Date
June 26, 2025, 11:12 a.m.
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 162.171779] Internal error: Oops: 0000000096000005 [#1] SMP [ 162.177387] Modules linked in: [ 162.180433] CPU: 2 UID: 0 PID: 581 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 162.190325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 162.194484] Hardware name: WinLink E850-96 board (DT) [ 162.199522] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 162.206462] pc : kunit_test_null_dereference+0x70/0x170 [ 162.211670] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.217487] sp : ffff80008a3b7d30 [ 162.220786] x29: ffff80008a3b7d90 x28: 0000000000000000 x27: 0000000000000000 [ 162.227902] x26: 1fffe00100db59c1 x25: 0000000000000000 x24: 0000000000000004 [ 162.235020] x23: ffff000806dace0c x22: ffff800081201da0 x21: ffff000806861d88 [ 162.242138] x20: 1ffff00011476fa6 x19: ffff800087bc7990 x18: ffff800087bc7b00 [ 162.249256] x17: ffff8000812001d0 x16: ffff800081200050 x15: ffff8000811f4e60 [ 162.256374] x14: ffff8000808d86a4 x13: 1fffe0010b5f19e0 x12: ffff60010093d3a4 [ 162.263492] x11: 1fffe0010093d3a3 x10: ffff60010093d3a3 x9 : ffff8000811f9208 [ 162.270610] x8 : ffff80008a3b7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 162.277728] x5 : ffff700011476fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 162.284846] x2 : dfff800000000000 x1 : ffff0008049e9440 x0 : ffff800087bc7990 [ 162.291966] Call trace: [ 162.294399] kunit_test_null_dereference+0x70/0x170 (P) [ 162.299606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.305071] kthread+0x328/0x630 [ 162.308283] ret_from_fork+0x10/0x20 [ 162.311858] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 162.317925] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[ 229.298589] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 229.306829] SMP: stopping secondary CPUs [ 229.310752] Kernel Offset: disabled [ 229.314203] CPU features: 0x0400,00000000,01002650,0200721b [ 229.319758] Memory Limit: none [ 229.322829] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 99.513179] ================================================================== [ 99.513316] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 99.513316] [ 99.513457] Use-after-free read at 0x(____ptrval____) (in kfence-#195): [ 99.513565] test_krealloc+0x51c/0x830 [ 99.516713] kunit_try_run_case+0x170/0x3f0 [ 99.520879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.526350] kthread+0x328/0x630 [ 99.529560] ret_from_fork+0x10/0x20 [ 99.533119] [ 99.534598] kfence-#195: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 99.534598] [ 99.544232] allocated by task 386 on cpu 1 at 99.513079s (0.031151s ago): [ 99.551017] test_alloc+0x29c/0x628 [ 99.554473] test_krealloc+0xc0/0x830 [ 99.558119] kunit_try_run_case+0x170/0x3f0 [ 99.562285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.567754] kthread+0x328/0x630 [ 99.570965] ret_from_fork+0x10/0x20 [ 99.574528] [ 99.576003] freed by task 386 on cpu 1 at 99.513112s (0.062888s ago): [ 99.582436] krealloc_noprof+0x148/0x360 [ 99.586330] test_krealloc+0x1dc/0x830 [ 99.590062] kunit_try_run_case+0x170/0x3f0 [ 99.594229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.599698] kthread+0x328/0x630 [ 99.602909] ret_from_fork+0x10/0x20 [ 99.606470] [ 99.607955] CPU: 1 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 99.617848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 99.622007] Hardware name: WinLink E850-96 board (DT) [ 99.627043] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 99.289972] ================================================================== [ 99.290121] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 99.290121] [ 99.290280] Use-after-free read at 0x(____ptrval____) (in kfence-#193): [ 99.291173] test_memcache_typesafe_by_rcu+0x280/0x560 [ 99.296294] kunit_try_run_case+0x170/0x3f0 [ 99.300461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.305929] kthread+0x328/0x630 [ 99.309141] ret_from_fork+0x10/0x20 [ 99.312700] [ 99.314179] kfence-#193: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 99.314179] [ 99.323293] allocated by task 384 on cpu 3 at 99.242331s (0.080959s ago): [ 99.330077] test_alloc+0x230/0x628 [ 99.333534] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 99.338655] kunit_try_run_case+0x170/0x3f0 [ 99.342821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.348290] kthread+0x328/0x630 [ 99.351502] ret_from_fork+0x10/0x20 [ 99.355063] [ 99.356538] freed by task 384 on cpu 3 at 99.242346s (0.114190s ago): [ 99.362970] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 99.368081] kunit_try_run_case+0x170/0x3f0 [ 99.372248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.377717] kthread+0x328/0x630 [ 99.380929] ret_from_fork+0x10/0x20 [ 99.384489] [ 99.385973] CPU: 3 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 99.395870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 99.400026] Hardware name: WinLink E850-96 board (DT) [ 99.405064] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 76.168295] ================================================================== [ 76.168492] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 76.168492] [ 76.168644] Invalid read at 0x(____ptrval____): [ 76.169825] test_invalid_access+0xdc/0x1f0 [ 76.173965] kunit_try_run_case+0x170/0x3f0 [ 76.178115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.183584] kthread+0x328/0x630 [ 76.186795] ret_from_fork+0x10/0x20 [ 76.190357] [ 76.191813] CPU: 7 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 76.201736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.205899] Hardware name: WinLink E850-96 board (DT) [ 76.210930] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 75.821159] ================================================================== [ 75.821303] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.821303] [ 75.821452] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#188): [ 75.825134] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.830342] kunit_try_run_case+0x170/0x3f0 [ 75.834509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.839978] kthread+0x328/0x630 [ 75.843189] ret_from_fork+0x10/0x20 [ 75.846748] [ 75.848227] kfence-#188: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 75.848227] [ 75.857861] allocated by task 374 on cpu 0 at 75.821090s (0.036769s ago): [ 75.864642] test_alloc+0x29c/0x628 [ 75.868102] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 75.873223] kunit_try_run_case+0x170/0x3f0 [ 75.877390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.882859] kthread+0x328/0x630 [ 75.886070] ret_from_fork+0x10/0x20 [ 75.889631] [ 75.891107] freed by task 374 on cpu 0 at 75.821107s (0.069997s ago): [ 75.897539] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.902737] kunit_try_run_case+0x170/0x3f0 [ 75.906903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.912372] kthread+0x328/0x630 [ 75.915584] ret_from_fork+0x10/0x20 [ 75.919145] [ 75.920629] CPU: 0 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 75.930530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.934682] Hardware name: WinLink E850-96 board (DT) [ 75.939719] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 75.609133] ================================================================== [ 75.609274] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 75.609274] [ 75.609429] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#186): [ 75.611111] test_kmalloc_aligned_oob_read+0x238/0x468 [ 75.616232] kunit_try_run_case+0x170/0x3f0 [ 75.620398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.625867] kthread+0x328/0x630 [ 75.629079] ret_from_fork+0x10/0x20 [ 75.632638] [ 75.634117] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 75.634117] [ 75.643751] allocated by task 372 on cpu 5 at 75.609096s (0.034653s ago): [ 75.650535] test_alloc+0x29c/0x628 [ 75.653992] test_kmalloc_aligned_oob_read+0x100/0x468 [ 75.659113] kunit_try_run_case+0x170/0x3f0 [ 75.663280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.668748] kthread+0x328/0x630 [ 75.671960] ret_from_fork+0x10/0x20 [ 75.675521] [ 75.677005] CPU: 5 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 75.686900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.691059] Hardware name: WinLink E850-96 board (DT) [ 75.696094] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 70.665139] ================================================================== [ 70.665269] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 70.665269] [ 70.665396] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#139): [ 70.667800] test_corruption+0x278/0x378 [ 70.671706] kunit_try_run_case+0x170/0x3f0 [ 70.675872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.681341] kthread+0x328/0x630 [ 70.684553] ret_from_fork+0x10/0x20 [ 70.688112] [ 70.689591] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.689591] [ 70.699225] allocated by task 360 on cpu 7 at 70.665076s (0.034146s ago): [ 70.706005] test_alloc+0x29c/0x628 [ 70.709466] test_corruption+0xdc/0x378 [ 70.713285] kunit_try_run_case+0x170/0x3f0 [ 70.717452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.722921] kthread+0x328/0x630 [ 70.726132] ret_from_fork+0x10/0x20 [ 70.729694] [ 70.731168] freed by task 360 on cpu 7 at 70.665093s (0.066073s ago): [ 70.737600] test_corruption+0x278/0x378 [ 70.741497] kunit_try_run_case+0x170/0x3f0 [ 70.745663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.751133] kthread+0x328/0x630 [ 70.754344] ret_from_fork+0x10/0x20 [ 70.757904] [ 70.759388] CPU: 7 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 70.769284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.773442] Hardware name: WinLink E850-96 board (DT) [ 70.778478] ================================================================== [ 71.317142] ================================================================== [ 71.317286] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 71.317286] [ 71.317414] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#145): [ 71.319816] test_corruption+0x120/0x378 [ 71.323722] kunit_try_run_case+0x170/0x3f0 [ 71.327888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.333357] kthread+0x328/0x630 [ 71.336569] ret_from_fork+0x10/0x20 [ 71.340128] [ 71.341606] kfence-#145: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.341606] [ 71.350720] allocated by task 362 on cpu 3 at 71.317076s (0.033641s ago): [ 71.357501] test_alloc+0x230/0x628 [ 71.360963] test_corruption+0xdc/0x378 [ 71.364781] kunit_try_run_case+0x170/0x3f0 [ 71.368947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.374416] kthread+0x328/0x630 [ 71.377627] ret_from_fork+0x10/0x20 [ 71.381189] [ 71.382664] freed by task 362 on cpu 3 at 71.317091s (0.065571s ago): [ 71.389097] test_corruption+0x120/0x378 [ 71.392992] kunit_try_run_case+0x170/0x3f0 [ 71.397158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.402627] kthread+0x328/0x630 [ 71.405839] ret_from_fork+0x10/0x20 [ 71.409399] [ 71.410884] CPU: 3 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 71.420781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.424937] Hardware name: WinLink E850-96 board (DT) [ 71.429974] ================================================================== [ 70.993158] ================================================================== [ 70.993289] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 70.993289] [ 70.993417] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#142): [ 70.993581] test_corruption+0x284/0x378 [ 70.997123] kunit_try_run_case+0x170/0x3f0 [ 71.001289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.006758] kthread+0x328/0x630 [ 71.009969] ret_from_fork+0x10/0x20 [ 71.013529] [ 71.015008] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 71.015008] [ 71.024642] allocated by task 360 on cpu 7 at 70.993094s (0.031545s ago): [ 71.031423] test_alloc+0x29c/0x628 [ 71.034882] test_corruption+0x198/0x378 [ 71.038789] kunit_try_run_case+0x170/0x3f0 [ 71.042955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.048424] kthread+0x328/0x630 [ 71.051636] ret_from_fork+0x10/0x20 [ 71.055198] [ 71.056673] freed by task 360 on cpu 7 at 70.993110s (0.063559s ago): [ 71.063104] test_corruption+0x284/0x378 [ 71.067000] kunit_try_run_case+0x170/0x3f0 [ 71.071167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.076635] kthread+0x328/0x630 [ 71.079847] ret_from_fork+0x10/0x20 [ 71.083407] [ 71.084892] CPU: 7 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 71.094787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.098945] Hardware name: WinLink E850-96 board (DT) [ 71.103982] ================================================================== [ 71.541148] ================================================================== [ 71.541289] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 71.541289] [ 71.541418] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#147): [ 71.541578] test_corruption+0x1d8/0x378 [ 71.545122] kunit_try_run_case+0x170/0x3f0 [ 71.549288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.554757] kthread+0x328/0x630 [ 71.557969] ret_from_fork+0x10/0x20 [ 71.561527] [ 71.563007] kfence-#147: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.563007] [ 71.572120] allocated by task 362 on cpu 3 at 71.541082s (0.031036s ago): [ 71.578901] test_alloc+0x230/0x628 [ 71.582361] test_corruption+0x198/0x378 [ 71.586267] kunit_try_run_case+0x170/0x3f0 [ 71.590433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.595902] kthread+0x328/0x630 [ 71.599114] ret_from_fork+0x10/0x20 [ 71.602676] [ 71.604151] freed by task 362 on cpu 3 at 71.541097s (0.063052s ago): [ 71.610583] test_corruption+0x1d8/0x378 [ 71.614478] kunit_try_run_case+0x170/0x3f0 [ 71.618645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.624114] kthread+0x328/0x630 [ 71.627326] ret_from_fork+0x10/0x20 [ 71.630886] [ 71.632370] CPU: 3 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 71.642264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.646424] Hardware name: WinLink E850-96 board (DT) [ 71.651460] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 70.249125] ================================================================== [ 70.249261] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 70.249261] [ 70.249397] Invalid free of 0x(____ptrval____) (in kfence-#135): [ 70.249501] test_invalid_addr_free+0x1ac/0x238 [ 70.253006] kunit_try_run_case+0x170/0x3f0 [ 70.257173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.262641] kthread+0x328/0x630 [ 70.265853] ret_from_fork+0x10/0x20 [ 70.269412] [ 70.270891] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.270891] [ 70.280525] allocated by task 356 on cpu 0 at 70.249077s (0.031446s ago): [ 70.287306] test_alloc+0x29c/0x628 [ 70.290766] test_invalid_addr_free+0xd4/0x238 [ 70.295193] kunit_try_run_case+0x170/0x3f0 [ 70.299361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.304828] kthread+0x328/0x630 [ 70.308040] ret_from_fork+0x10/0x20 [ 70.311601] [ 70.313085] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 70.322980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.327138] Hardware name: WinLink E850-96 board (DT) [ 70.332176] ================================================================== [ 70.457124] ================================================================== [ 70.457254] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 70.457254] [ 70.457382] Invalid free of 0x(____ptrval____) (in kfence-#137): [ 70.457485] test_invalid_addr_free+0xec/0x238 [ 70.460826] kunit_try_run_case+0x170/0x3f0 [ 70.464992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.470461] kthread+0x328/0x630 [ 70.473673] ret_from_fork+0x10/0x20 [ 70.477232] [ 70.478711] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.478711] [ 70.487824] allocated by task 358 on cpu 7 at 70.457079s (0.030742s ago): [ 70.494606] test_alloc+0x230/0x628 [ 70.498065] test_invalid_addr_free+0xd4/0x238 [ 70.502492] kunit_try_run_case+0x170/0x3f0 [ 70.506659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.512127] kthread+0x328/0x630 [ 70.515339] ret_from_fork+0x10/0x20 [ 70.518900] [ 70.520383] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 70.530279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.534437] Hardware name: WinLink E850-96 board (DT) [ 70.539474] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 70.029142] ================================================================== [ 70.029272] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 70.029272] [ 70.029400] Invalid free of 0x(____ptrval____) (in kfence-#133): [ 70.029502] test_double_free+0x100/0x238 [ 70.031977] kunit_try_run_case+0x170/0x3f0 [ 70.036143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.041612] kthread+0x328/0x630 [ 70.044823] ret_from_fork+0x10/0x20 [ 70.048383] [ 70.049862] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.049862] [ 70.058975] allocated by task 354 on cpu 1 at 70.029074s (0.029899s ago): [ 70.065758] test_alloc+0x230/0x628 [ 70.069215] test_double_free+0xd4/0x238 [ 70.073122] kunit_try_run_case+0x170/0x3f0 [ 70.077288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.082757] kthread+0x328/0x630 [ 70.085970] ret_from_fork+0x10/0x20 [ 70.089531] [ 70.091004] freed by task 354 on cpu 1 at 70.029088s (0.061914s ago): [ 70.097442] test_double_free+0xf0/0x238 [ 70.101333] kunit_try_run_case+0x170/0x3f0 [ 70.105500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.110969] kthread+0x328/0x630 [ 70.114180] ret_from_fork+0x10/0x20 [ 70.117741] [ 70.119226] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 70.129121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.133278] Hardware name: WinLink E850-96 board (DT) [ 70.138315] ================================================================== [ 69.809158] ================================================================== [ 69.809288] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 69.809288] [ 69.809415] Invalid free of 0x(____ptrval____) (in kfence-#131): [ 69.809515] test_double_free+0x1bc/0x238 [ 69.811993] kunit_try_run_case+0x170/0x3f0 [ 69.816159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.821628] kthread+0x328/0x630 [ 69.824840] ret_from_fork+0x10/0x20 [ 69.828399] [ 69.829878] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.829878] [ 69.839512] allocated by task 352 on cpu 0 at 69.809082s (0.030428s ago): [ 69.846293] test_alloc+0x29c/0x628 [ 69.849753] test_double_free+0xd4/0x238 [ 69.853659] kunit_try_run_case+0x170/0x3f0 [ 69.857825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.863294] kthread+0x328/0x630 [ 69.866506] ret_from_fork+0x10/0x20 [ 69.870068] [ 69.871543] freed by task 352 on cpu 0 at 69.809098s (0.062443s ago): [ 69.877978] test_double_free+0x1ac/0x238 [ 69.881957] kunit_try_run_case+0x170/0x3f0 [ 69.886124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.891594] kthread+0x328/0x630 [ 69.894804] ret_from_fork+0x10/0x20 [ 69.898364] [ 69.899850] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 69.909745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.913903] Hardware name: WinLink E850-96 board (DT) [ 69.918939] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 69.377127] ================================================================== [ 69.377246] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 69.377246] [ 69.377395] Use-after-free read at 0x(____ptrval____) (in kfence-#127): [ 69.377869] test_use_after_free_read+0x114/0x248 [ 69.382557] kunit_try_run_case+0x170/0x3f0 [ 69.386724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.392192] kthread+0x328/0x630 [ 69.395404] ret_from_fork+0x10/0x20 [ 69.398963] [ 69.400442] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.400442] [ 69.409555] allocated by task 346 on cpu 7 at 69.377074s (0.032479s ago): [ 69.416341] test_alloc+0x230/0x628 [ 69.419796] test_use_after_free_read+0xd0/0x248 [ 69.424397] kunit_try_run_case+0x170/0x3f0 [ 69.428565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.434032] kthread+0x328/0x630 [ 69.437244] ret_from_fork+0x10/0x20 [ 69.440805] [ 69.442283] freed by task 346 on cpu 7 at 69.377089s (0.065190s ago): [ 69.448716] test_use_after_free_read+0xf0/0x248 [ 69.453303] kunit_try_run_case+0x170/0x3f0 [ 69.457469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.462938] kthread+0x328/0x630 [ 69.466150] ret_from_fork+0x10/0x20 [ 69.469710] [ 69.471194] CPU: 7 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 69.481089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.485248] Hardware name: WinLink E850-96 board (DT) [ 69.490285] ================================================================== [ 69.153133] ================================================================== [ 69.153268] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 69.153268] [ 69.153426] Use-after-free read at 0x(____ptrval____) (in kfence-#125): [ 69.153890] test_use_after_free_read+0x114/0x248 [ 69.158577] kunit_try_run_case+0x170/0x3f0 [ 69.162744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.168212] kthread+0x328/0x630 [ 69.171424] ret_from_fork+0x10/0x20 [ 69.174983] [ 69.176462] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.176462] [ 69.186096] allocated by task 344 on cpu 0 at 69.153078s (0.033016s ago): [ 69.192882] test_alloc+0x29c/0x628 [ 69.196337] test_use_after_free_read+0xd0/0x248 [ 69.200937] kunit_try_run_case+0x170/0x3f0 [ 69.205104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.210573] kthread+0x328/0x630 [ 69.213786] ret_from_fork+0x10/0x20 [ 69.217347] [ 69.218823] freed by task 344 on cpu 0 at 69.153094s (0.065725s ago): [ 69.225256] test_use_after_free_read+0x1c0/0x248 [ 69.229932] kunit_try_run_case+0x170/0x3f0 [ 69.234097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.239566] kthread+0x328/0x630 [ 69.242777] ret_from_fork+0x10/0x20 [ 69.246338] [ 69.247823] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 69.257718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.261876] Hardware name: WinLink E850-96 board (DT) [ 69.266912] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 68.945099] ================================================================== [ 68.945235] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.945235] [ 68.945392] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#123): [ 68.946549] test_out_of_bounds_write+0x100/0x240 [ 68.951236] kunit_try_run_case+0x170/0x3f0 [ 68.955403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.960871] kthread+0x328/0x630 [ 68.964083] ret_from_fork+0x10/0x20 [ 68.967643] [ 68.969121] kfence-#123: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.969121] [ 68.978235] allocated by task 342 on cpu 1 at 68.945066s (0.033166s ago): [ 68.985021] test_alloc+0x230/0x628 [ 68.988476] test_out_of_bounds_write+0xc8/0x240 [ 68.993076] kunit_try_run_case+0x170/0x3f0 [ 68.997243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.002712] kthread+0x328/0x630 [ 69.005923] ret_from_fork+0x10/0x20 [ 69.009484] [ 69.010968] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 69.020863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.025021] Hardware name: WinLink E850-96 board (DT) [ 69.030058] ================================================================== [ 68.737102] ================================================================== [ 68.737231] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.737231] [ 68.737386] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#121): [ 68.738547] test_out_of_bounds_write+0x100/0x240 [ 68.743235] kunit_try_run_case+0x170/0x3f0 [ 68.747401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.752870] kthread+0x328/0x630 [ 68.756082] ret_from_fork+0x10/0x20 [ 68.759641] [ 68.761119] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.761119] [ 68.770754] allocated by task 340 on cpu 7 at 68.737069s (0.033683s ago): [ 68.777538] test_alloc+0x29c/0x628 [ 68.780995] test_out_of_bounds_write+0xc8/0x240 [ 68.785595] kunit_try_run_case+0x170/0x3f0 [ 68.789762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.795230] kthread+0x328/0x630 [ 68.798442] ret_from_fork+0x10/0x20 [ 68.802003] [ 68.803487] CPU: 7 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 68.813384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.817540] Hardware name: WinLink E850-96 board (DT) [ 68.822577] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 67.177121] ================================================================== [ 67.177246] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.177246] [ 67.177395] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#106): [ 67.178304] test_out_of_bounds_read+0x114/0x3e0 [ 67.182904] kunit_try_run_case+0x170/0x3f0 [ 67.187070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.192539] kthread+0x328/0x630 [ 67.195750] ret_from_fork+0x10/0x20 [ 67.199309] [ 67.200789] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.200789] [ 67.210423] allocated by task 336 on cpu 6 at 67.177087s (0.033334s ago): [ 67.217207] test_alloc+0x29c/0x628 [ 67.220664] test_out_of_bounds_read+0xdc/0x3e0 [ 67.225177] kunit_try_run_case+0x170/0x3f0 [ 67.229344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.234813] kthread+0x328/0x630 [ 67.238024] ret_from_fork+0x10/0x20 [ 67.241585] [ 67.243069] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 67.252963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.257122] Hardware name: WinLink E850-96 board (DT) [ 67.262159] ================================================================== [ 67.593113] ================================================================== [ 67.593242] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 67.593242] [ 67.593393] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#110): [ 67.594472] test_out_of_bounds_read+0x1c8/0x3e0 [ 67.599071] kunit_try_run_case+0x170/0x3f0 [ 67.603238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.608706] kthread+0x328/0x630 [ 67.611918] ret_from_fork+0x10/0x20 [ 67.615477] [ 67.616956] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.616956] [ 67.626590] allocated by task 336 on cpu 6 at 67.593080s (0.033508s ago): [ 67.633375] test_alloc+0x29c/0x628 [ 67.636831] test_out_of_bounds_read+0x198/0x3e0 [ 67.641431] kunit_try_run_case+0x170/0x3f0 [ 67.645598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.651066] kthread+0x328/0x630 [ 67.654278] ret_from_fork+0x10/0x20 [ 67.657839] [ 67.659323] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 67.669217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.673377] Hardware name: WinLink E850-96 board (DT) [ 67.678414] ================================================================== [ 68.529094] ================================================================== [ 68.529236] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 68.529236] [ 68.529389] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#119): [ 68.530465] test_out_of_bounds_read+0x1c8/0x3e0 [ 68.535064] kunit_try_run_case+0x170/0x3f0 [ 68.539231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.544700] kthread+0x328/0x630 [ 68.547912] ret_from_fork+0x10/0x20 [ 68.551470] [ 68.552949] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.552949] [ 68.562063] allocated by task 338 on cpu 0 at 68.529059s (0.033001s ago): [ 68.568846] test_alloc+0x230/0x628 [ 68.572304] test_out_of_bounds_read+0x198/0x3e0 [ 68.576904] kunit_try_run_case+0x170/0x3f0 [ 68.581072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.586539] kthread+0x328/0x630 [ 68.589751] ret_from_fork+0x10/0x20 [ 68.593312] [ 68.594797] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 68.604691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.608849] Hardware name: WinLink E850-96 board (DT) [ 68.613886] ================================================================== [ 67.905092] ================================================================== [ 67.905234] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.905234] [ 67.905388] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#113): [ 67.906290] test_out_of_bounds_read+0x114/0x3e0 [ 67.910888] kunit_try_run_case+0x170/0x3f0 [ 67.915055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.920524] kthread+0x328/0x630 [ 67.923736] ret_from_fork+0x10/0x20 [ 67.927294] [ 67.928772] kfence-#113: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.928772] [ 67.937887] allocated by task 338 on cpu 0 at 67.905058s (0.032827s ago): [ 67.944672] test_alloc+0x230/0x628 [ 67.948128] test_out_of_bounds_read+0xdc/0x3e0 [ 67.952641] kunit_try_run_case+0x170/0x3f0 [ 67.956808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.962277] kthread+0x328/0x630 [ 67.965488] ret_from_fork+0x10/0x20 [ 67.969049] [ 67.970534] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 67.980430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.984587] Hardware name: WinLink E850-96 board (DT) [ 67.989624] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 20.750038] ================================================================== [ 20.772760] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 20.772760] [ 20.782305] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#39): [ 20.790292] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.795499] kunit_try_run_case+0x170/0x3f0 [ 20.799666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.805135] kthread+0x328/0x630 [ 20.808346] ret_from_fork+0x10/0x20 [ 20.811905] [ 20.813384] kfence-#39: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 20.813384] [ 20.823107] allocated by task 191 on cpu 7 at 20.749682s (0.073423s ago): [ 20.829890] kmalloc_track_caller_oob_right+0x184/0x488 [ 20.835082] kunit_try_run_case+0x170/0x3f0 [ 20.839249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.844719] kthread+0x328/0x630 [ 20.847929] ret_from_fork+0x10/0x20 [ 20.851490] [ 20.852966] freed by task 191 on cpu 7 at 20.749999s (0.102962s ago): [ 20.859399] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.864595] kunit_try_run_case+0x170/0x3f0 [ 20.868762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.874231] kthread+0x328/0x630 [ 20.877442] ret_from_fork+0x10/0x20 [ 20.881003] [ 20.882487] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.892383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.896541] Hardware name: WinLink E850-96 board (DT) [ 20.901578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 66.766749] ================================================================== [ 66.773850] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 66.780793] Write of size 1 at addr ffff000800dad678 by task kunit_try_catch/334 [ 66.788170] [ 66.789655] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 66.789708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.789726] Hardware name: WinLink E850-96 board (DT) [ 66.789746] Call trace: [ 66.789762] show_stack+0x20/0x38 (C) [ 66.789798] dump_stack_lvl+0x8c/0xd0 [ 66.789837] print_report+0x118/0x608 [ 66.789868] kasan_report+0xdc/0x128 [ 66.789900] __asan_report_store1_noabort+0x20/0x30 [ 66.789935] strncpy_from_user+0x270/0x2a0 [ 66.789966] copy_user_test_oob+0x5c0/0xec8 [ 66.789995] kunit_try_run_case+0x170/0x3f0 [ 66.790032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.790071] kthread+0x328/0x630 [ 66.790104] ret_from_fork+0x10/0x20 [ 66.790140] [ 66.856658] Allocated by task 334: [ 66.860044] kasan_save_stack+0x3c/0x68 [ 66.863863] kasan_save_track+0x20/0x40 [ 66.867683] kasan_save_alloc_info+0x40/0x58 [ 66.871936] __kasan_kmalloc+0xd4/0xd8 [ 66.875669] __kmalloc_noprof+0x198/0x4c8 [ 66.879662] kunit_kmalloc_array+0x34/0x88 [ 66.883741] copy_user_test_oob+0xac/0xec8 [ 66.887821] kunit_try_run_case+0x170/0x3f0 [ 66.891988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.897457] kthread+0x328/0x630 [ 66.900668] ret_from_fork+0x10/0x20 [ 66.904227] [ 66.905703] The buggy address belongs to the object at ffff000800dad600 [ 66.905703] which belongs to the cache kmalloc-128 of size 128 [ 66.918203] The buggy address is located 0 bytes to the right of [ 66.918203] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.931137] [ 66.932616] The buggy address belongs to the physical page: [ 66.938170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.946154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.953793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.960737] page_type: f5(slab) [ 66.963873] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.971594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.979321] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.987132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.994945] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 67.002757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 67.010562] page dumped because: kasan: bad access detected [ 67.016118] [ 67.017593] Memory state around the buggy address: [ 67.022373] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.029577] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.036781] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 67.043982] ^ [ 67.051104] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.058309] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.065510] ================================================================== [ 66.457892] ================================================================== [ 66.465000] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 66.471855] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 66.479407] [ 66.480892] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 66.480942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.480958] Hardware name: WinLink E850-96 board (DT) [ 66.480977] Call trace: [ 66.480990] show_stack+0x20/0x38 (C) [ 66.481026] dump_stack_lvl+0x8c/0xd0 [ 66.481061] print_report+0x118/0x608 [ 66.481093] kasan_report+0xdc/0x128 [ 66.481122] kasan_check_range+0x100/0x1a8 [ 66.481156] __kasan_check_write+0x20/0x30 [ 66.481192] strncpy_from_user+0x3c/0x2a0 [ 66.481223] copy_user_test_oob+0x5c0/0xec8 [ 66.481253] kunit_try_run_case+0x170/0x3f0 [ 66.481290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.481329] kthread+0x328/0x630 [ 66.481365] ret_from_fork+0x10/0x20 [ 66.481401] [ 66.551110] Allocated by task 334: [ 66.554494] kasan_save_stack+0x3c/0x68 [ 66.558312] kasan_save_track+0x20/0x40 [ 66.562132] kasan_save_alloc_info+0x40/0x58 [ 66.566385] __kasan_kmalloc+0xd4/0xd8 [ 66.570118] __kmalloc_noprof+0x198/0x4c8 [ 66.574111] kunit_kmalloc_array+0x34/0x88 [ 66.578190] copy_user_test_oob+0xac/0xec8 [ 66.582270] kunit_try_run_case+0x170/0x3f0 [ 66.586437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.591906] kthread+0x328/0x630 [ 66.595117] ret_from_fork+0x10/0x20 [ 66.598676] [ 66.600152] The buggy address belongs to the object at ffff000800dad600 [ 66.600152] which belongs to the cache kmalloc-128 of size 128 [ 66.612652] The buggy address is located 0 bytes inside of [ 66.612652] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.625065] [ 66.626544] The buggy address belongs to the physical page: [ 66.632099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.640082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.647721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.654665] page_type: f5(slab) [ 66.657802] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.665522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.673249] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.681060] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.688873] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 66.696685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.704491] page dumped because: kasan: bad access detected [ 66.710048] [ 66.711523] Memory state around the buggy address: [ 66.716303] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.723505] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.730709] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.737910] ^ [ 66.745032] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.752237] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.759438] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 64.933426] ================================================================== [ 64.940371] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 64.947399] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 64.954864] [ 64.956350] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.956407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.956425] Hardware name: WinLink E850-96 board (DT) [ 64.956447] Call trace: [ 64.956461] show_stack+0x20/0x38 (C) [ 64.956497] dump_stack_lvl+0x8c/0xd0 [ 64.956538] print_report+0x118/0x608 [ 64.956573] kasan_report+0xdc/0x128 [ 64.956603] kasan_check_range+0x100/0x1a8 [ 64.956638] __kasan_check_read+0x20/0x30 [ 64.956673] copy_user_test_oob+0x728/0xec8 [ 64.956704] kunit_try_run_case+0x170/0x3f0 [ 64.956741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.956782] kthread+0x328/0x630 [ 64.956817] ret_from_fork+0x10/0x20 [ 64.956854] [ 65.022485] Allocated by task 334: [ 65.025872] kasan_save_stack+0x3c/0x68 [ 65.029689] kasan_save_track+0x20/0x40 [ 65.033509] kasan_save_alloc_info+0x40/0x58 [ 65.037763] __kasan_kmalloc+0xd4/0xd8 [ 65.041495] __kmalloc_noprof+0x198/0x4c8 [ 65.045488] kunit_kmalloc_array+0x34/0x88 [ 65.049567] copy_user_test_oob+0xac/0xec8 [ 65.053649] kunit_try_run_case+0x170/0x3f0 [ 65.057814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.063283] kthread+0x328/0x630 [ 65.066494] ret_from_fork+0x10/0x20 [ 65.070053] [ 65.071529] The buggy address belongs to the object at ffff000800dad600 [ 65.071529] which belongs to the cache kmalloc-128 of size 128 [ 65.084032] The buggy address is located 0 bytes inside of [ 65.084032] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 65.096442] [ 65.097922] The buggy address belongs to the physical page: [ 65.103477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 65.111462] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.119100] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.126045] page_type: f5(slab) [ 65.129178] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.136900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.144626] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.152437] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.160250] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 65.168062] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.175867] page dumped because: kasan: bad access detected [ 65.181423] [ 65.182899] Memory state around the buggy address: [ 65.187681] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.194882] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.202087] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.209288] ^ [ 65.216409] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.223614] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.230815] ================================================================== [ 64.623030] ================================================================== [ 64.635341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.642369] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 64.649922] [ 64.651409] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.651465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.651483] Hardware name: WinLink E850-96 board (DT) [ 64.651505] Call trace: [ 64.651519] show_stack+0x20/0x38 (C) [ 64.651558] dump_stack_lvl+0x8c/0xd0 [ 64.651599] print_report+0x118/0x608 [ 64.651631] kasan_report+0xdc/0x128 [ 64.651665] kasan_check_range+0x100/0x1a8 [ 64.651699] __kasan_check_write+0x20/0x30 [ 64.651733] copy_user_test_oob+0x234/0xec8 [ 64.651766] kunit_try_run_case+0x170/0x3f0 [ 64.651805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.651844] kthread+0x328/0x630 [ 64.651884] ret_from_fork+0x10/0x20 [ 64.651920] [ 64.717628] Allocated by task 334: [ 64.721018] kasan_save_stack+0x3c/0x68 [ 64.724833] kasan_save_track+0x20/0x40 [ 64.728652] kasan_save_alloc_info+0x40/0x58 [ 64.732906] __kasan_kmalloc+0xd4/0xd8 [ 64.736639] __kmalloc_noprof+0x198/0x4c8 [ 64.740632] kunit_kmalloc_array+0x34/0x88 [ 64.744711] copy_user_test_oob+0xac/0xec8 [ 64.748791] kunit_try_run_case+0x170/0x3f0 [ 64.752957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.758426] kthread+0x328/0x630 [ 64.761638] ret_from_fork+0x10/0x20 [ 64.765197] [ 64.766674] The buggy address belongs to the object at ffff000800dad600 [ 64.766674] which belongs to the cache kmalloc-128 of size 128 [ 64.779174] The buggy address is located 0 bytes inside of [ 64.779174] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 64.791585] [ 64.793066] The buggy address belongs to the physical page: [ 64.798621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 64.806606] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.814244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.821187] page_type: f5(slab) [ 64.824327] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.832043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.839771] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.847581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.855394] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 64.863206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.871011] page dumped because: kasan: bad access detected [ 64.876568] [ 64.878042] Memory state around the buggy address: [ 64.882823] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.890027] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.897232] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.904431] ^ [ 64.911553] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.918757] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.925960] ================================================================== [ 65.543170] ================================================================== [ 65.550259] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.557286] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 65.564751] [ 65.566236] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 65.566290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.566307] Hardware name: WinLink E850-96 board (DT) [ 65.566329] Call trace: [ 65.566344] show_stack+0x20/0x38 (C) [ 65.566379] dump_stack_lvl+0x8c/0xd0 [ 65.566415] print_report+0x118/0x608 [ 65.566449] kasan_report+0xdc/0x128 [ 65.566480] kasan_check_range+0x100/0x1a8 [ 65.566514] __kasan_check_read+0x20/0x30 [ 65.566550] copy_user_test_oob+0x3c8/0xec8 [ 65.566581] kunit_try_run_case+0x170/0x3f0 [ 65.566618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.566658] kthread+0x328/0x630 [ 65.566690] ret_from_fork+0x10/0x20 [ 65.566726] [ 65.632372] Allocated by task 334: [ 65.635760] kasan_save_stack+0x3c/0x68 [ 65.639576] kasan_save_track+0x20/0x40 [ 65.643396] kasan_save_alloc_info+0x40/0x58 [ 65.647649] __kasan_kmalloc+0xd4/0xd8 [ 65.651383] __kmalloc_noprof+0x198/0x4c8 [ 65.655375] kunit_kmalloc_array+0x34/0x88 [ 65.659455] copy_user_test_oob+0xac/0xec8 [ 65.663534] kunit_try_run_case+0x170/0x3f0 [ 65.667701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.673170] kthread+0x328/0x630 [ 65.676381] ret_from_fork+0x10/0x20 [ 65.679940] [ 65.681416] The buggy address belongs to the object at ffff000800dad600 [ 65.681416] which belongs to the cache kmalloc-128 of size 128 [ 65.693919] The buggy address is located 0 bytes inside of [ 65.693919] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 65.706329] [ 65.707807] The buggy address belongs to the physical page: [ 65.713366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 65.721347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.728986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.735932] page_type: f5(slab) [ 65.739065] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.746786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.754513] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.762324] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.770137] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 65.777949] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.785755] page dumped because: kasan: bad access detected [ 65.791310] [ 65.792785] Memory state around the buggy address: [ 65.797565] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.804769] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.811973] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.819174] ^ [ 65.826296] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.833501] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.840703] ================================================================== [ 65.238365] ================================================================== [ 65.245231] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.252256] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 65.259808] [ 65.261293] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 65.261350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.261368] Hardware name: WinLink E850-96 board (DT) [ 65.261389] Call trace: [ 65.261404] show_stack+0x20/0x38 (C) [ 65.261443] dump_stack_lvl+0x8c/0xd0 [ 65.261481] print_report+0x118/0x608 [ 65.261513] kasan_report+0xdc/0x128 [ 65.261546] kasan_check_range+0x100/0x1a8 [ 65.261581] __kasan_check_write+0x20/0x30 [ 65.261614] copy_user_test_oob+0x35c/0xec8 [ 65.261644] kunit_try_run_case+0x170/0x3f0 [ 65.261682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.261723] kthread+0x328/0x630 [ 65.261756] ret_from_fork+0x10/0x20 [ 65.261792] [ 65.327514] Allocated by task 334: [ 65.330904] kasan_save_stack+0x3c/0x68 [ 65.334720] kasan_save_track+0x20/0x40 [ 65.338539] kasan_save_alloc_info+0x40/0x58 [ 65.342792] __kasan_kmalloc+0xd4/0xd8 [ 65.346526] __kmalloc_noprof+0x198/0x4c8 [ 65.350518] kunit_kmalloc_array+0x34/0x88 [ 65.354598] copy_user_test_oob+0xac/0xec8 [ 65.358677] kunit_try_run_case+0x170/0x3f0 [ 65.362844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.368313] kthread+0x328/0x630 [ 65.371525] ret_from_fork+0x10/0x20 [ 65.375084] [ 65.376559] The buggy address belongs to the object at ffff000800dad600 [ 65.376559] which belongs to the cache kmalloc-128 of size 128 [ 65.389062] The buggy address is located 0 bytes inside of [ 65.389062] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 65.401472] [ 65.402951] The buggy address belongs to the physical page: [ 65.408508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 65.416489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.424131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.431074] page_type: f5(slab) [ 65.434211] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.441930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.449656] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.457467] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.465280] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 65.473092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.480898] page dumped because: kasan: bad access detected [ 65.486453] [ 65.487929] Memory state around the buggy address: [ 65.492710] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.499912] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.507116] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.514318] ^ [ 65.521440] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.528644] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.535845] ================================================================== [ 66.153052] ================================================================== [ 66.160144] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.167172] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 66.174638] [ 66.176122] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 66.176177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.176197] Hardware name: WinLink E850-96 board (DT) [ 66.176219] Call trace: [ 66.176232] show_stack+0x20/0x38 (C) [ 66.176267] dump_stack_lvl+0x8c/0xd0 [ 66.176305] print_report+0x118/0x608 [ 66.176336] kasan_report+0xdc/0x128 [ 66.176367] kasan_check_range+0x100/0x1a8 [ 66.176400] __kasan_check_read+0x20/0x30 [ 66.176433] copy_user_test_oob+0x4a0/0xec8 [ 66.176463] kunit_try_run_case+0x170/0x3f0 [ 66.176501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.176539] kthread+0x328/0x630 [ 66.176573] ret_from_fork+0x10/0x20 [ 66.176606] [ 66.242258] Allocated by task 334: [ 66.245645] kasan_save_stack+0x3c/0x68 [ 66.249463] kasan_save_track+0x20/0x40 [ 66.253282] kasan_save_alloc_info+0x40/0x58 [ 66.257536] __kasan_kmalloc+0xd4/0xd8 [ 66.261268] __kmalloc_noprof+0x198/0x4c8 [ 66.265261] kunit_kmalloc_array+0x34/0x88 [ 66.269341] copy_user_test_oob+0xac/0xec8 [ 66.273420] kunit_try_run_case+0x170/0x3f0 [ 66.277587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.283056] kthread+0x328/0x630 [ 66.286267] ret_from_fork+0x10/0x20 [ 66.289827] [ 66.291302] The buggy address belongs to the object at ffff000800dad600 [ 66.291302] which belongs to the cache kmalloc-128 of size 128 [ 66.303803] The buggy address is located 0 bytes inside of [ 66.303803] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.316215] [ 66.317693] The buggy address belongs to the physical page: [ 66.323249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.331233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.338873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.345817] page_type: f5(slab) [ 66.348949] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.356673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.364400] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.372210] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.380024] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 66.387835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.395641] page dumped because: kasan: bad access detected [ 66.401196] [ 66.402672] Memory state around the buggy address: [ 66.407452] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.414655] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.421860] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.429061] ^ [ 66.436182] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.443389] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.450589] ================================================================== [ 65.848118] ================================================================== [ 65.855114] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 65.862142] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 65.869694] [ 65.871179] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 65.871235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.871254] Hardware name: WinLink E850-96 board (DT) [ 65.871276] Call trace: [ 65.871290] show_stack+0x20/0x38 (C) [ 65.871327] dump_stack_lvl+0x8c/0xd0 [ 65.871366] print_report+0x118/0x608 [ 65.871399] kasan_report+0xdc/0x128 [ 65.871431] kasan_check_range+0x100/0x1a8 [ 65.871463] __kasan_check_write+0x20/0x30 [ 65.871497] copy_user_test_oob+0x434/0xec8 [ 65.871527] kunit_try_run_case+0x170/0x3f0 [ 65.871566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.871604] kthread+0x328/0x630 [ 65.871640] ret_from_fork+0x10/0x20 [ 65.871674] [ 65.937401] Allocated by task 334: [ 65.940788] kasan_save_stack+0x3c/0x68 [ 65.944606] kasan_save_track+0x20/0x40 [ 65.948425] kasan_save_alloc_info+0x40/0x58 [ 65.952679] __kasan_kmalloc+0xd4/0xd8 [ 65.956413] __kmalloc_noprof+0x198/0x4c8 [ 65.960405] kunit_kmalloc_array+0x34/0x88 [ 65.964485] copy_user_test_oob+0xac/0xec8 [ 65.968564] kunit_try_run_case+0x170/0x3f0 [ 65.972731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.978199] kthread+0x328/0x630 [ 65.981411] ret_from_fork+0x10/0x20 [ 65.984970] [ 65.986446] The buggy address belongs to the object at ffff000800dad600 [ 65.986446] which belongs to the cache kmalloc-128 of size 128 [ 65.998948] The buggy address is located 0 bytes inside of [ 65.998948] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.011359] [ 66.012836] The buggy address belongs to the physical page: [ 66.018395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.026379] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.034017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.040959] page_type: f5(slab) [ 66.044095] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.051816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.059543] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.067354] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.075167] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 66.082979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.090785] page dumped because: kasan: bad access detected [ 66.096340] [ 66.097816] Memory state around the buggy address: [ 66.102597] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.109799] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.117003] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.124204] ^ [ 66.131327] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.138531] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.145732] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 64.309905] ================================================================== [ 64.316772] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 64.324058] Write of size 8 at addr ffff000801936378 by task kunit_try_catch/330 [ 64.331436] [ 64.332922] CPU: 2 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.332973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.332989] Hardware name: WinLink E850-96 board (DT) [ 64.333010] Call trace: [ 64.333025] show_stack+0x20/0x38 (C) [ 64.333060] dump_stack_lvl+0x8c/0xd0 [ 64.333100] print_report+0x118/0x608 [ 64.333134] kasan_report+0xdc/0x128 [ 64.333166] kasan_check_range+0x100/0x1a8 [ 64.333202] __kasan_check_write+0x20/0x30 [ 64.333238] copy_to_kernel_nofault+0x8c/0x250 [ 64.333270] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 64.333308] kunit_try_run_case+0x170/0x3f0 [ 64.333345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.333387] kthread+0x328/0x630 [ 64.333422] ret_from_fork+0x10/0x20 [ 64.333458] [ 64.404265] Allocated by task 330: [ 64.407653] kasan_save_stack+0x3c/0x68 [ 64.411469] kasan_save_track+0x20/0x40 [ 64.415289] kasan_save_alloc_info+0x40/0x58 [ 64.419542] __kasan_kmalloc+0xd4/0xd8 [ 64.423275] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.427789] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.432564] kunit_try_run_case+0x170/0x3f0 [ 64.436729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.442198] kthread+0x328/0x630 [ 64.445410] ret_from_fork+0x10/0x20 [ 64.448969] [ 64.450444] The buggy address belongs to the object at ffff000801936300 [ 64.450444] which belongs to the cache kmalloc-128 of size 128 [ 64.462946] The buggy address is located 0 bytes to the right of [ 64.462946] allocated 120-byte region [ffff000801936300, ffff000801936378) [ 64.475878] [ 64.477358] The buggy address belongs to the physical page: [ 64.482915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881936 [ 64.490897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.498536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.505478] page_type: f5(slab) [ 64.508614] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.516336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.524062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.531874] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.539687] head: 0bfffe0000000001 fffffdffe0064d81 00000000ffffffff 00000000ffffffff [ 64.547499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.555304] page dumped because: kasan: bad access detected [ 64.560860] [ 64.562337] Memory state around the buggy address: [ 64.567116] ffff000801936200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.574318] ffff000801936280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.581523] >ffff000801936300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.588724] ^ [ 64.595845] ffff000801936380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.603052] ffff000801936400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.610251] ================================================================== [ 63.998053] ================================================================== [ 64.012174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 64.019550] Read of size 8 at addr ffff000801936378 by task kunit_try_catch/330 [ 64.026840] [ 64.028328] CPU: 2 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.028383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.028403] Hardware name: WinLink E850-96 board (DT) [ 64.028428] Call trace: [ 64.028443] show_stack+0x20/0x38 (C) [ 64.028483] dump_stack_lvl+0x8c/0xd0 [ 64.028522] print_report+0x118/0x608 [ 64.028558] kasan_report+0xdc/0x128 [ 64.028590] __asan_report_load8_noabort+0x20/0x30 [ 64.028626] copy_to_kernel_nofault+0x204/0x250 [ 64.028658] copy_to_kernel_nofault_oob+0x158/0x418 [ 64.028702] kunit_try_run_case+0x170/0x3f0 [ 64.028741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.028781] kthread+0x328/0x630 [ 64.028818] ret_from_fork+0x10/0x20 [ 64.028854] [ 64.096371] Allocated by task 330: [ 64.099760] kasan_save_stack+0x3c/0x68 [ 64.103576] kasan_save_track+0x20/0x40 [ 64.107396] kasan_save_alloc_info+0x40/0x58 [ 64.111648] __kasan_kmalloc+0xd4/0xd8 [ 64.115380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.119894] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.124670] kunit_try_run_case+0x170/0x3f0 [ 64.128835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.134304] kthread+0x328/0x630 [ 64.137515] ret_from_fork+0x10/0x20 [ 64.141074] [ 64.142551] The buggy address belongs to the object at ffff000801936300 [ 64.142551] which belongs to the cache kmalloc-128 of size 128 [ 64.155052] The buggy address is located 0 bytes to the right of [ 64.155052] allocated 120-byte region [ffff000801936300, ffff000801936378) [ 64.167983] [ 64.169464] The buggy address belongs to the physical page: [ 64.175021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881936 [ 64.183003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.190641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.197585] page_type: f5(slab) [ 64.200723] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.208441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.216168] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.223979] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.231792] head: 0bfffe0000000001 fffffdffe0064d81 00000000ffffffff 00000000ffffffff [ 64.239604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.247409] page dumped because: kasan: bad access detected [ 64.252965] [ 64.254442] Memory state around the buggy address: [ 64.259221] ffff000801936200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.266424] ffff000801936280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.273630] >ffff000801936300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.280829] ^ [ 64.287951] ffff000801936380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.295157] ffff000801936400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.302358] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 63.558711] ================================================================== [ 63.573117] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 63.579800] Read of size 1 at addr ffff800087b3d7f3 by task kunit_try_catch/318 [ 63.587091] [ 63.588578] CPU: 2 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 63.588636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.588652] Hardware name: WinLink E850-96 board (DT) [ 63.588676] Call trace: [ 63.588690] show_stack+0x20/0x38 (C) [ 63.588730] dump_stack_lvl+0x8c/0xd0 [ 63.588769] print_report+0x310/0x608 [ 63.588803] kasan_report+0xdc/0x128 [ 63.588835] __asan_report_load1_noabort+0x20/0x30 [ 63.588874] vmalloc_oob+0x578/0x5d0 [ 63.588908] kunit_try_run_case+0x170/0x3f0 [ 63.588945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.588986] kthread+0x328/0x630 [ 63.589023] ret_from_fork+0x10/0x20 [ 63.589060] [ 63.650809] The buggy address belongs to the virtual mapping at [ 63.650809] [ffff800087b3d000, ffff800087b3f000) created by: [ 63.650809] vmalloc_oob+0x98/0x5d0 [ 63.665908] [ 63.667388] The buggy address belongs to the physical page: [ 63.672944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886532 [ 63.680927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.687451] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.695168] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.702886] page dumped because: kasan: bad access detected [ 63.708445] [ 63.709917] Memory state around the buggy address: [ 63.714699] ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.721900] ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.729106] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.736306] ^ [ 63.743169] ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.750372] ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.757575] ================================================================== [ 63.764906] ================================================================== [ 63.771987] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 63.778667] Read of size 1 at addr ffff800087b3d7f8 by task kunit_try_catch/318 [ 63.785958] [ 63.787443] CPU: 2 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 63.787495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.787511] Hardware name: WinLink E850-96 board (DT) [ 63.787533] Call trace: [ 63.787546] show_stack+0x20/0x38 (C) [ 63.787584] dump_stack_lvl+0x8c/0xd0 [ 63.787622] print_report+0x310/0x608 [ 63.787654] kasan_report+0xdc/0x128 [ 63.787686] __asan_report_load1_noabort+0x20/0x30 [ 63.787722] vmalloc_oob+0x51c/0x5d0 [ 63.787754] kunit_try_run_case+0x170/0x3f0 [ 63.787796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.787837] kthread+0x328/0x630 [ 63.787874] ret_from_fork+0x10/0x20 [ 63.787907] [ 63.849676] The buggy address belongs to the virtual mapping at [ 63.849676] [ffff800087b3d000, ffff800087b3f000) created by: [ 63.849676] vmalloc_oob+0x98/0x5d0 [ 63.864778] [ 63.866257] The buggy address belongs to the physical page: [ 63.871812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886532 [ 63.879796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.886318] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.894036] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.901755] page dumped because: kasan: bad access detected [ 63.907312] [ 63.908786] Memory state around the buggy address: [ 63.913566] ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.920769] ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.927974] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.935175] ^ [ 63.942298] ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.949503] ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.956703] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 48.558908] ================================================================== [ 48.565965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.573253] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.580631] [ 48.582114] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.582161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.582178] Hardware name: WinLink E850-96 board (DT) [ 48.582197] Call trace: [ 48.582211] show_stack+0x20/0x38 (C) [ 48.582244] dump_stack_lvl+0x8c/0xd0 [ 48.582280] print_report+0x118/0x608 [ 48.582310] kasan_report+0xdc/0x128 [ 48.582340] kasan_check_range+0x100/0x1a8 [ 48.582375] __kasan_check_write+0x20/0x30 [ 48.582408] kasan_atomics_helper+0x3ac/0x4858 [ 48.582438] kasan_atomics+0x198/0x2e0 [ 48.582465] kunit_try_run_case+0x170/0x3f0 [ 48.582501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.582542] kthread+0x328/0x630 [ 48.582577] ret_from_fork+0x10/0x20 [ 48.582609] [ 48.652331] Allocated by task 314: [ 48.655718] kasan_save_stack+0x3c/0x68 [ 48.659536] kasan_save_track+0x20/0x40 [ 48.663355] kasan_save_alloc_info+0x40/0x58 [ 48.667609] __kasan_kmalloc+0xd4/0xd8 [ 48.671341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.675855] kasan_atomics+0xb8/0x2e0 [ 48.679501] kunit_try_run_case+0x170/0x3f0 [ 48.683668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.689136] kthread+0x328/0x630 [ 48.692348] ret_from_fork+0x10/0x20 [ 48.695907] [ 48.697382] The buggy address belongs to the object at ffff000800d61a00 [ 48.697382] which belongs to the cache kmalloc-64 of size 64 [ 48.709710] The buggy address is located 0 bytes to the right of [ 48.709710] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.722556] [ 48.724033] The buggy address belongs to the physical page: [ 48.729589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 48.737576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.744083] page_type: f5(slab) [ 48.747219] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.754941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.762659] page dumped because: kasan: bad access detected [ 48.768215] [ 48.769690] Memory state around the buggy address: [ 48.774471] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.781673] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.788878] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.796079] ^ [ 48.800857] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.808062] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.815263] ================================================================== [ 50.141179] ================================================================== [ 50.148232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.155521] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.162899] [ 50.164381] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.164430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.164447] Hardware name: WinLink E850-96 board (DT) [ 50.164468] Call trace: [ 50.164479] show_stack+0x20/0x38 (C) [ 50.164513] dump_stack_lvl+0x8c/0xd0 [ 50.164550] print_report+0x118/0x608 [ 50.164581] kasan_report+0xdc/0x128 [ 50.164611] kasan_check_range+0x100/0x1a8 [ 50.164642] __kasan_check_write+0x20/0x30 [ 50.164675] kasan_atomics_helper+0x61c/0x4858 [ 50.164705] kasan_atomics+0x198/0x2e0 [ 50.164732] kunit_try_run_case+0x170/0x3f0 [ 50.164767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.164806] kthread+0x328/0x630 [ 50.164838] ret_from_fork+0x10/0x20 [ 50.164873] [ 50.234599] Allocated by task 314: [ 50.237984] kasan_save_stack+0x3c/0x68 [ 50.241804] kasan_save_track+0x20/0x40 [ 50.245623] kasan_save_alloc_info+0x40/0x58 [ 50.249877] __kasan_kmalloc+0xd4/0xd8 [ 50.253609] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.258123] kasan_atomics+0xb8/0x2e0 [ 50.261769] kunit_try_run_case+0x170/0x3f0 [ 50.265936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.271404] kthread+0x328/0x630 [ 50.274616] ret_from_fork+0x10/0x20 [ 50.278175] [ 50.279650] The buggy address belongs to the object at ffff000800d61a00 [ 50.279650] which belongs to the cache kmalloc-64 of size 64 [ 50.291977] The buggy address is located 0 bytes to the right of [ 50.291977] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.304824] [ 50.306301] The buggy address belongs to the physical page: [ 50.311855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.319841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.326351] page_type: f5(slab) [ 50.329487] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.337208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.344927] page dumped because: kasan: bad access detected [ 50.350483] [ 50.351958] Memory state around the buggy address: [ 50.356737] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.363941] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.371146] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.378347] ^ [ 50.383125] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.390330] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.397531] ================================================================== [ 53.038704] ================================================================== [ 53.045758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.053047] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.060425] [ 53.061906] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.061952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.061968] Hardware name: WinLink E850-96 board (DT) [ 53.061987] Call trace: [ 53.062002] show_stack+0x20/0x38 (C) [ 53.062035] dump_stack_lvl+0x8c/0xd0 [ 53.062071] print_report+0x118/0x608 [ 53.062102] kasan_report+0xdc/0x128 [ 53.062132] kasan_check_range+0x100/0x1a8 [ 53.062164] __kasan_check_write+0x20/0x30 [ 53.062199] kasan_atomics_helper+0xad4/0x4858 [ 53.062229] kasan_atomics+0x198/0x2e0 [ 53.062258] kunit_try_run_case+0x170/0x3f0 [ 53.062295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.062333] kthread+0x328/0x630 [ 53.062367] ret_from_fork+0x10/0x20 [ 53.062401] [ 53.132125] Allocated by task 314: [ 53.135512] kasan_save_stack+0x3c/0x68 [ 53.139330] kasan_save_track+0x20/0x40 [ 53.143149] kasan_save_alloc_info+0x40/0x58 [ 53.147403] __kasan_kmalloc+0xd4/0xd8 [ 53.151135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.155649] kasan_atomics+0xb8/0x2e0 [ 53.159295] kunit_try_run_case+0x170/0x3f0 [ 53.163461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.168930] kthread+0x328/0x630 [ 53.172142] ret_from_fork+0x10/0x20 [ 53.175701] [ 53.177176] The buggy address belongs to the object at ffff000800d61a00 [ 53.177176] which belongs to the cache kmalloc-64 of size 64 [ 53.189503] The buggy address is located 0 bytes to the right of [ 53.189503] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.202349] [ 53.203826] The buggy address belongs to the physical page: [ 53.209382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 53.217367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.223877] page_type: f5(slab) [ 53.227013] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.234735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.242453] page dumped because: kasan: bad access detected [ 53.248009] [ 53.249484] Memory state around the buggy address: [ 53.254264] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.261467] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.268672] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.275873] ^ [ 53.280651] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.287856] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.295057] ================================================================== [ 55.398906] ================================================================== [ 55.405965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.413341] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.420633] [ 55.422117] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.422165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.422181] Hardware name: WinLink E850-96 board (DT) [ 55.422198] Call trace: [ 55.422211] show_stack+0x20/0x38 (C) [ 55.422244] dump_stack_lvl+0x8c/0xd0 [ 55.422280] print_report+0x118/0x608 [ 55.422309] kasan_report+0xdc/0x128 [ 55.422340] __asan_report_load4_noabort+0x20/0x30 [ 55.422375] kasan_atomics_helper+0x3e04/0x4858 [ 55.422403] kasan_atomics+0x198/0x2e0 [ 55.422431] kunit_try_run_case+0x170/0x3f0 [ 55.422467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.422507] kthread+0x328/0x630 [ 55.422540] ret_from_fork+0x10/0x20 [ 55.422571] [ 55.489034] Allocated by task 314: [ 55.492420] kasan_save_stack+0x3c/0x68 [ 55.496239] kasan_save_track+0x20/0x40 [ 55.500058] kasan_save_alloc_info+0x40/0x58 [ 55.504312] __kasan_kmalloc+0xd4/0xd8 [ 55.508044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.512558] kasan_atomics+0xb8/0x2e0 [ 55.516204] kunit_try_run_case+0x170/0x3f0 [ 55.520371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.525839] kthread+0x328/0x630 [ 55.529051] ret_from_fork+0x10/0x20 [ 55.532610] [ 55.534086] The buggy address belongs to the object at ffff000800d61a00 [ 55.534086] which belongs to the cache kmalloc-64 of size 64 [ 55.546412] The buggy address is located 0 bytes to the right of [ 55.546412] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.559259] [ 55.560735] The buggy address belongs to the physical page: [ 55.566291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.574276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.580786] page_type: f5(slab) [ 55.583922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.591643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.599362] page dumped because: kasan: bad access detected [ 55.604918] [ 55.606393] Memory state around the buggy address: [ 55.611172] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.618376] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.625581] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.632782] ^ [ 55.637560] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.644764] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.651966] ================================================================== [ 62.238031] ================================================================== [ 62.245099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.252475] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 62.259853] [ 62.261336] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.261386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.261401] Hardware name: WinLink E850-96 board (DT) [ 62.261420] Call trace: [ 62.261432] show_stack+0x20/0x38 (C) [ 62.261463] dump_stack_lvl+0x8c/0xd0 [ 62.261498] print_report+0x118/0x608 [ 62.261528] kasan_report+0xdc/0x128 [ 62.261557] kasan_check_range+0x100/0x1a8 [ 62.261589] __kasan_check_write+0x20/0x30 [ 62.261622] kasan_atomics_helper+0x16d0/0x4858 [ 62.261652] kasan_atomics+0x198/0x2e0 [ 62.261680] kunit_try_run_case+0x170/0x3f0 [ 62.261717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.261757] kthread+0x328/0x630 [ 62.261790] ret_from_fork+0x10/0x20 [ 62.261823] [ 62.331639] Allocated by task 314: [ 62.335026] kasan_save_stack+0x3c/0x68 [ 62.338844] kasan_save_track+0x20/0x40 [ 62.342663] kasan_save_alloc_info+0x40/0x58 [ 62.346917] __kasan_kmalloc+0xd4/0xd8 [ 62.350650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.355163] kasan_atomics+0xb8/0x2e0 [ 62.358809] kunit_try_run_case+0x170/0x3f0 [ 62.362976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.368445] kthread+0x328/0x630 [ 62.371656] ret_from_fork+0x10/0x20 [ 62.375215] [ 62.376691] The buggy address belongs to the object at ffff000800d61a00 [ 62.376691] which belongs to the cache kmalloc-64 of size 64 [ 62.389018] The buggy address is located 0 bytes to the right of [ 62.389018] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.401864] [ 62.403342] The buggy address belongs to the physical page: [ 62.408896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.416882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.423392] page_type: f5(slab) [ 62.426527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.434249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.441968] page dumped because: kasan: bad access detected [ 62.447523] [ 62.448999] Memory state around the buggy address: [ 62.453777] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.460982] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.468187] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.475387] ^ [ 62.480166] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.487370] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.494571] ================================================================== [ 63.026239] ================================================================== [ 63.033282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.040657] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 63.047948] [ 63.049432] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 63.049482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.049498] Hardware name: WinLink E850-96 board (DT) [ 63.049517] Call trace: [ 63.049530] show_stack+0x20/0x38 (C) [ 63.049562] dump_stack_lvl+0x8c/0xd0 [ 63.049598] print_report+0x118/0x608 [ 63.049628] kasan_report+0xdc/0x128 [ 63.049657] __asan_report_load8_noabort+0x20/0x30 [ 63.049692] kasan_atomics_helper+0x3e20/0x4858 [ 63.049722] kasan_atomics+0x198/0x2e0 [ 63.049752] kunit_try_run_case+0x170/0x3f0 [ 63.049788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.049828] kthread+0x328/0x630 [ 63.049861] ret_from_fork+0x10/0x20 [ 63.049896] [ 63.116350] Allocated by task 314: [ 63.119737] kasan_save_stack+0x3c/0x68 [ 63.123555] kasan_save_track+0x20/0x40 [ 63.127374] kasan_save_alloc_info+0x40/0x58 [ 63.131628] __kasan_kmalloc+0xd4/0xd8 [ 63.135360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.139874] kasan_atomics+0xb8/0x2e0 [ 63.143520] kunit_try_run_case+0x170/0x3f0 [ 63.147686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.153155] kthread+0x328/0x630 [ 63.156367] ret_from_fork+0x10/0x20 [ 63.159926] [ 63.161401] The buggy address belongs to the object at ffff000800d61a00 [ 63.161401] which belongs to the cache kmalloc-64 of size 64 [ 63.173729] The buggy address is located 0 bytes to the right of [ 63.173729] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 63.186575] [ 63.188052] The buggy address belongs to the physical page: [ 63.193608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 63.201592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.208102] page_type: f5(slab) [ 63.211237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.218960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.226678] page dumped because: kasan: bad access detected [ 63.232234] [ 63.233709] Memory state around the buggy address: [ 63.238489] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.245692] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.252897] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.260098] ^ [ 63.264876] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.272081] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.279282] ================================================================== [ 46.983525] ================================================================== [ 46.990471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 46.997756] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.005047] [ 47.006533] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.006594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.006611] Hardware name: WinLink E850-96 board (DT) [ 47.006633] Call trace: [ 47.006649] show_stack+0x20/0x38 (C) [ 47.006684] dump_stack_lvl+0x8c/0xd0 [ 47.006726] print_report+0x118/0x608 [ 47.006757] kasan_report+0xdc/0x128 [ 47.006788] kasan_check_range+0x100/0x1a8 [ 47.006824] __kasan_check_read+0x20/0x30 [ 47.006857] kasan_atomics_helper+0x1ec/0x4858 [ 47.006889] kasan_atomics+0x198/0x2e0 [ 47.006918] kunit_try_run_case+0x170/0x3f0 [ 47.006957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.006997] kthread+0x328/0x630 [ 47.007033] ret_from_fork+0x10/0x20 [ 47.007069] [ 47.076661] Allocated by task 314: [ 47.080049] kasan_save_stack+0x3c/0x68 [ 47.083865] kasan_save_track+0x20/0x40 [ 47.087685] kasan_save_alloc_info+0x40/0x58 [ 47.091938] __kasan_kmalloc+0xd4/0xd8 [ 47.095671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.100184] kasan_atomics+0xb8/0x2e0 [ 47.103830] kunit_try_run_case+0x170/0x3f0 [ 47.107997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.113466] kthread+0x328/0x630 [ 47.116677] ret_from_fork+0x10/0x20 [ 47.120236] [ 47.121712] The buggy address belongs to the object at ffff000800d61a00 [ 47.121712] which belongs to the cache kmalloc-64 of size 64 [ 47.134042] The buggy address is located 0 bytes to the right of [ 47.134042] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.146885] [ 47.148363] The buggy address belongs to the physical page: [ 47.153921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.161905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.168413] page_type: f5(slab) [ 47.171552] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.179270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.186989] page dumped because: kasan: bad access detected [ 47.192545] [ 47.194020] Memory state around the buggy address: [ 47.198802] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.206003] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.213208] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.220408] ^ [ 47.225186] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.232391] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.239592] ================================================================== [ 47.510722] ================================================================== [ 47.517716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.525005] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.532297] [ 47.533781] CPU: 6 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.533839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.533855] Hardware name: WinLink E850-96 board (DT) [ 47.533879] Call trace: [ 47.533893] show_stack+0x20/0x38 (C) [ 47.533928] dump_stack_lvl+0x8c/0xd0 [ 47.533967] print_report+0x118/0x608 [ 47.533996] kasan_report+0xdc/0x128 [ 47.534028] kasan_check_range+0x100/0x1a8 [ 47.534064] __kasan_check_read+0x20/0x30 [ 47.534096] kasan_atomics_helper+0x2b0/0x4858 [ 47.534128] kasan_atomics+0x198/0x2e0 [ 47.534156] kunit_try_run_case+0x170/0x3f0 [ 47.534192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.534233] kthread+0x328/0x630 [ 47.534265] ret_from_fork+0x10/0x20 [ 47.534303] [ 47.603910] Allocated by task 314: [ 47.607299] kasan_save_stack+0x3c/0x68 [ 47.611115] kasan_save_track+0x20/0x40 [ 47.614933] kasan_save_alloc_info+0x40/0x58 [ 47.619187] __kasan_kmalloc+0xd4/0xd8 [ 47.622920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.627433] kasan_atomics+0xb8/0x2e0 [ 47.631079] kunit_try_run_case+0x170/0x3f0 [ 47.635246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.640714] kthread+0x328/0x630 [ 47.643926] ret_from_fork+0x10/0x20 [ 47.647485] [ 47.648962] The buggy address belongs to the object at ffff000800d61a00 [ 47.648962] which belongs to the cache kmalloc-64 of size 64 [ 47.661289] The buggy address is located 0 bytes to the right of [ 47.661289] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.674134] [ 47.675613] The buggy address belongs to the physical page: [ 47.681169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.689154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.695662] page_type: f5(slab) [ 47.698800] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.706519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.714238] page dumped because: kasan: bad access detected [ 47.719793] [ 47.721268] Memory state around the buggy address: [ 47.726048] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.733252] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.740456] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.747657] ^ [ 47.752435] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.759640] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.766842] ================================================================== [ 53.562816] ================================================================== [ 53.569880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.577171] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.584549] [ 53.586032] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.586081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.586096] Hardware name: WinLink E850-96 board (DT) [ 53.586116] Call trace: [ 53.586128] show_stack+0x20/0x38 (C) [ 53.586159] dump_stack_lvl+0x8c/0xd0 [ 53.586197] print_report+0x118/0x608 [ 53.586227] kasan_report+0xdc/0x128 [ 53.586255] kasan_check_range+0x100/0x1a8 [ 53.586286] __kasan_check_write+0x20/0x30 [ 53.586319] kasan_atomics_helper+0xb70/0x4858 [ 53.586350] kasan_atomics+0x198/0x2e0 [ 53.586378] kunit_try_run_case+0x170/0x3f0 [ 53.586413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.586453] kthread+0x328/0x630 [ 53.586485] ret_from_fork+0x10/0x20 [ 53.586519] [ 53.656249] Allocated by task 314: [ 53.659636] kasan_save_stack+0x3c/0x68 [ 53.663454] kasan_save_track+0x20/0x40 [ 53.667273] kasan_save_alloc_info+0x40/0x58 [ 53.671527] __kasan_kmalloc+0xd4/0xd8 [ 53.675259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.679773] kasan_atomics+0xb8/0x2e0 [ 53.683419] kunit_try_run_case+0x170/0x3f0 [ 53.687586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.693054] kthread+0x328/0x630 [ 53.696266] ret_from_fork+0x10/0x20 [ 53.699825] [ 53.701301] The buggy address belongs to the object at ffff000800d61a00 [ 53.701301] which belongs to the cache kmalloc-64 of size 64 [ 53.713627] The buggy address is located 0 bytes to the right of [ 53.713627] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.726473] [ 53.727951] The buggy address belongs to the physical page: [ 53.733506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 53.741491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.748001] page_type: f5(slab) [ 53.751136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.758859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.766577] page dumped because: kasan: bad access detected [ 53.772133] [ 53.773608] Memory state around the buggy address: [ 53.778388] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.785591] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.792796] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.799997] ^ [ 53.804775] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.811980] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.819181] ================================================================== [ 51.195986] ================================================================== [ 51.203076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.210366] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 51.217744] [ 51.219227] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 51.219275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.219290] Hardware name: WinLink E850-96 board (DT) [ 51.219308] Call trace: [ 51.219320] show_stack+0x20/0x38 (C) [ 51.219350] dump_stack_lvl+0x8c/0xd0 [ 51.219387] print_report+0x118/0x608 [ 51.219418] kasan_report+0xdc/0x128 [ 51.219448] kasan_check_range+0x100/0x1a8 [ 51.219479] __kasan_check_write+0x20/0x30 [ 51.219513] kasan_atomics_helper+0x7cc/0x4858 [ 51.219543] kasan_atomics+0x198/0x2e0 [ 51.219571] kunit_try_run_case+0x170/0x3f0 [ 51.219607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.219646] kthread+0x328/0x630 [ 51.219679] ret_from_fork+0x10/0x20 [ 51.219709] [ 51.289444] Allocated by task 314: [ 51.292830] kasan_save_stack+0x3c/0x68 [ 51.296649] kasan_save_track+0x20/0x40 [ 51.300469] kasan_save_alloc_info+0x40/0x58 [ 51.304722] __kasan_kmalloc+0xd4/0xd8 [ 51.308454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.312968] kasan_atomics+0xb8/0x2e0 [ 51.316614] kunit_try_run_case+0x170/0x3f0 [ 51.320781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.326249] kthread+0x328/0x630 [ 51.329461] ret_from_fork+0x10/0x20 [ 51.333020] [ 51.334496] The buggy address belongs to the object at ffff000800d61a00 [ 51.334496] which belongs to the cache kmalloc-64 of size 64 [ 51.346822] The buggy address is located 0 bytes to the right of [ 51.346822] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.359669] [ 51.361146] The buggy address belongs to the physical page: [ 51.366702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.374686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.381196] page_type: f5(slab) [ 51.384330] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.392054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.399773] page dumped because: kasan: bad access detected [ 51.405328] [ 51.406804] Memory state around the buggy address: [ 51.411583] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.418787] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.425991] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.433192] ^ [ 51.437970] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.445175] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.452376] ================================================================== [ 55.135218] ================================================================== [ 55.142253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.149543] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.156921] [ 55.158406] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.158455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.158469] Hardware name: WinLink E850-96 board (DT) [ 55.158486] Call trace: [ 55.158498] show_stack+0x20/0x38 (C) [ 55.158530] dump_stack_lvl+0x8c/0xd0 [ 55.158565] print_report+0x118/0x608 [ 55.158597] kasan_report+0xdc/0x128 [ 55.158627] kasan_check_range+0x100/0x1a8 [ 55.158660] __kasan_check_write+0x20/0x30 [ 55.158693] kasan_atomics_helper+0xd3c/0x4858 [ 55.158725] kasan_atomics+0x198/0x2e0 [ 55.158755] kunit_try_run_case+0x170/0x3f0 [ 55.158789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.158828] kthread+0x328/0x630 [ 55.158858] ret_from_fork+0x10/0x20 [ 55.158891] [ 55.228621] Allocated by task 314: [ 55.232008] kasan_save_stack+0x3c/0x68 [ 55.235826] kasan_save_track+0x20/0x40 [ 55.239646] kasan_save_alloc_info+0x40/0x58 [ 55.243899] __kasan_kmalloc+0xd4/0xd8 [ 55.247631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.252145] kasan_atomics+0xb8/0x2e0 [ 55.255791] kunit_try_run_case+0x170/0x3f0 [ 55.259958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.265426] kthread+0x328/0x630 [ 55.268638] ret_from_fork+0x10/0x20 [ 55.272197] [ 55.273673] The buggy address belongs to the object at ffff000800d61a00 [ 55.273673] which belongs to the cache kmalloc-64 of size 64 [ 55.285999] The buggy address is located 0 bytes to the right of [ 55.285999] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.298846] [ 55.300322] The buggy address belongs to the physical page: [ 55.305878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.313863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.320373] page_type: f5(slab) [ 55.323507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.331231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.338950] page dumped because: kasan: bad access detected [ 55.344505] [ 55.345981] Memory state around the buggy address: [ 55.350760] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.357964] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.365168] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.372369] ^ [ 55.377147] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.384352] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.391553] ================================================================== [ 59.081807] ================================================================== [ 59.088896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.096272] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.103650] [ 59.105136] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.105184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.105202] Hardware name: WinLink E850-96 board (DT) [ 59.105221] Call trace: [ 59.105233] show_stack+0x20/0x38 (C) [ 59.105264] dump_stack_lvl+0x8c/0xd0 [ 59.105297] print_report+0x118/0x608 [ 59.105329] kasan_report+0xdc/0x128 [ 59.105359] kasan_check_range+0x100/0x1a8 [ 59.105390] __kasan_check_write+0x20/0x30 [ 59.105423] kasan_atomics_helper+0x126c/0x4858 [ 59.105453] kasan_atomics+0x198/0x2e0 [ 59.105480] kunit_try_run_case+0x170/0x3f0 [ 59.105516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.105554] kthread+0x328/0x630 [ 59.105587] ret_from_fork+0x10/0x20 [ 59.105617] [ 59.175437] Allocated by task 314: [ 59.178824] kasan_save_stack+0x3c/0x68 [ 59.182642] kasan_save_track+0x20/0x40 [ 59.186461] kasan_save_alloc_info+0x40/0x58 [ 59.190715] __kasan_kmalloc+0xd4/0xd8 [ 59.194447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.198961] kasan_atomics+0xb8/0x2e0 [ 59.202607] kunit_try_run_case+0x170/0x3f0 [ 59.206773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.212242] kthread+0x328/0x630 [ 59.215454] ret_from_fork+0x10/0x20 [ 59.219013] [ 59.220489] The buggy address belongs to the object at ffff000800d61a00 [ 59.220489] which belongs to the cache kmalloc-64 of size 64 [ 59.232815] The buggy address is located 0 bytes to the right of [ 59.232815] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 59.245662] [ 59.247139] The buggy address belongs to the physical page: [ 59.252693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 59.260679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.267189] page_type: f5(slab) [ 59.270324] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.278047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.285765] page dumped because: kasan: bad access detected [ 59.291321] [ 59.292796] Memory state around the buggy address: [ 59.297576] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.304779] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.311984] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.319185] ^ [ 59.323963] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.331168] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.338369] ================================================================== [ 49.350031] ================================================================== [ 49.357097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.364387] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.371765] [ 49.373248] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.373297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.373315] Hardware name: WinLink E850-96 board (DT) [ 49.373331] Call trace: [ 49.373344] show_stack+0x20/0x38 (C) [ 49.373374] dump_stack_lvl+0x8c/0xd0 [ 49.373412] print_report+0x118/0x608 [ 49.373442] kasan_report+0xdc/0x128 [ 49.373471] kasan_check_range+0x100/0x1a8 [ 49.373504] __kasan_check_write+0x20/0x30 [ 49.373537] kasan_atomics_helper+0x4e4/0x4858 [ 49.373568] kasan_atomics+0x198/0x2e0 [ 49.373596] kunit_try_run_case+0x170/0x3f0 [ 49.373632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.373672] kthread+0x328/0x630 [ 49.373706] ret_from_fork+0x10/0x20 [ 49.373739] [ 49.443465] Allocated by task 314: [ 49.446851] kasan_save_stack+0x3c/0x68 [ 49.450670] kasan_save_track+0x20/0x40 [ 49.454489] kasan_save_alloc_info+0x40/0x58 [ 49.458743] __kasan_kmalloc+0xd4/0xd8 [ 49.462475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.466989] kasan_atomics+0xb8/0x2e0 [ 49.470635] kunit_try_run_case+0x170/0x3f0 [ 49.474801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.480270] kthread+0x328/0x630 [ 49.483482] ret_from_fork+0x10/0x20 [ 49.487041] [ 49.488516] The buggy address belongs to the object at ffff000800d61a00 [ 49.488516] which belongs to the cache kmalloc-64 of size 64 [ 49.500843] The buggy address is located 0 bytes to the right of [ 49.500843] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 49.513690] [ 49.515167] The buggy address belongs to the physical page: [ 49.520723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.528707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.535217] page_type: f5(slab) [ 49.538353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.546075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.553794] page dumped because: kasan: bad access detected [ 49.559349] [ 49.560824] Memory state around the buggy address: [ 49.565603] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.572807] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.580012] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.587213] ^ [ 49.591991] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.599196] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.606397] ================================================================== [ 58.554061] ================================================================== [ 58.561125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.568502] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.575880] [ 58.577365] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.577415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.577431] Hardware name: WinLink E850-96 board (DT) [ 58.577454] Call trace: [ 58.577466] show_stack+0x20/0x38 (C) [ 58.577498] dump_stack_lvl+0x8c/0xd0 [ 58.577534] print_report+0x118/0x608 [ 58.577566] kasan_report+0xdc/0x128 [ 58.577595] kasan_check_range+0x100/0x1a8 [ 58.577626] __kasan_check_write+0x20/0x30 [ 58.577660] kasan_atomics_helper+0x1190/0x4858 [ 58.577691] kasan_atomics+0x198/0x2e0 [ 58.577718] kunit_try_run_case+0x170/0x3f0 [ 58.577754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.577793] kthread+0x328/0x630 [ 58.577826] ret_from_fork+0x10/0x20 [ 58.577859] [ 58.647667] Allocated by task 314: [ 58.651055] kasan_save_stack+0x3c/0x68 [ 58.654872] kasan_save_track+0x20/0x40 [ 58.658692] kasan_save_alloc_info+0x40/0x58 [ 58.662945] __kasan_kmalloc+0xd4/0xd8 [ 58.666677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.671191] kasan_atomics+0xb8/0x2e0 [ 58.674837] kunit_try_run_case+0x170/0x3f0 [ 58.679004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.684472] kthread+0x328/0x630 [ 58.687684] ret_from_fork+0x10/0x20 [ 58.691243] [ 58.692719] The buggy address belongs to the object at ffff000800d61a00 [ 58.692719] which belongs to the cache kmalloc-64 of size 64 [ 58.705045] The buggy address is located 0 bytes to the right of [ 58.705045] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.717892] [ 58.719369] The buggy address belongs to the physical page: [ 58.724924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.732909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.739419] page_type: f5(slab) [ 58.742554] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.750277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.757995] page dumped because: kasan: bad access detected [ 58.763551] [ 58.765026] Memory state around the buggy address: [ 58.769805] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.777010] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.784214] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.791415] ^ [ 58.796193] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.803398] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.810599] ================================================================== [ 52.511241] ================================================================== [ 52.518335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.525624] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.533002] [ 52.534485] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.534531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.534547] Hardware name: WinLink E850-96 board (DT) [ 52.534565] Call trace: [ 52.534578] show_stack+0x20/0x38 (C) [ 52.534609] dump_stack_lvl+0x8c/0xd0 [ 52.534644] print_report+0x118/0x608 [ 52.534673] kasan_report+0xdc/0x128 [ 52.534701] kasan_check_range+0x100/0x1a8 [ 52.534733] __kasan_check_write+0x20/0x30 [ 52.534765] kasan_atomics_helper+0xa04/0x4858 [ 52.534796] kasan_atomics+0x198/0x2e0 [ 52.534823] kunit_try_run_case+0x170/0x3f0 [ 52.534857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.534896] kthread+0x328/0x630 [ 52.534931] ret_from_fork+0x10/0x20 [ 52.534962] [ 52.604702] Allocated by task 314: [ 52.608088] kasan_save_stack+0x3c/0x68 [ 52.611907] kasan_save_track+0x20/0x40 [ 52.615727] kasan_save_alloc_info+0x40/0x58 [ 52.619980] __kasan_kmalloc+0xd4/0xd8 [ 52.623713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.628226] kasan_atomics+0xb8/0x2e0 [ 52.631872] kunit_try_run_case+0x170/0x3f0 [ 52.636039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.641508] kthread+0x328/0x630 [ 52.644719] ret_from_fork+0x10/0x20 [ 52.648278] [ 52.649754] The buggy address belongs to the object at ffff000800d61a00 [ 52.649754] which belongs to the cache kmalloc-64 of size 64 [ 52.662080] The buggy address is located 0 bytes to the right of [ 52.662080] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.674927] [ 52.676403] The buggy address belongs to the physical page: [ 52.681959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.689944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.696454] page_type: f5(slab) [ 52.699589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.707312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.715031] page dumped because: kasan: bad access detected [ 52.720586] [ 52.722061] Memory state around the buggy address: [ 52.726841] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.734045] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.741249] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.748450] ^ [ 52.753228] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.760433] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.767634] ================================================================== [ 49.877481] ================================================================== [ 49.884520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.891810] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.899188] [ 49.900670] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.900718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.900735] Hardware name: WinLink E850-96 board (DT) [ 49.900753] Call trace: [ 49.900767] show_stack+0x20/0x38 (C) [ 49.900799] dump_stack_lvl+0x8c/0xd0 [ 49.900835] print_report+0x118/0x608 [ 49.900865] kasan_report+0xdc/0x128 [ 49.900896] kasan_check_range+0x100/0x1a8 [ 49.900927] __kasan_check_write+0x20/0x30 [ 49.900961] kasan_atomics_helper+0x5b4/0x4858 [ 49.900992] kasan_atomics+0x198/0x2e0 [ 49.901020] kunit_try_run_case+0x170/0x3f0 [ 49.901054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.901094] kthread+0x328/0x630 [ 49.901127] ret_from_fork+0x10/0x20 [ 49.901161] [ 49.970888] Allocated by task 314: [ 49.974275] kasan_save_stack+0x3c/0x68 [ 49.978092] kasan_save_track+0x20/0x40 [ 49.981912] kasan_save_alloc_info+0x40/0x58 [ 49.986165] __kasan_kmalloc+0xd4/0xd8 [ 49.989898] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.994412] kasan_atomics+0xb8/0x2e0 [ 49.998058] kunit_try_run_case+0x170/0x3f0 [ 50.002224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.007693] kthread+0x328/0x630 [ 50.010905] ret_from_fork+0x10/0x20 [ 50.014463] [ 50.015939] The buggy address belongs to the object at ffff000800d61a00 [ 50.015939] which belongs to the cache kmalloc-64 of size 64 [ 50.028266] The buggy address is located 0 bytes to the right of [ 50.028266] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.041112] [ 50.042590] The buggy address belongs to the physical page: [ 50.048144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.056130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.062640] page_type: f5(slab) [ 50.065775] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.073497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.081216] page dumped because: kasan: bad access detected [ 50.086771] [ 50.088247] Memory state around the buggy address: [ 50.093027] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.100230] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.107435] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.114636] ^ [ 50.119414] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.126619] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.133819] ================================================================== [ 50.404900] ================================================================== [ 50.411941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.419232] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.426610] [ 50.428096] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.428144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.428161] Hardware name: WinLink E850-96 board (DT) [ 50.428178] Call trace: [ 50.428191] show_stack+0x20/0x38 (C) [ 50.428224] dump_stack_lvl+0x8c/0xd0 [ 50.428261] print_report+0x118/0x608 [ 50.428290] kasan_report+0xdc/0x128 [ 50.428319] kasan_check_range+0x100/0x1a8 [ 50.428350] __kasan_check_write+0x20/0x30 [ 50.428383] kasan_atomics_helper+0x684/0x4858 [ 50.428415] kasan_atomics+0x198/0x2e0 [ 50.428443] kunit_try_run_case+0x170/0x3f0 [ 50.428478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.428518] kthread+0x328/0x630 [ 50.428550] ret_from_fork+0x10/0x20 [ 50.428581] [ 50.498310] Allocated by task 314: [ 50.501696] kasan_save_stack+0x3c/0x68 [ 50.505515] kasan_save_track+0x20/0x40 [ 50.509335] kasan_save_alloc_info+0x40/0x58 [ 50.513588] __kasan_kmalloc+0xd4/0xd8 [ 50.517320] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.521834] kasan_atomics+0xb8/0x2e0 [ 50.525480] kunit_try_run_case+0x170/0x3f0 [ 50.529647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.535115] kthread+0x328/0x630 [ 50.538327] ret_from_fork+0x10/0x20 [ 50.541886] [ 50.543362] The buggy address belongs to the object at ffff000800d61a00 [ 50.543362] which belongs to the cache kmalloc-64 of size 64 [ 50.555688] The buggy address is located 0 bytes to the right of [ 50.555688] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.568535] [ 50.570012] The buggy address belongs to the physical page: [ 50.575568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.583552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.590063] page_type: f5(slab) [ 50.593199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.600920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.608639] page dumped because: kasan: bad access detected [ 50.614194] [ 50.615670] Memory state around the buggy address: [ 50.620448] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.627653] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.634858] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.642058] ^ [ 50.646836] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.654041] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.661242] ================================================================== [ 54.350621] ================================================================== [ 54.357716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.365093] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.372384] [ 54.373868] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.373914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.373932] Hardware name: WinLink E850-96 board (DT) [ 54.373950] Call trace: [ 54.373963] show_stack+0x20/0x38 (C) [ 54.373992] dump_stack_lvl+0x8c/0xd0 [ 54.374027] print_report+0x118/0x608 [ 54.374055] kasan_report+0xdc/0x128 [ 54.374086] __asan_report_load4_noabort+0x20/0x30 [ 54.374121] kasan_atomics_helper+0x3de4/0x4858 [ 54.374150] kasan_atomics+0x198/0x2e0 [ 54.374178] kunit_try_run_case+0x170/0x3f0 [ 54.374212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.374251] kthread+0x328/0x630 [ 54.374286] ret_from_fork+0x10/0x20 [ 54.374317] [ 54.440786] Allocated by task 314: [ 54.444173] kasan_save_stack+0x3c/0x68 [ 54.447990] kasan_save_track+0x20/0x40 [ 54.451810] kasan_save_alloc_info+0x40/0x58 [ 54.456064] __kasan_kmalloc+0xd4/0xd8 [ 54.459796] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.464310] kasan_atomics+0xb8/0x2e0 [ 54.467956] kunit_try_run_case+0x170/0x3f0 [ 54.472122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.477591] kthread+0x328/0x630 [ 54.480803] ret_from_fork+0x10/0x20 [ 54.484362] [ 54.485837] The buggy address belongs to the object at ffff000800d61a00 [ 54.485837] which belongs to the cache kmalloc-64 of size 64 [ 54.498164] The buggy address is located 0 bytes to the right of [ 54.498164] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 54.511010] [ 54.512486] The buggy address belongs to the physical page: [ 54.518042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.526028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.532538] page_type: f5(slab) [ 54.535674] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.543396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.551114] page dumped because: kasan: bad access detected [ 54.556669] [ 54.558145] Memory state around the buggy address: [ 54.562924] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.570128] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.577333] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.584534] ^ [ 54.589312] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.596517] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.603718] ================================================================== [ 56.183271] ================================================================== [ 56.190328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.197617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.204996] [ 56.206478] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.206524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.206539] Hardware name: WinLink E850-96 board (DT) [ 56.206560] Call trace: [ 56.206573] show_stack+0x20/0x38 (C) [ 56.206606] dump_stack_lvl+0x8c/0xd0 [ 56.206642] print_report+0x118/0x608 [ 56.206671] kasan_report+0xdc/0x128 [ 56.206701] kasan_check_range+0x100/0x1a8 [ 56.206733] __kasan_check_write+0x20/0x30 [ 56.206767] kasan_atomics_helper+0xe44/0x4858 [ 56.206797] kasan_atomics+0x198/0x2e0 [ 56.206825] kunit_try_run_case+0x170/0x3f0 [ 56.206861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.206902] kthread+0x328/0x630 [ 56.206936] ret_from_fork+0x10/0x20 [ 56.206968] [ 56.276696] Allocated by task 314: [ 56.280081] kasan_save_stack+0x3c/0x68 [ 56.283900] kasan_save_track+0x20/0x40 [ 56.287720] kasan_save_alloc_info+0x40/0x58 [ 56.291973] __kasan_kmalloc+0xd4/0xd8 [ 56.295706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.300220] kasan_atomics+0xb8/0x2e0 [ 56.303866] kunit_try_run_case+0x170/0x3f0 [ 56.308032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.313501] kthread+0x328/0x630 [ 56.316713] ret_from_fork+0x10/0x20 [ 56.320272] [ 56.321747] The buggy address belongs to the object at ffff000800d61a00 [ 56.321747] which belongs to the cache kmalloc-64 of size 64 [ 56.334074] The buggy address is located 0 bytes to the right of [ 56.334074] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.346920] [ 56.348396] The buggy address belongs to the physical page: [ 56.353954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.361938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.368448] page_type: f5(slab) [ 56.371581] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.379306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.387024] page dumped because: kasan: bad access detected [ 56.392580] [ 56.394055] Memory state around the buggy address: [ 56.398835] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.406038] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.413243] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.420444] ^ [ 56.425222] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.432426] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.439628] ================================================================== [ 59.873515] ================================================================== [ 59.880551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 59.887927] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.895218] [ 59.896700] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.896747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.896763] Hardware name: WinLink E850-96 board (DT) [ 59.896782] Call trace: [ 59.896794] show_stack+0x20/0x38 (C) [ 59.896827] dump_stack_lvl+0x8c/0xd0 [ 59.896863] print_report+0x118/0x608 [ 59.896895] kasan_report+0xdc/0x128 [ 59.896924] __asan_report_load8_noabort+0x20/0x30 [ 59.896959] kasan_atomics_helper+0x3f04/0x4858 [ 59.896990] kasan_atomics+0x198/0x2e0 [ 59.897019] kunit_try_run_case+0x170/0x3f0 [ 59.897054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.897091] kthread+0x328/0x630 [ 59.897121] ret_from_fork+0x10/0x20 [ 59.897153] [ 59.963620] Allocated by task 314: [ 59.967007] kasan_save_stack+0x3c/0x68 [ 59.970824] kasan_save_track+0x20/0x40 [ 59.974644] kasan_save_alloc_info+0x40/0x58 [ 59.978897] __kasan_kmalloc+0xd4/0xd8 [ 59.982630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.987144] kasan_atomics+0xb8/0x2e0 [ 59.990789] kunit_try_run_case+0x170/0x3f0 [ 59.994956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.000424] kthread+0x328/0x630 [ 60.003636] ret_from_fork+0x10/0x20 [ 60.007195] [ 60.008671] The buggy address belongs to the object at ffff000800d61a00 [ 60.008671] which belongs to the cache kmalloc-64 of size 64 [ 60.020998] The buggy address is located 0 bytes to the right of [ 60.020998] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.033844] [ 60.035322] The buggy address belongs to the physical page: [ 60.040876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.048862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.055371] page_type: f5(slab) [ 60.058507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.066229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.073948] page dumped because: kasan: bad access detected [ 60.079503] [ 60.080979] Memory state around the buggy address: [ 60.085759] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.092962] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.100167] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.107367] ^ [ 60.112146] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.119350] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.126551] ================================================================== [ 60.397753] ================================================================== [ 60.404848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.412224] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.419602] [ 60.421086] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.421133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.421149] Hardware name: WinLink E850-96 board (DT) [ 60.421168] Call trace: [ 60.421181] show_stack+0x20/0x38 (C) [ 60.421213] dump_stack_lvl+0x8c/0xd0 [ 60.421247] print_report+0x118/0x608 [ 60.421276] kasan_report+0xdc/0x128 [ 60.421307] kasan_check_range+0x100/0x1a8 [ 60.421339] __kasan_check_write+0x20/0x30 [ 60.421372] kasan_atomics_helper+0x147c/0x4858 [ 60.421403] kasan_atomics+0x198/0x2e0 [ 60.421431] kunit_try_run_case+0x170/0x3f0 [ 60.421465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.421504] kthread+0x328/0x630 [ 60.421537] ret_from_fork+0x10/0x20 [ 60.421572] [ 60.491389] Allocated by task 314: [ 60.494775] kasan_save_stack+0x3c/0x68 [ 60.498594] kasan_save_track+0x20/0x40 [ 60.502414] kasan_save_alloc_info+0x40/0x58 [ 60.506667] __kasan_kmalloc+0xd4/0xd8 [ 60.510400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.514913] kasan_atomics+0xb8/0x2e0 [ 60.518559] kunit_try_run_case+0x170/0x3f0 [ 60.522726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.528194] kthread+0x328/0x630 [ 60.531406] ret_from_fork+0x10/0x20 [ 60.534965] [ 60.536440] The buggy address belongs to the object at ffff000800d61a00 [ 60.536440] which belongs to the cache kmalloc-64 of size 64 [ 60.548767] The buggy address is located 0 bytes to the right of [ 60.548767] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.561614] [ 60.563091] The buggy address belongs to the physical page: [ 60.568646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.576631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.583142] page_type: f5(slab) [ 60.586277] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.593999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.601718] page dumped because: kasan: bad access detected [ 60.607273] [ 60.608748] Memory state around the buggy address: [ 60.613527] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.620732] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.627937] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.635137] ^ [ 60.639915] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.647121] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.654321] ================================================================== [ 61.189469] ================================================================== [ 61.196503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.203879] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.211257] [ 61.212740] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 61.212787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.212803] Hardware name: WinLink E850-96 board (DT) [ 61.212819] Call trace: [ 61.212832] show_stack+0x20/0x38 (C) [ 61.212861] dump_stack_lvl+0x8c/0xd0 [ 61.212896] print_report+0x118/0x608 [ 61.212927] kasan_report+0xdc/0x128 [ 61.212959] kasan_check_range+0x100/0x1a8 [ 61.212992] __kasan_check_write+0x20/0x30 [ 61.213025] kasan_atomics_helper+0x15b4/0x4858 [ 61.213056] kasan_atomics+0x198/0x2e0 [ 61.213084] kunit_try_run_case+0x170/0x3f0 [ 61.213118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.213156] kthread+0x328/0x630 [ 61.213189] ret_from_fork+0x10/0x20 [ 61.213223] [ 61.283044] Allocated by task 314: [ 61.286430] kasan_save_stack+0x3c/0x68 [ 61.290249] kasan_save_track+0x20/0x40 [ 61.294069] kasan_save_alloc_info+0x40/0x58 [ 61.298322] __kasan_kmalloc+0xd4/0xd8 [ 61.302054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.306568] kasan_atomics+0xb8/0x2e0 [ 61.310214] kunit_try_run_case+0x170/0x3f0 [ 61.314380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.319849] kthread+0x328/0x630 [ 61.323061] ret_from_fork+0x10/0x20 [ 61.326620] [ 61.328096] The buggy address belongs to the object at ffff000800d61a00 [ 61.328096] which belongs to the cache kmalloc-64 of size 64 [ 61.340422] The buggy address is located 0 bytes to the right of [ 61.340422] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.353269] [ 61.354745] The buggy address belongs to the physical page: [ 61.360301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.368287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.374796] page_type: f5(slab) [ 61.377931] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.385654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.393373] page dumped because: kasan: bad access detected [ 61.398928] [ 61.400403] Memory state around the buggy address: [ 61.405182] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.412387] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.419592] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.426792] ^ [ 61.431570] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.438775] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.445976] ================================================================== [ 60.661664] ================================================================== [ 60.668732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.676109] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.683487] [ 60.684970] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.685018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.685036] Hardware name: WinLink E850-96 board (DT) [ 60.685054] Call trace: [ 60.685067] show_stack+0x20/0x38 (C) [ 60.685098] dump_stack_lvl+0x8c/0xd0 [ 60.685136] print_report+0x118/0x608 [ 60.685168] kasan_report+0xdc/0x128 [ 60.685197] kasan_check_range+0x100/0x1a8 [ 60.685229] __kasan_check_write+0x20/0x30 [ 60.685262] kasan_atomics_helper+0x14e4/0x4858 [ 60.685293] kasan_atomics+0x198/0x2e0 [ 60.685323] kunit_try_run_case+0x170/0x3f0 [ 60.685356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.685394] kthread+0x328/0x630 [ 60.685428] ret_from_fork+0x10/0x20 [ 60.685461] [ 60.755274] Allocated by task 314: [ 60.758661] kasan_save_stack+0x3c/0x68 [ 60.762479] kasan_save_track+0x20/0x40 [ 60.766298] kasan_save_alloc_info+0x40/0x58 [ 60.770552] __kasan_kmalloc+0xd4/0xd8 [ 60.774285] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.778798] kasan_atomics+0xb8/0x2e0 [ 60.782444] kunit_try_run_case+0x170/0x3f0 [ 60.786611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.792080] kthread+0x328/0x630 [ 60.795291] ret_from_fork+0x10/0x20 [ 60.798850] [ 60.800326] The buggy address belongs to the object at ffff000800d61a00 [ 60.800326] which belongs to the cache kmalloc-64 of size 64 [ 60.812652] The buggy address is located 0 bytes to the right of [ 60.812652] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.825499] [ 60.826976] The buggy address belongs to the physical page: [ 60.832531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.840516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.847027] page_type: f5(slab) [ 60.850161] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.857884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.865603] page dumped because: kasan: bad access detected [ 60.871158] [ 60.872634] Memory state around the buggy address: [ 60.877412] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.884617] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.891822] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.899023] ^ [ 60.903800] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.911005] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.918206] ================================================================== [ 49.613718] ================================================================== [ 49.620808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.628098] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.635476] [ 49.636959] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.637009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.637026] Hardware name: WinLink E850-96 board (DT) [ 49.637046] Call trace: [ 49.637058] show_stack+0x20/0x38 (C) [ 49.637088] dump_stack_lvl+0x8c/0xd0 [ 49.637125] print_report+0x118/0x608 [ 49.637155] kasan_report+0xdc/0x128 [ 49.637184] kasan_check_range+0x100/0x1a8 [ 49.637215] __kasan_check_write+0x20/0x30 [ 49.637251] kasan_atomics_helper+0x54c/0x4858 [ 49.637283] kasan_atomics+0x198/0x2e0 [ 49.637310] kunit_try_run_case+0x170/0x3f0 [ 49.637344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.637383] kthread+0x328/0x630 [ 49.637416] ret_from_fork+0x10/0x20 [ 49.637450] [ 49.707176] Allocated by task 314: [ 49.710562] kasan_save_stack+0x3c/0x68 [ 49.714381] kasan_save_track+0x20/0x40 [ 49.718201] kasan_save_alloc_info+0x40/0x58 [ 49.722454] __kasan_kmalloc+0xd4/0xd8 [ 49.726187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.730700] kasan_atomics+0xb8/0x2e0 [ 49.734346] kunit_try_run_case+0x170/0x3f0 [ 49.738513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.743982] kthread+0x328/0x630 [ 49.747193] ret_from_fork+0x10/0x20 [ 49.750752] [ 49.752228] The buggy address belongs to the object at ffff000800d61a00 [ 49.752228] which belongs to the cache kmalloc-64 of size 64 [ 49.764554] The buggy address is located 0 bytes to the right of [ 49.764554] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 49.777401] [ 49.778878] The buggy address belongs to the physical page: [ 49.784433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.792418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.798928] page_type: f5(slab) [ 49.802063] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.809786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.817505] page dumped because: kasan: bad access detected [ 49.823060] [ 49.824536] Memory state around the buggy address: [ 49.829314] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.836519] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.843724] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.850924] ^ [ 49.855702] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.862907] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.870108] ================================================================== [ 57.498666] ================================================================== [ 57.505759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.513049] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 57.520427] [ 57.521909] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 57.521958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.521972] Hardware name: WinLink E850-96 board (DT) [ 57.521991] Call trace: [ 57.522002] show_stack+0x20/0x38 (C) [ 57.522033] dump_stack_lvl+0x8c/0xd0 [ 57.522067] print_report+0x118/0x608 [ 57.522096] kasan_report+0xdc/0x128 [ 57.522126] kasan_check_range+0x100/0x1a8 [ 57.522157] __kasan_check_write+0x20/0x30 [ 57.522190] kasan_atomics_helper+0xff0/0x4858 [ 57.522222] kasan_atomics+0x198/0x2e0 [ 57.522250] kunit_try_run_case+0x170/0x3f0 [ 57.522284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.522324] kthread+0x328/0x630 [ 57.522356] ret_from_fork+0x10/0x20 [ 57.522389] [ 57.592127] Allocated by task 314: [ 57.595513] kasan_save_stack+0x3c/0x68 [ 57.599332] kasan_save_track+0x20/0x40 [ 57.603152] kasan_save_alloc_info+0x40/0x58 [ 57.607405] __kasan_kmalloc+0xd4/0xd8 [ 57.611138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.615651] kasan_atomics+0xb8/0x2e0 [ 57.619297] kunit_try_run_case+0x170/0x3f0 [ 57.623464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.628933] kthread+0x328/0x630 [ 57.632144] ret_from_fork+0x10/0x20 [ 57.635703] [ 57.637179] The buggy address belongs to the object at ffff000800d61a00 [ 57.637179] which belongs to the cache kmalloc-64 of size 64 [ 57.649505] The buggy address is located 0 bytes to the right of [ 57.649505] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.662352] [ 57.663828] The buggy address belongs to the physical page: [ 57.669384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.677369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.683880] page_type: f5(slab) [ 57.687014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.694737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.702456] page dumped because: kasan: bad access detected [ 57.708011] [ 57.709487] Memory state around the buggy address: [ 57.714266] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.721470] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.728674] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.735875] ^ [ 57.740653] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.747858] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.755059] ================================================================== [ 50.932298] ================================================================== [ 50.939364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 50.946655] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.954033] [ 50.955515] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.955561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.955579] Hardware name: WinLink E850-96 board (DT) [ 50.955597] Call trace: [ 50.955609] show_stack+0x20/0x38 (C) [ 50.955642] dump_stack_lvl+0x8c/0xd0 [ 50.955676] print_report+0x118/0x608 [ 50.955708] kasan_report+0xdc/0x128 [ 50.955737] kasan_check_range+0x100/0x1a8 [ 50.955768] __kasan_check_write+0x20/0x30 [ 50.955800] kasan_atomics_helper+0x760/0x4858 [ 50.955831] kasan_atomics+0x198/0x2e0 [ 50.955860] kunit_try_run_case+0x170/0x3f0 [ 50.955894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.955934] kthread+0x328/0x630 [ 50.955967] ret_from_fork+0x10/0x20 [ 50.955997] [ 51.025733] Allocated by task 314: [ 51.029120] kasan_save_stack+0x3c/0x68 [ 51.032938] kasan_save_track+0x20/0x40 [ 51.036757] kasan_save_alloc_info+0x40/0x58 [ 51.041010] __kasan_kmalloc+0xd4/0xd8 [ 51.044743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.049257] kasan_atomics+0xb8/0x2e0 [ 51.052903] kunit_try_run_case+0x170/0x3f0 [ 51.057069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.062538] kthread+0x328/0x630 [ 51.065750] ret_from_fork+0x10/0x20 [ 51.069309] [ 51.070785] The buggy address belongs to the object at ffff000800d61a00 [ 51.070785] which belongs to the cache kmalloc-64 of size 64 [ 51.083111] The buggy address is located 0 bytes to the right of [ 51.083111] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.095958] [ 51.097435] The buggy address belongs to the physical page: [ 51.102991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.110977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.117485] page_type: f5(slab) [ 51.120620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.128342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.136061] page dumped because: kasan: bad access detected [ 51.141617] [ 51.143092] Memory state around the buggy address: [ 51.147872] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.155076] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.162280] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.169481] ^ [ 51.174259] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.181464] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.188664] ================================================================== [ 57.762432] ================================================================== [ 57.769470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.776847] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 57.784225] [ 57.785707] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 57.785756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.785772] Hardware name: WinLink E850-96 board (DT) [ 57.785790] Call trace: [ 57.785804] show_stack+0x20/0x38 (C) [ 57.785836] dump_stack_lvl+0x8c/0xd0 [ 57.785873] print_report+0x118/0x608 [ 57.785903] kasan_report+0xdc/0x128 [ 57.785932] kasan_check_range+0x100/0x1a8 [ 57.785965] __kasan_check_write+0x20/0x30 [ 57.785998] kasan_atomics_helper+0x1058/0x4858 [ 57.786028] kasan_atomics+0x198/0x2e0 [ 57.786056] kunit_try_run_case+0x170/0x3f0 [ 57.786091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.786131] kthread+0x328/0x630 [ 57.786164] ret_from_fork+0x10/0x20 [ 57.786197] [ 57.856012] Allocated by task 314: [ 57.859401] kasan_save_stack+0x3c/0x68 [ 57.863217] kasan_save_track+0x20/0x40 [ 57.867037] kasan_save_alloc_info+0x40/0x58 [ 57.871290] __kasan_kmalloc+0xd4/0xd8 [ 57.875023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.879537] kasan_atomics+0xb8/0x2e0 [ 57.883182] kunit_try_run_case+0x170/0x3f0 [ 57.887349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.892817] kthread+0x328/0x630 [ 57.896029] ret_from_fork+0x10/0x20 [ 57.899588] [ 57.901063] The buggy address belongs to the object at ffff000800d61a00 [ 57.901063] which belongs to the cache kmalloc-64 of size 64 [ 57.913392] The buggy address is located 0 bytes to the right of [ 57.913392] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.926237] [ 57.927713] The buggy address belongs to the physical page: [ 57.933269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.941255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.947764] page_type: f5(slab) [ 57.950897] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.958622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.966341] page dumped because: kasan: bad access detected [ 57.971896] [ 57.973372] Memory state around the buggy address: [ 57.978152] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.985355] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.992559] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.999760] ^ [ 58.004538] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.011743] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.018944] ================================================================== [ 56.707562] ================================================================== [ 56.714628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.721915] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.729293] [ 56.730777] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.730823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.730839] Hardware name: WinLink E850-96 board (DT) [ 56.730856] Call trace: [ 56.730870] show_stack+0x20/0x38 (C) [ 56.730902] dump_stack_lvl+0x8c/0xd0 [ 56.730936] print_report+0x118/0x608 [ 56.730967] kasan_report+0xdc/0x128 [ 56.730996] kasan_check_range+0x100/0x1a8 [ 56.731027] __kasan_check_write+0x20/0x30 [ 56.731059] kasan_atomics_helper+0xeb8/0x4858 [ 56.731087] kasan_atomics+0x198/0x2e0 [ 56.731118] kunit_try_run_case+0x170/0x3f0 [ 56.731151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.731190] kthread+0x328/0x630 [ 56.731222] ret_from_fork+0x10/0x20 [ 56.731256] [ 56.800994] Allocated by task 314: [ 56.804379] kasan_save_stack+0x3c/0x68 [ 56.808198] kasan_save_track+0x20/0x40 [ 56.812018] kasan_save_alloc_info+0x40/0x58 [ 56.816271] __kasan_kmalloc+0xd4/0xd8 [ 56.820004] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.824517] kasan_atomics+0xb8/0x2e0 [ 56.828163] kunit_try_run_case+0x170/0x3f0 [ 56.832330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.837798] kthread+0x328/0x630 [ 56.841010] ret_from_fork+0x10/0x20 [ 56.844569] [ 56.846045] The buggy address belongs to the object at ffff000800d61a00 [ 56.846045] which belongs to the cache kmalloc-64 of size 64 [ 56.858371] The buggy address is located 0 bytes to the right of [ 56.858371] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.871218] [ 56.872694] The buggy address belongs to the physical page: [ 56.878251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.886236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.892746] page_type: f5(slab) [ 56.895882] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.903603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.911322] page dumped because: kasan: bad access detected [ 56.916877] [ 56.918353] Memory state around the buggy address: [ 56.923132] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.930336] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.937541] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.944741] ^ [ 56.949519] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.956724] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.963925] ================================================================== [ 59.345744] ================================================================== [ 59.352780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.360157] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.367535] [ 59.369018] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.369067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.369083] Hardware name: WinLink E850-96 board (DT) [ 59.369100] Call trace: [ 59.369113] show_stack+0x20/0x38 (C) [ 59.369144] dump_stack_lvl+0x8c/0xd0 [ 59.369182] print_report+0x118/0x608 [ 59.369211] kasan_report+0xdc/0x128 [ 59.369241] kasan_check_range+0x100/0x1a8 [ 59.369272] __kasan_check_write+0x20/0x30 [ 59.369304] kasan_atomics_helper+0x12d8/0x4858 [ 59.369334] kasan_atomics+0x198/0x2e0 [ 59.369361] kunit_try_run_case+0x170/0x3f0 [ 59.369395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.369435] kthread+0x328/0x630 [ 59.369470] ret_from_fork+0x10/0x20 [ 59.369501] [ 59.439322] Allocated by task 314: [ 59.442708] kasan_save_stack+0x3c/0x68 [ 59.446527] kasan_save_track+0x20/0x40 [ 59.450346] kasan_save_alloc_info+0x40/0x58 [ 59.454599] __kasan_kmalloc+0xd4/0xd8 [ 59.458332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.462846] kasan_atomics+0xb8/0x2e0 [ 59.466492] kunit_try_run_case+0x170/0x3f0 [ 59.470658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.476127] kthread+0x328/0x630 [ 59.479339] ret_from_fork+0x10/0x20 [ 59.482898] [ 59.484373] The buggy address belongs to the object at ffff000800d61a00 [ 59.484373] which belongs to the cache kmalloc-64 of size 64 [ 59.496700] The buggy address is located 0 bytes to the right of [ 59.496700] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 59.509547] [ 59.511024] The buggy address belongs to the physical page: [ 59.516578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 59.524564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.531074] page_type: f5(slab) [ 59.534209] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.541931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.549650] page dumped because: kasan: bad access detected [ 59.555205] [ 59.556681] Memory state around the buggy address: [ 59.561461] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.568664] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.575869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.583070] ^ [ 59.587848] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.595053] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.602254] ================================================================== [ 63.286642] ================================================================== [ 63.293694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.301070] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 63.308448] [ 63.309931] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 63.309978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.309993] Hardware name: WinLink E850-96 board (DT) [ 63.310013] Call trace: [ 63.310025] show_stack+0x20/0x38 (C) [ 63.310057] dump_stack_lvl+0x8c/0xd0 [ 63.310092] print_report+0x118/0x608 [ 63.310123] kasan_report+0xdc/0x128 [ 63.310153] kasan_check_range+0x100/0x1a8 [ 63.310183] __kasan_check_write+0x20/0x30 [ 63.310217] kasan_atomics_helper+0x17ec/0x4858 [ 63.310248] kasan_atomics+0x198/0x2e0 [ 63.310275] kunit_try_run_case+0x170/0x3f0 [ 63.310311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.310349] kthread+0x328/0x630 [ 63.310383] ret_from_fork+0x10/0x20 [ 63.310416] [ 63.380235] Allocated by task 314: [ 63.383621] kasan_save_stack+0x3c/0x68 [ 63.387440] kasan_save_track+0x20/0x40 [ 63.391259] kasan_save_alloc_info+0x40/0x58 [ 63.395512] __kasan_kmalloc+0xd4/0xd8 [ 63.399245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.403759] kasan_atomics+0xb8/0x2e0 [ 63.407405] kunit_try_run_case+0x170/0x3f0 [ 63.411571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.417040] kthread+0x328/0x630 [ 63.420252] ret_from_fork+0x10/0x20 [ 63.423811] [ 63.425286] The buggy address belongs to the object at ffff000800d61a00 [ 63.425286] which belongs to the cache kmalloc-64 of size 64 [ 63.437614] The buggy address is located 0 bytes to the right of [ 63.437614] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 63.450460] [ 63.451937] The buggy address belongs to the physical page: [ 63.457493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 63.465477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.471987] page_type: f5(slab) [ 63.475121] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.482845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.490563] page dumped because: kasan: bad access detected [ 63.496119] [ 63.497594] Memory state around the buggy address: [ 63.502374] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.509577] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.516782] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.523983] ^ [ 63.528761] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.535966] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.543167] ================================================================== [ 51.723445] ================================================================== [ 51.730501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.737875] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 51.745167] [ 51.746650] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 51.746697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.746715] Hardware name: WinLink E850-96 board (DT) [ 51.746735] Call trace: [ 51.746747] show_stack+0x20/0x38 (C) [ 51.746778] dump_stack_lvl+0x8c/0xd0 [ 51.746813] print_report+0x118/0x608 [ 51.746846] kasan_report+0xdc/0x128 [ 51.746876] __asan_report_load4_noabort+0x20/0x30 [ 51.746911] kasan_atomics_helper+0x42d8/0x4858 [ 51.746942] kasan_atomics+0x198/0x2e0 [ 51.746969] kunit_try_run_case+0x170/0x3f0 [ 51.747003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.747044] kthread+0x328/0x630 [ 51.747077] ret_from_fork+0x10/0x20 [ 51.747113] [ 51.813568] Allocated by task 314: [ 51.816954] kasan_save_stack+0x3c/0x68 [ 51.820773] kasan_save_track+0x20/0x40 [ 51.824593] kasan_save_alloc_info+0x40/0x58 [ 51.828846] __kasan_kmalloc+0xd4/0xd8 [ 51.832578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.837092] kasan_atomics+0xb8/0x2e0 [ 51.840738] kunit_try_run_case+0x170/0x3f0 [ 51.844905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.850374] kthread+0x328/0x630 [ 51.853585] ret_from_fork+0x10/0x20 [ 51.857144] [ 51.858620] The buggy address belongs to the object at ffff000800d61a00 [ 51.858620] which belongs to the cache kmalloc-64 of size 64 [ 51.870947] The buggy address is located 0 bytes to the right of [ 51.870947] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.883793] [ 51.885269] The buggy address belongs to the physical page: [ 51.890826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.898810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.905321] page_type: f5(slab) [ 51.908455] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.916178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.923896] page dumped because: kasan: bad access detected [ 51.929452] [ 51.930928] Memory state around the buggy address: [ 51.935706] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.942911] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.950115] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.957316] ^ [ 51.962094] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.969299] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.976500] ================================================================== [ 47.247062] ================================================================== [ 47.254004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.261293] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.268672] [ 47.270155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.270213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.270232] Hardware name: WinLink E850-96 board (DT) [ 47.270254] Call trace: [ 47.270268] show_stack+0x20/0x38 (C) [ 47.270308] dump_stack_lvl+0x8c/0xd0 [ 47.270346] print_report+0x118/0x608 [ 47.270376] kasan_report+0xdc/0x128 [ 47.270406] kasan_check_range+0x100/0x1a8 [ 47.270440] __kasan_check_write+0x20/0x30 [ 47.270475] kasan_atomics_helper+0x24c/0x4858 [ 47.270506] kasan_atomics+0x198/0x2e0 [ 47.270535] kunit_try_run_case+0x170/0x3f0 [ 47.270576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.270614] kthread+0x328/0x630 [ 47.270648] ret_from_fork+0x10/0x20 [ 47.270684] [ 47.340371] Allocated by task 314: [ 47.343759] kasan_save_stack+0x3c/0x68 [ 47.347577] kasan_save_track+0x20/0x40 [ 47.351396] kasan_save_alloc_info+0x40/0x58 [ 47.355649] __kasan_kmalloc+0xd4/0xd8 [ 47.359382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.363896] kasan_atomics+0xb8/0x2e0 [ 47.367541] kunit_try_run_case+0x170/0x3f0 [ 47.371708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.377177] kthread+0x328/0x630 [ 47.380388] ret_from_fork+0x10/0x20 [ 47.383947] [ 47.385423] The buggy address belongs to the object at ffff000800d61a00 [ 47.385423] which belongs to the cache kmalloc-64 of size 64 [ 47.397751] The buggy address is located 0 bytes to the right of [ 47.397751] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.410596] [ 47.412074] The buggy address belongs to the physical page: [ 47.417631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.425616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.432124] page_type: f5(slab) [ 47.435261] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.442981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.450700] page dumped because: kasan: bad access detected [ 47.456257] [ 47.457731] Memory state around the buggy address: [ 47.462513] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.469714] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.476918] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.484120] ^ [ 47.488898] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.496102] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.503303] ================================================================== [ 55.659284] ================================================================== [ 55.666377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.673667] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.680958] [ 55.682441] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.682490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.682506] Hardware name: WinLink E850-96 board (DT) [ 55.682526] Call trace: [ 55.682540] show_stack+0x20/0x38 (C) [ 55.682570] dump_stack_lvl+0x8c/0xd0 [ 55.682606] print_report+0x118/0x608 [ 55.682637] kasan_report+0xdc/0x128 [ 55.682667] kasan_check_range+0x100/0x1a8 [ 55.682700] __kasan_check_read+0x20/0x30 [ 55.682734] kasan_atomics_helper+0xdd4/0x4858 [ 55.682764] kasan_atomics+0x198/0x2e0 [ 55.682792] kunit_try_run_case+0x170/0x3f0 [ 55.682827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.682865] kthread+0x328/0x630 [ 55.682898] ret_from_fork+0x10/0x20 [ 55.682931] [ 55.752572] Allocated by task 314: [ 55.755959] kasan_save_stack+0x3c/0x68 [ 55.759776] kasan_save_track+0x20/0x40 [ 55.763596] kasan_save_alloc_info+0x40/0x58 [ 55.767849] __kasan_kmalloc+0xd4/0xd8 [ 55.771582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.776096] kasan_atomics+0xb8/0x2e0 [ 55.779741] kunit_try_run_case+0x170/0x3f0 [ 55.783908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.789377] kthread+0x328/0x630 [ 55.792589] ret_from_fork+0x10/0x20 [ 55.796147] [ 55.797623] The buggy address belongs to the object at ffff000800d61a00 [ 55.797623] which belongs to the cache kmalloc-64 of size 64 [ 55.809951] The buggy address is located 0 bytes to the right of [ 55.809951] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.822796] [ 55.824272] The buggy address belongs to the physical page: [ 55.829828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.837814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.844324] page_type: f5(slab) [ 55.847459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.855181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.862900] page dumped because: kasan: bad access detected [ 55.868455] [ 55.869931] Memory state around the buggy address: [ 55.874710] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.881914] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.889119] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.896320] ^ [ 55.901098] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.908302] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.915503] ================================================================== [ 56.447004] ================================================================== [ 56.454040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.461416] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.468794] [ 56.470277] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.470324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.470342] Hardware name: WinLink E850-96 board (DT) [ 56.470361] Call trace: [ 56.470374] show_stack+0x20/0x38 (C) [ 56.470405] dump_stack_lvl+0x8c/0xd0 [ 56.470438] print_report+0x118/0x608 [ 56.470468] kasan_report+0xdc/0x128 [ 56.470497] __asan_report_store8_noabort+0x20/0x30 [ 56.470533] kasan_atomics_helper+0x3e5c/0x4858 [ 56.470565] kasan_atomics+0x198/0x2e0 [ 56.470592] kunit_try_run_case+0x170/0x3f0 [ 56.470627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.470666] kthread+0x328/0x630 [ 56.470699] ret_from_fork+0x10/0x20 [ 56.470732] [ 56.537282] Allocated by task 314: [ 56.540669] kasan_save_stack+0x3c/0x68 [ 56.544487] kasan_save_track+0x20/0x40 [ 56.548306] kasan_save_alloc_info+0x40/0x58 [ 56.552560] __kasan_kmalloc+0xd4/0xd8 [ 56.556292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.560806] kasan_atomics+0xb8/0x2e0 [ 56.564452] kunit_try_run_case+0x170/0x3f0 [ 56.568619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.574087] kthread+0x328/0x630 [ 56.577299] ret_from_fork+0x10/0x20 [ 56.580858] [ 56.582334] The buggy address belongs to the object at ffff000800d61a00 [ 56.582334] which belongs to the cache kmalloc-64 of size 64 [ 56.594660] The buggy address is located 0 bytes to the right of [ 56.594660] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.607506] [ 56.608983] The buggy address belongs to the physical page: [ 56.614540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.622524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.629034] page_type: f5(slab) [ 56.632171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.639892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.647611] page dumped because: kasan: bad access detected [ 56.653166] [ 56.654641] Memory state around the buggy address: [ 56.659420] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.666625] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.673829] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.681030] ^ [ 56.685808] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.693013] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.700214] ================================================================== [ 58.290202] ================================================================== [ 58.297240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.304617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.311995] [ 58.313480] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.313531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.313548] Hardware name: WinLink E850-96 board (DT) [ 58.313564] Call trace: [ 58.313580] show_stack+0x20/0x38 (C) [ 58.313611] dump_stack_lvl+0x8c/0xd0 [ 58.313646] print_report+0x118/0x608 [ 58.313676] kasan_report+0xdc/0x128 [ 58.313705] kasan_check_range+0x100/0x1a8 [ 58.313736] __kasan_check_write+0x20/0x30 [ 58.313769] kasan_atomics_helper+0x1128/0x4858 [ 58.313801] kasan_atomics+0x198/0x2e0 [ 58.313829] kunit_try_run_case+0x170/0x3f0 [ 58.313864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.313901] kthread+0x328/0x630 [ 58.313933] ret_from_fork+0x10/0x20 [ 58.313963] [ 58.383782] Allocated by task 314: [ 58.387170] kasan_save_stack+0x3c/0x68 [ 58.390987] kasan_save_track+0x20/0x40 [ 58.394806] kasan_save_alloc_info+0x40/0x58 [ 58.399060] __kasan_kmalloc+0xd4/0xd8 [ 58.402793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.407306] kasan_atomics+0xb8/0x2e0 [ 58.410952] kunit_try_run_case+0x170/0x3f0 [ 58.415119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.420587] kthread+0x328/0x630 [ 58.423799] ret_from_fork+0x10/0x20 [ 58.427358] [ 58.428834] The buggy address belongs to the object at ffff000800d61a00 [ 58.428834] which belongs to the cache kmalloc-64 of size 64 [ 58.441160] The buggy address is located 0 bytes to the right of [ 58.441160] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.454007] [ 58.455484] The buggy address belongs to the physical page: [ 58.461039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.469024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.475534] page_type: f5(slab) [ 58.478669] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.486392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.494110] page dumped because: kasan: bad access detected [ 58.499666] [ 58.501141] Memory state around the buggy address: [ 58.505920] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.513125] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.520329] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.527530] ^ [ 58.532308] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.539513] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.546714] ================================================================== [ 61.977594] ================================================================== [ 61.984685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 61.992063] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.999353] [ 62.000835] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.000883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.000899] Hardware name: WinLink E850-96 board (DT) [ 62.000918] Call trace: [ 62.000932] show_stack+0x20/0x38 (C) [ 62.000964] dump_stack_lvl+0x8c/0xd0 [ 62.000997] print_report+0x118/0x608 [ 62.001025] kasan_report+0xdc/0x128 [ 62.001056] __asan_report_load8_noabort+0x20/0x30 [ 62.001092] kasan_atomics_helper+0x3df4/0x4858 [ 62.001121] kasan_atomics+0x198/0x2e0 [ 62.001149] kunit_try_run_case+0x170/0x3f0 [ 62.001184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.001222] kthread+0x328/0x630 [ 62.001255] ret_from_fork+0x10/0x20 [ 62.001289] [ 62.067754] Allocated by task 314: [ 62.071141] kasan_save_stack+0x3c/0x68 [ 62.074959] kasan_save_track+0x20/0x40 [ 62.078779] kasan_save_alloc_info+0x40/0x58 [ 62.083032] __kasan_kmalloc+0xd4/0xd8 [ 62.086765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.091279] kasan_atomics+0xb8/0x2e0 [ 62.094924] kunit_try_run_case+0x170/0x3f0 [ 62.099091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.104560] kthread+0x328/0x630 [ 62.107772] ret_from_fork+0x10/0x20 [ 62.111330] [ 62.112806] The buggy address belongs to the object at ffff000800d61a00 [ 62.112806] which belongs to the cache kmalloc-64 of size 64 [ 62.125133] The buggy address is located 0 bytes to the right of [ 62.125133] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.137979] [ 62.139457] The buggy address belongs to the physical page: [ 62.145012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.152998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.159507] page_type: f5(slab) [ 62.162642] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.170364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.178083] page dumped because: kasan: bad access detected [ 62.183638] [ 62.185114] Memory state around the buggy address: [ 62.189893] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.197097] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.204302] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.211503] ^ [ 62.216281] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.223485] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.230687] ================================================================== [ 53.826560] ================================================================== [ 53.833592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.840969] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.848260] [ 53.849744] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.849793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.849810] Hardware name: WinLink E850-96 board (DT) [ 53.849829] Call trace: [ 53.849843] show_stack+0x20/0x38 (C) [ 53.849874] dump_stack_lvl+0x8c/0xd0 [ 53.849910] print_report+0x118/0x608 [ 53.849940] kasan_report+0xdc/0x128 [ 53.849972] __asan_report_load4_noabort+0x20/0x30 [ 53.850006] kasan_atomics_helper+0x3dbc/0x4858 [ 53.850037] kasan_atomics+0x198/0x2e0 [ 53.850064] kunit_try_run_case+0x170/0x3f0 [ 53.850103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.850144] kthread+0x328/0x630 [ 53.850176] ret_from_fork+0x10/0x20 [ 53.850211] [ 53.916662] Allocated by task 314: [ 53.920049] kasan_save_stack+0x3c/0x68 [ 53.923867] kasan_save_track+0x20/0x40 [ 53.927686] kasan_save_alloc_info+0x40/0x58 [ 53.931939] __kasan_kmalloc+0xd4/0xd8 [ 53.935672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.940186] kasan_atomics+0xb8/0x2e0 [ 53.943831] kunit_try_run_case+0x170/0x3f0 [ 53.947998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.953467] kthread+0x328/0x630 [ 53.956679] ret_from_fork+0x10/0x20 [ 53.960238] [ 53.961713] The buggy address belongs to the object at ffff000800d61a00 [ 53.961713] which belongs to the cache kmalloc-64 of size 64 [ 53.974040] The buggy address is located 0 bytes to the right of [ 53.974040] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.986886] [ 53.988364] The buggy address belongs to the physical page: [ 53.993920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.001904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.008414] page_type: f5(slab) [ 54.011547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.019271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.026990] page dumped because: kasan: bad access detected [ 54.032545] [ 54.034021] Memory state around the buggy address: [ 54.038799] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.046004] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.053209] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.060410] ^ [ 54.065188] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.072393] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.079594] ================================================================== [ 62.762334] ================================================================== [ 62.769395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.776773] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 62.784150] [ 62.785634] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.785681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.785696] Hardware name: WinLink E850-96 board (DT) [ 62.785712] Call trace: [ 62.785725] show_stack+0x20/0x38 (C) [ 62.785756] dump_stack_lvl+0x8c/0xd0 [ 62.785793] print_report+0x118/0x608 [ 62.785824] kasan_report+0xdc/0x128 [ 62.785853] kasan_check_range+0x100/0x1a8 [ 62.785884] __kasan_check_write+0x20/0x30 [ 62.785919] kasan_atomics_helper+0x175c/0x4858 [ 62.785949] kasan_atomics+0x198/0x2e0 [ 62.785976] kunit_try_run_case+0x170/0x3f0 [ 62.786013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.786052] kthread+0x328/0x630 [ 62.786085] ret_from_fork+0x10/0x20 [ 62.786118] [ 62.855937] Allocated by task 314: [ 62.859323] kasan_save_stack+0x3c/0x68 [ 62.863142] kasan_save_track+0x20/0x40 [ 62.866962] kasan_save_alloc_info+0x40/0x58 [ 62.871215] __kasan_kmalloc+0xd4/0xd8 [ 62.874947] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.879461] kasan_atomics+0xb8/0x2e0 [ 62.883107] kunit_try_run_case+0x170/0x3f0 [ 62.887273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.892742] kthread+0x328/0x630 [ 62.895954] ret_from_fork+0x10/0x20 [ 62.899513] [ 62.900988] The buggy address belongs to the object at ffff000800d61a00 [ 62.900988] which belongs to the cache kmalloc-64 of size 64 [ 62.913315] The buggy address is located 0 bytes to the right of [ 62.913315] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.926162] [ 62.927641] The buggy address belongs to the physical page: [ 62.933195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.941180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.947689] page_type: f5(slab) [ 62.950825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.958547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.966266] page dumped because: kasan: bad access detected [ 62.971821] [ 62.973297] Memory state around the buggy address: [ 62.978075] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.985280] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.992484] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.999685] ^ [ 63.004464] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.011668] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.018869] ================================================================== [ 51.983854] ================================================================== [ 51.990912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 51.998201] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.005579] [ 52.007063] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.007109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.007127] Hardware name: WinLink E850-96 board (DT) [ 52.007145] Call trace: [ 52.007158] show_stack+0x20/0x38 (C) [ 52.007190] dump_stack_lvl+0x8c/0xd0 [ 52.007224] print_report+0x118/0x608 [ 52.007255] kasan_report+0xdc/0x128 [ 52.007286] kasan_check_range+0x100/0x1a8 [ 52.007317] __kasan_check_write+0x20/0x30 [ 52.007348] kasan_atomics_helper+0x934/0x4858 [ 52.007379] kasan_atomics+0x198/0x2e0 [ 52.007404] kunit_try_run_case+0x170/0x3f0 [ 52.007440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.007478] kthread+0x328/0x630 [ 52.007509] ret_from_fork+0x10/0x20 [ 52.007542] [ 52.077280] Allocated by task 314: [ 52.080667] kasan_save_stack+0x3c/0x68 [ 52.084485] kasan_save_track+0x20/0x40 [ 52.088304] kasan_save_alloc_info+0x40/0x58 [ 52.092557] __kasan_kmalloc+0xd4/0xd8 [ 52.096290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.100804] kasan_atomics+0xb8/0x2e0 [ 52.104450] kunit_try_run_case+0x170/0x3f0 [ 52.108616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.114085] kthread+0x328/0x630 [ 52.117297] ret_from_fork+0x10/0x20 [ 52.120856] [ 52.122331] The buggy address belongs to the object at ffff000800d61a00 [ 52.122331] which belongs to the cache kmalloc-64 of size 64 [ 52.134658] The buggy address is located 0 bytes to the right of [ 52.134658] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.147504] [ 52.148982] The buggy address belongs to the physical page: [ 52.154538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.162522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.169031] page_type: f5(slab) [ 52.172167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.179889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.187608] page dumped because: kasan: bad access detected [ 52.193163] [ 52.194639] Memory state around the buggy address: [ 52.199417] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.206622] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.213827] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.221028] ^ [ 52.225806] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.233010] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.240211] ================================================================== [ 57.234982] ================================================================== [ 57.242047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.249338] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 57.256716] [ 57.258199] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 57.258249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.258265] Hardware name: WinLink E850-96 board (DT) [ 57.258285] Call trace: [ 57.258297] show_stack+0x20/0x38 (C) [ 57.258330] dump_stack_lvl+0x8c/0xd0 [ 57.258365] print_report+0x118/0x608 [ 57.258396] kasan_report+0xdc/0x128 [ 57.258425] kasan_check_range+0x100/0x1a8 [ 57.258457] __kasan_check_write+0x20/0x30 [ 57.258489] kasan_atomics_helper+0xf88/0x4858 [ 57.258519] kasan_atomics+0x198/0x2e0 [ 57.258547] kunit_try_run_case+0x170/0x3f0 [ 57.258581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.258621] kthread+0x328/0x630 [ 57.258652] ret_from_fork+0x10/0x20 [ 57.258684] [ 57.328416] Allocated by task 314: [ 57.331802] kasan_save_stack+0x3c/0x68 [ 57.335621] kasan_save_track+0x20/0x40 [ 57.339441] kasan_save_alloc_info+0x40/0x58 [ 57.343694] __kasan_kmalloc+0xd4/0xd8 [ 57.347426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.351940] kasan_atomics+0xb8/0x2e0 [ 57.355586] kunit_try_run_case+0x170/0x3f0 [ 57.359753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.365221] kthread+0x328/0x630 [ 57.368433] ret_from_fork+0x10/0x20 [ 57.371992] [ 57.373467] The buggy address belongs to the object at ffff000800d61a00 [ 57.373467] which belongs to the cache kmalloc-64 of size 64 [ 57.385794] The buggy address is located 0 bytes to the right of [ 57.385794] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.398641] [ 57.400117] The buggy address belongs to the physical page: [ 57.405673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.413659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.420168] page_type: f5(slab) [ 57.423303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.431026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.438744] page dumped because: kasan: bad access detected [ 57.444300] [ 57.445775] Memory state around the buggy address: [ 57.450555] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.457759] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.464963] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.472164] ^ [ 57.476942] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.484147] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.491348] ================================================================== [ 58.026301] ================================================================== [ 58.033355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.040732] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.048110] [ 58.049593] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.049643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.049660] Hardware name: WinLink E850-96 board (DT) [ 58.049680] Call trace: [ 58.049692] show_stack+0x20/0x38 (C) [ 58.049724] dump_stack_lvl+0x8c/0xd0 [ 58.049760] print_report+0x118/0x608 [ 58.049789] kasan_report+0xdc/0x128 [ 58.049818] kasan_check_range+0x100/0x1a8 [ 58.049850] __kasan_check_write+0x20/0x30 [ 58.049882] kasan_atomics_helper+0x10c0/0x4858 [ 58.049914] kasan_atomics+0x198/0x2e0 [ 58.049942] kunit_try_run_case+0x170/0x3f0 [ 58.049976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.050015] kthread+0x328/0x630 [ 58.050045] ret_from_fork+0x10/0x20 [ 58.050078] [ 58.119897] Allocated by task 314: [ 58.123284] kasan_save_stack+0x3c/0x68 [ 58.127102] kasan_save_track+0x20/0x40 [ 58.130921] kasan_save_alloc_info+0x40/0x58 [ 58.135175] __kasan_kmalloc+0xd4/0xd8 [ 58.138908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.143421] kasan_atomics+0xb8/0x2e0 [ 58.147067] kunit_try_run_case+0x170/0x3f0 [ 58.151234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.156702] kthread+0x328/0x630 [ 58.159914] ret_from_fork+0x10/0x20 [ 58.163473] [ 58.164949] The buggy address belongs to the object at ffff000800d61a00 [ 58.164949] which belongs to the cache kmalloc-64 of size 64 [ 58.177275] The buggy address is located 0 bytes to the right of [ 58.177275] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.190122] [ 58.191600] The buggy address belongs to the physical page: [ 58.197155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.205139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.211649] page_type: f5(slab) [ 58.214786] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.222507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.230226] page dumped because: kasan: bad access detected [ 58.235781] [ 58.237257] Memory state around the buggy address: [ 58.242036] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.249240] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.256444] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.263645] ^ [ 58.268423] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.275628] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.282829] ================================================================== [ 51.459752] ================================================================== [ 51.466788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.474077] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 51.481455] [ 51.482939] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 51.482986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.483002] Hardware name: WinLink E850-96 board (DT) [ 51.483022] Call trace: [ 51.483036] show_stack+0x20/0x38 (C) [ 51.483067] dump_stack_lvl+0x8c/0xd0 [ 51.483103] print_report+0x118/0x608 [ 51.483133] kasan_report+0xdc/0x128 [ 51.483162] kasan_check_range+0x100/0x1a8 [ 51.483194] __kasan_check_write+0x20/0x30 [ 51.483229] kasan_atomics_helper+0x894/0x4858 [ 51.483259] kasan_atomics+0x198/0x2e0 [ 51.483288] kunit_try_run_case+0x170/0x3f0 [ 51.483323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.483362] kthread+0x328/0x630 [ 51.483394] ret_from_fork+0x10/0x20 [ 51.483427] [ 51.553155] Allocated by task 314: [ 51.556543] kasan_save_stack+0x3c/0x68 [ 51.560360] kasan_save_track+0x20/0x40 [ 51.564180] kasan_save_alloc_info+0x40/0x58 [ 51.568433] __kasan_kmalloc+0xd4/0xd8 [ 51.572166] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.576680] kasan_atomics+0xb8/0x2e0 [ 51.580325] kunit_try_run_case+0x170/0x3f0 [ 51.584492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.589961] kthread+0x328/0x630 [ 51.593172] ret_from_fork+0x10/0x20 [ 51.596732] [ 51.598207] The buggy address belongs to the object at ffff000800d61a00 [ 51.598207] which belongs to the cache kmalloc-64 of size 64 [ 51.610533] The buggy address is located 0 bytes to the right of [ 51.610533] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.623380] [ 51.624856] The buggy address belongs to the physical page: [ 51.630414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.638398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.644908] page_type: f5(slab) [ 51.648044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.655765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.663484] page dumped because: kasan: bad access detected [ 51.669039] [ 51.670515] Memory state around the buggy address: [ 51.675295] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.682498] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.689703] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.696904] ^ [ 51.701681] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.708887] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.716087] ================================================================== [ 55.922850] ================================================================== [ 55.929914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 55.937291] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.944583] [ 55.946066] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.946115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.946131] Hardware name: WinLink E850-96 board (DT) [ 55.946151] Call trace: [ 55.946162] show_stack+0x20/0x38 (C) [ 55.946193] dump_stack_lvl+0x8c/0xd0 [ 55.946227] print_report+0x118/0x608 [ 55.946259] kasan_report+0xdc/0x128 [ 55.946289] __asan_report_load8_noabort+0x20/0x30 [ 55.946326] kasan_atomics_helper+0x3f58/0x4858 [ 55.946356] kasan_atomics+0x198/0x2e0 [ 55.946384] kunit_try_run_case+0x170/0x3f0 [ 55.946418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.946457] kthread+0x328/0x630 [ 55.946491] ret_from_fork+0x10/0x20 [ 55.946524] [ 56.012984] Allocated by task 314: [ 56.016371] kasan_save_stack+0x3c/0x68 [ 56.020189] kasan_save_track+0x20/0x40 [ 56.024009] kasan_save_alloc_info+0x40/0x58 [ 56.028262] __kasan_kmalloc+0xd4/0xd8 [ 56.031995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.036509] kasan_atomics+0xb8/0x2e0 [ 56.040154] kunit_try_run_case+0x170/0x3f0 [ 56.044321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.049790] kthread+0x328/0x630 [ 56.053001] ret_from_fork+0x10/0x20 [ 56.056560] [ 56.058036] The buggy address belongs to the object at ffff000800d61a00 [ 56.058036] which belongs to the cache kmalloc-64 of size 64 [ 56.070362] The buggy address is located 0 bytes to the right of [ 56.070362] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.083209] [ 56.084685] The buggy address belongs to the physical page: [ 56.090243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.098226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.104737] page_type: f5(slab) [ 56.107871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.115594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.123313] page dumped because: kasan: bad access detected [ 56.128868] [ 56.130344] Memory state around the buggy address: [ 56.135122] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.142327] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.149532] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.156732] ^ [ 56.161510] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.168715] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.175916] ================================================================== [ 62.501926] ================================================================== [ 62.508985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.516359] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 62.523651] [ 62.525133] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.525181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.525199] Hardware name: WinLink E850-96 board (DT) [ 62.525216] Call trace: [ 62.525229] show_stack+0x20/0x38 (C) [ 62.525260] dump_stack_lvl+0x8c/0xd0 [ 62.525294] print_report+0x118/0x608 [ 62.525325] kasan_report+0xdc/0x128 [ 62.525354] __asan_report_load8_noabort+0x20/0x30 [ 62.525390] kasan_atomics_helper+0x3e10/0x4858 [ 62.525422] kasan_atomics+0x198/0x2e0 [ 62.525448] kunit_try_run_case+0x170/0x3f0 [ 62.525485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.525524] kthread+0x328/0x630 [ 62.525556] ret_from_fork+0x10/0x20 [ 62.525588] [ 62.592052] Allocated by task 314: [ 62.595438] kasan_save_stack+0x3c/0x68 [ 62.599257] kasan_save_track+0x20/0x40 [ 62.603077] kasan_save_alloc_info+0x40/0x58 [ 62.607330] __kasan_kmalloc+0xd4/0xd8 [ 62.611063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.615576] kasan_atomics+0xb8/0x2e0 [ 62.619222] kunit_try_run_case+0x170/0x3f0 [ 62.623389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.628858] kthread+0x328/0x630 [ 62.632069] ret_from_fork+0x10/0x20 [ 62.635628] [ 62.637104] The buggy address belongs to the object at ffff000800d61a00 [ 62.637104] which belongs to the cache kmalloc-64 of size 64 [ 62.649430] The buggy address is located 0 bytes to the right of [ 62.649430] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.662277] [ 62.663754] The buggy address belongs to the physical page: [ 62.669310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.677295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.683804] page_type: f5(slab) [ 62.686939] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.694662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.702381] page dumped because: kasan: bad access detected [ 62.707936] [ 62.709412] Memory state around the buggy address: [ 62.714190] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.721395] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.728599] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.735800] ^ [ 62.740578] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.747783] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.754984] ================================================================== [ 60.925555] ================================================================== [ 60.932617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 60.939994] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.947372] [ 60.948855] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.948902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.948918] Hardware name: WinLink E850-96 board (DT) [ 60.948937] Call trace: [ 60.948949] show_stack+0x20/0x38 (C) [ 60.948983] dump_stack_lvl+0x8c/0xd0 [ 60.949018] print_report+0x118/0x608 [ 60.949050] kasan_report+0xdc/0x128 [ 60.949079] kasan_check_range+0x100/0x1a8 [ 60.949111] __kasan_check_write+0x20/0x30 [ 60.949143] kasan_atomics_helper+0x154c/0x4858 [ 60.949174] kasan_atomics+0x198/0x2e0 [ 60.949202] kunit_try_run_case+0x170/0x3f0 [ 60.949237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.949275] kthread+0x328/0x630 [ 60.949310] ret_from_fork+0x10/0x20 [ 60.949344] [ 61.019159] Allocated by task 314: [ 61.022545] kasan_save_stack+0x3c/0x68 [ 61.026364] kasan_save_track+0x20/0x40 [ 61.030183] kasan_save_alloc_info+0x40/0x58 [ 61.034437] __kasan_kmalloc+0xd4/0xd8 [ 61.038169] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.042683] kasan_atomics+0xb8/0x2e0 [ 61.046329] kunit_try_run_case+0x170/0x3f0 [ 61.050496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.055964] kthread+0x328/0x630 [ 61.059176] ret_from_fork+0x10/0x20 [ 61.062735] [ 61.064211] The buggy address belongs to the object at ffff000800d61a00 [ 61.064211] which belongs to the cache kmalloc-64 of size 64 [ 61.076537] The buggy address is located 0 bytes to the right of [ 61.076537] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.089384] [ 61.090862] The buggy address belongs to the physical page: [ 61.096416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.104401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.110911] page_type: f5(slab) [ 61.114045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.121769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.129488] page dumped because: kasan: bad access detected [ 61.135043] [ 61.136519] Memory state around the buggy address: [ 61.141297] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.148502] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.155706] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.162907] ^ [ 61.167685] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.174890] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.182091] ================================================================== [ 58.817946] ================================================================== [ 58.825010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.832387] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.839765] [ 58.841247] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.841296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.841312] Hardware name: WinLink E850-96 board (DT) [ 58.841331] Call trace: [ 58.841344] show_stack+0x20/0x38 (C) [ 58.841375] dump_stack_lvl+0x8c/0xd0 [ 58.841411] print_report+0x118/0x608 [ 58.841442] kasan_report+0xdc/0x128 [ 58.841471] kasan_check_range+0x100/0x1a8 [ 58.841502] __kasan_check_write+0x20/0x30 [ 58.841535] kasan_atomics_helper+0x11f8/0x4858 [ 58.841565] kasan_atomics+0x198/0x2e0 [ 58.841593] kunit_try_run_case+0x170/0x3f0 [ 58.841628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.841668] kthread+0x328/0x630 [ 58.841701] ret_from_fork+0x10/0x20 [ 58.841733] [ 58.911552] Allocated by task 314: [ 58.914939] kasan_save_stack+0x3c/0x68 [ 58.918757] kasan_save_track+0x20/0x40 [ 58.922576] kasan_save_alloc_info+0x40/0x58 [ 58.926830] __kasan_kmalloc+0xd4/0xd8 [ 58.930563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.935076] kasan_atomics+0xb8/0x2e0 [ 58.938722] kunit_try_run_case+0x170/0x3f0 [ 58.942888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.948357] kthread+0x328/0x630 [ 58.951569] ret_from_fork+0x10/0x20 [ 58.955128] [ 58.956603] The buggy address belongs to the object at ffff000800d61a00 [ 58.956603] which belongs to the cache kmalloc-64 of size 64 [ 58.968930] The buggy address is located 0 bytes to the right of [ 58.968930] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.981777] [ 58.983254] The buggy address belongs to the physical page: [ 58.988808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.996794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.003304] page_type: f5(slab) [ 59.006439] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.014162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.021881] page dumped because: kasan: bad access detected [ 59.027435] [ 59.028911] Memory state around the buggy address: [ 59.033690] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.040895] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.048099] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.055300] ^ [ 59.060078] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.067283] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.074484] ================================================================== [ 46.722987] ================================================================== [ 46.729883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.737256] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 46.744634] [ 46.746121] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 46.746179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.746198] Hardware name: WinLink E850-96 board (DT) [ 46.746219] Call trace: [ 46.746236] show_stack+0x20/0x38 (C) [ 46.746271] dump_stack_lvl+0x8c/0xd0 [ 46.746309] print_report+0x118/0x608 [ 46.746343] kasan_report+0xdc/0x128 [ 46.746374] __asan_report_store4_noabort+0x20/0x30 [ 46.746415] kasan_atomics_helper+0x3f7c/0x4858 [ 46.746445] kasan_atomics+0x198/0x2e0 [ 46.746474] kunit_try_run_case+0x170/0x3f0 [ 46.746509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.746547] kthread+0x328/0x630 [ 46.746581] ret_from_fork+0x10/0x20 [ 46.746618] [ 46.813122] Allocated by task 314: [ 46.816511] kasan_save_stack+0x3c/0x68 [ 46.820327] kasan_save_track+0x20/0x40 [ 46.824146] kasan_save_alloc_info+0x40/0x58 [ 46.828400] __kasan_kmalloc+0xd4/0xd8 [ 46.832133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.836647] kasan_atomics+0xb8/0x2e0 [ 46.840292] kunit_try_run_case+0x170/0x3f0 [ 46.844459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.849928] kthread+0x328/0x630 [ 46.853139] ret_from_fork+0x10/0x20 [ 46.856698] [ 46.858175] The buggy address belongs to the object at ffff000800d61a00 [ 46.858175] which belongs to the cache kmalloc-64 of size 64 [ 46.870502] The buggy address is located 0 bytes to the right of [ 46.870502] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 46.883347] [ 46.884826] The buggy address belongs to the physical page: [ 46.890383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 46.898367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.904875] page_type: f5(slab) [ 46.908011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.915732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.923451] page dumped because: kasan: bad access detected [ 46.929008] [ 46.930482] Memory state around the buggy address: [ 46.935263] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.942465] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.949670] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.956871] ^ [ 46.961648] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.968853] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.976054] ================================================================== [ 50.668589] ================================================================== [ 50.675653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.682943] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.690322] [ 50.691804] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.691854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.691871] Hardware name: WinLink E850-96 board (DT) [ 50.691892] Call trace: [ 50.691904] show_stack+0x20/0x38 (C) [ 50.691936] dump_stack_lvl+0x8c/0xd0 [ 50.691970] print_report+0x118/0x608 [ 50.692000] kasan_report+0xdc/0x128 [ 50.692030] kasan_check_range+0x100/0x1a8 [ 50.692063] __kasan_check_write+0x20/0x30 [ 50.692098] kasan_atomics_helper+0x6ec/0x4858 [ 50.692129] kasan_atomics+0x198/0x2e0 [ 50.692155] kunit_try_run_case+0x170/0x3f0 [ 50.692191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.692229] kthread+0x328/0x630 [ 50.692261] ret_from_fork+0x10/0x20 [ 50.692293] [ 50.762021] Allocated by task 314: [ 50.765408] kasan_save_stack+0x3c/0x68 [ 50.769226] kasan_save_track+0x20/0x40 [ 50.773046] kasan_save_alloc_info+0x40/0x58 [ 50.777299] __kasan_kmalloc+0xd4/0xd8 [ 50.781032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.785546] kasan_atomics+0xb8/0x2e0 [ 50.789192] kunit_try_run_case+0x170/0x3f0 [ 50.793358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.798827] kthread+0x328/0x630 [ 50.802038] ret_from_fork+0x10/0x20 [ 50.805598] [ 50.807073] The buggy address belongs to the object at ffff000800d61a00 [ 50.807073] which belongs to the cache kmalloc-64 of size 64 [ 50.819400] The buggy address is located 0 bytes to the right of [ 50.819400] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.832246] [ 50.833724] The buggy address belongs to the physical page: [ 50.839280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.847265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.853774] page_type: f5(slab) [ 50.856909] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.864631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.872350] page dumped because: kasan: bad access detected [ 50.877905] [ 50.879381] Memory state around the buggy address: [ 50.884161] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.891364] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.898569] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.905770] ^ [ 50.910548] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.917752] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.924953] ================================================================== [ 46.455310] ================================================================== [ 46.469469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.476845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 46.484134] [ 46.485623] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 46.485679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.485697] Hardware name: WinLink E850-96 board (DT) [ 46.485720] Call trace: [ 46.485734] show_stack+0x20/0x38 (C) [ 46.485773] dump_stack_lvl+0x8c/0xd0 [ 46.485812] print_report+0x118/0x608 [ 46.485846] kasan_report+0xdc/0x128 [ 46.485877] __asan_report_load4_noabort+0x20/0x30 [ 46.485913] kasan_atomics_helper+0x40a8/0x4858 [ 46.485943] kasan_atomics+0x198/0x2e0 [ 46.485971] kunit_try_run_case+0x170/0x3f0 [ 46.486009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.486049] kthread+0x328/0x630 [ 46.486086] ret_from_fork+0x10/0x20 [ 46.486126] [ 46.552537] Allocated by task 314: [ 46.555925] kasan_save_stack+0x3c/0x68 [ 46.559741] kasan_save_track+0x20/0x40 [ 46.563560] kasan_save_alloc_info+0x40/0x58 [ 46.567814] __kasan_kmalloc+0xd4/0xd8 [ 46.571546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.576060] kasan_atomics+0xb8/0x2e0 [ 46.579706] kunit_try_run_case+0x170/0x3f0 [ 46.583873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.589341] kthread+0x328/0x630 [ 46.592553] ret_from_fork+0x10/0x20 [ 46.596112] [ 46.597589] The buggy address belongs to the object at ffff000800d61a00 [ 46.597589] which belongs to the cache kmalloc-64 of size 64 [ 46.609918] The buggy address is located 0 bytes to the right of [ 46.609918] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 46.622761] [ 46.624240] The buggy address belongs to the physical page: [ 46.629798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 46.637780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.644290] page_type: f5(slab) [ 46.647429] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.655146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.662865] page dumped because: kasan: bad access detected [ 46.668420] [ 46.669896] Memory state around the buggy address: [ 46.674675] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.681879] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.689084] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.696284] ^ [ 46.701063] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.708267] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.715469] ================================================================== [ 53.302428] ================================================================== [ 53.309468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.316845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.324136] [ 53.325619] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.325667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.325684] Hardware name: WinLink E850-96 board (DT) [ 53.325704] Call trace: [ 53.325717] show_stack+0x20/0x38 (C) [ 53.325749] dump_stack_lvl+0x8c/0xd0 [ 53.325784] print_report+0x118/0x608 [ 53.325812] kasan_report+0xdc/0x128 [ 53.325841] __asan_report_load4_noabort+0x20/0x30 [ 53.325876] kasan_atomics_helper+0x3dcc/0x4858 [ 53.325906] kasan_atomics+0x198/0x2e0 [ 53.325935] kunit_try_run_case+0x170/0x3f0 [ 53.325972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.326012] kthread+0x328/0x630 [ 53.326044] ret_from_fork+0x10/0x20 [ 53.326078] [ 53.392538] Allocated by task 314: [ 53.395925] kasan_save_stack+0x3c/0x68 [ 53.399742] kasan_save_track+0x20/0x40 [ 53.403562] kasan_save_alloc_info+0x40/0x58 [ 53.407815] __kasan_kmalloc+0xd4/0xd8 [ 53.411548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.416062] kasan_atomics+0xb8/0x2e0 [ 53.419707] kunit_try_run_case+0x170/0x3f0 [ 53.423874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.429343] kthread+0x328/0x630 [ 53.432554] ret_from_fork+0x10/0x20 [ 53.436114] [ 53.437589] The buggy address belongs to the object at ffff000800d61a00 [ 53.437589] which belongs to the cache kmalloc-64 of size 64 [ 53.449916] The buggy address is located 0 bytes to the right of [ 53.449916] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.462763] [ 53.464238] The buggy address belongs to the physical page: [ 53.469794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 53.477780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.484290] page_type: f5(slab) [ 53.487423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.495147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.502866] page dumped because: kasan: bad access detected [ 53.508422] [ 53.509897] Memory state around the buggy address: [ 53.514677] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.521880] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.529085] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.536286] ^ [ 53.541064] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.548269] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.555470] ================================================================== [ 54.874779] ================================================================== [ 54.881840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 54.889217] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.896508] [ 54.897992] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.898038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.898055] Hardware name: WinLink E850-96 board (DT) [ 54.898074] Call trace: [ 54.898089] show_stack+0x20/0x38 (C) [ 54.898121] dump_stack_lvl+0x8c/0xd0 [ 54.898157] print_report+0x118/0x608 [ 54.898189] kasan_report+0xdc/0x128 [ 54.898217] __asan_report_load4_noabort+0x20/0x30 [ 54.898253] kasan_atomics_helper+0x3dd8/0x4858 [ 54.898284] kasan_atomics+0x198/0x2e0 [ 54.898311] kunit_try_run_case+0x170/0x3f0 [ 54.898347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.898387] kthread+0x328/0x630 [ 54.898421] ret_from_fork+0x10/0x20 [ 54.898457] [ 54.964910] Allocated by task 314: [ 54.968296] kasan_save_stack+0x3c/0x68 [ 54.972114] kasan_save_track+0x20/0x40 [ 54.975934] kasan_save_alloc_info+0x40/0x58 [ 54.980188] __kasan_kmalloc+0xd4/0xd8 [ 54.983920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.988434] kasan_atomics+0xb8/0x2e0 [ 54.992080] kunit_try_run_case+0x170/0x3f0 [ 54.996246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.001715] kthread+0x328/0x630 [ 55.004927] ret_from_fork+0x10/0x20 [ 55.008486] [ 55.009961] The buggy address belongs to the object at ffff000800d61a00 [ 55.009961] which belongs to the cache kmalloc-64 of size 64 [ 55.022288] The buggy address is located 0 bytes to the right of [ 55.022288] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.035135] [ 55.036612] The buggy address belongs to the physical page: [ 55.042167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.050152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.056662] page_type: f5(slab) [ 55.059797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.067520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.075238] page dumped because: kasan: bad access detected [ 55.080794] [ 55.082269] Memory state around the buggy address: [ 55.087048] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.094252] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.101457] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.108658] ^ [ 55.113436] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.120640] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.127842] ================================================================== [ 56.971275] ================================================================== [ 56.978337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 56.985626] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.993005] [ 56.994487] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.994537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.994553] Hardware name: WinLink E850-96 board (DT) [ 56.994573] Call trace: [ 56.994585] show_stack+0x20/0x38 (C) [ 56.994618] dump_stack_lvl+0x8c/0xd0 [ 56.994652] print_report+0x118/0x608 [ 56.994682] kasan_report+0xdc/0x128 [ 56.994714] kasan_check_range+0x100/0x1a8 [ 56.994747] __kasan_check_write+0x20/0x30 [ 56.994780] kasan_atomics_helper+0xf20/0x4858 [ 56.994811] kasan_atomics+0x198/0x2e0 [ 56.994838] kunit_try_run_case+0x170/0x3f0 [ 56.994872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.994911] kthread+0x328/0x630 [ 56.994945] ret_from_fork+0x10/0x20 [ 56.994978] [ 57.064705] Allocated by task 314: [ 57.068091] kasan_save_stack+0x3c/0x68 [ 57.071910] kasan_save_track+0x20/0x40 [ 57.075729] kasan_save_alloc_info+0x40/0x58 [ 57.079983] __kasan_kmalloc+0xd4/0xd8 [ 57.083715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.088229] kasan_atomics+0xb8/0x2e0 [ 57.091875] kunit_try_run_case+0x170/0x3f0 [ 57.096041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.101509] kthread+0x328/0x630 [ 57.104722] ret_from_fork+0x10/0x20 [ 57.108281] [ 57.109756] The buggy address belongs to the object at ffff000800d61a00 [ 57.109756] which belongs to the cache kmalloc-64 of size 64 [ 57.122083] The buggy address is located 0 bytes to the right of [ 57.122083] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.134930] [ 57.136406] The buggy address belongs to the physical page: [ 57.141963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.149947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.156457] page_type: f5(slab) [ 57.159592] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.167314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.175033] page dumped because: kasan: bad access detected [ 57.180588] [ 57.182064] Memory state around the buggy address: [ 57.186842] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.194047] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.201252] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.208453] ^ [ 57.213231] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.220436] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.227637] ================================================================== [ 52.247594] ================================================================== [ 52.254624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.261913] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.269291] [ 52.270774] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.270823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.270840] Hardware name: WinLink E850-96 board (DT) [ 52.270861] Call trace: [ 52.270873] show_stack+0x20/0x38 (C) [ 52.270904] dump_stack_lvl+0x8c/0xd0 [ 52.270941] print_report+0x118/0x608 [ 52.270972] kasan_report+0xdc/0x128 [ 52.271001] kasan_check_range+0x100/0x1a8 [ 52.271033] __kasan_check_write+0x20/0x30 [ 52.271065] kasan_atomics_helper+0x99c/0x4858 [ 52.271097] kasan_atomics+0x198/0x2e0 [ 52.271125] kunit_try_run_case+0x170/0x3f0 [ 52.271159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.271199] kthread+0x328/0x630 [ 52.271232] ret_from_fork+0x10/0x20 [ 52.271264] [ 52.340991] Allocated by task 314: [ 52.344378] kasan_save_stack+0x3c/0x68 [ 52.348196] kasan_save_track+0x20/0x40 [ 52.352015] kasan_save_alloc_info+0x40/0x58 [ 52.356269] __kasan_kmalloc+0xd4/0xd8 [ 52.360001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.364515] kasan_atomics+0xb8/0x2e0 [ 52.368161] kunit_try_run_case+0x170/0x3f0 [ 52.372328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.377796] kthread+0x328/0x630 [ 52.381008] ret_from_fork+0x10/0x20 [ 52.384567] [ 52.386042] The buggy address belongs to the object at ffff000800d61a00 [ 52.386042] which belongs to the cache kmalloc-64 of size 64 [ 52.398369] The buggy address is located 0 bytes to the right of [ 52.398369] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.411216] [ 52.412692] The buggy address belongs to the physical page: [ 52.418249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.426233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.432743] page_type: f5(slab) [ 52.435878] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.443600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.451319] page dumped because: kasan: bad access detected [ 52.456874] [ 52.458350] Memory state around the buggy address: [ 52.463130] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.470334] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.477538] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.484739] ^ [ 52.489517] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.496722] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.503923] ================================================================== [ 61.713767] ================================================================== [ 61.720800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.728177] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.735555] [ 61.737037] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 61.737083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.737101] Hardware name: WinLink E850-96 board (DT) [ 61.737118] Call trace: [ 61.737132] show_stack+0x20/0x38 (C) [ 61.737163] dump_stack_lvl+0x8c/0xd0 [ 61.737198] print_report+0x118/0x608 [ 61.737228] kasan_report+0xdc/0x128 [ 61.737257] kasan_check_range+0x100/0x1a8 [ 61.737288] __kasan_check_write+0x20/0x30 [ 61.737319] kasan_atomics_helper+0x1644/0x4858 [ 61.737351] kasan_atomics+0x198/0x2e0 [ 61.737379] kunit_try_run_case+0x170/0x3f0 [ 61.737417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.737454] kthread+0x328/0x630 [ 61.737487] ret_from_fork+0x10/0x20 [ 61.737519] [ 61.807342] Allocated by task 314: [ 61.810729] kasan_save_stack+0x3c/0x68 [ 61.814547] kasan_save_track+0x20/0x40 [ 61.818366] kasan_save_alloc_info+0x40/0x58 [ 61.822620] __kasan_kmalloc+0xd4/0xd8 [ 61.826352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.830866] kasan_atomics+0xb8/0x2e0 [ 61.834512] kunit_try_run_case+0x170/0x3f0 [ 61.838678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.844147] kthread+0x328/0x630 [ 61.847359] ret_from_fork+0x10/0x20 [ 61.850918] [ 61.852394] The buggy address belongs to the object at ffff000800d61a00 [ 61.852394] which belongs to the cache kmalloc-64 of size 64 [ 61.864721] The buggy address is located 0 bytes to the right of [ 61.864721] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.877567] [ 61.879042] The buggy address belongs to the physical page: [ 61.884598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.892584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.899094] page_type: f5(slab) [ 61.902230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.909951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.917670] page dumped because: kasan: bad access detected [ 61.923225] [ 61.924701] Memory state around the buggy address: [ 61.929481] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.936684] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.943889] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.951090] ^ [ 61.955868] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.963074] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.970274] ================================================================== [ 52.774976] ================================================================== [ 52.782045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.789335] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.796713] [ 52.798198] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.798247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.798262] Hardware name: WinLink E850-96 board (DT) [ 52.798282] Call trace: [ 52.798294] show_stack+0x20/0x38 (C) [ 52.798324] dump_stack_lvl+0x8c/0xd0 [ 52.798360] print_report+0x118/0x608 [ 52.798390] kasan_report+0xdc/0x128 [ 52.798420] kasan_check_range+0x100/0x1a8 [ 52.798452] __kasan_check_write+0x20/0x30 [ 52.798485] kasan_atomics_helper+0xa6c/0x4858 [ 52.798515] kasan_atomics+0x198/0x2e0 [ 52.798543] kunit_try_run_case+0x170/0x3f0 [ 52.798578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.798617] kthread+0x328/0x630 [ 52.798651] ret_from_fork+0x10/0x20 [ 52.798682] [ 52.868414] Allocated by task 314: [ 52.871799] kasan_save_stack+0x3c/0x68 [ 52.875619] kasan_save_track+0x20/0x40 [ 52.879438] kasan_save_alloc_info+0x40/0x58 [ 52.883691] __kasan_kmalloc+0xd4/0xd8 [ 52.887424] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.891937] kasan_atomics+0xb8/0x2e0 [ 52.895584] kunit_try_run_case+0x170/0x3f0 [ 52.899750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.905219] kthread+0x328/0x630 [ 52.908431] ret_from_fork+0x10/0x20 [ 52.911989] [ 52.913465] The buggy address belongs to the object at ffff000800d61a00 [ 52.913465] which belongs to the cache kmalloc-64 of size 64 [ 52.925793] The buggy address is located 0 bytes to the right of [ 52.925793] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.938638] [ 52.940114] The buggy address belongs to the physical page: [ 52.945670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.953656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.960166] page_type: f5(slab) [ 52.963301] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.971023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.978742] page dumped because: kasan: bad access detected [ 52.984297] [ 52.985773] Memory state around the buggy address: [ 52.990553] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.997756] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.004961] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.012162] ^ [ 53.016940] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.024144] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.031346] ================================================================== [ 61.453332] ================================================================== [ 61.460388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.467764] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.475055] [ 61.476538] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 61.476585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.476600] Hardware name: WinLink E850-96 board (DT) [ 61.476619] Call trace: [ 61.476632] show_stack+0x20/0x38 (C) [ 61.476663] dump_stack_lvl+0x8c/0xd0 [ 61.476699] print_report+0x118/0x608 [ 61.476730] kasan_report+0xdc/0x128 [ 61.476760] __asan_report_load8_noabort+0x20/0x30 [ 61.476793] kasan_atomics_helper+0x3db0/0x4858 [ 61.476824] kasan_atomics+0x198/0x2e0 [ 61.476851] kunit_try_run_case+0x170/0x3f0 [ 61.476887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.476924] kthread+0x328/0x630 [ 61.476957] ret_from_fork+0x10/0x20 [ 61.476990] [ 61.543457] Allocated by task 314: [ 61.546842] kasan_save_stack+0x3c/0x68 [ 61.550662] kasan_save_track+0x20/0x40 [ 61.554481] kasan_save_alloc_info+0x40/0x58 [ 61.558735] __kasan_kmalloc+0xd4/0xd8 [ 61.562467] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.566981] kasan_atomics+0xb8/0x2e0 [ 61.570627] kunit_try_run_case+0x170/0x3f0 [ 61.574793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.580262] kthread+0x328/0x630 [ 61.583474] ret_from_fork+0x10/0x20 [ 61.587033] [ 61.588508] The buggy address belongs to the object at ffff000800d61a00 [ 61.588508] which belongs to the cache kmalloc-64 of size 64 [ 61.600835] The buggy address is located 0 bytes to the right of [ 61.600835] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.613681] [ 61.615158] The buggy address belongs to the physical page: [ 61.620714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.628700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.635209] page_type: f5(slab) [ 61.638344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.646067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.653786] page dumped because: kasan: bad access detected [ 61.659341] [ 61.660816] Memory state around the buggy address: [ 61.665596] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.672799] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.680004] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.687205] ^ [ 61.691983] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.699187] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.706389] ================================================================== [ 48.822647] ================================================================== [ 48.829674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.836964] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.844342] [ 48.845825] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.845876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.845893] Hardware name: WinLink E850-96 board (DT) [ 48.845912] Call trace: [ 48.845924] show_stack+0x20/0x38 (C) [ 48.845953] dump_stack_lvl+0x8c/0xd0 [ 48.845988] print_report+0x118/0x608 [ 48.846017] kasan_report+0xdc/0x128 [ 48.846048] kasan_check_range+0x100/0x1a8 [ 48.846080] __kasan_check_write+0x20/0x30 [ 48.846112] kasan_atomics_helper+0x414/0x4858 [ 48.846141] kasan_atomics+0x198/0x2e0 [ 48.846170] kunit_try_run_case+0x170/0x3f0 [ 48.846205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.846245] kthread+0x328/0x630 [ 48.846278] ret_from_fork+0x10/0x20 [ 48.846310] [ 48.916042] Allocated by task 314: [ 48.919428] kasan_save_stack+0x3c/0x68 [ 48.923247] kasan_save_track+0x20/0x40 [ 48.927067] kasan_save_alloc_info+0x40/0x58 [ 48.931320] __kasan_kmalloc+0xd4/0xd8 [ 48.935053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.939566] kasan_atomics+0xb8/0x2e0 [ 48.943212] kunit_try_run_case+0x170/0x3f0 [ 48.947379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.952847] kthread+0x328/0x630 [ 48.956059] ret_from_fork+0x10/0x20 [ 48.959618] [ 48.961094] The buggy address belongs to the object at ffff000800d61a00 [ 48.961094] which belongs to the cache kmalloc-64 of size 64 [ 48.973420] The buggy address is located 0 bytes to the right of [ 48.973420] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.986267] [ 48.987745] The buggy address belongs to the physical page: [ 48.993301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.001284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.007794] page_type: f5(slab) [ 49.010929] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.018652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.026370] page dumped because: kasan: bad access detected [ 49.031926] [ 49.033402] Memory state around the buggy address: [ 49.038182] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.045385] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.052590] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.059790] ^ [ 49.064568] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.071773] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.078974] ================================================================== [ 48.034698] ================================================================== [ 48.041667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.048955] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.056333] [ 48.057818] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.057870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.057887] Hardware name: WinLink E850-96 board (DT) [ 48.057908] Call trace: [ 48.057924] show_stack+0x20/0x38 (C) [ 48.057959] dump_stack_lvl+0x8c/0xd0 [ 48.057997] print_report+0x118/0x608 [ 48.058029] kasan_report+0xdc/0x128 [ 48.058058] kasan_check_range+0x100/0x1a8 [ 48.058093] __kasan_check_write+0x20/0x30 [ 48.058127] kasan_atomics_helper+0x32c/0x4858 [ 48.058156] kasan_atomics+0x198/0x2e0 [ 48.058185] kunit_try_run_case+0x170/0x3f0 [ 48.058223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.058261] kthread+0x328/0x630 [ 48.058296] ret_from_fork+0x10/0x20 [ 48.058330] [ 48.128034] Allocated by task 314: [ 48.131421] kasan_save_stack+0x3c/0x68 [ 48.135238] kasan_save_track+0x20/0x40 [ 48.139058] kasan_save_alloc_info+0x40/0x58 [ 48.143311] __kasan_kmalloc+0xd4/0xd8 [ 48.147044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.151558] kasan_atomics+0xb8/0x2e0 [ 48.155203] kunit_try_run_case+0x170/0x3f0 [ 48.159370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.164839] kthread+0x328/0x630 [ 48.168050] ret_from_fork+0x10/0x20 [ 48.171609] [ 48.173086] The buggy address belongs to the object at ffff000800d61a00 [ 48.173086] which belongs to the cache kmalloc-64 of size 64 [ 48.185413] The buggy address is located 0 bytes to the right of [ 48.185413] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.198258] [ 48.199734] The buggy address belongs to the physical page: [ 48.205294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 48.213278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.219786] page_type: f5(slab) [ 48.222922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.230643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.238361] page dumped because: kasan: bad access detected [ 48.243917] [ 48.245393] Memory state around the buggy address: [ 48.250174] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.257376] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.264580] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.271781] ^ [ 48.276559] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.283764] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.290965] ================================================================== [ 48.298373] ================================================================== [ 48.305378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.312753] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.320131] [ 48.321617] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.321667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.321684] Hardware name: WinLink E850-96 board (DT) [ 48.321704] Call trace: [ 48.321714] show_stack+0x20/0x38 (C) [ 48.321749] dump_stack_lvl+0x8c/0xd0 [ 48.321787] print_report+0x118/0x608 [ 48.321819] kasan_report+0xdc/0x128 [ 48.321848] __asan_report_store4_noabort+0x20/0x30 [ 48.321884] kasan_atomics_helper+0x3f94/0x4858 [ 48.321915] kasan_atomics+0x198/0x2e0 [ 48.321943] kunit_try_run_case+0x170/0x3f0 [ 48.321981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.322021] kthread+0x328/0x630 [ 48.322055] ret_from_fork+0x10/0x20 [ 48.322088] [ 48.388620] Allocated by task 314: [ 48.392008] kasan_save_stack+0x3c/0x68 [ 48.395825] kasan_save_track+0x20/0x40 [ 48.399644] kasan_save_alloc_info+0x40/0x58 [ 48.403897] __kasan_kmalloc+0xd4/0xd8 [ 48.407630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.412144] kasan_atomics+0xb8/0x2e0 [ 48.415789] kunit_try_run_case+0x170/0x3f0 [ 48.419956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.425425] kthread+0x328/0x630 [ 48.428637] ret_from_fork+0x10/0x20 [ 48.432196] [ 48.433671] The buggy address belongs to the object at ffff000800d61a00 [ 48.433671] which belongs to the cache kmalloc-64 of size 64 [ 48.445999] The buggy address is located 0 bytes to the right of [ 48.445999] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.458844] [ 48.460322] The buggy address belongs to the physical page: [ 48.465878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 48.473865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.480372] page_type: f5(slab) [ 48.483508] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.491229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.498948] page dumped because: kasan: bad access detected [ 48.504503] [ 48.505979] Memory state around the buggy address: [ 48.510759] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.517962] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.525166] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.532368] ^ [ 48.537146] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.544351] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.551551] ================================================================== [ 49.086332] ================================================================== [ 49.093385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.100676] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.108054] [ 49.109539] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.109587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.109604] Hardware name: WinLink E850-96 board (DT) [ 49.109624] Call trace: [ 49.109637] show_stack+0x20/0x38 (C) [ 49.109669] dump_stack_lvl+0x8c/0xd0 [ 49.109705] print_report+0x118/0x608 [ 49.109735] kasan_report+0xdc/0x128 [ 49.109765] kasan_check_range+0x100/0x1a8 [ 49.109798] __kasan_check_write+0x20/0x30 [ 49.109834] kasan_atomics_helper+0x47c/0x4858 [ 49.109865] kasan_atomics+0x198/0x2e0 [ 49.109893] kunit_try_run_case+0x170/0x3f0 [ 49.109927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.109966] kthread+0x328/0x630 [ 49.110000] ret_from_fork+0x10/0x20 [ 49.110032] [ 49.179754] Allocated by task 314: [ 49.183140] kasan_save_stack+0x3c/0x68 [ 49.186958] kasan_save_track+0x20/0x40 [ 49.190778] kasan_save_alloc_info+0x40/0x58 [ 49.195031] __kasan_kmalloc+0xd4/0xd8 [ 49.198764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.203278] kasan_atomics+0xb8/0x2e0 [ 49.206924] kunit_try_run_case+0x170/0x3f0 [ 49.211090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.216559] kthread+0x328/0x630 [ 49.219771] ret_from_fork+0x10/0x20 [ 49.223330] [ 49.224805] The buggy address belongs to the object at ffff000800d61a00 [ 49.224805] which belongs to the cache kmalloc-64 of size 64 [ 49.237132] The buggy address is located 0 bytes to the right of [ 49.237132] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 49.249978] [ 49.251457] The buggy address belongs to the physical page: [ 49.257012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.264996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.271506] page_type: f5(slab) [ 49.274641] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.282364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.290082] page dumped because: kasan: bad access detected [ 49.295638] [ 49.297113] Memory state around the buggy address: [ 49.301893] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.309096] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.316301] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.323502] ^ [ 49.328280] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.335484] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.342685] ================================================================== [ 54.086917] ================================================================== [ 54.094005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.101295] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.108673] [ 54.110156] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.110206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.110223] Hardware name: WinLink E850-96 board (DT) [ 54.110241] Call trace: [ 54.110254] show_stack+0x20/0x38 (C) [ 54.110286] dump_stack_lvl+0x8c/0xd0 [ 54.110320] print_report+0x118/0x608 [ 54.110351] kasan_report+0xdc/0x128 [ 54.110380] kasan_check_range+0x100/0x1a8 [ 54.110413] __kasan_check_write+0x20/0x30 [ 54.110447] kasan_atomics_helper+0xc08/0x4858 [ 54.110477] kasan_atomics+0x198/0x2e0 [ 54.110504] kunit_try_run_case+0x170/0x3f0 [ 54.110539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.110578] kthread+0x328/0x630 [ 54.110612] ret_from_fork+0x10/0x20 [ 54.110645] [ 54.180373] Allocated by task 314: [ 54.183760] kasan_save_stack+0x3c/0x68 [ 54.187578] kasan_save_track+0x20/0x40 [ 54.191397] kasan_save_alloc_info+0x40/0x58 [ 54.195651] __kasan_kmalloc+0xd4/0xd8 [ 54.199383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.203897] kasan_atomics+0xb8/0x2e0 [ 54.207543] kunit_try_run_case+0x170/0x3f0 [ 54.211709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.217178] kthread+0x328/0x630 [ 54.220390] ret_from_fork+0x10/0x20 [ 54.223949] [ 54.225425] The buggy address belongs to the object at ffff000800d61a00 [ 54.225425] which belongs to the cache kmalloc-64 of size 64 [ 54.237751] The buggy address is located 0 bytes to the right of [ 54.237751] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 54.250598] [ 54.252074] The buggy address belongs to the physical page: [ 54.257629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.265615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.272125] page_type: f5(slab) [ 54.275260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.282983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.290701] page dumped because: kasan: bad access detected [ 54.296257] [ 54.297732] Memory state around the buggy address: [ 54.302510] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.309715] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.316920] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.324121] ^ [ 54.328899] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.336104] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.343305] ================================================================== [ 60.133902] ================================================================== [ 60.140962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.148339] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.155717] [ 60.157200] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.157246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.157262] Hardware name: WinLink E850-96 board (DT) [ 60.157278] Call trace: [ 60.157292] show_stack+0x20/0x38 (C) [ 60.157322] dump_stack_lvl+0x8c/0xd0 [ 60.157359] print_report+0x118/0x608 [ 60.157389] kasan_report+0xdc/0x128 [ 60.157417] kasan_check_range+0x100/0x1a8 [ 60.157448] __kasan_check_write+0x20/0x30 [ 60.157481] kasan_atomics_helper+0x1414/0x4858 [ 60.157512] kasan_atomics+0x198/0x2e0 [ 60.157540] kunit_try_run_case+0x170/0x3f0 [ 60.157575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.157614] kthread+0x328/0x630 [ 60.157646] ret_from_fork+0x10/0x20 [ 60.157679] [ 60.227504] Allocated by task 314: [ 60.230892] kasan_save_stack+0x3c/0x68 [ 60.234709] kasan_save_track+0x20/0x40 [ 60.238529] kasan_save_alloc_info+0x40/0x58 [ 60.242782] __kasan_kmalloc+0xd4/0xd8 [ 60.246515] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.251029] kasan_atomics+0xb8/0x2e0 [ 60.254674] kunit_try_run_case+0x170/0x3f0 [ 60.258841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.264310] kthread+0x328/0x630 [ 60.267521] ret_from_fork+0x10/0x20 [ 60.271080] [ 60.272556] The buggy address belongs to the object at ffff000800d61a00 [ 60.272556] which belongs to the cache kmalloc-64 of size 64 [ 60.284883] The buggy address is located 0 bytes to the right of [ 60.284883] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.297729] [ 60.299205] The buggy address belongs to the physical page: [ 60.304762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.312746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.319257] page_type: f5(slab) [ 60.322390] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.330114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.337833] page dumped because: kasan: bad access detected [ 60.343388] [ 60.344864] Memory state around the buggy address: [ 60.349643] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.356847] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.364052] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.371253] ^ [ 60.376030] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.383235] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.390436] ================================================================== [ 54.611094] ================================================================== [ 54.618129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.625419] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.632797] [ 54.634280] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.634330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.634347] Hardware name: WinLink E850-96 board (DT) [ 54.634365] Call trace: [ 54.634378] show_stack+0x20/0x38 (C) [ 54.634408] dump_stack_lvl+0x8c/0xd0 [ 54.634443] print_report+0x118/0x608 [ 54.634475] kasan_report+0xdc/0x128 [ 54.634504] kasan_check_range+0x100/0x1a8 [ 54.634537] __kasan_check_write+0x20/0x30 [ 54.634570] kasan_atomics_helper+0xca0/0x4858 [ 54.634600] kasan_atomics+0x198/0x2e0 [ 54.634628] kunit_try_run_case+0x170/0x3f0 [ 54.634663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.634701] kthread+0x328/0x630 [ 54.634735] ret_from_fork+0x10/0x20 [ 54.634767] [ 54.704497] Allocated by task 314: [ 54.707884] kasan_save_stack+0x3c/0x68 [ 54.711702] kasan_save_track+0x20/0x40 [ 54.715521] kasan_save_alloc_info+0x40/0x58 [ 54.719775] __kasan_kmalloc+0xd4/0xd8 [ 54.723507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.728021] kasan_atomics+0xb8/0x2e0 [ 54.731667] kunit_try_run_case+0x170/0x3f0 [ 54.735833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.741302] kthread+0x328/0x630 [ 54.744514] ret_from_fork+0x10/0x20 [ 54.748073] [ 54.749549] The buggy address belongs to the object at ffff000800d61a00 [ 54.749549] which belongs to the cache kmalloc-64 of size 64 [ 54.761875] The buggy address is located 0 bytes to the right of [ 54.761875] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 54.774722] [ 54.776199] The buggy address belongs to the physical page: [ 54.781754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.789739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.796249] page_type: f5(slab) [ 54.799384] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.807107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.814826] page dumped because: kasan: bad access detected [ 54.820381] [ 54.821856] Memory state around the buggy address: [ 54.826636] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.833840] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.841044] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.848245] ^ [ 54.853023] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.860228] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.867429] ================================================================== [ 47.774266] ================================================================== [ 47.781255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.788629] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.795921] [ 47.797407] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.797461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.797479] Hardware name: WinLink E850-96 board (DT) [ 47.797500] Call trace: [ 47.797514] show_stack+0x20/0x38 (C) [ 47.797550] dump_stack_lvl+0x8c/0xd0 [ 47.797587] print_report+0x118/0x608 [ 47.797619] kasan_report+0xdc/0x128 [ 47.797647] __asan_report_load4_noabort+0x20/0x30 [ 47.797686] kasan_atomics_helper+0x40fc/0x4858 [ 47.797715] kasan_atomics+0x198/0x2e0 [ 47.797743] kunit_try_run_case+0x170/0x3f0 [ 47.797782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.797822] kthread+0x328/0x630 [ 47.797857] ret_from_fork+0x10/0x20 [ 47.797891] [ 47.864323] Allocated by task 314: [ 47.867709] kasan_save_stack+0x3c/0x68 [ 47.871527] kasan_save_track+0x20/0x40 [ 47.875347] kasan_save_alloc_info+0x40/0x58 [ 47.879600] __kasan_kmalloc+0xd4/0xd8 [ 47.883332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.887846] kasan_atomics+0xb8/0x2e0 [ 47.891492] kunit_try_run_case+0x170/0x3f0 [ 47.895658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.901127] kthread+0x328/0x630 [ 47.904339] ret_from_fork+0x10/0x20 [ 47.907898] [ 47.909375] The buggy address belongs to the object at ffff000800d61a00 [ 47.909375] which belongs to the cache kmalloc-64 of size 64 [ 47.921702] The buggy address is located 0 bytes to the right of [ 47.921702] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.934547] [ 47.936025] The buggy address belongs to the physical page: [ 47.941579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.949566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.956075] page_type: f5(slab) [ 47.959212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.966931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.974651] page dumped because: kasan: bad access detected [ 47.980206] [ 47.981681] Memory state around the buggy address: [ 47.986461] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.993665] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.000869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.008070] ^ [ 48.012848] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.020053] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.027254] ================================================================== [ 59.609607] ================================================================== [ 59.616664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.624042] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.631420] [ 59.632904] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.632953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.632969] Hardware name: WinLink E850-96 board (DT) [ 59.632989] Call trace: [ 59.633001] show_stack+0x20/0x38 (C) [ 59.633032] dump_stack_lvl+0x8c/0xd0 [ 59.633068] print_report+0x118/0x608 [ 59.633099] kasan_report+0xdc/0x128 [ 59.633130] kasan_check_range+0x100/0x1a8 [ 59.633161] __kasan_check_write+0x20/0x30 [ 59.633195] kasan_atomics_helper+0x1384/0x4858 [ 59.633225] kasan_atomics+0x198/0x2e0 [ 59.633252] kunit_try_run_case+0x170/0x3f0 [ 59.633289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.633331] kthread+0x328/0x630 [ 59.633363] ret_from_fork+0x10/0x20 [ 59.633398] [ 59.703207] Allocated by task 314: [ 59.706594] kasan_save_stack+0x3c/0x68 [ 59.710411] kasan_save_track+0x20/0x40 [ 59.714231] kasan_save_alloc_info+0x40/0x58 [ 59.718485] __kasan_kmalloc+0xd4/0xd8 [ 59.722217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.726731] kasan_atomics+0xb8/0x2e0 [ 59.730377] kunit_try_run_case+0x170/0x3f0 [ 59.734543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.740012] kthread+0x328/0x630 [ 59.743224] ret_from_fork+0x10/0x20 [ 59.746783] [ 59.748258] The buggy address belongs to the object at ffff000800d61a00 [ 59.748258] which belongs to the cache kmalloc-64 of size 64 [ 59.760585] The buggy address is located 0 bytes to the right of [ 59.760585] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 59.773431] [ 59.774909] The buggy address belongs to the physical page: [ 59.780465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 59.788449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.794959] page_type: f5(slab) [ 59.798095] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.805816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.813535] page dumped because: kasan: bad access detected [ 59.819090] [ 59.820566] Memory state around the buggy address: [ 59.825346] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.832549] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.839754] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.846954] ^ [ 59.851733] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.858938] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.866139] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 44.312617] ================================================================== [ 44.319672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.328612] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 44.335903] [ 44.337386] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 44.337434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.337451] Hardware name: WinLink E850-96 board (DT) [ 44.337470] Call trace: [ 44.337484] show_stack+0x20/0x38 (C) [ 44.337515] dump_stack_lvl+0x8c/0xd0 [ 44.337550] print_report+0x118/0x608 [ 44.337579] kasan_report+0xdc/0x128 [ 44.337611] __asan_report_load8_noabort+0x20/0x30 [ 44.337645] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.337680] kasan_bitops_generic+0x11c/0x1c8 [ 44.337708] kunit_try_run_case+0x170/0x3f0 [ 44.337743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.337783] kthread+0x328/0x630 [ 44.337816] ret_from_fork+0x10/0x20 [ 44.337849] [ 44.406474] Allocated by task 310: [ 44.409860] kasan_save_stack+0x3c/0x68 [ 44.413680] kasan_save_track+0x20/0x40 [ 44.417499] kasan_save_alloc_info+0x40/0x58 [ 44.421753] __kasan_kmalloc+0xd4/0xd8 [ 44.425485] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.429999] kasan_bitops_generic+0xa0/0x1c8 [ 44.434252] kunit_try_run_case+0x170/0x3f0 [ 44.438418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.443888] kthread+0x328/0x630 [ 44.447099] ret_from_fork+0x10/0x20 [ 44.450658] [ 44.452133] The buggy address belongs to the object at ffff000802e0b440 [ 44.452133] which belongs to the cache kmalloc-16 of size 16 [ 44.464462] The buggy address is located 8 bytes inside of [ 44.464462] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 44.476699] [ 44.478175] The buggy address belongs to the physical page: [ 44.483734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 44.491719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.498227] page_type: f5(slab) [ 44.501360] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.509084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.516803] page dumped because: kasan: bad access detected [ 44.522358] [ 44.523834] Memory state around the buggy address: [ 44.528613] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 44.535817] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 44.543022] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 44.550223] ^ [ 44.555782] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.562987] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.570188] ================================================================== [ 45.644207] ================================================================== [ 45.651249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.660189] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 45.667567] [ 45.669050] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 45.669098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.669112] Hardware name: WinLink E850-96 board (DT) [ 45.669131] Call trace: [ 45.669144] show_stack+0x20/0x38 (C) [ 45.669174] dump_stack_lvl+0x8c/0xd0 [ 45.669206] print_report+0x118/0x608 [ 45.669236] kasan_report+0xdc/0x128 [ 45.669266] kasan_check_range+0x100/0x1a8 [ 45.669300] __kasan_check_write+0x20/0x30 [ 45.669331] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.669367] kasan_bitops_generic+0x11c/0x1c8 [ 45.669396] kunit_try_run_case+0x170/0x3f0 [ 45.669430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.669470] kthread+0x328/0x630 [ 45.669505] ret_from_fork+0x10/0x20 [ 45.669539] [ 45.741524] Allocated by task 310: [ 45.744910] kasan_save_stack+0x3c/0x68 [ 45.748729] kasan_save_track+0x20/0x40 [ 45.752548] kasan_save_alloc_info+0x40/0x58 [ 45.756802] __kasan_kmalloc+0xd4/0xd8 [ 45.760534] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.765048] kasan_bitops_generic+0xa0/0x1c8 [ 45.769302] kunit_try_run_case+0x170/0x3f0 [ 45.773468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.778937] kthread+0x328/0x630 [ 45.782149] ret_from_fork+0x10/0x20 [ 45.785708] [ 45.787183] The buggy address belongs to the object at ffff000802e0b440 [ 45.787183] which belongs to the cache kmalloc-16 of size 16 [ 45.799510] The buggy address is located 8 bytes inside of [ 45.799510] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 45.811749] [ 45.813225] The buggy address belongs to the physical page: [ 45.818781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 45.826766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.833276] page_type: f5(slab) [ 45.836412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.844134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.851852] page dumped because: kasan: bad access detected [ 45.857408] [ 45.858883] Memory state around the buggy address: [ 45.863662] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 45.870867] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 45.878071] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 45.885272] ^ [ 45.890832] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.898036] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.905237] ================================================================== [ 45.110861] ================================================================== [ 45.117924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.126864] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 45.134242] [ 45.135725] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 45.135773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.135789] Hardware name: WinLink E850-96 board (DT) [ 45.135811] Call trace: [ 45.135823] show_stack+0x20/0x38 (C) [ 45.135857] dump_stack_lvl+0x8c/0xd0 [ 45.135891] print_report+0x118/0x608 [ 45.135922] kasan_report+0xdc/0x128 [ 45.135952] kasan_check_range+0x100/0x1a8 [ 45.135985] __kasan_check_write+0x20/0x30 [ 45.136018] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.136055] kasan_bitops_generic+0x11c/0x1c8 [ 45.136084] kunit_try_run_case+0x170/0x3f0 [ 45.136119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.136158] kthread+0x328/0x630 [ 45.136190] ret_from_fork+0x10/0x20 [ 45.136223] [ 45.208199] Allocated by task 310: [ 45.211584] kasan_save_stack+0x3c/0x68 [ 45.215403] kasan_save_track+0x20/0x40 [ 45.219223] kasan_save_alloc_info+0x40/0x58 [ 45.223476] __kasan_kmalloc+0xd4/0xd8 [ 45.227209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.231723] kasan_bitops_generic+0xa0/0x1c8 [ 45.235976] kunit_try_run_case+0x170/0x3f0 [ 45.240143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.245612] kthread+0x328/0x630 [ 45.248823] ret_from_fork+0x10/0x20 [ 45.252382] [ 45.253858] The buggy address belongs to the object at ffff000802e0b440 [ 45.253858] which belongs to the cache kmalloc-16 of size 16 [ 45.266184] The buggy address is located 8 bytes inside of [ 45.266184] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 45.278423] [ 45.279900] The buggy address belongs to the physical page: [ 45.285456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 45.293441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.299951] page_type: f5(slab) [ 45.303086] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.310808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.318527] page dumped because: kasan: bad access detected [ 45.324082] [ 45.325558] Memory state around the buggy address: [ 45.330337] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 45.337541] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 45.344746] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 45.351947] ^ [ 45.357506] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.364711] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.371912] ================================================================== [ 44.577562] ================================================================== [ 44.584600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.593538] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 44.600916] [ 44.602399] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 44.602446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.602462] Hardware name: WinLink E850-96 board (DT) [ 44.602481] Call trace: [ 44.602496] show_stack+0x20/0x38 (C) [ 44.602528] dump_stack_lvl+0x8c/0xd0 [ 44.602562] print_report+0x118/0x608 [ 44.602593] kasan_report+0xdc/0x128 [ 44.602623] kasan_check_range+0x100/0x1a8 [ 44.602656] __kasan_check_write+0x20/0x30 [ 44.602690] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.602725] kasan_bitops_generic+0x11c/0x1c8 [ 44.602753] kunit_try_run_case+0x170/0x3f0 [ 44.602787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.602825] kthread+0x328/0x630 [ 44.602857] ret_from_fork+0x10/0x20 [ 44.602890] [ 44.674874] Allocated by task 310: [ 44.678259] kasan_save_stack+0x3c/0x68 [ 44.682078] kasan_save_track+0x20/0x40 [ 44.685898] kasan_save_alloc_info+0x40/0x58 [ 44.690151] __kasan_kmalloc+0xd4/0xd8 [ 44.693884] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.698397] kasan_bitops_generic+0xa0/0x1c8 [ 44.702651] kunit_try_run_case+0x170/0x3f0 [ 44.706817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.712286] kthread+0x328/0x630 [ 44.715498] ret_from_fork+0x10/0x20 [ 44.719057] [ 44.720532] The buggy address belongs to the object at ffff000802e0b440 [ 44.720532] which belongs to the cache kmalloc-16 of size 16 [ 44.732859] The buggy address is located 8 bytes inside of [ 44.732859] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 44.745098] [ 44.746574] The buggy address belongs to the physical page: [ 44.752133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 44.760116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.766626] page_type: f5(slab) [ 44.769761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.777483] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.785202] page dumped because: kasan: bad access detected [ 44.790757] [ 44.792233] Memory state around the buggy address: [ 44.797013] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 44.804216] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 44.811420] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 44.818622] ^ [ 44.824181] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.831385] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.838586] ================================================================== [ 44.044439] ================================================================== [ 44.051450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.060300] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 44.067678] [ 44.069161] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 44.069210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.069229] Hardware name: WinLink E850-96 board (DT) [ 44.069248] Call trace: [ 44.069262] show_stack+0x20/0x38 (C) [ 44.069293] dump_stack_lvl+0x8c/0xd0 [ 44.069331] print_report+0x118/0x608 [ 44.069360] kasan_report+0xdc/0x128 [ 44.069392] kasan_check_range+0x100/0x1a8 [ 44.069429] __kasan_check_write+0x20/0x30 [ 44.069460] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.069495] kasan_bitops_generic+0x11c/0x1c8 [ 44.069524] kunit_try_run_case+0x170/0x3f0 [ 44.069558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.069598] kthread+0x328/0x630 [ 44.069633] ret_from_fork+0x10/0x20 [ 44.069668] [ 44.141548] Allocated by task 310: [ 44.144934] kasan_save_stack+0x3c/0x68 [ 44.148753] kasan_save_track+0x20/0x40 [ 44.152572] kasan_save_alloc_info+0x40/0x58 [ 44.156826] __kasan_kmalloc+0xd4/0xd8 [ 44.160559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.165072] kasan_bitops_generic+0xa0/0x1c8 [ 44.169326] kunit_try_run_case+0x170/0x3f0 [ 44.173492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.178961] kthread+0x328/0x630 [ 44.182173] ret_from_fork+0x10/0x20 [ 44.185731] [ 44.187207] The buggy address belongs to the object at ffff000802e0b440 [ 44.187207] which belongs to the cache kmalloc-16 of size 16 [ 44.199534] The buggy address is located 8 bytes inside of [ 44.199534] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 44.211773] [ 44.213249] The buggy address belongs to the physical page: [ 44.218807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 44.226792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.233301] page_type: f5(slab) [ 44.236435] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.244158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.251877] page dumped because: kasan: bad access detected [ 44.257432] [ 44.258907] Memory state around the buggy address: [ 44.263686] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 44.270890] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 44.278095] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 44.285296] ^ [ 44.290855] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.298060] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.305261] ================================================================== [ 46.177543] ================================================================== [ 46.184575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.193514] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 46.200805] [ 46.202287] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 46.202332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.202349] Hardware name: WinLink E850-96 board (DT) [ 46.202368] Call trace: [ 46.202382] show_stack+0x20/0x38 (C) [ 46.202415] dump_stack_lvl+0x8c/0xd0 [ 46.202448] print_report+0x118/0x608 [ 46.202480] kasan_report+0xdc/0x128 [ 46.202509] __asan_report_load8_noabort+0x20/0x30 [ 46.202545] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.202580] kasan_bitops_generic+0x11c/0x1c8 [ 46.202609] kunit_try_run_case+0x170/0x3f0 [ 46.202643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.202686] kthread+0x328/0x630 [ 46.202717] ret_from_fork+0x10/0x20 [ 46.202749] [ 46.271377] Allocated by task 310: [ 46.274764] kasan_save_stack+0x3c/0x68 [ 46.278582] kasan_save_track+0x20/0x40 [ 46.282401] kasan_save_alloc_info+0x40/0x58 [ 46.286655] __kasan_kmalloc+0xd4/0xd8 [ 46.290388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.294901] kasan_bitops_generic+0xa0/0x1c8 [ 46.299155] kunit_try_run_case+0x170/0x3f0 [ 46.303321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.308790] kthread+0x328/0x630 [ 46.312002] ret_from_fork+0x10/0x20 [ 46.315561] [ 46.317036] The buggy address belongs to the object at ffff000802e0b440 [ 46.317036] which belongs to the cache kmalloc-16 of size 16 [ 46.329364] The buggy address is located 8 bytes inside of [ 46.329364] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 46.341602] [ 46.343078] The buggy address belongs to the physical page: [ 46.348635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 46.356620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.363129] page_type: f5(slab) [ 46.366264] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.373986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.381706] page dumped because: kasan: bad access detected [ 46.387261] [ 46.388737] Memory state around the buggy address: [ 46.393515] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 46.400719] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 46.407924] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 46.415125] ^ [ 46.420684] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.427889] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.435090] ================================================================== [ 45.379264] ================================================================== [ 45.386323] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.395262] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 45.402554] [ 45.404037] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 45.404082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.404096] Hardware name: WinLink E850-96 board (DT) [ 45.404113] Call trace: [ 45.404125] show_stack+0x20/0x38 (C) [ 45.404155] dump_stack_lvl+0x8c/0xd0 [ 45.404190] print_report+0x118/0x608 [ 45.404219] kasan_report+0xdc/0x128 [ 45.404248] __asan_report_load8_noabort+0x20/0x30 [ 45.404281] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.404315] kasan_bitops_generic+0x11c/0x1c8 [ 45.404344] kunit_try_run_case+0x170/0x3f0 [ 45.404379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.404418] kthread+0x328/0x630 [ 45.404451] ret_from_fork+0x10/0x20 [ 45.404482] [ 45.473126] Allocated by task 310: [ 45.476511] kasan_save_stack+0x3c/0x68 [ 45.480330] kasan_save_track+0x20/0x40 [ 45.484150] kasan_save_alloc_info+0x40/0x58 [ 45.488403] __kasan_kmalloc+0xd4/0xd8 [ 45.492136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.496650] kasan_bitops_generic+0xa0/0x1c8 [ 45.500903] kunit_try_run_case+0x170/0x3f0 [ 45.505069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.510538] kthread+0x328/0x630 [ 45.513750] ret_from_fork+0x10/0x20 [ 45.517309] [ 45.518784] The buggy address belongs to the object at ffff000802e0b440 [ 45.518784] which belongs to the cache kmalloc-16 of size 16 [ 45.531111] The buggy address is located 8 bytes inside of [ 45.531111] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 45.543350] [ 45.544826] The buggy address belongs to the physical page: [ 45.550382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 45.558367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.564878] page_type: f5(slab) [ 45.568010] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.575735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.583454] page dumped because: kasan: bad access detected [ 45.589009] [ 45.590485] Memory state around the buggy address: [ 45.595263] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 45.602468] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 45.609672] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 45.616873] ^ [ 45.622433] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.629637] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.636838] ================================================================== [ 44.845907] ================================================================== [ 44.852998] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.861937] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 44.869228] [ 44.870712] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 44.870758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.870775] Hardware name: WinLink E850-96 board (DT) [ 44.870794] Call trace: [ 44.870808] show_stack+0x20/0x38 (C) [ 44.870842] dump_stack_lvl+0x8c/0xd0 [ 44.870878] print_report+0x118/0x608 [ 44.870907] kasan_report+0xdc/0x128 [ 44.870937] __asan_report_load8_noabort+0x20/0x30 [ 44.870971] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.871006] kasan_bitops_generic+0x11c/0x1c8 [ 44.871035] kunit_try_run_case+0x170/0x3f0 [ 44.871071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.871111] kthread+0x328/0x630 [ 44.871144] ret_from_fork+0x10/0x20 [ 44.871174] [ 44.939800] Allocated by task 310: [ 44.943185] kasan_save_stack+0x3c/0x68 [ 44.947005] kasan_save_track+0x20/0x40 [ 44.950824] kasan_save_alloc_info+0x40/0x58 [ 44.955078] __kasan_kmalloc+0xd4/0xd8 [ 44.958810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.963324] kasan_bitops_generic+0xa0/0x1c8 [ 44.967577] kunit_try_run_case+0x170/0x3f0 [ 44.971744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.977213] kthread+0x328/0x630 [ 44.980424] ret_from_fork+0x10/0x20 [ 44.983983] [ 44.985459] The buggy address belongs to the object at ffff000802e0b440 [ 44.985459] which belongs to the cache kmalloc-16 of size 16 [ 44.997785] The buggy address is located 8 bytes inside of [ 44.997785] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 45.010024] [ 45.011501] The buggy address belongs to the physical page: [ 45.017057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 45.025043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.031552] page_type: f5(slab) [ 45.034685] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.042410] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.050128] page dumped because: kasan: bad access detected [ 45.055684] [ 45.057159] Memory state around the buggy address: [ 45.061938] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 45.069142] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 45.076347] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 45.083548] ^ [ 45.089107] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.096312] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.103513] ================================================================== [ 45.912585] ================================================================== [ 45.919648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.928588] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 45.935879] [ 45.937359] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 45.937404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.937421] Hardware name: WinLink E850-96 board (DT) [ 45.937441] Call trace: [ 45.937452] show_stack+0x20/0x38 (C) [ 45.937484] dump_stack_lvl+0x8c/0xd0 [ 45.937516] print_report+0x118/0x608 [ 45.937547] kasan_report+0xdc/0x128 [ 45.937577] __asan_report_load8_noabort+0x20/0x30 [ 45.937610] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.937645] kasan_bitops_generic+0x11c/0x1c8 [ 45.937674] kunit_try_run_case+0x170/0x3f0 [ 45.937709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.937749] kthread+0x328/0x630 [ 45.937781] ret_from_fork+0x10/0x20 [ 45.937814] [ 46.006451] Allocated by task 310: [ 46.009836] kasan_save_stack+0x3c/0x68 [ 46.013656] kasan_save_track+0x20/0x40 [ 46.017475] kasan_save_alloc_info+0x40/0x58 [ 46.021728] __kasan_kmalloc+0xd4/0xd8 [ 46.025461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.029975] kasan_bitops_generic+0xa0/0x1c8 [ 46.034228] kunit_try_run_case+0x170/0x3f0 [ 46.038395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.043864] kthread+0x328/0x630 [ 46.047075] ret_from_fork+0x10/0x20 [ 46.050634] [ 46.052110] The buggy address belongs to the object at ffff000802e0b440 [ 46.052110] which belongs to the cache kmalloc-16 of size 16 [ 46.064436] The buggy address is located 8 bytes inside of [ 46.064436] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 46.076675] [ 46.078151] The buggy address belongs to the physical page: [ 46.083709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 46.091693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.098203] page_type: f5(slab) [ 46.101336] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.109060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.116779] page dumped because: kasan: bad access detected [ 46.122334] [ 46.123810] Memory state around the buggy address: [ 46.128589] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 46.135793] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 46.142998] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 46.150199] ^ [ 46.155758] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.162963] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.170164] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 42.984018] ================================================================== [ 42.991048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 42.999205] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.006496] [ 43.007980] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.008033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.008051] Hardware name: WinLink E850-96 board (DT) [ 43.008071] Call trace: [ 43.008084] show_stack+0x20/0x38 (C) [ 43.008119] dump_stack_lvl+0x8c/0xd0 [ 43.008159] print_report+0x118/0x608 [ 43.008191] kasan_report+0xdc/0x128 [ 43.008219] __asan_report_load8_noabort+0x20/0x30 [ 43.008255] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.008289] kasan_bitops_generic+0x110/0x1c8 [ 43.008319] kunit_try_run_case+0x170/0x3f0 [ 43.008358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.008397] kthread+0x328/0x630 [ 43.008433] ret_from_fork+0x10/0x20 [ 43.008470] [ 43.076286] Allocated by task 310: [ 43.079672] kasan_save_stack+0x3c/0x68 [ 43.083491] kasan_save_track+0x20/0x40 [ 43.087310] kasan_save_alloc_info+0x40/0x58 [ 43.091564] __kasan_kmalloc+0xd4/0xd8 [ 43.095296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.099810] kasan_bitops_generic+0xa0/0x1c8 [ 43.104063] kunit_try_run_case+0x170/0x3f0 [ 43.108230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.113699] kthread+0x328/0x630 [ 43.116911] ret_from_fork+0x10/0x20 [ 43.120470] [ 43.121945] The buggy address belongs to the object at ffff000802e0b440 [ 43.121945] which belongs to the cache kmalloc-16 of size 16 [ 43.134273] The buggy address is located 8 bytes inside of [ 43.134273] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.146511] [ 43.147989] The buggy address belongs to the physical page: [ 43.153546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.161530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.168039] page_type: f5(slab) [ 43.171176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.178896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.186614] page dumped because: kasan: bad access detected [ 43.192170] [ 43.193646] Memory state around the buggy address: [ 43.198426] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 43.205630] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 43.212834] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 43.220034] ^ [ 43.225595] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.232798] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.240000] ================================================================== [ 41.387629] ================================================================== [ 41.396976] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.405133] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 41.412509] [ 41.413995] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.414056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.414074] Hardware name: WinLink E850-96 board (DT) [ 41.414098] Call trace: [ 41.414114] show_stack+0x20/0x38 (C) [ 41.414154] dump_stack_lvl+0x8c/0xd0 [ 41.414195] print_report+0x118/0x608 [ 41.414230] kasan_report+0xdc/0x128 [ 41.414260] kasan_check_range+0x100/0x1a8 [ 41.414294] __kasan_check_write+0x20/0x30 [ 41.414328] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.414364] kasan_bitops_generic+0x110/0x1c8 [ 41.414398] kunit_try_run_case+0x170/0x3f0 [ 41.414439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.414478] kthread+0x328/0x630 [ 41.414516] ret_from_fork+0x10/0x20 [ 41.414556] [ 41.485685] Allocated by task 310: [ 41.489075] kasan_save_stack+0x3c/0x68 [ 41.492890] kasan_save_track+0x20/0x40 [ 41.496709] kasan_save_alloc_info+0x40/0x58 [ 41.500963] __kasan_kmalloc+0xd4/0xd8 [ 41.504695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.509209] kasan_bitops_generic+0xa0/0x1c8 [ 41.513464] kunit_try_run_case+0x170/0x3f0 [ 41.517629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.523098] kthread+0x328/0x630 [ 41.526310] ret_from_fork+0x10/0x20 [ 41.529869] [ 41.531347] The buggy address belongs to the object at ffff000802e0b440 [ 41.531347] which belongs to the cache kmalloc-16 of size 16 [ 41.543673] The buggy address is located 8 bytes inside of [ 41.543673] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 41.555910] [ 41.557390] The buggy address belongs to the physical page: [ 41.562946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 41.570929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.577439] page_type: f5(slab) [ 41.580578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.588295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.596013] page dumped because: kasan: bad access detected [ 41.601570] [ 41.603046] Memory state around the buggy address: [ 41.607827] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 41.615028] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 41.622232] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 41.629433] ^ [ 41.634992] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.642197] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.649400] ================================================================== [ 41.920181] ================================================================== [ 41.927176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.935331] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 41.942710] [ 41.944193] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.944247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.944264] Hardware name: WinLink E850-96 board (DT) [ 41.944286] Call trace: [ 41.944298] show_stack+0x20/0x38 (C) [ 41.944330] dump_stack_lvl+0x8c/0xd0 [ 41.944368] print_report+0x118/0x608 [ 41.944399] kasan_report+0xdc/0x128 [ 41.944428] kasan_check_range+0x100/0x1a8 [ 41.944463] __kasan_check_write+0x20/0x30 [ 41.944496] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.944529] kasan_bitops_generic+0x110/0x1c8 [ 41.944558] kunit_try_run_case+0x170/0x3f0 [ 41.944598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.944640] kthread+0x328/0x630 [ 41.944675] ret_from_fork+0x10/0x20 [ 41.944708] [ 42.015886] Allocated by task 310: [ 42.019274] kasan_save_stack+0x3c/0x68 [ 42.023090] kasan_save_track+0x20/0x40 [ 42.026910] kasan_save_alloc_info+0x40/0x58 [ 42.031163] __kasan_kmalloc+0xd4/0xd8 [ 42.034896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.039410] kasan_bitops_generic+0xa0/0x1c8 [ 42.043663] kunit_try_run_case+0x170/0x3f0 [ 42.047830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.053298] kthread+0x328/0x630 [ 42.056510] ret_from_fork+0x10/0x20 [ 42.060069] [ 42.061544] The buggy address belongs to the object at ffff000802e0b440 [ 42.061544] which belongs to the cache kmalloc-16 of size 16 [ 42.073871] The buggy address is located 8 bytes inside of [ 42.073871] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.086110] [ 42.087588] The buggy address belongs to the physical page: [ 42.093145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.101129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.107638] page_type: f5(slab) [ 42.110776] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.118495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.126214] page dumped because: kasan: bad access detected [ 42.131769] [ 42.133245] Memory state around the buggy address: [ 42.138025] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.145228] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.152433] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.159634] ^ [ 42.165193] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.172398] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.179599] ================================================================== [ 43.247315] ================================================================== [ 43.254412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.262569] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.269947] [ 43.271430] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.271484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.271503] Hardware name: WinLink E850-96 board (DT) [ 43.271524] Call trace: [ 43.271536] show_stack+0x20/0x38 (C) [ 43.271572] dump_stack_lvl+0x8c/0xd0 [ 43.271612] print_report+0x118/0x608 [ 43.271643] kasan_report+0xdc/0x128 [ 43.271672] kasan_check_range+0x100/0x1a8 [ 43.271706] __kasan_check_write+0x20/0x30 [ 43.271738] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.271772] kasan_bitops_generic+0x110/0x1c8 [ 43.271802] kunit_try_run_case+0x170/0x3f0 [ 43.271839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.271878] kthread+0x328/0x630 [ 43.271912] ret_from_fork+0x10/0x20 [ 43.271945] [ 43.343122] Allocated by task 310: [ 43.346510] kasan_save_stack+0x3c/0x68 [ 43.350327] kasan_save_track+0x20/0x40 [ 43.354147] kasan_save_alloc_info+0x40/0x58 [ 43.358400] __kasan_kmalloc+0xd4/0xd8 [ 43.362133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.366647] kasan_bitops_generic+0xa0/0x1c8 [ 43.370900] kunit_try_run_case+0x170/0x3f0 [ 43.375066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.380535] kthread+0x328/0x630 [ 43.383747] ret_from_fork+0x10/0x20 [ 43.387306] [ 43.388782] The buggy address belongs to the object at ffff000802e0b440 [ 43.388782] which belongs to the cache kmalloc-16 of size 16 [ 43.401108] The buggy address is located 8 bytes inside of [ 43.401108] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.413347] [ 43.414825] The buggy address belongs to the physical page: [ 43.420382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.428366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.434875] page_type: f5(slab) [ 43.438013] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.445732] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.453451] page dumped because: kasan: bad access detected [ 43.459006] [ 43.460482] Memory state around the buggy address: [ 43.465264] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 43.472465] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 43.479671] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 43.486871] ^ [ 43.492431] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.499635] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.506836] ================================================================== [ 43.780993] ================================================================== [ 43.788084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.796241] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.803532] [ 43.805015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.805066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.805081] Hardware name: WinLink E850-96 board (DT) [ 43.805101] Call trace: [ 43.805114] show_stack+0x20/0x38 (C) [ 43.805146] dump_stack_lvl+0x8c/0xd0 [ 43.805186] print_report+0x118/0x608 [ 43.805215] kasan_report+0xdc/0x128 [ 43.805245] __asan_report_load8_noabort+0x20/0x30 [ 43.805282] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.805314] kasan_bitops_generic+0x110/0x1c8 [ 43.805345] kunit_try_run_case+0x170/0x3f0 [ 43.805382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.805421] kthread+0x328/0x630 [ 43.805455] ret_from_fork+0x10/0x20 [ 43.805491] [ 43.873323] Allocated by task 310: [ 43.876709] kasan_save_stack+0x3c/0x68 [ 43.880528] kasan_save_track+0x20/0x40 [ 43.884347] kasan_save_alloc_info+0x40/0x58 [ 43.888600] __kasan_kmalloc+0xd4/0xd8 [ 43.892333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.896847] kasan_bitops_generic+0xa0/0x1c8 [ 43.901100] kunit_try_run_case+0x170/0x3f0 [ 43.905267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.910736] kthread+0x328/0x630 [ 43.913947] ret_from_fork+0x10/0x20 [ 43.917507] [ 43.918981] The buggy address belongs to the object at ffff000802e0b440 [ 43.918981] which belongs to the cache kmalloc-16 of size 16 [ 43.931308] The buggy address is located 8 bytes inside of [ 43.931308] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.943548] [ 43.945024] The buggy address belongs to the physical page: [ 43.950582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.958567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.965075] page_type: f5(slab) [ 43.968210] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.975932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.983651] page dumped because: kasan: bad access detected [ 43.989206] [ 43.990682] Memory state around the buggy address: [ 43.995463] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 44.002665] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 44.009870] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 44.017071] ^ [ 44.022630] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.029835] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.037036] ================================================================== [ 42.717119] ================================================================== [ 42.724212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.732368] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 42.739746] [ 42.741229] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 42.741285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.741304] Hardware name: WinLink E850-96 board (DT) [ 42.741323] Call trace: [ 42.741336] show_stack+0x20/0x38 (C) [ 42.741370] dump_stack_lvl+0x8c/0xd0 [ 42.741410] print_report+0x118/0x608 [ 42.741440] kasan_report+0xdc/0x128 [ 42.741471] kasan_check_range+0x100/0x1a8 [ 42.741504] __kasan_check_write+0x20/0x30 [ 42.741539] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.741573] kasan_bitops_generic+0x110/0x1c8 [ 42.741604] kunit_try_run_case+0x170/0x3f0 [ 42.741642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.741682] kthread+0x328/0x630 [ 42.741716] ret_from_fork+0x10/0x20 [ 42.741750] [ 42.812921] Allocated by task 310: [ 42.816308] kasan_save_stack+0x3c/0x68 [ 42.820127] kasan_save_track+0x20/0x40 [ 42.823947] kasan_save_alloc_info+0x40/0x58 [ 42.828200] __kasan_kmalloc+0xd4/0xd8 [ 42.831933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.836446] kasan_bitops_generic+0xa0/0x1c8 [ 42.840700] kunit_try_run_case+0x170/0x3f0 [ 42.844866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.850334] kthread+0x328/0x630 [ 42.853546] ret_from_fork+0x10/0x20 [ 42.857106] [ 42.858581] The buggy address belongs to the object at ffff000802e0b440 [ 42.858581] which belongs to the cache kmalloc-16 of size 16 [ 42.870909] The buggy address is located 8 bytes inside of [ 42.870909] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.883147] [ 42.884625] The buggy address belongs to the physical page: [ 42.890182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.898166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.904674] page_type: f5(slab) [ 42.907812] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.915532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.923251] page dumped because: kasan: bad access detected [ 42.928806] [ 42.930281] Memory state around the buggy address: [ 42.935064] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.942267] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.949471] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.956670] ^ [ 42.962231] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.969435] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.976635] ================================================================== [ 42.450507] ================================================================== [ 42.457375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.465532] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 42.472910] [ 42.474395] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 42.474449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.474467] Hardware name: WinLink E850-96 board (DT) [ 42.474489] Call trace: [ 42.474502] show_stack+0x20/0x38 (C) [ 42.474536] dump_stack_lvl+0x8c/0xd0 [ 42.474575] print_report+0x118/0x608 [ 42.474608] kasan_report+0xdc/0x128 [ 42.474638] kasan_check_range+0x100/0x1a8 [ 42.474671] __kasan_check_write+0x20/0x30 [ 42.474707] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.474740] kasan_bitops_generic+0x110/0x1c8 [ 42.474771] kunit_try_run_case+0x170/0x3f0 [ 42.474808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.474849] kthread+0x328/0x630 [ 42.474886] ret_from_fork+0x10/0x20 [ 42.474918] [ 42.546086] Allocated by task 310: [ 42.549472] kasan_save_stack+0x3c/0x68 [ 42.553291] kasan_save_track+0x20/0x40 [ 42.557110] kasan_save_alloc_info+0x40/0x58 [ 42.561364] __kasan_kmalloc+0xd4/0xd8 [ 42.565096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.569610] kasan_bitops_generic+0xa0/0x1c8 [ 42.573863] kunit_try_run_case+0x170/0x3f0 [ 42.578030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.583498] kthread+0x328/0x630 [ 42.586711] ret_from_fork+0x10/0x20 [ 42.590269] [ 42.591745] The buggy address belongs to the object at ffff000802e0b440 [ 42.591745] which belongs to the cache kmalloc-16 of size 16 [ 42.604073] The buggy address is located 8 bytes inside of [ 42.604073] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.616311] [ 42.617789] The buggy address belongs to the physical page: [ 42.623346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.631330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.637838] page_type: f5(slab) [ 42.640975] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.648695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.656414] page dumped because: kasan: bad access detected [ 42.661969] [ 42.663445] Memory state around the buggy address: [ 42.668228] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.675430] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.682635] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.689834] ^ [ 42.695393] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.702599] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.709799] ================================================================== [ 43.514165] ================================================================== [ 43.521248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.529405] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.536783] [ 43.538267] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.538318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.538336] Hardware name: WinLink E850-96 board (DT) [ 43.538357] Call trace: [ 43.538371] show_stack+0x20/0x38 (C) [ 43.538405] dump_stack_lvl+0x8c/0xd0 [ 43.538443] print_report+0x118/0x608 [ 43.538472] kasan_report+0xdc/0x128 [ 43.538502] kasan_check_range+0x100/0x1a8 [ 43.538535] __kasan_check_write+0x20/0x30 [ 43.538567] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.538600] kasan_bitops_generic+0x110/0x1c8 [ 43.538629] kunit_try_run_case+0x170/0x3f0 [ 43.538666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.538705] kthread+0x328/0x630 [ 43.538739] ret_from_fork+0x10/0x20 [ 43.538773] [ 43.609959] Allocated by task 310: [ 43.613346] kasan_save_stack+0x3c/0x68 [ 43.617163] kasan_save_track+0x20/0x40 [ 43.620983] kasan_save_alloc_info+0x40/0x58 [ 43.625236] __kasan_kmalloc+0xd4/0xd8 [ 43.628969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.633483] kasan_bitops_generic+0xa0/0x1c8 [ 43.637736] kunit_try_run_case+0x170/0x3f0 [ 43.641903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.647371] kthread+0x328/0x630 [ 43.650583] ret_from_fork+0x10/0x20 [ 43.654143] [ 43.655618] The buggy address belongs to the object at ffff000802e0b440 [ 43.655618] which belongs to the cache kmalloc-16 of size 16 [ 43.667944] The buggy address is located 8 bytes inside of [ 43.667944] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.680184] [ 43.681661] The buggy address belongs to the physical page: [ 43.687218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.695203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.701712] page_type: f5(slab) [ 43.704846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.712568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.720287] page dumped because: kasan: bad access detected [ 43.725842] [ 43.727318] Memory state around the buggy address: [ 43.732098] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 43.739302] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 43.746507] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 43.753707] ^ [ 43.759267] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.766472] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.773672] ================================================================== [ 42.187051] ================================================================== [ 42.194012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.202168] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 42.209459] [ 42.210944] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 42.211003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.211022] Hardware name: WinLink E850-96 board (DT) [ 42.211042] Call trace: [ 42.211056] show_stack+0x20/0x38 (C) [ 42.211090] dump_stack_lvl+0x8c/0xd0 [ 42.211133] print_report+0x118/0x608 [ 42.211165] kasan_report+0xdc/0x128 [ 42.211197] __asan_report_load8_noabort+0x20/0x30 [ 42.211235] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.211268] kasan_bitops_generic+0x110/0x1c8 [ 42.211298] kunit_try_run_case+0x170/0x3f0 [ 42.211338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.211379] kthread+0x328/0x630 [ 42.211416] ret_from_fork+0x10/0x20 [ 42.211450] [ 42.279251] Allocated by task 310: [ 42.282637] kasan_save_stack+0x3c/0x68 [ 42.286454] kasan_save_track+0x20/0x40 [ 42.290274] kasan_save_alloc_info+0x40/0x58 [ 42.294527] __kasan_kmalloc+0xd4/0xd8 [ 42.298260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.302774] kasan_bitops_generic+0xa0/0x1c8 [ 42.307027] kunit_try_run_case+0x170/0x3f0 [ 42.311194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.316662] kthread+0x328/0x630 [ 42.319875] ret_from_fork+0x10/0x20 [ 42.323434] [ 42.324909] The buggy address belongs to the object at ffff000802e0b440 [ 42.324909] which belongs to the cache kmalloc-16 of size 16 [ 42.337237] The buggy address is located 8 bytes inside of [ 42.337237] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.349474] [ 42.350953] The buggy address belongs to the physical page: [ 42.356510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.364494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.371003] page_type: f5(slab) [ 42.374140] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.381859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.389578] page dumped because: kasan: bad access detected [ 42.395135] [ 42.396609] Memory state around the buggy address: [ 42.401392] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.408592] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.415797] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.422997] ^ [ 42.428559] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.435763] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.442963] ================================================================== [ 41.656797] ================================================================== [ 41.663812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.671967] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 41.679260] [ 41.680743] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.680800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.680815] Hardware name: WinLink E850-96 board (DT) [ 41.680838] Call trace: [ 41.680853] show_stack+0x20/0x38 (C) [ 41.680887] dump_stack_lvl+0x8c/0xd0 [ 41.680927] print_report+0x118/0x608 [ 41.680955] kasan_report+0xdc/0x128 [ 41.680986] __asan_report_load8_noabort+0x20/0x30 [ 41.681024] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.681058] kasan_bitops_generic+0x110/0x1c8 [ 41.681091] kunit_try_run_case+0x170/0x3f0 [ 41.681130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.681169] kthread+0x328/0x630 [ 41.681205] ret_from_fork+0x10/0x20 [ 41.681240] [ 41.749049] Allocated by task 310: [ 41.752436] kasan_save_stack+0x3c/0x68 [ 41.756254] kasan_save_track+0x20/0x40 [ 41.760074] kasan_save_alloc_info+0x40/0x58 [ 41.764327] __kasan_kmalloc+0xd4/0xd8 [ 41.768060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.772573] kasan_bitops_generic+0xa0/0x1c8 [ 41.776828] kunit_try_run_case+0x170/0x3f0 [ 41.780993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.786462] kthread+0x328/0x630 [ 41.789674] ret_from_fork+0x10/0x20 [ 41.793233] [ 41.794710] The buggy address belongs to the object at ffff000802e0b440 [ 41.794710] which belongs to the cache kmalloc-16 of size 16 [ 41.807035] The buggy address is located 8 bytes inside of [ 41.807035] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 41.819274] [ 41.820753] The buggy address belongs to the physical page: [ 41.826308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 41.834293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.840801] page_type: f5(slab) [ 41.843939] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.851659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.859377] page dumped because: kasan: bad access detected [ 41.864932] [ 41.866408] Memory state around the buggy address: [ 41.871190] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 41.878392] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 41.885596] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 41.892797] ^ [ 41.898357] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.905561] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.912762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 41.084854] ================================================================== [ 41.091947] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 41.097932] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308 [ 41.105222] [ 41.106708] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.106761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.106778] Hardware name: WinLink E850-96 board (DT) [ 41.106798] Call trace: [ 41.106814] show_stack+0x20/0x38 (C) [ 41.106854] dump_stack_lvl+0x8c/0xd0 [ 41.106891] print_report+0x118/0x608 [ 41.106923] kasan_report+0xdc/0x128 [ 41.106953] __asan_report_load1_noabort+0x20/0x30 [ 41.106991] strnlen+0x80/0x88 [ 41.107019] kasan_strings+0x478/0xb00 [ 41.107053] kunit_try_run_case+0x170/0x3f0 [ 41.107093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.107132] kthread+0x328/0x630 [ 41.107167] ret_from_fork+0x10/0x20 [ 41.107201] [ 41.172148] Allocated by task 308: [ 41.175534] kasan_save_stack+0x3c/0x68 [ 41.179353] kasan_save_track+0x20/0x40 [ 41.183172] kasan_save_alloc_info+0x40/0x58 [ 41.187426] __kasan_kmalloc+0xd4/0xd8 [ 41.191158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.195672] kasan_strings+0xc8/0xb00 [ 41.199318] kunit_try_run_case+0x170/0x3f0 [ 41.203485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.208953] kthread+0x328/0x630 [ 41.212165] ret_from_fork+0x10/0x20 [ 41.215724] [ 41.217200] Freed by task 308: [ 41.220240] kasan_save_stack+0x3c/0x68 [ 41.224058] kasan_save_track+0x20/0x40 [ 41.227878] kasan_save_free_info+0x4c/0x78 [ 41.232043] __kasan_slab_free+0x6c/0x98 [ 41.235949] kfree+0x214/0x3c8 [ 41.238987] kasan_strings+0x24c/0xb00 [ 41.242720] kunit_try_run_case+0x170/0x3f0 [ 41.246887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.252355] kthread+0x328/0x630 [ 41.255567] ret_from_fork+0x10/0x20 [ 41.259126] [ 41.260603] The buggy address belongs to the object at ffff0008066bd2c0 [ 41.260603] which belongs to the cache kmalloc-32 of size 32 [ 41.272928] The buggy address is located 16 bytes inside of [ 41.272928] freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0) [ 41.284994] [ 41.286473] The buggy address belongs to the physical page: [ 41.292029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd [ 41.300013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.306522] page_type: f5(slab) [ 41.309658] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.317379] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.325099] page dumped because: kasan: bad access detected [ 41.330653] [ 41.332128] Memory state around the buggy address: [ 41.336910] ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.344112] ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.351316] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.358517] ^ [ 41.364337] ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.371541] ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 41.378744] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 40.783903] ================================================================== [ 40.790908] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 40.796807] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308 [ 40.804099] [ 40.805584] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 40.805635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.805654] Hardware name: WinLink E850-96 board (DT) [ 40.805676] Call trace: [ 40.805690] show_stack+0x20/0x38 (C) [ 40.805728] dump_stack_lvl+0x8c/0xd0 [ 40.805764] print_report+0x118/0x608 [ 40.805797] kasan_report+0xdc/0x128 [ 40.805827] __asan_report_load1_noabort+0x20/0x30 [ 40.805864] strlen+0xa8/0xb0 [ 40.805893] kasan_strings+0x418/0xb00 [ 40.805928] kunit_try_run_case+0x170/0x3f0 [ 40.805966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.806004] kthread+0x328/0x630 [ 40.806037] ret_from_fork+0x10/0x20 [ 40.806074] [ 40.870938] Allocated by task 308: [ 40.874325] kasan_save_stack+0x3c/0x68 [ 40.878142] kasan_save_track+0x20/0x40 [ 40.881962] kasan_save_alloc_info+0x40/0x58 [ 40.886215] __kasan_kmalloc+0xd4/0xd8 [ 40.889948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.894462] kasan_strings+0xc8/0xb00 [ 40.898107] kunit_try_run_case+0x170/0x3f0 [ 40.902274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.907743] kthread+0x328/0x630 [ 40.910956] ret_from_fork+0x10/0x20 [ 40.914515] [ 40.915989] Freed by task 308: [ 40.919029] kasan_save_stack+0x3c/0x68 [ 40.922847] kasan_save_track+0x20/0x40 [ 40.926666] kasan_save_free_info+0x4c/0x78 [ 40.930832] __kasan_slab_free+0x6c/0x98 [ 40.934738] kfree+0x214/0x3c8 [ 40.937777] kasan_strings+0x24c/0xb00 [ 40.941509] kunit_try_run_case+0x170/0x3f0 [ 40.945676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.951145] kthread+0x328/0x630 [ 40.954357] ret_from_fork+0x10/0x20 [ 40.957916] [ 40.959392] The buggy address belongs to the object at ffff0008066bd2c0 [ 40.959392] which belongs to the cache kmalloc-32 of size 32 [ 40.971719] The buggy address is located 16 bytes inside of [ 40.971719] freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0) [ 40.983783] [ 40.985261] The buggy address belongs to the physical page: [ 40.990817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd [ 40.998803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.005310] page_type: f5(slab) [ 41.008449] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.016168] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.023887] page dumped because: kasan: bad access detected [ 41.029442] [ 41.030917] Memory state around the buggy address: [ 41.035699] ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.042901] ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.050105] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.057306] ^ [ 41.063126] ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.070331] ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 41.077532] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 40.484979] ================================================================== [ 40.492043] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 40.498721] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308 [ 40.506012] [ 40.507498] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 40.507556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.507575] Hardware name: WinLink E850-96 board (DT) [ 40.507596] Call trace: [ 40.507611] show_stack+0x20/0x38 (C) [ 40.507649] dump_stack_lvl+0x8c/0xd0 [ 40.507690] print_report+0x118/0x608 [ 40.507725] kasan_report+0xdc/0x128 [ 40.507753] __asan_report_load1_noabort+0x20/0x30 [ 40.507791] kasan_strings+0x95c/0xb00 [ 40.507827] kunit_try_run_case+0x170/0x3f0 [ 40.507864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.507904] kthread+0x328/0x630 [ 40.507940] ret_from_fork+0x10/0x20 [ 40.507977] [ 40.569900] Allocated by task 308: [ 40.573286] kasan_save_stack+0x3c/0x68 [ 40.577105] kasan_save_track+0x20/0x40 [ 40.580924] kasan_save_alloc_info+0x40/0x58 [ 40.585178] __kasan_kmalloc+0xd4/0xd8 [ 40.588910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.593424] kasan_strings+0xc8/0xb00 [ 40.597070] kunit_try_run_case+0x170/0x3f0 [ 40.601237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.606705] kthread+0x328/0x630 [ 40.609917] ret_from_fork+0x10/0x20 [ 40.613476] [ 40.614952] Freed by task 308: [ 40.617992] kasan_save_stack+0x3c/0x68 [ 40.621809] kasan_save_track+0x20/0x40 [ 40.625629] kasan_save_free_info+0x4c/0x78 [ 40.629795] __kasan_slab_free+0x6c/0x98 [ 40.633702] kfree+0x214/0x3c8 [ 40.636740] kasan_strings+0x24c/0xb00 [ 40.640472] kunit_try_run_case+0x170/0x3f0 [ 40.644639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.650107] kthread+0x328/0x630 [ 40.653319] ret_from_fork+0x10/0x20 [ 40.656878] [ 40.658355] The buggy address belongs to the object at ffff0008066bd2c0 [ 40.658355] which belongs to the cache kmalloc-32 of size 32 [ 40.670680] The buggy address is located 16 bytes inside of [ 40.670680] freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0) [ 40.682746] [ 40.684223] The buggy address belongs to the physical page: [ 40.689780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd [ 40.697766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.704275] page_type: f5(slab) [ 40.707410] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.715131] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.722850] page dumped because: kasan: bad access detected [ 40.728405] [ 40.729880] Memory state around the buggy address: [ 40.734662] ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.741863] ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.749068] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.756269] ^ [ 40.762089] ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.769294] ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 40.776494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 40.167440] ================================================================== [ 40.191005] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 40.196903] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308 [ 40.204196] [ 40.205681] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 40.205741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.205761] Hardware name: WinLink E850-96 board (DT) [ 40.205784] Call trace: [ 40.205799] show_stack+0x20/0x38 (C) [ 40.205836] dump_stack_lvl+0x8c/0xd0 [ 40.205876] print_report+0x118/0x608 [ 40.205912] kasan_report+0xdc/0x128 [ 40.205944] __asan_report_load1_noabort+0x20/0x30 [ 40.205982] strcmp+0xc0/0xc8 [ 40.206014] kasan_strings+0x340/0xb00 [ 40.206049] kunit_try_run_case+0x170/0x3f0 [ 40.206090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.206132] kthread+0x328/0x630 [ 40.206171] ret_from_fork+0x10/0x20 [ 40.206209] [ 40.271033] Allocated by task 308: [ 40.274423] kasan_save_stack+0x3c/0x68 [ 40.278238] kasan_save_track+0x20/0x40 [ 40.282057] kasan_save_alloc_info+0x40/0x58 [ 40.286311] __kasan_kmalloc+0xd4/0xd8 [ 40.290045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.294557] kasan_strings+0xc8/0xb00 [ 40.298203] kunit_try_run_case+0x170/0x3f0 [ 40.302370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.307838] kthread+0x328/0x630 [ 40.311050] ret_from_fork+0x10/0x20 [ 40.314609] [ 40.316084] Freed by task 308: [ 40.319125] kasan_save_stack+0x3c/0x68 [ 40.322942] kasan_save_track+0x20/0x40 [ 40.326763] kasan_save_free_info+0x4c/0x78 [ 40.330928] __kasan_slab_free+0x6c/0x98 [ 40.334835] kfree+0x214/0x3c8 [ 40.337873] kasan_strings+0x24c/0xb00 [ 40.341605] kunit_try_run_case+0x170/0x3f0 [ 40.345772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.351241] kthread+0x328/0x630 [ 40.354454] ret_from_fork+0x10/0x20 [ 40.358011] [ 40.359488] The buggy address belongs to the object at ffff0008066bd2c0 [ 40.359488] which belongs to the cache kmalloc-32 of size 32 [ 40.371816] The buggy address is located 16 bytes inside of [ 40.371816] freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0) [ 40.383879] [ 40.385359] The buggy address belongs to the physical page: [ 40.390914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd [ 40.398898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.405408] page_type: f5(slab) [ 40.408546] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.416264] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.423983] page dumped because: kasan: bad access detected [ 40.429539] [ 40.431015] Memory state around the buggy address: [ 40.435795] ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.442996] ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.450203] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.457402] ^ [ 40.463222] ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.470426] ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 40.477629] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 39.868979] ================================================================== [ 39.879117] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 39.885105] Read of size 1 at addr ffff0008061c6618 by task kunit_try_catch/306 [ 39.892393] [ 39.893881] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 39.893938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.893957] Hardware name: WinLink E850-96 board (DT) [ 39.893983] Call trace: [ 39.893999] show_stack+0x20/0x38 (C) [ 39.894040] dump_stack_lvl+0x8c/0xd0 [ 39.894078] print_report+0x118/0x608 [ 39.894114] kasan_report+0xdc/0x128 [ 39.894145] __asan_report_load1_noabort+0x20/0x30 [ 39.894183] memcmp+0x198/0x1d8 [ 39.894215] kasan_memcmp+0x16c/0x300 [ 39.894251] kunit_try_run_case+0x170/0x3f0 [ 39.894292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.894334] kthread+0x328/0x630 [ 39.894372] ret_from_fork+0x10/0x20 [ 39.894412] [ 39.959320] Allocated by task 306: [ 39.962708] kasan_save_stack+0x3c/0x68 [ 39.966524] kasan_save_track+0x20/0x40 [ 39.970343] kasan_save_alloc_info+0x40/0x58 [ 39.974597] __kasan_kmalloc+0xd4/0xd8 [ 39.978329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.982843] kasan_memcmp+0xbc/0x300 [ 39.986402] kunit_try_run_case+0x170/0x3f0 [ 39.990568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.996039] kthread+0x328/0x630 [ 39.999249] ret_from_fork+0x10/0x20 [ 40.002808] [ 40.004286] The buggy address belongs to the object at ffff0008061c6600 [ 40.004286] which belongs to the cache kmalloc-32 of size 32 [ 40.016612] The buggy address is located 0 bytes to the right of [ 40.016612] allocated 24-byte region [ffff0008061c6600, ffff0008061c6618) [ 40.029457] [ 40.030937] The buggy address belongs to the physical page: [ 40.036493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8861c6 [ 40.044477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.050986] page_type: f5(slab) [ 40.054125] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.061842] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.069560] page dumped because: kasan: bad access detected [ 40.075117] [ 40.076592] Memory state around the buggy address: [ 40.081371] ffff0008061c6500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.088575] ffff0008061c6580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.095781] >ffff0008061c6600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.102980] ^ [ 40.106977] ffff0008061c6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.114182] ffff0008061c6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.121383] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 39.636137] ================================================================== [ 39.645872] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 39.653423] Read of size 1 at addr ffff800089347b4a by task kunit_try_catch/302 [ 39.660713] [ 39.662198] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 39.662257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.662276] Hardware name: WinLink E850-96 board (DT) [ 39.662302] Call trace: [ 39.662317] show_stack+0x20/0x38 (C) [ 39.662354] dump_stack_lvl+0x8c/0xd0 [ 39.662396] print_report+0x310/0x608 [ 39.662430] kasan_report+0xdc/0x128 [ 39.662460] __asan_report_load1_noabort+0x20/0x30 [ 39.662500] kasan_alloca_oob_right+0x2dc/0x340 [ 39.662537] kunit_try_run_case+0x170/0x3f0 [ 39.662578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.662619] kthread+0x328/0x630 [ 39.662659] ret_from_fork+0x10/0x20 [ 39.662701] [ 39.725385] The buggy address belongs to stack of task kunit_try_catch/302 [ 39.732263] [ 39.733721] The buggy address belongs to the virtual mapping at [ 39.733721] [ffff800089340000, ffff800089349000) created by: [ 39.733721] kernel_clone+0x150/0x7a8 [ 39.748993] [ 39.750472] The buggy address belongs to the physical page: [ 39.756028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886824 [ 39.764012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.770534] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.778252] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.785972] page dumped because: kasan: bad access detected [ 39.791528] [ 39.793002] Memory state around the buggy address: [ 39.797783] ffff800089347a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.804985] ffff800089347a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.812191] >ffff800089347b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 39.819391] ^ [ 39.824950] ffff800089347b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.832155] ffff800089347c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.839356] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 39.424415] ================================================================== [ 39.433463] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 39.440925] Read of size 1 at addr ffff800089327b5f by task kunit_try_catch/300 [ 39.448216] [ 39.449703] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 39.449758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.449778] Hardware name: WinLink E850-96 board (DT) [ 39.449802] Call trace: [ 39.449816] show_stack+0x20/0x38 (C) [ 39.449852] dump_stack_lvl+0x8c/0xd0 [ 39.449889] print_report+0x310/0x608 [ 39.449920] kasan_report+0xdc/0x128 [ 39.449950] __asan_report_load1_noabort+0x20/0x30 [ 39.449987] kasan_alloca_oob_left+0x2b8/0x310 [ 39.450023] kunit_try_run_case+0x170/0x3f0 [ 39.450061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.450102] kthread+0x328/0x630 [ 39.450141] ret_from_fork+0x10/0x20 [ 39.450177] [ 39.512802] The buggy address belongs to stack of task kunit_try_catch/300 [ 39.519678] [ 39.521137] The buggy address belongs to the virtual mapping at [ 39.521137] [ffff800089320000, ffff800089329000) created by: [ 39.521137] kernel_clone+0x150/0x7a8 [ 39.536409] [ 39.537889] The buggy address belongs to the physical page: [ 39.543446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886810 [ 39.551429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.557951] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.565668] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.573388] page dumped because: kasan: bad access detected [ 39.578944] [ 39.580418] Memory state around the buggy address: [ 39.585202] ffff800089327a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.592402] ffff800089327a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.599608] >ffff800089327b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.606807] ^ [ 39.612887] ffff800089327b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.620094] ffff800089327c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.627295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 39.182549] ================================================================== [ 39.196920] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 39.203776] Read of size 1 at addr ffff800089307c2a by task kunit_try_catch/298 [ 39.211067] [ 39.212554] CPU: 6 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 39.212615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.212634] Hardware name: WinLink E850-96 board (DT) [ 39.212658] Call trace: [ 39.212673] show_stack+0x20/0x38 (C) [ 39.212712] dump_stack_lvl+0x8c/0xd0 [ 39.212753] print_report+0x310/0x608 [ 39.212789] kasan_report+0xdc/0x128 [ 39.212818] __asan_report_load1_noabort+0x20/0x30 [ 39.212859] kasan_stack_oob+0x238/0x270 [ 39.212895] kunit_try_run_case+0x170/0x3f0 [ 39.212932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.212973] kthread+0x328/0x630 [ 39.213009] ret_from_fork+0x10/0x20 [ 39.213045] [ 39.275132] The buggy address belongs to stack of task kunit_try_catch/298 [ 39.281988] and is located at offset 138 in frame: [ 39.286847] kasan_stack_oob+0x0/0x270 [ 39.290584] [ 39.292055] This frame has 4 objects: [ 39.295705] [48, 49) '__assertion' [ 39.295728] [64, 72) 'array' [ 39.299174] [96, 112) '__assertion' [ 39.302127] [128, 138) 'stack_array' [ 39.305683] [ 39.310810] The buggy address belongs to the virtual mapping at [ 39.310810] [ffff800089300000, ffff800089309000) created by: [ 39.310810] kernel_clone+0x150/0x7a8 [ 39.326082] [ 39.327562] The buggy address belongs to the physical page: [ 39.333118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867fc [ 39.341103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.347623] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.355342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.363061] page dumped because: kasan: bad access detected [ 39.368618] [ 39.370092] Memory state around the buggy address: [ 39.374875] ffff800089307b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.382075] ffff800089307b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 39.389280] >ffff800089307c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 39.396481] ^ [ 39.400998] ffff800089307c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 39.408203] ffff800089307d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.415405] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 38.965224] ================================================================== [ 38.975743] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 38.983294] Read of size 1 at addr ffff800087a035ad by task kunit_try_catch/294 [ 38.990584] [ 38.992073] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 38.992130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.992149] Hardware name: WinLink E850-96 board (DT) [ 38.992174] Call trace: [ 38.992190] show_stack+0x20/0x38 (C) [ 38.992226] dump_stack_lvl+0x8c/0xd0 [ 38.992265] print_report+0x310/0x608 [ 38.992297] kasan_report+0xdc/0x128 [ 38.992326] __asan_report_load1_noabort+0x20/0x30 [ 38.992365] kasan_global_oob_right+0x230/0x270 [ 38.992401] kunit_try_run_case+0x170/0x3f0 [ 38.992440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.992479] kthread+0x328/0x630 [ 38.992517] ret_from_fork+0x10/0x20 [ 38.992557] [ 39.055253] The buggy address belongs to the variable: [ 39.060374] global_array+0xd/0x40 [ 39.063759] [ 39.065243] The buggy address belongs to the virtual mapping at [ 39.065243] [ffff800085c20000, ffff800087ac1000) created by: [ 39.065243] paging_init+0x66c/0x7d0 [ 39.080426] [ 39.081908] The buggy address belongs to the physical page: [ 39.087463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87a03 [ 39.095361] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.102662] raw: 03fffe0000002000 fffffdffc01e80c8 fffffdffc01e80c8 0000000000000000 [ 39.110380] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.118101] page dumped because: kasan: bad access detected [ 39.123655] [ 39.125132] Memory state around the buggy address: [ 39.129913] ffff800087a03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.137113] ffff800087a03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 39.144321] >ffff800087a03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 39.151519] ^ [ 39.156037] ffff800087a03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 39.163242] ffff800087a03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.170444] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 38.400235] ================================================================== [ 38.410561] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.418550] Free of addr ffff000802d03401 by task kunit_try_catch/290 [ 38.424967] [ 38.426456] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 38.426515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.426534] Hardware name: WinLink E850-96 board (DT) [ 38.426559] Call trace: [ 38.426571] show_stack+0x20/0x38 (C) [ 38.426608] dump_stack_lvl+0x8c/0xd0 [ 38.426646] print_report+0x118/0x608 [ 38.426677] kasan_report_invalid_free+0xc0/0xe8 [ 38.426711] check_slab_allocation+0xfc/0x108 [ 38.426744] __kasan_mempool_poison_object+0x78/0x150 [ 38.426776] mempool_free+0x28c/0x328 [ 38.426815] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.426855] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.426890] kunit_try_run_case+0x170/0x3f0 [ 38.426929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.426971] kthread+0x328/0x630 [ 38.427008] ret_from_fork+0x10/0x20 [ 38.427044] [ 38.505003] Allocated by task 290: [ 38.508391] kasan_save_stack+0x3c/0x68 [ 38.512205] kasan_save_track+0x20/0x40 [ 38.516026] kasan_save_alloc_info+0x40/0x58 [ 38.520279] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.525573] remove_element+0x130/0x1f8 [ 38.529392] mempool_alloc_preallocated+0x58/0xc0 [ 38.534080] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.539636] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.544584] kunit_try_run_case+0x170/0x3f0 [ 38.548750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.554218] kthread+0x328/0x630 [ 38.557430] ret_from_fork+0x10/0x20 [ 38.560989] [ 38.562467] The buggy address belongs to the object at ffff000802d03400 [ 38.562467] which belongs to the cache kmalloc-128 of size 128 [ 38.574967] The buggy address is located 1 bytes inside of [ 38.574967] 128-byte region [ffff000802d03400, ffff000802d03480) [ 38.586510] [ 38.587990] The buggy address belongs to the physical page: [ 38.593547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 38.601530] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.609168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.616113] page_type: f5(slab) [ 38.619250] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.626967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.634694] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.642505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.650318] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 38.658131] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.665936] page dumped because: kasan: bad access detected [ 38.671491] [ 38.672967] Memory state around the buggy address: [ 38.677749] ffff000802d03300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.684951] ffff000802d03380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.692156] >ffff000802d03400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.699355] ^ [ 38.702571] ffff000802d03480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.709776] ffff000802d03500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.716978] ================================================================== [ 38.726091] ================================================================== [ 38.736164] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.744147] Free of addr ffff00080586c001 by task kunit_try_catch/292 [ 38.750572] [ 38.752059] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 38.752115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.752129] Hardware name: WinLink E850-96 board (DT) [ 38.752151] Call trace: [ 38.752167] show_stack+0x20/0x38 (C) [ 38.752204] dump_stack_lvl+0x8c/0xd0 [ 38.752244] print_report+0x118/0x608 [ 38.752276] kasan_report_invalid_free+0xc0/0xe8 [ 38.752309] __kasan_mempool_poison_object+0xfc/0x150 [ 38.752342] mempool_free+0x28c/0x328 [ 38.752378] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.752420] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.752460] kunit_try_run_case+0x170/0x3f0 [ 38.752499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.752542] kthread+0x328/0x630 [ 38.752576] ret_from_fork+0x10/0x20 [ 38.752614] [ 38.826787] The buggy address belongs to the physical page: [ 38.832345] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88586c [ 38.840328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.847967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.854910] page_type: f8(unknown) [ 38.858307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.866026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.873752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.881564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.889378] head: 0bfffe0000000002 fffffdffe0161b01 00000000ffffffff 00000000ffffffff [ 38.897189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.904995] page dumped because: kasan: bad access detected [ 38.910550] [ 38.912027] Memory state around the buggy address: [ 38.916809] ffff00080586bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.924010] ffff00080586bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.931215] >ffff00080586c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.938414] ^ [ 38.941630] ffff00080586c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.948834] ffff00080586c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.956037] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 37.968259] ================================================================== [ 37.978364] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.985479] Free of addr ffff000803330000 by task kunit_try_catch/286 [ 37.991902] [ 37.993386] CPU: 7 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 37.993442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.993457] Hardware name: WinLink E850-96 board (DT) [ 37.993481] Call trace: [ 37.993497] show_stack+0x20/0x38 (C) [ 37.993532] dump_stack_lvl+0x8c/0xd0 [ 37.993570] print_report+0x118/0x608 [ 37.993603] kasan_report_invalid_free+0xc0/0xe8 [ 37.993635] __kasan_mempool_poison_object+0x14c/0x150 [ 37.993666] mempool_free+0x28c/0x328 [ 37.993703] mempool_double_free_helper+0x150/0x2e8 [ 37.993740] mempool_kmalloc_large_double_free+0xc0/0x118 [ 37.993779] kunit_try_run_case+0x170/0x3f0 [ 37.993818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.993856] kthread+0x328/0x630 [ 37.993892] ret_from_fork+0x10/0x20 [ 37.993929] [ 38.067337] The buggy address belongs to the physical page: [ 38.072894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330 [ 38.080878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.088518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.095460] page_type: f8(unknown) [ 38.098858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.106576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.114302] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.122114] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.129927] head: 0bfffe0000000002 fffffdffe00ccc01 00000000ffffffff 00000000ffffffff [ 38.137740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.145544] page dumped because: kasan: bad access detected [ 38.151101] [ 38.152577] Memory state around the buggy address: [ 38.157358] ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.164561] ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.171763] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.178964] ^ [ 38.182180] ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.189384] ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.196587] ================================================================== [ 37.594678] ================================================================== [ 37.604324] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.611439] Free of addr ffff000800dad400 by task kunit_try_catch/284 [ 37.617861] [ 37.619350] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 37.619406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.619423] Hardware name: WinLink E850-96 board (DT) [ 37.619444] Call trace: [ 37.619460] show_stack+0x20/0x38 (C) [ 37.619499] dump_stack_lvl+0x8c/0xd0 [ 37.619539] print_report+0x118/0x608 [ 37.619572] kasan_report_invalid_free+0xc0/0xe8 [ 37.619604] check_slab_allocation+0xd4/0x108 [ 37.619636] __kasan_mempool_poison_object+0x78/0x150 [ 37.619672] mempool_free+0x28c/0x328 [ 37.619708] mempool_double_free_helper+0x150/0x2e8 [ 37.619751] mempool_kmalloc_double_free+0xc0/0x118 [ 37.619787] kunit_try_run_case+0x170/0x3f0 [ 37.619823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.619863] kthread+0x328/0x630 [ 37.619901] ret_from_fork+0x10/0x20 [ 37.619937] [ 37.697028] Allocated by task 284: [ 37.700417] kasan_save_stack+0x3c/0x68 [ 37.704231] kasan_save_track+0x20/0x40 [ 37.708051] kasan_save_alloc_info+0x40/0x58 [ 37.712305] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.717599] remove_element+0x130/0x1f8 [ 37.721419] mempool_alloc_preallocated+0x58/0xc0 [ 37.726106] mempool_double_free_helper+0x94/0x2e8 [ 37.730880] mempool_kmalloc_double_free+0xc0/0x118 [ 37.735743] kunit_try_run_case+0x170/0x3f0 [ 37.739908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.745377] kthread+0x328/0x630 [ 37.748588] ret_from_fork+0x10/0x20 [ 37.752147] [ 37.753624] Freed by task 284: [ 37.756663] kasan_save_stack+0x3c/0x68 [ 37.760481] kasan_save_track+0x20/0x40 [ 37.764300] kasan_save_free_info+0x4c/0x78 [ 37.768467] __kasan_mempool_poison_object+0xc0/0x150 [ 37.773501] mempool_free+0x28c/0x328 [ 37.777147] mempool_double_free_helper+0x100/0x2e8 [ 37.782008] mempool_kmalloc_double_free+0xc0/0x118 [ 37.786869] kunit_try_run_case+0x170/0x3f0 [ 37.791036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.796505] kthread+0x328/0x630 [ 37.799716] ret_from_fork+0x10/0x20 [ 37.803275] [ 37.804752] The buggy address belongs to the object at ffff000800dad400 [ 37.804752] which belongs to the cache kmalloc-128 of size 128 [ 37.817254] The buggy address is located 0 bytes inside of [ 37.817254] 128-byte region [ffff000800dad400, ffff000800dad480) [ 37.828796] [ 37.830276] The buggy address belongs to the physical page: [ 37.835832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 37.843815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.851455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.858397] page_type: f5(slab) [ 37.861536] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.869253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.876980] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.884791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.892604] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 37.900416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.908221] page dumped because: kasan: bad access detected [ 37.913778] [ 37.915254] Memory state around the buggy address: [ 37.920036] ffff000800dad300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.927240] ffff000800dad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.934442] >ffff000800dad400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.941641] ^ [ 37.944857] ffff000800dad480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.952062] ffff000800dad500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.959264] ================================================================== [ 38.205655] ================================================================== [ 38.216208] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.223324] Free of addr ffff000803330000 by task kunit_try_catch/288 [ 38.229746] [ 38.231232] CPU: 7 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 38.231290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.231306] Hardware name: WinLink E850-96 board (DT) [ 38.231328] Call trace: [ 38.231342] show_stack+0x20/0x38 (C) [ 38.231380] dump_stack_lvl+0x8c/0xd0 [ 38.231417] print_report+0x118/0x608 [ 38.231451] kasan_report_invalid_free+0xc0/0xe8 [ 38.231486] __kasan_mempool_poison_pages+0xe0/0xe8 [ 38.231519] mempool_free+0x24c/0x328 [ 38.231555] mempool_double_free_helper+0x150/0x2e8 [ 38.231592] mempool_page_alloc_double_free+0xbc/0x118 [ 38.231625] kunit_try_run_case+0x170/0x3f0 [ 38.231663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.231701] kthread+0x328/0x630 [ 38.231737] ret_from_fork+0x10/0x20 [ 38.231773] [ 38.304659] The buggy address belongs to the physical page: [ 38.310217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330 [ 38.318200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.324723] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.332441] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.340159] page dumped because: kasan: bad access detected [ 38.345716] [ 38.347192] Memory state around the buggy address: [ 38.351973] ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.359175] ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.366380] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.373579] ^ [ 38.376795] ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.383999] ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.391202] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 37.415422] ================================================================== [ 37.416392] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.423075] Read of size 1 at addr ffff000803330000 by task kunit_try_catch/282 [ 37.430364] [ 37.431852] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 37.431911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.431927] Hardware name: WinLink E850-96 board (DT) [ 37.431948] Call trace: [ 37.431961] show_stack+0x20/0x38 (C) [ 37.432001] dump_stack_lvl+0x8c/0xd0 [ 37.432040] print_report+0x118/0x608 [ 37.432074] kasan_report+0xdc/0x128 [ 37.432105] __asan_report_load1_noabort+0x20/0x30 [ 37.432146] mempool_uaf_helper+0x314/0x340 [ 37.432181] mempool_page_alloc_uaf+0xc0/0x118 [ 37.432214] kunit_try_run_case+0x170/0x3f0 [ 37.432253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.432295] kthread+0x328/0x630 [ 37.432330] ret_from_fork+0x10/0x20 [ 37.432367] [ 37.499115] The buggy address belongs to the physical page: [ 37.504673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330 [ 37.512658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.519178] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.526897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.534616] page dumped because: kasan: bad access detected [ 37.540173] [ 37.541648] Memory state around the buggy address: [ 37.546428] ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.553630] ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.560836] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.568036] ^ [ 37.571251] ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.578456] ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.585658] ================================================================== [ 36.853326] ================================================================== [ 36.862407] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.869091] Read of size 1 at addr ffff000803330000 by task kunit_try_catch/278 [ 36.876379] [ 36.877866] CPU: 7 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 36.877924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.877940] Hardware name: WinLink E850-96 board (DT) [ 36.877964] Call trace: [ 36.877978] show_stack+0x20/0x38 (C) [ 36.878012] dump_stack_lvl+0x8c/0xd0 [ 36.878053] print_report+0x118/0x608 [ 36.878085] kasan_report+0xdc/0x128 [ 36.878114] __asan_report_load1_noabort+0x20/0x30 [ 36.878151] mempool_uaf_helper+0x314/0x340 [ 36.878184] mempool_kmalloc_large_uaf+0xc4/0x120 [ 36.878224] kunit_try_run_case+0x170/0x3f0 [ 36.878262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.878301] kthread+0x328/0x630 [ 36.878337] ret_from_fork+0x10/0x20 [ 36.878374] [ 36.945393] The buggy address belongs to the physical page: [ 36.950949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330 [ 36.958934] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.966573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.973515] page_type: f8(unknown) [ 36.976914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.984630] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.992357] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.000169] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.007982] head: 0bfffe0000000002 fffffdffe00ccc01 00000000ffffffff 00000000ffffffff [ 37.015794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.023599] page dumped because: kasan: bad access detected [ 37.029156] [ 37.030630] Memory state around the buggy address: [ 37.035411] ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.042614] ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.049819] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.057019] ^ [ 37.060235] ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.067439] ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.074641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 37.084243] ================================================================== [ 37.093567] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.100683] Read of size 1 at addr ffff000806481240 by task kunit_try_catch/280 [ 37.107973] [ 37.109460] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 37.109516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.109532] Hardware name: WinLink E850-96 board (DT) [ 37.109555] Call trace: [ 37.109569] show_stack+0x20/0x38 (C) [ 37.109605] dump_stack_lvl+0x8c/0xd0 [ 37.109644] print_report+0x118/0x608 [ 37.109676] kasan_report+0xdc/0x128 [ 37.109706] __asan_report_load1_noabort+0x20/0x30 [ 37.109741] mempool_uaf_helper+0x314/0x340 [ 37.109777] mempool_slab_uaf+0xc0/0x118 [ 37.109806] kunit_try_run_case+0x170/0x3f0 [ 37.109845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.109886] kthread+0x328/0x630 [ 37.109921] ret_from_fork+0x10/0x20 [ 37.109959] [ 37.176202] Allocated by task 280: [ 37.179591] kasan_save_stack+0x3c/0x68 [ 37.183406] kasan_save_track+0x20/0x40 [ 37.187226] kasan_save_alloc_info+0x40/0x58 [ 37.191479] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.196687] remove_element+0x16c/0x1f8 [ 37.200506] mempool_alloc_preallocated+0x58/0xc0 [ 37.205195] mempool_uaf_helper+0xa4/0x340 [ 37.209273] mempool_slab_uaf+0xc0/0x118 [ 37.213180] kunit_try_run_case+0x170/0x3f0 [ 37.217347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.222815] kthread+0x328/0x630 [ 37.226027] ret_from_fork+0x10/0x20 [ 37.229586] [ 37.231061] Freed by task 280: [ 37.234101] kasan_save_stack+0x3c/0x68 [ 37.237919] kasan_save_track+0x20/0x40 [ 37.241738] kasan_save_free_info+0x4c/0x78 [ 37.245905] __kasan_mempool_poison_object+0xc0/0x150 [ 37.250940] mempool_free+0x28c/0x328 [ 37.254585] mempool_uaf_helper+0x104/0x340 [ 37.258753] mempool_slab_uaf+0xc0/0x118 [ 37.262658] kunit_try_run_case+0x170/0x3f0 [ 37.266825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.272293] kthread+0x328/0x630 [ 37.275505] ret_from_fork+0x10/0x20 [ 37.279064] [ 37.280541] The buggy address belongs to the object at ffff000806481240 [ 37.280541] which belongs to the cache test_cache of size 123 [ 37.292955] The buggy address is located 0 bytes inside of [ 37.292955] freed 123-byte region [ffff000806481240, ffff0008064812bb) [ 37.305019] [ 37.306498] The buggy address belongs to the physical page: [ 37.312054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886481 [ 37.320040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.326549] page_type: f5(slab) [ 37.329687] raw: 0bfffe0000000000 ffff00080177bcc0 dead000000000122 0000000000000000 [ 37.337403] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.345122] page dumped because: kasan: bad access detected [ 37.350679] [ 37.352155] Memory state around the buggy address: [ 37.356932] ffff000806481100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.364137] ffff000806481180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.371341] >ffff000806481200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 37.378542] ^ [ 37.383841] ffff000806481280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.391046] ffff000806481300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398248] ================================================================== [ 36.495655] ================================================================== [ 36.501129] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.508244] Read of size 1 at addr ffff000802d03000 by task kunit_try_catch/276 [ 36.515534] [ 36.517021] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 36.517071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.517088] Hardware name: WinLink E850-96 board (DT) [ 36.517114] Call trace: [ 36.517130] show_stack+0x20/0x38 (C) [ 36.517166] dump_stack_lvl+0x8c/0xd0 [ 36.517204] print_report+0x118/0x608 [ 36.517238] kasan_report+0xdc/0x128 [ 36.517272] __asan_report_load1_noabort+0x20/0x30 [ 36.517311] mempool_uaf_helper+0x314/0x340 [ 36.517346] mempool_kmalloc_uaf+0xc4/0x120 [ 36.517380] kunit_try_run_case+0x170/0x3f0 [ 36.517417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.517457] kthread+0x328/0x630 [ 36.517497] ret_from_fork+0x10/0x20 [ 36.517535] [ 36.584023] Allocated by task 276: [ 36.587411] kasan_save_stack+0x3c/0x68 [ 36.591227] kasan_save_track+0x20/0x40 [ 36.595047] kasan_save_alloc_info+0x40/0x58 [ 36.599300] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.604595] remove_element+0x130/0x1f8 [ 36.608415] mempool_alloc_preallocated+0x58/0xc0 [ 36.613102] mempool_uaf_helper+0xa4/0x340 [ 36.617182] mempool_kmalloc_uaf+0xc4/0x120 [ 36.621350] kunit_try_run_case+0x170/0x3f0 [ 36.625515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.630984] kthread+0x328/0x630 [ 36.634196] ret_from_fork+0x10/0x20 [ 36.637754] [ 36.639232] Freed by task 276: [ 36.642270] kasan_save_stack+0x3c/0x68 [ 36.646087] kasan_save_track+0x20/0x40 [ 36.649907] kasan_save_free_info+0x4c/0x78 [ 36.654074] __kasan_mempool_poison_object+0xc0/0x150 [ 36.659108] mempool_free+0x28c/0x328 [ 36.662754] mempool_uaf_helper+0x104/0x340 [ 36.666921] mempool_kmalloc_uaf+0xc4/0x120 [ 36.671087] kunit_try_run_case+0x170/0x3f0 [ 36.675255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.680722] kthread+0x328/0x630 [ 36.683934] ret_from_fork+0x10/0x20 [ 36.687493] [ 36.688970] The buggy address belongs to the object at ffff000802d03000 [ 36.688970] which belongs to the cache kmalloc-128 of size 128 [ 36.701472] The buggy address is located 0 bytes inside of [ 36.701472] freed 128-byte region [ffff000802d03000, ffff000802d03080) [ 36.713534] [ 36.715014] The buggy address belongs to the physical page: [ 36.720571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 36.728555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.736194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.743136] page_type: f5(slab) [ 36.746274] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.753992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.761719] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.769530] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.777343] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 36.785155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.792960] page dumped because: kasan: bad access detected [ 36.798516] [ 36.799991] Memory state around the buggy address: [ 36.804773] ffff000802d02f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.811974] ffff000802d02f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.819181] >ffff000802d03000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.826380] ^ [ 36.829596] ffff000802d03080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.836800] ffff000802d03100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.844003] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 36.214244] ================================================================== [ 36.224136] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.231687] Read of size 1 at addr ffff00080659a2bb by task kunit_try_catch/274 [ 36.238975] [ 36.240464] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 36.240523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.240539] Hardware name: WinLink E850-96 board (DT) [ 36.240561] Call trace: [ 36.240577] show_stack+0x20/0x38 (C) [ 36.240613] dump_stack_lvl+0x8c/0xd0 [ 36.240651] print_report+0x118/0x608 [ 36.240681] kasan_report+0xdc/0x128 [ 36.240712] __asan_report_load1_noabort+0x20/0x30 [ 36.240750] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.240786] mempool_slab_oob_right+0xc0/0x118 [ 36.240819] kunit_try_run_case+0x170/0x3f0 [ 36.240857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.240897] kthread+0x328/0x630 [ 36.240931] ret_from_fork+0x10/0x20 [ 36.240964] [ 36.308247] Allocated by task 274: [ 36.311635] kasan_save_stack+0x3c/0x68 [ 36.315450] kasan_save_track+0x20/0x40 [ 36.319270] kasan_save_alloc_info+0x40/0x58 [ 36.323523] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.328733] remove_element+0x16c/0x1f8 [ 36.332550] mempool_alloc_preallocated+0x58/0xc0 [ 36.337238] mempool_oob_right_helper+0x98/0x2f0 [ 36.341839] mempool_slab_oob_right+0xc0/0x118 [ 36.346266] kunit_try_run_case+0x170/0x3f0 [ 36.350432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.355901] kthread+0x328/0x630 [ 36.359113] ret_from_fork+0x10/0x20 [ 36.362672] [ 36.364149] The buggy address belongs to the object at ffff00080659a240 [ 36.364149] which belongs to the cache test_cache of size 123 [ 36.376562] The buggy address is located 0 bytes to the right of [ 36.376562] allocated 123-byte region [ffff00080659a240, ffff00080659a2bb) [ 36.389494] [ 36.390974] The buggy address belongs to the physical page: [ 36.396530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88659a [ 36.404514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.411025] page_type: f5(slab) [ 36.414162] raw: 0bfffe0000000000 ffff000800dbe3c0 dead000000000122 0000000000000000 [ 36.421879] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.429598] page dumped because: kasan: bad access detected [ 36.435155] [ 36.436630] Memory state around the buggy address: [ 36.441411] ffff00080659a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.448612] ffff00080659a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.455817] >ffff00080659a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.463017] ^ [ 36.468056] ffff00080659a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.475261] ffff00080659a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.482463] ================================================================== [ 35.980585] ================================================================== [ 35.990549] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.998094] Read of size 1 at addr ffff00080315a001 by task kunit_try_catch/272 [ 36.005385] [ 36.006874] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 36.006933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.006953] Hardware name: WinLink E850-96 board (DT) [ 36.006975] Call trace: [ 36.006990] show_stack+0x20/0x38 (C) [ 36.007024] dump_stack_lvl+0x8c/0xd0 [ 36.007067] print_report+0x118/0x608 [ 36.007099] kasan_report+0xdc/0x128 [ 36.007130] __asan_report_load1_noabort+0x20/0x30 [ 36.007168] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.007205] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 36.007245] kunit_try_run_case+0x170/0x3f0 [ 36.007284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.007323] kthread+0x328/0x630 [ 36.007360] ret_from_fork+0x10/0x20 [ 36.007397] [ 36.075439] The buggy address belongs to the physical page: [ 36.080997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883158 [ 36.088980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.096621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.103562] page_type: f8(unknown) [ 36.106962] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.114679] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.122405] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.130216] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.138030] head: 0bfffe0000000002 fffffdffe00c5601 00000000ffffffff 00000000ffffffff [ 36.145842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.153647] page dumped because: kasan: bad access detected [ 36.159204] [ 36.160680] Memory state around the buggy address: [ 36.165460] ffff000803159f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.172661] ffff000803159f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.179869] >ffff00080315a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.187067] ^ [ 36.190282] ffff00080315a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.197487] ffff00080315a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.204689] ================================================================== [ 35.679590] ================================================================== [ 35.679768] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.679902] Read of size 1 at addr ffff000801e72b73 by task kunit_try_catch/270 [ 35.686293] [ 35.687781] CPU: 5 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 35.687835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.687853] Hardware name: WinLink E850-96 board (DT) [ 35.687876] Call trace: [ 35.687889] show_stack+0x20/0x38 (C) [ 35.687924] dump_stack_lvl+0x8c/0xd0 [ 35.687961] print_report+0x118/0x608 [ 35.687990] kasan_report+0xdc/0x128 [ 35.688021] __asan_report_load1_noabort+0x20/0x30 [ 35.688063] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.688096] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.688132] kunit_try_run_case+0x170/0x3f0 [ 35.688172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.688211] kthread+0x328/0x630 [ 35.688249] ret_from_fork+0x10/0x20 [ 35.688285] [ 35.755825] Allocated by task 270: [ 35.759212] kasan_save_stack+0x3c/0x68 [ 35.763030] kasan_save_track+0x20/0x40 [ 35.766849] kasan_save_alloc_info+0x40/0x58 [ 35.771101] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.776396] remove_element+0x130/0x1f8 [ 35.780215] mempool_alloc_preallocated+0x58/0xc0 [ 35.784903] mempool_oob_right_helper+0x98/0x2f0 [ 35.789503] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.794191] kunit_try_run_case+0x170/0x3f0 [ 35.798357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.803827] kthread+0x328/0x630 [ 35.807038] ret_from_fork+0x10/0x20 [ 35.810597] [ 35.812074] The buggy address belongs to the object at ffff000801e72b00 [ 35.812074] which belongs to the cache kmalloc-128 of size 128 [ 35.824574] The buggy address is located 0 bytes to the right of [ 35.824574] allocated 115-byte region [ffff000801e72b00, ffff000801e72b73) [ 35.837506] [ 35.838986] The buggy address belongs to the physical page: [ 35.844542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e72 [ 35.852526] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.860166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.867108] page_type: f5(slab) [ 35.870247] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.877964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.885690] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.893501] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.901315] head: 0bfffe0000000001 fffffdffe0079c81 00000000ffffffff 00000000ffffffff [ 35.909126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.916931] page dumped because: kasan: bad access detected [ 35.922489] [ 35.923964] Memory state around the buggy address: [ 35.928743] ffff000801e72a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.935946] ffff000801e72a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.943152] >ffff000801e72b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.950352] ^ [ 35.957213] ffff000801e72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.964419] ffff000801e72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.971620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 34.792035] ================================================================== [ 34.792222] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.792363] Read of size 1 at addr ffff000800dbe140 by task kunit_try_catch/264 [ 34.795916] [ 34.797405] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 34.797463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.797480] Hardware name: WinLink E850-96 board (DT) [ 34.797502] Call trace: [ 34.797518] show_stack+0x20/0x38 (C) [ 34.797557] dump_stack_lvl+0x8c/0xd0 [ 34.797595] print_report+0x118/0x608 [ 34.797627] kasan_report+0xdc/0x128 [ 34.797658] __kasan_check_byte+0x54/0x70 [ 34.797689] kmem_cache_destroy+0x34/0x218 [ 34.797722] kmem_cache_double_destroy+0x174/0x300 [ 34.797757] kunit_try_run_case+0x170/0x3f0 [ 34.797794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.797834] kthread+0x328/0x630 [ 34.797871] ret_from_fork+0x10/0x20 [ 34.797908] [ 34.864144] Allocated by task 264: [ 34.867533] kasan_save_stack+0x3c/0x68 [ 34.871349] kasan_save_track+0x20/0x40 [ 34.875168] kasan_save_alloc_info+0x40/0x58 [ 34.879421] __kasan_slab_alloc+0xa8/0xb0 [ 34.883415] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.888015] __kmem_cache_create_args+0x178/0x280 [ 34.892702] kmem_cache_double_destroy+0xc0/0x300 [ 34.897390] kunit_try_run_case+0x170/0x3f0 [ 34.901558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.907025] kthread+0x328/0x630 [ 34.910237] ret_from_fork+0x10/0x20 [ 34.913796] [ 34.915273] Freed by task 264: [ 34.918311] kasan_save_stack+0x3c/0x68 [ 34.922129] kasan_save_track+0x20/0x40 [ 34.925948] kasan_save_free_info+0x4c/0x78 [ 34.930115] __kasan_slab_free+0x6c/0x98 [ 34.934023] kmem_cache_free+0x260/0x468 [ 34.937927] slab_kmem_cache_release+0x38/0x50 [ 34.942354] kmem_cache_release+0x1c/0x30 [ 34.946348] kobject_put+0x17c/0x420 [ 34.949906] sysfs_slab_release+0x1c/0x30 [ 34.953900] kmem_cache_destroy+0x118/0x218 [ 34.958066] kmem_cache_double_destroy+0x128/0x300 [ 34.962840] kunit_try_run_case+0x170/0x3f0 [ 34.967009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.972476] kthread+0x328/0x630 [ 34.975688] ret_from_fork+0x10/0x20 [ 34.979246] [ 34.980723] The buggy address belongs to the object at ffff000800dbe140 [ 34.980723] which belongs to the cache kmem_cache of size 208 [ 34.993137] The buggy address is located 0 bytes inside of [ 34.993137] freed 208-byte region [ffff000800dbe140, ffff000800dbe210) [ 35.005200] [ 35.006681] The buggy address belongs to the physical page: [ 35.012237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dbe [ 35.020220] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.027859] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.034802] page_type: f5(slab) [ 35.037941] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.045658] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.053385] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.061196] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.069009] head: 0bfffe0000000001 fffffdffe0036f81 00000000ffffffff 00000000ffffffff [ 35.076822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.084627] page dumped because: kasan: bad access detected [ 35.090183] [ 35.091658] Memory state around the buggy address: [ 35.096438] ffff000800dbe000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.103641] ffff000800dbe080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 35.110847] >ffff000800dbe100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.118046] ^ [ 35.123345] ffff000800dbe180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.130551] ffff000800dbe200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.137751] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 34.385122] ================================================================== [ 34.385308] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 34.385443] Read of size 1 at addr ffff000802d0c000 by task kunit_try_catch/262 [ 34.388824] [ 34.390313] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 34.390370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.390386] Hardware name: WinLink E850-96 board (DT) [ 34.390410] Call trace: [ 34.390428] show_stack+0x20/0x38 (C) [ 34.390464] dump_stack_lvl+0x8c/0xd0 [ 34.390504] print_report+0x118/0x608 [ 34.390538] kasan_report+0xdc/0x128 [ 34.390570] __asan_report_load1_noabort+0x20/0x30 [ 34.390608] kmem_cache_rcu_uaf+0x388/0x468 [ 34.390644] kunit_try_run_case+0x170/0x3f0 [ 34.390682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.390723] kthread+0x328/0x630 [ 34.390757] ret_from_fork+0x10/0x20 [ 34.390794] [ 34.453148] Allocated by task 262: [ 34.456535] kasan_save_stack+0x3c/0x68 [ 34.460351] kasan_save_track+0x20/0x40 [ 34.464171] kasan_save_alloc_info+0x40/0x58 [ 34.468424] __kasan_slab_alloc+0xa8/0xb0 [ 34.472417] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.477018] kmem_cache_rcu_uaf+0x12c/0x468 [ 34.481184] kunit_try_run_case+0x170/0x3f0 [ 34.485351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.490821] kthread+0x328/0x630 [ 34.494031] ret_from_fork+0x10/0x20 [ 34.497590] [ 34.499067] Freed by task 0: [ 34.501933] kasan_save_stack+0x3c/0x68 [ 34.505750] kasan_save_track+0x20/0x40 [ 34.509569] kasan_save_free_info+0x4c/0x78 [ 34.513736] __kasan_slab_free+0x6c/0x98 [ 34.517642] slab_free_after_rcu_debug+0xd4/0x2f8 [ 34.522329] rcu_core+0x9f4/0x1e20 [ 34.525715] rcu_core_si+0x18/0x30 [ 34.529100] handle_softirqs+0x374/0xb28 [ 34.533006] __do_softirq+0x1c/0x28 [ 34.536479] [ 34.537954] Last potentially related work creation: [ 34.542817] kasan_save_stack+0x3c/0x68 [ 34.546634] kasan_record_aux_stack+0xb4/0xc8 [ 34.550976] kmem_cache_free+0x120/0x468 [ 34.554881] kmem_cache_rcu_uaf+0x16c/0x468 [ 34.559048] kunit_try_run_case+0x170/0x3f0 [ 34.563214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.568683] kthread+0x328/0x630 [ 34.571894] ret_from_fork+0x10/0x20 [ 34.575454] [ 34.576928] The buggy address belongs to the object at ffff000802d0c000 [ 34.576928] which belongs to the cache test_cache of size 200 [ 34.589345] The buggy address is located 0 bytes inside of [ 34.589345] freed 200-byte region [ffff000802d0c000, ffff000802d0c0c8) [ 34.601408] [ 34.602887] The buggy address belongs to the physical page: [ 34.608444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d0c [ 34.616428] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.624066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.631010] page_type: f5(slab) [ 34.634148] raw: 0bfffe0000000040 ffff00080177ba40 dead000000000122 0000000000000000 [ 34.641866] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.649592] head: 0bfffe0000000040 ffff00080177ba40 dead000000000122 0000000000000000 [ 34.657404] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.665217] head: 0bfffe0000000001 fffffdffe00b4301 00000000ffffffff 00000000ffffffff [ 34.673028] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.680834] page dumped because: kasan: bad access detected [ 34.686391] [ 34.687865] Memory state around the buggy address: [ 34.692647] ffff000802d0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.699848] ffff000802d0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.707053] >ffff000802d0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.714254] ^ [ 34.717469] ffff000802d0c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.724674] ffff000802d0c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.731876] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 34.004079] ================================================================== [ 34.007320] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 34.014263] Free of addr ffff000800dc0001 by task kunit_try_catch/260 [ 34.020683] [ 34.022171] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 34.022229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.022246] Hardware name: WinLink E850-96 board (DT) [ 34.022270] Call trace: [ 34.022283] show_stack+0x20/0x38 (C) [ 34.022318] dump_stack_lvl+0x8c/0xd0 [ 34.022355] print_report+0x118/0x608 [ 34.022386] kasan_report_invalid_free+0xc0/0xe8 [ 34.022421] check_slab_allocation+0xfc/0x108 [ 34.022452] __kasan_slab_pre_free+0x2c/0x48 [ 34.022483] kmem_cache_free+0xf0/0x468 [ 34.022515] kmem_cache_invalid_free+0x184/0x3c8 [ 34.022552] kunit_try_run_case+0x170/0x3f0 [ 34.022592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.022633] kthread+0x328/0x630 [ 34.022670] ret_from_fork+0x10/0x20 [ 34.022707] [ 34.094122] Allocated by task 260: [ 34.097509] kasan_save_stack+0x3c/0x68 [ 34.101324] kasan_save_track+0x20/0x40 [ 34.105144] kasan_save_alloc_info+0x40/0x58 [ 34.109397] __kasan_slab_alloc+0xa8/0xb0 [ 34.113390] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.117991] kmem_cache_invalid_free+0x12c/0x3c8 [ 34.122591] kunit_try_run_case+0x170/0x3f0 [ 34.126758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.132228] kthread+0x328/0x630 [ 34.135439] ret_from_fork+0x10/0x20 [ 34.138997] [ 34.140475] The buggy address belongs to the object at ffff000800dc0000 [ 34.140475] which belongs to the cache test_cache of size 200 [ 34.152888] The buggy address is located 1 bytes inside of [ 34.152888] 200-byte region [ffff000800dc0000, ffff000800dc00c8) [ 34.164431] [ 34.165911] The buggy address belongs to the physical page: [ 34.171467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dc0 [ 34.179452] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.187091] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.194033] page_type: f5(slab) [ 34.197172] raw: 0bfffe0000000040 ffff000800dbe000 dead000000000122 0000000000000000 [ 34.204888] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.212615] head: 0bfffe0000000040 ffff000800dbe000 dead000000000122 0000000000000000 [ 34.220427] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.228240] head: 0bfffe0000000001 fffffdffe0037001 00000000ffffffff 00000000ffffffff [ 34.236051] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.243857] page dumped because: kasan: bad access detected [ 34.249414] [ 34.250888] Memory state around the buggy address: [ 34.255668] ffff000800dbff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.262871] ffff000800dbff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.270077] >ffff000800dc0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.277277] ^ [ 34.280492] ffff000800dc0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.287697] ffff000800dc0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.294900] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.667853] ================================================================== [ 33.668032] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.668161] Free of addr ffff000802d0a000 by task kunit_try_catch/258 [ 33.669560] [ 33.671048] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 33.671102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.671119] Hardware name: WinLink E850-96 board (DT) [ 33.671143] Call trace: [ 33.671159] show_stack+0x20/0x38 (C) [ 33.671194] dump_stack_lvl+0x8c/0xd0 [ 33.671232] print_report+0x118/0x608 [ 33.671266] kasan_report_invalid_free+0xc0/0xe8 [ 33.671299] check_slab_allocation+0xd4/0x108 [ 33.671332] __kasan_slab_pre_free+0x2c/0x48 [ 33.671363] kmem_cache_free+0xf0/0x468 [ 33.671396] kmem_cache_double_free+0x190/0x3c8 [ 33.671431] kunit_try_run_case+0x170/0x3f0 [ 33.671468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.671509] kthread+0x328/0x630 [ 33.671545] ret_from_fork+0x10/0x20 [ 33.671583] [ 33.742911] Allocated by task 258: [ 33.746299] kasan_save_stack+0x3c/0x68 [ 33.750114] kasan_save_track+0x20/0x40 [ 33.753934] kasan_save_alloc_info+0x40/0x58 [ 33.758187] __kasan_slab_alloc+0xa8/0xb0 [ 33.762180] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.766781] kmem_cache_double_free+0x12c/0x3c8 [ 33.771295] kunit_try_run_case+0x170/0x3f0 [ 33.775461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.780929] kthread+0x328/0x630 [ 33.784142] ret_from_fork+0x10/0x20 [ 33.787700] [ 33.789178] Freed by task 258: [ 33.792215] kasan_save_stack+0x3c/0x68 [ 33.796034] kasan_save_track+0x20/0x40 [ 33.799853] kasan_save_free_info+0x4c/0x78 [ 33.804020] __kasan_slab_free+0x6c/0x98 [ 33.807926] kmem_cache_free+0x260/0x468 [ 33.811832] kmem_cache_double_free+0x140/0x3c8 [ 33.816346] kunit_try_run_case+0x170/0x3f0 [ 33.820513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.825982] kthread+0x328/0x630 [ 33.829193] ret_from_fork+0x10/0x20 [ 33.832752] [ 33.834229] The buggy address belongs to the object at ffff000802d0a000 [ 33.834229] which belongs to the cache test_cache of size 200 [ 33.846644] The buggy address is located 0 bytes inside of [ 33.846644] 200-byte region [ffff000802d0a000, ffff000802d0a0c8) [ 33.858186] [ 33.859665] The buggy address belongs to the physical page: [ 33.865222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d0a [ 33.873206] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.880846] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.887789] page_type: f5(slab) [ 33.890927] raw: 0bfffe0000000040 ffff00080177b900 dead000000000122 0000000000000000 [ 33.898644] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.906370] head: 0bfffe0000000040 ffff00080177b900 dead000000000122 0000000000000000 [ 33.914181] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.921995] head: 0bfffe0000000001 fffffdffe00b4281 00000000ffffffff 00000000ffffffff [ 33.929806] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.937612] page dumped because: kasan: bad access detected [ 33.943168] [ 33.944643] Memory state around the buggy address: [ 33.949423] ffff000802d09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.956626] ffff000802d09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.963832] >ffff000802d0a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.971031] ^ [ 33.974247] ffff000802d0a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.981452] ffff000802d0a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.988654] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 33.333588] ================================================================== [ 33.343260] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 33.349941] Read of size 1 at addr ffff00080193c0c8 by task kunit_try_catch/256 [ 33.357233] [ 33.358720] CPU: 2 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 33.358775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.358791] Hardware name: WinLink E850-96 board (DT) [ 33.358814] Call trace: [ 33.358829] show_stack+0x20/0x38 (C) [ 33.358867] dump_stack_lvl+0x8c/0xd0 [ 33.358905] print_report+0x118/0x608 [ 33.358939] kasan_report+0xdc/0x128 [ 33.358969] __asan_report_load1_noabort+0x20/0x30 [ 33.359005] kmem_cache_oob+0x344/0x430 [ 33.359038] kunit_try_run_case+0x170/0x3f0 [ 33.359079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.359119] kthread+0x328/0x630 [ 33.359154] ret_from_fork+0x10/0x20 [ 33.359193] [ 33.421208] Allocated by task 256: [ 33.424595] kasan_save_stack+0x3c/0x68 [ 33.428411] kasan_save_track+0x20/0x40 [ 33.432231] kasan_save_alloc_info+0x40/0x58 [ 33.436484] __kasan_slab_alloc+0xa8/0xb0 [ 33.440477] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.445078] kmem_cache_oob+0x12c/0x430 [ 33.448897] kunit_try_run_case+0x170/0x3f0 [ 33.453064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.458532] kthread+0x328/0x630 [ 33.461744] ret_from_fork+0x10/0x20 [ 33.465303] [ 33.466780] The buggy address belongs to the object at ffff00080193c000 [ 33.466780] which belongs to the cache test_cache of size 200 [ 33.479194] The buggy address is located 0 bytes to the right of [ 33.479194] allocated 200-byte region [ffff00080193c000, ffff00080193c0c8) [ 33.492126] [ 33.493606] The buggy address belongs to the physical page: [ 33.499161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193c [ 33.507145] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.514784] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.521728] page_type: f5(slab) [ 33.524866] raw: 0bfffe0000000040 ffff00080193a000 dead000000000122 0000000000000000 [ 33.532583] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.540310] head: 0bfffe0000000040 ffff00080193a000 dead000000000122 0000000000000000 [ 33.548121] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.555934] head: 0bfffe0000000001 fffffdffe0064f01 00000000ffffffff 00000000ffffffff [ 33.563746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.571551] page dumped because: kasan: bad access detected [ 33.577108] [ 33.578584] Memory state around the buggy address: [ 33.583364] ffff00080193bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.590565] ffff00080193c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.597770] >ffff00080193c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.604971] ^ [ 33.610531] ffff00080193c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.617735] ffff00080193c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.624935] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.987014] ================================================================== [ 32.994135] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 33.000814] Read of size 8 at addr ffff000800d63c40 by task kunit_try_catch/249 [ 33.008105] [ 33.009591] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 33.009648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.009666] Hardware name: WinLink E850-96 board (DT) [ 33.009689] Call trace: [ 33.009702] show_stack+0x20/0x38 (C) [ 33.009736] dump_stack_lvl+0x8c/0xd0 [ 33.009776] print_report+0x118/0x608 [ 33.009807] kasan_report+0xdc/0x128 [ 33.009837] __asan_report_load8_noabort+0x20/0x30 [ 33.009873] workqueue_uaf+0x480/0x4a8 [ 33.009907] kunit_try_run_case+0x170/0x3f0 [ 33.009946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.009986] kthread+0x328/0x630 [ 33.010021] ret_from_fork+0x10/0x20 [ 33.010057] [ 33.071995] Allocated by task 249: [ 33.075383] kasan_save_stack+0x3c/0x68 [ 33.079198] kasan_save_track+0x20/0x40 [ 33.083017] kasan_save_alloc_info+0x40/0x58 [ 33.087271] __kasan_kmalloc+0xd4/0xd8 [ 33.091003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.095517] workqueue_uaf+0x13c/0x4a8 [ 33.099250] kunit_try_run_case+0x170/0x3f0 [ 33.103416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.108886] kthread+0x328/0x630 [ 33.112097] ret_from_fork+0x10/0x20 [ 33.115656] [ 33.117132] Freed by task 87: [ 33.120085] kasan_save_stack+0x3c/0x68 [ 33.123902] kasan_save_track+0x20/0x40 [ 33.127721] kasan_save_free_info+0x4c/0x78 [ 33.131888] __kasan_slab_free+0x6c/0x98 [ 33.135794] kfree+0x214/0x3c8 [ 33.138832] workqueue_uaf_work+0x18/0x30 [ 33.142825] process_one_work+0x530/0xf98 [ 33.146818] worker_thread+0x618/0xf38 [ 33.150551] kthread+0x328/0x630 [ 33.153763] ret_from_fork+0x10/0x20 [ 33.157322] [ 33.158799] Last potentially related work creation: [ 33.163658] kasan_save_stack+0x3c/0x68 [ 33.167478] kasan_record_aux_stack+0xb4/0xc8 [ 33.171819] __queue_work+0x65c/0x1008 [ 33.175551] queue_work_on+0xbc/0xf8 [ 33.179109] workqueue_uaf+0x210/0x4a8 [ 33.182842] kunit_try_run_case+0x170/0x3f0 [ 33.187009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.192477] kthread+0x328/0x630 [ 33.195689] ret_from_fork+0x10/0x20 [ 33.199248] [ 33.200725] The buggy address belongs to the object at ffff000800d63c40 [ 33.200725] which belongs to the cache kmalloc-32 of size 32 [ 33.213053] The buggy address is located 0 bytes inside of [ 33.213053] freed 32-byte region [ffff000800d63c40, ffff000800d63c60) [ 33.225029] [ 33.226509] The buggy address belongs to the physical page: [ 33.232066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 33.240049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.246559] page_type: f5(slab) [ 33.249697] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 33.257414] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.265134] page dumped because: kasan: bad access detected [ 33.270689] [ 33.272165] Memory state around the buggy address: [ 33.276945] ffff000800d63b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.284146] ffff000800d63b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.291351] >ffff000800d63c00: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 33.298552] ^ [ 33.303851] ffff000800d63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.311056] ffff000800d63d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.318257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.620986] ================================================================== [ 32.621160] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.621286] Read of size 4 at addr ffff000800d63b80 by task swapper/7/0 [ 32.622349] [ 32.623833] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 32.623884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.623898] Hardware name: WinLink E850-96 board (DT) [ 32.623921] Call trace: [ 32.623935] show_stack+0x20/0x38 (C) [ 32.623970] dump_stack_lvl+0x8c/0xd0 [ 32.624010] print_report+0x118/0x608 [ 32.624041] kasan_report+0xdc/0x128 [ 32.624071] __asan_report_load4_noabort+0x20/0x30 [ 32.624108] rcu_uaf_reclaim+0x64/0x70 [ 32.624139] rcu_core+0x9f4/0x1e20 [ 32.624172] rcu_core_si+0x18/0x30 [ 32.624200] handle_softirqs+0x374/0xb28 [ 32.624234] __do_softirq+0x1c/0x28 [ 32.624264] ____do_softirq+0x18/0x30 [ 32.624297] call_on_irq_stack+0x24/0x30 [ 32.624325] do_softirq_own_stack+0x24/0x38 [ 32.624355] __irq_exit_rcu+0x1fc/0x318 [ 32.624384] irq_exit_rcu+0x1c/0x80 [ 32.624414] el1_interrupt+0x38/0x58 [ 32.624442] el1h_64_irq_handler+0x18/0x28 [ 32.624475] el1h_64_irq+0x6c/0x70 [ 32.624503] arch_local_irq_enable+0x4/0x8 (P) [ 32.624536] do_idle+0x384/0x4e8 [ 32.624567] cpu_startup_entry+0x68/0x80 [ 32.624595] secondary_start_kernel+0x288/0x340 [ 32.624633] __secondary_switched+0xc0/0xc8 [ 32.624670] [ 32.733543] Allocated by task 247: [ 32.736930] kasan_save_stack+0x3c/0x68 [ 32.740748] kasan_save_track+0x20/0x40 [ 32.744569] kasan_save_alloc_info+0x40/0x58 [ 32.748821] __kasan_kmalloc+0xd4/0xd8 [ 32.752553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.757067] rcu_uaf+0xb0/0x2d8 [ 32.760192] kunit_try_run_case+0x170/0x3f0 [ 32.764359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.769827] kthread+0x328/0x630 [ 32.773039] ret_from_fork+0x10/0x20 [ 32.776598] [ 32.778074] Freed by task 0: [ 32.780938] kasan_save_stack+0x3c/0x68 [ 32.784758] kasan_save_track+0x20/0x40 [ 32.788577] kasan_save_free_info+0x4c/0x78 [ 32.792744] __kasan_slab_free+0x6c/0x98 [ 32.796650] kfree+0x214/0x3c8 [ 32.799688] rcu_uaf_reclaim+0x28/0x70 [ 32.803422] rcu_core+0x9f4/0x1e20 [ 32.806806] rcu_core_si+0x18/0x30 [ 32.810192] handle_softirqs+0x374/0xb28 [ 32.814098] __do_softirq+0x1c/0x28 [ 32.817569] [ 32.819048] Last potentially related work creation: [ 32.823908] kasan_save_stack+0x3c/0x68 [ 32.827726] kasan_record_aux_stack+0xb4/0xc8 [ 32.832066] __call_rcu_common.constprop.0+0x70/0x8b0 [ 32.837101] call_rcu+0x18/0x30 [ 32.840226] rcu_uaf+0x14c/0x2d8 [ 32.843437] kunit_try_run_case+0x170/0x3f0 [ 32.847604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.853073] kthread+0x328/0x630 [ 32.856285] ret_from_fork+0x10/0x20 [ 32.859844] [ 32.861320] The buggy address belongs to the object at ffff000800d63b80 [ 32.861320] which belongs to the cache kmalloc-32 of size 32 [ 32.873649] The buggy address is located 0 bytes inside of [ 32.873649] freed 32-byte region [ffff000800d63b80, ffff000800d63ba0) [ 32.885624] [ 32.887104] The buggy address belongs to the physical page: [ 32.892660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 32.900644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.907155] page_type: f5(slab) [ 32.910293] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 32.918009] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.925728] page dumped because: kasan: bad access detected [ 32.931285] [ 32.932760] Memory state around the buggy address: [ 32.937543] ffff000800d63a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.944742] ffff000800d63b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.951947] >ffff000800d63b80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.959148] ^ [ 32.962365] ffff000800d63c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.969568] ffff000800d63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.976770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.242697] ================================================================== [ 32.249759] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.256092] Read of size 1 at addr ffff000802d02d78 by task kunit_try_catch/245 [ 32.263383] [ 32.264867] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 32.264919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.264934] Hardware name: WinLink E850-96 board (DT) [ 32.264952] Call trace: [ 32.264962] show_stack+0x20/0x38 (C) [ 32.264995] dump_stack_lvl+0x8c/0xd0 [ 32.265031] print_report+0x118/0x608 [ 32.265063] kasan_report+0xdc/0x128 [ 32.265091] __asan_report_load1_noabort+0x20/0x30 [ 32.265126] ksize_uaf+0x544/0x5f8 [ 32.265160] kunit_try_run_case+0x170/0x3f0 [ 32.265195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.265232] kthread+0x328/0x630 [ 32.265264] ret_from_fork+0x10/0x20 [ 32.265297] [ 32.326923] Allocated by task 245: [ 32.330311] kasan_save_stack+0x3c/0x68 [ 32.334128] kasan_save_track+0x20/0x40 [ 32.337948] kasan_save_alloc_info+0x40/0x58 [ 32.342201] __kasan_kmalloc+0xd4/0xd8 [ 32.345933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.350447] ksize_uaf+0xb8/0x5f8 [ 32.353747] kunit_try_run_case+0x170/0x3f0 [ 32.357913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.363381] kthread+0x328/0x630 [ 32.366593] ret_from_fork+0x10/0x20 [ 32.370152] [ 32.371628] Freed by task 245: [ 32.374667] kasan_save_stack+0x3c/0x68 [ 32.378485] kasan_save_track+0x20/0x40 [ 32.382305] kasan_save_free_info+0x4c/0x78 [ 32.386471] __kasan_slab_free+0x6c/0x98 [ 32.390377] kfree+0x214/0x3c8 [ 32.393415] ksize_uaf+0x11c/0x5f8 [ 32.396801] kunit_try_run_case+0x170/0x3f0 [ 32.400967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.406438] kthread+0x328/0x630 [ 32.409648] ret_from_fork+0x10/0x20 [ 32.413207] [ 32.414683] The buggy address belongs to the object at ffff000802d02d00 [ 32.414683] which belongs to the cache kmalloc-128 of size 128 [ 32.427184] The buggy address is located 120 bytes inside of [ 32.427184] freed 128-byte region [ffff000802d02d00, ffff000802d02d80) [ 32.439422] [ 32.440901] The buggy address belongs to the physical page: [ 32.446459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 32.454441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.462079] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.469022] page_type: f5(slab) [ 32.472159] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.479879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.487606] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.495417] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.503230] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 32.511042] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.518848] page dumped because: kasan: bad access detected [ 32.524404] [ 32.525879] Memory state around the buggy address: [ 32.530660] ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.537862] ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.545067] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.552267] ^ [ 32.559389] ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.566594] ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.573795] ================================================================== [ 31.908452] ================================================================== [ 31.915391] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.921723] Read of size 1 at addr ffff000802d02d00 by task kunit_try_catch/245 [ 31.929013] [ 31.930499] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 31.930551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.930566] Hardware name: WinLink E850-96 board (DT) [ 31.930588] Call trace: [ 31.930600] show_stack+0x20/0x38 (C) [ 31.930637] dump_stack_lvl+0x8c/0xd0 [ 31.930674] print_report+0x118/0x608 [ 31.930709] kasan_report+0xdc/0x128 [ 31.930740] __asan_report_load1_noabort+0x20/0x30 [ 31.930774] ksize_uaf+0x598/0x5f8 [ 31.930808] kunit_try_run_case+0x170/0x3f0 [ 31.930844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.930881] kthread+0x328/0x630 [ 31.930915] ret_from_fork+0x10/0x20 [ 31.930953] [ 31.992553] Allocated by task 245: [ 31.995942] kasan_save_stack+0x3c/0x68 [ 31.999758] kasan_save_track+0x20/0x40 [ 32.003578] kasan_save_alloc_info+0x40/0x58 [ 32.007831] __kasan_kmalloc+0xd4/0xd8 [ 32.011565] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.016078] ksize_uaf+0xb8/0x5f8 [ 32.019377] kunit_try_run_case+0x170/0x3f0 [ 32.023543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.029011] kthread+0x328/0x630 [ 32.032223] ret_from_fork+0x10/0x20 [ 32.035782] [ 32.037257] Freed by task 245: [ 32.040297] kasan_save_stack+0x3c/0x68 [ 32.044115] kasan_save_track+0x20/0x40 [ 32.047935] kasan_save_free_info+0x4c/0x78 [ 32.052101] __kasan_slab_free+0x6c/0x98 [ 32.056007] kfree+0x214/0x3c8 [ 32.059046] ksize_uaf+0x11c/0x5f8 [ 32.062431] kunit_try_run_case+0x170/0x3f0 [ 32.066598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.072068] kthread+0x328/0x630 [ 32.075278] ret_from_fork+0x10/0x20 [ 32.078837] [ 32.080312] The buggy address belongs to the object at ffff000802d02d00 [ 32.080312] which belongs to the cache kmalloc-128 of size 128 [ 32.092816] The buggy address is located 0 bytes inside of [ 32.092816] freed 128-byte region [ffff000802d02d00, ffff000802d02d80) [ 32.104878] [ 32.106357] The buggy address belongs to the physical page: [ 32.111913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 32.119897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.127536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.134478] page_type: f5(slab) [ 32.137615] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.145336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.153063] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.160873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.168687] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 32.176499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.184304] page dumped because: kasan: bad access detected [ 32.189861] [ 32.191335] Memory state around the buggy address: [ 32.196115] ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.203318] ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.210523] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.217725] ^ [ 32.220938] ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.228144] ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235345] ================================================================== [ 31.569422] ================================================================== [ 31.578936] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.585271] Read of size 1 at addr ffff000802d02d00 by task kunit_try_catch/245 [ 31.592561] [ 31.594048] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 31.594101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.594118] Hardware name: WinLink E850-96 board (DT) [ 31.594140] Call trace: [ 31.594153] show_stack+0x20/0x38 (C) [ 31.594192] dump_stack_lvl+0x8c/0xd0 [ 31.594228] print_report+0x118/0x608 [ 31.594256] kasan_report+0xdc/0x128 [ 31.594286] __kasan_check_byte+0x54/0x70 [ 31.594319] ksize+0x30/0x88 [ 31.594347] ksize_uaf+0x168/0x5f8 [ 31.594379] kunit_try_run_case+0x170/0x3f0 [ 31.594415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.594457] kthread+0x328/0x630 [ 31.594496] ret_from_fork+0x10/0x20 [ 31.594532] [ 31.658185] Allocated by task 245: [ 31.661573] kasan_save_stack+0x3c/0x68 [ 31.665388] kasan_save_track+0x20/0x40 [ 31.669208] kasan_save_alloc_info+0x40/0x58 [ 31.673461] __kasan_kmalloc+0xd4/0xd8 [ 31.677194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.681707] ksize_uaf+0xb8/0x5f8 [ 31.685006] kunit_try_run_case+0x170/0x3f0 [ 31.689173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.694641] kthread+0x328/0x630 [ 31.697853] ret_from_fork+0x10/0x20 [ 31.701412] [ 31.702887] Freed by task 245: [ 31.705927] kasan_save_stack+0x3c/0x68 [ 31.709745] kasan_save_track+0x20/0x40 [ 31.713564] kasan_save_free_info+0x4c/0x78 [ 31.717731] __kasan_slab_free+0x6c/0x98 [ 31.721637] kfree+0x214/0x3c8 [ 31.724675] ksize_uaf+0x11c/0x5f8 [ 31.728061] kunit_try_run_case+0x170/0x3f0 [ 31.732227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.737696] kthread+0x328/0x630 [ 31.740908] ret_from_fork+0x10/0x20 [ 31.744467] [ 31.745944] The buggy address belongs to the object at ffff000802d02d00 [ 31.745944] which belongs to the cache kmalloc-128 of size 128 [ 31.758446] The buggy address is located 0 bytes inside of [ 31.758446] freed 128-byte region [ffff000802d02d00, ffff000802d02d80) [ 31.770508] [ 31.771988] The buggy address belongs to the physical page: [ 31.777544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 31.785528] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.793166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.800111] page_type: f5(slab) [ 31.803249] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.810965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.818694] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.826505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.834318] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 31.842129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.849934] page dumped because: kasan: bad access detected [ 31.855491] [ 31.856964] Memory state around the buggy address: [ 31.861747] ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.868948] ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.876153] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.883354] ^ [ 31.886569] ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.893775] ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.900975] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.268112] ================================================================== [ 31.275207] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.282582] Read of size 1 at addr ffff000801ed677f by task kunit_try_catch/243 [ 31.289873] [ 31.291358] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 31.291406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.291422] Hardware name: WinLink E850-96 board (DT) [ 31.291443] Call trace: [ 31.291455] show_stack+0x20/0x38 (C) [ 31.291488] dump_stack_lvl+0x8c/0xd0 [ 31.291526] print_report+0x118/0x608 [ 31.291554] kasan_report+0xdc/0x128 [ 31.291585] __asan_report_load1_noabort+0x20/0x30 [ 31.291624] ksize_unpoisons_memory+0x690/0x740 [ 31.291658] kunit_try_run_case+0x170/0x3f0 [ 31.291693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.291730] kthread+0x328/0x630 [ 31.291762] ret_from_fork+0x10/0x20 [ 31.291797] [ 31.354542] Allocated by task 243: [ 31.357930] kasan_save_stack+0x3c/0x68 [ 31.361747] kasan_save_track+0x20/0x40 [ 31.365566] kasan_save_alloc_info+0x40/0x58 [ 31.369820] __kasan_kmalloc+0xd4/0xd8 [ 31.373553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.378066] ksize_unpoisons_memory+0xc0/0x740 [ 31.382493] kunit_try_run_case+0x170/0x3f0 [ 31.386660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.392128] kthread+0x328/0x630 [ 31.395340] ret_from_fork+0x10/0x20 [ 31.398899] [ 31.400375] The buggy address belongs to the object at ffff000801ed6700 [ 31.400375] which belongs to the cache kmalloc-128 of size 128 [ 31.412877] The buggy address is located 12 bytes to the right of [ 31.412877] allocated 115-byte region [ffff000801ed6700, ffff000801ed6773) [ 31.425895] [ 31.427372] The buggy address belongs to the physical page: [ 31.432928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 31.440914] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.448553] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.455497] page_type: f5(slab) [ 31.458632] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.466353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.474080] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.481891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.489704] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 31.497516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.505321] page dumped because: kasan: bad access detected [ 31.510876] [ 31.512352] Memory state around the buggy address: [ 31.517133] ffff000801ed6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.524335] ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.531540] >ffff000801ed6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.538741] ^ [ 31.545863] ffff000801ed6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.553069] ffff000801ed6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.560268] ================================================================== [ 30.666919] ================================================================== [ 30.676692] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.684068] Read of size 1 at addr ffff000801ed6773 by task kunit_try_catch/243 [ 30.691358] [ 30.692845] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 30.692903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.692920] Hardware name: WinLink E850-96 board (DT) [ 30.692939] Call trace: [ 30.692954] show_stack+0x20/0x38 (C) [ 30.692990] dump_stack_lvl+0x8c/0xd0 [ 30.693030] print_report+0x118/0x608 [ 30.693065] kasan_report+0xdc/0x128 [ 30.693096] __asan_report_load1_noabort+0x20/0x30 [ 30.693133] ksize_unpoisons_memory+0x628/0x740 [ 30.693170] kunit_try_run_case+0x170/0x3f0 [ 30.693207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.693246] kthread+0x328/0x630 [ 30.693279] ret_from_fork+0x10/0x20 [ 30.693317] [ 30.756027] Allocated by task 243: [ 30.759416] kasan_save_stack+0x3c/0x68 [ 30.763232] kasan_save_track+0x20/0x40 [ 30.767051] kasan_save_alloc_info+0x40/0x58 [ 30.771304] __kasan_kmalloc+0xd4/0xd8 [ 30.775037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.779551] ksize_unpoisons_memory+0xc0/0x740 [ 30.783978] kunit_try_run_case+0x170/0x3f0 [ 30.788144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.793613] kthread+0x328/0x630 [ 30.796825] ret_from_fork+0x10/0x20 [ 30.800384] [ 30.801861] The buggy address belongs to the object at ffff000801ed6700 [ 30.801861] which belongs to the cache kmalloc-128 of size 128 [ 30.814362] The buggy address is located 0 bytes to the right of [ 30.814362] allocated 115-byte region [ffff000801ed6700, ffff000801ed6773) [ 30.827293] [ 30.828772] The buggy address belongs to the physical page: [ 30.834329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 30.842313] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.849951] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.856895] page_type: f5(slab) [ 30.860032] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.867751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.875478] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.883289] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.891102] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 30.898913] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.906719] page dumped because: kasan: bad access detected [ 30.912276] [ 30.913752] Memory state around the buggy address: [ 30.918530] ffff000801ed6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.925733] ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.932939] >ffff000801ed6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.940139] ^ [ 30.947000] ffff000801ed6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.954206] ffff000801ed6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.961407] ================================================================== [ 30.968872] ================================================================== [ 30.975819] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.983194] Read of size 1 at addr ffff000801ed6778 by task kunit_try_catch/243 [ 30.990485] [ 30.991970] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 30.992018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.992034] Hardware name: WinLink E850-96 board (DT) [ 30.992054] Call trace: [ 30.992066] show_stack+0x20/0x38 (C) [ 30.992101] dump_stack_lvl+0x8c/0xd0 [ 30.992138] print_report+0x118/0x608 [ 30.992168] kasan_report+0xdc/0x128 [ 30.992200] __asan_report_load1_noabort+0x20/0x30 [ 30.992233] ksize_unpoisons_memory+0x618/0x740 [ 30.992268] kunit_try_run_case+0x170/0x3f0 [ 30.992303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.992341] kthread+0x328/0x630 [ 30.992373] ret_from_fork+0x10/0x20 [ 30.992407] [ 31.055154] Allocated by task 243: [ 31.058543] kasan_save_stack+0x3c/0x68 [ 31.062359] kasan_save_track+0x20/0x40 [ 31.066178] kasan_save_alloc_info+0x40/0x58 [ 31.070432] __kasan_kmalloc+0xd4/0xd8 [ 31.074165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.078679] ksize_unpoisons_memory+0xc0/0x740 [ 31.083105] kunit_try_run_case+0x170/0x3f0 [ 31.087272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.092741] kthread+0x328/0x630 [ 31.095952] ret_from_fork+0x10/0x20 [ 31.099511] [ 31.100987] The buggy address belongs to the object at ffff000801ed6700 [ 31.100987] which belongs to the cache kmalloc-128 of size 128 [ 31.113489] The buggy address is located 5 bytes to the right of [ 31.113489] allocated 115-byte region [ffff000801ed6700, ffff000801ed6773) [ 31.126421] [ 31.127898] The buggy address belongs to the physical page: [ 31.133457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 31.141441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.149078] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.156022] page_type: f5(slab) [ 31.159157] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.166878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.174605] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.182416] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.190229] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 31.198041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.205847] page dumped because: kasan: bad access detected [ 31.211402] [ 31.212879] Memory state around the buggy address: [ 31.217659] ffff000801ed6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.224861] ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.232065] >ffff000801ed6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.239266] ^ [ 31.246388] ffff000801ed6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.253594] ffff000801ed6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.260794] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.351916] ================================================================== [ 30.358988] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.364973] Free of addr ffff0008046792c0 by task kunit_try_catch/241 [ 30.371397] [ 30.372882] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 30.372936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.372952] Hardware name: WinLink E850-96 board (DT) [ 30.372970] Call trace: [ 30.372983] show_stack+0x20/0x38 (C) [ 30.373015] dump_stack_lvl+0x8c/0xd0 [ 30.373052] print_report+0x118/0x608 [ 30.373083] kasan_report_invalid_free+0xc0/0xe8 [ 30.373116] check_slab_allocation+0xd4/0x108 [ 30.373149] __kasan_slab_pre_free+0x2c/0x48 [ 30.373180] kfree+0xe8/0x3c8 [ 30.373207] kfree_sensitive+0x3c/0xb0 [ 30.373237] kmalloc_double_kzfree+0x168/0x308 [ 30.373275] kunit_try_run_case+0x170/0x3f0 [ 30.373312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.373349] kthread+0x328/0x630 [ 30.373383] ret_from_fork+0x10/0x20 [ 30.373420] [ 30.447526] Allocated by task 241: [ 30.450911] kasan_save_stack+0x3c/0x68 [ 30.454729] kasan_save_track+0x20/0x40 [ 30.458549] kasan_save_alloc_info+0x40/0x58 [ 30.462802] __kasan_kmalloc+0xd4/0xd8 [ 30.466535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.471049] kmalloc_double_kzfree+0xb8/0x308 [ 30.475389] kunit_try_run_case+0x170/0x3f0 [ 30.479555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485025] kthread+0x328/0x630 [ 30.488236] ret_from_fork+0x10/0x20 [ 30.491795] [ 30.493270] Freed by task 241: [ 30.496309] kasan_save_stack+0x3c/0x68 [ 30.500128] kasan_save_track+0x20/0x40 [ 30.503949] kasan_save_free_info+0x4c/0x78 [ 30.508114] __kasan_slab_free+0x6c/0x98 [ 30.512020] kfree+0x214/0x3c8 [ 30.515058] kfree_sensitive+0x80/0xb0 [ 30.518791] kmalloc_double_kzfree+0x11c/0x308 [ 30.523218] kunit_try_run_case+0x170/0x3f0 [ 30.527384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.532853] kthread+0x328/0x630 [ 30.536065] ret_from_fork+0x10/0x20 [ 30.539624] [ 30.541101] The buggy address belongs to the object at ffff0008046792c0 [ 30.541101] which belongs to the cache kmalloc-16 of size 16 [ 30.553427] The buggy address is located 0 bytes inside of [ 30.553427] 16-byte region [ffff0008046792c0, ffff0008046792d0) [ 30.564884] [ 30.566363] The buggy address belongs to the physical page: [ 30.571917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884679 [ 30.579902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.586412] page_type: f5(slab) [ 30.589549] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.597269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.604987] page dumped because: kasan: bad access detected [ 30.610543] [ 30.612019] Memory state around the buggy address: [ 30.616800] ffff000804679180: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 30.624001] ffff000804679200: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 30.631208] >ffff000804679280: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.638407] ^ [ 30.643706] ffff000804679300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.650911] ffff000804679380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.658112] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.037451] ================================================================== [ 30.051267] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.058643] Read of size 1 at addr ffff0008046792c0 by task kunit_try_catch/241 [ 30.065934] [ 30.067423] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 30.067480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.067499] Hardware name: WinLink E850-96 board (DT) [ 30.067521] Call trace: [ 30.067535] show_stack+0x20/0x38 (C) [ 30.067569] dump_stack_lvl+0x8c/0xd0 [ 30.067613] print_report+0x118/0x608 [ 30.067644] kasan_report+0xdc/0x128 [ 30.067673] __kasan_check_byte+0x54/0x70 [ 30.067703] kfree_sensitive+0x30/0xb0 [ 30.067736] kmalloc_double_kzfree+0x168/0x308 [ 30.067775] kunit_try_run_case+0x170/0x3f0 [ 30.067813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.067855] kthread+0x328/0x630 [ 30.067892] ret_from_fork+0x10/0x20 [ 30.067930] [ 30.133469] Allocated by task 241: [ 30.136855] kasan_save_stack+0x3c/0x68 [ 30.140671] kasan_save_track+0x20/0x40 [ 30.144491] kasan_save_alloc_info+0x40/0x58 [ 30.148744] __kasan_kmalloc+0xd4/0xd8 [ 30.152477] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.156991] kmalloc_double_kzfree+0xb8/0x308 [ 30.161331] kunit_try_run_case+0x170/0x3f0 [ 30.165497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.170968] kthread+0x328/0x630 [ 30.174178] ret_from_fork+0x10/0x20 [ 30.177737] [ 30.179213] Freed by task 241: [ 30.182250] kasan_save_stack+0x3c/0x68 [ 30.186070] kasan_save_track+0x20/0x40 [ 30.189891] kasan_save_free_info+0x4c/0x78 [ 30.194056] __kasan_slab_free+0x6c/0x98 [ 30.197962] kfree+0x214/0x3c8 [ 30.201000] kfree_sensitive+0x80/0xb0 [ 30.204733] kmalloc_double_kzfree+0x11c/0x308 [ 30.209160] kunit_try_run_case+0x170/0x3f0 [ 30.213327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.218795] kthread+0x328/0x630 [ 30.222007] ret_from_fork+0x10/0x20 [ 30.225566] [ 30.227044] The buggy address belongs to the object at ffff0008046792c0 [ 30.227044] which belongs to the cache kmalloc-16 of size 16 [ 30.239371] The buggy address is located 0 bytes inside of [ 30.239371] freed 16-byte region [ffff0008046792c0, ffff0008046792d0) [ 30.251347] [ 30.252827] The buggy address belongs to the physical page: [ 30.258382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884679 [ 30.266367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.272877] page_type: f5(slab) [ 30.276015] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.283732] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.291452] page dumped because: kasan: bad access detected [ 30.297007] [ 30.298483] Memory state around the buggy address: [ 30.303263] ffff000804679180: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 30.310465] ffff000804679200: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 30.317671] >ffff000804679280: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.324870] ^ [ 30.330169] ffff000804679300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.337374] ffff000804679380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.344575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 21.211214] ================================================================== [ 21.220757] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 21.228220] Write of size 1 at addr ffff00080332200a by task kunit_try_catch/195 [ 21.235598] [ 21.237083] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.237139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.237155] Hardware name: WinLink E850-96 board (DT) [ 21.237178] Call trace: [ 21.237191] show_stack+0x20/0x38 (C) [ 21.237229] dump_stack_lvl+0x8c/0xd0 [ 21.237267] print_report+0x118/0x608 [ 21.237298] kasan_report+0xdc/0x128 [ 21.237327] __asan_report_store1_noabort+0x20/0x30 [ 21.237363] kmalloc_large_oob_right+0x278/0x2b8 [ 21.237396] kunit_try_run_case+0x170/0x3f0 [ 21.237431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.237470] kthread+0x328/0x630 [ 21.237505] ret_from_fork+0x10/0x20 [ 21.237543] [ 21.300443] The buggy address belongs to the physical page: [ 21.306000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883320 [ 21.313983] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.321622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.328566] page_type: f8(unknown) [ 21.331964] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.339682] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.347408] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.355219] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.363033] head: 0bfffe0000000002 fffffdffe00cc801 00000000ffffffff 00000000ffffffff [ 21.370845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.378650] page dumped because: kasan: bad access detected [ 21.384205] [ 21.385683] Memory state around the buggy address: [ 21.390461] ffff000803321f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.397664] ffff000803321f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.404870] >ffff000803322000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.412070] ^ [ 21.415546] ffff000803322080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.422751] ffff000803322100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.429952] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 29.734142] ================================================================== [ 29.743458] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.750054] Read of size 1 at addr ffff000802e1aba8 by task kunit_try_catch/237 [ 29.757344] [ 29.758833] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 29.758890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.758910] Hardware name: WinLink E850-96 board (DT) [ 29.758933] Call trace: [ 29.758951] show_stack+0x20/0x38 (C) [ 29.758987] dump_stack_lvl+0x8c/0xd0 [ 29.759027] print_report+0x118/0x608 [ 29.759059] kasan_report+0xdc/0x128 [ 29.759088] __asan_report_load1_noabort+0x20/0x30 [ 29.759125] kmalloc_uaf2+0x3f4/0x468 [ 29.759160] kunit_try_run_case+0x170/0x3f0 [ 29.759199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.759237] kthread+0x328/0x630 [ 29.759271] ret_from_fork+0x10/0x20 [ 29.759308] [ 29.821147] Allocated by task 237: [ 29.824534] kasan_save_stack+0x3c/0x68 [ 29.828350] kasan_save_track+0x20/0x40 [ 29.832169] kasan_save_alloc_info+0x40/0x58 [ 29.836423] __kasan_kmalloc+0xd4/0xd8 [ 29.840155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.844669] kmalloc_uaf2+0xc4/0x468 [ 29.848228] kunit_try_run_case+0x170/0x3f0 [ 29.852395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.857863] kthread+0x328/0x630 [ 29.861075] ret_from_fork+0x10/0x20 [ 29.864634] [ 29.866111] Freed by task 237: [ 29.869148] kasan_save_stack+0x3c/0x68 [ 29.872967] kasan_save_track+0x20/0x40 [ 29.876787] kasan_save_free_info+0x4c/0x78 [ 29.880953] __kasan_slab_free+0x6c/0x98 [ 29.884859] kfree+0x214/0x3c8 [ 29.887897] kmalloc_uaf2+0x134/0x468 [ 29.891543] kunit_try_run_case+0x170/0x3f0 [ 29.895710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.901179] kthread+0x328/0x630 [ 29.904391] ret_from_fork+0x10/0x20 [ 29.907950] [ 29.909427] The buggy address belongs to the object at ffff000802e1ab80 [ 29.909427] which belongs to the cache kmalloc-64 of size 64 [ 29.921755] The buggy address is located 40 bytes inside of [ 29.921755] freed 64-byte region [ffff000802e1ab80, ffff000802e1abc0) [ 29.933817] [ 29.935297] The buggy address belongs to the physical page: [ 29.940852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e1a [ 29.948837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.955347] page_type: f5(slab) [ 29.958485] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.966202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.973922] page dumped because: kasan: bad access detected [ 29.979476] [ 29.980951] Memory state around the buggy address: [ 29.985734] ffff000802e1aa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.992934] ffff000802e1ab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.000141] >ffff000802e1ab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.007340] ^ [ 30.011859] ffff000802e1ac00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.019063] ffff000802e1ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.026265] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 29.430043] ================================================================== [ 29.438603] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.445719] Write of size 33 at addr ffff000800d61600 by task kunit_try_catch/235 [ 29.453182] [ 29.454670] CPU: 7 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 29.454725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.454745] Hardware name: WinLink E850-96 board (DT) [ 29.454768] Call trace: [ 29.454780] show_stack+0x20/0x38 (C) [ 29.454819] dump_stack_lvl+0x8c/0xd0 [ 29.454857] print_report+0x118/0x608 [ 29.454888] kasan_report+0xdc/0x128 [ 29.454918] kasan_check_range+0x100/0x1a8 [ 29.454948] __asan_memset+0x34/0x78 [ 29.454980] kmalloc_uaf_memset+0x170/0x310 [ 29.455014] kunit_try_run_case+0x170/0x3f0 [ 29.455052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.455091] kthread+0x328/0x630 [ 29.455126] ret_from_fork+0x10/0x20 [ 29.455162] [ 29.520370] Allocated by task 235: [ 29.523758] kasan_save_stack+0x3c/0x68 [ 29.527573] kasan_save_track+0x20/0x40 [ 29.531392] kasan_save_alloc_info+0x40/0x58 [ 29.535646] __kasan_kmalloc+0xd4/0xd8 [ 29.539380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.543892] kmalloc_uaf_memset+0xb8/0x310 [ 29.547972] kunit_try_run_case+0x170/0x3f0 [ 29.552139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.557607] kthread+0x328/0x630 [ 29.560819] ret_from_fork+0x10/0x20 [ 29.564378] [ 29.565854] Freed by task 235: [ 29.568893] kasan_save_stack+0x3c/0x68 [ 29.572711] kasan_save_track+0x20/0x40 [ 29.576531] kasan_save_free_info+0x4c/0x78 [ 29.580697] __kasan_slab_free+0x6c/0x98 [ 29.584604] kfree+0x214/0x3c8 [ 29.587642] kmalloc_uaf_memset+0x11c/0x310 [ 29.591810] kunit_try_run_case+0x170/0x3f0 [ 29.595975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.601444] kthread+0x328/0x630 [ 29.604655] ret_from_fork+0x10/0x20 [ 29.608214] [ 29.609690] The buggy address belongs to the object at ffff000800d61600 [ 29.609690] which belongs to the cache kmalloc-64 of size 64 [ 29.622019] The buggy address is located 0 bytes inside of [ 29.622019] freed 64-byte region [ffff000800d61600, ffff000800d61640) [ 29.633995] [ 29.635475] The buggy address belongs to the physical page: [ 29.641032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 29.649015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.655525] page_type: f5(slab) [ 29.658662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.666380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.674100] page dumped because: kasan: bad access detected [ 29.679654] [ 29.681131] Memory state around the buggy address: [ 29.685913] ffff000800d61500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.693113] ffff000800d61580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.700318] >ffff000800d61600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.707518] ^ [ 29.710734] ffff000800d61680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.717939] ffff000800d61700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.725141] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 29.128310] ================================================================== [ 29.138522] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.145029] Read of size 1 at addr ffff000802e0b428 by task kunit_try_catch/233 [ 29.152318] [ 29.153807] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 29.153858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.153875] Hardware name: WinLink E850-96 board (DT) [ 29.153897] Call trace: [ 29.153910] show_stack+0x20/0x38 (C) [ 29.153949] dump_stack_lvl+0x8c/0xd0 [ 29.153988] print_report+0x118/0x608 [ 29.154020] kasan_report+0xdc/0x128 [ 29.154051] __asan_report_load1_noabort+0x20/0x30 [ 29.154091] kmalloc_uaf+0x300/0x338 [ 29.154122] kunit_try_run_case+0x170/0x3f0 [ 29.154161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.154201] kthread+0x328/0x630 [ 29.154237] ret_from_fork+0x10/0x20 [ 29.154273] [ 29.216035] Allocated by task 233: [ 29.219421] kasan_save_stack+0x3c/0x68 [ 29.223238] kasan_save_track+0x20/0x40 [ 29.227057] kasan_save_alloc_info+0x40/0x58 [ 29.231310] __kasan_kmalloc+0xd4/0xd8 [ 29.235043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.239557] kmalloc_uaf+0xb8/0x338 [ 29.243029] kunit_try_run_case+0x170/0x3f0 [ 29.247195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.252664] kthread+0x328/0x630 [ 29.255876] ret_from_fork+0x10/0x20 [ 29.259435] [ 29.260910] Freed by task 233: [ 29.263949] kasan_save_stack+0x3c/0x68 [ 29.267768] kasan_save_track+0x20/0x40 [ 29.271589] kasan_save_free_info+0x4c/0x78 [ 29.275754] __kasan_slab_free+0x6c/0x98 [ 29.279660] kfree+0x214/0x3c8 [ 29.282699] kmalloc_uaf+0x11c/0x338 [ 29.286257] kunit_try_run_case+0x170/0x3f0 [ 29.290424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.295892] kthread+0x328/0x630 [ 29.299105] ret_from_fork+0x10/0x20 [ 29.302663] [ 29.304140] The buggy address belongs to the object at ffff000802e0b420 [ 29.304140] which belongs to the cache kmalloc-16 of size 16 [ 29.316469] The buggy address is located 8 bytes inside of [ 29.316469] freed 16-byte region [ffff000802e0b420, ffff000802e0b430) [ 29.328444] [ 29.329925] The buggy address belongs to the physical page: [ 29.335480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 29.343466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.349975] page_type: f5(slab) [ 29.353112] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 29.360829] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.368548] page dumped because: kasan: bad access detected [ 29.374104] [ 29.375580] Memory state around the buggy address: [ 29.380360] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 29.387562] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 29.394766] >ffff000802e0b400: 00 05 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 29.401968] ^ [ 29.406485] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.413690] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.420891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 28.861701] ================================================================== [ 28.871684] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.879583] Read of size 64 at addr ffff000800d61584 by task kunit_try_catch/231 [ 28.886960] [ 28.888447] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 28.888504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.888522] Hardware name: WinLink E850-96 board (DT) [ 28.888545] Call trace: [ 28.888559] show_stack+0x20/0x38 (C) [ 28.888599] dump_stack_lvl+0x8c/0xd0 [ 28.888637] print_report+0x118/0x608 [ 28.888669] kasan_report+0xdc/0x128 [ 28.888698] kasan_check_range+0x100/0x1a8 [ 28.888732] __asan_memmove+0x3c/0x98 [ 28.888765] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.888802] kunit_try_run_case+0x170/0x3f0 [ 28.888840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.888880] kthread+0x328/0x630 [ 28.888916] ret_from_fork+0x10/0x20 [ 28.888949] [ 28.955100] Allocated by task 231: [ 28.958489] kasan_save_stack+0x3c/0x68 [ 28.962304] kasan_save_track+0x20/0x40 [ 28.966123] kasan_save_alloc_info+0x40/0x58 [ 28.970377] __kasan_kmalloc+0xd4/0xd8 [ 28.974109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.978623] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 28.983571] kunit_try_run_case+0x170/0x3f0 [ 28.987737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.993206] kthread+0x328/0x630 [ 28.996418] ret_from_fork+0x10/0x20 [ 28.999977] [ 29.001454] The buggy address belongs to the object at ffff000800d61580 [ 29.001454] which belongs to the cache kmalloc-64 of size 64 [ 29.013782] The buggy address is located 4 bytes inside of [ 29.013782] allocated 64-byte region [ffff000800d61580, ffff000800d615c0) [ 29.026105] [ 29.027585] The buggy address belongs to the physical page: [ 29.033140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 29.041124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.047635] page_type: f5(slab) [ 29.050772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.058490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.066208] page dumped because: kasan: bad access detected [ 29.071765] [ 29.073241] Memory state around the buggy address: [ 29.078020] ffff000800d61480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.085223] ffff000800d61500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.092428] >ffff000800d61580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.099628] ^ [ 29.104927] ffff000800d61600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.112132] ffff000800d61680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.119333] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 28.596762] ================================================================== [ 28.606324] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.613875] Read of size 18446744073709551614 at addr ffff000802e1ab04 by task kunit_try_catch/229 [ 28.622812] [ 28.624302] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 28.624354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.624372] Hardware name: WinLink E850-96 board (DT) [ 28.624394] Call trace: [ 28.624405] show_stack+0x20/0x38 (C) [ 28.624441] dump_stack_lvl+0x8c/0xd0 [ 28.624479] print_report+0x118/0x608 [ 28.624511] kasan_report+0xdc/0x128 [ 28.624538] kasan_check_range+0x100/0x1a8 [ 28.624570] __asan_memmove+0x3c/0x98 [ 28.624602] kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.624641] kunit_try_run_case+0x170/0x3f0 [ 28.624679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.624720] kthread+0x328/0x630 [ 28.624756] ret_from_fork+0x10/0x20 [ 28.624790] [ 28.691040] Allocated by task 229: [ 28.694430] kasan_save_stack+0x3c/0x68 [ 28.698245] kasan_save_track+0x20/0x40 [ 28.702065] kasan_save_alloc_info+0x40/0x58 [ 28.706318] __kasan_kmalloc+0xd4/0xd8 [ 28.710051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.714565] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 28.719599] kunit_try_run_case+0x170/0x3f0 [ 28.723766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.729236] kthread+0x328/0x630 [ 28.732446] ret_from_fork+0x10/0x20 [ 28.736005] [ 28.737482] The buggy address belongs to the object at ffff000802e1ab00 [ 28.737482] which belongs to the cache kmalloc-64 of size 64 [ 28.749810] The buggy address is located 4 bytes inside of [ 28.749810] 64-byte region [ffff000802e1ab00, ffff000802e1ab40) [ 28.761265] [ 28.762745] The buggy address belongs to the physical page: [ 28.768301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e1a [ 28.776285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.782796] page_type: f5(slab) [ 28.785933] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 28.793650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.801368] page dumped because: kasan: bad access detected [ 28.806925] [ 28.808402] Memory state around the buggy address: [ 28.813181] ffff000802e1aa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.820383] ffff000802e1aa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.827589] >ffff000802e1ab00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 28.834788] ^ [ 28.838004] ffff000802e1ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.845210] ffff000802e1ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.852410] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 28.290736] ================================================================== [ 28.300339] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 28.307627] Write of size 16 at addr ffff000801ed6669 by task kunit_try_catch/227 [ 28.315091] [ 28.316580] CPU: 7 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 28.316640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.316657] Hardware name: WinLink E850-96 board (DT) [ 28.316679] Call trace: [ 28.316693] show_stack+0x20/0x38 (C) [ 28.316730] dump_stack_lvl+0x8c/0xd0 [ 28.316769] print_report+0x118/0x608 [ 28.316799] kasan_report+0xdc/0x128 [ 28.316828] kasan_check_range+0x100/0x1a8 [ 28.316859] __asan_memset+0x34/0x78 [ 28.316891] kmalloc_oob_memset_16+0x150/0x2f8 [ 28.316925] kunit_try_run_case+0x170/0x3f0 [ 28.316960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.316997] kthread+0x328/0x630 [ 28.317030] ret_from_fork+0x10/0x20 [ 28.317065] [ 28.382539] Allocated by task 227: [ 28.385927] kasan_save_stack+0x3c/0x68 [ 28.389743] kasan_save_track+0x20/0x40 [ 28.393562] kasan_save_alloc_info+0x40/0x58 [ 28.397816] __kasan_kmalloc+0xd4/0xd8 [ 28.401548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.406062] kmalloc_oob_memset_16+0xb0/0x2f8 [ 28.410402] kunit_try_run_case+0x170/0x3f0 [ 28.414569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.420037] kthread+0x328/0x630 [ 28.423250] ret_from_fork+0x10/0x20 [ 28.426808] [ 28.428287] The buggy address belongs to the object at ffff000801ed6600 [ 28.428287] which belongs to the cache kmalloc-128 of size 128 [ 28.440787] The buggy address is located 105 bytes inside of [ 28.440787] allocated 120-byte region [ffff000801ed6600, ffff000801ed6678) [ 28.453370] [ 28.454849] The buggy address belongs to the physical page: [ 28.460407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 28.468390] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.476028] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.482972] page_type: f5(slab) [ 28.486110] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.493828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.501555] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.509366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.517179] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 28.524991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.532796] page dumped because: kasan: bad access detected [ 28.538353] [ 28.539829] Memory state around the buggy address: [ 28.544607] ffff000801ed6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.551810] ffff000801ed6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.559016] >ffff000801ed6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.566216] ^ [ 28.573338] ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.580543] ffff000801ed6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.587745] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 27.985309] ================================================================== [ 27.994788] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 28.001990] Write of size 8 at addr ffff000802d02c71 by task kunit_try_catch/225 [ 28.009368] [ 28.010855] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 28.010914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.010931] Hardware name: WinLink E850-96 board (DT) [ 28.010952] Call trace: [ 28.010964] show_stack+0x20/0x38 (C) [ 28.011000] dump_stack_lvl+0x8c/0xd0 [ 28.011039] print_report+0x118/0x608 [ 28.011069] kasan_report+0xdc/0x128 [ 28.011098] kasan_check_range+0x100/0x1a8 [ 28.011129] __asan_memset+0x34/0x78 [ 28.011160] kmalloc_oob_memset_8+0x150/0x2f8 [ 28.011196] kunit_try_run_case+0x170/0x3f0 [ 28.011232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.011270] kthread+0x328/0x630 [ 28.011305] ret_from_fork+0x10/0x20 [ 28.011341] [ 28.076729] Allocated by task 225: [ 28.080116] kasan_save_stack+0x3c/0x68 [ 28.083933] kasan_save_track+0x20/0x40 [ 28.087751] kasan_save_alloc_info+0x40/0x58 [ 28.092004] __kasan_kmalloc+0xd4/0xd8 [ 28.095737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.100251] kmalloc_oob_memset_8+0xb0/0x2f8 [ 28.104504] kunit_try_run_case+0x170/0x3f0 [ 28.108671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.114141] kthread+0x328/0x630 [ 28.117351] ret_from_fork+0x10/0x20 [ 28.120910] [ 28.122389] The buggy address belongs to the object at ffff000802d02c00 [ 28.122389] which belongs to the cache kmalloc-128 of size 128 [ 28.134888] The buggy address is located 113 bytes inside of [ 28.134888] allocated 120-byte region [ffff000802d02c00, ffff000802d02c78) [ 28.147472] [ 28.148950] The buggy address belongs to the physical page: [ 28.154508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 28.162493] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.170131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.177074] page_type: f5(slab) [ 28.180213] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.187930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.195657] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.203468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.211281] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 28.219093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.226898] page dumped because: kasan: bad access detected [ 28.232455] [ 28.233931] Memory state around the buggy address: [ 28.238713] ffff000802d02b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.245912] ffff000802d02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.253118] >ffff000802d02c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.260318] ^ [ 28.267440] ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.274644] ffff000802d02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.281847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 27.679827] ================================================================== [ 27.689237] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 27.696440] Write of size 4 at addr ffff000801ed6575 by task kunit_try_catch/223 [ 27.703816] [ 27.705306] CPU: 7 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 27.705362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.705378] Hardware name: WinLink E850-96 board (DT) [ 27.705398] Call trace: [ 27.705410] show_stack+0x20/0x38 (C) [ 27.705447] dump_stack_lvl+0x8c/0xd0 [ 27.705487] print_report+0x118/0x608 [ 27.705517] kasan_report+0xdc/0x128 [ 27.705547] kasan_check_range+0x100/0x1a8 [ 27.705581] __asan_memset+0x34/0x78 [ 27.705611] kmalloc_oob_memset_4+0x150/0x300 [ 27.705643] kunit_try_run_case+0x170/0x3f0 [ 27.705683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.705722] kthread+0x328/0x630 [ 27.705757] ret_from_fork+0x10/0x20 [ 27.705794] [ 27.771176] Allocated by task 223: [ 27.774565] kasan_save_stack+0x3c/0x68 [ 27.778380] kasan_save_track+0x20/0x40 [ 27.782200] kasan_save_alloc_info+0x40/0x58 [ 27.786453] __kasan_kmalloc+0xd4/0xd8 [ 27.790187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.794700] kmalloc_oob_memset_4+0xb0/0x300 [ 27.798953] kunit_try_run_case+0x170/0x3f0 [ 27.803121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.808588] kthread+0x328/0x630 [ 27.811800] ret_from_fork+0x10/0x20 [ 27.815359] [ 27.816837] The buggy address belongs to the object at ffff000801ed6500 [ 27.816837] which belongs to the cache kmalloc-128 of size 128 [ 27.829337] The buggy address is located 117 bytes inside of [ 27.829337] allocated 120-byte region [ffff000801ed6500, ffff000801ed6578) [ 27.841921] [ 27.843402] The buggy address belongs to the physical page: [ 27.848955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 27.856940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.864579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.871524] page_type: f5(slab) [ 27.874662] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.882379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.890107] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.897917] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.905729] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 27.913542] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.921347] page dumped because: kasan: bad access detected [ 27.926902] [ 27.928378] Memory state around the buggy address: [ 27.933161] ffff000801ed6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.940361] ffff000801ed6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.947567] >ffff000801ed6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.954767] ^ [ 27.961889] ffff000801ed6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.969094] ffff000801ed6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.976296] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 27.374201] ================================================================== [ 27.383687] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 27.390888] Write of size 2 at addr ffff000802d02b77 by task kunit_try_catch/221 [ 27.398266] [ 27.399752] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 27.399806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.399824] Hardware name: WinLink E850-96 board (DT) [ 27.399846] Call trace: [ 27.399858] show_stack+0x20/0x38 (C) [ 27.399896] dump_stack_lvl+0x8c/0xd0 [ 27.399935] print_report+0x118/0x608 [ 27.399965] kasan_report+0xdc/0x128 [ 27.399994] kasan_check_range+0x100/0x1a8 [ 27.400026] __asan_memset+0x34/0x78 [ 27.400057] kmalloc_oob_memset_2+0x150/0x2f8 [ 27.400091] kunit_try_run_case+0x170/0x3f0 [ 27.400128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.400169] kthread+0x328/0x630 [ 27.400205] ret_from_fork+0x10/0x20 [ 27.400241] [ 27.465625] Allocated by task 221: [ 27.469013] kasan_save_stack+0x3c/0x68 [ 27.472830] kasan_save_track+0x20/0x40 [ 27.476649] kasan_save_alloc_info+0x40/0x58 [ 27.480902] __kasan_kmalloc+0xd4/0xd8 [ 27.484635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.489149] kmalloc_oob_memset_2+0xb0/0x2f8 [ 27.493402] kunit_try_run_case+0x170/0x3f0 [ 27.497569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.503039] kthread+0x328/0x630 [ 27.506249] ret_from_fork+0x10/0x20 [ 27.509808] [ 27.511286] The buggy address belongs to the object at ffff000802d02b00 [ 27.511286] which belongs to the cache kmalloc-128 of size 128 [ 27.523786] The buggy address is located 119 bytes inside of [ 27.523786] allocated 120-byte region [ffff000802d02b00, ffff000802d02b78) [ 27.536371] [ 27.537850] The buggy address belongs to the physical page: [ 27.543407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 27.551391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.559028] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.565972] page_type: f5(slab) [ 27.569112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.576828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.584556] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.592366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.600179] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 27.607991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.615796] page dumped because: kasan: bad access detected [ 27.621353] [ 27.622829] Memory state around the buggy address: [ 27.627606] ffff000802d02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.634810] ffff000802d02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.642017] >ffff000802d02b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.649216] ^ [ 27.656338] ffff000802d02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.663544] ffff000802d02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.670743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 27.068756] ================================================================== [ 27.077790] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 27.085079] Write of size 128 at addr ffff000801ed6400 by task kunit_try_catch/219 [ 27.092627] [ 27.094116] CPU: 7 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 27.094171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.094186] Hardware name: WinLink E850-96 board (DT) [ 27.094210] Call trace: [ 27.094225] show_stack+0x20/0x38 (C) [ 27.094259] dump_stack_lvl+0x8c/0xd0 [ 27.094298] print_report+0x118/0x608 [ 27.094329] kasan_report+0xdc/0x128 [ 27.094360] kasan_check_range+0x100/0x1a8 [ 27.094390] __asan_memset+0x34/0x78 [ 27.094422] kmalloc_oob_in_memset+0x144/0x2d0 [ 27.094456] kunit_try_run_case+0x170/0x3f0 [ 27.094493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.094532] kthread+0x328/0x630 [ 27.094568] ret_from_fork+0x10/0x20 [ 27.094604] [ 27.160075] Allocated by task 219: [ 27.163463] kasan_save_stack+0x3c/0x68 [ 27.167278] kasan_save_track+0x20/0x40 [ 27.171098] kasan_save_alloc_info+0x40/0x58 [ 27.175351] __kasan_kmalloc+0xd4/0xd8 [ 27.179085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.183598] kmalloc_oob_in_memset+0xb0/0x2d0 [ 27.187938] kunit_try_run_case+0x170/0x3f0 [ 27.192105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.197573] kthread+0x328/0x630 [ 27.200785] ret_from_fork+0x10/0x20 [ 27.204344] [ 27.205821] The buggy address belongs to the object at ffff000801ed6400 [ 27.205821] which belongs to the cache kmalloc-128 of size 128 [ 27.218322] The buggy address is located 0 bytes inside of [ 27.218322] allocated 120-byte region [ffff000801ed6400, ffff000801ed6478) [ 27.230733] [ 27.232211] The buggy address belongs to the physical page: [ 27.237769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 27.245753] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.253390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.260336] page_type: f5(slab) [ 27.263474] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.271190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.278917] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.286728] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.294541] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 27.302353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.310158] page dumped because: kasan: bad access detected [ 27.315715] [ 27.317191] Memory state around the buggy address: [ 27.321973] ffff000801ed6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.329172] ffff000801ed6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.336379] >ffff000801ed6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.343578] ^ [ 27.350702] ffff000801ed6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.357904] ffff000801ed6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.365107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 26.767527] ================================================================== [ 26.776405] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.783173] Read of size 16 at addr ffff0008046792a0 by task kunit_try_catch/217 [ 26.790548] [ 26.792036] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 26.792089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.792103] Hardware name: WinLink E850-96 board (DT) [ 26.792127] Call trace: [ 26.792140] show_stack+0x20/0x38 (C) [ 26.792180] dump_stack_lvl+0x8c/0xd0 [ 26.792220] print_report+0x118/0x608 [ 26.792251] kasan_report+0xdc/0x128 [ 26.792280] __asan_report_load16_noabort+0x20/0x30 [ 26.792318] kmalloc_uaf_16+0x3bc/0x438 [ 26.792351] kunit_try_run_case+0x170/0x3f0 [ 26.792389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.792427] kthread+0x328/0x630 [ 26.792464] ret_from_fork+0x10/0x20 [ 26.792501] [ 26.854611] Allocated by task 217: [ 26.857999] kasan_save_stack+0x3c/0x68 [ 26.861814] kasan_save_track+0x20/0x40 [ 26.865634] kasan_save_alloc_info+0x40/0x58 [ 26.869887] __kasan_kmalloc+0xd4/0xd8 [ 26.873620] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.878134] kmalloc_uaf_16+0x140/0x438 [ 26.881954] kunit_try_run_case+0x170/0x3f0 [ 26.886119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.891588] kthread+0x328/0x630 [ 26.894800] ret_from_fork+0x10/0x20 [ 26.898359] [ 26.899834] Freed by task 217: [ 26.902874] kasan_save_stack+0x3c/0x68 [ 26.906694] kasan_save_track+0x20/0x40 [ 26.910512] kasan_save_free_info+0x4c/0x78 [ 26.914678] __kasan_slab_free+0x6c/0x98 [ 26.918585] kfree+0x214/0x3c8 [ 26.921622] kmalloc_uaf_16+0x190/0x438 [ 26.925442] kunit_try_run_case+0x170/0x3f0 [ 26.929609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.935078] kthread+0x328/0x630 [ 26.938289] ret_from_fork+0x10/0x20 [ 26.941848] [ 26.943325] The buggy address belongs to the object at ffff0008046792a0 [ 26.943325] which belongs to the cache kmalloc-16 of size 16 [ 26.955653] The buggy address is located 0 bytes inside of [ 26.955653] freed 16-byte region [ffff0008046792a0, ffff0008046792b0) [ 26.967629] [ 26.969109] The buggy address belongs to the physical page: [ 26.974664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884679 [ 26.982649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.989158] page_type: f5(slab) [ 26.992297] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 27.000014] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.007732] page dumped because: kasan: bad access detected [ 27.013288] [ 27.014763] Memory state around the buggy address: [ 27.019546] ffff000804679180: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 27.026747] ffff000804679200: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 27.033953] >ffff000804679280: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 27.041152] ^ [ 27.045409] ffff000804679300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.052614] ffff000804679380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.059815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 26.506773] ================================================================== [ 26.515817] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.522499] Write of size 16 at addr ffff000800d62060 by task kunit_try_catch/215 [ 26.529962] [ 26.531450] CPU: 7 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 26.531505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.531520] Hardware name: WinLink E850-96 board (DT) [ 26.531540] Call trace: [ 26.531551] show_stack+0x20/0x38 (C) [ 26.531584] dump_stack_lvl+0x8c/0xd0 [ 26.531619] print_report+0x118/0x608 [ 26.531649] kasan_report+0xdc/0x128 [ 26.531679] __asan_report_store16_noabort+0x20/0x30 [ 26.531713] kmalloc_oob_16+0x3a0/0x3f8 [ 26.531743] kunit_try_run_case+0x170/0x3f0 [ 26.531780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.531818] kthread+0x328/0x630 [ 26.531855] ret_from_fork+0x10/0x20 [ 26.531892] [ 26.594110] Allocated by task 215: [ 26.597498] kasan_save_stack+0x3c/0x68 [ 26.601315] kasan_save_track+0x20/0x40 [ 26.605134] kasan_save_alloc_info+0x40/0x58 [ 26.609388] __kasan_kmalloc+0xd4/0xd8 [ 26.613121] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.617634] kmalloc_oob_16+0xb4/0x3f8 [ 26.621367] kunit_try_run_case+0x170/0x3f0 [ 26.625534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.631002] kthread+0x328/0x630 [ 26.634214] ret_from_fork+0x10/0x20 [ 26.637773] [ 26.639250] The buggy address belongs to the object at ffff000800d62060 [ 26.639250] which belongs to the cache kmalloc-16 of size 16 [ 26.651577] The buggy address is located 0 bytes inside of [ 26.651577] allocated 13-byte region [ffff000800d62060, ffff000800d6206d) [ 26.663901] [ 26.665381] The buggy address belongs to the physical page: [ 26.670937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62 [ 26.678922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.685429] page_type: f5(slab) [ 26.688567] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.696286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.704004] page dumped because: kasan: bad access detected [ 26.709560] [ 26.711035] Memory state around the buggy address: [ 26.715817] ffff000800d61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.723019] ffff000800d61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.730225] >ffff000800d62000: 00 04 fc fc 00 05 fc fc fa fb fc fc 00 05 fc fc [ 26.737424] ^ [ 26.744026] ffff000800d62080: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.751230] ffff000800d62100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.758431] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 26.170075] ================================================================== [ 26.177020] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.183613] Read of size 1 at addr ffff000802fae600 by task kunit_try_catch/213 [ 26.190906] [ 26.192390] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 26.192438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.192454] Hardware name: WinLink E850-96 board (DT) [ 26.192472] Call trace: [ 26.192484] show_stack+0x20/0x38 (C) [ 26.192516] dump_stack_lvl+0x8c/0xd0 [ 26.192553] print_report+0x118/0x608 [ 26.192582] kasan_report+0xdc/0x128 [ 26.192610] __asan_report_load1_noabort+0x20/0x30 [ 26.192645] krealloc_uaf+0x4c8/0x520 [ 26.192671] kunit_try_run_case+0x170/0x3f0 [ 26.192708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.192747] kthread+0x328/0x630 [ 26.192779] ret_from_fork+0x10/0x20 [ 26.192812] [ 26.254705] Allocated by task 213: [ 26.258093] kasan_save_stack+0x3c/0x68 [ 26.261910] kasan_save_track+0x20/0x40 [ 26.265730] kasan_save_alloc_info+0x40/0x58 [ 26.269983] __kasan_kmalloc+0xd4/0xd8 [ 26.273716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.278230] krealloc_uaf+0xc8/0x520 [ 26.281789] kunit_try_run_case+0x170/0x3f0 [ 26.285955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.291425] kthread+0x328/0x630 [ 26.294636] ret_from_fork+0x10/0x20 [ 26.298195] [ 26.299670] Freed by task 213: [ 26.302708] kasan_save_stack+0x3c/0x68 [ 26.306528] kasan_save_track+0x20/0x40 [ 26.310348] kasan_save_free_info+0x4c/0x78 [ 26.314514] __kasan_slab_free+0x6c/0x98 [ 26.318420] kfree+0x214/0x3c8 [ 26.321458] krealloc_uaf+0x12c/0x520 [ 26.325104] kunit_try_run_case+0x170/0x3f0 [ 26.329270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.334739] kthread+0x328/0x630 [ 26.337951] ret_from_fork+0x10/0x20 [ 26.341510] [ 26.342987] The buggy address belongs to the object at ffff000802fae600 [ 26.342987] which belongs to the cache kmalloc-256 of size 256 [ 26.355487] The buggy address is located 0 bytes inside of [ 26.355487] freed 256-byte region [ffff000802fae600, ffff000802fae700) [ 26.367551] [ 26.369030] The buggy address belongs to the physical page: [ 26.374586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fac [ 26.382568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.390209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.397151] page_type: f5(slab) [ 26.400288] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.408009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.415737] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.423547] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.431359] head: 0bfffe0000000002 fffffdffe00beb01 00000000ffffffff 00000000ffffffff [ 26.439172] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.446977] page dumped because: kasan: bad access detected [ 26.452532] [ 26.454008] Memory state around the buggy address: [ 26.458789] ffff000802fae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.465991] ffff000802fae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.473196] >ffff000802fae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.480396] ^ [ 26.483612] ffff000802fae680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.490817] ffff000802fae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.498018] ================================================================== [ 25.828773] ================================================================== [ 25.838571] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.845166] Read of size 1 at addr ffff000802fae600 by task kunit_try_catch/213 [ 25.852455] [ 25.853942] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.854000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.854016] Hardware name: WinLink E850-96 board (DT) [ 25.854038] Call trace: [ 25.854054] show_stack+0x20/0x38 (C) [ 25.854089] dump_stack_lvl+0x8c/0xd0 [ 25.854126] print_report+0x118/0x608 [ 25.854159] kasan_report+0xdc/0x128 [ 25.854191] __kasan_check_byte+0x54/0x70 [ 25.854220] krealloc_noprof+0x44/0x360 [ 25.854252] krealloc_uaf+0x180/0x520 [ 25.854277] kunit_try_run_case+0x170/0x3f0 [ 25.854315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.854353] kthread+0x328/0x630 [ 25.854388] ret_from_fork+0x10/0x20 [ 25.854426] [ 25.919296] Allocated by task 213: [ 25.922684] kasan_save_stack+0x3c/0x68 [ 25.926498] kasan_save_track+0x20/0x40 [ 25.930318] kasan_save_alloc_info+0x40/0x58 [ 25.934572] __kasan_kmalloc+0xd4/0xd8 [ 25.938304] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.942818] krealloc_uaf+0xc8/0x520 [ 25.946377] kunit_try_run_case+0x170/0x3f0 [ 25.950544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.956012] kthread+0x328/0x630 [ 25.959224] ret_from_fork+0x10/0x20 [ 25.962783] [ 25.964260] Freed by task 213: [ 25.967296] kasan_save_stack+0x3c/0x68 [ 25.971116] kasan_save_track+0x20/0x40 [ 25.974937] kasan_save_free_info+0x4c/0x78 [ 25.979102] __kasan_slab_free+0x6c/0x98 [ 25.983008] kfree+0x214/0x3c8 [ 25.986046] krealloc_uaf+0x12c/0x520 [ 25.989692] kunit_try_run_case+0x170/0x3f0 [ 25.993859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.999327] kthread+0x328/0x630 [ 26.002539] ret_from_fork+0x10/0x20 [ 26.006098] [ 26.007575] The buggy address belongs to the object at ffff000802fae600 [ 26.007575] which belongs to the cache kmalloc-256 of size 256 [ 26.020077] The buggy address is located 0 bytes inside of [ 26.020077] freed 256-byte region [ffff000802fae600, ffff000802fae700) [ 26.032139] [ 26.033620] The buggy address belongs to the physical page: [ 26.039176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fac [ 26.047160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.054798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.061741] page_type: f5(slab) [ 26.064880] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.072597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.080323] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.088135] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.095948] head: 0bfffe0000000002 fffffdffe00beb01 00000000ffffffff 00000000ffffffff [ 26.103760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.111565] page dumped because: kasan: bad access detected [ 26.117122] [ 26.118598] Memory state around the buggy address: [ 26.123377] ffff000802fae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.130581] ffff000802fae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.137786] >ffff000802fae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.144985] ^ [ 26.148201] ffff000802fae680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.155405] ffff000802fae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.162606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 22.974400] ================================================================== [ 22.981410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.988956] Write of size 1 at addr ffff000803310ad0 by task kunit_try_catch/207 [ 22.996334] [ 22.997821] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.997877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.997892] Hardware name: WinLink E850-96 board (DT) [ 22.997912] Call trace: [ 22.997926] show_stack+0x20/0x38 (C) [ 22.997958] dump_stack_lvl+0x8c/0xd0 [ 22.997997] print_report+0x118/0x608 [ 22.998028] kasan_report+0xdc/0x128 [ 22.998058] __asan_report_store1_noabort+0x20/0x30 [ 22.998094] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.998123] krealloc_less_oob+0x20/0x38 [ 22.998150] kunit_try_run_case+0x170/0x3f0 [ 22.998188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.998225] kthread+0x328/0x630 [ 22.998259] ret_from_fork+0x10/0x20 [ 22.998295] [ 23.065170] Allocated by task 207: [ 23.068559] kasan_save_stack+0x3c/0x68 [ 23.072375] kasan_save_track+0x20/0x40 [ 23.076194] kasan_save_alloc_info+0x40/0x58 [ 23.080448] __kasan_krealloc+0x118/0x178 [ 23.084441] krealloc_noprof+0x128/0x360 [ 23.088347] krealloc_less_oob_helper+0x168/0xc50 [ 23.093034] krealloc_less_oob+0x20/0x38 [ 23.096940] kunit_try_run_case+0x170/0x3f0 [ 23.101108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.106576] kthread+0x328/0x630 [ 23.109788] ret_from_fork+0x10/0x20 [ 23.113346] [ 23.114824] The buggy address belongs to the object at ffff000803310a00 [ 23.114824] which belongs to the cache kmalloc-256 of size 256 [ 23.127324] The buggy address is located 7 bytes to the right of [ 23.127324] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 23.140256] [ 23.141733] The buggy address belongs to the physical page: [ 23.147292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 23.155274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.162912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.169856] page_type: f5(slab) [ 23.172995] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.180713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.188440] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.196251] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.204065] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 23.211876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.219682] page dumped because: kasan: bad access detected [ 23.225237] [ 23.226712] Memory state around the buggy address: [ 23.231494] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.238696] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.245901] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.253103] ^ [ 23.258921] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.266126] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.273327] ================================================================== [ 25.133653] ================================================================== [ 25.140749] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 25.148299] Write of size 1 at addr ffff0008033260da by task kunit_try_catch/211 [ 25.155677] [ 25.157161] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.157205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.157218] Hardware name: WinLink E850-96 board (DT) [ 25.157236] Call trace: [ 25.157249] show_stack+0x20/0x38 (C) [ 25.157280] dump_stack_lvl+0x8c/0xd0 [ 25.157315] print_report+0x118/0x608 [ 25.157346] kasan_report+0xdc/0x128 [ 25.157373] __asan_report_store1_noabort+0x20/0x30 [ 25.157405] krealloc_less_oob_helper+0xa80/0xc50 [ 25.157433] krealloc_large_less_oob+0x20/0x38 [ 25.157461] kunit_try_run_case+0x170/0x3f0 [ 25.157497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.157535] kthread+0x328/0x630 [ 25.157569] ret_from_fork+0x10/0x20 [ 25.157603] [ 25.225035] The buggy address belongs to the physical page: [ 25.230592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.238575] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.246214] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.253158] page_type: f8(unknown) [ 25.256554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.264276] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.272002] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.279814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.287627] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.295438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.303244] page dumped because: kasan: bad access detected [ 25.308799] [ 25.310275] Memory state around the buggy address: [ 25.315056] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.322258] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.329463] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.336664] ^ [ 25.342744] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.349949] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.357150] ================================================================== [ 23.894760] ================================================================== [ 23.901620] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.909168] Write of size 1 at addr ffff000803310aeb by task kunit_try_catch/207 [ 23.916546] [ 23.918031] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.918080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.918097] Hardware name: WinLink E850-96 board (DT) [ 23.918115] Call trace: [ 23.918127] show_stack+0x20/0x38 (C) [ 23.918160] dump_stack_lvl+0x8c/0xd0 [ 23.918197] print_report+0x118/0x608 [ 23.918226] kasan_report+0xdc/0x128 [ 23.918254] __asan_report_store1_noabort+0x20/0x30 [ 23.918287] krealloc_less_oob_helper+0xa58/0xc50 [ 23.918316] krealloc_less_oob+0x20/0x38 [ 23.918343] kunit_try_run_case+0x170/0x3f0 [ 23.918379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.918417] kthread+0x328/0x630 [ 23.918448] ret_from_fork+0x10/0x20 [ 23.918481] [ 23.985382] Allocated by task 207: [ 23.988769] kasan_save_stack+0x3c/0x68 [ 23.992586] kasan_save_track+0x20/0x40 [ 23.996406] kasan_save_alloc_info+0x40/0x58 [ 24.000659] __kasan_krealloc+0x118/0x178 [ 24.004653] krealloc_noprof+0x128/0x360 [ 24.008559] krealloc_less_oob_helper+0x168/0xc50 [ 24.013246] krealloc_less_oob+0x20/0x38 [ 24.017153] kunit_try_run_case+0x170/0x3f0 [ 24.021321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.026788] kthread+0x328/0x630 [ 24.029999] ret_from_fork+0x10/0x20 [ 24.033558] [ 24.035036] The buggy address belongs to the object at ffff000803310a00 [ 24.035036] which belongs to the cache kmalloc-256 of size 256 [ 24.047537] The buggy address is located 34 bytes to the right of [ 24.047537] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 24.060555] [ 24.062033] The buggy address belongs to the physical page: [ 24.067590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 24.075573] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.083211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.090155] page_type: f5(slab) [ 24.093291] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.101012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.108739] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.116550] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.124363] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 24.132175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.139980] page dumped because: kasan: bad access detected [ 24.145535] [ 24.147011] Memory state around the buggy address: [ 24.151793] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.158994] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.166199] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.173400] ^ [ 24.180001] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.187206] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.194407] ================================================================== [ 25.364435] ================================================================== [ 25.371561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.379111] Write of size 1 at addr ffff0008033260ea by task kunit_try_catch/211 [ 25.386489] [ 25.387974] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.388017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.388031] Hardware name: WinLink E850-96 board (DT) [ 25.388048] Call trace: [ 25.388057] show_stack+0x20/0x38 (C) [ 25.388091] dump_stack_lvl+0x8c/0xd0 [ 25.388127] print_report+0x118/0x608 [ 25.388156] kasan_report+0xdc/0x128 [ 25.388186] __asan_report_store1_noabort+0x20/0x30 [ 25.388219] krealloc_less_oob_helper+0xae4/0xc50 [ 25.388248] krealloc_large_less_oob+0x20/0x38 [ 25.388278] kunit_try_run_case+0x170/0x3f0 [ 25.388312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.388350] kthread+0x328/0x630 [ 25.388383] ret_from_fork+0x10/0x20 [ 25.388415] [ 25.455848] The buggy address belongs to the physical page: [ 25.461404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.469388] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.477026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.483971] page_type: f8(unknown) [ 25.487367] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.495089] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.502814] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.510626] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.518441] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.526251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.534057] page dumped because: kasan: bad access detected [ 25.539612] [ 25.541088] Memory state around the buggy address: [ 25.545868] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.553071] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.560275] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.567476] ^ [ 25.574077] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.581282] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.588483] ================================================================== [ 24.903303] ================================================================== [ 24.910200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.917747] Write of size 1 at addr ffff0008033260d0 by task kunit_try_catch/211 [ 24.925125] [ 24.926612] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.926663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.926679] Hardware name: WinLink E850-96 board (DT) [ 24.926697] Call trace: [ 24.926710] show_stack+0x20/0x38 (C) [ 24.926743] dump_stack_lvl+0x8c/0xd0 [ 24.926782] print_report+0x118/0x608 [ 24.926812] kasan_report+0xdc/0x128 [ 24.926842] __asan_report_store1_noabort+0x20/0x30 [ 24.926877] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.926906] krealloc_large_less_oob+0x20/0x38 [ 24.926934] kunit_try_run_case+0x170/0x3f0 [ 24.926972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.927010] kthread+0x328/0x630 [ 24.927044] ret_from_fork+0x10/0x20 [ 24.927079] [ 24.994484] The buggy address belongs to the physical page: [ 25.000042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.008023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.015664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.022606] page_type: f8(unknown) [ 25.026003] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.033724] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.041450] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.049262] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.057075] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.064886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.072692] page dumped because: kasan: bad access detected [ 25.078247] [ 25.079723] Memory state around the buggy address: [ 25.084503] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.091706] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.098911] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.106112] ^ [ 25.111931] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.119136] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.126337] ================================================================== [ 23.587323] ================================================================== [ 23.594422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.601968] Write of size 1 at addr ffff000803310aea by task kunit_try_catch/207 [ 23.609346] [ 23.610831] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.610878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.610892] Hardware name: WinLink E850-96 board (DT) [ 23.610909] Call trace: [ 23.610920] show_stack+0x20/0x38 (C) [ 23.610954] dump_stack_lvl+0x8c/0xd0 [ 23.610991] print_report+0x118/0x608 [ 23.611022] kasan_report+0xdc/0x128 [ 23.611050] __asan_report_store1_noabort+0x20/0x30 [ 23.611088] krealloc_less_oob_helper+0xae4/0xc50 [ 23.611116] krealloc_less_oob+0x20/0x38 [ 23.611144] kunit_try_run_case+0x170/0x3f0 [ 23.611182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.611219] kthread+0x328/0x630 [ 23.611254] ret_from_fork+0x10/0x20 [ 23.611289] [ 23.678181] Allocated by task 207: [ 23.681569] kasan_save_stack+0x3c/0x68 [ 23.685386] kasan_save_track+0x20/0x40 [ 23.689206] kasan_save_alloc_info+0x40/0x58 [ 23.693459] __kasan_krealloc+0x118/0x178 [ 23.697452] krealloc_noprof+0x128/0x360 [ 23.701359] krealloc_less_oob_helper+0x168/0xc50 [ 23.706046] krealloc_less_oob+0x20/0x38 [ 23.709952] kunit_try_run_case+0x170/0x3f0 [ 23.714119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.719587] kthread+0x328/0x630 [ 23.722799] ret_from_fork+0x10/0x20 [ 23.726358] [ 23.727835] The buggy address belongs to the object at ffff000803310a00 [ 23.727835] which belongs to the cache kmalloc-256 of size 256 [ 23.740335] The buggy address is located 33 bytes to the right of [ 23.740335] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 23.753354] [ 23.754831] The buggy address belongs to the physical page: [ 23.760390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 23.768372] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.776010] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.782957] page_type: f5(slab) [ 23.786092] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.793812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.801543] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.809350] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.817163] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 23.824974] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.832780] page dumped because: kasan: bad access detected [ 23.838335] [ 23.839811] Memory state around the buggy address: [ 23.844591] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.851794] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.858999] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.866200] ^ [ 23.872801] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.880005] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.887206] ================================================================== [ 22.666013] ================================================================== [ 22.675336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.682887] Write of size 1 at addr ffff000803310ac9 by task kunit_try_catch/207 [ 22.690262] [ 22.691749] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.691802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.691819] Hardware name: WinLink E850-96 board (DT) [ 22.691840] Call trace: [ 22.691855] show_stack+0x20/0x38 (C) [ 22.691889] dump_stack_lvl+0x8c/0xd0 [ 22.691927] print_report+0x118/0x608 [ 22.691961] kasan_report+0xdc/0x128 [ 22.691990] __asan_report_store1_noabort+0x20/0x30 [ 22.692028] krealloc_less_oob_helper+0xa48/0xc50 [ 22.692057] krealloc_less_oob+0x20/0x38 [ 22.692086] kunit_try_run_case+0x170/0x3f0 [ 22.692124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.692161] kthread+0x328/0x630 [ 22.692197] ret_from_fork+0x10/0x20 [ 22.692234] [ 22.759098] Allocated by task 207: [ 22.762487] kasan_save_stack+0x3c/0x68 [ 22.766304] kasan_save_track+0x20/0x40 [ 22.770122] kasan_save_alloc_info+0x40/0x58 [ 22.774376] __kasan_krealloc+0x118/0x178 [ 22.778369] krealloc_noprof+0x128/0x360 [ 22.782275] krealloc_less_oob_helper+0x168/0xc50 [ 22.786963] krealloc_less_oob+0x20/0x38 [ 22.790869] kunit_try_run_case+0x170/0x3f0 [ 22.795037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.800504] kthread+0x328/0x630 [ 22.803716] ret_from_fork+0x10/0x20 [ 22.807275] [ 22.808754] The buggy address belongs to the object at ffff000803310a00 [ 22.808754] which belongs to the cache kmalloc-256 of size 256 [ 22.821253] The buggy address is located 0 bytes to the right of [ 22.821253] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 22.834184] [ 22.835664] The buggy address belongs to the physical page: [ 22.841220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 22.849205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.856842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.863786] page_type: f5(slab) [ 22.866925] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.874642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.882368] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.890180] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.897992] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 22.905804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.913610] page dumped because: kasan: bad access detected [ 22.919167] [ 22.920641] Memory state around the buggy address: [ 22.925420] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.932624] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.939829] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.947030] ^ [ 22.952589] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.959793] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.966996] ================================================================== [ 25.595796] ================================================================== [ 25.602895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.610445] Write of size 1 at addr ffff0008033260eb by task kunit_try_catch/211 [ 25.617823] [ 25.619308] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 25.619356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.619371] Hardware name: WinLink E850-96 board (DT) [ 25.619387] Call trace: [ 25.619400] show_stack+0x20/0x38 (C) [ 25.619435] dump_stack_lvl+0x8c/0xd0 [ 25.619470] print_report+0x118/0x608 [ 25.619500] kasan_report+0xdc/0x128 [ 25.619530] __asan_report_store1_noabort+0x20/0x30 [ 25.619563] krealloc_less_oob_helper+0xa58/0xc50 [ 25.619593] krealloc_large_less_oob+0x20/0x38 [ 25.619622] kunit_try_run_case+0x170/0x3f0 [ 25.619660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.619698] kthread+0x328/0x630 [ 25.619730] ret_from_fork+0x10/0x20 [ 25.619762] [ 25.687181] The buggy address belongs to the physical page: [ 25.692739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 25.700721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.708360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.715305] page_type: f8(unknown) [ 25.718703] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.726423] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.734149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.741959] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.749773] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 25.757584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.765390] page dumped because: kasan: bad access detected [ 25.770945] [ 25.772421] Memory state around the buggy address: [ 25.777203] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.784404] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.791609] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.798810] ^ [ 25.805411] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.812615] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.819816] ================================================================== [ 23.280653] ================================================================== [ 23.287740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.295288] Write of size 1 at addr ffff000803310ada by task kunit_try_catch/207 [ 23.302667] [ 23.304151] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.304198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.304212] Hardware name: WinLink E850-96 board (DT) [ 23.304228] Call trace: [ 23.304242] show_stack+0x20/0x38 (C) [ 23.304278] dump_stack_lvl+0x8c/0xd0 [ 23.304315] print_report+0x118/0x608 [ 23.304343] kasan_report+0xdc/0x128 [ 23.304371] __asan_report_store1_noabort+0x20/0x30 [ 23.304403] krealloc_less_oob_helper+0xa80/0xc50 [ 23.304432] krealloc_less_oob+0x20/0x38 [ 23.304459] kunit_try_run_case+0x170/0x3f0 [ 23.304495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.304535] kthread+0x328/0x630 [ 23.304569] ret_from_fork+0x10/0x20 [ 23.304600] [ 23.371502] Allocated by task 207: [ 23.374890] kasan_save_stack+0x3c/0x68 [ 23.378707] kasan_save_track+0x20/0x40 [ 23.382526] kasan_save_alloc_info+0x40/0x58 [ 23.386780] __kasan_krealloc+0x118/0x178 [ 23.390773] krealloc_noprof+0x128/0x360 [ 23.394679] krealloc_less_oob_helper+0x168/0xc50 [ 23.399367] krealloc_less_oob+0x20/0x38 [ 23.403273] kunit_try_run_case+0x170/0x3f0 [ 23.407439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.412908] kthread+0x328/0x630 [ 23.416120] ret_from_fork+0x10/0x20 [ 23.419679] [ 23.421156] The buggy address belongs to the object at ffff000803310a00 [ 23.421156] which belongs to the cache kmalloc-256 of size 256 [ 23.433654] The buggy address is located 17 bytes to the right of [ 23.433654] allocated 201-byte region [ffff000803310a00, ffff000803310ac9) [ 23.446675] [ 23.448152] The buggy address belongs to the physical page: [ 23.453710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 23.461692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.469331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.476275] page_type: f5(slab) [ 23.479410] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.487132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.494859] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.502670] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.510484] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 23.518295] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.526101] page dumped because: kasan: bad access detected [ 23.531656] [ 23.533132] Memory state around the buggy address: [ 23.537913] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.545115] ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.552319] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.559520] ^ [ 23.565600] ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.572805] ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.580006] ================================================================== [ 24.670060] ================================================================== [ 24.679908] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.687456] Write of size 1 at addr ffff0008033260c9 by task kunit_try_catch/211 [ 24.694834] [ 24.696319] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.696376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.696392] Hardware name: WinLink E850-96 board (DT) [ 24.696412] Call trace: [ 24.696426] show_stack+0x20/0x38 (C) [ 24.696459] dump_stack_lvl+0x8c/0xd0 [ 24.696501] print_report+0x118/0x608 [ 24.696535] kasan_report+0xdc/0x128 [ 24.696565] __asan_report_store1_noabort+0x20/0x30 [ 24.696603] krealloc_less_oob_helper+0xa48/0xc50 [ 24.696633] krealloc_large_less_oob+0x20/0x38 [ 24.696661] kunit_try_run_case+0x170/0x3f0 [ 24.696699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.696737] kthread+0x328/0x630 [ 24.696773] ret_from_fork+0x10/0x20 [ 24.696807] [ 24.764194] The buggy address belongs to the physical page: [ 24.769752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324 [ 24.777734] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.785372] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.792316] page_type: f8(unknown) [ 24.795711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.803432] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.811159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.818970] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.826783] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff [ 24.834595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.842400] page dumped because: kasan: bad access detected [ 24.847956] [ 24.849434] Memory state around the buggy address: [ 24.854211] ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.861414] ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.868620] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.875820] ^ [ 24.881379] ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.888584] ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.895785] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 24.437044] ================================================================== [ 24.443972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.451523] Write of size 1 at addr ffff0008031520f0 by task kunit_try_catch/209 [ 24.458899] [ 24.460385] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.460438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.460453] Hardware name: WinLink E850-96 board (DT) [ 24.460476] Call trace: [ 24.460489] show_stack+0x20/0x38 (C) [ 24.460525] dump_stack_lvl+0x8c/0xd0 [ 24.460562] print_report+0x118/0x608 [ 24.460596] kasan_report+0xdc/0x128 [ 24.460626] __asan_report_store1_noabort+0x20/0x30 [ 24.460661] krealloc_more_oob_helper+0x5c0/0x678 [ 24.460690] krealloc_large_more_oob+0x20/0x38 [ 24.460720] kunit_try_run_case+0x170/0x3f0 [ 24.460757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.460797] kthread+0x328/0x630 [ 24.460832] ret_from_fork+0x10/0x20 [ 24.460868] [ 24.528258] The buggy address belongs to the physical page: [ 24.533816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150 [ 24.541799] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.549438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.556381] page_type: f8(unknown) [ 24.559778] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.567498] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.575224] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.583036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.590849] head: 0bfffe0000000002 fffffdffe00c5401 00000000ffffffff 00000000ffffffff [ 24.598661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.606466] page dumped because: kasan: bad access detected [ 24.612022] [ 24.613497] Memory state around the buggy address: [ 24.618276] ffff000803151f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.625480] ffff000803152000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.632685] >ffff000803152080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.639886] ^ [ 24.646747] ffff000803152100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.653952] ffff000803152180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.661153] ================================================================== [ 24.203342] ================================================================== [ 24.212639] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.220189] Write of size 1 at addr ffff0008031520eb by task kunit_try_catch/209 [ 24.227567] [ 24.229055] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 24.229109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.229126] Hardware name: WinLink E850-96 board (DT) [ 24.229147] Call trace: [ 24.229161] show_stack+0x20/0x38 (C) [ 24.229197] dump_stack_lvl+0x8c/0xd0 [ 24.229233] print_report+0x118/0x608 [ 24.229265] kasan_report+0xdc/0x128 [ 24.229296] __asan_report_store1_noabort+0x20/0x30 [ 24.229334] krealloc_more_oob_helper+0x60c/0x678 [ 24.229362] krealloc_large_more_oob+0x20/0x38 [ 24.229389] kunit_try_run_case+0x170/0x3f0 [ 24.229429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.229467] kthread+0x328/0x630 [ 24.229503] ret_from_fork+0x10/0x20 [ 24.229539] [ 24.296924] The buggy address belongs to the physical page: [ 24.302482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150 [ 24.310466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.318105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.325049] page_type: f8(unknown) [ 24.328448] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.336165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.343891] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.351703] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.359515] head: 0bfffe0000000002 fffffdffe00c5401 00000000ffffffff 00000000ffffffff [ 24.367327] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.375133] page dumped because: kasan: bad access detected [ 24.380688] [ 24.382165] Memory state around the buggy address: [ 24.386947] ffff000803151f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.394149] ffff000803152000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.401353] >ffff000803152080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.408552] ^ [ 24.415154] ffff000803152100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.422358] ffff000803152180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.429559] ================================================================== [ 22.357271] ================================================================== [ 22.364143] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.371691] Write of size 1 at addr ffff0008033108f0 by task kunit_try_catch/205 [ 22.379069] [ 22.380555] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.380605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.380620] Hardware name: WinLink E850-96 board (DT) [ 22.380638] Call trace: [ 22.380650] show_stack+0x20/0x38 (C) [ 22.380681] dump_stack_lvl+0x8c/0xd0 [ 22.380720] print_report+0x118/0x608 [ 22.380752] kasan_report+0xdc/0x128 [ 22.380781] __asan_report_store1_noabort+0x20/0x30 [ 22.380820] krealloc_more_oob_helper+0x5c0/0x678 [ 22.380849] krealloc_more_oob+0x20/0x38 [ 22.380875] kunit_try_run_case+0x170/0x3f0 [ 22.380911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.380947] kthread+0x328/0x630 [ 22.380980] ret_from_fork+0x10/0x20 [ 22.381015] [ 22.447905] Allocated by task 205: [ 22.451293] kasan_save_stack+0x3c/0x68 [ 22.455110] kasan_save_track+0x20/0x40 [ 22.458929] kasan_save_alloc_info+0x40/0x58 [ 22.463183] __kasan_krealloc+0x118/0x178 [ 22.467176] krealloc_noprof+0x128/0x360 [ 22.471082] krealloc_more_oob_helper+0x168/0x678 [ 22.475769] krealloc_more_oob+0x20/0x38 [ 22.479675] kunit_try_run_case+0x170/0x3f0 [ 22.483842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.489311] kthread+0x328/0x630 [ 22.492523] ret_from_fork+0x10/0x20 [ 22.496082] [ 22.497558] The buggy address belongs to the object at ffff000803310800 [ 22.497558] which belongs to the cache kmalloc-256 of size 256 [ 22.510059] The buggy address is located 5 bytes to the right of [ 22.510059] allocated 235-byte region [ffff000803310800, ffff0008033108eb) [ 22.522990] [ 22.524468] The buggy address belongs to the physical page: [ 22.530027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 22.538008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.545648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.552594] page_type: f5(slab) [ 22.555729] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.563448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.571175] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.578986] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.586799] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 22.594611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.602416] page dumped because: kasan: bad access detected [ 22.607972] [ 22.609449] Memory state around the buggy address: [ 22.614229] ffff000803310780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.621432] ffff000803310800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.628635] >ffff000803310880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.635836] ^ [ 22.642698] ffff000803310900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.649902] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.657104] ================================================================== [ 22.048015] ================================================================== [ 22.057029] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.064580] Write of size 1 at addr ffff0008033108eb by task kunit_try_catch/205 [ 22.071956] [ 22.073442] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.073497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.073515] Hardware name: WinLink E850-96 board (DT) [ 22.073536] Call trace: [ 22.073549] show_stack+0x20/0x38 (C) [ 22.073585] dump_stack_lvl+0x8c/0xd0 [ 22.073623] print_report+0x118/0x608 [ 22.073658] kasan_report+0xdc/0x128 [ 22.073688] __asan_report_store1_noabort+0x20/0x30 [ 22.073725] krealloc_more_oob_helper+0x60c/0x678 [ 22.073756] krealloc_more_oob+0x20/0x38 [ 22.073782] kunit_try_run_case+0x170/0x3f0 [ 22.073818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.073859] kthread+0x328/0x630 [ 22.073893] ret_from_fork+0x10/0x20 [ 22.073928] [ 22.140793] Allocated by task 205: [ 22.144180] kasan_save_stack+0x3c/0x68 [ 22.147996] kasan_save_track+0x20/0x40 [ 22.151816] kasan_save_alloc_info+0x40/0x58 [ 22.156069] __kasan_krealloc+0x118/0x178 [ 22.160062] krealloc_noprof+0x128/0x360 [ 22.163968] krealloc_more_oob_helper+0x168/0x678 [ 22.168656] krealloc_more_oob+0x20/0x38 [ 22.172562] kunit_try_run_case+0x170/0x3f0 [ 22.176729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.182197] kthread+0x328/0x630 [ 22.185409] ret_from_fork+0x10/0x20 [ 22.188968] [ 22.190445] The buggy address belongs to the object at ffff000803310800 [ 22.190445] which belongs to the cache kmalloc-256 of size 256 [ 22.202945] The buggy address is located 0 bytes to the right of [ 22.202945] allocated 235-byte region [ffff000803310800, ffff0008033108eb) [ 22.215877] [ 22.217357] The buggy address belongs to the physical page: [ 22.222913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310 [ 22.230896] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.238537] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.245479] page_type: f5(slab) [ 22.248618] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.256335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.264061] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.271873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.279686] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff [ 22.287498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.295303] page dumped because: kasan: bad access detected [ 22.300860] [ 22.302336] Memory state around the buggy address: [ 22.307115] ffff000803310780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.314319] ffff000803310800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.321523] >ffff000803310880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.328723] ^ [ 22.335324] ffff000803310900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.342529] ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.349731] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 21.857317] ================================================================== [ 21.871702] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 21.878037] Read of size 1 at addr ffff000806430000 by task kunit_try_catch/203 [ 21.885327] [ 21.886815] CPU: 4 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.886869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.886887] Hardware name: WinLink E850-96 board (DT) [ 21.886907] Call trace: [ 21.886920] show_stack+0x20/0x38 (C) [ 21.886955] dump_stack_lvl+0x8c/0xd0 [ 21.886993] print_report+0x118/0x608 [ 21.887026] kasan_report+0xdc/0x128 [ 21.887059] __asan_report_load1_noabort+0x20/0x30 [ 21.887098] page_alloc_uaf+0x328/0x350 [ 21.887126] kunit_try_run_case+0x170/0x3f0 [ 21.887166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.887204] kthread+0x328/0x630 [ 21.887240] ret_from_fork+0x10/0x20 [ 21.887277] [ 21.949305] The buggy address belongs to the physical page: [ 21.954862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886430 [ 21.962845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.969355] page_type: f0(buddy) [ 21.972581] raw: 0bfffe0000000000 ffff00087f61bbe0 ffff00087f61bbe0 0000000000000000 [ 21.980297] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 21.988019] page dumped because: kasan: bad access detected [ 21.993571] [ 21.995049] Memory state around the buggy address: [ 21.999830] ffff00080642ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.007031] ffff00080642ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.014236] >ffff000806430000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.021436] ^ [ 22.024651] ffff000806430080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.031856] ffff000806430100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.039058] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 21.622309] ================================================================== [ 21.631432] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 21.636808] Free of addr ffff000803320001 by task kunit_try_catch/199 [ 21.643230] [ 21.644717] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.644770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.644789] Hardware name: WinLink E850-96 board (DT) [ 21.644811] Call trace: [ 21.644825] show_stack+0x20/0x38 (C) [ 21.644862] dump_stack_lvl+0x8c/0xd0 [ 21.644902] print_report+0x118/0x608 [ 21.644935] kasan_report_invalid_free+0xc0/0xe8 [ 21.644966] __kasan_kfree_large+0x5c/0xa8 [ 21.644998] free_large_kmalloc+0x64/0x190 [ 21.645038] kfree+0x270/0x3c8 [ 21.645062] kmalloc_large_invalid_free+0x108/0x270 [ 21.645100] kunit_try_run_case+0x170/0x3f0 [ 21.645137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.645173] kthread+0x328/0x630 [ 21.645208] ret_from_fork+0x10/0x20 [ 21.645242] [ 21.715715] The buggy address belongs to the physical page: [ 21.721271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883320 [ 21.729256] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.736893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.743837] page_type: f8(unknown) [ 21.747236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.754953] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.762683] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.770491] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.778304] head: 0bfffe0000000002 fffffdffe00cc801 00000000ffffffff 00000000ffffffff [ 21.786116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.793922] page dumped because: kasan: bad access detected [ 21.799479] [ 21.800954] Memory state around the buggy address: [ 21.805733] ffff00080331ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.812935] ffff00080331ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.820142] >ffff000803320000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.827341] ^ [ 21.830557] ffff000803320080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.837762] ffff000803320100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.844964] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 21.438786] ================================================================== [ 21.448619] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 21.455212] Read of size 1 at addr ffff000803150000 by task kunit_try_catch/197 [ 21.462505] [ 21.463991] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.464046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.464062] Hardware name: WinLink E850-96 board (DT) [ 21.464083] Call trace: [ 21.464097] show_stack+0x20/0x38 (C) [ 21.464135] dump_stack_lvl+0x8c/0xd0 [ 21.464173] print_report+0x118/0x608 [ 21.464204] kasan_report+0xdc/0x128 [ 21.464232] __asan_report_load1_noabort+0x20/0x30 [ 21.464270] kmalloc_large_uaf+0x2cc/0x2f8 [ 21.464302] kunit_try_run_case+0x170/0x3f0 [ 21.464339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.464376] kthread+0x328/0x630 [ 21.464411] ret_from_fork+0x10/0x20 [ 21.464445] [ 21.526741] The buggy address belongs to the physical page: [ 21.532299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150 [ 21.540282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.546806] raw: 0bfffe0000000000 fffffdffe00c5508 ffff00085af4d0c0 0000000000000000 [ 21.554522] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.562241] page dumped because: kasan: bad access detected [ 21.567797] [ 21.569274] Memory state around the buggy address: [ 21.574055] ffff00080314ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.581255] ffff00080314ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.588461] >ffff000803150000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.595661] ^ [ 21.598877] ffff000803150080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.606081] ffff000803150100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.613282] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 20.910416] ================================================================== [ 20.921201] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.928484] Write of size 1 at addr ffff0008031d9f00 by task kunit_try_catch/193 [ 20.935862] [ 20.937350] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.937405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.937421] Hardware name: WinLink E850-96 board (DT) [ 20.937441] Call trace: [ 20.937454] show_stack+0x20/0x38 (C) [ 20.937489] dump_stack_lvl+0x8c/0xd0 [ 20.937531] print_report+0x118/0x608 [ 20.937567] kasan_report+0xdc/0x128 [ 20.937596] __asan_report_store1_noabort+0x20/0x30 [ 20.937633] kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.937670] kunit_try_run_case+0x170/0x3f0 [ 20.937709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.937747] kthread+0x328/0x630 [ 20.937783] ret_from_fork+0x10/0x20 [ 20.937819] [ 21.000531] Allocated by task 193: [ 21.003920] kasan_save_stack+0x3c/0x68 [ 21.007736] kasan_save_track+0x20/0x40 [ 21.011555] kasan_save_alloc_info+0x40/0x58 [ 21.015809] __kasan_kmalloc+0xd4/0xd8 [ 21.019541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.024055] kmalloc_big_oob_right+0xb8/0x2f0 [ 21.028395] kunit_try_run_case+0x170/0x3f0 [ 21.032561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.038030] kthread+0x328/0x630 [ 21.041242] ret_from_fork+0x10/0x20 [ 21.044801] [ 21.046280] The buggy address belongs to the object at ffff0008031d8000 [ 21.046280] which belongs to the cache kmalloc-8k of size 8192 [ 21.058779] The buggy address is located 0 bytes to the right of [ 21.058779] allocated 7936-byte region [ffff0008031d8000, ffff0008031d9f00) [ 21.071797] [ 21.073278] The buggy address belongs to the physical page: [ 21.078833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831d8 [ 21.086818] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.094455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.101399] page_type: f5(slab) [ 21.104538] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.112255] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.119983] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.127793] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.135605] head: 0bfffe0000000003 fffffdffe00c7601 00000000ffffffff 00000000ffffffff [ 21.143417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.151223] page dumped because: kasan: bad access detected [ 21.156778] [ 21.158254] Memory state around the buggy address: [ 21.163036] ffff0008031d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.170238] ffff0008031d9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.177443] >ffff0008031d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.184643] ^ [ 21.187858] ffff0008031d9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195063] ffff0008031da000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.202264] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 20.444211] ================================================================== [ 20.453842] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.461911] Write of size 1 at addr ffff000801ed6278 by task kunit_try_catch/191 [ 20.469289] [ 20.470775] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.470829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.470846] Hardware name: WinLink E850-96 board (DT) [ 20.470866] Call trace: [ 20.470879] show_stack+0x20/0x38 (C) [ 20.470915] dump_stack_lvl+0x8c/0xd0 [ 20.470953] print_report+0x118/0x608 [ 20.470985] kasan_report+0xdc/0x128 [ 20.471016] __asan_report_store1_noabort+0x20/0x30 [ 20.471053] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.471085] kunit_try_run_case+0x170/0x3f0 [ 20.471123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.471160] kthread+0x328/0x630 [ 20.471196] ret_from_fork+0x10/0x20 [ 20.471231] [ 20.534741] Allocated by task 191: [ 20.538127] kasan_save_stack+0x3c/0x68 [ 20.541944] kasan_save_track+0x20/0x40 [ 20.545764] kasan_save_alloc_info+0x40/0x58 [ 20.550017] __kasan_kmalloc+0xd4/0xd8 [ 20.553750] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 20.559305] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.564426] kunit_try_run_case+0x170/0x3f0 [ 20.568593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574062] kthread+0x328/0x630 [ 20.577273] ret_from_fork+0x10/0x20 [ 20.580833] [ 20.582309] The buggy address belongs to the object at ffff000801ed6200 [ 20.582309] which belongs to the cache kmalloc-128 of size 128 [ 20.594811] The buggy address is located 0 bytes to the right of [ 20.594811] allocated 120-byte region [ffff000801ed6200, ffff000801ed6278) [ 20.607742] [ 20.609222] The buggy address belongs to the physical page: [ 20.614777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6 [ 20.622762] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.630400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.637343] page_type: f5(slab) [ 20.640482] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.648199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.655927] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.663737] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.671550] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff [ 20.679362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.687167] page dumped because: kasan: bad access detected [ 20.692723] [ 20.694198] Memory state around the buggy address: [ 20.698979] ffff000801ed6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.706182] ffff000801ed6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.713387] >ffff000801ed6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.720587] ^ [ 20.727709] ffff000801ed6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.734914] ffff000801ed6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.742116] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 20.144490] ================================================================== [ 20.153679] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 20.161049] Read of size 1 at addr ffff0008031b3000 by task kunit_try_catch/189 [ 20.168340] [ 20.169826] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.169880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.169896] Hardware name: WinLink E850-96 board (DT) [ 20.169918] Call trace: [ 20.169932] show_stack+0x20/0x38 (C) [ 20.169966] dump_stack_lvl+0x8c/0xd0 [ 20.170003] print_report+0x118/0x608 [ 20.170035] kasan_report+0xdc/0x128 [ 20.170065] __asan_report_load1_noabort+0x20/0x30 [ 20.170100] kmalloc_node_oob_right+0x2f4/0x330 [ 20.170131] kunit_try_run_case+0x170/0x3f0 [ 20.170169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.170207] kthread+0x328/0x630 [ 20.170240] ret_from_fork+0x10/0x20 [ 20.170276] [ 20.233009] Allocated by task 189: [ 20.236397] kasan_save_stack+0x3c/0x68 [ 20.240212] kasan_save_track+0x20/0x40 [ 20.244032] kasan_save_alloc_info+0x40/0x58 [ 20.248285] __kasan_kmalloc+0xd4/0xd8 [ 20.252018] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 20.256965] kmalloc_node_oob_right+0xbc/0x330 [ 20.261393] kunit_try_run_case+0x170/0x3f0 [ 20.265559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.271028] kthread+0x328/0x630 [ 20.274239] ret_from_fork+0x10/0x20 [ 20.277799] [ 20.279276] The buggy address belongs to the object at ffff0008031b2000 [ 20.279276] which belongs to the cache kmalloc-4k of size 4096 [ 20.291776] The buggy address is located 0 bytes to the right of [ 20.291776] allocated 4096-byte region [ffff0008031b2000, ffff0008031b3000) [ 20.304794] [ 20.306275] The buggy address belongs to the physical page: [ 20.311831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831b0 [ 20.319816] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.327453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.334396] page_type: f5(slab) [ 20.337535] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.345252] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.352979] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.360790] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.368603] head: 0bfffe0000000003 fffffdffe00c6c01 00000000ffffffff 00000000ffffffff [ 20.376415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.384220] page dumped because: kasan: bad access detected [ 20.389777] [ 20.391253] Memory state around the buggy address: [ 20.396031] ffff0008031b2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.403235] ffff0008031b2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.410441] >ffff0008031b3000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.417640] ^ [ 20.420856] ffff0008031b3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.428061] ffff0008031b3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.435263] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 19.877356] ================================================================== [ 19.886405] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 19.893257] Read of size 1 at addr ffff000800d6203f by task kunit_try_catch/187 [ 19.900547] [ 19.902038] CPU: 7 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.902096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.902112] Hardware name: WinLink E850-96 board (DT) [ 19.902134] Call trace: [ 19.902147] show_stack+0x20/0x38 (C) [ 19.902183] dump_stack_lvl+0x8c/0xd0 [ 19.902221] print_report+0x118/0x608 [ 19.902251] kasan_report+0xdc/0x128 [ 19.902284] __asan_report_load1_noabort+0x20/0x30 [ 19.902322] kmalloc_oob_left+0x2ec/0x320 [ 19.902354] kunit_try_run_case+0x170/0x3f0 [ 19.902390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.902431] kthread+0x328/0x630 [ 19.902468] ret_from_fork+0x10/0x20 [ 19.902503] [ 19.964696] Allocated by task 55: [ 19.967999] kasan_save_stack+0x3c/0x68 [ 19.971814] kasan_save_track+0x20/0x40 [ 19.975633] kasan_save_alloc_info+0x40/0x58 [ 19.979886] __kasan_kmalloc+0xd4/0xd8 [ 19.983619] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.989175] kvasprintf+0xe0/0x180 [ 19.992560] __kthread_create_on_node+0x16c/0x350 [ 19.997247] kthread_create_on_node+0xe4/0x130 [ 20.001676] create_worker+0x380/0x6b8 [ 20.005407] worker_thread+0x808/0xf38 [ 20.009140] kthread+0x328/0x630 [ 20.012351] ret_from_fork+0x10/0x20 [ 20.015910] [ 20.017387] The buggy address belongs to the object at ffff000800d62020 [ 20.017387] which belongs to the cache kmalloc-16 of size 16 [ 20.029714] The buggy address is located 18 bytes to the right of [ 20.029714] allocated 13-byte region [ffff000800d62020, ffff000800d6202d) [ 20.042646] [ 20.044126] The buggy address belongs to the physical page: [ 20.049681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62 [ 20.057667] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.064175] page_type: f5(slab) [ 20.067314] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 20.075031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.082749] page dumped because: kasan: bad access detected [ 20.088306] [ 20.089782] Memory state around the buggy address: [ 20.094563] ffff000800d61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.101763] ffff000800d61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.108969] >ffff000800d62000: 00 04 fc fc 00 05 fc fc 00 07 fc fc fc fc fc fc [ 20.116169] ^ [ 20.121209] ffff000800d62080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128412] ffff000800d62100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.135615] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 19.283004] ================================================================== [ 19.290143] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.297085] Write of size 1 at addr ffff000801b46178 by task kunit_try_catch/185 [ 19.304462] [ 19.305947] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.305999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.306013] Hardware name: WinLink E850-96 board (DT) [ 19.306032] Call trace: [ 19.306042] show_stack+0x20/0x38 (C) [ 19.306077] dump_stack_lvl+0x8c/0xd0 [ 19.306112] print_report+0x118/0x608 [ 19.306141] kasan_report+0xdc/0x128 [ 19.306168] __asan_report_store1_noabort+0x20/0x30 [ 19.306200] kmalloc_oob_right+0x538/0x660 [ 19.306232] kunit_try_run_case+0x170/0x3f0 [ 19.306268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.306305] kthread+0x328/0x630 [ 19.306339] ret_from_fork+0x10/0x20 [ 19.306374] [ 19.368784] Allocated by task 185: [ 19.372171] kasan_save_stack+0x3c/0x68 [ 19.375989] kasan_save_track+0x20/0x40 [ 19.379809] kasan_save_alloc_info+0x40/0x58 [ 19.384062] __kasan_kmalloc+0xd4/0xd8 [ 19.387795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.392309] kmalloc_oob_right+0xb0/0x660 [ 19.396302] kunit_try_run_case+0x170/0x3f0 [ 19.400468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.405937] kthread+0x328/0x630 [ 19.409149] ret_from_fork+0x10/0x20 [ 19.412708] [ 19.414183] The buggy address belongs to the object at ffff000801b46100 [ 19.414183] which belongs to the cache kmalloc-128 of size 128 [ 19.426685] The buggy address is located 5 bytes to the right of [ 19.426685] allocated 115-byte region [ffff000801b46100, ffff000801b46173) [ 19.439617] [ 19.441093] The buggy address belongs to the physical page: [ 19.446652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46 [ 19.454636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.462273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.469219] page_type: f5(slab) [ 19.472352] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.480075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.487801] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.495613] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.503426] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff [ 19.511237] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.519043] page dumped because: kasan: bad access detected [ 19.524598] [ 19.526074] Memory state around the buggy address: [ 19.530853] ffff000801b46000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.538057] ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545261] >ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.552462] ^ [ 19.559584] ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566790] ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.573990] ================================================================== [ 19.581362] ================================================================== [ 19.588402] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.595344] Read of size 1 at addr ffff000801b46180 by task kunit_try_catch/185 [ 19.602636] [ 19.604119] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.604164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.604178] Hardware name: WinLink E850-96 board (DT) [ 19.604196] Call trace: [ 19.604210] show_stack+0x20/0x38 (C) [ 19.604245] dump_stack_lvl+0x8c/0xd0 [ 19.604280] print_report+0x118/0x608 [ 19.604308] kasan_report+0xdc/0x128 [ 19.604339] __asan_report_load1_noabort+0x20/0x30 [ 19.604373] kmalloc_oob_right+0x5d0/0x660 [ 19.604406] kunit_try_run_case+0x170/0x3f0 [ 19.604441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.604477] kthread+0x328/0x630 [ 19.604509] ret_from_fork+0x10/0x20 [ 19.604541] [ 19.666870] Allocated by task 185: [ 19.670256] kasan_save_stack+0x3c/0x68 [ 19.674075] kasan_save_track+0x20/0x40 [ 19.677896] kasan_save_alloc_info+0x40/0x58 [ 19.682148] __kasan_kmalloc+0xd4/0xd8 [ 19.685880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.690395] kmalloc_oob_right+0xb0/0x660 [ 19.694387] kunit_try_run_case+0x170/0x3f0 [ 19.698554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.704023] kthread+0x328/0x630 [ 19.707234] ret_from_fork+0x10/0x20 [ 19.710794] [ 19.712269] The buggy address belongs to the object at ffff000801b46100 [ 19.712269] which belongs to the cache kmalloc-128 of size 128 [ 19.724769] The buggy address is located 13 bytes to the right of [ 19.724769] allocated 115-byte region [ffff000801b46100, ffff000801b46173) [ 19.737789] [ 19.739265] The buggy address belongs to the physical page: [ 19.744823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46 [ 19.752807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.760446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.767390] page_type: f5(slab) [ 19.770525] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.778247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.785974] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.793785] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.801598] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff [ 19.809410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.817216] page dumped because: kasan: bad access detected [ 19.822771] [ 19.824246] Memory state around the buggy address: [ 19.829025] ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.836229] ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.843434] >ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.850635] ^ [ 19.853850] ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.861055] ffff000801b46280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.868257] ================================================================== [ 18.981515] ================================================================== [ 18.988067] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.995010] Write of size 1 at addr ffff000801b46173 by task kunit_try_catch/185 [ 19.002384] [ 19.003871] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G N 6.15.4-rc3 #1 PREEMPT [ 19.003921] Tainted: [N]=TEST [ 19.003935] Hardware name: WinLink E850-96 board (DT) [ 19.003957] Call trace: [ 19.003970] show_stack+0x20/0x38 (C) [ 19.004006] dump_stack_lvl+0x8c/0xd0 [ 19.004045] print_report+0x118/0x608 [ 19.004080] kasan_report+0xdc/0x128 [ 19.004110] __asan_report_store1_noabort+0x20/0x30 [ 19.004147] kmalloc_oob_right+0x5a4/0x660 [ 19.004179] kunit_try_run_case+0x170/0x3f0 [ 19.004216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.004255] kthread+0x328/0x630 [ 19.004289] ret_from_fork+0x10/0x20 [ 19.004325] [ 19.065493] Allocated by task 185: [ 19.068880] kasan_save_stack+0x3c/0x68 [ 19.072695] kasan_save_track+0x20/0x40 [ 19.076515] kasan_save_alloc_info+0x40/0x58 [ 19.080768] __kasan_kmalloc+0xd4/0xd8 [ 19.084501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.089015] kmalloc_oob_right+0xb0/0x660 [ 19.093007] kunit_try_run_case+0x170/0x3f0 [ 19.097174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.102643] kthread+0x328/0x630 [ 19.105855] ret_from_fork+0x10/0x20 [ 19.109414] [ 19.110891] The buggy address belongs to the object at ffff000801b46100 [ 19.110891] which belongs to the cache kmalloc-128 of size 128 [ 19.123391] The buggy address is located 0 bytes to the right of [ 19.123391] allocated 115-byte region [ffff000801b46100, ffff000801b46173) [ 19.136323] [ 19.137802] The buggy address belongs to the physical page: [ 19.143359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46 [ 19.151343] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.158981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.165925] page_type: f5(slab) [ 19.169062] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.176780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.184507] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.192318] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.200131] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff [ 19.207943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.215749] page dumped because: kasan: bad access detected [ 19.221306] [ 19.222780] Memory state around the buggy address: [ 19.227562] ffff000801b46000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.234763] ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.241969] >ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.249168] ^ [ 19.256030] ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.263236] ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.270435] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 163.488281] WARNING: CPU: 2 PID: 705 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 163.495744] Modules linked in: [ 163.498793] CPU: 2 UID: 0 PID: 705 Comm: kunit_try_catch Tainted: G B D W N 6.15.4-rc3 #1 PREEMPT [ 163.508693] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 163.514493] Hardware name: WinLink E850-96 board (DT) [ 163.519531] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 163.526471] pc : intlog10+0x38/0x48 [ 163.529943] lr : intlog10_test+0xe4/0x200 [ 163.533937] sp : ffff80008ab57c10 [ 163.537236] x29: ffff80008ab57c90 x28: 0000000000000000 x27: 0000000000000000 [ 163.544352] x26: 1fffe0010037d3a1 x25: 0000000000000000 x24: ffff80008ab57ce0 [ 163.551472] x23: ffff80008ab57d00 x22: 0000000000000000 x21: 1ffff0001156af82 [ 163.558588] x20: ffff800083c35180 x19: ffff800087bc7990 x18: 0000000021d23619 [ 163.565706] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 163.572824] x14: 00000000f1f1f1f1 x13: 1fffe0010b5f19e0 x12: ffff700010f39b71 [ 163.579942] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff8000812147c4 [ 163.587060] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 163.594178] x5 : ffff70001156af82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a30 [ 163.601296] x2 : 1ffff00010786a30 x1 : 0000000000000003 x0 : 0000000000000000 [ 163.608416] Call trace: [ 163.610848] intlog10+0x38/0x48 (P) [ 163.614320] kunit_try_run_case+0x170/0x3f0 [ 163.618483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 163.623952] kthread+0x328/0x630 [ 163.627165] ret_from_fork+0x10/0x20 [ 163.630727] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 163.285854] WARNING: CPU: 3 PID: 687 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 163.293142] Modules linked in: [ 163.296192] CPU: 3 UID: 0 PID: 687 Comm: kunit_try_catch Tainted: G B D N 6.15.4-rc3 #1 PREEMPT [ 163.306087] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 163.311023] Hardware name: WinLink E850-96 board (DT) [ 163.316062] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 163.323003] pc : intlog2+0xd8/0xf8 [ 163.326387] lr : intlog2_test+0xe4/0x200 [ 163.330293] sp : ffff80008aa37c10 [ 163.333593] x29: ffff80008aa37c90 x28: 0000000000000000 x27: 0000000000000000 [ 163.340709] x26: 1fffe001002ed701 x25: 0000000000000000 x24: ffff80008aa37ce0 [ 163.347829] x23: ffff80008aa37d00 x22: 0000000000000000 x21: 1ffff00011546f82 [ 163.354946] x20: ffff800083c35080 x19: ffff800087bc7990 x18: ffff800087bc7b00 [ 163.362063] x17: 0000000000000001 x16: ffff00085afaefe0 x15: 0000000000000000 [ 163.369181] x14: 00000000f1f1f1f1 x13: 1fffe0010b5f5de0 x12: ffff700010f39b71 [ 163.376299] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff8000812149c4 [ 163.383417] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 163.390535] x5 : ffff700011546f82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a10 [ 163.397653] x2 : 1ffff00010786a10 x1 : 0000000000000003 x0 : 0000000000000000 [ 163.404774] Call trace: [ 163.407206] intlog2+0xd8/0xf8 (P) [ 163.410590] kunit_try_run_case+0x170/0x3f0 [ 163.414755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 163.420222] kthread+0x328/0x630 [ 163.423435] ret_from_fork+0x10/0x20 [ 163.426997] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)