Date
July 4, 2025, 3:11 p.m.
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 66.376846] ================================================================== [ 66.376979] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 66.376979] [ 66.377136] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#115): [ 66.378295] test_out_of_bounds_write+0x100/0x240 [ 66.382982] kunit_try_run_case+0x170/0x3f0 [ 66.387148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.392617] kthread+0x328/0x630 [ 66.395829] ret_from_fork+0x10/0x20 [ 66.399387] [ 66.400867] kfence-#115: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 66.400867] [ 66.410501] allocated by task 340 on cpu 5 at 66.376812s (0.033687s ago): [ 66.417287] test_alloc+0x29c/0x628 [ 66.420742] test_out_of_bounds_write+0xc8/0x240 [ 66.425342] kunit_try_run_case+0x170/0x3f0 [ 66.429509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.434977] kthread+0x328/0x630 [ 66.438189] ret_from_fork+0x10/0x20 [ 66.441750] [ 66.443236] CPU: 5 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 66.453131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.457289] Hardware name: WinLink E850-96 board (DT) [ 66.462324] ================================================================== [ 66.584835] ================================================================== [ 66.584974] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 66.584974] [ 66.585130] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#117): [ 66.586290] test_out_of_bounds_write+0x100/0x240 [ 66.590977] kunit_try_run_case+0x170/0x3f0 [ 66.595144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.600612] kthread+0x328/0x630 [ 66.603824] ret_from_fork+0x10/0x20 [ 66.607383] [ 66.608862] kfence-#117: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 66.608862] [ 66.617976] allocated by task 342 on cpu 4 at 66.584798s (0.033176s ago): [ 66.624761] test_alloc+0x230/0x628 [ 66.628216] test_out_of_bounds_write+0xc8/0x240 [ 66.632817] kunit_try_run_case+0x170/0x3f0 [ 66.636983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.642452] kthread+0x328/0x630 [ 66.645664] ret_from_fork+0x10/0x20 [ 66.649226] [ 66.650710] CPU: 4 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 66.660603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.664762] Hardware name: WinLink E850-96 board (DT) [ 66.669799] ==================================================================
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 161.451985] Internal error: Oops: 0000000096000005 [#1] SMP [ 161.457586] Modules linked in: [ 161.460631] CPU: 7 UID: 0 PID: 581 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 161.470525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 161.474682] Hardware name: WinLink E850-96 board (DT) [ 161.479720] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 161.486659] pc : kunit_test_null_dereference+0x70/0x170 [ 161.491868] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 161.497684] sp : ffff80008a447d30 [ 161.500982] x29: ffff80008a447d90 x28: 0000000000000000 x27: 0000000000000000 [ 161.508100] x26: 1fffe0010007e641 x25: 0000000000000000 x24: 0000000000000004 [ 161.515218] x23: ffff0008003f320c x22: ffff8000812024e0 x21: ffff000801370f88 [ 161.522336] x20: 1ffff00011488fa6 x19: ffff800087bc7990 x18: ffff800087bc7b00 [ 161.529454] x17: 0000000000000000 x16: ffff00085b036fe0 x15: ffff8000811f2d10 [ 161.536572] x14: ffff8000808d8bbc x13: 1fffe0010b606de0 x12: ffff6001012888b4 [ 161.543690] x11: 1fffe001012888b3 x10: ffff6001012888b3 x9 : ffff8000811f9948 [ 161.550808] x8 : ffff80008a447c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 161.557926] x5 : ffff700011488fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 161.565044] x2 : dfff800000000000 x1 : ffff000809443cc0 x0 : ffff800087bc7990 [ 161.572165] Call trace: [ 161.574595] kunit_test_null_dereference+0x70/0x170 (P) [ 161.579804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 161.585270] kthread+0x328/0x630 [ 161.588481] ret_from_fork+0x10/0x20 [ 161.592053] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 161.598123] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[ 228.626713] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 228.634952] SMP: stopping secondary CPUs [ 228.638876] Kernel Offset: disabled [ 228.642326] CPU features: 0x0400,00000000,01002650,0200721b [ 228.647882] Memory Limit: none [ 228.650952] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 98.524895] ================================================================== [ 98.525019] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 98.525019] [ 98.525165] Use-after-free read at 0x(____ptrval____) (in kfence-#198): [ 98.525272] test_krealloc+0x51c/0x830 [ 98.528415] kunit_try_run_case+0x170/0x3f0 [ 98.532582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.538050] kthread+0x328/0x630 [ 98.541263] ret_from_fork+0x10/0x20 [ 98.544821] [ 98.546301] kfence-#198: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 98.546301] [ 98.555935] allocated by task 386 on cpu 6 at 98.524798s (0.031135s ago): [ 98.562721] test_alloc+0x29c/0x628 [ 98.566175] test_krealloc+0xc0/0x830 [ 98.569821] kunit_try_run_case+0x170/0x3f0 [ 98.573988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.579458] kthread+0x328/0x630 [ 98.582668] ret_from_fork+0x10/0x20 [ 98.586227] [ 98.587705] freed by task 386 on cpu 6 at 98.524826s (0.062875s ago): [ 98.594145] krealloc_noprof+0x148/0x360 [ 98.598032] test_krealloc+0x1dc/0x830 [ 98.601765] kunit_try_run_case+0x170/0x3f0 [ 98.605931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.611400] kthread+0x328/0x630 [ 98.614612] ret_from_fork+0x10/0x20 [ 98.618173] [ 98.619658] CPU: 6 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 98.629555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 98.633710] Hardware name: WinLink E850-96 board (DT) [ 98.638747] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 98.300540] ================================================================== [ 98.300688] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 98.300688] [ 98.300846] Use-after-free read at 0x(____ptrval____) (in kfence-#196): [ 98.301740] test_memcache_typesafe_by_rcu+0x280/0x560 [ 98.306862] kunit_try_run_case+0x170/0x3f0 [ 98.311028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.316497] kthread+0x328/0x630 [ 98.319709] ret_from_fork+0x10/0x20 [ 98.323267] [ 98.324747] kfence-#196: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 98.324747] [ 98.333862] allocated by task 384 on cpu 1 at 98.248811s (0.085047s ago): [ 98.340646] test_alloc+0x230/0x628 [ 98.344102] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 98.349222] kunit_try_run_case+0x170/0x3f0 [ 98.353388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.358857] kthread+0x328/0x630 [ 98.362069] ret_from_fork+0x10/0x20 [ 98.365628] [ 98.367107] freed by task 384 on cpu 1 at 98.248827s (0.118278s ago): [ 98.373535] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 98.378649] kunit_try_run_case+0x170/0x3f0 [ 98.382816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.388286] kthread+0x328/0x630 [ 98.391496] ret_from_fork+0x10/0x20 [ 98.395056] [ 98.396543] CPU: 1 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 98.406437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 98.410594] Hardware name: WinLink E850-96 board (DT) [ 98.415632] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 74.750637] ================================================================== [ 74.750829] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 74.750829] [ 74.750980] Invalid read at 0x(____ptrval____): [ 74.752094] test_invalid_access+0xdc/0x1f0 [ 74.756327] kunit_try_run_case+0x170/0x3f0 [ 74.760470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.765925] kthread+0x328/0x630 [ 74.769133] ret_from_fork+0x10/0x20 [ 74.772694] [ 74.774154] CPU: 6 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 74.784078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.788238] Hardware name: WinLink E850-96 board (DT) [ 74.793272] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 74.404895] ================================================================== [ 74.405036] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 74.405036] [ 74.405179] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#191): [ 74.408870] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 74.414076] kunit_try_run_case+0x170/0x3f0 [ 74.418243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.423712] kthread+0x328/0x630 [ 74.426923] ret_from_fork+0x10/0x20 [ 74.430482] [ 74.431962] kfence-#191: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 74.431962] [ 74.441596] allocated by task 374 on cpu 6 at 74.404827s (0.036767s ago): [ 74.448377] test_alloc+0x29c/0x628 [ 74.451836] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 74.456958] kunit_try_run_case+0x170/0x3f0 [ 74.461124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.466593] kthread+0x328/0x630 [ 74.469805] ret_from_fork+0x10/0x20 [ 74.473364] [ 74.474842] freed by task 374 on cpu 6 at 74.404843s (0.069997s ago): [ 74.481276] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 74.486471] kunit_try_run_case+0x170/0x3f0 [ 74.490638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.496106] kthread+0x328/0x630 [ 74.499318] ret_from_fork+0x10/0x20 [ 74.502878] [ 74.504364] CPU: 6 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 74.514260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.518417] Hardware name: WinLink E850-96 board (DT) [ 74.523452] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 74.192861] ================================================================== [ 74.193009] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 74.193009] [ 74.193171] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#189): [ 74.194843] test_kmalloc_aligned_oob_read+0x238/0x468 [ 74.199965] kunit_try_run_case+0x170/0x3f0 [ 74.204131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.209600] kthread+0x328/0x630 [ 74.212811] ret_from_fork+0x10/0x20 [ 74.216370] [ 74.217850] kfence-#189: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 74.217850] [ 74.227484] allocated by task 372 on cpu 4 at 74.192820s (0.034661s ago): [ 74.234269] test_alloc+0x29c/0x628 [ 74.237725] test_kmalloc_aligned_oob_read+0x100/0x468 [ 74.242846] kunit_try_run_case+0x170/0x3f0 [ 74.247012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.252481] kthread+0x328/0x630 [ 74.255693] ret_from_fork+0x10/0x20 [ 74.259255] [ 74.260739] CPU: 4 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 74.270634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.274792] Hardware name: WinLink E850-96 board (DT) [ 74.279828] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 69.496877] ================================================================== [ 69.496998] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 69.496998] [ 69.497125] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#144): [ 69.497285] test_corruption+0x1d8/0x378 [ 69.500832] kunit_try_run_case+0x170/0x3f0 [ 69.504999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.510468] kthread+0x328/0x630 [ 69.513679] ret_from_fork+0x10/0x20 [ 69.517239] [ 69.518717] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.518717] [ 69.527831] allocated by task 362 on cpu 0 at 69.496819s (0.031010s ago): [ 69.534611] test_alloc+0x230/0x628 [ 69.538071] test_corruption+0x198/0x378 [ 69.541979] kunit_try_run_case+0x170/0x3f0 [ 69.546144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.551613] kthread+0x328/0x630 [ 69.554825] ret_from_fork+0x10/0x20 [ 69.558383] [ 69.559863] freed by task 362 on cpu 0 at 69.496833s (0.063026s ago): [ 69.566295] test_corruption+0x1d8/0x378 [ 69.570189] kunit_try_run_case+0x170/0x3f0 [ 69.574356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.579824] kthread+0x328/0x630 [ 69.583036] ret_from_fork+0x10/0x20 [ 69.586595] [ 69.588080] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 69.597976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.602135] Hardware name: WinLink E850-96 board (DT) [ 69.607171] ================================================================== [ 68.412864] ================================================================== [ 68.412992] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 68.412992] [ 68.413122] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#134): [ 68.415525] test_corruption+0x278/0x378 [ 68.419429] kunit_try_run_case+0x170/0x3f0 [ 68.423596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.429065] kthread+0x328/0x630 [ 68.432277] ret_from_fork+0x10/0x20 [ 68.435835] [ 68.437314] kfence-#134: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.437314] [ 68.446949] allocated by task 360 on cpu 6 at 68.412807s (0.034140s ago): [ 68.453730] test_alloc+0x29c/0x628 [ 68.457189] test_corruption+0xdc/0x378 [ 68.461009] kunit_try_run_case+0x170/0x3f0 [ 68.465176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.470646] kthread+0x328/0x630 [ 68.473855] ret_from_fork+0x10/0x20 [ 68.477416] [ 68.478893] freed by task 360 on cpu 6 at 68.412821s (0.066069s ago): [ 68.485328] test_corruption+0x278/0x378 [ 68.489220] kunit_try_run_case+0x170/0x3f0 [ 68.493387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.498855] kthread+0x328/0x630 [ 68.502067] ret_from_fork+0x10/0x20 [ 68.505628] [ 68.507114] CPU: 6 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 68.517007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.521166] Hardware name: WinLink E850-96 board (DT) [ 68.526202] ================================================================== [ 69.272860] ================================================================== [ 69.272995] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 69.272995] [ 69.273126] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#142): [ 69.275527] test_corruption+0x120/0x378 [ 69.279432] kunit_try_run_case+0x170/0x3f0 [ 69.283598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.289067] kthread+0x328/0x630 [ 69.292279] ret_from_fork+0x10/0x20 [ 69.295838] [ 69.297317] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.297317] [ 69.306431] allocated by task 362 on cpu 0 at 69.272800s (0.033628s ago): [ 69.313214] test_alloc+0x230/0x628 [ 69.316671] test_corruption+0xdc/0x378 [ 69.320490] kunit_try_run_case+0x170/0x3f0 [ 69.324657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.330127] kthread+0x328/0x630 [ 69.333337] ret_from_fork+0x10/0x20 [ 69.336896] [ 69.338376] freed by task 362 on cpu 0 at 69.272814s (0.065558s ago): [ 69.344810] test_corruption+0x120/0x378 [ 69.348701] kunit_try_run_case+0x170/0x3f0 [ 69.352868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.358337] kthread+0x328/0x630 [ 69.361549] ret_from_fork+0x10/0x20 [ 69.365109] [ 69.366594] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 69.376491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.380648] Hardware name: WinLink E850-96 board (DT) [ 69.385684] ================================================================== [ 68.948869] ================================================================== [ 68.949001] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 68.949001] [ 68.949132] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#139): [ 68.949293] test_corruption+0x284/0x378 [ 68.952834] kunit_try_run_case+0x170/0x3f0 [ 68.957001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.962469] kthread+0x328/0x630 [ 68.965681] ret_from_fork+0x10/0x20 [ 68.969240] [ 68.970719] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.970719] [ 68.980354] allocated by task 360 on cpu 6 at 68.948806s (0.031545s ago): [ 68.987135] test_alloc+0x29c/0x628 [ 68.990594] test_corruption+0x198/0x378 [ 68.994500] kunit_try_run_case+0x170/0x3f0 [ 68.998667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.004135] kthread+0x328/0x630 [ 69.007347] ret_from_fork+0x10/0x20 [ 69.010906] [ 69.012384] freed by task 360 on cpu 6 at 68.948821s (0.063561s ago): [ 69.018819] test_corruption+0x284/0x378 [ 69.022711] kunit_try_run_case+0x170/0x3f0 [ 69.026878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.032348] kthread+0x328/0x630 [ 69.035559] ret_from_fork+0x10/0x20 [ 69.039119] [ 69.040604] CPU: 6 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 69.050501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.054658] Hardware name: WinLink E850-96 board (DT) [ 69.059692] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 67.888864] ================================================================== [ 67.888993] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 67.888993] [ 67.889131] Invalid free of 0x(____ptrval____) (in kfence-#129): [ 67.889231] test_invalid_addr_free+0x1ac/0x238 [ 67.892739] kunit_try_run_case+0x170/0x3f0 [ 67.896906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.902375] kthread+0x328/0x630 [ 67.905587] ret_from_fork+0x10/0x20 [ 67.909145] [ 67.910624] kfence-#129: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.910624] [ 67.920261] allocated by task 356 on cpu 6 at 67.888815s (0.031441s ago): [ 67.927041] test_alloc+0x29c/0x628 [ 67.930501] test_invalid_addr_free+0xd4/0x238 [ 67.934926] kunit_try_run_case+0x170/0x3f0 [ 67.939093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.944561] kthread+0x328/0x630 [ 67.947773] ret_from_fork+0x10/0x20 [ 67.951335] [ 67.952820] CPU: 6 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 67.962716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.966872] Hardware name: WinLink E850-96 board (DT) [ 67.971909] ================================================================== [ 68.100875] ================================================================== [ 68.101004] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 68.101004] [ 68.101135] Invalid free of 0x(____ptrval____) (in kfence-#131): [ 68.101239] test_invalid_addr_free+0xec/0x238 [ 68.104576] kunit_try_run_case+0x170/0x3f0 [ 68.108743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.114212] kthread+0x328/0x630 [ 68.117424] ret_from_fork+0x10/0x20 [ 68.120983] [ 68.122462] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.122462] [ 68.131575] allocated by task 358 on cpu 7 at 68.100825s (0.030747s ago): [ 68.138354] test_alloc+0x230/0x628 [ 68.141815] test_invalid_addr_free+0xd4/0x238 [ 68.146243] kunit_try_run_case+0x170/0x3f0 [ 68.150409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.155877] kthread+0x328/0x630 [ 68.159089] ret_from_fork+0x10/0x20 [ 68.162651] [ 68.164136] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 68.174030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.178189] Hardware name: WinLink E850-96 board (DT) [ 68.183225] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 67.668877] ================================================================== [ 67.669006] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 67.669006] [ 67.669130] Invalid free of 0x(____ptrval____) (in kfence-#127): [ 67.669233] test_double_free+0x100/0x238 [ 67.671711] kunit_try_run_case+0x170/0x3f0 [ 67.675878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.681347] kthread+0x328/0x630 [ 67.684558] ret_from_fork+0x10/0x20 [ 67.688117] [ 67.689597] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.689597] [ 67.698710] allocated by task 354 on cpu 7 at 67.668808s (0.029900s ago): [ 67.705491] test_alloc+0x230/0x628 [ 67.708951] test_double_free+0xd4/0x238 [ 67.712856] kunit_try_run_case+0x170/0x3f0 [ 67.717023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.722492] kthread+0x328/0x630 [ 67.725703] ret_from_fork+0x10/0x20 [ 67.729264] [ 67.730740] freed by task 354 on cpu 7 at 67.668822s (0.061916s ago): [ 67.737173] test_double_free+0xf0/0x238 [ 67.741068] kunit_try_run_case+0x170/0x3f0 [ 67.745234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.750703] kthread+0x328/0x630 [ 67.753915] ret_from_fork+0x10/0x20 [ 67.757475] [ 67.758960] CPU: 7 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 67.768857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.773013] Hardware name: WinLink E850-96 board (DT) [ 67.778050] ================================================================== [ 67.448891] ================================================================== [ 67.449019] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 67.449019] [ 67.449147] Invalid free of 0x(____ptrval____) (in kfence-#125): [ 67.449247] test_double_free+0x1bc/0x238 [ 67.451724] kunit_try_run_case+0x170/0x3f0 [ 67.455891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.461360] kthread+0x328/0x630 [ 67.464571] ret_from_fork+0x10/0x20 [ 67.468130] [ 67.469610] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.469610] [ 67.479244] allocated by task 352 on cpu 6 at 67.448821s (0.030421s ago): [ 67.486024] test_alloc+0x29c/0x628 [ 67.489484] test_double_free+0xd4/0x238 [ 67.493390] kunit_try_run_case+0x170/0x3f0 [ 67.497557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.503025] kthread+0x328/0x630 [ 67.506239] ret_from_fork+0x10/0x20 [ 67.509796] [ 67.511275] freed by task 352 on cpu 6 at 67.448836s (0.062436s ago): [ 67.517709] test_double_free+0x1ac/0x238 [ 67.521689] kunit_try_run_case+0x170/0x3f0 [ 67.525855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.531324] kthread+0x328/0x630 [ 67.534535] ret_from_fork+0x10/0x20 [ 67.538096] [ 67.539581] CPU: 6 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 67.549475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.553634] Hardware name: WinLink E850-96 board (DT) [ 67.558671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 67.016865] ================================================================== [ 67.016994] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 67.016994] [ 67.017144] Use-after-free read at 0x(____ptrval____) (in kfence-#121): [ 67.017616] test_use_after_free_read+0x114/0x248 [ 67.022304] kunit_try_run_case+0x170/0x3f0 [ 67.026470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.031939] kthread+0x328/0x630 [ 67.035151] ret_from_fork+0x10/0x20 [ 67.038709] [ 67.040189] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.040189] [ 67.049302] allocated by task 346 on cpu 7 at 67.016811s (0.032489s ago): [ 67.056089] test_alloc+0x230/0x628 [ 67.059543] test_use_after_free_read+0xd0/0x248 [ 67.064144] kunit_try_run_case+0x170/0x3f0 [ 67.068310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.073779] kthread+0x328/0x630 [ 67.076990] ret_from_fork+0x10/0x20 [ 67.080551] [ 67.082026] freed by task 346 on cpu 7 at 67.016826s (0.065198s ago): [ 67.088459] test_use_after_free_read+0xf0/0x248 [ 67.093049] kunit_try_run_case+0x170/0x3f0 [ 67.097216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.102684] kthread+0x328/0x630 [ 67.105896] ret_from_fork+0x10/0x20 [ 67.109457] [ 67.110942] CPU: 7 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 67.120838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.124995] Hardware name: WinLink E850-96 board (DT) [ 67.130031] ================================================================== [ 66.792863] ================================================================== [ 66.792999] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 66.792999] [ 66.793152] Use-after-free read at 0x(____ptrval____) (in kfence-#119): [ 66.793620] test_use_after_free_read+0x114/0x248 [ 66.798307] kunit_try_run_case+0x170/0x3f0 [ 66.802474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.807943] kthread+0x328/0x630 [ 66.811155] ret_from_fork+0x10/0x20 [ 66.814713] [ 66.816193] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 66.816193] [ 66.825827] allocated by task 344 on cpu 5 at 66.792809s (0.033016s ago): [ 66.832611] test_alloc+0x29c/0x628 [ 66.836067] test_use_after_free_read+0xd0/0x248 [ 66.840668] kunit_try_run_case+0x170/0x3f0 [ 66.844836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.850303] kthread+0x328/0x630 [ 66.853515] ret_from_fork+0x10/0x20 [ 66.857075] [ 66.858552] freed by task 344 on cpu 5 at 66.792824s (0.065725s ago): [ 66.864985] test_use_after_free_read+0x1c0/0x248 [ 66.869661] kunit_try_run_case+0x170/0x3f0 [ 66.873827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.879296] kthread+0x328/0x630 [ 66.882508] ret_from_fork+0x10/0x20 [ 66.886068] [ 66.887554] CPU: 5 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 66.897448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.901606] Hardware name: WinLink E850-96 board (DT) [ 66.906643] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 65.644839] ================================================================== [ 65.644968] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 65.644968] [ 65.645120] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#108): [ 65.646199] test_out_of_bounds_read+0x1c8/0x3e0 [ 65.650800] kunit_try_run_case+0x170/0x3f0 [ 65.654966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.660435] kthread+0x328/0x630 [ 65.663647] ret_from_fork+0x10/0x20 [ 65.667206] [ 65.668685] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 65.668685] [ 65.678319] allocated by task 336 on cpu 6 at 65.644806s (0.033511s ago): [ 65.685103] test_alloc+0x29c/0x628 [ 65.688560] test_out_of_bounds_read+0x198/0x3e0 [ 65.693160] kunit_try_run_case+0x170/0x3f0 [ 65.697327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.702795] kthread+0x328/0x630 [ 65.706007] ret_from_fork+0x10/0x20 [ 65.709569] [ 65.711054] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 65.720948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.725106] Hardware name: WinLink E850-96 board (DT) [ 65.730143] ================================================================== [ 65.332853] ================================================================== [ 65.332983] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 65.332983] [ 65.333132] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#105): [ 65.334042] test_out_of_bounds_read+0x114/0x3e0 [ 65.338641] kunit_try_run_case+0x170/0x3f0 [ 65.342807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.348276] kthread+0x328/0x630 [ 65.351488] ret_from_fork+0x10/0x20 [ 65.355047] [ 65.356526] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 65.356526] [ 65.366161] allocated by task 336 on cpu 6 at 65.332818s (0.033340s ago): [ 65.372944] test_alloc+0x29c/0x628 [ 65.376401] test_out_of_bounds_read+0xdc/0x3e0 [ 65.380915] kunit_try_run_case+0x170/0x3f0 [ 65.385081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.390549] kthread+0x328/0x630 [ 65.393761] ret_from_fork+0x10/0x20 [ 65.397324] [ 65.398807] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 65.408702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.412860] Hardware name: WinLink E850-96 board (DT) [ 65.417896] ================================================================== [ 65.960857] ================================================================== [ 65.960983] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 65.960983] [ 65.961130] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#111): [ 65.962040] test_out_of_bounds_read+0x114/0x3e0 [ 65.966640] kunit_try_run_case+0x170/0x3f0 [ 65.970807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.976275] kthread+0x328/0x630 [ 65.979487] ret_from_fork+0x10/0x20 [ 65.983046] [ 65.984525] kfence-#111: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 65.984525] [ 65.993639] allocated by task 338 on cpu 7 at 65.960824s (0.032812s ago): [ 66.000424] test_alloc+0x230/0x628 [ 66.003879] test_out_of_bounds_read+0xdc/0x3e0 [ 66.008393] kunit_try_run_case+0x170/0x3f0 [ 66.012560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.018029] kthread+0x328/0x630 [ 66.021240] ret_from_fork+0x10/0x20 [ 66.024801] [ 66.026286] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 66.036180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.040340] Hardware name: WinLink E850-96 board (DT) [ 66.045375] ================================================================== [ 66.168865] ================================================================== [ 66.168992] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 66.168992] [ 66.169141] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#113): [ 66.170224] test_out_of_bounds_read+0x1c8/0x3e0 [ 66.174822] kunit_try_run_case+0x170/0x3f0 [ 66.178989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.184458] kthread+0x328/0x630 [ 66.187669] ret_from_fork+0x10/0x20 [ 66.191228] [ 66.192708] kfence-#113: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 66.192708] [ 66.201821] allocated by task 338 on cpu 7 at 66.168831s (0.032988s ago): [ 66.208605] test_alloc+0x230/0x628 [ 66.212061] test_out_of_bounds_read+0x198/0x3e0 [ 66.216662] kunit_try_run_case+0x170/0x3f0 [ 66.220829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.226297] kthread+0x328/0x630 [ 66.229509] ret_from_fork+0x10/0x20 [ 66.233069] [ 66.234555] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 66.244449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.248607] Hardware name: WinLink E850-96 board (DT) [ 66.253643] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 18.670968] ================================================================== [ 18.693704] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 18.693704] [ 18.703250] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#37): [ 18.712627] kmalloc_track_caller_oob_right+0x224/0x488 [ 18.717833] kunit_try_run_case+0x170/0x3f0 [ 18.722000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.727469] kthread+0x328/0x630 [ 18.730681] ret_from_fork+0x10/0x20 [ 18.734239] [ 18.735719] kfence-#37: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 18.735719] [ 18.745440] allocated by task 191 on cpu 2 at 18.670620s (0.074817s ago): [ 18.752225] kmalloc_track_caller_oob_right+0x184/0x488 [ 18.757416] kunit_try_run_case+0x170/0x3f0 [ 18.761583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.767052] kthread+0x328/0x630 [ 18.770263] ret_from_fork+0x10/0x20 [ 18.773822] [ 18.775301] freed by task 191 on cpu 2 at 18.670936s (0.104361s ago): [ 18.781733] kmalloc_track_caller_oob_right+0x224/0x488 [ 18.786929] kunit_try_run_case+0x170/0x3f0 [ 18.791096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.796565] kthread+0x328/0x630 [ 18.799777] ret_from_fork+0x10/0x20 [ 18.803337] [ 18.804821] CPU: 2 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.814717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.818875] Hardware name: WinLink E850-96 board (DT) [ 18.823911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 64.686326] ================================================================== [ 64.693434] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 64.700376] Write of size 1 at addr ffff0008018e7578 by task kunit_try_catch/334 [ 64.707754] [ 64.709238] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 64.709287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.709306] Hardware name: WinLink E850-96 board (DT) [ 64.709328] Call trace: [ 64.709340] show_stack+0x20/0x38 (C) [ 64.709376] dump_stack_lvl+0x8c/0xd0 [ 64.709412] print_report+0x118/0x608 [ 64.709444] kasan_report+0xdc/0x128 [ 64.709472] __asan_report_store1_noabort+0x20/0x30 [ 64.709507] strncpy_from_user+0x270/0x2a0 [ 64.709536] copy_user_test_oob+0x5c0/0xec8 [ 64.709566] kunit_try_run_case+0x170/0x3f0 [ 64.709599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.709638] kthread+0x328/0x630 [ 64.709671] ret_from_fork+0x10/0x20 [ 64.709707] [ 64.776242] Allocated by task 334: [ 64.779629] kasan_save_stack+0x3c/0x68 [ 64.783447] kasan_save_track+0x20/0x40 [ 64.787267] kasan_save_alloc_info+0x40/0x58 [ 64.791520] __kasan_kmalloc+0xd4/0xd8 [ 64.795253] __kmalloc_noprof+0x198/0x4c8 [ 64.799246] kunit_kmalloc_array+0x34/0x88 [ 64.803326] copy_user_test_oob+0xac/0xec8 [ 64.807405] kunit_try_run_case+0x170/0x3f0 [ 64.811572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.817040] kthread+0x328/0x630 [ 64.820252] ret_from_fork+0x10/0x20 [ 64.823811] [ 64.825287] The buggy address belongs to the object at ffff0008018e7500 [ 64.825287] which belongs to the cache kmalloc-128 of size 128 [ 64.837787] The buggy address is located 0 bytes to the right of [ 64.837787] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 64.850721] [ 64.852197] The buggy address belongs to the physical page: [ 64.857753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 64.865738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.873376] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.880321] page_type: f5(slab) [ 64.883454] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.891178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.898905] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.906716] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.914529] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 64.922342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.930147] page dumped because: kasan: bad access detected [ 64.935702] [ 64.937177] Memory state around the buggy address: [ 64.941956] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.949162] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.956365] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.963566] ^ [ 64.970688] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.977893] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.985094] ================================================================== [ 64.377489] ================================================================== [ 64.384586] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 64.391440] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 64.398991] [ 64.400475] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 64.400525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.400543] Hardware name: WinLink E850-96 board (DT) [ 64.400562] Call trace: [ 64.400573] show_stack+0x20/0x38 (C) [ 64.400606] dump_stack_lvl+0x8c/0xd0 [ 64.400640] print_report+0x118/0x608 [ 64.400672] kasan_report+0xdc/0x128 [ 64.400698] kasan_check_range+0x100/0x1a8 [ 64.400730] __kasan_check_write+0x20/0x30 [ 64.400760] strncpy_from_user+0x3c/0x2a0 [ 64.400790] copy_user_test_oob+0x5c0/0xec8 [ 64.400818] kunit_try_run_case+0x170/0x3f0 [ 64.400855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.400891] kthread+0x328/0x630 [ 64.400924] ret_from_fork+0x10/0x20 [ 64.400957] [ 64.470691] Allocated by task 334: [ 64.474079] kasan_save_stack+0x3c/0x68 [ 64.477896] kasan_save_track+0x20/0x40 [ 64.481716] kasan_save_alloc_info+0x40/0x58 [ 64.485969] __kasan_kmalloc+0xd4/0xd8 [ 64.489702] __kmalloc_noprof+0x198/0x4c8 [ 64.493695] kunit_kmalloc_array+0x34/0x88 [ 64.497775] copy_user_test_oob+0xac/0xec8 [ 64.501854] kunit_try_run_case+0x170/0x3f0 [ 64.506021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.511490] kthread+0x328/0x630 [ 64.514701] ret_from_fork+0x10/0x20 [ 64.518260] [ 64.519736] The buggy address belongs to the object at ffff0008018e7500 [ 64.519736] which belongs to the cache kmalloc-128 of size 128 [ 64.532236] The buggy address is located 0 bytes inside of [ 64.532236] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 64.544649] [ 64.546125] The buggy address belongs to the physical page: [ 64.551683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 64.559668] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.567306] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.574250] page_type: f5(slab) [ 64.577384] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.585106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.592833] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.600644] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.608457] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 64.616271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.624075] page dumped because: kasan: bad access detected [ 64.629630] [ 64.631106] Memory state around the buggy address: [ 64.635887] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.643088] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.650294] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.657494] ^ [ 64.664616] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.671821] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.679022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 62.852955] ================================================================== [ 62.859959] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 62.866986] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 62.874448] [ 62.875935] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 62.875989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.876007] Hardware name: WinLink E850-96 board (DT) [ 62.876030] Call trace: [ 62.876043] show_stack+0x20/0x38 (C) [ 62.876076] dump_stack_lvl+0x8c/0xd0 [ 62.876114] print_report+0x118/0x608 [ 62.876146] kasan_report+0xdc/0x128 [ 62.876178] kasan_check_range+0x100/0x1a8 [ 62.876213] __kasan_check_read+0x20/0x30 [ 62.876248] copy_user_test_oob+0x728/0xec8 [ 62.876277] kunit_try_run_case+0x170/0x3f0 [ 62.876312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.876350] kthread+0x328/0x630 [ 62.876384] ret_from_fork+0x10/0x20 [ 62.876421] [ 62.942069] Allocated by task 334: [ 62.945458] kasan_save_stack+0x3c/0x68 [ 62.949273] kasan_save_track+0x20/0x40 [ 62.953093] kasan_save_alloc_info+0x40/0x58 [ 62.957346] __kasan_kmalloc+0xd4/0xd8 [ 62.961079] __kmalloc_noprof+0x198/0x4c8 [ 62.965072] kunit_kmalloc_array+0x34/0x88 [ 62.969151] copy_user_test_oob+0xac/0xec8 [ 62.973231] kunit_try_run_case+0x170/0x3f0 [ 62.977398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.982867] kthread+0x328/0x630 [ 62.986080] ret_from_fork+0x10/0x20 [ 62.989637] [ 62.991115] The buggy address belongs to the object at ffff0008018e7500 [ 62.991115] which belongs to the cache kmalloc-128 of size 128 [ 63.003614] The buggy address is located 0 bytes inside of [ 63.003614] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 63.016026] [ 63.017505] The buggy address belongs to the physical page: [ 63.023060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 63.031045] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.038684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.045626] page_type: f5(slab) [ 63.048762] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.056485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.064210] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.072021] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.079834] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 63.087646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.095453] page dumped because: kasan: bad access detected [ 63.101007] [ 63.102482] Memory state around the buggy address: [ 63.107263] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.114466] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.121674] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.128871] ^ [ 63.135993] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.143198] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.150400] ================================================================== [ 62.542566] ================================================================== [ 62.554927] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 62.561955] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 62.569505] [ 62.570992] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 62.571046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.571063] Hardware name: WinLink E850-96 board (DT) [ 62.571087] Call trace: [ 62.571102] show_stack+0x20/0x38 (C) [ 62.571138] dump_stack_lvl+0x8c/0xd0 [ 62.571176] print_report+0x118/0x608 [ 62.571207] kasan_report+0xdc/0x128 [ 62.571237] kasan_check_range+0x100/0x1a8 [ 62.571273] __kasan_check_write+0x20/0x30 [ 62.571307] copy_user_test_oob+0x234/0xec8 [ 62.571341] kunit_try_run_case+0x170/0x3f0 [ 62.571378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.571417] kthread+0x328/0x630 [ 62.571453] ret_from_fork+0x10/0x20 [ 62.571491] [ 62.637212] Allocated by task 334: [ 62.640601] kasan_save_stack+0x3c/0x68 [ 62.644417] kasan_save_track+0x20/0x40 [ 62.648238] kasan_save_alloc_info+0x40/0x58 [ 62.652490] __kasan_kmalloc+0xd4/0xd8 [ 62.656222] __kmalloc_noprof+0x198/0x4c8 [ 62.660215] kunit_kmalloc_array+0x34/0x88 [ 62.664295] copy_user_test_oob+0xac/0xec8 [ 62.668375] kunit_try_run_case+0x170/0x3f0 [ 62.672541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.678010] kthread+0x328/0x630 [ 62.681223] ret_from_fork+0x10/0x20 [ 62.684781] [ 62.686258] The buggy address belongs to the object at ffff0008018e7500 [ 62.686258] which belongs to the cache kmalloc-128 of size 128 [ 62.698760] The buggy address is located 0 bytes inside of [ 62.698760] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 62.711169] [ 62.712649] The buggy address belongs to the physical page: [ 62.718206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 62.726188] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.733828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.740770] page_type: f5(slab) [ 62.743910] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.751627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.759354] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.767166] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.774978] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 62.782789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.790595] page dumped because: kasan: bad access detected [ 62.796151] [ 62.797626] Memory state around the buggy address: [ 62.802407] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.809609] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.816817] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.824015] ^ [ 62.831138] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.838343] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.845543] ================================================================== [ 64.072900] ================================================================== [ 64.079732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 64.086757] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 64.094222] [ 64.095706] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 64.095759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.095778] Hardware name: WinLink E850-96 board (DT) [ 64.095798] Call trace: [ 64.095812] show_stack+0x20/0x38 (C) [ 64.095845] dump_stack_lvl+0x8c/0xd0 [ 64.095882] print_report+0x118/0x608 [ 64.095912] kasan_report+0xdc/0x128 [ 64.095943] kasan_check_range+0x100/0x1a8 [ 64.095974] __kasan_check_read+0x20/0x30 [ 64.096008] copy_user_test_oob+0x4a0/0xec8 [ 64.096037] kunit_try_run_case+0x170/0x3f0 [ 64.096071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.096109] kthread+0x328/0x630 [ 64.096142] ret_from_fork+0x10/0x20 [ 64.096176] [ 64.161842] Allocated by task 334: [ 64.165231] kasan_save_stack+0x3c/0x68 [ 64.169046] kasan_save_track+0x20/0x40 [ 64.172866] kasan_save_alloc_info+0x40/0x58 [ 64.177120] __kasan_kmalloc+0xd4/0xd8 [ 64.180852] __kmalloc_noprof+0x198/0x4c8 [ 64.184845] kunit_kmalloc_array+0x34/0x88 [ 64.188925] copy_user_test_oob+0xac/0xec8 [ 64.193005] kunit_try_run_case+0x170/0x3f0 [ 64.197171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.202640] kthread+0x328/0x630 [ 64.205851] ret_from_fork+0x10/0x20 [ 64.209411] [ 64.210886] The buggy address belongs to the object at ffff0008018e7500 [ 64.210886] which belongs to the cache kmalloc-128 of size 128 [ 64.223387] The buggy address is located 0 bytes inside of [ 64.223387] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 64.235799] [ 64.237277] The buggy address belongs to the physical page: [ 64.242835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 64.250818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.258457] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.265400] page_type: f5(slab) [ 64.268536] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.276257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.283983] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.291795] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.299608] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 64.307420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.315225] page dumped because: kasan: bad access detected [ 64.320781] [ 64.322256] Memory state around the buggy address: [ 64.327036] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.334239] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.341444] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.348645] ^ [ 64.355767] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.362972] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.370174] ================================================================== [ 63.158048] ================================================================== [ 63.164816] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 63.171841] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 63.179391] [ 63.180878] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 63.180931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.180948] Hardware name: WinLink E850-96 board (DT) [ 63.180970] Call trace: [ 63.180985] show_stack+0x20/0x38 (C) [ 63.181019] dump_stack_lvl+0x8c/0xd0 [ 63.181056] print_report+0x118/0x608 [ 63.181088] kasan_report+0xdc/0x128 [ 63.181121] kasan_check_range+0x100/0x1a8 [ 63.181155] __kasan_check_write+0x20/0x30 [ 63.181187] copy_user_test_oob+0x35c/0xec8 [ 63.181215] kunit_try_run_case+0x170/0x3f0 [ 63.181252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.181292] kthread+0x328/0x630 [ 63.181325] ret_from_fork+0x10/0x20 [ 63.181360] [ 63.247099] Allocated by task 334: [ 63.250486] kasan_save_stack+0x3c/0x68 [ 63.254304] kasan_save_track+0x20/0x40 [ 63.258123] kasan_save_alloc_info+0x40/0x58 [ 63.262377] __kasan_kmalloc+0xd4/0xd8 [ 63.266109] __kmalloc_noprof+0x198/0x4c8 [ 63.270102] kunit_kmalloc_array+0x34/0x88 [ 63.274182] copy_user_test_oob+0xac/0xec8 [ 63.278263] kunit_try_run_case+0x170/0x3f0 [ 63.282428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.287897] kthread+0x328/0x630 [ 63.291109] ret_from_fork+0x10/0x20 [ 63.294668] [ 63.296143] The buggy address belongs to the object at ffff0008018e7500 [ 63.296143] which belongs to the cache kmalloc-128 of size 128 [ 63.308644] The buggy address is located 0 bytes inside of [ 63.308644] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 63.321056] [ 63.322535] The buggy address belongs to the physical page: [ 63.328092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 63.336075] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.343716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.350658] page_type: f5(slab) [ 63.353792] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.361513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.369240] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.377051] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.384864] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 63.392676] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.400482] page dumped because: kasan: bad access detected [ 63.406037] [ 63.407513] Memory state around the buggy address: [ 63.412295] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.419496] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.426702] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.433902] ^ [ 63.441023] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.448228] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.455431] ================================================================== [ 63.462784] ================================================================== [ 63.469841] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 63.476870] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 63.484335] [ 63.485820] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 63.485870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.485887] Hardware name: WinLink E850-96 board (DT) [ 63.485907] Call trace: [ 63.485921] show_stack+0x20/0x38 (C) [ 63.485954] dump_stack_lvl+0x8c/0xd0 [ 63.485991] print_report+0x118/0x608 [ 63.486021] kasan_report+0xdc/0x128 [ 63.486049] kasan_check_range+0x100/0x1a8 [ 63.486079] __kasan_check_read+0x20/0x30 [ 63.486111] copy_user_test_oob+0x3c8/0xec8 [ 63.486140] kunit_try_run_case+0x170/0x3f0 [ 63.486174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.486213] kthread+0x328/0x630 [ 63.486245] ret_from_fork+0x10/0x20 [ 63.486276] [ 63.551955] Allocated by task 334: [ 63.555343] kasan_save_stack+0x3c/0x68 [ 63.559160] kasan_save_track+0x20/0x40 [ 63.562979] kasan_save_alloc_info+0x40/0x58 [ 63.567233] __kasan_kmalloc+0xd4/0xd8 [ 63.570966] __kmalloc_noprof+0x198/0x4c8 [ 63.574958] kunit_kmalloc_array+0x34/0x88 [ 63.579038] copy_user_test_oob+0xac/0xec8 [ 63.583118] kunit_try_run_case+0x170/0x3f0 [ 63.587285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.592753] kthread+0x328/0x630 [ 63.595965] ret_from_fork+0x10/0x20 [ 63.599524] [ 63.601000] The buggy address belongs to the object at ffff0008018e7500 [ 63.601000] which belongs to the cache kmalloc-128 of size 128 [ 63.613500] The buggy address is located 0 bytes inside of [ 63.613500] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 63.625913] [ 63.627388] The buggy address belongs to the physical page: [ 63.632947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 63.640932] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.648570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.655514] page_type: f5(slab) [ 63.658647] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.666370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.674096] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.681908] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.689723] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 63.697533] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.705338] page dumped because: kasan: bad access detected [ 63.710894] [ 63.712369] Memory state around the buggy address: [ 63.717149] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.724353] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.731557] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.738758] ^ [ 63.745880] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.753085] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.760286] ================================================================== [ 63.767599] ================================================================== [ 63.774700] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 63.781728] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334 [ 63.789278] [ 63.790762] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 63.790816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.790833] Hardware name: WinLink E850-96 board (DT) [ 63.790854] Call trace: [ 63.790868] show_stack+0x20/0x38 (C) [ 63.790903] dump_stack_lvl+0x8c/0xd0 [ 63.790939] print_report+0x118/0x608 [ 63.790970] kasan_report+0xdc/0x128 [ 63.791000] kasan_check_range+0x100/0x1a8 [ 63.791032] __kasan_check_write+0x20/0x30 [ 63.791065] copy_user_test_oob+0x434/0xec8 [ 63.791094] kunit_try_run_case+0x170/0x3f0 [ 63.791129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.791167] kthread+0x328/0x630 [ 63.791199] ret_from_fork+0x10/0x20 [ 63.791233] [ 63.856985] Allocated by task 334: [ 63.860373] kasan_save_stack+0x3c/0x68 [ 63.864190] kasan_save_track+0x20/0x40 [ 63.868010] kasan_save_alloc_info+0x40/0x58 [ 63.872263] __kasan_kmalloc+0xd4/0xd8 [ 63.875996] __kmalloc_noprof+0x198/0x4c8 [ 63.879988] kunit_kmalloc_array+0x34/0x88 [ 63.884068] copy_user_test_oob+0xac/0xec8 [ 63.888148] kunit_try_run_case+0x170/0x3f0 [ 63.892315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.897783] kthread+0x328/0x630 [ 63.900995] ret_from_fork+0x10/0x20 [ 63.904555] [ 63.906030] The buggy address belongs to the object at ffff0008018e7500 [ 63.906030] which belongs to the cache kmalloc-128 of size 128 [ 63.918530] The buggy address is located 0 bytes inside of [ 63.918530] allocated 120-byte region [ffff0008018e7500, ffff0008018e7578) [ 63.930943] [ 63.932420] The buggy address belongs to the physical page: [ 63.937979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 63.945962] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.953600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.960544] page_type: f5(slab) [ 63.963679] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.971400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.979126] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.986938] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.994752] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 64.002565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.010370] page dumped because: kasan: bad access detected [ 64.015924] [ 64.017399] Memory state around the buggy address: [ 64.022179] ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.029383] ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.036587] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.043788] ^ [ 64.050910] ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.058116] ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.065317] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 61.917552] ================================================================== [ 61.931759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 61.939136] Read of size 8 at addr ffff000802678c78 by task kunit_try_catch/330 [ 61.946427] [ 61.947912] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 61.947969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.947987] Hardware name: WinLink E850-96 board (DT) [ 61.948010] Call trace: [ 61.948026] show_stack+0x20/0x38 (C) [ 61.948062] dump_stack_lvl+0x8c/0xd0 [ 61.948103] print_report+0x118/0x608 [ 61.948136] kasan_report+0xdc/0x128 [ 61.948167] __asan_report_load8_noabort+0x20/0x30 [ 61.948202] copy_to_kernel_nofault+0x204/0x250 [ 61.948232] copy_to_kernel_nofault_oob+0x158/0x418 [ 61.948271] kunit_try_run_case+0x170/0x3f0 [ 61.948307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.948346] kthread+0x328/0x630 [ 61.948380] ret_from_fork+0x10/0x20 [ 61.948416] [ 62.015956] Allocated by task 330: [ 62.019342] kasan_save_stack+0x3c/0x68 [ 62.023159] kasan_save_track+0x20/0x40 [ 62.026978] kasan_save_alloc_info+0x40/0x58 [ 62.031232] __kasan_kmalloc+0xd4/0xd8 [ 62.034964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.039478] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.044252] kunit_try_run_case+0x170/0x3f0 [ 62.048419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.053888] kthread+0x328/0x630 [ 62.057099] ret_from_fork+0x10/0x20 [ 62.060658] [ 62.062136] The buggy address belongs to the object at ffff000802678c00 [ 62.062136] which belongs to the cache kmalloc-128 of size 128 [ 62.074638] The buggy address is located 0 bytes to the right of [ 62.074638] allocated 120-byte region [ffff000802678c00, ffff000802678c78) [ 62.087568] [ 62.089047] The buggy address belongs to the physical page: [ 62.094605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 62.102587] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.110225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.117168] page_type: f5(slab) [ 62.120308] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.128025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.135753] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.143563] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.151376] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 62.159188] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.166993] page dumped because: kasan: bad access detected [ 62.172549] [ 62.174024] Memory state around the buggy address: [ 62.178807] ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.186008] ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.193215] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.200413] ^ [ 62.207535] ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.214740] ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.221942] ================================================================== [ 62.229672] ================================================================== [ 62.236357] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 62.243643] Write of size 8 at addr ffff000802678c78 by task kunit_try_catch/330 [ 62.251020] [ 62.252507] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 62.252560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.252579] Hardware name: WinLink E850-96 board (DT) [ 62.252601] Call trace: [ 62.252615] show_stack+0x20/0x38 (C) [ 62.252651] dump_stack_lvl+0x8c/0xd0 [ 62.252690] print_report+0x118/0x608 [ 62.252719] kasan_report+0xdc/0x128 [ 62.252748] kasan_check_range+0x100/0x1a8 [ 62.252784] __kasan_check_write+0x20/0x30 [ 62.252817] copy_to_kernel_nofault+0x8c/0x250 [ 62.252847] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 62.252885] kunit_try_run_case+0x170/0x3f0 [ 62.252923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.252962] kthread+0x328/0x630 [ 62.252995] ret_from_fork+0x10/0x20 [ 62.253030] [ 62.323849] Allocated by task 330: [ 62.327238] kasan_save_stack+0x3c/0x68 [ 62.331054] kasan_save_track+0x20/0x40 [ 62.334873] kasan_save_alloc_info+0x40/0x58 [ 62.339126] __kasan_kmalloc+0xd4/0xd8 [ 62.342859] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.347373] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.352148] kunit_try_run_case+0x170/0x3f0 [ 62.356314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.361782] kthread+0x328/0x630 [ 62.364994] ret_from_fork+0x10/0x20 [ 62.368553] [ 62.370028] The buggy address belongs to the object at ffff000802678c00 [ 62.370028] which belongs to the cache kmalloc-128 of size 128 [ 62.382530] The buggy address is located 0 bytes to the right of [ 62.382530] allocated 120-byte region [ffff000802678c00, ffff000802678c78) [ 62.395462] [ 62.396940] The buggy address belongs to the physical page: [ 62.402498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 62.410481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.418120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.425064] page_type: f5(slab) [ 62.428201] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.435920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.443648] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.451458] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.459271] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 62.467083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.474888] page dumped because: kasan: bad access detected [ 62.480444] [ 62.481919] Memory state around the buggy address: [ 62.486701] ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.493902] ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.501109] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.508308] ^ [ 62.515430] ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.522636] ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.529837] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 61.684553] ================================================================== [ 61.691570] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 61.698251] Read of size 1 at addr ffff800087b3d7f8 by task kunit_try_catch/318 [ 61.705542] [ 61.707028] CPU: 5 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 61.707083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.707102] Hardware name: WinLink E850-96 board (DT) [ 61.707122] Call trace: [ 61.707135] show_stack+0x20/0x38 (C) [ 61.707175] dump_stack_lvl+0x8c/0xd0 [ 61.707211] print_report+0x310/0x608 [ 61.707244] kasan_report+0xdc/0x128 [ 61.707272] __asan_report_load1_noabort+0x20/0x30 [ 61.707307] vmalloc_oob+0x51c/0x5d0 [ 61.707340] kunit_try_run_case+0x170/0x3f0 [ 61.707379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.707419] kthread+0x328/0x630 [ 61.707454] ret_from_fork+0x10/0x20 [ 61.707491] [ 61.769260] The buggy address belongs to the virtual mapping at [ 61.769260] [ffff800087b3d000, ffff800087b3f000) created by: [ 61.769260] vmalloc_oob+0x98/0x5d0 [ 61.784360] [ 61.785840] The buggy address belongs to the physical page: [ 61.791396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862 [ 61.799379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.805900] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 61.813620] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 61.821339] page dumped because: kasan: bad access detected [ 61.826894] [ 61.828369] Memory state around the buggy address: [ 61.833150] ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.840353] ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.847560] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 61.854759] ^ [ 61.861882] ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.869085] ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.876286] ================================================================== [ 61.478327] ================================================================== [ 61.492701] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 61.499384] Read of size 1 at addr ffff800087b3d7f3 by task kunit_try_catch/318 [ 61.506675] [ 61.508162] CPU: 5 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 61.508221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.508241] Hardware name: WinLink E850-96 board (DT) [ 61.508266] Call trace: [ 61.508281] show_stack+0x20/0x38 (C) [ 61.508316] dump_stack_lvl+0x8c/0xd0 [ 61.508355] print_report+0x310/0x608 [ 61.508386] kasan_report+0xdc/0x128 [ 61.508417] __asan_report_load1_noabort+0x20/0x30 [ 61.508455] vmalloc_oob+0x578/0x5d0 [ 61.508487] kunit_try_run_case+0x170/0x3f0 [ 61.508525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.508566] kthread+0x328/0x630 [ 61.508601] ret_from_fork+0x10/0x20 [ 61.508642] [ 61.570393] The buggy address belongs to the virtual mapping at [ 61.570393] [ffff800087b3d000, ffff800087b3f000) created by: [ 61.570393] vmalloc_oob+0x98/0x5d0 [ 61.585492] [ 61.586972] The buggy address belongs to the physical page: [ 61.592528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862 [ 61.600511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.607034] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 61.614751] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 61.622472] page dumped because: kasan: bad access detected [ 61.628026] [ 61.629501] Memory state around the buggy address: [ 61.634282] ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.641484] ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.648688] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 61.655890] ^ [ 61.662753] ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.669956] ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.677159] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 49.379314] ================================================================== [ 49.386371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 49.393661] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.401040] [ 49.402520] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.402566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.402583] Hardware name: WinLink E850-96 board (DT) [ 49.402602] Call trace: [ 49.402615] show_stack+0x20/0x38 (C) [ 49.402645] dump_stack_lvl+0x8c/0xd0 [ 49.402677] print_report+0x118/0x608 [ 49.402706] kasan_report+0xdc/0x128 [ 49.402735] kasan_check_range+0x100/0x1a8 [ 49.402767] __kasan_check_write+0x20/0x30 [ 49.402800] kasan_atomics_helper+0x894/0x4858 [ 49.402827] kasan_atomics+0x198/0x2e0 [ 49.402854] kunit_try_run_case+0x170/0x3f0 [ 49.402885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.402924] kthread+0x328/0x630 [ 49.402957] ret_from_fork+0x10/0x20 [ 49.402986] [ 49.472740] Allocated by task 314: [ 49.476127] kasan_save_stack+0x3c/0x68 [ 49.479944] kasan_save_track+0x20/0x40 [ 49.483764] kasan_save_alloc_info+0x40/0x58 [ 49.488018] __kasan_kmalloc+0xd4/0xd8 [ 49.491750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.496264] kasan_atomics+0xb8/0x2e0 [ 49.499909] kunit_try_run_case+0x170/0x3f0 [ 49.504076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.509545] kthread+0x328/0x630 [ 49.512757] ret_from_fork+0x10/0x20 [ 49.516315] [ 49.517791] The buggy address belongs to the object at ffff000803afab80 [ 49.517791] which belongs to the cache kmalloc-64 of size 64 [ 49.530118] The buggy address is located 0 bytes to the right of [ 49.530118] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.542964] [ 49.544440] The buggy address belongs to the physical page: [ 49.549996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.557982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.564492] page_type: f5(slab) [ 49.567624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.575349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.583068] page dumped because: kasan: bad access detected [ 49.588623] [ 49.590099] Memory state around the buggy address: [ 49.594878] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.602082] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.609287] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.616488] ^ [ 49.621266] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.628470] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.635671] ================================================================== [ 47.269626] ================================================================== [ 47.276680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 47.283971] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.291349] [ 47.292831] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.292878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.292894] Hardware name: WinLink E850-96 board (DT) [ 47.292913] Call trace: [ 47.292925] show_stack+0x20/0x38 (C) [ 47.292956] dump_stack_lvl+0x8c/0xd0 [ 47.292990] print_report+0x118/0x608 [ 47.293019] kasan_report+0xdc/0x128 [ 47.293049] kasan_check_range+0x100/0x1a8 [ 47.293079] __kasan_check_write+0x20/0x30 [ 47.293111] kasan_atomics_helper+0x4e4/0x4858 [ 47.293138] kasan_atomics+0x198/0x2e0 [ 47.293167] kunit_try_run_case+0x170/0x3f0 [ 47.293200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.293237] kthread+0x328/0x630 [ 47.293268] ret_from_fork+0x10/0x20 [ 47.293296] [ 47.363049] Allocated by task 314: [ 47.366435] kasan_save_stack+0x3c/0x68 [ 47.370254] kasan_save_track+0x20/0x40 [ 47.374073] kasan_save_alloc_info+0x40/0x58 [ 47.378327] __kasan_kmalloc+0xd4/0xd8 [ 47.382059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.386573] kasan_atomics+0xb8/0x2e0 [ 47.390219] kunit_try_run_case+0x170/0x3f0 [ 47.394386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.399854] kthread+0x328/0x630 [ 47.403066] ret_from_fork+0x10/0x20 [ 47.406625] [ 47.408100] The buggy address belongs to the object at ffff000803afab80 [ 47.408100] which belongs to the cache kmalloc-64 of size 64 [ 47.420427] The buggy address is located 0 bytes to the right of [ 47.420427] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.433274] [ 47.434750] The buggy address belongs to the physical page: [ 47.440306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.448291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.454801] page_type: f5(slab) [ 47.457934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.465659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.473377] page dumped because: kasan: bad access detected [ 47.478933] [ 47.480408] Memory state around the buggy address: [ 47.485188] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.492392] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.499596] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.506797] ^ [ 47.511575] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.518780] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.525982] ================================================================== [ 44.374859] ================================================================== [ 44.389056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 44.396429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 44.403719] [ 44.405207] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.405265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.405284] Hardware name: WinLink E850-96 board (DT) [ 44.405306] Call trace: [ 44.405323] show_stack+0x20/0x38 (C) [ 44.405357] dump_stack_lvl+0x8c/0xd0 [ 44.405395] print_report+0x118/0x608 [ 44.405430] kasan_report+0xdc/0x128 [ 44.405460] __asan_report_load4_noabort+0x20/0x30 [ 44.405496] kasan_atomics_helper+0x40a8/0x4858 [ 44.405529] kasan_atomics+0x198/0x2e0 [ 44.405556] kunit_try_run_case+0x170/0x3f0 [ 44.405594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.405634] kthread+0x328/0x630 [ 44.405669] ret_from_fork+0x10/0x20 [ 44.405706] [ 44.472122] Allocated by task 314: [ 44.475510] kasan_save_stack+0x3c/0x68 [ 44.479325] kasan_save_track+0x20/0x40 [ 44.483145] kasan_save_alloc_info+0x40/0x58 [ 44.487398] __kasan_kmalloc+0xd4/0xd8 [ 44.491130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.495644] kasan_atomics+0xb8/0x2e0 [ 44.499291] kunit_try_run_case+0x170/0x3f0 [ 44.503456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.508925] kthread+0x328/0x630 [ 44.512137] ret_from_fork+0x10/0x20 [ 44.515696] [ 44.517175] The buggy address belongs to the object at ffff000803afab80 [ 44.517175] which belongs to the cache kmalloc-64 of size 64 [ 44.529502] The buggy address is located 0 bytes to the right of [ 44.529502] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 44.542345] [ 44.543824] The buggy address belongs to the physical page: [ 44.549380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 44.557364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.563874] page_type: f5(slab) [ 44.567011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.574730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.582451] page dumped because: kasan: bad access detected [ 44.588004] [ 44.589479] Memory state around the buggy address: [ 44.594260] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.601464] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.608669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.615868] ^ [ 44.620648] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.627851] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.635054] ================================================================== [ 53.054767] ================================================================== [ 53.061836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 53.069127] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.076505] [ 53.077985] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.078030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.078046] Hardware name: WinLink E850-96 board (DT) [ 53.078064] Call trace: [ 53.078076] show_stack+0x20/0x38 (C) [ 53.078105] dump_stack_lvl+0x8c/0xd0 [ 53.078140] print_report+0x118/0x608 [ 53.078170] kasan_report+0xdc/0x128 [ 53.078198] kasan_check_range+0x100/0x1a8 [ 53.078231] __kasan_check_write+0x20/0x30 [ 53.078262] kasan_atomics_helper+0xd3c/0x4858 [ 53.078291] kasan_atomics+0x198/0x2e0 [ 53.078317] kunit_try_run_case+0x170/0x3f0 [ 53.078352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.078390] kthread+0x328/0x630 [ 53.078425] ret_from_fork+0x10/0x20 [ 53.078453] [ 53.148205] Allocated by task 314: [ 53.151591] kasan_save_stack+0x3c/0x68 [ 53.155410] kasan_save_track+0x20/0x40 [ 53.159229] kasan_save_alloc_info+0x40/0x58 [ 53.163483] __kasan_kmalloc+0xd4/0xd8 [ 53.167215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.171729] kasan_atomics+0xb8/0x2e0 [ 53.175375] kunit_try_run_case+0x170/0x3f0 [ 53.179542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.185010] kthread+0x328/0x630 [ 53.188222] ret_from_fork+0x10/0x20 [ 53.191781] [ 53.193257] The buggy address belongs to the object at ffff000803afab80 [ 53.193257] which belongs to the cache kmalloc-64 of size 64 [ 53.205583] The buggy address is located 0 bytes to the right of [ 53.205583] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 53.218430] [ 53.219906] The buggy address belongs to the physical page: [ 53.225462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 53.233447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.239958] page_type: f5(slab) [ 53.243090] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.250815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.258534] page dumped because: kasan: bad access detected [ 53.264089] [ 53.265565] Memory state around the buggy address: [ 53.270346] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.277548] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.284753] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.291953] ^ [ 53.296731] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.303936] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.311139] ================================================================== [ 49.643032] ================================================================== [ 49.650086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 49.657460] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.664751] [ 49.666233] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.666281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.666295] Hardware name: WinLink E850-96 board (DT) [ 49.666316] Call trace: [ 49.666328] show_stack+0x20/0x38 (C) [ 49.666360] dump_stack_lvl+0x8c/0xd0 [ 49.666395] print_report+0x118/0x608 [ 49.666424] kasan_report+0xdc/0x128 [ 49.666451] __asan_report_load4_noabort+0x20/0x30 [ 49.666488] kasan_atomics_helper+0x42d8/0x4858 [ 49.666519] kasan_atomics+0x198/0x2e0 [ 49.666548] kunit_try_run_case+0x170/0x3f0 [ 49.666581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.666619] kthread+0x328/0x630 [ 49.666653] ret_from_fork+0x10/0x20 [ 49.666686] [ 49.733153] Allocated by task 314: [ 49.736538] kasan_save_stack+0x3c/0x68 [ 49.740357] kasan_save_track+0x20/0x40 [ 49.744176] kasan_save_alloc_info+0x40/0x58 [ 49.748430] __kasan_kmalloc+0xd4/0xd8 [ 49.752163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.756676] kasan_atomics+0xb8/0x2e0 [ 49.760324] kunit_try_run_case+0x170/0x3f0 [ 49.764489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.769958] kthread+0x328/0x630 [ 49.773169] ret_from_fork+0x10/0x20 [ 49.776728] [ 49.778205] The buggy address belongs to the object at ffff000803afab80 [ 49.778205] which belongs to the cache kmalloc-64 of size 64 [ 49.790531] The buggy address is located 0 bytes to the right of [ 49.790531] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.803377] [ 49.804853] The buggy address belongs to the physical page: [ 49.810410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.818394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.824905] page_type: f5(slab) [ 49.828040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.835762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.843482] page dumped because: kasan: bad access detected [ 49.849036] [ 49.850512] Memory state around the buggy address: [ 49.855292] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.862495] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.869699] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.876900] ^ [ 49.881678] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.888883] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.896085] ================================================================== [ 51.222013] ================================================================== [ 51.229052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 51.236429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 51.243720] [ 51.245200] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 51.245244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.245261] Hardware name: WinLink E850-96 board (DT) [ 51.245278] Call trace: [ 51.245292] show_stack+0x20/0x38 (C) [ 51.245322] dump_stack_lvl+0x8c/0xd0 [ 51.245354] print_report+0x118/0x608 [ 51.245383] kasan_report+0xdc/0x128 [ 51.245411] __asan_report_load4_noabort+0x20/0x30 [ 51.245444] kasan_atomics_helper+0x3dcc/0x4858 [ 51.245474] kasan_atomics+0x198/0x2e0 [ 51.245502] kunit_try_run_case+0x170/0x3f0 [ 51.245537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.245574] kthread+0x328/0x630 [ 51.245606] ret_from_fork+0x10/0x20 [ 51.245635] [ 51.312122] Allocated by task 314: [ 51.315507] kasan_save_stack+0x3c/0x68 [ 51.319326] kasan_save_track+0x20/0x40 [ 51.323146] kasan_save_alloc_info+0x40/0x58 [ 51.327399] __kasan_kmalloc+0xd4/0xd8 [ 51.331132] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.335646] kasan_atomics+0xb8/0x2e0 [ 51.339292] kunit_try_run_case+0x170/0x3f0 [ 51.343458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.348927] kthread+0x328/0x630 [ 51.352139] ret_from_fork+0x10/0x20 [ 51.355697] [ 51.357173] The buggy address belongs to the object at ffff000803afab80 [ 51.357173] which belongs to the cache kmalloc-64 of size 64 [ 51.369500] The buggy address is located 0 bytes to the right of [ 51.369500] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.382347] [ 51.383822] The buggy address belongs to the physical page: [ 51.389378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.397364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.403874] page_type: f5(slab) [ 51.407007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.414731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.422450] page dumped because: kasan: bad access detected [ 51.428005] [ 51.429481] Memory state around the buggy address: [ 51.434259] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.441464] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.448669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.455870] ^ [ 51.460647] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.467853] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.475055] ================================================================== [ 54.102879] ================================================================== [ 54.109913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 54.117202] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.124580] [ 54.126059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.126107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.126122] Hardware name: WinLink E850-96 board (DT) [ 54.126141] Call trace: [ 54.126153] show_stack+0x20/0x38 (C) [ 54.126184] dump_stack_lvl+0x8c/0xd0 [ 54.126219] print_report+0x118/0x608 [ 54.126247] kasan_report+0xdc/0x128 [ 54.126277] kasan_check_range+0x100/0x1a8 [ 54.126308] __kasan_check_write+0x20/0x30 [ 54.126338] kasan_atomics_helper+0xe44/0x4858 [ 54.126367] kasan_atomics+0x198/0x2e0 [ 54.126394] kunit_try_run_case+0x170/0x3f0 [ 54.126427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.126465] kthread+0x328/0x630 [ 54.126497] ret_from_fork+0x10/0x20 [ 54.126528] [ 54.196280] Allocated by task 314: [ 54.199665] kasan_save_stack+0x3c/0x68 [ 54.203485] kasan_save_track+0x20/0x40 [ 54.207304] kasan_save_alloc_info+0x40/0x58 [ 54.211557] __kasan_kmalloc+0xd4/0xd8 [ 54.215290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.219804] kasan_atomics+0xb8/0x2e0 [ 54.223450] kunit_try_run_case+0x170/0x3f0 [ 54.227616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.233085] kthread+0x328/0x630 [ 54.236297] ret_from_fork+0x10/0x20 [ 54.239856] [ 54.241331] The buggy address belongs to the object at ffff000803afab80 [ 54.241331] which belongs to the cache kmalloc-64 of size 64 [ 54.253658] The buggy address is located 0 bytes to the right of [ 54.253658] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.266504] [ 54.267981] The buggy address belongs to the physical page: [ 54.273536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.281522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.288032] page_type: f5(slab) [ 54.291165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.298889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.306608] page dumped because: kasan: bad access detected [ 54.312163] [ 54.313639] Memory state around the buggy address: [ 54.318419] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.325622] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.332827] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.340028] ^ [ 54.344806] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.352011] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.359212] ================================================================== [ 57.001433] ================================================================== [ 57.008479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 57.015856] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.023234] [ 57.024714] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.024759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.024773] Hardware name: WinLink E850-96 board (DT) [ 57.024791] Call trace: [ 57.024804] show_stack+0x20/0x38 (C) [ 57.024834] dump_stack_lvl+0x8c/0xd0 [ 57.024867] print_report+0x118/0x608 [ 57.024895] kasan_report+0xdc/0x128 [ 57.024924] kasan_check_range+0x100/0x1a8 [ 57.024955] __kasan_check_write+0x20/0x30 [ 57.024987] kasan_atomics_helper+0x126c/0x4858 [ 57.025018] kasan_atomics+0x198/0x2e0 [ 57.025046] kunit_try_run_case+0x170/0x3f0 [ 57.025080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.025118] kthread+0x328/0x630 [ 57.025150] ret_from_fork+0x10/0x20 [ 57.025181] [ 57.095021] Allocated by task 314: [ 57.098406] kasan_save_stack+0x3c/0x68 [ 57.102226] kasan_save_track+0x20/0x40 [ 57.106045] kasan_save_alloc_info+0x40/0x58 [ 57.110299] __kasan_kmalloc+0xd4/0xd8 [ 57.114031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.118545] kasan_atomics+0xb8/0x2e0 [ 57.122191] kunit_try_run_case+0x170/0x3f0 [ 57.126357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.131826] kthread+0x328/0x630 [ 57.135038] ret_from_fork+0x10/0x20 [ 57.138597] [ 57.140072] The buggy address belongs to the object at ffff000803afab80 [ 57.140072] which belongs to the cache kmalloc-64 of size 64 [ 57.152399] The buggy address is located 0 bytes to the right of [ 57.152399] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.165246] [ 57.166722] The buggy address belongs to the physical page: [ 57.172278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.180263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.186773] page_type: f5(slab) [ 57.189906] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.197631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.205349] page dumped because: kasan: bad access detected [ 57.210905] [ 57.212380] Memory state around the buggy address: [ 57.217160] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.224363] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.231568] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.238769] ^ [ 57.243547] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.250752] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.257953] ================================================================== [ 44.642448] ================================================================== [ 44.649468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 44.656840] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 44.664218] [ 44.665704] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.665760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.665778] Hardware name: WinLink E850-96 board (DT) [ 44.665797] Call trace: [ 44.665811] show_stack+0x20/0x38 (C) [ 44.665843] dump_stack_lvl+0x8c/0xd0 [ 44.665882] print_report+0x118/0x608 [ 44.665913] kasan_report+0xdc/0x128 [ 44.665940] __asan_report_store4_noabort+0x20/0x30 [ 44.665977] kasan_atomics_helper+0x3f7c/0x4858 [ 44.666007] kasan_atomics+0x198/0x2e0 [ 44.666033] kunit_try_run_case+0x170/0x3f0 [ 44.666070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.666108] kthread+0x328/0x630 [ 44.666140] ret_from_fork+0x10/0x20 [ 44.666175] [ 44.732707] Allocated by task 314: [ 44.736095] kasan_save_stack+0x3c/0x68 [ 44.739912] kasan_save_track+0x20/0x40 [ 44.743731] kasan_save_alloc_info+0x40/0x58 [ 44.747984] __kasan_kmalloc+0xd4/0xd8 [ 44.751717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.756231] kasan_atomics+0xb8/0x2e0 [ 44.759877] kunit_try_run_case+0x170/0x3f0 [ 44.764043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.769512] kthread+0x328/0x630 [ 44.772723] ret_from_fork+0x10/0x20 [ 44.776282] [ 44.777761] The buggy address belongs to the object at ffff000803afab80 [ 44.777761] which belongs to the cache kmalloc-64 of size 64 [ 44.790085] The buggy address is located 0 bytes to the right of [ 44.790085] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 44.802931] [ 44.804411] The buggy address belongs to the physical page: [ 44.809967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 44.817951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.824460] page_type: f5(slab) [ 44.827595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.835316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.843035] page dumped because: kasan: bad access detected [ 44.848590] [ 44.850066] Memory state around the buggy address: [ 44.854846] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.862049] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.869255] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.876455] ^ [ 44.881234] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.888439] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.895640] ================================================================== [ 46.742171] ================================================================== [ 46.749258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 46.756548] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 46.763926] [ 46.765409] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 46.765456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.765471] Hardware name: WinLink E850-96 board (DT) [ 46.765489] Call trace: [ 46.765502] show_stack+0x20/0x38 (C) [ 46.765536] dump_stack_lvl+0x8c/0xd0 [ 46.765570] print_report+0x118/0x608 [ 46.765600] kasan_report+0xdc/0x128 [ 46.765628] kasan_check_range+0x100/0x1a8 [ 46.765659] __kasan_check_write+0x20/0x30 [ 46.765692] kasan_atomics_helper+0x414/0x4858 [ 46.765720] kasan_atomics+0x198/0x2e0 [ 46.765747] kunit_try_run_case+0x170/0x3f0 [ 46.765783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.765820] kthread+0x328/0x630 [ 46.765853] ret_from_fork+0x10/0x20 [ 46.765887] [ 46.835626] Allocated by task 314: [ 46.839012] kasan_save_stack+0x3c/0x68 [ 46.842832] kasan_save_track+0x20/0x40 [ 46.846651] kasan_save_alloc_info+0x40/0x58 [ 46.850904] __kasan_kmalloc+0xd4/0xd8 [ 46.854637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.859151] kasan_atomics+0xb8/0x2e0 [ 46.862796] kunit_try_run_case+0x170/0x3f0 [ 46.866963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.872432] kthread+0x328/0x630 [ 46.875643] ret_from_fork+0x10/0x20 [ 46.879202] [ 46.880678] The buggy address belongs to the object at ffff000803afab80 [ 46.880678] which belongs to the cache kmalloc-64 of size 64 [ 46.893005] The buggy address is located 0 bytes to the right of [ 46.893005] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.905851] [ 46.907327] The buggy address belongs to the physical page: [ 46.912883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.920869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.927379] page_type: f5(slab) [ 46.930513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.938236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.945955] page dumped because: kasan: bad access detected [ 46.951510] [ 46.952986] Memory state around the buggy address: [ 46.957764] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.964969] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.972174] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.979374] ^ [ 46.984152] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.991357] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.998560] ================================================================== [ 48.588171] ================================================================== [ 48.595237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 48.602527] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.609906] [ 48.611387] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.611435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.611453] Hardware name: WinLink E850-96 board (DT) [ 48.611471] Call trace: [ 48.611482] show_stack+0x20/0x38 (C) [ 48.611512] dump_stack_lvl+0x8c/0xd0 [ 48.611545] print_report+0x118/0x608 [ 48.611573] kasan_report+0xdc/0x128 [ 48.611603] kasan_check_range+0x100/0x1a8 [ 48.611635] __kasan_check_write+0x20/0x30 [ 48.611667] kasan_atomics_helper+0x6ec/0x4858 [ 48.611698] kasan_atomics+0x198/0x2e0 [ 48.611724] kunit_try_run_case+0x170/0x3f0 [ 48.611758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.611797] kthread+0x328/0x630 [ 48.611827] ret_from_fork+0x10/0x20 [ 48.611858] [ 48.681606] Allocated by task 314: [ 48.684991] kasan_save_stack+0x3c/0x68 [ 48.688810] kasan_save_track+0x20/0x40 [ 48.692630] kasan_save_alloc_info+0x40/0x58 [ 48.696883] __kasan_kmalloc+0xd4/0xd8 [ 48.700616] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.705130] kasan_atomics+0xb8/0x2e0 [ 48.708775] kunit_try_run_case+0x170/0x3f0 [ 48.712942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.718411] kthread+0x328/0x630 [ 48.721623] ret_from_fork+0x10/0x20 [ 48.725182] [ 48.726657] The buggy address belongs to the object at ffff000803afab80 [ 48.726657] which belongs to the cache kmalloc-64 of size 64 [ 48.738984] The buggy address is located 0 bytes to the right of [ 48.738984] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 48.751830] [ 48.753307] The buggy address belongs to the physical page: [ 48.758862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 48.766848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.773358] page_type: f5(slab) [ 48.776492] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.784215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.791934] page dumped because: kasan: bad access detected [ 48.797489] [ 48.798965] Memory state around the buggy address: [ 48.803743] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.810948] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.818153] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.825354] ^ [ 48.830131] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.837336] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.844537] ================================================================== [ 48.851889] ================================================================== [ 48.858949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 48.866239] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.873617] [ 48.875099] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.875148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.875166] Hardware name: WinLink E850-96 board (DT) [ 48.875186] Call trace: [ 48.875201] show_stack+0x20/0x38 (C) [ 48.875231] dump_stack_lvl+0x8c/0xd0 [ 48.875265] print_report+0x118/0x608 [ 48.875293] kasan_report+0xdc/0x128 [ 48.875322] kasan_check_range+0x100/0x1a8 [ 48.875353] __kasan_check_write+0x20/0x30 [ 48.875385] kasan_atomics_helper+0x760/0x4858 [ 48.875413] kasan_atomics+0x198/0x2e0 [ 48.875439] kunit_try_run_case+0x170/0x3f0 [ 48.875473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.875512] kthread+0x328/0x630 [ 48.875543] ret_from_fork+0x10/0x20 [ 48.875572] [ 48.945318] Allocated by task 314: [ 48.948704] kasan_save_stack+0x3c/0x68 [ 48.952522] kasan_save_track+0x20/0x40 [ 48.956341] kasan_save_alloc_info+0x40/0x58 [ 48.960595] __kasan_kmalloc+0xd4/0xd8 [ 48.964327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.968841] kasan_atomics+0xb8/0x2e0 [ 48.972487] kunit_try_run_case+0x170/0x3f0 [ 48.976653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.982122] kthread+0x328/0x630 [ 48.985334] ret_from_fork+0x10/0x20 [ 48.988893] [ 48.990368] The buggy address belongs to the object at ffff000803afab80 [ 48.990368] which belongs to the cache kmalloc-64 of size 64 [ 49.002695] The buggy address is located 0 bytes to the right of [ 49.002695] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.015542] [ 49.017018] The buggy address belongs to the physical page: [ 49.022573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.030559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.037069] page_type: f5(slab) [ 49.040202] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.047927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.055645] page dumped because: kasan: bad access detected [ 49.061200] [ 49.062676] Memory state around the buggy address: [ 49.067457] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.074659] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.081864] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.089065] ^ [ 49.093843] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.101048] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.108250] ================================================================== [ 55.681994] ================================================================== [ 55.689054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 55.696431] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.703809] [ 55.705289] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.705335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.705353] Hardware name: WinLink E850-96 board (DT) [ 55.705371] Call trace: [ 55.705383] show_stack+0x20/0x38 (C) [ 55.705414] dump_stack_lvl+0x8c/0xd0 [ 55.705449] print_report+0x118/0x608 [ 55.705478] kasan_report+0xdc/0x128 [ 55.705506] kasan_check_range+0x100/0x1a8 [ 55.705535] __kasan_check_write+0x20/0x30 [ 55.705567] kasan_atomics_helper+0x1058/0x4858 [ 55.705596] kasan_atomics+0x198/0x2e0 [ 55.705624] kunit_try_run_case+0x170/0x3f0 [ 55.705657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.705694] kthread+0x328/0x630 [ 55.705727] ret_from_fork+0x10/0x20 [ 55.705758] [ 55.775597] Allocated by task 314: [ 55.778982] kasan_save_stack+0x3c/0x68 [ 55.782801] kasan_save_track+0x20/0x40 [ 55.786621] kasan_save_alloc_info+0x40/0x58 [ 55.790874] __kasan_kmalloc+0xd4/0xd8 [ 55.794607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.799120] kasan_atomics+0xb8/0x2e0 [ 55.802766] kunit_try_run_case+0x170/0x3f0 [ 55.806933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.812401] kthread+0x328/0x630 [ 55.815613] ret_from_fork+0x10/0x20 [ 55.819172] [ 55.820647] The buggy address belongs to the object at ffff000803afab80 [ 55.820647] which belongs to the cache kmalloc-64 of size 64 [ 55.832975] The buggy address is located 0 bytes to the right of [ 55.832975] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.845821] [ 55.847297] The buggy address belongs to the physical page: [ 55.852853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.860838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.867349] page_type: f5(slab) [ 55.870482] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.878206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.885925] page dumped because: kasan: bad access detected [ 55.891480] [ 55.892955] Memory state around the buggy address: [ 55.897734] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.904939] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.912143] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.919344] ^ [ 55.924122] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.931327] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.938528] ================================================================== [ 58.845138] ================================================================== [ 58.852201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 58.859578] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.866956] [ 58.868436] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.868482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.868499] Hardware name: WinLink E850-96 board (DT) [ 58.868519] Call trace: [ 58.868530] show_stack+0x20/0x38 (C) [ 58.868560] dump_stack_lvl+0x8c/0xd0 [ 58.868593] print_report+0x118/0x608 [ 58.868622] kasan_report+0xdc/0x128 [ 58.868652] kasan_check_range+0x100/0x1a8 [ 58.868682] __kasan_check_write+0x20/0x30 [ 58.868714] kasan_atomics_helper+0x154c/0x4858 [ 58.868746] kasan_atomics+0x198/0x2e0 [ 58.868773] kunit_try_run_case+0x170/0x3f0 [ 58.868809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.868847] kthread+0x328/0x630 [ 58.868878] ret_from_fork+0x10/0x20 [ 58.868908] [ 58.938743] Allocated by task 314: [ 58.942129] kasan_save_stack+0x3c/0x68 [ 58.945948] kasan_save_track+0x20/0x40 [ 58.949767] kasan_save_alloc_info+0x40/0x58 [ 58.954021] __kasan_kmalloc+0xd4/0xd8 [ 58.957754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.962267] kasan_atomics+0xb8/0x2e0 [ 58.965913] kunit_try_run_case+0x170/0x3f0 [ 58.970080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.975549] kthread+0x328/0x630 [ 58.978760] ret_from_fork+0x10/0x20 [ 58.982319] [ 58.983795] The buggy address belongs to the object at ffff000803afab80 [ 58.983795] which belongs to the cache kmalloc-64 of size 64 [ 58.996122] The buggy address is located 0 bytes to the right of [ 58.996122] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.008968] [ 59.010444] The buggy address belongs to the physical page: [ 59.016001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.023985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.030496] page_type: f5(slab) [ 59.033629] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.041353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.049072] page dumped because: kasan: bad access detected [ 59.054627] [ 59.056103] Memory state around the buggy address: [ 59.060882] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.068086] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.075291] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.082491] ^ [ 59.087269] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.094474] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.101676] ================================================================== [ 58.317374] ================================================================== [ 58.324431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 58.331809] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.339187] [ 58.340666] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.340712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.340728] Hardware name: WinLink E850-96 board (DT) [ 58.340746] Call trace: [ 58.340759] show_stack+0x20/0x38 (C) [ 58.340788] dump_stack_lvl+0x8c/0xd0 [ 58.340821] print_report+0x118/0x608 [ 58.340851] kasan_report+0xdc/0x128 [ 58.340880] kasan_check_range+0x100/0x1a8 [ 58.340911] __kasan_check_write+0x20/0x30 [ 58.340942] kasan_atomics_helper+0x147c/0x4858 [ 58.340971] kasan_atomics+0x198/0x2e0 [ 58.340997] kunit_try_run_case+0x170/0x3f0 [ 58.341033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.341070] kthread+0x328/0x630 [ 58.341102] ret_from_fork+0x10/0x20 [ 58.341134] [ 58.410974] Allocated by task 314: [ 58.414359] kasan_save_stack+0x3c/0x68 [ 58.418179] kasan_save_track+0x20/0x40 [ 58.421998] kasan_save_alloc_info+0x40/0x58 [ 58.426251] __kasan_kmalloc+0xd4/0xd8 [ 58.429984] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.434497] kasan_atomics+0xb8/0x2e0 [ 58.438143] kunit_try_run_case+0x170/0x3f0 [ 58.442310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.447779] kthread+0x328/0x630 [ 58.450990] ret_from_fork+0x10/0x20 [ 58.454550] [ 58.456025] The buggy address belongs to the object at ffff000803afab80 [ 58.456025] which belongs to the cache kmalloc-64 of size 64 [ 58.468352] The buggy address is located 0 bytes to the right of [ 58.468352] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 58.481198] [ 58.482674] The buggy address belongs to the physical page: [ 58.488230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 58.496216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.502725] page_type: f5(slab) [ 58.505860] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.513583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.521302] page dumped because: kasan: bad access detected [ 58.526857] [ 58.528333] Memory state around the buggy address: [ 58.533112] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.540316] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.547521] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.554721] ^ [ 58.559499] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.566704] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.573905] ================================================================== [ 45.166488] ================================================================== [ 45.173591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 45.180877] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.188255] [ 45.189742] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.189794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.189808] Hardware name: WinLink E850-96 board (DT) [ 45.189828] Call trace: [ 45.189839] show_stack+0x20/0x38 (C) [ 45.189872] dump_stack_lvl+0x8c/0xd0 [ 45.189908] print_report+0x118/0x608 [ 45.189938] kasan_report+0xdc/0x128 [ 45.189968] kasan_check_range+0x100/0x1a8 [ 45.190000] __kasan_check_write+0x20/0x30 [ 45.190033] kasan_atomics_helper+0x24c/0x4858 [ 45.190061] kasan_atomics+0x198/0x2e0 [ 45.190090] kunit_try_run_case+0x170/0x3f0 [ 45.190124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.190163] kthread+0x328/0x630 [ 45.190197] ret_from_fork+0x10/0x20 [ 45.190231] [ 45.259955] Allocated by task 314: [ 45.263341] kasan_save_stack+0x3c/0x68 [ 45.267161] kasan_save_track+0x20/0x40 [ 45.270980] kasan_save_alloc_info+0x40/0x58 [ 45.275233] __kasan_kmalloc+0xd4/0xd8 [ 45.278966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.283480] kasan_atomics+0xb8/0x2e0 [ 45.287125] kunit_try_run_case+0x170/0x3f0 [ 45.291292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.296761] kthread+0x328/0x630 [ 45.299972] ret_from_fork+0x10/0x20 [ 45.303532] [ 45.305007] The buggy address belongs to the object at ffff000803afab80 [ 45.305007] which belongs to the cache kmalloc-64 of size 64 [ 45.317333] The buggy address is located 0 bytes to the right of [ 45.317333] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.330181] [ 45.331656] The buggy address belongs to the physical page: [ 45.337215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.345198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.351708] page_type: f5(slab) [ 45.354842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.362565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.370284] page dumped because: kasan: bad access detected [ 45.375839] [ 45.377315] Memory state around the buggy address: [ 45.382096] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.389298] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.396504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.403704] ^ [ 45.408482] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.415687] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.422889] ================================================================== [ 51.482375] ================================================================== [ 51.489466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 51.496755] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 51.504133] [ 51.505613] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 51.505659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.505674] Hardware name: WinLink E850-96 board (DT) [ 51.505695] Call trace: [ 51.505706] show_stack+0x20/0x38 (C) [ 51.505736] dump_stack_lvl+0x8c/0xd0 [ 51.505769] print_report+0x118/0x608 [ 51.505799] kasan_report+0xdc/0x128 [ 51.505828] kasan_check_range+0x100/0x1a8 [ 51.505860] __kasan_check_write+0x20/0x30 [ 51.505891] kasan_atomics_helper+0xb70/0x4858 [ 51.505922] kasan_atomics+0x198/0x2e0 [ 51.505948] kunit_try_run_case+0x170/0x3f0 [ 51.505981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.506020] kthread+0x328/0x630 [ 51.506053] ret_from_fork+0x10/0x20 [ 51.506082] [ 51.575833] Allocated by task 314: [ 51.579219] kasan_save_stack+0x3c/0x68 [ 51.583038] kasan_save_track+0x20/0x40 [ 51.586857] kasan_save_alloc_info+0x40/0x58 [ 51.591111] __kasan_kmalloc+0xd4/0xd8 [ 51.594843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.599357] kasan_atomics+0xb8/0x2e0 [ 51.603003] kunit_try_run_case+0x170/0x3f0 [ 51.607170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.612638] kthread+0x328/0x630 [ 51.615850] ret_from_fork+0x10/0x20 [ 51.619409] [ 51.620884] The buggy address belongs to the object at ffff000803afab80 [ 51.620884] which belongs to the cache kmalloc-64 of size 64 [ 51.633211] The buggy address is located 0 bytes to the right of [ 51.633211] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.646058] [ 51.647534] The buggy address belongs to the physical page: [ 51.653089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.661075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.667585] page_type: f5(slab) [ 51.670718] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.678442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.686161] page dumped because: kasan: bad access detected [ 51.691717] [ 51.693192] Memory state around the buggy address: [ 51.697971] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.705175] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.712380] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.719581] ^ [ 51.724359] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.731564] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.738765] ================================================================== [ 52.006545] ================================================================== [ 52.013590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 52.020879] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.028257] [ 52.029739] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.029785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.029802] Hardware name: WinLink E850-96 board (DT) [ 52.029818] Call trace: [ 52.029830] show_stack+0x20/0x38 (C) [ 52.029860] dump_stack_lvl+0x8c/0xd0 [ 52.029893] print_report+0x118/0x608 [ 52.029923] kasan_report+0xdc/0x128 [ 52.029952] kasan_check_range+0x100/0x1a8 [ 52.029982] __kasan_check_write+0x20/0x30 [ 52.030016] kasan_atomics_helper+0xc08/0x4858 [ 52.030046] kasan_atomics+0x198/0x2e0 [ 52.030074] kunit_try_run_case+0x170/0x3f0 [ 52.030108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.030146] kthread+0x328/0x630 [ 52.030180] ret_from_fork+0x10/0x20 [ 52.030211] [ 52.099957] Allocated by task 314: [ 52.103343] kasan_save_stack+0x3c/0x68 [ 52.107162] kasan_save_track+0x20/0x40 [ 52.110981] kasan_save_alloc_info+0x40/0x58 [ 52.115235] __kasan_kmalloc+0xd4/0xd8 [ 52.118967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.123481] kasan_atomics+0xb8/0x2e0 [ 52.127127] kunit_try_run_case+0x170/0x3f0 [ 52.131294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.136762] kthread+0x328/0x630 [ 52.139974] ret_from_fork+0x10/0x20 [ 52.143533] [ 52.145010] The buggy address belongs to the object at ffff000803afab80 [ 52.145010] which belongs to the cache kmalloc-64 of size 64 [ 52.157335] The buggy address is located 0 bytes to the right of [ 52.157335] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.170182] [ 52.171658] The buggy address belongs to the physical page: [ 52.177213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.185199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.191710] page_type: f5(slab) [ 52.194842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.202567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.210285] page dumped because: kasan: bad access detected [ 52.215841] [ 52.217316] Memory state around the buggy address: [ 52.222097] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.229300] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.236504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.243705] ^ [ 52.248483] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.255688] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.262889] ================================================================== [ 53.318454] ================================================================== [ 53.325548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 53.332925] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.340216] [ 53.341697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.341743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.341761] Hardware name: WinLink E850-96 board (DT) [ 53.341779] Call trace: [ 53.341793] show_stack+0x20/0x38 (C) [ 53.341825] dump_stack_lvl+0x8c/0xd0 [ 53.341858] print_report+0x118/0x608 [ 53.341886] kasan_report+0xdc/0x128 [ 53.341915] __asan_report_load4_noabort+0x20/0x30 [ 53.341949] kasan_atomics_helper+0x3e04/0x4858 [ 53.341980] kasan_atomics+0x198/0x2e0 [ 53.342007] kunit_try_run_case+0x170/0x3f0 [ 53.342041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.342079] kthread+0x328/0x630 [ 53.342110] ret_from_fork+0x10/0x20 [ 53.342140] [ 53.408618] Allocated by task 314: [ 53.412004] kasan_save_stack+0x3c/0x68 [ 53.415823] kasan_save_track+0x20/0x40 [ 53.419642] kasan_save_alloc_info+0x40/0x58 [ 53.423896] __kasan_kmalloc+0xd4/0xd8 [ 53.427628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.432142] kasan_atomics+0xb8/0x2e0 [ 53.435788] kunit_try_run_case+0x170/0x3f0 [ 53.439955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.445423] kthread+0x328/0x630 [ 53.448635] ret_from_fork+0x10/0x20 [ 53.452194] [ 53.453669] The buggy address belongs to the object at ffff000803afab80 [ 53.453669] which belongs to the cache kmalloc-64 of size 64 [ 53.465996] The buggy address is located 0 bytes to the right of [ 53.465996] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 53.478843] [ 53.480319] The buggy address belongs to the physical page: [ 53.485875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 53.493860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.500370] page_type: f5(slab) [ 53.503503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.511227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.518946] page dumped because: kasan: bad access detected [ 53.524502] [ 53.525977] Memory state around the buggy address: [ 53.530755] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.537960] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.545165] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.552366] ^ [ 53.557144] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.564349] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.571550] ================================================================== [ 54.890853] ================================================================== [ 54.897922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 54.905210] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.912589] [ 54.914069] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.914116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.914132] Hardware name: WinLink E850-96 board (DT) [ 54.914150] Call trace: [ 54.914160] show_stack+0x20/0x38 (C) [ 54.914189] dump_stack_lvl+0x8c/0xd0 [ 54.914222] print_report+0x118/0x608 [ 54.914251] kasan_report+0xdc/0x128 [ 54.914280] kasan_check_range+0x100/0x1a8 [ 54.914311] __kasan_check_write+0x20/0x30 [ 54.914343] kasan_atomics_helper+0xf20/0x4858 [ 54.914371] kasan_atomics+0x198/0x2e0 [ 54.914399] kunit_try_run_case+0x170/0x3f0 [ 54.914434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.914473] kthread+0x328/0x630 [ 54.914506] ret_from_fork+0x10/0x20 [ 54.914537] [ 54.984290] Allocated by task 314: [ 54.987674] kasan_save_stack+0x3c/0x68 [ 54.991494] kasan_save_track+0x20/0x40 [ 54.995313] kasan_save_alloc_info+0x40/0x58 [ 54.999567] __kasan_kmalloc+0xd4/0xd8 [ 55.003299] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.007813] kasan_atomics+0xb8/0x2e0 [ 55.011458] kunit_try_run_case+0x170/0x3f0 [ 55.015625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.021094] kthread+0x328/0x630 [ 55.024306] ret_from_fork+0x10/0x20 [ 55.027865] [ 55.029340] The buggy address belongs to the object at ffff000803afab80 [ 55.029340] which belongs to the cache kmalloc-64 of size 64 [ 55.041667] The buggy address is located 0 bytes to the right of [ 55.041667] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.054514] [ 55.055990] The buggy address belongs to the physical page: [ 55.061545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.069531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.076041] page_type: f5(slab) [ 55.079174] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.086898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.094617] page dumped because: kasan: bad access detected [ 55.100172] [ 55.101648] Memory state around the buggy address: [ 55.106427] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.113631] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.120836] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.128036] ^ [ 55.132814] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.140020] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.147221] ================================================================== [ 60.421504] ================================================================== [ 60.428566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 60.435943] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.443235] [ 60.444716] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.444764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.444780] Hardware name: WinLink E850-96 board (DT) [ 60.444798] Call trace: [ 60.444811] show_stack+0x20/0x38 (C) [ 60.444842] dump_stack_lvl+0x8c/0xd0 [ 60.444877] print_report+0x118/0x608 [ 60.444905] kasan_report+0xdc/0x128 [ 60.444935] __asan_report_load8_noabort+0x20/0x30 [ 60.444968] kasan_atomics_helper+0x3e10/0x4858 [ 60.444997] kasan_atomics+0x198/0x2e0 [ 60.445024] kunit_try_run_case+0x170/0x3f0 [ 60.445059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.445100] kthread+0x328/0x630 [ 60.445132] ret_from_fork+0x10/0x20 [ 60.445161] [ 60.511636] Allocated by task 314: [ 60.515022] kasan_save_stack+0x3c/0x68 [ 60.518841] kasan_save_track+0x20/0x40 [ 60.522661] kasan_save_alloc_info+0x40/0x58 [ 60.526914] __kasan_kmalloc+0xd4/0xd8 [ 60.530647] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.535160] kasan_atomics+0xb8/0x2e0 [ 60.538806] kunit_try_run_case+0x170/0x3f0 [ 60.542973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.548442] kthread+0x328/0x630 [ 60.551653] ret_from_fork+0x10/0x20 [ 60.555212] [ 60.556688] The buggy address belongs to the object at ffff000803afab80 [ 60.556688] which belongs to the cache kmalloc-64 of size 64 [ 60.569015] The buggy address is located 0 bytes to the right of [ 60.569015] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.581861] [ 60.583337] The buggy address belongs to the physical page: [ 60.588893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.596878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.603389] page_type: f5(slab) [ 60.606523] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.614246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.621965] page dumped because: kasan: bad access detected [ 60.627520] [ 60.628996] Memory state around the buggy address: [ 60.633775] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.640978] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.648183] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.655384] ^ [ 60.660162] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.667367] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.674568] ================================================================== [ 60.945771] ================================================================== [ 60.952866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 60.960241] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.967533] [ 60.969014] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.969062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.969077] Hardware name: WinLink E850-96 board (DT) [ 60.969095] Call trace: [ 60.969106] show_stack+0x20/0x38 (C) [ 60.969138] dump_stack_lvl+0x8c/0xd0 [ 60.969170] print_report+0x118/0x608 [ 60.969200] kasan_report+0xdc/0x128 [ 60.969229] __asan_report_load8_noabort+0x20/0x30 [ 60.969263] kasan_atomics_helper+0x3e20/0x4858 [ 60.969292] kasan_atomics+0x198/0x2e0 [ 60.969319] kunit_try_run_case+0x170/0x3f0 [ 60.969352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.969390] kthread+0x328/0x630 [ 60.969421] ret_from_fork+0x10/0x20 [ 60.969450] [ 61.035934] Allocated by task 314: [ 61.039320] kasan_save_stack+0x3c/0x68 [ 61.043139] kasan_save_track+0x20/0x40 [ 61.046958] kasan_save_alloc_info+0x40/0x58 [ 61.051212] __kasan_kmalloc+0xd4/0xd8 [ 61.054944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.059458] kasan_atomics+0xb8/0x2e0 [ 61.063104] kunit_try_run_case+0x170/0x3f0 [ 61.067270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.072739] kthread+0x328/0x630 [ 61.075951] ret_from_fork+0x10/0x20 [ 61.079510] [ 61.080986] The buggy address belongs to the object at ffff000803afab80 [ 61.080986] which belongs to the cache kmalloc-64 of size 64 [ 61.093312] The buggy address is located 0 bytes to the right of [ 61.093312] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 61.106159] [ 61.107634] The buggy address belongs to the physical page: [ 61.113191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 61.121176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.127686] page_type: f5(slab) [ 61.130819] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.138544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.146262] page dumped because: kasan: bad access detected [ 61.151818] [ 61.153293] Memory state around the buggy address: [ 61.158072] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.165276] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.172481] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.179682] ^ [ 61.184460] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.191665] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.198866] ================================================================== [ 57.793044] ================================================================== [ 57.800134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 57.807511] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.814802] [ 57.816281] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.816327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.816343] Hardware name: WinLink E850-96 board (DT) [ 57.816360] Call trace: [ 57.816370] show_stack+0x20/0x38 (C) [ 57.816401] dump_stack_lvl+0x8c/0xd0 [ 57.816433] print_report+0x118/0x608 [ 57.816464] kasan_report+0xdc/0x128 [ 57.816494] __asan_report_load8_noabort+0x20/0x30 [ 57.816527] kasan_atomics_helper+0x3f04/0x4858 [ 57.816555] kasan_atomics+0x198/0x2e0 [ 57.816583] kunit_try_run_case+0x170/0x3f0 [ 57.816615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.816653] kthread+0x328/0x630 [ 57.816686] ret_from_fork+0x10/0x20 [ 57.816717] [ 57.883203] Allocated by task 314: [ 57.886589] kasan_save_stack+0x3c/0x68 [ 57.890408] kasan_save_track+0x20/0x40 [ 57.894228] kasan_save_alloc_info+0x40/0x58 [ 57.898481] __kasan_kmalloc+0xd4/0xd8 [ 57.902214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.906728] kasan_atomics+0xb8/0x2e0 [ 57.910374] kunit_try_run_case+0x170/0x3f0 [ 57.914540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.920009] kthread+0x328/0x630 [ 57.923220] ret_from_fork+0x10/0x20 [ 57.926779] [ 57.928255] The buggy address belongs to the object at ffff000803afab80 [ 57.928255] which belongs to the cache kmalloc-64 of size 64 [ 57.940582] The buggy address is located 0 bytes to the right of [ 57.940582] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.953429] [ 57.954904] The buggy address belongs to the physical page: [ 57.960460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.968446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.974956] page_type: f5(slab) [ 57.978089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.985813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.993532] page dumped because: kasan: bad access detected [ 57.999087] [ 58.000563] Memory state around the buggy address: [ 58.005341] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.012546] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.019752] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.026952] ^ [ 58.031730] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.038934] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.046136] ================================================================== [ 44.903038] ================================================================== [ 44.910055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 44.917342] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 44.924632] [ 44.926116] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.926172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.926188] Hardware name: WinLink E850-96 board (DT) [ 44.926210] Call trace: [ 44.926224] show_stack+0x20/0x38 (C) [ 44.926259] dump_stack_lvl+0x8c/0xd0 [ 44.926298] print_report+0x118/0x608 [ 44.926329] kasan_report+0xdc/0x128 [ 44.926358] kasan_check_range+0x100/0x1a8 [ 44.926390] __kasan_check_read+0x20/0x30 [ 44.926421] kasan_atomics_helper+0x1ec/0x4858 [ 44.926451] kasan_atomics+0x198/0x2e0 [ 44.926480] kunit_try_run_case+0x170/0x3f0 [ 44.926518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.926558] kthread+0x328/0x630 [ 44.926592] ret_from_fork+0x10/0x20 [ 44.926626] [ 44.996244] Allocated by task 314: [ 44.999634] kasan_save_stack+0x3c/0x68 [ 45.003449] kasan_save_track+0x20/0x40 [ 45.007269] kasan_save_alloc_info+0x40/0x58 [ 45.011522] __kasan_kmalloc+0xd4/0xd8 [ 45.015255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.019768] kasan_atomics+0xb8/0x2e0 [ 45.023416] kunit_try_run_case+0x170/0x3f0 [ 45.027581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.033049] kthread+0x328/0x630 [ 45.036261] ret_from_fork+0x10/0x20 [ 45.039820] [ 45.041296] The buggy address belongs to the object at ffff000803afab80 [ 45.041296] which belongs to the cache kmalloc-64 of size 64 [ 45.053623] The buggy address is located 0 bytes to the right of [ 45.053623] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.066469] [ 45.067948] The buggy address belongs to the physical page: [ 45.073505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.081488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.087997] page_type: f5(slab) [ 45.091133] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.098854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.106573] page dumped because: kasan: bad access detected [ 45.112128] [ 45.113603] Memory state around the buggy address: [ 45.118385] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.125588] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.132792] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.139992] ^ [ 45.144771] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.151975] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.159178] ================================================================== [ 45.954234] ================================================================== [ 45.961252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 45.968539] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.975917] [ 45.977400] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.977450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.977465] Hardware name: WinLink E850-96 board (DT) [ 45.977486] Call trace: [ 45.977499] show_stack+0x20/0x38 (C) [ 45.977533] dump_stack_lvl+0x8c/0xd0 [ 45.977566] print_report+0x118/0x608 [ 45.977598] kasan_report+0xdc/0x128 [ 45.977627] kasan_check_range+0x100/0x1a8 [ 45.977659] __kasan_check_write+0x20/0x30 [ 45.977691] kasan_atomics_helper+0x32c/0x4858 [ 45.977721] kasan_atomics+0x198/0x2e0 [ 45.977748] kunit_try_run_case+0x170/0x3f0 [ 45.977784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.977821] kthread+0x328/0x630 [ 45.977854] ret_from_fork+0x10/0x20 [ 45.977886] [ 46.047617] Allocated by task 314: [ 46.051005] kasan_save_stack+0x3c/0x68 [ 46.054822] kasan_save_track+0x20/0x40 [ 46.058642] kasan_save_alloc_info+0x40/0x58 [ 46.062895] __kasan_kmalloc+0xd4/0xd8 [ 46.066628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.071141] kasan_atomics+0xb8/0x2e0 [ 46.074787] kunit_try_run_case+0x170/0x3f0 [ 46.078954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.084422] kthread+0x328/0x630 [ 46.087634] ret_from_fork+0x10/0x20 [ 46.091193] [ 46.092669] The buggy address belongs to the object at ffff000803afab80 [ 46.092669] which belongs to the cache kmalloc-64 of size 64 [ 46.104996] The buggy address is located 0 bytes to the right of [ 46.104996] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.117842] [ 46.119319] The buggy address belongs to the physical page: [ 46.124875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.132859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.139370] page_type: f5(slab) [ 46.142506] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.150227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.157946] page dumped because: kasan: bad access detected [ 46.163501] [ 46.164976] Memory state around the buggy address: [ 46.169757] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.176960] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.184166] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.191365] ^ [ 46.196143] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.203348] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.210549] ================================================================== [ 58.053455] ================================================================== [ 58.060548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 58.067923] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.075302] [ 58.076781] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.076829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.076844] Hardware name: WinLink E850-96 board (DT) [ 58.076861] Call trace: [ 58.076873] show_stack+0x20/0x38 (C) [ 58.076903] dump_stack_lvl+0x8c/0xd0 [ 58.076936] print_report+0x118/0x608 [ 58.076966] kasan_report+0xdc/0x128 [ 58.076994] kasan_check_range+0x100/0x1a8 [ 58.077024] __kasan_check_write+0x20/0x30 [ 58.077056] kasan_atomics_helper+0x1414/0x4858 [ 58.077084] kasan_atomics+0x198/0x2e0 [ 58.077111] kunit_try_run_case+0x170/0x3f0 [ 58.077143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.077181] kthread+0x328/0x630 [ 58.077214] ret_from_fork+0x10/0x20 [ 58.077244] [ 58.147089] Allocated by task 314: [ 58.150474] kasan_save_stack+0x3c/0x68 [ 58.154293] kasan_save_track+0x20/0x40 [ 58.158113] kasan_save_alloc_info+0x40/0x58 [ 58.162366] __kasan_kmalloc+0xd4/0xd8 [ 58.166099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.170613] kasan_atomics+0xb8/0x2e0 [ 58.174258] kunit_try_run_case+0x170/0x3f0 [ 58.178425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.183894] kthread+0x328/0x630 [ 58.187105] ret_from_fork+0x10/0x20 [ 58.190664] [ 58.192140] The buggy address belongs to the object at ffff000803afab80 [ 58.192140] which belongs to the cache kmalloc-64 of size 64 [ 58.204467] The buggy address is located 0 bytes to the right of [ 58.204467] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 58.217313] [ 58.218789] The buggy address belongs to the physical page: [ 58.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 58.232331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.238841] page_type: f5(slab) [ 58.241973] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.249698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.257417] page dumped because: kasan: bad access detected [ 58.262972] [ 58.264448] Memory state around the buggy address: [ 58.269227] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.276431] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.283636] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.290837] ^ [ 58.295615] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.302820] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.310020] ================================================================== [ 59.633321] ================================================================== [ 59.640385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 59.647761] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.655139] [ 59.656619] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.656664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.656679] Hardware name: WinLink E850-96 board (DT) [ 59.656697] Call trace: [ 59.656711] show_stack+0x20/0x38 (C) [ 59.656743] dump_stack_lvl+0x8c/0xd0 [ 59.656774] print_report+0x118/0x608 [ 59.656801] kasan_report+0xdc/0x128 [ 59.656829] kasan_check_range+0x100/0x1a8 [ 59.656858] __kasan_check_write+0x20/0x30 [ 59.656890] kasan_atomics_helper+0x1644/0x4858 [ 59.656919] kasan_atomics+0x198/0x2e0 [ 59.656946] kunit_try_run_case+0x170/0x3f0 [ 59.656981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.657019] kthread+0x328/0x630 [ 59.657052] ret_from_fork+0x10/0x20 [ 59.657084] [ 59.726926] Allocated by task 314: [ 59.730312] kasan_save_stack+0x3c/0x68 [ 59.734131] kasan_save_track+0x20/0x40 [ 59.737950] kasan_save_alloc_info+0x40/0x58 [ 59.742204] __kasan_kmalloc+0xd4/0xd8 [ 59.745936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.750450] kasan_atomics+0xb8/0x2e0 [ 59.754096] kunit_try_run_case+0x170/0x3f0 [ 59.758262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.763731] kthread+0x328/0x630 [ 59.766943] ret_from_fork+0x10/0x20 [ 59.770502] [ 59.771977] The buggy address belongs to the object at ffff000803afab80 [ 59.771977] which belongs to the cache kmalloc-64 of size 64 [ 59.784304] The buggy address is located 0 bytes to the right of [ 59.784304] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.797151] [ 59.798627] The buggy address belongs to the physical page: [ 59.804182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.812168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.818678] page_type: f5(slab) [ 59.821811] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.829535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.837254] page dumped because: kasan: bad access detected [ 59.842809] [ 59.844285] Memory state around the buggy address: [ 59.849065] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.856268] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.863473] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.870674] ^ [ 59.875452] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.882657] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.889858] ================================================================== [ 49.903416] ================================================================== [ 49.910495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 49.917785] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.925164] [ 49.926646] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.926691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.926707] Hardware name: WinLink E850-96 board (DT) [ 49.926728] Call trace: [ 49.926740] show_stack+0x20/0x38 (C) [ 49.926771] dump_stack_lvl+0x8c/0xd0 [ 49.926805] print_report+0x118/0x608 [ 49.926833] kasan_report+0xdc/0x128 [ 49.926862] kasan_check_range+0x100/0x1a8 [ 49.926894] __kasan_check_write+0x20/0x30 [ 49.926925] kasan_atomics_helper+0x934/0x4858 [ 49.926956] kasan_atomics+0x198/0x2e0 [ 49.926981] kunit_try_run_case+0x170/0x3f0 [ 49.927014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.927052] kthread+0x328/0x630 [ 49.927083] ret_from_fork+0x10/0x20 [ 49.927115] [ 49.996864] Allocated by task 314: [ 50.000249] kasan_save_stack+0x3c/0x68 [ 50.004069] kasan_save_track+0x20/0x40 [ 50.007888] kasan_save_alloc_info+0x40/0x58 [ 50.012141] __kasan_kmalloc+0xd4/0xd8 [ 50.015874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.020388] kasan_atomics+0xb8/0x2e0 [ 50.024034] kunit_try_run_case+0x170/0x3f0 [ 50.028200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.033669] kthread+0x328/0x630 [ 50.036881] ret_from_fork+0x10/0x20 [ 50.040440] [ 50.041915] The buggy address belongs to the object at ffff000803afab80 [ 50.041915] which belongs to the cache kmalloc-64 of size 64 [ 50.054242] The buggy address is located 0 bytes to the right of [ 50.054242] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.067088] [ 50.068566] The buggy address belongs to the physical page: [ 50.074120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.082106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.088616] page_type: f5(slab) [ 50.091749] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.099473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.107192] page dumped because: kasan: bad access detected [ 50.112747] [ 50.114223] Memory state around the buggy address: [ 50.119003] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.126206] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.133411] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.140612] ^ [ 50.145390] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.152595] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.159797] ================================================================== [ 51.746082] ================================================================== [ 51.753176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 51.760553] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 51.767844] [ 51.769323] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 51.769367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.769382] Hardware name: WinLink E850-96 board (DT) [ 51.769403] Call trace: [ 51.769415] show_stack+0x20/0x38 (C) [ 51.769446] dump_stack_lvl+0x8c/0xd0 [ 51.769478] print_report+0x118/0x608 [ 51.769508] kasan_report+0xdc/0x128 [ 51.769539] __asan_report_load4_noabort+0x20/0x30 [ 51.769571] kasan_atomics_helper+0x3dbc/0x4858 [ 51.769600] kasan_atomics+0x198/0x2e0 [ 51.769627] kunit_try_run_case+0x170/0x3f0 [ 51.769662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.769700] kthread+0x328/0x630 [ 51.769733] ret_from_fork+0x10/0x20 [ 51.769762] [ 51.836246] Allocated by task 314: [ 51.839631] kasan_save_stack+0x3c/0x68 [ 51.843451] kasan_save_track+0x20/0x40 [ 51.847270] kasan_save_alloc_info+0x40/0x58 [ 51.851524] __kasan_kmalloc+0xd4/0xd8 [ 51.855256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.859770] kasan_atomics+0xb8/0x2e0 [ 51.863416] kunit_try_run_case+0x170/0x3f0 [ 51.867582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.873051] kthread+0x328/0x630 [ 51.876263] ret_from_fork+0x10/0x20 [ 51.879821] [ 51.881297] The buggy address belongs to the object at ffff000803afab80 [ 51.881297] which belongs to the cache kmalloc-64 of size 64 [ 51.893624] The buggy address is located 0 bytes to the right of [ 51.893624] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.906471] [ 51.907946] The buggy address belongs to the physical page: [ 51.913504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.921488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.927998] page_type: f5(slab) [ 51.931131] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.938855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.946574] page dumped because: kasan: bad access detected [ 51.952129] [ 51.953605] Memory state around the buggy address: [ 51.958383] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.965588] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.972793] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.979994] ^ [ 51.984772] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.991977] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.999178] ================================================================== [ 52.270236] ================================================================== [ 52.277301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 52.284677] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.291968] [ 52.293449] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.293493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.293507] Hardware name: WinLink E850-96 board (DT) [ 52.293523] Call trace: [ 52.293536] show_stack+0x20/0x38 (C) [ 52.293566] dump_stack_lvl+0x8c/0xd0 [ 52.293598] print_report+0x118/0x608 [ 52.293628] kasan_report+0xdc/0x128 [ 52.293657] __asan_report_load4_noabort+0x20/0x30 [ 52.293692] kasan_atomics_helper+0x3de4/0x4858 [ 52.293721] kasan_atomics+0x198/0x2e0 [ 52.293748] kunit_try_run_case+0x170/0x3f0 [ 52.293782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.293820] kthread+0x328/0x630 [ 52.293852] ret_from_fork+0x10/0x20 [ 52.293884] [ 52.360370] Allocated by task 314: [ 52.363755] kasan_save_stack+0x3c/0x68 [ 52.367575] kasan_save_track+0x20/0x40 [ 52.371394] kasan_save_alloc_info+0x40/0x58 [ 52.375648] __kasan_kmalloc+0xd4/0xd8 [ 52.379380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.383894] kasan_atomics+0xb8/0x2e0 [ 52.387540] kunit_try_run_case+0x170/0x3f0 [ 52.391707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.397175] kthread+0x328/0x630 [ 52.400387] ret_from_fork+0x10/0x20 [ 52.403946] [ 52.405421] The buggy address belongs to the object at ffff000803afab80 [ 52.405421] which belongs to the cache kmalloc-64 of size 64 [ 52.417748] The buggy address is located 0 bytes to the right of [ 52.417748] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.430595] [ 52.432071] The buggy address belongs to the physical page: [ 52.437626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.445612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.452122] page_type: f5(slab) [ 52.455255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.462979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.470698] page dumped because: kasan: bad access detected [ 52.476253] [ 52.477729] Memory state around the buggy address: [ 52.482510] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.489712] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.496917] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.504118] ^ [ 52.508896] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.516100] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.523302] ================================================================== [ 59.109019] ================================================================== [ 59.116086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 59.123463] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.130841] [ 59.132321] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.132366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.132384] Hardware name: WinLink E850-96 board (DT) [ 59.132402] Call trace: [ 59.132414] show_stack+0x20/0x38 (C) [ 59.132443] dump_stack_lvl+0x8c/0xd0 [ 59.132477] print_report+0x118/0x608 [ 59.132507] kasan_report+0xdc/0x128 [ 59.132536] kasan_check_range+0x100/0x1a8 [ 59.132568] __kasan_check_write+0x20/0x30 [ 59.132600] kasan_atomics_helper+0x15b4/0x4858 [ 59.132629] kasan_atomics+0x198/0x2e0 [ 59.132655] kunit_try_run_case+0x170/0x3f0 [ 59.132690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.132729] kthread+0x328/0x630 [ 59.132762] ret_from_fork+0x10/0x20 [ 59.132792] [ 59.202629] Allocated by task 314: [ 59.206014] kasan_save_stack+0x3c/0x68 [ 59.209833] kasan_save_track+0x20/0x40 [ 59.213653] kasan_save_alloc_info+0x40/0x58 [ 59.217906] __kasan_kmalloc+0xd4/0xd8 [ 59.221639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.226152] kasan_atomics+0xb8/0x2e0 [ 59.229798] kunit_try_run_case+0x170/0x3f0 [ 59.233965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.239433] kthread+0x328/0x630 [ 59.242645] ret_from_fork+0x10/0x20 [ 59.246204] [ 59.247680] The buggy address belongs to the object at ffff000803afab80 [ 59.247680] which belongs to the cache kmalloc-64 of size 64 [ 59.260007] The buggy address is located 0 bytes to the right of [ 59.260007] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.272853] [ 59.274329] The buggy address belongs to the physical page: [ 59.279885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.287871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.294381] page_type: f5(slab) [ 59.297513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.305238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.312956] page dumped because: kasan: bad access detected [ 59.318512] [ 59.319988] Memory state around the buggy address: [ 59.324767] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.331970] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.339176] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.346376] ^ [ 59.351154] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.358359] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.365560] ================================================================== [ 50.430857] ================================================================== [ 50.437917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 50.445208] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.452586] [ 50.454067] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.454115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.454129] Hardware name: WinLink E850-96 board (DT) [ 50.454148] Call trace: [ 50.454159] show_stack+0x20/0x38 (C) [ 50.454189] dump_stack_lvl+0x8c/0xd0 [ 50.454220] print_report+0x118/0x608 [ 50.454251] kasan_report+0xdc/0x128 [ 50.454279] kasan_check_range+0x100/0x1a8 [ 50.454310] __kasan_check_write+0x20/0x30 [ 50.454342] kasan_atomics_helper+0xa04/0x4858 [ 50.454372] kasan_atomics+0x198/0x2e0 [ 50.454399] kunit_try_run_case+0x170/0x3f0 [ 50.454434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.454470] kthread+0x328/0x630 [ 50.454502] ret_from_fork+0x10/0x20 [ 50.454532] [ 50.524286] Allocated by task 314: [ 50.527673] kasan_save_stack+0x3c/0x68 [ 50.531491] kasan_save_track+0x20/0x40 [ 50.535311] kasan_save_alloc_info+0x40/0x58 [ 50.539564] __kasan_kmalloc+0xd4/0xd8 [ 50.543296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.547810] kasan_atomics+0xb8/0x2e0 [ 50.551456] kunit_try_run_case+0x170/0x3f0 [ 50.555623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.561092] kthread+0x328/0x630 [ 50.564303] ret_from_fork+0x10/0x20 [ 50.567862] [ 50.569338] The buggy address belongs to the object at ffff000803afab80 [ 50.569338] which belongs to the cache kmalloc-64 of size 64 [ 50.581664] The buggy address is located 0 bytes to the right of [ 50.581664] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.594511] [ 50.595987] The buggy address belongs to the physical page: [ 50.601543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.609528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.616039] page_type: f5(slab) [ 50.619171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.626896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.634615] page dumped because: kasan: bad access detected [ 50.640170] [ 50.641646] Memory state around the buggy address: [ 50.646427] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.653629] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.660834] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.668035] ^ [ 50.672812] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.680017] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.687219] ================================================================== [ 55.945899] ================================================================== [ 55.952940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 55.960316] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.967694] [ 55.969175] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.969219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.969233] Hardware name: WinLink E850-96 board (DT) [ 55.969252] Call trace: [ 55.969265] show_stack+0x20/0x38 (C) [ 55.969297] dump_stack_lvl+0x8c/0xd0 [ 55.969330] print_report+0x118/0x608 [ 55.969358] kasan_report+0xdc/0x128 [ 55.969387] kasan_check_range+0x100/0x1a8 [ 55.969419] __kasan_check_write+0x20/0x30 [ 55.969449] kasan_atomics_helper+0x10c0/0x4858 [ 55.969479] kasan_atomics+0x198/0x2e0 [ 55.969504] kunit_try_run_case+0x170/0x3f0 [ 55.969539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.969577] kthread+0x328/0x630 [ 55.969607] ret_from_fork+0x10/0x20 [ 55.969637] [ 56.039481] Allocated by task 314: [ 56.042867] kasan_save_stack+0x3c/0x68 [ 56.046686] kasan_save_track+0x20/0x40 [ 56.050506] kasan_save_alloc_info+0x40/0x58 [ 56.054759] __kasan_kmalloc+0xd4/0xd8 [ 56.058491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.063005] kasan_atomics+0xb8/0x2e0 [ 56.066651] kunit_try_run_case+0x170/0x3f0 [ 56.070818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.076286] kthread+0x328/0x630 [ 56.079498] ret_from_fork+0x10/0x20 [ 56.083057] [ 56.084532] The buggy address belongs to the object at ffff000803afab80 [ 56.084532] which belongs to the cache kmalloc-64 of size 64 [ 56.096860] The buggy address is located 0 bytes to the right of [ 56.096860] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.109706] [ 56.111182] The buggy address belongs to the physical page: [ 56.116738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.124723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.131234] page_type: f5(slab) [ 56.134366] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.142091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.149810] page dumped because: kasan: bad access detected [ 56.155365] [ 56.156841] Memory state around the buggy address: [ 56.161620] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.168824] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.176028] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.183229] ^ [ 56.188007] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.195212] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.202413] ================================================================== [ 56.473640] ================================================================== [ 56.480709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 56.488086] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 56.495464] [ 56.496944] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 56.496991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.497007] Hardware name: WinLink E850-96 board (DT) [ 56.497027] Call trace: [ 56.497038] show_stack+0x20/0x38 (C) [ 56.497069] dump_stack_lvl+0x8c/0xd0 [ 56.497102] print_report+0x118/0x608 [ 56.497130] kasan_report+0xdc/0x128 [ 56.497159] kasan_check_range+0x100/0x1a8 [ 56.497190] __kasan_check_write+0x20/0x30 [ 56.497221] kasan_atomics_helper+0x1190/0x4858 [ 56.497250] kasan_atomics+0x198/0x2e0 [ 56.497277] kunit_try_run_case+0x170/0x3f0 [ 56.497312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.497349] kthread+0x328/0x630 [ 56.497379] ret_from_fork+0x10/0x20 [ 56.497412] [ 56.567251] Allocated by task 314: [ 56.570637] kasan_save_stack+0x3c/0x68 [ 56.574456] kasan_save_track+0x20/0x40 [ 56.578275] kasan_save_alloc_info+0x40/0x58 [ 56.582529] __kasan_kmalloc+0xd4/0xd8 [ 56.586261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.590775] kasan_atomics+0xb8/0x2e0 [ 56.594421] kunit_try_run_case+0x170/0x3f0 [ 56.598587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.604056] kthread+0x328/0x630 [ 56.607268] ret_from_fork+0x10/0x20 [ 56.610827] [ 56.612303] The buggy address belongs to the object at ffff000803afab80 [ 56.612303] which belongs to the cache kmalloc-64 of size 64 [ 56.624629] The buggy address is located 0 bytes to the right of [ 56.624629] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.637476] [ 56.638952] The buggy address belongs to the physical page: [ 56.644508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.652493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.659004] page_type: f5(slab) [ 56.662138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.669861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.677580] page dumped because: kasan: bad access detected [ 56.683135] [ 56.684610] Memory state around the buggy address: [ 56.689390] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.696594] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.703798] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.710999] ^ [ 56.715777] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.722982] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.730183] ================================================================== [ 47.797043] ================================================================== [ 47.804103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 47.811393] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.818772] [ 47.820253] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.820301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.820318] Hardware name: WinLink E850-96 board (DT) [ 47.820335] Call trace: [ 47.820347] show_stack+0x20/0x38 (C) [ 47.820377] dump_stack_lvl+0x8c/0xd0 [ 47.820412] print_report+0x118/0x608 [ 47.820443] kasan_report+0xdc/0x128 [ 47.820473] kasan_check_range+0x100/0x1a8 [ 47.820504] __kasan_check_write+0x20/0x30 [ 47.820536] kasan_atomics_helper+0x5b4/0x4858 [ 47.820566] kasan_atomics+0x198/0x2e0 [ 47.820593] kunit_try_run_case+0x170/0x3f0 [ 47.820628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.820665] kthread+0x328/0x630 [ 47.820699] ret_from_fork+0x10/0x20 [ 47.820731] [ 47.890472] Allocated by task 314: [ 47.893857] kasan_save_stack+0x3c/0x68 [ 47.897677] kasan_save_track+0x20/0x40 [ 47.901496] kasan_save_alloc_info+0x40/0x58 [ 47.905749] __kasan_kmalloc+0xd4/0xd8 [ 47.909482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.913996] kasan_atomics+0xb8/0x2e0 [ 47.917642] kunit_try_run_case+0x170/0x3f0 [ 47.921808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.927277] kthread+0x328/0x630 [ 47.930489] ret_from_fork+0x10/0x20 [ 47.934047] [ 47.935523] The buggy address belongs to the object at ffff000803afab80 [ 47.935523] which belongs to the cache kmalloc-64 of size 64 [ 47.947850] The buggy address is located 0 bytes to the right of [ 47.947850] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.960697] [ 47.962174] The buggy address belongs to the physical page: [ 47.967728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.975714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.982224] page_type: f5(slab) [ 47.985357] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.993081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.000800] page dumped because: kasan: bad access detected [ 48.006355] [ 48.007831] Memory state around the buggy address: [ 48.012609] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.019814] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.027019] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.034220] ^ [ 48.038998] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.046202] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.053403] ================================================================== [ 45.693725] ================================================================== [ 45.700837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 45.708213] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.715505] [ 45.716988] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.717035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.717052] Hardware name: WinLink E850-96 board (DT) [ 45.717071] Call trace: [ 45.717085] show_stack+0x20/0x38 (C) [ 45.717119] dump_stack_lvl+0x8c/0xd0 [ 45.717151] print_report+0x118/0x608 [ 45.717179] kasan_report+0xdc/0x128 [ 45.717209] __asan_report_load4_noabort+0x20/0x30 [ 45.717244] kasan_atomics_helper+0x40fc/0x4858 [ 45.717274] kasan_atomics+0x198/0x2e0 [ 45.717301] kunit_try_run_case+0x170/0x3f0 [ 45.717334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.717373] kthread+0x328/0x630 [ 45.717403] ret_from_fork+0x10/0x20 [ 45.717437] [ 45.783906] Allocated by task 314: [ 45.787292] kasan_save_stack+0x3c/0x68 [ 45.791111] kasan_save_track+0x20/0x40 [ 45.794931] kasan_save_alloc_info+0x40/0x58 [ 45.799184] __kasan_kmalloc+0xd4/0xd8 [ 45.802917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.807430] kasan_atomics+0xb8/0x2e0 [ 45.811076] kunit_try_run_case+0x170/0x3f0 [ 45.815243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.820711] kthread+0x328/0x630 [ 45.823923] ret_from_fork+0x10/0x20 [ 45.827482] [ 45.828958] The buggy address belongs to the object at ffff000803afab80 [ 45.828958] which belongs to the cache kmalloc-64 of size 64 [ 45.841285] The buggy address is located 0 bytes to the right of [ 45.841285] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.854131] [ 45.855607] The buggy address belongs to the physical page: [ 45.861164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.869148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.875658] page_type: f5(slab) [ 45.878791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.886516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.894235] page dumped because: kasan: bad access detected [ 45.899790] [ 45.901265] Memory state around the buggy address: [ 45.906046] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.913248] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.920455] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.927654] ^ [ 45.932432] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.939637] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.946840] ================================================================== [ 49.115617] ================================================================== [ 49.122660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 49.129950] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.137328] [ 49.138811] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.138857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.138872] Hardware name: WinLink E850-96 board (DT) [ 49.138890] Call trace: [ 49.138901] show_stack+0x20/0x38 (C) [ 49.138931] dump_stack_lvl+0x8c/0xd0 [ 49.138964] print_report+0x118/0x608 [ 49.138994] kasan_report+0xdc/0x128 [ 49.139022] kasan_check_range+0x100/0x1a8 [ 49.139052] __kasan_check_write+0x20/0x30 [ 49.139084] kasan_atomics_helper+0x7cc/0x4858 [ 49.139113] kasan_atomics+0x198/0x2e0 [ 49.139139] kunit_try_run_case+0x170/0x3f0 [ 49.139173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.139212] kthread+0x328/0x630 [ 49.139245] ret_from_fork+0x10/0x20 [ 49.139275] [ 49.209029] Allocated by task 314: [ 49.212414] kasan_save_stack+0x3c/0x68 [ 49.216233] kasan_save_track+0x20/0x40 [ 49.220053] kasan_save_alloc_info+0x40/0x58 [ 49.224306] __kasan_kmalloc+0xd4/0xd8 [ 49.228039] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.232552] kasan_atomics+0xb8/0x2e0 [ 49.236198] kunit_try_run_case+0x170/0x3f0 [ 49.240364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.245833] kthread+0x328/0x630 [ 49.249045] ret_from_fork+0x10/0x20 [ 49.252604] [ 49.254079] The buggy address belongs to the object at ffff000803afab80 [ 49.254079] which belongs to the cache kmalloc-64 of size 64 [ 49.266406] The buggy address is located 0 bytes to the right of [ 49.266406] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.279253] [ 49.280729] The buggy address belongs to the physical page: [ 49.286285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.294270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.300781] page_type: f5(slab) [ 49.303913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.311638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.319357] page dumped because: kasan: bad access detected [ 49.324912] [ 49.326387] Memory state around the buggy address: [ 49.331166] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.338371] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.345575] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.352776] ^ [ 49.357554] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.364759] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.371962] ================================================================== [ 60.157639] ================================================================== [ 60.164682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 60.172059] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.179437] [ 60.180918] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.180964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.180981] Hardware name: WinLink E850-96 board (DT) [ 60.180998] Call trace: [ 60.181010] show_stack+0x20/0x38 (C) [ 60.181039] dump_stack_lvl+0x8c/0xd0 [ 60.181073] print_report+0x118/0x608 [ 60.181100] kasan_report+0xdc/0x128 [ 60.181130] kasan_check_range+0x100/0x1a8 [ 60.181162] __kasan_check_write+0x20/0x30 [ 60.181194] kasan_atomics_helper+0x16d0/0x4858 [ 60.181223] kasan_atomics+0x198/0x2e0 [ 60.181251] kunit_try_run_case+0x170/0x3f0 [ 60.181285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.181323] kthread+0x328/0x630 [ 60.181354] ret_from_fork+0x10/0x20 [ 60.181387] [ 60.251224] Allocated by task 314: [ 60.254611] kasan_save_stack+0x3c/0x68 [ 60.258428] kasan_save_track+0x20/0x40 [ 60.262248] kasan_save_alloc_info+0x40/0x58 [ 60.266501] __kasan_kmalloc+0xd4/0xd8 [ 60.270234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.274748] kasan_atomics+0xb8/0x2e0 [ 60.278393] kunit_try_run_case+0x170/0x3f0 [ 60.282560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.288029] kthread+0x328/0x630 [ 60.291240] ret_from_fork+0x10/0x20 [ 60.294800] [ 60.296275] The buggy address belongs to the object at ffff000803afab80 [ 60.296275] which belongs to the cache kmalloc-64 of size 64 [ 60.308602] The buggy address is located 0 bytes to the right of [ 60.308602] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.321448] [ 60.322925] The buggy address belongs to the physical page: [ 60.328480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.336466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.342976] page_type: f5(slab) [ 60.346108] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.353833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.361552] page dumped because: kasan: bad access detected [ 60.367107] [ 60.368583] Memory state around the buggy address: [ 60.373361] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.380566] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.387771] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.394972] ^ [ 60.399750] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.406954] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.414155] ================================================================== [ 45.430204] ================================================================== [ 45.437301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 45.444589] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.451880] [ 45.453365] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.453413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.453430] Hardware name: WinLink E850-96 board (DT) [ 45.453448] Call trace: [ 45.453463] show_stack+0x20/0x38 (C) [ 45.453496] dump_stack_lvl+0x8c/0xd0 [ 45.453529] print_report+0x118/0x608 [ 45.453563] kasan_report+0xdc/0x128 [ 45.453589] kasan_check_range+0x100/0x1a8 [ 45.453621] __kasan_check_read+0x20/0x30 [ 45.453652] kasan_atomics_helper+0x2b0/0x4858 [ 45.453681] kasan_atomics+0x198/0x2e0 [ 45.453708] kunit_try_run_case+0x170/0x3f0 [ 45.453743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.453782] kthread+0x328/0x630 [ 45.453815] ret_from_fork+0x10/0x20 [ 45.453848] [ 45.523493] Allocated by task 314: [ 45.526881] kasan_save_stack+0x3c/0x68 [ 45.530698] kasan_save_track+0x20/0x40 [ 45.534518] kasan_save_alloc_info+0x40/0x58 [ 45.538771] __kasan_kmalloc+0xd4/0xd8 [ 45.542504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.547017] kasan_atomics+0xb8/0x2e0 [ 45.550663] kunit_try_run_case+0x170/0x3f0 [ 45.554830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.560298] kthread+0x328/0x630 [ 45.563510] ret_from_fork+0x10/0x20 [ 45.567069] [ 45.568545] The buggy address belongs to the object at ffff000803afab80 [ 45.568545] which belongs to the cache kmalloc-64 of size 64 [ 45.580872] The buggy address is located 0 bytes to the right of [ 45.580872] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.593718] [ 45.595194] The buggy address belongs to the physical page: [ 45.600752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.608735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.615246] page_type: f5(slab) [ 45.618381] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.626103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.633822] page dumped because: kasan: bad access detected [ 45.639377] [ 45.640853] Memory state around the buggy address: [ 45.645632] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.652836] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.660042] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.667241] ^ [ 45.672019] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.679224] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.686425] ================================================================== [ 61.206209] ================================================================== [ 61.213277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 61.220654] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 61.228032] [ 61.229513] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 61.229559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.229574] Hardware name: WinLink E850-96 board (DT) [ 61.229596] Call trace: [ 61.229609] show_stack+0x20/0x38 (C) [ 61.229639] dump_stack_lvl+0x8c/0xd0 [ 61.229671] print_report+0x118/0x608 [ 61.229700] kasan_report+0xdc/0x128 [ 61.229728] kasan_check_range+0x100/0x1a8 [ 61.229759] __kasan_check_write+0x20/0x30 [ 61.229791] kasan_atomics_helper+0x17ec/0x4858 [ 61.229821] kasan_atomics+0x198/0x2e0 [ 61.229847] kunit_try_run_case+0x170/0x3f0 [ 61.229881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.229920] kthread+0x328/0x630 [ 61.229953] ret_from_fork+0x10/0x20 [ 61.229986] [ 61.299819] Allocated by task 314: [ 61.303205] kasan_save_stack+0x3c/0x68 [ 61.307024] kasan_save_track+0x20/0x40 [ 61.310843] kasan_save_alloc_info+0x40/0x58 [ 61.315097] __kasan_kmalloc+0xd4/0xd8 [ 61.318829] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.323343] kasan_atomics+0xb8/0x2e0 [ 61.326989] kunit_try_run_case+0x170/0x3f0 [ 61.331155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.336624] kthread+0x328/0x630 [ 61.339836] ret_from_fork+0x10/0x20 [ 61.343395] [ 61.344871] The buggy address belongs to the object at ffff000803afab80 [ 61.344871] which belongs to the cache kmalloc-64 of size 64 [ 61.357197] The buggy address is located 0 bytes to the right of [ 61.357197] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 61.370044] [ 61.371522] The buggy address belongs to the physical page: [ 61.377076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 61.385061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.391571] page_type: f5(slab) [ 61.394704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.402428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.410147] page dumped because: kasan: bad access detected [ 61.415703] [ 61.417178] Memory state around the buggy address: [ 61.421957] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.429161] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.436366] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.443567] ^ [ 61.448345] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.455550] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.462751] ================================================================== [ 47.005903] ================================================================== [ 47.012969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 47.020260] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.027638] [ 47.029120] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.029167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.029181] Hardware name: WinLink E850-96 board (DT) [ 47.029202] Call trace: [ 47.029214] show_stack+0x20/0x38 (C) [ 47.029244] dump_stack_lvl+0x8c/0xd0 [ 47.029281] print_report+0x118/0x608 [ 47.029309] kasan_report+0xdc/0x128 [ 47.029337] kasan_check_range+0x100/0x1a8 [ 47.029368] __kasan_check_write+0x20/0x30 [ 47.029399] kasan_atomics_helper+0x47c/0x4858 [ 47.029429] kasan_atomics+0x198/0x2e0 [ 47.029454] kunit_try_run_case+0x170/0x3f0 [ 47.029489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.029527] kthread+0x328/0x630 [ 47.029557] ret_from_fork+0x10/0x20 [ 47.029590] [ 47.099338] Allocated by task 314: [ 47.102724] kasan_save_stack+0x3c/0x68 [ 47.106542] kasan_save_track+0x20/0x40 [ 47.110362] kasan_save_alloc_info+0x40/0x58 [ 47.114615] __kasan_kmalloc+0xd4/0xd8 [ 47.118348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.122862] kasan_atomics+0xb8/0x2e0 [ 47.126507] kunit_try_run_case+0x170/0x3f0 [ 47.130674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.136143] kthread+0x328/0x630 [ 47.139355] ret_from_fork+0x10/0x20 [ 47.142914] [ 47.144389] The buggy address belongs to the object at ffff000803afab80 [ 47.144389] which belongs to the cache kmalloc-64 of size 64 [ 47.156716] The buggy address is located 0 bytes to the right of [ 47.156716] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.169562] [ 47.171038] The buggy address belongs to the physical page: [ 47.176594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.184580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.191090] page_type: f5(slab) [ 47.194223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.201947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.209666] page dumped because: kasan: bad access detected [ 47.215221] [ 47.216697] Memory state around the buggy address: [ 47.221477] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.228680] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.235885] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.243086] ^ [ 47.247864] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.255068] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.262271] ================================================================== [ 54.366560] ================================================================== [ 54.373624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 54.381000] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.388378] [ 54.389859] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.389903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.389920] Hardware name: WinLink E850-96 board (DT) [ 54.389940] Call trace: [ 54.389955] show_stack+0x20/0x38 (C) [ 54.389987] dump_stack_lvl+0x8c/0xd0 [ 54.390019] print_report+0x118/0x608 [ 54.390047] kasan_report+0xdc/0x128 [ 54.390077] __asan_report_store8_noabort+0x20/0x30 [ 54.390109] kasan_atomics_helper+0x3e5c/0x4858 [ 54.390137] kasan_atomics+0x198/0x2e0 [ 54.390164] kunit_try_run_case+0x170/0x3f0 [ 54.390198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.390236] kthread+0x328/0x630 [ 54.390268] ret_from_fork+0x10/0x20 [ 54.390299] [ 54.456866] Allocated by task 314: [ 54.460252] kasan_save_stack+0x3c/0x68 [ 54.464071] kasan_save_track+0x20/0x40 [ 54.467891] kasan_save_alloc_info+0x40/0x58 [ 54.472144] __kasan_kmalloc+0xd4/0xd8 [ 54.475876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.480390] kasan_atomics+0xb8/0x2e0 [ 54.484036] kunit_try_run_case+0x170/0x3f0 [ 54.488203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.493671] kthread+0x328/0x630 [ 54.496883] ret_from_fork+0x10/0x20 [ 54.500442] [ 54.501917] The buggy address belongs to the object at ffff000803afab80 [ 54.501917] which belongs to the cache kmalloc-64 of size 64 [ 54.514244] The buggy address is located 0 bytes to the right of [ 54.514244] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.527091] [ 54.528567] The buggy address belongs to the physical page: [ 54.534122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.542108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.548619] page_type: f5(slab) [ 54.551751] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.559476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.567194] page dumped because: kasan: bad access detected [ 54.572750] [ 54.574225] Memory state around the buggy address: [ 54.579003] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.586208] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.593413] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.600614] ^ [ 54.605392] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.612597] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.619798] ================================================================== [ 50.167140] ================================================================== [ 50.174206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 50.181496] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.188875] [ 50.190356] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.190402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.190418] Hardware name: WinLink E850-96 board (DT) [ 50.190435] Call trace: [ 50.190448] show_stack+0x20/0x38 (C) [ 50.190479] dump_stack_lvl+0x8c/0xd0 [ 50.190512] print_report+0x118/0x608 [ 50.190543] kasan_report+0xdc/0x128 [ 50.190571] kasan_check_range+0x100/0x1a8 [ 50.190601] __kasan_check_write+0x20/0x30 [ 50.190632] kasan_atomics_helper+0x99c/0x4858 [ 50.190661] kasan_atomics+0x198/0x2e0 [ 50.190687] kunit_try_run_case+0x170/0x3f0 [ 50.190724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.190759] kthread+0x328/0x630 [ 50.190791] ret_from_fork+0x10/0x20 [ 50.190819] [ 50.260575] Allocated by task 314: [ 50.263961] kasan_save_stack+0x3c/0x68 [ 50.267780] kasan_save_track+0x20/0x40 [ 50.271599] kasan_save_alloc_info+0x40/0x58 [ 50.275853] __kasan_kmalloc+0xd4/0xd8 [ 50.279585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.284099] kasan_atomics+0xb8/0x2e0 [ 50.287745] kunit_try_run_case+0x170/0x3f0 [ 50.291911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.297380] kthread+0x328/0x630 [ 50.300592] ret_from_fork+0x10/0x20 [ 50.304151] [ 50.305626] The buggy address belongs to the object at ffff000803afab80 [ 50.305626] which belongs to the cache kmalloc-64 of size 64 [ 50.317953] The buggy address is located 0 bytes to the right of [ 50.317953] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.330800] [ 50.332275] The buggy address belongs to the physical page: [ 50.337831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.345817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.352327] page_type: f5(slab) [ 50.355460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.363184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.370904] page dumped because: kasan: bad access detected [ 50.376459] [ 50.377934] Memory state around the buggy address: [ 50.382714] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.389918] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.397122] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.404323] ^ [ 50.409101] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.416306] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.423506] ================================================================== [ 54.627114] ================================================================== [ 54.634209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 54.641499] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.648877] [ 54.650357] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.650405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.650421] Hardware name: WinLink E850-96 board (DT) [ 54.650440] Call trace: [ 54.650450] show_stack+0x20/0x38 (C) [ 54.650479] dump_stack_lvl+0x8c/0xd0 [ 54.650511] print_report+0x118/0x608 [ 54.650541] kasan_report+0xdc/0x128 [ 54.650571] kasan_check_range+0x100/0x1a8 [ 54.650601] __kasan_check_write+0x20/0x30 [ 54.650634] kasan_atomics_helper+0xeb8/0x4858 [ 54.650661] kasan_atomics+0x198/0x2e0 [ 54.650689] kunit_try_run_case+0x170/0x3f0 [ 54.650724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.650761] kthread+0x328/0x630 [ 54.650793] ret_from_fork+0x10/0x20 [ 54.650827] [ 54.720578] Allocated by task 314: [ 54.723963] kasan_save_stack+0x3c/0x68 [ 54.727782] kasan_save_track+0x20/0x40 [ 54.731602] kasan_save_alloc_info+0x40/0x58 [ 54.735855] __kasan_kmalloc+0xd4/0xd8 [ 54.739588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.744101] kasan_atomics+0xb8/0x2e0 [ 54.747747] kunit_try_run_case+0x170/0x3f0 [ 54.751914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.757383] kthread+0x328/0x630 [ 54.760594] ret_from_fork+0x10/0x20 [ 54.764153] [ 54.765629] The buggy address belongs to the object at ffff000803afab80 [ 54.765629] which belongs to the cache kmalloc-64 of size 64 [ 54.777956] The buggy address is located 0 bytes to the right of [ 54.777956] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.790802] [ 54.792278] The buggy address belongs to the physical page: [ 54.797835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.805819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.812330] page_type: f5(slab) [ 54.815464] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.823187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.830906] page dumped because: kasan: bad access detected [ 54.836461] [ 54.837937] Memory state around the buggy address: [ 54.842716] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.849920] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.857125] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.864326] ^ [ 54.869104] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.876308] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.883509] ================================================================== [ 52.530671] ================================================================== [ 52.537713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 52.545003] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.552381] [ 52.553862] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.553910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.553924] Hardware name: WinLink E850-96 board (DT) [ 52.553943] Call trace: [ 52.553954] show_stack+0x20/0x38 (C) [ 52.553983] dump_stack_lvl+0x8c/0xd0 [ 52.554018] print_report+0x118/0x608 [ 52.554047] kasan_report+0xdc/0x128 [ 52.554076] kasan_check_range+0x100/0x1a8 [ 52.554108] __kasan_check_write+0x20/0x30 [ 52.554137] kasan_atomics_helper+0xca0/0x4858 [ 52.554168] kasan_atomics+0x198/0x2e0 [ 52.554196] kunit_try_run_case+0x170/0x3f0 [ 52.554231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.554268] kthread+0x328/0x630 [ 52.554301] ret_from_fork+0x10/0x20 [ 52.554333] [ 52.624081] Allocated by task 314: [ 52.627467] kasan_save_stack+0x3c/0x68 [ 52.631286] kasan_save_track+0x20/0x40 [ 52.635106] kasan_save_alloc_info+0x40/0x58 [ 52.639359] __kasan_kmalloc+0xd4/0xd8 [ 52.643091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.647605] kasan_atomics+0xb8/0x2e0 [ 52.651251] kunit_try_run_case+0x170/0x3f0 [ 52.655418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.660886] kthread+0x328/0x630 [ 52.664098] ret_from_fork+0x10/0x20 [ 52.667657] [ 52.669132] The buggy address belongs to the object at ffff000803afab80 [ 52.669132] which belongs to the cache kmalloc-64 of size 64 [ 52.681459] The buggy address is located 0 bytes to the right of [ 52.681459] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.694306] [ 52.695782] The buggy address belongs to the physical page: [ 52.701338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.709323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.715833] page_type: f5(slab) [ 52.718968] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.726691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.734410] page dumped because: kasan: bad access detected [ 52.739965] [ 52.741440] Memory state around the buggy address: [ 52.746221] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.753423] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.760628] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.767829] ^ [ 52.772607] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.779812] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.787015] ================================================================== [ 46.478502] ================================================================== [ 46.485548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 46.492837] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 46.500215] [ 46.501697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 46.501750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.501765] Hardware name: WinLink E850-96 board (DT) [ 46.501784] Call trace: [ 46.501795] show_stack+0x20/0x38 (C) [ 46.501827] dump_stack_lvl+0x8c/0xd0 [ 46.501862] print_report+0x118/0x608 [ 46.501890] kasan_report+0xdc/0x128 [ 46.501917] kasan_check_range+0x100/0x1a8 [ 46.501948] __kasan_check_write+0x20/0x30 [ 46.501978] kasan_atomics_helper+0x3ac/0x4858 [ 46.502007] kasan_atomics+0x198/0x2e0 [ 46.502034] kunit_try_run_case+0x170/0x3f0 [ 46.502070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.502109] kthread+0x328/0x630 [ 46.502142] ret_from_fork+0x10/0x20 [ 46.502174] [ 46.571915] Allocated by task 314: [ 46.575302] kasan_save_stack+0x3c/0x68 [ 46.579120] kasan_save_track+0x20/0x40 [ 46.582939] kasan_save_alloc_info+0x40/0x58 [ 46.587193] __kasan_kmalloc+0xd4/0xd8 [ 46.590925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.595439] kasan_atomics+0xb8/0x2e0 [ 46.599085] kunit_try_run_case+0x170/0x3f0 [ 46.603251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.608720] kthread+0x328/0x630 [ 46.611932] ret_from_fork+0x10/0x20 [ 46.615491] [ 46.616966] The buggy address belongs to the object at ffff000803afab80 [ 46.616966] which belongs to the cache kmalloc-64 of size 64 [ 46.629294] The buggy address is located 0 bytes to the right of [ 46.629294] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.642140] [ 46.643616] The buggy address belongs to the physical page: [ 46.649174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.657157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.663667] page_type: f5(slab) [ 46.666802] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.674525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.682244] page dumped because: kasan: bad access detected [ 46.687799] [ 46.689274] Memory state around the buggy address: [ 46.694055] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.701257] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.708462] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.715663] ^ [ 46.720441] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.727646] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.734847] ================================================================== [ 53.578920] ================================================================== [ 53.585962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 53.593251] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.600542] [ 53.602023] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.602070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.602084] Hardware name: WinLink E850-96 board (DT) [ 53.602103] Call trace: [ 53.602115] show_stack+0x20/0x38 (C) [ 53.602144] dump_stack_lvl+0x8c/0xd0 [ 53.602179] print_report+0x118/0x608 [ 53.602210] kasan_report+0xdc/0x128 [ 53.602239] kasan_check_range+0x100/0x1a8 [ 53.602270] __kasan_check_read+0x20/0x30 [ 53.602301] kasan_atomics_helper+0xdd4/0x4858 [ 53.602330] kasan_atomics+0x198/0x2e0 [ 53.602358] kunit_try_run_case+0x170/0x3f0 [ 53.602392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.602431] kthread+0x328/0x630 [ 53.602464] ret_from_fork+0x10/0x20 [ 53.602495] [ 53.672155] Allocated by task 314: [ 53.675542] kasan_save_stack+0x3c/0x68 [ 53.679361] kasan_save_track+0x20/0x40 [ 53.683180] kasan_save_alloc_info+0x40/0x58 [ 53.687433] __kasan_kmalloc+0xd4/0xd8 [ 53.691166] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.695680] kasan_atomics+0xb8/0x2e0 [ 53.699326] kunit_try_run_case+0x170/0x3f0 [ 53.703492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.708961] kthread+0x328/0x630 [ 53.712173] ret_from_fork+0x10/0x20 [ 53.715731] [ 53.717207] The buggy address belongs to the object at ffff000803afab80 [ 53.717207] which belongs to the cache kmalloc-64 of size 64 [ 53.729534] The buggy address is located 0 bytes to the right of [ 53.729534] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 53.742380] [ 53.743857] The buggy address belongs to the physical page: [ 53.749412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 53.757398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.763908] page_type: f5(slab) [ 53.767041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.774765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.782484] page dumped because: kasan: bad access detected [ 53.788040] [ 53.789515] Memory state around the buggy address: [ 53.794295] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.801498] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.808703] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.815904] ^ [ 53.820682] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.827887] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.835088] ================================================================== [ 59.372882] ================================================================== [ 59.379971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 59.387348] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.394640] [ 59.396119] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.396163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.396179] Hardware name: WinLink E850-96 board (DT) [ 59.396197] Call trace: [ 59.396208] show_stack+0x20/0x38 (C) [ 59.396238] dump_stack_lvl+0x8c/0xd0 [ 59.396270] print_report+0x118/0x608 [ 59.396299] kasan_report+0xdc/0x128 [ 59.396328] __asan_report_load8_noabort+0x20/0x30 [ 59.396362] kasan_atomics_helper+0x3db0/0x4858 [ 59.396391] kasan_atomics+0x198/0x2e0 [ 59.396418] kunit_try_run_case+0x170/0x3f0 [ 59.396451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.396488] kthread+0x328/0x630 [ 59.396522] ret_from_fork+0x10/0x20 [ 59.396552] [ 59.463041] Allocated by task 314: [ 59.466426] kasan_save_stack+0x3c/0x68 [ 59.470246] kasan_save_track+0x20/0x40 [ 59.474065] kasan_save_alloc_info+0x40/0x58 [ 59.478319] __kasan_kmalloc+0xd4/0xd8 [ 59.482051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.486565] kasan_atomics+0xb8/0x2e0 [ 59.490211] kunit_try_run_case+0x170/0x3f0 [ 59.494378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.499846] kthread+0x328/0x630 [ 59.503058] ret_from_fork+0x10/0x20 [ 59.506617] [ 59.508092] The buggy address belongs to the object at ffff000803afab80 [ 59.508092] which belongs to the cache kmalloc-64 of size 64 [ 59.520419] The buggy address is located 0 bytes to the right of [ 59.520419] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.533266] [ 59.534742] The buggy address belongs to the physical page: [ 59.540297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.548283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.554794] page_type: f5(slab) [ 59.557926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.565650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.573369] page dumped because: kasan: bad access detected [ 59.578925] [ 59.580400] Memory state around the buggy address: [ 59.585181] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.592383] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.599588] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.606789] ^ [ 59.611567] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.618772] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.625973] ================================================================== [ 55.154573] ================================================================== [ 55.161631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 55.168922] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.176300] [ 55.177780] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.177825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.177840] Hardware name: WinLink E850-96 board (DT) [ 55.177858] Call trace: [ 55.177870] show_stack+0x20/0x38 (C) [ 55.177901] dump_stack_lvl+0x8c/0xd0 [ 55.177934] print_report+0x118/0x608 [ 55.177966] kasan_report+0xdc/0x128 [ 55.177992] kasan_check_range+0x100/0x1a8 [ 55.178024] __kasan_check_write+0x20/0x30 [ 55.178055] kasan_atomics_helper+0xf88/0x4858 [ 55.178084] kasan_atomics+0x198/0x2e0 [ 55.178109] kunit_try_run_case+0x170/0x3f0 [ 55.178144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.178183] kthread+0x328/0x630 [ 55.178215] ret_from_fork+0x10/0x20 [ 55.178248] [ 55.248000] Allocated by task 314: [ 55.251386] kasan_save_stack+0x3c/0x68 [ 55.255205] kasan_save_track+0x20/0x40 [ 55.259024] kasan_save_alloc_info+0x40/0x58 [ 55.263278] __kasan_kmalloc+0xd4/0xd8 [ 55.267011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.271524] kasan_atomics+0xb8/0x2e0 [ 55.275170] kunit_try_run_case+0x170/0x3f0 [ 55.279337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.284805] kthread+0x328/0x630 [ 55.288017] ret_from_fork+0x10/0x20 [ 55.291576] [ 55.293052] The buggy address belongs to the object at ffff000803afab80 [ 55.293052] which belongs to the cache kmalloc-64 of size 64 [ 55.305378] The buggy address is located 0 bytes to the right of [ 55.305378] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.318225] [ 55.319701] The buggy address belongs to the physical page: [ 55.325257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.333242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.339752] page_type: f5(slab) [ 55.342885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.350610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.358329] page dumped because: kasan: bad access detected [ 55.363884] [ 55.365359] Memory state around the buggy address: [ 55.370139] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.377342] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.384547] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.391748] ^ [ 55.396526] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.403731] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.410932] ================================================================== [ 55.418297] ================================================================== [ 55.425344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 55.432633] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.440011] [ 55.441491] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.441537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.441552] Hardware name: WinLink E850-96 board (DT) [ 55.441570] Call trace: [ 55.441580] show_stack+0x20/0x38 (C) [ 55.441612] dump_stack_lvl+0x8c/0xd0 [ 55.441643] print_report+0x118/0x608 [ 55.441671] kasan_report+0xdc/0x128 [ 55.441699] kasan_check_range+0x100/0x1a8 [ 55.441729] __kasan_check_write+0x20/0x30 [ 55.441760] kasan_atomics_helper+0xff0/0x4858 [ 55.441791] kasan_atomics+0x198/0x2e0 [ 55.441818] kunit_try_run_case+0x170/0x3f0 [ 55.441851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.441889] kthread+0x328/0x630 [ 55.441920] ret_from_fork+0x10/0x20 [ 55.441950] [ 55.511712] Allocated by task 314: [ 55.515097] kasan_save_stack+0x3c/0x68 [ 55.518916] kasan_save_track+0x20/0x40 [ 55.522736] kasan_save_alloc_info+0x40/0x58 [ 55.526989] __kasan_kmalloc+0xd4/0xd8 [ 55.530722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.535236] kasan_atomics+0xb8/0x2e0 [ 55.538881] kunit_try_run_case+0x170/0x3f0 [ 55.543048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.548517] kthread+0x328/0x630 [ 55.551728] ret_from_fork+0x10/0x20 [ 55.555287] [ 55.556763] The buggy address belongs to the object at ffff000803afab80 [ 55.556763] which belongs to the cache kmalloc-64 of size 64 [ 55.569089] The buggy address is located 0 bytes to the right of [ 55.569089] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.581936] [ 55.583412] The buggy address belongs to the physical page: [ 55.588968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.596953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.603464] page_type: f5(slab) [ 55.606596] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.614321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.622040] page dumped because: kasan: bad access detected [ 55.627595] [ 55.629071] Memory state around the buggy address: [ 55.633852] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.641054] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.648258] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.655459] ^ [ 55.660237] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.667442] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.674643] ================================================================== [ 50.694568] ================================================================== [ 50.701629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 50.708919] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.716297] [ 50.717779] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.717824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.717840] Hardware name: WinLink E850-96 board (DT) [ 50.717858] Call trace: [ 50.717873] show_stack+0x20/0x38 (C) [ 50.717902] dump_stack_lvl+0x8c/0xd0 [ 50.717936] print_report+0x118/0x608 [ 50.717966] kasan_report+0xdc/0x128 [ 50.717994] kasan_check_range+0x100/0x1a8 [ 50.718025] __kasan_check_write+0x20/0x30 [ 50.718056] kasan_atomics_helper+0xa6c/0x4858 [ 50.718085] kasan_atomics+0x198/0x2e0 [ 50.718113] kunit_try_run_case+0x170/0x3f0 [ 50.718146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.718184] kthread+0x328/0x630 [ 50.718217] ret_from_fork+0x10/0x20 [ 50.718247] [ 50.787998] Allocated by task 314: [ 50.791383] kasan_save_stack+0x3c/0x68 [ 50.795203] kasan_save_track+0x20/0x40 [ 50.799022] kasan_save_alloc_info+0x40/0x58 [ 50.803275] __kasan_kmalloc+0xd4/0xd8 [ 50.807008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.811522] kasan_atomics+0xb8/0x2e0 [ 50.815168] kunit_try_run_case+0x170/0x3f0 [ 50.819334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.824803] kthread+0x328/0x630 [ 50.828015] ret_from_fork+0x10/0x20 [ 50.831574] [ 50.833049] The buggy address belongs to the object at ffff000803afab80 [ 50.833049] which belongs to the cache kmalloc-64 of size 64 [ 50.845376] The buggy address is located 0 bytes to the right of [ 50.845376] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.858222] [ 50.859698] The buggy address belongs to the physical page: [ 50.865254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.873240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.879750] page_type: f5(slab) [ 50.882883] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.890607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.898326] page dumped because: kasan: bad access detected [ 50.903881] [ 50.905357] Memory state around the buggy address: [ 50.910135] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.917340] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.924545] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.931745] ^ [ 50.936524] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.943729] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.950930] ================================================================== [ 46.217947] ================================================================== [ 46.224960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 46.232337] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 46.239715] [ 46.241198] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 46.241247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.241262] Hardware name: WinLink E850-96 board (DT) [ 46.241282] Call trace: [ 46.241296] show_stack+0x20/0x38 (C) [ 46.241329] dump_stack_lvl+0x8c/0xd0 [ 46.241362] print_report+0x118/0x608 [ 46.241391] kasan_report+0xdc/0x128 [ 46.241421] __asan_report_store4_noabort+0x20/0x30 [ 46.241454] kasan_atomics_helper+0x3f94/0x4858 [ 46.241481] kasan_atomics+0x198/0x2e0 [ 46.241508] kunit_try_run_case+0x170/0x3f0 [ 46.241542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.241579] kthread+0x328/0x630 [ 46.241610] ret_from_fork+0x10/0x20 [ 46.241644] [ 46.308204] Allocated by task 314: [ 46.311591] kasan_save_stack+0x3c/0x68 [ 46.315409] kasan_save_track+0x20/0x40 [ 46.319228] kasan_save_alloc_info+0x40/0x58 [ 46.323482] __kasan_kmalloc+0xd4/0xd8 [ 46.327214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.331728] kasan_atomics+0xb8/0x2e0 [ 46.335374] kunit_try_run_case+0x170/0x3f0 [ 46.339540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.345009] kthread+0x328/0x630 [ 46.348221] ret_from_fork+0x10/0x20 [ 46.351780] [ 46.353255] The buggy address belongs to the object at ffff000803afab80 [ 46.353255] which belongs to the cache kmalloc-64 of size 64 [ 46.365582] The buggy address is located 0 bytes to the right of [ 46.365582] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.378428] [ 46.379905] The buggy address belongs to the physical page: [ 46.385462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.393445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.399956] page_type: f5(slab) [ 46.403089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.410813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.418532] page dumped because: kasan: bad access detected [ 46.424087] [ 46.425563] Memory state around the buggy address: [ 46.430341] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.437546] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.444751] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.451952] ^ [ 46.456730] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.463935] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.471136] ================================================================== [ 56.209731] ================================================================== [ 56.216824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 56.224201] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 56.231579] [ 56.233059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 56.233106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.233122] Hardware name: WinLink E850-96 board (DT) [ 56.233143] Call trace: [ 56.233155] show_stack+0x20/0x38 (C) [ 56.233187] dump_stack_lvl+0x8c/0xd0 [ 56.233219] print_report+0x118/0x608 [ 56.233250] kasan_report+0xdc/0x128 [ 56.233279] kasan_check_range+0x100/0x1a8 [ 56.233312] __kasan_check_write+0x20/0x30 [ 56.233345] kasan_atomics_helper+0x1128/0x4858 [ 56.233373] kasan_atomics+0x198/0x2e0 [ 56.233399] kunit_try_run_case+0x170/0x3f0 [ 56.233431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.233469] kthread+0x328/0x630 [ 56.233502] ret_from_fork+0x10/0x20 [ 56.233529] [ 56.303366] Allocated by task 314: [ 56.306752] kasan_save_stack+0x3c/0x68 [ 56.310571] kasan_save_track+0x20/0x40 [ 56.314391] kasan_save_alloc_info+0x40/0x58 [ 56.318644] __kasan_kmalloc+0xd4/0xd8 [ 56.322376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.326890] kasan_atomics+0xb8/0x2e0 [ 56.330536] kunit_try_run_case+0x170/0x3f0 [ 56.334703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.340171] kthread+0x328/0x630 [ 56.343383] ret_from_fork+0x10/0x20 [ 56.346942] [ 56.348418] The buggy address belongs to the object at ffff000803afab80 [ 56.348418] which belongs to the cache kmalloc-64 of size 64 [ 56.360744] The buggy address is located 0 bytes to the right of [ 56.360744] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.373591] [ 56.375067] The buggy address belongs to the physical page: [ 56.380623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.388608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.395119] page_type: f5(slab) [ 56.398251] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.405976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.413695] page dumped because: kasan: bad access detected [ 56.419250] [ 56.420725] Memory state around the buggy address: [ 56.425505] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.432709] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.439913] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.447114] ^ [ 56.451892] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.459097] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.466298] ================================================================== [ 59.897211] ================================================================== [ 59.904270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 59.911646] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.918937] [ 59.920419] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.920466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.920481] Hardware name: WinLink E850-96 board (DT) [ 59.920499] Call trace: [ 59.920511] show_stack+0x20/0x38 (C) [ 59.920543] dump_stack_lvl+0x8c/0xd0 [ 59.920575] print_report+0x118/0x608 [ 59.920604] kasan_report+0xdc/0x128 [ 59.920632] __asan_report_load8_noabort+0x20/0x30 [ 59.920666] kasan_atomics_helper+0x3df4/0x4858 [ 59.920697] kasan_atomics+0x198/0x2e0 [ 59.920724] kunit_try_run_case+0x170/0x3f0 [ 59.920760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.920797] kthread+0x328/0x630 [ 59.920829] ret_from_fork+0x10/0x20 [ 59.920861] [ 59.987340] Allocated by task 314: [ 59.990725] kasan_save_stack+0x3c/0x68 [ 59.994544] kasan_save_track+0x20/0x40 [ 59.998363] kasan_save_alloc_info+0x40/0x58 [ 60.002617] __kasan_kmalloc+0xd4/0xd8 [ 60.006349] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.010863] kasan_atomics+0xb8/0x2e0 [ 60.014509] kunit_try_run_case+0x170/0x3f0 [ 60.018675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.024144] kthread+0x328/0x630 [ 60.027356] ret_from_fork+0x10/0x20 [ 60.030915] [ 60.032390] The buggy address belongs to the object at ffff000803afab80 [ 60.032390] which belongs to the cache kmalloc-64 of size 64 [ 60.044717] The buggy address is located 0 bytes to the right of [ 60.044717] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.057563] [ 60.059039] The buggy address belongs to the physical page: [ 60.064595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.072581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.079091] page_type: f5(slab) [ 60.082224] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.089948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.097667] page dumped because: kasan: bad access detected [ 60.103222] [ 60.104698] Memory state around the buggy address: [ 60.109476] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.116681] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.123886] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.131087] ^ [ 60.135865] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.143069] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.150272] ================================================================== [ 57.529209] ================================================================== [ 57.536249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 57.543626] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.551004] [ 57.552484] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.552532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.552547] Hardware name: WinLink E850-96 board (DT) [ 57.552566] Call trace: [ 57.552578] show_stack+0x20/0x38 (C) [ 57.552612] dump_stack_lvl+0x8c/0xd0 [ 57.552645] print_report+0x118/0x608 [ 57.552672] kasan_report+0xdc/0x128 [ 57.552700] kasan_check_range+0x100/0x1a8 [ 57.552731] __kasan_check_write+0x20/0x30 [ 57.552762] kasan_atomics_helper+0x1384/0x4858 [ 57.552792] kasan_atomics+0x198/0x2e0 [ 57.552819] kunit_try_run_case+0x170/0x3f0 [ 57.552852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.552889] kthread+0x328/0x630 [ 57.552922] ret_from_fork+0x10/0x20 [ 57.552956] [ 57.622791] Allocated by task 314: [ 57.626177] kasan_save_stack+0x3c/0x68 [ 57.629996] kasan_save_track+0x20/0x40 [ 57.633815] kasan_save_alloc_info+0x40/0x58 [ 57.638069] __kasan_kmalloc+0xd4/0xd8 [ 57.641801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.646315] kasan_atomics+0xb8/0x2e0 [ 57.649961] kunit_try_run_case+0x170/0x3f0 [ 57.654127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.659596] kthread+0x328/0x630 [ 57.662808] ret_from_fork+0x10/0x20 [ 57.666367] [ 57.667842] The buggy address belongs to the object at ffff000803afab80 [ 57.667842] which belongs to the cache kmalloc-64 of size 64 [ 57.680169] The buggy address is located 0 bytes to the right of [ 57.680169] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.693016] [ 57.694491] The buggy address belongs to the physical page: [ 57.700047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.708033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.714543] page_type: f5(slab) [ 57.717676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.725400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.733119] page dumped because: kasan: bad access detected [ 57.738674] [ 57.740150] Memory state around the buggy address: [ 57.744928] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.752133] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.759338] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.766539] ^ [ 57.771317] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.778522] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.785722] ================================================================== [ 60.681930] ================================================================== [ 60.688979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 60.696356] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.703734] [ 60.705216] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.705263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.705279] Hardware name: WinLink E850-96 board (DT) [ 60.705296] Call trace: [ 60.705307] show_stack+0x20/0x38 (C) [ 60.705339] dump_stack_lvl+0x8c/0xd0 [ 60.705370] print_report+0x118/0x608 [ 60.705401] kasan_report+0xdc/0x128 [ 60.705429] kasan_check_range+0x100/0x1a8 [ 60.705461] __kasan_check_write+0x20/0x30 [ 60.705493] kasan_atomics_helper+0x175c/0x4858 [ 60.705521] kasan_atomics+0x198/0x2e0 [ 60.705548] kunit_try_run_case+0x170/0x3f0 [ 60.705583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.705620] kthread+0x328/0x630 [ 60.705651] ret_from_fork+0x10/0x20 [ 60.705679] [ 60.775521] Allocated by task 314: [ 60.778907] kasan_save_stack+0x3c/0x68 [ 60.782726] kasan_save_track+0x20/0x40 [ 60.786545] kasan_save_alloc_info+0x40/0x58 [ 60.790799] __kasan_kmalloc+0xd4/0xd8 [ 60.794531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.799045] kasan_atomics+0xb8/0x2e0 [ 60.802691] kunit_try_run_case+0x170/0x3f0 [ 60.806857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.812326] kthread+0x328/0x630 [ 60.815538] ret_from_fork+0x10/0x20 [ 60.819097] [ 60.820573] The buggy address belongs to the object at ffff000803afab80 [ 60.820573] which belongs to the cache kmalloc-64 of size 64 [ 60.832899] The buggy address is located 0 bytes to the right of [ 60.832899] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.845746] [ 60.847222] The buggy address belongs to the physical page: [ 60.852778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.860763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.867274] page_type: f5(slab) [ 60.870408] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.878131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.885850] page dumped because: kasan: bad access detected [ 60.891405] [ 60.892880] Memory state around the buggy address: [ 60.897659] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.904864] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.912068] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.919269] ^ [ 60.924047] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.931252] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.938453] ================================================================== [ 47.533354] ================================================================== [ 47.540393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 47.547682] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.555060] [ 47.556542] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.556587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.556602] Hardware name: WinLink E850-96 board (DT) [ 47.556622] Call trace: [ 47.556636] show_stack+0x20/0x38 (C) [ 47.556666] dump_stack_lvl+0x8c/0xd0 [ 47.556702] print_report+0x118/0x608 [ 47.556731] kasan_report+0xdc/0x128 [ 47.556759] kasan_check_range+0x100/0x1a8 [ 47.556789] __kasan_check_write+0x20/0x30 [ 47.556822] kasan_atomics_helper+0x54c/0x4858 [ 47.556851] kasan_atomics+0x198/0x2e0 [ 47.556879] kunit_try_run_case+0x170/0x3f0 [ 47.556914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.556951] kthread+0x328/0x630 [ 47.556982] ret_from_fork+0x10/0x20 [ 47.557014] [ 47.626761] Allocated by task 314: [ 47.630146] kasan_save_stack+0x3c/0x68 [ 47.633965] kasan_save_track+0x20/0x40 [ 47.637785] kasan_save_alloc_info+0x40/0x58 [ 47.642038] __kasan_kmalloc+0xd4/0xd8 [ 47.645771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.650284] kasan_atomics+0xb8/0x2e0 [ 47.653930] kunit_try_run_case+0x170/0x3f0 [ 47.658097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.663565] kthread+0x328/0x630 [ 47.666777] ret_from_fork+0x10/0x20 [ 47.670336] [ 47.671812] The buggy address belongs to the object at ffff000803afab80 [ 47.671812] which belongs to the cache kmalloc-64 of size 64 [ 47.684139] The buggy address is located 0 bytes to the right of [ 47.684139] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.696985] [ 47.698461] The buggy address belongs to the physical page: [ 47.704017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.712003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.718513] page_type: f5(slab) [ 47.721645] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.729370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.737089] page dumped because: kasan: bad access detected [ 47.742644] [ 47.744120] Memory state around the buggy address: [ 47.748898] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.756103] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.763307] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.770508] ^ [ 47.775286] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.782491] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.789692] ================================================================== [ 50.958276] ================================================================== [ 50.965340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 50.972631] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.980009] [ 50.981490] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.981537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.981551] Hardware name: WinLink E850-96 board (DT) [ 50.981569] Call trace: [ 50.981580] show_stack+0x20/0x38 (C) [ 50.981610] dump_stack_lvl+0x8c/0xd0 [ 50.981645] print_report+0x118/0x608 [ 50.981675] kasan_report+0xdc/0x128 [ 50.981703] kasan_check_range+0x100/0x1a8 [ 50.981735] __kasan_check_write+0x20/0x30 [ 50.981767] kasan_atomics_helper+0xad4/0x4858 [ 50.981798] kasan_atomics+0x198/0x2e0 [ 50.981825] kunit_try_run_case+0x170/0x3f0 [ 50.981862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.981901] kthread+0x328/0x630 [ 50.981933] ret_from_fork+0x10/0x20 [ 50.981963] [ 51.051709] Allocated by task 314: [ 51.055095] kasan_save_stack+0x3c/0x68 [ 51.058914] kasan_save_track+0x20/0x40 [ 51.062733] kasan_save_alloc_info+0x40/0x58 [ 51.066987] __kasan_kmalloc+0xd4/0xd8 [ 51.070719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.075233] kasan_atomics+0xb8/0x2e0 [ 51.078879] kunit_try_run_case+0x170/0x3f0 [ 51.083045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.088514] kthread+0x328/0x630 [ 51.091726] ret_from_fork+0x10/0x20 [ 51.095285] [ 51.096760] The buggy address belongs to the object at ffff000803afab80 [ 51.096760] which belongs to the cache kmalloc-64 of size 64 [ 51.109087] The buggy address is located 0 bytes to the right of [ 51.109087] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.121934] [ 51.123410] The buggy address belongs to the physical page: [ 51.128965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.136951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.143461] page_type: f5(slab) [ 51.146595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.154318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.162037] page dumped because: kasan: bad access detected [ 51.167593] [ 51.169068] Memory state around the buggy address: [ 51.173848] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.181051] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.188256] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.195457] ^ [ 51.200235] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.207440] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.214641] ================================================================== [ 48.060792] ================================================================== [ 48.067814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 48.075105] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.082483] [ 48.083964] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.084010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.084024] Hardware name: WinLink E850-96 board (DT) [ 48.084044] Call trace: [ 48.084057] show_stack+0x20/0x38 (C) [ 48.084089] dump_stack_lvl+0x8c/0xd0 [ 48.084123] print_report+0x118/0x608 [ 48.084154] kasan_report+0xdc/0x128 [ 48.084182] kasan_check_range+0x100/0x1a8 [ 48.084212] __kasan_check_write+0x20/0x30 [ 48.084245] kasan_atomics_helper+0x61c/0x4858 [ 48.084274] kasan_atomics+0x198/0x2e0 [ 48.084301] kunit_try_run_case+0x170/0x3f0 [ 48.084338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.084375] kthread+0x328/0x630 [ 48.084406] ret_from_fork+0x10/0x20 [ 48.084437] [ 48.154183] Allocated by task 314: [ 48.157569] kasan_save_stack+0x3c/0x68 [ 48.161388] kasan_save_track+0x20/0x40 [ 48.165207] kasan_save_alloc_info+0x40/0x58 [ 48.169461] __kasan_kmalloc+0xd4/0xd8 [ 48.173193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.177707] kasan_atomics+0xb8/0x2e0 [ 48.181353] kunit_try_run_case+0x170/0x3f0 [ 48.185520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.190988] kthread+0x328/0x630 [ 48.194200] ret_from_fork+0x10/0x20 [ 48.197759] [ 48.199234] The buggy address belongs to the object at ffff000803afab80 [ 48.199234] which belongs to the cache kmalloc-64 of size 64 [ 48.211561] The buggy address is located 0 bytes to the right of [ 48.211561] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 48.224408] [ 48.225884] The buggy address belongs to the physical page: [ 48.231440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 48.239425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.245935] page_type: f5(slab) [ 48.249068] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.256792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.264511] page dumped because: kasan: bad access detected [ 48.270067] [ 48.271542] Memory state around the buggy address: [ 48.276324] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.283526] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.290730] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.297931] ^ [ 48.302709] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.309914] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.317115] ================================================================== [ 52.794357] ================================================================== [ 52.801425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 52.808801] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.816092] [ 52.817573] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.817620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.817636] Hardware name: WinLink E850-96 board (DT) [ 52.817655] Call trace: [ 52.817665] show_stack+0x20/0x38 (C) [ 52.817695] dump_stack_lvl+0x8c/0xd0 [ 52.817728] print_report+0x118/0x608 [ 52.817757] kasan_report+0xdc/0x128 [ 52.817787] __asan_report_load4_noabort+0x20/0x30 [ 52.817820] kasan_atomics_helper+0x3dd8/0x4858 [ 52.817851] kasan_atomics+0x198/0x2e0 [ 52.817877] kunit_try_run_case+0x170/0x3f0 [ 52.817911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.817949] kthread+0x328/0x630 [ 52.817981] ret_from_fork+0x10/0x20 [ 52.818014] [ 52.884494] Allocated by task 314: [ 52.887879] kasan_save_stack+0x3c/0x68 [ 52.891699] kasan_save_track+0x20/0x40 [ 52.895518] kasan_save_alloc_info+0x40/0x58 [ 52.899772] __kasan_kmalloc+0xd4/0xd8 [ 52.903504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.908018] kasan_atomics+0xb8/0x2e0 [ 52.911664] kunit_try_run_case+0x170/0x3f0 [ 52.915830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.921299] kthread+0x328/0x630 [ 52.924511] ret_from_fork+0x10/0x20 [ 52.928070] [ 52.929545] The buggy address belongs to the object at ffff000803afab80 [ 52.929545] which belongs to the cache kmalloc-64 of size 64 [ 52.941872] The buggy address is located 0 bytes to the right of [ 52.941872] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.954719] [ 52.956195] The buggy address belongs to the physical page: [ 52.961751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.969736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.976246] page_type: f5(slab) [ 52.979379] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.987103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.994822] page dumped because: kasan: bad access detected [ 53.000378] [ 53.001853] Memory state around the buggy address: [ 53.006633] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.013836] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.021041] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.028242] ^ [ 53.033020] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.040225] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.047427] ================================================================== [ 58.581273] ================================================================== [ 58.588316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 58.595693] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.603072] [ 58.604552] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.604597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.604613] Hardware name: WinLink E850-96 board (DT) [ 58.604631] Call trace: [ 58.604643] show_stack+0x20/0x38 (C) [ 58.604672] dump_stack_lvl+0x8c/0xd0 [ 58.604705] print_report+0x118/0x608 [ 58.604735] kasan_report+0xdc/0x128 [ 58.604762] kasan_check_range+0x100/0x1a8 [ 58.604794] __kasan_check_write+0x20/0x30 [ 58.604826] kasan_atomics_helper+0x14e4/0x4858 [ 58.604855] kasan_atomics+0x198/0x2e0 [ 58.604881] kunit_try_run_case+0x170/0x3f0 [ 58.604914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.604951] kthread+0x328/0x630 [ 58.604983] ret_from_fork+0x10/0x20 [ 58.605011] [ 58.674858] Allocated by task 314: [ 58.678244] kasan_save_stack+0x3c/0x68 [ 58.682063] kasan_save_track+0x20/0x40 [ 58.685883] kasan_save_alloc_info+0x40/0x58 [ 58.690136] __kasan_kmalloc+0xd4/0xd8 [ 58.693869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.698383] kasan_atomics+0xb8/0x2e0 [ 58.702028] kunit_try_run_case+0x170/0x3f0 [ 58.706195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.711664] kthread+0x328/0x630 [ 58.714875] ret_from_fork+0x10/0x20 [ 58.718434] [ 58.719910] The buggy address belongs to the object at ffff000803afab80 [ 58.719910] which belongs to the cache kmalloc-64 of size 64 [ 58.732237] The buggy address is located 0 bytes to the right of [ 58.732237] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 58.745083] [ 58.746559] The buggy address belongs to the physical page: [ 58.752115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 58.760101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.766611] page_type: f5(slab) [ 58.769743] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.777468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.785187] page dumped because: kasan: bad access detected [ 58.790742] [ 58.792218] Memory state around the buggy address: [ 58.796997] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.804201] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.811406] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.818606] ^ [ 58.823385] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.830589] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.837790] ================================================================== [ 53.842441] ================================================================== [ 53.849498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 53.856876] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.864167] [ 53.865648] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.865694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.865709] Hardware name: WinLink E850-96 board (DT) [ 53.865727] Call trace: [ 53.865739] show_stack+0x20/0x38 (C) [ 53.865771] dump_stack_lvl+0x8c/0xd0 [ 53.865805] print_report+0x118/0x608 [ 53.865835] kasan_report+0xdc/0x128 [ 53.865863] __asan_report_load8_noabort+0x20/0x30 [ 53.865897] kasan_atomics_helper+0x3f58/0x4858 [ 53.865928] kasan_atomics+0x198/0x2e0 [ 53.865955] kunit_try_run_case+0x170/0x3f0 [ 53.865990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.866026] kthread+0x328/0x630 [ 53.866058] ret_from_fork+0x10/0x20 [ 53.866089] [ 53.932569] Allocated by task 314: [ 53.935954] kasan_save_stack+0x3c/0x68 [ 53.939774] kasan_save_track+0x20/0x40 [ 53.943593] kasan_save_alloc_info+0x40/0x58 [ 53.947846] __kasan_kmalloc+0xd4/0xd8 [ 53.951579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.956093] kasan_atomics+0xb8/0x2e0 [ 53.959738] kunit_try_run_case+0x170/0x3f0 [ 53.963905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.969374] kthread+0x328/0x630 [ 53.972585] ret_from_fork+0x10/0x20 [ 53.976144] [ 53.977620] The buggy address belongs to the object at ffff000803afab80 [ 53.977620] which belongs to the cache kmalloc-64 of size 64 [ 53.989947] The buggy address is located 0 bytes to the right of [ 53.989947] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.002793] [ 54.004270] The buggy address belongs to the physical page: [ 54.009825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.017811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.024321] page_type: f5(slab) [ 54.027453] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.035178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.042897] page dumped because: kasan: bad access detected [ 54.048452] [ 54.049928] Memory state around the buggy address: [ 54.054707] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.061911] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.069116] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.076317] ^ [ 54.081094] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.088299] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.095500] ================================================================== [ 56.737533] ================================================================== [ 56.744594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 56.751971] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 56.759349] [ 56.760829] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 56.760876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.760891] Hardware name: WinLink E850-96 board (DT) [ 56.760908] Call trace: [ 56.760920] show_stack+0x20/0x38 (C) [ 56.760950] dump_stack_lvl+0x8c/0xd0 [ 56.760980] print_report+0x118/0x608 [ 56.761012] kasan_report+0xdc/0x128 [ 56.761038] kasan_check_range+0x100/0x1a8 [ 56.761069] __kasan_check_write+0x20/0x30 [ 56.761102] kasan_atomics_helper+0x11f8/0x4858 [ 56.761130] kasan_atomics+0x198/0x2e0 [ 56.761157] kunit_try_run_case+0x170/0x3f0 [ 56.761189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.761227] kthread+0x328/0x630 [ 56.761258] ret_from_fork+0x10/0x20 [ 56.761289] [ 56.831136] Allocated by task 314: [ 56.834522] kasan_save_stack+0x3c/0x68 [ 56.838341] kasan_save_track+0x20/0x40 [ 56.842160] kasan_save_alloc_info+0x40/0x58 [ 56.846414] __kasan_kmalloc+0xd4/0xd8 [ 56.850146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.854660] kasan_atomics+0xb8/0x2e0 [ 56.858306] kunit_try_run_case+0x170/0x3f0 [ 56.862472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.867941] kthread+0x328/0x630 [ 56.871153] ret_from_fork+0x10/0x20 [ 56.874712] [ 56.876188] The buggy address belongs to the object at ffff000803afab80 [ 56.876188] which belongs to the cache kmalloc-64 of size 64 [ 56.888514] The buggy address is located 0 bytes to the right of [ 56.888514] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.901361] [ 56.902837] The buggy address belongs to the physical page: [ 56.908393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.916378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.922888] page_type: f5(slab) [ 56.926021] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.933745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.941465] page dumped because: kasan: bad access detected [ 56.947020] [ 56.948495] Memory state around the buggy address: [ 56.953274] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.960479] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.967683] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.974884] ^ [ 56.979662] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.986867] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.994068] ================================================================== [ 57.265299] ================================================================== [ 57.272365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 57.279741] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.287119] [ 57.288599] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.288645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.288662] Hardware name: WinLink E850-96 board (DT) [ 57.288678] Call trace: [ 57.288692] show_stack+0x20/0x38 (C) [ 57.288725] dump_stack_lvl+0x8c/0xd0 [ 57.288757] print_report+0x118/0x608 [ 57.288787] kasan_report+0xdc/0x128 [ 57.288815] kasan_check_range+0x100/0x1a8 [ 57.288845] __kasan_check_write+0x20/0x30 [ 57.288879] kasan_atomics_helper+0x12d8/0x4858 [ 57.288907] kasan_atomics+0x198/0x2e0 [ 57.288935] kunit_try_run_case+0x170/0x3f0 [ 57.288967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.289004] kthread+0x328/0x630 [ 57.289037] ret_from_fork+0x10/0x20 [ 57.289069] [ 57.358906] Allocated by task 314: [ 57.362292] kasan_save_stack+0x3c/0x68 [ 57.366111] kasan_save_track+0x20/0x40 [ 57.369930] kasan_save_alloc_info+0x40/0x58 [ 57.374184] __kasan_kmalloc+0xd4/0xd8 [ 57.377916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.382430] kasan_atomics+0xb8/0x2e0 [ 57.386076] kunit_try_run_case+0x170/0x3f0 [ 57.390242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.395711] kthread+0x328/0x630 [ 57.398923] ret_from_fork+0x10/0x20 [ 57.402482] [ 57.403957] The buggy address belongs to the object at ffff000803afab80 [ 57.403957] which belongs to the cache kmalloc-64 of size 64 [ 57.416284] The buggy address is located 0 bytes to the right of [ 57.416284] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.429131] [ 57.430606] The buggy address belongs to the physical page: [ 57.436163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.444148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.450658] page_type: f5(slab) [ 57.453791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.461516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.469234] page dumped because: kasan: bad access detected [ 57.474790] [ 57.476265] Memory state around the buggy address: [ 57.481044] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.488248] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.495453] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.502654] ^ [ 57.507432] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.514637] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.521838] ================================================================== [ 48.324435] ================================================================== [ 48.331526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 48.338816] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.346194] [ 48.347675] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.347720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.347736] Hardware name: WinLink E850-96 board (DT) [ 48.347755] Call trace: [ 48.347765] show_stack+0x20/0x38 (C) [ 48.347796] dump_stack_lvl+0x8c/0xd0 [ 48.347830] print_report+0x118/0x608 [ 48.347862] kasan_report+0xdc/0x128 [ 48.347889] kasan_check_range+0x100/0x1a8 [ 48.347922] __kasan_check_write+0x20/0x30 [ 48.347955] kasan_atomics_helper+0x684/0x4858 [ 48.347983] kasan_atomics+0x198/0x2e0 [ 48.348009] kunit_try_run_case+0x170/0x3f0 [ 48.348044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.348081] kthread+0x328/0x630 [ 48.348113] ret_from_fork+0x10/0x20 [ 48.348145] [ 48.417894] Allocated by task 314: [ 48.421280] kasan_save_stack+0x3c/0x68 [ 48.425100] kasan_save_track+0x20/0x40 [ 48.428919] kasan_save_alloc_info+0x40/0x58 [ 48.433172] __kasan_kmalloc+0xd4/0xd8 [ 48.436904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.441418] kasan_atomics+0xb8/0x2e0 [ 48.445064] kunit_try_run_case+0x170/0x3f0 [ 48.449231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.454699] kthread+0x328/0x630 [ 48.457911] ret_from_fork+0x10/0x20 [ 48.461470] [ 48.462945] The buggy address belongs to the object at ffff000803afab80 [ 48.462945] which belongs to the cache kmalloc-64 of size 64 [ 48.475272] The buggy address is located 0 bytes to the right of [ 48.475272] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 48.488119] [ 48.489595] The buggy address belongs to the physical page: [ 48.495151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 48.503137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.509647] page_type: f5(slab) [ 48.512779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.520504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.528223] page dumped because: kasan: bad access detected [ 48.533778] [ 48.535254] Memory state around the buggy address: [ 48.540033] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.547237] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.554441] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.561642] ^ [ 48.566420] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.573625] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.580826] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 42.771790] ================================================================== [ 42.778833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.787771] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 42.795062] [ 42.796543] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 42.796590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.796606] Hardware name: WinLink E850-96 board (DT) [ 42.796624] Call trace: [ 42.796636] show_stack+0x20/0x38 (C) [ 42.796665] dump_stack_lvl+0x8c/0xd0 [ 42.796697] print_report+0x118/0x608 [ 42.796724] kasan_report+0xdc/0x128 [ 42.796752] __asan_report_load8_noabort+0x20/0x30 [ 42.796790] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.796823] kasan_bitops_generic+0x11c/0x1c8 [ 42.796851] kunit_try_run_case+0x170/0x3f0 [ 42.796886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.796924] kthread+0x328/0x630 [ 42.796957] ret_from_fork+0x10/0x20 [ 42.796986] [ 42.865634] Allocated by task 310: [ 42.869020] kasan_save_stack+0x3c/0x68 [ 42.872839] kasan_save_track+0x20/0x40 [ 42.876658] kasan_save_alloc_info+0x40/0x58 [ 42.880912] __kasan_kmalloc+0xd4/0xd8 [ 42.884644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.889158] kasan_bitops_generic+0xa0/0x1c8 [ 42.893411] kunit_try_run_case+0x170/0x3f0 [ 42.897578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.903047] kthread+0x328/0x630 [ 42.906258] ret_from_fork+0x10/0x20 [ 42.909817] [ 42.911293] The buggy address belongs to the object at ffff000800d63020 [ 42.911293] which belongs to the cache kmalloc-16 of size 16 [ 42.923620] The buggy address is located 8 bytes inside of [ 42.923620] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.935859] [ 42.937335] The buggy address belongs to the physical page: [ 42.942891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.950876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.957386] page_type: f5(slab) [ 42.960519] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.968244] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.975963] page dumped because: kasan: bad access detected [ 42.981518] [ 42.982993] Memory state around the buggy address: [ 42.987773] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.994976] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.002181] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.009382] ^ [ 43.013900] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.021104] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.028307] ================================================================== [ 44.098140] ================================================================== [ 44.105201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.114140] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 44.121431] [ 44.122912] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.122958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.122974] Hardware name: WinLink E850-96 board (DT) [ 44.122993] Call trace: [ 44.123005] show_stack+0x20/0x38 (C) [ 44.123037] dump_stack_lvl+0x8c/0xd0 [ 44.123069] print_report+0x118/0x608 [ 44.123099] kasan_report+0xdc/0x128 [ 44.123128] __asan_report_load8_noabort+0x20/0x30 [ 44.123160] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.123193] kasan_bitops_generic+0x11c/0x1c8 [ 44.123223] kunit_try_run_case+0x170/0x3f0 [ 44.123257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.123297] kthread+0x328/0x630 [ 44.123326] ret_from_fork+0x10/0x20 [ 44.123357] [ 44.192003] Allocated by task 310: [ 44.195389] kasan_save_stack+0x3c/0x68 [ 44.199208] kasan_save_track+0x20/0x40 [ 44.203027] kasan_save_alloc_info+0x40/0x58 [ 44.207281] __kasan_kmalloc+0xd4/0xd8 [ 44.211013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.215527] kasan_bitops_generic+0xa0/0x1c8 [ 44.219780] kunit_try_run_case+0x170/0x3f0 [ 44.223947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.229416] kthread+0x328/0x630 [ 44.232628] ret_from_fork+0x10/0x20 [ 44.236186] [ 44.237664] The buggy address belongs to the object at ffff000800d63020 [ 44.237664] which belongs to the cache kmalloc-16 of size 16 [ 44.249989] The buggy address is located 8 bytes inside of [ 44.249989] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 44.262228] [ 44.263703] The buggy address belongs to the physical page: [ 44.269260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.277245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.283755] page_type: f5(slab) [ 44.286888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.294612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.302331] page dumped because: kasan: bad access detected [ 44.307887] [ 44.309362] Memory state around the buggy address: [ 44.314141] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.321345] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.328550] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.335751] ^ [ 44.340268] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.347474] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.354674] ================================================================== [ 42.504414] ================================================================== [ 42.511476] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.520414] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 42.527792] [ 42.529273] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 42.529319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.529335] Hardware name: WinLink E850-96 board (DT) [ 42.529352] Call trace: [ 42.529365] show_stack+0x20/0x38 (C) [ 42.529399] dump_stack_lvl+0x8c/0xd0 [ 42.529433] print_report+0x118/0x608 [ 42.529463] kasan_report+0xdc/0x128 [ 42.529493] kasan_check_range+0x100/0x1a8 [ 42.529525] __kasan_check_write+0x20/0x30 [ 42.529556] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.529589] kasan_bitops_generic+0x11c/0x1c8 [ 42.529618] kunit_try_run_case+0x170/0x3f0 [ 42.529655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.529691] kthread+0x328/0x630 [ 42.529723] ret_from_fork+0x10/0x20 [ 42.529753] [ 42.601749] Allocated by task 310: [ 42.605134] kasan_save_stack+0x3c/0x68 [ 42.608954] kasan_save_track+0x20/0x40 [ 42.612773] kasan_save_alloc_info+0x40/0x58 [ 42.617027] __kasan_kmalloc+0xd4/0xd8 [ 42.620759] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.625273] kasan_bitops_generic+0xa0/0x1c8 [ 42.629526] kunit_try_run_case+0x170/0x3f0 [ 42.633693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.639162] kthread+0x328/0x630 [ 42.642373] ret_from_fork+0x10/0x20 [ 42.645932] [ 42.647408] The buggy address belongs to the object at ffff000800d63020 [ 42.647408] which belongs to the cache kmalloc-16 of size 16 [ 42.659735] The buggy address is located 8 bytes inside of [ 42.659735] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.671974] [ 42.673450] The buggy address belongs to the physical page: [ 42.679006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.686991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.693501] page_type: f5(slab) [ 42.696634] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.704358] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.712077] page dumped because: kasan: bad access detected [ 42.717632] [ 42.719108] Memory state around the buggy address: [ 42.723888] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.731091] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.738296] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.745497] ^ [ 42.750015] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.757219] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.764420] ================================================================== [ 43.566899] ================================================================== [ 43.573961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.582898] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.590276] [ 43.591757] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.591804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.591820] Hardware name: WinLink E850-96 board (DT) [ 43.591838] Call trace: [ 43.591851] show_stack+0x20/0x38 (C) [ 43.591880] dump_stack_lvl+0x8c/0xd0 [ 43.591913] print_report+0x118/0x608 [ 43.591942] kasan_report+0xdc/0x128 [ 43.591970] kasan_check_range+0x100/0x1a8 [ 43.592002] __kasan_check_write+0x20/0x30 [ 43.592034] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.592068] kasan_bitops_generic+0x11c/0x1c8 [ 43.592096] kunit_try_run_case+0x170/0x3f0 [ 43.592129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.592166] kthread+0x328/0x630 [ 43.592201] ret_from_fork+0x10/0x20 [ 43.592230] [ 43.664233] Allocated by task 310: [ 43.667619] kasan_save_stack+0x3c/0x68 [ 43.671438] kasan_save_track+0x20/0x40 [ 43.675257] kasan_save_alloc_info+0x40/0x58 [ 43.679511] __kasan_kmalloc+0xd4/0xd8 [ 43.683243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.687757] kasan_bitops_generic+0xa0/0x1c8 [ 43.692011] kunit_try_run_case+0x170/0x3f0 [ 43.696177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.701646] kthread+0x328/0x630 [ 43.704858] ret_from_fork+0x10/0x20 [ 43.708416] [ 43.709894] The buggy address belongs to the object at ffff000800d63020 [ 43.709894] which belongs to the cache kmalloc-16 of size 16 [ 43.722219] The buggy address is located 8 bytes inside of [ 43.722219] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.734458] [ 43.735934] The buggy address belongs to the physical page: [ 43.741489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.749475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.755986] page_type: f5(slab) [ 43.759118] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.766843] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.774561] page dumped because: kasan: bad access detected [ 43.780117] [ 43.781592] Memory state around the buggy address: [ 43.786373] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.793575] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.800780] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.807981] ^ [ 43.812499] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.819704] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.826904] ================================================================== [ 43.834280] ================================================================== [ 43.841316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.850255] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.857546] [ 43.859027] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.859074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.859089] Hardware name: WinLink E850-96 board (DT) [ 43.859106] Call trace: [ 43.859120] show_stack+0x20/0x38 (C) [ 43.859148] dump_stack_lvl+0x8c/0xd0 [ 43.859182] print_report+0x118/0x608 [ 43.859211] kasan_report+0xdc/0x128 [ 43.859241] __asan_report_load8_noabort+0x20/0x30 [ 43.859276] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.859310] kasan_bitops_generic+0x11c/0x1c8 [ 43.859338] kunit_try_run_case+0x170/0x3f0 [ 43.859369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.859407] kthread+0x328/0x630 [ 43.859438] ret_from_fork+0x10/0x20 [ 43.859469] [ 43.928118] Allocated by task 310: [ 43.931504] kasan_save_stack+0x3c/0x68 [ 43.935323] kasan_save_track+0x20/0x40 [ 43.939142] kasan_save_alloc_info+0x40/0x58 [ 43.943396] __kasan_kmalloc+0xd4/0xd8 [ 43.947128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.951642] kasan_bitops_generic+0xa0/0x1c8 [ 43.955895] kunit_try_run_case+0x170/0x3f0 [ 43.960062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.965531] kthread+0x328/0x630 [ 43.968742] ret_from_fork+0x10/0x20 [ 43.972302] [ 43.973778] The buggy address belongs to the object at ffff000800d63020 [ 43.973778] which belongs to the cache kmalloc-16 of size 16 [ 43.986104] The buggy address is located 8 bytes inside of [ 43.986104] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.998343] [ 43.999819] The buggy address belongs to the physical page: [ 44.005375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.013360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.019870] page_type: f5(slab) [ 44.023003] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.030727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.038446] page dumped because: kasan: bad access detected [ 44.044002] [ 44.045477] Memory state around the buggy address: [ 44.050255] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.057460] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.064665] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.071866] ^ [ 44.076384] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.083588] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.090790] ================================================================== [ 41.973352] ================================================================== [ 41.980406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.989259] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.996637] [ 41.998118] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.998164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.998181] Hardware name: WinLink E850-96 board (DT) [ 41.998200] Call trace: [ 41.998213] show_stack+0x20/0x38 (C) [ 41.998243] dump_stack_lvl+0x8c/0xd0 [ 41.998278] print_report+0x118/0x608 [ 41.998307] kasan_report+0xdc/0x128 [ 41.998335] kasan_check_range+0x100/0x1a8 [ 41.998367] __kasan_check_write+0x20/0x30 [ 41.998397] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.998432] kasan_bitops_generic+0x11c/0x1c8 [ 41.998461] kunit_try_run_case+0x170/0x3f0 [ 41.998495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.998532] kthread+0x328/0x630 [ 41.998563] ret_from_fork+0x10/0x20 [ 41.998594] [ 42.070507] Allocated by task 310: [ 42.073893] kasan_save_stack+0x3c/0x68 [ 42.077712] kasan_save_track+0x20/0x40 [ 42.081531] kasan_save_alloc_info+0x40/0x58 [ 42.085785] __kasan_kmalloc+0xd4/0xd8 [ 42.089517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.094031] kasan_bitops_generic+0xa0/0x1c8 [ 42.098284] kunit_try_run_case+0x170/0x3f0 [ 42.102451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.107919] kthread+0x328/0x630 [ 42.111132] ret_from_fork+0x10/0x20 [ 42.114690] [ 42.116166] The buggy address belongs to the object at ffff000800d63020 [ 42.116166] which belongs to the cache kmalloc-16 of size 16 [ 42.128493] The buggy address is located 8 bytes inside of [ 42.128493] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.140732] [ 42.142209] The buggy address belongs to the physical page: [ 42.147764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.155749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.162259] page_type: f5(slab) [ 42.165392] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.173117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.180835] page dumped because: kasan: bad access detected [ 42.186391] [ 42.187866] Memory state around the buggy address: [ 42.192646] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.199849] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.207054] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.214255] ^ [ 42.218773] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.225977] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.233178] ================================================================== [ 43.303010] ================================================================== [ 43.310073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.319013] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.326304] [ 43.327784] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.327832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.327849] Hardware name: WinLink E850-96 board (DT) [ 43.327869] Call trace: [ 43.327880] show_stack+0x20/0x38 (C) [ 43.327909] dump_stack_lvl+0x8c/0xd0 [ 43.327941] print_report+0x118/0x608 [ 43.327970] kasan_report+0xdc/0x128 [ 43.328000] __asan_report_load8_noabort+0x20/0x30 [ 43.328033] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.328068] kasan_bitops_generic+0x11c/0x1c8 [ 43.328096] kunit_try_run_case+0x170/0x3f0 [ 43.328131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.328169] kthread+0x328/0x630 [ 43.328202] ret_from_fork+0x10/0x20 [ 43.328231] [ 43.396876] Allocated by task 310: [ 43.400262] kasan_save_stack+0x3c/0x68 [ 43.404081] kasan_save_track+0x20/0x40 [ 43.407900] kasan_save_alloc_info+0x40/0x58 [ 43.412154] __kasan_kmalloc+0xd4/0xd8 [ 43.415886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.420400] kasan_bitops_generic+0xa0/0x1c8 [ 43.424653] kunit_try_run_case+0x170/0x3f0 [ 43.428820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.434289] kthread+0x328/0x630 [ 43.437501] ret_from_fork+0x10/0x20 [ 43.441059] [ 43.442537] The buggy address belongs to the object at ffff000800d63020 [ 43.442537] which belongs to the cache kmalloc-16 of size 16 [ 43.454862] The buggy address is located 8 bytes inside of [ 43.454862] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.467101] [ 43.468576] The buggy address belongs to the physical page: [ 43.474132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.482118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.488628] page_type: f5(slab) [ 43.491761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.499485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.507205] page dumped because: kasan: bad access detected [ 43.512760] [ 43.514235] Memory state around the buggy address: [ 43.519014] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.526218] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.533423] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.540624] ^ [ 43.545142] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.552346] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.559547] ================================================================== [ 42.240553] ================================================================== [ 42.247590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.256530] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 42.263820] [ 42.265300] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 42.265345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.265360] Hardware name: WinLink E850-96 board (DT) [ 42.265378] Call trace: [ 42.265390] show_stack+0x20/0x38 (C) [ 42.265424] dump_stack_lvl+0x8c/0xd0 [ 42.265456] print_report+0x118/0x608 [ 42.265486] kasan_report+0xdc/0x128 [ 42.265515] __asan_report_load8_noabort+0x20/0x30 [ 42.265548] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.265583] kasan_bitops_generic+0x11c/0x1c8 [ 42.265610] kunit_try_run_case+0x170/0x3f0 [ 42.265645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.265685] kthread+0x328/0x630 [ 42.265715] ret_from_fork+0x10/0x20 [ 42.265747] [ 42.334392] Allocated by task 310: [ 42.337778] kasan_save_stack+0x3c/0x68 [ 42.341597] kasan_save_track+0x20/0x40 [ 42.345416] kasan_save_alloc_info+0x40/0x58 [ 42.349670] __kasan_kmalloc+0xd4/0xd8 [ 42.353402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.357916] kasan_bitops_generic+0xa0/0x1c8 [ 42.362170] kunit_try_run_case+0x170/0x3f0 [ 42.366336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.371805] kthread+0x328/0x630 [ 42.375016] ret_from_fork+0x10/0x20 [ 42.378575] [ 42.380052] The buggy address belongs to the object at ffff000800d63020 [ 42.380052] which belongs to the cache kmalloc-16 of size 16 [ 42.392378] The buggy address is located 8 bytes inside of [ 42.392378] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.404617] [ 42.406094] The buggy address belongs to the physical page: [ 42.411648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.419634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.426144] page_type: f5(slab) [ 42.429277] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.437001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.444720] page dumped because: kasan: bad access detected [ 42.450276] [ 42.451751] Memory state around the buggy address: [ 42.456530] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.463734] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.470939] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.478140] ^ [ 42.482658] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.489862] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.497064] ================================================================== [ 43.035627] ================================================================== [ 43.042716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.051656] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.059034] [ 43.060514] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.060562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.060577] Hardware name: WinLink E850-96 board (DT) [ 43.060596] Call trace: [ 43.060606] show_stack+0x20/0x38 (C) [ 43.060636] dump_stack_lvl+0x8c/0xd0 [ 43.060669] print_report+0x118/0x608 [ 43.060698] kasan_report+0xdc/0x128 [ 43.060726] kasan_check_range+0x100/0x1a8 [ 43.060757] __kasan_check_write+0x20/0x30 [ 43.060788] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.060822] kasan_bitops_generic+0x11c/0x1c8 [ 43.060853] kunit_try_run_case+0x170/0x3f0 [ 43.060888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.060927] kthread+0x328/0x630 [ 43.060959] ret_from_fork+0x10/0x20 [ 43.060989] [ 43.132992] Allocated by task 310: [ 43.136376] kasan_save_stack+0x3c/0x68 [ 43.140196] kasan_save_track+0x20/0x40 [ 43.144015] kasan_save_alloc_info+0x40/0x58 [ 43.148268] __kasan_kmalloc+0xd4/0xd8 [ 43.152001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.156515] kasan_bitops_generic+0xa0/0x1c8 [ 43.160768] kunit_try_run_case+0x170/0x3f0 [ 43.164935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.170404] kthread+0x328/0x630 [ 43.173615] ret_from_fork+0x10/0x20 [ 43.177175] [ 43.178652] The buggy address belongs to the object at ffff000800d63020 [ 43.178652] which belongs to the cache kmalloc-16 of size 16 [ 43.190977] The buggy address is located 8 bytes inside of [ 43.190977] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.203216] [ 43.204692] The buggy address belongs to the physical page: [ 43.210249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.218233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.224743] page_type: f5(slab) [ 43.227876] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.235600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.243320] page dumped because: kasan: bad access detected [ 43.248875] [ 43.250350] Memory state around the buggy address: [ 43.255129] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.262334] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.269538] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.276739] ^ [ 43.281257] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.288461] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.295664] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 39.327019] ================================================================== [ 39.336351] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 39.344507] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 39.351886] [ 39.353372] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.353430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.353448] Hardware name: WinLink E850-96 board (DT) [ 39.353471] Call trace: [ 39.353485] show_stack+0x20/0x38 (C) [ 39.353519] dump_stack_lvl+0x8c/0xd0 [ 39.353556] print_report+0x118/0x608 [ 39.353587] kasan_report+0xdc/0x128 [ 39.353619] kasan_check_range+0x100/0x1a8 [ 39.353651] __kasan_check_write+0x20/0x30 [ 39.353687] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 39.353719] kasan_bitops_generic+0x110/0x1c8 [ 39.353750] kunit_try_run_case+0x170/0x3f0 [ 39.353787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.353826] kthread+0x328/0x630 [ 39.353862] ret_from_fork+0x10/0x20 [ 39.353898] [ 39.425063] Allocated by task 310: [ 39.428448] kasan_save_stack+0x3c/0x68 [ 39.432265] kasan_save_track+0x20/0x40 [ 39.436085] kasan_save_alloc_info+0x40/0x58 [ 39.440338] __kasan_kmalloc+0xd4/0xd8 [ 39.444071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.448585] kasan_bitops_generic+0xa0/0x1c8 [ 39.452838] kunit_try_run_case+0x170/0x3f0 [ 39.457004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.462473] kthread+0x328/0x630 [ 39.465685] ret_from_fork+0x10/0x20 [ 39.469244] [ 39.470722] The buggy address belongs to the object at ffff000800d63020 [ 39.470722] which belongs to the cache kmalloc-16 of size 16 [ 39.483050] The buggy address is located 8 bytes inside of [ 39.483050] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 39.495285] [ 39.496765] The buggy address belongs to the physical page: [ 39.502320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 39.510305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.516814] page_type: f5(slab) [ 39.519952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.527670] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.535392] page dumped because: kasan: bad access detected [ 39.540944] [ 39.542419] Memory state around the buggy address: [ 39.547199] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.554403] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.561610] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 39.568809] ^ [ 39.573326] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.580531] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.587733] ================================================================== [ 39.857451] ================================================================== [ 39.864471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 39.872625] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 39.880002] [ 39.881487] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.881537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.881552] Hardware name: WinLink E850-96 board (DT) [ 39.881573] Call trace: [ 39.881586] show_stack+0x20/0x38 (C) [ 39.881620] dump_stack_lvl+0x8c/0xd0 [ 39.881659] print_report+0x118/0x608 [ 39.881688] kasan_report+0xdc/0x128 [ 39.881717] kasan_check_range+0x100/0x1a8 [ 39.881750] __kasan_check_write+0x20/0x30 [ 39.881781] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 39.881813] kasan_bitops_generic+0x110/0x1c8 [ 39.881844] kunit_try_run_case+0x170/0x3f0 [ 39.881879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.881915] kthread+0x328/0x630 [ 39.881950] ret_from_fork+0x10/0x20 [ 39.881987] [ 39.953178] Allocated by task 310: [ 39.956566] kasan_save_stack+0x3c/0x68 [ 39.960382] kasan_save_track+0x20/0x40 [ 39.964203] kasan_save_alloc_info+0x40/0x58 [ 39.968455] __kasan_kmalloc+0xd4/0xd8 [ 39.972188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.976702] kasan_bitops_generic+0xa0/0x1c8 [ 39.980955] kunit_try_run_case+0x170/0x3f0 [ 39.985122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.990590] kthread+0x328/0x630 [ 39.993802] ret_from_fork+0x10/0x20 [ 39.997361] [ 39.998839] The buggy address belongs to the object at ffff000800d63020 [ 39.998839] which belongs to the cache kmalloc-16 of size 16 [ 40.011164] The buggy address is located 8 bytes inside of [ 40.011164] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.023402] [ 40.024880] The buggy address belongs to the physical page: [ 40.030438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.038420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.044930] page_type: f5(slab) [ 40.048067] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.055787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.063506] page dumped because: kasan: bad access detected [ 40.069061] [ 40.070537] Memory state around the buggy address: [ 40.075318] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.082522] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.089726] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.096926] ^ [ 40.101445] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.108648] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.115849] ================================================================== [ 41.711041] ================================================================== [ 41.718085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 41.726242] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.733533] [ 41.735015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.735059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.735076] Hardware name: WinLink E850-96 board (DT) [ 41.735096] Call trace: [ 41.735110] show_stack+0x20/0x38 (C) [ 41.735140] dump_stack_lvl+0x8c/0xd0 [ 41.735175] print_report+0x118/0x608 [ 41.735208] kasan_report+0xdc/0x128 [ 41.735236] __asan_report_load8_noabort+0x20/0x30 [ 41.735274] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 41.735305] kasan_bitops_generic+0x110/0x1c8 [ 41.735335] kunit_try_run_case+0x170/0x3f0 [ 41.735370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.735408] kthread+0x328/0x630 [ 41.735440] ret_from_fork+0x10/0x20 [ 41.735473] [ 41.803324] Allocated by task 310: [ 41.806709] kasan_save_stack+0x3c/0x68 [ 41.810529] kasan_save_track+0x20/0x40 [ 41.814348] kasan_save_alloc_info+0x40/0x58 [ 41.818601] __kasan_kmalloc+0xd4/0xd8 [ 41.822334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.826847] kasan_bitops_generic+0xa0/0x1c8 [ 41.831101] kunit_try_run_case+0x170/0x3f0 [ 41.835267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.840736] kthread+0x328/0x630 [ 41.843948] ret_from_fork+0x10/0x20 [ 41.847507] [ 41.848984] The buggy address belongs to the object at ffff000800d63020 [ 41.848984] which belongs to the cache kmalloc-16 of size 16 [ 41.861309] The buggy address is located 8 bytes inside of [ 41.861309] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.873548] [ 41.875024] The buggy address belongs to the physical page: [ 41.880580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.888566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.895076] page_type: f5(slab) [ 41.898209] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.905933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.913652] page dumped because: kasan: bad access detected [ 41.919207] [ 41.920683] Memory state around the buggy address: [ 41.925461] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.932666] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.939871] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.947072] ^ [ 41.951589] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.958794] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.965995] ================================================================== [ 40.123151] ================================================================== [ 40.130263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 40.138418] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.145710] [ 40.147194] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.147245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.147261] Hardware name: WinLink E850-96 board (DT) [ 40.147280] Call trace: [ 40.147294] show_stack+0x20/0x38 (C) [ 40.147329] dump_stack_lvl+0x8c/0xd0 [ 40.147364] print_report+0x118/0x608 [ 40.147393] kasan_report+0xdc/0x128 [ 40.147420] __asan_report_load8_noabort+0x20/0x30 [ 40.147456] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 40.147487] kasan_bitops_generic+0x110/0x1c8 [ 40.147517] kunit_try_run_case+0x170/0x3f0 [ 40.147551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.147588] kthread+0x328/0x630 [ 40.147620] ret_from_fork+0x10/0x20 [ 40.147653] [ 40.215500] Allocated by task 310: [ 40.218886] kasan_save_stack+0x3c/0x68 [ 40.222705] kasan_save_track+0x20/0x40 [ 40.226524] kasan_save_alloc_info+0x40/0x58 [ 40.230778] __kasan_kmalloc+0xd4/0xd8 [ 40.234510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.239024] kasan_bitops_generic+0xa0/0x1c8 [ 40.243278] kunit_try_run_case+0x170/0x3f0 [ 40.247444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.252913] kthread+0x328/0x630 [ 40.256125] ret_from_fork+0x10/0x20 [ 40.259684] [ 40.261161] The buggy address belongs to the object at ffff000800d63020 [ 40.261161] which belongs to the cache kmalloc-16 of size 16 [ 40.273486] The buggy address is located 8 bytes inside of [ 40.273486] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.285725] [ 40.287202] The buggy address belongs to the physical page: [ 40.292758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.300742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.307252] page_type: f5(slab) [ 40.310387] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.318110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.325829] page dumped because: kasan: bad access detected [ 40.331384] [ 40.332859] Memory state around the buggy address: [ 40.337640] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.344843] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.352047] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.359248] ^ [ 40.363766] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.370971] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.378171] ================================================================== [ 40.917079] ================================================================== [ 40.924174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 40.932330] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.939621] [ 40.941106] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.941156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.941173] Hardware name: WinLink E850-96 board (DT) [ 40.941192] Call trace: [ 40.941204] show_stack+0x20/0x38 (C) [ 40.941238] dump_stack_lvl+0x8c/0xd0 [ 40.941272] print_report+0x118/0x608 [ 40.941303] kasan_report+0xdc/0x128 [ 40.941331] __asan_report_load8_noabort+0x20/0x30 [ 40.941370] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 40.941402] kasan_bitops_generic+0x110/0x1c8 [ 40.941432] kunit_try_run_case+0x170/0x3f0 [ 40.941467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.941504] kthread+0x328/0x630 [ 40.941538] ret_from_fork+0x10/0x20 [ 40.941570] [ 41.009412] Allocated by task 310: [ 41.012798] kasan_save_stack+0x3c/0x68 [ 41.016617] kasan_save_track+0x20/0x40 [ 41.020436] kasan_save_alloc_info+0x40/0x58 [ 41.024690] __kasan_kmalloc+0xd4/0xd8 [ 41.028422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.032936] kasan_bitops_generic+0xa0/0x1c8 [ 41.037189] kunit_try_run_case+0x170/0x3f0 [ 41.041356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.046824] kthread+0x328/0x630 [ 41.050036] ret_from_fork+0x10/0x20 [ 41.053595] [ 41.055072] The buggy address belongs to the object at ffff000800d63020 [ 41.055072] which belongs to the cache kmalloc-16 of size 16 [ 41.067398] The buggy address is located 8 bytes inside of [ 41.067398] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.079637] [ 41.081113] The buggy address belongs to the physical page: [ 41.086670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.094654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.101164] page_type: f5(slab) [ 41.104298] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.112022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.119740] page dumped because: kasan: bad access detected [ 41.125296] [ 41.126771] Memory state around the buggy address: [ 41.131551] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.138754] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.145959] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.153160] ^ [ 41.157677] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.164882] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.172083] ================================================================== [ 41.445191] ================================================================== [ 41.452292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 41.460447] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.467825] [ 41.469306] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.469356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.469372] Hardware name: WinLink E850-96 board (DT) [ 41.469391] Call trace: [ 41.469403] show_stack+0x20/0x38 (C) [ 41.469435] dump_stack_lvl+0x8c/0xd0 [ 41.469472] print_report+0x118/0x608 [ 41.469502] kasan_report+0xdc/0x128 [ 41.469531] kasan_check_range+0x100/0x1a8 [ 41.469559] __kasan_check_write+0x20/0x30 [ 41.469593] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 41.469625] kasan_bitops_generic+0x110/0x1c8 [ 41.469653] kunit_try_run_case+0x170/0x3f0 [ 41.469685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.469725] kthread+0x328/0x630 [ 41.469757] ret_from_fork+0x10/0x20 [ 41.469791] [ 41.541001] Allocated by task 310: [ 41.544387] kasan_save_stack+0x3c/0x68 [ 41.548206] kasan_save_track+0x20/0x40 [ 41.552025] kasan_save_alloc_info+0x40/0x58 [ 41.556279] __kasan_kmalloc+0xd4/0xd8 [ 41.560011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.564525] kasan_bitops_generic+0xa0/0x1c8 [ 41.568779] kunit_try_run_case+0x170/0x3f0 [ 41.572945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.578414] kthread+0x328/0x630 [ 41.581626] ret_from_fork+0x10/0x20 [ 41.585184] [ 41.586660] The buggy address belongs to the object at ffff000800d63020 [ 41.586660] which belongs to the cache kmalloc-16 of size 16 [ 41.598987] The buggy address is located 8 bytes inside of [ 41.598987] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.611227] [ 41.612702] The buggy address belongs to the physical page: [ 41.618257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.626243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.632755] page_type: f5(slab) [ 41.635888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.643611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.651329] page dumped because: kasan: bad access detected [ 41.656885] [ 41.658360] Memory state around the buggy address: [ 41.663140] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.670343] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.677548] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.684749] ^ [ 41.689267] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.696472] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.703672] ================================================================== [ 39.595066] ================================================================== [ 39.602145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 39.610301] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 39.617593] [ 39.619077] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.619125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.619143] Hardware name: WinLink E850-96 board (DT) [ 39.619165] Call trace: [ 39.619181] show_stack+0x20/0x38 (C) [ 39.619214] dump_stack_lvl+0x8c/0xd0 [ 39.619250] print_report+0x118/0x608 [ 39.619280] kasan_report+0xdc/0x128 [ 39.619309] __asan_report_load8_noabort+0x20/0x30 [ 39.619346] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 39.619377] kasan_bitops_generic+0x110/0x1c8 [ 39.619405] kunit_try_run_case+0x170/0x3f0 [ 39.619441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.619478] kthread+0x328/0x630 [ 39.619513] ret_from_fork+0x10/0x20 [ 39.619547] [ 39.687383] Allocated by task 310: [ 39.690770] kasan_save_stack+0x3c/0x68 [ 39.694588] kasan_save_track+0x20/0x40 [ 39.698407] kasan_save_alloc_info+0x40/0x58 [ 39.702661] __kasan_kmalloc+0xd4/0xd8 [ 39.706393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.710907] kasan_bitops_generic+0xa0/0x1c8 [ 39.715160] kunit_try_run_case+0x170/0x3f0 [ 39.719327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.724796] kthread+0x328/0x630 [ 39.728008] ret_from_fork+0x10/0x20 [ 39.731566] [ 39.733044] The buggy address belongs to the object at ffff000800d63020 [ 39.733044] which belongs to the cache kmalloc-16 of size 16 [ 39.745369] The buggy address is located 8 bytes inside of [ 39.745369] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 39.757608] [ 39.759087] The buggy address belongs to the physical page: [ 39.764641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 39.772625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.779135] page_type: f5(slab) [ 39.782272] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.789992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.797711] page dumped because: kasan: bad access detected [ 39.803267] [ 39.804742] Memory state around the buggy address: [ 39.809523] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.816726] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.823932] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 39.831131] ^ [ 39.835649] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.842854] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.850055] ================================================================== [ 40.385489] ================================================================== [ 40.392586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 40.400741] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.408119] [ 40.409601] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.409654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.409670] Hardware name: WinLink E850-96 board (DT) [ 40.409689] Call trace: [ 40.409702] show_stack+0x20/0x38 (C) [ 40.409733] dump_stack_lvl+0x8c/0xd0 [ 40.409767] print_report+0x118/0x608 [ 40.409798] kasan_report+0xdc/0x128 [ 40.409826] kasan_check_range+0x100/0x1a8 [ 40.409859] __kasan_check_write+0x20/0x30 [ 40.409891] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 40.409921] kasan_bitops_generic+0x110/0x1c8 [ 40.409950] kunit_try_run_case+0x170/0x3f0 [ 40.409986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.410023] kthread+0x328/0x630 [ 40.410058] ret_from_fork+0x10/0x20 [ 40.410095] [ 40.481295] Allocated by task 310: [ 40.484680] kasan_save_stack+0x3c/0x68 [ 40.488499] kasan_save_track+0x20/0x40 [ 40.492319] kasan_save_alloc_info+0x40/0x58 [ 40.496573] __kasan_kmalloc+0xd4/0xd8 [ 40.500305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.504819] kasan_bitops_generic+0xa0/0x1c8 [ 40.509072] kunit_try_run_case+0x170/0x3f0 [ 40.513238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.518708] kthread+0x328/0x630 [ 40.521919] ret_from_fork+0x10/0x20 [ 40.525478] [ 40.526954] The buggy address belongs to the object at ffff000800d63020 [ 40.526954] which belongs to the cache kmalloc-16 of size 16 [ 40.539282] The buggy address is located 8 bytes inside of [ 40.539282] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.551519] [ 40.552997] The buggy address belongs to the physical page: [ 40.558554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.566537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.573047] page_type: f5(slab) [ 40.576183] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.583904] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.591623] page dumped because: kasan: bad access detected [ 40.597178] [ 40.598654] Memory state around the buggy address: [ 40.603435] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.610639] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.617844] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.625043] ^ [ 40.629560] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.636765] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.643968] ================================================================== [ 41.179386] ================================================================== [ 41.186497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 41.194652] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.202031] [ 41.203515] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.203562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.203579] Hardware name: WinLink E850-96 board (DT) [ 41.203596] Call trace: [ 41.203608] show_stack+0x20/0x38 (C) [ 41.203639] dump_stack_lvl+0x8c/0xd0 [ 41.203673] print_report+0x118/0x608 [ 41.203703] kasan_report+0xdc/0x128 [ 41.203733] kasan_check_range+0x100/0x1a8 [ 41.203765] __kasan_check_write+0x20/0x30 [ 41.203800] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 41.203832] kasan_bitops_generic+0x110/0x1c8 [ 41.203862] kunit_try_run_case+0x170/0x3f0 [ 41.203896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.203935] kthread+0x328/0x630 [ 41.203967] ret_from_fork+0x10/0x20 [ 41.203998] [ 41.275206] Allocated by task 310: [ 41.278592] kasan_save_stack+0x3c/0x68 [ 41.282411] kasan_save_track+0x20/0x40 [ 41.286231] kasan_save_alloc_info+0x40/0x58 [ 41.290484] __kasan_kmalloc+0xd4/0xd8 [ 41.294217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.298730] kasan_bitops_generic+0xa0/0x1c8 [ 41.302984] kunit_try_run_case+0x170/0x3f0 [ 41.307150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.312619] kthread+0x328/0x630 [ 41.315831] ret_from_fork+0x10/0x20 [ 41.319390] [ 41.320866] The buggy address belongs to the object at ffff000800d63020 [ 41.320866] which belongs to the cache kmalloc-16 of size 16 [ 41.333192] The buggy address is located 8 bytes inside of [ 41.333192] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.345431] [ 41.346907] The buggy address belongs to the physical page: [ 41.352464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.360450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.366960] page_type: f5(slab) [ 41.370093] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.377816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.385535] page dumped because: kasan: bad access detected [ 41.391090] [ 41.392566] Memory state around the buggy address: [ 41.397347] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.404549] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.411753] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.418954] ^ [ 41.423472] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.430677] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.437878] ================================================================== [ 40.651273] ================================================================== [ 40.658380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 40.666535] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.673914] [ 40.675400] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.675448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.675465] Hardware name: WinLink E850-96 board (DT) [ 40.675485] Call trace: [ 40.675497] show_stack+0x20/0x38 (C) [ 40.675531] dump_stack_lvl+0x8c/0xd0 [ 40.675566] print_report+0x118/0x608 [ 40.675593] kasan_report+0xdc/0x128 [ 40.675619] kasan_check_range+0x100/0x1a8 [ 40.675650] __kasan_check_write+0x20/0x30 [ 40.675682] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 40.675715] kasan_bitops_generic+0x110/0x1c8 [ 40.675745] kunit_try_run_case+0x170/0x3f0 [ 40.675779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.675817] kthread+0x328/0x630 [ 40.675849] ret_from_fork+0x10/0x20 [ 40.675884] [ 40.747089] Allocated by task 310: [ 40.750477] kasan_save_stack+0x3c/0x68 [ 40.754294] kasan_save_track+0x20/0x40 [ 40.758114] kasan_save_alloc_info+0x40/0x58 [ 40.762367] __kasan_kmalloc+0xd4/0xd8 [ 40.766100] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.770614] kasan_bitops_generic+0xa0/0x1c8 [ 40.774867] kunit_try_run_case+0x170/0x3f0 [ 40.779033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.784502] kthread+0x328/0x630 [ 40.787714] ret_from_fork+0x10/0x20 [ 40.791273] [ 40.792749] The buggy address belongs to the object at ffff000800d63020 [ 40.792749] which belongs to the cache kmalloc-16 of size 16 [ 40.805076] The buggy address is located 8 bytes inside of [ 40.805076] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.817314] [ 40.818790] The buggy address belongs to the physical page: [ 40.824347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.832331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.838842] page_type: f5(slab) [ 40.841976] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.849700] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.857418] page dumped because: kasan: bad access detected [ 40.862973] [ 40.864449] Memory state around the buggy address: [ 40.869230] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.876432] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.883636] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.890837] ^ [ 40.895355] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.902560] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.909761] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 39.024310] ================================================================== [ 39.031321] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 39.037307] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308 [ 39.044598] [ 39.046082] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.046134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.046152] Hardware name: WinLink E850-96 board (DT) [ 39.046172] Call trace: [ 39.046184] show_stack+0x20/0x38 (C) [ 39.046221] dump_stack_lvl+0x8c/0xd0 [ 39.046254] print_report+0x118/0x608 [ 39.046287] kasan_report+0xdc/0x128 [ 39.046316] __asan_report_load1_noabort+0x20/0x30 [ 39.046350] strnlen+0x80/0x88 [ 39.046376] kasan_strings+0x478/0xb00 [ 39.046408] kunit_try_run_case+0x170/0x3f0 [ 39.046445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.046483] kthread+0x328/0x630 [ 39.046515] ret_from_fork+0x10/0x20 [ 39.046551] [ 39.111524] Allocated by task 308: [ 39.114911] kasan_save_stack+0x3c/0x68 [ 39.118728] kasan_save_track+0x20/0x40 [ 39.122548] kasan_save_alloc_info+0x40/0x58 [ 39.126801] __kasan_kmalloc+0xd4/0xd8 [ 39.130534] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.135048] kasan_strings+0xc8/0xb00 [ 39.138693] kunit_try_run_case+0x170/0x3f0 [ 39.142860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.148329] kthread+0x328/0x630 [ 39.151540] ret_from_fork+0x10/0x20 [ 39.155100] [ 39.156575] Freed by task 308: [ 39.159614] kasan_save_stack+0x3c/0x68 [ 39.163433] kasan_save_track+0x20/0x40 [ 39.167252] kasan_save_free_info+0x4c/0x78 [ 39.171419] __kasan_slab_free+0x6c/0x98 [ 39.175325] kfree+0x214/0x3c8 [ 39.178363] kasan_strings+0x24c/0xb00 [ 39.182095] kunit_try_run_case+0x170/0x3f0 [ 39.186262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.191731] kthread+0x328/0x630 [ 39.194943] ret_from_fork+0x10/0x20 [ 39.198502] [ 39.199977] The buggy address belongs to the object at ffff000800cab9c0 [ 39.199977] which belongs to the cache kmalloc-32 of size 32 [ 39.212307] The buggy address is located 16 bytes inside of [ 39.212307] freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0) [ 39.224369] [ 39.225847] The buggy address belongs to the physical page: [ 39.231403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab [ 39.239386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.245897] page_type: f5(slab) [ 39.249033] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 39.256755] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 39.264474] page dumped because: kasan: bad access detected [ 39.270028] [ 39.271504] Memory state around the buggy address: [ 39.276287] ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.283487] ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 39.290693] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.297893] ^ [ 39.303712] ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.310917] ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 39.318119] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 38.723198] ================================================================== [ 38.730282] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 38.736183] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308 [ 38.743474] [ 38.744958] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 38.745010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.745026] Hardware name: WinLink E850-96 board (DT) [ 38.745047] Call trace: [ 38.745061] show_stack+0x20/0x38 (C) [ 38.745096] dump_stack_lvl+0x8c/0xd0 [ 38.745130] print_report+0x118/0x608 [ 38.745162] kasan_report+0xdc/0x128 [ 38.745191] __asan_report_load1_noabort+0x20/0x30 [ 38.745227] strlen+0xa8/0xb0 [ 38.745254] kasan_strings+0x418/0xb00 [ 38.745285] kunit_try_run_case+0x170/0x3f0 [ 38.745321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.745360] kthread+0x328/0x630 [ 38.745393] ret_from_fork+0x10/0x20 [ 38.745428] [ 38.810313] Allocated by task 308: [ 38.813702] kasan_save_stack+0x3c/0x68 [ 38.817518] kasan_save_track+0x20/0x40 [ 38.821337] kasan_save_alloc_info+0x40/0x58 [ 38.825590] __kasan_kmalloc+0xd4/0xd8 [ 38.829323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.833837] kasan_strings+0xc8/0xb00 [ 38.837483] kunit_try_run_case+0x170/0x3f0 [ 38.841649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.847118] kthread+0x328/0x630 [ 38.850330] ret_from_fork+0x10/0x20 [ 38.853889] [ 38.855364] Freed by task 308: [ 38.858403] kasan_save_stack+0x3c/0x68 [ 38.862222] kasan_save_track+0x20/0x40 [ 38.866041] kasan_save_free_info+0x4c/0x78 [ 38.870208] __kasan_slab_free+0x6c/0x98 [ 38.874114] kfree+0x214/0x3c8 [ 38.877152] kasan_strings+0x24c/0xb00 [ 38.880885] kunit_try_run_case+0x170/0x3f0 [ 38.885051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.890520] kthread+0x328/0x630 [ 38.893732] ret_from_fork+0x10/0x20 [ 38.897291] [ 38.898767] The buggy address belongs to the object at ffff000800cab9c0 [ 38.898767] which belongs to the cache kmalloc-32 of size 32 [ 38.911093] The buggy address is located 16 bytes inside of [ 38.911093] freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0) [ 38.923159] [ 38.924636] The buggy address belongs to the physical page: [ 38.930193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab [ 38.938176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.944686] page_type: f5(slab) [ 38.947820] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 38.955543] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.963262] page dumped because: kasan: bad access detected [ 38.968817] [ 38.970293] Memory state around the buggy address: [ 38.975075] ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.982276] ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.989483] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.996681] ^ [ 39.002501] ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.009706] ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 39.016907] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 38.424342] ================================================================== [ 38.431420] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 38.438098] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308 [ 38.445388] [ 38.446874] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 38.446928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.446945] Hardware name: WinLink E850-96 board (DT) [ 38.446963] Call trace: [ 38.446978] show_stack+0x20/0x38 (C) [ 38.447010] dump_stack_lvl+0x8c/0xd0 [ 38.447049] print_report+0x118/0x608 [ 38.447078] kasan_report+0xdc/0x128 [ 38.447106] __asan_report_load1_noabort+0x20/0x30 [ 38.447141] kasan_strings+0x95c/0xb00 [ 38.447174] kunit_try_run_case+0x170/0x3f0 [ 38.447211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.447249] kthread+0x328/0x630 [ 38.447284] ret_from_fork+0x10/0x20 [ 38.447318] [ 38.509275] Allocated by task 308: [ 38.512660] kasan_save_stack+0x3c/0x68 [ 38.516480] kasan_save_track+0x20/0x40 [ 38.520300] kasan_save_alloc_info+0x40/0x58 [ 38.524554] __kasan_kmalloc+0xd4/0xd8 [ 38.528286] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.532800] kasan_strings+0xc8/0xb00 [ 38.536446] kunit_try_run_case+0x170/0x3f0 [ 38.540612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.546082] kthread+0x328/0x630 [ 38.549293] ret_from_fork+0x10/0x20 [ 38.552852] [ 38.554327] Freed by task 308: [ 38.557366] kasan_save_stack+0x3c/0x68 [ 38.561185] kasan_save_track+0x20/0x40 [ 38.565004] kasan_save_free_info+0x4c/0x78 [ 38.569171] __kasan_slab_free+0x6c/0x98 [ 38.573077] kfree+0x214/0x3c8 [ 38.576115] kasan_strings+0x24c/0xb00 [ 38.579848] kunit_try_run_case+0x170/0x3f0 [ 38.584014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.589483] kthread+0x328/0x630 [ 38.592695] ret_from_fork+0x10/0x20 [ 38.596254] [ 38.597730] The buggy address belongs to the object at ffff000800cab9c0 [ 38.597730] which belongs to the cache kmalloc-32 of size 32 [ 38.610056] The buggy address is located 16 bytes inside of [ 38.610056] freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0) [ 38.622121] [ 38.623599] The buggy address belongs to the physical page: [ 38.629156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab [ 38.637141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.643650] page_type: f5(slab) [ 38.646785] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 38.654506] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.662225] page dumped because: kasan: bad access detected [ 38.667780] [ 38.669256] Memory state around the buggy address: [ 38.674036] ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.681239] ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.688445] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.695645] ^ [ 38.701464] ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.708668] ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 38.715870] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 38.106807] ================================================================== [ 38.130379] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 38.136279] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308 [ 38.143571] [ 38.145058] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 38.145115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.145133] Hardware name: WinLink E850-96 board (DT) [ 38.145155] Call trace: [ 38.145170] show_stack+0x20/0x38 (C) [ 38.145205] dump_stack_lvl+0x8c/0xd0 [ 38.145241] print_report+0x118/0x608 [ 38.145275] kasan_report+0xdc/0x128 [ 38.145307] __asan_report_load1_noabort+0x20/0x30 [ 38.145344] strcmp+0xc0/0xc8 [ 38.145372] kasan_strings+0x340/0xb00 [ 38.145406] kunit_try_run_case+0x170/0x3f0 [ 38.145444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.145485] kthread+0x328/0x630 [ 38.145519] ret_from_fork+0x10/0x20 [ 38.145557] [ 38.210409] Allocated by task 308: [ 38.213798] kasan_save_stack+0x3c/0x68 [ 38.217613] kasan_save_track+0x20/0x40 [ 38.221433] kasan_save_alloc_info+0x40/0x58 [ 38.225686] __kasan_kmalloc+0xd4/0xd8 [ 38.229419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.233933] kasan_strings+0xc8/0xb00 [ 38.237578] kunit_try_run_case+0x170/0x3f0 [ 38.241745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.247215] kthread+0x328/0x630 [ 38.250426] ret_from_fork+0x10/0x20 [ 38.253985] [ 38.255461] Freed by task 308: [ 38.258500] kasan_save_stack+0x3c/0x68 [ 38.262317] kasan_save_track+0x20/0x40 [ 38.266137] kasan_save_free_info+0x4c/0x78 [ 38.270304] __kasan_slab_free+0x6c/0x98 [ 38.274210] kfree+0x214/0x3c8 [ 38.277248] kasan_strings+0x24c/0xb00 [ 38.280981] kunit_try_run_case+0x170/0x3f0 [ 38.285147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.290616] kthread+0x328/0x630 [ 38.293828] ret_from_fork+0x10/0x20 [ 38.297387] [ 38.298864] The buggy address belongs to the object at ffff000800cab9c0 [ 38.298864] which belongs to the cache kmalloc-32 of size 32 [ 38.311192] The buggy address is located 16 bytes inside of [ 38.311192] freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0) [ 38.323254] [ 38.324732] The buggy address belongs to the physical page: [ 38.330290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab [ 38.338273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.344783] page_type: f5(slab) [ 38.347922] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 38.355639] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.363359] page dumped because: kasan: bad access detected [ 38.368913] [ 38.370389] Memory state around the buggy address: [ 38.375172] ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.382372] ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.389578] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.396777] ^ [ 38.402597] ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.409802] ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 38.417005] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 37.806179] ================================================================== [ 37.816409] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 37.822394] Read of size 1 at addr ffff000800d61358 by task kunit_try_catch/306 [ 37.829687] [ 37.831174] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 37.831230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.831247] Hardware name: WinLink E850-96 board (DT) [ 37.831271] Call trace: [ 37.831285] show_stack+0x20/0x38 (C) [ 37.831322] dump_stack_lvl+0x8c/0xd0 [ 37.831360] print_report+0x118/0x608 [ 37.831395] kasan_report+0xdc/0x128 [ 37.831427] __asan_report_load1_noabort+0x20/0x30 [ 37.831465] memcmp+0x198/0x1d8 [ 37.831493] kasan_memcmp+0x16c/0x300 [ 37.831528] kunit_try_run_case+0x170/0x3f0 [ 37.831566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.831607] kthread+0x328/0x630 [ 37.831643] ret_from_fork+0x10/0x20 [ 37.831680] [ 37.896612] Allocated by task 306: [ 37.900001] kasan_save_stack+0x3c/0x68 [ 37.903816] kasan_save_track+0x20/0x40 [ 37.907636] kasan_save_alloc_info+0x40/0x58 [ 37.911889] __kasan_kmalloc+0xd4/0xd8 [ 37.915621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.920135] kasan_memcmp+0xbc/0x300 [ 37.923694] kunit_try_run_case+0x170/0x3f0 [ 37.927861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.933329] kthread+0x328/0x630 [ 37.936541] ret_from_fork+0x10/0x20 [ 37.940100] [ 37.941577] The buggy address belongs to the object at ffff000800d61340 [ 37.941577] which belongs to the cache kmalloc-32 of size 32 [ 37.953906] The buggy address is located 0 bytes to the right of [ 37.953906] allocated 24-byte region [ffff000800d61340, ffff000800d61358) [ 37.966749] [ 37.968228] The buggy address belongs to the physical page: [ 37.973785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 37.981768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.988278] page_type: f5(slab) [ 37.991414] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 37.999135] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.006854] page dumped because: kasan: bad access detected [ 38.012408] [ 38.013884] Memory state around the buggy address: [ 38.018667] ffff000800d61200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.025867] ffff000800d61280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.033074] >ffff000800d61300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.040272] ^ [ 38.046353] ffff000800d61380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.053559] ffff000800d61400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.060760] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 37.573491] ================================================================== [ 37.583167] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 37.590717] Read of size 1 at addr ffff800089397b4a by task kunit_try_catch/302 [ 37.598005] [ 37.599491] CPU: 6 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 37.599547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.599568] Hardware name: WinLink E850-96 board (DT) [ 37.599591] Call trace: [ 37.599607] show_stack+0x20/0x38 (C) [ 37.599642] dump_stack_lvl+0x8c/0xd0 [ 37.599682] print_report+0x310/0x608 [ 37.599716] kasan_report+0xdc/0x128 [ 37.599744] __asan_report_load1_noabort+0x20/0x30 [ 37.599781] kasan_alloca_oob_right+0x2dc/0x340 [ 37.599816] kunit_try_run_case+0x170/0x3f0 [ 37.599854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.599896] kthread+0x328/0x630 [ 37.599932] ret_from_fork+0x10/0x20 [ 37.599970] [ 37.662676] The buggy address belongs to stack of task kunit_try_catch/302 [ 37.669554] [ 37.671013] The buggy address belongs to the virtual mapping at [ 37.671013] [ffff800089390000, ffff800089399000) created by: [ 37.671013] kernel_clone+0x150/0x7a8 [ 37.686285] [ 37.687764] The buggy address belongs to the physical page: [ 37.693320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884967 [ 37.701304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.707827] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.715544] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.723266] page dumped because: kasan: bad access detected [ 37.728819] [ 37.730294] Memory state around the buggy address: [ 37.735077] ffff800089397a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.742277] ffff800089397a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.749484] >ffff800089397b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 37.756683] ^ [ 37.762242] ffff800089397b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 37.769450] ffff800089397c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.776650] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 37.360442] ================================================================== [ 37.369452] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 37.376917] Read of size 1 at addr ffff800089377b5f by task kunit_try_catch/300 [ 37.384207] [ 37.385692] CPU: 7 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 37.385752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.385770] Hardware name: WinLink E850-96 board (DT) [ 37.385792] Call trace: [ 37.385806] show_stack+0x20/0x38 (C) [ 37.385843] dump_stack_lvl+0x8c/0xd0 [ 37.385880] print_report+0x310/0x608 [ 37.385913] kasan_report+0xdc/0x128 [ 37.385941] __asan_report_load1_noabort+0x20/0x30 [ 37.385981] kasan_alloca_oob_left+0x2b8/0x310 [ 37.386017] kunit_try_run_case+0x170/0x3f0 [ 37.386054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.386093] kthread+0x328/0x630 [ 37.386131] ret_from_fork+0x10/0x20 [ 37.386168] [ 37.448792] The buggy address belongs to stack of task kunit_try_catch/300 [ 37.455669] [ 37.457126] The buggy address belongs to the virtual mapping at [ 37.457126] [ffff800089370000, ffff800089379000) created by: [ 37.457126] kernel_clone+0x150/0x7a8 [ 37.472399] [ 37.473879] The buggy address belongs to the physical page: [ 37.479435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffffffffffffff pfn:0x882607 [ 37.488720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.495246] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.502961] raw: ffffffffffffffff 0000000000000000 00000001ffffffff 0000000000000000 [ 37.510681] page dumped because: kasan: bad access detected [ 37.516235] [ 37.517711] Memory state around the buggy address: [ 37.522493] ffff800089377a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.529694] ffff800089377a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.536901] >ffff800089377b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 37.544099] ^ [ 37.550179] ffff800089377b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 37.557384] ffff800089377c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.564587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 37.118572] ================================================================== [ 37.132915] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 37.139767] Read of size 1 at addr ffff800089357c2a by task kunit_try_catch/298 [ 37.147058] [ 37.148544] CPU: 6 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 37.148600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.148620] Hardware name: WinLink E850-96 board (DT) [ 37.148644] Call trace: [ 37.148658] show_stack+0x20/0x38 (C) [ 37.148692] dump_stack_lvl+0x8c/0xd0 [ 37.148728] print_report+0x310/0x608 [ 37.148759] kasan_report+0xdc/0x128 [ 37.148790] __asan_report_load1_noabort+0x20/0x30 [ 37.148828] kasan_stack_oob+0x238/0x270 [ 37.148861] kunit_try_run_case+0x170/0x3f0 [ 37.148897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.148939] kthread+0x328/0x630 [ 37.148973] ret_from_fork+0x10/0x20 [ 37.149009] [ 37.211123] The buggy address belongs to stack of task kunit_try_catch/298 [ 37.217977] and is located at offset 138 in frame: [ 37.222837] kasan_stack_oob+0x0/0x270 [ 37.226574] [ 37.228045] This frame has 4 objects: [ 37.231697] [48, 49) '__assertion' [ 37.231719] [64, 72) 'array' [ 37.235166] [96, 112) '__assertion' [ 37.238116] [128, 138) 'stack_array' [ 37.241673] [ 37.246800] The buggy address belongs to the virtual mapping at [ 37.246800] [ffff800089350000, ffff800089359000) created by: [ 37.246800] kernel_clone+0x150/0x7a8 [ 37.262072] [ 37.263552] The buggy address belongs to the physical page: [ 37.269109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88624a [ 37.277092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.283616] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.291332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.299052] page dumped because: kasan: bad access detected [ 37.304606] [ 37.306082] Memory state around the buggy address: [ 37.310863] ffff800089357b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.318066] ffff800089357b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 37.325271] >ffff800089357c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 37.332471] ^ [ 37.336988] ffff800089357c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 37.344193] ffff800089357d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.351396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 36.901156] ================================================================== [ 36.911733] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 36.919286] Read of size 1 at addr ffff800087a035ad by task kunit_try_catch/294 [ 36.926576] [ 36.928061] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.928118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.928136] Hardware name: WinLink E850-96 board (DT) [ 36.928159] Call trace: [ 36.928172] show_stack+0x20/0x38 (C) [ 36.928210] dump_stack_lvl+0x8c/0xd0 [ 36.928247] print_report+0x310/0x608 [ 36.928278] kasan_report+0xdc/0x128 [ 36.928308] __asan_report_load1_noabort+0x20/0x30 [ 36.928348] kasan_global_oob_right+0x230/0x270 [ 36.928382] kunit_try_run_case+0x170/0x3f0 [ 36.928419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.928459] kthread+0x328/0x630 [ 36.928493] ret_from_fork+0x10/0x20 [ 36.928532] [ 36.991244] The buggy address belongs to the variable: [ 36.996364] global_array+0xd/0x40 [ 36.999751] [ 37.001235] The buggy address belongs to the virtual mapping at [ 37.001235] [ffff800085c20000, ffff800087ac1000) created by: [ 37.001235] paging_init+0x66c/0x7d0 [ 37.016416] [ 37.017898] The buggy address belongs to the physical page: [ 37.023454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87a03 [ 37.031349] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 37.038654] raw: 03fffe0000002000 fffffdffc01e80c8 fffffdffc01e80c8 0000000000000000 [ 37.046370] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.054091] page dumped because: kasan: bad access detected [ 37.059645] [ 37.061120] Memory state around the buggy address: [ 37.065902] ffff800087a03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.073104] ffff800087a03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 37.080311] >ffff800087a03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 37.087509] ^ [ 37.092027] ffff800087a03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 37.099232] ffff800087a03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.106434] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 36.662016] ================================================================== [ 36.672154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.680137] Free of addr ffff000803260001 by task kunit_try_catch/292 [ 36.686560] [ 36.688048] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.688105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.688120] Hardware name: WinLink E850-96 board (DT) [ 36.688141] Call trace: [ 36.688153] show_stack+0x20/0x38 (C) [ 36.688189] dump_stack_lvl+0x8c/0xd0 [ 36.688229] print_report+0x118/0x608 [ 36.688257] kasan_report_invalid_free+0xc0/0xe8 [ 36.688291] __kasan_mempool_poison_object+0xfc/0x150 [ 36.688327] mempool_free+0x28c/0x328 [ 36.688361] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.688398] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 36.688435] kunit_try_run_case+0x170/0x3f0 [ 36.688471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.688511] kthread+0x328/0x630 [ 36.688544] ret_from_fork+0x10/0x20 [ 36.688580] [ 36.762779] The buggy address belongs to the physical page: [ 36.768334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 36.776319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.783957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.790900] page_type: f8(unknown) [ 36.794302] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.802016] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.809742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.817554] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.825367] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff [ 36.833179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.840986] page dumped because: kasan: bad access detected [ 36.846540] [ 36.848016] Memory state around the buggy address: [ 36.852796] ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.860001] ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.867208] >ffff000803260000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.874405] ^ [ 36.877620] ffff000803260080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.884825] ffff000803260100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.892027] ================================================================== [ 36.336045] ================================================================== [ 36.346554] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.354535] Free of addr ffff000802678a01 by task kunit_try_catch/290 [ 36.360959] [ 36.362445] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.362500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.362516] Hardware name: WinLink E850-96 board (DT) [ 36.362537] Call trace: [ 36.362550] show_stack+0x20/0x38 (C) [ 36.362586] dump_stack_lvl+0x8c/0xd0 [ 36.362624] print_report+0x118/0x608 [ 36.362656] kasan_report_invalid_free+0xc0/0xe8 [ 36.362689] check_slab_allocation+0xfc/0x108 [ 36.362720] __kasan_mempool_poison_object+0x78/0x150 [ 36.362753] mempool_free+0x28c/0x328 [ 36.362790] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.362828] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.362864] kunit_try_run_case+0x170/0x3f0 [ 36.362901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.362941] kthread+0x328/0x630 [ 36.362975] ret_from_fork+0x10/0x20 [ 36.363009] [ 36.440991] Allocated by task 290: [ 36.444380] kasan_save_stack+0x3c/0x68 [ 36.448195] kasan_save_track+0x20/0x40 [ 36.452015] kasan_save_alloc_info+0x40/0x58 [ 36.456268] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.461565] remove_element+0x130/0x1f8 [ 36.465383] mempool_alloc_preallocated+0x58/0xc0 [ 36.470070] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 36.475626] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.480573] kunit_try_run_case+0x170/0x3f0 [ 36.484741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.490209] kthread+0x328/0x630 [ 36.493420] ret_from_fork+0x10/0x20 [ 36.496980] [ 36.498457] The buggy address belongs to the object at ffff000802678a00 [ 36.498457] which belongs to the cache kmalloc-128 of size 128 [ 36.510958] The buggy address is located 1 bytes inside of [ 36.510958] 128-byte region [ffff000802678a00, ffff000802678a80) [ 36.522500] [ 36.523978] The buggy address belongs to the physical page: [ 36.529535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 36.537519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.545158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.552101] page_type: f5(slab) [ 36.555238] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.562958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.570684] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.578495] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.586308] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 36.594120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.601927] page dumped because: kasan: bad access detected [ 36.607481] [ 36.608957] Memory state around the buggy address: [ 36.613741] ffff000802678900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.620942] ffff000802678980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.628146] >ffff000802678a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.635346] ^ [ 36.638561] ffff000802678a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.645766] ffff000802678b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.652968] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 35.904841] ================================================================== [ 35.914354] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.921469] Free of addr ffff000803260000 by task kunit_try_catch/286 [ 35.927891] [ 35.929379] CPU: 6 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 35.929433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.929450] Hardware name: WinLink E850-96 board (DT) [ 35.929471] Call trace: [ 35.929484] show_stack+0x20/0x38 (C) [ 35.929522] dump_stack_lvl+0x8c/0xd0 [ 35.929560] print_report+0x118/0x608 [ 35.929590] kasan_report_invalid_free+0xc0/0xe8 [ 35.929621] __kasan_mempool_poison_object+0x14c/0x150 [ 35.929657] mempool_free+0x28c/0x328 [ 35.929692] mempool_double_free_helper+0x150/0x2e8 [ 35.929729] mempool_kmalloc_large_double_free+0xc0/0x118 [ 35.929765] kunit_try_run_case+0x170/0x3f0 [ 35.929800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.929839] kthread+0x328/0x630 [ 35.929872] ret_from_fork+0x10/0x20 [ 35.929908] [ 36.003328] The buggy address belongs to the physical page: [ 36.008884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 36.016867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.024507] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.031448] page_type: f8(unknown) [ 36.034849] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.042566] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.050292] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.058103] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.065917] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff [ 36.073729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.081536] page dumped because: kasan: bad access detected [ 36.087089] [ 36.088565] Memory state around the buggy address: [ 36.093346] ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.100550] ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.107757] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.114954] ^ [ 36.118169] ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.125374] ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.132577] ================================================================== [ 35.530633] ================================================================== [ 35.540314] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.547429] Free of addr ffff000802678600 by task kunit_try_catch/284 [ 35.553852] [ 35.555339] CPU: 7 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 35.555393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.555410] Hardware name: WinLink E850-96 board (DT) [ 35.555430] Call trace: [ 35.555442] show_stack+0x20/0x38 (C) [ 35.555475] dump_stack_lvl+0x8c/0xd0 [ 35.555512] print_report+0x118/0x608 [ 35.555544] kasan_report_invalid_free+0xc0/0xe8 [ 35.555579] check_slab_allocation+0xd4/0x108 [ 35.555611] __kasan_mempool_poison_object+0x78/0x150 [ 35.555642] mempool_free+0x28c/0x328 [ 35.555678] mempool_double_free_helper+0x150/0x2e8 [ 35.555713] mempool_kmalloc_double_free+0xc0/0x118 [ 35.555747] kunit_try_run_case+0x170/0x3f0 [ 35.555784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.555823] kthread+0x328/0x630 [ 35.555858] ret_from_fork+0x10/0x20 [ 35.555894] [ 35.633017] Allocated by task 284: [ 35.636406] kasan_save_stack+0x3c/0x68 [ 35.640221] kasan_save_track+0x20/0x40 [ 35.644042] kasan_save_alloc_info+0x40/0x58 [ 35.648294] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.653589] remove_element+0x130/0x1f8 [ 35.657409] mempool_alloc_preallocated+0x58/0xc0 [ 35.662098] mempool_double_free_helper+0x94/0x2e8 [ 35.666870] mempool_kmalloc_double_free+0xc0/0x118 [ 35.671732] kunit_try_run_case+0x170/0x3f0 [ 35.675898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.681367] kthread+0x328/0x630 [ 35.684578] ret_from_fork+0x10/0x20 [ 35.688137] [ 35.689614] Freed by task 284: [ 35.692651] kasan_save_stack+0x3c/0x68 [ 35.696471] kasan_save_track+0x20/0x40 [ 35.700291] kasan_save_free_info+0x4c/0x78 [ 35.704457] __kasan_mempool_poison_object+0xc0/0x150 [ 35.709491] mempool_free+0x28c/0x328 [ 35.713137] mempool_double_free_helper+0x100/0x2e8 [ 35.717998] mempool_kmalloc_double_free+0xc0/0x118 [ 35.722859] kunit_try_run_case+0x170/0x3f0 [ 35.727026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.732494] kthread+0x328/0x630 [ 35.735708] ret_from_fork+0x10/0x20 [ 35.739265] [ 35.740743] The buggy address belongs to the object at ffff000802678600 [ 35.740743] which belongs to the cache kmalloc-128 of size 128 [ 35.753244] The buggy address is located 0 bytes inside of [ 35.753244] 128-byte region [ffff000802678600, ffff000802678680) [ 35.764785] [ 35.766265] The buggy address belongs to the physical page: [ 35.771821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 35.779806] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.787444] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.794387] page_type: f5(slab) [ 35.797525] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.805243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.812969] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.820783] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.828594] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 35.836406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.844214] page dumped because: kasan: bad access detected [ 35.849767] [ 35.851242] Memory state around the buggy address: [ 35.856025] ffff000802678500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.863228] ffff000802678580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.870435] >ffff000802678600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.877631] ^ [ 35.880847] ffff000802678680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.888051] ffff000802678700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.895254] ================================================================== [ 36.141606] ================================================================== [ 36.152196] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 36.159314] Free of addr ffff000803260000 by task kunit_try_catch/288 [ 36.165735] [ 36.167222] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.167273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.167292] Hardware name: WinLink E850-96 board (DT) [ 36.167317] Call trace: [ 36.167329] show_stack+0x20/0x38 (C) [ 36.167366] dump_stack_lvl+0x8c/0xd0 [ 36.167406] print_report+0x118/0x608 [ 36.167436] kasan_report_invalid_free+0xc0/0xe8 [ 36.167469] __kasan_mempool_poison_pages+0xe0/0xe8 [ 36.167502] mempool_free+0x24c/0x328 [ 36.167537] mempool_double_free_helper+0x150/0x2e8 [ 36.167577] mempool_page_alloc_double_free+0xbc/0x118 [ 36.167608] kunit_try_run_case+0x170/0x3f0 [ 36.167648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.167686] kthread+0x328/0x630 [ 36.167719] ret_from_fork+0x10/0x20 [ 36.167757] [ 36.240650] The buggy address belongs to the physical page: [ 36.246205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 36.254190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.260713] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.268431] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.276152] page dumped because: kasan: bad access detected [ 36.281705] [ 36.283180] Memory state around the buggy address: [ 36.287963] ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.295165] ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.302371] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.309569] ^ [ 36.312785] ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.319989] ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.327192] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 35.347500] ================================================================== [ 35.352385] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.359063] Read of size 1 at addr ffff000803260000 by task kunit_try_catch/282 [ 35.366354] [ 35.367841] CPU: 6 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 35.367896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.367914] Hardware name: WinLink E850-96 board (DT) [ 35.367938] Call trace: [ 35.367952] show_stack+0x20/0x38 (C) [ 35.367988] dump_stack_lvl+0x8c/0xd0 [ 35.368026] print_report+0x118/0x608 [ 35.368056] kasan_report+0xdc/0x128 [ 35.368085] __asan_report_load1_noabort+0x20/0x30 [ 35.368124] mempool_uaf_helper+0x314/0x340 [ 35.368159] mempool_page_alloc_uaf+0xc0/0x118 [ 35.368192] kunit_try_run_case+0x170/0x3f0 [ 35.368227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.368266] kthread+0x328/0x630 [ 35.368300] ret_from_fork+0x10/0x20 [ 35.368340] [ 35.435108] The buggy address belongs to the physical page: [ 35.440661] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 35.448647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.455170] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.462887] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.470609] page dumped because: kasan: bad access detected [ 35.476162] [ 35.477637] Memory state around the buggy address: [ 35.482418] ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.489620] ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.496827] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.504026] ^ [ 35.507242] ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.514446] ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.521649] ================================================================== [ 34.788938] ================================================================== [ 34.798398] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.805081] Read of size 1 at addr ffff000801eb0000 by task kunit_try_catch/278 [ 34.812370] [ 34.813857] CPU: 4 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 34.813913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.813932] Hardware name: WinLink E850-96 board (DT) [ 34.813954] Call trace: [ 34.813967] show_stack+0x20/0x38 (C) [ 34.814001] dump_stack_lvl+0x8c/0xd0 [ 34.814040] print_report+0x118/0x608 [ 34.814072] kasan_report+0xdc/0x128 [ 34.814103] __asan_report_load1_noabort+0x20/0x30 [ 34.814141] mempool_uaf_helper+0x314/0x340 [ 34.814175] mempool_kmalloc_large_uaf+0xc4/0x120 [ 34.814210] kunit_try_run_case+0x170/0x3f0 [ 34.814247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.814282] kthread+0x328/0x630 [ 34.814320] ret_from_fork+0x10/0x20 [ 34.814356] [ 34.881380] The buggy address belongs to the physical page: [ 34.886938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881eb0 [ 34.894924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.902562] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.909505] page_type: f8(unknown) [ 34.912902] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.920621] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.928347] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.936159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.943972] head: 0bfffe0000000002 fffffdffe007ac01 00000000ffffffff 00000000ffffffff [ 34.951784] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.959590] page dumped because: kasan: bad access detected [ 34.965145] [ 34.966620] Memory state around the buggy address: [ 34.971404] ffff000801eaff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.978603] ffff000801eaff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.985812] >ffff000801eb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.993009] ^ [ 34.996225] ffff000801eb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.003429] ffff000801eb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.010632] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 34.435252] ================================================================== [ 34.437119] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.444233] Read of size 1 at addr ffff0008018e7300 by task kunit_try_catch/276 [ 34.451524] [ 34.453011] CPU: 2 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 34.453070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.453090] Hardware name: WinLink E850-96 board (DT) [ 34.453114] Call trace: [ 34.453126] show_stack+0x20/0x38 (C) [ 34.453159] dump_stack_lvl+0x8c/0xd0 [ 34.453195] print_report+0x118/0x608 [ 34.453225] kasan_report+0xdc/0x128 [ 34.453255] __asan_report_load1_noabort+0x20/0x30 [ 34.453291] mempool_uaf_helper+0x314/0x340 [ 34.453326] mempool_kmalloc_uaf+0xc4/0x120 [ 34.453359] kunit_try_run_case+0x170/0x3f0 [ 34.453394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.453430] kthread+0x328/0x630 [ 34.453465] ret_from_fork+0x10/0x20 [ 34.453500] [ 34.520015] Allocated by task 276: [ 34.523402] kasan_save_stack+0x3c/0x68 [ 34.527217] kasan_save_track+0x20/0x40 [ 34.531037] kasan_save_alloc_info+0x40/0x58 [ 34.535290] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.540585] remove_element+0x130/0x1f8 [ 34.544405] mempool_alloc_preallocated+0x58/0xc0 [ 34.549092] mempool_uaf_helper+0xa4/0x340 [ 34.553172] mempool_kmalloc_uaf+0xc4/0x120 [ 34.557338] kunit_try_run_case+0x170/0x3f0 [ 34.561505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.566974] kthread+0x328/0x630 [ 34.570186] ret_from_fork+0x10/0x20 [ 34.573744] [ 34.575221] Freed by task 276: [ 34.578260] kasan_save_stack+0x3c/0x68 [ 34.582078] kasan_save_track+0x20/0x40 [ 34.585897] kasan_save_free_info+0x4c/0x78 [ 34.590064] __kasan_mempool_poison_object+0xc0/0x150 [ 34.595098] mempool_free+0x28c/0x328 [ 34.598744] mempool_uaf_helper+0x104/0x340 [ 34.602910] mempool_kmalloc_uaf+0xc4/0x120 [ 34.607077] kunit_try_run_case+0x170/0x3f0 [ 34.611245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.616713] kthread+0x328/0x630 [ 34.619924] ret_from_fork+0x10/0x20 [ 34.623483] [ 34.624960] The buggy address belongs to the object at ffff0008018e7300 [ 34.624960] which belongs to the cache kmalloc-128 of size 128 [ 34.637463] The buggy address is located 0 bytes inside of [ 34.637463] freed 128-byte region [ffff0008018e7300, ffff0008018e7380) [ 34.649524] [ 34.651003] The buggy address belongs to the physical page: [ 34.656562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 34.664544] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.672184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.679126] page_type: f5(slab) [ 34.682264] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 34.689982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.697709] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 34.705520] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.713333] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 34.721145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.728950] page dumped because: kasan: bad access detected [ 34.734505] [ 34.735981] Memory state around the buggy address: [ 34.740765] ffff0008018e7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.747964] ffff0008018e7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.755170] >ffff0008018e7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.762370] ^ [ 34.765586] ffff0008018e7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.772792] ffff0008018e7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.779993] ================================================================== [ 35.020117] ================================================================== [ 35.029561] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.036675] Read of size 1 at addr ffff0008067bf240 by task kunit_try_catch/280 [ 35.043965] [ 35.045451] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 35.045507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.045523] Hardware name: WinLink E850-96 board (DT) [ 35.045546] Call trace: [ 35.045558] show_stack+0x20/0x38 (C) [ 35.045594] dump_stack_lvl+0x8c/0xd0 [ 35.045633] print_report+0x118/0x608 [ 35.045666] kasan_report+0xdc/0x128 [ 35.045697] __asan_report_load1_noabort+0x20/0x30 [ 35.045734] mempool_uaf_helper+0x314/0x340 [ 35.045767] mempool_slab_uaf+0xc0/0x118 [ 35.045794] kunit_try_run_case+0x170/0x3f0 [ 35.045832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.045869] kthread+0x328/0x630 [ 35.045906] ret_from_fork+0x10/0x20 [ 35.045942] [ 35.112192] Allocated by task 280: [ 35.115581] kasan_save_stack+0x3c/0x68 [ 35.119396] kasan_save_track+0x20/0x40 [ 35.123215] kasan_save_alloc_info+0x40/0x58 [ 35.127469] __kasan_mempool_unpoison_object+0xbc/0x180 [ 35.132677] remove_element+0x16c/0x1f8 [ 35.136496] mempool_alloc_preallocated+0x58/0xc0 [ 35.141185] mempool_uaf_helper+0xa4/0x340 [ 35.145264] mempool_slab_uaf+0xc0/0x118 [ 35.149170] kunit_try_run_case+0x170/0x3f0 [ 35.153337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.158805] kthread+0x328/0x630 [ 35.162017] ret_from_fork+0x10/0x20 [ 35.165576] [ 35.167053] Freed by task 280: [ 35.170091] kasan_save_stack+0x3c/0x68 [ 35.173909] kasan_save_track+0x20/0x40 [ 35.177729] kasan_save_free_info+0x4c/0x78 [ 35.181895] __kasan_mempool_poison_object+0xc0/0x150 [ 35.186930] mempool_free+0x28c/0x328 [ 35.190575] mempool_uaf_helper+0x104/0x340 [ 35.194742] mempool_slab_uaf+0xc0/0x118 [ 35.198648] kunit_try_run_case+0x170/0x3f0 [ 35.202815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.208283] kthread+0x328/0x630 [ 35.211495] ret_from_fork+0x10/0x20 [ 35.215054] [ 35.216532] The buggy address belongs to the object at ffff0008067bf240 [ 35.216532] which belongs to the cache test_cache of size 123 [ 35.228947] The buggy address is located 0 bytes inside of [ 35.228947] freed 123-byte region [ffff0008067bf240, ffff0008067bf2bb) [ 35.241009] [ 35.242488] The buggy address belongs to the physical page: [ 35.248045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867bf [ 35.256029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.262537] page_type: f5(slab) [ 35.265676] raw: 0bfffe0000000000 ffff000806738000 dead000000000122 0000000000000000 [ 35.273394] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 35.281113] page dumped because: kasan: bad access detected [ 35.286668] [ 35.288143] Memory state around the buggy address: [ 35.292927] ffff0008067bf100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.300128] ffff0008067bf180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.307335] >ffff0008067bf200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.314532] ^ [ 35.319831] ffff0008067bf280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.327036] ffff0008067bf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.334238] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 33.615574] ================================================================== [ 33.615752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.615887] Read of size 1 at addr ffff000802778473 by task kunit_try_catch/270 [ 33.622284] [ 33.623771] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 33.623825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.623843] Hardware name: WinLink E850-96 board (DT) [ 33.623863] Call trace: [ 33.623879] show_stack+0x20/0x38 (C) [ 33.623914] dump_stack_lvl+0x8c/0xd0 [ 33.623952] print_report+0x118/0x608 [ 33.623982] kasan_report+0xdc/0x128 [ 33.624010] __asan_report_load1_noabort+0x20/0x30 [ 33.624046] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.624081] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.624116] kunit_try_run_case+0x170/0x3f0 [ 33.624153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624191] kthread+0x328/0x630 [ 33.624226] ret_from_fork+0x10/0x20 [ 33.624262] [ 33.691815] Allocated by task 270: [ 33.695203] kasan_save_stack+0x3c/0x68 [ 33.699018] kasan_save_track+0x20/0x40 [ 33.702839] kasan_save_alloc_info+0x40/0x58 [ 33.707091] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.712386] remove_element+0x130/0x1f8 [ 33.716205] mempool_alloc_preallocated+0x58/0xc0 [ 33.720893] mempool_oob_right_helper+0x98/0x2f0 [ 33.725493] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.730180] kunit_try_run_case+0x170/0x3f0 [ 33.734347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.739817] kthread+0x328/0x630 [ 33.743028] ret_from_fork+0x10/0x20 [ 33.746587] [ 33.748065] The buggy address belongs to the object at ffff000802778400 [ 33.748065] which belongs to the cache kmalloc-128 of size 128 [ 33.760566] The buggy address is located 0 bytes to the right of [ 33.760566] allocated 115-byte region [ffff000802778400, ffff000802778473) [ 33.773496] [ 33.774975] The buggy address belongs to the physical page: [ 33.780532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882778 [ 33.788515] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.796155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.803098] page_type: f5(slab) [ 33.806235] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.813954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.821681] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.829491] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.837309] head: 0bfffe0000000001 fffffdffe009de01 00000000ffffffff 00000000ffffffff [ 33.845116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.852923] page dumped because: kasan: bad access detected [ 33.858477] [ 33.859953] Memory state around the buggy address: [ 33.864733] ffff000802778300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.871936] ffff000802778380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879142] >ffff000802778400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.886342] ^ [ 33.893203] ffff000802778480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.900407] ffff000802778500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.907611] ================================================================== [ 33.916578] ================================================================== [ 33.926537] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.934086] Read of size 1 at addr ffff000803262001 by task kunit_try_catch/272 [ 33.941376] [ 33.942862] CPU: 6 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 33.942921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.942939] Hardware name: WinLink E850-96 board (DT) [ 33.942962] Call trace: [ 33.942975] show_stack+0x20/0x38 (C) [ 33.943011] dump_stack_lvl+0x8c/0xd0 [ 33.943046] print_report+0x118/0x608 [ 33.943081] kasan_report+0xdc/0x128 [ 33.943110] __asan_report_load1_noabort+0x20/0x30 [ 33.943148] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.943184] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.943220] kunit_try_run_case+0x170/0x3f0 [ 33.943256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.943293] kthread+0x328/0x630 [ 33.943329] ret_from_fork+0x10/0x20 [ 33.943365] [ 34.011428] The buggy address belongs to the physical page: [ 34.016987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 34.024970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.032611] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.039551] page_type: f8(unknown) [ 34.042950] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.050668] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.058395] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.066206] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.074020] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff [ 34.081832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.089637] page dumped because: kasan: bad access detected [ 34.095192] [ 34.096667] Memory state around the buggy address: [ 34.101448] ffff000803261f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.108651] ffff000803261f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.115859] >ffff000803262000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.123057] ^ [ 34.126272] ffff000803262080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.133477] ffff000803262100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.140680] ================================================================== [ 34.150273] ================================================================== [ 34.160127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.167677] Read of size 1 at addr ffff00080675f2bb by task kunit_try_catch/274 [ 34.174967] [ 34.176454] CPU: 7 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 34.176508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.176525] Hardware name: WinLink E850-96 board (DT) [ 34.176546] Call trace: [ 34.176562] show_stack+0x20/0x38 (C) [ 34.176596] dump_stack_lvl+0x8c/0xd0 [ 34.176635] print_report+0x118/0x608 [ 34.176663] kasan_report+0xdc/0x128 [ 34.176692] __asan_report_load1_noabort+0x20/0x30 [ 34.176727] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.176763] mempool_slab_oob_right+0xc0/0x118 [ 34.176792] kunit_try_run_case+0x170/0x3f0 [ 34.176829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.176866] kthread+0x328/0x630 [ 34.176902] ret_from_fork+0x10/0x20 [ 34.176936] [ 34.244237] Allocated by task 274: [ 34.247625] kasan_save_stack+0x3c/0x68 [ 34.251440] kasan_save_track+0x20/0x40 [ 34.255260] kasan_save_alloc_info+0x40/0x58 [ 34.259513] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.264721] remove_element+0x16c/0x1f8 [ 34.268540] mempool_alloc_preallocated+0x58/0xc0 [ 34.273228] mempool_oob_right_helper+0x98/0x2f0 [ 34.277829] mempool_slab_oob_right+0xc0/0x118 [ 34.282256] kunit_try_run_case+0x170/0x3f0 [ 34.286422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.291891] kthread+0x328/0x630 [ 34.295103] ret_from_fork+0x10/0x20 [ 34.298662] [ 34.300139] The buggy address belongs to the object at ffff00080675f240 [ 34.300139] which belongs to the cache test_cache of size 123 [ 34.312553] The buggy address is located 0 bytes to the right of [ 34.312553] allocated 123-byte region [ffff00080675f240, ffff00080675f2bb) [ 34.325484] [ 34.326964] The buggy address belongs to the physical page: [ 34.332519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88675f [ 34.340504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.347013] page_type: f5(slab) [ 34.350151] raw: 0bfffe0000000000 ffff000801bca140 dead000000000122 0000000000000000 [ 34.357871] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.365591] page dumped because: kasan: bad access detected [ 34.371143] [ 34.372618] Memory state around the buggy address: [ 34.377401] ffff00080675f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.384602] ffff00080675f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.391810] >ffff00080675f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.399008] ^ [ 34.404046] ffff00080675f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.411251] ffff00080675f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.418453] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.727922] ================================================================== [ 32.728110] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.728252] Read of size 1 at addr ffff00080179f7c0 by task kunit_try_catch/264 [ 32.731806] [ 32.733292] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 32.733348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.733365] Hardware name: WinLink E850-96 board (DT) [ 32.733387] Call trace: [ 32.733402] show_stack+0x20/0x38 (C) [ 32.733438] dump_stack_lvl+0x8c/0xd0 [ 32.733473] print_report+0x118/0x608 [ 32.733505] kasan_report+0xdc/0x128 [ 32.733532] __kasan_check_byte+0x54/0x70 [ 32.733565] kmem_cache_destroy+0x34/0x218 [ 32.733593] kmem_cache_double_destroy+0x174/0x300 [ 32.733628] kunit_try_run_case+0x170/0x3f0 [ 32.733663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.733700] kthread+0x328/0x630 [ 32.733734] ret_from_fork+0x10/0x20 [ 32.733771] [ 32.800035] Allocated by task 264: [ 32.803422] kasan_save_stack+0x3c/0x68 [ 32.807238] kasan_save_track+0x20/0x40 [ 32.811057] kasan_save_alloc_info+0x40/0x58 [ 32.815310] __kasan_slab_alloc+0xa8/0xb0 [ 32.819304] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.823904] __kmem_cache_create_args+0x178/0x280 [ 32.828592] kmem_cache_double_destroy+0xc0/0x300 [ 32.833279] kunit_try_run_case+0x170/0x3f0 [ 32.837447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.842914] kthread+0x328/0x630 [ 32.846126] ret_from_fork+0x10/0x20 [ 32.849685] [ 32.851162] Freed by task 264: [ 32.854201] kasan_save_stack+0x3c/0x68 [ 32.858020] kasan_save_track+0x20/0x40 [ 32.861838] kasan_save_free_info+0x4c/0x78 [ 32.866004] __kasan_slab_free+0x6c/0x98 [ 32.869912] kmem_cache_free+0x260/0x468 [ 32.873817] slab_kmem_cache_release+0x38/0x50 [ 32.878244] kmem_cache_release+0x1c/0x30 [ 32.882236] kobject_put+0x17c/0x420 [ 32.885796] sysfs_slab_release+0x1c/0x30 [ 32.889789] kmem_cache_destroy+0x118/0x218 [ 32.893955] kmem_cache_double_destroy+0x128/0x300 [ 32.898730] kunit_try_run_case+0x170/0x3f0 [ 32.902897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.908365] kthread+0x328/0x630 [ 32.911577] ret_from_fork+0x10/0x20 [ 32.915136] [ 32.916613] The buggy address belongs to the object at ffff00080179f7c0 [ 32.916613] which belongs to the cache kmem_cache of size 208 [ 32.929027] The buggy address is located 0 bytes inside of [ 32.929027] freed 208-byte region [ffff00080179f7c0, ffff00080179f890) [ 32.941090] [ 32.942570] The buggy address belongs to the physical page: [ 32.948125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88179e [ 32.956109] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.963750] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.970692] page_type: f5(slab) [ 32.973830] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 32.981549] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 32.989274] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 32.997085] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 33.004898] head: 0bfffe0000000001 fffffdffe005e781 00000000ffffffff 00000000ffffffff [ 33.012712] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.020518] page dumped because: kasan: bad access detected [ 33.026071] [ 33.027547] Memory state around the buggy address: [ 33.032329] ffff00080179f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.039530] ffff00080179f700: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 33.046738] >ffff00080179f780: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.053936] ^ [ 33.059234] ffff00080179f800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.066441] ffff00080179f880: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.073642] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 32.316840] ================================================================== [ 32.317030] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 32.317160] Read of size 1 at addr ffff000802604000 by task kunit_try_catch/262 [ 32.320545] [ 32.322032] CPU: 6 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 32.322088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.322105] Hardware name: WinLink E850-96 board (DT) [ 32.322127] Call trace: [ 32.322140] show_stack+0x20/0x38 (C) [ 32.322176] dump_stack_lvl+0x8c/0xd0 [ 32.322215] print_report+0x118/0x608 [ 32.322248] kasan_report+0xdc/0x128 [ 32.322276] __asan_report_load1_noabort+0x20/0x30 [ 32.322317] kmem_cache_rcu_uaf+0x388/0x468 [ 32.322349] kunit_try_run_case+0x170/0x3f0 [ 32.322385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.322424] kthread+0x328/0x630 [ 32.322457] ret_from_fork+0x10/0x20 [ 32.322493] [ 32.384868] Allocated by task 262: [ 32.388255] kasan_save_stack+0x3c/0x68 [ 32.392071] kasan_save_track+0x20/0x40 [ 32.395891] kasan_save_alloc_info+0x40/0x58 [ 32.400144] __kasan_slab_alloc+0xa8/0xb0 [ 32.404137] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.408738] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.412904] kunit_try_run_case+0x170/0x3f0 [ 32.417071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.422541] kthread+0x328/0x630 [ 32.425752] ret_from_fork+0x10/0x20 [ 32.429310] [ 32.430787] Freed by task 0: [ 32.433654] kasan_save_stack+0x3c/0x68 [ 32.437470] kasan_save_track+0x20/0x40 [ 32.441289] kasan_save_free_info+0x4c/0x78 [ 32.445456] __kasan_slab_free+0x6c/0x98 [ 32.449363] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.454050] rcu_core+0x9f4/0x1e20 [ 32.457435] rcu_core_si+0x18/0x30 [ 32.460820] handle_softirqs+0x374/0xb28 [ 32.464728] __do_softirq+0x1c/0x28 [ 32.468199] [ 32.469676] Last potentially related work creation: [ 32.474537] kasan_save_stack+0x3c/0x68 [ 32.478355] kasan_record_aux_stack+0xb4/0xc8 [ 32.482696] kmem_cache_free+0x120/0x468 [ 32.486602] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.490768] kunit_try_run_case+0x170/0x3f0 [ 32.494934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.500403] kthread+0x328/0x630 [ 32.503615] ret_from_fork+0x10/0x20 [ 32.507174] [ 32.508651] The buggy address belongs to the object at ffff000802604000 [ 32.508651] which belongs to the cache test_cache of size 200 [ 32.521066] The buggy address is located 0 bytes inside of [ 32.521066] freed 200-byte region [ffff000802604000, ffff0008026040c8) [ 32.533128] [ 32.534608] The buggy address belongs to the physical page: [ 32.540163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882604 [ 32.548149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.555786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.562730] page_type: f5(slab) [ 32.565869] raw: 0bfffe0000000040 ffff000802602000 dead000000000122 0000000000000000 [ 32.573586] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.581313] head: 0bfffe0000000040 ffff000802602000 dead000000000122 0000000000000000 [ 32.589124] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.596937] head: 0bfffe0000000001 fffffdffe0098101 00000000ffffffff 00000000ffffffff [ 32.604749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.612557] page dumped because: kasan: bad access detected [ 32.618109] [ 32.619585] Memory state around the buggy address: [ 32.624364] ffff000802603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.631569] ffff000802603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.638774] >ffff000802604000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.645974] ^ [ 32.649189] ffff000802604080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.656395] ffff000802604100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.663597] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.919837] ================================================================== [ 31.923291] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.930234] Free of addr ffff000801bca001 by task kunit_try_catch/260 [ 31.936656] [ 31.938142] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 31.938200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.938215] Hardware name: WinLink E850-96 board (DT) [ 31.938240] Call trace: [ 31.938252] show_stack+0x20/0x38 (C) [ 31.938288] dump_stack_lvl+0x8c/0xd0 [ 31.938325] print_report+0x118/0x608 [ 31.938356] kasan_report_invalid_free+0xc0/0xe8 [ 31.938389] check_slab_allocation+0xfc/0x108 [ 31.938420] __kasan_slab_pre_free+0x2c/0x48 [ 31.938449] kmem_cache_free+0xf0/0x468 [ 31.938479] kmem_cache_invalid_free+0x184/0x3c8 [ 31.938514] kunit_try_run_case+0x170/0x3f0 [ 31.938552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.938588] kthread+0x328/0x630 [ 31.938622] ret_from_fork+0x10/0x20 [ 31.938661] [ 32.010093] Allocated by task 260: [ 32.013481] kasan_save_stack+0x3c/0x68 [ 32.017296] kasan_save_track+0x20/0x40 [ 32.021115] kasan_save_alloc_info+0x40/0x58 [ 32.025369] __kasan_slab_alloc+0xa8/0xb0 [ 32.029361] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.033962] kmem_cache_invalid_free+0x12c/0x3c8 [ 32.038564] kunit_try_run_case+0x170/0x3f0 [ 32.042730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.048198] kthread+0x328/0x630 [ 32.051410] ret_from_fork+0x10/0x20 [ 32.054969] [ 32.056446] The buggy address belongs to the object at ffff000801bca000 [ 32.056446] which belongs to the cache test_cache of size 200 [ 32.068861] The buggy address is located 1 bytes inside of [ 32.068861] 200-byte region [ffff000801bca000, ffff000801bca0c8) [ 32.080403] [ 32.081882] The buggy address belongs to the physical page: [ 32.087437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bca [ 32.095422] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.103062] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.110002] page_type: f5(slab) [ 32.113141] raw: 0bfffe0000000040 ffff000801bc6140 dead000000000122 0000000000000000 [ 32.120860] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.128586] head: 0bfffe0000000040 ffff000801bc6140 dead000000000122 0000000000000000 [ 32.136398] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.144211] head: 0bfffe0000000001 fffffdffe006f281 00000000ffffffff 00000000ffffffff [ 32.152023] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.159829] page dumped because: kasan: bad access detected [ 32.165384] [ 32.166859] Memory state around the buggy address: [ 32.171639] ffff000801bc9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.178844] ffff000801bc9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.186051] >ffff000801bca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.193248] ^ [ 32.196464] ffff000801bca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.203668] ffff000801bca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.210871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.583820] ================================================================== [ 31.584004] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.584131] Free of addr ffff0008018ea000 by task kunit_try_catch/258 [ 31.585533] [ 31.587018] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 31.587074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.587091] Hardware name: WinLink E850-96 board (DT) [ 31.587111] Call trace: [ 31.587123] show_stack+0x20/0x38 (C) [ 31.587157] dump_stack_lvl+0x8c/0xd0 [ 31.587196] print_report+0x118/0x608 [ 31.587226] kasan_report_invalid_free+0xc0/0xe8 [ 31.587259] check_slab_allocation+0xd4/0x108 [ 31.587291] __kasan_slab_pre_free+0x2c/0x48 [ 31.587319] kmem_cache_free+0xf0/0x468 [ 31.587351] kmem_cache_double_free+0x190/0x3c8 [ 31.587385] kunit_try_run_case+0x170/0x3f0 [ 31.587423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.587461] kthread+0x328/0x630 [ 31.587495] ret_from_fork+0x10/0x20 [ 31.587531] [ 31.658883] Allocated by task 258: [ 31.662269] kasan_save_stack+0x3c/0x68 [ 31.666086] kasan_save_track+0x20/0x40 [ 31.669905] kasan_save_alloc_info+0x40/0x58 [ 31.674158] __kasan_slab_alloc+0xa8/0xb0 [ 31.678153] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.682752] kmem_cache_double_free+0x12c/0x3c8 [ 31.687266] kunit_try_run_case+0x170/0x3f0 [ 31.691433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.696901] kthread+0x328/0x630 [ 31.700113] ret_from_fork+0x10/0x20 [ 31.703672] [ 31.705149] Freed by task 258: [ 31.708187] kasan_save_stack+0x3c/0x68 [ 31.712005] kasan_save_track+0x20/0x40 [ 31.715824] kasan_save_free_info+0x4c/0x78 [ 31.719991] __kasan_slab_free+0x6c/0x98 [ 31.723897] kmem_cache_free+0x260/0x468 [ 31.727804] kmem_cache_double_free+0x140/0x3c8 [ 31.732319] kunit_try_run_case+0x170/0x3f0 [ 31.736484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.741953] kthread+0x328/0x630 [ 31.745164] ret_from_fork+0x10/0x20 [ 31.748723] [ 31.750202] The buggy address belongs to the object at ffff0008018ea000 [ 31.750202] which belongs to the cache test_cache of size 200 [ 31.762614] The buggy address is located 0 bytes inside of [ 31.762614] 200-byte region [ffff0008018ea000, ffff0008018ea0c8) [ 31.774157] [ 31.775637] The buggy address belongs to the physical page: [ 31.781193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818ea [ 31.789176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.796817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.803759] page_type: f5(slab) [ 31.806896] raw: 0bfffe0000000040 ffff0008018c37c0 dead000000000122 0000000000000000 [ 31.814615] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.822343] head: 0bfffe0000000040 ffff0008018c37c0 dead000000000122 0000000000000000 [ 31.830153] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.837965] head: 0bfffe0000000001 fffffdffe0063a81 00000000ffffffff 00000000ffffffff [ 31.845779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.853583] page dumped because: kasan: bad access detected [ 31.859140] [ 31.860613] Memory state around the buggy address: [ 31.865397] ffff0008018e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.872603] ffff0008018e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.879803] >ffff0008018ea000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.887003] ^ [ 31.890218] ffff0008018ea080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.897423] ffff0008018ea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.904626] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 19.779628] ================================================================== [ 19.794039] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 19.800371] Read of size 1 at addr ffff0008064b0000 by task kunit_try_catch/203 [ 19.807663] [ 19.809148] CPU: 2 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 19.809201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.809216] Hardware name: WinLink E850-96 board (DT) [ 19.809236] Call trace: [ 19.809251] show_stack+0x20/0x38 (C) [ 19.809286] dump_stack_lvl+0x8c/0xd0 [ 19.809322] print_report+0x118/0x608 [ 19.809351] kasan_report+0xdc/0x128 [ 19.809381] __asan_report_load1_noabort+0x20/0x30 [ 19.809417] page_alloc_uaf+0x328/0x350 [ 19.809443] kunit_try_run_case+0x170/0x3f0 [ 19.809479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.809515] kthread+0x328/0x630 [ 19.809550] ret_from_fork+0x10/0x20 [ 19.809585] [ 19.871640] The buggy address belongs to the physical page: [ 19.877195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8864b0 [ 19.885177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.891688] page_type: f0(buddy) [ 19.894913] raw: 0bfffe0000000000 ffff00087f61bbe0 ffff00087f61bbe0 0000000000000000 [ 19.902634] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 19.910352] page dumped because: kasan: bad access detected [ 19.915905] [ 19.917381] Memory state around the buggy address: [ 19.922163] ffff0008064aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.929364] ffff0008064aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.936571] >ffff0008064b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.943770] ^ [ 19.946985] ffff0008064b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.954190] ffff0008064b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.961393] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.251374] ================================================================== [ 31.260893] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.267573] Read of size 1 at addr ffff000801bc80c8 by task kunit_try_catch/256 [ 31.274864] [ 31.276349] CPU: 4 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 31.276407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.276424] Hardware name: WinLink E850-96 board (DT) [ 31.276446] Call trace: [ 31.276460] show_stack+0x20/0x38 (C) [ 31.276494] dump_stack_lvl+0x8c/0xd0 [ 31.276532] print_report+0x118/0x608 [ 31.276563] kasan_report+0xdc/0x128 [ 31.276592] __asan_report_load1_noabort+0x20/0x30 [ 31.276625] kmem_cache_oob+0x344/0x430 [ 31.276657] kunit_try_run_case+0x170/0x3f0 [ 31.276690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.276727] kthread+0x328/0x630 [ 31.276765] ret_from_fork+0x10/0x20 [ 31.276801] [ 31.338839] Allocated by task 256: [ 31.342225] kasan_save_stack+0x3c/0x68 [ 31.346041] kasan_save_track+0x20/0x40 [ 31.349861] kasan_save_alloc_info+0x40/0x58 [ 31.354115] __kasan_slab_alloc+0xa8/0xb0 [ 31.358108] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.362708] kmem_cache_oob+0x12c/0x430 [ 31.366527] kunit_try_run_case+0x170/0x3f0 [ 31.370694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.376163] kthread+0x328/0x630 [ 31.379374] ret_from_fork+0x10/0x20 [ 31.382934] [ 31.384410] The buggy address belongs to the object at ffff000801bc8000 [ 31.384410] which belongs to the cache test_cache of size 200 [ 31.396826] The buggy address is located 0 bytes to the right of [ 31.396826] allocated 200-byte region [ffff000801bc8000, ffff000801bc80c8) [ 31.409756] [ 31.411236] The buggy address belongs to the physical page: [ 31.416791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bc8 [ 31.424775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.432414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.439356] page_type: f5(slab) [ 31.442494] raw: 0bfffe0000000040 ffff000801bc6000 dead000000000122 0000000000000000 [ 31.450214] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.457940] head: 0bfffe0000000040 ffff000801bc6000 dead000000000122 0000000000000000 [ 31.465752] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.473564] head: 0bfffe0000000001 fffffdffe006f201 00000000ffffffff 00000000ffffffff [ 31.481376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.489183] page dumped because: kasan: bad access detected [ 31.494737] [ 31.496213] Memory state around the buggy address: [ 31.500995] ffff000801bc7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.508196] ffff000801bc8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.515402] >ffff000801bc8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.522602] ^ [ 31.528161] ffff000801bc8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.535366] ffff000801bc8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.542568] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 30.906460] ================================================================== [ 30.913849] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 30.920531] Read of size 8 at addr ffff000803acdd80 by task kunit_try_catch/249 [ 30.927822] [ 30.929306] CPU: 2 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 30.929363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.929383] Hardware name: WinLink E850-96 board (DT) [ 30.929406] Call trace: [ 30.929420] show_stack+0x20/0x38 (C) [ 30.929455] dump_stack_lvl+0x8c/0xd0 [ 30.929491] print_report+0x118/0x608 [ 30.929521] kasan_report+0xdc/0x128 [ 30.929550] __asan_report_load8_noabort+0x20/0x30 [ 30.929590] workqueue_uaf+0x480/0x4a8 [ 30.929624] kunit_try_run_case+0x170/0x3f0 [ 30.929661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.929697] kthread+0x328/0x630 [ 30.929733] ret_from_fork+0x10/0x20 [ 30.929767] [ 30.991709] Allocated by task 249: [ 30.995096] kasan_save_stack+0x3c/0x68 [ 30.998911] kasan_save_track+0x20/0x40 [ 31.002731] kasan_save_alloc_info+0x40/0x58 [ 31.006984] __kasan_kmalloc+0xd4/0xd8 [ 31.010718] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.015231] workqueue_uaf+0x13c/0x4a8 [ 31.018963] kunit_try_run_case+0x170/0x3f0 [ 31.023130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.028598] kthread+0x328/0x630 [ 31.031810] ret_from_fork+0x10/0x20 [ 31.035370] [ 31.036846] Freed by task 67: [ 31.039798] kasan_save_stack+0x3c/0x68 [ 31.043616] kasan_save_track+0x20/0x40 [ 31.047435] kasan_save_free_info+0x4c/0x78 [ 31.051602] __kasan_slab_free+0x6c/0x98 [ 31.055508] kfree+0x214/0x3c8 [ 31.058546] workqueue_uaf_work+0x18/0x30 [ 31.062539] process_one_work+0x530/0xf98 [ 31.066532] worker_thread+0x618/0xf38 [ 31.070266] kthread+0x328/0x630 [ 31.073476] ret_from_fork+0x10/0x20 [ 31.077035] [ 31.078512] Last potentially related work creation: [ 31.083372] kasan_save_stack+0x3c/0x68 [ 31.087191] kasan_record_aux_stack+0xb4/0xc8 [ 31.091532] __queue_work+0x65c/0x1008 [ 31.095264] queue_work_on+0xbc/0xf8 [ 31.098823] workqueue_uaf+0x210/0x4a8 [ 31.102556] kunit_try_run_case+0x170/0x3f0 [ 31.106723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.112191] kthread+0x328/0x630 [ 31.115403] ret_from_fork+0x10/0x20 [ 31.118962] [ 31.120439] The buggy address belongs to the object at ffff000803acdd80 [ 31.120439] which belongs to the cache kmalloc-32 of size 32 [ 31.132765] The buggy address is located 0 bytes inside of [ 31.132765] freed 32-byte region [ffff000803acdd80, ffff000803acdda0) [ 31.144743] [ 31.146221] The buggy address belongs to the physical page: [ 31.151777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883acd [ 31.159762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.166272] page_type: f5(slab) [ 31.169411] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 31.177127] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.184849] page dumped because: kasan: bad access detected [ 31.190401] [ 31.191877] Memory state around the buggy address: [ 31.196658] ffff000803acdc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.203860] ffff000803acdd00: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc [ 31.211066] >ffff000803acdd80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 31.218266] ^ [ 31.221483] ffff000803acde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.228686] ffff000803acde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235889] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 30.540699] ================================================================== [ 30.540878] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.541002] Read of size 4 at addr ffff00080656c280 by task swapper/1/0 [ 30.542062] [ 30.543548] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 30.543600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.543615] Hardware name: WinLink E850-96 board (DT) [ 30.543637] Call trace: [ 30.543650] show_stack+0x20/0x38 (C) [ 30.543681] dump_stack_lvl+0x8c/0xd0 [ 30.543718] print_report+0x118/0x608 [ 30.543748] kasan_report+0xdc/0x128 [ 30.543780] __asan_report_load4_noabort+0x20/0x30 [ 30.543816] rcu_uaf_reclaim+0x64/0x70 [ 30.543847] rcu_core+0x9f4/0x1e20 [ 30.543877] rcu_core_si+0x18/0x30 [ 30.543904] handle_softirqs+0x374/0xb28 [ 30.543936] __do_softirq+0x1c/0x28 [ 30.543967] ____do_softirq+0x18/0x30 [ 30.543999] call_on_irq_stack+0x24/0x30 [ 30.544027] do_softirq_own_stack+0x24/0x38 [ 30.544058] __irq_exit_rcu+0x1fc/0x318 [ 30.544088] irq_exit_rcu+0x1c/0x80 [ 30.544114] el1_interrupt+0x38/0x58 [ 30.544144] el1h_64_irq_handler+0x18/0x28 [ 30.544172] el1h_64_irq+0x6c/0x70 [ 30.544199] arch_local_irq_enable+0x4/0x8 (P) [ 30.544231] do_idle+0x384/0x4e8 [ 30.544260] cpu_startup_entry+0x64/0x80 [ 30.544288] secondary_start_kernel+0x288/0x340 [ 30.544327] __secondary_switched+0xc0/0xc8 [ 30.544367] [ 30.653257] Allocated by task 247: [ 30.656646] kasan_save_stack+0x3c/0x68 [ 30.660462] kasan_save_track+0x20/0x40 [ 30.664281] kasan_save_alloc_info+0x40/0x58 [ 30.668534] __kasan_kmalloc+0xd4/0xd8 [ 30.672267] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.676781] rcu_uaf+0xb0/0x2d8 [ 30.679906] kunit_try_run_case+0x170/0x3f0 [ 30.684073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.689543] kthread+0x328/0x630 [ 30.692753] ret_from_fork+0x10/0x20 [ 30.696312] [ 30.697789] Freed by task 0: [ 30.700655] kasan_save_stack+0x3c/0x68 [ 30.704471] kasan_save_track+0x20/0x40 [ 30.708291] kasan_save_free_info+0x4c/0x78 [ 30.712457] __kasan_slab_free+0x6c/0x98 [ 30.716365] kfree+0x214/0x3c8 [ 30.719401] rcu_uaf_reclaim+0x28/0x70 [ 30.723134] rcu_core+0x9f4/0x1e20 [ 30.726520] rcu_core_si+0x18/0x30 [ 30.729905] handle_softirqs+0x374/0xb28 [ 30.733811] __do_softirq+0x1c/0x28 [ 30.737284] [ 30.738760] Last potentially related work creation: [ 30.743620] kasan_save_stack+0x3c/0x68 [ 30.747440] kasan_record_aux_stack+0xb4/0xc8 [ 30.751780] __call_rcu_common.constprop.0+0x70/0x8b0 [ 30.756815] call_rcu+0x18/0x30 [ 30.759939] rcu_uaf+0x14c/0x2d8 [ 30.763151] kunit_try_run_case+0x170/0x3f0 [ 30.767318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.772787] kthread+0x328/0x630 [ 30.775998] ret_from_fork+0x10/0x20 [ 30.779557] [ 30.781034] The buggy address belongs to the object at ffff00080656c280 [ 30.781034] which belongs to the cache kmalloc-32 of size 32 [ 30.793363] The buggy address is located 0 bytes inside of [ 30.793363] freed 32-byte region [ffff00080656c280, ffff00080656c2a0) [ 30.805338] [ 30.806818] The buggy address belongs to the physical page: [ 30.812374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88656c [ 30.820357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.826867] page_type: f5(slab) [ 30.830007] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 30.837723] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.845443] page dumped because: kasan: bad access detected [ 30.850997] [ 30.852473] Memory state around the buggy address: [ 30.857256] ffff00080656c180: 00 00 00 06 fc fc fc fc fa fb fb fb fc fc fc fc [ 30.864456] ffff00080656c200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.871662] >ffff00080656c280: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.878861] ^ [ 30.882077] ffff00080656c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.889282] ffff00080656c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.896484] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 29.490358] ================================================================== [ 29.500231] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.506563] Read of size 1 at addr ffff0008018e7000 by task kunit_try_catch/245 [ 29.513852] [ 29.515340] CPU: 2 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 29.515395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.515410] Hardware name: WinLink E850-96 board (DT) [ 29.515431] Call trace: [ 29.515446] show_stack+0x20/0x38 (C) [ 29.515482] dump_stack_lvl+0x8c/0xd0 [ 29.515518] print_report+0x118/0x608 [ 29.515549] kasan_report+0xdc/0x128 [ 29.515581] __kasan_check_byte+0x54/0x70 [ 29.515612] ksize+0x30/0x88 [ 29.515640] ksize_uaf+0x168/0x5f8 [ 29.515671] kunit_try_run_case+0x170/0x3f0 [ 29.515711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.515747] kthread+0x328/0x630 [ 29.515780] ret_from_fork+0x10/0x20 [ 29.515815] [ 29.579477] Allocated by task 245: [ 29.582865] kasan_save_stack+0x3c/0x68 [ 29.586681] kasan_save_track+0x20/0x40 [ 29.590500] kasan_save_alloc_info+0x40/0x58 [ 29.594753] __kasan_kmalloc+0xd4/0xd8 [ 29.598486] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.603000] ksize_uaf+0xb8/0x5f8 [ 29.606298] kunit_try_run_case+0x170/0x3f0 [ 29.610465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.615934] kthread+0x328/0x630 [ 29.619145] ret_from_fork+0x10/0x20 [ 29.622705] [ 29.624181] Freed by task 245: [ 29.627218] kasan_save_stack+0x3c/0x68 [ 29.631038] kasan_save_track+0x20/0x40 [ 29.634857] kasan_save_free_info+0x4c/0x78 [ 29.639024] __kasan_slab_free+0x6c/0x98 [ 29.642930] kfree+0x214/0x3c8 [ 29.645968] ksize_uaf+0x11c/0x5f8 [ 29.649355] kunit_try_run_case+0x170/0x3f0 [ 29.653520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.658988] kthread+0x328/0x630 [ 29.662200] ret_from_fork+0x10/0x20 [ 29.665759] [ 29.667238] The buggy address belongs to the object at ffff0008018e7000 [ 29.667238] which belongs to the cache kmalloc-128 of size 128 [ 29.679738] The buggy address is located 0 bytes inside of [ 29.679738] freed 128-byte region [ffff0008018e7000, ffff0008018e7080) [ 29.691801] [ 29.693279] The buggy address belongs to the physical page: [ 29.698838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 29.706820] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.714458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.721402] page_type: f5(slab) [ 29.724540] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.732258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.739985] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.747796] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.755609] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 29.763421] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.771228] page dumped because: kasan: bad access detected [ 29.776782] [ 29.778257] Memory state around the buggy address: [ 29.783040] ffff0008018e6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.790241] ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.797447] >ffff0008018e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.804646] ^ [ 29.807862] ffff0008018e7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.815066] ffff0008018e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.822269] ================================================================== [ 29.829629] ================================================================== [ 29.836679] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.843014] Read of size 1 at addr ffff0008018e7000 by task kunit_try_catch/245 [ 29.850305] [ 29.851791] CPU: 2 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 29.851840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.851856] Hardware name: WinLink E850-96 board (DT) [ 29.851876] Call trace: [ 29.851889] show_stack+0x20/0x38 (C) [ 29.851925] dump_stack_lvl+0x8c/0xd0 [ 29.851961] print_report+0x118/0x608 [ 29.851990] kasan_report+0xdc/0x128 [ 29.852021] __asan_report_load1_noabort+0x20/0x30 [ 29.852056] ksize_uaf+0x598/0x5f8 [ 29.852087] kunit_try_run_case+0x170/0x3f0 [ 29.852121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.852157] kthread+0x328/0x630 [ 29.852190] ret_from_fork+0x10/0x20 [ 29.852222] [ 29.913846] Allocated by task 245: [ 29.917235] kasan_save_stack+0x3c/0x68 [ 29.921051] kasan_save_track+0x20/0x40 [ 29.924870] kasan_save_alloc_info+0x40/0x58 [ 29.929123] __kasan_kmalloc+0xd4/0xd8 [ 29.932856] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.937369] ksize_uaf+0xb8/0x5f8 [ 29.940667] kunit_try_run_case+0x170/0x3f0 [ 29.944835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.950304] kthread+0x328/0x630 [ 29.953515] ret_from_fork+0x10/0x20 [ 29.957075] [ 29.958550] Freed by task 245: [ 29.961588] kasan_save_stack+0x3c/0x68 [ 29.965408] kasan_save_track+0x20/0x40 [ 29.969227] kasan_save_free_info+0x4c/0x78 [ 29.973394] __kasan_slab_free+0x6c/0x98 [ 29.977300] kfree+0x214/0x3c8 [ 29.980338] ksize_uaf+0x11c/0x5f8 [ 29.983723] kunit_try_run_case+0x170/0x3f0 [ 29.987890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.993359] kthread+0x328/0x630 [ 29.996570] ret_from_fork+0x10/0x20 [ 30.000130] [ 30.001605] The buggy address belongs to the object at ffff0008018e7000 [ 30.001605] which belongs to the cache kmalloc-128 of size 128 [ 30.014106] The buggy address is located 0 bytes inside of [ 30.014106] freed 128-byte region [ffff0008018e7000, ffff0008018e7080) [ 30.026171] [ 30.027649] The buggy address belongs to the physical page: [ 30.033206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 30.041189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.048828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.055773] page_type: f5(slab) [ 30.058906] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.066628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.074354] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.082166] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.089979] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 30.097791] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.105596] page dumped because: kasan: bad access detected [ 30.111152] [ 30.112627] Memory state around the buggy address: [ 30.117409] ffff0008018e6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.124611] ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.131815] >ffff0008018e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.139016] ^ [ 30.142231] ffff0008018e7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.149436] ffff0008018e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.156638] ================================================================== [ 30.164055] ================================================================== [ 30.171055] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.177385] Read of size 1 at addr ffff0008018e7078 by task kunit_try_catch/245 [ 30.184675] [ 30.186159] CPU: 2 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 30.186208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.186225] Hardware name: WinLink E850-96 board (DT) [ 30.186245] Call trace: [ 30.186256] show_stack+0x20/0x38 (C) [ 30.186290] dump_stack_lvl+0x8c/0xd0 [ 30.186327] print_report+0x118/0x608 [ 30.186357] kasan_report+0xdc/0x128 [ 30.186386] __asan_report_load1_noabort+0x20/0x30 [ 30.186420] ksize_uaf+0x544/0x5f8 [ 30.186450] kunit_try_run_case+0x170/0x3f0 [ 30.186485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186523] kthread+0x328/0x630 [ 30.186556] ret_from_fork+0x10/0x20 [ 30.186588] [ 30.248216] Allocated by task 245: [ 30.251603] kasan_save_stack+0x3c/0x68 [ 30.255421] kasan_save_track+0x20/0x40 [ 30.259240] kasan_save_alloc_info+0x40/0x58 [ 30.263493] __kasan_kmalloc+0xd4/0xd8 [ 30.267226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.271740] ksize_uaf+0xb8/0x5f8 [ 30.275038] kunit_try_run_case+0x170/0x3f0 [ 30.279205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.284674] kthread+0x328/0x630 [ 30.287885] ret_from_fork+0x10/0x20 [ 30.291445] [ 30.292920] Freed by task 245: [ 30.295958] kasan_save_stack+0x3c/0x68 [ 30.299777] kasan_save_track+0x20/0x40 [ 30.303597] kasan_save_free_info+0x4c/0x78 [ 30.307763] __kasan_slab_free+0x6c/0x98 [ 30.311670] kfree+0x214/0x3c8 [ 30.314708] ksize_uaf+0x11c/0x5f8 [ 30.318093] kunit_try_run_case+0x170/0x3f0 [ 30.322260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.327728] kthread+0x328/0x630 [ 30.330940] ret_from_fork+0x10/0x20 [ 30.334499] [ 30.335975] The buggy address belongs to the object at ffff0008018e7000 [ 30.335975] which belongs to the cache kmalloc-128 of size 128 [ 30.348475] The buggy address is located 120 bytes inside of [ 30.348475] freed 128-byte region [ffff0008018e7000, ffff0008018e7080) [ 30.360714] [ 30.362192] The buggy address belongs to the physical page: [ 30.367750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 30.375734] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.383370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.390314] page_type: f5(slab) [ 30.393452] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.401172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.408898] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.416708] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.424523] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 30.432335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.440140] page dumped because: kasan: bad access detected [ 30.445695] [ 30.447171] Memory state around the buggy address: [ 30.451952] ffff0008018e6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.459154] ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.466359] >ffff0008018e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.473560] ^ [ 30.480681] ffff0008018e7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.487886] ffff0008018e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.495089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 29.189412] ================================================================== [ 29.196500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.203874] Read of size 1 at addr ffff000800daca7f by task kunit_try_catch/243 [ 29.211167] [ 29.212651] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 29.212700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.212712] Hardware name: WinLink E850-96 board (DT) [ 29.212732] Call trace: [ 29.212746] show_stack+0x20/0x38 (C) [ 29.212780] dump_stack_lvl+0x8c/0xd0 [ 29.212817] print_report+0x118/0x608 [ 29.212846] kasan_report+0xdc/0x128 [ 29.212875] __asan_report_load1_noabort+0x20/0x30 [ 29.212911] ksize_unpoisons_memory+0x690/0x740 [ 29.212945] kunit_try_run_case+0x170/0x3f0 [ 29.212980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.213017] kthread+0x328/0x630 [ 29.213050] ret_from_fork+0x10/0x20 [ 29.213085] [ 29.275834] Allocated by task 243: [ 29.279224] kasan_save_stack+0x3c/0x68 [ 29.283039] kasan_save_track+0x20/0x40 [ 29.286858] kasan_save_alloc_info+0x40/0x58 [ 29.291112] __kasan_kmalloc+0xd4/0xd8 [ 29.294845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.299358] ksize_unpoisons_memory+0xc0/0x740 [ 29.303785] kunit_try_run_case+0x170/0x3f0 [ 29.307952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.313424] kthread+0x328/0x630 [ 29.316633] ret_from_fork+0x10/0x20 [ 29.320191] [ 29.321667] The buggy address belongs to the object at ffff000800daca00 [ 29.321667] which belongs to the cache kmalloc-128 of size 128 [ 29.334169] The buggy address is located 12 bytes to the right of [ 29.334169] allocated 115-byte region [ffff000800daca00, ffff000800daca73) [ 29.347188] [ 29.348664] The buggy address belongs to the physical page: [ 29.354222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 29.362206] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.369845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.376790] page_type: f5(slab) [ 29.379926] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.387645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.395372] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.403183] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.410996] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 29.418808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.426613] page dumped because: kasan: bad access detected [ 29.432169] [ 29.433645] Memory state around the buggy address: [ 29.438426] ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.445628] ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.452834] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.460033] ^ [ 29.467155] ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.474360] ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.481561] ================================================================== [ 28.588260] ================================================================== [ 28.597987] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 28.605361] Read of size 1 at addr ffff000800daca73 by task kunit_try_catch/243 [ 28.612650] [ 28.614137] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 28.614193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.614209] Hardware name: WinLink E850-96 board (DT) [ 28.614231] Call trace: [ 28.614244] show_stack+0x20/0x38 (C) [ 28.614283] dump_stack_lvl+0x8c/0xd0 [ 28.614321] print_report+0x118/0x608 [ 28.614350] kasan_report+0xdc/0x128 [ 28.614380] __asan_report_load1_noabort+0x20/0x30 [ 28.614417] ksize_unpoisons_memory+0x628/0x740 [ 28.614454] kunit_try_run_case+0x170/0x3f0 [ 28.614492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.614532] kthread+0x328/0x630 [ 28.614566] ret_from_fork+0x10/0x20 [ 28.614600] [ 28.677321] Allocated by task 243: [ 28.680708] kasan_save_stack+0x3c/0x68 [ 28.684524] kasan_save_track+0x20/0x40 [ 28.688343] kasan_save_alloc_info+0x40/0x58 [ 28.692597] __kasan_kmalloc+0xd4/0xd8 [ 28.696329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.700844] ksize_unpoisons_memory+0xc0/0x740 [ 28.705270] kunit_try_run_case+0x170/0x3f0 [ 28.709437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.714907] kthread+0x328/0x630 [ 28.718117] ret_from_fork+0x10/0x20 [ 28.721676] [ 28.723154] The buggy address belongs to the object at ffff000800daca00 [ 28.723154] which belongs to the cache kmalloc-128 of size 128 [ 28.735655] The buggy address is located 0 bytes to the right of [ 28.735655] allocated 115-byte region [ffff000800daca00, ffff000800daca73) [ 28.748586] [ 28.750064] The buggy address belongs to the physical page: [ 28.755622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 28.763605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.771243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.778187] page_type: f5(slab) [ 28.781325] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.789044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.796770] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.804581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.812394] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 28.820206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.828011] page dumped because: kasan: bad access detected [ 28.833567] [ 28.835042] Memory state around the buggy address: [ 28.839826] ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.847027] ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.854232] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.861431] ^ [ 28.868292] ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.875498] ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.882701] ================================================================== [ 28.890269] ================================================================== [ 28.897113] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 28.904487] Read of size 1 at addr ffff000800daca78 by task kunit_try_catch/243 [ 28.911778] [ 28.913262] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 28.913316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.913331] Hardware name: WinLink E850-96 board (DT) [ 28.913353] Call trace: [ 28.913367] show_stack+0x20/0x38 (C) [ 28.913402] dump_stack_lvl+0x8c/0xd0 [ 28.913437] print_report+0x118/0x608 [ 28.913466] kasan_report+0xdc/0x128 [ 28.913497] __asan_report_load1_noabort+0x20/0x30 [ 28.913531] ksize_unpoisons_memory+0x618/0x740 [ 28.913566] kunit_try_run_case+0x170/0x3f0 [ 28.913603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.913639] kthread+0x328/0x630 [ 28.913676] ret_from_fork+0x10/0x20 [ 28.913710] [ 28.976447] Allocated by task 243: [ 28.979836] kasan_save_stack+0x3c/0x68 [ 28.983651] kasan_save_track+0x20/0x40 [ 28.987471] kasan_save_alloc_info+0x40/0x58 [ 28.991724] __kasan_kmalloc+0xd4/0xd8 [ 28.995457] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.999971] ksize_unpoisons_memory+0xc0/0x740 [ 29.004398] kunit_try_run_case+0x170/0x3f0 [ 29.008564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.014035] kthread+0x328/0x630 [ 29.017245] ret_from_fork+0x10/0x20 [ 29.020804] [ 29.022279] The buggy address belongs to the object at ffff000800daca00 [ 29.022279] which belongs to the cache kmalloc-128 of size 128 [ 29.034779] The buggy address is located 5 bytes to the right of [ 29.034779] allocated 115-byte region [ffff000800daca00, ffff000800daca73) [ 29.047713] [ 29.049190] The buggy address belongs to the physical page: [ 29.054748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 29.062732] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.070371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.077315] page_type: f5(slab) [ 29.080451] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.088171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.095897] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.103708] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.111522] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 29.119333] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.127139] page dumped because: kasan: bad access detected [ 29.132693] [ 29.134170] Memory state around the buggy address: [ 29.138952] ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.146153] ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.153359] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.160559] ^ [ 29.167681] ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.174885] ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.182086] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 28.274296] ================================================================== [ 28.281323] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 28.287308] Free of addr ffff000800cad020 by task kunit_try_catch/241 [ 28.293731] [ 28.295217] CPU: 6 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 28.295271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.295289] Hardware name: WinLink E850-96 board (DT) [ 28.295307] Call trace: [ 28.295318] show_stack+0x20/0x38 (C) [ 28.295352] dump_stack_lvl+0x8c/0xd0 [ 28.295388] print_report+0x118/0x608 [ 28.295418] kasan_report_invalid_free+0xc0/0xe8 [ 28.295450] check_slab_allocation+0xd4/0x108 [ 28.295479] __kasan_slab_pre_free+0x2c/0x48 [ 28.295509] kfree+0xe8/0x3c8 [ 28.295535] kfree_sensitive+0x3c/0xb0 [ 28.295562] kmalloc_double_kzfree+0x168/0x308 [ 28.295598] kunit_try_run_case+0x170/0x3f0 [ 28.295635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.295671] kthread+0x328/0x630 [ 28.295702] ret_from_fork+0x10/0x20 [ 28.295733] [ 28.369860] Allocated by task 241: [ 28.373246] kasan_save_stack+0x3c/0x68 [ 28.377063] kasan_save_track+0x20/0x40 [ 28.380883] kasan_save_alloc_info+0x40/0x58 [ 28.385136] __kasan_kmalloc+0xd4/0xd8 [ 28.388869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.393383] kmalloc_double_kzfree+0xb8/0x308 [ 28.397723] kunit_try_run_case+0x170/0x3f0 [ 28.401890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.407358] kthread+0x328/0x630 [ 28.410570] ret_from_fork+0x10/0x20 [ 28.414129] [ 28.415605] Freed by task 241: [ 28.418644] kasan_save_stack+0x3c/0x68 [ 28.422462] kasan_save_track+0x20/0x40 [ 28.426281] kasan_save_free_info+0x4c/0x78 [ 28.430448] __kasan_slab_free+0x6c/0x98 [ 28.434354] kfree+0x214/0x3c8 [ 28.437392] kfree_sensitive+0x80/0xb0 [ 28.441125] kmalloc_double_kzfree+0x11c/0x308 [ 28.445552] kunit_try_run_case+0x170/0x3f0 [ 28.449719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.455187] kthread+0x328/0x630 [ 28.458399] ret_from_fork+0x10/0x20 [ 28.461958] [ 28.463435] The buggy address belongs to the object at ffff000800cad020 [ 28.463435] which belongs to the cache kmalloc-16 of size 16 [ 28.475760] The buggy address is located 0 bytes inside of [ 28.475760] 16-byte region [ffff000800cad020, ffff000800cad030) [ 28.487218] [ 28.488695] The buggy address belongs to the physical page: [ 28.494253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cad [ 28.502235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.508747] page_type: f5(slab) [ 28.511883] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 28.519603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.527322] page dumped because: kasan: bad access detected [ 28.532877] [ 28.534352] Memory state around the buggy address: [ 28.539134] ffff000800cacf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.546336] ffff000800cacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.553542] >ffff000800cad000: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 28.560741] ^ [ 28.564999] ffff000800cad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.572203] ffff000800cad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.579406] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 27.960873] ================================================================== [ 27.974646] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 27.982018] Read of size 1 at addr ffff000800cad020 by task kunit_try_catch/241 [ 27.989309] [ 27.990796] CPU: 6 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 27.990850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.990870] Hardware name: WinLink E850-96 board (DT) [ 27.990894] Call trace: [ 27.990906] show_stack+0x20/0x38 (C) [ 27.990943] dump_stack_lvl+0x8c/0xd0 [ 27.990979] print_report+0x118/0x608 [ 27.991009] kasan_report+0xdc/0x128 [ 27.991037] __kasan_check_byte+0x54/0x70 [ 27.991066] kfree_sensitive+0x30/0xb0 [ 27.991097] kmalloc_double_kzfree+0x168/0x308 [ 27.991134] kunit_try_run_case+0x170/0x3f0 [ 27.991172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.991210] kthread+0x328/0x630 [ 27.991244] ret_from_fork+0x10/0x20 [ 27.991278] [ 28.056844] Allocated by task 241: [ 28.060231] kasan_save_stack+0x3c/0x68 [ 28.064047] kasan_save_track+0x20/0x40 [ 28.067867] kasan_save_alloc_info+0x40/0x58 [ 28.072120] __kasan_kmalloc+0xd4/0xd8 [ 28.075852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.080366] kmalloc_double_kzfree+0xb8/0x308 [ 28.084708] kunit_try_run_case+0x170/0x3f0 [ 28.088873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.094342] kthread+0x328/0x630 [ 28.097553] ret_from_fork+0x10/0x20 [ 28.101113] [ 28.102590] Freed by task 241: [ 28.105628] kasan_save_stack+0x3c/0x68 [ 28.109446] kasan_save_track+0x20/0x40 [ 28.113265] kasan_save_free_info+0x4c/0x78 [ 28.117432] __kasan_slab_free+0x6c/0x98 [ 28.121338] kfree+0x214/0x3c8 [ 28.124376] kfree_sensitive+0x80/0xb0 [ 28.128109] kmalloc_double_kzfree+0x11c/0x308 [ 28.132536] kunit_try_run_case+0x170/0x3f0 [ 28.136704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.142171] kthread+0x328/0x630 [ 28.145383] ret_from_fork+0x10/0x20 [ 28.148942] [ 28.150419] The buggy address belongs to the object at ffff000800cad020 [ 28.150419] which belongs to the cache kmalloc-16 of size 16 [ 28.162747] The buggy address is located 0 bytes inside of [ 28.162747] freed 16-byte region [ffff000800cad020, ffff000800cad030) [ 28.174722] [ 28.176201] The buggy address belongs to the physical page: [ 28.181758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cad [ 28.189743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.196251] page_type: f5(slab) [ 28.199390] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 28.207107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.214827] page dumped because: kasan: bad access detected [ 28.220381] [ 28.221857] Memory state around the buggy address: [ 28.226640] ffff000800cacf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.233840] ffff000800cacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.241047] >ffff000800cad000: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 28.248246] ^ [ 28.252503] ffff000800cad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.259708] ffff000800cad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.266911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 19.544345] ================================================================== [ 19.553761] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 19.559143] Free of addr ffff000806088001 by task kunit_try_catch/199 [ 19.565564] [ 19.567050] CPU: 2 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 19.567102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.567120] Hardware name: WinLink E850-96 board (DT) [ 19.567142] Call trace: [ 19.567155] show_stack+0x20/0x38 (C) [ 19.567189] dump_stack_lvl+0x8c/0xd0 [ 19.567225] print_report+0x118/0x608 [ 19.567255] kasan_report_invalid_free+0xc0/0xe8 [ 19.567286] __kasan_kfree_large+0x5c/0xa8 [ 19.567316] free_large_kmalloc+0x64/0x190 [ 19.567354] kfree+0x270/0x3c8 [ 19.567376] kmalloc_large_invalid_free+0x108/0x270 [ 19.567413] kunit_try_run_case+0x170/0x3f0 [ 19.567449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.567486] kthread+0x328/0x630 [ 19.567519] ret_from_fork+0x10/0x20 [ 19.567553] [ 19.638047] The buggy address belongs to the physical page: [ 19.643605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886088 [ 19.651589] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.659227] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.666170] page_type: f8(unknown) [ 19.669571] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.677288] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.685015] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.692825] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.700638] head: 0bfffe0000000002 fffffdffe0182201 00000000ffffffff 00000000ffffffff [ 19.708450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.716259] page dumped because: kasan: bad access detected [ 19.721811] [ 19.723287] Memory state around the buggy address: [ 19.728068] ffff000806087f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.735272] ffff000806087f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.742479] >ffff000806088000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.749676] ^ [ 19.752891] ffff000806088080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.760096] ffff000806088100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.767298] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 27.657561] ================================================================== [ 27.666837] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 27.673432] Read of size 1 at addr ffff00080656b028 by task kunit_try_catch/237 [ 27.680720] [ 27.682207] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 27.682263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.682280] Hardware name: WinLink E850-96 board (DT) [ 27.682302] Call trace: [ 27.682314] show_stack+0x20/0x38 (C) [ 27.682352] dump_stack_lvl+0x8c/0xd0 [ 27.682389] print_report+0x118/0x608 [ 27.682421] kasan_report+0xdc/0x128 [ 27.682452] __asan_report_load1_noabort+0x20/0x30 [ 27.682490] kmalloc_uaf2+0x3f4/0x468 [ 27.682520] kunit_try_run_case+0x170/0x3f0 [ 27.682554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.682594] kthread+0x328/0x630 [ 27.682630] ret_from_fork+0x10/0x20 [ 27.682665] [ 27.744522] Allocated by task 237: [ 27.747909] kasan_save_stack+0x3c/0x68 [ 27.751725] kasan_save_track+0x20/0x40 [ 27.755545] kasan_save_alloc_info+0x40/0x58 [ 27.759798] __kasan_kmalloc+0xd4/0xd8 [ 27.763531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.768045] kmalloc_uaf2+0xc4/0x468 [ 27.771605] kunit_try_run_case+0x170/0x3f0 [ 27.775770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.781239] kthread+0x328/0x630 [ 27.784451] ret_from_fork+0x10/0x20 [ 27.788010] [ 27.789487] Freed by task 237: [ 27.792524] kasan_save_stack+0x3c/0x68 [ 27.796343] kasan_save_track+0x20/0x40 [ 27.800163] kasan_save_free_info+0x4c/0x78 [ 27.804329] __kasan_slab_free+0x6c/0x98 [ 27.808235] kfree+0x214/0x3c8 [ 27.811273] kmalloc_uaf2+0x134/0x468 [ 27.814919] kunit_try_run_case+0x170/0x3f0 [ 27.819087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.824554] kthread+0x328/0x630 [ 27.827766] ret_from_fork+0x10/0x20 [ 27.831325] [ 27.832802] The buggy address belongs to the object at ffff00080656b000 [ 27.832802] which belongs to the cache kmalloc-64 of size 64 [ 27.845130] The buggy address is located 40 bytes inside of [ 27.845130] freed 64-byte region [ffff00080656b000, ffff00080656b040) [ 27.857193] [ 27.858673] The buggy address belongs to the physical page: [ 27.864228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88656b [ 27.872211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.878722] page_type: f5(slab) [ 27.881859] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 27.889578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.897299] page dumped because: kasan: bad access detected [ 27.902852] [ 27.904327] Memory state around the buggy address: [ 27.909109] ffff00080656af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.916311] ffff00080656af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.923519] >ffff00080656b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.930716] ^ [ 27.935234] ffff00080656b080: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 27.942438] ffff00080656b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.949641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 27.353328] ================================================================== [ 27.361981] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 27.369094] Write of size 33 at addr ffff000803afaa80 by task kunit_try_catch/235 [ 27.376559] [ 27.378043] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 27.378096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.378114] Hardware name: WinLink E850-96 board (DT) [ 27.378136] Call trace: [ 27.378151] show_stack+0x20/0x38 (C) [ 27.378185] dump_stack_lvl+0x8c/0xd0 [ 27.378225] print_report+0x118/0x608 [ 27.378257] kasan_report+0xdc/0x128 [ 27.378288] kasan_check_range+0x100/0x1a8 [ 27.378321] __asan_memset+0x34/0x78 [ 27.378353] kmalloc_uaf_memset+0x170/0x310 [ 27.378385] kunit_try_run_case+0x170/0x3f0 [ 27.378421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.378460] kthread+0x328/0x630 [ 27.378495] ret_from_fork+0x10/0x20 [ 27.378529] [ 27.443744] Allocated by task 235: [ 27.447133] kasan_save_stack+0x3c/0x68 [ 27.450949] kasan_save_track+0x20/0x40 [ 27.454769] kasan_save_alloc_info+0x40/0x58 [ 27.459022] __kasan_kmalloc+0xd4/0xd8 [ 27.462754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.467268] kmalloc_uaf_memset+0xb8/0x310 [ 27.471348] kunit_try_run_case+0x170/0x3f0 [ 27.475514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.480983] kthread+0x328/0x630 [ 27.484195] ret_from_fork+0x10/0x20 [ 27.487754] [ 27.489231] Freed by task 235: [ 27.492268] kasan_save_stack+0x3c/0x68 [ 27.496087] kasan_save_track+0x20/0x40 [ 27.499907] kasan_save_free_info+0x4c/0x78 [ 27.504073] __kasan_slab_free+0x6c/0x98 [ 27.507979] kfree+0x214/0x3c8 [ 27.511017] kmalloc_uaf_memset+0x11c/0x310 [ 27.515184] kunit_try_run_case+0x170/0x3f0 [ 27.519351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.524819] kthread+0x328/0x630 [ 27.528031] ret_from_fork+0x10/0x20 [ 27.531590] [ 27.533067] The buggy address belongs to the object at ffff000803afaa80 [ 27.533067] which belongs to the cache kmalloc-64 of size 64 [ 27.545396] The buggy address is located 0 bytes inside of [ 27.545396] freed 64-byte region [ffff000803afaa80, ffff000803afaac0) [ 27.557371] [ 27.558849] The buggy address belongs to the physical page: [ 27.564407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 27.572390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.578900] page_type: f5(slab) [ 27.582039] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 27.589756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.597474] page dumped because: kasan: bad access detected [ 27.603030] [ 27.604505] Memory state around the buggy address: [ 27.609287] ffff000803afa980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.616490] ffff000803afaa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.623695] >ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.630894] ^ [ 27.634110] ffff000803afab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.641314] ffff000803afab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.648517] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 27.051706] ================================================================== [ 27.061901] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 27.068406] Read of size 1 at addr ffff000804354aa8 by task kunit_try_catch/233 [ 27.075694] [ 27.077182] CPU: 3 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 27.077237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.077253] Hardware name: WinLink E850-96 board (DT) [ 27.077275] Call trace: [ 27.077289] show_stack+0x20/0x38 (C) [ 27.077326] dump_stack_lvl+0x8c/0xd0 [ 27.077366] print_report+0x118/0x608 [ 27.077398] kasan_report+0xdc/0x128 [ 27.077429] __asan_report_load1_noabort+0x20/0x30 [ 27.077465] kmalloc_uaf+0x300/0x338 [ 27.077498] kunit_try_run_case+0x170/0x3f0 [ 27.077534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.077573] kthread+0x328/0x630 [ 27.077607] ret_from_fork+0x10/0x20 [ 27.077643] [ 27.139411] Allocated by task 233: [ 27.142796] kasan_save_stack+0x3c/0x68 [ 27.146613] kasan_save_track+0x20/0x40 [ 27.150433] kasan_save_alloc_info+0x40/0x58 [ 27.154686] __kasan_kmalloc+0xd4/0xd8 [ 27.158418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.162932] kmalloc_uaf+0xb8/0x338 [ 27.166404] kunit_try_run_case+0x170/0x3f0 [ 27.170571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.176040] kthread+0x328/0x630 [ 27.179252] ret_from_fork+0x10/0x20 [ 27.182810] [ 27.184288] Freed by task 233: [ 27.187326] kasan_save_stack+0x3c/0x68 [ 27.191144] kasan_save_track+0x20/0x40 [ 27.194963] kasan_save_free_info+0x4c/0x78 [ 27.199130] __kasan_slab_free+0x6c/0x98 [ 27.203036] kfree+0x214/0x3c8 [ 27.206074] kmalloc_uaf+0x11c/0x338 [ 27.209633] kunit_try_run_case+0x170/0x3f0 [ 27.213799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.219270] kthread+0x328/0x630 [ 27.222480] ret_from_fork+0x10/0x20 [ 27.226039] [ 27.227517] The buggy address belongs to the object at ffff000804354aa0 [ 27.227517] which belongs to the cache kmalloc-16 of size 16 [ 27.239845] The buggy address is located 8 bytes inside of [ 27.239845] freed 16-byte region [ffff000804354aa0, ffff000804354ab0) [ 27.251820] [ 27.253299] The buggy address belongs to the physical page: [ 27.258857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884354 [ 27.266839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.273349] page_type: f5(slab) [ 27.276487] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 27.284205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.291926] page dumped because: kasan: bad access detected [ 27.297479] [ 27.298954] Memory state around the buggy address: [ 27.303736] ffff000804354980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.310939] ffff000804354a00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.318145] >ffff000804354a80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 27.325343] ^ [ 27.329861] ffff000804354b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.337066] ffff000804354b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.344268] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 26.784517] ================================================================== [ 26.795062] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.802958] Read of size 64 at addr ffff000803afaa04 by task kunit_try_catch/231 [ 26.810335] [ 26.811821] CPU: 2 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 26.811877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.811895] Hardware name: WinLink E850-96 board (DT) [ 26.811917] Call trace: [ 26.811929] show_stack+0x20/0x38 (C) [ 26.811965] dump_stack_lvl+0x8c/0xd0 [ 26.811999] print_report+0x118/0x608 [ 26.812033] kasan_report+0xdc/0x128 [ 26.812063] kasan_check_range+0x100/0x1a8 [ 26.812096] __asan_memmove+0x3c/0x98 [ 26.812126] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.812161] kunit_try_run_case+0x170/0x3f0 [ 26.812196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.812235] kthread+0x328/0x630 [ 26.812268] ret_from_fork+0x10/0x20 [ 26.812301] [ 26.878475] Allocated by task 231: [ 26.881864] kasan_save_stack+0x3c/0x68 [ 26.885679] kasan_save_track+0x20/0x40 [ 26.889500] kasan_save_alloc_info+0x40/0x58 [ 26.893752] __kasan_kmalloc+0xd4/0xd8 [ 26.897485] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.902000] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 26.906947] kunit_try_run_case+0x170/0x3f0 [ 26.911113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.916582] kthread+0x328/0x630 [ 26.919794] ret_from_fork+0x10/0x20 [ 26.923353] [ 26.924830] The buggy address belongs to the object at ffff000803afaa00 [ 26.924830] which belongs to the cache kmalloc-64 of size 64 [ 26.937158] The buggy address is located 4 bytes inside of [ 26.937158] allocated 64-byte region [ffff000803afaa00, ffff000803afaa40) [ 26.949481] [ 26.950959] The buggy address belongs to the physical page: [ 26.956517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 26.964500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.971010] page_type: f5(slab) [ 26.974148] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 26.981867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.989586] page dumped because: kasan: bad access detected [ 26.995140] [ 26.996615] Memory state around the buggy address: [ 27.001397] ffff000803afa900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.008598] ffff000803afa980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.015804] >ffff000803afaa00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 27.023004] ^ [ 27.028303] ffff000803afaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.035507] ffff000803afab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.042710] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 26.520076] ================================================================== [ 26.529700] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.537249] Read of size 18446744073709551614 at addr ffff0008049a1484 by task kunit_try_catch/229 [ 26.546191] [ 26.547676] CPU: 3 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 26.547733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.547750] Hardware name: WinLink E850-96 board (DT) [ 26.547772] Call trace: [ 26.547786] show_stack+0x20/0x38 (C) [ 26.547822] dump_stack_lvl+0x8c/0xd0 [ 26.547862] print_report+0x118/0x608 [ 26.547896] kasan_report+0xdc/0x128 [ 26.547925] kasan_check_range+0x100/0x1a8 [ 26.547957] __asan_memmove+0x3c/0x98 [ 26.547988] kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.548022] kunit_try_run_case+0x170/0x3f0 [ 26.548060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.548099] kthread+0x328/0x630 [ 26.548135] ret_from_fork+0x10/0x20 [ 26.548172] [ 26.614418] Allocated by task 229: [ 26.617806] kasan_save_stack+0x3c/0x68 [ 26.621621] kasan_save_track+0x20/0x40 [ 26.625441] kasan_save_alloc_info+0x40/0x58 [ 26.629694] __kasan_kmalloc+0xd4/0xd8 [ 26.633426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.637940] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 26.642976] kunit_try_run_case+0x170/0x3f0 [ 26.647141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.652610] kthread+0x328/0x630 [ 26.655822] ret_from_fork+0x10/0x20 [ 26.659381] [ 26.660859] The buggy address belongs to the object at ffff0008049a1480 [ 26.660859] which belongs to the cache kmalloc-64 of size 64 [ 26.673187] The buggy address is located 4 bytes inside of [ 26.673187] 64-byte region [ffff0008049a1480, ffff0008049a14c0) [ 26.684641] [ 26.686119] The buggy address belongs to the physical page: [ 26.691676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8849a1 [ 26.699660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.706170] page_type: f5(slab) [ 26.709308] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 26.717026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.724747] page dumped because: kasan: bad access detected [ 26.730300] [ 26.731775] Memory state around the buggy address: [ 26.736556] ffff0008049a1380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.743760] ffff0008049a1400: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 26.750966] >ffff0008049a1480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.758164] ^ [ 26.761380] ffff0008049a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.768584] ffff0008049a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.775787] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 26.214230] ================================================================== [ 26.223717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 26.231004] Write of size 16 at addr ffff0008018e6f69 by task kunit_try_catch/227 [ 26.238469] [ 26.239955] CPU: 2 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 26.240010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.240029] Hardware name: WinLink E850-96 board (DT) [ 26.240051] Call trace: [ 26.240064] show_stack+0x20/0x38 (C) [ 26.240096] dump_stack_lvl+0x8c/0xd0 [ 26.240132] print_report+0x118/0x608 [ 26.240159] kasan_report+0xdc/0x128 [ 26.240188] kasan_check_range+0x100/0x1a8 [ 26.240219] __asan_memset+0x34/0x78 [ 26.240249] kmalloc_oob_memset_16+0x150/0x2f8 [ 26.240282] kunit_try_run_case+0x170/0x3f0 [ 26.240318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.240358] kthread+0x328/0x630 [ 26.240391] ret_from_fork+0x10/0x20 [ 26.240422] [ 26.305914] Allocated by task 227: [ 26.309303] kasan_save_stack+0x3c/0x68 [ 26.313118] kasan_save_track+0x20/0x40 [ 26.316940] kasan_save_alloc_info+0x40/0x58 [ 26.321191] __kasan_kmalloc+0xd4/0xd8 [ 26.324924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.329438] kmalloc_oob_memset_16+0xb0/0x2f8 [ 26.333778] kunit_try_run_case+0x170/0x3f0 [ 26.337945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.343414] kthread+0x328/0x630 [ 26.346625] ret_from_fork+0x10/0x20 [ 26.350184] [ 26.351661] The buggy address belongs to the object at ffff0008018e6f00 [ 26.351661] which belongs to the cache kmalloc-128 of size 128 [ 26.364163] The buggy address is located 105 bytes inside of [ 26.364163] allocated 120-byte region [ffff0008018e6f00, ffff0008018e6f78) [ 26.376746] [ 26.378226] The buggy address belongs to the physical page: [ 26.383781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 26.391765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.399404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.406348] page_type: f5(slab) [ 26.409485] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.417204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.424930] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.432742] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.440555] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 26.448366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.456175] page dumped because: kasan: bad access detected [ 26.461727] [ 26.463203] Memory state around the buggy address: [ 26.467984] ffff0008018e6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.475186] ffff0008018e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.482393] >ffff0008018e6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.489592] ^ [ 26.496713] ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.503920] ffff0008018e7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.511121] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 25.908714] ================================================================== [ 25.918168] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 25.925364] Write of size 8 at addr ffff000801a3d671 by task kunit_try_catch/225 [ 25.932743] [ 25.934229] CPU: 3 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 25.934282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.934297] Hardware name: WinLink E850-96 board (DT) [ 25.934320] Call trace: [ 25.934332] show_stack+0x20/0x38 (C) [ 25.934366] dump_stack_lvl+0x8c/0xd0 [ 25.934404] print_report+0x118/0x608 [ 25.934435] kasan_report+0xdc/0x128 [ 25.934463] kasan_check_range+0x100/0x1a8 [ 25.934494] __asan_memset+0x34/0x78 [ 25.934524] kmalloc_oob_memset_8+0x150/0x2f8 [ 25.934559] kunit_try_run_case+0x170/0x3f0 [ 25.934596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.934634] kthread+0x328/0x630 [ 25.934669] ret_from_fork+0x10/0x20 [ 25.934704] [ 26.000103] Allocated by task 225: [ 26.003492] kasan_save_stack+0x3c/0x68 [ 26.007309] kasan_save_track+0x20/0x40 [ 26.011127] kasan_save_alloc_info+0x40/0x58 [ 26.015380] __kasan_kmalloc+0xd4/0xd8 [ 26.019113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.023627] kmalloc_oob_memset_8+0xb0/0x2f8 [ 26.027881] kunit_try_run_case+0x170/0x3f0 [ 26.032047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.037515] kthread+0x328/0x630 [ 26.040727] ret_from_fork+0x10/0x20 [ 26.044286] [ 26.045763] The buggy address belongs to the object at ffff000801a3d600 [ 26.045763] which belongs to the cache kmalloc-128 of size 128 [ 26.058265] The buggy address is located 113 bytes inside of [ 26.058265] allocated 120-byte region [ffff000801a3d600, ffff000801a3d678) [ 26.070848] [ 26.072326] The buggy address belongs to the physical page: [ 26.077884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881a3c [ 26.085868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.093506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.100450] page_type: f5(slab) [ 26.103587] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.111306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.119033] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.126843] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.134656] head: 0bfffe0000000001 fffffdffe0068f01 00000000ffffffff 00000000ffffffff [ 26.142468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.150274] page dumped because: kasan: bad access detected [ 26.155829] [ 26.157304] Memory state around the buggy address: [ 26.162086] ffff000801a3d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.169288] ffff000801a3d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.176496] >ffff000801a3d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.183694] ^ [ 26.190815] ffff000801a3d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.198020] ffff000801a3d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.205223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 25.602835] ================================================================== [ 25.612612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 25.619815] Write of size 4 at addr ffff0008018e6e75 by task kunit_try_catch/223 [ 25.627192] [ 25.628677] CPU: 2 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 25.628726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.628743] Hardware name: WinLink E850-96 board (DT) [ 25.628764] Call trace: [ 25.628779] show_stack+0x20/0x38 (C) [ 25.628812] dump_stack_lvl+0x8c/0xd0 [ 25.628847] print_report+0x118/0x608 [ 25.628878] kasan_report+0xdc/0x128 [ 25.628906] kasan_check_range+0x100/0x1a8 [ 25.628937] __asan_memset+0x34/0x78 [ 25.628966] kmalloc_oob_memset_4+0x150/0x300 [ 25.628997] kunit_try_run_case+0x170/0x3f0 [ 25.629034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.629070] kthread+0x328/0x630 [ 25.629105] ret_from_fork+0x10/0x20 [ 25.629138] [ 25.694552] Allocated by task 223: [ 25.697941] kasan_save_stack+0x3c/0x68 [ 25.701756] kasan_save_track+0x20/0x40 [ 25.705576] kasan_save_alloc_info+0x40/0x58 [ 25.709829] __kasan_kmalloc+0xd4/0xd8 [ 25.713562] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.718076] kmalloc_oob_memset_4+0xb0/0x300 [ 25.722329] kunit_try_run_case+0x170/0x3f0 [ 25.726496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.731964] kthread+0x328/0x630 [ 25.735176] ret_from_fork+0x10/0x20 [ 25.738735] [ 25.740213] The buggy address belongs to the object at ffff0008018e6e00 [ 25.740213] which belongs to the cache kmalloc-128 of size 128 [ 25.752714] The buggy address is located 117 bytes inside of [ 25.752714] allocated 120-byte region [ffff0008018e6e00, ffff0008018e6e78) [ 25.765297] [ 25.766776] The buggy address belongs to the physical page: [ 25.772333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 25.780317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.787955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.794899] page_type: f5(slab) [ 25.798034] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.805755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.813481] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.821293] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.829106] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 25.836921] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.844723] page dumped because: kasan: bad access detected [ 25.850278] [ 25.851754] Memory state around the buggy address: [ 25.856533] ffff0008018e6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.863737] ffff0008018e6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.870943] >ffff0008018e6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.878143] ^ [ 25.885264] ffff0008018e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.892469] ffff0008018e6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.899672] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 25.297536] ================================================================== [ 25.307065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 25.314264] Write of size 2 at addr ffff000801a3d577 by task kunit_try_catch/221 [ 25.321642] [ 25.323129] CPU: 3 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 25.323182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.323199] Hardware name: WinLink E850-96 board (DT) [ 25.323220] Call trace: [ 25.323233] show_stack+0x20/0x38 (C) [ 25.323265] dump_stack_lvl+0x8c/0xd0 [ 25.323304] print_report+0x118/0x608 [ 25.323335] kasan_report+0xdc/0x128 [ 25.323364] kasan_check_range+0x100/0x1a8 [ 25.323395] __asan_memset+0x34/0x78 [ 25.323422] kmalloc_oob_memset_2+0x150/0x2f8 [ 25.323457] kunit_try_run_case+0x170/0x3f0 [ 25.323493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.323530] kthread+0x328/0x630 [ 25.323564] ret_from_fork+0x10/0x20 [ 25.323599] [ 25.389002] Allocated by task 221: [ 25.392390] kasan_save_stack+0x3c/0x68 [ 25.396205] kasan_save_track+0x20/0x40 [ 25.400025] kasan_save_alloc_info+0x40/0x58 [ 25.404278] __kasan_kmalloc+0xd4/0xd8 [ 25.408011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.412524] kmalloc_oob_memset_2+0xb0/0x2f8 [ 25.416779] kunit_try_run_case+0x170/0x3f0 [ 25.420945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.426413] kthread+0x328/0x630 [ 25.429625] ret_from_fork+0x10/0x20 [ 25.433184] [ 25.434661] The buggy address belongs to the object at ffff000801a3d500 [ 25.434661] which belongs to the cache kmalloc-128 of size 128 [ 25.447163] The buggy address is located 119 bytes inside of [ 25.447163] allocated 120-byte region [ffff000801a3d500, ffff000801a3d578) [ 25.459746] [ 25.461224] The buggy address belongs to the physical page: [ 25.466782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881a3c [ 25.474765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.482404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.489348] page_type: f5(slab) [ 25.492485] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.500204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.507930] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.515741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.523554] head: 0bfffe0000000001 fffffdffe0068f01 00000000ffffffff 00000000ffffffff [ 25.531366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.539175] page dumped because: kasan: bad access detected [ 25.544727] [ 25.546203] Memory state around the buggy address: [ 25.550986] ffff000801a3d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.558186] ffff000801a3d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.565392] >ffff000801a3d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.572592] ^ [ 25.579713] ffff000801a3d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.586920] ffff000801a3d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.594121] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 24.992063] ================================================================== [ 25.001164] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 25.008452] Write of size 128 at addr ffff0008018e6d00 by task kunit_try_catch/219 [ 25.016003] [ 25.017488] CPU: 2 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 25.017540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.017556] Hardware name: WinLink E850-96 board (DT) [ 25.017577] Call trace: [ 25.017591] show_stack+0x20/0x38 (C) [ 25.017626] dump_stack_lvl+0x8c/0xd0 [ 25.017666] print_report+0x118/0x608 [ 25.017697] kasan_report+0xdc/0x128 [ 25.017727] kasan_check_range+0x100/0x1a8 [ 25.017759] __asan_memset+0x34/0x78 [ 25.017789] kmalloc_oob_in_memset+0x144/0x2d0 [ 25.017822] kunit_try_run_case+0x170/0x3f0 [ 25.017857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.017893] kthread+0x328/0x630 [ 25.017929] ret_from_fork+0x10/0x20 [ 25.017963] [ 25.083450] Allocated by task 219: [ 25.086839] kasan_save_stack+0x3c/0x68 [ 25.090654] kasan_save_track+0x20/0x40 [ 25.094475] kasan_save_alloc_info+0x40/0x58 [ 25.098729] __kasan_kmalloc+0xd4/0xd8 [ 25.102460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.106974] kmalloc_oob_in_memset+0xb0/0x2d0 [ 25.111314] kunit_try_run_case+0x170/0x3f0 [ 25.115480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.120949] kthread+0x328/0x630 [ 25.124160] ret_from_fork+0x10/0x20 [ 25.127720] [ 25.129198] The buggy address belongs to the object at ffff0008018e6d00 [ 25.129198] which belongs to the cache kmalloc-128 of size 128 [ 25.141699] The buggy address is located 0 bytes inside of [ 25.141699] allocated 120-byte region [ffff0008018e6d00, ffff0008018e6d78) [ 25.154108] [ 25.155588] The buggy address belongs to the physical page: [ 25.161144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 25.169128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.176766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.183710] page_type: f5(slab) [ 25.186848] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.194566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.202292] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.210104] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.217916] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 25.225729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.233536] page dumped because: kasan: bad access detected [ 25.239089] [ 25.240565] Memory state around the buggy address: [ 25.245347] ffff0008018e6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.252548] ffff0008018e6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.259754] >ffff0008018e6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.266954] ^ [ 25.274075] ffff0008018e6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.281282] ffff0008018e6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.288483] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 24.689640] ================================================================== [ 24.698738] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.705505] Read of size 16 at addr ffff000801716f40 by task kunit_try_catch/217 [ 24.712884] [ 24.714369] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 24.714424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.714440] Hardware name: WinLink E850-96 board (DT) [ 24.714462] Call trace: [ 24.714476] show_stack+0x20/0x38 (C) [ 24.714510] dump_stack_lvl+0x8c/0xd0 [ 24.714546] print_report+0x118/0x608 [ 24.714577] kasan_report+0xdc/0x128 [ 24.714606] __asan_report_load16_noabort+0x20/0x30 [ 24.714642] kmalloc_uaf_16+0x3bc/0x438 [ 24.714672] kunit_try_run_case+0x170/0x3f0 [ 24.714707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.714744] kthread+0x328/0x630 [ 24.714779] ret_from_fork+0x10/0x20 [ 24.714813] [ 24.776944] Allocated by task 217: [ 24.780333] kasan_save_stack+0x3c/0x68 [ 24.784148] kasan_save_track+0x20/0x40 [ 24.787968] kasan_save_alloc_info+0x40/0x58 [ 24.792221] __kasan_kmalloc+0xd4/0xd8 [ 24.795955] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.800468] kmalloc_uaf_16+0x140/0x438 [ 24.804287] kunit_try_run_case+0x170/0x3f0 [ 24.808454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.813923] kthread+0x328/0x630 [ 24.817135] ret_from_fork+0x10/0x20 [ 24.820693] [ 24.822170] Freed by task 217: [ 24.825208] kasan_save_stack+0x3c/0x68 [ 24.829026] kasan_save_track+0x20/0x40 [ 24.832846] kasan_save_free_info+0x4c/0x78 [ 24.837012] __kasan_slab_free+0x6c/0x98 [ 24.840918] kfree+0x214/0x3c8 [ 24.843957] kmalloc_uaf_16+0x190/0x438 [ 24.847778] kunit_try_run_case+0x170/0x3f0 [ 24.851942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.857411] kthread+0x328/0x630 [ 24.860623] ret_from_fork+0x10/0x20 [ 24.864182] [ 24.865660] The buggy address belongs to the object at ffff000801716f40 [ 24.865660] which belongs to the cache kmalloc-16 of size 16 [ 24.877988] The buggy address is located 0 bytes inside of [ 24.877988] freed 16-byte region [ffff000801716f40, ffff000801716f50) [ 24.889963] [ 24.891441] The buggy address belongs to the physical page: [ 24.896999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881716 [ 24.904983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.911492] page_type: f5(slab) [ 24.914630] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 24.922348] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.930068] page dumped because: kasan: bad access detected [ 24.935622] [ 24.937097] Memory state around the buggy address: [ 24.941881] ffff000801716e00: 00 02 fc fc 00 06 fc fc 00 06 fc fc 00 04 fc fc [ 24.949080] ffff000801716e80: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 24.956287] >ffff000801716f00: 00 04 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 24.963486] ^ [ 24.968785] ffff000801716f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.975991] ffff000801717000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.983192] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 24.429170] ================================================================== [ 24.438153] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 24.444832] Write of size 16 at addr ffff000804354a60 by task kunit_try_catch/215 [ 24.452298] [ 24.453782] CPU: 3 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 24.453834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.453851] Hardware name: WinLink E850-96 board (DT) [ 24.453872] Call trace: [ 24.453890] show_stack+0x20/0x38 (C) [ 24.453927] dump_stack_lvl+0x8c/0xd0 [ 24.453962] print_report+0x118/0x608 [ 24.453993] kasan_report+0xdc/0x128 [ 24.454022] __asan_report_store16_noabort+0x20/0x30 [ 24.454059] kmalloc_oob_16+0x3a0/0x3f8 [ 24.454091] kunit_try_run_case+0x170/0x3f0 [ 24.454128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.454165] kthread+0x328/0x630 [ 24.454198] ret_from_fork+0x10/0x20 [ 24.454231] [ 24.516445] Allocated by task 215: [ 24.519834] kasan_save_stack+0x3c/0x68 [ 24.523649] kasan_save_track+0x20/0x40 [ 24.527469] kasan_save_alloc_info+0x40/0x58 [ 24.531722] __kasan_kmalloc+0xd4/0xd8 [ 24.535455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.539968] kmalloc_oob_16+0xb4/0x3f8 [ 24.543701] kunit_try_run_case+0x170/0x3f0 [ 24.547867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.553336] kthread+0x328/0x630 [ 24.556548] ret_from_fork+0x10/0x20 [ 24.560107] [ 24.561584] The buggy address belongs to the object at ffff000804354a60 [ 24.561584] which belongs to the cache kmalloc-16 of size 16 [ 24.573913] The buggy address is located 0 bytes inside of [ 24.573913] allocated 13-byte region [ffff000804354a60, ffff000804354a6d) [ 24.586235] [ 24.587715] The buggy address belongs to the physical page: [ 24.593271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884354 [ 24.601254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.607764] page_type: f5(slab) [ 24.610901] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 24.618620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.626340] page dumped because: kasan: bad access detected [ 24.631894] [ 24.633369] Memory state around the buggy address: [ 24.638151] ffff000804354900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.645353] ffff000804354980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.652558] >ffff000804354a00: 00 04 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 24.659758] ^ [ 24.666359] ffff000804354a80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.673564] ffff000804354b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.680767] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 23.750901] ================================================================== [ 23.760905] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 23.767500] Read of size 1 at addr ffff000803bc6600 by task kunit_try_catch/213 [ 23.774790] [ 23.776276] CPU: 2 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.776331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.776348] Hardware name: WinLink E850-96 board (DT) [ 23.776368] Call trace: [ 23.776383] show_stack+0x20/0x38 (C) [ 23.776414] dump_stack_lvl+0x8c/0xd0 [ 23.776452] print_report+0x118/0x608 [ 23.776481] kasan_report+0xdc/0x128 [ 23.776511] __kasan_check_byte+0x54/0x70 [ 23.776539] krealloc_noprof+0x44/0x360 [ 23.776570] krealloc_uaf+0x180/0x520 [ 23.776595] kunit_try_run_case+0x170/0x3f0 [ 23.776632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.776668] kthread+0x328/0x630 [ 23.776701] ret_from_fork+0x10/0x20 [ 23.776732] [ 23.841629] Allocated by task 213: [ 23.845017] kasan_save_stack+0x3c/0x68 [ 23.848832] kasan_save_track+0x20/0x40 [ 23.852652] kasan_save_alloc_info+0x40/0x58 [ 23.856906] __kasan_kmalloc+0xd4/0xd8 [ 23.860638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.865152] krealloc_uaf+0xc8/0x520 [ 23.868711] kunit_try_run_case+0x170/0x3f0 [ 23.872878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.878346] kthread+0x328/0x630 [ 23.881558] ret_from_fork+0x10/0x20 [ 23.885117] [ 23.886594] Freed by task 213: [ 23.889632] kasan_save_stack+0x3c/0x68 [ 23.893450] kasan_save_track+0x20/0x40 [ 23.897269] kasan_save_free_info+0x4c/0x78 [ 23.901436] __kasan_slab_free+0x6c/0x98 [ 23.905342] kfree+0x214/0x3c8 [ 23.908380] krealloc_uaf+0x12c/0x520 [ 23.912026] kunit_try_run_case+0x170/0x3f0 [ 23.916193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.921663] kthread+0x328/0x630 [ 23.924873] ret_from_fork+0x10/0x20 [ 23.928432] [ 23.929910] The buggy address belongs to the object at ffff000803bc6600 [ 23.929910] which belongs to the cache kmalloc-256 of size 256 [ 23.942411] The buggy address is located 0 bytes inside of [ 23.942411] freed 256-byte region [ffff000803bc6600, ffff000803bc6700) [ 23.954473] [ 23.955953] The buggy address belongs to the physical page: [ 23.961508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 23.969493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.977131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.984075] page_type: f5(slab) [ 23.987212] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.994931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.002657] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.010469] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.018282] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 24.026094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.033899] page dumped because: kasan: bad access detected [ 24.039454] [ 24.040930] Memory state around the buggy address: [ 24.045714] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.052913] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060120] >ffff000803bc6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.067319] ^ [ 24.070534] ffff000803bc6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.077739] ffff000803bc6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.084942] ================================================================== [ 24.092356] ================================================================== [ 24.099355] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 24.105947] Read of size 1 at addr ffff000803bc6600 by task kunit_try_catch/213 [ 24.113239] [ 24.114725] CPU: 2 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 24.114773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.114790] Hardware name: WinLink E850-96 board (DT) [ 24.114810] Call trace: [ 24.114823] show_stack+0x20/0x38 (C) [ 24.114855] dump_stack_lvl+0x8c/0xd0 [ 24.114890] print_report+0x118/0x608 [ 24.114919] kasan_report+0xdc/0x128 [ 24.114949] __asan_report_load1_noabort+0x20/0x30 [ 24.114979] krealloc_uaf+0x4c8/0x520 [ 24.115003] kunit_try_run_case+0x170/0x3f0 [ 24.115037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.115073] kthread+0x328/0x630 [ 24.115105] ret_from_fork+0x10/0x20 [ 24.115139] [ 24.177039] Allocated by task 213: [ 24.180428] kasan_save_stack+0x3c/0x68 [ 24.184244] kasan_save_track+0x20/0x40 [ 24.188064] kasan_save_alloc_info+0x40/0x58 [ 24.192317] __kasan_kmalloc+0xd4/0xd8 [ 24.196050] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.200563] krealloc_uaf+0xc8/0x520 [ 24.204122] kunit_try_run_case+0x170/0x3f0 [ 24.208289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.213758] kthread+0x328/0x630 [ 24.216970] ret_from_fork+0x10/0x20 [ 24.220528] [ 24.222004] Freed by task 213: [ 24.225044] kasan_save_stack+0x3c/0x68 [ 24.228862] kasan_save_track+0x20/0x40 [ 24.232681] kasan_save_free_info+0x4c/0x78 [ 24.236848] __kasan_slab_free+0x6c/0x98 [ 24.240754] kfree+0x214/0x3c8 [ 24.243792] krealloc_uaf+0x12c/0x520 [ 24.247438] kunit_try_run_case+0x170/0x3f0 [ 24.251604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.257073] kthread+0x328/0x630 [ 24.260285] ret_from_fork+0x10/0x20 [ 24.263844] [ 24.265319] The buggy address belongs to the object at ffff000803bc6600 [ 24.265319] which belongs to the cache kmalloc-256 of size 256 [ 24.277820] The buggy address is located 0 bytes inside of [ 24.277820] freed 256-byte region [ffff000803bc6600, ffff000803bc6700) [ 24.289885] [ 24.291364] The buggy address belongs to the physical page: [ 24.296919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 24.304904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.312542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.319487] page_type: f5(slab) [ 24.322620] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.330343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.338069] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.345880] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.353694] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 24.361505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.369311] page dumped because: kasan: bad access detected [ 24.374866] [ 24.376342] Memory state around the buggy address: [ 24.381123] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.388325] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.395533] >ffff000803bc6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.402731] ^ [ 24.405947] ffff000803bc6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.413151] ffff000803bc6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.420353] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 20.896757] ================================================================== [ 20.903745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 20.911291] Write of size 1 at addr ffff000803bc64d0 by task kunit_try_catch/207 [ 20.918668] [ 20.920154] CPU: 2 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 20.920206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.920222] Hardware name: WinLink E850-96 board (DT) [ 20.920241] Call trace: [ 20.920253] show_stack+0x20/0x38 (C) [ 20.920287] dump_stack_lvl+0x8c/0xd0 [ 20.920324] print_report+0x118/0x608 [ 20.920355] kasan_report+0xdc/0x128 [ 20.920385] __asan_report_store1_noabort+0x20/0x30 [ 20.920422] krealloc_less_oob_helper+0xb9c/0xc50 [ 20.920449] krealloc_less_oob+0x20/0x38 [ 20.920473] kunit_try_run_case+0x170/0x3f0 [ 20.920508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.920544] kthread+0x328/0x630 [ 20.920578] ret_from_fork+0x10/0x20 [ 20.920611] [ 20.987504] Allocated by task 207: [ 20.990892] kasan_save_stack+0x3c/0x68 [ 20.994709] kasan_save_track+0x20/0x40 [ 20.998529] kasan_save_alloc_info+0x40/0x58 [ 21.002782] __kasan_krealloc+0x118/0x178 [ 21.006775] krealloc_noprof+0x128/0x360 [ 21.010681] krealloc_less_oob_helper+0x168/0xc50 [ 21.015369] krealloc_less_oob+0x20/0x38 [ 21.019274] kunit_try_run_case+0x170/0x3f0 [ 21.023441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.028910] kthread+0x328/0x630 [ 21.032121] ret_from_fork+0x10/0x20 [ 21.035680] [ 21.037159] The buggy address belongs to the object at ffff000803bc6400 [ 21.037159] which belongs to the cache kmalloc-256 of size 256 [ 21.049656] The buggy address is located 7 bytes to the right of [ 21.049656] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.062590] [ 21.064067] The buggy address belongs to the physical page: [ 21.069624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.077609] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.085248] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.092190] page_type: f5(slab) [ 21.095328] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.103048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.110774] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.118585] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.126398] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 21.134210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.142017] page dumped because: kasan: bad access detected [ 21.147571] [ 21.149046] Memory state around the buggy address: [ 21.153829] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.161030] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.168236] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.175436] ^ [ 21.181255] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188460] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195662] ================================================================== [ 23.286767] ================================================================== [ 23.293896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.301445] Write of size 1 at addr ffff000805d560ea by task kunit_try_catch/211 [ 23.308824] [ 23.310306] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.310351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.310366] Hardware name: WinLink E850-96 board (DT) [ 23.310381] Call trace: [ 23.310390] show_stack+0x20/0x38 (C) [ 23.310421] dump_stack_lvl+0x8c/0xd0 [ 23.310455] print_report+0x118/0x608 [ 23.310484] kasan_report+0xdc/0x128 [ 23.310514] __asan_report_store1_noabort+0x20/0x30 [ 23.310547] krealloc_less_oob_helper+0xae4/0xc50 [ 23.310574] krealloc_large_less_oob+0x20/0x38 [ 23.310601] kunit_try_run_case+0x170/0x3f0 [ 23.310636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.310673] kthread+0x328/0x630 [ 23.310706] ret_from_fork+0x10/0x20 [ 23.310738] [ 23.378182] The buggy address belongs to the physical page: [ 23.383737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 23.391723] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.399360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.406305] page_type: f8(unknown) [ 23.409701] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.417422] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.425149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.432960] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.440773] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 23.448585] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.456391] page dumped because: kasan: bad access detected [ 23.461946] [ 23.463422] Memory state around the buggy address: [ 23.468201] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.475405] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.482609] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.489810] ^ [ 23.496411] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.503616] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.510819] ================================================================== [ 20.588215] ================================================================== [ 20.597673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 20.605220] Write of size 1 at addr ffff000803bc64c9 by task kunit_try_catch/207 [ 20.612600] [ 20.614084] CPU: 2 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 20.614140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.614158] Hardware name: WinLink E850-96 board (DT) [ 20.614178] Call trace: [ 20.614192] show_stack+0x20/0x38 (C) [ 20.614224] dump_stack_lvl+0x8c/0xd0 [ 20.614260] print_report+0x118/0x608 [ 20.614290] kasan_report+0xdc/0x128 [ 20.614320] __asan_report_store1_noabort+0x20/0x30 [ 20.614356] krealloc_less_oob_helper+0xa48/0xc50 [ 20.614387] krealloc_less_oob+0x20/0x38 [ 20.614412] kunit_try_run_case+0x170/0x3f0 [ 20.614447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.614484] kthread+0x328/0x630 [ 20.614519] ret_from_fork+0x10/0x20 [ 20.614553] [ 20.681433] Allocated by task 207: [ 20.684822] kasan_save_stack+0x3c/0x68 [ 20.688637] kasan_save_track+0x20/0x40 [ 20.692457] kasan_save_alloc_info+0x40/0x58 [ 20.696710] __kasan_krealloc+0x118/0x178 [ 20.700703] krealloc_noprof+0x128/0x360 [ 20.704609] krealloc_less_oob_helper+0x168/0xc50 [ 20.709298] krealloc_less_oob+0x20/0x38 [ 20.713203] kunit_try_run_case+0x170/0x3f0 [ 20.717369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.722838] kthread+0x328/0x630 [ 20.726050] ret_from_fork+0x10/0x20 [ 20.729609] [ 20.731086] The buggy address belongs to the object at ffff000803bc6400 [ 20.731086] which belongs to the cache kmalloc-256 of size 256 [ 20.743588] The buggy address is located 0 bytes to the right of [ 20.743588] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 20.756518] [ 20.757996] The buggy address belongs to the physical page: [ 20.763553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 20.771538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.779175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.786120] page_type: f5(slab) [ 20.789257] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.796976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.804704] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.812513] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.820326] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 20.828140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.835945] page dumped because: kasan: bad access detected [ 20.841499] [ 20.842975] Memory state around the buggy address: [ 20.847756] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.854958] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.862165] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.869364] ^ [ 20.874923] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.882128] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.889331] ================================================================== [ 23.055991] ================================================================== [ 23.063088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.070633] Write of size 1 at addr ffff000805d560da by task kunit_try_catch/211 [ 23.078011] [ 23.079496] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.079544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.079558] Hardware name: WinLink E850-96 board (DT) [ 23.079576] Call trace: [ 23.079588] show_stack+0x20/0x38 (C) [ 23.079620] dump_stack_lvl+0x8c/0xd0 [ 23.079655] print_report+0x118/0x608 [ 23.079686] kasan_report+0xdc/0x128 [ 23.079715] __asan_report_store1_noabort+0x20/0x30 [ 23.079749] krealloc_less_oob_helper+0xa80/0xc50 [ 23.079777] krealloc_large_less_oob+0x20/0x38 [ 23.079803] kunit_try_run_case+0x170/0x3f0 [ 23.079838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.079873] kthread+0x328/0x630 [ 23.079906] ret_from_fork+0x10/0x20 [ 23.079941] [ 23.147370] The buggy address belongs to the physical page: [ 23.152924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 23.160911] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.168549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.175492] page_type: f8(unknown) [ 23.178890] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.186610] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.194336] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.202147] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.209961] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 23.217773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.225578] page dumped because: kasan: bad access detected [ 23.231133] [ 23.232609] Memory state around the buggy address: [ 23.237389] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.244592] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.251799] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.258998] ^ [ 23.265078] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.272283] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.279485] ================================================================== [ 21.816865] ================================================================== [ 21.823953] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.831502] Write of size 1 at addr ffff000803bc64eb by task kunit_try_catch/207 [ 21.838880] [ 21.840364] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 21.840415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.840431] Hardware name: WinLink E850-96 board (DT) [ 21.840450] Call trace: [ 21.840462] show_stack+0x20/0x38 (C) [ 21.840491] dump_stack_lvl+0x8c/0xd0 [ 21.840528] print_report+0x118/0x608 [ 21.840560] kasan_report+0xdc/0x128 [ 21.840589] __asan_report_store1_noabort+0x20/0x30 [ 21.840624] krealloc_less_oob_helper+0xa58/0xc50 [ 21.840653] krealloc_less_oob+0x20/0x38 [ 21.840679] kunit_try_run_case+0x170/0x3f0 [ 21.840710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.840744] kthread+0x328/0x630 [ 21.840777] ret_from_fork+0x10/0x20 [ 21.840810] [ 21.907716] Allocated by task 207: [ 21.911103] kasan_save_stack+0x3c/0x68 [ 21.914921] kasan_save_track+0x20/0x40 [ 21.918740] kasan_save_alloc_info+0x40/0x58 [ 21.922994] __kasan_krealloc+0x118/0x178 [ 21.926987] krealloc_noprof+0x128/0x360 [ 21.930893] krealloc_less_oob_helper+0x168/0xc50 [ 21.935580] krealloc_less_oob+0x20/0x38 [ 21.939486] kunit_try_run_case+0x170/0x3f0 [ 21.943653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949122] kthread+0x328/0x630 [ 21.952334] ret_from_fork+0x10/0x20 [ 21.955892] [ 21.957371] The buggy address belongs to the object at ffff000803bc6400 [ 21.957371] which belongs to the cache kmalloc-256 of size 256 [ 21.969868] The buggy address is located 34 bytes to the right of [ 21.969868] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.982889] [ 21.984366] The buggy address belongs to the physical page: [ 21.989922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.997906] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.005545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.012490] page_type: f5(slab) [ 22.015626] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.023346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.031073] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.038884] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.046697] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 22.054509] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.062314] page dumped because: kasan: bad access detected [ 22.067870] [ 22.069345] Memory state around the buggy address: [ 22.074126] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.081329] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.088535] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.095734] ^ [ 22.102335] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.109540] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.116741] ================================================================== [ 21.509853] ================================================================== [ 21.516754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.524302] Write of size 1 at addr ffff000803bc64ea by task kunit_try_catch/207 [ 21.531680] [ 21.533165] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 21.533217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.533232] Hardware name: WinLink E850-96 board (DT) [ 21.533251] Call trace: [ 21.533264] show_stack+0x20/0x38 (C) [ 21.533296] dump_stack_lvl+0x8c/0xd0 [ 21.533331] print_report+0x118/0x608 [ 21.533362] kasan_report+0xdc/0x128 [ 21.533391] __asan_report_store1_noabort+0x20/0x30 [ 21.533426] krealloc_less_oob_helper+0xae4/0xc50 [ 21.533453] krealloc_less_oob+0x20/0x38 [ 21.533477] kunit_try_run_case+0x170/0x3f0 [ 21.533511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.533547] kthread+0x328/0x630 [ 21.533581] ret_from_fork+0x10/0x20 [ 21.533613] [ 21.600516] Allocated by task 207: [ 21.603903] kasan_save_stack+0x3c/0x68 [ 21.607722] kasan_save_track+0x20/0x40 [ 21.611540] kasan_save_alloc_info+0x40/0x58 [ 21.615793] __kasan_krealloc+0x118/0x178 [ 21.619786] krealloc_noprof+0x128/0x360 [ 21.623692] krealloc_less_oob_helper+0x168/0xc50 [ 21.628380] krealloc_less_oob+0x20/0x38 [ 21.632286] kunit_try_run_case+0x170/0x3f0 [ 21.636453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.641922] kthread+0x328/0x630 [ 21.645133] ret_from_fork+0x10/0x20 [ 21.648692] [ 21.650171] The buggy address belongs to the object at ffff000803bc6400 [ 21.650171] which belongs to the cache kmalloc-256 of size 256 [ 21.662668] The buggy address is located 33 bytes to the right of [ 21.662668] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.675688] [ 21.677167] The buggy address belongs to the physical page: [ 21.682723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.690709] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.698346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.705290] page_type: f5(slab) [ 21.708426] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.716146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.723872] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.731684] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.739497] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 21.747309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.755114] page dumped because: kasan: bad access detected [ 21.760669] [ 21.762145] Memory state around the buggy address: [ 21.766926] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.774128] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.781335] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.788534] ^ [ 21.795136] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.802339] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.809542] ================================================================== [ 22.592291] ================================================================== [ 22.602241] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.609791] Write of size 1 at addr ffff000805d560c9 by task kunit_try_catch/211 [ 22.617167] [ 22.618654] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 22.618704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.618720] Hardware name: WinLink E850-96 board (DT) [ 22.618739] Call trace: [ 22.618748] show_stack+0x20/0x38 (C) [ 22.618781] dump_stack_lvl+0x8c/0xd0 [ 22.618818] print_report+0x118/0x608 [ 22.618846] kasan_report+0xdc/0x128 [ 22.618875] __asan_report_store1_noabort+0x20/0x30 [ 22.618912] krealloc_less_oob_helper+0xa48/0xc50 [ 22.618940] krealloc_large_less_oob+0x20/0x38 [ 22.618966] kunit_try_run_case+0x170/0x3f0 [ 22.619001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.619036] kthread+0x328/0x630 [ 22.619071] ret_from_fork+0x10/0x20 [ 22.619105] [ 22.686527] The buggy address belongs to the physical page: [ 22.692084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 22.700066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.707706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.714650] page_type: f8(unknown) [ 22.718047] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.725766] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.733492] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.741303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.749117] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 22.756929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.764734] page dumped because: kasan: bad access detected [ 22.770290] [ 22.771765] Memory state around the buggy address: [ 22.776547] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.783749] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.790955] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.798154] ^ [ 22.803713] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.810918] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.818120] ================================================================== [ 22.825654] ================================================================== [ 22.832534] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.840081] Write of size 1 at addr ffff000805d560d0 by task kunit_try_catch/211 [ 22.847459] [ 22.848943] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 22.848990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.849005] Hardware name: WinLink E850-96 board (DT) [ 22.849023] Call trace: [ 22.849035] show_stack+0x20/0x38 (C) [ 22.849067] dump_stack_lvl+0x8c/0xd0 [ 22.849101] print_report+0x118/0x608 [ 22.849135] kasan_report+0xdc/0x128 [ 22.849166] __asan_report_store1_noabort+0x20/0x30 [ 22.849201] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.849228] krealloc_large_less_oob+0x20/0x38 [ 22.849255] kunit_try_run_case+0x170/0x3f0 [ 22.849290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.849326] kthread+0x328/0x630 [ 22.849360] ret_from_fork+0x10/0x20 [ 22.849392] [ 22.916818] The buggy address belongs to the physical page: [ 22.922376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 22.930359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.937998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.944940] page_type: f8(unknown) [ 22.948337] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.956058] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.963784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.971595] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.979409] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 22.987221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.995026] page dumped because: kasan: bad access detected [ 23.000581] [ 23.002057] Memory state around the buggy address: [ 23.006837] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.014040] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.021246] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.028446] ^ [ 23.034265] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.041470] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.048672] ================================================================== [ 23.518131] ================================================================== [ 23.525232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.532780] Write of size 1 at addr ffff000805d560eb by task kunit_try_catch/211 [ 23.540157] [ 23.541640] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 23.541690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.541704] Hardware name: WinLink E850-96 board (DT) [ 23.541724] Call trace: [ 23.541738] show_stack+0x20/0x38 (C) [ 23.541770] dump_stack_lvl+0x8c/0xd0 [ 23.541804] print_report+0x118/0x608 [ 23.541835] kasan_report+0xdc/0x128 [ 23.541863] __asan_report_store1_noabort+0x20/0x30 [ 23.541896] krealloc_less_oob_helper+0xa58/0xc50 [ 23.541926] krealloc_large_less_oob+0x20/0x38 [ 23.541952] kunit_try_run_case+0x170/0x3f0 [ 23.541986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.542023] kthread+0x328/0x630 [ 23.542057] ret_from_fork+0x10/0x20 [ 23.542091] [ 23.609514] The buggy address belongs to the physical page: [ 23.615073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 23.623057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.630695] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.637638] page_type: f8(unknown) [ 23.641036] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.648755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.656482] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.664293] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.672107] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff [ 23.679918] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.687724] page dumped because: kasan: bad access detected [ 23.693279] [ 23.694755] Memory state around the buggy address: [ 23.699535] ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.706738] ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.713945] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.721144] ^ [ 23.727745] ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.734950] ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.742152] ================================================================== [ 21.203219] ================================================================== [ 21.210076] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.217623] Write of size 1 at addr ffff000803bc64da by task kunit_try_catch/207 [ 21.225001] [ 21.226488] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 21.226542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.226559] Hardware name: WinLink E850-96 board (DT) [ 21.226578] Call trace: [ 21.226590] show_stack+0x20/0x38 (C) [ 21.226628] dump_stack_lvl+0x8c/0xd0 [ 21.226663] print_report+0x118/0x608 [ 21.226695] kasan_report+0xdc/0x128 [ 21.226726] __asan_report_store1_noabort+0x20/0x30 [ 21.226762] krealloc_less_oob_helper+0xa80/0xc50 [ 21.226791] krealloc_less_oob+0x20/0x38 [ 21.226816] kunit_try_run_case+0x170/0x3f0 [ 21.226850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.226886] kthread+0x328/0x630 [ 21.226921] ret_from_fork+0x10/0x20 [ 21.226957] [ 21.293836] Allocated by task 207: [ 21.297227] kasan_save_stack+0x3c/0x68 [ 21.301041] kasan_save_track+0x20/0x40 [ 21.304860] kasan_save_alloc_info+0x40/0x58 [ 21.309114] __kasan_krealloc+0x118/0x178 [ 21.313107] krealloc_noprof+0x128/0x360 [ 21.317013] krealloc_less_oob_helper+0x168/0xc50 [ 21.321702] krealloc_less_oob+0x20/0x38 [ 21.325607] kunit_try_run_case+0x170/0x3f0 [ 21.329773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.335242] kthread+0x328/0x630 [ 21.338453] ret_from_fork+0x10/0x20 [ 21.342012] [ 21.343491] The buggy address belongs to the object at ffff000803bc6400 [ 21.343491] which belongs to the cache kmalloc-256 of size 256 [ 21.355990] The buggy address is located 17 bytes to the right of [ 21.355990] allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9) [ 21.369009] [ 21.370487] The buggy address belongs to the physical page: [ 21.376043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4 [ 21.384028] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.391667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.398609] page_type: f5(slab) [ 21.401747] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.409466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.417193] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.425004] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.432817] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff [ 21.440629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.448436] page dumped because: kasan: bad access detected [ 21.453990] [ 21.455466] Memory state around the buggy address: [ 21.460247] ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.467451] ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.474655] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.481854] ^ [ 21.487934] ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.495140] ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.502342] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 19.970321] ================================================================== [ 19.979369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.986914] Write of size 1 at addr ffff000800dec6eb by task kunit_try_catch/205 [ 19.994290] [ 19.995778] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 19.995829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.995844] Hardware name: WinLink E850-96 board (DT) [ 19.995864] Call trace: [ 19.995882] show_stack+0x20/0x38 (C) [ 19.995917] dump_stack_lvl+0x8c/0xd0 [ 19.995956] print_report+0x118/0x608 [ 19.995988] kasan_report+0xdc/0x128 [ 19.996016] __asan_report_store1_noabort+0x20/0x30 [ 19.996051] krealloc_more_oob_helper+0x60c/0x678 [ 19.996081] krealloc_more_oob+0x20/0x38 [ 19.996107] kunit_try_run_case+0x170/0x3f0 [ 19.996143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.996181] kthread+0x328/0x630 [ 19.996216] ret_from_fork+0x10/0x20 [ 19.996250] [ 20.063126] Allocated by task 205: [ 20.066517] kasan_save_stack+0x3c/0x68 [ 20.070330] kasan_save_track+0x20/0x40 [ 20.074150] kasan_save_alloc_info+0x40/0x58 [ 20.078403] __kasan_krealloc+0x118/0x178 [ 20.082396] krealloc_noprof+0x128/0x360 [ 20.086302] krealloc_more_oob_helper+0x168/0x678 [ 20.090991] krealloc_more_oob+0x20/0x38 [ 20.094896] kunit_try_run_case+0x170/0x3f0 [ 20.099062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.104531] kthread+0x328/0x630 [ 20.107743] ret_from_fork+0x10/0x20 [ 20.111302] [ 20.112780] The buggy address belongs to the object at ffff000800dec600 [ 20.112780] which belongs to the cache kmalloc-256 of size 256 [ 20.125281] The buggy address is located 0 bytes to the right of [ 20.125281] allocated 235-byte region [ffff000800dec600, ffff000800dec6eb) [ 20.138211] [ 20.139692] The buggy address belongs to the physical page: [ 20.145249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dec [ 20.153230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.160869] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.167813] page_type: f5(slab) [ 20.170950] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.178669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.186395] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.194207] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.202020] head: 0bfffe0000000002 fffffdffe0037b01 00000000ffffffff 00000000ffffffff [ 20.209832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.217639] page dumped because: kasan: bad access detected [ 20.223192] [ 20.224668] Memory state around the buggy address: [ 20.229449] ffff000800dec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.236653] ffff000800dec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.243857] >ffff000800dec680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.251057] ^ [ 20.257658] ffff000800dec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.264863] ffff000800dec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.272065] ================================================================== [ 22.125619] ================================================================== [ 22.134973] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.142522] Write of size 1 at addr ffff00080608a0eb by task kunit_try_catch/209 [ 22.149900] [ 22.151387] CPU: 2 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 22.151440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.151456] Hardware name: WinLink E850-96 board (DT) [ 22.151477] Call trace: [ 22.151491] show_stack+0x20/0x38 (C) [ 22.151524] dump_stack_lvl+0x8c/0xd0 [ 22.151559] print_report+0x118/0x608 [ 22.151588] kasan_report+0xdc/0x128 [ 22.151616] __asan_report_store1_noabort+0x20/0x30 [ 22.151650] krealloc_more_oob_helper+0x60c/0x678 [ 22.151679] krealloc_large_more_oob+0x20/0x38 [ 22.151706] kunit_try_run_case+0x170/0x3f0 [ 22.151744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.151781] kthread+0x328/0x630 [ 22.151814] ret_from_fork+0x10/0x20 [ 22.151847] [ 22.219259] The buggy address belongs to the physical page: [ 22.224816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886088 [ 22.232800] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.240438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.247381] page_type: f8(unknown) [ 22.250780] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.258499] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.266225] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.274036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.281849] head: 0bfffe0000000002 fffffdffe0182201 00000000ffffffff 00000000ffffffff [ 22.289662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.297470] page dumped because: kasan: bad access detected [ 22.303022] [ 22.304498] Memory state around the buggy address: [ 22.309281] ffff000806089f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.316483] ffff00080608a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.323688] >ffff00080608a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 22.330887] ^ [ 22.337488] ffff00080608a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.344692] ffff00080608a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.351895] ================================================================== [ 22.359298] ================================================================== [ 22.366309] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.373855] Write of size 1 at addr ffff00080608a0f0 by task kunit_try_catch/209 [ 22.381234] [ 22.382718] CPU: 2 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 22.382765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.382781] Hardware name: WinLink E850-96 board (DT) [ 22.382801] Call trace: [ 22.382813] show_stack+0x20/0x38 (C) [ 22.382844] dump_stack_lvl+0x8c/0xd0 [ 22.382879] print_report+0x118/0x608 [ 22.382909] kasan_report+0xdc/0x128 [ 22.382938] __asan_report_store1_noabort+0x20/0x30 [ 22.382973] krealloc_more_oob_helper+0x5c0/0x678 [ 22.383002] krealloc_large_more_oob+0x20/0x38 [ 22.383030] kunit_try_run_case+0x170/0x3f0 [ 22.383065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.383102] kthread+0x328/0x630 [ 22.383135] ret_from_fork+0x10/0x20 [ 22.383167] [ 22.450594] The buggy address belongs to the physical page: [ 22.456148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886088 [ 22.464133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.471772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.478716] page_type: f8(unknown) [ 22.482109] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.489832] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.497558] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.505370] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.513184] head: 0bfffe0000000002 fffffdffe0182201 00000000ffffffff 00000000ffffffff [ 22.520995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.528801] page dumped because: kasan: bad access detected [ 22.534356] [ 22.535831] Memory state around the buggy address: [ 22.540613] ffff000806089f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.547815] ffff00080608a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.555021] >ffff00080608a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 22.562220] ^ [ 22.569083] ffff00080608a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.576286] ffff00080608a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.583487] ================================================================== [ 20.279396] ================================================================== [ 20.286478] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.294025] Write of size 1 at addr ffff000800dec6f0 by task kunit_try_catch/205 [ 20.301404] [ 20.302888] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 20.302939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.302953] Hardware name: WinLink E850-96 board (DT) [ 20.302972] Call trace: [ 20.302984] show_stack+0x20/0x38 (C) [ 20.303016] dump_stack_lvl+0x8c/0xd0 [ 20.303050] print_report+0x118/0x608 [ 20.303081] kasan_report+0xdc/0x128 [ 20.303106] __asan_report_store1_noabort+0x20/0x30 [ 20.303142] krealloc_more_oob_helper+0x5c0/0x678 [ 20.303169] krealloc_more_oob+0x20/0x38 [ 20.303196] kunit_try_run_case+0x170/0x3f0 [ 20.303231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.303269] kthread+0x328/0x630 [ 20.303301] ret_from_fork+0x10/0x20 [ 20.303335] [ 20.370239] Allocated by task 205: [ 20.373626] kasan_save_stack+0x3c/0x68 [ 20.377444] kasan_save_track+0x20/0x40 [ 20.381263] kasan_save_alloc_info+0x40/0x58 [ 20.385517] __kasan_krealloc+0x118/0x178 [ 20.389510] krealloc_noprof+0x128/0x360 [ 20.393416] krealloc_more_oob_helper+0x168/0x678 [ 20.398103] krealloc_more_oob+0x20/0x38 [ 20.402009] kunit_try_run_case+0x170/0x3f0 [ 20.406176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.411645] kthread+0x328/0x630 [ 20.414856] ret_from_fork+0x10/0x20 [ 20.418416] [ 20.419893] The buggy address belongs to the object at ffff000800dec600 [ 20.419893] which belongs to the cache kmalloc-256 of size 256 [ 20.432393] The buggy address is located 5 bytes to the right of [ 20.432393] allocated 235-byte region [ffff000800dec600, ffff000800dec6eb) [ 20.445325] [ 20.446804] The buggy address belongs to the physical page: [ 20.452360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dec [ 20.460342] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.467982] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.474926] page_type: f5(slab) [ 20.478061] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.485783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.493509] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.501320] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.509133] head: 0bfffe0000000002 fffffdffe0037b01 00000000ffffffff 00000000ffffffff [ 20.516945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.524751] page dumped because: kasan: bad access detected [ 20.530306] [ 20.531782] Memory state around the buggy address: [ 20.536561] ffff000800dec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.543765] ffff000800dec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.550971] >ffff000800dec680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.558170] ^ [ 20.565032] ffff000800dec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.572236] ffff000800dec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.579437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 19.361157] ================================================================== [ 19.370954] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 19.377550] Read of size 1 at addr ffff000805d54000 by task kunit_try_catch/197 [ 19.384840] [ 19.386325] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 19.386382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.386399] Hardware name: WinLink E850-96 board (DT) [ 19.386420] Call trace: [ 19.386433] show_stack+0x20/0x38 (C) [ 19.386469] dump_stack_lvl+0x8c/0xd0 [ 19.386506] print_report+0x118/0x608 [ 19.386535] kasan_report+0xdc/0x128 [ 19.386569] __asan_report_load1_noabort+0x20/0x30 [ 19.386605] kmalloc_large_uaf+0x2cc/0x2f8 [ 19.386637] kunit_try_run_case+0x170/0x3f0 [ 19.386672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.386710] kthread+0x328/0x630 [ 19.386744] ret_from_fork+0x10/0x20 [ 19.386777] [ 19.449076] The buggy address belongs to the physical page: [ 19.454632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54 [ 19.462616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.469140] raw: 0bfffe0000000000 fffffdffe0175608 ffff00085af6f0c0 0000000000000000 [ 19.476860] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.484577] page dumped because: kasan: bad access detected [ 19.490131] [ 19.491606] Memory state around the buggy address: [ 19.496389] ffff000805d53f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.503589] ffff000805d53f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510797] >ffff000805d54000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.517995] ^ [ 19.521211] ffff000805d54080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.528415] ffff000805d54100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.535618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 19.133640] ================================================================== [ 19.143091] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 19.150554] Write of size 1 at addr ffff00080310600a by task kunit_try_catch/195 [ 19.157931] [ 19.159419] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 19.159473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.159487] Hardware name: WinLink E850-96 board (DT) [ 19.159509] Call trace: [ 19.159524] show_stack+0x20/0x38 (C) [ 19.159561] dump_stack_lvl+0x8c/0xd0 [ 19.159596] print_report+0x118/0x608 [ 19.159627] kasan_report+0xdc/0x128 [ 19.159657] __asan_report_store1_noabort+0x20/0x30 [ 19.159692] kmalloc_large_oob_right+0x278/0x2b8 [ 19.159724] kunit_try_run_case+0x170/0x3f0 [ 19.159760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.159798] kthread+0x328/0x630 [ 19.159832] ret_from_fork+0x10/0x20 [ 19.159866] [ 19.222776] The buggy address belongs to the physical page: [ 19.228334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883104 [ 19.236318] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.243956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.250898] page_type: f8(unknown) [ 19.254300] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.262016] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.269742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.277553] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.285367] head: 0bfffe0000000002 fffffdffe00c4101 00000000ffffffff 00000000ffffffff [ 19.293179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.300987] page dumped because: kasan: bad access detected [ 19.306540] [ 19.308015] Memory state around the buggy address: [ 19.312795] ffff000803105f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.319998] ffff000803105f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.327205] >ffff000803106000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.334404] ^ [ 19.337880] ffff000803106080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.345085] ffff000803106100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.352288] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 18.832855] ================================================================== [ 18.843538] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.850820] Write of size 1 at addr ffff000805f79f00 by task kunit_try_catch/193 [ 18.858197] [ 18.859682] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.859738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.859753] Hardware name: WinLink E850-96 board (DT) [ 18.859774] Call trace: [ 18.859788] show_stack+0x20/0x38 (C) [ 18.859822] dump_stack_lvl+0x8c/0xd0 [ 18.859859] print_report+0x118/0x608 [ 18.859888] kasan_report+0xdc/0x128 [ 18.859918] __asan_report_store1_noabort+0x20/0x30 [ 18.859955] kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.859991] kunit_try_run_case+0x170/0x3f0 [ 18.860025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.860063] kthread+0x328/0x630 [ 18.860098] ret_from_fork+0x10/0x20 [ 18.860132] [ 18.922867] Allocated by task 193: [ 18.926254] kasan_save_stack+0x3c/0x68 [ 18.930071] kasan_save_track+0x20/0x40 [ 18.933891] kasan_save_alloc_info+0x40/0x58 [ 18.938143] __kasan_kmalloc+0xd4/0xd8 [ 18.941875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.946389] kmalloc_big_oob_right+0xb8/0x2f0 [ 18.950729] kunit_try_run_case+0x170/0x3f0 [ 18.954896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.960364] kthread+0x328/0x630 [ 18.963576] ret_from_fork+0x10/0x20 [ 18.967135] [ 18.968613] The buggy address belongs to the object at ffff000805f78000 [ 18.968613] which belongs to the cache kmalloc-8k of size 8192 [ 18.981115] The buggy address is located 0 bytes to the right of [ 18.981115] allocated 7936-byte region [ffff000805f78000, ffff000805f79f00) [ 18.994133] [ 18.995611] The buggy address belongs to the physical page: [ 19.001166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f78 [ 19.009150] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.016790] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.023733] page_type: f5(slab) [ 19.026870] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 19.034589] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.042315] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 19.050127] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.057940] head: 0bfffe0000000003 fffffdffe017de01 00000000ffffffff 00000000ffffffff [ 19.065752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.073559] page dumped because: kasan: bad access detected [ 19.079113] [ 19.080588] Memory state around the buggy address: [ 19.085370] ffff000805f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.092573] ffff000805f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.099780] >ffff000805f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.106977] ^ [ 19.110193] ffff000805f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.117399] ffff000805f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.124600] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 18.364896] ================================================================== [ 18.374787] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.382859] Write of size 1 at addr ffff0008018e6b78 by task kunit_try_catch/191 [ 18.390234] [ 18.391721] CPU: 2 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.391777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.391793] Hardware name: WinLink E850-96 board (DT) [ 18.391815] Call trace: [ 18.391828] show_stack+0x20/0x38 (C) [ 18.391861] dump_stack_lvl+0x8c/0xd0 [ 18.391899] print_report+0x118/0x608 [ 18.391931] kasan_report+0xdc/0x128 [ 18.391961] __asan_report_store1_noabort+0x20/0x30 [ 18.391996] kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.392028] kunit_try_run_case+0x170/0x3f0 [ 18.392063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.392102] kthread+0x328/0x630 [ 18.392137] ret_from_fork+0x10/0x20 [ 18.392171] [ 18.455686] Allocated by task 191: [ 18.459074] kasan_save_stack+0x3c/0x68 [ 18.462889] kasan_save_track+0x20/0x40 [ 18.466709] kasan_save_alloc_info+0x40/0x58 [ 18.470962] __kasan_kmalloc+0xd4/0xd8 [ 18.474695] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.480250] kmalloc_track_caller_oob_right+0xa8/0x488 [ 18.485371] kunit_try_run_case+0x170/0x3f0 [ 18.489538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.495006] kthread+0x328/0x630 [ 18.498219] ret_from_fork+0x10/0x20 [ 18.501778] [ 18.503255] The buggy address belongs to the object at ffff0008018e6b00 [ 18.503255] which belongs to the cache kmalloc-128 of size 128 [ 18.515756] The buggy address is located 0 bytes to the right of [ 18.515756] allocated 120-byte region [ffff0008018e6b00, ffff0008018e6b78) [ 18.528687] [ 18.530166] The buggy address belongs to the physical page: [ 18.535723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 18.543706] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.551345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.558289] page_type: f5(slab) [ 18.561426] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 18.569145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.576871] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 18.584682] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.592495] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 18.600307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.608113] page dumped because: kasan: bad access detected [ 18.613668] [ 18.615144] Memory state around the buggy address: [ 18.619926] ffff0008018e6a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.627127] ffff0008018e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.634333] >ffff0008018e6b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.641533] ^ [ 18.648653] ffff0008018e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.655861] ffff0008018e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.663061] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 18.065469] ================================================================== [ 18.074620] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 18.081993] Read of size 1 at addr ffff00080476f000 by task kunit_try_catch/189 [ 18.089284] [ 18.090771] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.090823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.090841] Hardware name: WinLink E850-96 board (DT) [ 18.090863] Call trace: [ 18.090875] show_stack+0x20/0x38 (C) [ 18.090911] dump_stack_lvl+0x8c/0xd0 [ 18.090952] print_report+0x118/0x608 [ 18.090983] kasan_report+0xdc/0x128 [ 18.091013] __asan_report_load1_noabort+0x20/0x30 [ 18.091049] kmalloc_node_oob_right+0x2f4/0x330 [ 18.091077] kunit_try_run_case+0x170/0x3f0 [ 18.091112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.091148] kthread+0x328/0x630 [ 18.091184] ret_from_fork+0x10/0x20 [ 18.091218] [ 18.153953] Allocated by task 189: [ 18.157342] kasan_save_stack+0x3c/0x68 [ 18.161157] kasan_save_track+0x20/0x40 [ 18.164979] kasan_save_alloc_info+0x40/0x58 [ 18.169231] __kasan_kmalloc+0xd4/0xd8 [ 18.172963] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 18.177911] kmalloc_node_oob_right+0xbc/0x330 [ 18.182338] kunit_try_run_case+0x170/0x3f0 [ 18.186504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.191973] kthread+0x328/0x630 [ 18.195185] ret_from_fork+0x10/0x20 [ 18.198744] [ 18.200221] The buggy address belongs to the object at ffff00080476e000 [ 18.200221] which belongs to the cache kmalloc-4k of size 4096 [ 18.212723] The buggy address is located 0 bytes to the right of [ 18.212723] allocated 4096-byte region [ffff00080476e000, ffff00080476f000) [ 18.225740] [ 18.227218] The buggy address belongs to the physical page: [ 18.232774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884768 [ 18.240759] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.248398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.255340] page_type: f5(slab) [ 18.258479] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 18.266198] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.273924] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 18.281735] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.289548] head: 0bfffe0000000003 fffffdffe011da01 00000000ffffffff 00000000ffffffff [ 18.297360] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.305169] page dumped because: kasan: bad access detected [ 18.310722] [ 18.312197] Memory state around the buggy address: [ 18.316979] ffff00080476ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.324180] ffff00080476ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.331386] >ffff00080476f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.338586] ^ [ 18.341801] ffff00080476f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.349006] ffff00080476f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.356208] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.715385] ================================================================== [ 17.724711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.731565] Read of size 1 at addr ffff000803af22ff by task kunit_try_catch/187 [ 17.738856] [ 17.740340] CPU: 2 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.740392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.740409] Hardware name: WinLink E850-96 board (DT) [ 17.740429] Call trace: [ 17.740443] show_stack+0x20/0x38 (C) [ 17.740476] dump_stack_lvl+0x8c/0xd0 [ 17.740513] print_report+0x118/0x608 [ 17.740543] kasan_report+0xdc/0x128 [ 17.740575] __asan_report_load1_noabort+0x20/0x30 [ 17.740610] kmalloc_oob_left+0x2ec/0x320 [ 17.740641] kunit_try_run_case+0x170/0x3f0 [ 17.740676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.740711] kthread+0x328/0x630 [ 17.740744] ret_from_fork+0x10/0x20 [ 17.740778] [ 17.803004] Allocated by task 67: [ 17.806305] kasan_save_stack+0x3c/0x68 [ 17.810121] kasan_save_track+0x20/0x40 [ 17.813940] kasan_save_alloc_info+0x40/0x58 [ 17.818194] __kasan_kmalloc+0xd4/0xd8 [ 17.821928] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.827482] kstrdup+0x54/0xc8 [ 17.830520] kstrdup_const+0x48/0x60 [ 17.834079] __kernfs_new_node+0xb0/0x578 [ 17.838072] kernfs_new_node+0x128/0x1a8 [ 17.841979] kernfs_create_link+0xac/0x228 [ 17.846058] sysfs_do_create_link_sd+0x8c/0x128 [ 17.850572] sysfs_create_link+0x48/0xb8 [ 17.854480] bus_add_device+0xf4/0x3a0 [ 17.858211] device_add+0x694/0x12b8 [ 17.861770] cdev_device_add+0xdc/0x208 [ 17.865589] mmc_blk_probe+0xa94/0x1508 [ 17.869409] mmc_bus_probe+0x60/0x88 [ 17.872967] really_probe+0x188/0x7f0 [ 17.876613] __driver_probe_device+0x164/0x378 [ 17.881041] driver_probe_device+0x64/0x180 [ 17.885208] __device_attach_driver+0x174/0x280 [ 17.889721] bus_for_each_drv+0x118/0x1b0 [ 17.893714] __device_attach+0x174/0x378 [ 17.897620] device_initial_probe+0x1c/0x30 [ 17.901787] bus_probe_device+0x12c/0x170 [ 17.905780] device_add+0xc44/0x12b8 [ 17.909339] mmc_add_card+0x304/0x660 [ 17.912984] mmc_attach_mmc+0x290/0x388 [ 17.916805] mmc_rescan+0x5d8/0xc80 [ 17.920276] process_one_work+0x530/0xf98 [ 17.924269] worker_thread+0x618/0xf38 [ 17.928002] kthread+0x328/0x630 [ 17.931214] ret_from_fork+0x10/0x20 [ 17.934772] [ 17.936250] The buggy address belongs to the object at ffff000803af22e0 [ 17.936250] which belongs to the cache kmalloc-16 of size 16 [ 17.948576] The buggy address is located 19 bytes to the right of [ 17.948576] allocated 12-byte region [ffff000803af22e0, ffff000803af22ec) [ 17.961508] [ 17.962987] The buggy address belongs to the physical page: [ 17.968545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883af2 [ 17.976529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.983037] page_type: f5(slab) [ 17.986173] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 17.993892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.001613] page dumped because: kasan: bad access detected [ 18.007167] [ 18.008642] Memory state around the buggy address: [ 18.013423] ffff000803af2180: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 18.020627] ffff000803af2200: 00 00 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 18.027835] >ffff000803af2280: 00 05 fc fc 00 04 fc fc 00 04 fc fc 00 04 fc fc [ 18.035031] ^ [ 18.042153] ffff000803af2300: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049358] ffff000803af2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.056561] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 16.819797] ================================================================== [ 16.826377] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.833315] Write of size 1 at addr ffff000800dac973 by task kunit_try_catch/185 [ 16.840691] [ 16.842179] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G N 6.15.5-rc2 #1 PREEMPT [ 16.842233] Tainted: [N]=TEST [ 16.842247] Hardware name: WinLink E850-96 board (DT) [ 16.842269] Call trace: [ 16.842282] show_stack+0x20/0x38 (C) [ 16.842317] dump_stack_lvl+0x8c/0xd0 [ 16.842357] print_report+0x118/0x608 [ 16.842389] kasan_report+0xdc/0x128 [ 16.842419] __asan_report_store1_noabort+0x20/0x30 [ 16.842453] kmalloc_oob_right+0x5a4/0x660 [ 16.842490] kunit_try_run_case+0x170/0x3f0 [ 16.842528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.842567] kthread+0x328/0x630 [ 16.842604] ret_from_fork+0x10/0x20 [ 16.842638] [ 16.903799] Allocated by task 185: [ 16.907188] kasan_save_stack+0x3c/0x68 [ 16.911003] kasan_save_track+0x20/0x40 [ 16.914824] kasan_save_alloc_info+0x40/0x58 [ 16.919075] __kasan_kmalloc+0xd4/0xd8 [ 16.922809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.927322] kmalloc_oob_right+0xb0/0x660 [ 16.931315] kunit_try_run_case+0x170/0x3f0 [ 16.935482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.940950] kthread+0x328/0x630 [ 16.944162] ret_from_fork+0x10/0x20 [ 16.947721] [ 16.949199] The buggy address belongs to the object at ffff000800dac900 [ 16.949199] which belongs to the cache kmalloc-128 of size 128 [ 16.961700] The buggy address is located 0 bytes to the right of [ 16.961700] allocated 115-byte region [ffff000800dac900, ffff000800dac973) [ 16.974631] [ 16.976110] The buggy address belongs to the physical page: [ 16.981668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 16.989649] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.997289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.004232] page_type: f5(slab) [ 17.007368] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.015088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.022815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.030625] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.038439] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 17.046251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.054059] page dumped because: kasan: bad access detected [ 17.059612] [ 17.061087] Memory state around the buggy address: [ 17.065869] ffff000800dac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.073070] ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.080279] >ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.087476] ^ [ 17.094337] ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.101545] ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.108745] ================================================================== [ 17.121316] ================================================================== [ 17.128452] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.135392] Write of size 1 at addr ffff000800dac978 by task kunit_try_catch/185 [ 17.142770] [ 17.144256] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.144310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.144325] Hardware name: WinLink E850-96 board (DT) [ 17.144343] Call trace: [ 17.144357] show_stack+0x20/0x38 (C) [ 17.144390] dump_stack_lvl+0x8c/0xd0 [ 17.144427] print_report+0x118/0x608 [ 17.144457] kasan_report+0xdc/0x128 [ 17.144486] __asan_report_store1_noabort+0x20/0x30 [ 17.144520] kmalloc_oob_right+0x538/0x660 [ 17.144551] kunit_try_run_case+0x170/0x3f0 [ 17.144589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.144628] kthread+0x328/0x630 [ 17.144662] ret_from_fork+0x10/0x20 [ 17.144693] [ 17.207092] Allocated by task 185: [ 17.210481] kasan_save_stack+0x3c/0x68 [ 17.214297] kasan_save_track+0x20/0x40 [ 17.218118] kasan_save_alloc_info+0x40/0x58 [ 17.222370] __kasan_kmalloc+0xd4/0xd8 [ 17.226103] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.230616] kmalloc_oob_right+0xb0/0x660 [ 17.234609] kunit_try_run_case+0x170/0x3f0 [ 17.238776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.244244] kthread+0x328/0x630 [ 17.247456] ret_from_fork+0x10/0x20 [ 17.251015] [ 17.252492] The buggy address belongs to the object at ffff000800dac900 [ 17.252492] which belongs to the cache kmalloc-128 of size 128 [ 17.264991] The buggy address is located 5 bytes to the right of [ 17.264991] allocated 115-byte region [ffff000800dac900, ffff000800dac973) [ 17.277924] [ 17.279404] The buggy address belongs to the physical page: [ 17.284961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 17.292943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.300580] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.307525] page_type: f5(slab) [ 17.310661] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.318382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.326108] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.333920] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.341733] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 17.349544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.357350] page dumped because: kasan: bad access detected [ 17.362906] [ 17.364381] Memory state around the buggy address: [ 17.369161] ffff000800dac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.376365] ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.383571] >ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.390770] ^ [ 17.397893] ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.405098] ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.412299] ================================================================== [ 17.419632] ================================================================== [ 17.426711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.433652] Read of size 1 at addr ffff000800dac980 by task kunit_try_catch/185 [ 17.440943] [ 17.442427] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.442478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.442493] Hardware name: WinLink E850-96 board (DT) [ 17.442510] Call trace: [ 17.442523] show_stack+0x20/0x38 (C) [ 17.442553] dump_stack_lvl+0x8c/0xd0 [ 17.442588] print_report+0x118/0x608 [ 17.442619] kasan_report+0xdc/0x128 [ 17.442649] __asan_report_load1_noabort+0x20/0x30 [ 17.442685] kmalloc_oob_right+0x5d0/0x660 [ 17.442716] kunit_try_run_case+0x170/0x3f0 [ 17.442750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.442785] kthread+0x328/0x630 [ 17.442818] ret_from_fork+0x10/0x20 [ 17.442851] [ 17.505178] Allocated by task 185: [ 17.508565] kasan_save_stack+0x3c/0x68 [ 17.512383] kasan_save_track+0x20/0x40 [ 17.516202] kasan_save_alloc_info+0x40/0x58 [ 17.520456] __kasan_kmalloc+0xd4/0xd8 [ 17.524188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.528702] kmalloc_oob_right+0xb0/0x660 [ 17.532695] kunit_try_run_case+0x170/0x3f0 [ 17.536861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.542330] kthread+0x328/0x630 [ 17.545542] ret_from_fork+0x10/0x20 [ 17.549101] [ 17.550577] The buggy address belongs to the object at ffff000800dac900 [ 17.550577] which belongs to the cache kmalloc-128 of size 128 [ 17.563077] The buggy address is located 13 bytes to the right of [ 17.563077] allocated 115-byte region [ffff000800dac900, ffff000800dac973) [ 17.576097] [ 17.577576] The buggy address belongs to the physical page: [ 17.583132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 17.591115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.598753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.605698] page_type: f5(slab) [ 17.608831] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.616555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.624281] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.632094] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.639906] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 17.647717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.655523] page dumped because: kasan: bad access detected [ 17.661078] [ 17.662554] Memory state around the buggy address: [ 17.667335] ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674537] ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.681743] >ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.688943] ^ [ 17.692160] ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.699363] ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.706564] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 162.762214] WARNING: CPU: 6 PID: 706 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 162.769680] Modules linked in: [ 162.772727] CPU: 6 UID: 0 PID: 706 Comm: kunit_try_catch Tainted: G B D W N 6.15.5-rc2 #1 PREEMPT [ 162.782625] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 162.788428] Hardware name: WinLink E850-96 board (DT) [ 162.793467] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 162.800406] pc : intlog10+0x38/0x48 [ 162.803878] lr : intlog10_test+0xe4/0x200 [ 162.807871] sp : ffff80008ac27c10 [ 162.811171] x29: ffff80008ac27c90 x28: 0000000000000000 x27: 0000000000000000 [ 162.818287] x26: 1fffe0010031bcc1 x25: 0000000000000000 x24: ffff80008ac27ce0 [ 162.825405] x23: ffff80008ac27d00 x22: 0000000000000000 x21: 1ffff00011584f82 [ 162.832523] x20: ffff800083c35180 x19: ffff800087bc7990 x18: 000000006135fe5e [ 162.839641] x17: 0000000000000001 x16: ffff00085b014fe0 x15: 000000005b0a5111 [ 162.846759] x14: 000000006808c972 x13: 1fffe0010b6029e0 x12: ffff700010f39b71 [ 162.853877] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff800081214f04 [ 162.860995] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 162.868113] x5 : ffff700011584f82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a30 [ 162.875231] x2 : 1ffff00010786a30 x1 : 0000000000000003 x0 : 0000000000000000 [ 162.882351] Call trace: [ 162.884782] intlog10+0x38/0x48 (P) [ 162.888254] kunit_try_run_case+0x170/0x3f0 [ 162.892420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.897888] kthread+0x328/0x630 [ 162.901100] ret_from_fork+0x10/0x20 [ 162.904660] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 162.559786] WARNING: CPU: 3 PID: 688 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 162.567078] Modules linked in: [ 162.570125] CPU: 3 UID: 0 PID: 688 Comm: kunit_try_catch Tainted: G B D N 6.15.5-rc2 #1 PREEMPT [ 162.580026] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 162.584959] Hardware name: WinLink E850-96 board (DT) [ 162.589998] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 162.596936] pc : intlog2+0xd8/0xf8 [ 162.600322] lr : intlog2_test+0xe4/0x200 [ 162.604228] sp : ffff80008ab07c10 [ 162.607527] x29: ffff80008ab07c90 x28: 0000000000000000 x27: 0000000000000000 [ 162.614644] x26: 1fffe001001b4521 x25: 0000000000000000 x24: ffff80008ab07ce0 [ 162.621762] x23: ffff80008ab07d00 x22: 0000000000000000 x21: 1ffff00011560f82 [ 162.628880] x20: ffff800083c35080 x19: ffff800087bc7990 x18: 00000000acaa77a3 [ 162.635998] x17: 0000000000000001 x16: ffff00085afaefe0 x15: 0000000000000000 [ 162.643116] x14: 00000000f1f1f1f1 x13: 1fffe0010b5f5de0 x12: ffff700010f39b71 [ 162.650234] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff800081215104 [ 162.657352] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 162.664470] x5 : ffff700011560f82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a10 [ 162.671588] x2 : 1ffff00010786a10 x1 : 0000000000000003 x0 : 0000000000000000 [ 162.678709] Call trace: [ 162.681140] intlog2+0xd8/0xf8 (P) [ 162.684525] kunit_try_run_case+0x170/0x3f0 [ 162.688689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.694157] kthread+0x328/0x630 [ 162.697371] ret_from_fork+0x10/0x20 [ 162.700932] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)