{ "log-parser-boot": { "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_right-d8ee5c79d7846c3db3883666245a0b3c1f7c0f7d8c2fb8eab630a92cf16beb15": { "log_lines": [ "[ 18.541381] ==================================================================\n[ 18.548701] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660\n[ 18.555761] Write of size 1 at addr ffff1b1dd4b72073 by task kunit_try_catch/204\n[ 18.563249] \n[ 18.564787] CPU: 4 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G N 6.13.3 #1\n[ 18.564812] Tainted: [N]=TEST\n[ 18.564819] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 18.564831] Call trace:\n[ 18.564838] show_stack+0x20/0x38 (C)\n[ 18.564857] dump_stack_lvl+0x8c/0xd0\n[ 18.564874] print_report+0x118/0x5e0\n[ 18.564892] kasan_report+0xc8/0x118\n[ 18.564908] __asan_report_store1_noabort+0x20/0x30\n[ 18.564926] kmalloc_oob_right+0x5a4/0x660\n[ 18.564940] kunit_try_run_case+0x14c/0x3d0\n[ 18.564960] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 18.564977] kthread+0x24c/0x2d0\n[ 18.564995] ret_from_fork+0x10/0x20\n[ 18.565012] \n[ 18.626979] Allocated by task 204:\n[ 18.630432] kasan_save_stack+0x3c/0x68\n[ 18.634338] kasan_save_track+0x20/0x40\n[ 18.638241] kasan_save_alloc_info+0x40/0x58\n[ 18.642580] __kasan_kmalloc+0xd4/0xd8\n[ 18.646393] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 18.650990] kmalloc_oob_right+0xb0/0x660\n[ 18.655065] kunit_try_run_case+0x14c/0x3d0\n[ 18.659314] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 18.664874] kthread+0x24c/0x2d0\n[ 18.668159] ret_from_fork+0x10/0x20\n[ 18.671790] \n[ 18.673311] The buggy address belongs to the object at ffff1b1dd4b72000\n[ 18.673311] which belongs to the cache kmalloc-128 of size 128\n[ 18.685965] The buggy address is located 0 bytes to the right of\n[ 18.685965] allocated 115-byte region [ffff1b1dd4b72000, ffff1b1dd4b72073)\n[ 18.699055] \n[ 18.700585] The buggy address belongs to the physical page:\n[ 18.706228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 18.714325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 18.722075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 18.729127] page_type: f5(slab)\n[ 18.732325] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 18.740165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 18.748004] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 18.755929] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 18.763854] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 18.771777] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 18.779697] page dumped because: kasan: bad access detected\n[ 18.785340] \n[ 18.786861] Memory state around the buggy address:\n[ 18.791721] ffff1b1dd4b71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 18.799029] ffff1b1dd4b71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 18.806334] >ffff1b1dd4b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 18.813636] ^\n[ 18.820592] ffff1b1dd4b72080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 18.827906] ffff1b1dd4b72100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 18.835212] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_right-61623d8b3bbf81de6e0a3e8287ff3681173c2f80d245edc9ad1e37cb3148b9d0": { "log_lines": [ "[ 18.848042] ==================================================================\n[ 18.855347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660\n[ 18.862398] Write of size 1 at addr ffff1b1dd4b72078 by task kunit_try_catch/204\n[ 18.869891] \n[ 18.871426] CPU: 4 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 18.871450] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 18.871457] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 18.871466] Call trace:\n[ 18.871472] show_stack+0x20/0x38 (C)\n[ 18.871487] dump_stack_lvl+0x8c/0xd0\n[ 18.871500] print_report+0x118/0x5e0\n[ 18.871516] kasan_report+0xc8/0x118\n[ 18.871531] __asan_report_store1_noabort+0x20/0x30\n[ 18.871550] kmalloc_oob_right+0x538/0x660\n[ 18.871563] kunit_try_run_case+0x14c/0x3d0\n[ 18.871581] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 18.871597] kthread+0x24c/0x2d0\n[ 18.871612] ret_from_fork+0x10/0x20\n[ 18.871627] \n[ 18.934815] Allocated by task 204:\n[ 18.938267] kasan_save_stack+0x3c/0x68\n[ 18.942170] kasan_save_track+0x20/0x40\n[ 18.946073] kasan_save_alloc_info+0x40/0x58\n[ 18.950410] __kasan_kmalloc+0xd4/0xd8\n[ 18.954225] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 18.958822] kmalloc_oob_right+0xb0/0x660\n[ 18.962896] kunit_try_run_case+0x14c/0x3d0\n[ 18.967147] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 18.972705] kthread+0x24c/0x2d0\n[ 18.975991] ret_from_fork+0x10/0x20\n[ 18.979622] \n[ 18.981144] The buggy address belongs to the object at ffff1b1dd4b72000\n[ 18.981144] which belongs to the cache kmalloc-128 of size 128\n[ 18.993797] The buggy address is located 5 bytes to the right of\n[ 18.993797] allocated 115-byte region [ffff1b1dd4b72000, ffff1b1dd4b72073)\n[ 19.006885] \n[ 19.008415] The buggy address belongs to the physical page:\n[ 19.014057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 19.022158] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 19.029909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 19.036955] page_type: f5(slab)\n[ 19.040149] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 19.047989] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 19.055829] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 19.063753] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 19.071678] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 19.079600] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 19.087521] page dumped because: kasan: bad access detected\n[ 19.093162] \n[ 19.094683] Memory state around the buggy address:\n[ 19.099542] ffff1b1dd4b71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.106848] ffff1b1dd4b71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.114153] >ffff1b1dd4b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 19.121463] ^\n[ 19.128679] ffff1b1dd4b72080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.135983] ffff1b1dd4b72100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.143287] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_right-73d6dd7cbb18e903a0ff2a4432d902e0c7dbeb5b0d38351d2c8e34462800f8d3": { "log_lines": [ "[ 19.150729] ==================================================================\n[ 19.158045] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660\n[ 19.165094] Read of size 1 at addr ffff1b1dd4b72080 by task kunit_try_catch/204\n[ 19.172499] \n[ 19.174024] CPU: 4 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 19.174048] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 19.174055] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 19.174064] Call trace:\n[ 19.174069] show_stack+0x20/0x38 (C)\n[ 19.174085] dump_stack_lvl+0x8c/0xd0\n[ 19.174099] print_report+0x118/0x5e0\n[ 19.174114] kasan_report+0xc8/0x118\n[ 19.174130] __asan_report_load1_noabort+0x20/0x30\n[ 19.174148] kmalloc_oob_right+0x5d0/0x660\n[ 19.174162] kunit_try_run_case+0x14c/0x3d0\n[ 19.174180] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 19.174196] kthread+0x24c/0x2d0\n[ 19.174211] ret_from_fork+0x10/0x20\n[ 19.174226] \n[ 19.237306] Allocated by task 204:\n[ 19.240757] kasan_save_stack+0x3c/0x68\n[ 19.244662] kasan_save_track+0x20/0x40\n[ 19.248564] kasan_save_alloc_info+0x40/0x58\n[ 19.252901] __kasan_kmalloc+0xd4/0xd8\n[ 19.256715] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 19.261312] kmalloc_oob_right+0xb0/0x660\n[ 19.265385] kunit_try_run_case+0x14c/0x3d0\n[ 19.269636] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 19.275199] kthread+0x24c/0x2d0\n[ 19.278484] ret_from_fork+0x10/0x20\n[ 19.282115] \n[ 19.283643] The buggy address belongs to the object at ffff1b1dd4b72000\n[ 19.283643] which belongs to the cache kmalloc-128 of size 128\n[ 19.296295] The buggy address is located 13 bytes to the right of\n[ 19.296295] allocated 115-byte region [ffff1b1dd4b72000, ffff1b1dd4b72073)\n[ 19.309472] \n[ 19.310995] The buggy address belongs to the physical page:\n[ 19.316633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 19.324732] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 19.332483] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 19.339529] page_type: f5(slab)\n[ 19.342726] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 19.350566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 19.358405] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 19.366330] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 19.374254] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 19.382179] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 19.390101] page dumped because: kasan: bad access detected\n[ 19.395739] \n[ 19.397260] Memory state around the buggy address:\n[ 19.402111] ffff1b1dd4b71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.409415] ffff1b1dd4b72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 19.416720] >ffff1b1dd4b72080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.424032] ^\n[ 19.427314] ffff1b1dd4b72100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.434618] ffff1b1dd4b72180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.441921] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_left-456897357f7e1b12d851814dda79c54176651956915ed911ed5b01e0c493a746": { "log_lines": [ "[ 19.453578] ==================================================================\n[ 19.464695] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320\n[ 19.471671] Read of size 1 at addr ffff1b1dc0c7c73f by task kunit_try_catch/206\n[ 19.479082] \n[ 19.480615] CPU: 3 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 19.480640] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 19.480648] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 19.480659] Call trace:\n[ 19.480666] show_stack+0x20/0x38 (C)\n[ 19.480682] dump_stack_lvl+0x8c/0xd0\n[ 19.480697] print_report+0x118/0x5e0\n[ 19.480715] kasan_report+0xc8/0x118\n[ 19.480731] __asan_report_load1_noabort+0x20/0x30\n[ 19.480750] kmalloc_oob_left+0x2ec/0x320\n[ 19.480764] kunit_try_run_case+0x14c/0x3d0\n[ 19.480784] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 19.480801] kthread+0x24c/0x2d0\n[ 19.480818] ret_from_fork+0x10/0x20\n[ 19.480834] \n[ 19.543895] Allocated by task 79:\n[ 19.547262] kasan_save_stack+0x3c/0x68\n[ 19.551166] kasan_save_track+0x20/0x40\n[ 19.555069] kasan_save_alloc_info+0x40/0x58\n[ 19.559415] __kasan_kmalloc+0xd4/0xd8\n[ 19.563229] __kmalloc_node_track_caller_noprof+0x184/0x4b8\n[ 19.568882] kstrdup+0x54/0xc8\n[ 19.571998] kstrdup_const+0x48/0x60\n[ 19.575638] __kernfs_new_node+0xb0/0x590\n[ 19.579717] kernfs_new_node+0x100/0x1f8\n[ 19.583707] kernfs_create_link+0xac/0x228\n[ 19.587869] sysfs_do_create_link_sd+0x8c/0x128\n[ 19.592476] sysfs_create_link+0x48/0xb8\n[ 19.596467] device_add+0x54c/0x12b8\n[ 19.600115] regulator_register+0x1090/0x2250\n[ 19.604549] devm_regulator_register+0x64/0xd8\n[ 19.609069] rpmh_regulator_probe+0x54c/0x928\n[ 19.613502] platform_probe+0xcc/0x198\n[ 19.617318] really_probe+0x188/0x7f0\n[ 19.621046] __driver_probe_device+0x164/0x378\n[ 19.625563] driver_probe_device+0x64/0x180\n[ 19.629820] __device_attach_driver+0x174/0x280\n[ 19.634423] bus_for_each_drv+0x110/0x1a8\n[ 19.638497] __device_attach_async_helper+0x194/0x240\n[ 19.643631] async_run_entry_fn+0x98/0x3c0\n[ 19.647793] process_one_work+0x530/0xf98\n[ 19.651867] worker_thread+0x614/0xf28\n[ 19.655679] kthread+0x24c/0x2d0\n[ 19.658966] ret_from_fork+0x10/0x20\n[ 19.662609] \n[ 19.664138] The buggy address belongs to the object at ffff1b1dc0c7c720\n[ 19.664138] which belongs to the cache kmalloc-16 of size 16\n[ 19.676623] The buggy address is located 19 bytes to the right of\n[ 19.676623] allocated 12-byte region [ffff1b1dc0c7c720, ffff1b1dc0c7c72c)\n[ 19.689726] \n[ 19.691256] The buggy address belongs to the physical page:\n[ 19.696899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 19.705002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 19.711614] page_type: f5(slab)\n[ 19.714811] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 19.722655] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 19.730495] page dumped because: kasan: bad access detected\n[ 19.736139] \n[ 19.737667] Memory state around the buggy address:\n[ 19.742524] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 19.749837] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 19.757149] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc\n[ 19.764459] ^\n[ 19.769587] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.776900] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 19.784210] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_node_oob_right-ad36d19ed1b789367ffa41d832bad0c4fdc1c2521bfa9a0dd925ac64749e3fd3": { "log_lines": [ "[ 19.795421] ==================================================================\n[ 19.806446] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330\n[ 19.813944] Read of size 1 at addr ffff1b1dd58d5000 by task kunit_try_catch/208\n[ 19.821347] \n[ 19.822884] CPU: 6 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 19.822913] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 19.822921] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 19.822935] Call trace:\n[ 19.822943] show_stack+0x20/0x38 (C)\n[ 19.822961] dump_stack_lvl+0x8c/0xd0\n[ 19.822977] print_report+0x118/0x5e0\n[ 19.822993] kasan_report+0xc8/0x118\n[ 19.823008] __asan_report_load1_noabort+0x20/0x30\n[ 19.823027] kmalloc_node_oob_right+0x2f4/0x330\n[ 19.823042] kunit_try_run_case+0x14c/0x3d0\n[ 19.823063] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 19.823080] kthread+0x24c/0x2d0\n[ 19.823097] ret_from_fork+0x10/0x20\n[ 19.823114] \n[ 19.851662] dwc3 a800000.usb: Adding to iommu group 6\n[ 19.851748] Allocated by task 208:\n[ 19.878793] platform a600000.usb: deferred probe pending: dwc3: failed to initialize core\n[ 19.881519] kasan_save_stack+0x3c/0x68\n[ 19.881536] kasan_save_track+0x20/0x40\n[ 19.885175] platform a800000.usb: deferred probe pending: dwc3: failed to initialize core\n[ 19.886657] kasan_save_alloc_info+0x40/0x58\n[ 19.891770] platform 17d43000.cpufreq: deferred probe pending: qcom-cpufreq-hw: Failed to find icc paths\n[ 19.895189] __kasan_kmalloc+0xd4/0xd8\n[ 19.895203] __kmalloc_cache_node_noprof+0x168/0x3d0\n[ 19.903459] platform 1c00000.pcie: deferred probe pending: (reason unknown)\n[ 19.907318] kmalloc_node_oob_right+0xbc/0x330\n[ 19.907333] kunit_try_run_case+0x14c/0x3d0\n[ 19.911260] qnoc-sdm845 1380000.interconnect: sync_state() pending due to 1436400.pmu\n[ 19.919440] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 19.919456] kthread+0x24c/0x2d0\n[ 19.923775] qnoc-sdm845 1380000.interconnect: sync_state() pending due to 114a000.pmu\n[ 19.933304] ret_from_fork+0x10/0x20\n[ 19.933318] \n[ 19.937128] qnoc-sdm845 1500000.interconnect: sync_state() pending due to 1d84000.ufshc\n[ 19.942113] The buggy address belongs to the object at ffff1b1dd58d4000\n[ 19.942113] which belongs to the cache kmalloc-4k of size 4096\n[ 19.949160] qnoc-sdm845 1380000.interconnect: sync_state() pending due to 1d84000.ufshc\n[ 19.953628] The buggy address is located 0 bytes to the right of\n[ 19.953628] allocated 4096-byte region [ffff1b1dd58d4000, ffff1b1dd58d5000)\n[ 19.957874] qnoc-sdm845 16e0000.interconnect: sync_state() pending due to 1d84000.ufshc\n[ 19.965744] \n[ 19.965751] The buggy address belongs to the physical page:\n[ 19.971368] qnoc-sdm845 1500000.interconnect: sync_state() pending due to aa00000.video-codec\n[ 19.974547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1158d0\n[ 19.982462] qnoc-sdm845 1380000.interconnect: sync_state() pending due to aa00000.video-codec\n[ 19.986045] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 19.987587] qnoc-sdm845 1740000.interconnect: sync_state() pending due to aa00000.video-codec\n[ 19.995641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 20.008286] qnoc-sdm845 1380000.interconnect: sync_state() pending due to ae00000.display-subsystem\n[ 20.016323] page_type: f5(slab)\n[ 20.016341] raw: 0bfffe0000000040 ffff1b1dc0003040 dead000000000122 0000000000000000\n[ 20.029483] qnoc-sdm845 1740000.interconnect: sync_state() pending due to ae00000.display-subsystem\n[ 20.037542] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000\n[ 20.039066] qnoc-sdm845 1380000.interconnect: sync_state() pending due to 5000000.gpu\n[ 20.044683] head: 0bfffe0000000040 ffff1b1dc0003040 dead000000000122 0000000000000000\n[ 20.053414] qnoc-sdm845 17900000.interconnect: sync_state() pending due to aa00000.video-codec\n[ 20.061355] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000\n[ 20.061370] head: 0bfffe0000000003 fffffe6c37563401 ffffffffffffffff 0000000000000000\n[ 20.069974] qnoc-sdm845 17900000.interconnect: sync_state() pending due to 1d84000.ufshc\n[ 20.077675] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000\n[ 20.077687] page dumped because: kasan: bad access detected\n[ 20.086293] qnoc-sdm845 17900000.interconnect: sync_state() pending due to 1436400.pmu\n[ 20.093291] \n[ 20.093297] Memory state around the buggy address:\n[ 20.093308] ffff1b1dd58d4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 20.102497] qcom-rpmhpd 179c0000.rsc:power-controller: sync_state() pending due to ae00000.display-subsystem\n[ 20.105587] ffff1b1dd58d4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 20.105600] >ffff1b1dd58d5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 20.113416] qcom-rpmhpd 179c0000.rsc:power-controller: sync_state() pending due to aa00000.video-codec\n[ 20.122515] ^\n[ 20.122524] ffff1b1dd58d5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 20.130347] qcom-rpmhpd 179c0000.rsc:power-controller: sync_state() pending due to 4080000.remoteproc\n[ 20.138224] ffff1b1dd58d5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 20.138235] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_track_caller_oob_right-914c55e93865be7c5f509566804985542c3ba7c5726a447b86c70a44b42c4783": { "log_lines": [ "[ 20.761503] ==================================================================\n[ 20.768819] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490\n[ 20.777018] Write of size 1 at addr ffff1b1dc21f2278 by task kunit_try_catch/211\n[ 20.784512] \n[ 20.786045] CPU: 3 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 20.786068] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 20.786076] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 20.786086] Call trace:\n[ 20.786093] show_stack+0x20/0x38 (C)\n[ 20.786108] dump_stack_lvl+0x8c/0xd0\n[ 20.786124] print_report+0x118/0x5e0\n[ 20.786143] kasan_report+0xc8/0x118\n[ 20.786159] __asan_report_store1_noabort+0x20/0x30\n[ 20.786178] kmalloc_track_caller_oob_right+0x420/0x490\n[ 20.786195] kunit_try_run_case+0x14c/0x3d0\n[ 20.786214] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 20.786231] kthread+0x24c/0x2d0\n[ 20.786247] ret_from_fork+0x10/0x20\n[ 20.786264] \n[ 20.850653] Allocated by task 211:\n[ 20.854111] kasan_save_stack+0x3c/0x68\n[ 20.858017] kasan_save_track+0x20/0x40\n[ 20.861926] kasan_save_alloc_info+0x40/0x58\n[ 20.866265] __kasan_kmalloc+0xd4/0xd8\n[ 20.870084] __kmalloc_node_track_caller_noprof+0x184/0x4b8\n[ 20.875739] kmalloc_track_caller_oob_right+0x184/0x490\n[ 20.881042] kunit_try_run_case+0x14c/0x3d0\n[ 20.885297] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 20.890865] kthread+0x24c/0x2d0\n[ 20.894156] ret_from_fork+0x10/0x20\n[ 20.897802] \n[ 20.899331] The buggy address belongs to the object at ffff1b1dc21f2200\n[ 20.899331] which belongs to the cache kmalloc-128 of size 128\n[ 20.911988] The buggy address is located 0 bytes to the right of\n[ 20.911988] allocated 120-byte region [ffff1b1dc21f2200, ffff1b1dc21f2278)\n[ 20.925087] \n[ 20.926616] The buggy address belongs to the physical page:\n[ 20.932266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021f2\n[ 20.940373] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 20.948127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 20.955182] page_type: f5(slab)\n[ 20.958384] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 20.966225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 20.974066] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 20.981992] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 20.989919] head: 0bfffe0000000001 fffffe6c37087c81 ffffffffffffffff 0000000000000000\n[ 20.997856] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 21.005787] page dumped because: kasan: bad access detected\n[ 21.011435] \n[ 21.012968] Memory state around the buggy address:\n[ 21.017827] ffff1b1dc21f2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 21.025148] ffff1b1dc21f2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 21.032468] >ffff1b1dc21f2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 21.039782] ^\n[ 21.047013] ffff1b1dc21f2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 21.054334] ffff1b1dc21f2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 21.061652] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_big_oob_right-ebd992f4a53a2ca287f05ac9ef254b133d33ce79f63d2aaa434e6e06fccc6b8f": { "log_lines": [ "[ 21.072574] ==================================================================\n[ 21.084838] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0\n[ 21.092248] Write of size 1 at addr ffff1b1dd4775f00 by task kunit_try_catch/213\n[ 21.099739] \n[ 21.101268] CPU: 4 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 21.101293] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 21.101301] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 21.101311] Call trace:\n[ 21.101318] show_stack+0x20/0x38 (C)\n[ 21.101333] dump_stack_lvl+0x8c/0xd0\n[ 21.101347] print_report+0x118/0x5e0\n[ 21.101364] kasan_report+0xc8/0x118\n[ 21.101379] __asan_report_store1_noabort+0x20/0x30\n[ 21.101399] kmalloc_big_oob_right+0x2a4/0x2f0\n[ 21.101415] kunit_try_run_case+0x14c/0x3d0\n[ 21.101435] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 21.101451] kthread+0x24c/0x2d0\n[ 21.101466] ret_from_fork+0x10/0x20\n[ 21.101481] \n[ 21.165048] Allocated by task 213:\n[ 21.168500] kasan_save_stack+0x3c/0x68\n[ 21.172404] kasan_save_track+0x20/0x40\n[ 21.176306] kasan_save_alloc_info+0x40/0x58\n[ 21.180643] __kasan_kmalloc+0xd4/0xd8\n[ 21.184456] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 21.189052] kmalloc_big_oob_right+0xb8/0x2f0\n[ 21.193472] kunit_try_run_case+0x14c/0x3d0\n[ 21.197722] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 21.203283] kthread+0x24c/0x2d0\n[ 21.206567] ret_from_fork+0x10/0x20\n[ 21.210197] \n[ 21.211725] The buggy address belongs to the object at ffff1b1dd4774000\n[ 21.211725] which belongs to the cache kmalloc-8k of size 8192\n[ 21.224376] The buggy address is located 0 bytes to the right of\n[ 21.224376] allocated 7936-byte region [ffff1b1dd4774000, ffff1b1dd4775f00)\n[ 21.237550] \n[ 21.239073] The buggy address belongs to the physical page:\n[ 21.244720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114770\n[ 21.252817] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 21.260566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 21.267613] page_type: f5(slab)\n[ 21.270810] raw: 0bfffe0000000040 ffff1b1dc0003180 dead000000000122 0000000000000000\n[ 21.278646] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000\n[ 21.286482] head: 0bfffe0000000040 ffff1b1dc0003180 dead000000000122 0000000000000000\n[ 21.294405] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000\n[ 21.302328] head: 0bfffe0000000003 fffffe6c3751dc01 ffffffffffffffff 0000000000000000\n[ 21.310250] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000\n[ 21.318170] page dumped because: kasan: bad access detected\n[ 21.323807] \n[ 21.325328] Memory state around the buggy address:\n[ 21.330189] ffff1b1dd4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.337502] ffff1b1dd4775e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.344815] >ffff1b1dd4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 21.352125] ^\n[ 21.355406] ffff1b1dd4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 21.362720] ffff1b1dd4776000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 21.370032] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_large_oob_right-2bed388316bdc9c0c2d139ad0d1d60bbb3293802a2bf032fb52aeab2504de22a": { "log_lines": [ "[ 21.382158] ==================================================================\n[ 21.393628] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8\n[ 21.401210] Write of size 1 at addr ffff1b1dd5b8a00a by task kunit_try_catch/215\n[ 21.408700] \n[ 21.410229] CPU: 5 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 21.410253] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 21.410261] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 21.410270] Call trace:\n[ 21.410276] show_stack+0x20/0x38 (C)\n[ 21.410293] dump_stack_lvl+0x8c/0xd0\n[ 21.410306] print_report+0x118/0x5e0\n[ 21.410323] kasan_report+0xc8/0x118\n[ 21.410338] __asan_report_store1_noabort+0x20/0x30\n[ 21.410357] kmalloc_large_oob_right+0x278/0x2b8\n[ 21.410374] kunit_try_run_case+0x14c/0x3d0\n[ 21.410393] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 21.410411] kthread+0x24c/0x2d0\n[ 21.410426] ret_from_fork+0x10/0x20\n[ 21.410442] \n[ 21.474174] The buggy address belongs to the physical page:\n[ 21.479822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115b88\n[ 21.487927] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 21.495673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 21.502724] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 21.510558] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 21.518392] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 21.526312] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 21.534234] head: 0bfffe0000000002 fffffe6c3756e201 ffffffffffffffff 0000000000000000\n[ 21.542153] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 21.550069] page dumped because: kasan: bad access detected\n[ 21.555706] \n[ 21.557227] Memory state around the buggy address:\n[ 21.562087] ffff1b1dd5b89f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.569398] ffff1b1dd5b89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.576708] >ffff1b1dd5b8a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 21.584016] ^\n[ 21.587556] ffff1b1dd5b8a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 21.594870] ffff1b1dd5b8a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 21.602179] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_use-after-free_in_kmalloc_large_uaf-a61b0f1c93ff46e72cbb24d78b48b3838eed486c14d0384e22a5100bff6758bc": { "log_lines": [ "[ 21.612326] ==================================================================\n[ 21.623977] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8\n[ 21.630685] Read of size 1 at addr ffff1b1dd52c8000 by task kunit_try_catch/217\n[ 21.638082] \n[ 21.639618] CPU: 4 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 21.639642] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 21.639649] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 21.639658] Call trace:\n[ 21.639663] show_stack+0x20/0x38 (C)\n[ 21.639679] dump_stack_lvl+0x8c/0xd0\n[ 21.639692] print_report+0x118/0x5e0\n[ 21.639707] kasan_report+0xc8/0x118\n[ 21.639722] __asan_report_load1_noabort+0x20/0x30\n[ 21.639741] kmalloc_large_uaf+0x2cc/0x2f8\n[ 21.639756] kunit_try_run_case+0x14c/0x3d0\n[ 21.639774] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 21.639791] kthread+0x24c/0x2d0\n[ 21.639806] ret_from_fork+0x10/0x20\n[ 21.639822] \n[ 21.702918] The buggy address belongs to the physical page:\n[ 21.708558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152c8\n[ 21.716658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 21.723278] raw: 0bfffe0000000000 fffffe6c3754b308 ffff1b1e1aea9fc0 0000000000000000\n[ 21.731118] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n[ 21.738953] page dumped because: kasan: bad access detected\n[ 21.744592] \n[ 21.746113] Memory state around the buggy address:\n[ 21.750967] ffff1b1dd52c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.758272] ffff1b1dd52c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.765577] >ffff1b1dd52c8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 21.772889] ^\n[ 21.776169] ffff1b1dd52c8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 21.783474] ffff1b1dd52c8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 21.790779] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_invalid-free_in_kfree-e36fb570826dc0d78ecc9a5ff98c26ecc5d126a65b8db6bb2da03c9b6243b7f3": { "log_lines": [ "[ 21.801750] ==================================================================\n[ 21.812878] BUG: KASAN: invalid-free in kfree+0x270/0x3c8\n[ 21.818358] Free of addr ffff1b1dd52c8001 by task kunit_try_catch/219\n[ 21.824884] \n[ 21.826412] CPU: 4 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 21.826436] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 21.826444] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 21.826453] Call trace:\n[ 21.826459] show_stack+0x20/0x38 (C)\n[ 21.826475] dump_stack_lvl+0x8c/0xd0\n[ 21.826489] print_report+0x118/0x5e0\n[ 21.826506] kasan_report_invalid_free+0xb0/0xd8\n[ 21.826525] __kasan_kfree_large+0x5c/0xa8\n[ 21.826543] free_large_kmalloc+0x58/0x140\n[ 21.826557] kfree+0x270/0x3c8\n[ 21.826571] kmalloc_large_invalid_free+0x108/0x270\n[ 21.826586] kunit_try_run_case+0x14c/0x3d0\n[ 21.826605] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 21.826621] kthread+0x24c/0x2d0\n[ 21.826637] ret_from_fork+0x10/0x20\n[ 21.826653] \n[ 21.898148] The buggy address belongs to the physical page:\n[ 21.903786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152c8\n[ 21.911885] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 21.919636] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 21.926689] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 21.934529] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 21.942369] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 21.950294] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 21.958220] head: 0bfffe0000000002 fffffe6c3754b201 ffffffffffffffff 0000000000000000\n[ 21.966143] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 21.974065] page dumped because: kasan: bad access detected\n[ 21.979703] \n[ 21.981224] Memory state around the buggy address:\n[ 21.986078] ffff1b1dd52c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 21.993383] ffff1b1dd52c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 22.000687] >ffff1b1dd52c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 22.007991] ^\n[ 22.011273] ffff1b1dd52c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 22.018578] ffff1b1dd52c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 22.025881] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_use-after-free_in_page_alloc_uaf-4230554e712ac2c2190a480364826ebc2d9e99ab3b7c0409204b552d27aca45f": { "log_lines": [ "[ 22.046585] ==================================================================\n[ 22.061816] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350\n[ 22.068259] Read of size 1 at addr ffff1b1dd6200000 by task kunit_try_catch/223\n[ 22.075669] \n[ 22.077201] CPU: 3 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 22.077227] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 22.077234] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 22.077245] Call trace:\n[ 22.077252] show_stack+0x20/0x38 (C)\n[ 22.077268] dump_stack_lvl+0x8c/0xd0\n[ 22.077283] print_report+0x118/0x5e0\n[ 22.077301] kasan_report+0xc8/0x118\n[ 22.077317] __asan_report_load1_noabort+0x20/0x30\n[ 22.077337] page_alloc_uaf+0x328/0x350\n[ 22.077353] kunit_try_run_case+0x14c/0x3d0\n[ 22.077374] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 22.077392] kthread+0x24c/0x2d0\n[ 22.077408] ret_from_fork+0x10/0x20\n[ 22.077424] \n[ 22.140313] The buggy address belongs to the physical page:\n[ 22.145957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116200\n[ 22.154059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 22.160680] page_type: f0(buddy)\n[ 22.163964] raw: 0bfffe0000000000 ffff1b1e3d587168 ffff1b1e3d587168 0000000000000000\n[ 22.171809] raw: 0000000000000000 0000000000000009 00000000f0000000 0000000000000000\n[ 22.179649] page dumped because: kasan: bad access detected\n[ 22.185293] \n[ 22.186821] Memory state around the buggy address:\n[ 22.191679] ffff1b1dd61fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 22.198992] ffff1b1dd61fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 22.206304] >ffff1b1dd6200000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 22.213615] ^\n[ 22.216898] ffff1b1dd6200080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 22.224210] ffff1b1dd6200100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 22.231520] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_more_oob_helper-11ea3e8bdbdcd360c2c0e0ee4808333ecc1475e823fc1937720cf6905569a941": { "log_lines": [ "[ 22.558085] ==================================================================\n[ 22.565399] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680\n[ 22.573065] Write of size 1 at addr ffff1b1dd52ba2f0 by task kunit_try_catch/225\n[ 22.580557] \n[ 22.582082] CPU: 4 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 22.582104] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 22.582111] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 22.582119] Call trace:\n[ 22.582125] show_stack+0x20/0x38 (C)\n[ 22.582140] dump_stack_lvl+0x8c/0xd0\n[ 22.582153] print_report+0x118/0x5e0\n[ 22.582170] kasan_report+0xc8/0x118\n[ 22.582185] __asan_report_store1_noabort+0x20/0x30\n[ 22.582204] krealloc_more_oob_helper+0x5c8/0x680\n[ 22.582220] krealloc_more_oob+0x20/0x38\n[ 22.582234] kunit_try_run_case+0x14c/0x3d0\n[ 22.582252] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 22.582268] kthread+0x24c/0x2d0\n[ 22.582283] ret_from_fork+0x10/0x20\n[ 22.582298] \n[ 22.650088] Allocated by task 225:\n[ 22.653538] kasan_save_stack+0x3c/0x68\n[ 22.657440] kasan_save_track+0x20/0x40\n[ 22.661341] kasan_save_alloc_info+0x40/0x58\n[ 22.665677] __kasan_krealloc+0x118/0x178\n[ 22.669752] krealloc_noprof+0x128/0x360\n[ 22.673740] krealloc_more_oob_helper+0x168/0x680\n[ 22.678508] krealloc_more_oob+0x20/0x38\n[ 22.682494] kunit_try_run_case+0x14c/0x3d0\n[ 22.686744] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 22.692298] kthread+0x24c/0x2d0\n[ 22.695582] ret_from_fork+0x10/0x20\n[ 22.699213] \n[ 22.700741] The buggy address belongs to the object at ffff1b1dd52ba200\n[ 22.700741] which belongs to the cache kmalloc-256 of size 256\n[ 22.713391] The buggy address is located 5 bytes to the right of\n[ 22.713391] allocated 235-byte region [ffff1b1dd52ba200, ffff1b1dd52ba2eb)\n[ 22.726486] \n[ 22.728014] The buggy address belongs to the physical page:\n[ 22.733655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152b8\n[ 22.741750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 22.749498] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 22.756551] page_type: f5(slab)\n[ 22.759744] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 22.767581] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 22.775418] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 22.783341] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 22.791263] head: 0bfffe0000000002 fffffe6c3754ae01 ffffffffffffffff 0000000000000000\n[ 22.799183] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 22.807101] page dumped because: kasan: bad access detected\n[ 22.812747] \n[ 22.814268] Memory state around the buggy address:\n[ 22.819118] ffff1b1dd52ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 22.826429] ffff1b1dd52ba200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 22.833740] >ffff1b1dd52ba280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc\n[ 22.841050] ^\n[ 22.848001] ffff1b1dd52ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 22.855305] ffff1b1dd52ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 22.862617] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_more_oob_helper-08e95bc1a089f0f61e00afcf6aaaf244577e0dbe20e17d87866e328e4e432c8f": { "log_lines": [ "[ 24.675423] ==================================================================\n[ 24.682738] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680\n[ 24.690403] Write of size 1 at addr ffff1b1dd52ca0f0 by task kunit_try_catch/229\n[ 24.697891] \n[ 24.699424] CPU: 4 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 24.699446] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 24.699453] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 24.699462] Call trace:\n[ 24.699467] show_stack+0x20/0x38 (C)\n[ 24.699482] dump_stack_lvl+0x8c/0xd0\n[ 24.699494] print_report+0x118/0x5e0\n[ 24.699511] kasan_report+0xc8/0x118\n[ 24.699525] __asan_report_store1_noabort+0x20/0x30\n[ 24.699543] krealloc_more_oob_helper+0x5c8/0x680\n[ 24.699558] krealloc_large_more_oob+0x20/0x38\n[ 24.699573] kunit_try_run_case+0x14c/0x3d0\n[ 24.699591] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 24.699607] kthread+0x24c/0x2d0\n[ 24.699622] ret_from_fork+0x10/0x20\n[ 24.699637] \n[ 24.767947] The buggy address belongs to the physical page:\n[ 24.773586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152c8\n[ 24.781681] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 24.789427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 24.796483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 24.804317] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 24.812151] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 24.820071] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 24.827990] head: 0bfffe0000000002 fffffe6c3754b201 ffffffffffffffff 0000000000000000\n[ 24.835910] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 24.843825] page dumped because: kasan: bad access detected\n[ 24.849463] \n[ 24.850985] Memory state around the buggy address:\n[ 24.855839] ffff1b1dd52c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 24.863142] ffff1b1dd52ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 24.870452] >ffff1b1dd52ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe\n[ 24.877760] ^\n[ 24.884722] ffff1b1dd52ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 24.892033] ffff1b1dd52ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 24.899345] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_more_oob_helper-3f28929a377c6964fdaedf80e24e8c5c0e4009f1cfe8560319c8cf281cafbedb": { "log_lines": [ "[ 24.440435] ==================================================================\n[ 24.451641] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680\n[ 24.459314] Write of size 1 at addr ffff1b1dd52ca0eb by task kunit_try_catch/229\n[ 24.466805] \n[ 24.468337] CPU: 4 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 24.468362] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 24.468369] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 24.468378] Call trace:\n[ 24.468384] show_stack+0x20/0x38 (C)\n[ 24.468400] dump_stack_lvl+0x8c/0xd0\n[ 24.468413] print_report+0x118/0x5e0\n[ 24.468432] kasan_report+0xc8/0x118\n[ 24.468446] __asan_report_store1_noabort+0x20/0x30\n[ 24.468467] krealloc_more_oob_helper+0x614/0x680\n[ 24.468483] krealloc_large_more_oob+0x20/0x38\n[ 24.468497] kunit_try_run_case+0x14c/0x3d0\n[ 24.468517] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 24.468534] kthread+0x24c/0x2d0\n[ 24.468549] ret_from_fork+0x10/0x20\n[ 24.468567] \n[ 24.536893] The buggy address belongs to the physical page:\n[ 24.542533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152c8\n[ 24.550638] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 24.558384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 24.565441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 24.573277] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 24.581111] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 24.589033] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 24.596954] head: 0bfffe0000000002 fffffe6c3754b201 ffffffffffffffff 0000000000000000\n[ 24.604873] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 24.612791] page dumped because: kasan: bad access detected\n[ 24.618434] \n[ 24.619960] Memory state around the buggy address:\n[ 24.624811] ffff1b1dd52c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 24.632121] ffff1b1dd52ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 24.639435] >ffff1b1dd52ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe\n[ 24.646745] ^\n[ 24.653435] ffff1b1dd52ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 24.660747] ffff1b1dd52ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 24.668056] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_more_oob_helper-92ec96126f44ea9c65f4867318fcefeba00ceb801ff8731e3dabdf7112e93498": { "log_lines": [ "[ 22.242707] ==================================================================\n[ 22.253650] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680\n[ 22.261319] Write of size 1 at addr ffff1b1dd52ba2eb by task kunit_try_catch/225\n[ 22.268811] \n[ 22.270339] CPU: 4 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 22.270363] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 22.270370] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 22.270379] Call trace:\n[ 22.270385] show_stack+0x20/0x38 (C)\n[ 22.270400] dump_stack_lvl+0x8c/0xd0\n[ 22.270414] print_report+0x118/0x5e0\n[ 22.270430] kasan_report+0xc8/0x118\n[ 22.270447] __asan_report_store1_noabort+0x20/0x30\n[ 22.270467] krealloc_more_oob_helper+0x614/0x680\n[ 22.270483] krealloc_more_oob+0x20/0x38\n[ 22.270498] kunit_try_run_case+0x14c/0x3d0\n[ 22.270517] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 22.270533] kthread+0x24c/0x2d0\n[ 22.270548] ret_from_fork+0x10/0x20\n[ 22.270563] \n[ 22.338359] Allocated by task 225:\n[ 22.341816] kasan_save_stack+0x3c/0x68\n[ 22.345716] kasan_save_track+0x20/0x40\n[ 22.349611] kasan_save_alloc_info+0x40/0x58\n[ 22.353953] __kasan_krealloc+0x118/0x178\n[ 22.358022] krealloc_noprof+0x128/0x360\n[ 22.362007] krealloc_more_oob_helper+0x168/0x680\n[ 22.366781] krealloc_more_oob+0x20/0x38\n[ 22.370763] kunit_try_run_case+0x14c/0x3d0\n[ 22.375017] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 22.380583] kthread+0x24c/0x2d0\n[ 22.383871] ret_from_fork+0x10/0x20\n[ 22.387504] \n[ 22.389028] The buggy address belongs to the object at ffff1b1dd52ba200\n[ 22.389028] which belongs to the cache kmalloc-256 of size 256\n[ 22.401683] The buggy address is located 0 bytes to the right of\n[ 22.401683] allocated 235-byte region [ffff1b1dd52ba200, ffff1b1dd52ba2eb)\n[ 22.414772] \n[ 22.416295] The buggy address belongs to the physical page:\n[ 22.421941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152b8\n[ 22.430036] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 22.437783] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 22.444836] page_type: f5(slab)\n[ 22.448034] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 22.455870] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 22.463706] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 22.471627] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 22.479548] head: 0bfffe0000000002 fffffe6c3754ae01 ffffffffffffffff 0000000000000000\n[ 22.487470] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 22.495388] page dumped because: kasan: bad access detected\n[ 22.501034] \n[ 22.502556] Memory state around the buggy address:\n[ 22.507412] ffff1b1dd52ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 22.514723] ffff1b1dd52ba200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 22.522033] >ffff1b1dd52ba280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc\n[ 22.529342] ^\n[ 22.536032] ffff1b1dd52ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 22.543343] ffff1b1dd52ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 22.550652] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-b5058e7fc6e0bdac47755007e90957adab19964f0a039c46d83864afbbb564b1": { "log_lines": [ "[ 23.500902] ==================================================================\n[ 23.508228] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50\n[ 23.515897] Write of size 1 at addr ffff1b1dc59664da by task kunit_try_catch/227\n[ 23.523387] \n[ 23.524915] CPU: 4 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 23.524940] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 23.524947] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 23.524957] Call trace:\n[ 23.524963] show_stack+0x20/0x38 (C)\n[ 23.524979] dump_stack_lvl+0x8c/0xd0\n[ 23.524992] print_report+0x118/0x5e0\n[ 23.525008] kasan_report+0xc8/0x118\n[ 23.525023] __asan_report_store1_noabort+0x20/0x30\n[ 23.525042] krealloc_less_oob_helper+0xa80/0xc50\n[ 23.525058] krealloc_less_oob+0x20/0x38\n[ 23.525073] kunit_try_run_case+0x14c/0x3d0\n[ 23.525092] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.525108] kthread+0x24c/0x2d0\n[ 23.525124] ret_from_fork+0x10/0x20\n[ 23.525140] \n[ 23.592937] Allocated by task 227:\n[ 23.596394] kasan_save_stack+0x3c/0x68\n[ 23.600293] kasan_save_track+0x20/0x40\n[ 23.604190] kasan_save_alloc_info+0x40/0x58\n[ 23.608531] __kasan_krealloc+0x118/0x178\n[ 23.612601] krealloc_noprof+0x128/0x360\n[ 23.616583] krealloc_less_oob_helper+0x168/0xc50\n[ 23.621357] krealloc_less_oob+0x20/0x38\n[ 23.625338] kunit_try_run_case+0x14c/0x3d0\n[ 23.629593] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.635159] kthread+0x24c/0x2d0\n[ 23.638449] ret_from_fork+0x10/0x20\n[ 23.642083] \n[ 23.643605] The buggy address belongs to the object at ffff1b1dc5966400\n[ 23.643605] which belongs to the cache kmalloc-256 of size 256\n[ 23.656258] The buggy address is located 17 bytes to the right of\n[ 23.656258] allocated 201-byte region [ffff1b1dc5966400, ffff1b1dc59664c9)\n[ 23.669435] \n[ 23.670959] The buggy address belongs to the physical page:\n[ 23.676606] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105964\n[ 23.684701] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 23.692449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 23.699502] page_type: f5(slab)\n[ 23.702700] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 23.710536] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 23.718372] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 23.726293] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 23.734213] head: 0bfffe0000000002 fffffe6c37165901 ffffffffffffffff 0000000000000000\n[ 23.742135] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 23.750053] page dumped because: kasan: bad access detected\n[ 23.755698] \n[ 23.757219] Memory state around the buggy address:\n[ 23.762073] ffff1b1dc5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.769384] ffff1b1dc5966400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 23.776695] >ffff1b1dc5966480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc\n[ 23.784004] ^\n[ 23.790173] ffff1b1dc5966500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.797483] ffff1b1dc5966580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.804792] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-8fa658c444d6e8c454770777b5aa5d1c14d3269928516fd8df9794528f1ef505": { "log_lines": [ "[ 25.145332] ==================================================================\n[ 25.152648] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50\n[ 25.160317] Write of size 1 at addr ffff1b1dd52f20d0 by task kunit_try_catch/231\n[ 25.167810] \n[ 25.169335] CPU: 4 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 25.169358] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 25.169365] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 25.169374] Call trace:\n[ 25.169380] show_stack+0x20/0x38 (C)\n[ 25.169395] dump_stack_lvl+0x8c/0xd0\n[ 25.169408] print_report+0x118/0x5e0\n[ 25.169424] kasan_report+0xc8/0x118\n[ 25.169440] __asan_report_store1_noabort+0x20/0x30\n[ 25.169459] krealloc_less_oob_helper+0xb9c/0xc50\n[ 25.169475] krealloc_large_less_oob+0x20/0x38\n[ 25.169489] kunit_try_run_case+0x14c/0x3d0\n[ 25.169507] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 25.169524] kthread+0x24c/0x2d0\n[ 25.169540] ret_from_fork+0x10/0x20\n[ 25.169556] \n[ 25.237837] The buggy address belongs to the physical page:\n[ 25.243478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152f0\n[ 25.251576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 25.259328] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 25.266379] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.274218] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.282055] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.289981] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.297905] head: 0bfffe0000000002 fffffe6c3754bc01 ffffffffffffffff 0000000000000000\n[ 25.305828] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 25.313751] page dumped because: kasan: bad access detected\n[ 25.319389] \n[ 25.320920] Memory state around the buggy address:\n[ 25.325771] ffff1b1dd52f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.333082] ffff1b1dd52f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.340393] >ffff1b1dd52f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe\n[ 25.347702] ^\n[ 25.353605] ffff1b1dd52f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.360916] ffff1b1dd52f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.368223] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-132387ae6b1ebed2c33b97da701196704367833f9cf12b8f35eb9becf418f5b5": { "log_lines": [ "[ 25.375939] ==================================================================\n[ 25.383262] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50\n[ 25.390937] Write of size 1 at addr ffff1b1dd52f20da by task kunit_try_catch/231\n[ 25.398434] \n[ 25.399965] CPU: 3 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 25.399988] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 25.399995] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 25.400005] Call trace:\n[ 25.400011] show_stack+0x20/0x38 (C)\n[ 25.400027] dump_stack_lvl+0x8c/0xd0\n[ 25.400041] print_report+0x118/0x5e0\n[ 25.400057] kasan_report+0xc8/0x118\n[ 25.400073] __asan_report_store1_noabort+0x20/0x30\n[ 25.400093] krealloc_less_oob_helper+0xa80/0xc50\n[ 25.400109] krealloc_large_less_oob+0x20/0x38\n[ 25.400127] kunit_try_run_case+0x14c/0x3d0\n[ 25.400146] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 25.400163] kthread+0x24c/0x2d0\n[ 25.400179] ret_from_fork+0x10/0x20\n[ 25.400194] \n[ 25.468526] The buggy address belongs to the physical page:\n[ 25.474176] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152f0\n[ 25.482278] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 25.490034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 25.497093] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.504937] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.512783] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.520714] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.528644] head: 0bfffe0000000002 fffffe6c3754bc01 ffffffffffffffff 0000000000000000\n[ 25.536574] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 25.544501] page dumped because: kasan: bad access detected\n[ 25.550151] \n[ 25.551679] Memory state around the buggy address:\n[ 25.556537] ffff1b1dd52f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.563854] ffff1b1dd52f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.571168] >ffff1b1dd52f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe\n[ 25.578479] ^\n[ 25.584654] ffff1b1dd52f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.591970] ffff1b1dd52f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.599283] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-f83269674859e7ec373e3a4eaddcc94973c1bd2dbc682abf1fc06b7b034c7260": { "log_lines": [ "[ 23.188829] ==================================================================\n[ 23.196149] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50\n[ 23.203817] Write of size 1 at addr ffff1b1dc59664d0 by task kunit_try_catch/227\n[ 23.211308] \n[ 23.212847] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 23.212870] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 23.212878] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 23.212888] Call trace:\n[ 23.212894] show_stack+0x20/0x38 (C)\n[ 23.212910] dump_stack_lvl+0x8c/0xd0\n[ 23.212926] print_report+0x118/0x5e0\n[ 23.212942] kasan_report+0xc8/0x118\n[ 23.212958] __asan_report_store1_noabort+0x20/0x30\n[ 23.212978] krealloc_less_oob_helper+0xb9c/0xc50\n[ 23.212994] krealloc_less_oob+0x20/0x38\n[ 23.213010] kunit_try_run_case+0x14c/0x3d0\n[ 23.213029] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.213047] kthread+0x24c/0x2d0\n[ 23.213063] ret_from_fork+0x10/0x20\n[ 23.213079] \n[ 23.280903] Allocated by task 227:\n[ 23.284360] kasan_save_stack+0x3c/0x68\n[ 23.288261] kasan_save_track+0x20/0x40\n[ 23.292159] kasan_save_alloc_info+0x40/0x58\n[ 23.296502] __kasan_krealloc+0x118/0x178\n[ 23.300582] krealloc_noprof+0x128/0x360\n[ 23.304569] krealloc_less_oob_helper+0x168/0xc50\n[ 23.309353] krealloc_less_oob+0x20/0x38\n[ 23.313338] kunit_try_run_case+0x14c/0x3d0\n[ 23.317593] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.323165] kthread+0x24c/0x2d0\n[ 23.326458] ret_from_fork+0x10/0x20\n[ 23.330097] \n[ 23.331626] The buggy address belongs to the object at ffff1b1dc5966400\n[ 23.331626] which belongs to the cache kmalloc-256 of size 256\n[ 23.344280] The buggy address is located 7 bytes to the right of\n[ 23.344280] allocated 201-byte region [ffff1b1dc5966400, ffff1b1dc59664c9)\n[ 23.357379] \n[ 23.358908] The buggy address belongs to the physical page:\n[ 23.364553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105964\n[ 23.372656] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 23.380415] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 23.387468] page_type: f5(slab)\n[ 23.390669] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 23.398515] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 23.406362] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 23.414294] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 23.422227] head: 0bfffe0000000002 fffffe6c37165901 ffffffffffffffff 0000000000000000\n[ 23.430160] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 23.438090] page dumped because: kasan: bad access detected\n[ 23.443742] \n[ 23.445267] Memory state around the buggy address:\n[ 23.450131] ffff1b1dc5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.457447] ffff1b1dc5966400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 23.464763] >ffff1b1dc5966480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc\n[ 23.472075] ^\n[ 23.477988] ffff1b1dc5966500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.485303] ffff1b1dc5966580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.492616] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-37674c9b6b7765f108da73cc59d2fbcb7a6144d559756d5f90332de67e467267": { "log_lines": [ "[ 22.873775] ==================================================================\n[ 22.884984] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50\n[ 22.892658] Write of size 1 at addr ffff1b1dc59664c9 by task kunit_try_catch/227\n[ 22.900157] \n[ 22.901688] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 22.901711] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 22.901719] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 22.901729] Call trace:\n[ 22.901736] show_stack+0x20/0x38 (C)\n[ 22.901753] dump_stack_lvl+0x8c/0xd0\n[ 22.901768] print_report+0x118/0x5e0\n[ 22.901786] kasan_report+0xc8/0x118\n[ 22.901802] __asan_report_store1_noabort+0x20/0x30\n[ 22.901821] krealloc_less_oob_helper+0xa48/0xc50\n[ 22.901840] krealloc_less_oob+0x20/0x38\n[ 22.901855] kunit_try_run_case+0x14c/0x3d0\n[ 22.901876] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 22.901895] kthread+0x24c/0x2d0\n[ 22.901911] ret_from_fork+0x10/0x20\n[ 22.901927] \n[ 22.969757] Allocated by task 227:\n[ 22.973215] kasan_save_stack+0x3c/0x68\n[ 22.977117] kasan_save_track+0x20/0x40\n[ 22.981016] kasan_save_alloc_info+0x40/0x58\n[ 22.985359] __kasan_krealloc+0x118/0x178\n[ 22.989443] krealloc_noprof+0x128/0x360\n[ 22.993431] krealloc_less_oob_helper+0x168/0xc50\n[ 22.998214] krealloc_less_oob+0x20/0x38\n[ 23.002198] kunit_try_run_case+0x14c/0x3d0\n[ 23.006453] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.012022] kthread+0x24c/0x2d0\n[ 23.015309] ret_from_fork+0x10/0x20\n[ 23.018949] \n[ 23.020484] The buggy address belongs to the object at ffff1b1dc5966400\n[ 23.020484] which belongs to the cache kmalloc-256 of size 256\n[ 23.033144] The buggy address is located 0 bytes to the right of\n[ 23.033144] allocated 201-byte region [ffff1b1dc5966400, ffff1b1dc59664c9)\n[ 23.046245] \n[ 23.047773] The buggy address belongs to the physical page:\n[ 23.053422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105964\n[ 23.061528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 23.069288] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 23.076344] page_type: f5(slab)\n[ 23.079543] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 23.087390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 23.095239] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 23.103174] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 23.111107] head: 0bfffe0000000002 fffffe6c37165901 ffffffffffffffff 0000000000000000\n[ 23.119040] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 23.126970] page dumped because: kasan: bad access detected\n[ 23.132617] \n[ 23.134146] Memory state around the buggy address:\n[ 23.139011] ffff1b1dc5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.146327] ffff1b1dc5966400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 23.153649] >ffff1b1dc5966480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc\n[ 23.160962] ^\n[ 23.166615] ffff1b1dc5966500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.173931] ffff1b1dc5966580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 23.181243] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-122e865ac2a57dee43f51744742b807b76b777e75b814d8b37db4b1bb9d35509": { "log_lines": [ "[ 25.838637] ==================================================================\n[ 25.845953] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50\n[ 25.853622] Write of size 1 at addr ffff1b1dd52f20eb by task kunit_try_catch/231\n[ 25.861113] \n[ 25.862637] CPU: 5 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 25.862661] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 25.862668] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 25.862676] Call trace:\n[ 25.862681] show_stack+0x20/0x38 (C)\n[ 25.862696] dump_stack_lvl+0x8c/0xd0\n[ 25.862709] print_report+0x118/0x5e0\n[ 25.862724] kasan_report+0xc8/0x118\n[ 25.862738] __asan_report_store1_noabort+0x20/0x30\n[ 25.862757] krealloc_less_oob_helper+0xa58/0xc50\n[ 25.862772] krealloc_large_less_oob+0x20/0x38\n[ 25.862786] kunit_try_run_case+0x14c/0x3d0\n[ 25.862805] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 25.862821] kthread+0x24c/0x2d0\n[ 25.862837] ret_from_fork+0x10/0x20\n[ 25.862852] \n[ 25.931156] The buggy address belongs to the physical page:\n[ 25.936794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152f0\n[ 25.944890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 25.952640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 25.959690] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.967531] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.975371] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.983293] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.991218] head: 0bfffe0000000002 fffffe6c3754bc01 ffffffffffffffff 0000000000000000\n[ 25.999142] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 26.007063] page dumped because: kasan: bad access detected\n[ 26.012702] \n[ 26.014224] Memory state around the buggy address:\n[ 26.019075] ffff1b1dd52f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 26.026391] ffff1b1dd52f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 26.033705] >ffff1b1dd52f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe\n[ 26.041017] ^\n[ 26.047710] ffff1b1dd52f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 26.055017] ffff1b1dd52f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 26.062328] ==================================================================", "[ 25.607548] ==================================================================\n[ 25.614868] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50\n[ 25.622541] Write of size 1 at addr ffff1b1dd52f20ea by task kunit_try_catch/231\n[ 25.630035] \n[ 25.631572] CPU: 5 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 25.631596] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 25.631603] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 25.631612] Call trace:\n[ 25.631618] show_stack+0x20/0x38 (C)\n[ 25.631634] dump_stack_lvl+0x8c/0xd0\n[ 25.631647] print_report+0x118/0x5e0\n[ 25.631663] kasan_report+0xc8/0x118\n[ 25.631678] __asan_report_store1_noabort+0x20/0x30\n[ 25.631697] krealloc_less_oob_helper+0xae4/0xc50\n[ 25.631712] krealloc_large_less_oob+0x20/0x38\n[ 25.631727] kunit_try_run_case+0x14c/0x3d0\n[ 25.631746] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 25.631762] kthread+0x24c/0x2d0\n[ 25.631777] ret_from_fork+0x10/0x20\n[ 25.631792] \n[ 25.700091] The buggy address belongs to the physical page:\n[ 25.705734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152f0\n[ 25.713833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 25.721584] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 25.728635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.736476] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.744316] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.752241] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.760166] head: 0bfffe0000000002 fffffe6c3754bc01 ffffffffffffffff 0000000000000000\n[ 25.768091] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 25.776010] page dumped because: kasan: bad access detected\n[ 25.781651] \n[ 25.783173] Memory state around the buggy address:\n[ 25.788032] ffff1b1dd52f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.795338] ffff1b1dd52f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.802642] >ffff1b1dd52f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe\n[ 25.809944] ^\n[ 25.816637] ffff1b1dd52f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.823953] ffff1b1dd52f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.831259] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-c331090d2f9e5830c248c15e5a5507cc91b8bfaa837b800f3c04808c677c9286": { "log_lines": [ "[ 23.812292] ==================================================================\n[ 23.819602] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50\n[ 23.827266] Write of size 1 at addr ffff1b1dc59664ea by task kunit_try_catch/227\n[ 23.834751] \n[ 23.836285] CPU: 4 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 23.836307] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 23.836315] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 23.836323] Call trace:\n[ 23.836329] show_stack+0x20/0x38 (C)\n[ 23.836344] dump_stack_lvl+0x8c/0xd0\n[ 23.836357] print_report+0x118/0x5e0\n[ 23.836372] kasan_report+0xc8/0x118\n[ 23.836388] __asan_report_store1_noabort+0x20/0x30\n[ 23.836408] krealloc_less_oob_helper+0xae4/0xc50\n[ 23.836423] krealloc_less_oob+0x20/0x38\n[ 23.836437] kunit_try_run_case+0x14c/0x3d0\n[ 23.836456] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.836472] kthread+0x24c/0x2d0\n[ 23.836487] ret_from_fork+0x10/0x20\n[ 23.836503] \n[ 23.904276] Allocated by task 227:\n[ 23.907729] kasan_save_stack+0x3c/0x68\n[ 23.911624] kasan_save_track+0x20/0x40\n[ 23.915517] kasan_save_alloc_info+0x40/0x58\n[ 23.919858] __kasan_krealloc+0x118/0x178\n[ 23.923935] krealloc_noprof+0x128/0x360\n[ 23.927916] krealloc_less_oob_helper+0x168/0xc50\n[ 23.932687] krealloc_less_oob+0x20/0x38\n[ 23.936666] kunit_try_run_case+0x14c/0x3d0\n[ 23.940920] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 23.946484] kthread+0x24c/0x2d0\n[ 23.949772] ret_from_fork+0x10/0x20\n[ 23.953405] \n[ 23.954927] The buggy address belongs to the object at ffff1b1dc5966400\n[ 23.954927] which belongs to the cache kmalloc-256 of size 256\n[ 23.967573] The buggy address is located 33 bytes to the right of\n[ 23.967573] allocated 201-byte region [ffff1b1dc5966400, ffff1b1dc59664c9)\n[ 23.980756] \n[ 23.982279] The buggy address belongs to the physical page:\n[ 23.987920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105964\n[ 23.996023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 24.003767] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 24.010818] page_type: f5(slab)\n[ 24.014014] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 24.021846] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 24.029679] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 24.037608] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 24.045536] head: 0bfffe0000000002 fffffe6c37165901 ffffffffffffffff 0000000000000000\n[ 24.053463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 24.061388] page dumped because: kasan: bad access detected\n[ 24.067031] \n[ 24.068562] Memory state around the buggy address:\n[ 24.073414] ffff1b1dc5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 24.080722] ffff1b1dc5966400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 24.088031] >ffff1b1dc5966480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc\n[ 24.095338] ^\n[ 24.102037] ffff1b1dc5966500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 24.109344] ffff1b1dc5966580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 24.116650] ==================================================================", "[ 24.124285] ==================================================================\n[ 24.131609] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50\n[ 24.139274] Write of size 1 at addr ffff1b1dc59664eb by task kunit_try_catch/227\n[ 24.146764] \n[ 24.148294] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 24.148317] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 24.148325] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 24.148335] Call trace:\n[ 24.148341] show_stack+0x20/0x38 (C)\n[ 24.148357] dump_stack_lvl+0x8c/0xd0\n[ 24.148372] print_report+0x118/0x5e0\n[ 24.148389] kasan_report+0xc8/0x118\n[ 24.148405] __asan_report_store1_noabort+0x20/0x30\n[ 24.148427] krealloc_less_oob_helper+0xa58/0xc50\n[ 24.148444] krealloc_less_oob+0x20/0x38\n[ 24.148459] kunit_try_run_case+0x14c/0x3d0\n[ 24.148478] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 24.148496] kthread+0x24c/0x2d0\n[ 24.148512] ret_from_fork+0x10/0x20\n[ 24.148528] \n[ 24.216351] Allocated by task 227:\n[ 24.219813] kasan_save_stack+0x3c/0x68\n[ 24.223713] kasan_save_track+0x20/0x40\n[ 24.227612] kasan_save_alloc_info+0x40/0x58\n[ 24.231960] __kasan_krealloc+0x118/0x178\n[ 24.236042] krealloc_noprof+0x128/0x360\n[ 24.240038] krealloc_less_oob_helper+0x168/0xc50\n[ 24.244821] krealloc_less_oob+0x20/0x38\n[ 24.248815] kunit_try_run_case+0x14c/0x3d0\n[ 24.253073] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 24.258643] kthread+0x24c/0x2d0\n[ 24.261938] ret_from_fork+0x10/0x20\n[ 24.265576] \n[ 24.267104] The buggy address belongs to the object at ffff1b1dc5966400\n[ 24.267104] which belongs to the cache kmalloc-256 of size 256\n[ 24.279761] The buggy address is located 34 bytes to the right of\n[ 24.279761] allocated 201-byte region [ffff1b1dc5966400, ffff1b1dc59664c9)\n[ 24.292946] \n[ 24.294476] The buggy address belongs to the physical page:\n[ 24.300122] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105964\n[ 24.308227] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 24.315985] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 24.323034] page_type: f5(slab)\n[ 24.326237] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 24.334083] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 24.341930] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 24.349863] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 24.357796] head: 0bfffe0000000002 fffffe6c37165901 ffffffffffffffff 0000000000000000\n[ 24.365729] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 24.373658] page dumped because: kasan: bad access detected\n[ 24.379310] \n[ 24.380834] Memory state around the buggy address:\n[ 24.385697] ffff1b1dc5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 24.393012] ffff1b1dc5966400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 24.400328] >ffff1b1dc5966480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc\n[ 24.407646] ^\n[ 24.414342] ffff1b1dc5966500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 24.421657] ffff1b1dc5966580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 24.428971] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_krealloc_less_oob_helper-6b8fb5eabab6e7faf6b13f3f918afcce12c1fc86a668f08173eac7c439d6200e": { "log_lines": [ "[ 24.910859] ==================================================================\n[ 24.922582] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50\n[ 24.930256] Write of size 1 at addr ffff1b1dd52f20c9 by task kunit_try_catch/231\n[ 24.937748] \n[ 24.939276] CPU: 4 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 24.939300] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 24.939307] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 24.939317] Call trace:\n[ 24.939322] show_stack+0x20/0x38 (C)\n[ 24.939339] dump_stack_lvl+0x8c/0xd0\n[ 24.939353] print_report+0x118/0x5e0\n[ 24.939369] kasan_report+0xc8/0x118\n[ 24.939384] __asan_report_store1_noabort+0x20/0x30\n[ 24.939402] krealloc_less_oob_helper+0xa48/0xc50\n[ 24.939417] krealloc_large_less_oob+0x20/0x38\n[ 24.939432] kunit_try_run_case+0x14c/0x3d0\n[ 24.939450] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 24.939466] kthread+0x24c/0x2d0\n[ 24.939481] ret_from_fork+0x10/0x20\n[ 24.939496] \n[ 25.007817] The buggy address belongs to the physical page:\n[ 25.013460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152f0\n[ 25.021561] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 25.029312] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 25.036363] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.044203] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.052043] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 25.059967] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 25.067893] head: 0bfffe0000000002 fffffe6c3754bc01 ffffffffffffffff 0000000000000000\n[ 25.075817] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 25.083738] page dumped because: kasan: bad access detected\n[ 25.089381] \n[ 25.090902] Memory state around the buggy address:\n[ 25.095760] ffff1b1dd52f1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.103066] ffff1b1dd52f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 25.110371] >ffff1b1dd52f2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe\n[ 25.117683] ^\n[ 25.123328] ffff1b1dd52f2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.130632] ffff1b1dd52f2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 25.137945] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_krealloc_uaf-d0cfd12fe842bd951085edb02f741afd413fb64045de8f6c9de9c5f03e6bbe18": { "log_lines": [ "[ 26.073676] ==================================================================\n[ 26.085412] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520\n[ 26.092119] Read of size 1 at addr ffff1b1dd52ba400 by task kunit_try_catch/233\n[ 26.099525] \n[ 26.101061] CPU: 4 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 26.101086] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 26.101094] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 26.101103] Call trace:\n[ 26.101109] show_stack+0x20/0x38 (C)\n[ 26.101126] dump_stack_lvl+0x8c/0xd0\n[ 26.101139] print_report+0x118/0x5e0\n[ 26.101156] kasan_report+0xc8/0x118\n[ 26.101172] __kasan_check_byte+0x54/0x70\n[ 26.101188] krealloc_noprof+0x44/0x360\n[ 26.101204] krealloc_uaf+0x180/0x520\n[ 26.101218] kunit_try_run_case+0x14c/0x3d0\n[ 26.101238] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.101255] kthread+0x24c/0x2d0\n[ 26.101270] ret_from_fork+0x10/0x20\n[ 26.101286] \n[ 26.167058] Allocated by task 233:\n[ 26.170509] kasan_save_stack+0x3c/0x68\n[ 26.174416] kasan_save_track+0x20/0x40\n[ 26.178317] kasan_save_alloc_info+0x40/0x58\n[ 26.182655] __kasan_kmalloc+0xd4/0xd8\n[ 26.186469] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 26.191066] krealloc_uaf+0xc8/0x520\n[ 26.194695] kunit_try_run_case+0x14c/0x3d0\n[ 26.198946] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.204505] kthread+0x24c/0x2d0\n[ 26.207790] ret_from_fork+0x10/0x20\n[ 26.211422] \n[ 26.212954] Freed by task 233:\n[ 26.216059] kasan_save_stack+0x3c/0x68\n[ 26.219962] kasan_save_track+0x20/0x40\n[ 26.223863] kasan_save_free_info+0x4c/0x78\n[ 26.228114] __kasan_slab_free+0x6c/0x98\n[ 26.232104] kfree+0x214/0x3c8\n[ 26.235216] krealloc_uaf+0x12c/0x520\n[ 26.238940] kunit_try_run_case+0x14c/0x3d0\n[ 26.243192] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.248752] kthread+0x24c/0x2d0\n[ 26.252036] ret_from_fork+0x10/0x20\n[ 26.255667] \n[ 26.257188] The buggy address belongs to the object at ffff1b1dd52ba400\n[ 26.257188] which belongs to the cache kmalloc-256 of size 256\n[ 26.269843] The buggy address is located 0 bytes inside of\n[ 26.269843] freed 256-byte region [ffff1b1dd52ba400, ffff1b1dd52ba500)\n[ 26.282062] \n[ 26.283591] The buggy address belongs to the physical page:\n[ 26.289233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152b8\n[ 26.297333] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 26.305084] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 26.312128] page_type: f5(slab)\n[ 26.315325] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 26.323164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 26.331003] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 26.338927] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 26.346852] head: 0bfffe0000000002 fffffe6c3754ae01 ffffffffffffffff 0000000000000000\n[ 26.354778] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 26.362698] page dumped because: kasan: bad access detected\n[ 26.368337] \n[ 26.369858] Memory state around the buggy address:\n[ 26.374710] ffff1b1dd52ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 26.382023] ffff1b1dd52ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 26.389338] >ffff1b1dd52ba400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 26.396649] ^\n[ 26.399929] ffff1b1dd52ba480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 26.407236] ffff1b1dd52ba500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 26.414537] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_krealloc_uaf-7923b476620a84145f0c786c6dee137dee527e2c8a1e2969fadb661634ef70c6": { "log_lines": [ "[ 26.421909] ==================================================================\n[ 26.429225] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520\n[ 26.435925] Read of size 1 at addr ffff1b1dd52ba400 by task kunit_try_catch/233\n[ 26.443323] \n[ 26.444855] CPU: 4 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 26.444877] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 26.444884] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 26.444894] Call trace:\n[ 26.444899] show_stack+0x20/0x38 (C)\n[ 26.444913] dump_stack_lvl+0x8c/0xd0\n[ 26.444926] print_report+0x118/0x5e0\n[ 26.444941] kasan_report+0xc8/0x118\n[ 26.444957] __asan_report_load1_noabort+0x20/0x30\n[ 26.444976] krealloc_uaf+0x4c8/0x520\n[ 26.444989] kunit_try_run_case+0x14c/0x3d0\n[ 26.445006] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.445022] kthread+0x24c/0x2d0\n[ 26.445037] ret_from_fork+0x10/0x20\n[ 26.445052] \n[ 26.507730] Allocated by task 233:\n[ 26.511186] kasan_save_stack+0x3c/0x68\n[ 26.515089] kasan_save_track+0x20/0x40\n[ 26.518990] kasan_save_alloc_info+0x40/0x58\n[ 26.523326] __kasan_kmalloc+0xd4/0xd8\n[ 26.527130] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 26.531734] krealloc_uaf+0xc8/0x520\n[ 26.535365] kunit_try_run_case+0x14c/0x3d0\n[ 26.539614] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.545175] kthread+0x24c/0x2d0\n[ 26.548460] ret_from_fork+0x10/0x20\n[ 26.552090] \n[ 26.553611] Freed by task 233:\n[ 26.556714] kasan_save_stack+0x3c/0x68\n[ 26.560617] kasan_save_track+0x20/0x40\n[ 26.564518] kasan_save_free_info+0x4c/0x78\n[ 26.568768] __kasan_slab_free+0x6c/0x98\n[ 26.572758] kfree+0x214/0x3c8\n[ 26.575866] krealloc_uaf+0x12c/0x520\n[ 26.579582] kunit_try_run_case+0x14c/0x3d0\n[ 26.583833] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.589394] kthread+0x24c/0x2d0\n[ 26.592678] ret_from_fork+0x10/0x20\n[ 26.596309] \n[ 26.597831] The buggy address belongs to the object at ffff1b1dd52ba400\n[ 26.597831] which belongs to the cache kmalloc-256 of size 256\n[ 26.610481] The buggy address is located 0 bytes inside of\n[ 26.610481] freed 256-byte region [ffff1b1dd52ba400, ffff1b1dd52ba500)\n[ 26.622701] \n[ 26.624231] The buggy address belongs to the physical page:\n[ 26.629873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152b8\n[ 26.637970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 26.645721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 26.652766] page_type: f5(slab)\n[ 26.655960] raw: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 26.663799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 26.671637] head: 0bfffe0000000040 ffff1b1dc0002b40 dead000000000122 0000000000000000\n[ 26.679562] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 26.687486] head: 0bfffe0000000002 fffffe6c3754ae01 ffffffffffffffff 0000000000000000\n[ 26.695412] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 26.703332] page dumped because: kasan: bad access detected\n[ 26.708970] \n[ 26.710492] Memory state around the buggy address:\n[ 26.715343] ffff1b1dd52ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 26.722650] ffff1b1dd52ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 26.729954] >ffff1b1dd52ba400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 26.737266] ^\n[ 26.740545] ffff1b1dd52ba480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 26.747860] ffff1b1dd52ba500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 26.755166] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_16-e247546a33853873a57a121c2b153b779b88a16892836fc75155eafe932044c1": { "log_lines": [ "[ 26.766188] ==================================================================\n[ 26.776959] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8\n[ 26.783746] Write of size 16 at addr ffff1b1dd48c02c0 by task kunit_try_catch/235\n[ 26.791325] \n[ 26.792852] CPU: 5 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 26.792877] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 26.792885] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 26.792895] Call trace:\n[ 26.792902] show_stack+0x20/0x38 (C)\n[ 26.792918] dump_stack_lvl+0x8c/0xd0\n[ 26.792932] print_report+0x118/0x5e0\n[ 26.792949] kasan_report+0xc8/0x118\n[ 26.792964] __asan_report_store16_noabort+0x20/0x30\n[ 26.792984] kmalloc_oob_16+0x3a0/0x3f8\n[ 26.792998] kunit_try_run_case+0x14c/0x3d0\n[ 26.793017] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.793033] kthread+0x24c/0x2d0\n[ 26.793051] ret_from_fork+0x10/0x20\n[ 26.793067] \n[ 26.856104] Allocated by task 235:\n[ 26.859561] kasan_save_stack+0x3c/0x68\n[ 26.863460] kasan_save_track+0x20/0x40\n[ 26.867356] kasan_save_alloc_info+0x40/0x58\n[ 26.871697] __kasan_kmalloc+0xd4/0xd8\n[ 26.875504] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 26.880109] kmalloc_oob_16+0xb4/0x3f8\n[ 26.883915] kunit_try_run_case+0x14c/0x3d0\n[ 26.888169] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 26.893735] kthread+0x24c/0x2d0\n[ 26.897024] ret_from_fork+0x10/0x20\n[ 26.900658] \n[ 26.902180] The buggy address belongs to the object at ffff1b1dd48c02c0\n[ 26.902180] which belongs to the cache kmalloc-16 of size 16\n[ 26.914660] The buggy address is located 0 bytes inside of\n[ 26.914660] allocated 13-byte region [ffff1b1dd48c02c0, ffff1b1dd48c02cd)\n[ 26.927143] \n[ 26.928665] The buggy address belongs to the physical page:\n[ 26.934312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1148c0\n[ 26.942408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 26.949016] page_type: f5(slab)\n[ 26.952215] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 26.960050] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 26.967883] page dumped because: kasan: bad access detected\n[ 26.973529] \n[ 26.975051] Memory state around the buggy address:\n[ 26.979908] ffff1b1dd48c0180: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc\n[ 26.987220] ffff1b1dd48c0200: 00 00 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc\n[ 26.994531] >ffff1b1dd48c0280: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc\n[ 27.001840] ^\n[ 27.007490] ffff1b1dd48c0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.014802] ffff1b1dd48c0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.022114] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmalloc_uaf_16-c01b13516219308dfb99e9df1eb504b4dcd9e69ccd429fa7ba10564c195ca4a0": { "log_lines": [ "[ 27.032930] ==================================================================\n[ 27.043876] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438\n[ 27.050756] Read of size 16 at addr ffff1b1dd4371820 by task kunit_try_catch/237\n[ 27.058251] \n[ 27.059787] CPU: 4 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 27.059812] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 27.059820] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 27.059830] Call trace:\n[ 27.059836] show_stack+0x20/0x38 (C)\n[ 27.059852] dump_stack_lvl+0x8c/0xd0\n[ 27.059867] print_report+0x118/0x5e0\n[ 27.059884] kasan_report+0xc8/0x118\n[ 27.059900] __asan_report_load16_noabort+0x20/0x30\n[ 27.059920] kmalloc_uaf_16+0x3bc/0x438\n[ 27.059934] kunit_try_run_case+0x14c/0x3d0\n[ 27.059953] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.059970] kthread+0x24c/0x2d0\n[ 27.059986] ret_from_fork+0x10/0x20\n[ 27.060001] \n[ 27.122950] Allocated by task 237:\n[ 27.126404] kasan_save_stack+0x3c/0x68\n[ 27.130311] kasan_save_track+0x20/0x40\n[ 27.134217] kasan_save_alloc_info+0x40/0x58\n[ 27.138553] __kasan_kmalloc+0xd4/0xd8\n[ 27.142368] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 27.146966] kmalloc_uaf_16+0x140/0x438\n[ 27.150866] kunit_try_run_case+0x14c/0x3d0\n[ 27.155118] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.160676] kthread+0x24c/0x2d0\n[ 27.163961] ret_from_fork+0x10/0x20\n[ 27.167593] \n[ 27.169115] Freed by task 237:\n[ 27.172218] kasan_save_stack+0x3c/0x68\n[ 27.176121] kasan_save_track+0x20/0x40\n[ 27.180023] kasan_save_free_info+0x4c/0x78\n[ 27.184273] __kasan_slab_free+0x6c/0x98\n[ 27.188264] kfree+0x214/0x3c8\n[ 27.191373] kmalloc_uaf_16+0x190/0x438\n[ 27.195264] kunit_try_run_case+0x14c/0x3d0\n[ 27.199513] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.205074] kthread+0x24c/0x2d0\n[ 27.208358] ret_from_fork+0x10/0x20\n[ 27.211988] \n[ 27.213510] The buggy address belongs to the object at ffff1b1dd4371820\n[ 27.213510] which belongs to the cache kmalloc-16 of size 16\n[ 27.225991] The buggy address is located 0 bytes inside of\n[ 27.225991] freed 16-byte region [ffff1b1dd4371820, ffff1b1dd4371830)\n[ 27.238117] \n[ 27.239648] The buggy address belongs to the physical page:\n[ 27.245289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114371\n[ 27.253389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 27.260002] page_type: f5(slab)\n[ 27.263201] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 27.271040] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 27.278876] page dumped because: kasan: bad access detected\n[ 27.284515] \n[ 27.286038] Memory state around the buggy address:\n[ 27.290892] ffff1b1dd4371700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 27.298208] ffff1b1dd4371780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 27.305523] >ffff1b1dd4371800: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc\n[ 27.312825] ^\n[ 27.317156] ffff1b1dd4371880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.324461] ffff1b1dd4371900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.331773] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_memset_2-0ccf6b8c1740b5220647148572ef019399881f02ceb6118c9e8b6afeb5e1ae3b": { "log_lines": [ "[ 27.511324] ==================================================================\n[ 27.523221] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8\n[ 27.530541] Write of size 2 at addr ffff1b1dd4b72377 by task kunit_try_catch/241\n[ 27.538029] \n[ 27.539564] CPU: 4 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 27.539589] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 27.539597] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 27.539608] Call trace:\n[ 27.539614] show_stack+0x20/0x38 (C)\n[ 27.539631] dump_stack_lvl+0x8c/0xd0\n[ 27.539644] print_report+0x118/0x5e0\n[ 27.539662] kasan_report+0xc8/0x118\n[ 27.539677] kasan_check_range+0x100/0x1a8\n[ 27.539694] __asan_memset+0x34/0x78\n[ 27.539711] kmalloc_oob_memset_2+0x150/0x2f8\n[ 27.539725] kunit_try_run_case+0x14c/0x3d0\n[ 27.539745] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.539763] kthread+0x24c/0x2d0\n[ 27.539778] ret_from_fork+0x10/0x20\n[ 27.539794] \n[ 27.606097] Allocated by task 241:\n[ 27.609550] kasan_save_stack+0x3c/0x68\n[ 27.613456] kasan_save_track+0x20/0x40\n[ 27.617357] kasan_save_alloc_info+0x40/0x58\n[ 27.621695] __kasan_kmalloc+0xd4/0xd8\n[ 27.625509] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 27.630107] kmalloc_oob_memset_2+0xb0/0x2f8\n[ 27.634442] kunit_try_run_case+0x14c/0x3d0\n[ 27.638693] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.644252] kthread+0x24c/0x2d0\n[ 27.647537] ret_from_fork+0x10/0x20\n[ 27.651170] \n[ 27.652698] The buggy address belongs to the object at ffff1b1dd4b72300\n[ 27.652698] which belongs to the cache kmalloc-128 of size 128\n[ 27.665355] The buggy address is located 119 bytes inside of\n[ 27.665355] allocated 120-byte region [ffff1b1dd4b72300, ffff1b1dd4b72378)\n[ 27.678098] \n[ 27.679628] The buggy address belongs to the physical page:\n[ 27.685272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 27.693371] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 27.701121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 27.708169] page_type: f5(slab)\n[ 27.711367] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 27.719208] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 27.727047] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 27.734974] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 27.742899] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 27.750823] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 27.758745] page dumped because: kasan: bad access detected\n[ 27.764383] \n[ 27.765904] Memory state around the buggy address:\n[ 27.770757] ffff1b1dd4b72200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 27.778072] ffff1b1dd4b72280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.785387] >ffff1b1dd4b72300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 27.792689] ^\n[ 27.799915] ffff1b1dd4b72380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.807223] ffff1b1dd4b72400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 27.814526] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_memset_4-0eddd3f27d88243daaf3d2af1137d980d835448b93b059b28262afc0817c754b": { "log_lines": [ "[ 27.825885] ==================================================================\n[ 27.837353] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300\n[ 27.844675] Write of size 4 at addr ffff1b1dc1f2fb75 by task kunit_try_catch/243\n[ 27.852168] \n[ 27.853696] CPU: 5 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 27.853720] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 27.853728] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 27.853738] Call trace:\n[ 27.853745] show_stack+0x20/0x38 (C)\n[ 27.853762] dump_stack_lvl+0x8c/0xd0\n[ 27.853776] print_report+0x118/0x5e0\n[ 27.853793] kasan_report+0xc8/0x118\n[ 27.853809] kasan_check_range+0x100/0x1a8\n[ 27.853827] __asan_memset+0x34/0x78\n[ 27.853844] kmalloc_oob_memset_4+0x150/0x300\n[ 27.853857] kunit_try_run_case+0x14c/0x3d0\n[ 27.853878] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.853896] kthread+0x24c/0x2d0\n[ 27.853912] ret_from_fork+0x10/0x20\n[ 27.853928] \n[ 27.920215] Allocated by task 243:\n[ 27.923668] kasan_save_stack+0x3c/0x68\n[ 27.927566] kasan_save_track+0x20/0x40\n[ 27.931459] kasan_save_alloc_info+0x40/0x58\n[ 27.935797] __kasan_kmalloc+0xd4/0xd8\n[ 27.939612] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 27.944208] kmalloc_oob_memset_4+0xb0/0x300\n[ 27.948543] kunit_try_run_case+0x14c/0x3d0\n[ 27.952795] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.958357] kthread+0x24c/0x2d0\n[ 27.961642] ret_from_fork+0x10/0x20\n[ 27.965272] \n[ 27.966796] The buggy address belongs to the object at ffff1b1dc1f2fb00\n[ 27.966796] which belongs to the cache kmalloc-128 of size 128\n[ 27.979451] The buggy address is located 117 bytes inside of\n[ 27.979451] allocated 120-byte region [ffff1b1dc1f2fb00, ffff1b1dc1f2fb78)\n[ 27.992191] \n[ 27.993714] The buggy address belongs to the physical page:\n[ 27.999357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f2e\n[ 28.007456] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 28.015208] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 28.022255] page_type: f5(slab)\n[ 28.025452] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 28.033292] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.041132] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 28.049058] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.056982] head: 0bfffe0000000001 fffffe6c3707cb81 ffffffffffffffff 0000000000000000\n[ 28.064907] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 28.072827] page dumped because: kasan: bad access detected\n[ 28.078470] \n[ 28.079998] Memory state around the buggy address:\n[ 28.084851] ffff1b1dc1f2fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 28.092165] ffff1b1dc1f2fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.099469] >ffff1b1dc1f2fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 28.106773] ^\n[ 28.113988] ffff1b1dc1f2fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.121294] ffff1b1dc1f2fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.128596] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_memset_8-f0a4371433c0241b1f5691d5993eaa800be7559466033b32f451b026539902f6": { "log_lines": [ "[ 28.139910] ==================================================================\n[ 28.151376] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8\n[ 28.158699] Write of size 8 at addr ffff1b1dd4b72471 by task kunit_try_catch/245\n[ 28.166187] \n[ 28.167723] CPU: 4 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 28.167747] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 28.167757] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 28.167767] Call trace:\n[ 28.167772] show_stack+0x20/0x38 (C)\n[ 28.167789] dump_stack_lvl+0x8c/0xd0\n[ 28.167804] print_report+0x118/0x5e0\n[ 28.167820] kasan_report+0xc8/0x118\n[ 28.167835] kasan_check_range+0x100/0x1a8\n[ 28.167853] __asan_memset+0x34/0x78\n[ 28.167871] kmalloc_oob_memset_8+0x150/0x2f8\n[ 28.167886] kunit_try_run_case+0x14c/0x3d0\n[ 28.167905] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 28.167921] kthread+0x24c/0x2d0\n[ 28.167938] ret_from_fork+0x10/0x20\n[ 28.167954] \n[ 28.234250] Allocated by task 245:\n[ 28.237703] kasan_save_stack+0x3c/0x68\n[ 28.241608] kasan_save_track+0x20/0x40\n[ 28.245512] kasan_save_alloc_info+0x40/0x58\n[ 28.249851] __kasan_kmalloc+0xd4/0xd8\n[ 28.253664] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 28.258262] kmalloc_oob_memset_8+0xb0/0x2f8\n[ 28.262597] kunit_try_run_case+0x14c/0x3d0\n[ 28.266847] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 28.272406] kthread+0x24c/0x2d0\n[ 28.275691] ret_from_fork+0x10/0x20\n[ 28.279325] \n[ 28.280856] The buggy address belongs to the object at ffff1b1dd4b72400\n[ 28.280856] which belongs to the cache kmalloc-128 of size 128\n[ 28.293510] The buggy address is located 113 bytes inside of\n[ 28.293510] allocated 120-byte region [ffff1b1dd4b72400, ffff1b1dd4b72478)\n[ 28.306254] \n[ 28.307784] The buggy address belongs to the physical page:\n[ 28.313427] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 28.321526] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 28.329278] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 28.336325] page_type: f5(slab)\n[ 28.339523] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 28.347365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.355205] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 28.363129] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.371054] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 28.378978] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 28.386898] page dumped because: kasan: bad access detected\n[ 28.392540] \n[ 28.394061] Memory state around the buggy address:\n[ 28.398914] ffff1b1dd4b72300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 28.406219] ffff1b1dd4b72380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.413533] >ffff1b1dd4b72400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 28.420845] ^\n[ 28.428061] ffff1b1dd4b72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.435366] ffff1b1dd4b72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.442669] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_oob_memset_16-323c3dfc4f305236846c861ff6cb30f36110ce987dcce12d83cfafe1698aedf2": { "log_lines": [ "[ 28.453586] ==================================================================\n[ 28.465060] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8\n[ 28.472472] Write of size 16 at addr ffff1b1dc21f2369 by task kunit_try_catch/247\n[ 28.480048] \n[ 28.481579] CPU: 3 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 28.481603] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 28.481612] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 28.481623] Call trace:\n[ 28.481629] show_stack+0x20/0x38 (C)\n[ 28.481646] dump_stack_lvl+0x8c/0xd0\n[ 28.481662] print_report+0x118/0x5e0\n[ 28.481680] kasan_report+0xc8/0x118\n[ 28.481696] kasan_check_range+0x100/0x1a8\n[ 28.481715] __asan_memset+0x34/0x78\n[ 28.481733] kmalloc_oob_memset_16+0x150/0x2f8\n[ 28.481749] kunit_try_run_case+0x14c/0x3d0\n[ 28.481769] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 28.481786] kthread+0x24c/0x2d0\n[ 28.481802] ret_from_fork+0x10/0x20\n[ 28.481818] \n[ 28.548227] Allocated by task 247:\n[ 28.551690] kasan_save_stack+0x3c/0x68\n[ 28.555600] kasan_save_track+0x20/0x40\n[ 28.559507] kasan_save_alloc_info+0x40/0x58\n[ 28.563847] __kasan_kmalloc+0xd4/0xd8\n[ 28.567659] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 28.572264] kmalloc_oob_memset_16+0xb0/0x2f8\n[ 28.576689] kunit_try_run_case+0x14c/0x3d0\n[ 28.580943] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 28.586514] kthread+0x24c/0x2d0\n[ 28.589808] ret_from_fork+0x10/0x20\n[ 28.593447] \n[ 28.594976] The buggy address belongs to the object at ffff1b1dc21f2300\n[ 28.594976] which belongs to the cache kmalloc-128 of size 128\n[ 28.607641] The buggy address is located 105 bytes inside of\n[ 28.607641] allocated 120-byte region [ffff1b1dc21f2300, ffff1b1dc21f2378)\n[ 28.620390] \n[ 28.621919] The buggy address belongs to the physical page:\n[ 28.627569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021f2\n[ 28.635672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 28.643429] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 28.650484] page_type: f5(slab)\n[ 28.653687] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 28.661533] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.669377] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 28.677309] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.685239] head: 0bfffe0000000001 fffffe6c37087c81 ffffffffffffffff 0000000000000000\n[ 28.693172] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 28.701099] page dumped because: kasan: bad access detected\n[ 28.706749] \n[ 28.708284] Memory state around the buggy address:\n[ 28.713146] ffff1b1dc21f2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 28.720460] ffff1b1dc21f2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.727779] >ffff1b1dc21f2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 28.735091] ^\n[ 28.742318] ffff1b1dc21f2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.749634] ffff1b1dc21f2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 28.756946] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_out-of-bounds_in_kmalloc_memmove_negative_size-1a98e9990ac9e812bbcc19497618019ff23350ec7390250679d0341ee0cbc39d": { "log_lines": [ "[ 28.769033] ==================================================================\n[ 28.780591] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0\n[ 28.788263] Read of size 18446744073709551614 at addr ffff1b1dd5abb384 by task kunit_try_catch/249\n[ 28.797332] \n[ 28.798860] CPU: 4 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 28.798887] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 28.798894] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 28.798904] Call trace:\n[ 28.798910] show_stack+0x20/0x38 (C)\n[ 28.798927] dump_stack_lvl+0x8c/0xd0\n[ 28.798941] print_report+0x118/0x5e0\n[ 28.798959] kasan_report+0xc8/0x118\n[ 28.798974] kasan_check_range+0x100/0x1a8\n[ 28.798992] __asan_memmove+0x3c/0x98\n[ 28.799010] kmalloc_memmove_negative_size+0x154/0x2e0\n[ 28.799028] kunit_try_run_case+0x14c/0x3d0\n[ 28.799048] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 28.799064] kthread+0x24c/0x2d0\n[ 28.799079] ret_from_fork+0x10/0x20\n[ 28.799095] \n[ 28.866255] Allocated by task 249:\n[ 28.869708] kasan_save_stack+0x3c/0x68\n[ 28.873613] kasan_save_track+0x20/0x40\n[ 28.877515] kasan_save_alloc_info+0x40/0x58\n[ 28.881852] __kasan_kmalloc+0xd4/0xd8\n[ 28.885666] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 28.890263] kmalloc_memmove_negative_size+0xb0/0x2e0\n[ 28.895388] kunit_try_run_case+0x14c/0x3d0\n[ 28.899636] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 28.905196] kthread+0x24c/0x2d0\n[ 28.908478] ret_from_fork+0x10/0x20\n[ 28.912117] \n[ 28.913641] The buggy address belongs to the object at ffff1b1dd5abb380\n[ 28.913641] which belongs to the cache kmalloc-64 of size 64\n[ 28.926119] The buggy address is located 4 bytes inside of\n[ 28.926119] 64-byte region [ffff1b1dd5abb380, ffff1b1dd5abb3c0)\n[ 28.937717] \n[ 28.939239] The buggy address belongs to the physical page:\n[ 28.944884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115abb\n[ 28.952992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 28.959601] page_type: f5(slab)\n[ 28.962797] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 28.970632] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 28.978463] page dumped because: kasan: bad access detected\n[ 28.984108] \n[ 28.985630] Memory state around the buggy address:\n[ 28.990482] ffff1b1dd5abb280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 28.997793] ffff1b1dd5abb300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 29.005103] >ffff1b1dd5abb380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc\n[ 29.012411] ^\n[ 29.015689] ffff1b1dd5abb400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.022994] ffff1b1dd5abb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.030301] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmalloc_memmove_invalid_size-51f553144bbb6b5287961f98046c592668b9b0e05ec6e75d7f90aa7161431c00": { "log_lines": [ "[ 29.041943] ==================================================================\n[ 29.054205] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8\n[ 29.062222] Read of size 64 at addr ffff1b1dd60da004 by task kunit_try_catch/251\n[ 29.069713] \n[ 29.071240] CPU: 5 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 29.071265] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 29.071273] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 29.071283] Call trace:\n[ 29.071288] show_stack+0x20/0x38 (C)\n[ 29.071305] dump_stack_lvl+0x8c/0xd0\n[ 29.071319] print_report+0x118/0x5e0\n[ 29.071337] kasan_report+0xc8/0x118\n[ 29.071351] kasan_check_range+0x100/0x1a8\n[ 29.071368] __asan_memmove+0x3c/0x98\n[ 29.071386] kmalloc_memmove_invalid_size+0x154/0x2e8\n[ 29.071402] kunit_try_run_case+0x14c/0x3d0\n[ 29.071420] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.071437] kthread+0x24c/0x2d0\n[ 29.071452] ret_from_fork+0x10/0x20\n[ 29.071468] \n[ 29.138566] Allocated by task 251:\n[ 29.142017] kasan_save_stack+0x3c/0x68\n[ 29.145921] kasan_save_track+0x20/0x40\n[ 29.149823] kasan_save_alloc_info+0x40/0x58\n[ 29.154159] __kasan_kmalloc+0xd4/0xd8\n[ 29.157970] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 29.162566] kmalloc_memmove_invalid_size+0xb0/0x2e8\n[ 29.167601] kunit_try_run_case+0x14c/0x3d0\n[ 29.171850] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.177407] kthread+0x24c/0x2d0\n[ 29.180690] ret_from_fork+0x10/0x20\n[ 29.184329] \n[ 29.185851] The buggy address belongs to the object at ffff1b1dd60da000\n[ 29.185851] which belongs to the cache kmalloc-64 of size 64\n[ 29.198326] The buggy address is located 4 bytes inside of\n[ 29.198326] allocated 64-byte region [ffff1b1dd60da000, ffff1b1dd60da040)\n[ 29.210802] \n[ 29.212330] The buggy address belongs to the physical page:\n[ 29.217970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1160da\n[ 29.226076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 29.232686] page_type: f5(slab)\n[ 29.235879] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 29.243716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 29.251551] page dumped because: kasan: bad access detected\n[ 29.257188] \n[ 29.258710] Memory state around the buggy address:\n[ 29.263566] ffff1b1dd60d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 29.270871] ffff1b1dd60d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 29.278183] >ffff1b1dd60da000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc\n[ 29.285492] ^\n[ 29.290874] ffff1b1dd60da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.298185] ffff1b1dd60da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.305497] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmalloc_uaf-a5f9b97fc1ce663e1ff4f982ffb94c5c4f9844f9a0ca4d99a77192e884a24874": { "log_lines": [ "[ 29.316372] ==================================================================\n[ 29.328539] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338\n[ 29.335160] Read of size 1 at addr ffff1b1dd4371848 by task kunit_try_catch/253\n[ 29.342565] \n[ 29.344100] CPU: 4 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 29.344124] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 29.344132] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 29.344142] Call trace:\n[ 29.344149] show_stack+0x20/0x38 (C)\n[ 29.344166] dump_stack_lvl+0x8c/0xd0\n[ 29.344181] print_report+0x118/0x5e0\n[ 29.344198] kasan_report+0xc8/0x118\n[ 29.344214] __asan_report_load1_noabort+0x20/0x30\n[ 29.344233] kmalloc_uaf+0x300/0x338\n[ 29.344246] kunit_try_run_case+0x14c/0x3d0\n[ 29.344266] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.344284] kthread+0x24c/0x2d0\n[ 29.344299] ret_from_fork+0x10/0x20\n[ 29.344316] \n[ 29.406928] Allocated by task 253:\n[ 29.410379] kasan_save_stack+0x3c/0x68\n[ 29.414283] kasan_save_track+0x20/0x40\n[ 29.418185] kasan_save_alloc_info+0x40/0x58\n[ 29.422520] __kasan_kmalloc+0xd4/0xd8\n[ 29.426332] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 29.430928] kmalloc_uaf+0xb8/0x338\n[ 29.434468] kunit_try_run_case+0x14c/0x3d0\n[ 29.438718] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.444274] kthread+0x24c/0x2d0\n[ 29.447559] ret_from_fork+0x10/0x20\n[ 29.451191] \n[ 29.452719] Freed by task 253:\n[ 29.455823] kasan_save_stack+0x3c/0x68\n[ 29.459724] kasan_save_track+0x20/0x40\n[ 29.463626] kasan_save_free_info+0x4c/0x78\n[ 29.467874] __kasan_slab_free+0x6c/0x98\n[ 29.471863] kfree+0x214/0x3c8\n[ 29.474974] kmalloc_uaf+0x11c/0x338\n[ 29.478601] kunit_try_run_case+0x14c/0x3d0\n[ 29.482851] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.488408] kthread+0x24c/0x2d0\n[ 29.491692] ret_from_fork+0x10/0x20\n[ 29.495324] \n[ 29.496854] The buggy address belongs to the object at ffff1b1dd4371840\n[ 29.496854] which belongs to the cache kmalloc-16 of size 16\n[ 29.509330] The buggy address is located 8 bytes inside of\n[ 29.509330] freed 16-byte region [ffff1b1dd4371840, ffff1b1dd4371850)\n[ 29.521460] \n[ 29.522983] The buggy address belongs to the physical page:\n[ 29.528630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114371\n[ 29.536735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 29.543347] page_type: f5(slab)\n[ 29.546542] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 29.554379] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 29.562213] page dumped because: kasan: bad access detected\n[ 29.567860] \n[ 29.569381] Memory state around the buggy address:\n[ 29.574233] ffff1b1dd4371700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 29.581545] ffff1b1dd4371780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 29.588857] >ffff1b1dd4371800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc\n[ 29.596167] ^\n[ 29.601809] ffff1b1dd4371880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.609122] ffff1b1dd4371900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.616431] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmalloc_uaf_memset-25a7b5a55eb05aceb632db19e1ac0425ce758cba07b68b15cb4a2eac7b04c19d": { "log_lines": [ "[ 29.626783] ==================================================================\n[ 29.637467] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310\n[ 29.644700] Write of size 33 at addr ffff1b1dd60da080 by task kunit_try_catch/255\n[ 29.652279] \n[ 29.653808] CPU: 5 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 29.653833] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 29.653842] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 29.653852] Call trace:\n[ 29.653860] show_stack+0x20/0x38 (C)\n[ 29.653876] dump_stack_lvl+0x8c/0xd0\n[ 29.653890] print_report+0x118/0x5e0\n[ 29.653908] kasan_report+0xc8/0x118\n[ 29.653924] kasan_check_range+0x100/0x1a8\n[ 29.653941] __asan_memset+0x34/0x78\n[ 29.653959] kmalloc_uaf_memset+0x170/0x310\n[ 29.653973] kunit_try_run_case+0x14c/0x3d0\n[ 29.653993] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.654010] kthread+0x24c/0x2d0\n[ 29.654026] ret_from_fork+0x10/0x20\n[ 29.654042] \n[ 29.720176] Allocated by task 255:\n[ 29.723634] kasan_save_stack+0x3c/0x68\n[ 29.727532] kasan_save_track+0x20/0x40\n[ 29.731428] kasan_save_alloc_info+0x40/0x58\n[ 29.735769] __kasan_kmalloc+0xd4/0xd8\n[ 29.739577] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 29.744179] kmalloc_uaf_memset+0xb8/0x310\n[ 29.748332] kunit_try_run_case+0x14c/0x3d0\n[ 29.752587] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.758153] kthread+0x24c/0x2d0\n[ 29.761441] ret_from_fork+0x10/0x20\n[ 29.765075] \n[ 29.766597] Freed by task 255:\n[ 29.769704] kasan_save_stack+0x3c/0x68\n[ 29.773600] kasan_save_track+0x20/0x40\n[ 29.777496] kasan_save_free_info+0x4c/0x78\n[ 29.781750] __kasan_slab_free+0x6c/0x98\n[ 29.785732] kfree+0x214/0x3c8\n[ 29.788845] kmalloc_uaf_memset+0x11c/0x310\n[ 29.793095] kunit_try_run_case+0x14c/0x3d0\n[ 29.797352] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.802918] kthread+0x24c/0x2d0\n[ 29.806208] ret_from_fork+0x10/0x20\n[ 29.809842] \n[ 29.811364] The buggy address belongs to the object at ffff1b1dd60da080\n[ 29.811364] which belongs to the cache kmalloc-64 of size 64\n[ 29.823844] The buggy address is located 0 bytes inside of\n[ 29.823844] freed 64-byte region [ffff1b1dd60da080, ffff1b1dd60da0c0)\n[ 29.835970] \n[ 29.837492] The buggy address belongs to the physical page:\n[ 29.843138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1160da\n[ 29.851235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 29.857843] page_type: f5(slab)\n[ 29.861043] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 29.868881] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 29.876712] page dumped because: kasan: bad access detected\n[ 29.882360] \n[ 29.883882] Memory state around the buggy address:\n[ 29.888738] ffff1b1dd60d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 29.896051] ffff1b1dd60da000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 29.903365] >ffff1b1dd60da080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 29.910676] ^\n[ 29.913958] ffff1b1dd60da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.921270] ffff1b1dd60da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 29.928581] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmalloc_uaf2-076a2e076d1ceece81a9d8b5843f61480af3a85f2c73569fc1eca8f87f783e5b": { "log_lines": [ "[ 29.940758] ==================================================================\n[ 29.952058] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468\n[ 29.958764] Read of size 1 at addr ffff1b1dd5abb428 by task kunit_try_catch/257\n[ 29.966167] \n[ 29.967702] CPU: 4 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 29.967728] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 29.967737] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 29.967747] Call trace:\n[ 29.967753] show_stack+0x20/0x38 (C)\n[ 29.967769] dump_stack_lvl+0x8c/0xd0\n[ 29.967783] print_report+0x118/0x5e0\n[ 29.967802] kasan_report+0xc8/0x118\n[ 29.967817] __asan_report_load1_noabort+0x20/0x30\n[ 29.967837] kmalloc_uaf2+0x3f4/0x468\n[ 29.967852] kunit_try_run_case+0x14c/0x3d0\n[ 29.967872] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 29.967890] kthread+0x24c/0x2d0\n[ 29.967906] ret_from_fork+0x10/0x20\n[ 29.967921] \n[ 30.030589] Allocated by task 257:\n[ 30.034042] kasan_save_stack+0x3c/0x68\n[ 30.037948] kasan_save_track+0x20/0x40\n[ 30.041854] kasan_save_alloc_info+0x40/0x58\n[ 30.046191] __kasan_kmalloc+0xd4/0xd8\n[ 30.050005] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 30.054604] kmalloc_uaf2+0xc4/0x468\n[ 30.058231] kunit_try_run_case+0x14c/0x3d0\n[ 30.062483] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.068041] kthread+0x24c/0x2d0\n[ 30.071329] ret_from_fork+0x10/0x20\n[ 30.074960] \n[ 30.076490] Freed by task 257:\n[ 30.079595] kasan_save_stack+0x3c/0x68\n[ 30.083488] kasan_save_track+0x20/0x40\n[ 30.087380] kasan_save_free_info+0x4c/0x78\n[ 30.091629] __kasan_slab_free+0x6c/0x98\n[ 30.095620] kfree+0x214/0x3c8\n[ 30.098731] kmalloc_uaf2+0x134/0x468\n[ 30.102447] kunit_try_run_case+0x14c/0x3d0\n[ 30.106698] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.112256] kthread+0x24c/0x2d0\n[ 30.115542] ret_from_fork+0x10/0x20\n[ 30.119173] \n[ 30.120704] The buggy address belongs to the object at ffff1b1dd5abb400\n[ 30.120704] which belongs to the cache kmalloc-64 of size 64\n[ 30.133182] The buggy address is located 40 bytes inside of\n[ 30.133182] freed 64-byte region [ffff1b1dd5abb400, ffff1b1dd5abb440)\n[ 30.145394] \n[ 30.146918] The buggy address belongs to the physical page:\n[ 30.152554] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115abb\n[ 30.160654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 30.167269] page_type: f5(slab)\n[ 30.170464] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 30.178306] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 30.186143] page dumped because: kasan: bad access detected\n[ 30.191783] \n[ 30.193306] Memory state around the buggy address:\n[ 30.198158] ffff1b1dd5abb300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 30.205473] ffff1b1dd5abb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 30.212789] >ffff1b1dd5abb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 30.220091] ^\n[ 30.224683] ffff1b1dd5abb480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc\n[ 30.231998] ffff1b1dd5abb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 30.239303] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmalloc_double_kzfree-35ab234c6d071d4bad0a39de87d8f3c3cb8f83c74e01f7910ff1b485075f2171": { "log_lines": [ "[ 30.258258] ==================================================================\n[ 30.272880] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308\n[ 30.280380] Read of size 1 at addr ffff1b1dd4371860 by task kunit_try_catch/261\n[ 30.287784] \n[ 30.289313] CPU: 4 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 30.289339] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 30.289347] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 30.289357] Call trace:\n[ 30.289364] show_stack+0x20/0x38 (C)\n[ 30.289381] dump_stack_lvl+0x8c/0xd0\n[ 30.289395] print_report+0x118/0x5e0\n[ 30.289413] kasan_report+0xc8/0x118\n[ 30.289429] __kasan_check_byte+0x54/0x70\n[ 30.289446] kfree_sensitive+0x30/0xb0\n[ 30.289465] kmalloc_double_kzfree+0x168/0x308\n[ 30.289480] kunit_try_run_case+0x14c/0x3d0\n[ 30.289498] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.289515] kthread+0x24c/0x2d0\n[ 30.289530] ret_from_fork+0x10/0x20\n[ 30.289545] \n[ 30.356028] Allocated by task 261:\n[ 30.359481] kasan_save_stack+0x3c/0x68\n[ 30.363386] kasan_save_track+0x20/0x40\n[ 30.367288] kasan_save_alloc_info+0x40/0x58\n[ 30.371622] __kasan_kmalloc+0xd4/0xd8\n[ 30.375437] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 30.380040] kmalloc_double_kzfree+0xb8/0x308\n[ 30.384460] kunit_try_run_case+0x14c/0x3d0\n[ 30.388711] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.394272] kthread+0x24c/0x2d0\n[ 30.397556] ret_from_fork+0x10/0x20\n[ 30.401185] \n[ 30.402707] Freed by task 261:\n[ 30.405808] kasan_save_stack+0x3c/0x68\n[ 30.409710] kasan_save_track+0x20/0x40\n[ 30.413611] kasan_save_free_info+0x4c/0x78\n[ 30.417861] __kasan_slab_free+0x6c/0x98\n[ 30.421850] kfree+0x214/0x3c8\n[ 30.424956] kfree_sensitive+0x80/0xb0\n[ 30.428769] kmalloc_double_kzfree+0x11c/0x308\n[ 30.433277] kunit_try_run_case+0x14c/0x3d0\n[ 30.437529] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.443089] kthread+0x24c/0x2d0\n[ 30.446372] ret_from_fork+0x10/0x20\n[ 30.450010] \n[ 30.451541] The buggy address belongs to the object at ffff1b1dd4371860\n[ 30.451541] which belongs to the cache kmalloc-16 of size 16\n[ 30.464015] The buggy address is located 0 bytes inside of\n[ 30.464015] freed 16-byte region [ffff1b1dd4371860, ffff1b1dd4371870)\n[ 30.476142] \n[ 30.477664] The buggy address belongs to the physical page:\n[ 30.483305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114371\n[ 30.491401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 30.498010] page_type: f5(slab)\n[ 30.501205] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 30.509043] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 30.516876] page dumped because: kasan: bad access detected\n[ 30.522518] \n[ 30.524046] Memory state around the buggy address:\n[ 30.528898] ffff1b1dd4371700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 30.536212] ffff1b1dd4371780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 30.543527] >ffff1b1dd4371800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 30.550839] ^\n[ 30.557271] ffff1b1dd4371880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 30.564585] ffff1b1dd4371900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 30.571896] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_double-free_in_kfree_sensitive-9ea94b3939805543bc2c301a0ca8a79369d7eb2cc29b5343929e58f53bb3b7c9": { "log_lines": [ "[ 30.579323] ==================================================================\n[ 30.586642] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0\n[ 30.592734] Free of addr ffff1b1dd4371860 by task kunit_try_catch/261\n[ 30.599260] \n[ 30.600791] CPU: 4 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 30.600815] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 30.600822] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 30.600832] Call trace:\n[ 30.600837] show_stack+0x20/0x38 (C)\n[ 30.600852] dump_stack_lvl+0x8c/0xd0\n[ 30.600865] print_report+0x118/0x5e0\n[ 30.600882] kasan_report_invalid_free+0xb0/0xd8\n[ 30.600899] check_slab_allocation+0xd4/0x108\n[ 30.600916] __kasan_slab_pre_free+0x2c/0x48\n[ 30.600933] kfree+0xe8/0x3c8\n[ 30.600946] kfree_sensitive+0x3c/0xb0\n[ 30.600961] kmalloc_double_kzfree+0x168/0x308\n[ 30.600977] kunit_try_run_case+0x14c/0x3d0\n[ 30.600995] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.601012] kthread+0x24c/0x2d0\n[ 30.601028] ret_from_fork+0x10/0x20\n[ 30.601043] \n[ 30.676250] Allocated by task 261:\n[ 30.679701] kasan_save_stack+0x3c/0x68\n[ 30.683606] kasan_save_track+0x20/0x40\n[ 30.687509] kasan_save_alloc_info+0x40/0x58\n[ 30.691843] __kasan_kmalloc+0xd4/0xd8\n[ 30.695657] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 30.700251] kmalloc_double_kzfree+0xb8/0x308\n[ 30.704671] kunit_try_run_case+0x14c/0x3d0\n[ 30.708923] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.714484] kthread+0x24c/0x2d0\n[ 30.717767] ret_from_fork+0x10/0x20\n[ 30.721407] \n[ 30.722928] Freed by task 261:\n[ 30.726031] kasan_save_stack+0x3c/0x68\n[ 30.729928] kasan_save_track+0x20/0x40\n[ 30.733828] kasan_save_free_info+0x4c/0x78\n[ 30.738078] __kasan_slab_free+0x6c/0x98\n[ 30.742067] kfree+0x214/0x3c8\n[ 30.745171] kfree_sensitive+0x80/0xb0\n[ 30.748984] kmalloc_double_kzfree+0x11c/0x308\n[ 30.753491] kunit_try_run_case+0x14c/0x3d0\n[ 30.757742] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.763299] kthread+0x24c/0x2d0\n[ 30.766583] ret_from_fork+0x10/0x20\n[ 30.770223] \n[ 30.771750] The buggy address belongs to the object at ffff1b1dd4371860\n[ 30.771750] which belongs to the cache kmalloc-16 of size 16\n[ 30.784231] The buggy address is located 0 bytes inside of\n[ 30.784231] 16-byte region [ffff1b1dd4371860, ffff1b1dd4371870)\n[ 30.795837] \n[ 30.797360] The buggy address belongs to the physical page:\n[ 30.802999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114371\n[ 30.811104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 30.817709] page_type: f5(slab)\n[ 30.820903] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 30.828737] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 30.836568] page dumped because: kasan: bad access detected\n[ 30.842207] \n[ 30.843734] Memory state around the buggy address:\n[ 30.848591] ffff1b1dd4371700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 30.855900] ffff1b1dd4371780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 30.863206] >ffff1b1dd4371800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc\n[ 30.870514] ^\n[ 30.876943] ffff1b1dd4371880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 30.884252] ffff1b1dd4371900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 30.891560] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_ksize_unpoisons_memory-eb63de8a0dd265c0253dd125af99181be75b9fe0bc028d103e7949d551877aea": { "log_lines": [ "[ 31.514852] ==================================================================\n[ 31.522188] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750\n[ 31.529688] Read of size 1 at addr ffff1b1dd4b7257f by task kunit_try_catch/263\n[ 31.537099] \n[ 31.538631] CPU: 3 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 31.538654] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 31.538662] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 31.538672] Call trace:\n[ 31.538678] show_stack+0x20/0x38 (C)\n[ 31.538695] dump_stack_lvl+0x8c/0xd0\n[ 31.538709] print_report+0x118/0x5e0\n[ 31.538724] kasan_report+0xc8/0x118\n[ 31.538741] __asan_report_load1_noabort+0x20/0x30\n[ 31.538762] ksize_unpoisons_memory+0x6a0/0x750\n[ 31.538779] kunit_try_run_case+0x14c/0x3d0\n[ 31.538798] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.538817] kthread+0x24c/0x2d0\n[ 31.538833] ret_from_fork+0x10/0x20\n[ 31.538850] \n[ 31.602441] Allocated by task 263:\n[ 31.605906] kasan_save_stack+0x3c/0x68\n[ 31.609812] kasan_save_track+0x20/0x40\n[ 31.613715] kasan_save_alloc_info+0x40/0x58\n[ 31.618062] __kasan_kmalloc+0xd4/0xd8\n[ 31.621877] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 31.626482] ksize_unpoisons_memory+0xc0/0x750\n[ 31.631000] kunit_try_run_case+0x14c/0x3d0\n[ 31.635260] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.640826] kthread+0x24c/0x2d0\n[ 31.644114] ret_from_fork+0x10/0x20\n[ 31.647756] \n[ 31.649286] The buggy address belongs to the object at ffff1b1dd4b72500\n[ 31.649286] which belongs to the cache kmalloc-128 of size 128\n[ 31.661946] The buggy address is located 12 bytes to the right of\n[ 31.661946] allocated 115-byte region [ffff1b1dd4b72500, ffff1b1dd4b72573)\n[ 31.675139] \n[ 31.676670] The buggy address belongs to the physical page:\n[ 31.682313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 31.690417] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 31.698176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 31.705232] page_type: f5(slab)\n[ 31.708431] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 31.716277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 31.724123] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 31.732055] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 31.739987] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 31.747919] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 31.755848] page dumped because: kasan: bad access detected\n[ 31.761494] \n[ 31.763023] Memory state around the buggy address:\n[ 31.767880] ffff1b1dd4b72400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 31.775194] ffff1b1dd4b72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.782508] >ffff1b1dd4b72500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 31.789820] ^\n[ 31.797044] ffff1b1dd4b72580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.804360] ffff1b1dd4b72600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.811673] ==================================================================", "[ 31.210867] ==================================================================\n[ 31.218185] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750\n[ 31.225678] Read of size 1 at addr ffff1b1dd4b72578 by task kunit_try_catch/263\n[ 31.233081] \n[ 31.234607] CPU: 4 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 31.234631] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 31.234638] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 31.234647] Call trace:\n[ 31.234652] show_stack+0x20/0x38 (C)\n[ 31.234668] dump_stack_lvl+0x8c/0xd0\n[ 31.234681] print_report+0x118/0x5e0\n[ 31.234697] kasan_report+0xc8/0x118\n[ 31.234715] __asan_report_load1_noabort+0x20/0x30\n[ 31.234733] ksize_unpoisons_memory+0x628/0x750\n[ 31.234750] kunit_try_run_case+0x14c/0x3d0\n[ 31.234768] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.234784] kthread+0x24c/0x2d0\n[ 31.234801] ret_from_fork+0x10/0x20\n[ 31.234816] \n[ 31.298347] Allocated by task 263:\n[ 31.301798] kasan_save_stack+0x3c/0x68\n[ 31.305700] kasan_save_track+0x20/0x40\n[ 31.309602] kasan_save_alloc_info+0x40/0x58\n[ 31.313938] __kasan_kmalloc+0xd4/0xd8\n[ 31.317750] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 31.322346] ksize_unpoisons_memory+0xc0/0x750\n[ 31.326853] kunit_try_run_case+0x14c/0x3d0\n[ 31.331104] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.336659] kthread+0x24c/0x2d0\n[ 31.339942] ret_from_fork+0x10/0x20\n[ 31.343571] \n[ 31.345102] The buggy address belongs to the object at ffff1b1dd4b72500\n[ 31.345102] which belongs to the cache kmalloc-128 of size 128\n[ 31.357751] The buggy address is located 5 bytes to the right of\n[ 31.357751] allocated 115-byte region [ffff1b1dd4b72500, ffff1b1dd4b72573)\n[ 31.370846] \n[ 31.372374] The buggy address belongs to the physical page:\n[ 31.378014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 31.386112] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 31.393860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 31.400904] page_type: f5(slab)\n[ 31.404098] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 31.411934] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 31.419771] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 31.427694] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 31.435616] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 31.443539] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 31.451458] page dumped because: kasan: bad access detected\n[ 31.457095] \n[ 31.458616] Memory state around the buggy address:\n[ 31.463474] ffff1b1dd4b72400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 31.470777] ffff1b1dd4b72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.478090] >ffff1b1dd4b72500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 31.485400] ^\n[ 31.492623] ffff1b1dd4b72580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.499934] ffff1b1dd4b72600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.507238] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_ksize_unpoisons_memory-d1daad59587e6b49193a5ec5b6bd353ec81a026d2cca121f88ff8bffb6801947": { "log_lines": [ "[ 30.903049] ==================================================================\n[ 30.914611] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750\n[ 30.922107] Read of size 1 at addr ffff1b1dd4b72573 by task kunit_try_catch/263\n[ 30.929512] \n[ 30.931041] CPU: 4 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 30.931067] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 30.931075] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 30.931085] Call trace:\n[ 30.931091] show_stack+0x20/0x38 (C)\n[ 30.931107] dump_stack_lvl+0x8c/0xd0\n[ 30.931122] print_report+0x118/0x5e0\n[ 30.931139] kasan_report+0xc8/0x118\n[ 30.931154] __asan_report_load1_noabort+0x20/0x30\n[ 30.931173] ksize_unpoisons_memory+0x638/0x750\n[ 30.931187] kunit_try_run_case+0x14c/0x3d0\n[ 30.931206] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 30.931222] kthread+0x24c/0x2d0\n[ 30.931237] ret_from_fork+0x10/0x20\n[ 30.931252] \n[ 30.994795] Allocated by task 263:\n[ 30.998247] kasan_save_stack+0x3c/0x68\n[ 31.002153] kasan_save_track+0x20/0x40\n[ 31.006054] kasan_save_alloc_info+0x40/0x58\n[ 31.010392] __kasan_kmalloc+0xd4/0xd8\n[ 31.014204] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 31.018802] ksize_unpoisons_memory+0xc0/0x750\n[ 31.023310] kunit_try_run_case+0x14c/0x3d0\n[ 31.027559] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.033117] kthread+0x24c/0x2d0\n[ 31.036400] ret_from_fork+0x10/0x20\n[ 31.040040] \n[ 31.041562] The buggy address belongs to the object at ffff1b1dd4b72500\n[ 31.041562] which belongs to the cache kmalloc-128 of size 128\n[ 31.054213] The buggy address is located 0 bytes to the right of\n[ 31.054213] allocated 115-byte region [ffff1b1dd4b72500, ffff1b1dd4b72573)\n[ 31.067301] \n[ 31.068830] The buggy address belongs to the physical page:\n[ 31.074475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 31.082572] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 31.090322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 31.097378] page_type: f5(slab)\n[ 31.100574] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 31.108412] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 31.116248] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 31.124170] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 31.132093] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 31.140017] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 31.147935] page dumped because: kasan: bad access detected\n[ 31.153576] \n[ 31.155098] Memory state around the buggy address:\n[ 31.159953] ffff1b1dd4b72400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 31.167259] ffff1b1dd4b72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.174572] >ffff1b1dd4b72500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 31.181882] ^\n[ 31.188835] ffff1b1dd4b72580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.196147] ffff1b1dd4b72600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 31.203450] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_ksize_uaf-db2ec7d44ef32420f05518929b941d7251c9e172ebbf9f37ed3e0fe7d719607c": { "log_lines": [ "[ 31.823597] ==================================================================\n[ 31.835239] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600\n[ 31.841679] Read of size 1 at addr ffff1b1dd4b72600 by task kunit_try_catch/265\n[ 31.849081] \n[ 31.850611] CPU: 4 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 31.850637] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 31.850645] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 31.850655] Call trace:\n[ 31.850661] show_stack+0x20/0x38 (C)\n[ 31.850677] dump_stack_lvl+0x8c/0xd0\n[ 31.850691] print_report+0x118/0x5e0\n[ 31.850708] kasan_report+0xc8/0x118\n[ 31.850723] __kasan_check_byte+0x54/0x70\n[ 31.850741] ksize+0x30/0x88\n[ 31.850757] ksize_uaf+0x168/0x600\n[ 31.850771] kunit_try_run_case+0x14c/0x3d0\n[ 31.850789] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.850806] kthread+0x24c/0x2d0\n[ 31.850821] ret_from_fork+0x10/0x20\n[ 31.850837] \n[ 31.915390] Allocated by task 265:\n[ 31.918843] kasan_save_stack+0x3c/0x68\n[ 31.922747] kasan_save_track+0x20/0x40\n[ 31.926649] kasan_save_alloc_info+0x40/0x58\n[ 31.930985] __kasan_kmalloc+0xd4/0xd8\n[ 31.934799] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 31.939403] ksize_uaf+0xb8/0x600\n[ 31.942780] kunit_try_run_case+0x14c/0x3d0\n[ 31.947035] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.952595] kthread+0x24c/0x2d0\n[ 31.955880] ret_from_fork+0x10/0x20\n[ 31.959512] \n[ 31.961045] Freed by task 265:\n[ 31.964151] kasan_save_stack+0x3c/0x68\n[ 31.968053] kasan_save_track+0x20/0x40\n[ 31.971954] kasan_save_free_info+0x4c/0x78\n[ 31.976205] __kasan_slab_free+0x6c/0x98\n[ 31.980195] kfree+0x214/0x3c8\n[ 31.983306] ksize_uaf+0x11c/0x600\n[ 31.986760] kunit_try_run_case+0x14c/0x3d0\n[ 31.991011] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 31.996567] kthread+0x24c/0x2d0\n[ 31.999851] ret_from_fork+0x10/0x20\n[ 32.003483] \n[ 32.005014] The buggy address belongs to the object at ffff1b1dd4b72600\n[ 32.005014] which belongs to the cache kmalloc-128 of size 128\n[ 32.017667] The buggy address is located 0 bytes inside of\n[ 32.017667] freed 128-byte region [ffff1b1dd4b72600, ffff1b1dd4b72680)\n[ 32.029884] \n[ 32.031416] The buggy address belongs to the physical page:\n[ 32.037054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 32.045152] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 32.052903] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 32.059949] page_type: f5(slab)\n[ 32.063149] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 32.070988] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 32.078825] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 32.086749] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 32.094672] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 32.102596] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 32.110515] page dumped because: kasan: bad access detected\n[ 32.116162] \n[ 32.117684] Memory state around the buggy address:\n[ 32.122535] ffff1b1dd4b72500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 32.129847] ffff1b1dd4b72580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.137162] >ffff1b1dd4b72600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 32.144471] ^\n[ 32.147750] ffff1b1dd4b72680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.155056] ffff1b1dd4b72700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.162365] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_ksize_uaf-4b924369ba4b42cd8fbbd24345aaf9a243005e7def6f0e566a761756a1c13691": { "log_lines": [ "[ 32.509338] ==================================================================\n[ 32.516649] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600\n[ 32.523091] Read of size 1 at addr ffff1b1dd4b72678 by task kunit_try_catch/265\n[ 32.530494] \n[ 32.532023] CPU: 4 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 32.532047] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 32.532055] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 32.532065] Call trace:\n[ 32.532070] show_stack+0x20/0x38 (C)\n[ 32.532087] dump_stack_lvl+0x8c/0xd0\n[ 32.532101] print_report+0x118/0x5e0\n[ 32.532117] kasan_report+0xc8/0x118\n[ 32.532133] __asan_report_load1_noabort+0x20/0x30\n[ 32.532152] ksize_uaf+0x548/0x600\n[ 32.532167] kunit_try_run_case+0x14c/0x3d0\n[ 32.532186] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 32.532203] kthread+0x24c/0x2d0\n[ 32.532219] ret_from_fork+0x10/0x20\n[ 32.532234] \n[ 32.594666] Allocated by task 265:\n[ 32.598117] kasan_save_stack+0x3c/0x68\n[ 32.602020] kasan_save_track+0x20/0x40\n[ 32.605922] kasan_save_alloc_info+0x40/0x58\n[ 32.610258] __kasan_kmalloc+0xd4/0xd8\n[ 32.614072] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 32.618668] ksize_uaf+0xb8/0x600\n[ 32.622035] kunit_try_run_case+0x14c/0x3d0\n[ 32.626285] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 32.631840] kthread+0x24c/0x2d0\n[ 32.635128] ret_from_fork+0x10/0x20\n[ 32.638769] \n[ 32.640296] Freed by task 265:\n[ 32.643403] kasan_save_stack+0x3c/0x68\n[ 32.647304] kasan_save_track+0x20/0x40\n[ 32.651205] kasan_save_free_info+0x4c/0x78\n[ 32.655452] __kasan_slab_free+0x6c/0x98\n[ 32.659441] kfree+0x214/0x3c8\n[ 32.662549] ksize_uaf+0x11c/0x600\n[ 32.666004] kunit_try_run_case+0x14c/0x3d0\n[ 32.670254] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 32.675820] kthread+0x24c/0x2d0\n[ 32.679108] ret_from_fork+0x10/0x20\n[ 32.682738] \n[ 32.684264] The buggy address belongs to the object at ffff1b1dd4b72600\n[ 32.684264] which belongs to the cache kmalloc-128 of size 128\n[ 32.696913] The buggy address is located 120 bytes inside of\n[ 32.696913] freed 128-byte region [ffff1b1dd4b72600, ffff1b1dd4b72680)\n[ 32.709306] \n[ 32.710828] The buggy address belongs to the physical page:\n[ 32.716476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 32.724572] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 32.732322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 32.739369] page_type: f5(slab)\n[ 32.742562] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 32.750398] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 32.758236] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 32.766161] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 32.774083] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 32.782006] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 32.789926] page dumped because: kasan: bad access detected\n[ 32.795563] \n[ 32.797094] Memory state around the buggy address:\n[ 32.801944] ffff1b1dd4b72500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 32.809257] ffff1b1dd4b72580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.816571] >ffff1b1dd4b72600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 32.823883] ^\n[ 32.831102] ffff1b1dd4b72680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.838413] ffff1b1dd4b72700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.845723] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_ksize_uaf-c606a6e00d482f6c586a29ab7138fbd575fbb7246ef113bc43212a2d1e066091": { "log_lines": [ "[ 32.169731] ==================================================================\n[ 32.177046] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600\n[ 32.183486] Read of size 1 at addr ffff1b1dd4b72600 by task kunit_try_catch/265\n[ 32.190891] \n[ 32.192424] CPU: 4 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 32.192447] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 32.192456] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 32.192465] Call trace:\n[ 32.192470] show_stack+0x20/0x38 (C)\n[ 32.192485] dump_stack_lvl+0x8c/0xd0\n[ 32.192499] print_report+0x118/0x5e0\n[ 32.192515] kasan_report+0xc8/0x118\n[ 32.192529] __asan_report_load1_noabort+0x20/0x30\n[ 32.192549] ksize_uaf+0x59c/0x600\n[ 32.192563] kunit_try_run_case+0x14c/0x3d0\n[ 32.192581] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 32.192598] kthread+0x24c/0x2d0\n[ 32.192613] ret_from_fork+0x10/0x20\n[ 32.192629] \n[ 32.255059] Allocated by task 265:\n[ 32.258510] kasan_save_stack+0x3c/0x68\n[ 32.262413] kasan_save_track+0x20/0x40\n[ 32.266316] kasan_save_alloc_info+0x40/0x58\n[ 32.270653] __kasan_kmalloc+0xd4/0xd8\n[ 32.274466] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 32.279061] ksize_uaf+0xb8/0x600\n[ 32.282428] kunit_try_run_case+0x14c/0x3d0\n[ 32.286679] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 32.292235] kthread+0x24c/0x2d0\n[ 32.295521] ret_from_fork+0x10/0x20\n[ 32.299153] \n[ 32.300682] Freed by task 265:\n[ 32.303784] kasan_save_stack+0x3c/0x68\n[ 32.307686] kasan_save_track+0x20/0x40\n[ 32.311588] kasan_save_free_info+0x4c/0x78\n[ 32.315836] __kasan_slab_free+0x6c/0x98\n[ 32.319824] kfree+0x214/0x3c8\n[ 32.322934] ksize_uaf+0x11c/0x600\n[ 32.326388] kunit_try_run_case+0x14c/0x3d0\n[ 32.330639] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 32.336195] kthread+0x24c/0x2d0\n[ 32.339483] ret_from_fork+0x10/0x20\n[ 32.343113] \n[ 32.344641] The buggy address belongs to the object at ffff1b1dd4b72600\n[ 32.344641] which belongs to the cache kmalloc-128 of size 128\n[ 32.357290] The buggy address is located 0 bytes inside of\n[ 32.357290] freed 128-byte region [ffff1b1dd4b72600, ffff1b1dd4b72680)\n[ 32.369507] \n[ 32.371029] The buggy address belongs to the physical page:\n[ 32.376676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 32.384772] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 32.392522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 32.399567] page_type: f5(slab)\n[ 32.402763] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 32.410600] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 32.418437] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 32.426359] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 32.434281] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 32.442203] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 32.450123] page dumped because: kasan: bad access detected\n[ 32.455759] \n[ 32.457281] Memory state around the buggy address:\n[ 32.462141] ffff1b1dd4b72500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 32.469454] ffff1b1dd4b72580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.476765] >ffff1b1dd4b72600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 32.484076] ^\n[ 32.487358] ffff1b1dd4b72680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.494672] ffff1b1dd4b72700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 32.501981] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_rcu_uaf_reclaim-544c8eb993a8ddf0e43afe1385528f131943632f1ffd4e1c2afdc9983c35c1f5": { "log_lines": [ "[ 32.892147] ==================================================================\n[ 32.902650] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70\n[ 32.909444] Read of size 4 at addr ffff1b1dd5b02740 by task swapper/6/0\n[ 32.916142] \n[ 32.917672] CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G B N 6.13.3 #1\n[ 32.917696] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 32.917704] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 32.917715] Call trace:\n[ 32.917721] show_stack+0x20/0x38 (C)\n[ 32.917738] dump_stack_lvl+0x8c/0xd0\n[ 32.917754] print_report+0x118/0x5e0\n[ 32.917771] kasan_report+0xc8/0x118\n[ 32.917787] __asan_report_load4_noabort+0x20/0x30\n[ 32.917806] rcu_uaf_reclaim+0x64/0x70\n[ 32.917820] rcu_core+0x9f4/0x1e20\n[ 32.917835] rcu_core_si+0x18/0x30\n[ 32.917848] handle_softirqs+0x374/0xb20\n[ 32.917864] __do_softirq+0x1c/0x28\n[ 32.917879] ____do_softirq+0x18/0x30\n[ 32.917895] call_on_irq_stack+0x24/0x58\n[ 32.917910] do_softirq_own_stack+0x24/0x38\n[ 32.917927] __irq_exit_rcu+0x1fc/0x318\n[ 32.917941] irq_exit_rcu+0x1c/0x80\n[ 32.917955] el1_interrupt+0x38/0x58\n[ 32.917972] el1h_64_irq_handler+0x18/0x28\n[ 32.917989] el1h_64_irq+0x6c/0x70\n[ 32.918003] arch_local_irq_enable+0x4/0x8 (P)\n[ 32.918023] cpuidle_enter+0x60/0xb8\n[ 32.918038] do_idle+0x36c/0x4e8\n[ 32.918052] cpu_startup_entry+0x68/0x80\n[ 32.918067] secondary_start_kernel+0x288/0x340\n[ 32.918086] __secondary_switched+0xc0/0xc8\n[ 32.918106] \n[ 33.032577] Allocated by task 267:\n[ 33.036031] kasan_save_stack+0x3c/0x68\n[ 33.039938] kasan_save_track+0x20/0x40\n[ 33.043841] kasan_save_alloc_info+0x40/0x58\n[ 33.048180] __kasan_kmalloc+0xd4/0xd8\n[ 33.051994] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 33.056592] rcu_uaf+0xb0/0x2d0\n[ 33.059786] kunit_try_run_case+0x14c/0x3d0\n[ 33.064039] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.069601] kthread+0x24c/0x2d0\n[ 33.072886] ret_from_fork+0x10/0x20\n[ 33.076518] \n[ 33.078040] Freed by task 0:\n[ 33.080973] kasan_save_stack+0x3c/0x68\n[ 33.084876] kasan_save_track+0x20/0x40\n[ 33.088778] kasan_save_free_info+0x4c/0x78\n[ 33.093029] __kasan_slab_free+0x6c/0x98\n[ 33.097019] kfree+0x214/0x3c8\n[ 33.100127] rcu_uaf_reclaim+0x28/0x70\n[ 33.103939] rcu_core+0x9f4/0x1e20\n[ 33.107397] rcu_core_si+0x18/0x30\n[ 33.110852] handle_softirqs+0x374/0xb20\n[ 33.114842] __do_softirq+0x1c/0x28\n[ 33.118384] \n[ 33.119912] Last potentially related work creation:\n[ 33.124849] kasan_save_stack+0x3c/0x68\n[ 33.128743] __kasan_record_aux_stack+0xbc/0xe8\n[ 33.133342] kasan_record_aux_stack_noalloc+0x14/0x20\n[ 33.138464] __call_rcu_common.constprop.0+0x74/0xa10\n[ 33.143595] call_rcu+0x18/0x30\n[ 33.146791] rcu_uaf+0x14c/0x2d0\n[ 33.150074] kunit_try_run_case+0x14c/0x3d0\n[ 33.154327] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.159884] kthread+0x24c/0x2d0\n[ 33.163173] ret_from_fork+0x10/0x20\n[ 33.166804] \n[ 33.168333] The buggy address belongs to the object at ffff1b1dd5b02740\n[ 33.168333] which belongs to the cache kmalloc-32 of size 32\n[ 33.180812] The buggy address is located 0 bytes inside of\n[ 33.180812] freed 32-byte region [ffff1b1dd5b02740, ffff1b1dd5b02760)\n[ 33.192937] \n[ 33.194459] The buggy address belongs to the physical page:\n[ 33.200098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115b02\n[ 33.208197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 33.214812] page_type: f5(slab)\n[ 33.218009] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 33.225847] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 33.233683] page dumped because: kasan: bad access detected\n[ 33.239326] \n[ 33.240855] Memory state around the buggy address:\n[ 33.245709] ffff1b1dd5b02600: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc\n[ 33.253014] ffff1b1dd5b02680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc\n[ 33.260327] >ffff1b1dd5b02700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 33.267631] ^\n[ 33.273015] ffff1b1dd5b02780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.280328] ffff1b1dd5b02800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.287631] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_workqueue_uaf-1062c0a982eddad52b64bec47d382b57e3498425b50db84ce80f72ff5ca0c907": { "log_lines": [ "[ 33.301954] ==================================================================\n[ 33.312289] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8\n[ 33.319085] Read of size 8 at addr ffff1b1dd437fa00 by task kunit_try_catch/269\n[ 33.326492] \n[ 33.328026] CPU: 4 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 33.328050] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 33.328058] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 33.328069] Call trace:\n[ 33.328075] show_stack+0x20/0x38 (C)\n[ 33.328093] dump_stack_lvl+0x8c/0xd0\n[ 33.328107] print_report+0x118/0x5e0\n[ 33.328124] kasan_report+0xc8/0x118\n[ 33.328140] __asan_report_load8_noabort+0x20/0x30\n[ 33.328161] workqueue_uaf+0x480/0x4a8\n[ 33.328175] kunit_try_run_case+0x14c/0x3d0\n[ 33.328194] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.328213] kthread+0x24c/0x2d0\n[ 33.328230] ret_from_fork+0x10/0x20\n[ 33.328246] \n[ 33.391038] Allocated by task 269:\n[ 33.394490] kasan_save_stack+0x3c/0x68\n[ 33.398396] kasan_save_track+0x20/0x40\n[ 33.402297] kasan_save_alloc_info+0x40/0x58\n[ 33.406633] __kasan_kmalloc+0xd4/0xd8\n[ 33.410447] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 33.415043] workqueue_uaf+0x13c/0x4a8\n[ 33.418856] kunit_try_run_case+0x14c/0x3d0\n[ 33.423106] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.428662] kthread+0x24c/0x2d0\n[ 33.431946] ret_from_fork+0x10/0x20\n[ 33.435576] \n[ 33.437108] Freed by task 114:\n[ 33.440210] kasan_save_stack+0x3c/0x68\n[ 33.444113] kasan_save_track+0x20/0x40\n[ 33.448015] kasan_save_free_info+0x4c/0x78\n[ 33.452264] __kasan_slab_free+0x6c/0x98\n[ 33.456254] kfree+0x214/0x3c8\n[ 33.459364] workqueue_uaf_work+0x18/0x30\n[ 33.463436] process_one_work+0x530/0xf98\n[ 33.467507] worker_thread+0x614/0xf28\n[ 33.471319] kthread+0x24c/0x2d0\n[ 33.474602] ret_from_fork+0x10/0x20\n[ 33.478242] \n[ 33.479770] Last potentially related work creation:\n[ 33.484715] kasan_save_stack+0x3c/0x68\n[ 33.488615] __kasan_record_aux_stack+0xbc/0xe8\n[ 33.493213] kasan_record_aux_stack_noalloc+0x14/0x20\n[ 33.498344] __queue_work+0x65c/0xfd8\n[ 33.502069] queue_work_on+0xbc/0xf8\n[ 33.505697] workqueue_uaf+0x210/0x4a8\n[ 33.509508] kunit_try_run_case+0x14c/0x3d0\n[ 33.513759] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.519319] kthread+0x24c/0x2d0\n[ 33.522602] ret_from_fork+0x10/0x20\n[ 33.526242] \n[ 33.527770] The buggy address belongs to the object at ffff1b1dd437fa00\n[ 33.527770] which belongs to the cache kmalloc-32 of size 32\n[ 33.540245] The buggy address is located 0 bytes inside of\n[ 33.540245] freed 32-byte region [ffff1b1dd437fa00, ffff1b1dd437fa20)\n[ 33.552379] \n[ 33.553901] The buggy address belongs to the physical page:\n[ 33.559539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 33.567635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 33.574247] page_type: f5(slab)\n[ 33.577443] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 33.585279] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 33.593112] page dumped because: kasan: bad access detected\n[ 33.598755] \n[ 33.600283] Memory state around the buggy address:\n[ 33.605143] ffff1b1dd437f900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 33.612456] ffff1b1dd437f980: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc\n[ 33.619769] >ffff1b1dd437fa00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.627073] ^\n[ 33.630350] ffff1b1dd437fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.637662] ffff1b1dd437fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.644973] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kmem_cache_oob-440dfa2147d655bc2a879eae4d687ecae4b93146b6533be3423fbc3402a4ddd9": { "log_lines": [ "[ 33.673645] ==================================================================\n[ 33.684599] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428\n[ 33.691400] Read of size 1 at addr ffff1b1dc21f60c8 by task kunit_try_catch/276\n[ 33.698810] \n[ 33.700346] CPU: 3 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 33.700373] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 33.700381] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 33.700391] Call trace:\n[ 33.700398] show_stack+0x20/0x38 (C)\n[ 33.700414] dump_stack_lvl+0x8c/0xd0\n[ 33.700430] print_report+0x118/0x5e0\n[ 33.700449] kasan_report+0xc8/0x118\n[ 33.700465] __asan_report_load1_noabort+0x20/0x30\n[ 33.700485] kmem_cache_oob+0x33c/0x428\n[ 33.700501] kunit_try_run_case+0x14c/0x3d0\n[ 33.700524] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.700541] kthread+0x24c/0x2d0\n[ 33.700558] ret_from_fork+0x10/0x20\n[ 33.700575] \n[ 33.763473] Allocated by task 276:\n[ 33.766931] kasan_save_stack+0x3c/0x68\n[ 33.770840] kasan_save_track+0x20/0x40\n[ 33.774747] kasan_save_alloc_info+0x40/0x58\n[ 33.779086] __kasan_slab_alloc+0xa8/0xb0\n[ 33.783165] kmem_cache_alloc_noprof+0x108/0x398\n[ 33.787862] kmem_cache_oob+0x12c/0x428\n[ 33.791767] kunit_try_run_case+0x14c/0x3d0\n[ 33.796019] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 33.801585] kthread+0x24c/0x2d0\n[ 33.804879] ret_from_fork+0x10/0x20\n[ 33.808515] \n[ 33.810044] The buggy address belongs to the object at ffff1b1dc21f6000\n[ 33.810044] which belongs to the cache test_cache of size 200\n[ 33.822619] The buggy address is located 0 bytes to the right of\n[ 33.822619] allocated 200-byte region [ffff1b1dc21f6000, ffff1b1dc21f60c8)\n[ 33.835722] \n[ 33.837255] The buggy address belongs to the physical page:\n[ 33.842905] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021f6\n[ 33.851019] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 33.858774] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 33.865827] page_type: f5(slab)\n[ 33.869031] raw: 0bfffe0000000040 ffff1b1dc21f4000 dead000000000122 0000000000000000\n[ 33.876871] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 33.884711] head: 0bfffe0000000040 ffff1b1dc21f4000 dead000000000122 0000000000000000\n[ 33.892648] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 33.900582] head: 0bfffe0000000001 fffffe6c37087d81 ffffffffffffffff 0000000000000000\n[ 33.908512] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 33.916445] page dumped because: kasan: bad access detected\n[ 33.922092] \n[ 33.923618] Memory state around the buggy address:\n[ 33.928485] ffff1b1dc21f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.935808] ffff1b1dc21f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 33.943130] >ffff1b1dc21f6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc\n[ 33.950445] ^\n[ 33.956099] ffff1b1dc21f6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.963422] ffff1b1dc21f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 33.970737] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_double-free_in_kmem_cache_double_free-619ce4eff43287292c98b1d3cab23253af6648702a23405d7b7c21e4ff8a247e": { "log_lines": [ "[ 34.023529] ==================================================================\n[ 34.034504] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8\n[ 34.041394] Free of addr ffff1b1dd4b76000 by task kunit_try_catch/278\n[ 34.047918] \n[ 34.049453] CPU: 4 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 34.049485] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 34.049495] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 34.049509] Call trace:\n[ 34.049517] show_stack+0x20/0x38 (C)\n[ 34.049534] dump_stack_lvl+0x8c/0xd0\n[ 34.049550] print_report+0x118/0x5e0\n[ 34.049569] kasan_report_invalid_free+0xb0/0xd8\n[ 34.049587] check_slab_allocation+0xd4/0x108\n[ 34.049606] __kasan_slab_pre_free+0x2c/0x48\n[ 34.049622] kmem_cache_free+0xf0/0x470\n[ 34.049640] kmem_cache_double_free+0x190/0x3c8\n[ 34.049655] kunit_try_run_case+0x14c/0x3d0\n[ 34.049677] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.049694] kthread+0x24c/0x2d0\n[ 34.049713] ret_from_fork+0x10/0x20\n[ 34.049732] \n[ 34.122079] Allocated by task 278:\n[ 34.125534] kasan_save_stack+0x3c/0x68\n[ 34.129441] kasan_save_track+0x20/0x40\n[ 34.133344] kasan_save_alloc_info+0x40/0x58\n[ 34.137682] __kasan_slab_alloc+0xa8/0xb0\n[ 34.141759] kmem_cache_alloc_noprof+0x108/0x398\n[ 34.146442] kmem_cache_double_free+0x12c/0x3c8\n[ 34.151038] kunit_try_run_case+0x14c/0x3d0\n[ 34.155287] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.160845] kthread+0x24c/0x2d0\n[ 34.164129] ret_from_fork+0x10/0x20\n[ 34.167759] \n[ 34.169282] Freed by task 278:\n[ 34.172385] kasan_save_stack+0x3c/0x68\n[ 34.176287] kasan_save_track+0x20/0x40\n[ 34.180189] kasan_save_free_info+0x4c/0x78\n[ 34.184439] __kasan_slab_free+0x6c/0x98\n[ 34.188429] kmem_cache_free+0x260/0x470\n[ 34.192418] kmem_cache_double_free+0x140/0x3c8\n[ 34.197014] kunit_try_run_case+0x14c/0x3d0\n[ 34.201264] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.206825] kthread+0x24c/0x2d0\n[ 34.210108] ret_from_fork+0x10/0x20\n[ 34.213737] \n[ 34.215268] The buggy address belongs to the object at ffff1b1dd4b76000\n[ 34.215268] which belongs to the cache test_cache of size 200\n[ 34.227832] The buggy address is located 0 bytes inside of\n[ 34.227832] 200-byte region [ffff1b1dd4b76000, ffff1b1dd4b760c8)\n[ 34.239523] \n[ 34.241056] The buggy address belongs to the physical page:\n[ 34.246701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b76\n[ 34.254803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 34.262555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 34.269608] page_type: f5(slab)\n[ 34.272806] raw: 0bfffe0000000040 ffff1b1dc8554140 dead000000000122 0000000000000000\n[ 34.280647] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 34.288486] head: 0bfffe0000000040 ffff1b1dc8554140 dead000000000122 0000000000000000\n[ 34.296410] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 34.304334] head: 0bfffe0000000001 fffffe6c3752dd81 ffffffffffffffff 0000000000000000\n[ 34.312257] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 34.320178] page dumped because: kasan: bad access detected\n[ 34.325822] \n[ 34.327353] Memory state around the buggy address:\n[ 34.332216] ffff1b1dd4b75f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 34.339522] ffff1b1dd4b75f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 34.346828] >ffff1b1dd4b76000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 34.354140] ^\n[ 34.357419] ffff1b1dd4b76080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc\n[ 34.364733] ffff1b1dd4b76100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 34.372046] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_invalid-free_in_kmem_cache_invalid_free-02e649064142c65574514dbd3a7f603f0a4bb2758ae601a033892dfc386ab94f": { "log_lines": [ "[ 34.390923] ==================================================================\n[ 34.402588] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8\n[ 34.409657] Free of addr ffff1b1dc21f6001 by task kunit_try_catch/280\n[ 34.416180] \n[ 34.417713] CPU: 5 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 34.417743] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 34.417753] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 34.417765] Call trace:\n[ 34.417774] show_stack+0x20/0x38 (C)\n[ 34.417791] dump_stack_lvl+0x8c/0xd0\n[ 34.417808] print_report+0x118/0x5e0\n[ 34.417825] kasan_report_invalid_free+0xb0/0xd8\n[ 34.417844] check_slab_allocation+0xfc/0x108\n[ 34.417861] __kasan_slab_pre_free+0x2c/0x48\n[ 34.417879] kmem_cache_free+0xf0/0x470\n[ 34.417895] kmem_cache_invalid_free+0x184/0x3b8\n[ 34.417911] kunit_try_run_case+0x14c/0x3d0\n[ 34.417932] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.417950] kthread+0x24c/0x2d0\n[ 34.417967] ret_from_fork+0x10/0x20\n[ 34.417986] \n[ 34.490421] Allocated by task 280:\n[ 34.493876] kasan_save_stack+0x3c/0x68\n[ 34.497781] kasan_save_track+0x20/0x40\n[ 34.501684] kasan_save_alloc_info+0x40/0x58\n[ 34.506021] __kasan_slab_alloc+0xa8/0xb0\n[ 34.510096] kmem_cache_alloc_noprof+0x108/0x398\n[ 34.514780] kmem_cache_invalid_free+0x12c/0x3b8\n[ 34.519462] kunit_try_run_case+0x14c/0x3d0\n[ 34.523711] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.529273] kthread+0x24c/0x2d0\n[ 34.532556] ret_from_fork+0x10/0x20\n[ 34.536187] \n[ 34.537709] The buggy address belongs to the object at ffff1b1dc21f6000\n[ 34.537709] which belongs to the cache test_cache of size 200\n[ 34.550281] The buggy address is located 1 bytes inside of\n[ 34.550281] 200-byte region [ffff1b1dc21f6000, ffff1b1dc21f60c8)\n[ 34.561969] \n[ 34.563501] The buggy address belongs to the physical page:\n[ 34.569154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021f6\n[ 34.577263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 34.585016] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 34.592069] page_type: f5(slab)\n[ 34.595273] raw: 0bfffe0000000040 ffff1b1dc1f2ca00 dead000000000122 0000000000000000\n[ 34.603114] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 34.610953] head: 0bfffe0000000040 ffff1b1dc1f2ca00 dead000000000122 0000000000000000\n[ 34.618879] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 34.626805] head: 0bfffe0000000001 fffffe6c37087d81 ffffffffffffffff 0000000000000000\n[ 34.634730] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 34.642651] page dumped because: kasan: bad access detected\n[ 34.648291] \n[ 34.649813] Memory state around the buggy address:\n[ 34.654665] ffff1b1dc21f5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 34.661981] ffff1b1dc21f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 34.669286] >ffff1b1dc21f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 34.676599] ^\n[ 34.679880] ffff1b1dc21f6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc\n[ 34.687187] ffff1b1dc21f6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 34.694490] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmem_cache_rcu_uaf-a143b0aa53ae648a92e9569dc97e2b34fd4faff332aa6fa18c53fc5dfa353aef": { "log_lines": [ "[ 34.816166] ==================================================================\n[ 34.827939] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468\n[ 34.835187] Read of size 1 at addr ffff1b1dc21f8000 by task kunit_try_catch/282\n[ 34.842593] \n[ 34.844142] CPU: 3 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 34.844171] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 34.844179] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 34.844191] Call trace:\n[ 34.844199] show_stack+0x20/0x38 (C)\n[ 34.844219] dump_stack_lvl+0x8c/0xd0\n[ 34.844238] print_report+0x118/0x5e0\n[ 34.844257] kasan_report+0xc8/0x118\n[ 34.844276] __asan_report_load1_noabort+0x20/0x30\n[ 34.844300] kmem_cache_rcu_uaf+0x390/0x468\n[ 34.844315] kunit_try_run_case+0x14c/0x3d0\n[ 34.844339] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.844359] kthread+0x24c/0x2d0\n[ 34.844379] ret_from_fork+0x10/0x20\n[ 34.844401] \n[ 34.907657] Allocated by task 282:\n[ 34.911119] kasan_save_stack+0x3c/0x68\n[ 34.915021] kasan_save_track+0x20/0x40\n[ 34.918931] kasan_save_alloc_info+0x40/0x58\n[ 34.923276] __kasan_slab_alloc+0xa8/0xb0\n[ 34.927359] kmem_cache_alloc_noprof+0x108/0x398\n[ 34.932059] kmem_cache_rcu_uaf+0x12c/0x468\n[ 34.936312] kunit_try_run_case+0x14c/0x3d0\n[ 34.940569] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 34.946141] kthread+0x24c/0x2d0\n[ 34.949435] ret_from_fork+0x10/0x20\n[ 34.953074] \n[ 34.954603] Freed by task 0:\n[ 34.957535] kasan_save_stack+0x3c/0x68\n[ 34.961434] kasan_save_track+0x20/0x40\n[ 34.965344] kasan_save_free_info+0x4c/0x78\n[ 34.969601] __kasan_slab_free+0x6c/0x98\n[ 34.973597] slab_free_after_rcu_debug+0xd4/0x2f8\n[ 34.978383] rcu_core+0x9f4/0x1e20\n[ 34.981851] rcu_core_si+0x18/0x30\n[ 34.985316] handle_softirqs+0x374/0xb20\n[ 34.989312] __do_softirq+0x1c/0x28\n[ 34.992863] \n[ 34.994393] Last potentially related work creation:\n[ 34.999341] kasan_save_stack+0x3c/0x68\n[ 35.003242] __kasan_record_aux_stack+0xbc/0xe8\n[ 35.007854] kasan_record_aux_stack_noalloc+0x14/0x20\n[ 35.012985] kmem_cache_free+0x120/0x470\n[ 35.016971] kmem_cache_rcu_uaf+0x16c/0x468\n[ 35.021224] kunit_try_run_case+0x14c/0x3d0\n[ 35.025481] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 35.031054] kthread+0x24c/0x2d0\n[ 35.034351] ret_from_fork+0x10/0x20\n[ 35.037990] \n[ 35.039520] The buggy address belongs to the object at ffff1b1dc21f8000\n[ 35.039520] which belongs to the cache test_cache of size 200\n[ 35.052092] The buggy address is located 0 bytes inside of\n[ 35.052092] freed 200-byte region [ffff1b1dc21f8000, ffff1b1dc21f80c8)\n[ 35.064311] \n[ 35.065843] The buggy address belongs to the physical page:\n[ 35.071497] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021f8\n[ 35.079606] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 35.087366] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 35.094435] page_type: f5(slab)\n[ 35.097649] raw: 0bfffe0000000040 ffff1b1dc21f4140 dead000000000122 0000000000000000\n[ 35.105497] raw: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 35.113348] head: 0bfffe0000000040 ffff1b1dc21f4140 dead000000000122 0000000000000000\n[ 35.121282] head: 0000000000000000 00000000801f001f 00000001f5000000 0000000000000000\n[ 35.129216] head: 0bfffe0000000001 fffffe6c37087e01 ffffffffffffffff 0000000000000000\n[ 35.137150] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 35.145081] page dumped because: kasan: bad access detected\n[ 35.150733] \n[ 35.152259] Memory state around the buggy address:\n[ 35.157124] ffff1b1dc21f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 35.164441] ffff1b1dc21f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 35.171759] >ffff1b1dc21f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 35.179073] ^\n[ 35.182362] ffff1b1dc21f8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc\n[ 35.189679] ffff1b1dc21f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 35.196993] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kmem_cache_double_destroy-c1063ee1a925989a231e26c45d1cf087cb7c88cb6ec171e882c51fcb8aa5aa79": { "log_lines": [ "[ 35.261947] ==================================================================\n[ 35.273265] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8\n[ 35.281120] Read of size 1 at addr ffff1b1dc8554280 by task kunit_try_catch/284\n[ 35.288524] \n[ 35.290058] CPU: 4 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 35.290089] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 35.290098] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 35.290111] Call trace:\n[ 35.290119] show_stack+0x20/0x38 (C)\n[ 35.290136] dump_stack_lvl+0x8c/0xd0\n[ 35.290153] print_report+0x118/0x5e0\n[ 35.290171] kasan_report+0xc8/0x118\n[ 35.290188] __kasan_check_byte+0x54/0x70\n[ 35.290204] kmem_cache_destroy+0x34/0x218\n[ 35.290224] kmem_cache_double_destroy+0x17c/0x2f8\n[ 35.290239] kunit_try_run_case+0x14c/0x3d0\n[ 35.290260] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 35.290277] kthread+0x24c/0x2d0\n[ 35.290294] ret_from_fork+0x10/0x20\n[ 35.290313] \n[ 35.357491] Allocated by task 284:\n[ 35.360950] kasan_save_stack+0x3c/0x68\n[ 35.364849] kasan_save_track+0x20/0x40\n[ 35.368745] kasan_save_alloc_info+0x40/0x58\n[ 35.373087] __kasan_slab_alloc+0xa8/0xb0\n[ 35.377156] kmem_cache_alloc_noprof+0x108/0x398\n[ 35.381848] __kmem_cache_create_args+0x18c/0x2b0\n[ 35.386622] kmem_cache_double_destroy+0xc8/0x2f8\n[ 35.391395] kunit_try_run_case+0x14c/0x3d0\n[ 35.395651] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 35.401216] kthread+0x24c/0x2d0\n[ 35.404505] ret_from_fork+0x10/0x20\n[ 35.408138] \n[ 35.409662] Freed by task 284:\n[ 35.412771] kasan_save_stack+0x3c/0x68\n[ 35.416666] kasan_save_track+0x20/0x40\n[ 35.420562] kasan_save_free_info+0x4c/0x78\n[ 35.424816] __kasan_slab_free+0x6c/0x98\n[ 35.428800] kmem_cache_free+0x260/0x470\n[ 35.432782] slab_kmem_cache_release+0x38/0x50\n[ 35.437297] kmem_cache_release+0x1c/0x30\n[ 35.441366] kobject_put+0x17c/0x430\n[ 35.445003] sysfs_slab_release+0x1c/0x30\n[ 35.449072] kmem_cache_destroy+0x118/0x218\n[ 35.453326] kmem_cache_double_destroy+0x130/0x2f8\n[ 35.458185] kunit_try_run_case+0x14c/0x3d0\n[ 35.462441] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 35.468007] kthread+0x24c/0x2d0\n[ 35.471297] ret_from_fork+0x10/0x20\n[ 35.474931] \n[ 35.476453] The buggy address belongs to the object at ffff1b1dc8554280\n[ 35.476453] which belongs to the cache kmem_cache of size 208\n[ 35.489024] The buggy address is located 0 bytes inside of\n[ 35.489024] freed 208-byte region [ffff1b1dc8554280, ffff1b1dc8554350)\n[ 35.501247] \n[ 35.502771] The buggy address belongs to the physical page:\n[ 35.508422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108554\n[ 35.516520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 35.524269] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 35.531330] page_type: f5(slab)\n[ 35.534535] raw: 0bfffe0000000040 ffff1b1dc0002000 dead000000000122 0000000000000000\n[ 35.542373] raw: 0000000000000000 0000000080190019 00000001f5000000 0000000000000000\n[ 35.550209] head: 0bfffe0000000040 ffff1b1dc0002000 dead000000000122 0000000000000000\n[ 35.558132] head: 0000000000000000 0000000080190019 00000001f5000000 0000000000000000\n[ 35.566054] head: 0bfffe0000000001 fffffe6c37215501 ffffffffffffffff 0000000000000000\n[ 35.573975] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 35.581893] page dumped because: kasan: bad access detected\n[ 35.587539] \n[ 35.589061] Memory state around the buggy address:\n[ 35.593919] ffff1b1dc8554180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 35.601232] ffff1b1dc8554200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 35.608544] >ffff1b1dc8554280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 35.615854] ^\n[ 35.619137] ffff1b1dc8554300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc\n[ 35.626449] ffff1b1dc8554380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 35.633759] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_mempool_oob_right_helper-6b43706fe47010aedad87ebc1be6931045dc6dae482e545952c6bc2a8744e907": { "log_lines": [ "[ 36.197941] ==================================================================\n[ 36.209018] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0\n[ 36.216701] Read of size 1 at addr ffff1b1dc43a5b73 by task kunit_try_catch/290\n[ 36.224107] \n[ 36.225641] CPU: 6 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 36.225670] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 36.225678] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 36.225692] Call trace:\n[ 36.225699] show_stack+0x20/0x38 (C)\n[ 36.225719] dump_stack_lvl+0x8c/0xd0\n[ 36.225735] print_report+0x118/0x5e0\n[ 36.225754] kasan_report+0xc8/0x118\n[ 36.225771] __asan_report_load1_noabort+0x20/0x30\n[ 36.225791] mempool_oob_right_helper+0x2ac/0x2f0\n[ 36.225806] mempool_kmalloc_oob_right+0xbc/0x118\n[ 36.225822] kunit_try_run_case+0x14c/0x3d0\n[ 36.225844] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 36.225863] kthread+0x24c/0x2d0\n[ 36.225880] ret_from_fork+0x10/0x20\n[ 36.225898] \n[ 36.294384] Allocated by task 290:\n[ 36.297838] kasan_save_stack+0x3c/0x68\n[ 36.301744] kasan_save_track+0x20/0x40\n[ 36.305647] kasan_save_alloc_info+0x40/0x58\n[ 36.309984] __kasan_mempool_unpoison_object+0x11c/0x180\n[ 36.315377] remove_element+0x130/0x1f8\n[ 36.319270] mempool_alloc_preallocated+0x58/0xc0\n[ 36.324046] mempool_oob_right_helper+0x98/0x2f0\n[ 36.328730] mempool_kmalloc_oob_right+0xbc/0x118\n[ 36.333499] kunit_try_run_case+0x14c/0x3d0\n[ 36.337752] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 36.343314] kthread+0x24c/0x2d0\n[ 36.346600] ret_from_fork+0x10/0x20\n[ 36.350240] \n[ 36.351770] The buggy address belongs to the object at ffff1b1dc43a5b00\n[ 36.351770] which belongs to the cache kmalloc-128 of size 128\n[ 36.364425] The buggy address is located 0 bytes to the right of\n[ 36.364425] allocated 115-byte region [ffff1b1dc43a5b00, ffff1b1dc43a5b73)\n[ 36.377514] \n[ 36.379038] The buggy address belongs to the physical page:\n[ 36.384680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 36.392780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 36.400531] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 36.407584] page_type: f5(slab)\n[ 36.410787] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 36.418626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 36.426464] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 36.434389] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 36.442313] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 36.450237] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 36.458158] page dumped because: kasan: bad access detected\n[ 36.463797] \n[ 36.465319] Memory state around the buggy address:\n[ 36.470171] ffff1b1dc43a5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 36.477485] ffff1b1dc43a5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 36.484799] >ffff1b1dc43a5b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 36.492111] ^\n[ 36.499070] ffff1b1dc43a5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 36.506383] ffff1b1dc43a5c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc\n[ 36.513686] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_mempool_oob_right_helper-cd808f379bc8b3fe15f6ad03e108cf3864bf8c7a8e035aca4277ec04feb7d80a": { "log_lines": [ "[ 36.762551] ==================================================================\n[ 36.774998] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0\n[ 36.782675] Read of size 1 at addr ffff1b1dc32bd2bb by task kunit_try_catch/294\n[ 36.790088] \n[ 36.791623] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 36.791650] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 36.791658] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 36.791671] Call trace:\n[ 36.791677] show_stack+0x20/0x38 (C)\n[ 36.791693] dump_stack_lvl+0x8c/0xd0\n[ 36.791710] print_report+0x118/0x5e0\n[ 36.791729] kasan_report+0xc8/0x118\n[ 36.791746] __asan_report_load1_noabort+0x20/0x30\n[ 36.791766] mempool_oob_right_helper+0x2ac/0x2f0\n[ 36.791783] mempool_slab_oob_right+0xb8/0x110\n[ 36.791800] kunit_try_run_case+0x14c/0x3d0\n[ 36.791823] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 36.791842] kthread+0x24c/0x2d0\n[ 36.791860] ret_from_fork+0x10/0x20\n[ 36.791877] \n[ 36.860138] Allocated by task 294:\n[ 36.863605] kasan_save_stack+0x3c/0x68\n[ 36.867510] kasan_save_track+0x20/0x40\n[ 36.871415] kasan_save_alloc_info+0x40/0x58\n[ 36.875763] __kasan_mempool_unpoison_object+0xbc/0x180\n[ 36.881070] remove_element+0x16c/0x1f8\n[ 36.884977] mempool_alloc_preallocated+0x58/0xc0\n[ 36.889754] mempool_oob_right_helper+0x98/0x2f0\n[ 36.894446] mempool_slab_oob_right+0xb8/0x110\n[ 36.898965] kunit_try_run_case+0x14c/0x3d0\n[ 36.903225] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 36.908791] kthread+0x24c/0x2d0\n[ 36.912079] ret_from_fork+0x10/0x20\n[ 36.915722] \n[ 36.917253] The buggy address belongs to the object at ffff1b1dc32bd240\n[ 36.917253] which belongs to the cache test_cache of size 123\n[ 36.929828] The buggy address is located 0 bytes to the right of\n[ 36.929828] allocated 123-byte region [ffff1b1dc32bd240, ffff1b1dc32bd2bb)\n[ 36.942935] \n[ 36.944466] The buggy address belongs to the physical page:\n[ 36.950111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032bd\n[ 36.958214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 36.964829] page_type: f5(slab)\n[ 36.968030] raw: 0bfffe0000000000 ffff1b1dc0349b80 dead000000000122 0000000000000000\n[ 36.975876] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000\n[ 36.983718] page dumped because: kasan: bad access detected\n[ 36.989362] \n[ 36.990891] Memory state around the buggy address:\n[ 36.995751] ffff1b1dc32bd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 37.003064] ffff1b1dc32bd200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00\n[ 37.010379] >ffff1b1dc32bd280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc\n[ 37.017690] ^\n[ 37.022818] ffff1b1dc32bd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.030133] ffff1b1dc32bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.037445] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_mempool_oob_right_helper-448c3bfc6635e0ddc21a4b7007941fe462d0cd71231bec701f075afffd2ec0b6": { "log_lines": [ "[ 36.525134] ==================================================================\n[ 36.537053] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0\n[ 36.544728] Read of size 1 at addr ffff1b1dd51ce001 by task kunit_try_catch/292\n[ 36.552135] \n[ 36.553665] CPU: 7 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 36.553695] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 36.553703] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 36.553716] Call trace:\n[ 36.553723] show_stack+0x20/0x38 (C)\n[ 36.553741] dump_stack_lvl+0x8c/0xd0\n[ 36.553757] print_report+0x118/0x5e0\n[ 36.553774] kasan_report+0xc8/0x118\n[ 36.553789] __asan_report_load1_noabort+0x20/0x30\n[ 36.553808] mempool_oob_right_helper+0x2ac/0x2f0\n[ 36.553825] mempool_kmalloc_large_oob_right+0xbc/0x118\n[ 36.553842] kunit_try_run_case+0x14c/0x3d0\n[ 36.553864] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 36.553881] kthread+0x24c/0x2d0\n[ 36.553897] ret_from_fork+0x10/0x20\n[ 36.553914] \n[ 36.622942] The buggy address belongs to the physical page:\n[ 36.628590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1151cc\n[ 36.636690] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 36.644438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 36.651494] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 36.659331] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 36.667168] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 36.675089] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 36.683012] head: 0bfffe0000000002 fffffe6c37547301 ffffffffffffffff 0000000000000000\n[ 36.690935] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 36.698853] page dumped because: kasan: bad access detected\n[ 36.704499] \n[ 36.706021] Memory state around the buggy address:\n[ 36.710882] ffff1b1dd51cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 36.718194] ffff1b1dd51cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 36.725507] >ffff1b1dd51ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 36.732816] ^\n[ 36.736095] ffff1b1dd51ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 36.743412] ffff1b1dd51ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n[ 36.750723] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_mempool_uaf_helper-e32ebe255cbdf8e12224a0868be6f1f91256fdd83dff47a9e32b6ff6e8c43493": { "log_lines": [ "[ 37.666051] ==================================================================\n[ 37.677964] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340\n[ 37.685200] Read of size 1 at addr ffff1b1dd6204240 by task kunit_try_catch/300\n[ 37.692607] \n[ 37.694142] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 37.694168] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 37.694176] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 37.694190] Call trace:\n[ 37.694197] show_stack+0x20/0x38 (C)\n[ 37.694214] dump_stack_lvl+0x8c/0xd0\n[ 37.694232] print_report+0x118/0x5e0\n[ 37.694251] kasan_report+0xc8/0x118\n[ 37.694267] __asan_report_load1_noabort+0x20/0x30\n[ 37.694289] mempool_uaf_helper+0x314/0x340\n[ 37.694305] mempool_slab_uaf+0xb8/0x110\n[ 37.694324] kunit_try_run_case+0x14c/0x3d0\n[ 37.694345] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.694363] kthread+0x24c/0x2d0\n[ 37.694381] ret_from_fork+0x10/0x20\n[ 37.694400] \n[ 37.761630] Allocated by task 300:\n[ 37.765087] kasan_save_stack+0x3c/0x68\n[ 37.768996] kasan_save_track+0x20/0x40\n[ 37.772901] kasan_save_alloc_info+0x40/0x58\n[ 37.777250] __kasan_mempool_unpoison_object+0xbc/0x180\n[ 37.782561] remove_element+0x16c/0x1f8\n[ 37.786469] mempool_alloc_preallocated+0x58/0xc0\n[ 37.791250] mempool_uaf_helper+0xa4/0x340\n[ 37.795410] mempool_slab_uaf+0xb8/0x110\n[ 37.799402] kunit_try_run_case+0x14c/0x3d0\n[ 37.803653] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.809218] kthread+0x24c/0x2d0\n[ 37.812510] ret_from_fork+0x10/0x20\n[ 37.816146] \n[ 37.817673] Freed by task 300:\n[ 37.820785] kasan_save_stack+0x3c/0x68\n[ 37.824691] kasan_save_track+0x20/0x40\n[ 37.828597] kasan_save_free_info+0x4c/0x78\n[ 37.832849] __kasan_mempool_poison_object+0xc0/0x150\n[ 37.837980] mempool_free+0x28c/0x328\n[ 37.841709] mempool_uaf_helper+0x104/0x340\n[ 37.845960] mempool_slab_uaf+0xb8/0x110\n[ 37.849951] kunit_try_run_case+0x14c/0x3d0\n[ 37.854205] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.859769] kthread+0x24c/0x2d0\n[ 37.863065] ret_from_fork+0x10/0x20\n[ 37.866710] \n[ 37.868243] The buggy address belongs to the object at ffff1b1dd6204240\n[ 37.868243] which belongs to the cache test_cache of size 123\n[ 37.880814] The buggy address is located 0 bytes inside of\n[ 37.880814] freed 123-byte region [ffff1b1dd6204240, ffff1b1dd62042bb)\n[ 37.893041] \n[ 37.894571] The buggy address belongs to the physical page:\n[ 37.900224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116204\n[ 37.908331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 37.914947] page_type: f5(slab)\n[ 37.918154] raw: 0bfffe0000000000 ffff1b1dc21f43c0 dead000000000122 0000000000000000\n[ 37.925994] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000\n[ 37.933832] page dumped because: kasan: bad access detected\n[ 37.939477] \n[ 37.941011] Memory state around the buggy address:\n[ 37.945874] ffff1b1dd6204100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 37.953193] ffff1b1dd6204180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 37.960512] >ffff1b1dd6204200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb\n[ 37.967824] ^\n[ 37.973210] ffff1b1dd6204280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 37.980529] ffff1b1dd6204300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.987848] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_mempool_uaf_helper-0aaef38d8fd3abf9a3edd5ab9a0a2ae348be39eb05303d15895c0bd51a29d41b": { "log_lines": [ "[ 37.058486] ==================================================================\n[ 37.070164] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340\n[ 37.077414] Read of size 1 at addr ffff1b1dc0e61800 by task kunit_try_catch/296\n[ 37.084822] \n[ 37.086361] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 37.086393] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 37.086401] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 37.086417] Call trace:\n[ 37.086430] show_stack+0x20/0x38 (C)\n[ 37.086486] dump_stack_lvl+0x8c/0xd0\n[ 37.086504] print_report+0x118/0x5e0\n[ 37.086523] kasan_report+0xc8/0x118\n[ 37.086540] __asan_report_load1_noabort+0x20/0x30\n[ 37.086561] mempool_uaf_helper+0x314/0x340\n[ 37.086577] mempool_kmalloc_uaf+0xbc/0x118\n[ 37.086593] kunit_try_run_case+0x14c/0x3d0\n[ 37.086615] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.086634] kthread+0x24c/0x2d0\n[ 37.086652] ret_from_fork+0x10/0x20\n[ 37.086671] \n[ 37.154167] Allocated by task 296:\n[ 37.157625] kasan_save_stack+0x3c/0x68\n[ 37.161533] kasan_save_track+0x20/0x40\n[ 37.165439] kasan_save_alloc_info+0x40/0x58\n[ 37.169789] __kasan_mempool_unpoison_object+0x11c/0x180\n[ 37.175186] remove_element+0x130/0x1f8\n[ 37.179093] mempool_alloc_preallocated+0x58/0xc0\n[ 37.183870] mempool_uaf_helper+0xa4/0x340\n[ 37.188031] mempool_kmalloc_uaf+0xbc/0x118\n[ 37.192287] kunit_try_run_case+0x14c/0x3d0\n[ 37.196545] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.202113] kthread+0x24c/0x2d0\n[ 37.205404] ret_from_fork+0x10/0x20\n[ 37.209051] \n[ 37.210582] Freed by task 296:\n[ 37.213690] kasan_save_stack+0x3c/0x68\n[ 37.217595] kasan_save_track+0x20/0x40\n[ 37.221500] kasan_save_free_info+0x4c/0x78\n[ 37.225753] __kasan_mempool_poison_object+0xc0/0x150\n[ 37.230882] mempool_free+0x28c/0x328\n[ 37.234612] mempool_uaf_helper+0x104/0x340\n[ 37.238860] mempool_kmalloc_uaf+0xbc/0x118\n[ 37.243110] kunit_try_run_case+0x14c/0x3d0\n[ 37.247371] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.252944] kthread+0x24c/0x2d0\n[ 37.256236] ret_from_fork+0x10/0x20\n[ 37.259875] \n[ 37.261410] The buggy address belongs to the object at ffff1b1dc0e61800\n[ 37.261410] which belongs to the cache kmalloc-128 of size 128\n[ 37.274071] The buggy address is located 0 bytes inside of\n[ 37.274071] freed 128-byte region [ffff1b1dc0e61800, ffff1b1dc0e61880)\n[ 37.286298] \n[ 37.287826] The buggy address belongs to the physical page:\n[ 37.293479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e60\n[ 37.301590] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 37.309343] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 37.316409] page_type: f5(slab)\n[ 37.319622] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 37.327473] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 37.335323] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 37.343259] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 37.351194] head: 0bfffe0000000001 fffffe6c37039801 ffffffffffffffff 0000000000000000\n[ 37.359130] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 37.367061] page dumped because: kasan: bad access detected\n[ 37.372712] \n[ 37.374242] Memory state around the buggy address:\n[ 37.379104] ffff1b1dc0e61700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 37.386422] ffff1b1dc0e61780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.393740] >ffff1b1dc0e61800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 37.401055] ^\n[ 37.404341] ffff1b1dc0e61880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.411653] ffff1b1dc0e61900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 37.418972] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_use-after-free_in_mempool_uaf_helper-e69e39294f10e0d98b528edc97306b267dc15ed33474dfdb3d22d338194eb101": { "log_lines": [ "[ 38.007997] ==================================================================\n[ 38.019152] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340\n[ 38.025952] Read of size 1 at addr ffff1b1dd5354000 by task kunit_try_catch/302\n[ 38.033358] \n[ 38.034890] CPU: 6 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 38.034921] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 38.034929] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 38.034942] Call trace:\n[ 38.034950] show_stack+0x20/0x38 (C)\n[ 38.034968] dump_stack_lvl+0x8c/0xd0\n[ 38.034986] print_report+0x118/0x5e0\n[ 38.035004] kasan_report+0xc8/0x118\n[ 38.035020] __asan_report_load1_noabort+0x20/0x30\n[ 38.035040] mempool_uaf_helper+0x314/0x340\n[ 38.035054] mempool_page_alloc_uaf+0xb8/0x118\n[ 38.035070] kunit_try_run_case+0x14c/0x3d0\n[ 38.035092] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 38.035108] kthread+0x24c/0x2d0\n[ 38.035126] ret_from_fork+0x10/0x20\n[ 38.035146] \n[ 38.102834] The buggy address belongs to the physical page:\n[ 38.108483] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115354\n[ 38.116582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 38.123210] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 38.131048] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 38.138881] page dumped because: kasan: bad access detected\n[ 38.144530] \n[ 38.146053] Memory state around the buggy address:\n[ 38.150906] ffff1b1dd5353f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.158219] ffff1b1dd5353f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.165532] >ffff1b1dd5354000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.172842] ^\n[ 38.176121] ffff1b1dd5354080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.183426] ffff1b1dd5354100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.190735] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_use-after-free_in_mempool_uaf_helper-9b1cb33845c3d84416417be23048f36fd979c3348c9cd766299d1a1b39a1dcb9": { "log_lines": [ "[ 37.430873] ==================================================================\n[ 37.442275] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340\n[ 37.449076] Read of size 1 at addr ffff1b1dc5d3c000 by task kunit_try_catch/298\n[ 37.456481] \n[ 37.458019] CPU: 3 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 37.458048] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 37.458056] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 37.458073] Call trace:\n[ 37.458082] show_stack+0x20/0x38 (C)\n[ 37.458100] dump_stack_lvl+0x8c/0xd0\n[ 37.458117] print_report+0x118/0x5e0\n[ 37.458137] kasan_report+0xc8/0x118\n[ 37.458154] __asan_report_load1_noabort+0x20/0x30\n[ 37.458176] mempool_uaf_helper+0x314/0x340\n[ 37.458192] mempool_kmalloc_large_uaf+0xbc/0x118\n[ 37.458211] kunit_try_run_case+0x14c/0x3d0\n[ 37.458233] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 37.458251] kthread+0x24c/0x2d0\n[ 37.458270] ret_from_fork+0x10/0x20\n[ 37.458288] \n[ 37.526312] The buggy address belongs to the physical page:\n[ 37.531967] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d3c\n[ 37.540073] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 37.547825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 37.554886] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 37.562736] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 37.570585] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 37.578519] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 37.586453] head: 0bfffe0000000002 fffffe6c37174f01 ffffffffffffffff 0000000000000000\n[ 37.594385] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 37.602315] page dumped because: kasan: bad access detected\n[ 37.607969] \n[ 37.609503] Memory state around the buggy address:\n[ 37.614363] ffff1b1dc5d3bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 37.621680] ffff1b1dc5d3bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 37.628996] >ffff1b1dc5d3c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 37.636313] ^\n[ 37.639602] ffff1b1dc5d3c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 37.646921] ffff1b1dc5d3c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 37.654236] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_double-free_in_mempool_double_free_helper-9052ef976680bf10bf08955b4a45912b32596654098226fe0a81108fbe6a5980": { "log_lines": [ "[ 38.201334] ==================================================================\n[ 38.212994] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0\n[ 38.220231] Free of addr ffff1b1dd4b72e00 by task kunit_try_catch/304\n[ 38.226760] \n[ 38.228298] CPU: 4 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 38.228327] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 38.228334] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 38.228349] Call trace:\n[ 38.228357] show_stack+0x20/0x38 (C)\n[ 38.228375] dump_stack_lvl+0x8c/0xd0\n[ 38.228391] print_report+0x118/0x5e0\n[ 38.228411] kasan_report_invalid_free+0xb0/0xd8\n[ 38.228431] check_slab_allocation+0xd4/0x108\n[ 38.228450] __kasan_mempool_poison_object+0x78/0x150\n[ 38.228470] mempool_free+0x28c/0x328\n[ 38.228488] mempool_double_free_helper+0x150/0x2e0\n[ 38.228504] mempool_kmalloc_double_free+0xb8/0x110\n[ 38.228519] kunit_try_run_case+0x14c/0x3d0\n[ 38.228540] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 38.228558] kthread+0x24c/0x2d0\n[ 38.228575] ret_from_fork+0x10/0x20\n[ 38.228593] \n[ 38.306855] Allocated by task 304:\n[ 38.310308] kasan_save_stack+0x3c/0x68\n[ 38.314213] kasan_save_track+0x20/0x40\n[ 38.318113] kasan_save_alloc_info+0x40/0x58\n[ 38.322450] __kasan_mempool_unpoison_object+0x11c/0x180\n[ 38.327835] remove_element+0x130/0x1f8\n[ 38.331749] mempool_alloc_preallocated+0x58/0xc0\n[ 38.336527] mempool_double_free_helper+0x94/0x2e0\n[ 38.341392] mempool_kmalloc_double_free+0xb8/0x110\n[ 38.346345] kunit_try_run_case+0x14c/0x3d0\n[ 38.350594] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 38.356158] kthread+0x24c/0x2d0\n[ 38.359445] ret_from_fork+0x10/0x20\n[ 38.363076] \n[ 38.364604] Freed by task 304:\n[ 38.367708] kasan_save_stack+0x3c/0x68\n[ 38.371610] kasan_save_track+0x20/0x40\n[ 38.375512] kasan_save_free_info+0x4c/0x78\n[ 38.379758] __kasan_mempool_poison_object+0xc0/0x150\n[ 38.384885] mempool_free+0x28c/0x328\n[ 38.388610] mempool_double_free_helper+0x100/0x2e0\n[ 38.393562] mempool_kmalloc_double_free+0xb8/0x110\n[ 38.398515] kunit_try_run_case+0x14c/0x3d0\n[ 38.402764] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 38.408329] kthread+0x24c/0x2d0\n[ 38.411615] ret_from_fork+0x10/0x20\n[ 38.415247] \n[ 38.416776] The buggy address belongs to the object at ffff1b1dd4b72e00\n[ 38.416776] which belongs to the cache kmalloc-128 of size 128\n[ 38.429434] The buggy address is located 0 bytes inside of\n[ 38.429434] 128-byte region [ffff1b1dd4b72e00, ffff1b1dd4b72e80)\n[ 38.441123] \n[ 38.442648] The buggy address belongs to the physical page:\n[ 38.448294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 38.456397] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 38.464144] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 38.471195] page_type: f5(slab)\n[ 38.474390] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 38.482224] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 38.490058] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 38.497988] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 38.505919] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 38.513848] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 38.521775] page dumped because: kasan: bad access detected\n[ 38.527425] \n[ 38.528955] Memory state around the buggy address:\n[ 38.533814] ffff1b1dd4b72d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 38.541122] ffff1b1dd4b72d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 38.548429] >ffff1b1dd4b72e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 38.555738] ^\n[ 38.559021] ffff1b1dd4b72e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 38.566330] ffff1b1dd4b72f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 38.573636] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_double-free_in_mempool_double_free_helper-7a7ddde95f72ecb6fdde1baac3321123fdf949a21754c40fd52efc6cb7d67a97": { "log_lines": [ "[ 38.584401] ==================================================================\n[ 38.596491] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0\n[ 38.603729] Free of addr ffff1b1dd5b90000 by task kunit_try_catch/306\n[ 38.610253] \n[ 38.611790] CPU: 5 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 38.611819] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 38.611827] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 38.611838] Call trace:\n[ 38.611844] show_stack+0x20/0x38 (C)\n[ 38.611862] dump_stack_lvl+0x8c/0xd0\n[ 38.611879] print_report+0x118/0x5e0\n[ 38.611896] kasan_report_invalid_free+0xb0/0xd8\n[ 38.611914] __kasan_mempool_poison_object+0x14c/0x150\n[ 38.611937] mempool_free+0x28c/0x328\n[ 38.611954] mempool_double_free_helper+0x150/0x2e0\n[ 38.611970] mempool_kmalloc_large_double_free+0xb8/0x110\n[ 38.611988] kunit_try_run_case+0x14c/0x3d0\n[ 38.612008] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 38.612028] kthread+0x24c/0x2d0\n[ 38.612046] ret_from_fork+0x10/0x20\n[ 38.612064] \n[ 38.686538] The buggy address belongs to the physical page:\n[ 38.692187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115b90\n[ 38.700295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 38.708046] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 38.715107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 38.722944] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 38.730781] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 38.738702] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 38.746625] head: 0bfffe0000000002 fffffe6c3756e401 ffffffffffffffff 0000000000000000\n[ 38.754547] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 38.762466] page dumped because: kasan: bad access detected\n[ 38.768113] \n[ 38.769635] Memory state around the buggy address:\n[ 38.774498] ffff1b1dd5b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.781809] ffff1b1dd5b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.789120] >ffff1b1dd5b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.796429] ^\n[ 38.799711] ffff1b1dd5b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.807026] ffff1b1dd5b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.814334] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_double-free_in_mempool_double_free_helper-13da8a9ae8f44f719c8916406c7f1487919f81274726f99d907966f77c687bfe": { "log_lines": [ "[ 38.823721] ==================================================================\n[ 38.836328] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0\n[ 38.843563] Free of addr ffff1b1dd52c8000 by task kunit_try_catch/308\n[ 38.850087] \n[ 38.851623] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 38.851649] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 38.851657] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 38.851667] Call trace:\n[ 38.851673] show_stack+0x20/0x38 (C)\n[ 38.851690] dump_stack_lvl+0x8c/0xd0\n[ 38.851705] print_report+0x118/0x5e0\n[ 38.851722] kasan_report_invalid_free+0xb0/0xd8\n[ 38.851739] __kasan_mempool_poison_pages+0xe0/0xe8\n[ 38.851758] mempool_free+0x24c/0x328\n[ 38.851773] mempool_double_free_helper+0x150/0x2e0\n[ 38.851788] mempool_page_alloc_double_free+0xb4/0x110\n[ 38.851805] kunit_try_run_case+0x14c/0x3d0\n[ 38.851824] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 38.851841] kthread+0x24c/0x2d0\n[ 38.851858] ret_from_fork+0x10/0x20\n[ 38.851874] \n[ 38.925806] The buggy address belongs to the physical page:\n[ 38.931455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152c8\n[ 38.939559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 38.946173] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 38.954016] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 38.961845] page dumped because: kasan: bad access detected\n[ 38.967493] \n[ 38.969022] Memory state around the buggy address:\n[ 38.973884] ffff1b1dd52c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 38.981192] ffff1b1dd52c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 38.988502] >ffff1b1dd52c8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 38.995812] ^\n[ 38.999093] ffff1b1dd52c8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 39.006401] ffff1b1dd52c8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 39.013708] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_invalid-free_in_mempool_kmalloc_invalid_free_helper-4cfe7cd1c85ef9310e400e3573a7dc3f3ac42e99d9aaa2a028ab8bfce2843288": { "log_lines": [ "[ 39.358853] ==================================================================\n[ 39.371025] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0\n[ 39.379130] Free of addr ffff1b1dd52c8001 by task kunit_try_catch/312\n[ 39.385653] \n[ 39.387181] CPU: 4 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 39.387209] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 39.387217] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 39.387228] Call trace:\n[ 39.387234] show_stack+0x20/0x38 (C)\n[ 39.387251] dump_stack_lvl+0x8c/0xd0\n[ 39.387266] print_report+0x118/0x5e0\n[ 39.387284] kasan_report_invalid_free+0xb0/0xd8\n[ 39.387302] __kasan_mempool_poison_object+0xfc/0x150\n[ 39.387320] mempool_free+0x28c/0x328\n[ 39.387335] mempool_kmalloc_invalid_free_helper+0x118/0x2a0\n[ 39.387352] mempool_kmalloc_large_invalid_free+0xb8/0x110\n[ 39.387368] kunit_try_run_case+0x14c/0x3d0\n[ 39.387387] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 39.387404] kthread+0x24c/0x2d0\n[ 39.387420] ret_from_fork+0x10/0x20\n[ 39.387436] \n[ 39.462710] The buggy address belongs to the physical page:\n[ 39.468357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152c8\n[ 39.476455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 39.484205] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 39.491266] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 39.499103] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 39.506941] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000\n[ 39.514864] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 39.522786] head: 0bfffe0000000002 fffffe6c3754b201 ffffffffffffffff 0000000000000000\n[ 39.530709] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 39.538628] page dumped because: kasan: bad access detected\n[ 39.544275] \n[ 39.545799] Memory state around the buggy address:\n[ 39.550657] ffff1b1dd52c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.557969] ffff1b1dd52c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.565282] >ffff1b1dd52c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.572592] ^\n[ 39.575878] ffff1b1dd52c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.583192] ffff1b1dd52c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.590503] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_invalid-free_in_mempool_kmalloc_invalid_free_helper-8800771028b265af7a148c6a3c4d8ef3c07d49fcd9f740c62eaaeec641b31261": { "log_lines": [ "[ 39.024340] ==================================================================\n[ 39.036689] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0\n[ 39.044794] Free of addr ffff1b1dc1f2fe01 by task kunit_try_catch/310\n[ 39.051323] \n[ 39.052860] CPU: 5 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 39.052888] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 39.052897] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 39.052907] Call trace:\n[ 39.052914] show_stack+0x20/0x38 (C)\n[ 39.052931] dump_stack_lvl+0x8c/0xd0\n[ 39.052947] print_report+0x118/0x5e0\n[ 39.052963] kasan_report_invalid_free+0xb0/0xd8\n[ 39.052982] check_slab_allocation+0xfc/0x108\n[ 39.053002] __kasan_mempool_poison_object+0x78/0x150\n[ 39.053021] mempool_free+0x28c/0x328\n[ 39.053036] mempool_kmalloc_invalid_free_helper+0x118/0x2a0\n[ 39.053054] mempool_kmalloc_invalid_free+0xb8/0x110\n[ 39.053070] kunit_try_run_case+0x14c/0x3d0\n[ 39.053091] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 39.053107] kthread+0x24c/0x2d0\n[ 39.053125] ret_from_fork+0x10/0x20\n[ 39.053142] \n[ 39.132255] Allocated by task 310:\n[ 39.135711] kasan_save_stack+0x3c/0x68\n[ 39.139616] kasan_save_track+0x20/0x40\n[ 39.143520] kasan_save_alloc_info+0x40/0x58\n[ 39.147856] __kasan_mempool_unpoison_object+0x11c/0x180\n[ 39.153249] remove_element+0x130/0x1f8\n[ 39.157149] mempool_alloc_preallocated+0x58/0xc0\n[ 39.161921] mempool_kmalloc_invalid_free_helper+0x94/0x2a0\n[ 39.167568] mempool_kmalloc_invalid_free+0xb8/0x110\n[ 39.172608] kunit_try_run_case+0x14c/0x3d0\n[ 39.176861] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 39.182424] kthread+0x24c/0x2d0\n[ 39.185710] ret_from_fork+0x10/0x20\n[ 39.189341] \n[ 39.190865] The buggy address belongs to the object at ffff1b1dc1f2fe00\n[ 39.190865] which belongs to the cache kmalloc-128 of size 128\n[ 39.203518] The buggy address is located 1 bytes inside of\n[ 39.203518] 128-byte region [ffff1b1dc1f2fe00, ffff1b1dc1f2fe80)\n[ 39.215210] \n[ 39.216740] The buggy address belongs to the physical page:\n[ 39.222385] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f2e\n[ 39.230486] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 39.238238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 39.245285] page_type: f5(slab)\n[ 39.248483] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 39.256323] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 39.264164] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 39.272090] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 39.280017] head: 0bfffe0000000001 fffffe6c3707cb81 ffffffffffffffff 0000000000000000\n[ 39.287943] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 39.295864] page dumped because: kasan: bad access detected\n[ 39.301508] \n[ 39.303030] Memory state around the buggy address:\n[ 39.307891] ffff1b1dc1f2fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 39.315200] ffff1b1dc1f2fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 39.322515] >ffff1b1dc1f2fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.329830] ^\n[ 39.333108] ffff1b1dc1f2fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 39.340422] ffff1b1dc1f2ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.347727] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_global-out-of-bounds_in_kasan_global_oob_right-29dfd36fe69b8a6c9363ee28f8f4717217da87b2fea377f57afac76e13990659": { "log_lines": [ "[ 39.600709] ==================================================================\n[ 39.613419] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270\n[ 39.621091] Read of size 1 at addr ffffcb84d10c502d by task kunit_try_catch/314\n[ 39.628502] \n[ 39.630038] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 39.630064] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 39.630074] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 39.630086] Call trace:\n[ 39.630092] show_stack+0x20/0x38 (C)\n[ 39.630111] dump_stack_lvl+0x8c/0xd0\n[ 39.630127] print_report+0x2fc/0x5e0\n[ 39.630145] kasan_report+0xc8/0x118\n[ 39.630162] __asan_report_load1_noabort+0x20/0x30\n[ 39.630182] kasan_global_oob_right+0x230/0x270\n[ 39.630201] kunit_try_run_case+0x14c/0x3d0\n[ 39.630221] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 39.630240] kthread+0x24c/0x2d0\n[ 39.630258] ret_from_fork+0x10/0x20\n[ 39.630274] \n[ 39.693860] The buggy address belongs to the variable:\n[ 39.699068] global_array+0xd/0x40\n[ 39.702537] \n[ 39.704085] The buggy address belongs to the virtual mapping at\n[ 39.704085] [ffffcb84cf420000, ffffcb84d1181000) created by:\n[ 39.704085] paging_init+0x668/0x7c8\n[ 39.719465] \n[ 39.721008] The buggy address belongs to the physical page:\n[ 39.726658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa76c5\n[ 39.734675] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)\n[ 39.742093] raw: 03fffe0000002000 fffffe6c359db148 fffffe6c359db148 0000000000000000\n[ 39.749937] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 39.757775] page dumped because: kasan: bad access detected\n[ 39.763423] \n[ 39.764958] Memory state around the buggy address:\n[ 39.769821] ffffcb84d10c4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 39.777143] ffffcb84d10c4f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9\n[ 39.784466] >ffffcb84d10c5000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9\n[ 39.791780] ^\n[ 39.796381] ffffcb84d10c5080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9\n[ 39.803698] ffffcb84d10c5100: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00\n[ 39.811020] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_stack-out-of-bounds_in_kasan_stack_oob-4dfb16ce405419dadd12fe0fb5a58119db2618ad5afdae7cf9f7bb3b0f9c7cb5": { "log_lines": [ "[ 39.832273] ==================================================================\n[ 39.847516] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268\n[ 39.854481] Read of size 1 at addr ffff800084197cba by task kunit_try_catch/318\n[ 39.861887] \n[ 39.863424] CPU: 7 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 39.863449] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 39.863458] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 39.863467] Call trace:\n[ 39.863473] show_stack+0x20/0x38 (C)\n[ 39.863490] dump_stack_lvl+0x8c/0xd0\n[ 39.863504] print_report+0x2fc/0x5e0\n[ 39.863522] kasan_report+0xc8/0x118\n[ 39.863539] __asan_report_load1_noabort+0x20/0x30\n[ 39.863558] kasan_stack_oob+0x230/0x268\n[ 39.863573] kunit_try_run_case+0x14c/0x3d0\n[ 39.863592] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 39.863609] kthread+0x24c/0x2d0\n[ 39.863626] ret_from_fork+0x10/0x20\n[ 39.863641] \n[ 39.926599] The buggy address belongs to stack of task kunit_try_catch/318\n[ 39.933553] and is located at offset 138 in frame:\n[ 39.938501] kasan_stack_oob+0x0/0x268\n[ 39.942319] \n[ 39.943847] This frame has 4 objects:\n[ 39.947561] [48, 49) '__assertion'\n[ 39.947574] [64, 72) 'array'\n[ 39.951116] [96, 112) '__assertion'\n[ 39.954135] [128, 138) 'stack_array'\n[ 39.957769] \n[ 39.963004] The buggy address belongs to the virtual mapping at\n[ 39.963004] [ffff800084190000, ffff800084199000) created by:\n[ 39.963004] kernel_clone+0x140/0x788\n[ 39.978470] \n[ 39.980000] The buggy address belongs to the physical page:\n[ 39.985643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c9\n[ 39.993749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 40.000363] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 40.008200] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 40.016035] page dumped because: kasan: bad access detected\n[ 40.021676] \n[ 40.023198] Memory state around the buggy address:\n[ 40.028055] ffff800084197b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 40.035363] ffff800084197c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2\n[ 40.042677] >ffff800084197c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00\n[ 40.049988] ^\n[ 40.055112] ffff800084197d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00\n[ 40.062424] ffff800084197d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00\n[ 40.069734] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_alloca-out-of-bounds_in_kasan_alloca_oob_left-5c0a1d97329fccefc92d6ef056b58c3faa212caed8486cc6074ccfcb5a6f09e5": { "log_lines": [ "[ 40.081686] ==================================================================\n[ 40.092719] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310\n[ 40.100311] Read of size 1 at addr ffff8000841b7bdf by task kunit_try_catch/320\n[ 40.107713] \n[ 40.109248] CPU: 3 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 40.109272] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 40.109281] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 40.109293] Call trace:\n[ 40.109300] show_stack+0x20/0x38 (C)\n[ 40.109316] dump_stack_lvl+0x8c/0xd0\n[ 40.109332] print_report+0x2fc/0x5e0\n[ 40.109352] kasan_report+0xc8/0x118\n[ 40.109370] __asan_report_load1_noabort+0x20/0x30\n[ 40.109390] kasan_alloca_oob_left+0x2b8/0x310\n[ 40.109407] kunit_try_run_case+0x14c/0x3d0\n[ 40.109428] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 40.109448] kthread+0x24c/0x2d0\n[ 40.109466] ret_from_fork+0x10/0x20\n[ 40.109484] \n[ 40.172991] The buggy address belongs to stack of task kunit_try_catch/320\n[ 40.179972] \n[ 40.181504] The buggy address belongs to the virtual mapping at\n[ 40.181504] [ffff8000841b0000, ffff8000841b9000) created by:\n[ 40.181504] kernel_clone+0x140/0x788\n[ 40.196982] \n[ 40.198516] The buggy address belongs to the physical page:\n[ 40.204162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dd\n[ 40.212268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 40.218897] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 40.226743] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 40.234586] page dumped because: kasan: bad access detected\n[ 40.240231] \n[ 40.241761] Memory state around the buggy address:\n[ 40.246619] ffff8000841b7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 40.253933] ffff8000841b7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 40.261248] >ffff8000841b7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb\n[ 40.268561] ^\n[ 40.274738] ffff8000841b7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2\n[ 40.282055] ffff8000841b7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00\n[ 40.289368] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_alloca-out-of-bounds_in_kasan_alloca_oob_right-253a082af73b1e81db1918738b872372014888443960d90ce9b549e97e42aa20": { "log_lines": [ "[ 40.298876] ==================================================================\n[ 40.310440] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348\n[ 40.318110] Read of size 1 at addr ffff8000841d7bea by task kunit_try_catch/322\n[ 40.325515] \n[ 40.327049] CPU: 3 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 40.327074] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 40.327083] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 40.327094] Call trace:\n[ 40.327102] show_stack+0x20/0x38 (C)\n[ 40.327119] dump_stack_lvl+0x8c/0xd0\n[ 40.327135] print_report+0x2fc/0x5e0\n[ 40.327153] kasan_report+0xc8/0x118\n[ 40.327169] __asan_report_load1_noabort+0x20/0x30\n[ 40.327189] kasan_alloca_oob_right+0x2e4/0x348\n[ 40.327206] kunit_try_run_case+0x14c/0x3d0\n[ 40.327226] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 40.327244] kthread+0x24c/0x2d0\n[ 40.327261] ret_from_fork+0x10/0x20\n[ 40.327277] \n[ 40.390859] The buggy address belongs to stack of task kunit_try_catch/322\n[ 40.397836] \n[ 40.399365] The buggy address belongs to the virtual mapping at\n[ 40.399365] [ffff8000841d0000, ffff8000841d9000) created by:\n[ 40.399365] kernel_clone+0x140/0x788\n[ 40.414832] \n[ 40.416366] The buggy address belongs to the physical page:\n[ 40.422015] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033f2\n[ 40.430123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 40.436745] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 40.444587] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 40.452424] page dumped because: kasan: bad access detected\n[ 40.458073] \n[ 40.459601] Memory state around the buggy address:\n[ 40.464467] ffff8000841d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 40.471783] ffff8000841d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 40.479107] >ffff8000841d7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb\n[ 40.486426] ^\n[ 40.493126] ffff8000841d7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2\n[ 40.500446] ffff8000841d7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00\n[ 40.507759] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_memchr-88cf6b321e5ae9e4562f3ba455617f1c4659bf651a2aeb8c65fd16e006f53757": { "log_lines": [ "[ 40.518548] ==================================================================\n[ 40.530194] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88\n[ 40.536113] Read of size 1 at addr ffff1b1dd437fc98 by task kunit_try_catch/324\n[ 40.543519] \n[ 40.545054] CPU: 4 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 40.545082] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 40.545091] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 40.545101] Call trace:\n[ 40.545107] show_stack+0x20/0x38 (C)\n[ 40.545125] dump_stack_lvl+0x8c/0xd0\n[ 40.545139] print_report+0x118/0x5e0\n[ 40.545158] kasan_report+0xc8/0x118\n[ 40.545174] __asan_report_load1_noabort+0x20/0x30\n[ 40.545193] memchr+0x78/0x88\n[ 40.545209] kasan_memchr+0x148/0x2d8\n[ 40.545223] kunit_try_run_case+0x14c/0x3d0\n[ 40.545243] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 40.545262] kthread+0x24c/0x2d0\n[ 40.545278] ret_from_fork+0x10/0x20\n[ 40.545293] \n[ 40.610986] Allocated by task 324:\n[ 40.614446] kasan_save_stack+0x3c/0x68\n[ 40.618348] kasan_save_track+0x20/0x40\n[ 40.622247] kasan_save_alloc_info+0x40/0x58\n[ 40.626585] __kasan_kmalloc+0xd4/0xd8\n[ 40.630398] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 40.634995] kasan_memchr+0xb0/0x2d8\n[ 40.638631] kunit_try_run_case+0x14c/0x3d0\n[ 40.642880] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 40.648440] kthread+0x24c/0x2d0\n[ 40.651724] ret_from_fork+0x10/0x20\n[ 40.655364] \n[ 40.656893] The buggy address belongs to the object at ffff1b1dd437fc80\n[ 40.656893] which belongs to the cache kmalloc-32 of size 32\n[ 40.669373] The buggy address is located 0 bytes to the right of\n[ 40.669373] allocated 24-byte region [ffff1b1dd437fc80, ffff1b1dd437fc98)\n[ 40.682376] \n[ 40.683904] The buggy address belongs to the physical page:\n[ 40.689542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 40.697643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 40.704260] page_type: f5(slab)\n[ 40.707458] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 40.715292] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 40.723122] page dumped because: kasan: bad access detected\n[ 40.728762] \n[ 40.730285] Memory state around the buggy address:\n[ 40.735143] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 40.742451] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 40.749758] >ffff1b1dd437fc80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 40.757065] ^\n[ 40.761132] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 40.768440] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 40.775746] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_memcmp-ee2cfb8127059e2bafece840cab0296ec2666500c1097b2b02d0e8384134f95c": { "log_lines": [ "[ 40.786952] ==================================================================\n[ 40.797733] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8\n[ 40.803835] Read of size 1 at addr ffff1b1dc0cd2cd8 by task kunit_try_catch/326\n[ 40.811237] \n[ 40.812776] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 40.812802] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 40.812811] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 40.812822] Call trace:\n[ 40.812830] show_stack+0x20/0x38 (C)\n[ 40.812848] dump_stack_lvl+0x8c/0xd0\n[ 40.812865] print_report+0x118/0x5e0\n[ 40.812883] kasan_report+0xc8/0x118\n[ 40.812902] __asan_report_load1_noabort+0x20/0x30\n[ 40.812923] memcmp+0x198/0x1d8\n[ 40.812941] kasan_memcmp+0x16c/0x300\n[ 40.812956] kunit_try_run_case+0x14c/0x3d0\n[ 40.812977] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 40.812996] kthread+0x24c/0x2d0\n[ 40.813014] ret_from_fork+0x10/0x20\n[ 40.813030] \n[ 40.878953] Allocated by task 326:\n[ 40.882411] kasan_save_stack+0x3c/0x68\n[ 40.886323] kasan_save_track+0x20/0x40\n[ 40.890232] kasan_save_alloc_info+0x40/0x58\n[ 40.894574] __kasan_kmalloc+0xd4/0xd8\n[ 40.898394] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 40.903009] kasan_memcmp+0xbc/0x300\n[ 40.906654] kunit_try_run_case+0x14c/0x3d0\n[ 40.910908] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 40.916473] kthread+0x24c/0x2d0\n[ 40.919769] ret_from_fork+0x10/0x20\n[ 40.923406] \n[ 40.924942] The buggy address belongs to the object at ffff1b1dc0cd2cc0\n[ 40.924942] which belongs to the cache kmalloc-32 of size 32\n[ 40.937430] The buggy address is located 0 bytes to the right of\n[ 40.937430] allocated 24-byte region [ffff1b1dc0cd2cc0, ffff1b1dc0cd2cd8)\n[ 40.950441] \n[ 40.951977] The buggy address belongs to the physical page:\n[ 40.957625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cd2\n[ 40.965738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 40.972359] page_type: f5(slab)\n[ 40.975565] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 40.983411] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 40.991253] page dumped because: kasan: bad access detected\n[ 40.996908] \n[ 40.998437] Memory state around the buggy address:\n[ 41.003298] ffff1b1dc0cd2b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.010622] ffff1b1dc0cd2c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.017944] >ffff1b1dc0cd2c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc\n[ 41.025266] ^\n[ 41.031445] ffff1b1dc0cd2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.038760] ffff1b1dc0cd2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.046081] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_strchr-91c482eb076d71a9401f28ec4b3651fb30b3945db564441a4e9d6e482f4f9085": { "log_lines": [ "[ 41.055714] ==================================================================\n[ 41.066480] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8\n[ 41.072481] Read of size 1 at addr ffff1b1dd437fcd0 by task kunit_try_catch/328\n[ 41.079889] \n[ 41.081419] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 41.081444] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 41.081452] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 41.081463] Call trace:\n[ 41.081469] show_stack+0x20/0x38 (C)\n[ 41.081486] dump_stack_lvl+0x8c/0xd0\n[ 41.081501] print_report+0x118/0x5e0\n[ 41.081518] kasan_report+0xc8/0x118\n[ 41.081535] __asan_report_load1_noabort+0x20/0x30\n[ 41.081555] strchr+0xcc/0xd8\n[ 41.081570] kasan_strings+0x180/0x8f8\n[ 41.081583] kunit_try_run_case+0x14c/0x3d0\n[ 41.081602] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.081620] kthread+0x24c/0x2d0\n[ 41.081637] ret_from_fork+0x10/0x20\n[ 41.081653] \n[ 41.147430] Allocated by task 328:\n[ 41.150884] kasan_save_stack+0x3c/0x68\n[ 41.154792] kasan_save_track+0x20/0x40\n[ 41.158695] kasan_save_alloc_info+0x40/0x58\n[ 41.163037] __kasan_kmalloc+0xd4/0xd8\n[ 41.166851] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 41.171449] kasan_strings+0xb4/0x8f8\n[ 41.175165] kunit_try_run_case+0x14c/0x3d0\n[ 41.179416] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.184975] kthread+0x24c/0x2d0\n[ 41.188261] ret_from_fork+0x10/0x20\n[ 41.191893] \n[ 41.193415] Freed by task 328:\n[ 41.196520] kasan_save_stack+0x3c/0x68\n[ 41.200424] kasan_save_track+0x20/0x40\n[ 41.204326] kasan_save_free_info+0x4c/0x78\n[ 41.208578] __kasan_slab_free+0x6c/0x98\n[ 41.212567] kfree+0x214/0x3c8\n[ 41.215676] kasan_strings+0x128/0x8f8\n[ 41.219480] kunit_try_run_case+0x14c/0x3d0\n[ 41.223729] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.229293] kthread+0x24c/0x2d0\n[ 41.232579] ret_from_fork+0x10/0x20\n[ 41.236209] \n[ 41.237732] The buggy address belongs to the object at ffff1b1dd437fcc0\n[ 41.237732] which belongs to the cache kmalloc-32 of size 32\n[ 41.250212] The buggy address is located 16 bytes inside of\n[ 41.250212] freed 32-byte region [ffff1b1dd437fcc0, ffff1b1dd437fce0)\n[ 41.262434] \n[ 41.263965] The buggy address belongs to the physical page:\n[ 41.269608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 41.277707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 41.284318] page_type: f5(slab)\n[ 41.287515] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 41.295357] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 41.303195] page dumped because: kasan: bad access detected\n[ 41.308833] \n[ 41.310355] Memory state around the buggy address:\n[ 41.315209] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.322514] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.329830] >ffff1b1dd437fc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.337145] ^\n[ 41.343053] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.350359] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.357674] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_strrchr-8a28aaeb2aeae7d15a5d060cfd5ce6e8560b698cfd88e6010e78415ce63ed6e0": { "log_lines": [ "[ 41.365033] ==================================================================\n[ 41.372351] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78\n[ 41.378439] Read of size 1 at addr ffff1b1dd437fcd0 by task kunit_try_catch/328\n[ 41.385846] \n[ 41.387381] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 41.387404] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 41.387411] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 41.387420] Call trace:\n[ 41.387426] show_stack+0x20/0x38 (C)\n[ 41.387441] dump_stack_lvl+0x8c/0xd0\n[ 41.387455] print_report+0x118/0x5e0\n[ 41.387470] kasan_report+0xc8/0x118\n[ 41.387486] __asan_report_load1_noabort+0x20/0x30\n[ 41.387505] strrchr+0x6c/0x78\n[ 41.387520] kasan_strings+0x1e0/0x8f8\n[ 41.387534] kunit_try_run_case+0x14c/0x3d0\n[ 41.387552] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.387568] kthread+0x24c/0x2d0\n[ 41.387584] ret_from_fork+0x10/0x20\n[ 41.387599] \n[ 41.453450] Allocated by task 328:\n[ 41.456900] kasan_save_stack+0x3c/0x68\n[ 41.460803] kasan_save_track+0x20/0x40\n[ 41.464708] kasan_save_alloc_info+0x40/0x58\n[ 41.469048] __kasan_kmalloc+0xd4/0xd8\n[ 41.472865] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 41.477463] kasan_strings+0xb4/0x8f8\n[ 41.481179] kunit_try_run_case+0x14c/0x3d0\n[ 41.485432] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.490995] kthread+0x24c/0x2d0\n[ 41.494281] ret_from_fork+0x10/0x20\n[ 41.497912] \n[ 41.499443] Freed by task 328:\n[ 41.502548] kasan_save_stack+0x3c/0x68\n[ 41.506452] kasan_save_track+0x20/0x40\n[ 41.510354] kasan_save_free_info+0x4c/0x78\n[ 41.514607] __kasan_slab_free+0x6c/0x98\n[ 41.518597] kfree+0x214/0x3c8\n[ 41.521706] kasan_strings+0x128/0x8f8\n[ 41.525520] kunit_try_run_case+0x14c/0x3d0\n[ 41.529771] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.535333] kthread+0x24c/0x2d0\n[ 41.538621] ret_from_fork+0x10/0x20\n[ 41.542262] \n[ 41.543791] The buggy address belongs to the object at ffff1b1dd437fcc0\n[ 41.543791] which belongs to the cache kmalloc-32 of size 32\n[ 41.556269] The buggy address is located 16 bytes inside of\n[ 41.556269] freed 32-byte region [ffff1b1dd437fcc0, ffff1b1dd437fce0)\n[ 41.568489] \n[ 41.570011] The buggy address belongs to the physical page:\n[ 41.575650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 41.583749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 41.590364] page_type: f5(slab)\n[ 41.593559] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 41.601398] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 41.609235] page dumped because: kasan: bad access detected\n[ 41.614877] \n[ 41.616407] Memory state around the buggy address:\n[ 41.621259] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.628575] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.635891] >ffff1b1dd437fc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.643199] ^\n[ 41.649103] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.656408] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.663722] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_strcmp-3db82015f903ca8f9c4697ba29d156931442a1d755445a92d0e2759f71c61008": { "log_lines": [ "[ 41.671155] ==================================================================\n[ 41.678474] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8\n[ 41.684481] Read of size 1 at addr ffff1b1dd437fcd0 by task kunit_try_catch/328\n[ 41.691885] \n[ 41.693411] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 41.693435] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 41.693443] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 41.693452] Call trace:\n[ 41.693459] show_stack+0x20/0x38 (C)\n[ 41.693474] dump_stack_lvl+0x8c/0xd0\n[ 41.693488] print_report+0x118/0x5e0\n[ 41.693505] kasan_report+0xc8/0x118\n[ 41.693522] __asan_report_load1_noabort+0x20/0x30\n[ 41.693540] strcmp+0xc0/0xc8\n[ 41.693555] kasan_strings+0x248/0x8f8\n[ 41.693568] kunit_try_run_case+0x14c/0x3d0\n[ 41.693587] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.693604] kthread+0x24c/0x2d0\n[ 41.693621] ret_from_fork+0x10/0x20\n[ 41.693636] \n[ 41.759417] Allocated by task 328:\n[ 41.762872] kasan_save_stack+0x3c/0x68\n[ 41.766776] kasan_save_track+0x20/0x40\n[ 41.770678] kasan_save_alloc_info+0x40/0x58\n[ 41.775017] __kasan_kmalloc+0xd4/0xd8\n[ 41.778832] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 41.783428] kasan_strings+0xb4/0x8f8\n[ 41.787146] kunit_try_run_case+0x14c/0x3d0\n[ 41.791395] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.796955] kthread+0x24c/0x2d0\n[ 41.800241] ret_from_fork+0x10/0x20\n[ 41.803881] \n[ 41.805405] Freed by task 328:\n[ 41.808509] kasan_save_stack+0x3c/0x68\n[ 41.812412] kasan_save_track+0x20/0x40\n[ 41.816314] kasan_save_free_info+0x4c/0x78\n[ 41.820565] __kasan_slab_free+0x6c/0x98\n[ 41.824556] kfree+0x214/0x3c8\n[ 41.827664] kasan_strings+0x128/0x8f8\n[ 41.831467] kunit_try_run_case+0x14c/0x3d0\n[ 41.835717] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 41.841279] kthread+0x24c/0x2d0\n[ 41.844564] ret_from_fork+0x10/0x20\n[ 41.848196] \n[ 41.849719] The buggy address belongs to the object at ffff1b1dd437fcc0\n[ 41.849719] which belongs to the cache kmalloc-32 of size 32\n[ 41.862198] The buggy address is located 16 bytes inside of\n[ 41.862198] freed 32-byte region [ffff1b1dd437fcc0, ffff1b1dd437fce0)\n[ 41.874416] \n[ 41.875945] The buggy address belongs to the physical page:\n[ 41.881588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 41.889688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 41.896298] page_type: f5(slab)\n[ 41.899495] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 41.907337] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 41.915173] page dumped because: kasan: bad access detected\n[ 41.920810] \n[ 41.922333] Memory state around the buggy address:\n[ 41.927184] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.934489] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.941804] >ffff1b1dd437fc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 41.949118] ^\n[ 41.955025] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.962340] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 41.969652] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_kasan_strings-d8d1b0ac90e78fe22ec2b524a4e34c3319fb5707073f84d4e643a610a0cfb112": { "log_lines": [ "[ 41.977260] ==================================================================\n[ 41.984590] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8\n[ 41.991391] Read of size 1 at addr ffff1b1dd437fcd0 by task kunit_try_catch/328\n[ 41.998794] \n[ 42.000333] CPU: 2 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 42.000358] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 42.000366] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 42.000377] Call trace:\n[ 42.000382] show_stack+0x20/0x38 (C)\n[ 42.000400] dump_stack_lvl+0x8c/0xd0\n[ 42.000415] print_report+0x118/0x5e0\n[ 42.000432] kasan_report+0xc8/0x118\n[ 42.000449] __asan_report_load1_noabort+0x20/0x30\n[ 42.000470] kasan_strings+0x858/0x8f8\n[ 42.000485] kunit_try_run_case+0x14c/0x3d0\n[ 42.000505] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.000525] kthread+0x24c/0x2d0\n[ 42.000541] ret_from_fork+0x10/0x20\n[ 42.000558] \n[ 42.063367] Allocated by task 328:\n[ 42.066830] kasan_save_stack+0x3c/0x68\n[ 42.070731] kasan_save_track+0x20/0x40\n[ 42.074642] kasan_save_alloc_info+0x40/0x58\n[ 42.078984] __kasan_kmalloc+0xd4/0xd8\n[ 42.082807] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 42.087417] kasan_strings+0xb4/0x8f8\n[ 42.091142] kunit_try_run_case+0x14c/0x3d0\n[ 42.095397] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.100966] kthread+0x24c/0x2d0\n[ 42.104260] ret_from_fork+0x10/0x20\n[ 42.107901] \n[ 42.109428] Freed by task 328:\n[ 42.112543] kasan_save_stack+0x3c/0x68\n[ 42.116454] kasan_save_track+0x20/0x40\n[ 42.120363] kasan_save_free_info+0x4c/0x78\n[ 42.124619] __kasan_slab_free+0x6c/0x98\n[ 42.128617] kfree+0x214/0x3c8\n[ 42.131727] kasan_strings+0x128/0x8f8\n[ 42.135548] kunit_try_run_case+0x14c/0x3d0\n[ 42.139803] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.145372] kthread+0x24c/0x2d0\n[ 42.148668] ret_from_fork+0x10/0x20\n[ 42.152306] \n[ 42.153835] The buggy address belongs to the object at ffff1b1dd437fcc0\n[ 42.153835] which belongs to the cache kmalloc-32 of size 32\n[ 42.166322] The buggy address is located 16 bytes inside of\n[ 42.166322] freed 32-byte region [ffff1b1dd437fcc0, ffff1b1dd437fce0)\n[ 42.178550] \n[ 42.180087] The buggy address belongs to the physical page:\n[ 42.185737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 42.193844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 42.200456] page_type: f5(slab)\n[ 42.203665] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 42.211512] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 42.219356] page dumped because: kasan: bad access detected\n[ 42.225006] \n[ 42.226536] Memory state around the buggy address:\n[ 42.231398] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.238717] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.246034] >ffff1b1dd437fc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.253347] ^\n[ 42.259260] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 42.266575] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 42.273891] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_strlen-60a380229f31a57af41b0cbcc9cf81e52ac2c02c24b88249828dd80a01fea568": { "log_lines": [ "[ 42.282075] ==================================================================\n[ 42.289394] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0\n[ 42.295399] Read of size 1 at addr ffff1b1dd437fcd0 by task kunit_try_catch/328\n[ 42.302799] \n[ 42.304334] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 42.304362] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 42.304371] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 42.304380] Call trace:\n[ 42.304387] show_stack+0x20/0x38 (C)\n[ 42.304404] dump_stack_lvl+0x8c/0xd0\n[ 42.304419] print_report+0x118/0x5e0\n[ 42.304437] kasan_report+0xc8/0x118\n[ 42.304453] __asan_report_load1_noabort+0x20/0x30\n[ 42.304473] strlen+0xa8/0xb0\n[ 42.304489] kasan_strings+0x320/0x8f8\n[ 42.304503] kunit_try_run_case+0x14c/0x3d0\n[ 42.304523] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.304540] kthread+0x24c/0x2d0\n[ 42.304556] ret_from_fork+0x10/0x20\n[ 42.304573] \n[ 42.370321] Allocated by task 328:\n[ 42.373776] kasan_save_stack+0x3c/0x68\n[ 42.377683] kasan_save_track+0x20/0x40\n[ 42.381577] kasan_save_alloc_info+0x40/0x58\n[ 42.385916] __kasan_kmalloc+0xd4/0xd8\n[ 42.389731] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 42.394329] kasan_strings+0xb4/0x8f8\n[ 42.398046] kunit_try_run_case+0x14c/0x3d0\n[ 42.402299] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.407861] kthread+0x24c/0x2d0\n[ 42.411150] ret_from_fork+0x10/0x20\n[ 42.414782] \n[ 42.416312] Freed by task 328:\n[ 42.419418] kasan_save_stack+0x3c/0x68\n[ 42.423314] kasan_save_track+0x20/0x40\n[ 42.427208] kasan_save_free_info+0x4c/0x78\n[ 42.431460] __kasan_slab_free+0x6c/0x98\n[ 42.435451] kfree+0x214/0x3c8\n[ 42.438564] kasan_strings+0x128/0x8f8\n[ 42.442376] kunit_try_run_case+0x14c/0x3d0\n[ 42.446630] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.452190] kthread+0x24c/0x2d0\n[ 42.455477] ret_from_fork+0x10/0x20\n[ 42.459111] \n[ 42.460642] The buggy address belongs to the object at ffff1b1dd437fcc0\n[ 42.460642] which belongs to the cache kmalloc-32 of size 32\n[ 42.473124] The buggy address is located 16 bytes inside of\n[ 42.473124] freed 32-byte region [ffff1b1dd437fcc0, ffff1b1dd437fce0)\n[ 42.485340] \n[ 42.486862] The buggy address belongs to the physical page:\n[ 42.492503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 42.500605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 42.507222] page_type: f5(slab)\n[ 42.510419] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 42.518262] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 42.526102] page dumped because: kasan: bad access detected\n[ 42.531742] \n[ 42.533265] Memory state around the buggy address:\n[ 42.538117] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.545425] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.552732] >ffff1b1dd437fc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.560038] ^\n[ 42.565946] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 42.573251] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 42.580555] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-use-after-free_in_strnlen-a72c6567de4cffff601ee73203c8e39cdb69cc7a57b055c24ca4e5f58cc5218b": { "log_lines": [ "[ 42.587924] ==================================================================\n[ 42.595234] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88\n[ 42.601319] Read of size 1 at addr ffff1b1dd437fcd0 by task kunit_try_catch/328\n[ 42.608726] \n[ 42.610252] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 42.610276] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 42.610284] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 42.610294] Call trace:\n[ 42.610300] show_stack+0x20/0x38 (C)\n[ 42.610316] dump_stack_lvl+0x8c/0xd0\n[ 42.610329] print_report+0x118/0x5e0\n[ 42.610346] kasan_report+0xc8/0x118\n[ 42.610363] __asan_report_load1_noabort+0x20/0x30\n[ 42.610382] strnlen+0x80/0x88\n[ 42.610397] kasan_strings+0x380/0x8f8\n[ 42.610411] kunit_try_run_case+0x14c/0x3d0\n[ 42.610431] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.610448] kthread+0x24c/0x2d0\n[ 42.610464] ret_from_fork+0x10/0x20\n[ 42.610480] \n[ 42.676331] Allocated by task 328:\n[ 42.679783] kasan_save_stack+0x3c/0x68\n[ 42.683679] kasan_save_track+0x20/0x40\n[ 42.687583] kasan_save_alloc_info+0x40/0x58\n[ 42.691923] __kasan_kmalloc+0xd4/0xd8\n[ 42.695737] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 42.700336] kasan_strings+0xb4/0x8f8\n[ 42.704052] kunit_try_run_case+0x14c/0x3d0\n[ 42.708306] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.713869] kthread+0x24c/0x2d0\n[ 42.717156] ret_from_fork+0x10/0x20\n[ 42.720789] \n[ 42.722311] Freed by task 328:\n[ 42.725417] kasan_save_stack+0x3c/0x68\n[ 42.729321] kasan_save_track+0x20/0x40\n[ 42.733214] kasan_save_free_info+0x4c/0x78\n[ 42.737468] __kasan_slab_free+0x6c/0x98\n[ 42.741459] kfree+0x214/0x3c8\n[ 42.744568] kasan_strings+0x128/0x8f8\n[ 42.748382] kunit_try_run_case+0x14c/0x3d0\n[ 42.752635] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.758199] kthread+0x24c/0x2d0\n[ 42.761486] ret_from_fork+0x10/0x20\n[ 42.765119] \n[ 42.766642] The buggy address belongs to the object at ffff1b1dd437fcc0\n[ 42.766642] which belongs to the cache kmalloc-32 of size 32\n[ 42.779124] The buggy address is located 16 bytes inside of\n[ 42.779124] freed 32-byte region [ffff1b1dd437fcc0, ffff1b1dd437fce0)\n[ 42.791337] \n[ 42.792868] The buggy address belongs to the physical page:\n[ 42.798511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11437f\n[ 42.806611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 42.813223] page_type: f5(slab)\n[ 42.816418] raw: 0bfffe0000000000 ffff1b1dc0002780 dead000000000122 0000000000000000\n[ 42.824261] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000\n[ 42.832100] page dumped because: kasan: bad access detected\n[ 42.837745] \n[ 42.839268] Memory state around the buggy address:\n[ 42.844118] ffff1b1dd437fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.851427] ffff1b1dd437fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.858736] >ffff1b1dd437fc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc\n[ 42.866040] ^\n[ 42.871947] ffff1b1dd437fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 42.879256] ffff1b1dd437fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 42.886559] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_bitops_modify_constprop-fcc9c604b2134c07a0be2a6692cca8c5b754af70e47c75282a43b6f197ff8ee4": { "log_lines": [ "[ 44.527450] ==================================================================\n[ 44.534757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8\n[ 44.543032] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 44.550437] \n[ 44.551969] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 44.551992] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 44.552000] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 44.552010] Call trace:\n[ 44.552015] show_stack+0x20/0x38 (C)\n[ 44.552032] dump_stack_lvl+0x8c/0xd0\n[ 44.552045] print_report+0x118/0x5e0\n[ 44.552062] kasan_report+0xc8/0x118\n[ 44.552077] __asan_report_load8_noabort+0x20/0x30\n[ 44.552096] kasan_bitops_modify.constprop.0+0xaf4/0xbc8\n[ 44.552114] kasan_bitops_generic+0x110/0x1c8\n[ 44.552129] kunit_try_run_case+0x14c/0x3d0\n[ 44.552147] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.552164] kthread+0x24c/0x2d0\n[ 44.552179] ret_from_fork+0x10/0x20\n[ 44.552194] \n[ 44.620925] Allocated by task 330:\n[ 44.624378] kasan_save_stack+0x3c/0x68\n[ 44.628274] kasan_save_track+0x20/0x40\n[ 44.632176] kasan_save_alloc_info+0x40/0x58\n[ 44.636518] __kasan_kmalloc+0xd4/0xd8\n[ 44.640334] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 44.644934] kasan_bitops_generic+0xa0/0x1c8\n[ 44.649271] kunit_try_run_case+0x14c/0x3d0\n[ 44.653525] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.659090] kthread+0x24c/0x2d0\n[ 44.662377] ret_from_fork+0x10/0x20\n[ 44.666008] \n[ 44.667540] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 44.667540] which belongs to the cache kmalloc-16 of size 16\n[ 44.680012] The buggy address is located 8 bytes inside of\n[ 44.680012] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 44.692403] \n[ 44.693926] The buggy address belongs to the physical page:\n[ 44.699567] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 44.707668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 44.714283] page_type: f5(slab)\n[ 44.717479] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 44.725321] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 44.733160] page dumped because: kasan: bad access detected\n[ 44.738802] \n[ 44.740332] Memory state around the buggy address:\n[ 44.745185] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 44.752493] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 44.759801] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 44.767110] ^\n[ 44.773807] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 44.781115] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 44.788421] ==================================================================", "[ 45.339560] ==================================================================\n[ 45.346871] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8\n[ 45.355144] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 45.362546] \n[ 45.364071] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 45.364094] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 45.364102] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 45.364113] Call trace:\n[ 45.364118] show_stack+0x20/0x38 (C)\n[ 45.364135] dump_stack_lvl+0x8c/0xd0\n[ 45.364148] print_report+0x118/0x5e0\n[ 45.364164] kasan_report+0xc8/0x118\n[ 45.364180] __asan_report_load8_noabort+0x20/0x30\n[ 45.364200] kasan_bitops_modify.constprop.0+0xa28/0xbc8\n[ 45.364218] kasan_bitops_generic+0x110/0x1c8\n[ 45.364234] kunit_try_run_case+0x14c/0x3d0\n[ 45.364253] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.364270] kthread+0x24c/0x2d0\n[ 45.364287] ret_from_fork+0x10/0x20\n[ 45.364302] \n[ 45.433046] Allocated by task 330:\n[ 45.436501] kasan_save_stack+0x3c/0x68\n[ 45.440398] kasan_save_track+0x20/0x40\n[ 45.444293] kasan_save_alloc_info+0x40/0x58\n[ 45.448636] __kasan_kmalloc+0xd4/0xd8\n[ 45.452444] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 45.457044] kasan_bitops_generic+0xa0/0x1c8\n[ 45.461384] kunit_try_run_case+0x14c/0x3d0\n[ 45.465641] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.471207] kthread+0x24c/0x2d0\n[ 45.474497] ret_from_fork+0x10/0x20\n[ 45.478132] \n[ 45.479654] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 45.479654] which belongs to the cache kmalloc-16 of size 16\n[ 45.492132] The buggy address is located 8 bytes inside of\n[ 45.492132] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 45.504527] \n[ 45.506051] The buggy address belongs to the physical page:\n[ 45.511699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 45.519794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 45.526403] page_type: f5(slab)\n[ 45.529600] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 45.537436] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 45.545268] page dumped because: kasan: bad access detected\n[ 45.550915] \n[ 45.552437] Memory state around the buggy address:\n[ 45.557292] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 45.564604] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 45.571917] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 45.579227] ^\n[ 45.585919] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.593231] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.600541] ==================================================================", "[ 43.715242] ==================================================================\n[ 43.722562] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8\n[ 43.730841] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 43.738247] \n[ 43.739780] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 43.739804] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 43.739811] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 43.739821] Call trace:\n[ 43.739828] show_stack+0x20/0x38 (C)\n[ 43.739846] dump_stack_lvl+0x8c/0xd0\n[ 43.739860] print_report+0x118/0x5e0\n[ 43.739877] kasan_report+0xc8/0x118\n[ 43.739894] __asan_report_load8_noabort+0x20/0x30\n[ 43.739914] kasan_bitops_modify.constprop.0+0xa88/0xbc8\n[ 43.739932] kasan_bitops_generic+0x110/0x1c8\n[ 43.739948] kunit_try_run_case+0x14c/0x3d0\n[ 43.739968] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.739986] kthread+0x24c/0x2d0\n[ 43.740002] ret_from_fork+0x10/0x20\n[ 43.740018] \n[ 43.808771] Allocated by task 330:\n[ 43.812224] kasan_save_stack+0x3c/0x68\n[ 43.816128] kasan_save_track+0x20/0x40\n[ 43.820030] kasan_save_alloc_info+0x40/0x58\n[ 43.824368] __kasan_kmalloc+0xd4/0xd8\n[ 43.828185] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 43.832782] kasan_bitops_generic+0xa0/0x1c8\n[ 43.837118] kunit_try_run_case+0x14c/0x3d0\n[ 43.841371] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.846933] kthread+0x24c/0x2d0\n[ 43.850219] ret_from_fork+0x10/0x20\n[ 43.853850] \n[ 43.855381] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 43.855381] which belongs to the cache kmalloc-16 of size 16\n[ 43.867856] The buggy address is located 8 bytes inside of\n[ 43.867856] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 43.880251] \n[ 43.881774] The buggy address belongs to the physical page:\n[ 43.887414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 43.895519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 43.902131] page_type: f5(slab)\n[ 43.905323] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 43.913159] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 43.920989] page dumped because: kasan: bad access detected\n[ 43.926627] \n[ 43.928155] Memory state around the buggy address:\n[ 43.933006] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 43.940318] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 43.947630] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 43.954942] ^\n[ 43.961634] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.968949] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.976259] ==================================================================", "[ 43.173779] ==================================================================\n[ 43.181106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8\n[ 43.189390] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 43.196802] \n[ 43.198335] CPU: 3 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 43.198359] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 43.198368] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 43.198381] Call trace:\n[ 43.198389] show_stack+0x20/0x38 (C)\n[ 43.198406] dump_stack_lvl+0x8c/0xd0\n[ 43.198423] print_report+0x118/0x5e0\n[ 43.198442] kasan_report+0xc8/0x118\n[ 43.198459] __asan_report_load8_noabort+0x20/0x30\n[ 43.198481] kasan_bitops_modify.constprop.0+0xa4c/0xbc8\n[ 43.198500] kasan_bitops_generic+0x110/0x1c8\n[ 43.198518] kunit_try_run_case+0x14c/0x3d0\n[ 43.198538] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.198556] kthread+0x24c/0x2d0\n[ 43.198574] ret_from_fork+0x10/0x20\n[ 43.198590] \n[ 43.267381] Allocated by task 330:\n[ 43.270840] kasan_save_stack+0x3c/0x68\n[ 43.274749] kasan_save_track+0x20/0x40\n[ 43.278648] kasan_save_alloc_info+0x40/0x58\n[ 43.282992] __kasan_kmalloc+0xd4/0xd8\n[ 43.286803] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 43.291405] kasan_bitops_generic+0xa0/0x1c8\n[ 43.295751] kunit_try_run_case+0x14c/0x3d0\n[ 43.300005] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.305572] kthread+0x24c/0x2d0\n[ 43.308866] ret_from_fork+0x10/0x20\n[ 43.312505] \n[ 43.314036] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 43.314036] which belongs to the cache kmalloc-16 of size 16\n[ 43.326518] The buggy address is located 8 bytes inside of\n[ 43.326518] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 43.338919] \n[ 43.340455] The buggy address belongs to the physical page:\n[ 43.346104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 43.354210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 43.360822] page_type: f5(slab)\n[ 43.364026] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 43.371873] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 43.379715] page dumped because: kasan: bad access detected\n[ 43.385362] \n[ 43.386891] Memory state around the buggy address:\n[ 43.391753] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 43.399070] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 43.406393] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 43.413707] ^\n[ 43.420416] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.427732] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.435046] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_bitops_modify_constprop-e05c5cb4a71f22fb71e13cdc230fe166bfd2555405a80e77f6f71cbe938be501": { "log_lines": [ "[ 45.067639] ==================================================================\n[ 45.074947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8\n[ 45.083228] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 45.090713] \n[ 45.092247] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 45.092270] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 45.092279] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 45.092289] Call trace:\n[ 45.092295] show_stack+0x20/0x38 (C)\n[ 45.092310] dump_stack_lvl+0x8c/0xd0\n[ 45.092323] print_report+0x118/0x5e0\n[ 45.092338] kasan_report+0xc8/0x118\n[ 45.092354] kasan_check_range+0x100/0x1a8\n[ 45.092371] __kasan_check_write+0x20/0x30\n[ 45.092390] kasan_bitops_modify.constprop.0+0x3b0/0xbc8\n[ 45.092408] kasan_bitops_generic+0x110/0x1c8\n[ 45.092424] kunit_try_run_case+0x14c/0x3d0\n[ 45.092442] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.092460] kthread+0x24c/0x2d0\n[ 45.092476] ret_from_fork+0x10/0x20\n[ 45.092491] \n[ 45.164674] Allocated by task 330:\n[ 45.168130] kasan_save_stack+0x3c/0x68\n[ 45.172027] kasan_save_track+0x20/0x40\n[ 45.175922] kasan_save_alloc_info+0x40/0x58\n[ 45.180266] __kasan_kmalloc+0xd4/0xd8\n[ 45.184074] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 45.188675] kasan_bitops_generic+0xa0/0x1c8\n[ 45.193015] kunit_try_run_case+0x14c/0x3d0\n[ 45.197271] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.202837] kthread+0x24c/0x2d0\n[ 45.206126] ret_from_fork+0x10/0x20\n[ 45.209761] \n[ 45.211283] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 45.211283] which belongs to the cache kmalloc-16 of size 16\n[ 45.223762] The buggy address is located 8 bytes inside of\n[ 45.223762] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 45.236158] \n[ 45.237682] The buggy address belongs to the physical page:\n[ 45.243329] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 45.251432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 45.258042] page_type: f5(slab)\n[ 45.261240] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 45.269077] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 45.276910] page dumped because: kasan: bad access detected\n[ 45.282557] \n[ 45.284079] Memory state around the buggy address:\n[ 45.288935] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 45.296247] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 45.303560] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 45.310870] ^\n[ 45.317561] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.324874] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.332184] ==================================================================", "[ 44.795770] ==================================================================\n[ 44.803078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8\n[ 44.811356] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 44.818840] \n[ 44.820373] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 44.820396] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 44.820403] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 44.820413] Call trace:\n[ 44.820418] show_stack+0x20/0x38 (C)\n[ 44.820434] dump_stack_lvl+0x8c/0xd0\n[ 44.820449] print_report+0x118/0x5e0\n[ 44.820465] kasan_report+0xc8/0x118\n[ 44.820481] kasan_check_range+0x100/0x1a8\n[ 44.820499] __kasan_check_write+0x20/0x30\n[ 44.820516] kasan_bitops_modify.constprop.0+0x344/0xbc8\n[ 44.820534] kasan_bitops_generic+0x110/0x1c8\n[ 44.820550] kunit_try_run_case+0x14c/0x3d0\n[ 44.820568] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.820587] kthread+0x24c/0x2d0\n[ 44.820602] ret_from_fork+0x10/0x20\n[ 44.820617] \n[ 44.892793] Allocated by task 330:\n[ 44.896245] kasan_save_stack+0x3c/0x68\n[ 44.900139] kasan_save_track+0x20/0x40\n[ 44.904033] kasan_save_alloc_info+0x40/0x58\n[ 44.908373] __kasan_kmalloc+0xd4/0xd8\n[ 44.912188] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 44.916788] kasan_bitops_generic+0xa0/0x1c8\n[ 44.921124] kunit_try_run_case+0x14c/0x3d0\n[ 44.925379] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.930942] kthread+0x24c/0x2d0\n[ 44.934230] ret_from_fork+0x10/0x20\n[ 44.937861] \n[ 44.939393] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 44.939393] which belongs to the cache kmalloc-16 of size 16\n[ 44.951872] The buggy address is located 8 bytes inside of\n[ 44.951872] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 44.964260] \n[ 44.965782] The buggy address belongs to the physical page:\n[ 44.971423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 44.979524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 44.986139] page_type: f5(slab)\n[ 44.989336] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 44.997178] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 45.005018] page dumped because: kasan: bad access detected\n[ 45.010663] \n[ 45.012195] Memory state around the buggy address:\n[ 45.017046] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 45.024355] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 45.031662] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 45.038972] ^\n[ 45.045670] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.052978] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.060285] ==================================================================", "[ 43.443231] ==================================================================\n[ 43.450559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8\n[ 43.458842] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 43.466339] \n[ 43.467874] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 43.467901] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 43.467910] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 43.467920] Call trace:\n[ 43.467927] show_stack+0x20/0x38 (C)\n[ 43.467943] dump_stack_lvl+0x8c/0xd0\n[ 43.467957] print_report+0x118/0x5e0\n[ 43.467974] kasan_report+0xc8/0x118\n[ 43.467992] kasan_check_range+0x100/0x1a8\n[ 43.468009] __kasan_check_write+0x20/0x30\n[ 43.468028] kasan_bitops_modify.constprop.0+0x1dc/0xbc8\n[ 43.468046] kasan_bitops_generic+0x110/0x1c8\n[ 43.468061] kunit_try_run_case+0x14c/0x3d0\n[ 43.468080] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.468097] kthread+0x24c/0x2d0\n[ 43.468113] ret_from_fork+0x10/0x20\n[ 43.468130] \n[ 43.540339] Allocated by task 330:\n[ 43.543792] kasan_save_stack+0x3c/0x68\n[ 43.547697] kasan_save_track+0x20/0x40\n[ 43.551600] kasan_save_alloc_info+0x40/0x58\n[ 43.555938] __kasan_kmalloc+0xd4/0xd8\n[ 43.559753] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 43.564350] kasan_bitops_generic+0xa0/0x1c8\n[ 43.568685] kunit_try_run_case+0x14c/0x3d0\n[ 43.572938] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.578501] kthread+0x24c/0x2d0\n[ 43.581788] ret_from_fork+0x10/0x20\n[ 43.585418] \n[ 43.586941] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 43.586941] which belongs to the cache kmalloc-16 of size 16\n[ 43.599420] The buggy address is located 8 bytes inside of\n[ 43.599420] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 43.611811] \n[ 43.613335] The buggy address belongs to the physical page:\n[ 43.618977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 43.627079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 43.633690] page_type: f5(slab)\n[ 43.636886] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 43.644725] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 43.652561] page dumped because: kasan: bad access detected\n[ 43.658204] \n[ 43.659735] Memory state around the buggy address:\n[ 43.664587] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 43.671904] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 43.679213] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 43.686517] ^\n[ 43.693213] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.700529] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.707833] ==================================================================", "[ 43.983629] ==================================================================\n[ 43.990947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8\n[ 43.999231] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 44.006720] \n[ 44.008250] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 44.008274] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 44.008283] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 44.008293] Call trace:\n[ 44.008299] show_stack+0x20/0x38 (C)\n[ 44.008316] dump_stack_lvl+0x8c/0xd0\n[ 44.008330] print_report+0x118/0x5e0\n[ 44.008347] kasan_report+0xc8/0x118\n[ 44.008364] kasan_check_range+0x100/0x1a8\n[ 44.008383] __kasan_check_write+0x20/0x30\n[ 44.008402] kasan_bitops_modify.constprop.0+0x2b4/0xbc8\n[ 44.008419] kasan_bitops_generic+0x110/0x1c8\n[ 44.008435] kunit_try_run_case+0x14c/0x3d0\n[ 44.008456] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.008473] kthread+0x24c/0x2d0\n[ 44.008489] ret_from_fork+0x10/0x20\n[ 44.008507] \n[ 44.080707] Allocated by task 330:\n[ 44.084159] kasan_save_stack+0x3c/0x68\n[ 44.088060] kasan_save_track+0x20/0x40\n[ 44.091962] kasan_save_alloc_info+0x40/0x58\n[ 44.096298] __kasan_kmalloc+0xd4/0xd8\n[ 44.100111] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 44.104707] kasan_bitops_generic+0xa0/0x1c8\n[ 44.109041] kunit_try_run_case+0x14c/0x3d0\n[ 44.113291] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.118853] kthread+0x24c/0x2d0\n[ 44.122137] ret_from_fork+0x10/0x20\n[ 44.125776] \n[ 44.127309] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 44.127309] which belongs to the cache kmalloc-16 of size 16\n[ 44.139787] The buggy address is located 8 bytes inside of\n[ 44.139787] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 44.152182] \n[ 44.153706] The buggy address belongs to the physical page:\n[ 44.159343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 44.167449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 44.174058] page_type: f5(slab)\n[ 44.177252] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 44.185088] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 44.192920] page dumped because: kasan: bad access detected\n[ 44.198561] \n[ 44.200089] Memory state around the buggy address:\n[ 44.204951] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 44.212264] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 44.219578] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 44.226880] ^\n[ 44.233570] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 44.240882] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 44.248192] ==================================================================", "[ 44.255558] ==================================================================\n[ 44.262875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8\n[ 44.271157] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 44.278644] \n[ 44.280174] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 44.280198] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 44.280206] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 44.280217] Call trace:\n[ 44.280222] show_stack+0x20/0x38 (C)\n[ 44.280237] dump_stack_lvl+0x8c/0xd0\n[ 44.280252] print_report+0x118/0x5e0\n[ 44.280268] kasan_report+0xc8/0x118\n[ 44.280284] kasan_check_range+0x100/0x1a8\n[ 44.280303] __kasan_check_write+0x20/0x30\n[ 44.280320] kasan_bitops_modify.constprop.0+0x320/0xbc8\n[ 44.280338] kasan_bitops_generic+0x110/0x1c8\n[ 44.280354] kunit_try_run_case+0x14c/0x3d0\n[ 44.280372] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.280389] kthread+0x24c/0x2d0\n[ 44.280405] ret_from_fork+0x10/0x20\n[ 44.280421] \n[ 44.352616] Allocated by task 330:\n[ 44.356068] kasan_save_stack+0x3c/0x68\n[ 44.359971] kasan_save_track+0x20/0x40\n[ 44.363874] kasan_save_alloc_info+0x40/0x58\n[ 44.368212] __kasan_kmalloc+0xd4/0xd8\n[ 44.372027] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 44.376624] kasan_bitops_generic+0xa0/0x1c8\n[ 44.380961] kunit_try_run_case+0x14c/0x3d0\n[ 44.385213] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 44.390777] kthread+0x24c/0x2d0\n[ 44.394062] ret_from_fork+0x10/0x20\n[ 44.397692] \n[ 44.399215] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 44.399215] which belongs to the cache kmalloc-16 of size 16\n[ 44.411689] The buggy address is located 8 bytes inside of\n[ 44.411689] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 44.424083] \n[ 44.425606] The buggy address belongs to the physical page:\n[ 44.431249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 44.439345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 44.445955] page_type: f5(slab)\n[ 44.449150] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 44.456988] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 44.464824] page dumped because: kasan: bad access detected\n[ 44.470466] \n[ 44.471996] Memory state around the buggy address:\n[ 44.476848] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 44.484162] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 44.491468] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 44.498773] ^\n[ 44.505466] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 44.512782] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 44.520095] ==================================================================", "[ 42.897951] ==================================================================\n[ 42.908815] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8\n[ 42.917107] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 42.924607] \n[ 42.926142] CPU: 3 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 42.926167] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 42.926176] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 42.926188] Call trace:\n[ 42.926194] show_stack+0x20/0x38 (C)\n[ 42.926211] dump_stack_lvl+0x8c/0xd0\n[ 42.926227] print_report+0x118/0x5e0\n[ 42.926246] kasan_report+0xc8/0x118\n[ 42.926266] kasan_check_range+0x100/0x1a8\n[ 42.926284] __kasan_check_write+0x20/0x30\n[ 42.926304] kasan_bitops_modify.constprop.0+0x100/0xbc8\n[ 42.926324] kasan_bitops_generic+0x110/0x1c8\n[ 42.926341] kunit_try_run_case+0x14c/0x3d0\n[ 42.926362] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 42.926381] kthread+0x24c/0x2d0\n[ 42.926398] ret_from_fork+0x10/0x20\n[ 42.926415] \n[ 42.998643] Allocated by task 330:\n[ 43.002109] kasan_save_stack+0x3c/0x68\n[ 43.006015] kasan_save_track+0x20/0x40\n[ 43.009919] kasan_save_alloc_info+0x40/0x58\n[ 43.014268] __kasan_kmalloc+0xd4/0xd8\n[ 43.018084] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 43.022691] kasan_bitops_generic+0xa0/0x1c8\n[ 43.027036] kunit_try_run_case+0x14c/0x3d0\n[ 43.031297] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 43.036865] kthread+0x24c/0x2d0\n[ 43.040154] ret_from_fork+0x10/0x20\n[ 43.043797] \n[ 43.045328] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 43.045328] which belongs to the cache kmalloc-16 of size 16\n[ 43.057816] The buggy address is located 8 bytes inside of\n[ 43.057816] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 43.070220] \n[ 43.071752] The buggy address belongs to the physical page:\n[ 43.077397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 43.085502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 43.092125] page_type: f5(slab)\n[ 43.095324] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 43.103173] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 43.111016] page dumped because: kasan: bad access detected\n[ 43.116662] \n[ 43.118192] Memory state around the buggy address:\n[ 43.123050] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 43.130365] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 43.137681] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 43.144994] ^\n[ 43.151702] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.159018] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 43.166332] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_bitops_test_and_modify_constprop-a16ce7f6d6e6f5965de7203e31d025d5dc7ece2c51be18a2163ab0f6a2c1842e": { "log_lines": [ "[ 47.781564] ==================================================================\n[ 47.788875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8\n[ 47.797942] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 47.805344] \n[ 47.806870] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 47.806894] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 47.806902] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 47.806911] Call trace:\n[ 47.806917] show_stack+0x20/0x38 (C)\n[ 47.806934] dump_stack_lvl+0x8c/0xd0\n[ 47.806948] print_report+0x118/0x5e0\n[ 47.806964] kasan_report+0xc8/0x118\n[ 47.806980] __asan_report_load8_noabort+0x20/0x30\n[ 47.806999] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8\n[ 47.807017] kasan_bitops_generic+0x11c/0x1c8\n[ 47.807034] kunit_try_run_case+0x14c/0x3d0\n[ 47.807053] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.807070] kthread+0x24c/0x2d0\n[ 47.807085] ret_from_fork+0x10/0x20\n[ 47.807101] \n[ 47.876644] Allocated by task 330:\n[ 47.880100] kasan_save_stack+0x3c/0x68\n[ 47.884009] kasan_save_track+0x20/0x40\n[ 47.887913] kasan_save_alloc_info+0x40/0x58\n[ 47.892259] __kasan_kmalloc+0xd4/0xd8\n[ 47.896069] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 47.900671] kasan_bitops_generic+0xa0/0x1c8\n[ 47.905012] kunit_try_run_case+0x14c/0x3d0\n[ 47.909269] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.914835] kthread+0x24c/0x2d0\n[ 47.918125] ret_from_fork+0x10/0x20\n[ 47.921762] \n[ 47.923286] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 47.923286] which belongs to the cache kmalloc-16 of size 16\n[ 47.935771] The buggy address is located 8 bytes inside of\n[ 47.935771] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 47.948168] \n[ 47.949693] The buggy address belongs to the physical page:\n[ 47.955341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 47.963438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 47.970047] page_type: f5(slab)\n[ 47.973248] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 47.981086] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 47.988919] page dumped because: kasan: bad access detected\n[ 47.994565] \n[ 47.996088] Memory state around the buggy address:\n[ 48.000945] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 48.008259] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 48.015572] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 48.022883] ^\n[ 48.029575] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.036887] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.044198] ==================================================================", "[ 46.424701] ==================================================================\n[ 46.432013] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8\n[ 46.441077] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 46.448477] \n[ 46.450002] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 46.450026] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 46.450034] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 46.450044] Call trace:\n[ 46.450050] show_stack+0x20/0x38 (C)\n[ 46.450066] dump_stack_lvl+0x8c/0xd0\n[ 46.450080] print_report+0x118/0x5e0\n[ 46.450096] kasan_report+0xc8/0x118\n[ 46.450113] __asan_report_load8_noabort+0x20/0x30\n[ 46.450132] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8\n[ 46.450152] kasan_bitops_generic+0x11c/0x1c8\n[ 46.450169] kunit_try_run_case+0x14c/0x3d0\n[ 46.450189] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.450205] kthread+0x24c/0x2d0\n[ 46.450221] ret_from_fork+0x10/0x20\n[ 46.450236] \n[ 46.519774] Allocated by task 330:\n[ 46.523229] kasan_save_stack+0x3c/0x68\n[ 46.527126] kasan_save_track+0x20/0x40\n[ 46.531022] kasan_save_alloc_info+0x40/0x58\n[ 46.535366] __kasan_kmalloc+0xd4/0xd8\n[ 46.539173] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 46.543775] kasan_bitops_generic+0xa0/0x1c8\n[ 46.548114] kunit_try_run_case+0x14c/0x3d0\n[ 46.552371] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.557938] kthread+0x24c/0x2d0\n[ 46.561226] ret_from_fork+0x10/0x20\n[ 46.564862] \n[ 46.566384] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 46.566384] which belongs to the cache kmalloc-16 of size 16\n[ 46.578862] The buggy address is located 8 bytes inside of\n[ 46.578862] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 46.591259] \n[ 46.592782] The buggy address belongs to the physical page:\n[ 46.598429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 46.606525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 46.613132] page_type: f5(slab)\n[ 46.616329] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 46.624165] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 46.631997] page dumped because: kasan: bad access detected\n[ 46.637644] \n[ 46.639165] Memory state around the buggy address:\n[ 46.644020] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 46.651334] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 46.658645] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 46.665955] ^\n[ 46.672646] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.679959] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.687270] ==================================================================", "[ 45.881241] ==================================================================\n[ 45.888554] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8\n[ 45.897619] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 45.905021] \n[ 45.906546] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 45.906569] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 45.906577] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 45.906587] Call trace:\n[ 45.906593] show_stack+0x20/0x38 (C)\n[ 45.906609] dump_stack_lvl+0x8c/0xd0\n[ 45.906622] print_report+0x118/0x5e0\n[ 45.906638] kasan_report+0xc8/0x118\n[ 45.906654] __asan_report_load8_noabort+0x20/0x30\n[ 45.906674] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8\n[ 45.906694] kasan_bitops_generic+0x11c/0x1c8\n[ 45.906709] kunit_try_run_case+0x14c/0x3d0\n[ 45.906727] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.906744] kthread+0x24c/0x2d0\n[ 45.906759] ret_from_fork+0x10/0x20\n[ 45.906775] \n[ 45.976317] Allocated by task 330:\n[ 45.979773] kasan_save_stack+0x3c/0x68\n[ 45.983671] kasan_save_track+0x20/0x40\n[ 45.987568] kasan_save_alloc_info+0x40/0x58\n[ 45.991910] __kasan_kmalloc+0xd4/0xd8\n[ 45.995718] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 46.000320] kasan_bitops_generic+0xa0/0x1c8\n[ 46.004660] kunit_try_run_case+0x14c/0x3d0\n[ 46.008916] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.014482] kthread+0x24c/0x2d0\n[ 46.017771] ret_from_fork+0x10/0x20\n[ 46.021405] \n[ 46.022928] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 46.022928] which belongs to the cache kmalloc-16 of size 16\n[ 46.035409] The buggy address is located 8 bytes inside of\n[ 46.035409] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 46.047804] \n[ 46.049328] The buggy address belongs to the physical page:\n[ 46.054974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 46.063069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 46.069677] page_type: f5(slab)\n[ 46.072876] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 46.080714] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 46.088547] page dumped because: kasan: bad access detected\n[ 46.094195] \n[ 46.095718] Memory state around the buggy address:\n[ 46.100574] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 46.107886] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 46.115199] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 46.122511] ^\n[ 46.129202] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.136515] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.143825] ==================================================================", "[ 46.968142] ==================================================================\n[ 46.975455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8\n[ 46.984522] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 46.991924] \n[ 46.993449] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 46.993473] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 46.993482] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 46.993491] Call trace:\n[ 46.993498] show_stack+0x20/0x38 (C)\n[ 46.993514] dump_stack_lvl+0x8c/0xd0\n[ 46.993528] print_report+0x118/0x5e0\n[ 46.993544] kasan_report+0xc8/0x118\n[ 46.993559] __asan_report_load8_noabort+0x20/0x30\n[ 46.993580] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8\n[ 46.993600] kasan_bitops_generic+0x11c/0x1c8\n[ 46.993616] kunit_try_run_case+0x14c/0x3d0\n[ 46.993635] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.993654] kthread+0x24c/0x2d0\n[ 46.993671] ret_from_fork+0x10/0x20\n[ 46.993687] \n[ 47.063238] Allocated by task 330:\n[ 47.066694] kasan_save_stack+0x3c/0x68\n[ 47.070593] kasan_save_track+0x20/0x40\n[ 47.074489] kasan_save_alloc_info+0x40/0x58\n[ 47.078831] __kasan_kmalloc+0xd4/0xd8\n[ 47.082640] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 47.087241] kasan_bitops_generic+0xa0/0x1c8\n[ 47.091580] kunit_try_run_case+0x14c/0x3d0\n[ 47.095836] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.101394] kthread+0x24c/0x2d0\n[ 47.104684] ret_from_fork+0x10/0x20\n[ 47.108319] \n[ 47.109842] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 47.109842] which belongs to the cache kmalloc-16 of size 16\n[ 47.122323] The buggy address is located 8 bytes inside of\n[ 47.122323] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 47.134718] \n[ 47.136243] The buggy address belongs to the physical page:\n[ 47.141890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 47.149986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 47.156594] page_type: f5(slab)\n[ 47.159792] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 47.167627] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 47.175461] page dumped because: kasan: bad access detected\n[ 47.181107] \n[ 47.182629] Memory state around the buggy address:\n[ 47.187484] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 47.194796] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 47.202110] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 47.209421] ^\n[ 47.216112] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 47.223424] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 47.230734] ==================================================================", "[ 47.511605] ==================================================================\n[ 47.518916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8\n[ 47.527982] Read of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 47.535382] \n[ 47.536907] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 47.536930] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 47.536938] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 47.536948] Call trace:\n[ 47.536954] show_stack+0x20/0x38 (C)\n[ 47.536969] dump_stack_lvl+0x8c/0xd0\n[ 47.536983] print_report+0x118/0x5e0\n[ 47.536999] kasan_report+0xc8/0x118\n[ 47.537014] __asan_report_load8_noabort+0x20/0x30\n[ 47.537033] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8\n[ 47.537051] kasan_bitops_generic+0x11c/0x1c8\n[ 47.537067] kunit_try_run_case+0x14c/0x3d0\n[ 47.537086] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.537103] kthread+0x24c/0x2d0\n[ 47.537120] ret_from_fork+0x10/0x20\n[ 47.537135] \n[ 47.606680] Allocated by task 330:\n[ 47.610136] kasan_save_stack+0x3c/0x68\n[ 47.614033] kasan_save_track+0x20/0x40\n[ 47.617930] kasan_save_alloc_info+0x40/0x58\n[ 47.622273] __kasan_kmalloc+0xd4/0xd8\n[ 47.626081] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 47.630684] kasan_bitops_generic+0xa0/0x1c8\n[ 47.635024] kunit_try_run_case+0x14c/0x3d0\n[ 47.639280] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.644848] kthread+0x24c/0x2d0\n[ 47.648136] ret_from_fork+0x10/0x20\n[ 47.651772] \n[ 47.653294] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 47.653294] which belongs to the cache kmalloc-16 of size 16\n[ 47.665773] The buggy address is located 8 bytes inside of\n[ 47.665773] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 47.678169] \n[ 47.679692] The buggy address belongs to the physical page:\n[ 47.685338] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 47.693434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 47.700041] page_type: f5(slab)\n[ 47.703239] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 47.711075] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 47.718907] page dumped because: kasan: bad access detected\n[ 47.724554] \n[ 47.726077] Memory state around the buggy address:\n[ 47.730932] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 47.738245] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 47.745556] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 47.752867] ^\n[ 47.759560] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 47.766874] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 47.774184] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_bitops_test_and_modify_constprop-3bd935eca447f8656ce3b2852d75fad6dfecd6916d3e91826fbec1ed11d642b8": { "log_lines": [ "[ 45.607925] ==================================================================\n[ 45.615236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8\n[ 45.624214] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 45.631703] \n[ 45.633228] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 45.633250] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 45.633259] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 45.633268] Call trace:\n[ 45.633277] show_stack+0x20/0x38 (C)\n[ 45.633293] dump_stack_lvl+0x8c/0xd0\n[ 45.633307] print_report+0x118/0x5e0\n[ 45.633323] kasan_report+0xc8/0x118\n[ 45.633339] kasan_check_range+0x100/0x1a8\n[ 45.633357] __kasan_check_write+0x20/0x30\n[ 45.633376] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8\n[ 45.633395] kasan_bitops_generic+0x11c/0x1c8\n[ 45.633412] kunit_try_run_case+0x14c/0x3d0\n[ 45.633430] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.633447] kthread+0x24c/0x2d0\n[ 45.633463] ret_from_fork+0x10/0x20\n[ 45.633480] \n[ 45.706372] Allocated by task 330:\n[ 45.709828] kasan_save_stack+0x3c/0x68\n[ 45.713725] kasan_save_track+0x20/0x40\n[ 45.717621] kasan_save_alloc_info+0x40/0x58\n[ 45.721964] __kasan_kmalloc+0xd4/0xd8\n[ 45.725773] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 45.730375] kasan_bitops_generic+0xa0/0x1c8\n[ 45.734714] kunit_try_run_case+0x14c/0x3d0\n[ 45.738969] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 45.744536] kthread+0x24c/0x2d0\n[ 45.747825] ret_from_fork+0x10/0x20\n[ 45.751462] \n[ 45.752984] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 45.752984] which belongs to the cache kmalloc-16 of size 16\n[ 45.765463] The buggy address is located 8 bytes inside of\n[ 45.765463] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 45.777858] \n[ 45.779380] The buggy address belongs to the physical page:\n[ 45.785027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 45.793123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 45.799731] page_type: f5(slab)\n[ 45.802930] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 45.810765] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 45.818598] page dumped because: kasan: bad access detected\n[ 45.824246] \n[ 45.825768] Memory state around the buggy address:\n[ 45.830624] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 45.837936] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 45.845249] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 45.852559] ^\n[ 45.859251] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.866563] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 45.873873] ==================================================================", "[ 46.694648] ==================================================================\n[ 46.701960] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8\n[ 46.711025] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 46.718514] \n[ 46.720039] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 46.720063] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 46.720072] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 46.720082] Call trace:\n[ 46.720088] show_stack+0x20/0x38 (C)\n[ 46.720104] dump_stack_lvl+0x8c/0xd0\n[ 46.720117] print_report+0x118/0x5e0\n[ 46.720135] kasan_report+0xc8/0x118\n[ 46.720152] kasan_check_range+0x100/0x1a8\n[ 46.720171] __kasan_check_write+0x20/0x30\n[ 46.720190] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8\n[ 46.720210] kasan_bitops_generic+0x11c/0x1c8\n[ 46.720225] kunit_try_run_case+0x14c/0x3d0\n[ 46.720246] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.720266] kthread+0x24c/0x2d0\n[ 46.720281] ret_from_fork+0x10/0x20\n[ 46.720296] \n[ 46.793279] Allocated by task 330:\n[ 46.796735] kasan_save_stack+0x3c/0x68\n[ 46.800632] kasan_save_track+0x20/0x40\n[ 46.804527] kasan_save_alloc_info+0x40/0x58\n[ 46.808869] __kasan_kmalloc+0xd4/0xd8\n[ 46.812678] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 46.817279] kasan_bitops_generic+0xa0/0x1c8\n[ 46.821618] kunit_try_run_case+0x14c/0x3d0\n[ 46.825874] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.831440] kthread+0x24c/0x2d0\n[ 46.834731] ret_from_fork+0x10/0x20\n[ 46.838366] \n[ 46.839889] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 46.839889] which belongs to the cache kmalloc-16 of size 16\n[ 46.852367] The buggy address is located 8 bytes inside of\n[ 46.852367] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 46.864763] \n[ 46.866285] The buggy address belongs to the physical page:\n[ 46.871931] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 46.880026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 46.886634] page_type: f5(slab)\n[ 46.889831] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 46.897667] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 46.905501] page dumped because: kasan: bad access detected\n[ 46.911147] \n[ 46.912670] Memory state around the buggy address:\n[ 46.917525] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 46.924838] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 46.932151] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 46.939461] ^\n[ 46.946152] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.953464] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.960774] ==================================================================", "[ 47.238113] ==================================================================\n[ 47.245424] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8\n[ 47.254491] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 47.261980] \n[ 47.263505] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 47.263528] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 47.263537] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 47.263548] Call trace:\n[ 47.263555] show_stack+0x20/0x38 (C)\n[ 47.263570] dump_stack_lvl+0x8c/0xd0\n[ 47.263583] print_report+0x118/0x5e0\n[ 47.263600] kasan_report+0xc8/0x118\n[ 47.263616] kasan_check_range+0x100/0x1a8\n[ 47.263633] __kasan_check_write+0x20/0x30\n[ 47.263653] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8\n[ 47.263672] kasan_bitops_generic+0x11c/0x1c8\n[ 47.263688] kunit_try_run_case+0x14c/0x3d0\n[ 47.263706] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.263723] kthread+0x24c/0x2d0\n[ 47.263738] ret_from_fork+0x10/0x20\n[ 47.263755] \n[ 47.336736] Allocated by task 330:\n[ 47.340193] kasan_save_stack+0x3c/0x68\n[ 47.344089] kasan_save_track+0x20/0x40\n[ 47.347986] kasan_save_alloc_info+0x40/0x58\n[ 47.352328] __kasan_kmalloc+0xd4/0xd8\n[ 47.356136] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 47.360737] kasan_bitops_generic+0xa0/0x1c8\n[ 47.365077] kunit_try_run_case+0x14c/0x3d0\n[ 47.369333] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 47.374900] kthread+0x24c/0x2d0\n[ 47.378190] ret_from_fork+0x10/0x20\n[ 47.381826] \n[ 47.383348] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 47.383348] which belongs to the cache kmalloc-16 of size 16\n[ 47.395827] The buggy address is located 8 bytes inside of\n[ 47.395827] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 47.408224] \n[ 47.409747] The buggy address belongs to the physical page:\n[ 47.415393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 47.423488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 47.430095] page_type: f5(slab)\n[ 47.433294] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 47.441131] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 47.448964] page dumped because: kasan: bad access detected\n[ 47.454611] \n[ 47.456133] Memory state around the buggy address:\n[ 47.460987] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 47.468301] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 47.475613] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 47.482925] ^\n[ 47.489615] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 47.496927] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 47.504238] ==================================================================", "[ 46.151205] ==================================================================\n[ 46.158518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8\n[ 46.167584] Write of size 8 at addr ffff1b1dc0c7c768 by task kunit_try_catch/330\n[ 46.175073] \n[ 46.176599] CPU: 6 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 46.176621] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 46.176629] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 46.176639] Call trace:\n[ 46.176646] show_stack+0x20/0x38 (C)\n[ 46.176662] dump_stack_lvl+0x8c/0xd0\n[ 46.176676] print_report+0x118/0x5e0\n[ 46.176693] kasan_report+0xc8/0x118\n[ 46.176710] kasan_check_range+0x100/0x1a8\n[ 46.176728] __kasan_check_write+0x20/0x30\n[ 46.176746] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8\n[ 46.176765] kasan_bitops_generic+0x11c/0x1c8\n[ 46.176780] kunit_try_run_case+0x14c/0x3d0\n[ 46.176799] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.176816] kthread+0x24c/0x2d0\n[ 46.176832] ret_from_fork+0x10/0x20\n[ 46.176849] \n[ 46.249824] Allocated by task 330:\n[ 46.253280] kasan_save_stack+0x3c/0x68\n[ 46.257178] kasan_save_track+0x20/0x40\n[ 46.261074] kasan_save_alloc_info+0x40/0x58\n[ 46.265417] __kasan_kmalloc+0xd4/0xd8\n[ 46.269225] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 46.273826] kasan_bitops_generic+0xa0/0x1c8\n[ 46.278165] kunit_try_run_case+0x14c/0x3d0\n[ 46.282421] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 46.287986] kthread+0x24c/0x2d0\n[ 46.291276] ret_from_fork+0x10/0x20\n[ 46.294911] \n[ 46.296434] The buggy address belongs to the object at ffff1b1dc0c7c760\n[ 46.296434] which belongs to the cache kmalloc-16 of size 16\n[ 46.308915] The buggy address is located 8 bytes inside of\n[ 46.308915] allocated 9-byte region [ffff1b1dc0c7c760, ffff1b1dc0c7c769)\n[ 46.321309] \n[ 46.322834] The buggy address belongs to the physical page:\n[ 46.328480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c7c\n[ 46.336576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 46.343184] page_type: f5(slab)\n[ 46.346382] raw: 0bfffe0000000000 ffff1b1dc0002640 dead000000000122 0000000000000000\n[ 46.354219] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000\n[ 46.362051] page dumped because: kasan: bad access detected\n[ 46.367697] \n[ 46.369220] Memory state around the buggy address:\n[ 46.374077] ffff1b1dc0c7c600: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc\n[ 46.381390] ffff1b1dc0c7c680: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 04 fc fc\n[ 46.388703] >ffff1b1dc0c7c700: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc\n[ 46.396015] ^\n[ 46.402708] ffff1b1dc0c7c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.410020] ffff1b1dc0c7c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 46.417332] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_atomics_helper-496fa0909595dc29c2eb080192105d126ee5da3cc56793a39d67dddbad439bce": { "log_lines": [ "[ 51.817723] ==================================================================\n[ 51.825036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858\n[ 51.832440] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 51.839930] \n[ 51.841455] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 51.841478] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 51.841485] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 51.841496] Call trace:\n[ 51.841503] show_stack+0x20/0x38 (C)\n[ 51.841518] dump_stack_lvl+0x8c/0xd0\n[ 51.841531] print_report+0x118/0x5e0\n[ 51.841547] kasan_report+0xc8/0x118\n[ 51.841564] kasan_check_range+0x100/0x1a8\n[ 51.841582] __kasan_check_write+0x20/0x30\n[ 51.841600] kasan_atomics_helper+0x61c/0x4858\n[ 51.841615] kasan_atomics+0x198/0x2e8\n[ 51.841630] kunit_try_run_case+0x14c/0x3d0\n[ 51.841649] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.841666] kthread+0x24c/0x2d0\n[ 51.841682] ret_from_fork+0x10/0x20\n[ 51.841698] \n[ 51.912402] Allocated by task 334:\n[ 51.915857] kasan_save_stack+0x3c/0x68\n[ 51.919754] kasan_save_track+0x20/0x40\n[ 51.923651] kasan_save_alloc_info+0x40/0x58\n[ 51.927993] __kasan_kmalloc+0xd4/0xd8\n[ 51.931800] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 51.936401] kasan_atomics+0xb8/0x2e8\n[ 51.940122] kunit_try_run_case+0x14c/0x3d0\n[ 51.944378] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.949945] kthread+0x24c/0x2d0\n[ 51.953233] ret_from_fork+0x10/0x20\n[ 51.956868] \n[ 51.958390] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 51.958390] which belongs to the cache kmalloc-64 of size 64\n[ 51.970868] The buggy address is located 0 bytes to the right of\n[ 51.970868] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 51.983870] \n[ 51.985393] The buggy address belongs to the physical page:\n[ 51.991039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 51.999135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 52.005741] page_type: f5(slab)\n[ 52.008940] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 52.016777] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 52.024609] page dumped because: kasan: bad access detected\n[ 52.030255] \n[ 52.031776] Memory state around the buggy address:\n[ 52.036632] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.043945] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.051258] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 52.058569] ^\n[ 52.063425] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.070738] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.078049] ==================================================================", "[ 59.554275] ==================================================================\n[ 59.561586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858\n[ 59.569076] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 59.576565] \n[ 59.578089] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 59.578113] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 59.578122] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 59.578132] Call trace:\n[ 59.578138] show_stack+0x20/0x38 (C)\n[ 59.578153] dump_stack_lvl+0x8c/0xd0\n[ 59.578166] print_report+0x118/0x5e0\n[ 59.578182] kasan_report+0xc8/0x118\n[ 59.578199] kasan_check_range+0x100/0x1a8\n[ 59.578217] __kasan_check_write+0x20/0x30\n[ 59.578235] kasan_atomics_helper+0x1058/0x4858\n[ 59.578252] kasan_atomics+0x198/0x2e8\n[ 59.578267] kunit_try_run_case+0x14c/0x3d0\n[ 59.578285] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.578303] kthread+0x24c/0x2d0\n[ 59.578319] ret_from_fork+0x10/0x20\n[ 59.578335] \n[ 59.649146] Allocated by task 334:\n[ 59.652608] kasan_save_stack+0x3c/0x68\n[ 59.656511] kasan_save_track+0x20/0x40\n[ 59.660410] kasan_save_alloc_info+0x40/0x58\n[ 59.664755] __kasan_kmalloc+0xd4/0xd8\n[ 59.668564] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 59.673166] kasan_atomics+0xb8/0x2e8\n[ 59.676887] kunit_try_run_case+0x14c/0x3d0\n[ 59.681144] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.686713] kthread+0x24c/0x2d0\n[ 59.690003] ret_from_fork+0x10/0x20\n[ 59.693638] \n[ 59.695162] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 59.695162] which belongs to the cache kmalloc-64 of size 64\n[ 59.707643] The buggy address is located 0 bytes to the right of\n[ 59.707643] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 59.720648] \n[ 59.722171] The buggy address belongs to the physical page:\n[ 59.727818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 59.735916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 59.742527] page_type: f5(slab)\n[ 59.745728] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 59.753569] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 59.761404] page dumped because: kasan: bad access detected\n[ 59.767053] \n[ 59.768575] Memory state around the buggy address:\n[ 59.773431] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 59.780744] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 59.788058] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 59.795369] ^\n[ 59.800226] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.807538] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.814850] ==================================================================", "[ 51.550023] ==================================================================\n[ 51.557335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858\n[ 51.564739] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 51.572228] \n[ 51.573754] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 51.573777] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 51.573786] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 51.573796] Call trace:\n[ 51.573802] show_stack+0x20/0x38 (C)\n[ 51.573818] dump_stack_lvl+0x8c/0xd0\n[ 51.573833] print_report+0x118/0x5e0\n[ 51.573850] kasan_report+0xc8/0x118\n[ 51.573866] kasan_check_range+0x100/0x1a8\n[ 51.573883] __kasan_check_write+0x20/0x30\n[ 51.573901] kasan_atomics_helper+0x5b4/0x4858\n[ 51.573917] kasan_atomics+0x198/0x2e8\n[ 51.573932] kunit_try_run_case+0x14c/0x3d0\n[ 51.573952] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.573968] kthread+0x24c/0x2d0\n[ 51.573983] ret_from_fork+0x10/0x20\n[ 51.573999] \n[ 51.644704] Allocated by task 334:\n[ 51.648160] kasan_save_stack+0x3c/0x68\n[ 51.652057] kasan_save_track+0x20/0x40\n[ 51.655953] kasan_save_alloc_info+0x40/0x58\n[ 51.660294] __kasan_kmalloc+0xd4/0xd8\n[ 51.664102] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 51.668703] kasan_atomics+0xb8/0x2e8\n[ 51.672423] kunit_try_run_case+0x14c/0x3d0\n[ 51.676679] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.682246] kthread+0x24c/0x2d0\n[ 51.685535] ret_from_fork+0x10/0x20\n[ 51.689171] \n[ 51.690695] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 51.690695] which belongs to the cache kmalloc-64 of size 64\n[ 51.703173] The buggy address is located 0 bytes to the right of\n[ 51.703173] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 51.716176] \n[ 51.717699] The buggy address belongs to the physical page:\n[ 51.723346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 51.731442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 51.738049] page_type: f5(slab)\n[ 51.741248] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 51.749084] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 51.756916] page dumped because: kasan: bad access detected\n[ 51.762563] \n[ 51.764085] Memory state around the buggy address:\n[ 51.768940] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 51.776253] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 51.783564] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 51.790875] ^\n[ 51.795732] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.803045] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.810355] ==================================================================", "[ 52.888509] ==================================================================\n[ 52.895821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858\n[ 52.903223] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 52.910711] \n[ 52.912236] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 52.912258] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 52.912265] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 52.912276] Call trace:\n[ 52.912281] show_stack+0x20/0x38 (C)\n[ 52.912296] dump_stack_lvl+0x8c/0xd0\n[ 52.912310] print_report+0x118/0x5e0\n[ 52.912327] kasan_report+0xc8/0x118\n[ 52.912343] kasan_check_range+0x100/0x1a8\n[ 52.912362] __kasan_check_write+0x20/0x30\n[ 52.912379] kasan_atomics_helper+0x7cc/0x4858\n[ 52.912396] kasan_atomics+0x198/0x2e8\n[ 52.912410] kunit_try_run_case+0x14c/0x3d0\n[ 52.912428] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.912446] kthread+0x24c/0x2d0\n[ 52.912462] ret_from_fork+0x10/0x20\n[ 52.912477] \n[ 52.983181] Allocated by task 334:\n[ 52.986636] kasan_save_stack+0x3c/0x68\n[ 52.990534] kasan_save_track+0x20/0x40\n[ 52.994430] kasan_save_alloc_info+0x40/0x58\n[ 52.998772] __kasan_kmalloc+0xd4/0xd8\n[ 53.002580] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 53.007182] kasan_atomics+0xb8/0x2e8\n[ 53.010903] kunit_try_run_case+0x14c/0x3d0\n[ 53.015161] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.020727] kthread+0x24c/0x2d0\n[ 53.024018] ret_from_fork+0x10/0x20\n[ 53.027653] \n[ 53.029176] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 53.029176] which belongs to the cache kmalloc-64 of size 64\n[ 53.041656] The buggy address is located 0 bytes to the right of\n[ 53.041656] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 53.054659] \n[ 53.056182] The buggy address belongs to the physical page:\n[ 53.061830] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 53.069925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 53.076532] page_type: f5(slab)\n[ 53.079730] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 53.087565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 53.095398] page dumped because: kasan: bad access detected\n[ 53.101044] \n[ 53.102565] Memory state around the buggy address:\n[ 53.107422] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.114734] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.122047] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 53.129358] ^\n[ 53.134214] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.141530] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.148840] ==================================================================", "[ 58.483503] ==================================================================\n[ 58.490816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858\n[ 58.498221] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 58.505712] \n[ 58.507237] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 58.507259] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 58.507267] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 58.507276] Call trace:\n[ 58.507283] show_stack+0x20/0x38 (C)\n[ 58.507299] dump_stack_lvl+0x8c/0xd0\n[ 58.507313] print_report+0x118/0x5e0\n[ 58.507329] kasan_report+0xc8/0x118\n[ 58.507345] kasan_check_range+0x100/0x1a8\n[ 58.507361] __kasan_check_write+0x20/0x30\n[ 58.507379] kasan_atomics_helper+0xeb8/0x4858\n[ 58.507396] kasan_atomics+0x198/0x2e8\n[ 58.507410] kunit_try_run_case+0x14c/0x3d0\n[ 58.507428] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.507444] kthread+0x24c/0x2d0\n[ 58.507460] ret_from_fork+0x10/0x20\n[ 58.507475] \n[ 58.578178] Allocated by task 334:\n[ 58.581634] kasan_save_stack+0x3c/0x68\n[ 58.585530] kasan_save_track+0x20/0x40\n[ 58.589427] kasan_save_alloc_info+0x40/0x58\n[ 58.593770] __kasan_kmalloc+0xd4/0xd8\n[ 58.597579] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 58.602181] kasan_atomics+0xb8/0x2e8\n[ 58.605902] kunit_try_run_case+0x14c/0x3d0\n[ 58.610158] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.615714] kthread+0x24c/0x2d0\n[ 58.619004] ret_from_fork+0x10/0x20\n[ 58.622639] \n[ 58.624161] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 58.624161] which belongs to the cache kmalloc-64 of size 64\n[ 58.636642] The buggy address is located 0 bytes to the right of\n[ 58.636642] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 58.649644] \n[ 58.651167] The buggy address belongs to the physical page:\n[ 58.656813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 58.664909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 58.671516] page_type: f5(slab)\n[ 58.674715] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 58.682551] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 58.690384] page dumped because: kasan: bad access detected\n[ 58.696030] \n[ 58.697552] Memory state around the buggy address:\n[ 58.702408] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.709720] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.717033] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 58.724343] ^\n[ 58.729199] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 58.736511] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 58.743822] ==================================================================", "[ 50.746892] ==================================================================\n[ 50.754205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858\n[ 50.761608] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 50.769097] \n[ 50.770623] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 50.770646] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 50.770653] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 50.770663] Call trace:\n[ 50.770669] show_stack+0x20/0x38 (C)\n[ 50.770684] dump_stack_lvl+0x8c/0xd0\n[ 50.770699] print_report+0x118/0x5e0\n[ 50.770715] kasan_report+0xc8/0x118\n[ 50.770731] kasan_check_range+0x100/0x1a8\n[ 50.770748] __kasan_check_write+0x20/0x30\n[ 50.770766] kasan_atomics_helper+0x47c/0x4858\n[ 50.770783] kasan_atomics+0x198/0x2e8\n[ 50.770798] kunit_try_run_case+0x14c/0x3d0\n[ 50.770818] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.770836] kthread+0x24c/0x2d0\n[ 50.770851] ret_from_fork+0x10/0x20\n[ 50.770867] \n[ 50.841571] Allocated by task 334:\n[ 50.845027] kasan_save_stack+0x3c/0x68\n[ 50.848924] kasan_save_track+0x20/0x40\n[ 50.852820] kasan_save_alloc_info+0x40/0x58\n[ 50.857161] __kasan_kmalloc+0xd4/0xd8\n[ 50.860969] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 50.865570] kasan_atomics+0xb8/0x2e8\n[ 50.869290] kunit_try_run_case+0x14c/0x3d0\n[ 50.873546] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.879112] kthread+0x24c/0x2d0\n[ 50.882402] ret_from_fork+0x10/0x20\n[ 50.886038] \n[ 50.887560] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 50.887560] which belongs to the cache kmalloc-64 of size 64\n[ 50.900038] The buggy address is located 0 bytes to the right of\n[ 50.900038] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 50.913040] \n[ 50.914563] The buggy address belongs to the physical page:\n[ 50.920209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 50.928305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 50.934914] page_type: f5(slab)\n[ 50.938113] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 50.945949] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 50.953782] page dumped because: kasan: bad access detected\n[ 50.959428] \n[ 50.960952] Memory state around the buggy address:\n[ 50.965808] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.973120] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.980433] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 50.987743] ^\n[ 50.992599] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.999913] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.007224] ==================================================================", "[ 57.951277] ==================================================================\n[ 57.958588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858\n[ 57.965991] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 57.973480] \n[ 57.975006] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 57.975028] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 57.975035] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 57.975045] Call trace:\n[ 57.975053] show_stack+0x20/0x38 (C)\n[ 57.975069] dump_stack_lvl+0x8c/0xd0\n[ 57.975084] print_report+0x118/0x5e0\n[ 57.975100] kasan_report+0xc8/0x118\n[ 57.975117] kasan_check_range+0x100/0x1a8\n[ 57.975135] __kasan_check_write+0x20/0x30\n[ 57.975153] kasan_atomics_helper+0xe44/0x4858\n[ 57.975169] kasan_atomics+0x198/0x2e8\n[ 57.975185] kunit_try_run_case+0x14c/0x3d0\n[ 57.975204] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.975222] kthread+0x24c/0x2d0\n[ 57.975238] ret_from_fork+0x10/0x20\n[ 57.975253] \n[ 58.045954] Allocated by task 334:\n[ 58.049409] kasan_save_stack+0x3c/0x68\n[ 58.053307] kasan_save_track+0x20/0x40\n[ 58.057205] kasan_save_alloc_info+0x40/0x58\n[ 58.061548] __kasan_kmalloc+0xd4/0xd8\n[ 58.065358] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 58.069959] kasan_atomics+0xb8/0x2e8\n[ 58.073679] kunit_try_run_case+0x14c/0x3d0\n[ 58.077936] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.083503] kthread+0x24c/0x2d0\n[ 58.086793] ret_from_fork+0x10/0x20\n[ 58.090428] \n[ 58.091949] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 58.091949] which belongs to the cache kmalloc-64 of size 64\n[ 58.104430] The buggy address is located 0 bytes to the right of\n[ 58.104430] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 58.117433] \n[ 58.118957] The buggy address belongs to the physical page:\n[ 58.124604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 58.132700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 58.139307] page_type: f5(slab)\n[ 58.142505] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 58.150342] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 58.158175] page dumped because: kasan: bad access detected\n[ 58.163821] \n[ 58.165343] Memory state around the buggy address:\n[ 58.170199] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.177511] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.184823] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 58.192133] ^\n[ 58.196990] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 58.204303] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 58.211613] ==================================================================", "[ 55.823300] ==================================================================\n[ 55.830611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858\n[ 55.838014] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 55.845502] \n[ 55.847026] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 55.847049] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 55.847057] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 55.847066] Call trace:\n[ 55.847073] show_stack+0x20/0x38 (C)\n[ 55.847089] dump_stack_lvl+0x8c/0xd0\n[ 55.847103] print_report+0x118/0x5e0\n[ 55.847120] kasan_report+0xc8/0x118\n[ 55.847138] kasan_check_range+0x100/0x1a8\n[ 55.847155] __kasan_check_write+0x20/0x30\n[ 55.847176] kasan_atomics_helper+0xc08/0x4858\n[ 55.847193] kasan_atomics+0x198/0x2e8\n[ 55.847207] kunit_try_run_case+0x14c/0x3d0\n[ 55.847226] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.847244] kthread+0x24c/0x2d0\n[ 55.847260] ret_from_fork+0x10/0x20\n[ 55.847276] \n[ 55.917980] Allocated by task 334:\n[ 55.921436] kasan_save_stack+0x3c/0x68\n[ 55.925333] kasan_save_track+0x20/0x40\n[ 55.929230] kasan_save_alloc_info+0x40/0x58\n[ 55.933572] __kasan_kmalloc+0xd4/0xd8\n[ 55.937381] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 55.941982] kasan_atomics+0xb8/0x2e8\n[ 55.945703] kunit_try_run_case+0x14c/0x3d0\n[ 55.949959] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.955525] kthread+0x24c/0x2d0\n[ 55.958815] ret_from_fork+0x10/0x20\n[ 55.962450] \n[ 55.963972] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 55.963972] which belongs to the cache kmalloc-64 of size 64\n[ 55.976451] The buggy address is located 0 bytes to the right of\n[ 55.976451] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 55.989453] \n[ 55.990977] The buggy address belongs to the physical page:\n[ 55.996623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 56.004718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 56.011325] page_type: f5(slab)\n[ 56.014523] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 56.022360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 56.030192] page dumped because: kasan: bad access detected\n[ 56.035839] \n[ 56.037361] Memory state around the buggy address:\n[ 56.042217] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.049530] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.056842] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 56.064152] ^\n[ 56.069008] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.076320] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.083629] ==================================================================", "[ 60.358031] ==================================================================\n[ 60.365345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858\n[ 60.372836] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 60.380325] \n[ 60.381850] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 60.381874] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 60.381881] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 60.381890] Call trace:\n[ 60.381895] show_stack+0x20/0x38 (C)\n[ 60.381912] dump_stack_lvl+0x8c/0xd0\n[ 60.381926] print_report+0x118/0x5e0\n[ 60.381943] kasan_report+0xc8/0x118\n[ 60.381960] kasan_check_range+0x100/0x1a8\n[ 60.381979] __kasan_check_write+0x20/0x30\n[ 60.381997] kasan_atomics_helper+0x1190/0x4858\n[ 60.382013] kasan_atomics+0x198/0x2e8\n[ 60.382027] kunit_try_run_case+0x14c/0x3d0\n[ 60.382046] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.382062] kthread+0x24c/0x2d0\n[ 60.382078] ret_from_fork+0x10/0x20\n[ 60.382094] \n[ 60.452885] Allocated by task 334:\n[ 60.456340] kasan_save_stack+0x3c/0x68\n[ 60.460236] kasan_save_track+0x20/0x40\n[ 60.464132] kasan_save_alloc_info+0x40/0x58\n[ 60.468476] __kasan_kmalloc+0xd4/0xd8\n[ 60.472284] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 60.476885] kasan_atomics+0xb8/0x2e8\n[ 60.480605] kunit_try_run_case+0x14c/0x3d0\n[ 60.484861] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.490417] kthread+0x24c/0x2d0\n[ 60.493707] ret_from_fork+0x10/0x20\n[ 60.497341] \n[ 60.498863] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 60.498863] which belongs to the cache kmalloc-64 of size 64\n[ 60.511343] The buggy address is located 0 bytes to the right of\n[ 60.511343] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 60.524345] \n[ 60.525870] The buggy address belongs to the physical page:\n[ 60.531516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 60.539613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 60.546220] page_type: f5(slab)\n[ 60.549418] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 60.557254] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 60.565087] page dumped because: kasan: bad access detected\n[ 60.570733] \n[ 60.572254] Memory state around the buggy address:\n[ 60.577109] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.584421] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.591735] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 60.599046] ^\n[ 60.603902] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.611214] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.618524] ==================================================================", "[ 53.956055] ==================================================================\n[ 53.963370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858\n[ 53.970775] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 53.978265] \n[ 53.979791] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 53.979815] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 53.979823] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 53.979832] Call trace:\n[ 53.979838] show_stack+0x20/0x38 (C)\n[ 53.979854] dump_stack_lvl+0x8c/0xd0\n[ 53.979868] print_report+0x118/0x5e0\n[ 53.979884] kasan_report+0xc8/0x118\n[ 53.979900] kasan_check_range+0x100/0x1a8\n[ 53.979918] __kasan_check_write+0x20/0x30\n[ 53.979937] kasan_atomics_helper+0x99c/0x4858\n[ 53.979953] kasan_atomics+0x198/0x2e8\n[ 53.979969] kunit_try_run_case+0x14c/0x3d0\n[ 53.979988] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.980004] kthread+0x24c/0x2d0\n[ 53.980019] ret_from_fork+0x10/0x20\n[ 53.980035] \n[ 54.050740] Allocated by task 334:\n[ 54.054197] kasan_save_stack+0x3c/0x68\n[ 54.058096] kasan_save_track+0x20/0x40\n[ 54.061992] kasan_save_alloc_info+0x40/0x58\n[ 54.066334] __kasan_kmalloc+0xd4/0xd8\n[ 54.070142] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 54.074743] kasan_atomics+0xb8/0x2e8\n[ 54.078464] kunit_try_run_case+0x14c/0x3d0\n[ 54.082720] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.088287] kthread+0x24c/0x2d0\n[ 54.091576] ret_from_fork+0x10/0x20\n[ 54.095213] \n[ 54.096735] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 54.096735] which belongs to the cache kmalloc-64 of size 64\n[ 54.109215] The buggy address is located 0 bytes to the right of\n[ 54.109215] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 54.122218] \n[ 54.123741] The buggy address belongs to the physical page:\n[ 54.129387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 54.137483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 54.144091] page_type: f5(slab)\n[ 54.147290] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 54.155126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 54.162959] page dumped because: kasan: bad access detected\n[ 54.168607] \n[ 54.170129] Memory state around the buggy address:\n[ 54.174984] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.182297] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.189609] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 54.196921] ^\n[ 54.201778] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 54.209091] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 54.216401] ==================================================================", "[ 50.479192] ==================================================================\n[ 50.486507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858\n[ 50.493912] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 50.501403] \n[ 50.502928] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 50.502952] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 50.502961] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 50.502971] Call trace:\n[ 50.502976] show_stack+0x20/0x38 (C)\n[ 50.502993] dump_stack_lvl+0x8c/0xd0\n[ 50.503007] print_report+0x118/0x5e0\n[ 50.503023] kasan_report+0xc8/0x118\n[ 50.503039] kasan_check_range+0x100/0x1a8\n[ 50.503057] __kasan_check_write+0x20/0x30\n[ 50.503076] kasan_atomics_helper+0x414/0x4858\n[ 50.503093] kasan_atomics+0x198/0x2e8\n[ 50.503108] kunit_try_run_case+0x14c/0x3d0\n[ 50.503127] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.503145] kthread+0x24c/0x2d0\n[ 50.503160] ret_from_fork+0x10/0x20\n[ 50.503175] \n[ 50.573879] Allocated by task 334:\n[ 50.577335] kasan_save_stack+0x3c/0x68\n[ 50.581232] kasan_save_track+0x20/0x40\n[ 50.585128] kasan_save_alloc_info+0x40/0x58\n[ 50.589470] __kasan_kmalloc+0xd4/0xd8\n[ 50.593277] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 50.597878] kasan_atomics+0xb8/0x2e8\n[ 50.601599] kunit_try_run_case+0x14c/0x3d0\n[ 50.605854] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.611420] kthread+0x24c/0x2d0\n[ 50.614708] ret_from_fork+0x10/0x20\n[ 50.618343] \n[ 50.619866] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 50.619866] which belongs to the cache kmalloc-64 of size 64\n[ 50.632340] The buggy address is located 0 bytes to the right of\n[ 50.632340] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 50.645344] \n[ 50.646867] The buggy address belongs to the physical page:\n[ 50.652513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 50.660610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 50.667217] page_type: f5(slab)\n[ 50.670416] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 50.678253] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 50.686084] page dumped because: kasan: bad access detected\n[ 50.691729] \n[ 50.693251] Memory state around the buggy address:\n[ 50.698107] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.705418] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.712731] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 50.720041] ^\n[ 50.724899] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.732210] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.739520] ==================================================================", "[ 52.353116] ==================================================================\n[ 52.360429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858\n[ 52.367833] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 52.375323] \n[ 52.376847] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 52.376872] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 52.376880] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 52.376890] Call trace:\n[ 52.376896] show_stack+0x20/0x38 (C)\n[ 52.376911] dump_stack_lvl+0x8c/0xd0\n[ 52.376925] print_report+0x118/0x5e0\n[ 52.376941] kasan_report+0xc8/0x118\n[ 52.376956] kasan_check_range+0x100/0x1a8\n[ 52.376975] __kasan_check_write+0x20/0x30\n[ 52.376994] kasan_atomics_helper+0x6ec/0x4858\n[ 52.377010] kasan_atomics+0x198/0x2e8\n[ 52.377025] kunit_try_run_case+0x14c/0x3d0\n[ 52.377044] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.377062] kthread+0x24c/0x2d0\n[ 52.377077] ret_from_fork+0x10/0x20\n[ 52.377093] \n[ 52.447797] Allocated by task 334:\n[ 52.451252] kasan_save_stack+0x3c/0x68\n[ 52.455149] kasan_save_track+0x20/0x40\n[ 52.459045] kasan_save_alloc_info+0x40/0x58\n[ 52.463388] __kasan_kmalloc+0xd4/0xd8\n[ 52.467195] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 52.471796] kasan_atomics+0xb8/0x2e8\n[ 52.475517] kunit_try_run_case+0x14c/0x3d0\n[ 52.479773] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.485339] kthread+0x24c/0x2d0\n[ 52.488628] ret_from_fork+0x10/0x20\n[ 52.492263] \n[ 52.493785] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 52.493785] which belongs to the cache kmalloc-64 of size 64\n[ 52.506266] The buggy address is located 0 bytes to the right of\n[ 52.506266] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 52.519269] \n[ 52.520793] The buggy address belongs to the physical page:\n[ 52.526439] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 52.534535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 52.541142] page_type: f5(slab)\n[ 52.544340] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 52.552176] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 52.560009] page dumped because: kasan: bad access detected\n[ 52.565655] \n[ 52.567176] Memory state around the buggy address:\n[ 52.572032] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.579343] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.586655] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 52.593965] ^\n[ 52.598820] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.606133] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.613443] ==================================================================", "[ 62.229552] ==================================================================\n[ 62.236864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858\n[ 62.244355] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 62.251843] \n[ 62.253368] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 62.253392] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 62.253399] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 62.253409] Call trace:\n[ 62.253415] show_stack+0x20/0x38 (C)\n[ 62.253431] dump_stack_lvl+0x8c/0xd0\n[ 62.253444] print_report+0x118/0x5e0\n[ 62.253461] kasan_report+0xc8/0x118\n[ 62.253477] kasan_check_range+0x100/0x1a8\n[ 62.253495] __kasan_check_write+0x20/0x30\n[ 62.253512] kasan_atomics_helper+0x147c/0x4858\n[ 62.253528] kasan_atomics+0x198/0x2e8\n[ 62.253542] kunit_try_run_case+0x14c/0x3d0\n[ 62.253560] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.253577] kthread+0x24c/0x2d0\n[ 62.253592] ret_from_fork+0x10/0x20\n[ 62.253607] \n[ 62.324400] Allocated by task 334:\n[ 62.327855] kasan_save_stack+0x3c/0x68\n[ 62.331751] kasan_save_track+0x20/0x40\n[ 62.335647] kasan_save_alloc_info+0x40/0x58\n[ 62.339989] __kasan_kmalloc+0xd4/0xd8\n[ 62.343796] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 62.348396] kasan_atomics+0xb8/0x2e8\n[ 62.352116] kunit_try_run_case+0x14c/0x3d0\n[ 62.356373] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.361939] kthread+0x24c/0x2d0\n[ 62.365228] ret_from_fork+0x10/0x20\n[ 62.368862] \n[ 62.370384] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 62.370384] which belongs to the cache kmalloc-64 of size 64\n[ 62.382862] The buggy address is located 0 bytes to the right of\n[ 62.382862] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 62.395864] \n[ 62.397388] The buggy address belongs to the physical page:\n[ 62.403033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 62.411129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 62.417737] page_type: f5(slab)\n[ 62.420936] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 62.428773] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 62.436605] page dumped because: kasan: bad access detected\n[ 62.442252] \n[ 62.443774] Memory state around the buggy address:\n[ 62.448629] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.455943] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.463254] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 62.470565] ^\n[ 62.475421] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 62.482732] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 62.490042] ==================================================================", "[ 53.156221] ==================================================================\n[ 53.163532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858\n[ 53.170935] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 53.178423] \n[ 53.179948] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 53.179972] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 53.179980] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 53.179990] Call trace:\n[ 53.179995] show_stack+0x20/0x38 (C)\n[ 53.180012] dump_stack_lvl+0x8c/0xd0\n[ 53.180025] print_report+0x118/0x5e0\n[ 53.180041] kasan_report+0xc8/0x118\n[ 53.180056] kasan_check_range+0x100/0x1a8\n[ 53.180074] __kasan_check_write+0x20/0x30\n[ 53.180092] kasan_atomics_helper+0x894/0x4858\n[ 53.180108] kasan_atomics+0x198/0x2e8\n[ 53.180123] kunit_try_run_case+0x14c/0x3d0\n[ 53.180141] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.180158] kthread+0x24c/0x2d0\n[ 53.180175] ret_from_fork+0x10/0x20\n[ 53.180190] \n[ 53.250894] Allocated by task 334:\n[ 53.254351] kasan_save_stack+0x3c/0x68\n[ 53.258247] kasan_save_track+0x20/0x40\n[ 53.262145] kasan_save_alloc_info+0x40/0x58\n[ 53.266487] __kasan_kmalloc+0xd4/0xd8\n[ 53.270294] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 53.274895] kasan_atomics+0xb8/0x2e8\n[ 53.278617] kunit_try_run_case+0x14c/0x3d0\n[ 53.282873] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.288442] kthread+0x24c/0x2d0\n[ 53.291731] ret_from_fork+0x10/0x20\n[ 53.295366] \n[ 53.296890] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 53.296890] which belongs to the cache kmalloc-64 of size 64\n[ 53.309370] The buggy address is located 0 bytes to the right of\n[ 53.309370] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 53.322372] \n[ 53.323896] The buggy address belongs to the physical page:\n[ 53.329542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 53.337639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 53.344247] page_type: f5(slab)\n[ 53.347446] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 53.355283] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 53.363116] page dumped because: kasan: bad access detected\n[ 53.368763] \n[ 53.370285] Memory state around the buggy address:\n[ 53.375142] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.382454] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.389766] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 53.397077] ^\n[ 53.401934] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.409246] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.416556] ==================================================================", "[ 53.688304] ==================================================================\n[ 53.695616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858\n[ 53.703020] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 53.710510] \n[ 53.712035] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 53.712057] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 53.712065] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 53.712075] Call trace:\n[ 53.712081] show_stack+0x20/0x38 (C)\n[ 53.712098] dump_stack_lvl+0x8c/0xd0\n[ 53.712112] print_report+0x118/0x5e0\n[ 53.712128] kasan_report+0xc8/0x118\n[ 53.712144] kasan_check_range+0x100/0x1a8\n[ 53.712162] __kasan_check_write+0x20/0x30\n[ 53.712181] kasan_atomics_helper+0x934/0x4858\n[ 53.712197] kasan_atomics+0x198/0x2e8\n[ 53.712211] kunit_try_run_case+0x14c/0x3d0\n[ 53.712230] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.712246] kthread+0x24c/0x2d0\n[ 53.712262] ret_from_fork+0x10/0x20\n[ 53.712279] \n[ 53.782998] Allocated by task 334:\n[ 53.786459] kasan_save_stack+0x3c/0x68\n[ 53.790360] kasan_save_track+0x20/0x40\n[ 53.794257] kasan_save_alloc_info+0x40/0x58\n[ 53.798601] __kasan_kmalloc+0xd4/0xd8\n[ 53.802410] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 53.807012] kasan_atomics+0xb8/0x2e8\n[ 53.810732] kunit_try_run_case+0x14c/0x3d0\n[ 53.814988] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.820555] kthread+0x24c/0x2d0\n[ 53.823844] ret_from_fork+0x10/0x20\n[ 53.827479] \n[ 53.829003] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 53.829003] which belongs to the cache kmalloc-64 of size 64\n[ 53.841484] The buggy address is located 0 bytes to the right of\n[ 53.841484] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 53.854488] \n[ 53.856011] The buggy address belongs to the physical page:\n[ 53.861658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 53.869755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 53.876362] page_type: f5(slab)\n[ 53.879562] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 53.887400] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 53.895233] page dumped because: kasan: bad access detected\n[ 53.900880] \n[ 53.902402] Memory state around the buggy address:\n[ 53.907257] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.914570] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.921882] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 53.929192] ^\n[ 53.934050] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.941363] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.948673] ==================================================================", "[ 48.878019] ==================================================================\n[ 48.885336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858\n[ 48.892743] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 48.900232] \n[ 48.901759] CPU: 4 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 48.901785] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 48.901792] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 48.901803] Call trace:\n[ 48.901809] show_stack+0x20/0x38 (C)\n[ 48.901825] dump_stack_lvl+0x8c/0xd0\n[ 48.901839] print_report+0x118/0x5e0\n[ 48.901856] kasan_report+0xc8/0x118\n[ 48.901873] kasan_check_range+0x100/0x1a8\n[ 48.901890] __kasan_check_write+0x20/0x30\n[ 48.901908] kasan_atomics_helper+0x24c/0x4858\n[ 48.901924] kasan_atomics+0x198/0x2e8\n[ 48.901940] kunit_try_run_case+0x14c/0x3d0\n[ 48.901960] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.901978] kthread+0x24c/0x2d0\n[ 48.901994] ret_from_fork+0x10/0x20\n[ 48.902011] \n[ 48.972712] Allocated by task 334:\n[ 48.976163] kasan_save_stack+0x3c/0x68\n[ 48.980065] kasan_save_track+0x20/0x40\n[ 48.983969] kasan_save_alloc_info+0x40/0x58\n[ 48.988306] __kasan_kmalloc+0xd4/0xd8\n[ 48.992121] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 48.996716] kasan_atomics+0xb8/0x2e8\n[ 49.000443] kunit_try_run_case+0x14c/0x3d0\n[ 49.004694] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.010258] kthread+0x24c/0x2d0\n[ 49.013541] ret_from_fork+0x10/0x20\n[ 49.017172] \n[ 49.018694] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 49.018694] which belongs to the cache kmalloc-64 of size 64\n[ 49.031169] The buggy address is located 0 bytes to the right of\n[ 49.031169] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 49.044174] \n[ 49.045697] The buggy address belongs to the physical page:\n[ 49.051339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 49.059435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 49.066046] page_type: f5(slab)\n[ 49.069240] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 49.077078] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 49.084910] page dumped because: kasan: bad access detected\n[ 49.090553] \n[ 49.092079] Memory state around the buggy address:\n[ 49.096930] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.104244] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.111558] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 49.118863] ^\n[ 49.123721] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.131027] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.138340] ==================================================================", "[ 59.286580] ==================================================================\n[ 59.293893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858\n[ 59.301296] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 59.308784] \n[ 59.310308] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 59.310332] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 59.310341] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 59.310351] Call trace:\n[ 59.310357] show_stack+0x20/0x38 (C)\n[ 59.310372] dump_stack_lvl+0x8c/0xd0\n[ 59.310385] print_report+0x118/0x5e0\n[ 59.310401] kasan_report+0xc8/0x118\n[ 59.310417] kasan_check_range+0x100/0x1a8\n[ 59.310435] __kasan_check_write+0x20/0x30\n[ 59.310453] kasan_atomics_helper+0xff0/0x4858\n[ 59.310468] kasan_atomics+0x198/0x2e8\n[ 59.310483] kunit_try_run_case+0x14c/0x3d0\n[ 59.310502] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.310519] kthread+0x24c/0x2d0\n[ 59.310535] ret_from_fork+0x10/0x20\n[ 59.310550] \n[ 59.381244] Allocated by task 334:\n[ 59.384700] kasan_save_stack+0x3c/0x68\n[ 59.388598] kasan_save_track+0x20/0x40\n[ 59.392494] kasan_save_alloc_info+0x40/0x58\n[ 59.396836] __kasan_kmalloc+0xd4/0xd8\n[ 59.400643] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 59.405245] kasan_atomics+0xb8/0x2e8\n[ 59.408965] kunit_try_run_case+0x14c/0x3d0\n[ 59.413222] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.418788] kthread+0x24c/0x2d0\n[ 59.422077] ret_from_fork+0x10/0x20\n[ 59.425712] \n[ 59.427234] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 59.427234] which belongs to the cache kmalloc-64 of size 64\n[ 59.439714] The buggy address is located 0 bytes to the right of\n[ 59.439714] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 59.452717] \n[ 59.454241] The buggy address belongs to the physical page:\n[ 59.459886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 59.467984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 59.474591] page_type: f5(slab)\n[ 59.477789] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 59.485624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 59.493458] page dumped because: kasan: bad access detected\n[ 59.499106] \n[ 59.500628] Memory state around the buggy address:\n[ 59.505484] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 59.512797] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 59.520108] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 59.527418] ^\n[ 59.532274] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.539587] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.546897] ==================================================================", "[ 61.429499] ==================================================================\n[ 61.436811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858\n[ 61.444303] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 61.451792] \n[ 61.453317] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 61.453340] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 61.453348] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 61.453358] Call trace:\n[ 61.453363] show_stack+0x20/0x38 (C)\n[ 61.453379] dump_stack_lvl+0x8c/0xd0\n[ 61.453392] print_report+0x118/0x5e0\n[ 61.453408] kasan_report+0xc8/0x118\n[ 61.453424] kasan_check_range+0x100/0x1a8\n[ 61.453441] __kasan_check_write+0x20/0x30\n[ 61.453459] kasan_atomics_helper+0x1384/0x4858\n[ 61.453476] kasan_atomics+0x198/0x2e8\n[ 61.453490] kunit_try_run_case+0x14c/0x3d0\n[ 61.453509] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.453526] kthread+0x24c/0x2d0\n[ 61.453543] ret_from_fork+0x10/0x20\n[ 61.453558] \n[ 61.524351] Allocated by task 334:\n[ 61.527807] kasan_save_stack+0x3c/0x68\n[ 61.531704] kasan_save_track+0x20/0x40\n[ 61.535601] kasan_save_alloc_info+0x40/0x58\n[ 61.539943] __kasan_kmalloc+0xd4/0xd8\n[ 61.543752] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 61.548352] kasan_atomics+0xb8/0x2e8\n[ 61.552073] kunit_try_run_case+0x14c/0x3d0\n[ 61.556330] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.561897] kthread+0x24c/0x2d0\n[ 61.565187] ret_from_fork+0x10/0x20\n[ 61.568822] \n[ 61.570345] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 61.570345] which belongs to the cache kmalloc-64 of size 64\n[ 61.582826] The buggy address is located 0 bytes to the right of\n[ 61.582826] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 61.595828] \n[ 61.597351] The buggy address belongs to the physical page:\n[ 61.602997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 61.611093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 61.617700] page_type: f5(slab)\n[ 61.620899] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 61.628736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 61.636567] page dumped because: kasan: bad access detected\n[ 61.642213] \n[ 61.643736] Memory state around the buggy address:\n[ 61.648590] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.655903] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.663215] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 61.670525] ^\n[ 61.675382] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.682692] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.690003] ==================================================================", "[ 60.090132] ==================================================================\n[ 60.097444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858\n[ 60.104935] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 60.112424] \n[ 60.113948] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 60.113972] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 60.113981] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 60.113992] Call trace:\n[ 60.113998] show_stack+0x20/0x38 (C)\n[ 60.114014] dump_stack_lvl+0x8c/0xd0\n[ 60.114027] print_report+0x118/0x5e0\n[ 60.114045] kasan_report+0xc8/0x118\n[ 60.114060] kasan_check_range+0x100/0x1a8\n[ 60.114079] __kasan_check_write+0x20/0x30\n[ 60.114097] kasan_atomics_helper+0x1128/0x4858\n[ 60.114112] kasan_atomics+0x198/0x2e8\n[ 60.114127] kunit_try_run_case+0x14c/0x3d0\n[ 60.114145] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.114161] kthread+0x24c/0x2d0\n[ 60.114177] ret_from_fork+0x10/0x20\n[ 60.114192] \n[ 60.184992] Allocated by task 334:\n[ 60.188447] kasan_save_stack+0x3c/0x68\n[ 60.192344] kasan_save_track+0x20/0x40\n[ 60.196242] kasan_save_alloc_info+0x40/0x58\n[ 60.200585] __kasan_kmalloc+0xd4/0xd8\n[ 60.204393] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 60.208994] kasan_atomics+0xb8/0x2e8\n[ 60.212716] kunit_try_run_case+0x14c/0x3d0\n[ 60.216974] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.222542] kthread+0x24c/0x2d0\n[ 60.225831] ret_from_fork+0x10/0x20\n[ 60.229466] \n[ 60.230988] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 60.230988] which belongs to the cache kmalloc-64 of size 64\n[ 60.243468] The buggy address is located 0 bytes to the right of\n[ 60.243468] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 60.256471] \n[ 60.257995] The buggy address belongs to the physical page:\n[ 60.263641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 60.271737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 60.278346] page_type: f5(slab)\n[ 60.281544] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 60.289383] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 60.297218] page dumped because: kasan: bad access detected\n[ 60.302866] \n[ 60.304388] Memory state around the buggy address:\n[ 60.309244] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.316556] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.323869] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 60.331180] ^\n[ 60.336037] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.343350] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.350660] ==================================================================", "[ 63.033150] ==================================================================\n[ 63.040462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858\n[ 63.047952] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 63.055441] \n[ 63.056966] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 63.056989] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 63.056996] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 63.057005] Call trace:\n[ 63.057011] show_stack+0x20/0x38 (C)\n[ 63.057026] dump_stack_lvl+0x8c/0xd0\n[ 63.057040] print_report+0x118/0x5e0\n[ 63.057056] kasan_report+0xc8/0x118\n[ 63.057072] kasan_check_range+0x100/0x1a8\n[ 63.057089] __kasan_check_write+0x20/0x30\n[ 63.057107] kasan_atomics_helper+0x15b4/0x4858\n[ 63.057124] kasan_atomics+0x198/0x2e8\n[ 63.057138] kunit_try_run_case+0x14c/0x3d0\n[ 63.057156] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.057173] kthread+0x24c/0x2d0\n[ 63.057188] ret_from_fork+0x10/0x20\n[ 63.057203] \n[ 63.127993] Allocated by task 334:\n[ 63.131448] kasan_save_stack+0x3c/0x68\n[ 63.135344] kasan_save_track+0x20/0x40\n[ 63.139239] kasan_save_alloc_info+0x40/0x58\n[ 63.143583] __kasan_kmalloc+0xd4/0xd8\n[ 63.147390] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 63.151991] kasan_atomics+0xb8/0x2e8\n[ 63.155710] kunit_try_run_case+0x14c/0x3d0\n[ 63.159967] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.165533] kthread+0x24c/0x2d0\n[ 63.168821] ret_from_fork+0x10/0x20\n[ 63.172457] \n[ 63.173979] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 63.173979] which belongs to the cache kmalloc-64 of size 64\n[ 63.186460] The buggy address is located 0 bytes to the right of\n[ 63.186460] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 63.199463] \n[ 63.200986] The buggy address belongs to the physical page:\n[ 63.206632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 63.214729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 63.221335] page_type: f5(slab)\n[ 63.224534] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 63.232371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 63.240204] page dumped because: kasan: bad access detected\n[ 63.245851] \n[ 63.247372] Memory state around the buggy address:\n[ 63.252228] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 63.259541] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 63.266853] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 63.274164] ^\n[ 63.279019] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.286330] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.293640] ==================================================================", "[ 60.625905] ==================================================================\n[ 60.633216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858\n[ 60.640708] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 60.648196] \n[ 60.649721] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 60.649744] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 60.649753] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 60.649763] Call trace:\n[ 60.649769] show_stack+0x20/0x38 (C)\n[ 60.649784] dump_stack_lvl+0x8c/0xd0\n[ 60.649797] print_report+0x118/0x5e0\n[ 60.649814] kasan_report+0xc8/0x118\n[ 60.649829] kasan_check_range+0x100/0x1a8\n[ 60.649846] __kasan_check_write+0x20/0x30\n[ 60.649864] kasan_atomics_helper+0x11f8/0x4858\n[ 60.649879] kasan_atomics+0x198/0x2e8\n[ 60.649893] kunit_try_run_case+0x14c/0x3d0\n[ 60.649911] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.649928] kthread+0x24c/0x2d0\n[ 60.649943] ret_from_fork+0x10/0x20\n[ 60.649958] \n[ 60.720748] Allocated by task 334:\n[ 60.724204] kasan_save_stack+0x3c/0x68\n[ 60.728102] kasan_save_track+0x20/0x40\n[ 60.731997] kasan_save_alloc_info+0x40/0x58\n[ 60.736339] __kasan_kmalloc+0xd4/0xd8\n[ 60.740147] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 60.744748] kasan_atomics+0xb8/0x2e8\n[ 60.748468] kunit_try_run_case+0x14c/0x3d0\n[ 60.752723] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.758290] kthread+0x24c/0x2d0\n[ 60.761579] ret_from_fork+0x10/0x20\n[ 60.765214] \n[ 60.766736] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 60.766736] which belongs to the cache kmalloc-64 of size 64\n[ 60.779216] The buggy address is located 0 bytes to the right of\n[ 60.779216] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 60.792218] \n[ 60.793742] The buggy address belongs to the physical page:\n[ 60.799389] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 60.807486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 60.814094] page_type: f5(slab)\n[ 60.817293] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 60.825129] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 60.832961] page dumped because: kasan: bad access detected\n[ 60.838608] \n[ 60.840129] Memory state around the buggy address:\n[ 60.844984] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.852296] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.859609] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 60.866920] ^\n[ 60.871777] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.879088] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.886398] ==================================================================", "[ 52.620822] ==================================================================\n[ 52.628133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858\n[ 52.635536] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 52.643024] \n[ 52.644549] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 52.644572] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 52.644579] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 52.644588] Call trace:\n[ 52.644595] show_stack+0x20/0x38 (C)\n[ 52.644609] dump_stack_lvl+0x8c/0xd0\n[ 52.644623] print_report+0x118/0x5e0\n[ 52.644640] kasan_report+0xc8/0x118\n[ 52.644656] kasan_check_range+0x100/0x1a8\n[ 52.644673] __kasan_check_write+0x20/0x30\n[ 52.644693] kasan_atomics_helper+0x760/0x4858\n[ 52.644709] kasan_atomics+0x198/0x2e8\n[ 52.644724] kunit_try_run_case+0x14c/0x3d0\n[ 52.644743] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.644760] kthread+0x24c/0x2d0\n[ 52.644778] ret_from_fork+0x10/0x20\n[ 52.644793] \n[ 52.715495] Allocated by task 334:\n[ 52.718951] kasan_save_stack+0x3c/0x68\n[ 52.722848] kasan_save_track+0x20/0x40\n[ 52.726744] kasan_save_alloc_info+0x40/0x58\n[ 52.731087] __kasan_kmalloc+0xd4/0xd8\n[ 52.734895] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 52.739496] kasan_atomics+0xb8/0x2e8\n[ 52.743217] kunit_try_run_case+0x14c/0x3d0\n[ 52.747472] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.753039] kthread+0x24c/0x2d0\n[ 52.756327] ret_from_fork+0x10/0x20\n[ 52.759962] \n[ 52.761484] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 52.761484] which belongs to the cache kmalloc-64 of size 64\n[ 52.773963] The buggy address is located 0 bytes to the right of\n[ 52.773963] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 52.786967] \n[ 52.788490] The buggy address belongs to the physical page:\n[ 52.794136] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 52.802233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 52.808840] page_type: f5(slab)\n[ 52.812038] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 52.819873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 52.827705] page dumped because: kasan: bad access detected\n[ 52.833351] \n[ 52.834873] Memory state around the buggy address:\n[ 52.839729] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.847043] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.854354] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 52.861665] ^\n[ 52.866521] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.873832] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.881142] ==================================================================", "[ 51.282326] ==================================================================\n[ 51.289639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858\n[ 51.297043] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 51.304531] \n[ 51.306057] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 51.306080] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 51.306088] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 51.306097] Call trace:\n[ 51.306102] show_stack+0x20/0x38 (C)\n[ 51.306119] dump_stack_lvl+0x8c/0xd0\n[ 51.306134] print_report+0x118/0x5e0\n[ 51.306150] kasan_report+0xc8/0x118\n[ 51.306166] kasan_check_range+0x100/0x1a8\n[ 51.306184] __kasan_check_write+0x20/0x30\n[ 51.306203] kasan_atomics_helper+0x54c/0x4858\n[ 51.306219] kasan_atomics+0x198/0x2e8\n[ 51.306235] kunit_try_run_case+0x14c/0x3d0\n[ 51.306254] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.306270] kthread+0x24c/0x2d0\n[ 51.306285] ret_from_fork+0x10/0x20\n[ 51.306302] \n[ 51.376998] Allocated by task 334:\n[ 51.380454] kasan_save_stack+0x3c/0x68\n[ 51.384351] kasan_save_track+0x20/0x40\n[ 51.388248] kasan_save_alloc_info+0x40/0x58\n[ 51.392590] __kasan_kmalloc+0xd4/0xd8\n[ 51.396397] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 51.400998] kasan_atomics+0xb8/0x2e8\n[ 51.404719] kunit_try_run_case+0x14c/0x3d0\n[ 51.408975] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.414541] kthread+0x24c/0x2d0\n[ 51.417830] ret_from_fork+0x10/0x20\n[ 51.421465] \n[ 51.422988] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 51.422988] which belongs to the cache kmalloc-64 of size 64\n[ 51.435465] The buggy address is located 0 bytes to the right of\n[ 51.435465] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 51.448467] \n[ 51.449991] The buggy address belongs to the physical page:\n[ 51.455636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 51.463731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 51.470339] page_type: f5(slab)\n[ 51.473537] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 51.481372] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 51.489205] page dumped because: kasan: bad access detected\n[ 51.494851] \n[ 51.496374] Memory state around the buggy address:\n[ 51.501229] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 51.508542] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 51.515853] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 51.523163] ^\n[ 51.528020] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.535332] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.542643] ==================================================================", "[ 56.887394] ==================================================================\n[ 56.894706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858\n[ 56.902110] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 56.909601] \n[ 56.911126] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 56.911148] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 56.911157] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 56.911166] Call trace:\n[ 56.911172] show_stack+0x20/0x38 (C)\n[ 56.911187] dump_stack_lvl+0x8c/0xd0\n[ 56.911202] print_report+0x118/0x5e0\n[ 56.911221] kasan_report+0xc8/0x118\n[ 56.911237] kasan_check_range+0x100/0x1a8\n[ 56.911254] __kasan_check_write+0x20/0x30\n[ 56.911274] kasan_atomics_helper+0xd3c/0x4858\n[ 56.911289] kasan_atomics+0x198/0x2e8\n[ 56.911304] kunit_try_run_case+0x14c/0x3d0\n[ 56.911324] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.911342] kthread+0x24c/0x2d0\n[ 56.911357] ret_from_fork+0x10/0x20\n[ 56.911374] \n[ 56.982075] Allocated by task 334:\n[ 56.985531] kasan_save_stack+0x3c/0x68\n[ 56.989429] kasan_save_track+0x20/0x40\n[ 56.993326] kasan_save_alloc_info+0x40/0x58\n[ 56.997670] __kasan_kmalloc+0xd4/0xd8\n[ 57.001478] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 57.006080] kasan_atomics+0xb8/0x2e8\n[ 57.009801] kunit_try_run_case+0x14c/0x3d0\n[ 57.014058] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.019627] kthread+0x24c/0x2d0\n[ 57.022916] ret_from_fork+0x10/0x20\n[ 57.026552] \n[ 57.028074] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 57.028074] which belongs to the cache kmalloc-64 of size 64\n[ 57.040555] The buggy address is located 0 bytes to the right of\n[ 57.040555] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 57.053557] \n[ 57.055080] The buggy address belongs to the physical page:\n[ 57.060726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 57.068824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 57.075431] page_type: f5(slab)\n[ 57.078630] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 57.086466] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 57.094298] page dumped because: kasan: bad access detected\n[ 57.099945] \n[ 57.101468] Memory state around the buggy address:\n[ 57.106323] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.113635] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.120947] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 57.128257] ^\n[ 57.133114] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.140424] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.147736] ==================================================================", "[ 64.097539] ==================================================================\n[ 64.104851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858\n[ 64.112340] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 64.119828] \n[ 64.121353] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 64.121375] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 64.121383] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 64.121392] Call trace:\n[ 64.121397] show_stack+0x20/0x38 (C)\n[ 64.121412] dump_stack_lvl+0x8c/0xd0\n[ 64.121426] print_report+0x118/0x5e0\n[ 64.121443] kasan_report+0xc8/0x118\n[ 64.121459] kasan_check_range+0x100/0x1a8\n[ 64.121476] __kasan_check_write+0x20/0x30\n[ 64.121494] kasan_atomics_helper+0x16d0/0x4858\n[ 64.121510] kasan_atomics+0x198/0x2e8\n[ 64.121524] kunit_try_run_case+0x14c/0x3d0\n[ 64.121543] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.121560] kthread+0x24c/0x2d0\n[ 64.121575] ret_from_fork+0x10/0x20\n[ 64.121590] \n[ 64.192377] Allocated by task 334:\n[ 64.195833] kasan_save_stack+0x3c/0x68\n[ 64.199730] kasan_save_track+0x20/0x40\n[ 64.203625] kasan_save_alloc_info+0x40/0x58\n[ 64.207967] __kasan_kmalloc+0xd4/0xd8\n[ 64.211775] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 64.216376] kasan_atomics+0xb8/0x2e8\n[ 64.220097] kunit_try_run_case+0x14c/0x3d0\n[ 64.224352] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.229918] kthread+0x24c/0x2d0\n[ 64.233207] ret_from_fork+0x10/0x20\n[ 64.236842] \n[ 64.238364] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 64.238364] which belongs to the cache kmalloc-64 of size 64\n[ 64.250843] The buggy address is located 0 bytes to the right of\n[ 64.250843] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 64.263846] \n[ 64.265368] The buggy address belongs to the physical page:\n[ 64.271014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 64.279110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 64.285717] page_type: f5(slab)\n[ 64.288915] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 64.296752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 64.304585] page dumped because: kasan: bad access detected\n[ 64.310231] \n[ 64.311753] Memory state around the buggy address:\n[ 64.316608] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.323920] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.331232] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 64.338542] ^\n[ 64.343398] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.350711] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.358021] ==================================================================", "[ 62.765291] ==================================================================\n[ 62.772602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858\n[ 62.780092] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 62.787580] \n[ 62.789105] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 62.789128] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 62.789136] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 62.789146] Call trace:\n[ 62.789153] show_stack+0x20/0x38 (C)\n[ 62.789168] dump_stack_lvl+0x8c/0xd0\n[ 62.789182] print_report+0x118/0x5e0\n[ 62.789198] kasan_report+0xc8/0x118\n[ 62.789216] kasan_check_range+0x100/0x1a8\n[ 62.789233] __kasan_check_write+0x20/0x30\n[ 62.789252] kasan_atomics_helper+0x154c/0x4858\n[ 62.789267] kasan_atomics+0x198/0x2e8\n[ 62.789282] kunit_try_run_case+0x14c/0x3d0\n[ 62.789301] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.789317] kthread+0x24c/0x2d0\n[ 62.789333] ret_from_fork+0x10/0x20\n[ 62.789348] \n[ 62.860139] Allocated by task 334:\n[ 62.863595] kasan_save_stack+0x3c/0x68\n[ 62.867491] kasan_save_track+0x20/0x40\n[ 62.871387] kasan_save_alloc_info+0x40/0x58\n[ 62.875730] __kasan_kmalloc+0xd4/0xd8\n[ 62.879538] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 62.884139] kasan_atomics+0xb8/0x2e8\n[ 62.887859] kunit_try_run_case+0x14c/0x3d0\n[ 62.892115] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.897681] kthread+0x24c/0x2d0\n[ 62.900971] ret_from_fork+0x10/0x20\n[ 62.904606] \n[ 62.906128] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 62.906128] which belongs to the cache kmalloc-64 of size 64\n[ 62.918607] The buggy address is located 0 bytes to the right of\n[ 62.918607] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 62.931610] \n[ 62.933134] The buggy address belongs to the physical page:\n[ 62.938780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 62.946876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 62.953483] page_type: f5(slab)\n[ 62.956682] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 62.964517] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 62.972349] page dumped because: kasan: bad access detected\n[ 62.977995] \n[ 62.979517] Memory state around the buggy address:\n[ 62.984372] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.991683] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.998995] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 63.006306] ^\n[ 63.011162] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.018473] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.025783] ==================================================================", "[ 62.497410] ==================================================================\n[ 62.504722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858\n[ 62.512212] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 62.519700] \n[ 62.521224] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 62.521248] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 62.521255] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 62.521265] Call trace:\n[ 62.521272] show_stack+0x20/0x38 (C)\n[ 62.521288] dump_stack_lvl+0x8c/0xd0\n[ 62.521301] print_report+0x118/0x5e0\n[ 62.521317] kasan_report+0xc8/0x118\n[ 62.521333] kasan_check_range+0x100/0x1a8\n[ 62.521351] __kasan_check_write+0x20/0x30\n[ 62.521370] kasan_atomics_helper+0x14e4/0x4858\n[ 62.521385] kasan_atomics+0x198/0x2e8\n[ 62.521399] kunit_try_run_case+0x14c/0x3d0\n[ 62.521418] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.521434] kthread+0x24c/0x2d0\n[ 62.521449] ret_from_fork+0x10/0x20\n[ 62.521465] \n[ 62.592256] Allocated by task 334:\n[ 62.595712] kasan_save_stack+0x3c/0x68\n[ 62.599610] kasan_save_track+0x20/0x40\n[ 62.603506] kasan_save_alloc_info+0x40/0x58\n[ 62.607850] __kasan_kmalloc+0xd4/0xd8\n[ 62.611657] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 62.616258] kasan_atomics+0xb8/0x2e8\n[ 62.619979] kunit_try_run_case+0x14c/0x3d0\n[ 62.624236] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.629802] kthread+0x24c/0x2d0\n[ 62.633091] ret_from_fork+0x10/0x20\n[ 62.636725] \n[ 62.638248] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 62.638248] which belongs to the cache kmalloc-64 of size 64\n[ 62.650726] The buggy address is located 0 bytes to the right of\n[ 62.650726] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 62.663728] \n[ 62.665252] The buggy address belongs to the physical page:\n[ 62.670898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 62.678993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 62.685600] page_type: f5(slab)\n[ 62.688799] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 62.696638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 62.704471] page dumped because: kasan: bad access detected\n[ 62.710118] \n[ 62.711640] Memory state around the buggy address:\n[ 62.716495] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.723808] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.731120] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 62.738431] ^\n[ 62.743288] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 62.750600] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 62.757910] ==================================================================", "[ 50.211415] ==================================================================\n[ 50.218728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858\n[ 50.226131] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 50.233620] \n[ 50.235145] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 50.235169] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 50.235177] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 50.235188] Call trace:\n[ 50.235195] show_stack+0x20/0x38 (C)\n[ 50.235211] dump_stack_lvl+0x8c/0xd0\n[ 50.235226] print_report+0x118/0x5e0\n[ 50.235244] kasan_report+0xc8/0x118\n[ 50.235260] kasan_check_range+0x100/0x1a8\n[ 50.235280] __kasan_check_write+0x20/0x30\n[ 50.235297] kasan_atomics_helper+0x3ac/0x4858\n[ 50.235315] kasan_atomics+0x198/0x2e8\n[ 50.235329] kunit_try_run_case+0x14c/0x3d0\n[ 50.235347] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.235364] kthread+0x24c/0x2d0\n[ 50.235379] ret_from_fork+0x10/0x20\n[ 50.235395] \n[ 50.306096] Allocated by task 334:\n[ 50.309552] kasan_save_stack+0x3c/0x68\n[ 50.313450] kasan_save_track+0x20/0x40\n[ 50.317346] kasan_save_alloc_info+0x40/0x58\n[ 50.321688] __kasan_kmalloc+0xd4/0xd8\n[ 50.325497] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 50.330098] kasan_atomics+0xb8/0x2e8\n[ 50.333818] kunit_try_run_case+0x14c/0x3d0\n[ 50.338075] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.343642] kthread+0x24c/0x2d0\n[ 50.346931] ret_from_fork+0x10/0x20\n[ 50.350567] \n[ 50.352089] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 50.352089] which belongs to the cache kmalloc-64 of size 64\n[ 50.364568] The buggy address is located 0 bytes to the right of\n[ 50.364568] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 50.377571] \n[ 50.379094] The buggy address belongs to the physical page:\n[ 50.384740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 50.392838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 50.399447] page_type: f5(slab)\n[ 50.402645] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 50.410481] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 50.418314] page dumped because: kasan: bad access detected\n[ 50.423960] \n[ 50.425483] Memory state around the buggy address:\n[ 50.430338] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.437650] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.444962] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 50.452272] ^\n[ 50.457128] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.464440] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.471750] ==================================================================", "[ 56.355355] ==================================================================\n[ 56.362666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858\n[ 56.370069] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 56.377557] \n[ 56.379081] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 56.379104] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 56.379113] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 56.379122] Call trace:\n[ 56.379127] show_stack+0x20/0x38 (C)\n[ 56.379142] dump_stack_lvl+0x8c/0xd0\n[ 56.379156] print_report+0x118/0x5e0\n[ 56.379174] kasan_report+0xc8/0x118\n[ 56.379189] kasan_check_range+0x100/0x1a8\n[ 56.379206] __kasan_check_write+0x20/0x30\n[ 56.379224] kasan_atomics_helper+0xca0/0x4858\n[ 56.379239] kasan_atomics+0x198/0x2e8\n[ 56.379254] kunit_try_run_case+0x14c/0x3d0\n[ 56.379274] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.379291] kthread+0x24c/0x2d0\n[ 56.379307] ret_from_fork+0x10/0x20\n[ 56.379322] \n[ 56.450022] Allocated by task 334:\n[ 56.453478] kasan_save_stack+0x3c/0x68\n[ 56.457375] kasan_save_track+0x20/0x40\n[ 56.461270] kasan_save_alloc_info+0x40/0x58\n[ 56.465612] __kasan_kmalloc+0xd4/0xd8\n[ 56.469420] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 56.474022] kasan_atomics+0xb8/0x2e8\n[ 56.477743] kunit_try_run_case+0x14c/0x3d0\n[ 56.482000] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.487565] kthread+0x24c/0x2d0\n[ 56.490855] ret_from_fork+0x10/0x20\n[ 56.494490] \n[ 56.496012] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 56.496012] which belongs to the cache kmalloc-64 of size 64\n[ 56.508491] The buggy address is located 0 bytes to the right of\n[ 56.508491] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 56.521492] \n[ 56.523016] The buggy address belongs to the physical page:\n[ 56.528660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 56.536755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 56.543362] page_type: f5(slab)\n[ 56.546560] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 56.554396] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 56.562228] page dumped because: kasan: bad access detected\n[ 56.567875] \n[ 56.569398] Memory state around the buggy address:\n[ 56.574254] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.581566] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.588878] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 56.596189] ^\n[ 56.601045] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.608357] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.615667] ==================================================================", "[ 54.223786] ==================================================================\n[ 54.231099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858\n[ 54.238505] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 54.245995] \n[ 54.247521] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 54.247544] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 54.247552] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 54.247563] Call trace:\n[ 54.247569] show_stack+0x20/0x38 (C)\n[ 54.247585] dump_stack_lvl+0x8c/0xd0\n[ 54.247599] print_report+0x118/0x5e0\n[ 54.247616] kasan_report+0xc8/0x118\n[ 54.247634] kasan_check_range+0x100/0x1a8\n[ 54.247652] __kasan_check_write+0x20/0x30\n[ 54.247670] kasan_atomics_helper+0xa04/0x4858\n[ 54.247688] kasan_atomics+0x198/0x2e8\n[ 54.247702] kunit_try_run_case+0x14c/0x3d0\n[ 54.247721] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.247739] kthread+0x24c/0x2d0\n[ 54.247754] ret_from_fork+0x10/0x20\n[ 54.247770] \n[ 54.318473] Allocated by task 334:\n[ 54.321929] kasan_save_stack+0x3c/0x68\n[ 54.325827] kasan_save_track+0x20/0x40\n[ 54.329723] kasan_save_alloc_info+0x40/0x58\n[ 54.334065] __kasan_kmalloc+0xd4/0xd8\n[ 54.337873] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 54.342474] kasan_atomics+0xb8/0x2e8\n[ 54.346194] kunit_try_run_case+0x14c/0x3d0\n[ 54.350451] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.356018] kthread+0x24c/0x2d0\n[ 54.359307] ret_from_fork+0x10/0x20\n[ 54.362942] \n[ 54.364465] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 54.364465] which belongs to the cache kmalloc-64 of size 64\n[ 54.376945] The buggy address is located 0 bytes to the right of\n[ 54.376945] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 54.389947] \n[ 54.391470] The buggy address belongs to the physical page:\n[ 54.397116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 54.405212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 54.411820] page_type: f5(slab)\n[ 54.415018] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 54.422855] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 54.430687] page dumped because: kasan: bad access detected\n[ 54.436334] \n[ 54.437857] Memory state around the buggy address:\n[ 54.442712] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.450024] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.457338] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 54.464649] ^\n[ 54.469506] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 54.476819] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 54.484129] ==================================================================", "[ 51.014607] ==================================================================\n[ 51.021922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858\n[ 51.029326] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 51.036817] \n[ 51.038343] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 51.038367] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 51.038376] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 51.038385] Call trace:\n[ 51.038392] show_stack+0x20/0x38 (C)\n[ 51.038409] dump_stack_lvl+0x8c/0xd0\n[ 51.038423] print_report+0x118/0x5e0\n[ 51.038440] kasan_report+0xc8/0x118\n[ 51.038456] kasan_check_range+0x100/0x1a8\n[ 51.038473] __kasan_check_write+0x20/0x30\n[ 51.038493] kasan_atomics_helper+0x4e4/0x4858\n[ 51.038511] kasan_atomics+0x198/0x2e8\n[ 51.038527] kunit_try_run_case+0x14c/0x3d0\n[ 51.038546] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.038563] kthread+0x24c/0x2d0\n[ 51.038579] ret_from_fork+0x10/0x20\n[ 51.038596] \n[ 51.109301] Allocated by task 334:\n[ 51.112757] kasan_save_stack+0x3c/0x68\n[ 51.116655] kasan_save_track+0x20/0x40\n[ 51.120551] kasan_save_alloc_info+0x40/0x58\n[ 51.124895] __kasan_kmalloc+0xd4/0xd8\n[ 51.128703] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 51.133305] kasan_atomics+0xb8/0x2e8\n[ 51.137027] kunit_try_run_case+0x14c/0x3d0\n[ 51.141282] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 51.146848] kthread+0x24c/0x2d0\n[ 51.150137] ret_from_fork+0x10/0x20\n[ 51.153772] \n[ 51.155295] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 51.155295] which belongs to the cache kmalloc-64 of size 64\n[ 51.167775] The buggy address is located 0 bytes to the right of\n[ 51.167775] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 51.180777] \n[ 51.182300] The buggy address belongs to the physical page:\n[ 51.187947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 51.196043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 51.202652] page_type: f5(slab)\n[ 51.205851] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 51.213687] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 51.221519] page dumped because: kasan: bad access detected\n[ 51.227165] \n[ 51.228688] Memory state around the buggy address:\n[ 51.233543] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 51.240856] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 51.248169] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 51.255479] ^\n[ 51.260335] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.267646] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 51.274957] ==================================================================", "[ 61.161636] ==================================================================\n[ 61.168948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858\n[ 61.176438] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 61.183927] \n[ 61.185452] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 61.185475] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 61.185482] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 61.185493] Call trace:\n[ 61.185499] show_stack+0x20/0x38 (C)\n[ 61.185514] dump_stack_lvl+0x8c/0xd0\n[ 61.185526] print_report+0x118/0x5e0\n[ 61.185543] kasan_report+0xc8/0x118\n[ 61.185559] kasan_check_range+0x100/0x1a8\n[ 61.185578] __kasan_check_write+0x20/0x30\n[ 61.185596] kasan_atomics_helper+0x12d8/0x4858\n[ 61.185613] kasan_atomics+0x198/0x2e8\n[ 61.185627] kunit_try_run_case+0x14c/0x3d0\n[ 61.185646] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.185662] kthread+0x24c/0x2d0\n[ 61.185679] ret_from_fork+0x10/0x20\n[ 61.185695] \n[ 61.256483] Allocated by task 334:\n[ 61.259938] kasan_save_stack+0x3c/0x68\n[ 61.263835] kasan_save_track+0x20/0x40\n[ 61.267731] kasan_save_alloc_info+0x40/0x58\n[ 61.272072] __kasan_kmalloc+0xd4/0xd8\n[ 61.275880] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 61.280481] kasan_atomics+0xb8/0x2e8\n[ 61.284201] kunit_try_run_case+0x14c/0x3d0\n[ 61.288457] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.294023] kthread+0x24c/0x2d0\n[ 61.297312] ret_from_fork+0x10/0x20\n[ 61.300946] \n[ 61.302468] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 61.302468] which belongs to the cache kmalloc-64 of size 64\n[ 61.314947] The buggy address is located 0 bytes to the right of\n[ 61.314947] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 61.327949] \n[ 61.329472] The buggy address belongs to the physical page:\n[ 61.335118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 61.343213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 61.349821] page_type: f5(slab)\n[ 61.353019] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 61.360857] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 61.368691] page dumped because: kasan: bad access detected\n[ 61.374338] \n[ 61.375861] Memory state around the buggy address:\n[ 61.380717] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.388029] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.395342] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 61.402652] ^\n[ 61.407511] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.414822] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.422132] ==================================================================", "[ 54.491501] ==================================================================\n[ 54.498813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858\n[ 54.506218] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 54.513707] \n[ 54.515233] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 54.515256] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 54.515266] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 54.515275] Call trace:\n[ 54.515281] show_stack+0x20/0x38 (C)\n[ 54.515297] dump_stack_lvl+0x8c/0xd0\n[ 54.515311] print_report+0x118/0x5e0\n[ 54.515329] kasan_report+0xc8/0x118\n[ 54.515345] kasan_check_range+0x100/0x1a8\n[ 54.515364] __kasan_check_write+0x20/0x30\n[ 54.515383] kasan_atomics_helper+0xa6c/0x4858\n[ 54.515399] kasan_atomics+0x198/0x2e8\n[ 54.515415] kunit_try_run_case+0x14c/0x3d0\n[ 54.515435] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.515451] kthread+0x24c/0x2d0\n[ 54.515469] ret_from_fork+0x10/0x20\n[ 54.515486] \n[ 54.586188] Allocated by task 334:\n[ 54.589645] kasan_save_stack+0x3c/0x68\n[ 54.593541] kasan_save_track+0x20/0x40\n[ 54.597437] kasan_save_alloc_info+0x40/0x58\n[ 54.601779] __kasan_kmalloc+0xd4/0xd8\n[ 54.605586] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 54.610188] kasan_atomics+0xb8/0x2e8\n[ 54.613908] kunit_try_run_case+0x14c/0x3d0\n[ 54.618162] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.623729] kthread+0x24c/0x2d0\n[ 54.627017] ret_from_fork+0x10/0x20\n[ 54.630651] \n[ 54.632174] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 54.632174] which belongs to the cache kmalloc-64 of size 64\n[ 54.644655] The buggy address is located 0 bytes to the right of\n[ 54.644655] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 54.657657] \n[ 54.659181] The buggy address belongs to the physical page:\n[ 54.664827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 54.672924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 54.679532] page_type: f5(slab)\n[ 54.682730] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 54.690567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 54.698399] page dumped because: kasan: bad access detected\n[ 54.704046] \n[ 54.705568] Memory state around the buggy address:\n[ 54.710422] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.717735] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.725047] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 54.732357] ^\n[ 54.737214] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 54.744525] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 54.751837] ==================================================================", "[ 58.751189] ==================================================================\n[ 58.758500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858\n[ 58.765903] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 58.773393] \n[ 58.774917] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 58.774940] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 58.774948] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 58.774958] Call trace:\n[ 58.774964] show_stack+0x20/0x38 (C)\n[ 58.774980] dump_stack_lvl+0x8c/0xd0\n[ 58.774994] print_report+0x118/0x5e0\n[ 58.775011] kasan_report+0xc8/0x118\n[ 58.775027] kasan_check_range+0x100/0x1a8\n[ 58.775044] __kasan_check_write+0x20/0x30\n[ 58.775061] kasan_atomics_helper+0xf20/0x4858\n[ 58.775077] kasan_atomics+0x198/0x2e8\n[ 58.775091] kunit_try_run_case+0x14c/0x3d0\n[ 58.775109] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.775127] kthread+0x24c/0x2d0\n[ 58.775142] ret_from_fork+0x10/0x20\n[ 58.775157] \n[ 58.845860] Allocated by task 334:\n[ 58.849315] kasan_save_stack+0x3c/0x68\n[ 58.853212] kasan_save_track+0x20/0x40\n[ 58.857109] kasan_save_alloc_info+0x40/0x58\n[ 58.861451] __kasan_kmalloc+0xd4/0xd8\n[ 58.865258] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 58.869860] kasan_atomics+0xb8/0x2e8\n[ 58.873581] kunit_try_run_case+0x14c/0x3d0\n[ 58.877838] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.883394] kthread+0x24c/0x2d0\n[ 58.886683] ret_from_fork+0x10/0x20\n[ 58.890318] \n[ 58.891841] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 58.891841] which belongs to the cache kmalloc-64 of size 64\n[ 58.904320] The buggy address is located 0 bytes to the right of\n[ 58.904320] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 58.917323] \n[ 58.918847] The buggy address belongs to the physical page:\n[ 58.924495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 58.932593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 58.939200] page_type: f5(slab)\n[ 58.942398] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 58.950234] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 58.958067] page dumped because: kasan: bad access detected\n[ 58.963715] \n[ 58.965236] Memory state around the buggy address:\n[ 58.970092] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.977405] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.984716] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 58.992026] ^\n[ 58.996883] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.004194] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.011506] ==================================================================", "[ 59.822231] ==================================================================\n[ 59.829545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858\n[ 59.837037] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 59.844526] \n[ 59.846052] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 59.846077] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 59.846084] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 59.846097] Call trace:\n[ 59.846103] show_stack+0x20/0x38 (C)\n[ 59.846119] dump_stack_lvl+0x8c/0xd0\n[ 59.846133] print_report+0x118/0x5e0\n[ 59.846149] kasan_report+0xc8/0x118\n[ 59.846166] kasan_check_range+0x100/0x1a8\n[ 59.846184] __kasan_check_write+0x20/0x30\n[ 59.846202] kasan_atomics_helper+0x10c0/0x4858\n[ 59.846219] kasan_atomics+0x198/0x2e8\n[ 59.846233] kunit_try_run_case+0x14c/0x3d0\n[ 59.846252] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.846270] kthread+0x24c/0x2d0\n[ 59.846286] ret_from_fork+0x10/0x20\n[ 59.846301] \n[ 59.917095] Allocated by task 334:\n[ 59.920552] kasan_save_stack+0x3c/0x68\n[ 59.924451] kasan_save_track+0x20/0x40\n[ 59.928349] kasan_save_alloc_info+0x40/0x58\n[ 59.932691] __kasan_kmalloc+0xd4/0xd8\n[ 59.936500] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 59.941101] kasan_atomics+0xb8/0x2e8\n[ 59.944821] kunit_try_run_case+0x14c/0x3d0\n[ 59.949077] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.954632] kthread+0x24c/0x2d0\n[ 59.957923] ret_from_fork+0x10/0x20\n[ 59.961558] \n[ 59.963081] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 59.963081] which belongs to the cache kmalloc-64 of size 64\n[ 59.975562] The buggy address is located 0 bytes to the right of\n[ 59.975562] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 59.988564] \n[ 59.990088] The buggy address belongs to the physical page:\n[ 59.995734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 60.003832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 60.010440] page_type: f5(slab)\n[ 60.013640] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 60.021476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 60.029309] page dumped because: kasan: bad access detected\n[ 60.034955] \n[ 60.036477] Memory state around the buggy address:\n[ 60.041333] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.048646] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 60.055959] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 60.063268] ^\n[ 60.068124] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.075436] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 60.082747] ==================================================================", "[ 49.679135] ==================================================================\n[ 49.686456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858\n[ 49.693861] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 49.701350] \n[ 49.702879] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 49.702906] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 49.702915] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 49.702926] Call trace:\n[ 49.702932] show_stack+0x20/0x38 (C)\n[ 49.702949] dump_stack_lvl+0x8c/0xd0\n[ 49.702965] print_report+0x118/0x5e0\n[ 49.702982] kasan_report+0xc8/0x118\n[ 49.702999] kasan_check_range+0x100/0x1a8\n[ 49.703017] __kasan_check_write+0x20/0x30\n[ 49.703036] kasan_atomics_helper+0x32c/0x4858\n[ 49.703053] kasan_atomics+0x198/0x2e8\n[ 49.703067] kunit_try_run_case+0x14c/0x3d0\n[ 49.703086] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.703103] kthread+0x24c/0x2d0\n[ 49.703119] ret_from_fork+0x10/0x20\n[ 49.703135] \n[ 49.773828] Allocated by task 334:\n[ 49.777283] kasan_save_stack+0x3c/0x68\n[ 49.781180] kasan_save_track+0x20/0x40\n[ 49.785075] kasan_save_alloc_info+0x40/0x58\n[ 49.789417] __kasan_kmalloc+0xd4/0xd8\n[ 49.793224] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 49.797823] kasan_atomics+0xb8/0x2e8\n[ 49.801542] kunit_try_run_case+0x14c/0x3d0\n[ 49.805797] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.811359] kthread+0x24c/0x2d0\n[ 49.814647] ret_from_fork+0x10/0x20\n[ 49.818279] \n[ 49.819812] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 49.819812] which belongs to the cache kmalloc-64 of size 64\n[ 49.832288] The buggy address is located 0 bytes to the right of\n[ 49.832288] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 49.845296] \n[ 49.846820] The buggy address belongs to the physical page:\n[ 49.852464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 49.860567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 49.867173] page_type: f5(slab)\n[ 49.870371] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 49.878217] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 49.886046] page dumped because: kasan: bad access detected\n[ 49.891689] \n[ 49.893212] Memory state around the buggy address:\n[ 49.898065] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.905375] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.912686] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 49.919994] ^\n[ 49.924850] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.932159] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.939465] ==================================================================", "[ 64.629733] ==================================================================\n[ 64.637043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858\n[ 64.644533] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 64.652021] \n[ 64.653545] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 64.653569] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 64.653576] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 64.653585] Call trace:\n[ 64.653591] show_stack+0x20/0x38 (C)\n[ 64.653606] dump_stack_lvl+0x8c/0xd0\n[ 64.653620] print_report+0x118/0x5e0\n[ 64.653636] kasan_report+0xc8/0x118\n[ 64.653652] kasan_check_range+0x100/0x1a8\n[ 64.653669] __kasan_check_write+0x20/0x30\n[ 64.653686] kasan_atomics_helper+0x175c/0x4858\n[ 64.653702] kasan_atomics+0x198/0x2e8\n[ 64.653717] kunit_try_run_case+0x14c/0x3d0\n[ 64.653736] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.653752] kthread+0x24c/0x2d0\n[ 64.653767] ret_from_fork+0x10/0x20\n[ 64.653783] \n[ 64.724572] Allocated by task 334:\n[ 64.728027] kasan_save_stack+0x3c/0x68\n[ 64.731924] kasan_save_track+0x20/0x40\n[ 64.735820] kasan_save_alloc_info+0x40/0x58\n[ 64.740162] __kasan_kmalloc+0xd4/0xd8\n[ 64.743969] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 64.748570] kasan_atomics+0xb8/0x2e8\n[ 64.752290] kunit_try_run_case+0x14c/0x3d0\n[ 64.756545] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.762112] kthread+0x24c/0x2d0\n[ 64.765402] ret_from_fork+0x10/0x20\n[ 64.769037] \n[ 64.770558] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 64.770558] which belongs to the cache kmalloc-64 of size 64\n[ 64.783037] The buggy address is located 0 bytes to the right of\n[ 64.783037] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 64.796038] \n[ 64.797561] The buggy address belongs to the physical page:\n[ 64.803208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 64.811313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 64.817920] page_type: f5(slab)\n[ 64.821117] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 64.828953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 64.836785] page dumped because: kasan: bad access detected\n[ 64.842431] \n[ 64.843953] Memory state around the buggy address:\n[ 64.848808] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.856120] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.863432] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 64.870742] ^\n[ 64.875598] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.882910] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.890220] ==================================================================", "[ 52.085428] ==================================================================\n[ 52.092740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858\n[ 52.100143] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 52.107631] \n[ 52.109155] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 52.109180] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 52.109187] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 52.109196] Call trace:\n[ 52.109202] show_stack+0x20/0x38 (C)\n[ 52.109217] dump_stack_lvl+0x8c/0xd0\n[ 52.109230] print_report+0x118/0x5e0\n[ 52.109247] kasan_report+0xc8/0x118\n[ 52.109263] kasan_check_range+0x100/0x1a8\n[ 52.109280] __kasan_check_write+0x20/0x30\n[ 52.109299] kasan_atomics_helper+0x684/0x4858\n[ 52.109315] kasan_atomics+0x198/0x2e8\n[ 52.109330] kunit_try_run_case+0x14c/0x3d0\n[ 52.109349] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.109367] kthread+0x24c/0x2d0\n[ 52.109382] ret_from_fork+0x10/0x20\n[ 52.109397] \n[ 52.180100] Allocated by task 334:\n[ 52.183555] kasan_save_stack+0x3c/0x68\n[ 52.187452] kasan_save_track+0x20/0x40\n[ 52.191348] kasan_save_alloc_info+0x40/0x58\n[ 52.195690] __kasan_kmalloc+0xd4/0xd8\n[ 52.199498] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 52.204099] kasan_atomics+0xb8/0x2e8\n[ 52.207819] kunit_try_run_case+0x14c/0x3d0\n[ 52.212075] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 52.217641] kthread+0x24c/0x2d0\n[ 52.220930] ret_from_fork+0x10/0x20\n[ 52.224565] \n[ 52.226087] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 52.226087] which belongs to the cache kmalloc-64 of size 64\n[ 52.238567] The buggy address is located 0 bytes to the right of\n[ 52.238567] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 52.251570] \n[ 52.253093] The buggy address belongs to the physical page:\n[ 52.258740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 52.266836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 52.273443] page_type: f5(slab)\n[ 52.276642] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 52.284478] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 52.292310] page dumped because: kasan: bad access detected\n[ 52.297957] \n[ 52.299479] Memory state around the buggy address:\n[ 52.304334] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.311646] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 52.318959] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 52.326269] ^\n[ 52.331127] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.338438] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 52.345749] ==================================================================", "[ 65.161917] ==================================================================\n[ 65.169230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858\n[ 65.176720] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 65.184208] \n[ 65.185732] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 65.185755] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 65.185763] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 65.185774] Call trace:\n[ 65.185779] show_stack+0x20/0x38 (C)\n[ 65.185795] dump_stack_lvl+0x8c/0xd0\n[ 65.185809] print_report+0x118/0x5e0\n[ 65.185825] kasan_report+0xc8/0x118\n[ 65.185841] kasan_check_range+0x100/0x1a8\n[ 65.185858] __kasan_check_write+0x20/0x30\n[ 65.185876] kasan_atomics_helper+0x17ec/0x4858\n[ 65.185891] kasan_atomics+0x198/0x2e8\n[ 65.185906] kunit_try_run_case+0x14c/0x3d0\n[ 65.185924] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 65.185941] kthread+0x24c/0x2d0\n[ 65.185957] ret_from_fork+0x10/0x20\n[ 65.185973] \n[ 65.256760] Allocated by task 334:\n[ 65.260216] kasan_save_stack+0x3c/0x68\n[ 65.264113] kasan_save_track+0x20/0x40\n[ 65.268009] kasan_save_alloc_info+0x40/0x58\n[ 65.272353] __kasan_kmalloc+0xd4/0xd8\n[ 65.276160] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 65.280762] kasan_atomics+0xb8/0x2e8\n[ 65.284483] kunit_try_run_case+0x14c/0x3d0\n[ 65.288739] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 65.294305] kthread+0x24c/0x2d0\n[ 65.297594] ret_from_fork+0x10/0x20\n[ 65.301229] \n[ 65.302752] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 65.302752] which belongs to the cache kmalloc-64 of size 64\n[ 65.315231] The buggy address is located 0 bytes to the right of\n[ 65.315231] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 65.328233] \n[ 65.329757] The buggy address belongs to the physical page:\n[ 65.335403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 65.343499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 65.350105] page_type: f5(slab)\n[ 65.353304] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 65.361140] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 65.368974] page dumped because: kasan: bad access detected\n[ 65.374619] \n[ 65.376141] Memory state around the buggy address:\n[ 65.380996] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 65.388308] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 65.395621] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 65.402933] ^\n[ 65.407789] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 65.415101] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 65.422411] ==================================================================", "[ 61.961686] ==================================================================\n[ 61.968999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858\n[ 61.976489] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 61.983977] \n[ 61.985502] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 61.985524] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 61.985532] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 61.985542] Call trace:\n[ 61.985548] show_stack+0x20/0x38 (C)\n[ 61.985563] dump_stack_lvl+0x8c/0xd0\n[ 61.985577] print_report+0x118/0x5e0\n[ 61.985593] kasan_report+0xc8/0x118\n[ 61.985609] kasan_check_range+0x100/0x1a8\n[ 61.985625] __kasan_check_write+0x20/0x30\n[ 61.985643] kasan_atomics_helper+0x1414/0x4858\n[ 61.985659] kasan_atomics+0x198/0x2e8\n[ 61.985674] kunit_try_run_case+0x14c/0x3d0\n[ 61.985692] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.985708] kthread+0x24c/0x2d0\n[ 61.985724] ret_from_fork+0x10/0x20\n[ 61.985740] \n[ 62.056527] Allocated by task 334:\n[ 62.059983] kasan_save_stack+0x3c/0x68\n[ 62.063880] kasan_save_track+0x20/0x40\n[ 62.067775] kasan_save_alloc_info+0x40/0x58\n[ 62.072118] __kasan_kmalloc+0xd4/0xd8\n[ 62.075926] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 62.080526] kasan_atomics+0xb8/0x2e8\n[ 62.084247] kunit_try_run_case+0x14c/0x3d0\n[ 62.088503] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 62.094070] kthread+0x24c/0x2d0\n[ 62.097359] ret_from_fork+0x10/0x20\n[ 62.100994] \n[ 62.102516] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 62.102516] which belongs to the cache kmalloc-64 of size 64\n[ 62.114997] The buggy address is located 0 bytes to the right of\n[ 62.114997] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 62.128000] \n[ 62.129523] The buggy address belongs to the physical page:\n[ 62.135169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 62.143265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 62.149873] page_type: f5(slab)\n[ 62.153071] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 62.160907] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 62.168739] page dumped because: kasan: bad access detected\n[ 62.174385] \n[ 62.175907] Memory state around the buggy address:\n[ 62.180762] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.188074] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 62.195386] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 62.202696] ^\n[ 62.207552] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 62.214864] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 62.222173] ==================================================================", "[ 63.565347] ==================================================================\n[ 63.572659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858\n[ 63.580149] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 63.587637] \n[ 63.589161] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 63.589184] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 63.589192] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 63.589202] Call trace:\n[ 63.589208] show_stack+0x20/0x38 (C)\n[ 63.589224] dump_stack_lvl+0x8c/0xd0\n[ 63.589238] print_report+0x118/0x5e0\n[ 63.589255] kasan_report+0xc8/0x118\n[ 63.589270] kasan_check_range+0x100/0x1a8\n[ 63.589288] __kasan_check_write+0x20/0x30\n[ 63.589306] kasan_atomics_helper+0x1644/0x4858\n[ 63.589322] kasan_atomics+0x198/0x2e8\n[ 63.589336] kunit_try_run_case+0x14c/0x3d0\n[ 63.589354] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.589372] kthread+0x24c/0x2d0\n[ 63.589389] ret_from_fork+0x10/0x20\n[ 63.589405] \n[ 63.660194] Allocated by task 334:\n[ 63.663650] kasan_save_stack+0x3c/0x68\n[ 63.667547] kasan_save_track+0x20/0x40\n[ 63.671444] kasan_save_alloc_info+0x40/0x58\n[ 63.675786] __kasan_kmalloc+0xd4/0xd8\n[ 63.679593] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 63.684194] kasan_atomics+0xb8/0x2e8\n[ 63.687914] kunit_try_run_case+0x14c/0x3d0\n[ 63.692169] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.697735] kthread+0x24c/0x2d0\n[ 63.701025] ret_from_fork+0x10/0x20\n[ 63.704660] \n[ 63.706183] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 63.706183] which belongs to the cache kmalloc-64 of size 64\n[ 63.718663] The buggy address is located 0 bytes to the right of\n[ 63.718663] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 63.731666] \n[ 63.733190] The buggy address belongs to the physical page:\n[ 63.738835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 63.746931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 63.753538] page_type: f5(slab)\n[ 63.756736] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 63.764572] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 63.772404] page dumped because: kasan: bad access detected\n[ 63.778050] \n[ 63.779572] Memory state around the buggy address:\n[ 63.784427] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 63.791740] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 63.799053] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 63.806364] ^\n[ 63.811221] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.818532] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.825842] ==================================================================", "[ 54.759218] ==================================================================\n[ 54.766529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858\n[ 54.773933] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 54.781422] \n[ 54.782949] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 54.782972] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 54.782981] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 54.782991] Call trace:\n[ 54.782997] show_stack+0x20/0x38 (C)\n[ 54.783012] dump_stack_lvl+0x8c/0xd0\n[ 54.783026] print_report+0x118/0x5e0\n[ 54.783042] kasan_report+0xc8/0x118\n[ 54.783058] kasan_check_range+0x100/0x1a8\n[ 54.783075] __kasan_check_write+0x20/0x30\n[ 54.783092] kasan_atomics_helper+0xad4/0x4858\n[ 54.783108] kasan_atomics+0x198/0x2e8\n[ 54.783124] kunit_try_run_case+0x14c/0x3d0\n[ 54.783143] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.783160] kthread+0x24c/0x2d0\n[ 54.783176] ret_from_fork+0x10/0x20\n[ 54.783191] \n[ 54.853893] Allocated by task 334:\n[ 54.857350] kasan_save_stack+0x3c/0x68\n[ 54.861247] kasan_save_track+0x20/0x40\n[ 54.865143] kasan_save_alloc_info+0x40/0x58\n[ 54.869487] __kasan_kmalloc+0xd4/0xd8\n[ 54.873295] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 54.877897] kasan_atomics+0xb8/0x2e8\n[ 54.881620] kunit_try_run_case+0x14c/0x3d0\n[ 54.885877] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 54.891443] kthread+0x24c/0x2d0\n[ 54.894732] ret_from_fork+0x10/0x20\n[ 54.898368] \n[ 54.899891] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 54.899891] which belongs to the cache kmalloc-64 of size 64\n[ 54.912370] The buggy address is located 0 bytes to the right of\n[ 54.912370] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 54.925373] \n[ 54.926897] The buggy address belongs to the physical page:\n[ 54.932542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 54.940638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 54.947245] page_type: f5(slab)\n[ 54.950444] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 54.958280] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 54.966112] page dumped because: kasan: bad access detected\n[ 54.971758] \n[ 54.973280] Memory state around the buggy address:\n[ 54.978135] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.985448] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 54.992761] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 55.000071] ^\n[ 55.004928] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.012240] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.019551] ==================================================================", "[ 59.018885] ==================================================================\n[ 59.026196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858\n[ 59.033599] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 59.041088] \n[ 59.042612] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 59.042636] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 59.042644] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 59.042653] Call trace:\n[ 59.042658] show_stack+0x20/0x38 (C)\n[ 59.042673] dump_stack_lvl+0x8c/0xd0\n[ 59.042686] print_report+0x118/0x5e0\n[ 59.042703] kasan_report+0xc8/0x118\n[ 59.042718] kasan_check_range+0x100/0x1a8\n[ 59.042736] __kasan_check_write+0x20/0x30\n[ 59.042753] kasan_atomics_helper+0xf88/0x4858\n[ 59.042770] kasan_atomics+0x198/0x2e8\n[ 59.042784] kunit_try_run_case+0x14c/0x3d0\n[ 59.042804] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.042822] kthread+0x24c/0x2d0\n[ 59.042837] ret_from_fork+0x10/0x20\n[ 59.042853] \n[ 59.113554] Allocated by task 334:\n[ 59.117010] kasan_save_stack+0x3c/0x68\n[ 59.120907] kasan_save_track+0x20/0x40\n[ 59.124803] kasan_save_alloc_info+0x40/0x58\n[ 59.129146] __kasan_kmalloc+0xd4/0xd8\n[ 59.132955] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 59.137556] kasan_atomics+0xb8/0x2e8\n[ 59.141278] kunit_try_run_case+0x14c/0x3d0\n[ 59.145534] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 59.151101] kthread+0x24c/0x2d0\n[ 59.154390] ret_from_fork+0x10/0x20\n[ 59.158026] \n[ 59.159549] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 59.159549] which belongs to the cache kmalloc-64 of size 64\n[ 59.172029] The buggy address is located 0 bytes to the right of\n[ 59.172029] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 59.185033] \n[ 59.186556] The buggy address belongs to the physical page:\n[ 59.192202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 59.200300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 59.206908] page_type: f5(slab)\n[ 59.210106] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 59.217942] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 59.225774] page dumped because: kasan: bad access detected\n[ 59.231421] \n[ 59.232943] Memory state around the buggy address:\n[ 59.237799] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 59.245112] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 59.252424] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 59.259734] ^\n[ 59.264591] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.271902] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 59.279212] ==================================================================", "[ 55.291262] ==================================================================\n[ 55.298573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858\n[ 55.305976] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 55.313465] \n[ 55.314989] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 55.315013] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 55.315020] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 55.315030] Call trace:\n[ 55.315035] show_stack+0x20/0x38 (C)\n[ 55.315052] dump_stack_lvl+0x8c/0xd0\n[ 55.315066] print_report+0x118/0x5e0\n[ 55.315083] kasan_report+0xc8/0x118\n[ 55.315100] kasan_check_range+0x100/0x1a8\n[ 55.315118] __kasan_check_write+0x20/0x30\n[ 55.315136] kasan_atomics_helper+0xb70/0x4858\n[ 55.315153] kasan_atomics+0x198/0x2e8\n[ 55.315169] kunit_try_run_case+0x14c/0x3d0\n[ 55.315188] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.315205] kthread+0x24c/0x2d0\n[ 55.315221] ret_from_fork+0x10/0x20\n[ 55.315236] \n[ 55.385942] Allocated by task 334:\n[ 55.389399] kasan_save_stack+0x3c/0x68\n[ 55.393296] kasan_save_track+0x20/0x40\n[ 55.397192] kasan_save_alloc_info+0x40/0x58\n[ 55.401534] __kasan_kmalloc+0xd4/0xd8\n[ 55.405342] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 55.409943] kasan_atomics+0xb8/0x2e8\n[ 55.413664] kunit_try_run_case+0x14c/0x3d0\n[ 55.417921] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.423488] kthread+0x24c/0x2d0\n[ 55.426778] ret_from_fork+0x10/0x20\n[ 55.430414] \n[ 55.431936] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 55.431936] which belongs to the cache kmalloc-64 of size 64\n[ 55.444415] The buggy address is located 0 bytes to the right of\n[ 55.444415] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 55.457418] \n[ 55.458940] The buggy address belongs to the physical page:\n[ 55.464586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 55.472681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 55.479288] page_type: f5(slab)\n[ 55.482486] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 55.490322] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 55.498155] page dumped because: kasan: bad access detected\n[ 55.503801] \n[ 55.505323] Memory state around the buggy address:\n[ 55.510179] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 55.517491] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 55.524804] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 55.532114] ^\n[ 55.536970] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.544282] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.551593] ==================================================================", "[ 60.893765] ==================================================================\n[ 60.901076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858\n[ 60.908568] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 60.916056] \n[ 60.917581] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 60.917605] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 60.917613] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 60.917623] Call trace:\n[ 60.917628] show_stack+0x20/0x38 (C)\n[ 60.917645] dump_stack_lvl+0x8c/0xd0\n[ 60.917659] print_report+0x118/0x5e0\n[ 60.917677] kasan_report+0xc8/0x118\n[ 60.917692] kasan_check_range+0x100/0x1a8\n[ 60.917709] __kasan_check_write+0x20/0x30\n[ 60.917727] kasan_atomics_helper+0x126c/0x4858\n[ 60.917742] kasan_atomics+0x198/0x2e8\n[ 60.917756] kunit_try_run_case+0x14c/0x3d0\n[ 60.917775] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 60.917791] kthread+0x24c/0x2d0\n[ 60.917807] ret_from_fork+0x10/0x20\n[ 60.917822] \n[ 60.988609] Allocated by task 334:\n[ 60.992066] kasan_save_stack+0x3c/0x68\n[ 60.995962] kasan_save_track+0x20/0x40\n[ 60.999858] kasan_save_alloc_info+0x40/0x58\n[ 61.004199] __kasan_kmalloc+0xd4/0xd8\n[ 61.008006] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 61.012606] kasan_atomics+0xb8/0x2e8\n[ 61.016327] kunit_try_run_case+0x14c/0x3d0\n[ 61.020582] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.026148] kthread+0x24c/0x2d0\n[ 61.029438] ret_from_fork+0x10/0x20\n[ 61.033073] \n[ 61.034596] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 61.034596] which belongs to the cache kmalloc-64 of size 64\n[ 61.047076] The buggy address is located 0 bytes to the right of\n[ 61.047076] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 61.060078] \n[ 61.061601] The buggy address belongs to the physical page:\n[ 61.067247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 61.075343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 61.081951] page_type: f5(slab)\n[ 61.085150] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 61.092987] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 61.100820] page dumped because: kasan: bad access detected\n[ 61.106467] \n[ 61.107988] Memory state around the buggy address:\n[ 61.112844] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.120157] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.127469] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 61.134779] ^\n[ 61.139636] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.146947] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.154257] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_atomics_helper-1d2481ddbf243ee2e3d2768bb2b34990af189b126c48c441ac19312dfd1f070f": { "log_lines": [ "[ 56.090997] ==================================================================\n[ 56.098309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858\n[ 56.105801] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 56.113202] \n[ 56.114728] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 56.114751] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 56.114760] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 56.114770] Call trace:\n[ 56.114777] show_stack+0x20/0x38 (C)\n[ 56.114793] dump_stack_lvl+0x8c/0xd0\n[ 56.114807] print_report+0x118/0x5e0\n[ 56.114822] kasan_report+0xc8/0x118\n[ 56.114838] __asan_report_load4_noabort+0x20/0x30\n[ 56.114857] kasan_atomics_helper+0x3de4/0x4858\n[ 56.114874] kasan_atomics+0x198/0x2e8\n[ 56.114889] kunit_try_run_case+0x14c/0x3d0\n[ 56.114908] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.114925] kthread+0x24c/0x2d0\n[ 56.114942] ret_from_fork+0x10/0x20\n[ 56.114958] \n[ 56.182315] Allocated by task 334:\n[ 56.185771] kasan_save_stack+0x3c/0x68\n[ 56.189669] kasan_save_track+0x20/0x40\n[ 56.193566] kasan_save_alloc_info+0x40/0x58\n[ 56.197909] __kasan_kmalloc+0xd4/0xd8\n[ 56.201717] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 56.206319] kasan_atomics+0xb8/0x2e8\n[ 56.210040] kunit_try_run_case+0x14c/0x3d0\n[ 56.214296] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.219864] kthread+0x24c/0x2d0\n[ 56.223154] ret_from_fork+0x10/0x20\n[ 56.226790] \n[ 56.228313] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 56.228313] which belongs to the cache kmalloc-64 of size 64\n[ 56.240794] The buggy address is located 0 bytes to the right of\n[ 56.240794] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 56.253798] \n[ 56.255321] The buggy address belongs to the physical page:\n[ 56.260967] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 56.269063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 56.275670] page_type: f5(slab)\n[ 56.278869] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 56.286705] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 56.294537] page dumped because: kasan: bad access detected\n[ 56.300183] \n[ 56.301705] Memory state around the buggy address:\n[ 56.306560] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.313874] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.321187] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 56.328497] ^\n[ 56.333354] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.340666] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.347976] ==================================================================", "[ 49.413748] ==================================================================\n[ 49.421070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858\n[ 49.428574] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 49.435980] \n[ 49.437511] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 49.437537] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 49.437546] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 49.437558] Call trace:\n[ 49.437565] show_stack+0x20/0x38 (C)\n[ 49.437582] dump_stack_lvl+0x8c/0xd0\n[ 49.437597] print_report+0x118/0x5e0\n[ 49.437616] kasan_report+0xc8/0x118\n[ 49.437634] __asan_report_load4_noabort+0x20/0x30\n[ 49.437653] kasan_atomics_helper+0x40fc/0x4858\n[ 49.437672] kasan_atomics+0x198/0x2e8\n[ 49.437689] kunit_try_run_case+0x14c/0x3d0\n[ 49.437709] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.437729] kthread+0x24c/0x2d0\n[ 49.437746] ret_from_fork+0x10/0x20\n[ 49.437764] \n[ 49.505145] Allocated by task 334:\n[ 49.508604] kasan_save_stack+0x3c/0x68\n[ 49.512515] kasan_save_track+0x20/0x40\n[ 49.516425] kasan_save_alloc_info+0x40/0x58\n[ 49.520769] __kasan_kmalloc+0xd4/0xd8\n[ 49.524591] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 49.529193] kasan_atomics+0xb8/0x2e8\n[ 49.532918] kunit_try_run_case+0x14c/0x3d0\n[ 49.537176] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.542750] kthread+0x24c/0x2d0\n[ 49.546045] ret_from_fork+0x10/0x20\n[ 49.549684] \n[ 49.551214] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 49.551214] which belongs to the cache kmalloc-64 of size 64\n[ 49.563699] The buggy address is located 0 bytes to the right of\n[ 49.563699] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 49.576709] \n[ 49.578240] The buggy address belongs to the physical page:\n[ 49.583889] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 49.591992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 49.598608] page_type: f5(slab)\n[ 49.601813] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 49.609660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 49.617502] page dumped because: kasan: bad access detected\n[ 49.623154] \n[ 49.624687] Memory state around the buggy address:\n[ 49.629549] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.636863] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.644179] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 49.651494] ^\n[ 49.656355] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.663672] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.670986] ==================================================================", "[ 55.558961] ==================================================================\n[ 55.566274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858\n[ 55.573764] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 55.581165] \n[ 55.582690] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 55.582713] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 55.582721] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 55.582733] Call trace:\n[ 55.582739] show_stack+0x20/0x38 (C)\n[ 55.582756] dump_stack_lvl+0x8c/0xd0\n[ 55.582770] print_report+0x118/0x5e0\n[ 55.582786] kasan_report+0xc8/0x118\n[ 55.582804] __asan_report_load4_noabort+0x20/0x30\n[ 55.582823] kasan_atomics_helper+0x3dbc/0x4858\n[ 55.582840] kasan_atomics+0x198/0x2e8\n[ 55.582854] kunit_try_run_case+0x14c/0x3d0\n[ 55.582874] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.582891] kthread+0x24c/0x2d0\n[ 55.582906] ret_from_fork+0x10/0x20\n[ 55.582923] \n[ 55.650278] Allocated by task 334:\n[ 55.653734] kasan_save_stack+0x3c/0x68\n[ 55.657631] kasan_save_track+0x20/0x40\n[ 55.661527] kasan_save_alloc_info+0x40/0x58\n[ 55.665869] __kasan_kmalloc+0xd4/0xd8\n[ 55.669677] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 55.674277] kasan_atomics+0xb8/0x2e8\n[ 55.677997] kunit_try_run_case+0x14c/0x3d0\n[ 55.682253] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.687818] kthread+0x24c/0x2d0\n[ 55.691107] ret_from_fork+0x10/0x20\n[ 55.694742] \n[ 55.696264] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 55.696264] which belongs to the cache kmalloc-64 of size 64\n[ 55.708745] The buggy address is located 0 bytes to the right of\n[ 55.708745] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 55.721747] \n[ 55.723270] The buggy address belongs to the physical page:\n[ 55.728915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 55.737011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 55.743618] page_type: f5(slab)\n[ 55.746815] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 55.754652] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 55.762484] page dumped because: kasan: bad access detected\n[ 55.768130] \n[ 55.769652] Memory state around the buggy address:\n[ 55.774507] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 55.781820] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 55.789131] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 55.796441] ^\n[ 55.801297] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.808610] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.815920] ==================================================================", "[ 57.155103] ==================================================================\n[ 57.162414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858\n[ 57.169905] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 57.177306] \n[ 57.178831] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 57.178853] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 57.178861] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 57.178870] Call trace:\n[ 57.178875] show_stack+0x20/0x38 (C)\n[ 57.178890] dump_stack_lvl+0x8c/0xd0\n[ 57.178904] print_report+0x118/0x5e0\n[ 57.178919] kasan_report+0xc8/0x118\n[ 57.178936] __asan_report_load4_noabort+0x20/0x30\n[ 57.178955] kasan_atomics_helper+0x3e04/0x4858\n[ 57.178971] kasan_atomics+0x198/0x2e8\n[ 57.178985] kunit_try_run_case+0x14c/0x3d0\n[ 57.179004] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.179022] kthread+0x24c/0x2d0\n[ 57.179038] ret_from_fork+0x10/0x20\n[ 57.179054] \n[ 57.246411] Allocated by task 334:\n[ 57.249866] kasan_save_stack+0x3c/0x68\n[ 57.253763] kasan_save_track+0x20/0x40\n[ 57.257660] kasan_save_alloc_info+0x40/0x58\n[ 57.262002] __kasan_kmalloc+0xd4/0xd8\n[ 57.265809] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 57.270410] kasan_atomics+0xb8/0x2e8\n[ 57.274130] kunit_try_run_case+0x14c/0x3d0\n[ 57.278385] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.283951] kthread+0x24c/0x2d0\n[ 57.287240] ret_from_fork+0x10/0x20\n[ 57.290875] \n[ 57.292398] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 57.292398] which belongs to the cache kmalloc-64 of size 64\n[ 57.304876] The buggy address is located 0 bytes to the right of\n[ 57.304876] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 57.317879] \n[ 57.319402] The buggy address belongs to the physical page:\n[ 57.325048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 57.333144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 57.339750] page_type: f5(slab)\n[ 57.342948] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 57.350783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 57.358615] page dumped because: kasan: bad access detected\n[ 57.364261] \n[ 57.365783] Memory state around the buggy address:\n[ 57.370637] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.377948] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.385261] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 57.392571] ^\n[ 57.397427] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.404738] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.412048] ==================================================================", "[ 48.072450] ==================================================================\n[ 48.087524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858\n[ 48.095029] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 48.102431] \n[ 48.103965] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 48.103990] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 48.103999] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 48.104010] Call trace:\n[ 48.104016] show_stack+0x20/0x38 (C)\n[ 48.104033] dump_stack_lvl+0x8c/0xd0\n[ 48.104049] print_report+0x118/0x5e0\n[ 48.104067] kasan_report+0xc8/0x118\n[ 48.104084] __asan_report_load4_noabort+0x20/0x30\n[ 48.104105] kasan_atomics_helper+0x40a8/0x4858\n[ 48.104124] kasan_atomics+0x198/0x2e8\n[ 48.104139] kunit_try_run_case+0x14c/0x3d0\n[ 48.104160] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.104180] kthread+0x24c/0x2d0\n[ 48.104200] ret_from_fork+0x10/0x20\n[ 48.104218] \n[ 48.171604] Allocated by task 334:\n[ 48.175071] kasan_save_stack+0x3c/0x68\n[ 48.178978] kasan_save_track+0x20/0x40\n[ 48.182881] kasan_save_alloc_info+0x40/0x58\n[ 48.187230] __kasan_kmalloc+0xd4/0xd8\n[ 48.191048] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 48.195655] kasan_atomics+0xb8/0x2e8\n[ 48.199384] kunit_try_run_case+0x14c/0x3d0\n[ 48.203646] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.209213] kthread+0x24c/0x2d0\n[ 48.212503] ret_from_fork+0x10/0x20\n[ 48.216147] \n[ 48.217678] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 48.217678] which belongs to the cache kmalloc-64 of size 64\n[ 48.230166] The buggy address is located 0 bytes to the right of\n[ 48.230166] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 48.243174] \n[ 48.244704] The buggy address belongs to the physical page:\n[ 48.250348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 48.258454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 48.265066] page_type: f5(slab)\n[ 48.268264] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 48.276110] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 48.283952] page dumped because: kasan: bad access detected\n[ 48.289599] \n[ 48.291130] Memory state around the buggy address:\n[ 48.295989] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 48.303303] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 48.310619] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 48.317930] ^\n[ 48.322790] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.330107] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.337419] ==================================================================", "[ 56.623033] ==================================================================\n[ 56.630345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858\n[ 56.637834] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 56.645236] \n[ 56.646761] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 56.646784] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 56.646792] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 56.646802] Call trace:\n[ 56.646807] show_stack+0x20/0x38 (C)\n[ 56.646823] dump_stack_lvl+0x8c/0xd0\n[ 56.646837] print_report+0x118/0x5e0\n[ 56.646854] kasan_report+0xc8/0x118\n[ 56.646870] __asan_report_load4_noabort+0x20/0x30\n[ 56.646889] kasan_atomics_helper+0x3dd8/0x4858\n[ 56.646906] kasan_atomics+0x198/0x2e8\n[ 56.646921] kunit_try_run_case+0x14c/0x3d0\n[ 56.646940] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.646960] kthread+0x24c/0x2d0\n[ 56.646975] ret_from_fork+0x10/0x20\n[ 56.646992] \n[ 56.714349] Allocated by task 334:\n[ 56.717804] kasan_save_stack+0x3c/0x68\n[ 56.721703] kasan_save_track+0x20/0x40\n[ 56.725600] kasan_save_alloc_info+0x40/0x58\n[ 56.729941] __kasan_kmalloc+0xd4/0xd8\n[ 56.733749] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 56.738351] kasan_atomics+0xb8/0x2e8\n[ 56.742073] kunit_try_run_case+0x14c/0x3d0\n[ 56.746328] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 56.751895] kthread+0x24c/0x2d0\n[ 56.755186] ret_from_fork+0x10/0x20\n[ 56.758820] \n[ 56.760343] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 56.760343] which belongs to the cache kmalloc-64 of size 64\n[ 56.772824] The buggy address is located 0 bytes to the right of\n[ 56.772824] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 56.785826] \n[ 56.787349] The buggy address belongs to the physical page:\n[ 56.792996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 56.801102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 56.807710] page_type: f5(slab)\n[ 56.810909] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 56.818745] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 56.826577] page dumped because: kasan: bad access detected\n[ 56.832224] \n[ 56.833745] Memory state around the buggy address:\n[ 56.838601] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.845913] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 56.853225] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 56.860536] ^\n[ 56.865392] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.872704] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 56.880015] ==================================================================", "[ 53.423925] ==================================================================\n[ 53.431239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858\n[ 53.438730] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 53.446132] \n[ 53.447658] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 53.447682] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 53.447691] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 53.447702] Call trace:\n[ 53.447707] show_stack+0x20/0x38 (C)\n[ 53.447723] dump_stack_lvl+0x8c/0xd0\n[ 53.447736] print_report+0x118/0x5e0\n[ 53.447752] kasan_report+0xc8/0x118\n[ 53.447768] __asan_report_load4_noabort+0x20/0x30\n[ 53.447788] kasan_atomics_helper+0x42d8/0x4858\n[ 53.447804] kasan_atomics+0x198/0x2e8\n[ 53.447818] kunit_try_run_case+0x14c/0x3d0\n[ 53.447837] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.447855] kthread+0x24c/0x2d0\n[ 53.447872] ret_from_fork+0x10/0x20\n[ 53.447888] \n[ 53.515248] Allocated by task 334:\n[ 53.518705] kasan_save_stack+0x3c/0x68\n[ 53.522603] kasan_save_track+0x20/0x40\n[ 53.526499] kasan_save_alloc_info+0x40/0x58\n[ 53.530842] __kasan_kmalloc+0xd4/0xd8\n[ 53.534651] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 53.539253] kasan_atomics+0xb8/0x2e8\n[ 53.542975] kunit_try_run_case+0x14c/0x3d0\n[ 53.547233] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 53.552801] kthread+0x24c/0x2d0\n[ 53.556090] ret_from_fork+0x10/0x20\n[ 53.559725] \n[ 53.561248] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 53.561248] which belongs to the cache kmalloc-64 of size 64\n[ 53.573728] The buggy address is located 0 bytes to the right of\n[ 53.573728] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 53.586731] \n[ 53.588254] The buggy address belongs to the physical page:\n[ 53.593901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 53.601998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 53.608606] page_type: f5(slab)\n[ 53.611805] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 53.619643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 53.627477] page dumped because: kasan: bad access detected\n[ 53.633124] \n[ 53.634647] Memory state around the buggy address:\n[ 53.639503] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.646816] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 53.654130] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 53.661443] ^\n[ 53.666301] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.673614] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 53.680925] ==================================================================", "[ 55.026919] ==================================================================\n[ 55.034232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858\n[ 55.041723] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 55.049125] \n[ 55.050650] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 55.050674] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 55.050681] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 55.050692] Call trace:\n[ 55.050698] show_stack+0x20/0x38 (C)\n[ 55.050713] dump_stack_lvl+0x8c/0xd0\n[ 55.050726] print_report+0x118/0x5e0\n[ 55.050744] kasan_report+0xc8/0x118\n[ 55.050760] __asan_report_load4_noabort+0x20/0x30\n[ 55.050780] kasan_atomics_helper+0x3dcc/0x4858\n[ 55.050796] kasan_atomics+0x198/0x2e8\n[ 55.050811] kunit_try_run_case+0x14c/0x3d0\n[ 55.050830] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.050846] kthread+0x24c/0x2d0\n[ 55.050862] ret_from_fork+0x10/0x20\n[ 55.050877] \n[ 55.118233] Allocated by task 334:\n[ 55.121688] kasan_save_stack+0x3c/0x68\n[ 55.125587] kasan_save_track+0x20/0x40\n[ 55.129484] kasan_save_alloc_info+0x40/0x58\n[ 55.133826] __kasan_kmalloc+0xd4/0xd8\n[ 55.137634] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 55.142234] kasan_atomics+0xb8/0x2e8\n[ 55.145955] kunit_try_run_case+0x14c/0x3d0\n[ 55.150210] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 55.155776] kthread+0x24c/0x2d0\n[ 55.159066] ret_from_fork+0x10/0x20\n[ 55.162702] \n[ 55.164224] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 55.164224] which belongs to the cache kmalloc-64 of size 64\n[ 55.176703] The buggy address is located 0 bytes to the right of\n[ 55.176703] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 55.189705] \n[ 55.191229] The buggy address belongs to the physical page:\n[ 55.196875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 55.204970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 55.211577] page_type: f5(slab)\n[ 55.214775] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 55.222612] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 55.230443] page dumped because: kasan: bad access detected\n[ 55.236089] \n[ 55.237612] Memory state around the buggy address:\n[ 55.242467] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 55.249780] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 55.257092] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 55.264403] ^\n[ 55.269260] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.276571] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 55.283881] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_atomics_helper-8c8462b6f8d59afde62e2650a4921cd7da0ed193d2d4aa24295e316d879a7135": { "log_lines": [ "[ 64.365398] ==================================================================\n[ 64.372710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858\n[ 64.380201] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 64.387604] \n[ 64.389129] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 64.389152] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 64.389159] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 64.389169] Call trace:\n[ 64.389175] show_stack+0x20/0x38 (C)\n[ 64.389192] dump_stack_lvl+0x8c/0xd0\n[ 64.389205] print_report+0x118/0x5e0\n[ 64.389222] kasan_report+0xc8/0x118\n[ 64.389238] __asan_report_load8_noabort+0x20/0x30\n[ 64.389256] kasan_atomics_helper+0x3e10/0x4858\n[ 64.389273] kasan_atomics+0x198/0x2e8\n[ 64.389287] kunit_try_run_case+0x14c/0x3d0\n[ 64.389305] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.389322] kthread+0x24c/0x2d0\n[ 64.389337] ret_from_fork+0x10/0x20\n[ 64.389353] \n[ 64.456714] Allocated by task 334:\n[ 64.460170] kasan_save_stack+0x3c/0x68\n[ 64.464068] kasan_save_track+0x20/0x40\n[ 64.467964] kasan_save_alloc_info+0x40/0x58\n[ 64.472306] __kasan_kmalloc+0xd4/0xd8\n[ 64.476113] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 64.480714] kasan_atomics+0xb8/0x2e8\n[ 64.484435] kunit_try_run_case+0x14c/0x3d0\n[ 64.488692] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.494258] kthread+0x24c/0x2d0\n[ 64.497548] ret_from_fork+0x10/0x20\n[ 64.501183] \n[ 64.502705] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 64.502705] which belongs to the cache kmalloc-64 of size 64\n[ 64.515184] The buggy address is located 0 bytes to the right of\n[ 64.515184] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 64.528185] \n[ 64.529708] The buggy address belongs to the physical page:\n[ 64.535354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 64.543449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 64.550057] page_type: f5(slab)\n[ 64.553257] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 64.561093] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 64.568927] page dumped because: kasan: bad access detected\n[ 64.574575] \n[ 64.576096] Memory state around the buggy address:\n[ 64.580952] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.588264] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.595577] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 64.602887] ^\n[ 64.607743] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.615055] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.622365] ==================================================================", "[ 61.697382] ==================================================================\n[ 61.704693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858\n[ 61.712184] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 61.719585] \n[ 61.721110] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 61.721133] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 61.721140] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 61.721149] Call trace:\n[ 61.721155] show_stack+0x20/0x38 (C)\n[ 61.721171] dump_stack_lvl+0x8c/0xd0\n[ 61.721185] print_report+0x118/0x5e0\n[ 61.721201] kasan_report+0xc8/0x118\n[ 61.721217] __asan_report_load8_noabort+0x20/0x30\n[ 61.721236] kasan_atomics_helper+0x3f04/0x4858\n[ 61.721253] kasan_atomics+0x198/0x2e8\n[ 61.721267] kunit_try_run_case+0x14c/0x3d0\n[ 61.721286] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.721304] kthread+0x24c/0x2d0\n[ 61.721320] ret_from_fork+0x10/0x20\n[ 61.721335] \n[ 61.788680] Allocated by task 334:\n[ 61.792137] kasan_save_stack+0x3c/0x68\n[ 61.796034] kasan_save_track+0x20/0x40\n[ 61.799930] kasan_save_alloc_info+0x40/0x58\n[ 61.804272] __kasan_kmalloc+0xd4/0xd8\n[ 61.808080] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 61.812681] kasan_atomics+0xb8/0x2e8\n[ 61.816401] kunit_try_run_case+0x14c/0x3d0\n[ 61.820657] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 61.826213] kthread+0x24c/0x2d0\n[ 61.829502] ret_from_fork+0x10/0x20\n[ 61.833137] \n[ 61.834659] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 61.834659] which belongs to the cache kmalloc-64 of size 64\n[ 61.847138] The buggy address is located 0 bytes to the right of\n[ 61.847138] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 61.860141] \n[ 61.861665] The buggy address belongs to the physical page:\n[ 61.867310] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 61.875405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 61.882014] page_type: f5(slab)\n[ 61.885213] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 61.893049] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 61.900882] page dumped because: kasan: bad access detected\n[ 61.906528] \n[ 61.908050] Memory state around the buggy address:\n[ 61.912905] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.920218] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 61.927531] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 61.934842] ^\n[ 61.939699] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.947010] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 61.954321] ==================================================================", "[ 57.686925] ==================================================================\n[ 57.694238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858\n[ 57.701728] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 57.709131] \n[ 57.710656] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 57.710678] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 57.710686] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 57.710697] Call trace:\n[ 57.710703] show_stack+0x20/0x38 (C)\n[ 57.710718] dump_stack_lvl+0x8c/0xd0\n[ 57.710731] print_report+0x118/0x5e0\n[ 57.710748] kasan_report+0xc8/0x118\n[ 57.710763] __asan_report_load8_noabort+0x20/0x30\n[ 57.710783] kasan_atomics_helper+0x3f58/0x4858\n[ 57.710799] kasan_atomics+0x198/0x2e8\n[ 57.710813] kunit_try_run_case+0x14c/0x3d0\n[ 57.710832] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.710849] kthread+0x24c/0x2d0\n[ 57.710865] ret_from_fork+0x10/0x20\n[ 57.710883] \n[ 57.778237] Allocated by task 334:\n[ 57.781693] kasan_save_stack+0x3c/0x68\n[ 57.785590] kasan_save_track+0x20/0x40\n[ 57.789487] kasan_save_alloc_info+0x40/0x58\n[ 57.793831] __kasan_kmalloc+0xd4/0xd8\n[ 57.797639] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 57.802239] kasan_atomics+0xb8/0x2e8\n[ 57.805960] kunit_try_run_case+0x14c/0x3d0\n[ 57.810215] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.815781] kthread+0x24c/0x2d0\n[ 57.819070] ret_from_fork+0x10/0x20\n[ 57.822705] \n[ 57.824229] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 57.824229] which belongs to the cache kmalloc-64 of size 64\n[ 57.836710] The buggy address is located 0 bytes to the right of\n[ 57.836710] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 57.849713] \n[ 57.851237] The buggy address belongs to the physical page:\n[ 57.856883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 57.864989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 57.871595] page_type: f5(slab)\n[ 57.874794] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 57.882630] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 57.890462] page dumped because: kasan: bad access detected\n[ 57.896110] \n[ 57.897632] Memory state around the buggy address:\n[ 57.902487] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.909798] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.917110] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 57.924422] ^\n[ 57.929278] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.936590] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.943899] ==================================================================", "[ 63.301019] ==================================================================\n[ 63.308332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858\n[ 63.315823] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 63.323225] \n[ 63.324750] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 63.324773] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 63.324780] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 63.324789] Call trace:\n[ 63.324795] show_stack+0x20/0x38 (C)\n[ 63.324811] dump_stack_lvl+0x8c/0xd0\n[ 63.324824] print_report+0x118/0x5e0\n[ 63.324840] kasan_report+0xc8/0x118\n[ 63.324855] __asan_report_load8_noabort+0x20/0x30\n[ 63.324874] kasan_atomics_helper+0x3db0/0x4858\n[ 63.324890] kasan_atomics+0x198/0x2e8\n[ 63.324904] kunit_try_run_case+0x14c/0x3d0\n[ 63.324923] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.324939] kthread+0x24c/0x2d0\n[ 63.324955] ret_from_fork+0x10/0x20\n[ 63.324970] \n[ 63.392326] Allocated by task 334:\n[ 63.395782] kasan_save_stack+0x3c/0x68\n[ 63.399678] kasan_save_track+0x20/0x40\n[ 63.403575] kasan_save_alloc_info+0x40/0x58\n[ 63.407918] __kasan_kmalloc+0xd4/0xd8\n[ 63.411726] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 63.416326] kasan_atomics+0xb8/0x2e8\n[ 63.420047] kunit_try_run_case+0x14c/0x3d0\n[ 63.424303] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.429868] kthread+0x24c/0x2d0\n[ 63.433157] ret_from_fork+0x10/0x20\n[ 63.436791] \n[ 63.438314] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 63.438314] which belongs to the cache kmalloc-64 of size 64\n[ 63.450794] The buggy address is located 0 bytes to the right of\n[ 63.450794] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 63.463797] \n[ 63.465320] The buggy address belongs to the physical page:\n[ 63.470966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 63.479062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 63.485668] page_type: f5(slab)\n[ 63.488867] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 63.496703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 63.504535] page dumped because: kasan: bad access detected\n[ 63.510184] \n[ 63.511706] Memory state around the buggy address:\n[ 63.516561] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 63.523874] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 63.531188] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 63.538500] ^\n[ 63.543358] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.550670] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 63.557980] ==================================================================", "[ 64.897597] ==================================================================\n[ 64.904907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858\n[ 64.912399] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 64.919801] \n[ 64.921325] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 64.921350] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 64.921358] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 64.921369] Call trace:\n[ 64.921374] show_stack+0x20/0x38 (C)\n[ 64.921389] dump_stack_lvl+0x8c/0xd0\n[ 64.921402] print_report+0x118/0x5e0\n[ 64.921418] kasan_report+0xc8/0x118\n[ 64.921433] __asan_report_load8_noabort+0x20/0x30\n[ 64.921452] kasan_atomics_helper+0x3e20/0x4858\n[ 64.921468] kasan_atomics+0x198/0x2e8\n[ 64.921483] kunit_try_run_case+0x14c/0x3d0\n[ 64.921501] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 64.921517] kthread+0x24c/0x2d0\n[ 64.921533] ret_from_fork+0x10/0x20\n[ 64.921549] \n[ 64.988903] Allocated by task 334:\n[ 64.992358] kasan_save_stack+0x3c/0x68\n[ 64.996255] kasan_save_track+0x20/0x40\n[ 65.000151] kasan_save_alloc_info+0x40/0x58\n[ 65.004493] __kasan_kmalloc+0xd4/0xd8\n[ 65.008301] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 65.012902] kasan_atomics+0xb8/0x2e8\n[ 65.016622] kunit_try_run_case+0x14c/0x3d0\n[ 65.020877] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 65.026443] kthread+0x24c/0x2d0\n[ 65.029731] ret_from_fork+0x10/0x20\n[ 65.033367] \n[ 65.034889] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 65.034889] which belongs to the cache kmalloc-64 of size 64\n[ 65.047369] The buggy address is located 0 bytes to the right of\n[ 65.047369] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 65.060372] \n[ 65.061896] The buggy address belongs to the physical page:\n[ 65.067542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 65.075638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 65.082245] page_type: f5(slab)\n[ 65.085443] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 65.093280] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 65.101113] page dumped because: kasan: bad access detected\n[ 65.106759] \n[ 65.108282] Memory state around the buggy address:\n[ 65.113137] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 65.120449] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 65.127761] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 65.135072] ^\n[ 65.139928] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 65.147240] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 65.154550] ==================================================================", "[ 63.833221] ==================================================================\n[ 63.840532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858\n[ 63.848022] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 63.855424] \n[ 63.856948] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 63.856970] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 63.856978] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 63.856989] Call trace:\n[ 63.856994] show_stack+0x20/0x38 (C)\n[ 63.857009] dump_stack_lvl+0x8c/0xd0\n[ 63.857023] print_report+0x118/0x5e0\n[ 63.857040] kasan_report+0xc8/0x118\n[ 63.857055] __asan_report_load8_noabort+0x20/0x30\n[ 63.857075] kasan_atomics_helper+0x3df4/0x4858\n[ 63.857091] kasan_atomics+0x198/0x2e8\n[ 63.857105] kunit_try_run_case+0x14c/0x3d0\n[ 63.857124] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.857141] kthread+0x24c/0x2d0\n[ 63.857157] ret_from_fork+0x10/0x20\n[ 63.857173] \n[ 63.924529] Allocated by task 334:\n[ 63.927984] kasan_save_stack+0x3c/0x68\n[ 63.931881] kasan_save_track+0x20/0x40\n[ 63.935776] kasan_save_alloc_info+0x40/0x58\n[ 63.940118] __kasan_kmalloc+0xd4/0xd8\n[ 63.943925] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 63.948526] kasan_atomics+0xb8/0x2e8\n[ 63.952246] kunit_try_run_case+0x14c/0x3d0\n[ 63.956502] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 63.962068] kthread+0x24c/0x2d0\n[ 63.965358] ret_from_fork+0x10/0x20\n[ 63.968993] \n[ 63.970515] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 63.970515] which belongs to the cache kmalloc-64 of size 64\n[ 63.982994] The buggy address is located 0 bytes to the right of\n[ 63.982994] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 63.995997] \n[ 63.997520] The buggy address belongs to the physical page:\n[ 64.003166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 64.011262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 64.017869] page_type: f5(slab)\n[ 64.021068] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 64.028904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 64.036736] page dumped because: kasan: bad access detected\n[ 64.042383] \n[ 64.043906] Memory state around the buggy address:\n[ 64.048761] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.056073] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 64.063385] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 64.070695] ^\n[ 64.075552] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.082863] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 64.090173] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_atomics_helper-0b0247fb6445f32d4bf07bd547f89a6a473a4c503e2371f878dd6ea4249eff05": { "log_lines": [ "[ 49.946920] ==================================================================\n[ 49.954233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858\n[ 49.961724] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 49.969212] \n[ 49.970739] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 49.970763] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 49.970770] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 49.970781] Call trace:\n[ 49.970787] show_stack+0x20/0x38 (C)\n[ 49.970803] dump_stack_lvl+0x8c/0xd0\n[ 49.970816] print_report+0x118/0x5e0\n[ 49.970832] kasan_report+0xc8/0x118\n[ 49.970848] __asan_report_store4_noabort+0x20/0x30\n[ 49.970868] kasan_atomics_helper+0x3f94/0x4858\n[ 49.970885] kasan_atomics+0x198/0x2e8\n[ 49.970899] kunit_try_run_case+0x14c/0x3d0\n[ 49.970917] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.970933] kthread+0x24c/0x2d0\n[ 49.970949] ret_from_fork+0x10/0x20\n[ 49.970966] \n[ 50.038380] Allocated by task 334:\n[ 50.041835] kasan_save_stack+0x3c/0x68\n[ 50.045733] kasan_save_track+0x20/0x40\n[ 50.049628] kasan_save_alloc_info+0x40/0x58\n[ 50.053968] __kasan_kmalloc+0xd4/0xd8\n[ 50.057775] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 50.062374] kasan_atomics+0xb8/0x2e8\n[ 50.066093] kunit_try_run_case+0x14c/0x3d0\n[ 50.070347] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 50.075911] kthread+0x24c/0x2d0\n[ 50.079201] ret_from_fork+0x10/0x20\n[ 50.082834] \n[ 50.084366] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 50.084366] which belongs to the cache kmalloc-64 of size 64\n[ 50.096842] The buggy address is located 0 bytes to the right of\n[ 50.096842] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 50.109850] \n[ 50.111383] The buggy address belongs to the physical page:\n[ 50.117028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 50.125132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 50.131748] page_type: f5(slab)\n[ 50.134947] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 50.142780] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 50.150610] page dumped because: kasan: bad access detected\n[ 50.156254] \n[ 50.157776] Memory state around the buggy address:\n[ 50.162631] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.169941] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 50.177251] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 50.184560] ^\n[ 50.189415] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.196724] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 50.204031] ==================================================================", "[ 48.344816] ==================================================================\n[ 48.352135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858\n[ 48.359628] Write of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 48.367120] \n[ 48.368656] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 48.368682] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 48.368692] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 48.368704] Call trace:\n[ 48.368711] show_stack+0x20/0x38 (C)\n[ 48.368728] dump_stack_lvl+0x8c/0xd0\n[ 48.368744] print_report+0x118/0x5e0\n[ 48.368763] kasan_report+0xc8/0x118\n[ 48.368781] __asan_report_store4_noabort+0x20/0x30\n[ 48.368802] kasan_atomics_helper+0x3f7c/0x4858\n[ 48.368820] kasan_atomics+0x198/0x2e8\n[ 48.368837] kunit_try_run_case+0x14c/0x3d0\n[ 48.368856] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.368876] kthread+0x24c/0x2d0\n[ 48.368893] ret_from_fork+0x10/0x20\n[ 48.368911] \n[ 48.436382] Allocated by task 334:\n[ 48.439845] kasan_save_stack+0x3c/0x68\n[ 48.443755] kasan_save_track+0x20/0x40\n[ 48.447655] kasan_save_alloc_info+0x40/0x58\n[ 48.452006] __kasan_kmalloc+0xd4/0xd8\n[ 48.455822] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 48.460422] kasan_atomics+0xb8/0x2e8\n[ 48.464146] kunit_try_run_case+0x14c/0x3d0\n[ 48.468401] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.473972] kthread+0x24c/0x2d0\n[ 48.477268] ret_from_fork+0x10/0x20\n[ 48.480905] \n[ 48.482436] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 48.482436] which belongs to the cache kmalloc-64 of size 64\n[ 48.494919] The buggy address is located 0 bytes to the right of\n[ 48.494919] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 48.507928] \n[ 48.509457] The buggy address belongs to the physical page:\n[ 48.515106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 48.523218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 48.529830] page_type: f5(slab)\n[ 48.533035] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 48.540880] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 48.548721] page dumped because: kasan: bad access detected\n[ 48.554372] \n[ 48.555909] Memory state around the buggy address:\n[ 48.560770] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 48.568085] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 48.575400] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 48.582713] ^\n[ 48.587574] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.594890] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.602202] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_atomics_helper-12ed02b20d4b2f3b16d973a0a61f9f6af9e97de52e7fa13513bf7af1fc107864": { "log_lines": [ "[ 48.610378] ==================================================================\n[ 48.617708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858\n[ 48.625117] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 48.632523] \n[ 48.634051] CPU: 4 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 48.634079] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 48.634086] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 48.634096] Call trace:\n[ 48.634103] show_stack+0x20/0x38 (C)\n[ 48.634120] dump_stack_lvl+0x8c/0xd0\n[ 48.634134] print_report+0x118/0x5e0\n[ 48.634152] kasan_report+0xc8/0x118\n[ 48.634168] kasan_check_range+0x100/0x1a8\n[ 48.634188] __kasan_check_read+0x20/0x30\n[ 48.634206] kasan_atomics_helper+0x1ec/0x4858\n[ 48.634222] kasan_atomics+0x198/0x2e8\n[ 48.634239] kunit_try_run_case+0x14c/0x3d0\n[ 48.634258] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.634275] kthread+0x24c/0x2d0\n[ 48.634293] ret_from_fork+0x10/0x20\n[ 48.634310] \n[ 48.704928] Allocated by task 334:\n[ 48.708388] kasan_save_stack+0x3c/0x68\n[ 48.712295] kasan_save_track+0x20/0x40\n[ 48.716196] kasan_save_alloc_info+0x40/0x58\n[ 48.720534] __kasan_kmalloc+0xd4/0xd8\n[ 48.724346] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 48.728944] kasan_atomics+0xb8/0x2e8\n[ 48.732670] kunit_try_run_case+0x14c/0x3d0\n[ 48.736924] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 48.742484] kthread+0x24c/0x2d0\n[ 48.745768] ret_from_fork+0x10/0x20\n[ 48.749408] \n[ 48.750931] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 48.750931] which belongs to the cache kmalloc-64 of size 64\n[ 48.763409] The buggy address is located 0 bytes to the right of\n[ 48.763409] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 48.776417] \n[ 48.777940] The buggy address belongs to the physical page:\n[ 48.783587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 48.791685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 48.798299] page_type: f5(slab)\n[ 48.801496] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 48.809334] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 48.817168] page dumped because: kasan: bad access detected\n[ 48.822810] \n[ 48.824339] Memory state around the buggy address:\n[ 48.829201] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 48.836515] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 48.843828] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 48.851133] ^\n[ 48.855989] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.863294] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 48.870608] ==================================================================", "[ 57.419426] ==================================================================\n[ 57.426737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858\n[ 57.434141] Read of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 57.441542] \n[ 57.443067] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 57.443089] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 57.443097] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 57.443107] Call trace:\n[ 57.443112] show_stack+0x20/0x38 (C)\n[ 57.443127] dump_stack_lvl+0x8c/0xd0\n[ 57.443140] print_report+0x118/0x5e0\n[ 57.443156] kasan_report+0xc8/0x118\n[ 57.443172] kasan_check_range+0x100/0x1a8\n[ 57.443189] __kasan_check_read+0x20/0x30\n[ 57.443207] kasan_atomics_helper+0xdd4/0x4858\n[ 57.443224] kasan_atomics+0x198/0x2e8\n[ 57.443238] kunit_try_run_case+0x14c/0x3d0\n[ 57.443257] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.443273] kthread+0x24c/0x2d0\n[ 57.443289] ret_from_fork+0x10/0x20\n[ 57.443304] \n[ 57.513918] Allocated by task 334:\n[ 57.517373] kasan_save_stack+0x3c/0x68\n[ 57.521270] kasan_save_track+0x20/0x40\n[ 57.525166] kasan_save_alloc_info+0x40/0x58\n[ 57.529508] __kasan_kmalloc+0xd4/0xd8\n[ 57.533316] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 57.537916] kasan_atomics+0xb8/0x2e8\n[ 57.541636] kunit_try_run_case+0x14c/0x3d0\n[ 57.545891] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 57.551458] kthread+0x24c/0x2d0\n[ 57.554747] ret_from_fork+0x10/0x20\n[ 57.558382] \n[ 57.559904] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 57.559904] which belongs to the cache kmalloc-64 of size 64\n[ 57.572384] The buggy address is located 0 bytes to the right of\n[ 57.572384] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 57.585384] \n[ 57.586908] The buggy address belongs to the physical page:\n[ 57.592553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 57.600649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 57.607256] page_type: f5(slab)\n[ 57.610454] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 57.618289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 57.626121] page dumped because: kasan: bad access detected\n[ 57.631767] \n[ 57.633289] Memory state around the buggy address:\n[ 57.638144] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.645456] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 57.652770] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 57.660081] ^\n[ 57.664936] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.672248] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 57.679559] ==================================================================", "[ 49.145925] ==================================================================\n[ 49.153243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858\n[ 49.160658] Read of size 4 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 49.168072] \n[ 49.169604] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 49.169629] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 49.169639] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 49.169652] Call trace:\n[ 49.169659] show_stack+0x20/0x38 (C)\n[ 49.169675] dump_stack_lvl+0x8c/0xd0\n[ 49.169690] print_report+0x118/0x5e0\n[ 49.169709] kasan_report+0xc8/0x118\n[ 49.169726] kasan_check_range+0x100/0x1a8\n[ 49.169747] __kasan_check_read+0x20/0x30\n[ 49.169766] kasan_atomics_helper+0x2b0/0x4858\n[ 49.169784] kasan_atomics+0x198/0x2e8\n[ 49.169802] kunit_try_run_case+0x14c/0x3d0\n[ 49.169822] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.169840] kthread+0x24c/0x2d0\n[ 49.169858] ret_from_fork+0x10/0x20\n[ 49.169874] \n[ 49.240527] Allocated by task 334:\n[ 49.243993] kasan_save_stack+0x3c/0x68\n[ 49.247900] kasan_save_track+0x20/0x40\n[ 49.251805] kasan_save_alloc_info+0x40/0x58\n[ 49.256154] __kasan_kmalloc+0xd4/0xd8\n[ 49.259970] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 49.264575] kasan_atomics+0xb8/0x2e8\n[ 49.268305] kunit_try_run_case+0x14c/0x3d0\n[ 49.272569] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 49.278135] kthread+0x24c/0x2d0\n[ 49.281424] ret_from_fork+0x10/0x20\n[ 49.285068] \n[ 49.286598] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 49.286598] which belongs to the cache kmalloc-64 of size 64\n[ 49.299087] The buggy address is located 0 bytes to the right of\n[ 49.299087] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 49.312097] \n[ 49.313628] The buggy address belongs to the physical page:\n[ 49.319272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 49.327376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 49.334000] page_type: f5(slab)\n[ 49.337200] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 49.345047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 49.352891] page dumped because: kasan: bad access detected\n[ 49.358536] \n[ 49.360065] Memory state around the buggy address:\n[ 49.364925] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.372241] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 49.379556] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 49.386870] ^\n[ 49.391728] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.399045] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 49.406358] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_kasan_atomics_helper-27217fcfe80b7d5854696cb0e68b0516274da54b9bf215b61309b8ebecf75ed9": { "log_lines": [ "[ 58.218980] ==================================================================\n[ 58.226293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858\n[ 58.233784] Write of size 8 at addr ffff1b1dc0cb8330 by task kunit_try_catch/334\n[ 58.241273] \n[ 58.242799] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 58.242822] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 58.242830] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 58.242839] Call trace:\n[ 58.242844] show_stack+0x20/0x38 (C)\n[ 58.242862] dump_stack_lvl+0x8c/0xd0\n[ 58.242875] print_report+0x118/0x5e0\n[ 58.242891] kasan_report+0xc8/0x118\n[ 58.242907] __asan_report_store8_noabort+0x20/0x30\n[ 58.242927] kasan_atomics_helper+0x3e5c/0x4858\n[ 58.242943] kasan_atomics+0x198/0x2e8\n[ 58.242958] kunit_try_run_case+0x14c/0x3d0\n[ 58.242976] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.242995] kthread+0x24c/0x2d0\n[ 58.243011] ret_from_fork+0x10/0x20\n[ 58.243027] \n[ 58.310474] Allocated by task 334:\n[ 58.313930] kasan_save_stack+0x3c/0x68\n[ 58.317827] kasan_save_track+0x20/0x40\n[ 58.321723] kasan_save_alloc_info+0x40/0x58\n[ 58.326067] __kasan_kmalloc+0xd4/0xd8\n[ 58.329875] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 58.334477] kasan_atomics+0xb8/0x2e8\n[ 58.338198] kunit_try_run_case+0x14c/0x3d0\n[ 58.342445] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 58.348011] kthread+0x24c/0x2d0\n[ 58.351301] ret_from_fork+0x10/0x20\n[ 58.354936] \n[ 58.356459] The buggy address belongs to the object at ffff1b1dc0cb8300\n[ 58.356459] which belongs to the cache kmalloc-64 of size 64\n[ 58.368939] The buggy address is located 0 bytes to the right of\n[ 58.368939] allocated 48-byte region [ffff1b1dc0cb8300, ffff1b1dc0cb8330)\n[ 58.381942] \n[ 58.383466] The buggy address belongs to the physical page:\n[ 58.389112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cb8\n[ 58.397208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 58.403815] page_type: f5(slab)\n[ 58.407014] raw: 0bfffe0000000000 ffff1b1dc00028c0 dead000000000122 0000000000000000\n[ 58.414853] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 58.422687] page dumped because: kasan: bad access detected\n[ 58.428333] \n[ 58.429855] Memory state around the buggy address:\n[ 58.434711] ffff1b1dc0cb8200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.442022] ffff1b1dc0cb8280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc\n[ 58.449334] >ffff1b1dc0cb8300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc\n[ 58.456645] ^\n[ 58.461501] ffff1b1dc0cb8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 58.468814] ffff1b1dc0cb8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 58.476124] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_vmalloc-out-of-bounds_in_vmalloc_oob-55f8bd94e08d61058fbf4b2f05619d2dd98c1fe2e16c9002856f295588cd8472": { "log_lines": [ "[ 65.656308] ==================================================================\n[ 65.663634] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0\n[ 65.670425] Read of size 1 at addr ffff8000802997f8 by task kunit_try_catch/338\n[ 65.677831] \n[ 65.679369] CPU: 4 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 65.679395] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 65.679403] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 65.679412] Call trace:\n[ 65.679418] show_stack+0x20/0x38 (C)\n[ 65.679435] dump_stack_lvl+0x8c/0xd0\n[ 65.679450] print_report+0x2fc/0x5e0\n[ 65.679466] kasan_report+0xc8/0x118\n[ 65.679482] __asan_report_load1_noabort+0x20/0x30\n[ 65.679501] vmalloc_oob+0x51c/0x5d0\n[ 65.679514] kunit_try_run_case+0x14c/0x3d0\n[ 65.679533] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 65.679550] kthread+0x24c/0x2d0\n[ 65.679566] ret_from_fork+0x10/0x20\n[ 65.679582] \n[ 65.742179] The buggy address belongs to the virtual mapping at\n[ 65.742179] [ffff800080299000, ffff80008029b000) created by:\n[ 65.742179] vmalloc_oob+0x98/0x5d0\n[ 65.757465] \n[ 65.758990] The buggy address belongs to the physical page:\n[ 65.764639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103844\n[ 65.772737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 65.779356] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 65.787197] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 65.795031] page dumped because: kasan: bad access detected\n[ 65.800679] \n[ 65.802201] Memory state around the buggy address:\n[ 65.807062] ffff800080299680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 65.814375] ffff800080299700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 65.821687] >ffff800080299780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8\n[ 65.828998] ^\n[ 65.836225] ffff800080299800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n[ 65.843531] ffff800080299880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n[ 65.850835] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_vmalloc-out-of-bounds_in_vmalloc_oob-3c3b25047e7033a8179277c75f83671a1a2c380d9cbae9e6c03131260ddb938d": { "log_lines": [ "[ 65.446309] ==================================================================\n[ 65.461620] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0\n[ 65.468413] Read of size 1 at addr ffff8000802997f3 by task kunit_try_catch/338\n[ 65.475824] \n[ 65.477354] CPU: 6 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 65.477381] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 65.477389] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 65.477399] Call trace:\n[ 65.477406] show_stack+0x20/0x38 (C)\n[ 65.477424] dump_stack_lvl+0x8c/0xd0\n[ 65.477441] print_report+0x2fc/0x5e0\n[ 65.477459] kasan_report+0xc8/0x118\n[ 65.477475] __asan_report_load1_noabort+0x20/0x30\n[ 65.477496] vmalloc_oob+0x578/0x5d0\n[ 65.477510] kunit_try_run_case+0x14c/0x3d0\n[ 65.477529] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 65.477547] kthread+0x24c/0x2d0\n[ 65.477562] ret_from_fork+0x10/0x20\n[ 65.477579] \n[ 65.540171] The buggy address belongs to the virtual mapping at\n[ 65.540171] [ffff800080299000, ffff80008029b000) created by:\n[ 65.540171] vmalloc_oob+0x98/0x5d0\n[ 65.555458] \n[ 65.556993] The buggy address belongs to the physical page:\n[ 65.562636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103844\n[ 65.570738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 65.577356] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 65.585198] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 65.593035] page dumped because: kasan: bad access detected\n[ 65.598679] \n[ 65.600209] Memory state around the buggy address:\n[ 65.605063] ffff800080299680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 65.612369] ffff800080299700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[ 65.619683] >ffff800080299780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8\n[ 65.626989] ^\n[ 65.633949] ffff800080299800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n[ 65.641255] ffff800080299880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n[ 65.648559] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_copy_to_kernel_nofault-110366e0cbb5f85320a2ac95689485e87b1efd338432c4fcf4dd7bf4df94b244": { "log_lines": [ "[ 66.234186] ==================================================================\n[ 66.241504] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250\n[ 66.248911] Write of size 8 at addr ffff1b1dd4b73078 by task kunit_try_catch/350\n[ 66.256402] \n[ 66.257929] CPU: 4 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 66.257954] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 66.257961] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 66.257971] Call trace:\n[ 66.257977] show_stack+0x20/0x38 (C)\n[ 66.257993] dump_stack_lvl+0x8c/0xd0\n[ 66.258008] print_report+0x118/0x5e0\n[ 66.258024] kasan_report+0xc8/0x118\n[ 66.258040] kasan_check_range+0x100/0x1a8\n[ 66.258059] __kasan_check_write+0x20/0x30\n[ 66.258077] copy_to_kernel_nofault+0x8c/0x250\n[ 66.258095] copy_to_kernel_nofault_oob+0x1bc/0x418\n[ 66.258111] kunit_try_run_case+0x14c/0x3d0\n[ 66.258129] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 66.258146] kthread+0x24c/0x2d0\n[ 66.258162] ret_from_fork+0x10/0x20\n[ 66.258178] \n[ 66.330010] Allocated by task 350:\n[ 66.333463] kasan_save_stack+0x3c/0x68\n[ 66.337367] kasan_save_track+0x20/0x40\n[ 66.341269] kasan_save_alloc_info+0x40/0x58\n[ 66.345606] __kasan_kmalloc+0xd4/0xd8\n[ 66.349420] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 66.354016] copy_to_kernel_nofault_oob+0xc8/0x418\n[ 66.358881] kunit_try_run_case+0x14c/0x3d0\n[ 66.363133] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 66.368689] kthread+0x24c/0x2d0\n[ 66.371975] ret_from_fork+0x10/0x20\n[ 66.375606] \n[ 66.377138] The buggy address belongs to the object at ffff1b1dd4b73000\n[ 66.377138] which belongs to the cache kmalloc-128 of size 128\n[ 66.389788] The buggy address is located 0 bytes to the right of\n[ 66.389788] allocated 120-byte region [ffff1b1dd4b73000, ffff1b1dd4b73078)\n[ 66.402884] \n[ 66.404413] The buggy address belongs to the physical page:\n[ 66.410054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 66.418151] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 66.425899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 66.432954] page_type: f5(slab)\n[ 66.436149] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 66.443986] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 66.451824] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 66.459746] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 66.467670] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 66.475592] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 66.483513] page dumped because: kasan: bad access detected\n[ 66.489152] \n[ 66.490674] Memory state around the buggy address:\n[ 66.495535] ffff1b1dd4b72f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 66.502850] ffff1b1dd4b72f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.510164] >ffff1b1dd4b73000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 66.517477] ^\n[ 66.524702] ffff1b1dd4b73080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.532014] ffff1b1dd4b73100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.539318] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_copy_to_kernel_nofault-ca1f12158d666d8486d6c88b918a691aeca74a57ac4e7b38e47120f57a706da7": { "log_lines": [ "[ 65.917249] ==================================================================\n[ 65.932304] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250\n[ 65.939806] Read of size 8 at addr ffff1b1dd4b73078 by task kunit_try_catch/350\n[ 65.947208] \n[ 65.948746] CPU: 4 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 65.948773] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 65.948782] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 65.948792] Call trace:\n[ 65.948799] show_stack+0x20/0x38 (C)\n[ 65.948817] dump_stack_lvl+0x8c/0xd0\n[ 65.948833] print_report+0x118/0x5e0\n[ 65.948851] kasan_report+0xc8/0x118\n[ 65.948868] __asan_report_load8_noabort+0x20/0x30\n[ 65.948889] copy_to_kernel_nofault+0x204/0x250\n[ 65.948908] copy_to_kernel_nofault_oob+0x158/0x418\n[ 65.948924] kunit_try_run_case+0x14c/0x3d0\n[ 65.948945] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 65.948962] kthread+0x24c/0x2d0\n[ 65.948981] ret_from_fork+0x10/0x20\n[ 65.948996] \n[ 66.017484] Allocated by task 350:\n[ 66.020939] kasan_save_stack+0x3c/0x68\n[ 66.024845] kasan_save_track+0x20/0x40\n[ 66.028748] kasan_save_alloc_info+0x40/0x58\n[ 66.033087] __kasan_kmalloc+0xd4/0xd8\n[ 66.036901] __kmalloc_cache_noprof+0x15c/0x3c0\n[ 66.041500] copy_to_kernel_nofault_oob+0xc8/0x418\n[ 66.046356] kunit_try_run_case+0x14c/0x3d0\n[ 66.050608] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 66.056176] kthread+0x24c/0x2d0\n[ 66.059464] ret_from_fork+0x10/0x20\n[ 66.063096] \n[ 66.064624] The buggy address belongs to the object at ffff1b1dd4b73000\n[ 66.064624] which belongs to the cache kmalloc-128 of size 128\n[ 66.077278] The buggy address is located 0 bytes to the right of\n[ 66.077278] allocated 120-byte region [ffff1b1dd4b73000, ffff1b1dd4b73078)\n[ 66.090376] \n[ 66.091905] The buggy address belongs to the physical page:\n[ 66.097550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114b72\n[ 66.105649] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 66.113399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 66.120448] page_type: f5(slab)\n[ 66.123645] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 66.131485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 66.139324] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 66.147249] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 66.155171] head: 0bfffe0000000001 fffffe6c3752dc81 ffffffffffffffff 0000000000000000\n[ 66.163095] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 66.171016] page dumped because: kasan: bad access detected\n[ 66.176663] \n[ 66.178185] Memory state around the buggy address:\n[ 66.183038] ffff1b1dd4b72f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 66.190350] ffff1b1dd4b72f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.197664] >ffff1b1dd4b73000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 66.204975] ^\n[ 66.212199] ffff1b1dd4b73080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.219504] ffff1b1dd4b73100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.226806] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_copy_user_test_oob-f3fdc5eab8fda75c2a48db4848c7bac2c579ac8a5fab0ca285d1ba728d173120": { "log_lines": [ "[ 67.496492] ==================================================================\n[ 67.503812] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0\n[ 67.510958] Read of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 67.518547] \n[ 67.520080] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 67.520106] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 67.520115] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 67.520128] Call trace:\n[ 67.520134] show_stack+0x20/0x38 (C)\n[ 67.520151] dump_stack_lvl+0x8c/0xd0\n[ 67.520167] print_report+0x118/0x5e0\n[ 67.520184] kasan_report+0xc8/0x118\n[ 67.520203] kasan_check_range+0x100/0x1a8\n[ 67.520222] __kasan_check_read+0x20/0x30\n[ 67.520242] copy_user_test_oob+0x3c8/0xec0\n[ 67.520259] kunit_try_run_case+0x14c/0x3d0\n[ 67.520279] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.520299] kthread+0x24c/0x2d0\n[ 67.520315] ret_from_fork+0x10/0x20\n[ 67.520333] \n[ 67.586931] Allocated by task 354:\n[ 67.590396] kasan_save_stack+0x3c/0x68\n[ 67.594300] kasan_save_track+0x20/0x40\n[ 67.598204] kasan_save_alloc_info+0x40/0x58\n[ 67.602552] __kasan_kmalloc+0xd4/0xd8\n[ 67.606370] __kmalloc_noprof+0x188/0x4c8\n[ 67.610447] kunit_kmalloc_array+0x34/0x88\n[ 67.614611] copy_user_test_oob+0xac/0xec0\n[ 67.618774] kunit_try_run_case+0x14c/0x3d0\n[ 67.623035] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.628602] kthread+0x24c/0x2d0\n[ 67.631890] ret_from_fork+0x10/0x20\n[ 67.635533] \n[ 67.637064] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 67.637064] which belongs to the cache kmalloc-128 of size 128\n[ 67.649725] The buggy address is located 0 bytes inside of\n[ 67.649725] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 67.662303] \n[ 67.663835] The buggy address belongs to the physical page:\n[ 67.669478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 67.677581] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 67.685338] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 67.692394] page_type: f5(slab)\n[ 67.695594] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 67.703439] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 67.711286] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 67.719218] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 67.727149] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 67.735080] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 67.743009] page dumped because: kasan: bad access detected\n[ 67.748655] \n[ 67.750184] Memory state around the buggy address:\n[ 67.755043] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 67.762358] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.769674] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 67.776986] ^\n[ 67.784212] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.791527] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.798840] ==================================================================", "[ 66.877086] ==================================================================\n[ 66.884401] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0\n[ 66.891539] Read of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 66.899111] \n[ 66.900644] CPU: 6 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 66.900668] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 66.900675] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 66.900685] Call trace:\n[ 66.900691] show_stack+0x20/0x38 (C)\n[ 66.900707] dump_stack_lvl+0x8c/0xd0\n[ 66.900722] print_report+0x118/0x5e0\n[ 66.900740] kasan_report+0xc8/0x118\n[ 66.900756] kasan_check_range+0x100/0x1a8\n[ 66.900774] __kasan_check_read+0x20/0x30\n[ 66.900792] copy_user_test_oob+0x728/0xec0\n[ 66.900807] kunit_try_run_case+0x14c/0x3d0\n[ 66.900826] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 66.900843] kthread+0x24c/0x2d0\n[ 66.900859] ret_from_fork+0x10/0x20\n[ 66.900875] \n[ 66.967429] Allocated by task 354:\n[ 66.970884] kasan_save_stack+0x3c/0x68\n[ 66.974788] kasan_save_track+0x20/0x40\n[ 66.978691] kasan_save_alloc_info+0x40/0x58\n[ 66.983030] __kasan_kmalloc+0xd4/0xd8\n[ 66.986843] __kmalloc_noprof+0x188/0x4c8\n[ 66.990920] kunit_kmalloc_array+0x34/0x88\n[ 66.995086] copy_user_test_oob+0xac/0xec0\n[ 66.999247] kunit_try_run_case+0x14c/0x3d0\n[ 67.003498] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.009059] kthread+0x24c/0x2d0\n[ 67.012344] ret_from_fork+0x10/0x20\n[ 67.015976] \n[ 67.017499] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 67.017499] which belongs to the cache kmalloc-128 of size 128\n[ 67.030151] The buggy address is located 0 bytes inside of\n[ 67.030151] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 67.042720] \n[ 67.044251] The buggy address belongs to the physical page:\n[ 67.049895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 67.057994] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 67.065745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 67.072791] page_type: f5(slab)\n[ 67.075985] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 67.083824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 67.091665] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 67.099591] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 67.107518] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 67.115443] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 67.123364] page dumped because: kasan: bad access detected\n[ 67.129003] \n[ 67.130527] Memory state around the buggy address:\n[ 67.135388] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 67.142692] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.150007] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 67.157317] ^\n[ 67.164535] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.171841] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.179147] ==================================================================", "[ 68.116469] ==================================================================\n[ 68.123792] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0\n[ 68.130941] Read of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 68.138528] \n[ 68.140068] CPU: 3 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 68.140094] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 68.140102] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 68.140113] Call trace:\n[ 68.140120] show_stack+0x20/0x38 (C)\n[ 68.140137] dump_stack_lvl+0x8c/0xd0\n[ 68.140153] print_report+0x118/0x5e0\n[ 68.140170] kasan_report+0xc8/0x118\n[ 68.140187] kasan_check_range+0x100/0x1a8\n[ 68.140207] __kasan_check_read+0x20/0x30\n[ 68.140226] copy_user_test_oob+0x4a0/0xec0\n[ 68.140244] kunit_try_run_case+0x14c/0x3d0\n[ 68.140264] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 68.140283] kthread+0x24c/0x2d0\n[ 68.140302] ret_from_fork+0x10/0x20\n[ 68.140318] \n[ 68.206925] Allocated by task 354:\n[ 68.210388] kasan_save_stack+0x3c/0x68\n[ 68.214291] kasan_save_track+0x20/0x40\n[ 68.218193] kasan_save_alloc_info+0x40/0x58\n[ 68.222538] __kasan_kmalloc+0xd4/0xd8\n[ 68.226354] __kmalloc_noprof+0x188/0x4c8\n[ 68.230437] kunit_kmalloc_array+0x34/0x88\n[ 68.234611] copy_user_test_oob+0xac/0xec0\n[ 68.238781] kunit_try_run_case+0x14c/0x3d0\n[ 68.243040] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 68.248613] kthread+0x24c/0x2d0\n[ 68.251900] ret_from_fork+0x10/0x20\n[ 68.255541] \n[ 68.257072] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 68.257072] which belongs to the cache kmalloc-128 of size 128\n[ 68.269737] The buggy address is located 0 bytes inside of\n[ 68.269737] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 68.282308] \n[ 68.283837] The buggy address belongs to the physical page:\n[ 68.289489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 68.297600] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 68.305355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 68.312416] page_type: f5(slab)\n[ 68.315624] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.323467] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.331308] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.339237] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.347166] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 68.355103] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 68.363026] page dumped because: kasan: bad access detected\n[ 68.368676] \n[ 68.370206] Memory state around the buggy address:\n[ 68.375074] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 68.382396] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.389715] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 68.397034] ^\n[ 68.404266] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.411587] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.418907] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_copy_user_test_oob-11f7c6c9666cc3fabc36ab7482a9129a6e1230857c3c9c18245c36918208a509": { "log_lines": [ "[ 67.806300] ==================================================================\n[ 67.813617] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0\n[ 67.820765] Write of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 67.828442] \n[ 67.829974] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 67.829999] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 67.830008] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 67.830019] Call trace:\n[ 67.830027] show_stack+0x20/0x38 (C)\n[ 67.830044] dump_stack_lvl+0x8c/0xd0\n[ 67.830060] print_report+0x118/0x5e0\n[ 67.830079] kasan_report+0xc8/0x118\n[ 67.830096] kasan_check_range+0x100/0x1a8\n[ 67.830115] __kasan_check_write+0x20/0x30\n[ 67.830136] copy_user_test_oob+0x434/0xec0\n[ 67.830153] kunit_try_run_case+0x14c/0x3d0\n[ 67.830172] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.830192] kthread+0x24c/0x2d0\n[ 67.830208] ret_from_fork+0x10/0x20\n[ 67.830226] \n[ 67.896900] Allocated by task 354:\n[ 67.900360] kasan_save_stack+0x3c/0x68\n[ 67.904270] kasan_save_track+0x20/0x40\n[ 67.908170] kasan_save_alloc_info+0x40/0x58\n[ 67.912512] __kasan_kmalloc+0xd4/0xd8\n[ 67.916332] __kmalloc_noprof+0x188/0x4c8\n[ 67.920412] kunit_kmalloc_array+0x34/0x88\n[ 67.924582] copy_user_test_oob+0xac/0xec0\n[ 67.928751] kunit_try_run_case+0x14c/0x3d0\n[ 67.933007] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.938579] kthread+0x24c/0x2d0\n[ 67.941874] ret_from_fork+0x10/0x20\n[ 67.945514] \n[ 67.947043] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 67.947043] which belongs to the cache kmalloc-128 of size 128\n[ 67.959701] The buggy address is located 0 bytes inside of\n[ 67.959701] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 67.972270] \n[ 67.973800] The buggy address belongs to the physical page:\n[ 67.979450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 67.987556] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 67.995314] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 68.002372] page_type: f5(slab)\n[ 68.005578] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.013425] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.021275] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.029209] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.037144] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 68.045077] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 68.053008] page dumped because: kasan: bad access detected\n[ 68.058659] \n[ 68.060196] Memory state around the buggy address:\n[ 68.065061] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 68.072377] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.079697] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 68.087011] ^\n[ 68.094238] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.101556] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.108871] ==================================================================", "[ 66.561189] ==================================================================\n[ 66.574679] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0\n[ 66.581820] Write of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 66.589489] \n[ 66.591018] CPU: 6 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 66.591044] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 66.591052] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 66.591062] Call trace:\n[ 66.591070] show_stack+0x20/0x38 (C)\n[ 66.591087] dump_stack_lvl+0x8c/0xd0\n[ 66.591102] print_report+0x118/0x5e0\n[ 66.591121] kasan_report+0xc8/0x118\n[ 66.591137] kasan_check_range+0x100/0x1a8\n[ 66.591155] __kasan_check_write+0x20/0x30\n[ 66.591173] copy_user_test_oob+0x234/0xec0\n[ 66.591189] kunit_try_run_case+0x14c/0x3d0\n[ 66.591209] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 66.591226] kthread+0x24c/0x2d0\n[ 66.591243] ret_from_fork+0x10/0x20\n[ 66.591258] \n[ 66.657908] Allocated by task 354:\n[ 66.661362] kasan_save_stack+0x3c/0x68\n[ 66.665270] kasan_save_track+0x20/0x40\n[ 66.669172] kasan_save_alloc_info+0x40/0x58\n[ 66.673511] __kasan_kmalloc+0xd4/0xd8\n[ 66.677326] __kmalloc_noprof+0x188/0x4c8\n[ 66.681404] kunit_kmalloc_array+0x34/0x88\n[ 66.685570] copy_user_test_oob+0xac/0xec0\n[ 66.689732] kunit_try_run_case+0x14c/0x3d0\n[ 66.693981] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 66.699541] kthread+0x24c/0x2d0\n[ 66.702829] ret_from_fork+0x10/0x20\n[ 66.706459] \n[ 66.707990] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 66.707990] which belongs to the cache kmalloc-128 of size 128\n[ 66.720646] The buggy address is located 0 bytes inside of\n[ 66.720646] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 66.733216] \n[ 66.734739] The buggy address belongs to the physical page:\n[ 66.740378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 66.748479] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 66.756231] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 66.763284] page_type: f5(slab)\n[ 66.766481] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 66.774322] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 66.782161] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 66.790086] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 66.798011] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 66.805935] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 66.813855] page dumped because: kasan: bad access detected\n[ 66.819493] \n[ 66.821023] Memory state around the buggy address:\n[ 66.825877] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 66.833183] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.840498] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 66.847810] ^\n[ 66.855029] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.862345] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 66.869659] ==================================================================", "[ 67.186623] ==================================================================\n[ 67.193944] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0\n[ 67.201080] Write of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 67.208749] \n[ 67.210274] CPU: 6 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 67.210298] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 67.210306] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 67.210317] Call trace:\n[ 67.210324] show_stack+0x20/0x38 (C)\n[ 67.210340] dump_stack_lvl+0x8c/0xd0\n[ 67.210353] print_report+0x118/0x5e0\n[ 67.210370] kasan_report+0xc8/0x118\n[ 67.210387] kasan_check_range+0x100/0x1a8\n[ 67.210406] __kasan_check_write+0x20/0x30\n[ 67.210424] copy_user_test_oob+0x35c/0xec0\n[ 67.210440] kunit_try_run_case+0x14c/0x3d0\n[ 67.210459] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.210476] kthread+0x24c/0x2d0\n[ 67.210493] ret_from_fork+0x10/0x20\n[ 67.210510] \n[ 67.277148] Allocated by task 354:\n[ 67.280600] kasan_save_stack+0x3c/0x68\n[ 67.284504] kasan_save_track+0x20/0x40\n[ 67.288408] kasan_save_alloc_info+0x40/0x58\n[ 67.292746] __kasan_kmalloc+0xd4/0xd8\n[ 67.296561] __kmalloc_noprof+0x188/0x4c8\n[ 67.300638] kunit_kmalloc_array+0x34/0x88\n[ 67.304802] copy_user_test_oob+0xac/0xec0\n[ 67.308965] kunit_try_run_case+0x14c/0x3d0\n[ 67.313217] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 67.318779] kthread+0x24c/0x2d0\n[ 67.322063] ret_from_fork+0x10/0x20\n[ 67.325696] \n[ 67.327219] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 67.327219] which belongs to the cache kmalloc-128 of size 128\n[ 67.339865] The buggy address is located 0 bytes inside of\n[ 67.339865] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 67.352431] \n[ 67.353955] The buggy address belongs to the physical page:\n[ 67.359594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 67.367691] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 67.375444] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 67.382491] page_type: f5(slab)\n[ 67.385686] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 67.393524] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 67.401364] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 67.409290] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 67.417214] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 67.425140] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 67.433062] page dumped because: kasan: bad access detected\n[ 67.438705] \n[ 67.440233] Memory state around the buggy address:\n[ 67.445085] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 67.452400] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.459714] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 67.467021] ^\n[ 67.474237] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.481552] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 67.488865] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_strncpy_from_user-a5022a503d167ed5f9f7d0913b89e14c0f4bebb2b9e34ce865334c6137799c19": { "log_lines": [ "[ 68.740697] ==================================================================\n[ 68.748011] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0\n[ 68.755067] Write of size 1 at addr ffff1b1dc43a5d78 by task kunit_try_catch/354\n[ 68.762558] \n[ 68.764084] CPU: 4 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 68.764108] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 68.764116] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 68.764126] Call trace:\n[ 68.764132] show_stack+0x20/0x38 (C)\n[ 68.764149] dump_stack_lvl+0x8c/0xd0\n[ 68.764163] print_report+0x118/0x5e0\n[ 68.764180] kasan_report+0xc8/0x118\n[ 68.764197] __asan_report_store1_noabort+0x20/0x30\n[ 68.764216] strncpy_from_user+0x270/0x2a0\n[ 68.764230] copy_user_test_oob+0x5c0/0xec0\n[ 68.764247] kunit_try_run_case+0x14c/0x3d0\n[ 68.764265] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 68.764283] kthread+0x24c/0x2d0\n[ 68.764300] ret_from_fork+0x10/0x20\n[ 68.764317] \n[ 68.831760] Allocated by task 354:\n[ 68.835216] kasan_save_stack+0x3c/0x68\n[ 68.839114] kasan_save_track+0x20/0x40\n[ 68.843010] kasan_save_alloc_info+0x40/0x58\n[ 68.847352] __kasan_kmalloc+0xd4/0xd8\n[ 68.851161] __kmalloc_noprof+0x188/0x4c8\n[ 68.855230] kunit_kmalloc_array+0x34/0x88\n[ 68.859388] copy_user_test_oob+0xac/0xec0\n[ 68.863545] kunit_try_run_case+0x14c/0x3d0\n[ 68.867801] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 68.873368] kthread+0x24c/0x2d0\n[ 68.876658] ret_from_fork+0x10/0x20\n[ 68.880292] \n[ 68.881815] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 68.881815] which belongs to the cache kmalloc-128 of size 128\n[ 68.894471] The buggy address is located 0 bytes to the right of\n[ 68.894471] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 68.907559] \n[ 68.909084] The buggy address belongs to the physical page:\n[ 68.914729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 68.922824] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 68.930572] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 68.937627] page_type: f5(slab)\n[ 68.940825] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.948661] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.956497] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.964421] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.972342] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 68.980264] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 68.988184] page dumped because: kasan: bad access detected\n[ 68.993830] \n[ 68.995352] Memory state around the buggy address:\n[ 69.000208] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 69.007521] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 69.014834] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 69.022144] ^\n[ 69.029368] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 69.036679] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 69.043990] ==================================================================" ], "result": "fail" }, "kasan-BUG_KASAN_slab-out-of-bounds_in_strncpy_from_user-368f61e44bc729120530f99694850f0345f1c7c014ce9b9a7a6d079e11050c86": { "log_lines": [ "[ 68.427108] ==================================================================\n[ 68.434431] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0\n[ 68.441406] Write of size 121 at addr ffff1b1dc43a5d00 by task kunit_try_catch/354\n[ 68.449072] \n[ 68.450601] CPU: 4 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 68.450628] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 68.450636] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 68.450647] Call trace:\n[ 68.450654] show_stack+0x20/0x38 (C)\n[ 68.450672] dump_stack_lvl+0x8c/0xd0\n[ 68.450685] print_report+0x118/0x5e0\n[ 68.450703] kasan_report+0xc8/0x118\n[ 68.450721] kasan_check_range+0x100/0x1a8\n[ 68.450738] __kasan_check_write+0x20/0x30\n[ 68.450757] strncpy_from_user+0x3c/0x2a0\n[ 68.450772] copy_user_test_oob+0x5c0/0xec0\n[ 68.450787] kunit_try_run_case+0x14c/0x3d0\n[ 68.450808] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 68.450825] kthread+0x24c/0x2d0\n[ 68.450841] ret_from_fork+0x10/0x20\n[ 68.450858] \n[ 68.521564] Allocated by task 354:\n[ 68.525022] kasan_save_stack+0x3c/0x68\n[ 68.528921] kasan_save_track+0x20/0x40\n[ 68.532818] kasan_save_alloc_info+0x40/0x58\n[ 68.537162] __kasan_kmalloc+0xd4/0xd8\n[ 68.540970] __kmalloc_noprof+0x188/0x4c8\n[ 68.545040] kunit_kmalloc_array+0x34/0x88\n[ 68.549200] copy_user_test_oob+0xac/0xec0\n[ 68.553356] kunit_try_run_case+0x14c/0x3d0\n[ 68.557612] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 68.563179] kthread+0x24c/0x2d0\n[ 68.566469] ret_from_fork+0x10/0x20\n[ 68.570105] \n[ 68.571628] The buggy address belongs to the object at ffff1b1dc43a5d00\n[ 68.571628] which belongs to the cache kmalloc-128 of size 128\n[ 68.584284] The buggy address is located 0 bytes inside of\n[ 68.584284] allocated 120-byte region [ffff1b1dc43a5d00, ffff1b1dc43a5d78)\n[ 68.596855] \n[ 68.598379] The buggy address belongs to the physical page:\n[ 68.604026] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043a4\n[ 68.612123] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 68.619872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)\n[ 68.626927] page_type: f5(slab)\n[ 68.630127] raw: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.637963] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.645800] head: 0bfffe0000000040 ffff1b1dc0002a00 dead000000000122 0000000000000000\n[ 68.653724] head: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000\n[ 68.661648] head: 0bfffe0000000001 fffffe6c3710e901 ffffffffffffffff 0000000000000000\n[ 68.669569] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\n[ 68.677488] page dumped because: kasan: bad access detected\n[ 68.683134] \n[ 68.684656] Memory state around the buggy address:\n[ 68.689513] ffff1b1dc43a5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n[ 68.696827] ffff1b1dc43a5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.704139] >ffff1b1dc43a5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc\n[ 68.711448] ^\n[ 68.718672] ffff1b1dc43a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.725985] ffff1b1dc43a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 68.733296] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_memory_corruption_in_kmalloc_oob_in_memset-4921caae7f3d6489cb6b43dd9ccdd128dcc788e12e6ed885a0facaceedd3f195": { "log_lines": [ "[ 27.347514] ==================================================================\n[ 27.372712] BUG: KFENCE: memory corruption in kmalloc_oob_in_memset+0x160/0x2d0\n[ 27.372712] \n[ 27.381612] Corrupted memory at 0x(____ptrval____) [ ! ! ! ! ! ! ! ! ] (in kfence-#100):\n[ 27.389871] kmalloc_oob_in_memset+0x160/0x2d0\n[ 27.394384] kunit_try_run_case+0x14c/0x3d0\n[ 27.398639] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.404198] kthread+0x24c/0x2d0\n[ 27.407486] ret_from_fork+0x10/0x20\n[ 27.411120] \n[ 27.412654] kfence-#100: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128\n[ 27.412654] \n[ 27.422602] allocated by task 239 on cpu 5 at 27.343645s (0.078956s ago):\n[ 27.429481] kmalloc_oob_in_memset+0xb0/0x2d0\n[ 27.433904] kunit_try_run_case+0x14c/0x3d0\n[ 27.438156] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.443715] kthread+0x24c/0x2d0\n[ 27.447003] ret_from_fork+0x10/0x20\n[ 27.450633] \n[ 27.452163] freed by task 239 on cpu 5 at 27.347489s (0.104672s ago):\n[ 27.458699] kmalloc_oob_in_memset+0x160/0x2d0\n[ 27.463209] kunit_try_run_case+0x14c/0x3d0\n[ 27.467458] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 27.473017] kthread+0x24c/0x2d0\n[ 27.476302] ret_from_fork+0x10/0x20\n[ 27.479932] \n[ 27.481456] CPU: 5 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 27.490272] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 27.494518] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 27.500245] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_read_in_test_out_of_bounds_read-fe096eb1c4531a577df5fcdcff96e54bb5b016d5bc0d84fde16fb215cd0b2563": { "log_lines": [ "[ 69.699441] ==================================================================\n[ 69.706769] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0\n[ 69.706769] \n[ 69.715937] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#163):\n[ 69.723260] test_out_of_bounds_read+0x114/0x3e0\n[ 69.727954] kunit_try_run_case+0x14c/0x3d0\n[ 69.732214] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.737781] kthread+0x24c/0x2d0\n[ 69.741073] ret_from_fork+0x10/0x20\n[ 69.744710] \n[ 69.746237] kfence-#163: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 69.746237] \n[ 69.755476] allocated by task 358 on cpu 4 at 69.699420s (0.056054s ago):\n[ 69.762368] test_alloc+0x22c/0x620\n[ 69.765917] test_out_of_bounds_read+0xdc/0x3e0\n[ 69.770519] kunit_try_run_case+0x14c/0x3d0\n[ 69.774775] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.780341] kthread+0x24c/0x2d0\n[ 69.783630] ret_from_fork+0x10/0x20\n[ 69.787264] \n[ 69.788793] CPU: 4 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 69.797606] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 69.801854] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 69.807591] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_read_in_test_out_of_bounds_read-ed5bf313416643eeac9528f4509b5979293833544e5b8a8e4441f43426b33271": { "log_lines": [ "[ 69.919454] ==================================================================\n[ 69.926782] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0\n[ 69.926782] \n[ 69.935949] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#165):\n[ 69.943440] test_out_of_bounds_read+0x1c8/0x3e0\n[ 69.948133] kunit_try_run_case+0x14c/0x3d0\n[ 69.952393] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.957960] kthread+0x24c/0x2d0\n[ 69.961251] ret_from_fork+0x10/0x20\n[ 69.964888] \n[ 69.966413] kfence-#165: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 69.966413] \n[ 69.975652] allocated by task 358 on cpu 4 at 69.919433s (0.056217s ago):\n[ 69.982544] test_alloc+0x22c/0x620\n[ 69.986093] test_out_of_bounds_read+0x198/0x3e0\n[ 69.990781] kunit_try_run_case+0x14c/0x3d0\n[ 69.995037] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.000602] kthread+0x24c/0x2d0\n[ 70.003891] ret_from_fork+0x10/0x20\n[ 70.007527] \n[ 70.009055] CPU: 4 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 70.017867] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 70.022114] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 70.027851] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_read_in_test_out_of_bounds_read-1c350704b853c1eceda0f7b746e229b4a25a456965247fe9129551e1c39398dd": { "log_lines": [ "[ 69.259470] ==================================================================\n[ 69.266882] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0\n[ 69.266882] \n[ 69.276052] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#159):\n[ 69.283377] test_out_of_bounds_read+0x114/0x3e0\n[ 69.288071] kunit_try_run_case+0x14c/0x3d0\n[ 69.292331] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.297898] kthread+0x24c/0x2d0\n[ 69.301191] ret_from_fork+0x10/0x20\n[ 69.304829] \n[ 69.306357] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 69.306357] \n[ 69.316129] allocated by task 356 on cpu 4 at 69.259446s (0.056681s ago):\n[ 69.323012] test_alloc+0x298/0x620\n[ 69.326562] test_out_of_bounds_read+0xdc/0x3e0\n[ 69.331164] kunit_try_run_case+0x14c/0x3d0\n[ 69.335420] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.340986] kthread+0x24c/0x2d0\n[ 69.344275] ret_from_fork+0x10/0x20\n[ 69.347910] \n[ 69.349438] CPU: 4 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 69.358250] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 69.362498] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 69.368235] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_read_in_test_out_of_bounds_read-2d977d8e750cf32646379c63fa015ab113357f0ee35289b8494d3d7ad8c64d1d": { "log_lines": [ "[ 69.479467] ==================================================================\n[ 69.486809] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0\n[ 69.486809] \n[ 69.495975] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#161):\n[ 69.503470] test_out_of_bounds_read+0x1c8/0x3e0\n[ 69.508163] kunit_try_run_case+0x14c/0x3d0\n[ 69.512423] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.517990] kthread+0x24c/0x2d0\n[ 69.521282] ret_from_fork+0x10/0x20\n[ 69.524918] \n[ 69.526445] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 69.526445] \n[ 69.536215] allocated by task 356 on cpu 4 at 69.479445s (0.056769s ago):\n[ 69.543108] test_alloc+0x298/0x620\n[ 69.546658] test_out_of_bounds_read+0x198/0x3e0\n[ 69.551347] kunit_try_run_case+0x14c/0x3d0\n[ 69.555603] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 69.561168] kthread+0x24c/0x2d0\n[ 69.564456] ret_from_fork+0x10/0x20\n[ 69.568092] \n[ 69.569620] CPU: 4 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 69.578432] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 69.582680] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 69.588416] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_write_in_test_out_of_bounds_write-0c0f4fe7c1f9fee49b7d7708133781b7fb005af18c2d35605e320bb04769b136": { "log_lines": [ "[ 70.243470] ==================================================================\n[ 70.250828] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240\n[ 70.250828] \n[ 70.260178] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#168):\n[ 70.267589] test_out_of_bounds_write+0x100/0x240\n[ 70.272370] kunit_try_run_case+0x14c/0x3d0\n[ 70.276631] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.282199] kthread+0x24c/0x2d0\n[ 70.285492] ret_from_fork+0x10/0x20\n[ 70.289130] \n[ 70.290657] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 70.290657] \n[ 70.300429] allocated by task 360 on cpu 4 at 70.243444s (0.056983s ago):\n[ 70.307321] test_alloc+0x298/0x620\n[ 70.310870] test_out_of_bounds_write+0xc8/0x240\n[ 70.315562] kunit_try_run_case+0x14c/0x3d0\n[ 70.319818] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.325382] kthread+0x24c/0x2d0\n[ 70.328671] ret_from_fork+0x10/0x20\n[ 70.332306] \n[ 70.333835] CPU: 4 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 70.342649] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 70.346900] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 70.352637] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_write_in_test_out_of_bounds_write-9fdf39b5e6463b1a95a36b4c2ae0d1054ab2e6db2935cb4743351b195c40f4ff": { "log_lines": [ "[ 70.463441] ==================================================================\n[ 70.470770] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240\n[ 70.470770] \n[ 70.480113] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#170):\n[ 70.487523] test_out_of_bounds_write+0x100/0x240\n[ 70.492304] kunit_try_run_case+0x14c/0x3d0\n[ 70.496564] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.502130] kthread+0x24c/0x2d0\n[ 70.505422] ret_from_fork+0x10/0x20\n[ 70.509058] \n[ 70.510595] kfence-#170: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 70.510595] \n[ 70.519832] allocated by task 362 on cpu 5 at 70.463420s (0.056410s ago):\n[ 70.526725] test_alloc+0x22c/0x620\n[ 70.530273] test_out_of_bounds_write+0xc8/0x240\n[ 70.534962] kunit_try_run_case+0x14c/0x3d0\n[ 70.539217] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.544783] kthread+0x24c/0x2d0\n[ 70.548072] ret_from_fork+0x10/0x20\n[ 70.551707] \n[ 70.553236] CPU: 5 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 70.562049] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 70.566298] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 70.572034] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_use-after-free_read_in_test_use_after_free_read-16e3a9a1516d39d12350a5d3d5b25cef0c23746b6e00744aa3e827fd5cceb91d": { "log_lines": [ "[ 70.683462] ==================================================================\n[ 70.690802] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248\n[ 70.690802] \n[ 70.700151] Use-after-free read at 0x(____ptrval____) (in kfence-#172):\n[ 70.706851] test_use_after_free_read+0x114/0x248\n[ 70.711632] kunit_try_run_case+0x14c/0x3d0\n[ 70.715893] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.721461] kthread+0x24c/0x2d0\n[ 70.724754] ret_from_fork+0x10/0x20\n[ 70.728390] \n[ 70.729916] kfence-#172: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 70.729916] \n[ 70.739687] allocated by task 364 on cpu 4 at 70.683423s (0.056263s ago):\n[ 70.746578] test_alloc+0x298/0x620\n[ 70.750126] test_use_after_free_read+0xd0/0x248\n[ 70.754816] kunit_try_run_case+0x14c/0x3d0\n[ 70.759071] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.764636] kthread+0x24c/0x2d0\n[ 70.767924] ret_from_fork+0x10/0x20\n[ 70.771557] \n[ 70.773081] freed by task 364 on cpu 4 at 70.683433s (0.089647s ago):\n[ 70.779610] test_use_after_free_read+0x1c0/0x248\n[ 70.784386] kunit_try_run_case+0x14c/0x3d0\n[ 70.788642] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.794206] kthread+0x24c/0x2d0\n[ 70.797495] ret_from_fork+0x10/0x20\n[ 70.801130] \n[ 70.802660] CPU: 4 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 70.811471] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 70.815718] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 70.821455] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_use-after-free_read_in_test_use_after_free_read-f6c7f586494d9d7a84697034fdf01d3299d644baa6e41edbc25cdd900259e781": { "log_lines": [ "[ 70.931458] ==================================================================\n[ 70.938790] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248\n[ 70.938790] \n[ 70.948134] Use-after-free read at 0x(____ptrval____) (in kfence-#174):\n[ 70.954834] test_use_after_free_read+0x114/0x248\n[ 70.959615] kunit_try_run_case+0x14c/0x3d0\n[ 70.963876] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 70.969443] kthread+0x24c/0x2d0\n[ 70.972735] ret_from_fork+0x10/0x20\n[ 70.976373] \n[ 70.977901] kfence-#174: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 70.977901] \n[ 70.987141] allocated by task 366 on cpu 5 at 70.931422s (0.055717s ago):\n[ 70.994034] test_alloc+0x22c/0x620\n[ 70.997583] test_use_after_free_read+0xd0/0x248\n[ 71.002274] kunit_try_run_case+0x14c/0x3d0\n[ 71.006530] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.012095] kthread+0x24c/0x2d0\n[ 71.015385] ret_from_fork+0x10/0x20\n[ 71.019019] \n[ 71.020544] freed by task 366 on cpu 5 at 70.931431s (0.089111s ago):\n[ 71.027074] test_use_after_free_read+0xf0/0x248\n[ 71.031765] kunit_try_run_case+0x14c/0x3d0\n[ 71.036020] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.041585] kthread+0x24c/0x2d0\n[ 71.044874] ret_from_fork+0x10/0x20\n[ 71.048509] \n[ 71.050037] CPU: 5 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 71.058851] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 71.063099] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 71.068836] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_invalid_free_in_test_double_free-a7003ead7c900f4191bb1395507525f625d38c821fe5c187d88ade63e8c111e2": { "log_lines": [ "[ 71.387477] ==================================================================\n[ 71.394813] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238\n[ 71.394813] \n[ 71.402832] Invalid free of 0x(____ptrval____) (in kfence-#178):\n[ 71.408925] test_double_free+0x1bc/0x238\n[ 71.413009] kunit_try_run_case+0x14c/0x3d0\n[ 71.417269] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.422837] kthread+0x24c/0x2d0\n[ 71.426129] ret_from_fork+0x10/0x20\n[ 71.429767] \n[ 71.431292] kfence-#178: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 71.431292] \n[ 71.441062] allocated by task 372 on cpu 4 at 71.387426s (0.053635s ago):\n[ 71.447950] test_alloc+0x298/0x620\n[ 71.451499] test_double_free+0xd4/0x238\n[ 71.455482] kunit_try_run_case+0x14c/0x3d0\n[ 71.459738] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.465304] kthread+0x24c/0x2d0\n[ 71.468592] ret_from_fork+0x10/0x20\n[ 71.472226] \n[ 71.473751] freed by task 372 on cpu 4 at 71.387435s (0.086313s ago):\n[ 71.480279] test_double_free+0x1ac/0x238\n[ 71.484349] kunit_try_run_case+0x14c/0x3d0\n[ 71.488604] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.494170] kthread+0x24c/0x2d0\n[ 71.497458] ret_from_fork+0x10/0x20\n[ 71.501093] \n[ 71.502620] CPU: 4 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 71.511432] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 71.515679] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 71.521414] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_invalid_free_in_test_double_free-cc9d2e879d751c430ed1d83362710233954a15452d06d3767a41234b96529100": { "log_lines": [ "[ 71.631717] ==================================================================\n[ 71.639043] BUG: KFENCE: invalid free in test_double_free+0x100/0x238\n[ 71.639043] \n[ 71.647062] Invalid free of 0x(____ptrval____) (in kfence-#180):\n[ 71.653154] test_double_free+0x100/0x238\n[ 71.657228] kunit_try_run_case+0x14c/0x3d0\n[ 71.661488] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.667057] kthread+0x24c/0x2d0\n[ 71.670348] ret_from_fork+0x10/0x20\n[ 71.673986] \n[ 71.675513] kfence-#180: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 71.675513] \n[ 71.684752] allocated by task 374 on cpu 5 at 71.631672s (0.053079s ago):\n[ 71.691630] test_alloc+0x22c/0x620\n[ 71.695180] test_double_free+0xd4/0x238\n[ 71.699162] kunit_try_run_case+0x14c/0x3d0\n[ 71.703418] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.708984] kthread+0x24c/0x2d0\n[ 71.712272] ret_from_fork+0x10/0x20\n[ 71.715908] \n[ 71.717431] freed by task 374 on cpu 5 at 71.631680s (0.085749s ago):\n[ 71.723963] test_double_free+0xf0/0x238\n[ 71.727946] kunit_try_run_case+0x14c/0x3d0\n[ 71.732201] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.737766] kthread+0x24c/0x2d0\n[ 71.741055] ret_from_fork+0x10/0x20\n[ 71.744689] \n[ 71.746218] CPU: 5 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 71.755031] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 71.759279] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 71.765017] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_invalid_free_in_test_invalid_addr_free-ae74d9997116b48f98d2ac9a96f9dfa33f1f053d53061d0c2d3da0c56d8e6232": { "log_lines": [ "[ 72.091733] ==================================================================\n[ 72.099065] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238\n[ 72.099065] \n[ 72.107527] Invalid free of 0x(____ptrval____) (in kfence-#184):\n[ 72.113619] test_invalid_addr_free+0xec/0x238\n[ 72.118141] kunit_try_run_case+0x14c/0x3d0\n[ 72.122402] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 72.127970] kthread+0x24c/0x2d0\n[ 72.131261] ret_from_fork+0x10/0x20\n[ 72.134899] \n[ 72.136426] kfence-#184: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 72.136426] \n[ 72.145665] allocated by task 378 on cpu 5 at 72.091700s (0.053964s ago):\n[ 72.152552] test_alloc+0x22c/0x620\n[ 72.156101] test_invalid_addr_free+0xd4/0x238\n[ 72.160616] kunit_try_run_case+0x14c/0x3d0\n[ 72.164872] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 72.170437] kthread+0x24c/0x2d0\n[ 72.173726] ret_from_fork+0x10/0x20\n[ 72.177361] \n[ 72.178889] CPU: 5 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 72.187703] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 72.191952] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 72.197691] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_invalid_free_in_test_invalid_addr_free-72b9511042d039ce1f280754399e2f62e5df11fdf8af9ea65df78c7d2ef88353": { "log_lines": [ "[ 71.875463] ==================================================================\n[ 71.882794] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238\n[ 71.882794] \n[ 71.891346] Invalid free of 0x(____ptrval____) (in kfence-#182):\n[ 71.897441] test_invalid_addr_free+0x1ac/0x238\n[ 71.902047] kunit_try_run_case+0x14c/0x3d0\n[ 71.906308] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.911876] kthread+0x24c/0x2d0\n[ 71.915169] ret_from_fork+0x10/0x20\n[ 71.918805] \n[ 71.920331] kfence-#182: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 71.920331] \n[ 71.930101] allocated by task 376 on cpu 4 at 71.875428s (0.054672s ago):\n[ 71.936988] test_alloc+0x298/0x620\n[ 71.940536] test_invalid_addr_free+0xd4/0x238\n[ 71.945050] kunit_try_run_case+0x14c/0x3d0\n[ 71.949306] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 71.954870] kthread+0x24c/0x2d0\n[ 71.958159] ret_from_fork+0x10/0x20\n[ 71.961793] \n[ 71.963322] CPU: 4 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 71.972134] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 71.976382] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 71.982119] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_memory_corruption_in_test_corruption-39ca6959ad496e11c374755eb8bab90dc24aea67132cb999ae34cae8f21f88d1": { "log_lines": [ "[ 74.191486] ==================================================================\n[ 74.198840] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378\n[ 74.198840] \n[ 74.207218] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#203):\n[ 74.214214] test_corruption+0x1d8/0x378\n[ 74.218201] kunit_try_run_case+0x14c/0x3d0\n[ 74.222461] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 74.228028] kthread+0x24c/0x2d0\n[ 74.231321] ret_from_fork+0x10/0x20\n[ 74.234959] \n[ 74.236485] kfence-#203: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 74.236485] \n[ 74.245724] allocated by task 382 on cpu 5 at 74.191437s (0.054286s ago):\n[ 74.252611] test_alloc+0x22c/0x620\n[ 74.256159] test_corruption+0x198/0x378\n[ 74.260144] kunit_try_run_case+0x14c/0x3d0\n[ 74.264401] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 74.269967] kthread+0x24c/0x2d0\n[ 74.273256] ret_from_fork+0x10/0x20\n[ 74.276890] \n[ 74.278414] freed by task 382 on cpu 5 at 74.191446s (0.086966s ago):\n[ 74.284944] test_corruption+0x1d8/0x378\n[ 74.288927] kunit_try_run_case+0x14c/0x3d0\n[ 74.293184] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 74.298748] kthread+0x24c/0x2d0\n[ 74.302037] ret_from_fork+0x10/0x20\n[ 74.305673] \n[ 74.307202] CPU: 5 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 74.316014] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 74.320261] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 74.325998] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_memory_corruption_in_test_corruption-7569c5c53b331bab9a1631e5621318ff0b26fee5160783ef2a69bacef5be5991": { "log_lines": [ "[ 72.307470] ==================================================================\n[ 72.314806] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378\n[ 72.314806] \n[ 72.323184] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#186):\n[ 72.332895] test_corruption+0x278/0x378\n[ 72.336884] kunit_try_run_case+0x14c/0x3d0\n[ 72.341144] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 72.346700] kthread+0x24c/0x2d0\n[ 72.349992] ret_from_fork+0x10/0x20\n[ 72.353631] \n[ 72.355158] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 72.355158] \n[ 72.364929] allocated by task 380 on cpu 4 at 72.307430s (0.057497s ago):\n[ 72.371807] test_alloc+0x298/0x620\n[ 72.375357] test_corruption+0xdc/0x378\n[ 72.379253] kunit_try_run_case+0x14c/0x3d0\n[ 72.383509] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 72.389075] kthread+0x24c/0x2d0\n[ 72.392363] ret_from_fork+0x10/0x20\n[ 72.395997] \n[ 72.397520] freed by task 380 on cpu 4 at 72.307439s (0.090080s ago):\n[ 72.404049] test_corruption+0x278/0x378\n[ 72.408034] kunit_try_run_case+0x14c/0x3d0\n[ 72.412291] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 72.417858] kthread+0x24c/0x2d0\n[ 72.421144] ret_from_fork+0x10/0x20\n[ 72.424777] \n[ 72.426306] CPU: 4 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 72.435118] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 72.439365] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 72.445103] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_memory_corruption_in_test_corruption-5d1c7d23fb4e7bec778cbbc7e6c97dc204eb54cc290f933cb53d089aea580be1": { "log_lines": [ "[ 72.971495] ==================================================================\n[ 72.978849] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378\n[ 72.978849] \n[ 72.987226] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#192):\n[ 72.994220] test_corruption+0x284/0x378\n[ 72.998207] kunit_try_run_case+0x14c/0x3d0\n[ 73.002468] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 73.008036] kthread+0x24c/0x2d0\n[ 73.011329] ret_from_fork+0x10/0x20\n[ 73.014965] \n[ 73.016491] kfence-#192: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 73.016491] \n[ 73.026260] allocated by task 380 on cpu 4 at 72.971446s (0.054813s ago):\n[ 73.033149] test_alloc+0x298/0x620\n[ 73.036700] test_corruption+0x198/0x378\n[ 73.040684] kunit_try_run_case+0x14c/0x3d0\n[ 73.044940] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 73.050506] kthread+0x24c/0x2d0\n[ 73.053795] ret_from_fork+0x10/0x20\n[ 73.057430] \n[ 73.058954] freed by task 380 on cpu 4 at 72.971456s (0.087496s ago):\n[ 73.065485] test_corruption+0x284/0x378\n[ 73.069469] kunit_try_run_case+0x14c/0x3d0\n[ 73.073726] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 73.079292] kthread+0x24c/0x2d0\n[ 73.082580] ret_from_fork+0x10/0x20\n[ 73.086215] \n[ 73.087743] CPU: 4 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 73.096558] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 73.100806] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 73.106543] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_memory_corruption_in_test_corruption-6d29195b7946e82c0283f265225d13958e5661e692df6e932eff653649136fce": { "log_lines": [ "[ 73.215453] ==================================================================\n[ 73.222781] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378\n[ 73.222781] \n[ 73.231157] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#194):\n[ 73.240869] test_corruption+0x120/0x378\n[ 73.244857] kunit_try_run_case+0x14c/0x3d0\n[ 73.249118] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 73.254686] kthread+0x24c/0x2d0\n[ 73.257979] ret_from_fork+0x10/0x20\n[ 73.261617] \n[ 73.263143] kfence-#194: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 73.263143] \n[ 73.272382] allocated by task 382 on cpu 5 at 73.215414s (0.056967s ago):\n[ 73.279270] test_alloc+0x22c/0x620\n[ 73.282819] test_corruption+0xdc/0x378\n[ 73.286715] kunit_try_run_case+0x14c/0x3d0\n[ 73.290971] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 73.296537] kthread+0x24c/0x2d0\n[ 73.299826] ret_from_fork+0x10/0x20\n[ 73.303460] \n[ 73.304984] freed by task 382 on cpu 5 at 73.215422s (0.089560s ago):\n[ 73.311513] test_corruption+0x120/0x378\n[ 73.315496] kunit_try_run_case+0x14c/0x3d0\n[ 73.319751] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 73.325317] kthread+0x24c/0x2d0\n[ 73.328605] ret_from_fork+0x10/0x20\n[ 73.332239] \n[ 73.333768] CPU: 5 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 73.342580] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 73.346829] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 73.352566] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_out-of-bounds_read_in_test_kmalloc_aligned_oob_read-1e52b615d99fe198fab1b7f6e95bc157cc5ab692199259799d432a5cbf79dfc9": { "log_lines": [ "[ 78.595510] ==================================================================\n[ 78.602863] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468\n[ 78.602863] \n[ 78.612573] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#245):\n[ 78.620158] test_kmalloc_aligned_oob_read+0x238/0x468\n[ 78.625376] kunit_try_run_case+0x14c/0x3d0\n[ 78.629639] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 78.635206] kthread+0x24c/0x2d0\n[ 78.638499] ret_from_fork+0x10/0x20\n[ 78.642137] \n[ 78.643662] kfence-#245: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96\n[ 78.643662] \n[ 78.653432] allocated by task 392 on cpu 7 at 78.595484s (0.057946s ago):\n[ 78.660323] test_alloc+0x298/0x620\n[ 78.663874] test_kmalloc_aligned_oob_read+0x100/0x468\n[ 78.669085] kunit_try_run_case+0x14c/0x3d0\n[ 78.673341] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 78.678907] kthread+0x24c/0x2d0\n[ 78.682196] ret_from_fork+0x10/0x20\n[ 78.685830] \n[ 78.687359] CPU: 7 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 78.696172] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 78.700421] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 78.706157] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_memory_corruption_in_test_kmalloc_aligned_oob_write-71690964dfaa729d6b8de4c2fe7d8ae2b34b0d9e271b0ad30f322719eaa0d592": { "log_lines": [ "[ 79.023571] ==================================================================\n[ 79.030927] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0\n[ 79.030927] \n[ 79.040620] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#249):\n[ 79.050330] test_kmalloc_aligned_oob_write+0x214/0x2c0\n[ 79.055634] kunit_try_run_case+0x14c/0x3d0\n[ 79.059896] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 79.065463] kthread+0x24c/0x2d0\n[ 79.068755] ret_from_fork+0x10/0x20\n[ 79.072394] \n[ 79.073921] kfence-#249: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96\n[ 79.073921] \n[ 79.083694] allocated by task 394 on cpu 4 at 79.023521s (0.060171s ago):\n[ 79.090580] test_alloc+0x298/0x620\n[ 79.094129] test_kmalloc_aligned_oob_write+0xbc/0x2c0\n[ 79.099338] kunit_try_run_case+0x14c/0x3d0\n[ 79.103594] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 79.109148] kthread+0x24c/0x2d0\n[ 79.112437] ret_from_fork+0x10/0x20\n[ 79.116071] \n[ 79.117594] freed by task 394 on cpu 4 at 79.023532s (0.094060s ago):\n[ 79.124124] test_kmalloc_aligned_oob_write+0x214/0x2c0\n[ 79.129420] kunit_try_run_case+0x14c/0x3d0\n[ 79.133676] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 79.139241] kthread+0x24c/0x2d0\n[ 79.142529] ret_from_fork+0x10/0x20\n[ 79.146164] \n[ 79.147693] CPU: 4 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 79.156507] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 79.160751] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 79.166489] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_invalid_read_in_test_invalid_access-7a4de0d1d071d45e67f44b81b640caeadf6ff65adfb35fa9cc1c54a5dafbd9f4": { "log_lines": [ "[ 79.395301] ==================================================================\n[ 79.406688] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0\n[ 79.406688] \n[ 79.414954] Invalid read at 0x(____ptrval____):\n[ 79.419592] test_invalid_access+0xdc/0x1f0\n[ 79.424190] kunit_try_run_case+0x14c/0x3d0\n[ 79.428511] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 79.434103] kthread+0x24c/0x2d0\n[ 79.437414] ret_from_fork+0x10/0x20\n[ 79.441076] \n[ 79.442615] CPU: 5 UID: 0 PID: 400 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 79.451447] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 79.455707] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 79.461455] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_use-after-free_read_in_test_memcache_typesafe_by_rcu-fd730ffcd18a509e6fc0ab61c693a3d3af16b41c06c01e89a7c739537e7a95f3": { "log_lines": [ "[ 101.063233] ==================================================================\n[ 101.070591] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560\n[ 101.070591] \n[ 101.080386] Use-after-free read at 0x(____ptrval____) (in kfence-#254):\n[ 101.087086] test_memcache_typesafe_by_rcu+0x280/0x560\n[ 101.092302] kunit_try_run_case+0x14c/0x3d0\n[ 101.096563] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 101.102130] kthread+0x24c/0x2d0\n[ 101.105422] ret_from_fork+0x10/0x20\n[ 101.109059] \n[ 101.110586] kfence-#254: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test\n[ 101.110586] \n[ 101.119833] allocated by task 404 on cpu 6 at 101.017750s (0.102081s ago):\n[ 101.126804] test_alloc+0x22c/0x620\n[ 101.130352] test_memcache_typesafe_by_rcu+0x15c/0x560\n[ 101.135562] kunit_try_run_case+0x14c/0x3d0\n[ 101.139818] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 101.145382] kthread+0x24c/0x2d0\n[ 101.148671] ret_from_fork+0x10/0x20\n[ 101.152305] \n[ 101.153828] freed by task 404 on cpu 6 at 101.017760s (0.136066s ago):\n[ 101.160442] test_memcache_typesafe_by_rcu+0x1a8/0x560\n[ 101.165654] kunit_try_run_case+0x14c/0x3d0\n[ 101.169910] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 101.175475] kthread+0x24c/0x2d0\n[ 101.178763] ret_from_fork+0x10/0x20\n[ 101.182397] \n[ 101.183926] CPU: 7 UID: 0 PID: 404 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 101.192737] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 101.196986] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 101.202722] ==================================================================" ], "result": "fail" }, "kfence-BUG_KFENCE_use-after-free_read_in_test_krealloc-e0656429b11240fefa82268c626f28a5b65d1c34ef19cdc41f040f5a3b0dece2": { "log_lines": [ "[ 101.311776] ==================================================================\n[ 101.319103] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830\n[ 101.319103] \n[ 101.327484] Use-after-free read at 0x(____ptrval____) (in kfence-#17):\n[ 101.334092] test_krealloc+0x51c/0x830\n[ 101.337902] kunit_try_run_case+0x14c/0x3d0\n[ 101.342163] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 101.347729] kthread+0x24c/0x2d0\n[ 101.351023] ret_from_fork+0x10/0x20\n[ 101.354659] \n[ 101.356195] kfence-#17: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32\n[ 101.356195] \n[ 101.365875] allocated by task 406 on cpu 4 at 101.311718s (0.054156s ago):\n[ 101.372850] test_alloc+0x298/0x620\n[ 101.376396] test_krealloc+0xc0/0x830\n[ 101.380116] kunit_try_run_case+0x14c/0x3d0\n[ 101.384370] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 101.389935] kthread+0x24c/0x2d0\n[ 101.393221] ret_from_fork+0x10/0x20\n[ 101.396854] \n[ 101.398378] freed by task 406 on cpu 4 at 101.311737s (0.086639s ago):\n[ 101.405001] krealloc_noprof+0x148/0x360\n[ 101.408993] test_krealloc+0x1dc/0x830\n[ 101.412799] kunit_try_run_case+0x14c/0x3d0\n[ 101.417051] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 101.422614] kthread+0x24c/0x2d0\n[ 101.425899] ret_from_fork+0x10/0x20\n[ 101.429532] \n[ 101.431062] CPU: 4 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 101.439876] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 101.444121] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 101.449859] ==================================================================" ], "result": "fail" }, "internal-error-oops-Oops_PREEMPT_SMP-7b05c4affab40d14c08b8c3be1e4a4e0b3e823dfd53fec0ffb512ac4fcafe798": { "log_lines": [ "[ 116.214516] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n[ 116.220867] Modules linked in:\n[ 116.223990] CPU: 5 UID: 0 PID: 701 Comm: kunit_try_catch Tainted: G B N 6.13.3 #1\n[ 116.232810] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 116.237054] Hardware name: Thundercomm Dragonboard 845c (DT)\n[ 116.242789] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 116.249834] pc : kunit_test_null_dereference+0x70/0x170\n[ 116.255150] lr : kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 116.261070] sp : ffff800087987dc0\n[ 116.264435] x29: ffff800087987e20 x28: 0000000000000000 x27: 0000000000000000\n[ 116.271674] x26: 0000000000000000 x25: 0000000000000000 x24: ffff1b1dc181d300\n[ 116.278909] x23: ffffcb84cabca7d0 x22: ffffcb84cabd3390 x21: ffff1b1dc181d308\n[ 116.286152] x20: 1ffff00010f30fb8 x19: ffff8000800a79f0 x18: 000000005bd5490e\n[ 116.293384] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000000\n[ 116.300615] x14: ffffcb84cf442900 x13: ffff4f994bb55000 x12: ffff6363b9d75dc2\n[ 116.307858] x11: 1fffe363b9d75dc1 x10: ffff6363b9d75dc1 x9 : ffffcb84cabca858\n[ 116.315093] x8 : ffff800087987cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3\n[ 116.322322] x5 : ffff700010f30fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003\n[ 116.329552] x2 : dfff800000000000 x1 : ffff1b1dcebae540 x0 : ffff8000800a79f0\n[ 116.336783] Call trace:\n[ 116.339272] kunit_test_null_dereference+0x70/0x170 (P)\n[ 116.344576] kunit_generic_run_threadfn_adapter+0x88/0x100\n[ 116.350139] kthread+0x24c/0x2d0\n[ 116.353430] ret_from_fork+0x10/0x20\n[ 116.357084] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) \n[ 116.363255] ---[ end trace 0000000000000000 ]---" ], "result": "fail" }, "bug-BUG_KASAN_slab-out-of-bounds_in_kmalloc_track_caller_oob_right-353d1d2704f58033b3ad98d6edce785de9d988f0f0a962154a39c90dd7189df2": { "log_lines": [ "[ 20.186711] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490" ], "result": "fail" } } }