Date
May 12, 2025, 11:48 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 19.207895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 19.267832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 19.358680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 19.142250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 19.147844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 90.948694] Internal error: Oops: 0000000096000005 [#1] SMP [ 90.953289] Modules linked in: [ 90.953725] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 90.954201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 90.954392] Hardware name: linux,dummy-virt (DT) [ 90.954727] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 90.955061] pc : kunit_test_null_dereference+0x70/0x170 [ 90.955365] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 90.955622] sp : ffff8000820f7d30 [ 90.955837] x29: ffff8000820f7d90 x28: 0000000000000000 x27: 0000000000000000 [ 90.956291] x26: 1ffe000018231261 x25: 0000000000000000 x24: 0000000000000004 [ 90.956654] x23: fff00000c118930c x22: ffffa8e06ce0acd8 x21: fff00000c139d508 [ 90.957016] x20: 1ffff0001041efa6 x19: ffff800080087990 x18: 000000006e2a1856 [ 90.957383] x17: 000000007f48da98 x16: 0000000000000100 x15: 000000008884be47 [ 90.957743] x14: 000000005bb35c1c x13: 1ffe00001b48ad81 x12: fffd8000182d062c [ 90.958079] x11: 1ffe0000182d062b x10: fffd8000182d062b x9 : ffffa8e06ce02140 [ 90.958465] x8 : ffff8000820f7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 90.958820] x5 : ffff70001041efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 90.959219] x2 : dfff800000000000 x1 : fff00000c1682880 x0 : ffff800080087990 [ 90.959579] Call trace: [ 90.959707] kunit_test_null_dereference+0x70/0x170 (P) [ 90.959971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 90.960236] kthread+0x328/0x630 [ 90.960493] ret_from_fork+0x10/0x20 [ 90.960897] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 90.961436] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 49.847447] ================================================================== [ 49.847515] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 49.847515] [ 49.847609] Use-after-free read at 0x00000000a2f1349e (in kfence-#171): [ 49.847663] test_krealloc+0x51c/0x830 [ 49.847708] kunit_try_run_case+0x170/0x3f0 [ 49.847752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.847794] kthread+0x328/0x630 [ 49.847835] ret_from_fork+0x10/0x20 [ 49.847875] [ 49.847899] kfence-#171: 0x00000000a2f1349e-0x000000004ed040c9, size=32, cache=kmalloc-32 [ 49.847899] [ 49.847953] allocated by task 337 on cpu 1 at 49.846600s (0.001349s ago): [ 49.848022] test_alloc+0x29c/0x628 [ 49.848075] test_krealloc+0xc0/0x830 [ 49.848113] kunit_try_run_case+0x170/0x3f0 [ 49.848151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.848193] kthread+0x328/0x630 [ 49.848231] ret_from_fork+0x10/0x20 [ 49.848268] [ 49.848292] freed by task 337 on cpu 1 at 49.846987s (0.001300s ago): [ 49.848351] krealloc_noprof+0x148/0x360 [ 49.848390] test_krealloc+0x1dc/0x830 [ 49.848427] kunit_try_run_case+0x170/0x3f0 [ 49.848463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.848504] kthread+0x328/0x630 [ 49.848539] ret_from_fork+0x10/0x20 [ 49.848577] [ 49.848623] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 49.848704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.848735] Hardware name: linux,dummy-virt (DT) [ 49.848770] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 49.774681] ================================================================== [ 49.774790] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.774790] [ 49.774902] Use-after-free read at 0x000000004b039977 (in kfence-#170): [ 49.774959] test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.775011] kunit_try_run_case+0x170/0x3f0 [ 49.775070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.775116] kthread+0x328/0x630 [ 49.775160] ret_from_fork+0x10/0x20 [ 49.775200] [ 49.775226] kfence-#170: 0x000000004b039977-0x00000000635159b6, size=32, cache=test [ 49.775226] [ 49.775279] allocated by task 335 on cpu 0 at 49.742509s (0.032766s ago): [ 49.775351] test_alloc+0x230/0x628 [ 49.775389] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 49.775431] kunit_try_run_case+0x170/0x3f0 [ 49.775467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.775507] kthread+0x328/0x630 [ 49.775545] ret_from_fork+0x10/0x20 [ 49.775581] [ 49.775604] freed by task 335 on cpu 0 at 49.742677s (0.032923s ago): [ 49.775659] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 49.775701] kunit_try_run_case+0x170/0x3f0 [ 49.775738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.775779] kthread+0x328/0x630 [ 49.775814] ret_from_fork+0x10/0x20 [ 49.775852] [ 49.775899] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 49.775977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.776007] Hardware name: linux,dummy-virt (DT) [ 49.776049] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 27.819703] ================================================================== [ 27.819893] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 27.819893] [ 27.820087] Invalid read at 0x00000000e9e653cc: [ 27.820207] test_invalid_access+0xdc/0x1f0 [ 27.820325] kunit_try_run_case+0x170/0x3f0 [ 27.820435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.820539] kthread+0x328/0x630 [ 27.820642] ret_from_fork+0x10/0x20 [ 27.820752] [ 27.820858] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 27.821060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.821155] Hardware name: linux,dummy-virt (DT) [ 27.821246] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 27.586843] ================================================================== [ 27.586938] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.586938] [ 27.587004] Corrupted memory at 0x0000000023a7d5e2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#165): [ 27.587336] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.587386] kunit_try_run_case+0x170/0x3f0 [ 27.587429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.587472] kthread+0x328/0x630 [ 27.587512] ret_from_fork+0x10/0x20 [ 27.587549] [ 27.587576] kfence-#165: 0x00000000a23a880c-0x000000004de97bd3, size=73, cache=kmalloc-96 [ 27.587576] [ 27.587631] allocated by task 325 on cpu 1 at 27.586466s (0.001161s ago): [ 27.587696] test_alloc+0x29c/0x628 [ 27.587738] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 27.587781] kunit_try_run_case+0x170/0x3f0 [ 27.587820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.587861] kthread+0x328/0x630 [ 27.587900] ret_from_fork+0x10/0x20 [ 27.587939] [ 27.587963] freed by task 325 on cpu 1 at 27.586670s (0.001289s ago): [ 27.588024] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.588080] kunit_try_run_case+0x170/0x3f0 [ 27.588120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.588162] kthread+0x328/0x630 [ 27.588201] ret_from_fork+0x10/0x20 [ 27.588240] [ 27.588282] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 27.588367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.588397] Hardware name: linux,dummy-virt (DT) [ 27.588431] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 27.378725] ================================================================== [ 27.378795] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 27.378795] [ 27.378895] Out-of-bounds read at 0x000000009f98511c (105B right of kfence-#163): [ 27.378958] test_kmalloc_aligned_oob_read+0x238/0x468 [ 27.379009] kunit_try_run_case+0x170/0x3f0 [ 27.379066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.379110] kthread+0x328/0x630 [ 27.379153] ret_from_fork+0x10/0x20 [ 27.379191] [ 27.379216] kfence-#163: 0x0000000004ab0743-0x00000000bfb0b80e, size=73, cache=kmalloc-96 [ 27.379216] [ 27.379270] allocated by task 323 on cpu 1 at 27.378428s (0.000837s ago): [ 27.379341] test_alloc+0x29c/0x628 [ 27.379379] test_kmalloc_aligned_oob_read+0x100/0x468 [ 27.379421] kunit_try_run_case+0x170/0x3f0 [ 27.379457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.379499] kthread+0x328/0x630 [ 27.379535] ret_from_fork+0x10/0x20 [ 27.379574] [ 27.379620] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 27.379700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.379731] Hardware name: linux,dummy-virt (DT) [ 27.379767] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 21.658665] ================================================================== [ 21.658747] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 21.658747] [ 21.658813] Corrupted memory at 0x00000000afb8e7a5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#108): [ 21.659128] test_corruption+0x278/0x378 [ 21.659177] kunit_try_run_case+0x170/0x3f0 [ 21.659221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.659264] kthread+0x328/0x630 [ 21.659306] ret_from_fork+0x10/0x20 [ 21.659345] [ 21.659368] kfence-#108: 0x00000000106a56f1-0x0000000026f0997b, size=32, cache=kmalloc-32 [ 21.659368] [ 21.659425] allocated by task 311 on cpu 1 at 21.658472s (0.000949s ago): [ 21.659487] test_alloc+0x29c/0x628 [ 21.659527] test_corruption+0xdc/0x378 [ 21.659563] kunit_try_run_case+0x170/0x3f0 [ 21.659602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.659643] kthread+0x328/0x630 [ 21.659679] ret_from_fork+0x10/0x20 [ 21.659715] [ 21.659738] freed by task 311 on cpu 1 at 21.658579s (0.001155s ago): [ 21.659796] test_corruption+0x278/0x378 [ 21.659833] kunit_try_run_case+0x170/0x3f0 [ 21.659870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.659910] kthread+0x328/0x630 [ 21.659947] ret_from_fork+0x10/0x20 [ 21.659984] [ 21.660027] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 21.660118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.660148] Hardware name: linux,dummy-virt (DT) [ 21.660182] ================================================================== [ 21.970945] ================================================================== [ 21.971086] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 21.971086] [ 21.971156] Corrupted memory at 0x000000004ee2c1c8 [ ! ] (in kfence-#111): [ 21.971297] test_corruption+0x284/0x378 [ 21.971344] kunit_try_run_case+0x170/0x3f0 [ 21.971386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.971429] kthread+0x328/0x630 [ 21.971468] ret_from_fork+0x10/0x20 [ 21.971507] [ 21.971530] kfence-#111: 0x00000000bbe87463-0x000000007b233d5a, size=32, cache=kmalloc-32 [ 21.971530] [ 21.971586] allocated by task 311 on cpu 1 at 21.970525s (0.001058s ago): [ 21.971650] test_alloc+0x29c/0x628 [ 21.971690] test_corruption+0x198/0x378 [ 21.971727] kunit_try_run_case+0x170/0x3f0 [ 21.971764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.971803] kthread+0x328/0x630 [ 21.971842] ret_from_fork+0x10/0x20 [ 21.971879] [ 21.971901] freed by task 311 on cpu 1 at 21.970683s (0.001214s ago): [ 21.971959] test_corruption+0x284/0x378 [ 21.971998] kunit_try_run_case+0x170/0x3f0 [ 21.972035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.972089] kthread+0x328/0x630 [ 21.972128] ret_from_fork+0x10/0x20 [ 21.972165] [ 21.972207] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 21.972285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.972316] Hardware name: linux,dummy-virt (DT) [ 21.972351] ================================================================== [ 22.698749] ================================================================== [ 22.698927] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 22.698927] [ 22.699023] Corrupted memory at 0x0000000073290a23 [ ! . . . . . . . . . . . . . . . ] (in kfence-#118): [ 22.699341] test_corruption+0x120/0x378 [ 22.699391] kunit_try_run_case+0x170/0x3f0 [ 22.699434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.699477] kthread+0x328/0x630 [ 22.699515] ret_from_fork+0x10/0x20 [ 22.699553] [ 22.699576] kfence-#118: 0x00000000b67e8002-0x0000000042d19729, size=32, cache=test [ 22.699576] [ 22.699633] allocated by task 313 on cpu 1 at 22.698511s (0.001119s ago): [ 22.699698] test_alloc+0x230/0x628 [ 22.699739] test_corruption+0xdc/0x378 [ 22.699778] kunit_try_run_case+0x170/0x3f0 [ 22.699814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.699854] kthread+0x328/0x630 [ 22.699890] ret_from_fork+0x10/0x20 [ 22.699928] [ 22.699953] freed by task 313 on cpu 1 at 22.698604s (0.001345s ago): [ 22.700010] test_corruption+0x120/0x378 [ 22.700057] kunit_try_run_case+0x170/0x3f0 [ 22.700097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.700138] kthread+0x328/0x630 [ 22.700176] ret_from_fork+0x10/0x20 [ 22.700212] [ 22.700259] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 22.700336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.700366] Hardware name: linux,dummy-virt (DT) [ 22.700398] ================================================================== [ 23.010775] ================================================================== [ 23.010943] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 23.010943] [ 23.011062] Corrupted memory at 0x000000001dfa8df5 [ ! ] (in kfence-#121): [ 23.011186] test_corruption+0x1d8/0x378 [ 23.011233] kunit_try_run_case+0x170/0x3f0 [ 23.011276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.011318] kthread+0x328/0x630 [ 23.011359] ret_from_fork+0x10/0x20 [ 23.011396] [ 23.011421] kfence-#121: 0x00000000a57fa0bf-0x0000000084dabe98, size=32, cache=test [ 23.011421] [ 23.011477] allocated by task 313 on cpu 1 at 23.010536s (0.000937s ago): [ 23.011542] test_alloc+0x230/0x628 [ 23.011582] test_corruption+0x198/0x378 [ 23.011621] kunit_try_run_case+0x170/0x3f0 [ 23.011659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.011700] kthread+0x328/0x630 [ 23.011737] ret_from_fork+0x10/0x20 [ 23.011774] [ 23.011798] freed by task 313 on cpu 1 at 23.010632s (0.001162s ago): [ 23.011856] test_corruption+0x1d8/0x378 [ 23.011895] kunit_try_run_case+0x170/0x3f0 [ 23.011932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.011973] kthread+0x328/0x630 [ 23.012010] ret_from_fork+0x10/0x20 [ 23.012058] [ 23.012101] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 23.012180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.012210] Hardware name: linux,dummy-virt (DT) [ 23.012244] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 21.554505] ================================================================== [ 21.554595] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 21.554595] [ 21.554659] Invalid free of 0x00000000bf68c757 (in kfence-#107): [ 21.554712] test_invalid_addr_free+0xec/0x238 [ 21.554759] kunit_try_run_case+0x170/0x3f0 [ 21.554800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.554840] kthread+0x328/0x630 [ 21.554879] ret_from_fork+0x10/0x20 [ 21.554917] [ 21.554941] kfence-#107: 0x000000000df7af08-0x000000000fa48d90, size=32, cache=test [ 21.554941] [ 21.554993] allocated by task 309 on cpu 1 at 21.554391s (0.000598s ago): [ 21.555067] test_alloc+0x230/0x628 [ 21.555108] test_invalid_addr_free+0xd4/0x238 [ 21.555149] kunit_try_run_case+0x170/0x3f0 [ 21.555185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.555227] kthread+0x328/0x630 [ 21.555264] ret_from_fork+0x10/0x20 [ 21.555302] [ 21.555343] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 21.555423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.555453] Hardware name: linux,dummy-virt (DT) [ 21.555486] ================================================================== [ 21.450626] ================================================================== [ 21.450703] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 21.450703] [ 21.450768] Invalid free of 0x0000000048dc97a3 (in kfence-#106): [ 21.450825] test_invalid_addr_free+0x1ac/0x238 [ 21.450874] kunit_try_run_case+0x170/0x3f0 [ 21.450919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.450961] kthread+0x328/0x630 [ 21.451006] ret_from_fork+0x10/0x20 [ 21.451072] [ 21.451100] kfence-#106: 0x00000000a335a609-0x00000000f57d7805, size=32, cache=kmalloc-32 [ 21.451100] [ 21.451156] allocated by task 307 on cpu 1 at 21.450478s (0.000674s ago): [ 21.451222] test_alloc+0x29c/0x628 [ 21.451261] test_invalid_addr_free+0xd4/0x238 [ 21.451302] kunit_try_run_case+0x170/0x3f0 [ 21.451341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.451381] kthread+0x328/0x630 [ 21.451417] ret_from_fork+0x10/0x20 [ 21.451456] [ 21.451501] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 21.451585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.451613] Hardware name: linux,dummy-virt (DT) [ 21.451648] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 21.242817] ================================================================== [ 21.242943] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 21.242943] [ 21.243014] Invalid free of 0x00000000304509bc (in kfence-#104): [ 21.243101] test_double_free+0x1bc/0x238 [ 21.243151] kunit_try_run_case+0x170/0x3f0 [ 21.243194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.243237] kthread+0x328/0x630 [ 21.243277] ret_from_fork+0x10/0x20 [ 21.243315] [ 21.243340] kfence-#104: 0x00000000304509bc-0x0000000096f48a84, size=32, cache=kmalloc-32 [ 21.243340] [ 21.243395] allocated by task 303 on cpu 0 at 21.242543s (0.000848s ago): [ 21.243459] test_alloc+0x29c/0x628 [ 21.243499] test_double_free+0xd4/0x238 [ 21.243538] kunit_try_run_case+0x170/0x3f0 [ 21.243577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.243618] kthread+0x328/0x630 [ 21.243655] ret_from_fork+0x10/0x20 [ 21.243694] [ 21.243717] freed by task 303 on cpu 0 at 21.242623s (0.001090s ago): [ 21.243777] test_double_free+0x1ac/0x238 [ 21.243817] kunit_try_run_case+0x170/0x3f0 [ 21.243855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.243896] kthread+0x328/0x630 [ 21.243934] ret_from_fork+0x10/0x20 [ 21.243972] [ 21.244017] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 21.244108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.244136] Hardware name: linux,dummy-virt (DT) [ 21.244169] ================================================================== [ 21.346686] ================================================================== [ 21.346778] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 21.346778] [ 21.346844] Invalid free of 0x00000000a73bcd9a (in kfence-#105): [ 21.346899] test_double_free+0x100/0x238 [ 21.346945] kunit_try_run_case+0x170/0x3f0 [ 21.346988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347031] kthread+0x328/0x630 [ 21.347094] ret_from_fork+0x10/0x20 [ 21.347137] [ 21.347162] kfence-#105: 0x00000000a73bcd9a-0x00000000613b457c, size=32, cache=test [ 21.347162] [ 21.347217] allocated by task 305 on cpu 0 at 21.346434s (0.000779s ago): [ 21.347281] test_alloc+0x230/0x628 [ 21.347322] test_double_free+0xd4/0x238 [ 21.347360] kunit_try_run_case+0x170/0x3f0 [ 21.347398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347439] kthread+0x328/0x630 [ 21.347475] ret_from_fork+0x10/0x20 [ 21.347514] [ 21.347538] freed by task 305 on cpu 0 at 21.346496s (0.001037s ago): [ 21.347598] test_double_free+0xf0/0x238 [ 21.347636] kunit_try_run_case+0x170/0x3f0 [ 21.347674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347714] kthread+0x328/0x630 [ 21.347752] ret_from_fork+0x10/0x20 [ 21.347788] [ 21.347831] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 21.347912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.347942] Hardware name: linux,dummy-virt (DT) [ 21.347976] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 20.930548] ================================================================== [ 20.930655] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 20.930655] [ 20.930753] Use-after-free read at 0x00000000b968c94d (in kfence-#101): [ 20.930813] test_use_after_free_read+0x114/0x248 [ 20.930868] kunit_try_run_case+0x170/0x3f0 [ 20.930916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.930965] kthread+0x328/0x630 [ 20.931013] ret_from_fork+0x10/0x20 [ 20.931069] [ 20.931097] kfence-#101: 0x00000000b968c94d-0x00000000e88ed70f, size=32, cache=test [ 20.931097] [ 20.931158] allocated by task 297 on cpu 0 at 20.930360s (0.000795s ago): [ 20.931237] test_alloc+0x230/0x628 [ 20.931283] test_use_after_free_read+0xd0/0x248 [ 20.931329] kunit_try_run_case+0x170/0x3f0 [ 20.931371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.931417] kthread+0x328/0x630 [ 20.931459] ret_from_fork+0x10/0x20 [ 20.931499] [ 20.931527] freed by task 297 on cpu 0 at 20.930417s (0.001106s ago): [ 20.931642] test_use_after_free_read+0xf0/0x248 [ 20.931689] kunit_try_run_case+0x170/0x3f0 [ 20.931729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.931774] kthread+0x328/0x630 [ 20.931812] ret_from_fork+0x10/0x20 [ 20.931853] [ 20.931897] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.931990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.932021] Hardware name: linux,dummy-virt (DT) [ 20.932068] ================================================================== [ 20.828166] ================================================================== [ 20.828280] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 20.828280] [ 20.828808] Use-after-free read at 0x00000000f0010944 (in kfence-#100): [ 20.828905] test_use_after_free_read+0x114/0x248 [ 20.829492] kunit_try_run_case+0x170/0x3f0 [ 20.829570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.829865] kthread+0x328/0x630 [ 20.829928] ret_from_fork+0x10/0x20 [ 20.830144] [ 20.830231] kfence-#100: 0x00000000f0010944-0x000000006293033e, size=32, cache=kmalloc-32 [ 20.830231] [ 20.830304] allocated by task 295 on cpu 0 at 20.827628s (0.002672s ago): [ 20.830394] test_alloc+0x29c/0x628 [ 20.830760] test_use_after_free_read+0xd0/0x248 [ 20.830825] kunit_try_run_case+0x170/0x3f0 [ 20.830871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.830917] kthread+0x328/0x630 [ 20.830955] ret_from_fork+0x10/0x20 [ 20.831017] [ 20.831060] freed by task 295 on cpu 0 at 20.827719s (0.003336s ago): [ 20.831145] test_use_after_free_read+0x1c0/0x248 [ 20.831191] kunit_try_run_case+0x170/0x3f0 [ 20.831232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.831278] kthread+0x328/0x630 [ 20.831317] ret_from_fork+0x10/0x20 [ 20.831358] [ 20.831408] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.831503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.831552] Hardware name: linux,dummy-virt (DT) [ 20.831590] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 20.514818] ================================================================== [ 20.514885] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 20.514885] [ 20.514971] Out-of-bounds write at 0x00000000b4061e8c (1B left of kfence-#97): [ 20.515028] test_out_of_bounds_write+0x100/0x240 [ 20.515099] kunit_try_run_case+0x170/0x3f0 [ 20.515189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.515270] kthread+0x328/0x630 [ 20.515350] ret_from_fork+0x10/0x20 [ 20.515425] [ 20.515476] kfence-#97: 0x00000000a9eed16a-0x00000000c36fc0b3, size=32, cache=kmalloc-32 [ 20.515476] [ 20.515548] allocated by task 291 on cpu 0 at 20.514676s (0.000868s ago): [ 20.515668] test_alloc+0x29c/0x628 [ 20.515752] test_out_of_bounds_write+0xc8/0x240 [ 20.515800] kunit_try_run_case+0x170/0x3f0 [ 20.515837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.515878] kthread+0x328/0x630 [ 20.515915] ret_from_fork+0x10/0x20 [ 20.515955] [ 20.515998] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.516090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.516121] Hardware name: linux,dummy-virt (DT) [ 20.516192] ================================================================== [ 20.722858] ================================================================== [ 20.722945] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 20.722945] [ 20.723037] Out-of-bounds write at 0x00000000c2bee07f (1B left of kfence-#99): [ 20.723110] test_out_of_bounds_write+0x100/0x240 [ 20.723159] kunit_try_run_case+0x170/0x3f0 [ 20.723202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.723244] kthread+0x328/0x630 [ 20.723283] ret_from_fork+0x10/0x20 [ 20.723321] [ 20.723347] kfence-#99: 0x00000000ce7d9867-0x00000000e3daef2d, size=32, cache=test [ 20.723347] [ 20.723403] allocated by task 293 on cpu 0 at 20.722759s (0.000640s ago): [ 20.723479] test_alloc+0x230/0x628 [ 20.723523] test_out_of_bounds_write+0xc8/0x240 [ 20.723565] kunit_try_run_case+0x170/0x3f0 [ 20.723604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.723648] kthread+0x328/0x630 [ 20.723686] ret_from_fork+0x10/0x20 [ 20.723725] [ 20.723769] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.723860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.723891] Hardware name: linux,dummy-virt (DT) [ 20.723926] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 20.205142] ================================================================== [ 20.205234] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 20.205234] [ 20.205344] Out-of-bounds read at 0x00000000193cecd2 (32B right of kfence-#94): [ 20.205405] test_out_of_bounds_read+0x1c8/0x3e0 [ 20.205454] kunit_try_run_case+0x170/0x3f0 [ 20.205496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.205538] kthread+0x328/0x630 [ 20.205579] ret_from_fork+0x10/0x20 [ 20.205618] [ 20.205643] kfence-#94: 0x00000000dce77df6-0x00000000db2f43cb, size=32, cache=kmalloc-32 [ 20.205643] [ 20.205695] allocated by task 287 on cpu 0 at 20.204870s (0.000821s ago): [ 20.205763] test_alloc+0x29c/0x628 [ 20.205803] test_out_of_bounds_read+0x198/0x3e0 [ 20.205841] kunit_try_run_case+0x170/0x3f0 [ 20.205877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.210125] kthread+0x328/0x630 [ 20.210651] ret_from_fork+0x10/0x20 [ 20.211011] [ 20.211190] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.211285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.211317] Hardware name: linux,dummy-virt (DT) [ 20.212098] ================================================================== [ 19.996963] ================================================================== [ 19.997221] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 19.997221] [ 19.997858] Out-of-bounds read at 0x000000002b0ff27e (1B left of kfence-#92): [ 19.998243] test_out_of_bounds_read+0x114/0x3e0 [ 19.998545] kunit_try_run_case+0x170/0x3f0 [ 19.998799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.998863] kthread+0x328/0x630 [ 19.998922] ret_from_fork+0x10/0x20 [ 19.999140] [ 19.999234] kfence-#92: 0x00000000201f8987-0x0000000031333c96, size=32, cache=kmalloc-32 [ 19.999234] [ 19.999388] allocated by task 287 on cpu 0 at 19.995327s (0.004056s ago): [ 19.999523] test_alloc+0x29c/0x628 [ 19.999578] test_out_of_bounds_read+0xdc/0x3e0 [ 19.999700] kunit_try_run_case+0x170/0x3f0 [ 19.999854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.000006] kthread+0x328/0x630 [ 20.000196] ret_from_fork+0x10/0x20 [ 20.000400] [ 20.000691] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.000877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.000988] Hardware name: linux,dummy-virt (DT) [ 20.001063] ================================================================== [ 20.411320] ================================================================== [ 20.411942] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 20.411942] [ 20.412072] Out-of-bounds read at 0x00000000233dad02 (32B right of kfence-#96): [ 20.412136] test_out_of_bounds_read+0x1c8/0x3e0 [ 20.412615] kunit_try_run_case+0x170/0x3f0 [ 20.412897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.412962] kthread+0x328/0x630 [ 20.413008] ret_from_fork+0x10/0x20 [ 20.413220] [ 20.413256] kfence-#96: 0x00000000bf25a7fd-0x0000000061b0a8e4, size=32, cache=test [ 20.413256] [ 20.413405] allocated by task 289 on cpu 0 at 20.411229s (0.002171s ago): [ 20.413482] test_alloc+0x230/0x628 [ 20.413523] test_out_of_bounds_read+0x198/0x3e0 [ 20.413630] kunit_try_run_case+0x170/0x3f0 [ 20.413696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.413744] kthread+0x328/0x630 [ 20.414092] ret_from_fork+0x10/0x20 [ 20.414385] [ 20.414523] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.414629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.414815] Hardware name: linux,dummy-virt (DT) [ 20.414885] ================================================================== [ 20.308153] ================================================================== [ 20.308232] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 20.308232] [ 20.308312] Out-of-bounds read at 0x0000000032b274bf (1B left of kfence-#95): [ 20.308369] test_out_of_bounds_read+0x114/0x3e0 [ 20.308416] kunit_try_run_case+0x170/0x3f0 [ 20.308698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.308772] kthread+0x328/0x630 [ 20.308989] ret_from_fork+0x10/0x20 [ 20.309059] [ 20.309260] kfence-#95: 0x0000000040bc5ddb-0x00000000f52f52b0, size=32, cache=test [ 20.309260] [ 20.309328] allocated by task 289 on cpu 0 at 20.308059s (0.001264s ago): [ 20.309809] test_alloc+0x230/0x628 [ 20.310076] test_out_of_bounds_read+0xdc/0x3e0 [ 20.310444] kunit_try_run_case+0x170/0x3f0 [ 20.310507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.310742] kthread+0x328/0x630 [ 20.310793] ret_from_fork+0x10/0x20 [ 20.311139] [ 20.311333] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 20.311595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.311792] Hardware name: linux,dummy-virt (DT) [ 20.311878] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_4
[ 16.736627] ================================================================== [ 16.736767] BUG: KFENCE: memory corruption in kmalloc_oob_memset_4+0x170/0x300 [ 16.736767] [ 16.736892] Corrupted memory at 0x00000000b5f03cb3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#66): [ 16.742249] kmalloc_oob_memset_4+0x170/0x300 [ 16.742575] kunit_try_run_case+0x170/0x3f0 [ 16.742671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.742775] kthread+0x328/0x630 [ 16.742846] ret_from_fork+0x10/0x20 [ 16.743122] [ 16.743657] kfence-#66: 0x0000000070e56bc7-0x00000000baf79b0e, size=120, cache=kmalloc-128 [ 16.743657] [ 16.744624] allocated by task 174 on cpu 1 at 16.730863s (0.013358s ago): [ 16.744907] kmalloc_oob_memset_4+0xb0/0x300 [ 16.745032] kunit_try_run_case+0x170/0x3f0 [ 16.745127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.745217] kthread+0x328/0x630 [ 16.745289] ret_from_fork+0x10/0x20 [ 16.745424] [ 16.745836] freed by task 174 on cpu 1 at 16.735697s (0.009828s ago): [ 16.746207] kmalloc_oob_memset_4+0x170/0x300 [ 16.746384] kunit_try_run_case+0x170/0x3f0 [ 16.746556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.746791] kthread+0x328/0x630 [ 16.746923] ret_from_fork+0x10/0x20 [ 16.747447] [ 16.747586] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.747859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.747934] Hardware name: linux,dummy-virt (DT) [ 16.748013] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 19.708559] ================================================================== [ 19.708624] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 19.708691] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.708744] [ 19.708776] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.708861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.708891] Hardware name: linux,dummy-virt (DT) [ 19.708922] Call trace: [ 19.708946] show_stack+0x20/0x38 (C) [ 19.708997] dump_stack_lvl+0x8c/0xd0 [ 19.709061] print_report+0x118/0x608 [ 19.709114] kasan_report+0xdc/0x128 [ 19.709161] kasan_check_range+0x100/0x1a8 [ 19.709208] __kasan_check_write+0x20/0x30 [ 19.709256] strncpy_from_user+0x3c/0x2a0 [ 19.709303] copy_user_test_oob+0x5c0/0xec8 [ 19.709349] kunit_try_run_case+0x170/0x3f0 [ 19.709396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.709447] kthread+0x328/0x630 [ 19.709492] ret_from_fork+0x10/0x20 [ 19.709539] [ 19.709561] Allocated by task 285: [ 19.709589] kasan_save_stack+0x3c/0x68 [ 19.709633] kasan_save_track+0x20/0x40 [ 19.709671] kasan_save_alloc_info+0x40/0x58 [ 19.709710] __kasan_kmalloc+0xd4/0xd8 [ 19.709745] __kmalloc_noprof+0x190/0x4d0 [ 19.709783] kunit_kmalloc_array+0x34/0x88 [ 19.709820] copy_user_test_oob+0xac/0xec8 [ 19.709973] kunit_try_run_case+0x170/0x3f0 [ 19.710065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.710122] kthread+0x328/0x630 [ 19.710171] ret_from_fork+0x10/0x20 [ 19.710226] [ 19.710248] The buggy address belongs to the object at fff00000c78d3c00 [ 19.710248] which belongs to the cache kmalloc-128 of size 128 [ 19.710322] The buggy address is located 0 bytes inside of [ 19.710322] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.710894] [ 19.710925] The buggy address belongs to the physical page: [ 19.711141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.711257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.711371] page_type: f5(slab) [ 19.711487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.711736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.712066] page dumped because: kasan: bad access detected [ 19.712117] [ 19.712153] Memory state around the buggy address: [ 19.712198] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.712242] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712299] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.712508] ^ [ 19.712557] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712737] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712796] ================================================================== [ 19.713494] ================================================================== [ 19.713667] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 19.713732] Write of size 1 at addr fff00000c78d3c78 by task kunit_try_catch/285 [ 19.713795] [ 19.714095] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.714457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.714613] Hardware name: linux,dummy-virt (DT) [ 19.714659] Call trace: [ 19.714747] show_stack+0x20/0x38 (C) [ 19.715014] dump_stack_lvl+0x8c/0xd0 [ 19.715136] print_report+0x118/0x608 [ 19.715398] kasan_report+0xdc/0x128 [ 19.715462] __asan_report_store1_noabort+0x20/0x30 [ 19.715658] strncpy_from_user+0x270/0x2a0 [ 19.715742] copy_user_test_oob+0x5c0/0xec8 [ 19.715950] kunit_try_run_case+0x170/0x3f0 [ 19.716023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.716137] kthread+0x328/0x630 [ 19.716326] ret_from_fork+0x10/0x20 [ 19.716384] [ 19.716407] Allocated by task 285: [ 19.717077] kasan_save_stack+0x3c/0x68 [ 19.717136] kasan_save_track+0x20/0x40 [ 19.717185] kasan_save_alloc_info+0x40/0x58 [ 19.717229] __kasan_kmalloc+0xd4/0xd8 [ 19.717308] __kmalloc_noprof+0x190/0x4d0 [ 19.717409] kunit_kmalloc_array+0x34/0x88 [ 19.717628] copy_user_test_oob+0xac/0xec8 [ 19.717763] kunit_try_run_case+0x170/0x3f0 [ 19.717808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.717856] kthread+0x328/0x630 [ 19.718205] ret_from_fork+0x10/0x20 [ 19.718366] [ 19.718427] The buggy address belongs to the object at fff00000c78d3c00 [ 19.718427] which belongs to the cache kmalloc-128 of size 128 [ 19.718577] The buggy address is located 0 bytes to the right of [ 19.718577] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.718728] [ 19.718809] The buggy address belongs to the physical page: [ 19.718931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.719092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.719147] page_type: f5(slab) [ 19.719190] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.719242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.719283] page dumped because: kasan: bad access detected [ 19.719465] [ 19.719493] Memory state around the buggy address: [ 19.719681] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.719758] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.719986] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.720050] ^ [ 19.720101] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.720163] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.720205] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 19.672309] ================================================================== [ 19.672378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.672438] Read of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.672491] [ 19.672526] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.672611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.672641] Hardware name: linux,dummy-virt (DT) [ 19.672673] Call trace: [ 19.672697] show_stack+0x20/0x38 (C) [ 19.672746] dump_stack_lvl+0x8c/0xd0 [ 19.672794] print_report+0x118/0x608 [ 19.672838] kasan_report+0xdc/0x128 [ 19.672883] kasan_check_range+0x100/0x1a8 [ 19.672930] __kasan_check_read+0x20/0x30 [ 19.672975] copy_user_test_oob+0x728/0xec8 [ 19.673021] kunit_try_run_case+0x170/0x3f0 [ 19.673576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.673876] kthread+0x328/0x630 [ 19.674155] ret_from_fork+0x10/0x20 [ 19.674215] [ 19.674240] Allocated by task 285: [ 19.674271] kasan_save_stack+0x3c/0x68 [ 19.674316] kasan_save_track+0x20/0x40 [ 19.674354] kasan_save_alloc_info+0x40/0x58 [ 19.674394] __kasan_kmalloc+0xd4/0xd8 [ 19.674685] __kmalloc_noprof+0x190/0x4d0 [ 19.674729] kunit_kmalloc_array+0x34/0x88 [ 19.674767] copy_user_test_oob+0xac/0xec8 [ 19.674803] kunit_try_run_case+0x170/0x3f0 [ 19.674839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.674883] kthread+0x328/0x630 [ 19.675000] ret_from_fork+0x10/0x20 [ 19.675061] [ 19.675099] The buggy address belongs to the object at fff00000c78d3c00 [ 19.675099] which belongs to the cache kmalloc-128 of size 128 [ 19.675171] The buggy address is located 0 bytes inside of [ 19.675171] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.675832] [ 19.675873] The buggy address belongs to the physical page: [ 19.675912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.675980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.676035] page_type: f5(slab) [ 19.676092] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.676145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.676187] page dumped because: kasan: bad access detected [ 19.676221] [ 19.676563] Memory state around the buggy address: [ 19.676640] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.676687] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.676836] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.676876] ^ [ 19.677443] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.677635] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.677949] ================================================================== [ 19.684289] ================================================================== [ 19.684362] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.684429] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.684488] [ 19.684522] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.684608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.684638] Hardware name: linux,dummy-virt (DT) [ 19.684671] Call trace: [ 19.684696] show_stack+0x20/0x38 (C) [ 19.684746] dump_stack_lvl+0x8c/0xd0 [ 19.684794] print_report+0x118/0x608 [ 19.684840] kasan_report+0xdc/0x128 [ 19.684884] kasan_check_range+0x100/0x1a8 [ 19.684932] __kasan_check_write+0x20/0x30 [ 19.684979] copy_user_test_oob+0x35c/0xec8 [ 19.685023] kunit_try_run_case+0x170/0x3f0 [ 19.685083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.685135] kthread+0x328/0x630 [ 19.685179] ret_from_fork+0x10/0x20 [ 19.685228] [ 19.685248] Allocated by task 285: [ 19.685277] kasan_save_stack+0x3c/0x68 [ 19.685951] kasan_save_track+0x20/0x40 [ 19.686017] kasan_save_alloc_info+0x40/0x58 [ 19.686075] __kasan_kmalloc+0xd4/0xd8 [ 19.686113] __kmalloc_noprof+0x190/0x4d0 [ 19.686153] kunit_kmalloc_array+0x34/0x88 [ 19.686312] copy_user_test_oob+0xac/0xec8 [ 19.686358] kunit_try_run_case+0x170/0x3f0 [ 19.686398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.686505] kthread+0x328/0x630 [ 19.686548] ret_from_fork+0x10/0x20 [ 19.686835] [ 19.686900] The buggy address belongs to the object at fff00000c78d3c00 [ 19.686900] which belongs to the cache kmalloc-128 of size 128 [ 19.687472] The buggy address is located 0 bytes inside of [ 19.687472] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.687608] [ 19.687634] The buggy address belongs to the physical page: [ 19.687667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.687719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.687769] page_type: f5(slab) [ 19.687811] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.687863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.688903] page dumped because: kasan: bad access detected [ 19.689098] [ 19.689124] Memory state around the buggy address: [ 19.689163] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.689211] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.689255] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.689293] ^ [ 19.689333] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.689376] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.689414] ================================================================== [ 19.701251] ================================================================== [ 19.701318] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.701378] Read of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.701430] [ 19.701462] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.701553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.701581] Hardware name: linux,dummy-virt (DT) [ 19.701614] Call trace: [ 19.701638] show_stack+0x20/0x38 (C) [ 19.701690] dump_stack_lvl+0x8c/0xd0 [ 19.701738] print_report+0x118/0x608 [ 19.701785] kasan_report+0xdc/0x128 [ 19.701828] kasan_check_range+0x100/0x1a8 [ 19.701875] __kasan_check_read+0x20/0x30 [ 19.702411] copy_user_test_oob+0x4a0/0xec8 [ 19.702500] kunit_try_run_case+0x170/0x3f0 [ 19.702571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.702778] kthread+0x328/0x630 [ 19.702875] ret_from_fork+0x10/0x20 [ 19.702930] [ 19.703136] Allocated by task 285: [ 19.703411] kasan_save_stack+0x3c/0x68 [ 19.703569] kasan_save_track+0x20/0x40 [ 19.703614] kasan_save_alloc_info+0x40/0x58 [ 19.703920] __kasan_kmalloc+0xd4/0xd8 [ 19.704257] __kmalloc_noprof+0x190/0x4d0 [ 19.704309] kunit_kmalloc_array+0x34/0x88 [ 19.704454] copy_user_test_oob+0xac/0xec8 [ 19.704503] kunit_try_run_case+0x170/0x3f0 [ 19.704666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.704759] kthread+0x328/0x630 [ 19.704924] ret_from_fork+0x10/0x20 [ 19.705207] [ 19.705245] The buggy address belongs to the object at fff00000c78d3c00 [ 19.705245] which belongs to the cache kmalloc-128 of size 128 [ 19.705310] The buggy address is located 0 bytes inside of [ 19.705310] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.705385] [ 19.705805] The buggy address belongs to the physical page: [ 19.705963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.706029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.706096] page_type: f5(slab) [ 19.706150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.706203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.706448] page dumped because: kasan: bad access detected [ 19.706643] [ 19.706673] Memory state around the buggy address: [ 19.706806] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.706939] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.706986] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.707242] ^ [ 19.707403] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.707793] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.707846] ================================================================== [ 19.696861] ================================================================== [ 19.696985] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.697060] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.697115] [ 19.697147] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.697234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.697262] Hardware name: linux,dummy-virt (DT) [ 19.697295] Call trace: [ 19.697319] show_stack+0x20/0x38 (C) [ 19.697369] dump_stack_lvl+0x8c/0xd0 [ 19.697417] print_report+0x118/0x608 [ 19.697464] kasan_report+0xdc/0x128 [ 19.697508] kasan_check_range+0x100/0x1a8 [ 19.697556] __kasan_check_write+0x20/0x30 [ 19.697604] copy_user_test_oob+0x434/0xec8 [ 19.697649] kunit_try_run_case+0x170/0x3f0 [ 19.697695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.697746] kthread+0x328/0x630 [ 19.697790] ret_from_fork+0x10/0x20 [ 19.697838] [ 19.697860] Allocated by task 285: [ 19.697925] kasan_save_stack+0x3c/0x68 [ 19.697972] kasan_save_track+0x20/0x40 [ 19.698010] kasan_save_alloc_info+0x40/0x58 [ 19.698060] __kasan_kmalloc+0xd4/0xd8 [ 19.698101] __kmalloc_noprof+0x190/0x4d0 [ 19.698139] kunit_kmalloc_array+0x34/0x88 [ 19.698175] copy_user_test_oob+0xac/0xec8 [ 19.698211] kunit_try_run_case+0x170/0x3f0 [ 19.698346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.698647] kthread+0x328/0x630 [ 19.698734] ret_from_fork+0x10/0x20 [ 19.698792] [ 19.698820] The buggy address belongs to the object at fff00000c78d3c00 [ 19.698820] which belongs to the cache kmalloc-128 of size 128 [ 19.699243] The buggy address is located 0 bytes inside of [ 19.699243] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.699435] [ 19.699552] The buggy address belongs to the physical page: [ 19.699590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.699663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.699718] page_type: f5(slab) [ 19.699758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.699943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.700025] page dumped because: kasan: bad access detected [ 19.700074] [ 19.700096] Memory state around the buggy address: [ 19.700130] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.700175] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700234] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.700413] ^ [ 19.700456] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700520] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700560] ================================================================== [ 19.690940] ================================================================== [ 19.691015] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.691084] Read of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.691138] [ 19.691681] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.691829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.691946] Hardware name: linux,dummy-virt (DT) [ 19.691990] Call trace: [ 19.692023] show_stack+0x20/0x38 (C) [ 19.692110] dump_stack_lvl+0x8c/0xd0 [ 19.692164] print_report+0x118/0x608 [ 19.692212] kasan_report+0xdc/0x128 [ 19.692505] kasan_check_range+0x100/0x1a8 [ 19.692611] __kasan_check_read+0x20/0x30 [ 19.692679] copy_user_test_oob+0x3c8/0xec8 [ 19.692729] kunit_try_run_case+0x170/0x3f0 [ 19.692897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.692977] kthread+0x328/0x630 [ 19.693027] ret_from_fork+0x10/0x20 [ 19.693139] [ 19.693176] Allocated by task 285: [ 19.693211] kasan_save_stack+0x3c/0x68 [ 19.693469] kasan_save_track+0x20/0x40 [ 19.693569] kasan_save_alloc_info+0x40/0x58 [ 19.693657] __kasan_kmalloc+0xd4/0xd8 [ 19.693701] __kmalloc_noprof+0x190/0x4d0 [ 19.693738] kunit_kmalloc_array+0x34/0x88 [ 19.693852] copy_user_test_oob+0xac/0xec8 [ 19.693910] kunit_try_run_case+0x170/0x3f0 [ 19.693954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.694019] kthread+0x328/0x630 [ 19.694074] ret_from_fork+0x10/0x20 [ 19.694114] [ 19.694137] The buggy address belongs to the object at fff00000c78d3c00 [ 19.694137] which belongs to the cache kmalloc-128 of size 128 [ 19.694208] The buggy address is located 0 bytes inside of [ 19.694208] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.694278] [ 19.694336] The buggy address belongs to the physical page: [ 19.694526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.694647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.694842] page_type: f5(slab) [ 19.694894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.694956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.695126] page dumped because: kasan: bad access detected [ 19.695167] [ 19.695191] Memory state around the buggy address: [ 19.695227] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.695272] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.695440] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.695907] ^ [ 19.696132] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.696350] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.696400] ================================================================== [ 19.656083] ================================================================== [ 19.656177] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.656257] Write of size 121 at addr fff00000c78d3c00 by task kunit_try_catch/285 [ 19.656945] [ 19.657017] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.657357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.657448] Hardware name: linux,dummy-virt (DT) [ 19.657508] Call trace: [ 19.657543] show_stack+0x20/0x38 (C) [ 19.657831] dump_stack_lvl+0x8c/0xd0 [ 19.657994] print_report+0x118/0x608 [ 19.658060] kasan_report+0xdc/0x128 [ 19.658227] kasan_check_range+0x100/0x1a8 [ 19.658423] __kasan_check_write+0x20/0x30 [ 19.658691] copy_user_test_oob+0x234/0xec8 [ 19.658845] kunit_try_run_case+0x170/0x3f0 [ 19.659075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659181] kthread+0x328/0x630 [ 19.659467] ret_from_fork+0x10/0x20 [ 19.659548] [ 19.659725] Allocated by task 285: [ 19.659812] kasan_save_stack+0x3c/0x68 [ 19.660004] kasan_save_track+0x20/0x40 [ 19.660065] kasan_save_alloc_info+0x40/0x58 [ 19.660248] __kasan_kmalloc+0xd4/0xd8 [ 19.660332] __kmalloc_noprof+0x190/0x4d0 [ 19.660379] kunit_kmalloc_array+0x34/0x88 [ 19.660548] copy_user_test_oob+0xac/0xec8 [ 19.660603] kunit_try_run_case+0x170/0x3f0 [ 19.660642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.661015] kthread+0x328/0x630 [ 19.661084] ret_from_fork+0x10/0x20 [ 19.661143] [ 19.661307] The buggy address belongs to the object at fff00000c78d3c00 [ 19.661307] which belongs to the cache kmalloc-128 of size 128 [ 19.661408] The buggy address is located 0 bytes inside of [ 19.661408] allocated 120-byte region [fff00000c78d3c00, fff00000c78d3c78) [ 19.661518] [ 19.661762] The buggy address belongs to the physical page: [ 19.661867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.662021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.662089] page_type: f5(slab) [ 19.662135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.662428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.662578] page dumped because: kasan: bad access detected [ 19.662709] [ 19.662737] Memory state around the buggy address: [ 19.662776] fff00000c78d3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.662822] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.662886] >fff00000c78d3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.662928] ^ [ 19.662969] fff00000c78d3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.663293] fff00000c78d3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.663473] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 19.621127] ================================================================== [ 19.621197] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 19.621266] Read of size 8 at addr fff00000c78d3b78 by task kunit_try_catch/281 [ 19.621317] [ 19.621353] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.621440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.621468] Hardware name: linux,dummy-virt (DT) [ 19.621501] Call trace: [ 19.621526] show_stack+0x20/0x38 (C) [ 19.621577] dump_stack_lvl+0x8c/0xd0 [ 19.621625] print_report+0x118/0x608 [ 19.621681] kasan_report+0xdc/0x128 [ 19.621769] __asan_report_load8_noabort+0x20/0x30 [ 19.621873] copy_to_kernel_nofault+0x204/0x250 [ 19.621961] copy_to_kernel_nofault_oob+0x158/0x418 [ 19.622113] kunit_try_run_case+0x170/0x3f0 [ 19.622261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.622315] kthread+0x328/0x630 [ 19.622362] ret_from_fork+0x10/0x20 [ 19.622408] [ 19.622430] Allocated by task 281: [ 19.622461] kasan_save_stack+0x3c/0x68 [ 19.622503] kasan_save_track+0x20/0x40 [ 19.622542] kasan_save_alloc_info+0x40/0x58 [ 19.622654] __kasan_kmalloc+0xd4/0xd8 [ 19.622848] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.622898] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.622943] kunit_try_run_case+0x170/0x3f0 [ 19.622981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.623072] kthread+0x328/0x630 [ 19.623125] ret_from_fork+0x10/0x20 [ 19.623195] [ 19.623238] The buggy address belongs to the object at fff00000c78d3b00 [ 19.623238] which belongs to the cache kmalloc-128 of size 128 [ 19.623296] The buggy address is located 0 bytes to the right of [ 19.623296] allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78) [ 19.623358] [ 19.623393] The buggy address belongs to the physical page: [ 19.623430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.623495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.623547] page_type: f5(slab) [ 19.623599] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.623661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.623743] page dumped because: kasan: bad access detected [ 19.623777] [ 19.623832] Memory state around the buggy address: [ 19.624026] fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.624101] fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.624337] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.624384] ^ [ 19.624486] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.624555] fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.624659] ================================================================== [ 19.625159] ================================================================== [ 19.625211] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 19.625269] Write of size 8 at addr fff00000c78d3b78 by task kunit_try_catch/281 [ 19.625319] [ 19.625352] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.625438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.625624] Hardware name: linux,dummy-virt (DT) [ 19.625755] Call trace: [ 19.625783] show_stack+0x20/0x38 (C) [ 19.625838] dump_stack_lvl+0x8c/0xd0 [ 19.625914] print_report+0x118/0x608 [ 19.626282] kasan_report+0xdc/0x128 [ 19.626346] kasan_check_range+0x100/0x1a8 [ 19.626396] __kasan_check_write+0x20/0x30 [ 19.626467] copy_to_kernel_nofault+0x8c/0x250 [ 19.626845] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 19.626920] kunit_try_run_case+0x170/0x3f0 [ 19.627079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.627155] kthread+0x328/0x630 [ 19.627207] ret_from_fork+0x10/0x20 [ 19.627259] [ 19.627280] Allocated by task 281: [ 19.627311] kasan_save_stack+0x3c/0x68 [ 19.627357] kasan_save_track+0x20/0x40 [ 19.627419] kasan_save_alloc_info+0x40/0x58 [ 19.627477] __kasan_kmalloc+0xd4/0xd8 [ 19.627518] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.627558] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.627602] kunit_try_run_case+0x170/0x3f0 [ 19.627638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.627682] kthread+0x328/0x630 [ 19.627727] ret_from_fork+0x10/0x20 [ 19.627770] [ 19.627792] The buggy address belongs to the object at fff00000c78d3b00 [ 19.627792] which belongs to the cache kmalloc-128 of size 128 [ 19.627852] The buggy address is located 0 bytes to the right of [ 19.627852] allocated 120-byte region [fff00000c78d3b00, fff00000c78d3b78) [ 19.627927] [ 19.627975] The buggy address belongs to the physical page: [ 19.628013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 19.628078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.628130] page_type: f5(slab) [ 19.628172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.628225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.628269] page dumped because: kasan: bad access detected [ 19.628316] [ 19.628338] Memory state around the buggy address: [ 19.628372] fff00000c78d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.628418] fff00000c78d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628462] >fff00000c78d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.628500] ^ [ 19.628542] fff00000c78d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628585] fff00000c78d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628623] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 19.587230] ================================================================== [ 19.587291] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.587351] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.587404] [ 19.587436] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.587524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.587554] Hardware name: linux,dummy-virt (DT) [ 19.587586] Call trace: [ 19.587611] show_stack+0x20/0x38 (C) [ 19.587663] dump_stack_lvl+0x8c/0xd0 [ 19.587711] print_report+0x310/0x608 [ 19.587757] kasan_report+0xdc/0x128 [ 19.587802] __asan_report_load1_noabort+0x20/0x30 [ 19.587854] vmalloc_oob+0x51c/0x5d0 [ 19.587902] kunit_try_run_case+0x170/0x3f0 [ 19.587949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.587999] kthread+0x328/0x630 [ 19.588064] ret_from_fork+0x10/0x20 [ 19.588171] [ 19.588227] The buggy address belongs to the virtual mapping at [ 19.588227] [ffff8000800fe000, ffff800080100000) created by: [ 19.588227] vmalloc_oob+0x98/0x5d0 [ 19.588394] [ 19.588423] The buggy address belongs to the physical page: [ 19.588456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653e [ 19.588509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.588570] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.588622] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.588664] page dumped because: kasan: bad access detected [ 19.588698] [ 19.588719] Memory state around the buggy address: [ 19.588751] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.588795] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.588838] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.588876] ^ [ 19.588917] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.588960] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.588998] ================================================================== [ 19.583366] ================================================================== [ 19.583448] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.583514] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.583566] [ 19.583601] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.583687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.583715] Hardware name: linux,dummy-virt (DT) [ 19.583748] Call trace: [ 19.583773] show_stack+0x20/0x38 (C) [ 19.583824] dump_stack_lvl+0x8c/0xd0 [ 19.583873] print_report+0x310/0x608 [ 19.583917] kasan_report+0xdc/0x128 [ 19.583961] __asan_report_load1_noabort+0x20/0x30 [ 19.584011] vmalloc_oob+0x578/0x5d0 [ 19.584079] kunit_try_run_case+0x170/0x3f0 [ 19.584184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.584289] kthread+0x328/0x630 [ 19.584384] ret_from_fork+0x10/0x20 [ 19.584481] [ 19.584540] The buggy address belongs to the virtual mapping at [ 19.584540] [ffff8000800fe000, ffff800080100000) created by: [ 19.584540] vmalloc_oob+0x98/0x5d0 [ 19.584687] [ 19.584883] The buggy address belongs to the physical page: [ 19.584927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653e [ 19.584984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.585060] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.585331] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.585707] page dumped because: kasan: bad access detected [ 19.585752] [ 19.585775] Memory state around the buggy address: [ 19.585812] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.585857] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.585959] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.586012] ^ [ 19.586066] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.586174] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.586428] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 19.486628] ================================================================== [ 19.486678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.486730] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.486780] [ 19.486812] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.486898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.486928] Hardware name: linux,dummy-virt (DT) [ 19.486960] Call trace: [ 19.486985] show_stack+0x20/0x38 (C) [ 19.487037] dump_stack_lvl+0x8c/0xd0 [ 19.487100] print_report+0x118/0x608 [ 19.487150] kasan_report+0xdc/0x128 [ 19.487194] kasan_check_range+0x100/0x1a8 [ 19.487241] __kasan_check_write+0x20/0x30 [ 19.487289] kasan_atomics_helper+0x12d8/0x4858 [ 19.487337] kasan_atomics+0x198/0x2e0 [ 19.487382] kunit_try_run_case+0x170/0x3f0 [ 19.487429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487482] kthread+0x328/0x630 [ 19.487527] ret_from_fork+0x10/0x20 [ 19.487576] [ 19.487597] Allocated by task 265: [ 19.487628] kasan_save_stack+0x3c/0x68 [ 19.487671] kasan_save_track+0x20/0x40 [ 19.487710] kasan_save_alloc_info+0x40/0x58 [ 19.487751] __kasan_kmalloc+0xd4/0xd8 [ 19.487789] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.487827] kasan_atomics+0xb8/0x2e0 [ 19.487864] kunit_try_run_case+0x170/0x3f0 [ 19.487903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487947] kthread+0x328/0x630 [ 19.487983] ret_from_fork+0x10/0x20 [ 19.488020] [ 19.488069] The buggy address belongs to the object at fff00000c788e780 [ 19.488069] which belongs to the cache kmalloc-64 of size 64 [ 19.488189] The buggy address is located 0 bytes to the right of [ 19.488189] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.488319] [ 19.488347] The buggy address belongs to the physical page: [ 19.488380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.488431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.488478] page_type: f5(slab) [ 19.488516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.488566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.488607] page dumped because: kasan: bad access detected [ 19.488639] [ 19.488660] Memory state around the buggy address: [ 19.488691] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.488734] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.488776] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.488813] ^ [ 19.488853] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.488934] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.489009] ================================================================== [ 19.469239] ================================================================== [ 19.469533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.469727] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.469862] [ 19.469909] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.469999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.470030] Hardware name: linux,dummy-virt (DT) [ 19.470074] Call trace: [ 19.470100] show_stack+0x20/0x38 (C) [ 19.470153] dump_stack_lvl+0x8c/0xd0 [ 19.470621] print_report+0x118/0x608 [ 19.470722] kasan_report+0xdc/0x128 [ 19.471098] kasan_check_range+0x100/0x1a8 [ 19.471385] __kasan_check_write+0x20/0x30 [ 19.471448] kasan_atomics_helper+0x11f8/0x4858 [ 19.471507] kasan_atomics+0x198/0x2e0 [ 19.471716] kunit_try_run_case+0x170/0x3f0 [ 19.471821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.472009] kthread+0x328/0x630 [ 19.472192] ret_from_fork+0x10/0x20 [ 19.472341] [ 19.472367] Allocated by task 265: [ 19.472567] kasan_save_stack+0x3c/0x68 [ 19.472618] kasan_save_track+0x20/0x40 [ 19.472658] kasan_save_alloc_info+0x40/0x58 [ 19.472699] __kasan_kmalloc+0xd4/0xd8 [ 19.472737] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.472874] kasan_atomics+0xb8/0x2e0 [ 19.473155] kunit_try_run_case+0x170/0x3f0 [ 19.473284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.473465] kthread+0x328/0x630 [ 19.473676] ret_from_fork+0x10/0x20 [ 19.473865] [ 19.473982] The buggy address belongs to the object at fff00000c788e780 [ 19.473982] which belongs to the cache kmalloc-64 of size 64 [ 19.474486] The buggy address is located 0 bytes to the right of [ 19.474486] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.474561] [ 19.474597] The buggy address belongs to the physical page: [ 19.475061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.475523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.475821] page_type: f5(slab) [ 19.475928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.476242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.476291] page dumped because: kasan: bad access detected [ 19.476585] [ 19.476641] Memory state around the buggy address: [ 19.476680] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.477034] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.477095] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.477136] ^ [ 19.477176] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.478180] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.478550] ================================================================== [ 19.499668] ================================================================== [ 19.499734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.499802] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.499879] [ 19.499939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.500080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.500112] Hardware name: linux,dummy-virt (DT) [ 19.500144] Call trace: [ 19.500194] show_stack+0x20/0x38 (C) [ 19.500290] dump_stack_lvl+0x8c/0xd0 [ 19.500386] print_report+0x118/0x608 [ 19.500479] kasan_report+0xdc/0x128 [ 19.500571] kasan_check_range+0x100/0x1a8 [ 19.500617] __kasan_check_write+0x20/0x30 [ 19.500670] kasan_atomics_helper+0x1414/0x4858 [ 19.500768] kasan_atomics+0x198/0x2e0 [ 19.500858] kunit_try_run_case+0x170/0x3f0 [ 19.500947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.500998] kthread+0x328/0x630 [ 19.501088] ret_from_fork+0x10/0x20 [ 19.501193] [ 19.501215] Allocated by task 265: [ 19.501246] kasan_save_stack+0x3c/0x68 [ 19.501288] kasan_save_track+0x20/0x40 [ 19.501328] kasan_save_alloc_info+0x40/0x58 [ 19.501367] __kasan_kmalloc+0xd4/0xd8 [ 19.501402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.501442] kasan_atomics+0xb8/0x2e0 [ 19.501478] kunit_try_run_case+0x170/0x3f0 [ 19.501515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501557] kthread+0x328/0x630 [ 19.501593] ret_from_fork+0x10/0x20 [ 19.501628] [ 19.501651] The buggy address belongs to the object at fff00000c788e780 [ 19.501651] which belongs to the cache kmalloc-64 of size 64 [ 19.501707] The buggy address is located 0 bytes to the right of [ 19.501707] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.501769] [ 19.501790] The buggy address belongs to the physical page: [ 19.501823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.501871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.501927] page_type: f5(slab) [ 19.501966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.502031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.502082] page dumped because: kasan: bad access detected [ 19.502116] [ 19.502136] Memory state around the buggy address: [ 19.502170] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.502211] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.502253] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.502291] ^ [ 19.502325] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.502367] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.502404] ================================================================== [ 19.523112] ================================================================== [ 19.523171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.523228] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.523310] [ 19.523350] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.523802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.523857] Hardware name: linux,dummy-virt (DT) [ 19.523902] Call trace: [ 19.523929] show_stack+0x20/0x38 (C) [ 19.523992] dump_stack_lvl+0x8c/0xd0 [ 19.524064] print_report+0x118/0x608 [ 19.524116] kasan_report+0xdc/0x128 [ 19.524168] __asan_report_load8_noabort+0x20/0x30 [ 19.524220] kasan_atomics_helper+0x3db0/0x4858 [ 19.524267] kasan_atomics+0x198/0x2e0 [ 19.524945] kunit_try_run_case+0x170/0x3f0 [ 19.525050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525111] kthread+0x328/0x630 [ 19.525158] ret_from_fork+0x10/0x20 [ 19.525251] [ 19.525278] Allocated by task 265: [ 19.525326] kasan_save_stack+0x3c/0x68 [ 19.525372] kasan_save_track+0x20/0x40 [ 19.525422] kasan_save_alloc_info+0x40/0x58 [ 19.525465] __kasan_kmalloc+0xd4/0xd8 [ 19.525502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.525540] kasan_atomics+0xb8/0x2e0 [ 19.525577] kunit_try_run_case+0x170/0x3f0 [ 19.525614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525657] kthread+0x328/0x630 [ 19.525692] ret_from_fork+0x10/0x20 [ 19.525729] [ 19.525749] The buggy address belongs to the object at fff00000c788e780 [ 19.525749] which belongs to the cache kmalloc-64 of size 64 [ 19.525929] The buggy address is located 0 bytes to the right of [ 19.525929] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.526004] [ 19.526030] The buggy address belongs to the physical page: [ 19.526088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.526147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.526198] page_type: f5(slab) [ 19.526238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.526290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.526333] page dumped because: kasan: bad access detected [ 19.526374] [ 19.526409] Memory state around the buggy address: [ 19.526456] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.526506] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.526551] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.526600] ^ [ 19.526638] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526682] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526722] ================================================================== [ 19.445451] ================================================================== [ 19.445515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.445572] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.445841] [ 19.445934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.446093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.446165] Hardware name: linux,dummy-virt (DT) [ 19.446201] Call trace: [ 19.446227] show_stack+0x20/0x38 (C) [ 19.446281] dump_stack_lvl+0x8c/0xd0 [ 19.446331] print_report+0x118/0x608 [ 19.446376] kasan_report+0xdc/0x128 [ 19.446419] kasan_check_range+0x100/0x1a8 [ 19.446467] __kasan_check_write+0x20/0x30 [ 19.446515] kasan_atomics_helper+0x10c0/0x4858 [ 19.448074] kasan_atomics+0x198/0x2e0 [ 19.448398] kunit_try_run_case+0x170/0x3f0 [ 19.448515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.448638] kthread+0x328/0x630 [ 19.448751] ret_from_fork+0x10/0x20 [ 19.448838] [ 19.448861] Allocated by task 265: [ 19.448894] kasan_save_stack+0x3c/0x68 [ 19.448979] kasan_save_track+0x20/0x40 [ 19.449078] kasan_save_alloc_info+0x40/0x58 [ 19.449124] __kasan_kmalloc+0xd4/0xd8 [ 19.449162] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.449202] kasan_atomics+0xb8/0x2e0 [ 19.449264] kunit_try_run_case+0x170/0x3f0 [ 19.449342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449385] kthread+0x328/0x630 [ 19.450071] ret_from_fork+0x10/0x20 [ 19.450142] [ 19.450210] The buggy address belongs to the object at fff00000c788e780 [ 19.450210] which belongs to the cache kmalloc-64 of size 64 [ 19.450363] The buggy address is located 0 bytes to the right of [ 19.450363] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.450536] [ 19.450561] The buggy address belongs to the physical page: [ 19.450606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.450716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.450770] page_type: f5(slab) [ 19.450811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.450876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.450933] page dumped because: kasan: bad access detected [ 19.451174] [ 19.451225] Memory state around the buggy address: [ 19.451267] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451315] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451657] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.451842] ^ [ 19.451897] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.451942] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452134] ================================================================== [ 19.439705] ================================================================== [ 19.439884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.439943] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.439995] [ 19.440028] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.440125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.440155] Hardware name: linux,dummy-virt (DT) [ 19.440186] Call trace: [ 19.440210] show_stack+0x20/0x38 (C) [ 19.440263] dump_stack_lvl+0x8c/0xd0 [ 19.440311] print_report+0x118/0x608 [ 19.440356] kasan_report+0xdc/0x128 [ 19.440402] kasan_check_range+0x100/0x1a8 [ 19.440449] __kasan_check_write+0x20/0x30 [ 19.440496] kasan_atomics_helper+0x1058/0x4858 [ 19.440542] kasan_atomics+0x198/0x2e0 [ 19.440586] kunit_try_run_case+0x170/0x3f0 [ 19.440633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.440683] kthread+0x328/0x630 [ 19.440727] ret_from_fork+0x10/0x20 [ 19.440774] [ 19.440794] Allocated by task 265: [ 19.441936] kasan_save_stack+0x3c/0x68 [ 19.442001] kasan_save_track+0x20/0x40 [ 19.442118] kasan_save_alloc_info+0x40/0x58 [ 19.442194] __kasan_kmalloc+0xd4/0xd8 [ 19.442277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.442322] kasan_atomics+0xb8/0x2e0 [ 19.442360] kunit_try_run_case+0x170/0x3f0 [ 19.442399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.442442] kthread+0x328/0x630 [ 19.442479] ret_from_fork+0x10/0x20 [ 19.442539] [ 19.442569] The buggy address belongs to the object at fff00000c788e780 [ 19.442569] which belongs to the cache kmalloc-64 of size 64 [ 19.442726] The buggy address is located 0 bytes to the right of [ 19.442726] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.442822] [ 19.442892] The buggy address belongs to the physical page: [ 19.442964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.443068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443131] page_type: f5(slab) [ 19.443187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443287] page dumped because: kasan: bad access detected [ 19.443322] [ 19.443343] Memory state around the buggy address: [ 19.443378] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.443754] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.443820] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.444008] ^ [ 19.444215] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444434] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444526] ================================================================== [ 19.479662] ================================================================== [ 19.479725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.479785] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.479835] [ 19.479868] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.479953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.479983] Hardware name: linux,dummy-virt (DT) [ 19.480014] Call trace: [ 19.480038] show_stack+0x20/0x38 (C) [ 19.482151] dump_stack_lvl+0x8c/0xd0 [ 19.482205] print_report+0x118/0x608 [ 19.482255] kasan_report+0xdc/0x128 [ 19.482299] kasan_check_range+0x100/0x1a8 [ 19.482346] __kasan_check_write+0x20/0x30 [ 19.482394] kasan_atomics_helper+0x126c/0x4858 [ 19.482442] kasan_atomics+0x198/0x2e0 [ 19.482487] kunit_try_run_case+0x170/0x3f0 [ 19.482535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.482597] kthread+0x328/0x630 [ 19.482647] ret_from_fork+0x10/0x20 [ 19.482698] [ 19.482720] Allocated by task 265: [ 19.484357] kasan_save_stack+0x3c/0x68 [ 19.484422] kasan_save_track+0x20/0x40 [ 19.484463] kasan_save_alloc_info+0x40/0x58 [ 19.484556] __kasan_kmalloc+0xd4/0xd8 [ 19.485059] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.485103] kasan_atomics+0xb8/0x2e0 [ 19.485143] kunit_try_run_case+0x170/0x3f0 [ 19.485181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.485236] kthread+0x328/0x630 [ 19.485273] ret_from_fork+0x10/0x20 [ 19.485309] [ 19.485369] The buggy address belongs to the object at fff00000c788e780 [ 19.485369] which belongs to the cache kmalloc-64 of size 64 [ 19.485439] The buggy address is located 0 bytes to the right of [ 19.485439] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.485562] [ 19.485586] The buggy address belongs to the physical page: [ 19.485619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.485670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.485758] page_type: f5(slab) [ 19.485831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.485885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.485927] page dumped because: kasan: bad access detected [ 19.485959] [ 19.485980] Memory state around the buggy address: [ 19.486025] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486088] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486133] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.486171] ^ [ 19.486207] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486249] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486297] ================================================================== [ 19.560665] ================================================================== [ 19.561104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.561177] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.561232] [ 19.561434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.561720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.561788] Hardware name: linux,dummy-virt (DT) [ 19.561822] Call trace: [ 19.561848] show_stack+0x20/0x38 (C) [ 19.561914] dump_stack_lvl+0x8c/0xd0 [ 19.561966] print_report+0x118/0x608 [ 19.562011] kasan_report+0xdc/0x128 [ 19.562068] kasan_check_range+0x100/0x1a8 [ 19.562119] __kasan_check_write+0x20/0x30 [ 19.562168] kasan_atomics_helper+0x17ec/0x4858 [ 19.562214] kasan_atomics+0x198/0x2e0 [ 19.562257] kunit_try_run_case+0x170/0x3f0 [ 19.562304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.562356] kthread+0x328/0x630 [ 19.562401] ret_from_fork+0x10/0x20 [ 19.562449] [ 19.562470] Allocated by task 265: [ 19.563254] kasan_save_stack+0x3c/0x68 [ 19.563320] kasan_save_track+0x20/0x40 [ 19.563361] kasan_save_alloc_info+0x40/0x58 [ 19.563411] __kasan_kmalloc+0xd4/0xd8 [ 19.563452] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.563745] kasan_atomics+0xb8/0x2e0 [ 19.563951] kunit_try_run_case+0x170/0x3f0 [ 19.564019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.564078] kthread+0x328/0x630 [ 19.564127] ret_from_fork+0x10/0x20 [ 19.564167] [ 19.564297] The buggy address belongs to the object at fff00000c788e780 [ 19.564297] which belongs to the cache kmalloc-64 of size 64 [ 19.564496] The buggy address is located 0 bytes to the right of [ 19.564496] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.564684] [ 19.564711] The buggy address belongs to the physical page: [ 19.564747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.564923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.565009] page_type: f5(slab) [ 19.565063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.565118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.565158] page dumped because: kasan: bad access detected [ 19.565193] [ 19.565214] Memory state around the buggy address: [ 19.565248] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.565597] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.565850] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.566055] ^ [ 19.566104] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566161] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566204] ================================================================== [ 19.339787] ================================================================== [ 19.339854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.339915] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.339966] [ 19.339999] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.340098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.340129] Hardware name: linux,dummy-virt (DT) [ 19.340161] Call trace: [ 19.340187] show_stack+0x20/0x38 (C) [ 19.340238] dump_stack_lvl+0x8c/0xd0 [ 19.340286] print_report+0x118/0x608 [ 19.340349] kasan_report+0xdc/0x128 [ 19.340580] kasan_check_range+0x100/0x1a8 [ 19.340923] __kasan_check_write+0x20/0x30 [ 19.340983] kasan_atomics_helper+0xa6c/0x4858 [ 19.341194] kasan_atomics+0x198/0x2e0 [ 19.341342] kunit_try_run_case+0x170/0x3f0 [ 19.341399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.341462] kthread+0x328/0x630 [ 19.341512] ret_from_fork+0x10/0x20 [ 19.341563] [ 19.341584] Allocated by task 265: [ 19.341616] kasan_save_stack+0x3c/0x68 [ 19.341658] kasan_save_track+0x20/0x40 [ 19.341700] kasan_save_alloc_info+0x40/0x58 [ 19.341740] __kasan_kmalloc+0xd4/0xd8 [ 19.341777] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.341816] kasan_atomics+0xb8/0x2e0 [ 19.341852] kunit_try_run_case+0x170/0x3f0 [ 19.341889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.342221] kthread+0x328/0x630 [ 19.342541] ret_from_fork+0x10/0x20 [ 19.342588] [ 19.342614] The buggy address belongs to the object at fff00000c788e780 [ 19.342614] which belongs to the cache kmalloc-64 of size 64 [ 19.342681] The buggy address is located 0 bytes to the right of [ 19.342681] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.342972] [ 19.343008] The buggy address belongs to the physical page: [ 19.343051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.343167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.343271] page_type: f5(slab) [ 19.343503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.343593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.343678] page dumped because: kasan: bad access detected [ 19.343721] [ 19.343743] Memory state around the buggy address: [ 19.343879] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.344126] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.344298] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.344381] ^ [ 19.344565] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.344768] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.344850] ================================================================== [ 19.505225] ================================================================== [ 19.505267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.505313] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.505360] [ 19.505394] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.505566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.505601] Hardware name: linux,dummy-virt (DT) [ 19.505633] Call trace: [ 19.505657] show_stack+0x20/0x38 (C) [ 19.505711] dump_stack_lvl+0x8c/0xd0 [ 19.505813] print_report+0x118/0x608 [ 19.506171] kasan_report+0xdc/0x128 [ 19.506277] kasan_check_range+0x100/0x1a8 [ 19.506663] __kasan_check_write+0x20/0x30 [ 19.506985] kasan_atomics_helper+0x14e4/0x4858 [ 19.507135] kasan_atomics+0x198/0x2e0 [ 19.507195] kunit_try_run_case+0x170/0x3f0 [ 19.507245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.507470] kthread+0x328/0x630 [ 19.507540] ret_from_fork+0x10/0x20 [ 19.507704] [ 19.507740] Allocated by task 265: [ 19.507785] kasan_save_stack+0x3c/0x68 [ 19.507834] kasan_save_track+0x20/0x40 [ 19.508028] kasan_save_alloc_info+0x40/0x58 [ 19.508095] __kasan_kmalloc+0xd4/0xd8 [ 19.508147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.508291] kasan_atomics+0xb8/0x2e0 [ 19.508356] kunit_try_run_case+0x170/0x3f0 [ 19.508401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.508460] kthread+0x328/0x630 [ 19.508510] ret_from_fork+0x10/0x20 [ 19.508551] [ 19.508724] The buggy address belongs to the object at fff00000c788e780 [ 19.508724] which belongs to the cache kmalloc-64 of size 64 [ 19.508897] The buggy address is located 0 bytes to the right of [ 19.508897] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.509515] [ 19.509591] The buggy address belongs to the physical page: [ 19.509649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.509723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.509775] page_type: f5(slab) [ 19.509823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.509924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.509969] page dumped because: kasan: bad access detected [ 19.510004] [ 19.510025] Memory state around the buggy address: [ 19.510070] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.510114] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.510375] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.510430] ^ [ 19.510471] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510515] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510554] ================================================================== [ 19.539510] ================================================================== [ 19.539610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.539772] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.540079] [ 19.540115] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.540213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.540284] Hardware name: linux,dummy-virt (DT) [ 19.540379] Call trace: [ 19.540441] show_stack+0x20/0x38 (C) [ 19.540583] dump_stack_lvl+0x8c/0xd0 [ 19.540722] print_report+0x118/0x608 [ 19.541071] kasan_report+0xdc/0x128 [ 19.541250] kasan_check_range+0x100/0x1a8 [ 19.541308] __kasan_check_write+0x20/0x30 [ 19.541356] kasan_atomics_helper+0x16d0/0x4858 [ 19.541405] kasan_atomics+0x198/0x2e0 [ 19.541450] kunit_try_run_case+0x170/0x3f0 [ 19.541503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541607] kthread+0x328/0x630 [ 19.541694] ret_from_fork+0x10/0x20 [ 19.541788] [ 19.541841] Allocated by task 265: [ 19.541873] kasan_save_stack+0x3c/0x68 [ 19.541933] kasan_save_track+0x20/0x40 [ 19.541975] kasan_save_alloc_info+0x40/0x58 [ 19.542031] __kasan_kmalloc+0xd4/0xd8 [ 19.542081] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.542121] kasan_atomics+0xb8/0x2e0 [ 19.542392] kunit_try_run_case+0x170/0x3f0 [ 19.542573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.542626] kthread+0x328/0x630 [ 19.542741] ret_from_fork+0x10/0x20 [ 19.542904] [ 19.542929] The buggy address belongs to the object at fff00000c788e780 [ 19.542929] which belongs to the cache kmalloc-64 of size 64 [ 19.543097] The buggy address is located 0 bytes to the right of [ 19.543097] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.543169] [ 19.543192] The buggy address belongs to the physical page: [ 19.543225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.543277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.543324] page_type: f5(slab) [ 19.543484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.543538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.543583] page dumped because: kasan: bad access detected [ 19.543624] [ 19.543671] Memory state around the buggy address: [ 19.543740] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.543816] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544137] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.544266] ^ [ 19.544353] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544409] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544449] ================================================================== [ 19.400528] ================================================================== [ 19.400580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.400822] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.400881] [ 19.400917] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.401384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.401438] Hardware name: linux,dummy-virt (DT) [ 19.401475] Call trace: [ 19.401717] show_stack+0x20/0x38 (C) [ 19.401869] dump_stack_lvl+0x8c/0xd0 [ 19.402247] print_report+0x118/0x608 [ 19.402309] kasan_report+0xdc/0x128 [ 19.402468] kasan_check_range+0x100/0x1a8 [ 19.402548] __kasan_check_read+0x20/0x30 [ 19.402609] kasan_atomics_helper+0xdd4/0x4858 [ 19.402659] kasan_atomics+0x198/0x2e0 [ 19.402704] kunit_try_run_case+0x170/0x3f0 [ 19.402753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402804] kthread+0x328/0x630 [ 19.402915] ret_from_fork+0x10/0x20 [ 19.403024] [ 19.403101] Allocated by task 265: [ 19.403137] kasan_save_stack+0x3c/0x68 [ 19.403244] kasan_save_track+0x20/0x40 [ 19.403294] kasan_save_alloc_info+0x40/0x58 [ 19.403351] __kasan_kmalloc+0xd4/0xd8 [ 19.403389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.403428] kasan_atomics+0xb8/0x2e0 [ 19.403510] kunit_try_run_case+0x170/0x3f0 [ 19.403575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.403617] kthread+0x328/0x630 [ 19.403652] ret_from_fork+0x10/0x20 [ 19.403695] [ 19.403743] The buggy address belongs to the object at fff00000c788e780 [ 19.403743] which belongs to the cache kmalloc-64 of size 64 [ 19.403832] The buggy address is located 0 bytes to the right of [ 19.403832] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.403917] [ 19.403984] The buggy address belongs to the physical page: [ 19.404023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.404085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.404157] page_type: f5(slab) [ 19.404216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.404269] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.404311] page dumped because: kasan: bad access detected [ 19.404345] [ 19.404365] Memory state around the buggy address: [ 19.404399] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404444] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404486] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.404555] ^ [ 19.404635] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404686] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404773] ================================================================== [ 19.395176] ================================================================== [ 19.395237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.395322] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.395380] [ 19.395412] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.395496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.395704] Hardware name: linux,dummy-virt (DT) [ 19.395791] Call trace: [ 19.395833] show_stack+0x20/0x38 (C) [ 19.395905] dump_stack_lvl+0x8c/0xd0 [ 19.396087] print_report+0x118/0x608 [ 19.396330] kasan_report+0xdc/0x128 [ 19.396383] __asan_report_load4_noabort+0x20/0x30 [ 19.396606] kasan_atomics_helper+0x3e04/0x4858 [ 19.396689] kasan_atomics+0x198/0x2e0 [ 19.396788] kunit_try_run_case+0x170/0x3f0 [ 19.396838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.396890] kthread+0x328/0x630 [ 19.396936] ret_from_fork+0x10/0x20 [ 19.396984] [ 19.397011] Allocated by task 265: [ 19.397314] kasan_save_stack+0x3c/0x68 [ 19.397452] kasan_save_track+0x20/0x40 [ 19.397501] kasan_save_alloc_info+0x40/0x58 [ 19.397543] __kasan_kmalloc+0xd4/0xd8 [ 19.397581] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.397722] kasan_atomics+0xb8/0x2e0 [ 19.397769] kunit_try_run_case+0x170/0x3f0 [ 19.397811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.397853] kthread+0x328/0x630 [ 19.397914] ret_from_fork+0x10/0x20 [ 19.397956] [ 19.398066] The buggy address belongs to the object at fff00000c788e780 [ 19.398066] which belongs to the cache kmalloc-64 of size 64 [ 19.398141] The buggy address is located 0 bytes to the right of [ 19.398141] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.398206] [ 19.398231] The buggy address belongs to the physical page: [ 19.398277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.398335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.398401] page_type: f5(slab) [ 19.398441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.398508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.398676] page dumped because: kasan: bad access detected [ 19.398758] [ 19.399279] Memory state around the buggy address: [ 19.399339] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.399474] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.399523] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.399562] ^ [ 19.399598] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.400018] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.400133] ================================================================== [ 19.415168] ================================================================== [ 19.415279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.415340] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.415442] [ 19.415507] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.415660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.415690] Hardware name: linux,dummy-virt (DT) [ 19.415722] Call trace: [ 19.415747] show_stack+0x20/0x38 (C) [ 19.415797] dump_stack_lvl+0x8c/0xd0 [ 19.415847] print_report+0x118/0x608 [ 19.415893] kasan_report+0xdc/0x128 [ 19.415938] __asan_report_store8_noabort+0x20/0x30 [ 19.415989] kasan_atomics_helper+0x3e5c/0x4858 [ 19.416036] kasan_atomics+0x198/0x2e0 [ 19.416093] kunit_try_run_case+0x170/0x3f0 [ 19.416141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.416194] kthread+0x328/0x630 [ 19.416238] ret_from_fork+0x10/0x20 [ 19.416286] [ 19.416307] Allocated by task 265: [ 19.416337] kasan_save_stack+0x3c/0x68 [ 19.416381] kasan_save_track+0x20/0x40 [ 19.416419] kasan_save_alloc_info+0x40/0x58 [ 19.416459] __kasan_kmalloc+0xd4/0xd8 [ 19.416495] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.416533] kasan_atomics+0xb8/0x2e0 [ 19.416569] kunit_try_run_case+0x170/0x3f0 [ 19.416612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.416714] kthread+0x328/0x630 [ 19.416757] ret_from_fork+0x10/0x20 [ 19.416794] [ 19.416815] The buggy address belongs to the object at fff00000c788e780 [ 19.416815] which belongs to the cache kmalloc-64 of size 64 [ 19.416871] The buggy address is located 0 bytes to the right of [ 19.416871] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.416938] [ 19.416969] The buggy address belongs to the physical page: [ 19.417001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.417204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.417259] page_type: f5(slab) [ 19.417300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.417354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.417394] page dumped because: kasan: bad access detected [ 19.417427] [ 19.417446] Memory state around the buggy address: [ 19.417478] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417523] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.417603] ^ [ 19.417635] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417677] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417715] ================================================================== [ 19.502621] ================================================================== [ 19.502669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.502717] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.502789] [ 19.502822] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.502904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.502933] Hardware name: linux,dummy-virt (DT) [ 19.502965] Call trace: [ 19.502988] show_stack+0x20/0x38 (C) [ 19.503036] dump_stack_lvl+0x8c/0xd0 [ 19.503099] print_report+0x118/0x608 [ 19.503156] kasan_report+0xdc/0x128 [ 19.503250] kasan_check_range+0x100/0x1a8 [ 19.503299] __kasan_check_write+0x20/0x30 [ 19.503347] kasan_atomics_helper+0x147c/0x4858 [ 19.503394] kasan_atomics+0x198/0x2e0 [ 19.503450] kunit_try_run_case+0x170/0x3f0 [ 19.503497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.503548] kthread+0x328/0x630 [ 19.503608] ret_from_fork+0x10/0x20 [ 19.503663] [ 19.503685] Allocated by task 265: [ 19.503716] kasan_save_stack+0x3c/0x68 [ 19.503758] kasan_save_track+0x20/0x40 [ 19.503832] kasan_save_alloc_info+0x40/0x58 [ 19.503911] __kasan_kmalloc+0xd4/0xd8 [ 19.503958] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.504049] kasan_atomics+0xb8/0x2e0 [ 19.504092] kunit_try_run_case+0x170/0x3f0 [ 19.504130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.504174] kthread+0x328/0x630 [ 19.504219] ret_from_fork+0x10/0x20 [ 19.504260] [ 19.504283] The buggy address belongs to the object at fff00000c788e780 [ 19.504283] which belongs to the cache kmalloc-64 of size 64 [ 19.504356] The buggy address is located 0 bytes to the right of [ 19.504356] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.504419] [ 19.504455] The buggy address belongs to the physical page: [ 19.504502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.504550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.504598] page_type: f5(slab) [ 19.504635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.504703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.504745] page dumped because: kasan: bad access detected [ 19.504778] [ 19.504798] Memory state around the buggy address: [ 19.504871] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.504918] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.504961] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.505000] ^ [ 19.505035] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505088] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505127] ================================================================== [ 19.512720] ================================================================== [ 19.512788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.512848] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.512899] [ 19.512933] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.513055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.513088] Hardware name: linux,dummy-virt (DT) [ 19.513122] Call trace: [ 19.513147] show_stack+0x20/0x38 (C) [ 19.513196] dump_stack_lvl+0x8c/0xd0 [ 19.513248] print_report+0x118/0x608 [ 19.513292] kasan_report+0xdc/0x128 [ 19.513335] kasan_check_range+0x100/0x1a8 [ 19.513382] __kasan_check_write+0x20/0x30 [ 19.513429] kasan_atomics_helper+0x154c/0x4858 [ 19.513476] kasan_atomics+0x198/0x2e0 [ 19.513521] kunit_try_run_case+0x170/0x3f0 [ 19.513569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.513620] kthread+0x328/0x630 [ 19.513664] ret_from_fork+0x10/0x20 [ 19.513712] [ 19.513733] Allocated by task 265: [ 19.513859] kasan_save_stack+0x3c/0x68 [ 19.513996] kasan_save_track+0x20/0x40 [ 19.514073] kasan_save_alloc_info+0x40/0x58 [ 19.514118] __kasan_kmalloc+0xd4/0xd8 [ 19.514155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.514195] kasan_atomics+0xb8/0x2e0 [ 19.514232] kunit_try_run_case+0x170/0x3f0 [ 19.514582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.514636] kthread+0x328/0x630 [ 19.514675] ret_from_fork+0x10/0x20 [ 19.514712] [ 19.514738] The buggy address belongs to the object at fff00000c788e780 [ 19.514738] which belongs to the cache kmalloc-64 of size 64 [ 19.514795] The buggy address is located 0 bytes to the right of [ 19.514795] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.514858] [ 19.514880] The buggy address belongs to the physical page: [ 19.514914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.514964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.515014] page_type: f5(slab) [ 19.515064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.515120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.515161] page dumped because: kasan: bad access detected [ 19.515196] [ 19.515216] Memory state around the buggy address: [ 19.515252] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.515295] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.515400] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.515460] ^ [ 19.515546] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.515899] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.516345] ================================================================== [ 19.345247] ================================================================== [ 19.345300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.345357] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.345408] [ 19.345439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.345524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.345553] Hardware name: linux,dummy-virt (DT) [ 19.345587] Call trace: [ 19.345613] show_stack+0x20/0x38 (C) [ 19.345663] dump_stack_lvl+0x8c/0xd0 [ 19.345713] print_report+0x118/0x608 [ 19.345758] kasan_report+0xdc/0x128 [ 19.345803] kasan_check_range+0x100/0x1a8 [ 19.345851] __kasan_check_write+0x20/0x30 [ 19.345908] kasan_atomics_helper+0xad4/0x4858 [ 19.345956] kasan_atomics+0x198/0x2e0 [ 19.346000] kunit_try_run_case+0x170/0x3f0 [ 19.346057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346113] kthread+0x328/0x630 [ 19.346158] ret_from_fork+0x10/0x20 [ 19.346205] [ 19.346308] Allocated by task 265: [ 19.346402] kasan_save_stack+0x3c/0x68 [ 19.346449] kasan_save_track+0x20/0x40 [ 19.346487] kasan_save_alloc_info+0x40/0x58 [ 19.346529] __kasan_kmalloc+0xd4/0xd8 [ 19.346579] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.346661] kasan_atomics+0xb8/0x2e0 [ 19.346705] kunit_try_run_case+0x170/0x3f0 [ 19.346743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.347079] [ 19.347104] The buggy address belongs to the physical page: [ 19.347137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.347202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.347255] page_type: f5(slab) [ 19.347296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.347348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.347390] page dumped because: kasan: bad access detected [ 19.347423] [ 19.347445] Memory state around the buggy address: [ 19.347479] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.347523] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.347565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.347603] ^ [ 19.347637] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.347679] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.348205] ================================================================== [ 19.452846] ================================================================== [ 19.452907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.452966] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.453017] [ 19.453063] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.453151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.453180] Hardware name: linux,dummy-virt (DT) [ 19.453212] Call trace: [ 19.453237] show_stack+0x20/0x38 (C) [ 19.453287] dump_stack_lvl+0x8c/0xd0 [ 19.453334] print_report+0x118/0x608 [ 19.453380] kasan_report+0xdc/0x128 [ 19.453423] kasan_check_range+0x100/0x1a8 [ 19.453551] __kasan_check_write+0x20/0x30 [ 19.453813] kasan_atomics_helper+0x1128/0x4858 [ 19.454946] kasan_atomics+0x198/0x2e0 [ 19.455014] kunit_try_run_case+0x170/0x3f0 [ 19.455084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.455141] kthread+0x328/0x630 [ 19.455187] ret_from_fork+0x10/0x20 [ 19.455236] [ 19.455257] Allocated by task 265: [ 19.455555] kasan_save_stack+0x3c/0x68 [ 19.455900] kasan_save_track+0x20/0x40 [ 19.455954] kasan_save_alloc_info+0x40/0x58 [ 19.456239] __kasan_kmalloc+0xd4/0xd8 [ 19.456296] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.456338] kasan_atomics+0xb8/0x2e0 [ 19.456567] kunit_try_run_case+0x170/0x3f0 [ 19.456625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.456833] kthread+0x328/0x630 [ 19.456881] ret_from_fork+0x10/0x20 [ 19.456922] [ 19.457356] The buggy address belongs to the object at fff00000c788e780 [ 19.457356] which belongs to the cache kmalloc-64 of size 64 [ 19.457430] The buggy address is located 0 bytes to the right of [ 19.457430] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.457591] [ 19.457617] The buggy address belongs to the physical page: [ 19.457664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.458010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.458142] page_type: f5(slab) [ 19.458205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.458258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.458302] page dumped because: kasan: bad access detected [ 19.458466] [ 19.458492] Memory state around the buggy address: [ 19.458530] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.458586] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.458729] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.458904] ^ [ 19.459018] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459082] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459227] ================================================================== [ 19.325310] ================================================================== [ 19.325369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.325420] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.325489] [ 19.325555] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.325695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.325757] Hardware name: linux,dummy-virt (DT) [ 19.325863] Call trace: [ 19.325952] show_stack+0x20/0x38 (C) [ 19.326047] dump_stack_lvl+0x8c/0xd0 [ 19.326105] print_report+0x118/0x608 [ 19.326162] kasan_report+0xdc/0x128 [ 19.326207] kasan_check_range+0x100/0x1a8 [ 19.326256] __kasan_check_write+0x20/0x30 [ 19.326555] kasan_atomics_helper+0x99c/0x4858 [ 19.326650] kasan_atomics+0x198/0x2e0 [ 19.326697] kunit_try_run_case+0x170/0x3f0 [ 19.326745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.326798] kthread+0x328/0x630 [ 19.327076] ret_from_fork+0x10/0x20 [ 19.327227] [ 19.327253] Allocated by task 265: [ 19.327287] kasan_save_stack+0x3c/0x68 [ 19.327365] kasan_save_track+0x20/0x40 [ 19.327442] kasan_save_alloc_info+0x40/0x58 [ 19.327523] __kasan_kmalloc+0xd4/0xd8 [ 19.327561] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.327601] kasan_atomics+0xb8/0x2e0 [ 19.327647] kunit_try_run_case+0x170/0x3f0 [ 19.327743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.327820] kthread+0x328/0x630 [ 19.328021] ret_from_fork+0x10/0x20 [ 19.328236] [ 19.328541] The buggy address belongs to the object at fff00000c788e780 [ 19.328541] which belongs to the cache kmalloc-64 of size 64 [ 19.328774] The buggy address is located 0 bytes to the right of [ 19.328774] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.329218] [ 19.329250] The buggy address belongs to the physical page: [ 19.329287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.329548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.329603] page_type: f5(slab) [ 19.329756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.329825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.330106] page dumped because: kasan: bad access detected [ 19.330287] [ 19.330503] Memory state around the buggy address: [ 19.330834] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.331155] ================================================================== [ 19.230802] ================================================================== [ 19.232730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 19.232965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.233025] Call trace: [ 19.234182] __kasan_check_write+0x20/0x30 [ 19.234708] kunit_try_run_case+0x170/0x3f0 [ 19.235535] kasan_save_track+0x20/0x40 [ 19.236447] The buggy address is located 0 bytes to the right of [ 19.236447] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.239158] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.240636] kasan_report+0xdc/0x128 [ 19.241264] kthread+0x328/0x630 [ 19.242746] [ 19.248682] kasan_atomics+0x198/0x2e0 [ 19.251575] page_type: f5(slab) [ 19.252553] ^ [ 19.253428] [ 19.253577] Hardware name: linux,dummy-virt (DT) [ 19.253635] show_stack+0x20/0x38 (C) [ 19.254044] kasan_atomics_helper+0x414/0x4858 [ 19.254544] [ 19.254730] __kasan_kmalloc+0xd4/0xd8 [ 19.255048] [ 19.255075] The buggy address belongs to the object at fff00000c788e780 [ 19.255075] which belongs to the cache kmalloc-64 of size 64 [ 19.255689] ^ [ 19.255774] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255821] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255861] ================================================================== [ 19.517078] ================================================================== [ 19.517294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.517374] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.517550] [ 19.517589] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.517800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.517839] Hardware name: linux,dummy-virt (DT) [ 19.518089] Call trace: [ 19.518125] show_stack+0x20/0x38 (C) [ 19.518200] dump_stack_lvl+0x8c/0xd0 [ 19.518284] print_report+0x118/0x608 [ 19.518372] kasan_report+0xdc/0x128 [ 19.518465] kasan_check_range+0x100/0x1a8 [ 19.518513] __kasan_check_write+0x20/0x30 [ 19.518561] kasan_atomics_helper+0x15b4/0x4858 [ 19.518806] kasan_atomics+0x198/0x2e0 [ 19.518868] kunit_try_run_case+0x170/0x3f0 [ 19.518919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.519105] kthread+0x328/0x630 [ 19.519267] ret_from_fork+0x10/0x20 [ 19.519444] [ 19.519469] Allocated by task 265: [ 19.519505] kasan_save_stack+0x3c/0x68 [ 19.519551] kasan_save_track+0x20/0x40 [ 19.519591] kasan_save_alloc_info+0x40/0x58 [ 19.519631] __kasan_kmalloc+0xd4/0xd8 [ 19.519667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.519707] kasan_atomics+0xb8/0x2e0 [ 19.519743] kunit_try_run_case+0x170/0x3f0 [ 19.520144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520192] kthread+0x328/0x630 [ 19.520718] ret_from_fork+0x10/0x20 [ 19.520837] [ 19.520868] The buggy address belongs to the object at fff00000c788e780 [ 19.520868] which belongs to the cache kmalloc-64 of size 64 [ 19.521135] The buggy address is located 0 bytes to the right of [ 19.521135] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.521231] [ 19.521305] The buggy address belongs to the physical page: [ 19.521508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.521681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.521882] page_type: f5(slab) [ 19.522058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.522120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.522163] page dumped because: kasan: bad access detected [ 19.522198] [ 19.522229] Memory state around the buggy address: [ 19.522265] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.522308] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.522350] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.522518] ^ [ 19.522569] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522662] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522706] ================================================================== [ 19.411373] ================================================================== [ 19.411563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.411639] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.411694] [ 19.411737] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.411824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.411854] Hardware name: linux,dummy-virt (DT) [ 19.411887] Call trace: [ 19.411911] show_stack+0x20/0x38 (C) [ 19.411961] dump_stack_lvl+0x8c/0xd0 [ 19.412561] print_report+0x118/0x608 [ 19.412629] kasan_report+0xdc/0x128 [ 19.412677] kasan_check_range+0x100/0x1a8 [ 19.412740] __kasan_check_write+0x20/0x30 [ 19.412812] kasan_atomics_helper+0xe44/0x4858 [ 19.412907] kasan_atomics+0x198/0x2e0 [ 19.413000] kunit_try_run_case+0x170/0x3f0 [ 19.413120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413243] kthread+0x328/0x630 [ 19.413301] ret_from_fork+0x10/0x20 [ 19.413351] [ 19.413385] Allocated by task 265: [ 19.413417] kasan_save_stack+0x3c/0x68 [ 19.413461] kasan_save_track+0x20/0x40 [ 19.413498] kasan_save_alloc_info+0x40/0x58 [ 19.413538] __kasan_kmalloc+0xd4/0xd8 [ 19.413574] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.413614] kasan_atomics+0xb8/0x2e0 [ 19.413650] kunit_try_run_case+0x170/0x3f0 [ 19.413686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413741] kthread+0x328/0x630 [ 19.413783] ret_from_fork+0x10/0x20 [ 19.413821] [ 19.413855] The buggy address belongs to the object at fff00000c788e780 [ 19.413855] which belongs to the cache kmalloc-64 of size 64 [ 19.413937] The buggy address is located 0 bytes to the right of [ 19.413937] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.414048] [ 19.414113] The buggy address belongs to the physical page: [ 19.414148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.414200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.414269] page_type: f5(slab) [ 19.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.414381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.414466] page dumped because: kasan: bad access detected [ 19.414534] [ 19.414592] Memory state around the buggy address: [ 19.414644] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.414690] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.414747] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.414785] ^ [ 19.414831] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414873] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414911] ================================================================== [ 19.550318] ================================================================== [ 19.550376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.550533] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.550599] [ 19.550635] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.550809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.550844] Hardware name: linux,dummy-virt (DT) [ 19.551072] Call trace: [ 19.551106] show_stack+0x20/0x38 (C) [ 19.551175] dump_stack_lvl+0x8c/0xd0 [ 19.551227] print_report+0x118/0x608 [ 19.551323] kasan_report+0xdc/0x128 [ 19.551386] kasan_check_range+0x100/0x1a8 [ 19.551440] __kasan_check_write+0x20/0x30 [ 19.551662] kasan_atomics_helper+0x175c/0x4858 [ 19.551784] kasan_atomics+0x198/0x2e0 [ 19.552031] kunit_try_run_case+0x170/0x3f0 [ 19.552105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.552161] kthread+0x328/0x630 [ 19.552499] ret_from_fork+0x10/0x20 [ 19.552725] [ 19.552777] Allocated by task 265: [ 19.552817] kasan_save_stack+0x3c/0x68 [ 19.552870] kasan_save_track+0x20/0x40 [ 19.552910] kasan_save_alloc_info+0x40/0x58 [ 19.552950] __kasan_kmalloc+0xd4/0xd8 [ 19.552987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.553025] kasan_atomics+0xb8/0x2e0 [ 19.553077] kunit_try_run_case+0x170/0x3f0 [ 19.553117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.553160] kthread+0x328/0x630 [ 19.553197] ret_from_fork+0x10/0x20 [ 19.553234] [ 19.553256] The buggy address belongs to the object at fff00000c788e780 [ 19.553256] which belongs to the cache kmalloc-64 of size 64 [ 19.553315] The buggy address is located 0 bytes to the right of [ 19.553315] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.553376] [ 19.553398] The buggy address belongs to the physical page: [ 19.553430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.553483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.553532] page_type: f5(slab) [ 19.553572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.553624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.553665] page dumped because: kasan: bad access detected [ 19.553699] [ 19.553718] Memory state around the buggy address: [ 19.553750] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.553793] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.554210] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.554284] ^ [ 19.554337] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554390] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554735] ================================================================== [ 19.420937] ================================================================== [ 19.421027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.421090] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.421140] [ 19.421171] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.421256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.421284] Hardware name: linux,dummy-virt (DT) [ 19.421314] Call trace: [ 19.421340] show_stack+0x20/0x38 (C) [ 19.421388] dump_stack_lvl+0x8c/0xd0 [ 19.421436] print_report+0x118/0x608 [ 19.421482] kasan_report+0xdc/0x128 [ 19.421527] kasan_check_range+0x100/0x1a8 [ 19.421574] __kasan_check_write+0x20/0x30 [ 19.421622] kasan_atomics_helper+0xf20/0x4858 [ 19.421668] kasan_atomics+0x198/0x2e0 [ 19.421712] kunit_try_run_case+0x170/0x3f0 [ 19.421758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.421809] kthread+0x328/0x630 [ 19.421852] ret_from_fork+0x10/0x20 [ 19.422213] [ 19.422278] Allocated by task 265: [ 19.422317] kasan_save_stack+0x3c/0x68 [ 19.422371] kasan_save_track+0x20/0x40 [ 19.422410] kasan_save_alloc_info+0x40/0x58 [ 19.422452] __kasan_kmalloc+0xd4/0xd8 [ 19.422489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.422528] kasan_atomics+0xb8/0x2e0 [ 19.422575] kunit_try_run_case+0x170/0x3f0 [ 19.422620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.422663] kthread+0x328/0x630 [ 19.422700] ret_from_fork+0x10/0x20 [ 19.422738] [ 19.422760] The buggy address belongs to the object at fff00000c788e780 [ 19.422760] which belongs to the cache kmalloc-64 of size 64 [ 19.422871] The buggy address is located 0 bytes to the right of [ 19.422871] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.422968] [ 19.423002] The buggy address belongs to the physical page: [ 19.423035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.423116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.423173] page_type: f5(slab) [ 19.423213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.423264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.423305] page dumped because: kasan: bad access detected [ 19.423339] [ 19.423370] Memory state around the buggy address: [ 19.423402] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.423446] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.423544] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.423625] ^ [ 19.423678] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.423726] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.423766] ================================================================== [ 19.544973] ================================================================== [ 19.545302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.545386] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.545473] [ 19.545505] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.545588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.545624] Hardware name: linux,dummy-virt (DT) [ 19.545690] Call trace: [ 19.545733] show_stack+0x20/0x38 (C) [ 19.545827] dump_stack_lvl+0x8c/0xd0 [ 19.546055] print_report+0x118/0x608 [ 19.546346] kasan_report+0xdc/0x128 [ 19.546408] __asan_report_load8_noabort+0x20/0x30 [ 19.546476] kasan_atomics_helper+0x3e10/0x4858 [ 19.546818] kasan_atomics+0x198/0x2e0 [ 19.546891] kunit_try_run_case+0x170/0x3f0 [ 19.546953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.547011] kthread+0x328/0x630 [ 19.547312] ret_from_fork+0x10/0x20 [ 19.547463] [ 19.547593] Allocated by task 265: [ 19.547767] kasan_save_stack+0x3c/0x68 [ 19.547974] kasan_save_track+0x20/0x40 [ 19.548020] kasan_save_alloc_info+0x40/0x58 [ 19.548077] __kasan_kmalloc+0xd4/0xd8 [ 19.548118] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.548158] kasan_atomics+0xb8/0x2e0 [ 19.548196] kunit_try_run_case+0x170/0x3f0 [ 19.548235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.548277] kthread+0x328/0x630 [ 19.548315] ret_from_fork+0x10/0x20 [ 19.548352] [ 19.548373] The buggy address belongs to the object at fff00000c788e780 [ 19.548373] which belongs to the cache kmalloc-64 of size 64 [ 19.548431] The buggy address is located 0 bytes to the right of [ 19.548431] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.548494] [ 19.548516] The buggy address belongs to the physical page: [ 19.548548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.548602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.548652] page_type: f5(slab) [ 19.548692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.548744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.548786] page dumped because: kasan: bad access detected [ 19.548819] [ 19.549194] Memory state around the buggy address: [ 19.549235] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.549283] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.549327] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.549418] ^ [ 19.549455] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549499] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549538] ================================================================== [ 19.533456] ================================================================== [ 19.533733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.534008] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.534232] [ 19.534271] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.534467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.534599] Hardware name: linux,dummy-virt (DT) [ 19.534791] Call trace: [ 19.534986] show_stack+0x20/0x38 (C) [ 19.535064] dump_stack_lvl+0x8c/0xd0 [ 19.535117] print_report+0x118/0x608 [ 19.535201] kasan_report+0xdc/0x128 [ 19.535453] __asan_report_load8_noabort+0x20/0x30 [ 19.535565] kasan_atomics_helper+0x3df4/0x4858 [ 19.535869] kasan_atomics+0x198/0x2e0 [ 19.536113] kunit_try_run_case+0x170/0x3f0 [ 19.536178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.536503] kthread+0x328/0x630 [ 19.536845] ret_from_fork+0x10/0x20 [ 19.536900] [ 19.536921] Allocated by task 265: [ 19.536953] kasan_save_stack+0x3c/0x68 [ 19.536998] kasan_save_track+0x20/0x40 [ 19.537062] kasan_save_alloc_info+0x40/0x58 [ 19.537155] __kasan_kmalloc+0xd4/0xd8 [ 19.537218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.537257] kasan_atomics+0xb8/0x2e0 [ 19.537299] kunit_try_run_case+0x170/0x3f0 [ 19.537445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.537687] kthread+0x328/0x630 [ 19.537913] ret_from_fork+0x10/0x20 [ 19.537958] [ 19.537981] The buggy address belongs to the object at fff00000c788e780 [ 19.537981] which belongs to the cache kmalloc-64 of size 64 [ 19.538054] The buggy address is located 0 bytes to the right of [ 19.538054] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.538207] [ 19.538247] The buggy address belongs to the physical page: [ 19.538329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.538386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.538441] page_type: f5(slab) [ 19.538530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.538596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.538700] page dumped because: kasan: bad access detected [ 19.538736] [ 19.538758] Memory state around the buggy address: [ 19.538845] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.538926] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.538970] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.539009] ^ [ 19.539052] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.539100] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.539139] ================================================================== [ 19.459604] ================================================================== [ 19.459651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.459707] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.459757] [ 19.459789] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.459873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.459902] Hardware name: linux,dummy-virt (DT) [ 19.459934] Call trace: [ 19.459958] show_stack+0x20/0x38 (C) [ 19.460008] dump_stack_lvl+0x8c/0xd0 [ 19.460072] print_report+0x118/0x608 [ 19.462097] kasan_report+0xdc/0x128 [ 19.462932] kasan_check_range+0x100/0x1a8 [ 19.463262] __kasan_check_write+0x20/0x30 [ 19.463347] kasan_atomics_helper+0x1190/0x4858 [ 19.463450] kasan_atomics+0x198/0x2e0 [ 19.463512] kunit_try_run_case+0x170/0x3f0 [ 19.463579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.463632] kthread+0x328/0x630 [ 19.463869] ret_from_fork+0x10/0x20 [ 19.463945] [ 19.463981] Allocated by task 265: [ 19.464275] kasan_save_stack+0x3c/0x68 [ 19.464329] kasan_save_track+0x20/0x40 [ 19.464589] kasan_save_alloc_info+0x40/0x58 [ 19.464641] __kasan_kmalloc+0xd4/0xd8 [ 19.464680] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.464759] kasan_atomics+0xb8/0x2e0 [ 19.464822] kunit_try_run_case+0x170/0x3f0 [ 19.464865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.464910] kthread+0x328/0x630 [ 19.465255] ret_from_fork+0x10/0x20 [ 19.465330] [ 19.465356] The buggy address belongs to the object at fff00000c788e780 [ 19.465356] which belongs to the cache kmalloc-64 of size 64 [ 19.465417] The buggy address is located 0 bytes to the right of [ 19.465417] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.465480] [ 19.466069] The buggy address belongs to the physical page: [ 19.466138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.466322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.466378] page_type: f5(slab) [ 19.466420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.466623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.466824] page dumped because: kasan: bad access detected [ 19.466869] [ 19.466894] Memory state around the buggy address: [ 19.467057] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.467339] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.467534] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.467581] ^ [ 19.467912] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.468192] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.468359] ================================================================== [ 19.433309] ================================================================== [ 19.433406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.433465] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.433608] [ 19.433673] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.433765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.433793] Hardware name: linux,dummy-virt (DT) [ 19.433827] Call trace: [ 19.434394] show_stack+0x20/0x38 (C) [ 19.434478] dump_stack_lvl+0x8c/0xd0 [ 19.434529] print_report+0x118/0x608 [ 19.434591] kasan_report+0xdc/0x128 [ 19.434641] kasan_check_range+0x100/0x1a8 [ 19.434690] __kasan_check_write+0x20/0x30 [ 19.434827] kasan_atomics_helper+0xff0/0x4858 [ 19.434985] kasan_atomics+0x198/0x2e0 [ 19.435240] kunit_try_run_case+0x170/0x3f0 [ 19.435311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.435487] kthread+0x328/0x630 [ 19.435554] ret_from_fork+0x10/0x20 [ 19.435604] [ 19.435639] Allocated by task 265: [ 19.435715] kasan_save_stack+0x3c/0x68 [ 19.435917] kasan_save_track+0x20/0x40 [ 19.436126] kasan_save_alloc_info+0x40/0x58 [ 19.436297] __kasan_kmalloc+0xd4/0xd8 [ 19.436339] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.436398] kasan_atomics+0xb8/0x2e0 [ 19.436536] kunit_try_run_case+0x170/0x3f0 [ 19.436761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.436812] kthread+0x328/0x630 [ 19.436851] ret_from_fork+0x10/0x20 [ 19.436888] [ 19.436912] The buggy address belongs to the object at fff00000c788e780 [ 19.436912] which belongs to the cache kmalloc-64 of size 64 [ 19.438062] The buggy address is located 0 bytes to the right of [ 19.438062] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.438334] [ 19.438366] The buggy address belongs to the physical page: [ 19.438400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.438456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.438506] page_type: f5(slab) [ 19.438547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.438615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.438698] page dumped because: kasan: bad access detected [ 19.438733] [ 19.438753] Memory state around the buggy address: [ 19.438786] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.438830] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.438873] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.438913] ^ [ 19.438946] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.438992] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.439030] ================================================================== [ 19.391356] ================================================================== [ 19.391417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.391476] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.391547] [ 19.391585] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.391672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.391838] Hardware name: linux,dummy-virt (DT) [ 19.391912] Call trace: [ 19.391968] show_stack+0x20/0x38 (C) [ 19.392088] dump_stack_lvl+0x8c/0xd0 [ 19.392149] print_report+0x118/0x608 [ 19.392254] kasan_report+0xdc/0x128 [ 19.392300] kasan_check_range+0x100/0x1a8 [ 19.392346] __kasan_check_write+0x20/0x30 [ 19.392395] kasan_atomics_helper+0xd3c/0x4858 [ 19.392443] kasan_atomics+0x198/0x2e0 [ 19.392487] kunit_try_run_case+0x170/0x3f0 [ 19.392533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.392583] kthread+0x328/0x630 [ 19.392628] ret_from_fork+0x10/0x20 [ 19.392677] [ 19.392697] Allocated by task 265: [ 19.392728] kasan_save_stack+0x3c/0x68 [ 19.392771] kasan_save_track+0x20/0x40 [ 19.392810] kasan_save_alloc_info+0x40/0x58 [ 19.392849] __kasan_kmalloc+0xd4/0xd8 [ 19.392885] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.392925] kasan_atomics+0xb8/0x2e0 [ 19.392959] kunit_try_run_case+0x170/0x3f0 [ 19.392995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393036] kthread+0x328/0x630 [ 19.393161] ret_from_fork+0x10/0x20 [ 19.393334] [ 19.393358] The buggy address belongs to the object at fff00000c788e780 [ 19.393358] which belongs to the cache kmalloc-64 of size 64 [ 19.393438] The buggy address is located 0 bytes to the right of [ 19.393438] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.393634] [ 19.393701] The buggy address belongs to the physical page: [ 19.393940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.394025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.394088] page_type: f5(slab) [ 19.394140] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.394207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.394250] page dumped because: kasan: bad access detected [ 19.394284] [ 19.394305] Memory state around the buggy address: [ 19.394339] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394405] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394470] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.394520] ^ [ 19.394554] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.394680] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.394800] ================================================================== [ 19.489554] ================================================================== [ 19.489601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.489648] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.489697] [ 19.489726] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.489807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.489836] Hardware name: linux,dummy-virt (DT) [ 19.489866] Call trace: [ 19.489911] show_stack+0x20/0x38 (C) [ 19.490015] dump_stack_lvl+0x8c/0xd0 [ 19.490079] print_report+0x118/0x608 [ 19.490131] kasan_report+0xdc/0x128 [ 19.490176] kasan_check_range+0x100/0x1a8 [ 19.490222] __kasan_check_write+0x20/0x30 [ 19.490270] kasan_atomics_helper+0x1384/0x4858 [ 19.490353] kasan_atomics+0x198/0x2e0 [ 19.490409] kunit_try_run_case+0x170/0x3f0 [ 19.490482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490578] kthread+0x328/0x630 [ 19.490814] ret_from_fork+0x10/0x20 [ 19.490870] [ 19.490892] Allocated by task 265: [ 19.490923] kasan_save_stack+0x3c/0x68 [ 19.491071] kasan_save_track+0x20/0x40 [ 19.491115] kasan_save_alloc_info+0x40/0x58 [ 19.491156] __kasan_kmalloc+0xd4/0xd8 [ 19.491192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.491233] kasan_atomics+0xb8/0x2e0 [ 19.491569] kunit_try_run_case+0x170/0x3f0 [ 19.491654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.491704] kthread+0x328/0x630 [ 19.491743] ret_from_fork+0x10/0x20 [ 19.491780] [ 19.491946] The buggy address belongs to the object at fff00000c788e780 [ 19.491946] which belongs to the cache kmalloc-64 of size 64 [ 19.492013] The buggy address is located 0 bytes to the right of [ 19.492013] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.492088] [ 19.492128] The buggy address belongs to the physical page: [ 19.492175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.492225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.492297] page_type: f5(slab) [ 19.492386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.492438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.492508] page dumped because: kasan: bad access detected [ 19.492542] [ 19.492562] Memory state around the buggy address: [ 19.492611] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.492707] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.492939] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.493015] ^ [ 19.493062] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.493296] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.493948] ================================================================== [ 19.555164] ================================================================== [ 19.555223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.555281] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.555332] [ 19.555378] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.555461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.555491] Hardware name: linux,dummy-virt (DT) [ 19.555522] Call trace: [ 19.555545] show_stack+0x20/0x38 (C) [ 19.555596] dump_stack_lvl+0x8c/0xd0 [ 19.555644] print_report+0x118/0x608 [ 19.555690] kasan_report+0xdc/0x128 [ 19.555734] __asan_report_load8_noabort+0x20/0x30 [ 19.555841] kasan_atomics_helper+0x3e20/0x4858 [ 19.556004] kasan_atomics+0x198/0x2e0 [ 19.556202] kunit_try_run_case+0x170/0x3f0 [ 19.556378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.556461] kthread+0x328/0x630 [ 19.556516] ret_from_fork+0x10/0x20 [ 19.556566] [ 19.556587] Allocated by task 265: [ 19.556618] kasan_save_stack+0x3c/0x68 [ 19.556815] kasan_save_track+0x20/0x40 [ 19.556863] kasan_save_alloc_info+0x40/0x58 [ 19.556919] __kasan_kmalloc+0xd4/0xd8 [ 19.557031] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.557144] kasan_atomics+0xb8/0x2e0 [ 19.557358] kunit_try_run_case+0x170/0x3f0 [ 19.557448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557601] kthread+0x328/0x630 [ 19.557641] ret_from_fork+0x10/0x20 [ 19.557686] [ 19.557729] The buggy address belongs to the object at fff00000c788e780 [ 19.557729] which belongs to the cache kmalloc-64 of size 64 [ 19.557874] The buggy address is located 0 bytes to the right of [ 19.557874] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.557977] [ 19.558000] The buggy address belongs to the physical page: [ 19.558576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.558719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.558803] page_type: f5(slab) [ 19.558844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.558921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.558968] page dumped because: kasan: bad access detected [ 19.559003] [ 19.559023] Memory state around the buggy address: [ 19.559103] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559340] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559663] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.559750] ^ [ 19.559808] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.559851] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.560080] ================================================================== [ 19.527354] ================================================================== [ 19.527423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.527790] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.527867] [ 19.527902] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.527990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.528020] Hardware name: linux,dummy-virt (DT) [ 19.528063] Call trace: [ 19.528090] show_stack+0x20/0x38 (C) [ 19.528145] dump_stack_lvl+0x8c/0xd0 [ 19.528358] print_report+0x118/0x608 [ 19.528556] kasan_report+0xdc/0x128 [ 19.528610] kasan_check_range+0x100/0x1a8 [ 19.528690] __kasan_check_write+0x20/0x30 [ 19.528780] kasan_atomics_helper+0x1644/0x4858 [ 19.528840] kasan_atomics+0x198/0x2e0 [ 19.528948] kunit_try_run_case+0x170/0x3f0 [ 19.529005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.529165] kthread+0x328/0x630 [ 19.529223] ret_from_fork+0x10/0x20 [ 19.529292] [ 19.529319] Allocated by task 265: [ 19.529352] kasan_save_stack+0x3c/0x68 [ 19.529397] kasan_save_track+0x20/0x40 [ 19.529651] kasan_save_alloc_info+0x40/0x58 [ 19.529933] __kasan_kmalloc+0xd4/0xd8 [ 19.529999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.530050] kasan_atomics+0xb8/0x2e0 [ 19.530094] kunit_try_run_case+0x170/0x3f0 [ 19.530412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530503] kthread+0x328/0x630 [ 19.530655] ret_from_fork+0x10/0x20 [ 19.530866] [ 19.530947] The buggy address belongs to the object at fff00000c788e780 [ 19.530947] which belongs to the cache kmalloc-64 of size 64 [ 19.531014] The buggy address is located 0 bytes to the right of [ 19.531014] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.531089] [ 19.531116] The buggy address belongs to the physical page: [ 19.531204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.531543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.531615] page_type: f5(slab) [ 19.531851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.531925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.532106] page dumped because: kasan: bad access detected [ 19.532372] [ 19.532401] Memory state around the buggy address: [ 19.532485] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.532535] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.532770] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.532818] ^ [ 19.532859] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.533185] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.533233] ================================================================== [ 19.404957] ================================================================== [ 19.405001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.405060] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.405110] [ 19.405143] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.405226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.405256] Hardware name: linux,dummy-virt (DT) [ 19.405289] Call trace: [ 19.405326] show_stack+0x20/0x38 (C) [ 19.405377] dump_stack_lvl+0x8c/0xd0 [ 19.405426] print_report+0x118/0x608 [ 19.405471] kasan_report+0xdc/0x128 [ 19.405517] __asan_report_load8_noabort+0x20/0x30 [ 19.406082] kasan_atomics_helper+0x3f58/0x4858 [ 19.406200] kasan_atomics+0x198/0x2e0 [ 19.406253] kunit_try_run_case+0x170/0x3f0 [ 19.406302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.406431] kthread+0x328/0x630 [ 19.406486] ret_from_fork+0x10/0x20 [ 19.406537] [ 19.406608] Allocated by task 265: [ 19.406644] kasan_save_stack+0x3c/0x68 [ 19.407433] kasan_save_track+0x20/0x40 [ 19.407503] kasan_save_alloc_info+0x40/0x58 [ 19.407557] __kasan_kmalloc+0xd4/0xd8 [ 19.407597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.407637] kasan_atomics+0xb8/0x2e0 [ 19.407673] kunit_try_run_case+0x170/0x3f0 [ 19.407711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.407754] kthread+0x328/0x630 [ 19.407793] ret_from_fork+0x10/0x20 [ 19.408391] [ 19.408419] The buggy address belongs to the object at fff00000c788e780 [ 19.408419] which belongs to the cache kmalloc-64 of size 64 [ 19.408481] The buggy address is located 0 bytes to the right of [ 19.408481] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.408544] [ 19.408567] The buggy address belongs to the physical page: [ 19.408598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.408832] page_type: f5(slab) [ 19.408880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.409397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.409491] page dumped because: kasan: bad access detected [ 19.409727] [ 19.409773] Memory state around the buggy address: [ 19.409807] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409853] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409905] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.409948] ^ [ 19.410328] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.410519] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.410590] ================================================================== [ 19.315730] ================================================================== [ 19.315791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.315848] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.315912] [ 19.315949] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.316431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.316505] Hardware name: linux,dummy-virt (DT) [ 19.316544] Call trace: [ 19.316569] show_stack+0x20/0x38 (C) [ 19.316627] dump_stack_lvl+0x8c/0xd0 [ 19.317056] print_report+0x118/0x608 [ 19.317126] kasan_report+0xdc/0x128 [ 19.317177] __asan_report_load4_noabort+0x20/0x30 [ 19.317230] kasan_atomics_helper+0x42d8/0x4858 [ 19.317318] kasan_atomics+0x198/0x2e0 [ 19.317379] kunit_try_run_case+0x170/0x3f0 [ 19.317472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.317550] kthread+0x328/0x630 [ 19.317644] ret_from_fork+0x10/0x20 [ 19.317751] [ 19.317807] Allocated by task 265: [ 19.317847] kasan_save_stack+0x3c/0x68 [ 19.318124] kasan_save_track+0x20/0x40 [ 19.318170] kasan_save_alloc_info+0x40/0x58 [ 19.318212] __kasan_kmalloc+0xd4/0xd8 [ 19.318262] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.318409] kasan_atomics+0xb8/0x2e0 [ 19.318535] kunit_try_run_case+0x170/0x3f0 [ 19.318657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.318707] kthread+0x328/0x630 [ 19.318744] ret_from_fork+0x10/0x20 [ 19.318781] [ 19.318806] The buggy address belongs to the object at fff00000c788e780 [ 19.318806] which belongs to the cache kmalloc-64 of size 64 [ 19.318866] The buggy address is located 0 bytes to the right of [ 19.318866] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.319283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.319572] page dumped because: kasan: bad access detected [ 19.320383] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.321912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.323158] kthread+0x328/0x630 [ 19.323648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.323689] kasan_atomics+0xb8/0x2e0 [ 19.323725] kunit_try_run_case+0x170/0x3f0 [ 19.323763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.323806] kthread+0x328/0x630 [ 19.323895] ret_from_fork+0x10/0x20 [ 19.323947] [ 19.323970] The buggy address belongs to the object at fff00000c788e780 [ 19.323970] which belongs to the cache kmalloc-64 of size 64 [ 19.324034] The buggy address is located 0 bytes to the right of [ 19.324034] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.324110] [ 19.324133] The buggy address belongs to the physical page: [ 19.324167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.324263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.324318] page_type: f5(slab) [ 19.324368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.324462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.324536] page dumped because: kasan: bad access detected [ 19.324576] [ 19.324597] Memory state around the buggy address: [ 19.324632] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.324709] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.324758] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.324798] ^ [ 19.324838] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324918] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324964] ================================================================== [ 19.424782] ================================================================== [ 19.424860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.424923] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.424975] [ 19.425007] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.425104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.425135] Hardware name: linux,dummy-virt (DT) [ 19.425169] Call trace: [ 19.425645] show_stack+0x20/0x38 (C) [ 19.426078] dump_stack_lvl+0x8c/0xd0 [ 19.426569] print_report+0x118/0x608 [ 19.426753] kasan_report+0xdc/0x128 [ 19.426947] kasan_check_range+0x100/0x1a8 [ 19.427012] __kasan_check_write+0x20/0x30 [ 19.427234] kasan_atomics_helper+0xf88/0x4858 [ 19.427385] kasan_atomics+0x198/0x2e0 [ 19.427784] kunit_try_run_case+0x170/0x3f0 [ 19.427884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.428204] kthread+0x328/0x630 [ 19.428308] ret_from_fork+0x10/0x20 [ 19.428377] [ 19.428401] Allocated by task 265: [ 19.428726] kasan_save_stack+0x3c/0x68 [ 19.429007] kasan_save_track+0x20/0x40 [ 19.429086] kasan_save_alloc_info+0x40/0x58 [ 19.429583] __kasan_kmalloc+0xd4/0xd8 [ 19.429887] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.430107] kasan_atomics+0xb8/0x2e0 [ 19.430216] kunit_try_run_case+0x170/0x3f0 [ 19.430263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430307] kthread+0x328/0x630 [ 19.430344] ret_from_fork+0x10/0x20 [ 19.430380] [ 19.430405] The buggy address belongs to the object at fff00000c788e780 [ 19.430405] which belongs to the cache kmalloc-64 of size 64 [ 19.430464] The buggy address is located 0 bytes to the right of [ 19.430464] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.430974] [ 19.431062] The buggy address belongs to the physical page: [ 19.431477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.431550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.431605] page_type: f5(slab) [ 19.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.431837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.431889] page dumped because: kasan: bad access detected [ 19.432128] [ 19.432166] Memory state around the buggy address: [ 19.432286] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432348] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432395] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.432565] ^ [ 19.432620] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.432667] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.432813] ================================================================== [ 19.385612] ================================================================== [ 19.385659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.385760] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.385815] [ 19.386446] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.386689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.386737] Hardware name: linux,dummy-virt (DT) [ 19.386818] Call trace: [ 19.386863] show_stack+0x20/0x38 (C) [ 19.387118] dump_stack_lvl+0x8c/0xd0 [ 19.387180] print_report+0x118/0x608 [ 19.387229] kasan_report+0xdc/0x128 [ 19.387277] __asan_report_load4_noabort+0x20/0x30 [ 19.387542] kasan_atomics_helper+0x3dd8/0x4858 [ 19.387885] kasan_atomics+0x198/0x2e0 [ 19.387938] kunit_try_run_case+0x170/0x3f0 [ 19.387987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388059] kthread+0x328/0x630 [ 19.388114] ret_from_fork+0x10/0x20 [ 19.388207] [ 19.388452] Allocated by task 265: [ 19.388512] kasan_save_stack+0x3c/0x68 [ 19.388571] kasan_save_track+0x20/0x40 [ 19.388673] kasan_save_alloc_info+0x40/0x58 [ 19.388718] __kasan_kmalloc+0xd4/0xd8 [ 19.388765] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.388933] kasan_atomics+0xb8/0x2e0 [ 19.389005] kunit_try_run_case+0x170/0x3f0 [ 19.389108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.389161] kthread+0x328/0x630 [ 19.389197] ret_from_fork+0x10/0x20 [ 19.389235] [ 19.389393] The buggy address belongs to the object at fff00000c788e780 [ 19.389393] which belongs to the cache kmalloc-64 of size 64 [ 19.389464] The buggy address is located 0 bytes to the right of [ 19.389464] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.389579] [ 19.389629] The buggy address belongs to the physical page: [ 19.389677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.389731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.389782] page_type: f5(slab) [ 19.389824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.389888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.389932] page dumped because: kasan: bad access detected [ 19.389965] [ 19.389985] Memory state around the buggy address: [ 19.390019] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390073] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390131] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.390172] ^ [ 19.390209] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390252] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390300] ================================================================== [ 19.494559] ================================================================== [ 19.494856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.494921] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.495168] [ 19.495215] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.495646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.495807] Hardware name: linux,dummy-virt (DT) [ 19.495852] Call trace: [ 19.496003] show_stack+0x20/0x38 (C) [ 19.496171] dump_stack_lvl+0x8c/0xd0 [ 19.496257] print_report+0x118/0x608 [ 19.496327] kasan_report+0xdc/0x128 [ 19.496379] __asan_report_load8_noabort+0x20/0x30 [ 19.496709] kasan_atomics_helper+0x3f04/0x4858 [ 19.496936] kasan_atomics+0x198/0x2e0 [ 19.497000] kunit_try_run_case+0x170/0x3f0 [ 19.497063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.497120] kthread+0x328/0x630 [ 19.497167] ret_from_fork+0x10/0x20 [ 19.497217] [ 19.497238] Allocated by task 265: [ 19.497271] kasan_save_stack+0x3c/0x68 [ 19.497315] kasan_save_track+0x20/0x40 [ 19.498096] kasan_save_alloc_info+0x40/0x58 [ 19.498319] __kasan_kmalloc+0xd4/0xd8 [ 19.498363] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.498401] kasan_atomics+0xb8/0x2e0 [ 19.498439] kunit_try_run_case+0x170/0x3f0 [ 19.498476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.498519] kthread+0x328/0x630 [ 19.498556] ret_from_fork+0x10/0x20 [ 19.498604] [ 19.498628] The buggy address belongs to the object at fff00000c788e780 [ 19.498628] which belongs to the cache kmalloc-64 of size 64 [ 19.498686] The buggy address is located 0 bytes to the right of [ 19.498686] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.498748] [ 19.498770] The buggy address belongs to the physical page: [ 19.498802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.498854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.498903] page_type: f5(slab) [ 19.498942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.498993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.499035] page dumped because: kasan: bad access detected [ 19.499077] [ 19.499099] Memory state around the buggy address: [ 19.499131] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499176] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499218] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.499256] ^ [ 19.499291] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499333] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499371] ================================================================== [ 19.417908] ================================================================== [ 19.417955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.418002] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.418059] [ 19.418093] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.418175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.418226] Hardware name: linux,dummy-virt (DT) [ 19.418278] Call trace: [ 19.418337] show_stack+0x20/0x38 (C) [ 19.418422] dump_stack_lvl+0x8c/0xd0 [ 19.418525] print_report+0x118/0x608 [ 19.418597] kasan_report+0xdc/0x128 [ 19.418645] kasan_check_range+0x100/0x1a8 [ 19.418692] __kasan_check_write+0x20/0x30 [ 19.418811] kasan_atomics_helper+0xeb8/0x4858 [ 19.418862] kasan_atomics+0x198/0x2e0 [ 19.418908] kunit_try_run_case+0x170/0x3f0 [ 19.418953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419018] kthread+0x328/0x630 [ 19.419076] ret_from_fork+0x10/0x20 [ 19.419127] [ 19.419169] Allocated by task 265: [ 19.419255] kasan_save_stack+0x3c/0x68 [ 19.419342] kasan_save_track+0x20/0x40 [ 19.419406] kasan_save_alloc_info+0x40/0x58 [ 19.419501] __kasan_kmalloc+0xd4/0xd8 [ 19.419543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.419582] kasan_atomics+0xb8/0x2e0 [ 19.419619] kunit_try_run_case+0x170/0x3f0 [ 19.419656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419699] kthread+0x328/0x630 [ 19.419758] ret_from_fork+0x10/0x20 [ 19.419840] [ 19.419865] The buggy address belongs to the object at fff00000c788e780 [ 19.419865] which belongs to the cache kmalloc-64 of size 64 [ 19.419923] The buggy address is located 0 bytes to the right of [ 19.419923] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.419984] [ 19.420005] The buggy address belongs to the physical page: [ 19.420036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.420098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.420145] page_type: f5(slab) [ 19.420201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.420262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.420319] page dumped because: kasan: bad access detected [ 19.420359] [ 19.420378] Memory state around the buggy address: [ 19.420419] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420463] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420505] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.420542] ^ [ 19.420576] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420618] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420656] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 19.089946] ================================================================== [ 19.090008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.090753] Read of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261 [ 19.090837] [ 19.090960] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.091107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.091174] Hardware name: linux,dummy-virt (DT) [ 19.091256] Call trace: [ 19.091284] show_stack+0x20/0x38 (C) [ 19.091634] dump_stack_lvl+0x8c/0xd0 [ 19.092323] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.094120] kthread+0x328/0x630 [ 19.094409] ret_from_fork+0x10/0x20 [ 19.094711] [ 19.094768] The buggy address belongs to the object at fff00000c5f09c40 [ 19.094768] which belongs to the cache kmalloc-16 of size 16 [ 19.095252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.095769] page dumped because: kasan: bad access detected [ 19.096185] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.096910] ================================================================== [ 19.065257] ================================================================== [ 19.065340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.065403] Write of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261 [ 19.066608] [ 19.066834] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.066960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.067273] Hardware name: linux,dummy-virt (DT) [ 19.067520] Call trace: [ 19.067559] show_stack+0x20/0x38 (C) [ 19.067711] dump_stack_lvl+0x8c/0xd0 [ 19.067790] print_report+0x118/0x608 [ 19.067839] kasan_report+0xdc/0x128 [ 19.067886] kasan_check_range+0x100/0x1a8 [ 19.067933] __kasan_check_write+0x20/0x30 [ 19.068552] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.068732] kasan_bitops_generic+0x110/0x1c8 [ 19.068959] kunit_try_run_case+0x170/0x3f0 [ 19.069109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.069173] kthread+0x328/0x630 [ 19.069374] ret_from_fork+0x10/0x20 [ 19.069555] [ 19.069613] Allocated by task 261: [ 19.069652] kasan_save_stack+0x3c/0x68 [ 19.069723] kasan_save_track+0x20/0x40 [ 19.069942] kasan_save_alloc_info+0x40/0x58 [ 19.070116] __kasan_kmalloc+0xd4/0xd8 [ 19.070171] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.070214] kasan_bitops_generic+0xa0/0x1c8 [ 19.070261] kunit_try_run_case+0x170/0x3f0 [ 19.070305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.070501] kthread+0x328/0x630 [ 19.070661] ret_from_fork+0x10/0x20 [ 19.070715] [ 19.070742] The buggy address belongs to the object at fff00000c5f09c40 [ 19.070742] which belongs to the cache kmalloc-16 of size 16 [ 19.070804] The buggy address is located 8 bytes inside of [ 19.070804] allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49) [ 19.070864] [ 19.070887] The buggy address belongs to the physical page: [ 19.071080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09 [ 19.071285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.071655] page_type: f5(slab) [ 19.071745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.071834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.072184] page dumped because: kasan: bad access detected [ 19.072229] [ 19.072255] Memory state around the buggy address: [ 19.072375] fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 19.072580] fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.072760] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.072868] ^ [ 19.072913] fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.072958] fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.073185] ================================================================== [ 19.080965] ================================================================== [ 19.081029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.081102] Write of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261 [ 19.081441] [ 19.081490] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.081609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.081645] Hardware name: linux,dummy-virt (DT) [ 19.081802] Call trace: [ 19.081838] show_stack+0x20/0x38 (C) [ 19.082364] dump_stack_lvl+0x8c/0xd0 [ 19.082587] print_report+0x118/0x608 [ 19.082696] kasan_report+0xdc/0x128 [ 19.082777] kasan_check_range+0x100/0x1a8 [ 19.082842] __kasan_check_write+0x20/0x30 [ 19.082892] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.082945] kasan_bitops_generic+0x110/0x1c8 [ 19.082992] kunit_try_run_case+0x170/0x3f0 [ 19.083375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.083470] kthread+0x328/0x630 [ 19.083520] ret_from_fork+0x10/0x20 [ 19.083865] [ 19.083946] Allocated by task 261: [ 19.083986] kasan_save_stack+0x3c/0x68 [ 19.084319] kasan_save_track+0x20/0x40 [ 19.084374] kasan_save_alloc_info+0x40/0x58 [ 19.084417] __kasan_kmalloc+0xd4/0xd8 [ 19.084455] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.084693] kasan_bitops_generic+0xa0/0x1c8 [ 19.085012] kunit_try_run_case+0x170/0x3f0 [ 19.085100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.085470] kthread+0x328/0x630 [ 19.085532] ret_from_fork+0x10/0x20 [ 19.085581] [ 19.085608] The buggy address belongs to the object at fff00000c5f09c40 [ 19.085608] which belongs to the cache kmalloc-16 of size 16 [ 19.085997] The buggy address is located 8 bytes inside of [ 19.085997] allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49) [ 19.086264] [ 19.086368] The buggy address belongs to the physical page: [ 19.086410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09 [ 19.086539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.086616] page_type: f5(slab) [ 19.086879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.087110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.087173] page dumped because: kasan: bad access detected [ 19.087332] [ 19.087463] Memory state around the buggy address: [ 19.087554] fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 19.087814] fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.088035] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.088101] ^ [ 19.088370] fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.088460] fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.088534] ================================================================== [ 19.075372] ================================================================== [ 19.075435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.075496] Read of size 8 at addr fff00000c5f09c48 by task kunit_try_catch/261 [ 19.075548] [ 19.076053] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.076572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.076636] Hardware name: linux,dummy-virt (DT) [ 19.076674] Call trace: [ 19.076699] show_stack+0x20/0x38 (C) [ 19.076759] dump_stack_lvl+0x8c/0xd0 [ 19.076809] print_report+0x118/0x608 [ 19.076894] kasan_report+0xdc/0x128 [ 19.076946] __asan_report_load8_noabort+0x20/0x30 [ 19.076997] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.077303] kasan_bitops_generic+0x110/0x1c8 [ 19.077437] kunit_try_run_case+0x170/0x3f0 [ 19.077493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.077743] kthread+0x328/0x630 [ 19.077838] ret_from_fork+0x10/0x20 [ 19.077891] [ 19.077938] Allocated by task 261: [ 19.077974] kasan_save_stack+0x3c/0x68 [ 19.078022] kasan_save_track+0x20/0x40 [ 19.078074] kasan_save_alloc_info+0x40/0x58 [ 19.078405] __kasan_kmalloc+0xd4/0xd8 [ 19.078703] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.078758] kasan_bitops_generic+0xa0/0x1c8 [ 19.078827] kunit_try_run_case+0x170/0x3f0 [ 19.078866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.078909] kthread+0x328/0x630 [ 19.078946] ret_from_fork+0x10/0x20 [ 19.078981] [ 19.079011] The buggy address belongs to the object at fff00000c5f09c40 [ 19.079011] which belongs to the cache kmalloc-16 of size 16 [ 19.079085] The buggy address is located 8 bytes inside of [ 19.079085] allocated 9-byte region [fff00000c5f09c40, fff00000c5f09c49) [ 19.079149] [ 19.079173] The buggy address belongs to the physical page: [ 19.079205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f09 [ 19.079259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.079313] page_type: f5(slab) [ 19.079356] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.079411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.079451] page dumped because: kasan: bad access detected [ 19.079482] [ 19.079518] Memory state around the buggy address: [ 19.079556] fff00000c5f09b00: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 19.079610] fff00000c5f09b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.079669] >fff00000c5f09c00: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.079709] ^ [ 19.079766] fff00000c5f09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.079815] fff00000c5f09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.079855] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 19.042191] ================================================================== [ 19.042310] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 19.042711] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259 [ 19.043269] [ 19.043638] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.043745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.043775] Hardware name: linux,dummy-virt (DT) [ 19.043816] Call trace: [ 19.043844] show_stack+0x20/0x38 (C) [ 19.044105] dump_stack_lvl+0x8c/0xd0 [ 19.044372] print_report+0x118/0x608 [ 19.044452] kasan_report+0xdc/0x128 [ 19.044503] __asan_report_load1_noabort+0x20/0x30 [ 19.044562] strnlen+0x80/0x88 [ 19.044818] kasan_strings+0x478/0xb00 [ 19.044902] kunit_try_run_case+0x170/0x3f0 [ 19.044955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.045008] kthread+0x328/0x630 [ 19.045066] ret_from_fork+0x10/0x20 [ 19.045418] [ 19.045468] Allocated by task 259: [ 19.045527] kasan_save_stack+0x3c/0x68 [ 19.045590] kasan_save_track+0x20/0x40 [ 19.045634] kasan_save_alloc_info+0x40/0x58 [ 19.045676] __kasan_kmalloc+0xd4/0xd8 [ 19.045713] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.045752] kasan_strings+0xc8/0xb00 [ 19.045788] kunit_try_run_case+0x170/0x3f0 [ 19.045824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.045867] kthread+0x328/0x630 [ 19.046229] ret_from_fork+0x10/0x20 [ 19.046284] [ 19.046311] Freed by task 259: [ 19.046344] kasan_save_stack+0x3c/0x68 [ 19.046384] kasan_save_track+0x20/0x40 [ 19.046877] kasan_save_free_info+0x4c/0x78 [ 19.047224] __kasan_slab_free+0x6c/0x98 [ 19.047408] kfree+0x214/0x3c8 [ 19.047476] kasan_strings+0x24c/0xb00 [ 19.047537] kunit_try_run_case+0x170/0x3f0 [ 19.047591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.047861] kthread+0x328/0x630 [ 19.047968] ret_from_fork+0x10/0x20 [ 19.048055] [ 19.048246] The buggy address belongs to the object at fff00000c78896c0 [ 19.048246] which belongs to the cache kmalloc-32 of size 32 [ 19.048329] The buggy address is located 16 bytes inside of [ 19.048329] freed 32-byte region [fff00000c78896c0, fff00000c78896e0) [ 19.048576] [ 19.048607] The buggy address belongs to the physical page: [ 19.048785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889 [ 19.048997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.049062] page_type: f5(slab) [ 19.049328] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.049634] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.049683] page dumped because: kasan: bad access detected [ 19.049815] [ 19.049848] Memory state around the buggy address: [ 19.050017] fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.050082] fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.050155] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.050418] ^ [ 19.050539] fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.050613] fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.050666] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 19.033952] ================================================================== [ 19.034167] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 19.034239] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259 [ 19.034293] [ 19.034326] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.034522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.034557] Hardware name: linux,dummy-virt (DT) [ 19.034603] Call trace: [ 19.034628] show_stack+0x20/0x38 (C) [ 19.034684] dump_stack_lvl+0x8c/0xd0 [ 19.034734] print_report+0x118/0x608 [ 19.034781] kasan_report+0xdc/0x128 [ 19.034894] __asan_report_load1_noabort+0x20/0x30 [ 19.034977] strlen+0xa8/0xb0 [ 19.035034] kasan_strings+0x418/0xb00 [ 19.035096] kunit_try_run_case+0x170/0x3f0 [ 19.035151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.035226] kthread+0x328/0x630 [ 19.035499] ret_from_fork+0x10/0x20 [ 19.035568] [ 19.035605] Allocated by task 259: [ 19.035640] kasan_save_stack+0x3c/0x68 [ 19.035853] kasan_save_track+0x20/0x40 [ 19.036087] kasan_save_alloc_info+0x40/0x58 [ 19.036290] __kasan_kmalloc+0xd4/0xd8 [ 19.036719] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.036787] kasan_strings+0xc8/0xb00 [ 19.036825] kunit_try_run_case+0x170/0x3f0 [ 19.036987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.037254] kthread+0x328/0x630 [ 19.037471] ret_from_fork+0x10/0x20 [ 19.037689] [ 19.037750] Freed by task 259: [ 19.037788] kasan_save_stack+0x3c/0x68 [ 19.037938] kasan_save_track+0x20/0x40 [ 19.037985] kasan_save_free_info+0x4c/0x78 [ 19.038102] __kasan_slab_free+0x6c/0x98 [ 19.038146] kfree+0x214/0x3c8 [ 19.038182] kasan_strings+0x24c/0xb00 [ 19.038216] kunit_try_run_case+0x170/0x3f0 [ 19.038254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.038297] kthread+0x328/0x630 [ 19.038335] ret_from_fork+0x10/0x20 [ 19.038370] [ 19.038393] The buggy address belongs to the object at fff00000c78896c0 [ 19.038393] which belongs to the cache kmalloc-32 of size 32 [ 19.038450] The buggy address is located 16 bytes inside of [ 19.038450] freed 32-byte region [fff00000c78896c0, fff00000c78896e0) [ 19.038710] [ 19.038847] The buggy address belongs to the physical page: [ 19.038926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889 [ 19.039036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.039102] page_type: f5(slab) [ 19.039569] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.039750] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.039846] page dumped because: kasan: bad access detected [ 19.039888] [ 19.039951] Memory state around the buggy address: [ 19.040009] fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.040224] fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.040498] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.040641] ^ [ 19.040698] fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.040751] fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.040792] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 19.028523] ================================================================== [ 19.028587] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 19.028643] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259 [ 19.028696] [ 19.028728] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.028814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.028844] Hardware name: linux,dummy-virt (DT) [ 19.028876] Call trace: [ 19.028901] show_stack+0x20/0x38 (C) [ 19.028950] dump_stack_lvl+0x8c/0xd0 [ 19.028999] print_report+0x118/0x608 [ 19.029644] kasan_report+0xdc/0x128 [ 19.029704] __asan_report_load1_noabort+0x20/0x30 [ 19.029757] kasan_strings+0x95c/0xb00 [ 19.029850] kunit_try_run_case+0x170/0x3f0 [ 19.029996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.030124] kthread+0x328/0x630 [ 19.030180] ret_from_fork+0x10/0x20 [ 19.030242] [ 19.030267] Allocated by task 259: [ 19.030300] kasan_save_stack+0x3c/0x68 [ 19.030345] kasan_save_track+0x20/0x40 [ 19.030384] kasan_save_alloc_info+0x40/0x58 [ 19.030425] __kasan_kmalloc+0xd4/0xd8 [ 19.030462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.030501] kasan_strings+0xc8/0xb00 [ 19.030537] kunit_try_run_case+0x170/0x3f0 [ 19.030583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.030630] kthread+0x328/0x630 [ 19.030927] ret_from_fork+0x10/0x20 [ 19.030977] [ 19.031000] Freed by task 259: [ 19.031029] kasan_save_stack+0x3c/0x68 [ 19.031160] kasan_save_track+0x20/0x40 [ 19.031249] kasan_save_free_info+0x4c/0x78 [ 19.031490] __kasan_slab_free+0x6c/0x98 [ 19.031533] kfree+0x214/0x3c8 [ 19.031686] kasan_strings+0x24c/0xb00 [ 19.031793] kunit_try_run_case+0x170/0x3f0 [ 19.031889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.032036] kthread+0x328/0x630 [ 19.032142] ret_from_fork+0x10/0x20 [ 19.032365] [ 19.032460] The buggy address belongs to the object at fff00000c78896c0 [ 19.032460] which belongs to the cache kmalloc-32 of size 32 [ 19.032585] The buggy address is located 16 bytes inside of [ 19.032585] freed 32-byte region [fff00000c78896c0, fff00000c78896e0) [ 19.032646] [ 19.032670] The buggy address belongs to the physical page: [ 19.032704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889 [ 19.032758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.032807] page_type: f5(slab) [ 19.032850] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.032901] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.032941] page dumped because: kasan: bad access detected [ 19.032975] [ 19.032995] Memory state around the buggy address: [ 19.033029] fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.033085] fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.033129] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.033167] ^ [ 19.033205] fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.033530] fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.033662] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 19.016560] ================================================================== [ 19.016614] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 19.016671] Read of size 1 at addr fff00000c78896d0 by task kunit_try_catch/259 [ 19.017618] [ 19.017688] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.017793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.017825] Hardware name: linux,dummy-virt (DT) [ 19.017858] Call trace: [ 19.017894] show_stack+0x20/0x38 (C) [ 19.017954] dump_stack_lvl+0x8c/0xd0 [ 19.018005] print_report+0x118/0x608 [ 19.018062] kasan_report+0xdc/0x128 [ 19.018111] __asan_report_load1_noabort+0x20/0x30 [ 19.018162] strcmp+0xc0/0xc8 [ 19.019485] kasan_strings+0x340/0xb00 [ 19.019917] kunit_try_run_case+0x170/0x3f0 [ 19.020263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.020793] kthread+0x328/0x630 [ 19.021003] ret_from_fork+0x10/0x20 [ 19.021068] [ 19.021093] Allocated by task 259: [ 19.021917] kasan_save_stack+0x3c/0x68 [ 19.022118] kasan_save_track+0x20/0x40 [ 19.022354] kasan_save_alloc_info+0x40/0x58 [ 19.022401] __kasan_kmalloc+0xd4/0xd8 [ 19.023321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.023375] kasan_strings+0xc8/0xb00 [ 19.023482] kunit_try_run_case+0x170/0x3f0 [ 19.023616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.023678] kthread+0x328/0x630 [ 19.023717] ret_from_fork+0x10/0x20 [ 19.023923] [ 19.023990] Freed by task 259: [ 19.024139] kasan_save_stack+0x3c/0x68 [ 19.024429] kasan_save_track+0x20/0x40 [ 19.024486] kasan_save_free_info+0x4c/0x78 [ 19.024529] __kasan_slab_free+0x6c/0x98 [ 19.024577] kfree+0x214/0x3c8 [ 19.024615] kasan_strings+0x24c/0xb00 [ 19.024652] kunit_try_run_case+0x170/0x3f0 [ 19.024691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.024735] kthread+0x328/0x630 [ 19.025322] ret_from_fork+0x10/0x20 [ 19.025389] [ 19.025432] The buggy address belongs to the object at fff00000c78896c0 [ 19.025432] which belongs to the cache kmalloc-32 of size 32 [ 19.025576] The buggy address is located 16 bytes inside of [ 19.025576] freed 32-byte region [fff00000c78896c0, fff00000c78896e0) [ 19.025647] [ 19.025671] The buggy address belongs to the physical page: [ 19.025704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889 [ 19.025854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.025987] page_type: f5(slab) [ 19.026074] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.026198] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.026243] page dumped because: kasan: bad access detected [ 19.026322] [ 19.026348] Memory state around the buggy address: [ 19.026384] fff00000c7889580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.026429] fff00000c7889600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.026472] >fff00000c7889680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.027036] ^ [ 19.027272] fff00000c7889700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.027322] fff00000c7889780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.027373] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 19.000746] ================================================================== [ 19.000817] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 19.000884] Read of size 1 at addr fff00000c7889518 by task kunit_try_catch/257 [ 19.000937] [ 19.000970] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.001069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.001102] Hardware name: linux,dummy-virt (DT) [ 19.001136] Call trace: [ 19.001161] show_stack+0x20/0x38 (C) [ 19.001215] dump_stack_lvl+0x8c/0xd0 [ 19.001263] print_report+0x118/0x608 [ 19.001311] kasan_report+0xdc/0x128 [ 19.001356] __asan_report_load1_noabort+0x20/0x30 [ 19.001409] memcmp+0x198/0x1d8 [ 19.001954] kasan_memcmp+0x16c/0x300 [ 19.002018] kunit_try_run_case+0x170/0x3f0 [ 19.002082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.002140] kthread+0x328/0x630 [ 19.002187] ret_from_fork+0x10/0x20 [ 19.002239] [ 19.002758] Allocated by task 257: [ 19.003166] kasan_save_stack+0x3c/0x68 [ 19.003477] kasan_save_track+0x20/0x40 [ 19.003598] kasan_save_alloc_info+0x40/0x58 [ 19.004074] __kasan_kmalloc+0xd4/0xd8 [ 19.004315] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.004738] kasan_memcmp+0xbc/0x300 [ 19.004929] kunit_try_run_case+0x170/0x3f0 [ 19.005199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.005482] kthread+0x328/0x630 [ 19.005651] ret_from_fork+0x10/0x20 [ 19.005870] [ 19.006050] The buggy address belongs to the object at fff00000c7889500 [ 19.006050] which belongs to the cache kmalloc-32 of size 32 [ 19.006119] The buggy address is located 0 bytes to the right of [ 19.006119] allocated 24-byte region [fff00000c7889500, fff00000c7889518) [ 19.006206] [ 19.006229] The buggy address belongs to the physical page: [ 19.006261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107889 [ 19.006340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.006427] page_type: f5(slab) [ 19.006471] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.006524] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.006573] page dumped because: kasan: bad access detected [ 19.006610] [ 19.006637] Memory state around the buggy address: [ 19.006706] fff00000c7889400: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 19.006759] fff00000c7889480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.006840] >fff00000c7889500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.006882] ^ [ 19.006958] fff00000c7889580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.007005] fff00000c7889600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.007054] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 18.980663] ================================================================== [ 18.980869] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 18.980929] Read of size 1 at addr ffff800080ab7b4a by task kunit_try_catch/253 [ 18.980981] [ 18.981014] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.981119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.981149] Hardware name: linux,dummy-virt (DT) [ 18.981181] Call trace: [ 18.981209] show_stack+0x20/0x38 (C) [ 18.981260] dump_stack_lvl+0x8c/0xd0 [ 18.981311] print_report+0x310/0x608 [ 18.981356] kasan_report+0xdc/0x128 [ 18.981407] __asan_report_load1_noabort+0x20/0x30 [ 18.981459] kasan_alloca_oob_right+0x2dc/0x340 [ 18.981508] kunit_try_run_case+0x170/0x3f0 [ 18.981554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.981607] kthread+0x328/0x630 [ 18.981652] ret_from_fork+0x10/0x20 [ 18.981701] [ 18.981726] The buggy address belongs to stack of task kunit_try_catch/253 [ 18.981787] [ 18.981838] The buggy address belongs to the virtual mapping at [ 18.981838] [ffff800080ab0000, ffff800080ab9000) created by: [ 18.981838] kernel_clone+0x150/0x7a8 [ 18.981954] [ 18.981978] The buggy address belongs to the physical page: [ 18.982022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795e [ 18.982095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.982197] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.982256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.982401] page dumped because: kasan: bad access detected [ 18.982687] [ 18.982718] Memory state around the buggy address: [ 18.982755] ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.982803] ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.982880] >ffff800080ab7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 18.982918] ^ [ 18.982967] ffff800080ab7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 18.983095] ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.983138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 18.971545] ================================================================== [ 18.971645] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 18.971710] Read of size 1 at addr ffff800080ab7b5f by task kunit_try_catch/251 [ 18.971763] [ 18.971804] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.971890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.971918] Hardware name: linux,dummy-virt (DT) [ 18.971953] Call trace: [ 18.971977] show_stack+0x20/0x38 (C) [ 18.972027] dump_stack_lvl+0x8c/0xd0 [ 18.972092] print_report+0x310/0x608 [ 18.972139] kasan_report+0xdc/0x128 [ 18.972326] __asan_report_load1_noabort+0x20/0x30 [ 18.972390] kasan_alloca_oob_left+0x2b8/0x310 [ 18.972440] kunit_try_run_case+0x170/0x3f0 [ 18.972487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.972540] kthread+0x328/0x630 [ 18.972586] ret_from_fork+0x10/0x20 [ 18.972636] [ 18.972660] The buggy address belongs to stack of task kunit_try_catch/251 [ 18.972728] [ 18.972755] The buggy address belongs to the virtual mapping at [ 18.972755] [ffff800080ab0000, ffff800080ab9000) created by: [ 18.972755] kernel_clone+0x150/0x7a8 [ 18.972830] [ 18.972854] The buggy address belongs to the physical page: [ 18.972884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795e [ 18.972936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.973000] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.973063] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.973108] page dumped because: kasan: bad access detected [ 18.973144] [ 18.973164] Memory state around the buggy address: [ 18.973197] ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.973241] ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.973285] >ffff800080ab7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 18.973611] ^ [ 18.973656] ffff800080ab7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 18.973703] ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.973743] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 18.964024] ================================================================== [ 18.964162] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 18.964242] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/249 [ 18.964308] [ 18.964339] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.964447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.964473] Hardware name: linux,dummy-virt (DT) [ 18.964509] Call trace: [ 18.964531] show_stack+0x20/0x38 (C) [ 18.964578] dump_stack_lvl+0x8c/0xd0 [ 18.964625] print_report+0x310/0x608 [ 18.964666] kasan_report+0xdc/0x128 [ 18.964709] __asan_report_load1_noabort+0x20/0x30 [ 18.964756] kasan_stack_oob+0x238/0x270 [ 18.964799] kunit_try_run_case+0x170/0x3f0 [ 18.964844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.964891] kthread+0x328/0x630 [ 18.964931] ret_from_fork+0x10/0x20 [ 18.964977] [ 18.965035] The buggy address belongs to stack of task kunit_try_catch/249 [ 18.965166] and is located at offset 138 in frame: [ 18.965203] kasan_stack_oob+0x0/0x270 [ 18.965388] [ 18.965461] This frame has 4 objects: [ 18.965600] [48, 49) '__assertion' [ 18.965687] [64, 72) 'array' [ 18.965801] [96, 112) '__assertion' [ 18.965848] [128, 138) 'stack_array' [ 18.965920] [ 18.965956] The buggy address belongs to the virtual mapping at [ 18.965956] [ffff800080ac0000, ffff800080ac9000) created by: [ 18.965956] kernel_clone+0x150/0x7a8 [ 18.966058] [ 18.966084] The buggy address belongs to the physical page: [ 18.966120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 18.966173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.966235] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.966327] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.966440] page dumped because: kasan: bad access detected [ 18.966506] [ 18.966550] Memory state around the buggy address: [ 18.966598] ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.966657] ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 18.966759] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 18.966804] ^ [ 18.966840] ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 18.966884] ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.966945] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 18.949096] ================================================================== [ 18.949167] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.949230] Read of size 1 at addr ffffa8e07372e60d by task kunit_try_catch/245 [ 18.949279] [ 18.949314] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.949395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.949422] Hardware name: linux,dummy-virt (DT) [ 18.949451] Call trace: [ 18.949472] show_stack+0x20/0x38 (C) [ 18.949521] dump_stack_lvl+0x8c/0xd0 [ 18.949568] print_report+0x310/0x608 [ 18.949613] kasan_report+0xdc/0x128 [ 18.949655] __asan_report_load1_noabort+0x20/0x30 [ 18.949732] kasan_global_oob_right+0x230/0x270 [ 18.949784] kunit_try_run_case+0x170/0x3f0 [ 18.949852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.949903] kthread+0x328/0x630 [ 18.949948] ret_from_fork+0x10/0x20 [ 18.950036] [ 18.950098] The buggy address belongs to the variable: [ 18.950131] global_array+0xd/0x40 [ 18.950179] [ 18.950251] The buggy address belongs to the virtual mapping at [ 18.950251] [ffffa8e0718e0000, ffffa8e0737e1000) created by: [ 18.950251] paging_init+0x66c/0x7d0 [ 18.950336] [ 18.950649] The buggy address belongs to the physical page: [ 18.950714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d2e [ 18.950772] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.951113] raw: 03fffe0000002000 ffffc1ffc01f4b88 ffffc1ffc01f4b88 0000000000000000 [ 18.951311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.951406] page dumped because: kasan: bad access detected [ 18.951476] [ 18.951641] Memory state around the buggy address: [ 18.951680] ffffa8e07372e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.951764] ffffa8e07372e580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.951830] >ffffa8e07372e600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.951888] ^ [ 18.951956] ffffa8e07372e680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.952000] ffffa8e07372e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.952036] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 18.933357] ================================================================== [ 18.933434] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.933578] Free of addr fff00000c79f0001 by task kunit_try_catch/243 [ 18.933631] [ 18.933663] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.933746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.933774] Hardware name: linux,dummy-virt (DT) [ 18.933949] Call trace: [ 18.934127] show_stack+0x20/0x38 (C) [ 18.934193] dump_stack_lvl+0x8c/0xd0 [ 18.934241] print_report+0x118/0x608 [ 18.934316] kasan_report_invalid_free+0xc0/0xe8 [ 18.934552] __kasan_mempool_poison_object+0xfc/0x150 [ 18.934695] mempool_free+0x28c/0x328 [ 18.934892] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.935063] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.935306] kunit_try_run_case+0x170/0x3f0 [ 18.935357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.935409] kthread+0x328/0x630 [ 18.935452] ret_from_fork+0x10/0x20 [ 18.935499] [ 18.936100] The buggy address belongs to the physical page: [ 18.936140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0 [ 18.936197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.936250] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.936307] page_type: f8(unknown) [ 18.936348] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.936397] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.936784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.936842] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.936925] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff [ 18.937231] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.937336] page dumped because: kasan: bad access detected [ 18.937435] [ 18.937495] Memory state around the buggy address: [ 18.937614] fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.937658] fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.937700] >fff00000c79f0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.937735] ^ [ 18.937763] fff00000c79f0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.937804] fff00000c79f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.937861] ================================================================== [ 18.922806] ================================================================== [ 18.923029] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.923104] Free of addr fff00000c78d3701 by task kunit_try_catch/241 [ 18.923147] [ 18.923260] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.923378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.923416] Hardware name: linux,dummy-virt (DT) [ 18.923566] Call trace: [ 18.923724] show_stack+0x20/0x38 (C) [ 18.923901] dump_stack_lvl+0x8c/0xd0 [ 18.924062] print_report+0x118/0x608 [ 18.924247] kasan_report_invalid_free+0xc0/0xe8 [ 18.924300] check_slab_allocation+0xfc/0x108 [ 18.924345] __kasan_mempool_poison_object+0x78/0x150 [ 18.924394] mempool_free+0x28c/0x328 [ 18.924443] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.924492] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.925148] kunit_try_run_case+0x170/0x3f0 [ 18.925210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.925262] kthread+0x328/0x630 [ 18.925319] ret_from_fork+0x10/0x20 [ 18.925367] [ 18.925385] Allocated by task 241: [ 18.925416] kasan_save_stack+0x3c/0x68 [ 18.925456] kasan_save_track+0x20/0x40 [ 18.925536] kasan_save_alloc_info+0x40/0x58 [ 18.925612] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.925696] remove_element+0x130/0x1f8 [ 18.925850] mempool_alloc_preallocated+0x58/0xc0 [ 18.925891] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.926244] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.926289] kunit_try_run_case+0x170/0x3f0 [ 18.926325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.926365] kthread+0x328/0x630 [ 18.926399] ret_from_fork+0x10/0x20 [ 18.926607] [ 18.926668] The buggy address belongs to the object at fff00000c78d3700 [ 18.926668] which belongs to the cache kmalloc-128 of size 128 [ 18.926732] The buggy address is located 1 bytes inside of [ 18.926732] 128-byte region [fff00000c78d3700, fff00000c78d3780) [ 18.926865] [ 18.926888] The buggy address belongs to the physical page: [ 18.926939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 18.927021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.927079] page_type: f5(slab) [ 18.927140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.927459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.927694] page dumped because: kasan: bad access detected [ 18.927752] [ 18.927781] Memory state around the buggy address: [ 18.927823] fff00000c78d3600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.928050] fff00000c78d3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.928109] >fff00000c78d3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.928156] ^ [ 18.928199] fff00000c78d3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.928258] fff00000c78d3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.928296] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 18.884331] ================================================================== [ 18.884471] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.884557] Free of addr fff00000c78d3300 by task kunit_try_catch/235 [ 18.884733] [ 18.884768] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.885109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.885303] Hardware name: linux,dummy-virt (DT) [ 18.885355] Call trace: [ 18.885396] show_stack+0x20/0x38 (C) [ 18.885463] dump_stack_lvl+0x8c/0xd0 [ 18.885515] print_report+0x118/0x608 [ 18.885561] kasan_report_invalid_free+0xc0/0xe8 [ 18.885608] check_slab_allocation+0xd4/0x108 [ 18.885870] __kasan_mempool_poison_object+0x78/0x150 [ 18.886209] mempool_free+0x28c/0x328 [ 18.886266] mempool_double_free_helper+0x150/0x2e8 [ 18.886458] mempool_kmalloc_double_free+0xc0/0x118 [ 18.886713] kunit_try_run_case+0x170/0x3f0 [ 18.886767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.886873] kthread+0x328/0x630 [ 18.886973] ret_from_fork+0x10/0x20 [ 18.887132] [ 18.887155] Allocated by task 235: [ 18.887362] kasan_save_stack+0x3c/0x68 [ 18.887536] kasan_save_track+0x20/0x40 [ 18.887662] kasan_save_alloc_info+0x40/0x58 [ 18.887715] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.887759] remove_element+0x130/0x1f8 [ 18.887967] mempool_alloc_preallocated+0x58/0xc0 [ 18.888142] mempool_double_free_helper+0x94/0x2e8 [ 18.888190] mempool_kmalloc_double_free+0xc0/0x118 [ 18.888568] kunit_try_run_case+0x170/0x3f0 [ 18.888649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.888692] kthread+0x328/0x630 [ 18.889007] ret_from_fork+0x10/0x20 [ 18.889076] [ 18.889099] Freed by task 235: [ 18.889130] kasan_save_stack+0x3c/0x68 [ 18.889177] kasan_save_track+0x20/0x40 [ 18.889212] kasan_save_free_info+0x4c/0x78 [ 18.889419] __kasan_mempool_poison_object+0xc0/0x150 [ 18.889523] mempool_free+0x28c/0x328 [ 18.889920] mempool_double_free_helper+0x100/0x2e8 [ 18.889973] mempool_kmalloc_double_free+0xc0/0x118 [ 18.890046] kunit_try_run_case+0x170/0x3f0 [ 18.890120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.890164] kthread+0x328/0x630 [ 18.890387] ret_from_fork+0x10/0x20 [ 18.890429] [ 18.890580] The buggy address belongs to the object at fff00000c78d3300 [ 18.890580] which belongs to the cache kmalloc-128 of size 128 [ 18.890685] The buggy address is located 0 bytes inside of [ 18.890685] 128-byte region [fff00000c78d3300, fff00000c78d3380) [ 18.890760] [ 18.890975] The buggy address belongs to the physical page: [ 18.891115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 18.891176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.891225] page_type: f5(slab) [ 18.891474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.891667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.891797] page dumped because: kasan: bad access detected [ 18.891837] [ 18.891916] Memory state around the buggy address: [ 18.892089] fff00000c78d3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.892137] fff00000c78d3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.892199] >fff00000c78d3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.892262] ^ [ 18.892304] fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.892605] fff00000c78d3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.892795] ================================================================== [ 18.900817] ================================================================== [ 18.900883] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.900942] Free of addr fff00000c79ec000 by task kunit_try_catch/237 [ 18.900984] [ 18.901014] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.901123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.901152] Hardware name: linux,dummy-virt (DT) [ 18.901181] Call trace: [ 18.901205] show_stack+0x20/0x38 (C) [ 18.901252] dump_stack_lvl+0x8c/0xd0 [ 18.901298] print_report+0x118/0x608 [ 18.901340] kasan_report_invalid_free+0xc0/0xe8 [ 18.901387] __kasan_mempool_poison_object+0x14c/0x150 [ 18.901436] mempool_free+0x28c/0x328 [ 18.901480] mempool_double_free_helper+0x150/0x2e8 [ 18.901526] mempool_kmalloc_large_double_free+0xc0/0x118 [ 18.901574] kunit_try_run_case+0x170/0x3f0 [ 18.901618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.901665] kthread+0x328/0x630 [ 18.901709] ret_from_fork+0x10/0x20 [ 18.901756] [ 18.901776] The buggy address belongs to the physical page: [ 18.901808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec [ 18.901860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.901923] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.902030] page_type: f8(unknown) [ 18.902081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.902131] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.902179] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.902226] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.902272] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff [ 18.902317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.902355] page dumped because: kasan: bad access detected [ 18.902387] [ 18.902404] Memory state around the buggy address: [ 18.902435] fff00000c79ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.902475] fff00000c79ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.902514] >fff00000c79ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.902579] ^ [ 18.902648] fff00000c79ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.902737] fff00000c79ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.902815] ================================================================== [ 18.907931] ================================================================== [ 18.907999] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.908074] Free of addr fff00000c79f0000 by task kunit_try_catch/239 [ 18.908118] [ 18.908151] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.908232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.908259] Hardware name: linux,dummy-virt (DT) [ 18.908289] Call trace: [ 18.908311] show_stack+0x20/0x38 (C) [ 18.908372] dump_stack_lvl+0x8c/0xd0 [ 18.908432] print_report+0x118/0x608 [ 18.908476] kasan_report_invalid_free+0xc0/0xe8 [ 18.908522] __kasan_mempool_poison_pages+0xe0/0xe8 [ 18.908569] mempool_free+0x24c/0x328 [ 18.908614] mempool_double_free_helper+0x150/0x2e8 [ 18.908661] mempool_page_alloc_double_free+0xbc/0x118 [ 18.908713] kunit_try_run_case+0x170/0x3f0 [ 18.908803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.908874] kthread+0x328/0x630 [ 18.908947] ret_from_fork+0x10/0x20 [ 18.909069] [ 18.909183] The buggy address belongs to the physical page: [ 18.909242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0 [ 18.909345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.909472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.909529] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.909582] page dumped because: kasan: bad access detected [ 18.909629] [ 18.909669] Memory state around the buggy address: [ 18.909738] fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.909780] fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.909819] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.909855] ^ [ 18.909881] fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.910406] fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.910452] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 18.872505] ================================================================== [ 18.872575] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.872662] Read of size 1 at addr fff00000c79ec000 by task kunit_try_catch/233 [ 18.872711] [ 18.872744] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.872827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.872854] Hardware name: linux,dummy-virt (DT) [ 18.873094] Call trace: [ 18.873135] show_stack+0x20/0x38 (C) [ 18.873191] dump_stack_lvl+0x8c/0xd0 [ 18.873248] print_report+0x118/0x608 [ 18.873296] kasan_report+0xdc/0x128 [ 18.873539] __asan_report_load1_noabort+0x20/0x30 [ 18.873878] mempool_uaf_helper+0x314/0x340 [ 18.874000] mempool_page_alloc_uaf+0xc0/0x118 [ 18.874067] kunit_try_run_case+0x170/0x3f0 [ 18.874120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.874169] kthread+0x328/0x630 [ 18.874213] ret_from_fork+0x10/0x20 [ 18.874258] [ 18.874282] The buggy address belongs to the physical page: [ 18.874311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec [ 18.874364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.874425] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.874502] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.874542] page dumped because: kasan: bad access detected [ 18.874581] [ 18.874600] Memory state around the buggy address: [ 18.874632] fff00000c79ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.874675] fff00000c79ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.874853] >fff00000c79ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.875023] ^ [ 18.875067] fff00000c79ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.875127] fff00000c79ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.875165] ================================================================== [ 18.837267] ================================================================== [ 18.837343] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.837463] Read of size 1 at addr fff00000c79e8000 by task kunit_try_catch/229 [ 18.837517] [ 18.837548] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.837862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.838022] Hardware name: linux,dummy-virt (DT) [ 18.838069] Call trace: [ 18.838095] show_stack+0x20/0x38 (C) [ 18.838150] dump_stack_lvl+0x8c/0xd0 [ 18.838197] print_report+0x118/0x608 [ 18.838242] kasan_report+0xdc/0x128 [ 18.838595] __asan_report_load1_noabort+0x20/0x30 [ 18.838664] mempool_uaf_helper+0x314/0x340 [ 18.838759] mempool_kmalloc_large_uaf+0xc4/0x120 [ 18.838811] kunit_try_run_case+0x170/0x3f0 [ 18.838885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.838983] kthread+0x328/0x630 [ 18.839118] ret_from_fork+0x10/0x20 [ 18.839174] [ 18.839199] The buggy address belongs to the physical page: [ 18.839420] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e8 [ 18.839489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.839537] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.839643] page_type: f8(unknown) [ 18.839697] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.839937] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.840114] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.840284] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.840335] head: 0bfffe0000000002 ffffc1ffc31e7a01 00000000ffffffff 00000000ffffffff [ 18.840413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.840455] page dumped because: kasan: bad access detected [ 18.840491] [ 18.840516] Memory state around the buggy address: [ 18.840574] fff00000c79e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.840618] fff00000c79e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.840661] >fff00000c79e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.841009] ^ [ 18.841078] fff00000c79e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.841126] fff00000c79e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.841252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 18.848995] ================================================================== [ 18.849411] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.849482] Read of size 1 at addr fff00000c6bb4240 by task kunit_try_catch/231 [ 18.849532] [ 18.849564] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.849647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.849672] Hardware name: linux,dummy-virt (DT) [ 18.849703] Call trace: [ 18.853046] show_stack+0x20/0x38 (C) [ 18.853129] dump_stack_lvl+0x8c/0xd0 [ 18.853177] print_report+0x118/0x608 [ 18.853223] kasan_report+0xdc/0x128 [ 18.853264] __asan_report_load1_noabort+0x20/0x30 [ 18.853330] mempool_uaf_helper+0x314/0x340 [ 18.853432] mempool_slab_uaf+0xc0/0x118 [ 18.853478] kunit_try_run_case+0x170/0x3f0 [ 18.853524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.853574] kthread+0x328/0x630 [ 18.853614] ret_from_fork+0x10/0x20 [ 18.853661] [ 18.853716] Allocated by task 231: [ 18.853752] kasan_save_stack+0x3c/0x68 [ 18.853843] kasan_save_track+0x20/0x40 [ 18.853879] kasan_save_alloc_info+0x40/0x58 [ 18.854059] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.854104] remove_element+0x16c/0x1f8 [ 18.854142] mempool_alloc_preallocated+0x58/0xc0 [ 18.854182] mempool_uaf_helper+0xa4/0x340 [ 18.854215] mempool_slab_uaf+0xc0/0x118 [ 18.854269] kunit_try_run_case+0x170/0x3f0 [ 18.854303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.854352] kthread+0x328/0x630 [ 18.854391] ret_from_fork+0x10/0x20 [ 18.854425] [ 18.854616] Freed by task 231: [ 18.854656] kasan_save_stack+0x3c/0x68 [ 18.854729] kasan_save_track+0x20/0x40 [ 18.854764] kasan_save_free_info+0x4c/0x78 [ 18.854803] __kasan_mempool_poison_object+0xc0/0x150 [ 18.854842] mempool_free+0x28c/0x328 [ 18.854878] mempool_uaf_helper+0x104/0x340 [ 18.854913] mempool_slab_uaf+0xc0/0x118 [ 18.854946] kunit_try_run_case+0x170/0x3f0 [ 18.854980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.855019] kthread+0x328/0x630 [ 18.855064] ret_from_fork+0x10/0x20 [ 18.855102] [ 18.855133] The buggy address belongs to the object at fff00000c6bb4240 [ 18.855133] which belongs to the cache test_cache of size 123 [ 18.855195] The buggy address is located 0 bytes inside of [ 18.855195] freed 123-byte region [fff00000c6bb4240, fff00000c6bb42bb) [ 18.855322] [ 18.855344] The buggy address belongs to the physical page: [ 18.855374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106bb4 [ 18.855424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.855470] page_type: f5(slab) [ 18.855509] raw: 0bfffe0000000000 fff00000c5d1e3c0 dead000000000122 0000000000000000 [ 18.855567] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.855611] page dumped because: kasan: bad access detected [ 18.855653] [ 18.855673] Memory state around the buggy address: [ 18.855703] fff00000c6bb4100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.855745] fff00000c6bb4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.855834] >fff00000c6bb4200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 18.855868] ^ [ 18.855916] fff00000c6bb4280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.856015] fff00000c6bb4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.856064] ================================================================== [ 18.823479] ================================================================== [ 18.823549] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.823613] Read of size 1 at addr fff00000c6370f00 by task kunit_try_catch/227 [ 18.823663] [ 18.823699] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.823782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.823809] Hardware name: linux,dummy-virt (DT) [ 18.823840] Call trace: [ 18.823878] show_stack+0x20/0x38 (C) [ 18.823927] dump_stack_lvl+0x8c/0xd0 [ 18.823977] print_report+0x118/0x608 [ 18.824020] kasan_report+0xdc/0x128 [ 18.824078] __asan_report_load1_noabort+0x20/0x30 [ 18.824126] mempool_uaf_helper+0x314/0x340 [ 18.824170] mempool_kmalloc_uaf+0xc4/0x120 [ 18.824213] kunit_try_run_case+0x170/0x3f0 [ 18.824259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.824305] kthread+0x328/0x630 [ 18.824349] ret_from_fork+0x10/0x20 [ 18.824395] [ 18.824413] Allocated by task 227: [ 18.824442] kasan_save_stack+0x3c/0x68 [ 18.824483] kasan_save_track+0x20/0x40 [ 18.824519] kasan_save_alloc_info+0x40/0x58 [ 18.824557] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.824598] remove_element+0x130/0x1f8 [ 18.824633] mempool_alloc_preallocated+0x58/0xc0 [ 18.824672] mempool_uaf_helper+0xa4/0x340 [ 18.824706] mempool_kmalloc_uaf+0xc4/0x120 [ 18.824741] kunit_try_run_case+0x170/0x3f0 [ 18.824775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.824815] kthread+0x328/0x630 [ 18.824848] ret_from_fork+0x10/0x20 [ 18.824883] [ 18.824908] Freed by task 227: [ 18.824969] kasan_save_stack+0x3c/0x68 [ 18.825079] kasan_save_track+0x20/0x40 [ 18.825121] kasan_save_free_info+0x4c/0x78 [ 18.825159] __kasan_mempool_poison_object+0xc0/0x150 [ 18.825427] mempool_free+0x28c/0x328 [ 18.825464] mempool_uaf_helper+0x104/0x340 [ 18.825499] mempool_kmalloc_uaf+0xc4/0x120 [ 18.825621] kunit_try_run_case+0x170/0x3f0 [ 18.825729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.825776] kthread+0x328/0x630 [ 18.825972] ret_from_fork+0x10/0x20 [ 18.826022] [ 18.826051] The buggy address belongs to the object at fff00000c6370f00 [ 18.826051] which belongs to the cache kmalloc-128 of size 128 [ 18.826275] The buggy address is located 0 bytes inside of [ 18.826275] freed 128-byte region [fff00000c6370f00, fff00000c6370f80) [ 18.826336] [ 18.826357] The buggy address belongs to the physical page: [ 18.826387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370 [ 18.826760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.826829] page_type: f5(slab) [ 18.826871] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.826922] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 18.826961] page dumped because: kasan: bad access detected [ 18.827009] [ 18.827079] Memory state around the buggy address: [ 18.827114] fff00000c6370e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.827158] fff00000c6370e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.827199] >fff00000c6370f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.827236] ^ [ 18.827264] fff00000c6370f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.827305] fff00000c6371000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.827343] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 18.803203] ================================================================== [ 18.803274] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.803335] Read of size 1 at addr fff00000c78d32bb by task kunit_try_catch/225 [ 18.803385] [ 18.803417] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.803499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.803525] Hardware name: linux,dummy-virt (DT) [ 18.803555] Call trace: [ 18.803579] show_stack+0x20/0x38 (C) [ 18.803625] dump_stack_lvl+0x8c/0xd0 [ 18.803672] print_report+0x118/0x608 [ 18.803715] kasan_report+0xdc/0x128 [ 18.803757] __asan_report_load1_noabort+0x20/0x30 [ 18.803805] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.803851] mempool_slab_oob_right+0xc0/0x118 [ 18.803896] kunit_try_run_case+0x170/0x3f0 [ 18.803940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.803988] kthread+0x328/0x630 [ 18.804030] ret_from_fork+0x10/0x20 [ 18.804107] [ 18.804781] Allocated by task 225: [ 18.804902] kasan_save_stack+0x3c/0x68 [ 18.804952] kasan_save_track+0x20/0x40 [ 18.804994] kasan_save_alloc_info+0x40/0x58 [ 18.805084] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.805128] remove_element+0x16c/0x1f8 [ 18.805199] mempool_alloc_preallocated+0x58/0xc0 [ 18.805302] mempool_oob_right_helper+0x98/0x2f0 [ 18.805346] mempool_slab_oob_right+0xc0/0x118 [ 18.805383] kunit_try_run_case+0x170/0x3f0 [ 18.805418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.805458] kthread+0x328/0x630 [ 18.805491] ret_from_fork+0x10/0x20 [ 18.805532] [ 18.805563] The buggy address belongs to the object at fff00000c78d3240 [ 18.805563] which belongs to the cache test_cache of size 123 [ 18.805657] The buggy address is located 0 bytes to the right of [ 18.805657] allocated 123-byte region [fff00000c78d3240, fff00000c78d32bb) [ 18.805722] [ 18.805744] The buggy address belongs to the physical page: [ 18.805774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 18.805823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.805870] page_type: f5(slab) [ 18.805917] raw: 0bfffe0000000000 fff00000c5d1e280 dead000000000122 0000000000000000 [ 18.805965] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.806399] page dumped because: kasan: bad access detected [ 18.806437] [ 18.806535] Memory state around the buggy address: [ 18.806575] fff00000c78d3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.806643] fff00000c78d3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.806684] >fff00000c78d3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.806784] ^ [ 18.806826] fff00000c78d3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.806903] fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.806940] ================================================================== [ 18.788949] ================================================================== [ 18.789381] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.789472] Read of size 1 at addr fff00000c79e6001 by task kunit_try_catch/223 [ 18.789523] [ 18.789634] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.789730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.789758] Hardware name: linux,dummy-virt (DT) [ 18.789802] Call trace: [ 18.789834] show_stack+0x20/0x38 (C) [ 18.789993] dump_stack_lvl+0x8c/0xd0 [ 18.790159] print_report+0x118/0x608 [ 18.790222] kasan_report+0xdc/0x128 [ 18.790279] __asan_report_load1_noabort+0x20/0x30 [ 18.790329] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.790375] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.790623] kunit_try_run_case+0x170/0x3f0 [ 18.790823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.790958] kthread+0x328/0x630 [ 18.791164] ret_from_fork+0x10/0x20 [ 18.791268] [ 18.791307] The buggy address belongs to the physical page: [ 18.791343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 18.791398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.791442] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.791497] page_type: f8(unknown) [ 18.791540] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.791588] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.791634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.791681] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.791728] head: 0bfffe0000000002 ffffc1ffc31e7901 00000000ffffffff 00000000ffffffff [ 18.791773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.791955] page dumped because: kasan: bad access detected [ 18.791989] [ 18.792010] Memory state around the buggy address: [ 18.792050] fff00000c79e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.793439] fff00000c79e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.793686] >fff00000c79e6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.793849] ^ [ 18.794007] fff00000c79e6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.794096] fff00000c79e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.794134] ================================================================== [ 18.764536] ================================================================== [ 18.764631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.764729] Read of size 1 at addr fff00000c6370b73 by task kunit_try_catch/221 [ 18.764781] [ 18.764826] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.764917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.764946] Hardware name: linux,dummy-virt (DT) [ 18.764981] Call trace: [ 18.765006] show_stack+0x20/0x38 (C) [ 18.765078] dump_stack_lvl+0x8c/0xd0 [ 18.765135] print_report+0x118/0x608 [ 18.765182] kasan_report+0xdc/0x128 [ 18.765225] __asan_report_load1_noabort+0x20/0x30 [ 18.765275] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.765319] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.765364] kunit_try_run_case+0x170/0x3f0 [ 18.765410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.765460] kthread+0x328/0x630 [ 18.765506] ret_from_fork+0x10/0x20 [ 18.765556] [ 18.765575] Allocated by task 221: [ 18.765603] kasan_save_stack+0x3c/0x68 [ 18.765646] kasan_save_track+0x20/0x40 [ 18.765681] kasan_save_alloc_info+0x40/0x58 [ 18.765720] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.765759] remove_element+0x130/0x1f8 [ 18.765799] mempool_alloc_preallocated+0x58/0xc0 [ 18.765837] mempool_oob_right_helper+0x98/0x2f0 [ 18.765873] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.765929] kunit_try_run_case+0x170/0x3f0 [ 18.765968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.766006] kthread+0x328/0x630 [ 18.766050] ret_from_fork+0x10/0x20 [ 18.766088] [ 18.766125] The buggy address belongs to the object at fff00000c6370b00 [ 18.766125] which belongs to the cache kmalloc-128 of size 128 [ 18.766183] The buggy address is located 0 bytes to the right of [ 18.766183] allocated 115-byte region [fff00000c6370b00, fff00000c6370b73) [ 18.766242] [ 18.766267] The buggy address belongs to the physical page: [ 18.766301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370 [ 18.766356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.766409] page_type: f5(slab) [ 18.766452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.766501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.766540] page dumped because: kasan: bad access detected [ 18.766581] [ 18.766600] Memory state around the buggy address: [ 18.766634] fff00000c6370a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.766676] fff00000c6370a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.766716] >fff00000c6370b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.766752] ^ [ 18.766790] fff00000c6370b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.766830] fff00000c6370c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.766866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 18.155369] ================================================================== [ 18.156099] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 18.156303] Read of size 1 at addr fff00000c1096c80 by task kunit_try_catch/215 [ 18.156403] [ 18.156659] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.157385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.157456] Hardware name: linux,dummy-virt (DT) [ 18.157533] Call trace: [ 18.157588] show_stack+0x20/0x38 (C) [ 18.157703] dump_stack_lvl+0x8c/0xd0 [ 18.158434] print_report+0x118/0x608 [ 18.158717] kasan_report+0xdc/0x128 [ 18.159197] __kasan_check_byte+0x54/0x70 [ 18.159392] kmem_cache_destroy+0x34/0x218 [ 18.159807] kmem_cache_double_destroy+0x174/0x300 [ 18.160088] kunit_try_run_case+0x170/0x3f0 [ 18.160207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.160315] kthread+0x328/0x630 [ 18.160793] ret_from_fork+0x10/0x20 [ 18.161125] [ 18.161385] Allocated by task 215: [ 18.161478] kasan_save_stack+0x3c/0x68 [ 18.161562] kasan_save_track+0x20/0x40 [ 18.161637] kasan_save_alloc_info+0x40/0x58 [ 18.161720] __kasan_slab_alloc+0xa8/0xb0 [ 18.161998] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.162317] __kmem_cache_create_args+0x178/0x280 [ 18.162777] kmem_cache_double_destroy+0xc0/0x300 [ 18.162882] kunit_try_run_case+0x170/0x3f0 [ 18.163201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.163445] kthread+0x328/0x630 [ 18.163579] ret_from_fork+0x10/0x20 [ 18.163722] [ 18.163761] Freed by task 215: [ 18.163998] kasan_save_stack+0x3c/0x68 [ 18.164284] kasan_save_track+0x20/0x40 [ 18.164381] kasan_save_free_info+0x4c/0x78 [ 18.164656] __kasan_slab_free+0x6c/0x98 [ 18.164767] kmem_cache_free+0x260/0x470 [ 18.164841] slab_kmem_cache_release+0x38/0x50 [ 18.165311] kmem_cache_release+0x1c/0x30 [ 18.165407] kobject_put+0x17c/0x430 [ 18.166047] sysfs_slab_release+0x1c/0x30 [ 18.166208] kmem_cache_destroy+0x118/0x218 [ 18.166467] kmem_cache_double_destroy+0x128/0x300 [ 18.166550] kunit_try_run_case+0x170/0x3f0 [ 18.166632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.166713] kthread+0x328/0x630 [ 18.167132] ret_from_fork+0x10/0x20 [ 18.167216] [ 18.167627] The buggy address belongs to the object at fff00000c1096c80 [ 18.167627] which belongs to the cache kmem_cache of size 208 [ 18.167765] The buggy address is located 0 bytes inside of [ 18.167765] freed 208-byte region [fff00000c1096c80, fff00000c1096d50) [ 18.168157] [ 18.168317] The buggy address belongs to the physical page: [ 18.168389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101096 [ 18.168732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.168856] page_type: f5(slab) [ 18.168935] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 18.169055] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 18.169797] page dumped because: kasan: bad access detected [ 18.170008] [ 18.170275] Memory state around the buggy address: [ 18.170539] fff00000c1096b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.170745] fff00000c1096c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.170847] >fff00000c1096c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.170985] ^ [ 18.171078] fff00000c1096d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 18.171382] fff00000c1096d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.171490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 18.051207] ================================================================== [ 18.051382] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 18.051697] Read of size 1 at addr fff00000c794e000 by task kunit_try_catch/213 [ 18.051875] [ 18.051990] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.052195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.052255] Hardware name: linux,dummy-virt (DT) [ 18.052423] Call trace: [ 18.052482] show_stack+0x20/0x38 (C) [ 18.052592] dump_stack_lvl+0x8c/0xd0 [ 18.052704] print_report+0x118/0x608 [ 18.052809] kasan_report+0xdc/0x128 [ 18.052909] __asan_report_load1_noabort+0x20/0x30 [ 18.053024] kmem_cache_rcu_uaf+0x388/0x468 [ 18.053125] kunit_try_run_case+0x170/0x3f0 [ 18.053228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.053340] kthread+0x328/0x630 [ 18.053436] ret_from_fork+0x10/0x20 [ 18.053540] [ 18.053581] Allocated by task 213: [ 18.053647] kasan_save_stack+0x3c/0x68 [ 18.053730] kasan_save_track+0x20/0x40 [ 18.053811] kasan_save_alloc_info+0x40/0x58 [ 18.053885] __kasan_slab_alloc+0xa8/0xb0 [ 18.054547] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.054716] kmem_cache_rcu_uaf+0x12c/0x468 [ 18.054807] kunit_try_run_case+0x170/0x3f0 [ 18.055050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.055166] kthread+0x328/0x630 [ 18.055228] ret_from_fork+0x10/0x20 [ 18.055490] [ 18.055858] Freed by task 0: [ 18.055934] kasan_save_stack+0x3c/0x68 [ 18.056198] kasan_save_track+0x20/0x40 [ 18.056315] kasan_save_free_info+0x4c/0x78 [ 18.056416] __kasan_slab_free+0x6c/0x98 [ 18.056495] slab_free_after_rcu_debug+0xd4/0x2f8 [ 18.056579] rcu_core+0x9f4/0x1e20 [ 18.057034] rcu_core_si+0x18/0x30 [ 18.057516] handle_softirqs+0x374/0xb28 [ 18.057707] __do_softirq+0x1c/0x28 [ 18.057951] [ 18.058092] Last potentially related work creation: [ 18.058187] kasan_save_stack+0x3c/0x68 [ 18.058401] kasan_record_aux_stack+0xb4/0xc8 [ 18.058536] kmem_cache_free+0x120/0x470 [ 18.058621] kmem_cache_rcu_uaf+0x16c/0x468 [ 18.058692] kunit_try_run_case+0x170/0x3f0 [ 18.058764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.059201] kthread+0x328/0x630 [ 18.059688] ret_from_fork+0x10/0x20 [ 18.059766] [ 18.059981] The buggy address belongs to the object at fff00000c794e000 [ 18.059981] which belongs to the cache test_cache of size 200 [ 18.060322] The buggy address is located 0 bytes inside of [ 18.060322] freed 200-byte region [fff00000c794e000, fff00000c794e0c8) [ 18.060846] [ 18.060956] The buggy address belongs to the physical page: [ 18.061159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794e [ 18.061880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.062226] page_type: f5(slab) [ 18.062611] raw: 0bfffe0000000000 fff00000c1096b40 dead000000000122 0000000000000000 [ 18.063248] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.063767] page dumped because: kasan: bad access detected [ 18.063953] [ 18.063996] Memory state around the buggy address: [ 18.064198] fff00000c794df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064454] fff00000c794df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064900] >fff00000c794e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.065376] ^ [ 18.065493] fff00000c794e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.065606] fff00000c794e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.066124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 17.651974] ================================================================== [ 17.652125] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.652247] Free of addr fff00000c794b001 by task kunit_try_catch/211 [ 17.652342] [ 17.652421] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.652607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.652662] Hardware name: linux,dummy-virt (DT) [ 17.652732] Call trace: [ 17.652779] show_stack+0x20/0x38 (C) [ 17.652887] dump_stack_lvl+0x8c/0xd0 [ 17.652993] print_report+0x118/0x608 [ 17.653612] kasan_report_invalid_free+0xc0/0xe8 [ 17.653779] check_slab_allocation+0xfc/0x108 [ 17.653917] __kasan_slab_pre_free+0x2c/0x48 [ 17.654036] kmem_cache_free+0xf0/0x470 [ 17.654154] kmem_cache_invalid_free+0x184/0x3c8 [ 17.654261] kunit_try_run_case+0x170/0x3f0 [ 17.654361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.654453] kthread+0x328/0x630 [ 17.654542] ret_from_fork+0x10/0x20 [ 17.654657] [ 17.654698] Allocated by task 211: [ 17.654763] kasan_save_stack+0x3c/0x68 [ 17.655281] kasan_save_track+0x20/0x40 [ 17.655536] kasan_save_alloc_info+0x40/0x58 [ 17.655765] __kasan_slab_alloc+0xa8/0xb0 [ 17.655885] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 17.656106] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.656513] kunit_try_run_case+0x170/0x3f0 [ 17.656740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.656980] kthread+0x328/0x630 [ 17.657148] ret_from_fork+0x10/0x20 [ 17.657232] [ 17.657362] The buggy address belongs to the object at fff00000c794b000 [ 17.657362] which belongs to the cache test_cache of size 200 [ 17.657748] The buggy address is located 1 bytes inside of [ 17.657748] 200-byte region [fff00000c794b000, fff00000c794b0c8) [ 17.658025] [ 17.658108] The buggy address belongs to the physical page: [ 17.658292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 17.658431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.658530] page_type: f5(slab) [ 17.658611] raw: 0bfffe0000000000 fff00000c1096a00 dead000000000122 0000000000000000 [ 17.658712] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.659399] page dumped because: kasan: bad access detected [ 17.659492] [ 17.659707] Memory state around the buggy address: [ 17.659793] fff00000c794af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.660254] fff00000c794af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.660404] >fff00000c794b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.660549] ^ [ 17.660685] fff00000c794b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.660805] fff00000c794b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.660890] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 17.584929] ================================================================== [ 17.585093] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 17.585239] Free of addr fff00000c794a000 by task kunit_try_catch/209 [ 17.585332] [ 17.585413] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.585605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.585662] Hardware name: linux,dummy-virt (DT) [ 17.585733] Call trace: [ 17.585787] show_stack+0x20/0x38 (C) [ 17.586519] dump_stack_lvl+0x8c/0xd0 [ 17.586770] print_report+0x118/0x608 [ 17.586886] kasan_report_invalid_free+0xc0/0xe8 [ 17.587358] check_slab_allocation+0xd4/0x108 [ 17.587571] __kasan_slab_pre_free+0x2c/0x48 [ 17.587679] kmem_cache_free+0xf0/0x470 [ 17.587984] kmem_cache_double_free+0x190/0x3c8 [ 17.588224] kunit_try_run_case+0x170/0x3f0 [ 17.588490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.588889] kthread+0x328/0x630 [ 17.589069] ret_from_fork+0x10/0x20 [ 17.589331] [ 17.589381] Allocated by task 209: [ 17.589661] kasan_save_stack+0x3c/0x68 [ 17.589806] kasan_save_track+0x20/0x40 [ 17.589943] kasan_save_alloc_info+0x40/0x58 [ 17.590102] __kasan_slab_alloc+0xa8/0xb0 [ 17.590197] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 17.590438] kmem_cache_double_free+0x12c/0x3c8 [ 17.590529] kunit_try_run_case+0x170/0x3f0 [ 17.590848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.590954] kthread+0x328/0x630 [ 17.591025] ret_from_fork+0x10/0x20 [ 17.591129] [ 17.591167] Freed by task 209: [ 17.591222] kasan_save_stack+0x3c/0x68 [ 17.591293] kasan_save_track+0x20/0x40 [ 17.591360] kasan_save_free_info+0x4c/0x78 [ 17.591471] __kasan_slab_free+0x6c/0x98 [ 17.591593] kmem_cache_free+0x260/0x470 [ 17.591835] kmem_cache_double_free+0x140/0x3c8 [ 17.591925] kunit_try_run_case+0x170/0x3f0 [ 17.592018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.592119] kthread+0x328/0x630 [ 17.592195] ret_from_fork+0x10/0x20 [ 17.592271] [ 17.592614] The buggy address belongs to the object at fff00000c794a000 [ 17.592614] which belongs to the cache test_cache of size 200 [ 17.592853] The buggy address is located 0 bytes inside of [ 17.592853] 200-byte region [fff00000c794a000, fff00000c794a0c8) [ 17.593164] [ 17.593236] The buggy address belongs to the physical page: [ 17.593359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794a [ 17.593749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.593858] page_type: f5(slab) [ 17.594158] raw: 0bfffe0000000000 fff00000c10968c0 dead000000000122 0000000000000000 [ 17.594392] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.594478] page dumped because: kasan: bad access detected [ 17.594544] [ 17.594593] Memory state around the buggy address: [ 17.594661] fff00000c7949f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.594774] fff00000c7949f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.594885] >fff00000c794a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.594978] ^ [ 17.595082] fff00000c794a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 17.595216] fff00000c794a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.595343] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 17.403549] ================================================================== [ 17.403669] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.403783] Read of size 1 at addr fff00000c79480c8 by task kunit_try_catch/207 [ 17.403891] [ 17.403954] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.404155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.404217] Hardware name: linux,dummy-virt (DT) [ 17.404285] Call trace: [ 17.404331] show_stack+0x20/0x38 (C) [ 17.404439] dump_stack_lvl+0x8c/0xd0 [ 17.404545] print_report+0x118/0x608 [ 17.404646] kasan_report+0xdc/0x128 [ 17.404746] __asan_report_load1_noabort+0x20/0x30 [ 17.404859] kmem_cache_oob+0x344/0x430 [ 17.404966] kunit_try_run_case+0x170/0x3f0 [ 17.405075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.405178] kthread+0x328/0x630 [ 17.405393] ret_from_fork+0x10/0x20 [ 17.405506] [ 17.405543] Allocated by task 207: [ 17.405847] kasan_save_stack+0x3c/0x68 [ 17.405952] kasan_save_track+0x20/0x40 [ 17.406035] kasan_save_alloc_info+0x40/0x58 [ 17.406132] __kasan_slab_alloc+0xa8/0xb0 [ 17.406198] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 17.406277] kmem_cache_oob+0x12c/0x430 [ 17.406559] kunit_try_run_case+0x170/0x3f0 [ 17.406646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.406723] kthread+0x328/0x630 [ 17.406792] ret_from_fork+0x10/0x20 [ 17.406864] [ 17.406947] The buggy address belongs to the object at fff00000c7948000 [ 17.406947] which belongs to the cache test_cache of size 200 [ 17.407176] The buggy address is located 0 bytes to the right of [ 17.407176] allocated 200-byte region [fff00000c7948000, fff00000c79480c8) [ 17.407322] [ 17.407414] The buggy address belongs to the physical page: [ 17.407642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 17.407839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.407946] page_type: f5(slab) [ 17.408033] raw: 0bfffe0000000000 fff00000c1096780 dead000000000122 0000000000000000 [ 17.408382] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.408819] page dumped because: kasan: bad access detected [ 17.408897] [ 17.408939] Memory state around the buggy address: [ 17.409014] fff00000c7947f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.409418] fff00000c7948000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.409736] >fff00000c7948080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.409822] ^ [ 17.410096] fff00000c7948100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.410522] fff00000c7948180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.410637] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 17.345491] ================================================================== [ 17.345934] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 17.346064] Read of size 8 at addr fff00000c7943540 by task kunit_try_catch/200 [ 17.346178] [ 17.346245] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.346424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.346475] Hardware name: linux,dummy-virt (DT) [ 17.346536] Call trace: [ 17.346654] show_stack+0x20/0x38 (C) [ 17.346885] dump_stack_lvl+0x8c/0xd0 [ 17.346985] print_report+0x118/0x608 [ 17.347085] kasan_report+0xdc/0x128 [ 17.347159] __asan_report_load8_noabort+0x20/0x30 [ 17.347423] workqueue_uaf+0x480/0x4a8 [ 17.347531] kunit_try_run_case+0x170/0x3f0 [ 17.347799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.348049] kthread+0x328/0x630 [ 17.348155] ret_from_fork+0x10/0x20 [ 17.348264] [ 17.348308] Allocated by task 200: [ 17.348370] kasan_save_stack+0x3c/0x68 [ 17.348457] kasan_save_track+0x20/0x40 [ 17.348534] kasan_save_alloc_info+0x40/0x58 [ 17.348629] __kasan_kmalloc+0xd4/0xd8 [ 17.348740] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.348861] workqueue_uaf+0x13c/0x4a8 [ 17.348962] kunit_try_run_case+0x170/0x3f0 [ 17.349085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.349190] kthread+0x328/0x630 [ 17.349288] ret_from_fork+0x10/0x20 [ 17.349392] [ 17.349437] Freed by task 48: [ 17.349492] kasan_save_stack+0x3c/0x68 [ 17.349578] kasan_save_track+0x20/0x40 [ 17.349658] kasan_save_free_info+0x4c/0x78 [ 17.349742] __kasan_slab_free+0x6c/0x98 [ 17.349821] kfree+0x214/0x3c8 [ 17.349925] workqueue_uaf_work+0x18/0x30 [ 17.350002] process_one_work+0x530/0xf98 [ 17.350084] worker_thread+0x8ac/0xf28 [ 17.350163] kthread+0x328/0x630 [ 17.350300] ret_from_fork+0x10/0x20 [ 17.350391] [ 17.350430] Last potentially related work creation: [ 17.350487] kasan_save_stack+0x3c/0x68 [ 17.350577] kasan_record_aux_stack+0xb4/0xc8 [ 17.350673] __queue_work+0x65c/0x1010 [ 17.350768] queue_work_on+0xbc/0xf8 [ 17.350834] workqueue_uaf+0x210/0x4a8 [ 17.350902] kunit_try_run_case+0x170/0x3f0 [ 17.350976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.351105] kthread+0x328/0x630 [ 17.351185] ret_from_fork+0x10/0x20 [ 17.351249] [ 17.351306] The buggy address belongs to the object at fff00000c7943540 [ 17.351306] which belongs to the cache kmalloc-32 of size 32 [ 17.351433] The buggy address is located 0 bytes inside of [ 17.351433] freed 32-byte region [fff00000c7943540, fff00000c7943560) [ 17.351567] [ 17.351633] The buggy address belongs to the physical page: [ 17.351722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107943 [ 17.351858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.351964] page_type: f5(slab) [ 17.352050] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 17.352179] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 17.352281] page dumped because: kasan: bad access detected [ 17.352348] [ 17.352383] Memory state around the buggy address: [ 17.352447] fff00000c7943400: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 17.352543] fff00000c7943480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 17.352637] >fff00000c7943500: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 17.352724] ^ [ 17.352803] fff00000c7943580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.352892] fff00000c7943600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.352975] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 17.316193] ================================================================== [ 17.316418] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 17.316616] Read of size 4 at addr fff00000c7943340 by task swapper/1/0 [ 17.316742] [ 17.316826] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.317082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.317132] Hardware name: linux,dummy-virt (DT) [ 17.317199] Call trace: [ 17.317491] show_stack+0x20/0x38 (C) [ 17.317701] dump_stack_lvl+0x8c/0xd0 [ 17.317801] print_report+0x118/0x608 [ 17.317907] kasan_report+0xdc/0x128 [ 17.318505] __asan_report_load4_noabort+0x20/0x30 [ 17.318556] rcu_uaf_reclaim+0x64/0x70 [ 17.318656] rcu_core+0x9f4/0x1e20 [ 17.318807] rcu_core_si+0x18/0x30 [ 17.318932] handle_softirqs+0x374/0xb28 [ 17.319016] __do_softirq+0x1c/0x28 [ 17.319360] ____do_softirq+0x18/0x30 [ 17.319582] call_on_irq_stack+0x24/0x30 [ 17.319692] do_softirq_own_stack+0x24/0x38 [ 17.319800] __irq_exit_rcu+0x1fc/0x318 [ 17.319893] irq_exit_rcu+0x1c/0x80 [ 17.319981] el1_interrupt+0x38/0x58 [ 17.320091] el1h_64_irq_handler+0x18/0x28 [ 17.320189] el1h_64_irq+0x6c/0x70 [ 17.320391] arch_local_irq_enable+0x4/0x8 (P) [ 17.320529] do_idle+0x384/0x4e8 [ 17.320658] cpu_startup_entry+0x68/0x80 [ 17.320784] secondary_start_kernel+0x288/0x340 [ 17.320928] __secondary_switched+0xc0/0xc8 [ 17.321103] [ 17.321141] Allocated by task 198: [ 17.321199] kasan_save_stack+0x3c/0x68 [ 17.321288] kasan_save_track+0x20/0x40 [ 17.321632] kasan_save_alloc_info+0x40/0x58 [ 17.321909] __kasan_kmalloc+0xd4/0xd8 [ 17.322018] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.322132] rcu_uaf+0xb0/0x2d8 [ 17.322228] kunit_try_run_case+0x170/0x3f0 [ 17.322341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.322462] kthread+0x328/0x630 [ 17.322560] ret_from_fork+0x10/0x20 [ 17.322645] [ 17.322695] Freed by task 0: [ 17.322772] kasan_save_stack+0x3c/0x68 [ 17.322884] kasan_save_track+0x20/0x40 [ 17.322956] kasan_save_free_info+0x4c/0x78 [ 17.323062] __kasan_slab_free+0x6c/0x98 [ 17.323128] kfree+0x214/0x3c8 [ 17.323190] rcu_uaf_reclaim+0x28/0x70 [ 17.323764] rcu_core+0x9f4/0x1e20 [ 17.324001] rcu_core_si+0x18/0x30 [ 17.324088] handle_softirqs+0x374/0xb28 [ 17.324338] __do_softirq+0x1c/0x28 [ 17.324427] [ 17.324509] Last potentially related work creation: [ 17.324620] kasan_save_stack+0x3c/0x68 [ 17.324710] kasan_record_aux_stack+0xb4/0xc8 [ 17.324858] __call_rcu_common.constprop.0+0x70/0x8b0 [ 17.324980] call_rcu+0x18/0x30 [ 17.325083] rcu_uaf+0x14c/0x2d8 [ 17.325152] kunit_try_run_case+0x170/0x3f0 [ 17.325237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.325328] kthread+0x328/0x630 [ 17.325402] ret_from_fork+0x10/0x20 [ 17.325487] [ 17.325543] The buggy address belongs to the object at fff00000c7943340 [ 17.325543] which belongs to the cache kmalloc-32 of size 32 [ 17.325674] The buggy address is located 0 bytes inside of [ 17.325674] freed 32-byte region [fff00000c7943340, fff00000c7943360) [ 17.325805] [ 17.325852] The buggy address belongs to the physical page: [ 17.325922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107943 [ 17.326024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.326345] page_type: f5(slab) [ 17.326440] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 17.326531] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 17.326610] page dumped because: kasan: bad access detected [ 17.326668] [ 17.327230] Memory state around the buggy address: [ 17.327376] fff00000c7943200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 17.327478] fff00000c7943280: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 17.327583] >fff00000c7943300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 17.327703] ^ [ 17.327798] fff00000c7943380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.327917] fff00000c7943400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.327999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 17.088829] ================================================================== [ 17.088959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.089071] Read of size 1 at addr fff00000c78d9400 by task kunit_try_catch/196 [ 17.089176] [ 17.089240] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.089432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.089490] Hardware name: linux,dummy-virt (DT) [ 17.089556] Call trace: [ 17.089604] show_stack+0x20/0x38 (C) [ 17.089710] dump_stack_lvl+0x8c/0xd0 [ 17.089814] print_report+0x118/0x608 [ 17.089954] kasan_report+0xdc/0x128 [ 17.090054] __kasan_check_byte+0x54/0x70 [ 17.090191] ksize+0x30/0x88 [ 17.090276] ksize_uaf+0x168/0x5f8 [ 17.090362] kunit_try_run_case+0x170/0x3f0 [ 17.090468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.090603] kthread+0x328/0x630 [ 17.090729] ret_from_fork+0x10/0x20 [ 17.090863] [ 17.090912] Allocated by task 196: [ 17.090986] kasan_save_stack+0x3c/0x68 [ 17.091107] kasan_save_track+0x20/0x40 [ 17.091208] kasan_save_alloc_info+0x40/0x58 [ 17.091313] __kasan_kmalloc+0xd4/0xd8 [ 17.091409] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.091509] ksize_uaf+0xb8/0x5f8 [ 17.091601] kunit_try_run_case+0x170/0x3f0 [ 17.091699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.091816] kthread+0x328/0x630 [ 17.092078] ret_from_fork+0x10/0x20 [ 17.092165] [ 17.092206] Freed by task 196: [ 17.092264] kasan_save_stack+0x3c/0x68 [ 17.092331] kasan_save_track+0x20/0x40 [ 17.092425] kasan_save_free_info+0x4c/0x78 [ 17.092552] __kasan_slab_free+0x6c/0x98 [ 17.092646] kfree+0x214/0x3c8 [ 17.092781] ksize_uaf+0x11c/0x5f8 [ 17.092860] kunit_try_run_case+0x170/0x3f0 [ 17.092951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.093052] kthread+0x328/0x630 [ 17.093128] ret_from_fork+0x10/0x20 [ 17.093259] [ 17.093314] The buggy address belongs to the object at fff00000c78d9400 [ 17.093314] which belongs to the cache kmalloc-128 of size 128 [ 17.093844] The buggy address is located 0 bytes inside of [ 17.093844] freed 128-byte region [fff00000c78d9400, fff00000c78d9480) [ 17.094051] [ 17.094147] The buggy address belongs to the physical page: [ 17.094287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.094799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.095298] page_type: f5(slab) [ 17.095513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.095623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.095713] page dumped because: kasan: bad access detected [ 17.096153] [ 17.096214] Memory state around the buggy address: [ 17.096370] fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.096671] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.096938] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.097035] ^ [ 17.097104] fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.097282] fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.097372] ================================================================== [ 17.099062] ================================================================== [ 17.099170] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.099270] Read of size 1 at addr fff00000c78d9400 by task kunit_try_catch/196 [ 17.100140] [ 17.100299] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.100892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.100960] Hardware name: linux,dummy-virt (DT) [ 17.101034] Call trace: [ 17.101089] show_stack+0x20/0x38 (C) [ 17.101300] dump_stack_lvl+0x8c/0xd0 [ 17.101405] print_report+0x118/0x608 [ 17.101944] kasan_report+0xdc/0x128 [ 17.102183] __asan_report_load1_noabort+0x20/0x30 [ 17.102389] ksize_uaf+0x598/0x5f8 [ 17.102679] kunit_try_run_case+0x170/0x3f0 [ 17.103011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.103145] kthread+0x328/0x630 [ 17.103551] ret_from_fork+0x10/0x20 [ 17.103660] [ 17.103701] Allocated by task 196: [ 17.103756] kasan_save_stack+0x3c/0x68 [ 17.104816] kasan_save_track+0x20/0x40 [ 17.104931] kasan_save_alloc_info+0x40/0x58 [ 17.105223] __kasan_kmalloc+0xd4/0xd8 [ 17.105460] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.105755] ksize_uaf+0xb8/0x5f8 [ 17.105827] kunit_try_run_case+0x170/0x3f0 [ 17.106280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.106738] kthread+0x328/0x630 [ 17.106821] ret_from_fork+0x10/0x20 [ 17.106997] [ 17.107083] Freed by task 196: [ 17.107143] kasan_save_stack+0x3c/0x68 [ 17.107227] kasan_save_track+0x20/0x40 [ 17.107304] kasan_save_free_info+0x4c/0x78 [ 17.107381] __kasan_slab_free+0x6c/0x98 [ 17.107471] kfree+0x214/0x3c8 [ 17.107539] ksize_uaf+0x11c/0x5f8 [ 17.107607] kunit_try_run_case+0x170/0x3f0 [ 17.107683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.107774] kthread+0x328/0x630 [ 17.107846] ret_from_fork+0x10/0x20 [ 17.107931] [ 17.107976] The buggy address belongs to the object at fff00000c78d9400 [ 17.107976] which belongs to the cache kmalloc-128 of size 128 [ 17.108102] The buggy address is located 0 bytes inside of [ 17.108102] freed 128-byte region [fff00000c78d9400, fff00000c78d9480) [ 17.108251] [ 17.108308] The buggy address belongs to the physical page: [ 17.108376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.108491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.108592] page_type: f5(slab) [ 17.108674] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.108784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.108873] page dumped because: kasan: bad access detected [ 17.108944] [ 17.108996] Memory state around the buggy address: [ 17.109562] fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.109687] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.109845] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.109960] ^ [ 17.110020] fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.110111] fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.111011] ================================================================== [ 17.112379] ================================================================== [ 17.112488] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.112585] Read of size 1 at addr fff00000c78d9478 by task kunit_try_catch/196 [ 17.112689] [ 17.112750] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.113213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.113866] Hardware name: linux,dummy-virt (DT) [ 17.114078] Call trace: [ 17.114149] show_stack+0x20/0x38 (C) [ 17.114662] dump_stack_lvl+0x8c/0xd0 [ 17.114903] print_report+0x118/0x608 [ 17.115059] kasan_report+0xdc/0x128 [ 17.115175] __asan_report_load1_noabort+0x20/0x30 [ 17.115451] ksize_uaf+0x544/0x5f8 [ 17.115547] kunit_try_run_case+0x170/0x3f0 [ 17.115644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.115754] kthread+0x328/0x630 [ 17.116777] ret_from_fork+0x10/0x20 [ 17.117661] [ 17.117822] Allocated by task 196: [ 17.118046] kasan_save_stack+0x3c/0x68 [ 17.118260] kasan_save_track+0x20/0x40 [ 17.118381] kasan_save_alloc_info+0x40/0x58 [ 17.118801] __kasan_kmalloc+0xd4/0xd8 [ 17.119103] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.119377] ksize_uaf+0xb8/0x5f8 [ 17.119479] kunit_try_run_case+0x170/0x3f0 [ 17.119639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.119797] kthread+0x328/0x630 [ 17.120002] ret_from_fork+0x10/0x20 [ 17.120238] [ 17.120298] Freed by task 196: [ 17.120365] kasan_save_stack+0x3c/0x68 [ 17.120452] kasan_save_track+0x20/0x40 [ 17.120529] kasan_save_free_info+0x4c/0x78 [ 17.120603] __kasan_slab_free+0x6c/0x98 [ 17.120894] kfree+0x214/0x3c8 [ 17.121008] ksize_uaf+0x11c/0x5f8 [ 17.121464] kunit_try_run_case+0x170/0x3f0 [ 17.121553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.121645] kthread+0x328/0x630 [ 17.121719] ret_from_fork+0x10/0x20 [ 17.121790] [ 17.121830] The buggy address belongs to the object at fff00000c78d9400 [ 17.121830] which belongs to the cache kmalloc-128 of size 128 [ 17.122856] The buggy address is located 120 bytes inside of [ 17.122856] freed 128-byte region [fff00000c78d9400, fff00000c78d9480) [ 17.123154] [ 17.123718] The buggy address belongs to the physical page: [ 17.123897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.124127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.124305] page_type: f5(slab) [ 17.124388] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.124498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.124929] page dumped because: kasan: bad access detected [ 17.125267] [ 17.125325] Memory state around the buggy address: [ 17.125400] fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.125697] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.125842] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.125991] ^ [ 17.126242] fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.126341] fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.126423] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 17.052218] ================================================================== [ 17.052577] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.052704] Read of size 1 at addr fff00000c78d9373 by task kunit_try_catch/194 [ 17.052874] [ 17.052973] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.053283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.053375] Hardware name: linux,dummy-virt (DT) [ 17.053479] Call trace: [ 17.053540] show_stack+0x20/0x38 (C) [ 17.053648] dump_stack_lvl+0x8c/0xd0 [ 17.053760] print_report+0x118/0x608 [ 17.053866] kasan_report+0xdc/0x128 [ 17.053957] __asan_report_load1_noabort+0x20/0x30 [ 17.054073] ksize_unpoisons_memory+0x628/0x740 [ 17.054667] kunit_try_run_case+0x170/0x3f0 [ 17.054825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.054991] kthread+0x328/0x630 [ 17.055111] ret_from_fork+0x10/0x20 [ 17.055244] [ 17.055279] Allocated by task 194: [ 17.055338] kasan_save_stack+0x3c/0x68 [ 17.055522] kasan_save_track+0x20/0x40 [ 17.055608] kasan_save_alloc_info+0x40/0x58 [ 17.055785] __kasan_kmalloc+0xd4/0xd8 [ 17.055862] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.055944] ksize_unpoisons_memory+0xc0/0x740 [ 17.056020] kunit_try_run_case+0x170/0x3f0 [ 17.056111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.056210] kthread+0x328/0x630 [ 17.056282] ret_from_fork+0x10/0x20 [ 17.056356] [ 17.056407] The buggy address belongs to the object at fff00000c78d9300 [ 17.056407] which belongs to the cache kmalloc-128 of size 128 [ 17.056601] The buggy address is located 0 bytes to the right of [ 17.056601] allocated 115-byte region [fff00000c78d9300, fff00000c78d9373) [ 17.056806] [ 17.056845] The buggy address belongs to the physical page: [ 17.056954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.057150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.057324] page_type: f5(slab) [ 17.057443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.057579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.057730] page dumped because: kasan: bad access detected [ 17.057842] [ 17.057884] Memory state around the buggy address: [ 17.057948] fff00000c78d9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.058057] fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058442] >fff00000c78d9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.058603] ^ [ 17.058724] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058830] fff00000c78d9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058923] ================================================================== [ 17.060069] ================================================================== [ 17.060174] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.060277] Read of size 1 at addr fff00000c78d9378 by task kunit_try_catch/194 [ 17.060380] [ 17.060441] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.060623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.060679] Hardware name: linux,dummy-virt (DT) [ 17.060741] Call trace: [ 17.060790] show_stack+0x20/0x38 (C) [ 17.060893] dump_stack_lvl+0x8c/0xd0 [ 17.060997] print_report+0x118/0x608 [ 17.061207] kasan_report+0xdc/0x128 [ 17.061310] __asan_report_load1_noabort+0x20/0x30 [ 17.061419] ksize_unpoisons_memory+0x618/0x740 [ 17.061527] kunit_try_run_case+0x170/0x3f0 [ 17.061633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.061748] kthread+0x328/0x630 [ 17.061843] ret_from_fork+0x10/0x20 [ 17.061981] [ 17.062019] Allocated by task 194: [ 17.062083] kasan_save_stack+0x3c/0x68 [ 17.062167] kasan_save_track+0x20/0x40 [ 17.062245] kasan_save_alloc_info+0x40/0x58 [ 17.062335] __kasan_kmalloc+0xd4/0xd8 [ 17.062409] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.062490] ksize_unpoisons_memory+0xc0/0x740 [ 17.062583] kunit_try_run_case+0x170/0x3f0 [ 17.062661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.062750] kthread+0x328/0x630 [ 17.063383] ret_from_fork+0x10/0x20 [ 17.063450] [ 17.063490] The buggy address belongs to the object at fff00000c78d9300 [ 17.063490] which belongs to the cache kmalloc-128 of size 128 [ 17.063616] The buggy address is located 5 bytes to the right of [ 17.063616] allocated 115-byte region [fff00000c78d9300, fff00000c78d9373) [ 17.063808] [ 17.063862] The buggy address belongs to the physical page: [ 17.063952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.064093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.064174] page_type: f5(slab) [ 17.064249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.064355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.064449] page dumped because: kasan: bad access detected [ 17.064518] [ 17.064559] Memory state around the buggy address: [ 17.064620] fff00000c78d9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.065574] fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.065869] >fff00000c78d9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.066012] ^ [ 17.066114] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.066210] fff00000c78d9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.066295] ================================================================== [ 17.068452] ================================================================== [ 17.068610] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.068756] Read of size 1 at addr fff00000c78d937f by task kunit_try_catch/194 [ 17.068901] [ 17.068984] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.069169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.069224] Hardware name: linux,dummy-virt (DT) [ 17.069300] Call trace: [ 17.069345] show_stack+0x20/0x38 (C) [ 17.069660] dump_stack_lvl+0x8c/0xd0 [ 17.069886] print_report+0x118/0x608 [ 17.070037] kasan_report+0xdc/0x128 [ 17.070154] __asan_report_load1_noabort+0x20/0x30 [ 17.070255] ksize_unpoisons_memory+0x690/0x740 [ 17.070543] kunit_try_run_case+0x170/0x3f0 [ 17.070653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.070771] kthread+0x328/0x630 [ 17.070902] ret_from_fork+0x10/0x20 [ 17.071049] [ 17.071089] Allocated by task 194: [ 17.071147] kasan_save_stack+0x3c/0x68 [ 17.071235] kasan_save_track+0x20/0x40 [ 17.071353] kasan_save_alloc_info+0x40/0x58 [ 17.071427] __kasan_kmalloc+0xd4/0xd8 [ 17.071497] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.071672] ksize_unpoisons_memory+0xc0/0x740 [ 17.071876] kunit_try_run_case+0x170/0x3f0 [ 17.072090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.072181] kthread+0x328/0x630 [ 17.072547] ret_from_fork+0x10/0x20 [ 17.072803] [ 17.072842] The buggy address belongs to the object at fff00000c78d9300 [ 17.072842] which belongs to the cache kmalloc-128 of size 128 [ 17.073016] The buggy address is located 12 bytes to the right of [ 17.073016] allocated 115-byte region [fff00000c78d9300, fff00000c78d9373) [ 17.073172] [ 17.073233] The buggy address belongs to the physical page: [ 17.073292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.073404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.073504] page_type: f5(slab) [ 17.073586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.073693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.073781] page dumped because: kasan: bad access detected [ 17.073850] [ 17.073887] Memory state around the buggy address: [ 17.073948] fff00000c78d9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.074027] fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.074369] >fff00000c78d9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.074687] ^ [ 17.074769] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.074850] fff00000c78d9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.074930] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 17.001253] ================================================================== [ 17.001970] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 17.002177] Free of addr fff00000c10cc860 by task kunit_try_catch/192 [ 17.002271] [ 17.002330] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.002988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.003339] Hardware name: linux,dummy-virt (DT) [ 17.003419] Call trace: [ 17.003467] show_stack+0x20/0x38 (C) [ 17.003970] dump_stack_lvl+0x8c/0xd0 [ 17.004098] print_report+0x118/0x608 [ 17.004654] kasan_report_invalid_free+0xc0/0xe8 [ 17.004791] check_slab_allocation+0xd4/0x108 [ 17.005109] __kasan_slab_pre_free+0x2c/0x48 [ 17.005462] kfree+0xe8/0x3c8 [ 17.005676] kfree_sensitive+0x3c/0xb0 [ 17.005856] kmalloc_double_kzfree+0x168/0x308 [ 17.005954] kunit_try_run_case+0x170/0x3f0 [ 17.006272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.006409] kthread+0x328/0x630 [ 17.006638] ret_from_fork+0x10/0x20 [ 17.007218] [ 17.007338] Allocated by task 192: [ 17.007427] kasan_save_stack+0x3c/0x68 [ 17.007662] kasan_save_track+0x20/0x40 [ 17.007835] kasan_save_alloc_info+0x40/0x58 [ 17.007925] __kasan_kmalloc+0xd4/0xd8 [ 17.008009] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.008103] kmalloc_double_kzfree+0xb8/0x308 [ 17.008190] kunit_try_run_case+0x170/0x3f0 [ 17.008274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.008629] kthread+0x328/0x630 [ 17.008959] ret_from_fork+0x10/0x20 [ 17.009283] [ 17.009499] Freed by task 192: [ 17.009636] kasan_save_stack+0x3c/0x68 [ 17.009742] kasan_save_track+0x20/0x40 [ 17.010033] kasan_save_free_info+0x4c/0x78 [ 17.010354] __kasan_slab_free+0x6c/0x98 [ 17.010445] kfree+0x214/0x3c8 [ 17.010616] kfree_sensitive+0x80/0xb0 [ 17.010745] kmalloc_double_kzfree+0x11c/0x308 [ 17.011026] kunit_try_run_case+0x170/0x3f0 [ 17.011127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.011236] kthread+0x328/0x630 [ 17.011313] ret_from_fork+0x10/0x20 [ 17.011950] [ 17.012003] The buggy address belongs to the object at fff00000c10cc860 [ 17.012003] which belongs to the cache kmalloc-16 of size 16 [ 17.012752] The buggy address is located 0 bytes inside of [ 17.012752] 16-byte region [fff00000c10cc860, fff00000c10cc870) [ 17.012939] [ 17.012987] The buggy address belongs to the physical page: [ 17.013597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc [ 17.014251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.014385] page_type: f5(slab) [ 17.014472] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.015273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.015455] page dumped because: kasan: bad access detected [ 17.015615] [ 17.015681] Memory state around the buggy address: [ 17.015765] fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 17.015884] fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.016000] >fff00000c10cc800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.016160] ^ [ 17.016259] fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.016376] fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.016482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 16.985440] ================================================================== [ 16.986018] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 16.986364] Read of size 1 at addr fff00000c10cc860 by task kunit_try_catch/192 [ 16.986743] [ 16.986834] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.987245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.987395] Hardware name: linux,dummy-virt (DT) [ 16.987464] Call trace: [ 16.987756] show_stack+0x20/0x38 (C) [ 16.987885] dump_stack_lvl+0x8c/0xd0 [ 16.987991] print_report+0x118/0x608 [ 16.988711] kasan_report+0xdc/0x128 [ 16.988842] __kasan_check_byte+0x54/0x70 [ 16.988947] kfree_sensitive+0x30/0xb0 [ 16.989060] kmalloc_double_kzfree+0x168/0x308 [ 16.989170] kunit_try_run_case+0x170/0x3f0 [ 16.989795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.990307] kthread+0x328/0x630 [ 16.990477] ret_from_fork+0x10/0x20 [ 16.990816] [ 16.990865] Allocated by task 192: [ 16.991106] kasan_save_stack+0x3c/0x68 [ 16.991399] kasan_save_track+0x20/0x40 [ 16.991528] kasan_save_alloc_info+0x40/0x58 [ 16.992109] __kasan_kmalloc+0xd4/0xd8 [ 16.992274] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.992376] kmalloc_double_kzfree+0xb8/0x308 [ 16.992468] kunit_try_run_case+0x170/0x3f0 [ 16.992544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.993003] kthread+0x328/0x630 [ 16.993294] ret_from_fork+0x10/0x20 [ 16.993393] [ 16.993661] Freed by task 192: [ 16.993961] kasan_save_stack+0x3c/0x68 [ 16.994185] kasan_save_track+0x20/0x40 [ 16.994335] kasan_save_free_info+0x4c/0x78 [ 16.994444] __kasan_slab_free+0x6c/0x98 [ 16.994532] kfree+0x214/0x3c8 [ 16.994848] kfree_sensitive+0x80/0xb0 [ 16.995147] kmalloc_double_kzfree+0x11c/0x308 [ 16.995242] kunit_try_run_case+0x170/0x3f0 [ 16.995324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.995490] kthread+0x328/0x630 [ 16.995578] ret_from_fork+0x10/0x20 [ 16.995956] [ 16.996288] The buggy address belongs to the object at fff00000c10cc860 [ 16.996288] which belongs to the cache kmalloc-16 of size 16 [ 16.996708] The buggy address is located 0 bytes inside of [ 16.996708] freed 16-byte region [fff00000c10cc860, fff00000c10cc870) [ 16.996910] [ 16.996974] The buggy address belongs to the physical page: [ 16.997248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc [ 16.997431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.997622] page_type: f5(slab) [ 16.997714] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.998038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.998320] page dumped because: kasan: bad access detected [ 16.998604] [ 16.998729] Memory state around the buggy address: [ 16.998856] fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 16.999032] fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.999142] >fff00000c10cc800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.999287] ^ [ 16.999372] fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.999468] fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.999561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 16.937257] ================================================================== [ 16.937403] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 16.937513] Read of size 1 at addr fff00000c7941028 by task kunit_try_catch/188 [ 16.937611] [ 16.937669] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.937899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.938092] Hardware name: linux,dummy-virt (DT) [ 16.938131] Call trace: [ 16.938156] show_stack+0x20/0x38 (C) [ 16.938214] dump_stack_lvl+0x8c/0xd0 [ 16.938569] print_report+0x118/0x608 [ 16.938669] kasan_report+0xdc/0x128 [ 16.938758] __asan_report_load1_noabort+0x20/0x30 [ 16.938861] kmalloc_uaf2+0x3f4/0x468 [ 16.939010] kunit_try_run_case+0x170/0x3f0 [ 16.939128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.939246] kthread+0x328/0x630 [ 16.939344] ret_from_fork+0x10/0x20 [ 16.939449] [ 16.939504] Allocated by task 188: [ 16.939571] kasan_save_stack+0x3c/0x68 [ 16.939654] kasan_save_track+0x20/0x40 [ 16.939748] kasan_save_alloc_info+0x40/0x58 [ 16.939836] __kasan_kmalloc+0xd4/0xd8 [ 16.939915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.940017] kmalloc_uaf2+0xc4/0x468 [ 16.941069] kunit_try_run_case+0x170/0x3f0 [ 16.941166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.941259] kthread+0x328/0x630 [ 16.941337] ret_from_fork+0x10/0x20 [ 16.941418] [ 16.941458] Freed by task 188: [ 16.941829] kasan_save_stack+0x3c/0x68 [ 16.941939] kasan_save_track+0x20/0x40 [ 16.942477] kasan_save_free_info+0x4c/0x78 [ 16.942683] __kasan_slab_free+0x6c/0x98 [ 16.942769] kfree+0x214/0x3c8 [ 16.942862] kmalloc_uaf2+0x134/0x468 [ 16.942949] kunit_try_run_case+0x170/0x3f0 [ 16.943236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.943510] kthread+0x328/0x630 [ 16.943689] ret_from_fork+0x10/0x20 [ 16.943843] [ 16.943907] The buggy address belongs to the object at fff00000c7941000 [ 16.943907] which belongs to the cache kmalloc-64 of size 64 [ 16.944109] The buggy address is located 40 bytes inside of [ 16.944109] freed 64-byte region [fff00000c7941000, fff00000c7941040) [ 16.944455] [ 16.944534] The buggy address belongs to the physical page: [ 16.944754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 16.944956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.945127] page_type: f5(slab) [ 16.945204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.945509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.945649] page dumped because: kasan: bad access detected [ 16.945919] [ 16.946006] Memory state around the buggy address: [ 16.946244] fff00000c7940f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.946433] fff00000c7940f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.946535] >fff00000c7941000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.946802] ^ [ 16.946882] fff00000c7941080: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 16.946982] fff00000c7941100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.947185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 16.907161] ================================================================== [ 16.907276] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 16.907388] Write of size 33 at addr fff00000c78cbe80 by task kunit_try_catch/186 [ 16.907497] [ 16.907559] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.907736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.907793] Hardware name: linux,dummy-virt (DT) [ 16.907858] Call trace: [ 16.907901] show_stack+0x20/0x38 (C) [ 16.908008] dump_stack_lvl+0x8c/0xd0 [ 16.908276] print_report+0x118/0x608 [ 16.908386] kasan_report+0xdc/0x128 [ 16.908481] kasan_check_range+0x100/0x1a8 [ 16.908585] __asan_memset+0x34/0x78 [ 16.908683] kmalloc_uaf_memset+0x170/0x310 [ 16.908780] kunit_try_run_case+0x170/0x3f0 [ 16.908886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.909786] kthread+0x328/0x630 [ 16.910143] ret_from_fork+0x10/0x20 [ 16.910555] [ 16.910621] Allocated by task 186: [ 16.910684] kasan_save_stack+0x3c/0x68 [ 16.910757] kasan_save_track+0x20/0x40 [ 16.910828] kasan_save_alloc_info+0x40/0x58 [ 16.910899] __kasan_kmalloc+0xd4/0xd8 [ 16.910969] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.911991] kmalloc_uaf_memset+0xb8/0x310 [ 16.912582] kunit_try_run_case+0x170/0x3f0 [ 16.912830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.913074] kthread+0x328/0x630 [ 16.913153] ret_from_fork+0x10/0x20 [ 16.913231] [ 16.913272] Freed by task 186: [ 16.913335] kasan_save_stack+0x3c/0x68 [ 16.913929] kasan_save_track+0x20/0x40 [ 16.914548] kasan_save_free_info+0x4c/0x78 [ 16.914648] __kasan_slab_free+0x6c/0x98 [ 16.915125] kfree+0x214/0x3c8 [ 16.915646] kmalloc_uaf_memset+0x11c/0x310 [ 16.915828] kunit_try_run_case+0x170/0x3f0 [ 16.915908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.916657] kthread+0x328/0x630 [ 16.916740] ret_from_fork+0x10/0x20 [ 16.916813] [ 16.916854] The buggy address belongs to the object at fff00000c78cbe80 [ 16.916854] which belongs to the cache kmalloc-64 of size 64 [ 16.916983] The buggy address is located 0 bytes inside of [ 16.916983] freed 64-byte region [fff00000c78cbe80, fff00000c78cbec0) [ 16.918751] [ 16.918843] The buggy address belongs to the physical page: [ 16.918926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cb [ 16.919179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.919394] page_type: f5(slab) [ 16.919526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.919708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.919878] page dumped because: kasan: bad access detected [ 16.919951] [ 16.920062] Memory state around the buggy address: [ 16.920151] fff00000c78cbd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.920391] fff00000c78cbe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.920746] >fff00000c78cbe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.920832] ^ [ 16.920904] fff00000c78cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.921275] fff00000c78cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.921404] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 16.887912] ================================================================== [ 16.888035] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.888160] Read of size 1 at addr fff00000c10cc848 by task kunit_try_catch/184 [ 16.888266] [ 16.888346] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.888528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.888613] Hardware name: linux,dummy-virt (DT) [ 16.889147] Call trace: [ 16.889214] show_stack+0x20/0x38 (C) [ 16.889375] dump_stack_lvl+0x8c/0xd0 [ 16.889485] print_report+0x118/0x608 [ 16.889579] kasan_report+0xdc/0x128 [ 16.889675] __asan_report_load1_noabort+0x20/0x30 [ 16.889783] kmalloc_uaf+0x300/0x338 [ 16.889877] kunit_try_run_case+0x170/0x3f0 [ 16.890382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.890505] kthread+0x328/0x630 [ 16.890614] ret_from_fork+0x10/0x20 [ 16.890718] [ 16.890763] Allocated by task 184: [ 16.890823] kasan_save_stack+0x3c/0x68 [ 16.890911] kasan_save_track+0x20/0x40 [ 16.891603] kasan_save_alloc_info+0x40/0x58 [ 16.891956] __kasan_kmalloc+0xd4/0xd8 [ 16.892318] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.892686] kmalloc_uaf+0xb8/0x338 [ 16.893057] kunit_try_run_case+0x170/0x3f0 [ 16.893145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.893253] kthread+0x328/0x630 [ 16.893385] ret_from_fork+0x10/0x20 [ 16.893504] [ 16.893552] Freed by task 184: [ 16.893611] kasan_save_stack+0x3c/0x68 [ 16.893690] kasan_save_track+0x20/0x40 [ 16.893759] kasan_save_free_info+0x4c/0x78 [ 16.893840] __kasan_slab_free+0x6c/0x98 [ 16.893946] kfree+0x214/0x3c8 [ 16.894013] kmalloc_uaf+0x11c/0x338 [ 16.894102] kunit_try_run_case+0x170/0x3f0 [ 16.894202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.894293] kthread+0x328/0x630 [ 16.894723] ret_from_fork+0x10/0x20 [ 16.894961] [ 16.895003] The buggy address belongs to the object at fff00000c10cc840 [ 16.895003] which belongs to the cache kmalloc-16 of size 16 [ 16.895122] The buggy address is located 8 bytes inside of [ 16.895122] freed 16-byte region [fff00000c10cc840, fff00000c10cc850) [ 16.895237] [ 16.895274] The buggy address belongs to the physical page: [ 16.895336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc [ 16.895441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.896097] page_type: f5(slab) [ 16.897317] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.897518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.897777] page dumped because: kasan: bad access detected [ 16.897884] [ 16.897997] Memory state around the buggy address: [ 16.898093] fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 16.898170] fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.898256] >fff00000c10cc800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 16.898323] ^ [ 16.898393] fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.898478] fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.899218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 16.851408] ================================================================== [ 16.851535] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.851656] Read of size 64 at addr fff00000c78cbb84 by task kunit_try_catch/182 [ 16.851758] [ 16.851822] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.852046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.852119] Hardware name: linux,dummy-virt (DT) [ 16.852195] Call trace: [ 16.852248] show_stack+0x20/0x38 (C) [ 16.852345] dump_stack_lvl+0x8c/0xd0 [ 16.852453] print_report+0x118/0x608 [ 16.852552] kasan_report+0xdc/0x128 [ 16.852646] kasan_check_range+0x100/0x1a8 [ 16.852747] __asan_memmove+0x3c/0x98 [ 16.852843] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.852950] kunit_try_run_case+0x170/0x3f0 [ 16.853060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.853178] kthread+0x328/0x630 [ 16.853278] ret_from_fork+0x10/0x20 [ 16.853377] [ 16.853419] Allocated by task 182: [ 16.853476] kasan_save_stack+0x3c/0x68 [ 16.853558] kasan_save_track+0x20/0x40 [ 16.853633] kasan_save_alloc_info+0x40/0x58 [ 16.853717] __kasan_kmalloc+0xd4/0xd8 [ 16.853792] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.853880] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 16.855979] kunit_try_run_case+0x170/0x3f0 [ 16.856092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.856767] kthread+0x328/0x630 [ 16.856950] ret_from_fork+0x10/0x20 [ 16.857455] [ 16.857540] The buggy address belongs to the object at fff00000c78cbb80 [ 16.857540] which belongs to the cache kmalloc-64 of size 64 [ 16.857797] The buggy address is located 4 bytes inside of [ 16.857797] allocated 64-byte region [fff00000c78cbb80, fff00000c78cbbc0) [ 16.858077] [ 16.858127] The buggy address belongs to the physical page: [ 16.858183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cb [ 16.858278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.858953] page_type: f5(slab) [ 16.859222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.859340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.859431] page dumped because: kasan: bad access detected [ 16.860027] [ 16.860090] Memory state around the buggy address: [ 16.860234] fff00000c78cba80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.860534] fff00000c78cbb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.860960] >fff00000c78cbb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.861058] ^ [ 16.861130] fff00000c78cbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.861226] fff00000c78cbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.861310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 16.816957] ================================================================== [ 16.817141] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.817254] Read of size 18446744073709551614 at addr fff00000c78cba04 by task kunit_try_catch/180 [ 16.817456] [ 16.817517] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.817754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.817829] Hardware name: linux,dummy-virt (DT) [ 16.817945] Call trace: [ 16.817986] show_stack+0x20/0x38 (C) [ 16.818087] dump_stack_lvl+0x8c/0xd0 [ 16.818180] print_report+0x118/0x608 [ 16.818277] kasan_report+0xdc/0x128 [ 16.818518] kasan_check_range+0x100/0x1a8 [ 16.818827] __asan_memmove+0x3c/0x98 [ 16.819106] kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.819336] kunit_try_run_case+0x170/0x3f0 [ 16.819470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.819615] kthread+0x328/0x630 [ 16.819698] ret_from_fork+0x10/0x20 [ 16.819922] [ 16.819963] Allocated by task 180: [ 16.820018] kasan_save_stack+0x3c/0x68 [ 16.820108] kasan_save_track+0x20/0x40 [ 16.820217] kasan_save_alloc_info+0x40/0x58 [ 16.820302] __kasan_kmalloc+0xd4/0xd8 [ 16.820373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.820455] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 16.820538] kunit_try_run_case+0x170/0x3f0 [ 16.820784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.820875] kthread+0x328/0x630 [ 16.821212] ret_from_fork+0x10/0x20 [ 16.821311] [ 16.822209] The buggy address belongs to the object at fff00000c78cba00 [ 16.822209] which belongs to the cache kmalloc-64 of size 64 [ 16.822352] The buggy address is located 4 bytes inside of [ 16.822352] 64-byte region [fff00000c78cba00, fff00000c78cba40) [ 16.822462] [ 16.822506] The buggy address belongs to the physical page: [ 16.822681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cb [ 16.822970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.823187] page_type: f5(slab) [ 16.823300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.823455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.823559] page dumped because: kasan: bad access detected [ 16.823651] [ 16.823688] Memory state around the buggy address: [ 16.823763] fff00000c78cb900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 16.823896] fff00000c78cb980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.824018] >fff00000c78cba00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.824108] ^ [ 16.824164] fff00000c78cba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.824490] fff00000c78cbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.824612] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 16.797512] ================================================================== [ 16.797810] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.798051] Write of size 16 at addr fff00000c78d9269 by task kunit_try_catch/178 [ 16.798368] [ 16.798679] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.799063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.799328] Hardware name: linux,dummy-virt (DT) [ 16.799391] Call trace: [ 16.799455] show_stack+0x20/0x38 (C) [ 16.799581] dump_stack_lvl+0x8c/0xd0 [ 16.799876] print_report+0x118/0x608 [ 16.800004] kasan_report+0xdc/0x128 [ 16.800115] kasan_check_range+0x100/0x1a8 [ 16.800216] __asan_memset+0x34/0x78 [ 16.800821] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.801061] kunit_try_run_case+0x170/0x3f0 [ 16.801174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.801297] kthread+0x328/0x630 [ 16.801394] ret_from_fork+0x10/0x20 [ 16.801494] [ 16.801530] Allocated by task 178: [ 16.801586] kasan_save_stack+0x3c/0x68 [ 16.801994] kasan_save_track+0x20/0x40 [ 16.802211] kasan_save_alloc_info+0x40/0x58 [ 16.802341] __kasan_kmalloc+0xd4/0xd8 [ 16.802582] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.802678] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.802754] kunit_try_run_case+0x170/0x3f0 [ 16.802816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.802894] kthread+0x328/0x630 [ 16.802962] ret_from_fork+0x10/0x20 [ 16.803049] [ 16.803095] The buggy address belongs to the object at fff00000c78d9200 [ 16.803095] which belongs to the cache kmalloc-128 of size 128 [ 16.803220] The buggy address is located 105 bytes inside of [ 16.803220] allocated 120-byte region [fff00000c78d9200, fff00000c78d9278) [ 16.803786] [ 16.803848] The buggy address belongs to the physical page: [ 16.804162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 16.804451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.804660] page_type: f5(slab) [ 16.804862] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.805024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.805307] page dumped because: kasan: bad access detected [ 16.805586] [ 16.805710] Memory state around the buggy address: [ 16.805875] fff00000c78d9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.805975] fff00000c78d9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806064] >fff00000c78d9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.806130] ^ [ 16.806208] fff00000c78d9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806296] fff00000c78d9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806378] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 16.764607] ================================================================== [ 16.764734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 16.764841] Write of size 8 at addr fff00000c78d9171 by task kunit_try_catch/176 [ 16.764946] [ 16.765013] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.765695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.765766] Hardware name: linux,dummy-virt (DT) [ 16.765930] Call trace: [ 16.765988] show_stack+0x20/0x38 (C) [ 16.766127] dump_stack_lvl+0x8c/0xd0 [ 16.766302] print_report+0x118/0x608 [ 16.766621] kasan_report+0xdc/0x128 [ 16.766794] kasan_check_range+0x100/0x1a8 [ 16.766915] __asan_memset+0x34/0x78 [ 16.767356] kmalloc_oob_memset_8+0x150/0x2f8 [ 16.767643] kunit_try_run_case+0x170/0x3f0 [ 16.767826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.768088] kthread+0x328/0x630 [ 16.768193] ret_from_fork+0x10/0x20 [ 16.768303] [ 16.768343] Allocated by task 176: [ 16.768403] kasan_save_stack+0x3c/0x68 [ 16.768486] kasan_save_track+0x20/0x40 [ 16.768669] kasan_save_alloc_info+0x40/0x58 [ 16.768857] __kasan_kmalloc+0xd4/0xd8 [ 16.769280] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.769578] kmalloc_oob_memset_8+0xb0/0x2f8 [ 16.769698] kunit_try_run_case+0x170/0x3f0 [ 16.770059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.770232] kthread+0x328/0x630 [ 16.770350] ret_from_fork+0x10/0x20 [ 16.770437] [ 16.770666] The buggy address belongs to the object at fff00000c78d9100 [ 16.770666] which belongs to the cache kmalloc-128 of size 128 [ 16.770796] The buggy address is located 113 bytes inside of [ 16.770796] allocated 120-byte region [fff00000c78d9100, fff00000c78d9178) [ 16.770912] [ 16.770955] The buggy address belongs to the physical page: [ 16.771125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 16.771346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.771549] page_type: f5(slab) [ 16.771840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.771941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.772124] page dumped because: kasan: bad access detected [ 16.772337] [ 16.772490] Memory state around the buggy address: [ 16.772564] fff00000c78d9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.772741] fff00000c78d9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772857] >fff00000c78d9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.772937] ^ [ 16.773022] fff00000c78d9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773125] fff00000c78d9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773208] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 16.691605] ================================================================== [ 16.691723] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.691832] Write of size 2 at addr fff00000c78d9077 by task kunit_try_catch/172 [ 16.691935] [ 16.691999] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.693087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.693193] Hardware name: linux,dummy-virt (DT) [ 16.693298] Call trace: [ 16.693436] show_stack+0x20/0x38 (C) [ 16.693651] dump_stack_lvl+0x8c/0xd0 [ 16.693798] print_report+0x118/0x608 [ 16.694012] kasan_report+0xdc/0x128 [ 16.694465] kasan_check_range+0x100/0x1a8 [ 16.694575] __asan_memset+0x34/0x78 [ 16.694786] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.695009] kunit_try_run_case+0x170/0x3f0 [ 16.695113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.695356] kthread+0x328/0x630 [ 16.695723] ret_from_fork+0x10/0x20 [ 16.695904] [ 16.696010] Allocated by task 172: [ 16.696092] kasan_save_stack+0x3c/0x68 [ 16.696184] kasan_save_track+0x20/0x40 [ 16.696585] kasan_save_alloc_info+0x40/0x58 [ 16.696906] __kasan_kmalloc+0xd4/0xd8 [ 16.697024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.697234] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.697340] kunit_try_run_case+0x170/0x3f0 [ 16.697518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.697687] kthread+0x328/0x630 [ 16.698019] ret_from_fork+0x10/0x20 [ 16.698205] [ 16.698253] The buggy address belongs to the object at fff00000c78d9000 [ 16.698253] which belongs to the cache kmalloc-128 of size 128 [ 16.698458] The buggy address is located 119 bytes inside of [ 16.698458] allocated 120-byte region [fff00000c78d9000, fff00000c78d9078) [ 16.698736] [ 16.698804] The buggy address belongs to the physical page: [ 16.698863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 16.699202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.699378] page_type: f5(slab) [ 16.699550] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.699668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.699840] page dumped because: kasan: bad access detected [ 16.699934] [ 16.700186] Memory state around the buggy address: [ 16.700495] fff00000c78d8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.700687] fff00000c78d8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.700938] >fff00000c78d9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.701134] ^ [ 16.701241] fff00000c78d9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.701430] fff00000c78d9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.701564] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 16.663555] ================================================================== [ 16.663674] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.664297] Write of size 128 at addr fff00000c1094f00 by task kunit_try_catch/170 [ 16.664464] [ 16.664568] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.664772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.664840] Hardware name: linux,dummy-virt (DT) [ 16.664930] Call trace: [ 16.664995] show_stack+0x20/0x38 (C) [ 16.665122] dump_stack_lvl+0x8c/0xd0 [ 16.665223] print_report+0x118/0x608 [ 16.665318] kasan_report+0xdc/0x128 [ 16.665410] kasan_check_range+0x100/0x1a8 [ 16.665508] __asan_memset+0x34/0x78 [ 16.665602] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.665709] kunit_try_run_case+0x170/0x3f0 [ 16.665808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.665914] kthread+0x328/0x630 [ 16.665996] ret_from_fork+0x10/0x20 [ 16.666108] [ 16.666151] Allocated by task 170: [ 16.666210] kasan_save_stack+0x3c/0x68 [ 16.666401] kasan_save_track+0x20/0x40 [ 16.666472] kasan_save_alloc_info+0x40/0x58 [ 16.666551] __kasan_kmalloc+0xd4/0xd8 [ 16.666635] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.666727] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.666848] kunit_try_run_case+0x170/0x3f0 [ 16.666946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.667079] kthread+0x328/0x630 [ 16.667154] ret_from_fork+0x10/0x20 [ 16.667233] [ 16.667277] The buggy address belongs to the object at fff00000c1094f00 [ 16.667277] which belongs to the cache kmalloc-128 of size 128 [ 16.667390] The buggy address is located 0 bytes inside of [ 16.667390] allocated 120-byte region [fff00000c1094f00, fff00000c1094f78) [ 16.667713] [ 16.667832] The buggy address belongs to the physical page: [ 16.668208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 16.668520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.668640] page_type: f5(slab) [ 16.668992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.669509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.669804] page dumped because: kasan: bad access detected [ 16.669989] [ 16.670072] Memory state around the buggy address: [ 16.670178] fff00000c1094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.670308] fff00000c1094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.670545] >fff00000c1094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.670655] ^ [ 16.670734] fff00000c1094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.670817] fff00000c1095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.670893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 16.640679] ================================================================== [ 16.640797] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 16.640905] Read of size 16 at addr fff00000c10cc820 by task kunit_try_catch/168 [ 16.641011] [ 16.641085] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.641259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.641313] Hardware name: linux,dummy-virt (DT) [ 16.641374] Call trace: [ 16.641417] show_stack+0x20/0x38 (C) [ 16.641518] dump_stack_lvl+0x8c/0xd0 [ 16.641617] print_report+0x118/0x608 [ 16.641709] kasan_report+0xdc/0x128 [ 16.641808] __asan_report_load16_noabort+0x20/0x30 [ 16.642553] kmalloc_uaf_16+0x3bc/0x438 [ 16.642678] kunit_try_run_case+0x170/0x3f0 [ 16.642784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.642895] kthread+0x328/0x630 [ 16.642998] ret_from_fork+0x10/0x20 [ 16.643146] [ 16.643191] Allocated by task 168: [ 16.643358] kasan_save_stack+0x3c/0x68 [ 16.643451] kasan_save_track+0x20/0x40 [ 16.643516] kasan_save_alloc_info+0x40/0x58 [ 16.643579] __kasan_kmalloc+0xd4/0xd8 [ 16.643645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.643713] kmalloc_uaf_16+0x140/0x438 [ 16.643780] kunit_try_run_case+0x170/0x3f0 [ 16.643851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.643939] kthread+0x328/0x630 [ 16.644407] ret_from_fork+0x10/0x20 [ 16.644691] [ 16.644754] Freed by task 168: [ 16.644834] kasan_save_stack+0x3c/0x68 [ 16.644916] kasan_save_track+0x20/0x40 [ 16.644990] kasan_save_free_info+0x4c/0x78 [ 16.645082] __kasan_slab_free+0x6c/0x98 [ 16.645153] kfree+0x214/0x3c8 [ 16.645220] kmalloc_uaf_16+0x190/0x438 [ 16.645296] kunit_try_run_case+0x170/0x3f0 [ 16.645369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.645454] kthread+0x328/0x630 [ 16.645524] ret_from_fork+0x10/0x20 [ 16.645596] [ 16.645645] The buggy address belongs to the object at fff00000c10cc820 [ 16.645645] which belongs to the cache kmalloc-16 of size 16 [ 16.645816] The buggy address is located 0 bytes inside of [ 16.645816] freed 16-byte region [fff00000c10cc820, fff00000c10cc830) [ 16.645985] [ 16.646026] The buggy address belongs to the physical page: [ 16.646459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc [ 16.646589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.646866] page_type: f5(slab) [ 16.646955] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.647114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.647221] page dumped because: kasan: bad access detected [ 16.647285] [ 16.647319] Memory state around the buggy address: [ 16.647383] fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 16.647494] fff00000c10cc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.647594] >fff00000c10cc800: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 16.647664] ^ [ 16.647725] fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648053] fff00000c10cc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 16.612650] ================================================================== [ 16.612835] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 16.612943] Write of size 16 at addr fff00000c10cc7c0 by task kunit_try_catch/166 [ 16.613088] [ 16.613177] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.613394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.613442] Hardware name: linux,dummy-virt (DT) [ 16.613501] Call trace: [ 16.613542] show_stack+0x20/0x38 (C) [ 16.613715] dump_stack_lvl+0x8c/0xd0 [ 16.613805] print_report+0x118/0x608 [ 16.613898] kasan_report+0xdc/0x128 [ 16.614063] __asan_report_store16_noabort+0x20/0x30 [ 16.614178] kmalloc_oob_16+0x3a0/0x3f8 [ 16.614292] kunit_try_run_case+0x170/0x3f0 [ 16.614418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.614649] kthread+0x328/0x630 [ 16.614767] ret_from_fork+0x10/0x20 [ 16.614874] [ 16.614936] Allocated by task 166: [ 16.615017] kasan_save_stack+0x3c/0x68 [ 16.615114] kasan_save_track+0x20/0x40 [ 16.615188] kasan_save_alloc_info+0x40/0x58 [ 16.615287] __kasan_kmalloc+0xd4/0xd8 [ 16.615359] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.615471] kmalloc_oob_16+0xb4/0x3f8 [ 16.615549] kunit_try_run_case+0x170/0x3f0 [ 16.615622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.615706] kthread+0x328/0x630 [ 16.615774] ret_from_fork+0x10/0x20 [ 16.615846] [ 16.615884] The buggy address belongs to the object at fff00000c10cc7c0 [ 16.615884] which belongs to the cache kmalloc-16 of size 16 [ 16.616002] The buggy address is located 0 bytes inside of [ 16.616002] allocated 13-byte region [fff00000c10cc7c0, fff00000c10cc7cd) [ 16.616123] [ 16.616162] The buggy address belongs to the physical page: [ 16.616786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc [ 16.616991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.617116] page_type: f5(slab) [ 16.617498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.617859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.618115] page dumped because: kasan: bad access detected [ 16.618189] [ 16.618227] Memory state around the buggy address: [ 16.618296] fff00000c10cc680: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 16.618594] fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 16.618731] >fff00000c10cc780: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 16.618800] ^ [ 16.619108] fff00000c10cc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.619347] fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.619509] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 16.588984] ================================================================== [ 16.589137] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 16.589241] Read of size 1 at addr fff00000c450a600 by task kunit_try_catch/164 [ 16.589338] [ 16.589394] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.590013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.590166] Hardware name: linux,dummy-virt (DT) [ 16.590250] Call trace: [ 16.590299] show_stack+0x20/0x38 (C) [ 16.590408] dump_stack_lvl+0x8c/0xd0 [ 16.590492] print_report+0x118/0x608 [ 16.590572] kasan_report+0xdc/0x128 [ 16.590657] __kasan_check_byte+0x54/0x70 [ 16.590753] krealloc_noprof+0x44/0x360 [ 16.590848] krealloc_uaf+0x180/0x520 [ 16.590938] kunit_try_run_case+0x170/0x3f0 [ 16.591033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.591371] kthread+0x328/0x630 [ 16.591672] ret_from_fork+0x10/0x20 [ 16.591776] [ 16.591818] Allocated by task 164: [ 16.591882] kasan_save_stack+0x3c/0x68 [ 16.592224] kasan_save_track+0x20/0x40 [ 16.592455] kasan_save_alloc_info+0x40/0x58 [ 16.592597] __kasan_kmalloc+0xd4/0xd8 [ 16.592709] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.592782] krealloc_uaf+0xc8/0x520 [ 16.593189] kunit_try_run_case+0x170/0x3f0 [ 16.593283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.593581] kthread+0x328/0x630 [ 16.593661] ret_from_fork+0x10/0x20 [ 16.594007] [ 16.594240] Freed by task 164: [ 16.594323] kasan_save_stack+0x3c/0x68 [ 16.594472] kasan_save_track+0x20/0x40 [ 16.594552] kasan_save_free_info+0x4c/0x78 [ 16.594822] __kasan_slab_free+0x6c/0x98 [ 16.594896] kfree+0x214/0x3c8 [ 16.594972] krealloc_uaf+0x12c/0x520 [ 16.595054] kunit_try_run_case+0x170/0x3f0 [ 16.595134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.595591] kthread+0x328/0x630 [ 16.595687] ret_from_fork+0x10/0x20 [ 16.595833] [ 16.595874] The buggy address belongs to the object at fff00000c450a600 [ 16.595874] which belongs to the cache kmalloc-256 of size 256 [ 16.596442] The buggy address is located 0 bytes inside of [ 16.596442] freed 256-byte region [fff00000c450a600, fff00000c450a700) [ 16.596653] [ 16.596699] The buggy address belongs to the physical page: [ 16.596926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.597133] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.597232] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.597330] page_type: f5(slab) [ 16.597408] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.597513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.598561] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.598742] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.598857] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.598959] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.599056] page dumped because: kasan: bad access detected [ 16.599163] [ 16.599218] Memory state around the buggy address: [ 16.599285] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599373] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599453] >fff00000c450a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.599540] ^ [ 16.599622] fff00000c450a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.599711] fff00000c450a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599789] ================================================================== [ 16.600690] ================================================================== [ 16.600786] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 16.600925] Read of size 1 at addr fff00000c450a600 by task kunit_try_catch/164 [ 16.601028] [ 16.601115] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.601325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.601402] Hardware name: linux,dummy-virt (DT) [ 16.601505] Call trace: [ 16.601573] show_stack+0x20/0x38 (C) [ 16.601679] dump_stack_lvl+0x8c/0xd0 [ 16.601808] print_report+0x118/0x608 [ 16.601913] kasan_report+0xdc/0x128 [ 16.602049] __asan_report_load1_noabort+0x20/0x30 [ 16.602165] krealloc_uaf+0x4c8/0x520 [ 16.602268] kunit_try_run_case+0x170/0x3f0 [ 16.602352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.602451] kthread+0x328/0x630 [ 16.602528] ret_from_fork+0x10/0x20 [ 16.602676] [ 16.602723] Allocated by task 164: [ 16.602780] kasan_save_stack+0x3c/0x68 [ 16.602858] kasan_save_track+0x20/0x40 [ 16.602921] kasan_save_alloc_info+0x40/0x58 [ 16.602990] __kasan_kmalloc+0xd4/0xd8 [ 16.603074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.603191] krealloc_uaf+0xc8/0x520 [ 16.603289] kunit_try_run_case+0x170/0x3f0 [ 16.603364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.603456] kthread+0x328/0x630 [ 16.603556] ret_from_fork+0x10/0x20 [ 16.603650] [ 16.603705] Freed by task 164: [ 16.603781] kasan_save_stack+0x3c/0x68 [ 16.603872] kasan_save_track+0x20/0x40 [ 16.603941] kasan_save_free_info+0x4c/0x78 [ 16.604037] __kasan_slab_free+0x6c/0x98 [ 16.604315] kfree+0x214/0x3c8 [ 16.604394] krealloc_uaf+0x12c/0x520 [ 16.604463] kunit_try_run_case+0x170/0x3f0 [ 16.604536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.604622] kthread+0x328/0x630 [ 16.604784] ret_from_fork+0x10/0x20 [ 16.604846] [ 16.604885] The buggy address belongs to the object at fff00000c450a600 [ 16.604885] which belongs to the cache kmalloc-256 of size 256 [ 16.605009] The buggy address is located 0 bytes inside of [ 16.605009] freed 256-byte region [fff00000c450a600, fff00000c450a700) [ 16.605184] [ 16.605225] The buggy address belongs to the physical page: [ 16.605291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.605419] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.605542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.605675] page_type: f5(slab) [ 16.605772] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.605910] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.605969] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.606015] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.606095] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.606141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.606178] page dumped because: kasan: bad access detected [ 16.606207] [ 16.606225] Memory state around the buggy address: [ 16.606254] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.606293] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.606332] >fff00000c450a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.606365] ^ [ 16.606391] fff00000c450a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.606429] fff00000c450a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.606463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 16.476973] ================================================================== [ 16.477074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.477170] Write of size 1 at addr fff00000c450a4d0 by task kunit_try_catch/158 [ 16.477273] [ 16.477332] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.477503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.477558] Hardware name: linux,dummy-virt (DT) [ 16.477617] Call trace: [ 16.477660] show_stack+0x20/0x38 (C) [ 16.477760] dump_stack_lvl+0x8c/0xd0 [ 16.477859] print_report+0x118/0x608 [ 16.477967] kasan_report+0xdc/0x128 [ 16.478092] __asan_report_store1_noabort+0x20/0x30 [ 16.478190] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.478287] krealloc_less_oob+0x20/0x38 [ 16.478387] kunit_try_run_case+0x170/0x3f0 [ 16.478480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.478577] kthread+0x328/0x630 [ 16.478668] ret_from_fork+0x10/0x20 [ 16.478774] [ 16.478816] Allocated by task 158: [ 16.478879] kasan_save_stack+0x3c/0x68 [ 16.478955] kasan_save_track+0x20/0x40 [ 16.479035] kasan_save_alloc_info+0x40/0x58 [ 16.479167] __kasan_krealloc+0x118/0x178 [ 16.479250] krealloc_noprof+0x128/0x360 [ 16.479336] krealloc_less_oob_helper+0x168/0xc50 [ 16.479418] krealloc_less_oob+0x20/0x38 [ 16.479520] kunit_try_run_case+0x170/0x3f0 [ 16.479602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.479679] kthread+0x328/0x630 [ 16.479744] ret_from_fork+0x10/0x20 [ 16.479806] [ 16.479840] The buggy address belongs to the object at fff00000c450a400 [ 16.479840] which belongs to the cache kmalloc-256 of size 256 [ 16.479941] The buggy address is located 7 bytes to the right of [ 16.479941] allocated 201-byte region [fff00000c450a400, fff00000c450a4c9) [ 16.480087] [ 16.480130] The buggy address belongs to the physical page: [ 16.480187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.480290] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.480382] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.480483] page_type: f5(slab) [ 16.480599] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.480710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.480806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.480903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.481008] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.481123] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.481217] page dumped because: kasan: bad access detected [ 16.481275] [ 16.481310] Memory state around the buggy address: [ 16.481366] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.481440] fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.481529] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.481597] ^ [ 16.481703] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.481807] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.481935] ================================================================== [ 16.555254] ================================================================== [ 16.555405] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.555555] Write of size 1 at addr fff00000c78e20da by task kunit_try_catch/162 [ 16.555678] [ 16.555742] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.555924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.555980] Hardware name: linux,dummy-virt (DT) [ 16.556051] Call trace: [ 16.556091] show_stack+0x20/0x38 (C) [ 16.556176] dump_stack_lvl+0x8c/0xd0 [ 16.556301] print_report+0x118/0x608 [ 16.556413] kasan_report+0xdc/0x128 [ 16.556512] __asan_report_store1_noabort+0x20/0x30 [ 16.556606] krealloc_less_oob_helper+0xa80/0xc50 [ 16.556982] krealloc_large_less_oob+0x20/0x38 [ 16.557263] kunit_try_run_case+0x170/0x3f0 [ 16.557357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.557502] kthread+0x328/0x630 [ 16.557597] ret_from_fork+0x10/0x20 [ 16.557725] [ 16.557761] The buggy address belongs to the physical page: [ 16.557833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.558304] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.558399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.558487] page_type: f8(unknown) [ 16.558527] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.558583] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.558632] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.558676] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.558720] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.558764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.558801] page dumped because: kasan: bad access detected [ 16.558830] [ 16.558848] Memory state around the buggy address: [ 16.558878] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.558918] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.558956] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.558990] ^ [ 16.559024] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.559086] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.559122] ================================================================== [ 16.483220] ================================================================== [ 16.483315] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.483412] Write of size 1 at addr fff00000c450a4da by task kunit_try_catch/158 [ 16.483514] [ 16.483573] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.484189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.484269] Hardware name: linux,dummy-virt (DT) [ 16.484338] Call trace: [ 16.484388] show_stack+0x20/0x38 (C) [ 16.484628] dump_stack_lvl+0x8c/0xd0 [ 16.484858] print_report+0x118/0x608 [ 16.485065] kasan_report+0xdc/0x128 [ 16.485485] __asan_report_store1_noabort+0x20/0x30 [ 16.485731] krealloc_less_oob_helper+0xa80/0xc50 [ 16.485948] krealloc_less_oob+0x20/0x38 [ 16.486031] kunit_try_run_case+0x170/0x3f0 [ 16.486137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.486323] kthread+0x328/0x630 [ 16.486663] ret_from_fork+0x10/0x20 [ 16.486766] [ 16.486887] Allocated by task 158: [ 16.486950] kasan_save_stack+0x3c/0x68 [ 16.487089] kasan_save_track+0x20/0x40 [ 16.487189] kasan_save_alloc_info+0x40/0x58 [ 16.487310] __kasan_krealloc+0x118/0x178 [ 16.487388] krealloc_noprof+0x128/0x360 [ 16.487461] krealloc_less_oob_helper+0x168/0xc50 [ 16.487538] krealloc_less_oob+0x20/0x38 [ 16.487609] kunit_try_run_case+0x170/0x3f0 [ 16.487681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.487765] kthread+0x328/0x630 [ 16.487831] ret_from_fork+0x10/0x20 [ 16.487900] [ 16.487940] The buggy address belongs to the object at fff00000c450a400 [ 16.487940] which belongs to the cache kmalloc-256 of size 256 [ 16.488068] The buggy address is located 17 bytes to the right of [ 16.488068] allocated 201-byte region [fff00000c450a400, fff00000c450a4c9) [ 16.488206] [ 16.488252] The buggy address belongs to the physical page: [ 16.488338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.488496] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.488593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.488704] page_type: f5(slab) [ 16.488811] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.488957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.489067] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.489155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.489250] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.489344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.489412] page dumped because: kasan: bad access detected [ 16.489470] [ 16.489501] Memory state around the buggy address: [ 16.489567] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.489655] fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.489735] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.489812] ^ [ 16.489901] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.489997] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.490088] ================================================================== [ 16.559460] ================================================================== [ 16.559555] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.559661] Write of size 1 at addr fff00000c78e20ea by task kunit_try_catch/162 [ 16.559768] [ 16.559828] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.560002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.560067] Hardware name: linux,dummy-virt (DT) [ 16.560132] Call trace: [ 16.560179] show_stack+0x20/0x38 (C) [ 16.560282] dump_stack_lvl+0x8c/0xd0 [ 16.560384] print_report+0x118/0x608 [ 16.560480] kasan_report+0xdc/0x128 [ 16.561090] __asan_report_store1_noabort+0x20/0x30 [ 16.562150] krealloc_less_oob_helper+0xae4/0xc50 [ 16.562538] krealloc_large_less_oob+0x20/0x38 [ 16.562651] kunit_try_run_case+0x170/0x3f0 [ 16.563381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.564090] kthread+0x328/0x630 [ 16.564616] ret_from_fork+0x10/0x20 [ 16.565091] [ 16.565137] The buggy address belongs to the physical page: [ 16.565641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.566242] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.566406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.566569] page_type: f8(unknown) [ 16.566684] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.566957] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.567667] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.567806] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.567916] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.568024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.568125] page dumped because: kasan: bad access detected [ 16.568193] [ 16.568712] Memory state around the buggy address: [ 16.568991] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.569794] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.570002] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.570304] ^ [ 16.570400] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.570499] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.570581] ================================================================== [ 16.490863] ================================================================== [ 16.491211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.491321] Write of size 1 at addr fff00000c450a4ea by task kunit_try_catch/158 [ 16.491425] [ 16.491483] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.491647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.491703] Hardware name: linux,dummy-virt (DT) [ 16.491843] Call trace: [ 16.491893] show_stack+0x20/0x38 (C) [ 16.492068] dump_stack_lvl+0x8c/0xd0 [ 16.492264] print_report+0x118/0x608 [ 16.492365] kasan_report+0xdc/0x128 [ 16.492521] __asan_report_store1_noabort+0x20/0x30 [ 16.492634] krealloc_less_oob_helper+0xae4/0xc50 [ 16.492740] krealloc_less_oob+0x20/0x38 [ 16.493203] kunit_try_run_case+0x170/0x3f0 [ 16.493333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.493437] kthread+0x328/0x630 [ 16.493532] ret_from_fork+0x10/0x20 [ 16.493629] [ 16.493667] Allocated by task 158: [ 16.493723] kasan_save_stack+0x3c/0x68 [ 16.493805] kasan_save_track+0x20/0x40 [ 16.493878] kasan_save_alloc_info+0x40/0x58 [ 16.493971] __kasan_krealloc+0x118/0x178 [ 16.494310] krealloc_noprof+0x128/0x360 [ 16.494501] krealloc_less_oob_helper+0x168/0xc50 [ 16.494550] krealloc_less_oob+0x20/0x38 [ 16.494598] kunit_try_run_case+0x170/0x3f0 [ 16.494656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.494758] kthread+0x328/0x630 [ 16.494854] ret_from_fork+0x10/0x20 [ 16.494929] [ 16.494964] The buggy address belongs to the object at fff00000c450a400 [ 16.494964] which belongs to the cache kmalloc-256 of size 256 [ 16.495109] The buggy address is located 33 bytes to the right of [ 16.495109] allocated 201-byte region [fff00000c450a400, fff00000c450a4c9) [ 16.495233] [ 16.495269] The buggy address belongs to the physical page: [ 16.495327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.495622] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.495733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.495887] page_type: f5(slab) [ 16.495976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.496092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.496203] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.496312] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.496408] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.496513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.496601] page dumped because: kasan: bad access detected [ 16.496667] [ 16.496706] Memory state around the buggy address: [ 16.496779] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.496867] fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.496955] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.497259] ^ [ 16.497455] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.497542] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.497653] ================================================================== [ 16.498631] ================================================================== [ 16.498730] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.498830] Write of size 1 at addr fff00000c450a4eb by task kunit_try_catch/158 [ 16.498935] [ 16.498994] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.499184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.499241] Hardware name: linux,dummy-virt (DT) [ 16.499303] Call trace: [ 16.499347] show_stack+0x20/0x38 (C) [ 16.499450] dump_stack_lvl+0x8c/0xd0 [ 16.499552] print_report+0x118/0x608 [ 16.499646] kasan_report+0xdc/0x128 [ 16.499739] __asan_report_store1_noabort+0x20/0x30 [ 16.499843] krealloc_less_oob_helper+0xa58/0xc50 [ 16.499943] krealloc_less_oob+0x20/0x38 [ 16.500038] kunit_try_run_case+0x170/0x3f0 [ 16.500786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.500934] kthread+0x328/0x630 [ 16.501835] ret_from_fork+0x10/0x20 [ 16.501968] [ 16.502024] Allocated by task 158: [ 16.502118] kasan_save_stack+0x3c/0x68 [ 16.502212] kasan_save_track+0x20/0x40 [ 16.502288] kasan_save_alloc_info+0x40/0x58 [ 16.502365] __kasan_krealloc+0x118/0x178 [ 16.502440] krealloc_noprof+0x128/0x360 [ 16.502512] krealloc_less_oob_helper+0x168/0xc50 [ 16.502598] krealloc_less_oob+0x20/0x38 [ 16.502664] kunit_try_run_case+0x170/0x3f0 [ 16.502724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.502796] kthread+0x328/0x630 [ 16.502862] ret_from_fork+0x10/0x20 [ 16.503301] [ 16.503356] The buggy address belongs to the object at fff00000c450a400 [ 16.503356] which belongs to the cache kmalloc-256 of size 256 [ 16.503927] The buggy address is located 34 bytes to the right of [ 16.503927] allocated 201-byte region [fff00000c450a400, fff00000c450a4c9) [ 16.504201] [ 16.504252] The buggy address belongs to the physical page: [ 16.504315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.504759] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.504948] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.505164] page_type: f5(slab) [ 16.505274] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.505552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.505755] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.506269] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.506395] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.506544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.506681] page dumped because: kasan: bad access detected [ 16.506778] [ 16.506966] Memory state around the buggy address: [ 16.507072] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.507163] fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.507242] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.507312] ^ [ 16.507814] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.508154] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.508275] ================================================================== [ 16.549211] ================================================================== [ 16.549422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.549633] Write of size 1 at addr fff00000c78e20d0 by task kunit_try_catch/162 [ 16.549739] [ 16.549827] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.550023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.550122] Hardware name: linux,dummy-virt (DT) [ 16.550207] Call trace: [ 16.550249] show_stack+0x20/0x38 (C) [ 16.550364] dump_stack_lvl+0x8c/0xd0 [ 16.550506] print_report+0x118/0x608 [ 16.550618] kasan_report+0xdc/0x128 [ 16.550798] __asan_report_store1_noabort+0x20/0x30 [ 16.550894] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.550991] krealloc_large_less_oob+0x20/0x38 [ 16.551138] kunit_try_run_case+0x170/0x3f0 [ 16.551252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.551634] kthread+0x328/0x630 [ 16.551726] ret_from_fork+0x10/0x20 [ 16.551817] [ 16.551851] The buggy address belongs to the physical page: [ 16.551927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.552053] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.552194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.552345] page_type: f8(unknown) [ 16.552455] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.552607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.552731] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.552874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.552989] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.553101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.553184] page dumped because: kasan: bad access detected [ 16.553288] [ 16.553324] Memory state around the buggy address: [ 16.553526] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.553655] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.553916] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.554035] ^ [ 16.554211] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.554307] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.554393] ================================================================== [ 16.571798] ================================================================== [ 16.571892] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.571992] Write of size 1 at addr fff00000c78e20eb by task kunit_try_catch/162 [ 16.572108] [ 16.572170] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.572344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.572401] Hardware name: linux,dummy-virt (DT) [ 16.572468] Call trace: [ 16.572515] show_stack+0x20/0x38 (C) [ 16.572616] dump_stack_lvl+0x8c/0xd0 [ 16.572716] print_report+0x118/0x608 [ 16.572811] kasan_report+0xdc/0x128 [ 16.572910] __asan_report_store1_noabort+0x20/0x30 [ 16.573019] krealloc_less_oob_helper+0xa58/0xc50 [ 16.573136] krealloc_large_less_oob+0x20/0x38 [ 16.573237] kunit_try_run_case+0x170/0x3f0 [ 16.573336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.573450] kthread+0x328/0x630 [ 16.573553] ret_from_fork+0x10/0x20 [ 16.573648] [ 16.573687] The buggy address belongs to the physical page: [ 16.573786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.573967] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.574125] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.574279] page_type: f8(unknown) [ 16.574377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.574466] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.574554] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.574651] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.574752] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.574885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.574958] page dumped because: kasan: bad access detected [ 16.575021] [ 16.575519] Memory state around the buggy address: [ 16.575639] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.575870] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.576066] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.576191] ^ [ 16.576280] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.576372] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.576455] ================================================================== [ 16.539885] ================================================================== [ 16.539997] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.540118] Write of size 1 at addr fff00000c78e20c9 by task kunit_try_catch/162 [ 16.540212] [ 16.540647] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.541156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.541227] Hardware name: linux,dummy-virt (DT) [ 16.541285] Call trace: [ 16.541336] show_stack+0x20/0x38 (C) [ 16.541483] dump_stack_lvl+0x8c/0xd0 [ 16.541616] print_report+0x118/0x608 [ 16.541745] kasan_report+0xdc/0x128 [ 16.541867] __asan_report_store1_noabort+0x20/0x30 [ 16.542151] krealloc_less_oob_helper+0xa48/0xc50 [ 16.542545] krealloc_large_less_oob+0x20/0x38 [ 16.542645] kunit_try_run_case+0x170/0x3f0 [ 16.542877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.543207] kthread+0x328/0x630 [ 16.543394] ret_from_fork+0x10/0x20 [ 16.543514] [ 16.543674] The buggy address belongs to the physical page: [ 16.543763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.543874] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.544238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.544495] page_type: f8(unknown) [ 16.544735] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.544916] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.545096] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.545545] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.547117] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.547201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.547240] page dumped because: kasan: bad access detected [ 16.547274] [ 16.547293] Memory state around the buggy address: [ 16.547332] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.547403] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.547645] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.547875] ^ [ 16.548020] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.548309] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.548426] ================================================================== [ 16.471012] ================================================================== [ 16.471172] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.471306] Write of size 1 at addr fff00000c450a4c9 by task kunit_try_catch/158 [ 16.471436] [ 16.471521] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.471704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.471754] Hardware name: linux,dummy-virt (DT) [ 16.471811] Call trace: [ 16.471855] show_stack+0x20/0x38 (C) [ 16.471937] dump_stack_lvl+0x8c/0xd0 [ 16.472022] print_report+0x118/0x608 [ 16.472121] kasan_report+0xdc/0x128 [ 16.472223] __asan_report_store1_noabort+0x20/0x30 [ 16.472342] krealloc_less_oob_helper+0xa48/0xc50 [ 16.472474] krealloc_less_oob+0x20/0x38 [ 16.472587] kunit_try_run_case+0x170/0x3f0 [ 16.472701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.472876] kthread+0x328/0x630 [ 16.472941] ret_from_fork+0x10/0x20 [ 16.472988] [ 16.473007] Allocated by task 158: [ 16.473034] kasan_save_stack+0x3c/0x68 [ 16.473128] kasan_save_track+0x20/0x40 [ 16.473202] kasan_save_alloc_info+0x40/0x58 [ 16.473280] __kasan_krealloc+0x118/0x178 [ 16.473382] krealloc_noprof+0x128/0x360 [ 16.473491] krealloc_less_oob_helper+0x168/0xc50 [ 16.473569] krealloc_less_oob+0x20/0x38 [ 16.473639] kunit_try_run_case+0x170/0x3f0 [ 16.473711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.473795] kthread+0x328/0x630 [ 16.473866] ret_from_fork+0x10/0x20 [ 16.473976] [ 16.474014] The buggy address belongs to the object at fff00000c450a400 [ 16.474014] which belongs to the cache kmalloc-256 of size 256 [ 16.474139] The buggy address is located 0 bytes to the right of [ 16.474139] allocated 201-byte region [fff00000c450a400, fff00000c450a4c9) [ 16.474248] [ 16.474285] The buggy address belongs to the physical page: [ 16.474343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.474453] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.474583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.474712] page_type: f5(slab) [ 16.474823] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.474952] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.475100] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.475203] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.475293] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.475373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.475473] page dumped because: kasan: bad access detected [ 16.475534] [ 16.475568] Memory state around the buggy address: [ 16.475621] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.475699] fff00000c450a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.475774] >fff00000c450a480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.475848] ^ [ 16.475913] fff00000c450a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.476008] fff00000c450a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.476101] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 16.518442] ================================================================== [ 16.518569] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.518675] Write of size 1 at addr fff00000c78e20eb by task kunit_try_catch/160 [ 16.518783] [ 16.518844] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.519009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.519071] Hardware name: linux,dummy-virt (DT) [ 16.519134] Call trace: [ 16.519176] show_stack+0x20/0x38 (C) [ 16.519265] dump_stack_lvl+0x8c/0xd0 [ 16.519348] print_report+0x118/0x608 [ 16.519428] kasan_report+0xdc/0x128 [ 16.519513] __asan_report_store1_noabort+0x20/0x30 [ 16.519619] krealloc_more_oob_helper+0x60c/0x678 [ 16.519719] krealloc_large_more_oob+0x20/0x38 [ 16.519820] kunit_try_run_case+0x170/0x3f0 [ 16.520081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.520201] kthread+0x328/0x630 [ 16.520532] ret_from_fork+0x10/0x20 [ 16.520698] [ 16.520746] The buggy address belongs to the physical page: [ 16.520811] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.520926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.521017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.521452] page_type: f8(unknown) [ 16.521558] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.521657] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.521755] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.522036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.522196] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.522307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.522390] page dumped because: kasan: bad access detected [ 16.522451] [ 16.522486] Memory state around the buggy address: [ 16.522549] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.522640] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.522719] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.522792] ^ [ 16.522896] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.523197] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.523311] ================================================================== [ 16.442994] ================================================================== [ 16.443113] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.443284] Write of size 1 at addr fff00000c450a2f0 by task kunit_try_catch/156 [ 16.443739] [ 16.443814] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.444085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.444148] Hardware name: linux,dummy-virt (DT) [ 16.444274] Call trace: [ 16.444322] show_stack+0x20/0x38 (C) [ 16.444609] dump_stack_lvl+0x8c/0xd0 [ 16.444920] print_report+0x118/0x608 [ 16.445019] kasan_report+0xdc/0x128 [ 16.445126] __asan_report_store1_noabort+0x20/0x30 [ 16.445229] krealloc_more_oob_helper+0x5c0/0x678 [ 16.445321] krealloc_more_oob+0x20/0x38 [ 16.445416] kunit_try_run_case+0x170/0x3f0 [ 16.445515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.445623] kthread+0x328/0x630 [ 16.446299] ret_from_fork+0x10/0x20 [ 16.446617] [ 16.447000] Allocated by task 156: [ 16.447088] kasan_save_stack+0x3c/0x68 [ 16.447300] kasan_save_track+0x20/0x40 [ 16.447440] kasan_save_alloc_info+0x40/0x58 [ 16.447521] __kasan_krealloc+0x118/0x178 [ 16.447612] krealloc_noprof+0x128/0x360 [ 16.447683] krealloc_more_oob_helper+0x168/0x678 [ 16.447987] krealloc_more_oob+0x20/0x38 [ 16.448306] kunit_try_run_case+0x170/0x3f0 [ 16.448400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.448501] kthread+0x328/0x630 [ 16.448741] ret_from_fork+0x10/0x20 [ 16.448833] [ 16.448883] The buggy address belongs to the object at fff00000c450a200 [ 16.448883] which belongs to the cache kmalloc-256 of size 256 [ 16.449153] The buggy address is located 5 bytes to the right of [ 16.449153] allocated 235-byte region [fff00000c450a200, fff00000c450a2eb) [ 16.449351] [ 16.449397] The buggy address belongs to the physical page: [ 16.449510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.449621] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.449792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.449969] page_type: f5(slab) [ 16.450065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.450154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.450667] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.450933] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.451161] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.451350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.451628] page dumped because: kasan: bad access detected [ 16.451903] [ 16.451963] Memory state around the buggy address: [ 16.452111] fff00000c450a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.452209] fff00000c450a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.452468] >fff00000c450a280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.452619] ^ [ 16.453013] fff00000c450a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453132] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453215] ================================================================== [ 16.524667] ================================================================== [ 16.524801] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.525136] Write of size 1 at addr fff00000c78e20f0 by task kunit_try_catch/160 [ 16.525237] [ 16.525298] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.525475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.525531] Hardware name: linux,dummy-virt (DT) [ 16.525594] Call trace: [ 16.525638] show_stack+0x20/0x38 (C) [ 16.525741] dump_stack_lvl+0x8c/0xd0 [ 16.525845] print_report+0x118/0x608 [ 16.525945] kasan_report+0xdc/0x128 [ 16.526091] __asan_report_store1_noabort+0x20/0x30 [ 16.526232] krealloc_more_oob_helper+0x5c0/0x678 [ 16.526350] krealloc_large_more_oob+0x20/0x38 [ 16.526489] kunit_try_run_case+0x170/0x3f0 [ 16.526644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.526796] kthread+0x328/0x630 [ 16.526912] ret_from_fork+0x10/0x20 [ 16.527031] [ 16.527296] The buggy address belongs to the physical page: [ 16.527380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.527501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.527605] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.527803] page_type: f8(unknown) [ 16.527919] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.528052] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.528612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.528750] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.528866] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.529061] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.529152] page dumped because: kasan: bad access detected [ 16.529231] [ 16.529286] Memory state around the buggy address: [ 16.529371] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.529460] fff00000c78e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.529553] >fff00000c78e2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.529635] ^ [ 16.529719] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.529811] fff00000c78e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.529928] ================================================================== [ 16.424868] ================================================================== [ 16.424988] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.426239] Write of size 1 at addr fff00000c450a2eb by task kunit_try_catch/156 [ 16.426337] [ 16.426407] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.426937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.427059] Hardware name: linux,dummy-virt (DT) [ 16.427121] Call trace: [ 16.427564] show_stack+0x20/0x38 (C) [ 16.427754] dump_stack_lvl+0x8c/0xd0 [ 16.428433] print_report+0x118/0x608 [ 16.428856] kasan_report+0xdc/0x128 [ 16.429036] __asan_report_store1_noabort+0x20/0x30 [ 16.429152] krealloc_more_oob_helper+0x60c/0x678 [ 16.429857] krealloc_more_oob+0x20/0x38 [ 16.430378] kunit_try_run_case+0x170/0x3f0 [ 16.430556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.430866] kthread+0x328/0x630 [ 16.431172] ret_from_fork+0x10/0x20 [ 16.431285] [ 16.431326] Allocated by task 156: [ 16.431386] kasan_save_stack+0x3c/0x68 [ 16.431461] kasan_save_track+0x20/0x40 [ 16.431536] kasan_save_alloc_info+0x40/0x58 [ 16.431615] __kasan_krealloc+0x118/0x178 [ 16.431688] krealloc_noprof+0x128/0x360 [ 16.432622] krealloc_more_oob_helper+0x168/0x678 [ 16.433183] krealloc_more_oob+0x20/0x38 [ 16.433346] kunit_try_run_case+0x170/0x3f0 [ 16.433428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.433828] kthread+0x328/0x630 [ 16.434251] ret_from_fork+0x10/0x20 [ 16.434379] [ 16.434591] The buggy address belongs to the object at fff00000c450a200 [ 16.434591] which belongs to the cache kmalloc-256 of size 256 [ 16.434942] The buggy address is located 0 bytes to the right of [ 16.434942] allocated 235-byte region [fff00000c450a200, fff00000c450a2eb) [ 16.435351] [ 16.435561] The buggy address belongs to the physical page: [ 16.435844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10450a [ 16.436214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.436472] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.436861] page_type: f5(slab) [ 16.437052] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.437249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.437599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.437989] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.438273] head: 0bfffe0000000001 ffffc1ffc3114281 00000000ffffffff 00000000ffffffff [ 16.438377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.438768] page dumped because: kasan: bad access detected [ 16.438968] [ 16.439159] Memory state around the buggy address: [ 16.439305] fff00000c450a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.439398] fff00000c450a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.439898] >fff00000c450a280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.440291] ^ [ 16.440507] fff00000c450a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.440599] fff00000c450a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.440910] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 16.397239] ================================================================== [ 16.397370] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 16.397631] Read of size 1 at addr fff00000c7910000 by task kunit_try_catch/154 [ 16.397872] [ 16.397940] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.398441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.398545] Hardware name: linux,dummy-virt (DT) [ 16.398627] Call trace: [ 16.398676] show_stack+0x20/0x38 (C) [ 16.398999] dump_stack_lvl+0x8c/0xd0 [ 16.399141] print_report+0x118/0x608 [ 16.399235] kasan_report+0xdc/0x128 [ 16.399409] __asan_report_load1_noabort+0x20/0x30 [ 16.399505] page_alloc_uaf+0x328/0x350 [ 16.399651] kunit_try_run_case+0x170/0x3f0 [ 16.399899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.400138] kthread+0x328/0x630 [ 16.400371] ret_from_fork+0x10/0x20 [ 16.400888] [ 16.400953] The buggy address belongs to the physical page: [ 16.401130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 16.401384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.401706] page_type: f0(buddy) [ 16.401832] raw: 0bfffe0000000000 fff00000ff6160a0 fff00000ff6160a0 0000000000000000 [ 16.402055] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 16.402158] page dumped because: kasan: bad access detected [ 16.402228] [ 16.402267] Memory state around the buggy address: [ 16.402336] fff00000c790ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.402434] fff00000c790ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.402518] >fff00000c7910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.402590] ^ [ 16.402641] fff00000c7910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.402724] fff00000c7910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.402799] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 16.346830] ================================================================== [ 16.347006] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.347196] Free of addr fff00000c78dc001 by task kunit_try_catch/150 [ 16.347893] [ 16.348361] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.348587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.348734] Hardware name: linux,dummy-virt (DT) [ 16.348893] Call trace: [ 16.348966] show_stack+0x20/0x38 (C) [ 16.349236] dump_stack_lvl+0x8c/0xd0 [ 16.349560] print_report+0x118/0x608 [ 16.349746] kasan_report_invalid_free+0xc0/0xe8 [ 16.349953] __kasan_kfree_large+0x5c/0xa8 [ 16.350175] free_large_kmalloc+0x64/0x190 [ 16.350323] kfree+0x270/0x3c8 [ 16.350439] kmalloc_large_invalid_free+0x108/0x270 [ 16.350594] kunit_try_run_case+0x170/0x3f0 [ 16.350909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.351108] kthread+0x328/0x630 [ 16.351558] ret_from_fork+0x10/0x20 [ 16.351787] [ 16.351875] The buggy address belongs to the physical page: [ 16.352148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc [ 16.352371] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.352541] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.352985] page_type: f8(unknown) [ 16.353073] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.353513] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.353822] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.354089] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.354174] head: 0bfffe0000000002 ffffc1ffc31e3701 00000000ffffffff 00000000ffffffff [ 16.354263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.355344] page dumped because: kasan: bad access detected [ 16.355709] [ 16.355760] Memory state around the buggy address: [ 16.355830] fff00000c78dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.355915] fff00000c78dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.355999] >fff00000c78dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.356335] ^ [ 16.356656] fff00000c78dc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.356752] fff00000c78dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.356936] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 16.329849] ================================================================== [ 16.330014] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 16.330130] Read of size 1 at addr fff00000c78dc000 by task kunit_try_catch/148 [ 16.330471] [ 16.330540] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.330839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.330925] Hardware name: linux,dummy-virt (DT) [ 16.331126] Call trace: [ 16.331180] show_stack+0x20/0x38 (C) [ 16.331537] dump_stack_lvl+0x8c/0xd0 [ 16.332067] print_report+0x118/0x608 [ 16.332339] kasan_report+0xdc/0x128 [ 16.332486] __asan_report_load1_noabort+0x20/0x30 [ 16.332591] kmalloc_large_uaf+0x2cc/0x2f8 [ 16.332697] kunit_try_run_case+0x170/0x3f0 [ 16.333177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.333402] kthread+0x328/0x630 [ 16.333581] ret_from_fork+0x10/0x20 [ 16.333689] [ 16.333902] The buggy address belongs to the physical page: [ 16.333965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc [ 16.334090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.334508] raw: 0bfffe0000000000 ffffc1ffc31e3808 fff00000da47cc00 0000000000000000 [ 16.334817] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.334913] page dumped because: kasan: bad access detected [ 16.334977] [ 16.335017] Memory state around the buggy address: [ 16.335106] fff00000c78dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.335354] fff00000c78dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.335477] >fff00000c78dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.335558] ^ [ 16.335622] fff00000c78dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.336091] fff00000c78dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.336186] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 16.300858] ================================================================== [ 16.300993] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.301407] Write of size 1 at addr fff00000c78de00a by task kunit_try_catch/146 [ 16.301627] [ 16.301830] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.302364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.302425] Hardware name: linux,dummy-virt (DT) [ 16.302790] Call trace: [ 16.302955] show_stack+0x20/0x38 (C) [ 16.303365] dump_stack_lvl+0x8c/0xd0 [ 16.303470] print_report+0x118/0x608 [ 16.304311] kasan_report+0xdc/0x128 [ 16.304456] __asan_report_store1_noabort+0x20/0x30 [ 16.304560] kmalloc_large_oob_right+0x278/0x2b8 [ 16.304657] kunit_try_run_case+0x170/0x3f0 [ 16.304767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.304910] kthread+0x328/0x630 [ 16.305031] ret_from_fork+0x10/0x20 [ 16.305165] [ 16.305242] The buggy address belongs to the physical page: [ 16.305337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc [ 16.305489] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.305617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.305773] page_type: f8(unknown) [ 16.305852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.305966] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.306077] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.306165] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.306261] head: 0bfffe0000000002 ffffc1ffc31e3701 00000000ffffffff 00000000ffffffff [ 16.306356] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.306436] page dumped because: kasan: bad access detected [ 16.306506] [ 16.306546] Memory state around the buggy address: [ 16.306623] fff00000c78ddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.307538] fff00000c78ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.307679] >fff00000c78de000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.307743] ^ [ 16.307826] fff00000c78de080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.307905] fff00000c78de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.307999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 16.280894] ================================================================== [ 16.281016] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.281291] Write of size 1 at addr fff00000c78b1f00 by task kunit_try_catch/144 [ 16.281408] [ 16.281490] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.281827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.282051] Hardware name: linux,dummy-virt (DT) [ 16.282121] Call trace: [ 16.282164] show_stack+0x20/0x38 (C) [ 16.282271] dump_stack_lvl+0x8c/0xd0 [ 16.282464] print_report+0x118/0x608 [ 16.282548] kasan_report+0xdc/0x128 [ 16.282632] __asan_report_store1_noabort+0x20/0x30 [ 16.282908] kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.283036] kunit_try_run_case+0x170/0x3f0 [ 16.283139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.283237] kthread+0x328/0x630 [ 16.283405] ret_from_fork+0x10/0x20 [ 16.283507] [ 16.283549] Allocated by task 144: [ 16.283610] kasan_save_stack+0x3c/0x68 [ 16.283693] kasan_save_track+0x20/0x40 [ 16.283769] kasan_save_alloc_info+0x40/0x58 [ 16.283848] __kasan_kmalloc+0xd4/0xd8 [ 16.284115] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.284222] kmalloc_big_oob_right+0xb8/0x2f0 [ 16.284453] kunit_try_run_case+0x170/0x3f0 [ 16.284668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.284756] kthread+0x328/0x630 [ 16.284829] ret_from_fork+0x10/0x20 [ 16.284987] [ 16.285132] The buggy address belongs to the object at fff00000c78b0000 [ 16.285132] which belongs to the cache kmalloc-8k of size 8192 [ 16.285253] The buggy address is located 0 bytes to the right of [ 16.285253] allocated 7936-byte region [fff00000c78b0000, fff00000c78b1f00) [ 16.285708] [ 16.285786] The buggy address belongs to the physical page: [ 16.285867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 16.286021] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.286082] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.286185] page_type: f5(slab) [ 16.286294] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.286439] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.286587] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.286728] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.286874] head: 0bfffe0000000003 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff [ 16.286980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.287109] page dumped because: kasan: bad access detected [ 16.287199] [ 16.287253] Memory state around the buggy address: [ 16.287335] fff00000c78b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.287409] fff00000c78b1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.287478] >fff00000c78b1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.287544] ^ [ 16.287597] fff00000c78b1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.287706] fff00000c78b2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.287815] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 16.259582] ================================================================== [ 16.259681] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.259785] Write of size 1 at addr fff00000c1094e78 by task kunit_try_catch/142 [ 16.259890] [ 16.259950] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.261752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.261934] Hardware name: linux,dummy-virt (DT) [ 16.262003] Call trace: [ 16.262056] show_stack+0x20/0x38 (C) [ 16.262167] dump_stack_lvl+0x8c/0xd0 [ 16.262275] print_report+0x118/0x608 [ 16.262377] kasan_report+0xdc/0x128 [ 16.262480] __asan_report_store1_noabort+0x20/0x30 [ 16.262604] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.262722] kunit_try_run_case+0x170/0x3f0 [ 16.262880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.263016] kthread+0x328/0x630 [ 16.263108] ret_from_fork+0x10/0x20 [ 16.263422] [ 16.263486] Allocated by task 142: [ 16.263579] kasan_save_stack+0x3c/0x68 [ 16.263660] kasan_save_track+0x20/0x40 [ 16.263956] kasan_save_alloc_info+0x40/0x58 [ 16.264035] __kasan_kmalloc+0xd4/0xd8 [ 16.264117] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 16.264207] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.264359] kunit_try_run_case+0x170/0x3f0 [ 16.264499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.264669] kthread+0x328/0x630 [ 16.264772] ret_from_fork+0x10/0x20 [ 16.264936] [ 16.265032] The buggy address belongs to the object at fff00000c1094e00 [ 16.265032] which belongs to the cache kmalloc-128 of size 128 [ 16.265233] The buggy address is located 0 bytes to the right of [ 16.265233] allocated 120-byte region [fff00000c1094e00, fff00000c1094e78) [ 16.265357] [ 16.265399] The buggy address belongs to the physical page: [ 16.265466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 16.265775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.265869] page_type: f5(slab) [ 16.266036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.266114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.266158] page dumped because: kasan: bad access detected [ 16.266235] [ 16.266284] Memory state around the buggy address: [ 16.266340] fff00000c1094d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.266417] fff00000c1094d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.266700] >fff00000c1094e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.267123] ^ [ 16.267224] fff00000c1094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.267320] fff00000c1094f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.267829] ================================================================== [ 16.248395] ================================================================== [ 16.248510] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.248609] Write of size 1 at addr fff00000c1094d78 by task kunit_try_catch/142 [ 16.248713] [ 16.248773] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.248947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.249002] Hardware name: linux,dummy-virt (DT) [ 16.249078] Call trace: [ 16.249115] show_stack+0x20/0x38 (C) [ 16.249206] dump_stack_lvl+0x8c/0xd0 [ 16.249556] print_report+0x118/0x608 [ 16.249842] kasan_report+0xdc/0x128 [ 16.250086] __asan_report_store1_noabort+0x20/0x30 [ 16.250306] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.250400] kunit_try_run_case+0x170/0x3f0 [ 16.250492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.250724] kthread+0x328/0x630 [ 16.251092] ret_from_fork+0x10/0x20 [ 16.251499] [ 16.251544] Allocated by task 142: [ 16.251603] kasan_save_stack+0x3c/0x68 [ 16.251807] kasan_save_track+0x20/0x40 [ 16.251923] kasan_save_alloc_info+0x40/0x58 [ 16.252155] __kasan_kmalloc+0xd4/0xd8 [ 16.252312] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 16.252793] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.252901] kunit_try_run_case+0x170/0x3f0 [ 16.252994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.253159] kthread+0x328/0x630 [ 16.253251] ret_from_fork+0x10/0x20 [ 16.253416] [ 16.253480] The buggy address belongs to the object at fff00000c1094d00 [ 16.253480] which belongs to the cache kmalloc-128 of size 128 [ 16.253610] The buggy address is located 0 bytes to the right of [ 16.253610] allocated 120-byte region [fff00000c1094d00, fff00000c1094d78) [ 16.253746] [ 16.254031] The buggy address belongs to the physical page: [ 16.254117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 16.254352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.254609] page_type: f5(slab) [ 16.254725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.254817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.255126] page dumped because: kasan: bad access detected [ 16.255268] [ 16.255319] Memory state around the buggy address: [ 16.255538] fff00000c1094c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.255717] fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.255824] >fff00000c1094d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.256047] ^ [ 16.256131] fff00000c1094d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256491] fff00000c1094e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256718] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 16.221753] ================================================================== [ 16.221877] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 16.221984] Read of size 1 at addr fff00000c651b000 by task kunit_try_catch/140 [ 16.222090] [ 16.222154] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.222313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.222454] Hardware name: linux,dummy-virt (DT) [ 16.222682] Call trace: [ 16.222932] show_stack+0x20/0x38 (C) [ 16.223094] dump_stack_lvl+0x8c/0xd0 [ 16.223261] print_report+0x118/0x608 [ 16.223355] kasan_report+0xdc/0x128 [ 16.223729] __asan_report_load1_noabort+0x20/0x30 [ 16.223854] kmalloc_node_oob_right+0x2f4/0x330 [ 16.223953] kunit_try_run_case+0x170/0x3f0 [ 16.224069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.224182] kthread+0x328/0x630 [ 16.224275] ret_from_fork+0x10/0x20 [ 16.224372] [ 16.224412] Allocated by task 140: [ 16.224469] kasan_save_stack+0x3c/0x68 [ 16.225576] kasan_save_track+0x20/0x40 [ 16.226154] kasan_save_alloc_info+0x40/0x58 [ 16.226266] __kasan_kmalloc+0xd4/0xd8 [ 16.226346] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 16.226435] kmalloc_node_oob_right+0xbc/0x330 [ 16.226508] kunit_try_run_case+0x170/0x3f0 [ 16.226755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.226862] kthread+0x328/0x630 [ 16.226930] ret_from_fork+0x10/0x20 [ 16.227120] [ 16.227181] The buggy address belongs to the object at fff00000c651a000 [ 16.227181] which belongs to the cache kmalloc-4k of size 4096 [ 16.227360] The buggy address is located 0 bytes to the right of [ 16.227360] allocated 4096-byte region [fff00000c651a000, fff00000c651b000) [ 16.227683] [ 16.227736] The buggy address belongs to the physical page: [ 16.227880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106518 [ 16.228438] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.229153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.229907] page_type: f5(slab) [ 16.229997] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.230365] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.230816] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.230956] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.231271] head: 0bfffe0000000003 ffffc1ffc3194601 00000000ffffffff 00000000ffffffff [ 16.231380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.231678] page dumped because: kasan: bad access detected [ 16.231784] [ 16.231843] Memory state around the buggy address: [ 16.231935] fff00000c651af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.232037] fff00000c651af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.232137] >fff00000c651b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.232222] ^ [ 16.232595] fff00000c651b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.232690] fff00000c651b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.233168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 16.198848] ================================================================== [ 16.199104] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 16.199224] Read of size 1 at addr fff00000c10cc79f by task kunit_try_catch/138 [ 16.199331] [ 16.199388] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.199557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.199603] Hardware name: linux,dummy-virt (DT) [ 16.199662] Call trace: [ 16.199706] show_stack+0x20/0x38 (C) [ 16.199798] dump_stack_lvl+0x8c/0xd0 [ 16.199897] print_report+0x118/0x608 [ 16.200000] kasan_report+0xdc/0x128 [ 16.200112] __asan_report_load1_noabort+0x20/0x30 [ 16.200209] kmalloc_oob_left+0x2ec/0x320 [ 16.200309] kunit_try_run_case+0x170/0x3f0 [ 16.200401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.200491] kthread+0x328/0x630 [ 16.200574] ret_from_fork+0x10/0x20 [ 16.200666] [ 16.200702] Allocated by task 26: [ 16.200759] kasan_save_stack+0x3c/0x68 [ 16.200834] kasan_save_track+0x20/0x40 [ 16.200904] kasan_save_alloc_info+0x40/0x58 [ 16.201014] __kasan_kmalloc+0xd4/0xd8 [ 16.201121] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 16.201224] kstrdup+0x54/0xc8 [ 16.201354] devtmpfs_work_loop+0x6f8/0xa58 [ 16.201474] devtmpfsd+0x50/0x58 [ 16.201579] kthread+0x328/0x630 [ 16.201677] ret_from_fork+0x10/0x20 [ 16.201781] [ 16.201879] Freed by task 26: [ 16.202022] kasan_save_stack+0x3c/0x68 [ 16.202120] kasan_save_track+0x20/0x40 [ 16.202198] kasan_save_free_info+0x4c/0x78 [ 16.202275] __kasan_slab_free+0x6c/0x98 [ 16.202344] kfree+0x214/0x3c8 [ 16.202401] devtmpfs_work_loop+0x804/0xa58 [ 16.202470] devtmpfsd+0x50/0x58 [ 16.202543] kthread+0x328/0x630 [ 16.202620] ret_from_fork+0x10/0x20 [ 16.202701] [ 16.202740] The buggy address belongs to the object at fff00000c10cc780 [ 16.202740] which belongs to the cache kmalloc-16 of size 16 [ 16.202868] The buggy address is located 15 bytes to the right of [ 16.202868] allocated 16-byte region [fff00000c10cc780, fff00000c10cc790) [ 16.203014] [ 16.203065] The buggy address belongs to the physical page: [ 16.203137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010cc [ 16.203324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.203436] page_type: f5(slab) [ 16.203580] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.203920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.204118] page dumped because: kasan: bad access detected [ 16.204507] [ 16.204553] Memory state around the buggy address: [ 16.204632] fff00000c10cc680: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 16.204726] fff00000c10cc700: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 16.204815] >fff00000c10cc780: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 16.204898] ^ [ 16.204962] fff00000c10cc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205061] fff00000c10cc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 16.167438] ================================================================== [ 16.167533] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.167638] Write of size 1 at addr fff00000c1094c78 by task kunit_try_catch/136 [ 16.167740] [ 16.167802] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.169012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.169112] Hardware name: linux,dummy-virt (DT) [ 16.169188] Call trace: [ 16.169235] show_stack+0x20/0x38 (C) [ 16.169348] dump_stack_lvl+0x8c/0xd0 [ 16.169450] print_report+0x118/0x608 [ 16.169545] kasan_report+0xdc/0x128 [ 16.169639] __asan_report_store1_noabort+0x20/0x30 [ 16.169740] kmalloc_oob_right+0x538/0x660 [ 16.169839] kunit_try_run_case+0x170/0x3f0 [ 16.170928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.171159] kthread+0x328/0x630 [ 16.171280] ret_from_fork+0x10/0x20 [ 16.171385] [ 16.171425] Allocated by task 136: [ 16.171484] kasan_save_stack+0x3c/0x68 [ 16.171566] kasan_save_track+0x20/0x40 [ 16.171651] kasan_save_alloc_info+0x40/0x58 [ 16.171738] __kasan_kmalloc+0xd4/0xd8 [ 16.171809] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.171933] kmalloc_oob_right+0xb0/0x660 [ 16.172016] kunit_try_run_case+0x170/0x3f0 [ 16.172106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.172195] kthread+0x328/0x630 [ 16.172270] ret_from_fork+0x10/0x20 [ 16.172344] [ 16.172383] The buggy address belongs to the object at fff00000c1094c00 [ 16.172383] which belongs to the cache kmalloc-128 of size 128 [ 16.172504] The buggy address is located 5 bytes to the right of [ 16.172504] allocated 115-byte region [fff00000c1094c00, fff00000c1094c73) [ 16.172638] [ 16.172682] The buggy address belongs to the physical page: [ 16.172747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 16.172859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.172963] page_type: f5(slab) [ 16.173055] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.173155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.173231] page dumped because: kasan: bad access detected [ 16.173287] [ 16.173321] Memory state around the buggy address: [ 16.173386] fff00000c1094b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.173476] fff00000c1094b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.173567] >fff00000c1094c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.173646] ^ [ 16.173726] fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.173811] fff00000c1094d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.173949] ================================================================== [ 16.159306] ================================================================== [ 16.159680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.160599] Write of size 1 at addr fff00000c1094c73 by task kunit_try_catch/136 [ 16.160715] [ 16.161543] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.161701] Tainted: [N]=TEST [ 16.161736] Hardware name: linux,dummy-virt (DT) [ 16.162037] Call trace: [ 16.162334] show_stack+0x20/0x38 (C) [ 16.162595] dump_stack_lvl+0x8c/0xd0 [ 16.162722] print_report+0x118/0x608 [ 16.162812] kasan_report+0xdc/0x128 [ 16.162897] __asan_report_store1_noabort+0x20/0x30 [ 16.162972] kmalloc_oob_right+0x5a4/0x660 [ 16.163020] kunit_try_run_case+0x170/0x3f0 [ 16.163096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.163145] kthread+0x328/0x630 [ 16.163191] ret_from_fork+0x10/0x20 [ 16.163356] [ 16.163398] Allocated by task 136: [ 16.163517] kasan_save_stack+0x3c/0x68 [ 16.163586] kasan_save_track+0x20/0x40 [ 16.163623] kasan_save_alloc_info+0x40/0x58 [ 16.163660] __kasan_kmalloc+0xd4/0xd8 [ 16.163693] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.163730] kmalloc_oob_right+0xb0/0x660 [ 16.163766] kunit_try_run_case+0x170/0x3f0 [ 16.163799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.163838] kthread+0x328/0x630 [ 16.163870] ret_from_fork+0x10/0x20 [ 16.163923] [ 16.163984] The buggy address belongs to the object at fff00000c1094c00 [ 16.163984] which belongs to the cache kmalloc-128 of size 128 [ 16.164085] The buggy address is located 0 bytes to the right of [ 16.164085] allocated 115-byte region [fff00000c1094c00, fff00000c1094c73) [ 16.164153] [ 16.164237] The buggy address belongs to the physical page: [ 16.164458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 16.164743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.165056] page_type: f5(slab) [ 16.165371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.165432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.165550] page dumped because: kasan: bad access detected [ 16.165591] [ 16.165618] Memory state around the buggy address: [ 16.165848] fff00000c1094b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.166217] fff00000c1094b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.166288] >fff00000c1094c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.166344] ^ [ 16.166434] fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.166475] fff00000c1094d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.166538] ================================================================== [ 16.175696] ================================================================== [ 16.175798] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.175900] Read of size 1 at addr fff00000c1094c80 by task kunit_try_catch/136 [ 16.176004] [ 16.176074] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 16.176249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.176305] Hardware name: linux,dummy-virt (DT) [ 16.177921] Call trace: [ 16.178581] show_stack+0x20/0x38 (C) [ 16.178822] dump_stack_lvl+0x8c/0xd0 [ 16.179489] print_report+0x118/0x608 [ 16.180809] kasan_report+0xdc/0x128 [ 16.181241] __asan_report_load1_noabort+0x20/0x30 [ 16.181459] kmalloc_oob_right+0x5d0/0x660 [ 16.181796] kunit_try_run_case+0x170/0x3f0 [ 16.181947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.182055] kthread+0x328/0x630 [ 16.182141] ret_from_fork+0x10/0x20 [ 16.182415] [ 16.182449] Allocated by task 136: [ 16.182498] kasan_save_stack+0x3c/0x68 [ 16.182784] kasan_save_track+0x20/0x40 [ 16.182896] kasan_save_alloc_info+0x40/0x58 [ 16.183093] __kasan_kmalloc+0xd4/0xd8 [ 16.183317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.183393] kmalloc_oob_right+0xb0/0x660 [ 16.183488] kunit_try_run_case+0x170/0x3f0 [ 16.183590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.183706] kthread+0x328/0x630 [ 16.183776] ret_from_fork+0x10/0x20 [ 16.183846] [ 16.183884] The buggy address belongs to the object at fff00000c1094c00 [ 16.183884] which belongs to the cache kmalloc-128 of size 128 [ 16.184018] The buggy address is located 13 bytes to the right of [ 16.184018] allocated 115-byte region [fff00000c1094c00, fff00000c1094c73) [ 16.184216] [ 16.184279] The buggy address belongs to the physical page: [ 16.184369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 16.184478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.184575] page_type: f5(slab) [ 16.184658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.184764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.184848] page dumped because: kasan: bad access detected [ 16.184911] [ 16.184946] Memory state around the buggy address: [ 16.185010] fff00000c1094b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.185096] fff00000c1094c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.185178] >fff00000c1094c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.185489] ^ [ 16.185649] fff00000c1094d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.185882] fff00000c1094d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.186061] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libteststest_ratelimit-test_ratelimit_stress_child
------------[ cut here ]------------ [ 153.230509] WARNING: CPU: 1 PID: 1552 at lib/tests/test_ratelimit.c:87 test_ratelimit_stress_child+0x160/0x1b8 [ 153.233820] Modules linked in: [ 153.235480] CPU: 1 UID: 0 PID: 1552 Comm: test_ratelimit_ Tainted: G B D W N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 153.237073] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 153.238050] Hardware name: linux,dummy-virt (DT) [ 153.238357] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 153.238729] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 153.239053] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 153.239356] sp : ffff800089507d90 [ 153.239574] x29: ffff800089507d90 x28: 0000000000000000 x27: 0000000000000000 [ 153.241336] x26: 1ffe0000193c1e01 x25: 0000000000000000 x24: 0000000000000004 [ 153.242586] x23: fff00000c9e0f00c x22: fff00000cbff5fa8 x21: ffffa8e06cf19618 [ 153.243649] x20: fff00000c9e0f000 x19: fff00000cbff5fa8 x18: fff00000c178d548 [ 153.244832] x17: 0000000000000001 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 153.245829] x14: 0000000000018fff x13: 1ffe00001b48adc5 x12: fffd80001b48f041 [ 153.246835] x11: 1ffe00001b48f040 x10: fffd80001b48f040 x9 : ffffa8e06f5ac60c [ 153.247856] x8 : ffff800089507ae8 x7 : 0000000000000001 x6 : ffff800089507c00 [ 153.248641] x5 : 0000000000000001 x4 : ffffa8e0718f4340 x3 : 0000000000000000 [ 153.249672] x2 : 1ffe0000197febf9 x1 : 0000000000000000 x0 : 0000000000000000 [ 153.250790] Call trace: [ 153.251137] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 153.251693] kthread+0x328/0x630 [ 153.252098] ret_from_fork+0x10/0x20 [ 153.252519] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 91.850702] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 91.851352] Modules linked in: [ 91.851658] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 91.852046] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 91.852366] Hardware name: linux,dummy-virt (DT) [ 91.852545] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 91.852781] pc : intlog10+0x38/0x48 [ 91.852995] lr : intlog10_test+0xe4/0x200 [ 91.853209] sp : ffff800082477c10 [ 91.853400] x29: ffff800082477c90 x28: 0000000000000000 x27: 0000000000000000 [ 91.853741] x26: 1ffe000018f11741 x25: 0000000000000000 x24: ffff800082477ce0 [ 91.854088] x23: ffff800082477d00 x22: 0000000000000000 x21: 1ffff0001048ef82 [ 91.854705] x20: ffffa8e06f866f80 x19: ffff800080087990 x18: 00000000cdfba44a [ 91.854971] x17: 00000000e5b6ca4f x16: 00000000488778e7 x15: 000000005f3a246b [ 91.855230] x14: 000000009c5710ee x13: 1ffe00001b48f181 x12: ffff751c0e6df181 [ 91.855474] x11: 1ffff51c0e6df180 x10: ffff751c0e6df180 x9 : ffffa8e06ce1d6fc [ 91.855719] x8 : ffffa8e0736f8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 91.855955] x5 : ffff70001048ef82 x4 : 1ffff00010010f3a x3 : 1ffff51c0df0cdf0 [ 91.856886] x2 : 1ffff51c0df0cdf0 x1 : 0000000000000003 x0 : 0000000000000000 [ 91.857462] Call trace: [ 91.857611] intlog10+0x38/0x48 (P) [ 91.857854] kunit_try_run_case+0x170/0x3f0 [ 91.858296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.858781] kthread+0x328/0x630 [ 91.859023] ret_from_fork+0x10/0x20 [ 91.859263] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 91.800425] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 91.801785] Modules linked in: [ 91.803026] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 91.803814] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 91.804214] Hardware name: linux,dummy-virt (DT) [ 91.804518] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 91.805063] pc : intlog2+0xd8/0xf8 [ 91.805218] lr : intlog2_test+0xe4/0x200 [ 91.805519] sp : ffff800082447c10 [ 91.805726] x29: ffff800082447c90 x28: 0000000000000000 x27: 0000000000000000 [ 91.806294] x26: 1ffe00001824eb41 x25: 0000000000000000 x24: ffff800082447ce0 [ 91.806806] x23: ffff800082447d00 x22: 0000000000000000 x21: 1ffff00010488f82 [ 91.807431] x20: ffffa8e06f866e80 x19: ffff800080087990 x18: fff00000c178d618 [ 91.807837] x17: 00000000eae4f324 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 91.808188] x14: 0000000000018fff x13: 1ffe00001b48adc5 x12: ffff751c0e6df181 [ 91.808536] x11: 1ffff51c0e6df180 x10: ffff751c0e6df180 x9 : ffffa8e06ce1d8fc [ 91.808889] x8 : ffffa8e0736f8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 91.809257] x5 : ffff700010488f82 x4 : 1ffff00010010f3a x3 : 1ffff51c0df0cdd0 [ 91.809614] x2 : 1ffff51c0df0cdd0 x1 : 0000000000000003 x0 : 0000000000000000 [ 91.810139] Call trace: [ 91.810430] intlog2+0xd8/0xf8 (P) [ 91.810592] kunit_try_run_case+0x170/0x3f0 [ 91.810763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.810985] kthread+0x328/0x630 [ 91.811216] ret_from_fork+0x10/0x20 [ 91.811381] ---[ end trace 0000000000000000 ]---