Date
May 13, 2025, 12:07 p.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 21.653207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 21.744507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 23.243519] ================================================================== [ 23.243656] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 23.243656] [ 23.243788] Out-of-bounds write at 0x00000000790ab28c (1B left of kfence-#103): [ 23.243852] test_out_of_bounds_write+0x100/0x240 [ 23.243907] kunit_try_run_case+0x170/0x3f0 [ 23.243959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.244022] kthread+0x328/0x630 [ 23.244067] ret_from_fork+0x10/0x20 [ 23.244107] [ 23.244140] kfence-#103: 0x000000009a5c2f04-0x00000000b0e9a372, size=32, cache=test [ 23.244140] [ 23.244195] allocated by task 293 on cpu 1 at 23.243418s (0.000773s ago): [ 23.244274] test_alloc+0x230/0x628 [ 23.244318] test_out_of_bounds_write+0xc8/0x240 [ 23.244362] kunit_try_run_case+0x170/0x3f0 [ 23.244432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.244489] kthread+0x328/0x630 [ 23.244534] ret_from_fork+0x10/0x20 [ 23.244610] [ 23.244679] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.244780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.244816] Hardware name: linux,dummy-virt (DT) [ 23.244866] ================================================================== [ 23.035206] ================================================================== [ 23.035316] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 23.035316] [ 23.035459] Out-of-bounds write at 0x00000000cbfc27dc (1B left of kfence-#101): [ 23.035541] test_out_of_bounds_write+0x100/0x240 [ 23.035601] kunit_try_run_case+0x170/0x3f0 [ 23.035652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.035701] kthread+0x328/0x630 [ 23.035748] ret_from_fork+0x10/0x20 [ 23.035795] [ 23.035825] kfence-#101: 0x00000000bd3ca3e5-0x0000000032393000, size=32, cache=kmalloc-32 [ 23.035825] [ 23.035885] allocated by task 291 on cpu 1 at 23.035005s (0.000875s ago): [ 23.035981] test_alloc+0x29c/0x628 [ 23.036051] test_out_of_bounds_write+0xc8/0x240 [ 23.036151] kunit_try_run_case+0x170/0x3f0 [ 23.036239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.036334] kthread+0x328/0x630 [ 23.036382] ret_from_fork+0x10/0x20 [ 23.036427] [ 23.036484] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.036582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.036619] Hardware name: linux,dummy-virt (DT) [ 23.036660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 21.393292] ================================================================== [ 21.393407] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 21.393494] Read of size 1 at addr ffff8000809d7b4a by task kunit_try_catch/253 [ 21.394502] [ 21.394586] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.394697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.394758] Hardware name: linux,dummy-virt (DT) [ 21.394797] Call trace: [ 21.394843] show_stack+0x20/0x38 (C) [ 21.394915] dump_stack_lvl+0x8c/0xd0 [ 21.394992] print_report+0x310/0x608 [ 21.395050] kasan_report+0xdc/0x128 [ 21.395101] __asan_report_load1_noabort+0x20/0x30 [ 21.395158] kasan_alloca_oob_right+0x2dc/0x340 [ 21.395500] kunit_try_run_case+0x170/0x3f0 [ 21.395737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.395875] kthread+0x328/0x630 [ 21.396332] ret_from_fork+0x10/0x20 [ 21.396704] [ 21.396740] The buggy address belongs to stack of task kunit_try_catch/253 [ 21.396807] [ 21.396844] The buggy address belongs to the virtual mapping at [ 21.396844] [ffff8000809d0000, ffff8000809d9000) created by: [ 21.396844] kernel_clone+0x150/0x7a8 [ 21.396931] [ 21.396964] The buggy address belongs to the physical page: [ 21.397020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 21.397087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.398811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.398897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.398950] page dumped because: kasan: bad access detected [ 21.399026] [ 21.399055] Memory state around the buggy address: [ 21.399098] ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.399151] ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.399397] >ffff8000809d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 21.399511] ^ [ 21.399562] ffff8000809d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 21.400087] ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 21.400148] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 100.367225] Internal error: Oops: 0000000096000005 [#1] SMP [ 100.374383] Modules linked in: [ 100.375356] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 100.376076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 100.376398] Hardware name: linux,dummy-virt (DT) [ 100.377069] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 100.377880] pc : kunit_test_null_dereference+0x70/0x170 [ 100.378650] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 100.379421] sp : ffff800081fd7d30 [ 100.380224] x29: ffff800081fd7d90 x28: 0000000000000000 x27: 0000000000000000 [ 100.381010] x26: 1ffe000018f7dfa1 x25: 0000000000000000 x24: 0000000000000004 [ 100.381566] x23: fff00000c7befd0c x22: ffff99d6c440b718 x21: fff00000c1c3de88 [ 100.382123] x20: 1ffff000103fafa6 x19: ffff800080087990 x18: fff00000c1217c98 [ 100.383140] x17: 0000000000000001 x16: fff00000da457ce8 x15: fff00000ff616b08 [ 100.384019] x14: 0000000000018fff x13: 1ffe00001b48af81 x12: fffd800019281dc4 [ 100.385056] x11: 1ffe000019281dc3 x10: fffd800019281dc3 x9 : ffff99d6c4402b80 [ 100.385879] x8 : ffff800081fd7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 100.386655] x5 : ffff7000103fafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 100.387470] x2 : dfff800000000000 x1 : fff00000c940e540 x0 : ffff800080087990 [ 100.388471] Call trace: [ 100.388748] kunit_test_null_dereference+0x70/0x170 (P) [ 100.389151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 100.389802] kthread+0x328/0x630 [ 100.390217] ret_from_fork+0x10/0x20 [ 100.391142] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 100.392078] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 50.911958] ================================================================== [ 50.912108] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 50.912108] [ 50.912240] Use-after-free read at 0x00000000ad1bf768 (in kfence-#162): [ 50.912307] test_krealloc+0x51c/0x830 [ 50.912364] kunit_try_run_case+0x170/0x3f0 [ 50.912417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.912469] kthread+0x328/0x630 [ 50.912520] ret_from_fork+0x10/0x20 [ 50.912567] [ 50.912596] kfence-#162: 0x00000000ad1bf768-0x00000000b3c9254f, size=32, cache=kmalloc-32 [ 50.912596] [ 50.912659] allocated by task 337 on cpu 1 at 50.911135s (0.001519s ago): [ 50.912748] test_alloc+0x29c/0x628 [ 50.912799] test_krealloc+0xc0/0x830 [ 50.912843] kunit_try_run_case+0x170/0x3f0 [ 50.912887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.912936] kthread+0x328/0x630 [ 50.913008] ret_from_fork+0x10/0x20 [ 50.913058] [ 50.913088] freed by task 337 on cpu 1 at 50.911447s (0.001636s ago): [ 50.913161] krealloc_noprof+0x148/0x360 [ 50.913209] test_krealloc+0x1dc/0x830 [ 50.913255] kunit_try_run_case+0x170/0x3f0 [ 50.913300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.913349] kthread+0x328/0x630 [ 50.913394] ret_from_fork+0x10/0x20 [ 50.913442] [ 50.913503] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 50.913600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.913639] Hardware name: linux,dummy-virt (DT) [ 50.913681] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 50.827473] ================================================================== [ 50.827610] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 50.827610] [ 50.827742] Use-after-free read at 0x000000001633a04a (in kfence-#161): [ 50.827814] test_memcache_typesafe_by_rcu+0x280/0x560 [ 50.827877] kunit_try_run_case+0x170/0x3f0 [ 50.827930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.828000] kthread+0x328/0x630 [ 50.828056] ret_from_fork+0x10/0x20 [ 50.828105] [ 50.828135] kfence-#161: 0x000000001633a04a-0x000000006c585dc1, size=32, cache=test [ 50.828135] [ 50.828198] allocated by task 335 on cpu 0 at 50.811477s (0.016716s ago): [ 50.828285] test_alloc+0x230/0x628 [ 50.828334] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 50.828387] kunit_try_run_case+0x170/0x3f0 [ 50.828432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.828480] kthread+0x328/0x630 [ 50.828525] ret_from_fork+0x10/0x20 [ 50.828570] [ 50.828598] freed by task 335 on cpu 0 at 50.811697s (0.016896s ago): [ 50.828665] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 50.828715] kunit_try_run_case+0x170/0x3f0 [ 50.828761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.828810] kthread+0x328/0x630 [ 50.828853] ret_from_fork+0x10/0x20 [ 50.828900] [ 50.828958] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 50.829071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.829107] Hardware name: linux,dummy-virt (DT) [ 50.829150] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 29.094290] ================================================================== [ 29.094875] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 29.094875] [ 29.095176] Invalid read at 0x0000000049cf2e62: [ 29.095331] test_invalid_access+0xdc/0x1f0 [ 29.095463] kunit_try_run_case+0x170/0x3f0 [ 29.095581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.095701] kthread+0x328/0x630 [ 29.095829] ret_from_fork+0x10/0x20 [ 29.095953] [ 29.096086] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 29.096311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.096400] Hardware name: linux,dummy-virt (DT) [ 29.096498] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 21.378279] ================================================================== [ 21.378406] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 21.378588] Read of size 1 at addr ffff8000809d7b5f by task kunit_try_catch/251 [ 21.378655] [ 21.378705] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.378813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.378846] Hardware name: linux,dummy-virt (DT) [ 21.378891] Call trace: [ 21.378922] show_stack+0x20/0x38 (C) [ 21.379008] dump_stack_lvl+0x8c/0xd0 [ 21.379070] print_report+0x310/0x608 [ 21.379129] kasan_report+0xdc/0x128 [ 21.379183] __asan_report_load1_noabort+0x20/0x30 [ 21.379244] kasan_alloca_oob_left+0x2b8/0x310 [ 21.379301] kunit_try_run_case+0x170/0x3f0 [ 21.379361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.379425] kthread+0x328/0x630 [ 21.379485] ret_from_fork+0x10/0x20 [ 21.379545] [ 21.379577] The buggy address belongs to stack of task kunit_try_catch/251 [ 21.379686] [ 21.379722] The buggy address belongs to the virtual mapping at [ 21.379722] [ffff8000809d0000, ffff8000809d9000) created by: [ 21.379722] kernel_clone+0x150/0x7a8 [ 21.379818] [ 21.379850] The buggy address belongs to the physical page: [ 21.379893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 21.379961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.380152] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.380404] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.380475] page dumped because: kasan: bad access detected [ 21.380518] [ 21.380653] Memory state around the buggy address: [ 21.380847] ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.380922] ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.380983] >ffff8000809d7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 21.381032] ^ [ 21.381080] ffff8000809d7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 21.381129] ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 21.381635] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 28.859739] ================================================================== [ 28.859868] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.859868] [ 28.859947] Corrupted memory at 0x00000000206b9873 [ ! . . . . . . . . . . . . . . . ] (in kfence-#157): [ 28.860322] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.860382] kunit_try_run_case+0x170/0x3f0 [ 28.860429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.860479] kthread+0x328/0x630 [ 28.860525] ret_from_fork+0x10/0x20 [ 28.860570] [ 28.860598] kfence-#157: 0x00000000077a233e-0x00000000cf941849, size=73, cache=kmalloc-96 [ 28.860598] [ 28.860663] allocated by task 325 on cpu 0 at 28.859326s (0.001332s ago): [ 28.860734] test_alloc+0x29c/0x628 [ 28.860782] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 28.860831] kunit_try_run_case+0x170/0x3f0 [ 28.860876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.860925] kthread+0x328/0x630 [ 28.860977] ret_from_fork+0x10/0x20 [ 28.861030] [ 28.861059] freed by task 325 on cpu 0 at 28.859579s (0.001476s ago): [ 28.861131] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.861181] kunit_try_run_case+0x170/0x3f0 [ 28.861226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.861275] kthread+0x328/0x630 [ 28.861320] ret_from_fork+0x10/0x20 [ 28.861366] [ 28.861422] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 28.861518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.861554] Hardware name: linux,dummy-virt (DT) [ 28.861594] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 28.755772] ================================================================== [ 28.755919] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.755919] [ 28.756066] Out-of-bounds read at 0x00000000d369a7fe (105B right of kfence-#156): [ 28.756133] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.756191] kunit_try_run_case+0x170/0x3f0 [ 28.756240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.756284] kthread+0x328/0x630 [ 28.756326] ret_from_fork+0x10/0x20 [ 28.756368] [ 28.756396] kfence-#156: 0x00000000b424cf7d-0x000000003de8abae, size=73, cache=kmalloc-96 [ 28.756396] [ 28.756450] allocated by task 323 on cpu 0 at 28.755346s (0.001099s ago): [ 28.756530] test_alloc+0x29c/0x628 [ 28.756575] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.756618] kunit_try_run_case+0x170/0x3f0 [ 28.756659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.756718] kthread+0x328/0x630 [ 28.756769] ret_from_fork+0x10/0x20 [ 28.756812] [ 28.756887] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 28.756997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.757032] Hardware name: linux,dummy-virt (DT) [ 28.757071] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 24.387905] ================================================================== [ 24.388058] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 24.388058] [ 24.388137] Corrupted memory at 0x00000000218d4ac5 [ ! ] (in kfence-#114): [ 24.388287] test_corruption+0x284/0x378 [ 24.388338] kunit_try_run_case+0x170/0x3f0 [ 24.388385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.388434] kthread+0x328/0x630 [ 24.388480] ret_from_fork+0x10/0x20 [ 24.388528] [ 24.388554] kfence-#114: 0x00000000929cba9c-0x00000000153bb2cd, size=32, cache=kmalloc-32 [ 24.388554] [ 24.388615] allocated by task 311 on cpu 1 at 24.387443s (0.001168s ago): [ 24.388683] test_alloc+0x29c/0x628 [ 24.388728] test_corruption+0x198/0x378 [ 24.388772] kunit_try_run_case+0x170/0x3f0 [ 24.388812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.388861] kthread+0x328/0x630 [ 24.388904] ret_from_fork+0x10/0x20 [ 24.388946] [ 24.388983] freed by task 311 on cpu 1 at 24.387605s (0.001372s ago): [ 24.389057] test_corruption+0x284/0x378 [ 24.389104] kunit_try_run_case+0x170/0x3f0 [ 24.389149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.389198] kthread+0x328/0x630 [ 24.389241] ret_from_fork+0x10/0x20 [ 24.389286] [ 24.389340] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 24.389429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.389466] Hardware name: linux,dummy-virt (DT) [ 24.389507] ================================================================== [ 24.595675] ================================================================== [ 24.595869] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 24.595869] [ 24.595968] Corrupted memory at 0x00000000d455faf6 [ ! . . . . . . . . . . . . . . . ] (in kfence-#116): [ 24.596352] test_corruption+0x120/0x378 [ 24.596410] kunit_try_run_case+0x170/0x3f0 [ 24.596464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.596513] kthread+0x328/0x630 [ 24.596559] ret_from_fork+0x10/0x20 [ 24.596606] [ 24.596634] kfence-#116: 0x0000000072ee961d-0x00000000a03ffaf6, size=32, cache=test [ 24.596634] [ 24.596695] allocated by task 313 on cpu 1 at 24.595417s (0.001274s ago): [ 24.596769] test_alloc+0x230/0x628 [ 24.596817] test_corruption+0xdc/0x378 [ 24.596861] kunit_try_run_case+0x170/0x3f0 [ 24.596905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.596954] kthread+0x328/0x630 [ 24.597014] ret_from_fork+0x10/0x20 [ 24.597060] [ 24.597087] freed by task 313 on cpu 1 at 24.595512s (0.001570s ago): [ 24.597155] test_corruption+0x120/0x378 [ 24.597199] kunit_try_run_case+0x170/0x3f0 [ 24.597244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.597296] kthread+0x328/0x630 [ 24.597339] ret_from_fork+0x10/0x20 [ 24.597385] [ 24.597442] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 24.597533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.597567] Hardware name: linux,dummy-virt (DT) [ 24.597607] ================================================================== [ 24.699601] ================================================================== [ 24.699765] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 24.699765] [ 24.699846] Corrupted memory at 0x0000000037831a29 [ ! ] (in kfence-#117): [ 24.700014] test_corruption+0x1d8/0x378 [ 24.700074] kunit_try_run_case+0x170/0x3f0 [ 24.700126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.700178] kthread+0x328/0x630 [ 24.700226] ret_from_fork+0x10/0x20 [ 24.700270] [ 24.700300] kfence-#117: 0x00000000bf803449-0x000000002042216c, size=32, cache=test [ 24.700300] [ 24.700363] allocated by task 313 on cpu 1 at 24.699338s (0.001020s ago): [ 24.700436] test_alloc+0x230/0x628 [ 24.700484] test_corruption+0x198/0x378 [ 24.700530] kunit_try_run_case+0x170/0x3f0 [ 24.700574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.700623] kthread+0x328/0x630 [ 24.700667] ret_from_fork+0x10/0x20 [ 24.700710] [ 24.700738] freed by task 313 on cpu 1 at 24.699437s (0.001297s ago): [ 24.700806] test_corruption+0x1d8/0x378 [ 24.700852] kunit_try_run_case+0x170/0x3f0 [ 24.700896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.700944] kthread+0x328/0x630 [ 24.701002] ret_from_fork+0x10/0x20 [ 24.701052] [ 24.701105] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 24.701196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.701231] Hardware name: linux,dummy-virt (DT) [ 24.701275] ================================================================== [ 24.179631] ================================================================== [ 24.179781] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 24.179781] [ 24.179870] Corrupted memory at 0x00000000eb886328 [ ! . . . . . . . . . . . . . . . ] (in kfence-#112): [ 24.181270] test_corruption+0x278/0x378 [ 24.181338] kunit_try_run_case+0x170/0x3f0 [ 24.181394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181446] kthread+0x328/0x630 [ 24.181497] ret_from_fork+0x10/0x20 [ 24.181543] [ 24.181571] kfence-#112: 0x0000000023cf7a8b-0x00000000ee5a2f08, size=32, cache=kmalloc-32 [ 24.181571] [ 24.181639] allocated by task 311 on cpu 1 at 24.179261s (0.002373s ago): [ 24.181713] test_alloc+0x29c/0x628 [ 24.181763] test_corruption+0xdc/0x378 [ 24.181829] kunit_try_run_case+0x170/0x3f0 [ 24.181883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181933] kthread+0x328/0x630 [ 24.181993] ret_from_fork+0x10/0x20 [ 24.182044] [ 24.182073] freed by task 311 on cpu 1 at 24.179396s (0.002672s ago): [ 24.182143] test_corruption+0x278/0x378 [ 24.182192] kunit_try_run_case+0x170/0x3f0 [ 24.182239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.182289] kthread+0x328/0x630 [ 24.182334] ret_from_fork+0x10/0x20 [ 24.182383] [ 24.182442] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 24.182539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.182577] Hardware name: linux,dummy-virt (DT) [ 24.182618] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 23.971553] ================================================================== [ 23.971688] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 23.971688] [ 23.971776] Invalid free of 0x0000000036935ce6 (in kfence-#110): [ 23.971852] test_invalid_addr_free+0x1ac/0x238 [ 23.971915] kunit_try_run_case+0x170/0x3f0 [ 23.971994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.972049] kthread+0x328/0x630 [ 23.972099] ret_from_fork+0x10/0x20 [ 23.972146] [ 23.972176] kfence-#110: 0x0000000005cb5437-0x000000006adc9b06, size=32, cache=kmalloc-32 [ 23.972176] [ 23.972242] allocated by task 307 on cpu 0 at 23.971333s (0.000905s ago): [ 23.972316] test_alloc+0x29c/0x628 [ 23.972366] test_invalid_addr_free+0xd4/0x238 [ 23.972415] kunit_try_run_case+0x170/0x3f0 [ 23.972458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.972504] kthread+0x328/0x630 [ 23.972549] ret_from_fork+0x10/0x20 [ 23.972593] [ 23.972656] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.972751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.972786] Hardware name: linux,dummy-virt (DT) [ 23.972826] ================================================================== [ 24.075308] ================================================================== [ 24.075431] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 24.075431] [ 24.075508] Invalid free of 0x000000001e7e07b8 (in kfence-#111): [ 24.075571] test_invalid_addr_free+0xec/0x238 [ 24.075627] kunit_try_run_case+0x170/0x3f0 [ 24.075673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.075723] kthread+0x328/0x630 [ 24.075771] ret_from_fork+0x10/0x20 [ 24.075815] [ 24.075843] kfence-#111: 0x0000000078629be6-0x00000000b0f4e750, size=32, cache=test [ 24.075843] [ 24.075904] allocated by task 309 on cpu 0 at 24.075145s (0.000755s ago): [ 24.075998] test_alloc+0x230/0x628 [ 24.076055] test_invalid_addr_free+0xd4/0x238 [ 24.076102] kunit_try_run_case+0x170/0x3f0 [ 24.076147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.076197] kthread+0x328/0x630 [ 24.076240] ret_from_fork+0x10/0x20 [ 24.076287] [ 24.076345] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 24.076444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.076481] Hardware name: linux,dummy-virt (DT) [ 24.076526] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 23.763369] ================================================================== [ 23.763498] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 23.763498] [ 23.763575] Invalid free of 0x000000000a9d273d (in kfence-#108): [ 23.763686] test_double_free+0x1bc/0x238 [ 23.763827] kunit_try_run_case+0x170/0x3f0 [ 23.763878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.763923] kthread+0x328/0x630 [ 23.763965] ret_from_fork+0x10/0x20 [ 23.764025] [ 23.764055] kfence-#108: 0x000000000a9d273d-0x00000000d9af9fcd, size=32, cache=kmalloc-32 [ 23.764055] [ 23.764116] allocated by task 303 on cpu 1 at 23.763003s (0.001108s ago): [ 23.764186] test_alloc+0x29c/0x628 [ 23.764232] test_double_free+0xd4/0x238 [ 23.764275] kunit_try_run_case+0x170/0x3f0 [ 23.764317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.764363] kthread+0x328/0x630 [ 23.764414] ret_from_fork+0x10/0x20 [ 23.764480] [ 23.764504] freed by task 303 on cpu 1 at 23.763112s (0.001389s ago): [ 23.764621] test_double_free+0x1ac/0x238 [ 23.764665] kunit_try_run_case+0x170/0x3f0 [ 23.764704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.764749] kthread+0x328/0x630 [ 23.764789] ret_from_fork+0x10/0x20 [ 23.764830] [ 23.764881] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.764979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.765015] Hardware name: linux,dummy-virt (DT) [ 23.765054] ================================================================== [ 23.867393] ================================================================== [ 23.867521] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 23.867521] [ 23.867600] Invalid free of 0x00000000216839f2 (in kfence-#109): [ 23.867664] test_double_free+0x100/0x238 [ 23.867718] kunit_try_run_case+0x170/0x3f0 [ 23.867768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.867818] kthread+0x328/0x630 [ 23.867864] ret_from_fork+0x10/0x20 [ 23.867910] [ 23.867939] kfence-#109: 0x00000000216839f2-0x0000000049bb4299, size=32, cache=test [ 23.867939] [ 23.868015] allocated by task 305 on cpu 1 at 23.867129s (0.000881s ago): [ 23.868089] test_alloc+0x230/0x628 [ 23.868137] test_double_free+0xd4/0x238 [ 23.868181] kunit_try_run_case+0x170/0x3f0 [ 23.868227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.868274] kthread+0x328/0x630 [ 23.868319] ret_from_fork+0x10/0x20 [ 23.868362] [ 23.868390] freed by task 305 on cpu 1 at 23.867208s (0.001177s ago): [ 23.868459] test_double_free+0xf0/0x238 [ 23.868505] kunit_try_run_case+0x170/0x3f0 [ 23.868547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.868596] kthread+0x328/0x630 [ 23.868641] ret_from_fork+0x10/0x20 [ 23.868686] [ 23.868743] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.868840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.868875] Hardware name: linux,dummy-virt (DT) [ 23.868916] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 23.453731] ================================================================== [ 23.454134] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 23.454134] [ 23.454269] Use-after-free read at 0x000000009e8924cb (in kfence-#105): [ 23.454333] test_use_after_free_read+0x114/0x248 [ 23.454395] kunit_try_run_case+0x170/0x3f0 [ 23.454717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.455130] kthread+0x328/0x630 [ 23.455228] ret_from_fork+0x10/0x20 [ 23.455373] [ 23.455465] kfence-#105: 0x000000009e8924cb-0x00000000b21d41c3, size=32, cache=test [ 23.455465] [ 23.455705] allocated by task 297 on cpu 1 at 23.452834s (0.002863s ago): [ 23.456008] test_alloc+0x230/0x628 [ 23.456335] test_use_after_free_read+0xd0/0x248 [ 23.456570] kunit_try_run_case+0x170/0x3f0 [ 23.456636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.456705] kthread+0x328/0x630 [ 23.456750] ret_from_fork+0x10/0x20 [ 23.456797] [ 23.457128] freed by task 297 on cpu 1 at 23.452907s (0.004184s ago): [ 23.457406] test_use_after_free_read+0xf0/0x248 [ 23.457467] kunit_try_run_case+0x170/0x3f0 [ 23.457681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.457744] kthread+0x328/0x630 [ 23.457793] ret_from_fork+0x10/0x20 [ 23.457867] [ 23.457928] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.458045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.458083] Hardware name: linux,dummy-virt (DT) [ 23.458126] ================================================================== [ 23.348718] ================================================================== [ 23.348986] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 23.348986] [ 23.349135] Use-after-free read at 0x00000000d0c7f4c7 (in kfence-#104): [ 23.349206] test_use_after_free_read+0x114/0x248 [ 23.349267] kunit_try_run_case+0x170/0x3f0 [ 23.349797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.350065] kthread+0x328/0x630 [ 23.350127] ret_from_fork+0x10/0x20 [ 23.350210] [ 23.350250] kfence-#104: 0x00000000d0c7f4c7-0x00000000479c9ef7, size=32, cache=kmalloc-32 [ 23.350250] [ 23.350531] allocated by task 295 on cpu 1 at 23.347764s (0.002760s ago): [ 23.350666] test_alloc+0x29c/0x628 [ 23.350877] test_use_after_free_read+0xd0/0x248 [ 23.350982] kunit_try_run_case+0x170/0x3f0 [ 23.351038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.351459] kthread+0x328/0x630 [ 23.351556] ret_from_fork+0x10/0x20 [ 23.351742] [ 23.352347] freed by task 295 on cpu 1 at 23.347919s (0.004244s ago): [ 23.352864] test_use_after_free_read+0x1c0/0x248 [ 23.353018] kunit_try_run_case+0x170/0x3f0 [ 23.353079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.353364] kthread+0x328/0x630 [ 23.353627] ret_from_fork+0x10/0x20 [ 23.353773] [ 23.354079] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 23.354263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.355235] Hardware name: linux,dummy-virt (DT) [ 23.355618] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 22.932172] ================================================================== [ 22.932285] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 22.932285] [ 22.932396] Out-of-bounds read at 0x0000000052a368c2 (32B right of kfence-#100): [ 22.932467] test_out_of_bounds_read+0x1c8/0x3e0 [ 22.932524] kunit_try_run_case+0x170/0x3f0 [ 22.932573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.932622] kthread+0x328/0x630 [ 22.932670] ret_from_fork+0x10/0x20 [ 22.932716] [ 22.932744] kfence-#100: 0x000000000a274cde-0x0000000030099e6c, size=32, cache=test [ 22.932744] [ 22.932801] allocated by task 289 on cpu 1 at 22.932049s (0.000747s ago): [ 22.932885] test_alloc+0x230/0x628 [ 22.932932] test_out_of_bounds_read+0x198/0x3e0 [ 22.933686] kunit_try_run_case+0x170/0x3f0 [ 22.933760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.933878] kthread+0x328/0x630 [ 22.934018] ret_from_fork+0x10/0x20 [ 22.934134] [ 22.934191] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.934609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.934672] Hardware name: linux,dummy-virt (DT) [ 22.934747] ================================================================== [ 22.724996] ================================================================== [ 22.725105] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 22.725105] [ 22.725563] Out-of-bounds read at 0x00000000236d31dc (1B left of kfence-#98): [ 22.726034] test_out_of_bounds_read+0x114/0x3e0 [ 22.726119] kunit_try_run_case+0x170/0x3f0 [ 22.726458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.726632] kthread+0x328/0x630 [ 22.726787] ret_from_fork+0x10/0x20 [ 22.726843] [ 22.726955] kfence-#98: 0x00000000b4691d7b-0x0000000006658219, size=32, cache=test [ 22.726955] [ 22.727279] allocated by task 289 on cpu 1 at 22.724761s (0.002512s ago): [ 22.728380] test_alloc+0x230/0x628 [ 22.728473] test_out_of_bounds_read+0xdc/0x3e0 [ 22.728534] kunit_try_run_case+0x170/0x3f0 [ 22.728598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.728668] kthread+0x328/0x630 [ 22.728986] ret_from_fork+0x10/0x20 [ 22.729172] [ 22.729489] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.729839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.730184] Hardware name: linux,dummy-virt (DT) [ 22.730423] ================================================================== [ 22.621253] ================================================================== [ 22.621358] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 22.621358] [ 22.621491] Out-of-bounds read at 0x00000000c28388a9 (32B right of kfence-#97): [ 22.621562] test_out_of_bounds_read+0x1c8/0x3e0 [ 22.621620] kunit_try_run_case+0x170/0x3f0 [ 22.621669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.621719] kthread+0x328/0x630 [ 22.621766] ret_from_fork+0x10/0x20 [ 22.621820] [ 22.621855] kfence-#97: 0x000000002b3086a4-0x00000000b410308c, size=32, cache=kmalloc-32 [ 22.621855] [ 22.621917] allocated by task 287 on cpu 1 at 22.621022s (0.000890s ago): [ 22.622024] test_alloc+0x29c/0x628 [ 22.622306] test_out_of_bounds_read+0x198/0x3e0 [ 22.622436] kunit_try_run_case+0x170/0x3f0 [ 22.622592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.622684] kthread+0x328/0x630 [ 22.622741] ret_from_fork+0x10/0x20 [ 22.622804] [ 22.622867] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.623511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.623664] Hardware name: linux,dummy-virt (DT) [ 22.623776] ================================================================== [ 22.517067] ================================================================== [ 22.517440] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 22.517440] [ 22.517693] Out-of-bounds read at 0x000000006fb4a574 (1B left of kfence-#96): [ 22.518064] test_out_of_bounds_read+0x114/0x3e0 [ 22.518244] kunit_try_run_case+0x170/0x3f0 [ 22.518301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.518351] kthread+0x328/0x630 [ 22.518412] ret_from_fork+0x10/0x20 [ 22.518522] [ 22.519363] kfence-#96: 0x0000000070e3451a-0x00000000a2d5ff56, size=32, cache=kmalloc-32 [ 22.519363] [ 22.520491] allocated by task 287 on cpu 1 at 22.516021s (0.004177s ago): [ 22.521496] test_alloc+0x29c/0x628 [ 22.521601] test_out_of_bounds_read+0xdc/0x3e0 [ 22.522109] kunit_try_run_case+0x170/0x3f0 [ 22.522184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.522239] kthread+0x328/0x630 [ 22.522626] ret_from_fork+0x10/0x20 [ 22.522878] [ 22.522988] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.523088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.523147] Hardware name: linux,dummy-virt (DT) [ 22.523197] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 22.349574] ================================================================== [ 22.349645] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 22.349724] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.349787] [ 22.349849] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.349952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.350000] Hardware name: linux,dummy-virt (DT) [ 22.350040] Call trace: [ 22.350070] show_stack+0x20/0x38 (C) [ 22.350269] dump_stack_lvl+0x8c/0xd0 [ 22.350351] print_report+0x118/0x608 [ 22.350408] kasan_report+0xdc/0x128 [ 22.350472] kasan_check_range+0x100/0x1a8 [ 22.350532] __kasan_check_write+0x20/0x30 [ 22.350593] strncpy_from_user+0x3c/0x2a0 [ 22.350647] copy_user_test_oob+0x5c0/0xec8 [ 22.350760] kunit_try_run_case+0x170/0x3f0 [ 22.350819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.350894] kthread+0x328/0x630 [ 22.350948] ret_from_fork+0x10/0x20 [ 22.351095] [ 22.351122] Allocated by task 285: [ 22.351159] kasan_save_stack+0x3c/0x68 [ 22.351207] kasan_save_track+0x20/0x40 [ 22.351248] kasan_save_alloc_info+0x40/0x58 [ 22.351420] __kasan_kmalloc+0xd4/0xd8 [ 22.351466] __kmalloc_noprof+0x190/0x4d0 [ 22.351510] kunit_kmalloc_array+0x34/0x88 [ 22.351568] copy_user_test_oob+0xac/0xec8 [ 22.351667] kunit_try_run_case+0x170/0x3f0 [ 22.351824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.351880] kthread+0x328/0x630 [ 22.351923] ret_from_fork+0x10/0x20 [ 22.351964] [ 22.351998] The buggy address belongs to the object at fff00000c6620c00 [ 22.351998] which belongs to the cache kmalloc-128 of size 128 [ 22.352086] The buggy address is located 0 bytes inside of [ 22.352086] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.352188] [ 22.352224] The buggy address belongs to the physical page: [ 22.352263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.352322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.352376] page_type: f5(slab) [ 22.352424] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.352509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.352628] page dumped because: kasan: bad access detected [ 22.352670] [ 22.352691] Memory state around the buggy address: [ 22.352728] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.352823] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.352876] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.352920] ^ [ 22.353116] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.353192] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.353289] ================================================================== [ 22.353663] ================================================================== [ 22.353720] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 22.353785] Write of size 1 at addr fff00000c6620c78 by task kunit_try_catch/285 [ 22.353865] [ 22.353904] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.354019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.354054] Hardware name: linux,dummy-virt (DT) [ 22.354094] Call trace: [ 22.354126] show_stack+0x20/0x38 (C) [ 22.354185] dump_stack_lvl+0x8c/0xd0 [ 22.354239] print_report+0x118/0x608 [ 22.354291] kasan_report+0xdc/0x128 [ 22.354344] __asan_report_store1_noabort+0x20/0x30 [ 22.354402] strncpy_from_user+0x270/0x2a0 [ 22.354998] copy_user_test_oob+0x5c0/0xec8 [ 22.355163] kunit_try_run_case+0x170/0x3f0 [ 22.355279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.355341] kthread+0x328/0x630 [ 22.355555] ret_from_fork+0x10/0x20 [ 22.355626] [ 22.355654] Allocated by task 285: [ 22.355689] kasan_save_stack+0x3c/0x68 [ 22.355738] kasan_save_track+0x20/0x40 [ 22.355783] kasan_save_alloc_info+0x40/0x58 [ 22.355865] __kasan_kmalloc+0xd4/0xd8 [ 22.355965] __kmalloc_noprof+0x190/0x4d0 [ 22.356021] kunit_kmalloc_array+0x34/0x88 [ 22.356076] copy_user_test_oob+0xac/0xec8 [ 22.356182] kunit_try_run_case+0x170/0x3f0 [ 22.356248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.356299] kthread+0x328/0x630 [ 22.356338] ret_from_fork+0x10/0x20 [ 22.356468] [ 22.356538] The buggy address belongs to the object at fff00000c6620c00 [ 22.356538] which belongs to the cache kmalloc-128 of size 128 [ 22.356612] The buggy address is located 0 bytes to the right of [ 22.356612] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.356682] [ 22.356707] The buggy address belongs to the physical page: [ 22.356743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.356799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.356851] page_type: f5(slab) [ 22.356897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.356954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.357850] page dumped because: kasan: bad access detected [ 22.358421] [ 22.358770] Memory state around the buggy address: [ 22.358835] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.358906] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.358961] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.359023] ^ [ 22.359076] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.359128] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.359174] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 22.332245] ================================================================== [ 22.332336] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 22.332967] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.333055] [ 22.333186] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.333576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.333632] Hardware name: linux,dummy-virt (DT) [ 22.333675] Call trace: [ 22.333704] show_stack+0x20/0x38 (C) [ 22.333779] dump_stack_lvl+0x8c/0xd0 [ 22.333844] print_report+0x118/0x608 [ 22.333905] kasan_report+0xdc/0x128 [ 22.333958] kasan_check_range+0x100/0x1a8 [ 22.334362] __kasan_check_write+0x20/0x30 [ 22.334425] copy_user_test_oob+0x35c/0xec8 [ 22.334565] kunit_try_run_case+0x170/0x3f0 [ 22.334626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.334798] kthread+0x328/0x630 [ 22.335202] ret_from_fork+0x10/0x20 [ 22.335272] [ 22.335296] Allocated by task 285: [ 22.335338] kasan_save_stack+0x3c/0x68 [ 22.335391] kasan_save_track+0x20/0x40 [ 22.335482] kasan_save_alloc_info+0x40/0x58 [ 22.335527] __kasan_kmalloc+0xd4/0xd8 [ 22.335589] __kmalloc_noprof+0x190/0x4d0 [ 22.335647] kunit_kmalloc_array+0x34/0x88 [ 22.335692] copy_user_test_oob+0xac/0xec8 [ 22.335770] kunit_try_run_case+0x170/0x3f0 [ 22.335810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.335853] kthread+0x328/0x630 [ 22.335891] ret_from_fork+0x10/0x20 [ 22.335930] [ 22.335953] The buggy address belongs to the object at fff00000c6620c00 [ 22.335953] which belongs to the cache kmalloc-128 of size 128 [ 22.336029] The buggy address is located 0 bytes inside of [ 22.336029] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.336098] [ 22.336125] The buggy address belongs to the physical page: [ 22.336162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.336253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.336342] page_type: f5(slab) [ 22.336415] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.336524] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.336571] page dumped because: kasan: bad access detected [ 22.336610] [ 22.336633] Memory state around the buggy address: [ 22.336676] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.336750] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.336863] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.336909] ^ [ 22.336954] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.337013] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.337060] ================================================================== [ 22.345537] ================================================================== [ 22.345597] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 22.345662] Read of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.345721] [ 22.345760] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.345881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.345942] Hardware name: linux,dummy-virt (DT) [ 22.346001] Call trace: [ 22.346033] show_stack+0x20/0x38 (C) [ 22.346092] dump_stack_lvl+0x8c/0xd0 [ 22.346179] print_report+0x118/0x608 [ 22.346233] kasan_report+0xdc/0x128 [ 22.346284] kasan_check_range+0x100/0x1a8 [ 22.346352] __kasan_check_read+0x20/0x30 [ 22.346496] copy_user_test_oob+0x4a0/0xec8 [ 22.346568] kunit_try_run_case+0x170/0x3f0 [ 22.346622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.346681] kthread+0x328/0x630 [ 22.346736] ret_from_fork+0x10/0x20 [ 22.346802] [ 22.346827] Allocated by task 285: [ 22.347058] kasan_save_stack+0x3c/0x68 [ 22.347164] kasan_save_track+0x20/0x40 [ 22.347220] kasan_save_alloc_info+0x40/0x58 [ 22.347285] __kasan_kmalloc+0xd4/0xd8 [ 22.347327] __kmalloc_noprof+0x190/0x4d0 [ 22.347371] kunit_kmalloc_array+0x34/0x88 [ 22.347413] copy_user_test_oob+0xac/0xec8 [ 22.347460] kunit_try_run_case+0x170/0x3f0 [ 22.347503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.347566] kthread+0x328/0x630 [ 22.347606] ret_from_fork+0x10/0x20 [ 22.347647] [ 22.347703] The buggy address belongs to the object at fff00000c6620c00 [ 22.347703] which belongs to the cache kmalloc-128 of size 128 [ 22.347781] The buggy address is located 0 bytes inside of [ 22.347781] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.347850] [ 22.347875] The buggy address belongs to the physical page: [ 22.347911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.347980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.348096] page_type: f5(slab) [ 22.348186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.348306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.348356] page dumped because: kasan: bad access detected [ 22.348396] [ 22.348421] Memory state around the buggy address: [ 22.348461] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.348519] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.348623] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.348685] ^ [ 22.348734] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.348784] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.348828] ================================================================== [ 22.338029] ================================================================== [ 22.338141] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 22.338217] Read of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.338278] [ 22.338318] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.338417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.338507] Hardware name: linux,dummy-virt (DT) [ 22.338554] Call trace: [ 22.338642] show_stack+0x20/0x38 (C) [ 22.338709] dump_stack_lvl+0x8c/0xd0 [ 22.338764] print_report+0x118/0x608 [ 22.338868] kasan_report+0xdc/0x128 [ 22.338922] kasan_check_range+0x100/0x1a8 [ 22.338993] __kasan_check_read+0x20/0x30 [ 22.339055] copy_user_test_oob+0x3c8/0xec8 [ 22.339110] kunit_try_run_case+0x170/0x3f0 [ 22.339166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.339265] kthread+0x328/0x630 [ 22.339326] ret_from_fork+0x10/0x20 [ 22.339385] [ 22.339412] Allocated by task 285: [ 22.339447] kasan_save_stack+0x3c/0x68 [ 22.339581] kasan_save_track+0x20/0x40 [ 22.339630] kasan_save_alloc_info+0x40/0x58 [ 22.339680] __kasan_kmalloc+0xd4/0xd8 [ 22.339723] __kmalloc_noprof+0x190/0x4d0 [ 22.339816] kunit_kmalloc_array+0x34/0x88 [ 22.339855] copy_user_test_oob+0xac/0xec8 [ 22.339895] kunit_try_run_case+0x170/0x3f0 [ 22.339936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.339997] kthread+0x328/0x630 [ 22.340040] ret_from_fork+0x10/0x20 [ 22.340083] [ 22.340108] The buggy address belongs to the object at fff00000c6620c00 [ 22.340108] which belongs to the cache kmalloc-128 of size 128 [ 22.340180] The buggy address is located 0 bytes inside of [ 22.340180] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.340313] [ 22.340339] The buggy address belongs to the physical page: [ 22.340375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.340476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.340533] page_type: f5(slab) [ 22.340623] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.340682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.340727] page dumped because: kasan: bad access detected [ 22.340765] [ 22.340787] Memory state around the buggy address: [ 22.340826] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.340875] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.340923] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.340963] ^ [ 22.341084] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.341207] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.341258] ================================================================== [ 22.300482] ================================================================== [ 22.300720] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 22.300881] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.300992] [ 22.301051] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.301352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.301388] Hardware name: linux,dummy-virt (DT) [ 22.301432] Call trace: [ 22.301466] show_stack+0x20/0x38 (C) [ 22.301533] dump_stack_lvl+0x8c/0xd0 [ 22.301593] print_report+0x118/0x608 [ 22.301647] kasan_report+0xdc/0x128 [ 22.301700] kasan_check_range+0x100/0x1a8 [ 22.301753] __kasan_check_write+0x20/0x30 [ 22.301832] copy_user_test_oob+0x234/0xec8 [ 22.301892] kunit_try_run_case+0x170/0x3f0 [ 22.301953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.302027] kthread+0x328/0x630 [ 22.302258] ret_from_fork+0x10/0x20 [ 22.302360] [ 22.302390] Allocated by task 285: [ 22.302432] kasan_save_stack+0x3c/0x68 [ 22.302486] kasan_save_track+0x20/0x40 [ 22.302532] kasan_save_alloc_info+0x40/0x58 [ 22.302577] __kasan_kmalloc+0xd4/0xd8 [ 22.303132] __kmalloc_noprof+0x190/0x4d0 [ 22.303198] kunit_kmalloc_array+0x34/0x88 [ 22.303244] copy_user_test_oob+0xac/0xec8 [ 22.303288] kunit_try_run_case+0x170/0x3f0 [ 22.303335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.303383] kthread+0x328/0x630 [ 22.303425] ret_from_fork+0x10/0x20 [ 22.303470] [ 22.303498] The buggy address belongs to the object at fff00000c6620c00 [ 22.303498] which belongs to the cache kmalloc-128 of size 128 [ 22.303570] The buggy address is located 0 bytes inside of [ 22.303570] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.303641] [ 22.303670] The buggy address belongs to the physical page: [ 22.303710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.303778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.303840] page_type: f5(slab) [ 22.303894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.303956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.304025] page dumped because: kasan: bad access detected [ 22.304065] [ 22.304134] Memory state around the buggy address: [ 22.304218] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.304274] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.304414] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.304550] ^ [ 22.304670] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.304721] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.304957] ================================================================== [ 22.341683] ================================================================== [ 22.341743] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 22.341816] Write of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.341880] [ 22.341921] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.342026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.342073] Hardware name: linux,dummy-virt (DT) [ 22.342132] Call trace: [ 22.342160] show_stack+0x20/0x38 (C) [ 22.342218] dump_stack_lvl+0x8c/0xd0 [ 22.342272] print_report+0x118/0x608 [ 22.342323] kasan_report+0xdc/0x128 [ 22.342412] kasan_check_range+0x100/0x1a8 [ 22.342516] __kasan_check_write+0x20/0x30 [ 22.342601] copy_user_test_oob+0x434/0xec8 [ 22.342712] kunit_try_run_case+0x170/0x3f0 [ 22.342788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.342846] kthread+0x328/0x630 [ 22.343059] ret_from_fork+0x10/0x20 [ 22.343123] [ 22.343161] Allocated by task 285: [ 22.343199] kasan_save_stack+0x3c/0x68 [ 22.343248] kasan_save_track+0x20/0x40 [ 22.343292] kasan_save_alloc_info+0x40/0x58 [ 22.343339] __kasan_kmalloc+0xd4/0xd8 [ 22.343384] __kmalloc_noprof+0x190/0x4d0 [ 22.343426] kunit_kmalloc_array+0x34/0x88 [ 22.343468] copy_user_test_oob+0xac/0xec8 [ 22.343511] kunit_try_run_case+0x170/0x3f0 [ 22.343555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.343635] kthread+0x328/0x630 [ 22.343680] ret_from_fork+0x10/0x20 [ 22.343740] [ 22.343794] The buggy address belongs to the object at fff00000c6620c00 [ 22.343794] which belongs to the cache kmalloc-128 of size 128 [ 22.343943] The buggy address is located 0 bytes inside of [ 22.343943] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.344035] [ 22.344103] The buggy address belongs to the physical page: [ 22.344142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.344203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.344259] page_type: f5(slab) [ 22.344308] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.344445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.344499] page dumped because: kasan: bad access detected [ 22.344565] [ 22.344596] Memory state around the buggy address: [ 22.344639] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.344692] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.344742] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.344787] ^ [ 22.344834] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.344900] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.345009] ================================================================== [ 22.313497] ================================================================== [ 22.313590] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 22.313676] Read of size 121 at addr fff00000c6620c00 by task kunit_try_catch/285 [ 22.313736] [ 22.313840] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.313961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.314008] Hardware name: linux,dummy-virt (DT) [ 22.314204] Call trace: [ 22.314649] show_stack+0x20/0x38 (C) [ 22.314717] dump_stack_lvl+0x8c/0xd0 [ 22.314772] print_report+0x118/0x608 [ 22.314822] kasan_report+0xdc/0x128 [ 22.314872] kasan_check_range+0x100/0x1a8 [ 22.314925] __kasan_check_read+0x20/0x30 [ 22.314986] copy_user_test_oob+0x728/0xec8 [ 22.315043] kunit_try_run_case+0x170/0x3f0 [ 22.315609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.315806] kthread+0x328/0x630 [ 22.316138] ret_from_fork+0x10/0x20 [ 22.316354] [ 22.316383] Allocated by task 285: [ 22.316711] kasan_save_stack+0x3c/0x68 [ 22.316780] kasan_save_track+0x20/0x40 [ 22.316827] kasan_save_alloc_info+0x40/0x58 [ 22.316876] __kasan_kmalloc+0xd4/0xd8 [ 22.316918] __kmalloc_noprof+0x190/0x4d0 [ 22.316964] kunit_kmalloc_array+0x34/0x88 [ 22.317024] copy_user_test_oob+0xac/0xec8 [ 22.317070] kunit_try_run_case+0x170/0x3f0 [ 22.318460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.318561] kthread+0x328/0x630 [ 22.318615] ret_from_fork+0x10/0x20 [ 22.318661] [ 22.318693] The buggy address belongs to the object at fff00000c6620c00 [ 22.318693] which belongs to the cache kmalloc-128 of size 128 [ 22.319295] The buggy address is located 0 bytes inside of [ 22.319295] allocated 120-byte region [fff00000c6620c00, fff00000c6620c78) [ 22.319386] [ 22.319520] The buggy address belongs to the physical page: [ 22.319607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.319677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.319880] page_type: f5(slab) [ 22.320097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.320232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.320420] page dumped because: kasan: bad access detected [ 22.320557] [ 22.320585] Memory state around the buggy address: [ 22.320628] fff00000c6620b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.320680] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.320728] >fff00000c6620c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.320959] ^ [ 22.321053] fff00000c6620c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.321246] fff00000c6620d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.321293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 22.240096] ================================================================== [ 22.240340] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 22.240575] Read of size 8 at addr fff00000c6620b78 by task kunit_try_catch/281 [ 22.240707] [ 22.240775] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.241161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.241524] Hardware name: linux,dummy-virt (DT) [ 22.241591] Call trace: [ 22.241764] show_stack+0x20/0x38 (C) [ 22.242149] dump_stack_lvl+0x8c/0xd0 [ 22.242271] print_report+0x118/0x608 [ 22.242515] kasan_report+0xdc/0x128 [ 22.242669] __asan_report_load8_noabort+0x20/0x30 [ 22.242857] copy_to_kernel_nofault+0x204/0x250 [ 22.242918] copy_to_kernel_nofault_oob+0x158/0x418 [ 22.242987] kunit_try_run_case+0x170/0x3f0 [ 22.243142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.243211] kthread+0x328/0x630 [ 22.243654] ret_from_fork+0x10/0x20 [ 22.244077] [ 22.244136] Allocated by task 281: [ 22.244195] kasan_save_stack+0x3c/0x68 [ 22.244416] kasan_save_track+0x20/0x40 [ 22.244479] kasan_save_alloc_info+0x40/0x58 [ 22.244523] __kasan_kmalloc+0xd4/0xd8 [ 22.244728] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.244787] copy_to_kernel_nofault_oob+0xc8/0x418 [ 22.244837] kunit_try_run_case+0x170/0x3f0 [ 22.244932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.245260] kthread+0x328/0x630 [ 22.245434] ret_from_fork+0x10/0x20 [ 22.245639] [ 22.245750] The buggy address belongs to the object at fff00000c6620b00 [ 22.245750] which belongs to the cache kmalloc-128 of size 128 [ 22.245850] The buggy address is located 0 bytes to the right of [ 22.245850] allocated 120-byte region [fff00000c6620b00, fff00000c6620b78) [ 22.246226] [ 22.246268] The buggy address belongs to the physical page: [ 22.246609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.247166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.247260] page_type: f5(slab) [ 22.247506] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.247644] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.247742] page dumped because: kasan: bad access detected [ 22.248297] [ 22.248342] Memory state around the buggy address: [ 22.248449] fff00000c6620a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.248560] fff00000c6620a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.248650] >fff00000c6620b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.248884] ^ [ 22.249103] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.249182] fff00000c6620c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.249233] ================================================================== [ 22.252586] ================================================================== [ 22.252723] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 22.252808] Write of size 8 at addr fff00000c6620b78 by task kunit_try_catch/281 [ 22.253332] [ 22.253383] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.253483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.253520] Hardware name: linux,dummy-virt (DT) [ 22.253953] Call trace: [ 22.254011] show_stack+0x20/0x38 (C) [ 22.254083] dump_stack_lvl+0x8c/0xd0 [ 22.254137] print_report+0x118/0x608 [ 22.254191] kasan_report+0xdc/0x128 [ 22.254240] kasan_check_range+0x100/0x1a8 [ 22.254632] __kasan_check_write+0x20/0x30 [ 22.254761] copy_to_kernel_nofault+0x8c/0x250 [ 22.254826] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 22.255466] kunit_try_run_case+0x170/0x3f0 [ 22.255554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.255765] kthread+0x328/0x630 [ 22.255963] ret_from_fork+0x10/0x20 [ 22.256159] [ 22.256188] Allocated by task 281: [ 22.256365] kasan_save_stack+0x3c/0x68 [ 22.256426] kasan_save_track+0x20/0x40 [ 22.256689] kasan_save_alloc_info+0x40/0x58 [ 22.256771] __kasan_kmalloc+0xd4/0xd8 [ 22.256817] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.256863] copy_to_kernel_nofault_oob+0xc8/0x418 [ 22.257360] kunit_try_run_case+0x170/0x3f0 [ 22.257488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.257548] kthread+0x328/0x630 [ 22.257596] ret_from_fork+0x10/0x20 [ 22.257796] [ 22.257871] The buggy address belongs to the object at fff00000c6620b00 [ 22.257871] which belongs to the cache kmalloc-128 of size 128 [ 22.258206] The buggy address is located 0 bytes to the right of [ 22.258206] allocated 120-byte region [fff00000c6620b00, fff00000c6620b78) [ 22.258439] [ 22.258546] The buggy address belongs to the physical page: [ 22.258603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 22.259092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.259232] page_type: f5(slab) [ 22.259296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.259511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.259679] page dumped because: kasan: bad access detected [ 22.259731] [ 22.259757] Memory state around the buggy address: [ 22.259820] fff00000c6620a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.259879] fff00000c6620a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.260260] >fff00000c6620b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.260337] ^ [ 22.260392] fff00000c6620b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.260447] fff00000c6620c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.260745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 22.172540] ================================================================== [ 22.172612] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 22.172687] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 22.173521] [ 22.173842] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.173991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.174028] Hardware name: linux,dummy-virt (DT) [ 22.174073] Call trace: [ 22.174416] show_stack+0x20/0x38 (C) [ 22.174870] dump_stack_lvl+0x8c/0xd0 [ 22.174960] print_report+0x310/0x608 [ 22.175131] kasan_report+0xdc/0x128 [ 22.175333] __asan_report_load1_noabort+0x20/0x30 [ 22.175899] vmalloc_oob+0x51c/0x5d0 [ 22.175984] kunit_try_run_case+0x170/0x3f0 [ 22.176230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.176598] kthread+0x328/0x630 [ 22.176672] ret_from_fork+0x10/0x20 [ 22.177260] [ 22.177469] The buggy address belongs to the virtual mapping at [ 22.177469] [ffff8000800fe000, ffff800080100000) created by: [ 22.177469] vmalloc_oob+0x98/0x5d0 [ 22.177573] [ 22.177604] The buggy address belongs to the physical page: [ 22.177644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059db [ 22.177900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.178906] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.179644] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.179728] page dumped because: kasan: bad access detected [ 22.180187] [ 22.180250] Memory state around the buggy address: [ 22.180303] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.180362] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.180861] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 22.181227] ^ [ 22.181295] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.181351] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.181644] ================================================================== [ 22.167308] ================================================================== [ 22.167481] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 22.167573] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 22.167635] [ 22.167684] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.167803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.167847] Hardware name: linux,dummy-virt (DT) [ 22.167889] Call trace: [ 22.167921] show_stack+0x20/0x38 (C) [ 22.168001] dump_stack_lvl+0x8c/0xd0 [ 22.168060] print_report+0x310/0x608 [ 22.168116] kasan_report+0xdc/0x128 [ 22.168468] __asan_report_load1_noabort+0x20/0x30 [ 22.168596] vmalloc_oob+0x578/0x5d0 [ 22.168798] kunit_try_run_case+0x170/0x3f0 [ 22.169407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.169727] kthread+0x328/0x630 [ 22.169836] ret_from_fork+0x10/0x20 [ 22.169908] [ 22.169954] The buggy address belongs to the virtual mapping at [ 22.169954] [ffff8000800fe000, ffff800080100000) created by: [ 22.169954] vmalloc_oob+0x98/0x5d0 [ 22.170068] [ 22.170100] The buggy address belongs to the physical page: [ 22.170152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059db [ 22.170217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.170302] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.170373] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.170461] page dumped because: kasan: bad access detected [ 22.170533] [ 22.170559] Memory state around the buggy address: [ 22.170609] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.170848] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.170937] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 22.171212] ^ [ 22.171423] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.171501] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.171549] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 22.083925] ================================================================== [ 22.084026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.084521] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.086015] [ 22.086107] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.086221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.086256] Hardware name: linux,dummy-virt (DT) [ 22.086296] Call trace: [ 22.086328] show_stack+0x20/0x38 (C) [ 22.086396] dump_stack_lvl+0x8c/0xd0 [ 22.086465] print_report+0x118/0x608 [ 22.086524] kasan_report+0xdc/0x128 [ 22.086581] kasan_check_range+0x100/0x1a8 [ 22.086637] __kasan_check_write+0x20/0x30 [ 22.086693] kasan_atomics_helper+0x154c/0x4858 [ 22.086751] kasan_atomics+0x198/0x2e0 [ 22.086806] kunit_try_run_case+0x170/0x3f0 [ 22.086863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.086925] kthread+0x328/0x630 [ 22.086988] ret_from_fork+0x10/0x20 [ 22.087052] [ 22.087077] Allocated by task 265: [ 22.087113] kasan_save_stack+0x3c/0x68 [ 22.088819] kasan_save_track+0x20/0x40 [ 22.088930] kasan_save_alloc_info+0x40/0x58 [ 22.089037] __kasan_kmalloc+0xd4/0xd8 [ 22.089117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.089166] kasan_atomics+0xb8/0x2e0 [ 22.089224] kunit_try_run_case+0x170/0x3f0 [ 22.089325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.089428] kthread+0x328/0x630 [ 22.089526] ret_from_fork+0x10/0x20 [ 22.089572] [ 22.089605] The buggy address belongs to the object at fff00000c59de300 [ 22.089605] which belongs to the cache kmalloc-64 of size 64 [ 22.089685] The buggy address is located 0 bytes to the right of [ 22.089685] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.089759] [ 22.089786] The buggy address belongs to the physical page: [ 22.089850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.089918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.090021] page_type: f5(slab) [ 22.090076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.090135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.090185] page dumped because: kasan: bad access detected [ 22.090225] [ 22.090249] Memory state around the buggy address: [ 22.090290] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.090370] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.090423] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.090491] ^ [ 22.090557] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.090612] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.090672] ================================================================== [ 22.091569] ================================================================== [ 22.091648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.091727] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.091787] [ 22.091830] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.091927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.091960] Hardware name: linux,dummy-virt (DT) [ 22.092018] Call trace: [ 22.092049] show_stack+0x20/0x38 (C) [ 22.092109] dump_stack_lvl+0x8c/0xd0 [ 22.092164] print_report+0x118/0x608 [ 22.092216] kasan_report+0xdc/0x128 [ 22.092270] kasan_check_range+0x100/0x1a8 [ 22.092323] __kasan_check_write+0x20/0x30 [ 22.092376] kasan_atomics_helper+0x15b4/0x4858 [ 22.092439] kasan_atomics+0x198/0x2e0 [ 22.092551] kunit_try_run_case+0x170/0x3f0 [ 22.092670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.092731] kthread+0x328/0x630 [ 22.092784] ret_from_fork+0x10/0x20 [ 22.092841] [ 22.092866] Allocated by task 265: [ 22.092902] kasan_save_stack+0x3c/0x68 [ 22.092953] kasan_save_track+0x20/0x40 [ 22.093014] kasan_save_alloc_info+0x40/0x58 [ 22.093062] __kasan_kmalloc+0xd4/0xd8 [ 22.093105] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.093151] kasan_atomics+0xb8/0x2e0 [ 22.093220] kunit_try_run_case+0x170/0x3f0 [ 22.093277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.093338] kthread+0x328/0x630 [ 22.093391] ret_from_fork+0x10/0x20 [ 22.093445] [ 22.094009] The buggy address belongs to the object at fff00000c59de300 [ 22.094009] which belongs to the cache kmalloc-64 of size 64 [ 22.094085] The buggy address is located 0 bytes to the right of [ 22.094085] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.094161] [ 22.094707] The buggy address belongs to the physical page: [ 22.094805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.094876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.095175] page_type: f5(slab) [ 22.095256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.095325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.095376] page dumped because: kasan: bad access detected [ 22.095425] [ 22.095457] Memory state around the buggy address: [ 22.095508] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.095561] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.096014] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.096100] ^ [ 22.096169] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.096264] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.096344] ================================================================== [ 21.835378] ================================================================== [ 21.835462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 21.835544] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.835606] [ 21.835652] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.835758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.835795] Hardware name: linux,dummy-virt (DT) [ 21.835878] Call trace: [ 21.835917] show_stack+0x20/0x38 (C) [ 21.835993] dump_stack_lvl+0x8c/0xd0 [ 21.836056] print_report+0x118/0x608 [ 21.836135] kasan_report+0xdc/0x128 [ 21.836198] __asan_report_load4_noabort+0x20/0x30 [ 21.836261] kasan_atomics_helper+0x3dcc/0x4858 [ 21.836324] kasan_atomics+0x198/0x2e0 [ 21.836376] kunit_try_run_case+0x170/0x3f0 [ 21.836455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.836527] kthread+0x328/0x630 [ 21.836583] ret_from_fork+0x10/0x20 [ 21.836643] [ 21.836670] Allocated by task 265: [ 21.836708] kasan_save_stack+0x3c/0x68 [ 21.836761] kasan_save_track+0x20/0x40 [ 21.836806] kasan_save_alloc_info+0x40/0x58 [ 21.836852] __kasan_kmalloc+0xd4/0xd8 [ 21.836897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.836943] kasan_atomics+0xb8/0x2e0 [ 21.837001] kunit_try_run_case+0x170/0x3f0 [ 21.837078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.837131] kthread+0x328/0x630 [ 21.837173] ret_from_fork+0x10/0x20 [ 21.838105] [ 21.838168] The buggy address belongs to the object at fff00000c59de300 [ 21.838168] which belongs to the cache kmalloc-64 of size 64 [ 21.838249] The buggy address is located 0 bytes to the right of [ 21.838249] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.838325] [ 21.838359] The buggy address belongs to the physical page: [ 21.838409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.838658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.838725] page_type: f5(slab) [ 21.838877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.839165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.839243] page dumped because: kasan: bad access detected [ 21.839388] [ 21.839418] Memory state around the buggy address: [ 21.839605] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.839792] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.841735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 21.845951] kthread+0x328/0x630 [ 21.847457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.850843] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.854364] print_report+0x118/0x608 [ 21.857769] kasan_save_alloc_info+0x40/0x58 [ 21.859215] [ 21.861231] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.866995] [ 21.868774] ret_from_fork+0x10/0x20 [ 21.870195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.870620] page dumped because: kasan: bad access detected [ 21.870772] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.879072] kunit_try_run_case+0x170/0x3f0 [ 21.881700] page dumped because: kasan: bad access detected [ 21.882798] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.886526] Hardware name: linux,dummy-virt (DT) [ 21.887964] kasan_save_alloc_info+0x40/0x58 [ 21.889479] [ 21.889509] The buggy address belongs to the object at fff00000c59de300 [ 21.889509] which belongs to the cache kmalloc-64 of size 64 [ 21.891154] page dumped because: kasan: bad access detected [ 21.891319] [ 21.891384] Memory state around the buggy address: [ 21.891433] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.891487] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.891625] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.891676] ^ [ 21.892053] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.892234] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.892286] ================================================================== [ 21.977845] ================================================================== [ 21.977925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.978015] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.978077] [ 21.978122] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.978224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.978257] Hardware name: linux,dummy-virt (DT) [ 21.978299] Call trace: [ 21.978329] show_stack+0x20/0x38 (C) [ 21.978391] dump_stack_lvl+0x8c/0xd0 [ 21.978448] print_report+0x118/0x608 [ 21.978503] kasan_report+0xdc/0x128 [ 21.978557] kasan_check_range+0x100/0x1a8 [ 21.978615] __kasan_check_write+0x20/0x30 [ 21.978673] kasan_atomics_helper+0xf20/0x4858 [ 21.978731] kasan_atomics+0x198/0x2e0 [ 21.978785] kunit_try_run_case+0x170/0x3f0 [ 21.978840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.978903] kthread+0x328/0x630 [ 21.978957] ret_from_fork+0x10/0x20 [ 21.979471] [ 21.980061] Allocated by task 265: [ 21.980155] kasan_save_stack+0x3c/0x68 [ 21.980573] kasan_save_track+0x20/0x40 [ 21.980881] kasan_save_alloc_info+0x40/0x58 [ 21.981101] __kasan_kmalloc+0xd4/0xd8 [ 21.981469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.981600] kasan_atomics+0xb8/0x2e0 [ 21.981656] kunit_try_run_case+0x170/0x3f0 [ 21.981705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.982003] kthread+0x328/0x630 [ 21.982250] ret_from_fork+0x10/0x20 [ 21.982592] [ 21.982636] The buggy address belongs to the object at fff00000c59de300 [ 21.982636] which belongs to the cache kmalloc-64 of size 64 [ 21.982722] The buggy address is located 0 bytes to the right of [ 21.982722] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.982801] [ 21.982829] The buggy address belongs to the physical page: [ 21.983257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.983398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.983479] page_type: f5(slab) [ 21.983560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.983731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.983793] page dumped because: kasan: bad access detected [ 21.983994] [ 21.984073] Memory state around the buggy address: [ 21.984148] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.984459] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.984631] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.984693] ^ [ 21.984738] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985067] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985131] ================================================================== [ 21.995516] ================================================================== [ 21.995588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.995659] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.995715] [ 21.995757] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.995853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.995885] Hardware name: linux,dummy-virt (DT) [ 21.995924] Call trace: [ 21.995954] show_stack+0x20/0x38 (C) [ 21.996088] dump_stack_lvl+0x8c/0xd0 [ 21.996141] print_report+0x118/0x608 [ 21.996190] kasan_report+0xdc/0x128 [ 21.996238] kasan_check_range+0x100/0x1a8 [ 21.996291] __kasan_check_write+0x20/0x30 [ 21.996344] kasan_atomics_helper+0xff0/0x4858 [ 21.996399] kasan_atomics+0x198/0x2e0 [ 21.996449] kunit_try_run_case+0x170/0x3f0 [ 21.996500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.996558] kthread+0x328/0x630 [ 21.996676] ret_from_fork+0x10/0x20 [ 21.996741] [ 21.996767] Allocated by task 265: [ 21.996801] kasan_save_stack+0x3c/0x68 [ 21.996853] kasan_save_track+0x20/0x40 [ 21.996898] kasan_save_alloc_info+0x40/0x58 [ 21.996945] __kasan_kmalloc+0xd4/0xd8 [ 21.997001] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.997051] kasan_atomics+0xb8/0x2e0 [ 21.997135] kunit_try_run_case+0x170/0x3f0 [ 21.997184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.997235] kthread+0x328/0x630 [ 21.997277] ret_from_fork+0x10/0x20 [ 21.997320] [ 21.997349] The buggy address belongs to the object at fff00000c59de300 [ 21.997349] which belongs to the cache kmalloc-64 of size 64 [ 21.997429] The buggy address is located 0 bytes to the right of [ 21.997429] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.997503] [ 21.997531] The buggy address belongs to the physical page: [ 21.997570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.997627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.997682] page_type: f5(slab) [ 21.997730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.997790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.997867] page dumped because: kasan: bad access detected [ 21.997950] [ 21.998019] Memory state around the buggy address: [ 21.998063] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.998115] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.998166] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.998210] ^ [ 21.998253] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.998302] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.998347] ================================================================== [ 22.096606] ================================================================== [ 22.096665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.096742] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.096801] [ 22.096843] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.096937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.097006] Hardware name: linux,dummy-virt (DT) [ 22.097051] Call trace: [ 22.097080] show_stack+0x20/0x38 (C) [ 22.097139] dump_stack_lvl+0x8c/0xd0 [ 22.097195] print_report+0x118/0x608 [ 22.097254] kasan_report+0xdc/0x128 [ 22.097372] __asan_report_load8_noabort+0x20/0x30 [ 22.097496] kasan_atomics_helper+0x3db0/0x4858 [ 22.097551] kasan_atomics+0x198/0x2e0 [ 22.097611] kunit_try_run_case+0x170/0x3f0 [ 22.097719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.097857] kthread+0x328/0x630 [ 22.098205] ret_from_fork+0x10/0x20 [ 22.098469] [ 22.098500] Allocated by task 265: [ 22.098539] kasan_save_stack+0x3c/0x68 [ 22.098597] kasan_save_track+0x20/0x40 [ 22.098645] kasan_save_alloc_info+0x40/0x58 [ 22.098694] __kasan_kmalloc+0xd4/0xd8 [ 22.098739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.098787] kasan_atomics+0xb8/0x2e0 [ 22.098832] kunit_try_run_case+0x170/0x3f0 [ 22.098969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.099088] kthread+0x328/0x630 [ 22.099137] ret_from_fork+0x10/0x20 [ 22.099184] [ 22.099210] The buggy address belongs to the object at fff00000c59de300 [ 22.099210] which belongs to the cache kmalloc-64 of size 64 [ 22.099279] The buggy address is located 0 bytes to the right of [ 22.099279] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.099355] [ 22.099381] The buggy address belongs to the physical page: [ 22.099439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.099508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.099613] page_type: f5(slab) [ 22.099687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.099751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.099801] page dumped because: kasan: bad access detected [ 22.099867] [ 22.099907] Memory state around the buggy address: [ 22.099949] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.100016] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.100069] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.100115] ^ [ 22.100156] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.100208] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.100286] ================================================================== [ 21.778836] ================================================================== [ 21.779182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.779370] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.779439] [ 21.779550] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.779654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.779691] Hardware name: linux,dummy-virt (DT) [ 21.780126] Call trace: [ 21.780204] show_stack+0x20/0x38 (C) [ 21.780434] dump_stack_lvl+0x8c/0xd0 [ 21.780559] print_report+0x118/0x608 [ 21.780680] kasan_report+0xdc/0x128 [ 21.780925] __asan_report_load4_noabort+0x20/0x30 [ 21.781023] kasan_atomics_helper+0x42d8/0x4858 [ 21.781311] kasan_atomics+0x198/0x2e0 [ 21.781381] kunit_try_run_case+0x170/0x3f0 [ 21.781529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.781796] kthread+0x328/0x630 [ 21.781913] ret_from_fork+0x10/0x20 [ 21.781989] [ 21.782121] Allocated by task 265: [ 21.782180] kasan_save_stack+0x3c/0x68 [ 21.782242] kasan_save_track+0x20/0x40 [ 21.782447] kasan_save_alloc_info+0x40/0x58 [ 21.782501] __kasan_kmalloc+0xd4/0xd8 [ 21.782546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.782596] kasan_atomics+0xb8/0x2e0 [ 21.782684] kunit_try_run_case+0x170/0x3f0 [ 21.782738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.782837] ret_from_fork+0x10/0x20 [ 21.783907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.783994] page_type: f5(slab) [ 21.784046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.784465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.784854] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.785156] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.785435] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.785730] ================================================================== [ 21.824896] ================================================================== [ 21.825511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.825614] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.825979] [ 21.826042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.826394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.826606] Hardware name: linux,dummy-virt (DT) [ 21.826663] Call trace: [ 21.826827] show_stack+0x20/0x38 (C) [ 21.827008] dump_stack_lvl+0x8c/0xd0 [ 21.827125] print_report+0x118/0x608 [ 21.827229] kasan_report+0xdc/0x128 [ 21.827574] kasan_check_range+0x100/0x1a8 [ 21.827661] __kasan_check_write+0x20/0x30 [ 21.827722] kasan_atomics_helper+0xad4/0x4858 [ 21.827783] kasan_atomics+0x198/0x2e0 [ 21.827981] kunit_try_run_case+0x170/0x3f0 [ 21.828373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.828499] kthread+0x328/0x630 [ 21.828565] ret_from_fork+0x10/0x20 [ 21.828647] [ 21.828682] Allocated by task 265: [ 21.828900] kasan_save_stack+0x3c/0x68 [ 21.829169] kasan_save_track+0x20/0x40 [ 21.829341] kasan_save_alloc_info+0x40/0x58 [ 21.829412] __kasan_kmalloc+0xd4/0xd8 [ 21.829462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.829744] kasan_atomics+0xb8/0x2e0 [ 21.829999] kunit_try_run_case+0x170/0x3f0 [ 21.830177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.830250] kthread+0x328/0x630 [ 21.830437] ret_from_fork+0x10/0x20 [ 21.830523] [ 21.830561] The buggy address belongs to the object at fff00000c59de300 [ 21.830561] which belongs to the cache kmalloc-64 of size 64 [ 21.830773] The buggy address is located 0 bytes to the right of [ 21.830773] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.830862] [ 21.830893] The buggy address belongs to the physical page: [ 21.831103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.831303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.831643] page_type: f5(slab) [ 21.831719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.831782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.831831] page dumped because: kasan: bad access detected [ 21.831871] [ 21.832070] Memory state around the buggy address: [ 21.832281] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.832391] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.832450] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.832704] ^ [ 21.832868] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.833098] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.833293] ================================================================== [ 22.137206] ================================================================== [ 22.137454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.137675] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.137768] [ 22.137822] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.137928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.137966] Hardware name: linux,dummy-virt (DT) [ 22.138018] Call trace: [ 22.138318] show_stack+0x20/0x38 (C) [ 22.138432] dump_stack_lvl+0x8c/0xd0 [ 22.138596] print_report+0x118/0x608 [ 22.138660] kasan_report+0xdc/0x128 [ 22.138861] __asan_report_load8_noabort+0x20/0x30 [ 22.138930] kasan_atomics_helper+0x3e20/0x4858 [ 22.139025] kasan_atomics+0x198/0x2e0 [ 22.139138] kunit_try_run_case+0x170/0x3f0 [ 22.139250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.139316] kthread+0x328/0x630 [ 22.139412] ret_from_fork+0x10/0x20 [ 22.139502] [ 22.139557] Allocated by task 265: [ 22.139651] kasan_save_stack+0x3c/0x68 [ 22.139707] kasan_save_track+0x20/0x40 [ 22.139753] kasan_save_alloc_info+0x40/0x58 [ 22.139803] __kasan_kmalloc+0xd4/0xd8 [ 22.139875] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.139979] kasan_atomics+0xb8/0x2e0 [ 22.140089] kunit_try_run_case+0x170/0x3f0 [ 22.140177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.140229] kthread+0x328/0x630 [ 22.140271] ret_from_fork+0x10/0x20 [ 22.140322] [ 22.140348] The buggy address belongs to the object at fff00000c59de300 [ 22.140348] which belongs to the cache kmalloc-64 of size 64 [ 22.140439] The buggy address is located 0 bytes to the right of [ 22.140439] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.140517] [ 22.140546] The buggy address belongs to the physical page: [ 22.140599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.140734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.140797] page_type: f5(slab) [ 22.140848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.140911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.140960] page dumped because: kasan: bad access detected [ 22.141163] [ 22.141186] Memory state around the buggy address: [ 22.141226] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.141276] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.141669] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.141922] ^ [ 22.141985] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.142042] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.142087] ================================================================== [ 22.064787] ================================================================== [ 22.064851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.064923] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.064993] [ 22.065033] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.065130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.065163] Hardware name: linux,dummy-virt (DT) [ 22.065201] Call trace: [ 22.065229] show_stack+0x20/0x38 (C) [ 22.065320] dump_stack_lvl+0x8c/0xd0 [ 22.065543] print_report+0x118/0x608 [ 22.065610] kasan_report+0xdc/0x128 [ 22.065860] kasan_check_range+0x100/0x1a8 [ 22.066055] __kasan_check_write+0x20/0x30 [ 22.066130] kasan_atomics_helper+0x147c/0x4858 [ 22.066206] kasan_atomics+0x198/0x2e0 [ 22.066262] kunit_try_run_case+0x170/0x3f0 [ 22.066318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.066379] kthread+0x328/0x630 [ 22.066625] ret_from_fork+0x10/0x20 [ 22.067487] [ 22.067743] Allocated by task 265: [ 22.067836] kasan_save_stack+0x3c/0x68 [ 22.068105] kasan_save_track+0x20/0x40 [ 22.068252] kasan_save_alloc_info+0x40/0x58 [ 22.068303] __kasan_kmalloc+0xd4/0xd8 [ 22.068904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.069283] kasan_atomics+0xb8/0x2e0 [ 22.069574] kunit_try_run_case+0x170/0x3f0 [ 22.069726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.070031] kthread+0x328/0x630 [ 22.070195] ret_from_fork+0x10/0x20 [ 22.070247] [ 22.070630] The buggy address belongs to the object at fff00000c59de300 [ 22.070630] which belongs to the cache kmalloc-64 of size 64 [ 22.070703] The buggy address is located 0 bytes to the right of [ 22.070703] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.071164] [ 22.071191] The buggy address belongs to the physical page: [ 22.071229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.071546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.071612] page_type: f5(slab) [ 22.071858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.072255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.072379] page dumped because: kasan: bad access detected [ 22.072724] [ 22.072791] Memory state around the buggy address: [ 22.072834] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.073366] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.073464] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.073898] ^ [ 22.074011] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.074066] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.074109] ================================================================== [ 21.642326] ================================================================== [ 21.642415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 21.642618] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.643180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.643397] show_stack+0x20/0x38 (C) [ 21.644019] kasan_atomics+0x198/0x2e0 [ 21.645070] [ 21.646018] kunit_try_run_case+0x170/0x3f0 [ 21.647284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.648418] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.648595] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.648653] ^ [ 21.648816] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.648993] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.649111] ================================================================== [ 22.105402] ================================================================== [ 22.105457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.105572] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.105634] [ 22.105675] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.105771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.105841] Hardware name: linux,dummy-virt (DT) [ 22.105892] Call trace: [ 22.105925] show_stack+0x20/0x38 (C) [ 22.106019] dump_stack_lvl+0x8c/0xd0 [ 22.106129] print_report+0x118/0x608 [ 22.106188] kasan_report+0xdc/0x128 [ 22.106265] __asan_report_load8_noabort+0x20/0x30 [ 22.106479] kasan_atomics_helper+0x3df4/0x4858 [ 22.106642] kasan_atomics+0x198/0x2e0 [ 22.106704] kunit_try_run_case+0x170/0x3f0 [ 22.106765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.106827] kthread+0x328/0x630 [ 22.106883] ret_from_fork+0x10/0x20 [ 22.106941] [ 22.106965] Allocated by task 265: [ 22.107015] kasan_save_stack+0x3c/0x68 [ 22.107118] kasan_save_track+0x20/0x40 [ 22.107533] kasan_save_alloc_info+0x40/0x58 [ 22.108238] __kasan_kmalloc+0xd4/0xd8 [ 22.108321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.108746] kasan_atomics+0xb8/0x2e0 [ 22.108832] kunit_try_run_case+0x170/0x3f0 [ 22.108895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.109151] kthread+0x328/0x630 [ 22.109427] ret_from_fork+0x10/0x20 [ 22.109502] [ 22.109551] The buggy address belongs to the object at fff00000c59de300 [ 22.109551] which belongs to the cache kmalloc-64 of size 64 [ 22.109968] The buggy address is located 0 bytes to the right of [ 22.109968] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.110120] [ 22.110174] The buggy address belongs to the physical page: [ 22.110440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.110548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.110611] page_type: f5(slab) [ 22.110662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.110724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.110771] page dumped because: kasan: bad access detected [ 22.110850] [ 22.111240] Memory state around the buggy address: [ 22.111291] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111367] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111418] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.111599] ^ [ 22.112048] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112137] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112282] ================================================================== [ 22.041961] ================================================================== [ 22.042053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.042129] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.042188] [ 22.042229] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.042328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.042362] Hardware name: linux,dummy-virt (DT) [ 22.042399] Call trace: [ 22.042427] show_stack+0x20/0x38 (C) [ 22.042605] dump_stack_lvl+0x8c/0xd0 [ 22.042765] print_report+0x118/0x608 [ 22.042824] kasan_report+0xdc/0x128 [ 22.042880] kasan_check_range+0x100/0x1a8 [ 22.043033] __kasan_check_write+0x20/0x30 [ 22.043099] kasan_atomics_helper+0x12d8/0x4858 [ 22.043151] kasan_atomics+0x198/0x2e0 [ 22.043200] kunit_try_run_case+0x170/0x3f0 [ 22.043252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043308] kthread+0x328/0x630 [ 22.043360] ret_from_fork+0x10/0x20 [ 22.043415] [ 22.043438] Allocated by task 265: [ 22.043503] kasan_save_stack+0x3c/0x68 [ 22.043551] kasan_save_track+0x20/0x40 [ 22.043593] kasan_save_alloc_info+0x40/0x58 [ 22.043636] __kasan_kmalloc+0xd4/0xd8 [ 22.043676] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.043718] kasan_atomics+0xb8/0x2e0 [ 22.043786] kunit_try_run_case+0x170/0x3f0 [ 22.043857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043907] kthread+0x328/0x630 [ 22.044045] ret_from_fork+0x10/0x20 [ 22.044281] [ 22.044326] The buggy address belongs to the object at fff00000c59de300 [ 22.044326] which belongs to the cache kmalloc-64 of size 64 [ 22.044389] The buggy address is located 0 bytes to the right of [ 22.044389] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.045050] [ 22.045229] The buggy address belongs to the physical page: [ 22.045273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.045529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.045978] page_type: f5(slab) [ 22.046041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.046552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.046684] page dumped because: kasan: bad access detected [ 22.046792] [ 22.046845] Memory state around the buggy address: [ 22.046888] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.046946] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.047011] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.047059] ^ [ 22.047132] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047196] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047241] ================================================================== [ 22.121052] ================================================================== [ 22.121147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.121235] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.121296] [ 22.121339] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.121437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.121471] Hardware name: linux,dummy-virt (DT) [ 22.121512] Call trace: [ 22.121541] show_stack+0x20/0x38 (C) [ 22.121602] dump_stack_lvl+0x8c/0xd0 [ 22.121659] print_report+0x118/0x608 [ 22.121712] kasan_report+0xdc/0x128 [ 22.121766] __asan_report_load8_noabort+0x20/0x30 [ 22.121838] kasan_atomics_helper+0x3e10/0x4858 [ 22.121903] kasan_atomics+0x198/0x2e0 [ 22.121958] kunit_try_run_case+0x170/0x3f0 [ 22.122029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.122092] kthread+0x328/0x630 [ 22.122147] ret_from_fork+0x10/0x20 [ 22.123842] [ 22.124523] Allocated by task 265: [ 22.124601] kasan_save_stack+0x3c/0x68 [ 22.125138] kasan_save_track+0x20/0x40 [ 22.125449] kasan_save_alloc_info+0x40/0x58 [ 22.125665] __kasan_kmalloc+0xd4/0xd8 [ 22.125772] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.125836] kasan_atomics+0xb8/0x2e0 [ 22.125888] kunit_try_run_case+0x170/0x3f0 [ 22.125937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.126002] kthread+0x328/0x630 [ 22.126053] ret_from_fork+0x10/0x20 [ 22.126098] [ 22.126125] The buggy address belongs to the object at fff00000c59de300 [ 22.126125] which belongs to the cache kmalloc-64 of size 64 [ 22.126192] The buggy address is located 0 bytes to the right of [ 22.126192] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.126262] [ 22.126759] The buggy address belongs to the physical page: [ 22.126869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.127924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.128887] page_type: f5(slab) [ 22.129222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.129363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.129422] page dumped because: kasan: bad access detected [ 22.129475] [ 22.129654] Memory state around the buggy address: [ 22.129906] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.130335] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.130400] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.130625] ^ [ 22.130693] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130749] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130859] ================================================================== [ 21.915690] ================================================================== [ 21.916178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.916555] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.916641] [ 21.916690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.916791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.916827] Hardware name: linux,dummy-virt (DT) [ 21.917253] Call trace: [ 21.917314] show_stack+0x20/0x38 (C) [ 21.917388] dump_stack_lvl+0x8c/0xd0 [ 21.917448] print_report+0x118/0x608 [ 21.917873] kasan_report+0xdc/0x128 [ 21.917963] __asan_report_load4_noabort+0x20/0x30 [ 21.918047] kasan_atomics_helper+0x3e04/0x4858 [ 21.918363] kasan_atomics+0x198/0x2e0 [ 21.918540] kunit_try_run_case+0x170/0x3f0 [ 21.918699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.918775] kthread+0x328/0x630 [ 21.918850] ret_from_fork+0x10/0x20 [ 21.919220] [ 21.919265] Allocated by task 265: [ 21.919351] kasan_save_stack+0x3c/0x68 [ 21.919460] kasan_save_track+0x20/0x40 [ 21.920343] kasan_save_alloc_info+0x40/0x58 [ 21.920440] __kasan_kmalloc+0xd4/0xd8 [ 21.920489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.920554] kasan_atomics+0xb8/0x2e0 [ 21.920617] kunit_try_run_case+0x170/0x3f0 [ 21.920679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.921051] kthread+0x328/0x630 [ 21.921168] ret_from_fork+0x10/0x20 [ 21.921220] [ 21.921249] The buggy address belongs to the object at fff00000c59de300 [ 21.921249] which belongs to the cache kmalloc-64 of size 64 [ 21.921732] The buggy address is located 0 bytes to the right of [ 21.921732] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.921846] [ 21.922036] The buggy address belongs to the physical page: [ 21.922103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.922392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.922629] page_type: f5(slab) [ 21.922692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.922887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.922950] page dumped because: kasan: bad access detected [ 21.923007] [ 21.923033] Memory state around the buggy address: [ 21.923183] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.923292] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.923349] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.923396] ^ [ 21.923554] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.923614] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.923663] ================================================================== [ 21.798436] ================================================================== [ 21.798534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.798611] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.798673] [ 21.799021] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.799375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.799582] Hardware name: linux,dummy-virt (DT) [ 21.799753] Call trace: [ 21.799946] show_stack+0x20/0x38 (C) [ 21.800296] dump_stack_lvl+0x8c/0xd0 [ 21.800371] print_report+0x118/0x608 [ 21.800474] kasan_report+0xdc/0x128 [ 21.800535] kasan_check_range+0x100/0x1a8 [ 21.800760] __kasan_check_write+0x20/0x30 [ 21.800831] kasan_atomics_helper+0x99c/0x4858 [ 21.800891] kasan_atomics+0x198/0x2e0 [ 21.800946] kunit_try_run_case+0x170/0x3f0 [ 21.801118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.801219] kthread+0x328/0x630 [ 21.801850] ret_from_fork+0x10/0x20 [ 21.802108] [ 21.802244] Allocated by task 265: [ 21.802313] kasan_save_stack+0x3c/0x68 [ 21.802389] kasan_save_track+0x20/0x40 [ 21.802442] kasan_save_alloc_info+0x40/0x58 [ 21.802507] __kasan_kmalloc+0xd4/0xd8 [ 21.802552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.802601] kasan_atomics+0xb8/0x2e0 [ 21.802645] kunit_try_run_case+0x170/0x3f0 [ 21.802694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.803129] kthread+0x328/0x630 [ 21.803282] ret_from_fork+0x10/0x20 [ 21.803339] [ 21.803378] The buggy address belongs to the object at fff00000c59de300 [ 21.803378] which belongs to the cache kmalloc-64 of size 64 [ 21.803753] The buggy address is located 0 bytes to the right of [ 21.803753] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.803832] [ 21.804129] The buggy address belongs to the physical page: [ 21.804183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.804268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.804330] page_type: f5(slab) [ 21.804546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.804757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.804827] page dumped because: kasan: bad access detected [ 21.804886] [ 21.804988] Memory state around the buggy address: [ 21.805038] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.805098] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.805559] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.805629] ^ [ 21.805690] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.805745] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.805793] ================================================================== [ 22.025493] ================================================================== [ 22.026116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.026408] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.026993] [ 22.027050] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.027166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.027508] Hardware name: linux,dummy-virt (DT) [ 22.027608] Call trace: [ 22.027802] show_stack+0x20/0x38 (C) [ 22.028265] dump_stack_lvl+0x8c/0xd0 [ 22.028521] print_report+0x118/0x608 [ 22.028578] kasan_report+0xdc/0x128 [ 22.029181] kasan_check_range+0x100/0x1a8 [ 22.030021] __kasan_check_write+0x20/0x30 [ 22.030138] kasan_atomics_helper+0x1190/0x4858 [ 22.030202] kasan_atomics+0x198/0x2e0 [ 22.030255] kunit_try_run_case+0x170/0x3f0 [ 22.030312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030373] kthread+0x328/0x630 [ 22.030643] ret_from_fork+0x10/0x20 [ 22.030739] [ 22.030766] Allocated by task 265: [ 22.030822] kasan_save_stack+0x3c/0x68 [ 22.030947] kasan_save_track+0x20/0x40 [ 22.031013] kasan_save_alloc_info+0x40/0x58 [ 22.031060] __kasan_kmalloc+0xd4/0xd8 [ 22.031113] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.031157] kasan_atomics+0xb8/0x2e0 [ 22.031198] kunit_try_run_case+0x170/0x3f0 [ 22.031255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.031304] kthread+0x328/0x630 [ 22.031347] ret_from_fork+0x10/0x20 [ 22.031440] [ 22.031471] The buggy address belongs to the object at fff00000c59de300 [ 22.031471] which belongs to the cache kmalloc-64 of size 64 [ 22.031544] The buggy address is located 0 bytes to the right of [ 22.031544] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.031688] [ 22.031719] The buggy address belongs to the physical page: [ 22.031756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.031815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.031868] page_type: f5(slab) [ 22.031915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.032007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.032116] page dumped because: kasan: bad access detected [ 22.032178] [ 22.032200] Memory state around the buggy address: [ 22.032249] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.032317] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.032366] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.032431] ^ [ 22.032516] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.032568] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.032616] ================================================================== [ 22.075803] ================================================================== [ 22.075878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.075950] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.076022] [ 22.076063] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.076156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.076189] Hardware name: linux,dummy-virt (DT) [ 22.076228] Call trace: [ 22.076257] show_stack+0x20/0x38 (C) [ 22.076316] dump_stack_lvl+0x8c/0xd0 [ 22.077313] print_report+0x118/0x608 [ 22.077412] kasan_report+0xdc/0x128 [ 22.077489] kasan_check_range+0x100/0x1a8 [ 22.077548] __kasan_check_write+0x20/0x30 [ 22.077956] kasan_atomics_helper+0x14e4/0x4858 [ 22.078059] kasan_atomics+0x198/0x2e0 [ 22.078198] kunit_try_run_case+0x170/0x3f0 [ 22.078263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.078529] kthread+0x328/0x630 [ 22.078597] ret_from_fork+0x10/0x20 [ 22.078992] [ 22.079036] Allocated by task 265: [ 22.079082] kasan_save_stack+0x3c/0x68 [ 22.079154] kasan_save_track+0x20/0x40 [ 22.079345] kasan_save_alloc_info+0x40/0x58 [ 22.079581] __kasan_kmalloc+0xd4/0xd8 [ 22.079766] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.079830] kasan_atomics+0xb8/0x2e0 [ 22.079877] kunit_try_run_case+0x170/0x3f0 [ 22.080099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.080181] kthread+0x328/0x630 [ 22.080234] ret_from_fork+0x10/0x20 [ 22.080477] [ 22.080513] The buggy address belongs to the object at fff00000c59de300 [ 22.080513] which belongs to the cache kmalloc-64 of size 64 [ 22.080587] The buggy address is located 0 bytes to the right of [ 22.080587] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.080676] [ 22.080706] The buggy address belongs to the physical page: [ 22.081054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.081143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.081343] page_type: f5(slab) [ 22.081412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.081831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.081905] page dumped because: kasan: bad access detected [ 22.082257] [ 22.082302] Memory state around the buggy address: [ 22.082352] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.082409] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.082552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.082608] ^ [ 22.082653] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082918] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.083115] ================================================================== [ 22.013578] ================================================================== [ 22.013939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.014073] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.014712] [ 22.014808] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.014923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.016052] Hardware name: linux,dummy-virt (DT) [ 22.016187] Call trace: [ 22.016356] show_stack+0x20/0x38 (C) [ 22.017055] dump_stack_lvl+0x8c/0xd0 [ 22.017286] print_report+0x118/0x608 [ 22.017348] kasan_report+0xdc/0x128 [ 22.017402] kasan_check_range+0x100/0x1a8 [ 22.017460] __kasan_check_write+0x20/0x30 [ 22.017517] kasan_atomics_helper+0x1128/0x4858 [ 22.017577] kasan_atomics+0x198/0x2e0 [ 22.018632] kunit_try_run_case+0x170/0x3f0 [ 22.018728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.018797] kthread+0x328/0x630 [ 22.019198] ret_from_fork+0x10/0x20 [ 22.019299] [ 22.019366] Allocated by task 265: [ 22.019458] kasan_save_stack+0x3c/0x68 [ 22.019559] kasan_save_track+0x20/0x40 [ 22.019856] kasan_save_alloc_info+0x40/0x58 [ 22.019980] __kasan_kmalloc+0xd4/0xd8 [ 22.020036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.020093] kasan_atomics+0xb8/0x2e0 [ 22.020249] kunit_try_run_case+0x170/0x3f0 [ 22.020581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.020819] kthread+0x328/0x630 [ 22.020874] ret_from_fork+0x10/0x20 [ 22.020920] [ 22.020977] The buggy address belongs to the object at fff00000c59de300 [ 22.020977] which belongs to the cache kmalloc-64 of size 64 [ 22.021049] The buggy address is located 0 bytes to the right of [ 22.021049] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.021117] [ 22.021143] The buggy address belongs to the physical page: [ 22.021181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.021238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.021292] page_type: f5(slab) [ 22.021337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.021400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.021442] page dumped because: kasan: bad access detected [ 22.021479] [ 22.021501] Memory state around the buggy address: [ 22.021539] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.021590] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.022013] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.022203] ^ [ 22.022661] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.022809] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.022914] ================================================================== [ 22.037465] ================================================================== [ 22.037527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.037594] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.037653] [ 22.037693] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.037793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.037846] Hardware name: linux,dummy-virt (DT) [ 22.037884] Call trace: [ 22.037913] show_stack+0x20/0x38 (C) [ 22.037987] dump_stack_lvl+0x8c/0xd0 [ 22.038047] print_report+0x118/0x608 [ 22.038102] kasan_report+0xdc/0x128 [ 22.038155] kasan_check_range+0x100/0x1a8 [ 22.038215] __kasan_check_write+0x20/0x30 [ 22.038270] kasan_atomics_helper+0x126c/0x4858 [ 22.038326] kasan_atomics+0x198/0x2e0 [ 22.038380] kunit_try_run_case+0x170/0x3f0 [ 22.038436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.038553] kthread+0x328/0x630 [ 22.038613] ret_from_fork+0x10/0x20 [ 22.038764] [ 22.038808] Allocated by task 265: [ 22.038881] kasan_save_stack+0x3c/0x68 [ 22.038954] kasan_save_track+0x20/0x40 [ 22.039014] kasan_save_alloc_info+0x40/0x58 [ 22.039065] __kasan_kmalloc+0xd4/0xd8 [ 22.039111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.039158] kasan_atomics+0xb8/0x2e0 [ 22.039228] kunit_try_run_case+0x170/0x3f0 [ 22.039344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.039404] kthread+0x328/0x630 [ 22.039453] ret_from_fork+0x10/0x20 [ 22.039499] [ 22.039527] The buggy address belongs to the object at fff00000c59de300 [ 22.039527] which belongs to the cache kmalloc-64 of size 64 [ 22.039625] The buggy address is located 0 bytes to the right of [ 22.039625] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.039739] [ 22.039780] The buggy address belongs to the physical page: [ 22.039821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.039885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.039943] page_type: f5(slab) [ 22.040000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.040294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.040347] page dumped because: kasan: bad access detected [ 22.040386] [ 22.040409] Memory state around the buggy address: [ 22.040462] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.040514] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.040688] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.040859] ^ [ 22.040904] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.040956] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.041013] ================================================================== [ 21.814905] ================================================================== [ 21.815715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.815814] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.816116] [ 21.816168] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.816511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.816553] Hardware name: linux,dummy-virt (DT) [ 21.816735] Call trace: [ 21.816778] show_stack+0x20/0x38 (C) [ 21.817162] dump_stack_lvl+0x8c/0xd0 [ 21.817389] print_report+0x118/0x608 [ 21.817472] kasan_report+0xdc/0x128 [ 21.817833] kasan_check_range+0x100/0x1a8 [ 21.817995] __kasan_check_write+0x20/0x30 [ 21.818224] kasan_atomics_helper+0xa6c/0x4858 [ 21.818299] kasan_atomics+0x198/0x2e0 [ 21.818685] kunit_try_run_case+0x170/0x3f0 [ 21.818781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.818849] kthread+0x328/0x630 [ 21.818904] ret_from_fork+0x10/0x20 [ 21.819207] [ 21.819396] Allocated by task 265: [ 21.819538] kasan_save_stack+0x3c/0x68 [ 21.819654] kasan_save_track+0x20/0x40 [ 21.819712] kasan_save_alloc_info+0x40/0x58 [ 21.819782] __kasan_kmalloc+0xd4/0xd8 [ 21.819991] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.820202] kasan_atomics+0xb8/0x2e0 [ 21.820281] kunit_try_run_case+0x170/0x3f0 [ 21.820331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.820589] kthread+0x328/0x630 [ 21.820826] ret_from_fork+0x10/0x20 [ 21.820881] [ 21.820913] The buggy address belongs to the object at fff00000c59de300 [ 21.820913] which belongs to the cache kmalloc-64 of size 64 [ 21.820996] The buggy address is located 0 bytes to the right of [ 21.820996] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.821251] [ 21.821381] The buggy address belongs to the physical page: [ 21.821430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.821497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.821567] page_type: f5(slab) [ 21.821926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.822155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.822221] page dumped because: kasan: bad access detected [ 21.822371] [ 21.822401] Memory state around the buggy address: [ 21.822572] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.822644] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.822885] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.822948] ^ [ 21.823156] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.823219] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.823373] ================================================================== [ 21.808057] ================================================================== [ 21.808162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.808361] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.808433] [ 21.808482] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.808584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.808889] Hardware name: linux,dummy-virt (DT) [ 21.809020] Call trace: [ 21.809055] show_stack+0x20/0x38 (C) [ 21.809143] dump_stack_lvl+0x8c/0xd0 [ 21.809207] print_report+0x118/0x608 [ 21.809264] kasan_report+0xdc/0x128 [ 21.809568] kasan_check_range+0x100/0x1a8 [ 21.809705] __kasan_check_write+0x20/0x30 [ 21.809772] kasan_atomics_helper+0xa04/0x4858 [ 21.809864] kasan_atomics+0x198/0x2e0 [ 21.809922] kunit_try_run_case+0x170/0x3f0 [ 21.809991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.810577] kthread+0x328/0x630 [ 21.810793] ret_from_fork+0x10/0x20 [ 21.810896] [ 21.811023] Allocated by task 265: [ 21.811092] kasan_save_stack+0x3c/0x68 [ 21.811160] kasan_save_track+0x20/0x40 [ 21.811204] kasan_save_alloc_info+0x40/0x58 [ 21.811251] __kasan_kmalloc+0xd4/0xd8 [ 21.811294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.811609] kasan_atomics+0xb8/0x2e0 [ 21.811777] kunit_try_run_case+0x170/0x3f0 [ 21.811829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.811928] kthread+0x328/0x630 [ 21.811988] ret_from_fork+0x10/0x20 [ 21.812054] [ 21.812087] The buggy address belongs to the object at fff00000c59de300 [ 21.812087] which belongs to the cache kmalloc-64 of size 64 [ 21.812151] The buggy address is located 0 bytes to the right of [ 21.812151] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.812235] [ 21.812262] The buggy address belongs to the physical page: [ 21.812301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.812357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.812412] page_type: f5(slab) [ 21.812458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.812518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.812564] page dumped because: kasan: bad access detected [ 21.812614] [ 21.812640] Memory state around the buggy address: [ 21.812679] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.812730] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.812778] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.812836] ^ [ 21.812889] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.812943] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.813006] ================================================================== [ 22.142840] ================================================================== [ 22.142913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.143360] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.143431] [ 22.143475] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.143571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.143604] Hardware name: linux,dummy-virt (DT) [ 22.143640] Call trace: [ 22.143695] show_stack+0x20/0x38 (C) [ 22.143810] dump_stack_lvl+0x8c/0xd0 [ 22.143917] print_report+0x118/0x608 [ 22.144043] kasan_report+0xdc/0x128 [ 22.144158] kasan_check_range+0x100/0x1a8 [ 22.144219] __kasan_check_write+0x20/0x30 [ 22.144319] kasan_atomics_helper+0x17ec/0x4858 [ 22.144375] kasan_atomics+0x198/0x2e0 [ 22.144435] kunit_try_run_case+0x170/0x3f0 [ 22.144541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.144652] kthread+0x328/0x630 [ 22.144731] ret_from_fork+0x10/0x20 [ 22.144786] [ 22.144809] Allocated by task 265: [ 22.144843] kasan_save_stack+0x3c/0x68 [ 22.144892] kasan_save_track+0x20/0x40 [ 22.144937] kasan_save_alloc_info+0x40/0x58 [ 22.144999] __kasan_kmalloc+0xd4/0xd8 [ 22.145045] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.145089] kasan_atomics+0xb8/0x2e0 [ 22.145131] kunit_try_run_case+0x170/0x3f0 [ 22.145175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.145226] kthread+0x328/0x630 [ 22.145266] ret_from_fork+0x10/0x20 [ 22.145310] [ 22.145345] The buggy address belongs to the object at fff00000c59de300 [ 22.145345] which belongs to the cache kmalloc-64 of size 64 [ 22.145480] The buggy address is located 0 bytes to the right of [ 22.145480] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.145636] [ 22.145698] The buggy address belongs to the physical page: [ 22.145774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.145912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.146013] page_type: f5(slab) [ 22.146064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.146124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.146228] page dumped because: kasan: bad access detected [ 22.146266] [ 22.146289] Memory state around the buggy address: [ 22.146330] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.146381] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.146431] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.146476] ^ [ 22.146514] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.146563] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.146607] ================================================================== [ 22.005757] ================================================================== [ 22.005860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.005938] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.006012] [ 22.006052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.006146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.006179] Hardware name: linux,dummy-virt (DT) [ 22.006216] Call trace: [ 22.006247] show_stack+0x20/0x38 (C) [ 22.006307] dump_stack_lvl+0x8c/0xd0 [ 22.006361] print_report+0x118/0x608 [ 22.006412] kasan_report+0xdc/0x128 [ 22.006474] kasan_check_range+0x100/0x1a8 [ 22.006526] __kasan_check_write+0x20/0x30 [ 22.006578] kasan_atomics_helper+0x10c0/0x4858 [ 22.006631] kasan_atomics+0x198/0x2e0 [ 22.006717] kunit_try_run_case+0x170/0x3f0 [ 22.007003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.007089] kthread+0x328/0x630 [ 22.007148] ret_from_fork+0x10/0x20 [ 22.007206] [ 22.007234] Allocated by task 265: [ 22.007269] kasan_save_stack+0x3c/0x68 [ 22.007322] kasan_save_track+0x20/0x40 [ 22.007524] kasan_save_alloc_info+0x40/0x58 [ 22.007617] __kasan_kmalloc+0xd4/0xd8 [ 22.007926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.007992] kasan_atomics+0xb8/0x2e0 [ 22.008038] kunit_try_run_case+0x170/0x3f0 [ 22.008220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.008274] kthread+0x328/0x630 [ 22.008345] ret_from_fork+0x10/0x20 [ 22.008612] [ 22.008696] The buggy address belongs to the object at fff00000c59de300 [ 22.008696] which belongs to the cache kmalloc-64 of size 64 [ 22.009071] The buggy address is located 0 bytes to the right of [ 22.009071] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.009559] [ 22.009610] The buggy address belongs to the physical page: [ 22.009737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.009964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.010381] page_type: f5(slab) [ 22.010636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.011041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.011197] page dumped because: kasan: bad access detected [ 22.011416] [ 22.011447] Memory state around the buggy address: [ 22.011640] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.011715] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.012053] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.012148] ^ [ 22.012233] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.012299] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.012533] ================================================================== [ 21.925792] ================================================================== [ 21.926184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.926270] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.926334] [ 21.926379] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.926608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.926942] Hardware name: linux,dummy-virt (DT) [ 21.927054] Call trace: [ 21.927122] show_stack+0x20/0x38 (C) [ 21.927392] dump_stack_lvl+0x8c/0xd0 [ 21.927460] print_report+0x118/0x608 [ 21.927518] kasan_report+0xdc/0x128 [ 21.927574] kasan_check_range+0x100/0x1a8 [ 21.927631] __kasan_check_read+0x20/0x30 [ 21.927690] kasan_atomics_helper+0xdd4/0x4858 [ 21.927749] kasan_atomics+0x198/0x2e0 [ 21.927805] kunit_try_run_case+0x170/0x3f0 [ 21.927861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927924] kthread+0x328/0x630 [ 21.927994] ret_from_fork+0x10/0x20 [ 21.928060] [ 21.928087] Allocated by task 265: [ 21.928125] kasan_save_stack+0x3c/0x68 [ 21.929901] kasan_save_track+0x20/0x40 [ 21.930146] kasan_save_alloc_info+0x40/0x58 [ 21.930982] __kasan_kmalloc+0xd4/0xd8 [ 21.931117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.931172] kasan_atomics+0xb8/0x2e0 [ 21.931219] kunit_try_run_case+0x170/0x3f0 [ 21.931268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.931322] kthread+0x328/0x630 [ 21.932296] ret_from_fork+0x10/0x20 [ 21.932635] [ 21.932710] The buggy address belongs to the object at fff00000c59de300 [ 21.932710] which belongs to the cache kmalloc-64 of size 64 [ 21.932789] The buggy address is located 0 bytes to the right of [ 21.932789] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.932864] [ 21.932893] The buggy address belongs to the physical page: [ 21.932931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.933010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.933075] page_type: f5(slab) [ 21.933127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.933189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.933867] page dumped because: kasan: bad access detected [ 21.935044] [ 21.935368] Memory state around the buggy address: [ 21.935443] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.935501] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.935552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.935599] ^ [ 21.935743] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.936308] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.936481] ================================================================== [ 21.895260] ================================================================== [ 21.895346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.895424] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.895812] [ 21.895880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.896777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.896842] Hardware name: linux,dummy-virt (DT) [ 21.896901] Call trace: [ 21.896940] show_stack+0x20/0x38 (C) [ 21.897372] dump_stack_lvl+0x8c/0xd0 [ 21.897465] print_report+0x118/0x608 [ 21.897526] kasan_report+0xdc/0x128 [ 21.897585] __asan_report_load4_noabort+0x20/0x30 [ 21.897648] kasan_atomics_helper+0x3dd8/0x4858 [ 21.898347] kasan_atomics+0x198/0x2e0 [ 21.898451] kunit_try_run_case+0x170/0x3f0 [ 21.898597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.898962] kthread+0x328/0x630 [ 21.899054] ret_from_fork+0x10/0x20 [ 21.899121] [ 21.899147] Allocated by task 265: [ 21.899188] kasan_save_stack+0x3c/0x68 [ 21.899826] kasan_save_track+0x20/0x40 [ 21.899883] kasan_save_alloc_info+0x40/0x58 [ 21.900032] __kasan_kmalloc+0xd4/0xd8 [ 21.900090] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.900355] kasan_atomics+0xb8/0x2e0 [ 21.900528] kunit_try_run_case+0x170/0x3f0 [ 21.900743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.900923] kthread+0x328/0x630 [ 21.901057] ret_from_fork+0x10/0x20 [ 21.901387] [ 21.901437] The buggy address belongs to the object at fff00000c59de300 [ 21.901437] which belongs to the cache kmalloc-64 of size 64 [ 21.901513] The buggy address is located 0 bytes to the right of [ 21.901513] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.902027] [ 21.902168] The buggy address belongs to the physical page: [ 21.902220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.902292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.902355] page_type: f5(slab) [ 21.902408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.902904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.903137] page dumped because: kasan: bad access detected [ 21.903252] [ 21.903281] Memory state around the buggy address: [ 21.903349] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.903676] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.903864] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.904059] ^ [ 21.904114] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904327] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904682] ================================================================== [ 21.956416] ================================================================== [ 21.956503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.956586] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.956646] [ 21.956695] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.956797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.956831] Hardware name: linux,dummy-virt (DT) [ 21.956872] Call trace: [ 21.956903] show_stack+0x20/0x38 (C) [ 21.956964] dump_stack_lvl+0x8c/0xd0 [ 21.957042] print_report+0x118/0x608 [ 21.957098] kasan_report+0xdc/0x128 [ 21.957152] kasan_check_range+0x100/0x1a8 [ 21.957209] __kasan_check_write+0x20/0x30 [ 21.957264] kasan_atomics_helper+0xe44/0x4858 [ 21.957320] kasan_atomics+0x198/0x2e0 [ 21.957374] kunit_try_run_case+0x170/0x3f0 [ 21.957430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.957489] kthread+0x328/0x630 [ 21.957541] ret_from_fork+0x10/0x20 [ 21.957601] [ 21.957626] Allocated by task 265: [ 21.958462] kasan_save_stack+0x3c/0x68 [ 21.958683] kasan_save_track+0x20/0x40 [ 21.959357] kasan_save_alloc_info+0x40/0x58 [ 21.959846] __kasan_kmalloc+0xd4/0xd8 [ 21.960285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.960682] kasan_atomics+0xb8/0x2e0 [ 21.961178] kunit_try_run_case+0x170/0x3f0 [ 21.961558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.962103] kthread+0x328/0x630 [ 21.962785] ret_from_fork+0x10/0x20 [ 21.963121] [ 21.963226] The buggy address belongs to the object at fff00000c59de300 [ 21.963226] which belongs to the cache kmalloc-64 of size 64 [ 21.963582] The buggy address is located 0 bytes to the right of [ 21.963582] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.963692] [ 21.964004] The buggy address belongs to the physical page: [ 21.964131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.964202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.964264] page_type: f5(slab) [ 21.964317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.964377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.964425] page dumped because: kasan: bad access detected [ 21.965756] [ 21.965798] Memory state around the buggy address: [ 21.965871] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.965931] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.966875] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.967255] ^ [ 21.967355] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.967647] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.967733] ================================================================== [ 21.906659] ================================================================== [ 21.906763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.906852] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.906914] [ 21.907611] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.907794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.907904] Hardware name: linux,dummy-virt (DT) [ 21.907985] Call trace: [ 21.908177] show_stack+0x20/0x38 (C) [ 21.908292] dump_stack_lvl+0x8c/0xd0 [ 21.908369] print_report+0x118/0x608 [ 21.908705] kasan_report+0xdc/0x128 [ 21.909044] kasan_check_range+0x100/0x1a8 [ 21.909255] __kasan_check_write+0x20/0x30 [ 21.909370] kasan_atomics_helper+0xd3c/0x4858 [ 21.909465] kasan_atomics+0x198/0x2e0 [ 21.909852] kunit_try_run_case+0x170/0x3f0 [ 21.910103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.910181] kthread+0x328/0x630 [ 21.910243] ret_from_fork+0x10/0x20 [ 21.910731] [ 21.910828] Allocated by task 265: [ 21.910928] kasan_save_stack+0x3c/0x68 [ 21.911006] kasan_save_track+0x20/0x40 [ 21.911261] kasan_save_alloc_info+0x40/0x58 [ 21.911457] __kasan_kmalloc+0xd4/0xd8 [ 21.911522] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.911638] kasan_atomics+0xb8/0x2e0 [ 21.911693] kunit_try_run_case+0x170/0x3f0 [ 21.911761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.912039] kthread+0x328/0x630 [ 21.912090] ret_from_fork+0x10/0x20 [ 21.912138] [ 21.912379] The buggy address belongs to the object at fff00000c59de300 [ 21.912379] which belongs to the cache kmalloc-64 of size 64 [ 21.912457] The buggy address is located 0 bytes to the right of [ 21.912457] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.912530] [ 21.912561] The buggy address belongs to the physical page: [ 21.912601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.912662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.912723] page_type: f5(slab) [ 21.912773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.913346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.913429] page dumped because: kasan: bad access detected [ 21.913475] [ 21.913562] Memory state around the buggy address: [ 21.913613] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.913668] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.914002] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.914058] ^ [ 21.914103] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.914530] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.914602] ================================================================== [ 21.939962] ================================================================== [ 21.940083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.940164] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.940226] [ 21.940273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.940372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.940407] Hardware name: linux,dummy-virt (DT) [ 21.940449] Call trace: [ 21.940481] show_stack+0x20/0x38 (C) [ 21.940544] dump_stack_lvl+0x8c/0xd0 [ 21.940600] print_report+0x118/0x608 [ 21.940654] kasan_report+0xdc/0x128 [ 21.940708] __asan_report_load8_noabort+0x20/0x30 [ 21.940768] kasan_atomics_helper+0x3f58/0x4858 [ 21.941487] kasan_atomics+0x198/0x2e0 [ 21.942103] kunit_try_run_case+0x170/0x3f0 [ 21.942592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.943163] kthread+0x328/0x630 [ 21.943634] ret_from_fork+0x10/0x20 [ 21.944371] [ 21.944484] Allocated by task 265: [ 21.944531] kasan_save_stack+0x3c/0x68 [ 21.944753] kasan_save_track+0x20/0x40 [ 21.945155] kasan_save_alloc_info+0x40/0x58 [ 21.945408] __kasan_kmalloc+0xd4/0xd8 [ 21.945543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.945606] kasan_atomics+0xb8/0x2e0 [ 21.945660] kunit_try_run_case+0x170/0x3f0 [ 21.946291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.946541] kthread+0x328/0x630 [ 21.946595] ret_from_fork+0x10/0x20 [ 21.946642] [ 21.946670] The buggy address belongs to the object at fff00000c59de300 [ 21.946670] which belongs to the cache kmalloc-64 of size 64 [ 21.946744] The buggy address is located 0 bytes to the right of [ 21.946744] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.947593] [ 21.947735] The buggy address belongs to the physical page: [ 21.947784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.947858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.947921] page_type: f5(slab) [ 21.947989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.948055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.948105] page dumped because: kasan: bad access detected [ 21.948145] [ 21.948172] Memory state around the buggy address: [ 21.950232] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.950765] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.950995] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.951343] ^ [ 21.951640] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.951888] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.951942] ================================================================== [ 22.053703] ================================================================== [ 22.054153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.054268] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.054342] [ 22.054384] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.054490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.054526] Hardware name: linux,dummy-virt (DT) [ 22.054567] Call trace: [ 22.054596] show_stack+0x20/0x38 (C) [ 22.055008] dump_stack_lvl+0x8c/0xd0 [ 22.055138] print_report+0x118/0x608 [ 22.055301] kasan_report+0xdc/0x128 [ 22.055652] __asan_report_load8_noabort+0x20/0x30 [ 22.055729] kasan_atomics_helper+0x3f04/0x4858 [ 22.055789] kasan_atomics+0x198/0x2e0 [ 22.055845] kunit_try_run_case+0x170/0x3f0 [ 22.055904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.056004] kthread+0x328/0x630 [ 22.056064] ret_from_fork+0x10/0x20 [ 22.056124] [ 22.056179] Allocated by task 265: [ 22.056222] kasan_save_stack+0x3c/0x68 [ 22.056291] kasan_save_track+0x20/0x40 [ 22.056338] kasan_save_alloc_info+0x40/0x58 [ 22.056386] __kasan_kmalloc+0xd4/0xd8 [ 22.056430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.056477] kasan_atomics+0xb8/0x2e0 [ 22.056522] kunit_try_run_case+0x170/0x3f0 [ 22.056580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.056656] kthread+0x328/0x630 [ 22.056709] ret_from_fork+0x10/0x20 [ 22.056803] [ 22.056871] The buggy address belongs to the object at fff00000c59de300 [ 22.056871] which belongs to the cache kmalloc-64 of size 64 [ 22.056945] The buggy address is located 0 bytes to the right of [ 22.056945] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.057034] [ 22.057063] The buggy address belongs to the physical page: [ 22.057118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.057254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.057316] page_type: f5(slab) [ 22.057366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.057428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.057479] page dumped because: kasan: bad access detected [ 22.057518] [ 22.057540] Memory state around the buggy address: [ 22.057579] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.057633] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.057758] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.057855] ^ [ 22.057955] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.058752] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.058844] ================================================================== [ 22.033545] ================================================================== [ 22.033618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.033690] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.033749] [ 22.033789] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.033923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.033958] Hardware name: linux,dummy-virt (DT) [ 22.034010] Call trace: [ 22.034041] show_stack+0x20/0x38 (C) [ 22.034104] dump_stack_lvl+0x8c/0xd0 [ 22.034153] print_report+0x118/0x608 [ 22.034204] kasan_report+0xdc/0x128 [ 22.034252] kasan_check_range+0x100/0x1a8 [ 22.034307] __kasan_check_write+0x20/0x30 [ 22.034369] kasan_atomics_helper+0x11f8/0x4858 [ 22.034518] kasan_atomics+0x198/0x2e0 [ 22.034576] kunit_try_run_case+0x170/0x3f0 [ 22.034692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034817] kthread+0x328/0x630 [ 22.034877] ret_from_fork+0x10/0x20 [ 22.034935] [ 22.034960] Allocated by task 265: [ 22.035008] kasan_save_stack+0x3c/0x68 [ 22.035072] kasan_save_track+0x20/0x40 [ 22.035169] kasan_save_alloc_info+0x40/0x58 [ 22.035298] __kasan_kmalloc+0xd4/0xd8 [ 22.035351] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.035420] kasan_atomics+0xb8/0x2e0 [ 22.035468] kunit_try_run_case+0x170/0x3f0 [ 22.035639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.035696] kthread+0x328/0x630 [ 22.035743] ret_from_fork+0x10/0x20 [ 22.035788] [ 22.035815] The buggy address belongs to the object at fff00000c59de300 [ 22.035815] which belongs to the cache kmalloc-64 of size 64 [ 22.035953] The buggy address is located 0 bytes to the right of [ 22.035953] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.036102] [ 22.036157] The buggy address belongs to the physical page: [ 22.036219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.036334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.036389] page_type: f5(slab) [ 22.036471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.036573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.036624] page dumped because: kasan: bad access detected [ 22.036664] [ 22.036688] Memory state around the buggy address: [ 22.036725] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.036776] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.036828] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.036874] ^ [ 22.036933] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.037025] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.037131] ================================================================== [ 22.101225] ================================================================== [ 22.101316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.101391] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.101451] [ 22.101532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.101652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.101690] Hardware name: linux,dummy-virt (DT) [ 22.101730] Call trace: [ 22.101786] show_stack+0x20/0x38 (C) [ 22.101926] dump_stack_lvl+0x8c/0xd0 [ 22.101994] print_report+0x118/0x608 [ 22.102118] kasan_report+0xdc/0x128 [ 22.102381] kasan_check_range+0x100/0x1a8 [ 22.102693] __kasan_check_write+0x20/0x30 [ 22.102810] kasan_atomics_helper+0x1644/0x4858 [ 22.102880] kasan_atomics+0x198/0x2e0 [ 22.102947] kunit_try_run_case+0x170/0x3f0 [ 22.103103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.103174] kthread+0x328/0x630 [ 22.103231] ret_from_fork+0x10/0x20 [ 22.103313] [ 22.103339] Allocated by task 265: [ 22.103378] kasan_save_stack+0x3c/0x68 [ 22.103431] kasan_save_track+0x20/0x40 [ 22.103477] kasan_save_alloc_info+0x40/0x58 [ 22.103562] __kasan_kmalloc+0xd4/0xd8 [ 22.103622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.103670] kasan_atomics+0xb8/0x2e0 [ 22.103713] kunit_try_run_case+0x170/0x3f0 [ 22.103758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.103808] kthread+0x328/0x630 [ 22.103883] ret_from_fork+0x10/0x20 [ 22.103937] [ 22.103965] The buggy address belongs to the object at fff00000c59de300 [ 22.103965] which belongs to the cache kmalloc-64 of size 64 [ 22.104045] The buggy address is located 0 bytes to the right of [ 22.104045] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.104121] [ 22.104161] The buggy address belongs to the physical page: [ 22.104205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.104302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.104373] page_type: f5(slab) [ 22.104423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.104483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.104591] page dumped because: kasan: bad access detected [ 22.104640] [ 22.104693] Memory state around the buggy address: [ 22.104778] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.104881] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.104935] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.104989] ^ [ 22.105031] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105106] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105158] ================================================================== [ 21.998708] ================================================================== [ 21.998769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.998838] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.998919] [ 21.998959] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.999069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.999120] Hardware name: linux,dummy-virt (DT) [ 21.999157] Call trace: [ 21.999186] show_stack+0x20/0x38 (C) [ 21.999246] dump_stack_lvl+0x8c/0xd0 [ 21.999318] print_report+0x118/0x608 [ 21.999378] kasan_report+0xdc/0x128 [ 21.999432] kasan_check_range+0x100/0x1a8 [ 21.999487] __kasan_check_write+0x20/0x30 [ 21.999545] kasan_atomics_helper+0x1058/0x4858 [ 21.999639] kasan_atomics+0x198/0x2e0 [ 21.999747] kunit_try_run_case+0x170/0x3f0 [ 21.999857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.999990] kthread+0x328/0x630 [ 22.000109] ret_from_fork+0x10/0x20 [ 22.000226] [ 22.000272] Allocated by task 265: [ 22.000345] kasan_save_stack+0x3c/0x68 [ 22.000420] kasan_save_track+0x20/0x40 [ 22.000469] kasan_save_alloc_info+0x40/0x58 [ 22.000548] __kasan_kmalloc+0xd4/0xd8 [ 22.000624] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.000706] kasan_atomics+0xb8/0x2e0 [ 22.000784] kunit_try_run_case+0x170/0x3f0 [ 22.000867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.000958] kthread+0x328/0x630 [ 22.001102] ret_from_fork+0x10/0x20 [ 22.001148] [ 22.001273] The buggy address belongs to the object at fff00000c59de300 [ 22.001273] which belongs to the cache kmalloc-64 of size 64 [ 22.001340] The buggy address is located 0 bytes to the right of [ 22.001340] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.001602] [ 22.001632] The buggy address belongs to the physical page: [ 22.001672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.001914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.002192] page_type: f5(slab) [ 22.002494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.002581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.002952] page dumped because: kasan: bad access detected [ 22.003055] [ 22.003279] Memory state around the buggy address: [ 22.003328] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.003827] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.004114] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.004178] ^ [ 22.004224] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.004473] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.004627] ================================================================== [ 21.986271] ================================================================== [ 21.986549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.986705] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.986828] [ 21.986880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.986991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.987029] Hardware name: linux,dummy-virt (DT) [ 21.987095] Call trace: [ 21.987130] show_stack+0x20/0x38 (C) [ 21.987193] dump_stack_lvl+0x8c/0xd0 [ 21.987246] print_report+0x118/0x608 [ 21.987489] kasan_report+0xdc/0x128 [ 21.987622] kasan_check_range+0x100/0x1a8 [ 21.987699] __kasan_check_write+0x20/0x30 [ 21.987810] kasan_atomics_helper+0xf88/0x4858 [ 21.987876] kasan_atomics+0x198/0x2e0 [ 21.987930] kunit_try_run_case+0x170/0x3f0 [ 21.987998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.988065] kthread+0x328/0x630 [ 21.988185] ret_from_fork+0x10/0x20 [ 21.988247] [ 21.988348] Allocated by task 265: [ 21.988530] kasan_save_stack+0x3c/0x68 [ 21.988588] kasan_save_track+0x20/0x40 [ 21.988635] kasan_save_alloc_info+0x40/0x58 [ 21.988684] __kasan_kmalloc+0xd4/0xd8 [ 21.988728] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.988777] kasan_atomics+0xb8/0x2e0 [ 21.989431] kunit_try_run_case+0x170/0x3f0 [ 21.990194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.990411] kthread+0x328/0x630 [ 21.990612] ret_from_fork+0x10/0x20 [ 21.991046] [ 21.991283] The buggy address belongs to the object at fff00000c59de300 [ 21.991283] which belongs to the cache kmalloc-64 of size 64 [ 21.991365] The buggy address is located 0 bytes to the right of [ 21.991365] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.991440] [ 21.991470] The buggy address belongs to the physical page: [ 21.991507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.991567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.991622] page_type: f5(slab) [ 21.993035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.993432] page dumped because: kasan: bad access detected [ 21.993580] [ 21.993670] Memory state around the buggy address: [ 21.993712] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.993946] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.994276] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.994465] ^ [ 21.994521] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.994575] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.994621] ================================================================== [ 21.968634] ================================================================== [ 21.968733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.968823] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.968886] [ 21.968940] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.969097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.969162] Hardware name: linux,dummy-virt (DT) [ 21.969211] Call trace: [ 21.969292] show_stack+0x20/0x38 (C) [ 21.969385] dump_stack_lvl+0x8c/0xd0 [ 21.969779] print_report+0x118/0x608 [ 21.969906] kasan_report+0xdc/0x128 [ 21.969965] __asan_report_store8_noabort+0x20/0x30 [ 21.970046] kasan_atomics_helper+0x3e5c/0x4858 [ 21.970109] kasan_atomics+0x198/0x2e0 [ 21.970164] kunit_try_run_case+0x170/0x3f0 [ 21.970222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.970299] kthread+0x328/0x630 [ 21.970366] ret_from_fork+0x10/0x20 [ 21.970450] [ 21.970481] Allocated by task 265: [ 21.970519] kasan_save_stack+0x3c/0x68 [ 21.970574] kasan_save_track+0x20/0x40 [ 21.970634] kasan_save_alloc_info+0x40/0x58 [ 21.970691] __kasan_kmalloc+0xd4/0xd8 [ 21.970736] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.970784] kasan_atomics+0xb8/0x2e0 [ 21.970849] kunit_try_run_case+0x170/0x3f0 [ 21.970902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.970955] kthread+0x328/0x630 [ 21.971009] ret_from_fork+0x10/0x20 [ 21.971055] [ 21.971080] The buggy address belongs to the object at fff00000c59de300 [ 21.971080] which belongs to the cache kmalloc-64 of size 64 [ 21.971150] The buggy address is located 0 bytes to the right of [ 21.971150] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.971222] [ 21.971250] The buggy address belongs to the physical page: [ 21.971290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.971355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.971415] page_type: f5(slab) [ 21.971463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.971523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.971572] page dumped because: kasan: bad access detected [ 21.971610] [ 21.971632] Memory state around the buggy address: [ 21.971671] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.971723] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.971774] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.971819] ^ [ 21.971857] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.971907] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.971952] ================================================================== [ 21.972130] ================================================================== [ 21.972184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.972240] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.972297] [ 21.972338] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.972534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.972589] Hardware name: linux,dummy-virt (DT) [ 21.972629] Call trace: [ 21.972659] show_stack+0x20/0x38 (C) [ 21.972773] dump_stack_lvl+0x8c/0xd0 [ 21.972883] print_report+0x118/0x608 [ 21.973728] kasan_report+0xdc/0x128 [ 21.973923] kasan_check_range+0x100/0x1a8 [ 21.974080] __kasan_check_write+0x20/0x30 [ 21.974200] kasan_atomics_helper+0xeb8/0x4858 [ 21.974259] kasan_atomics+0x198/0x2e0 [ 21.974320] kunit_try_run_case+0x170/0x3f0 [ 21.974375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.974462] kthread+0x328/0x630 [ 21.974517] ret_from_fork+0x10/0x20 [ 21.974574] [ 21.974599] Allocated by task 265: [ 21.974636] kasan_save_stack+0x3c/0x68 [ 21.974823] kasan_save_track+0x20/0x40 [ 21.974908] kasan_save_alloc_info+0x40/0x58 [ 21.974960] __kasan_kmalloc+0xd4/0xd8 [ 21.975031] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.975079] kasan_atomics+0xb8/0x2e0 [ 21.975124] kunit_try_run_case+0x170/0x3f0 [ 21.975171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.975222] kthread+0x328/0x630 [ 21.975268] ret_from_fork+0x10/0x20 [ 21.975315] [ 21.975346] The buggy address belongs to the object at fff00000c59de300 [ 21.975346] which belongs to the cache kmalloc-64 of size 64 [ 21.975416] The buggy address is located 0 bytes to the right of [ 21.975416] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.975486] [ 21.975511] The buggy address belongs to the physical page: [ 21.975550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.975608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.975663] page_type: f5(slab) [ 21.975711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.975769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.975814] page dumped because: kasan: bad access detected [ 21.975848] [ 21.975871] Memory state around the buggy address: [ 21.975908] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.975956] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.976024] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.976070] ^ [ 21.976111] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.976160] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.976205] ================================================================== [ 22.047798] ================================================================== [ 22.047861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.047933] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.048009] [ 22.048052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.048151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.048185] Hardware name: linux,dummy-virt (DT) [ 22.048223] Call trace: [ 22.048253] show_stack+0x20/0x38 (C) [ 22.048315] dump_stack_lvl+0x8c/0xd0 [ 22.048369] print_report+0x118/0x608 [ 22.048425] kasan_report+0xdc/0x128 [ 22.048478] kasan_check_range+0x100/0x1a8 [ 22.048536] __kasan_check_write+0x20/0x30 [ 22.048592] kasan_atomics_helper+0x1384/0x4858 [ 22.048649] kasan_atomics+0x198/0x2e0 [ 22.048703] kunit_try_run_case+0x170/0x3f0 [ 22.048760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.048824] kthread+0x328/0x630 [ 22.048922] ret_from_fork+0x10/0x20 [ 22.049026] [ 22.049052] Allocated by task 265: [ 22.049089] kasan_save_stack+0x3c/0x68 [ 22.049215] kasan_save_track+0x20/0x40 [ 22.049364] kasan_save_alloc_info+0x40/0x58 [ 22.049475] __kasan_kmalloc+0xd4/0xd8 [ 22.049538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.049590] kasan_atomics+0xb8/0x2e0 [ 22.049633] kunit_try_run_case+0x170/0x3f0 [ 22.049679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.049733] kthread+0x328/0x630 [ 22.049777] ret_from_fork+0x10/0x20 [ 22.049845] [ 22.049876] The buggy address belongs to the object at fff00000c59de300 [ 22.049876] which belongs to the cache kmalloc-64 of size 64 [ 22.049947] The buggy address is located 0 bytes to the right of [ 22.049947] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.050064] [ 22.050097] The buggy address belongs to the physical page: [ 22.050185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.050278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.050337] page_type: f5(slab) [ 22.050388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.050454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.050541] page dumped because: kasan: bad access detected [ 22.050614] [ 22.050663] Memory state around the buggy address: [ 22.050705] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050759] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050808] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.050852] ^ [ 22.050893] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.050944] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.051001] ================================================================== [ 22.059361] ================================================================== [ 22.059429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.059498] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.059556] [ 22.059594] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.059692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.059725] Hardware name: linux,dummy-virt (DT) [ 22.059761] Call trace: [ 22.059790] show_stack+0x20/0x38 (C) [ 22.059850] dump_stack_lvl+0x8c/0xd0 [ 22.059903] print_report+0x118/0x608 [ 22.059959] kasan_report+0xdc/0x128 [ 22.060027] kasan_check_range+0x100/0x1a8 [ 22.060085] __kasan_check_write+0x20/0x30 [ 22.060140] kasan_atomics_helper+0x1414/0x4858 [ 22.060194] kasan_atomics+0x198/0x2e0 [ 22.060247] kunit_try_run_case+0x170/0x3f0 [ 22.060300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.060361] kthread+0x328/0x630 [ 22.060414] ret_from_fork+0x10/0x20 [ 22.060471] [ 22.060495] Allocated by task 265: [ 22.060530] kasan_save_stack+0x3c/0x68 [ 22.060581] kasan_save_track+0x20/0x40 [ 22.060627] kasan_save_alloc_info+0x40/0x58 [ 22.060675] __kasan_kmalloc+0xd4/0xd8 [ 22.060719] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.060765] kasan_atomics+0xb8/0x2e0 [ 22.060806] kunit_try_run_case+0x170/0x3f0 [ 22.060854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.060905] kthread+0x328/0x630 [ 22.060949] ret_from_fork+0x10/0x20 [ 22.061977] [ 22.062040] The buggy address belongs to the object at fff00000c59de300 [ 22.062040] which belongs to the cache kmalloc-64 of size 64 [ 22.062172] The buggy address is located 0 bytes to the right of [ 22.062172] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.062353] [ 22.062405] The buggy address belongs to the physical page: [ 22.062511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.062720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.062780] page_type: f5(slab) [ 22.062829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.062883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.062929] page dumped because: kasan: bad access detected [ 22.063558] [ 22.063589] Memory state around the buggy address: [ 22.063634] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.063688] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.063736] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.063781] ^ [ 22.063822] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.063917] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.063964] ================================================================== [ 22.113023] ================================================================== [ 22.113092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.113564] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.113670] [ 22.113728] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.113841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.113878] Hardware name: linux,dummy-virt (DT) [ 22.113919] Call trace: [ 22.113951] show_stack+0x20/0x38 (C) [ 22.114031] dump_stack_lvl+0x8c/0xd0 [ 22.114089] print_report+0x118/0x608 [ 22.114142] kasan_report+0xdc/0x128 [ 22.114195] kasan_check_range+0x100/0x1a8 [ 22.114251] __kasan_check_write+0x20/0x30 [ 22.114308] kasan_atomics_helper+0x16d0/0x4858 [ 22.114363] kasan_atomics+0x198/0x2e0 [ 22.114411] kunit_try_run_case+0x170/0x3f0 [ 22.115491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.115613] kthread+0x328/0x630 [ 22.115673] ret_from_fork+0x10/0x20 [ 22.115775] [ 22.115804] Allocated by task 265: [ 22.115839] kasan_save_stack+0x3c/0x68 [ 22.115894] kasan_save_track+0x20/0x40 [ 22.115940] kasan_save_alloc_info+0x40/0x58 [ 22.116011] __kasan_kmalloc+0xd4/0xd8 [ 22.116060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.116263] kasan_atomics+0xb8/0x2e0 [ 22.116421] kunit_try_run_case+0x170/0x3f0 [ 22.116565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.116895] kthread+0x328/0x630 [ 22.116981] ret_from_fork+0x10/0x20 [ 22.117036] [ 22.117141] The buggy address belongs to the object at fff00000c59de300 [ 22.117141] which belongs to the cache kmalloc-64 of size 64 [ 22.117209] The buggy address is located 0 bytes to the right of [ 22.117209] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.117283] [ 22.117308] The buggy address belongs to the physical page: [ 22.117348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.117409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.117692] page_type: f5(slab) [ 22.117816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.118207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.118307] page dumped because: kasan: bad access detected [ 22.118365] [ 22.118392] Memory state around the buggy address: [ 22.118662] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.119063] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.119180] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.119524] ^ [ 22.119738] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.119858] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.119923] ================================================================== [ 22.131862] ================================================================== [ 22.131944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.132042] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.132103] [ 22.132148] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.132247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.132280] Hardware name: linux,dummy-virt (DT) [ 22.132315] Call trace: [ 22.132343] show_stack+0x20/0x38 (C) [ 22.132402] dump_stack_lvl+0x8c/0xd0 [ 22.132453] print_report+0x118/0x608 [ 22.132505] kasan_report+0xdc/0x128 [ 22.132554] kasan_check_range+0x100/0x1a8 [ 22.132607] __kasan_check_write+0x20/0x30 [ 22.132661] kasan_atomics_helper+0x175c/0x4858 [ 22.132715] kasan_atomics+0x198/0x2e0 [ 22.132762] kunit_try_run_case+0x170/0x3f0 [ 22.132815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.132873] kthread+0x328/0x630 [ 22.132926] ret_from_fork+0x10/0x20 [ 22.133003] [ 22.133146] Allocated by task 265: [ 22.133193] kasan_save_stack+0x3c/0x68 [ 22.133258] kasan_save_track+0x20/0x40 [ 22.133305] kasan_save_alloc_info+0x40/0x58 [ 22.133354] __kasan_kmalloc+0xd4/0xd8 [ 22.133398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.133456] kasan_atomics+0xb8/0x2e0 [ 22.133507] kunit_try_run_case+0x170/0x3f0 [ 22.133553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.133605] kthread+0x328/0x630 [ 22.133883] ret_from_fork+0x10/0x20 [ 22.133988] [ 22.134111] The buggy address belongs to the object at fff00000c59de300 [ 22.134111] which belongs to the cache kmalloc-64 of size 64 [ 22.134485] The buggy address is located 0 bytes to the right of [ 22.134485] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.134564] [ 22.134592] The buggy address belongs to the physical page: [ 22.134731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.135063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.135353] page_type: f5(slab) [ 22.135481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.135543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.135592] page dumped because: kasan: bad access detected [ 22.135633] [ 22.135659] Memory state around the buggy address: [ 22.135699] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.135750] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.135800] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.135845] ^ [ 22.135887] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.136194] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.136252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 21.579650] ================================================================== [ 21.579733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 21.579813] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.579875] [ 21.579917] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.580034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.580071] Hardware name: linux,dummy-virt (DT) [ 21.580112] Call trace: [ 21.580141] show_stack+0x20/0x38 (C) [ 21.580202] dump_stack_lvl+0x8c/0xd0 [ 21.580261] print_report+0x118/0x608 [ 21.580317] kasan_report+0xdc/0x128 [ 21.580371] kasan_check_range+0x100/0x1a8 [ 21.580427] __kasan_check_write+0x20/0x30 [ 21.580484] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 21.580547] kasan_bitops_generic+0x11c/0x1c8 [ 21.580602] kunit_try_run_case+0x170/0x3f0 [ 21.580658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.580719] kthread+0x328/0x630 [ 21.580773] ret_from_fork+0x10/0x20 [ 21.580828] [ 21.580855] Allocated by task 261: [ 21.580892] kasan_save_stack+0x3c/0x68 [ 21.580955] kasan_save_track+0x20/0x40 [ 21.581018] kasan_save_alloc_info+0x40/0x58 [ 21.581067] __kasan_kmalloc+0xd4/0xd8 [ 21.581111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.581158] kasan_bitops_generic+0xa0/0x1c8 [ 21.581204] kunit_try_run_case+0x170/0x3f0 [ 21.581248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.581296] kthread+0x328/0x630 [ 21.581338] ret_from_fork+0x10/0x20 [ 21.581823] [ 21.581857] The buggy address belongs to the object at fff00000c4035140 [ 21.581857] which belongs to the cache kmalloc-16 of size 16 [ 21.581929] The buggy address is located 8 bytes inside of [ 21.581929] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.582108] [ 21.582139] The buggy address belongs to the physical page: [ 21.582190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.582757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.583055] page_type: f5(slab) [ 21.583115] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.583176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.583312] page dumped because: kasan: bad access detected [ 21.583355] [ 21.583379] Memory state around the buggy address: [ 21.583521] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.583716] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.583770] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.584030] ^ [ 21.584126] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.584258] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.584475] ================================================================== [ 21.585008] ================================================================== [ 21.585073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 21.585151] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.585210] [ 21.585254] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.585351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.585386] Hardware name: linux,dummy-virt (DT) [ 21.585425] Call trace: [ 21.585455] show_stack+0x20/0x38 (C) [ 21.585516] dump_stack_lvl+0x8c/0xd0 [ 21.585570] print_report+0x118/0x608 [ 21.585625] kasan_report+0xdc/0x128 [ 21.585679] __asan_report_load8_noabort+0x20/0x30 [ 21.585739] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 21.585847] kasan_bitops_generic+0x11c/0x1c8 [ 21.585917] kunit_try_run_case+0x170/0x3f0 [ 21.586595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.587320] kthread+0x328/0x630 [ 21.587408] ret_from_fork+0x10/0x20 [ 21.587529] [ 21.587593] Allocated by task 261: [ 21.587667] kasan_save_stack+0x3c/0x68 [ 21.587733] kasan_save_track+0x20/0x40 [ 21.587780] kasan_save_alloc_info+0x40/0x58 [ 21.587828] __kasan_kmalloc+0xd4/0xd8 [ 21.587871] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.588335] kasan_bitops_generic+0xa0/0x1c8 [ 21.588392] kunit_try_run_case+0x170/0x3f0 [ 21.588448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.588646] kthread+0x328/0x630 [ 21.588701] ret_from_fork+0x10/0x20 [ 21.588835] [ 21.589100] The buggy address belongs to the object at fff00000c4035140 [ 21.589100] which belongs to the cache kmalloc-16 of size 16 [ 21.589185] The buggy address is located 8 bytes inside of [ 21.589185] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.589273] [ 21.589633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.590316] [ 21.590541] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.590702] ^ [ 21.591943] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 21.562556] ================================================================== [ 21.562892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 21.562968] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.563066] [ 21.563106] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.563330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.563363] Hardware name: linux,dummy-virt (DT) [ 21.563402] Call trace: [ 21.563463] show_stack+0x20/0x38 (C) [ 21.563577] dump_stack_lvl+0x8c/0xd0 [ 21.563644] print_report+0x118/0x608 [ 21.563759] kasan_report+0xdc/0x128 [ 21.563862] kasan_check_range+0x100/0x1a8 [ 21.563998] __kasan_check_write+0x20/0x30 [ 21.564056] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 21.564114] kasan_bitops_generic+0x110/0x1c8 [ 21.564531] kunit_try_run_case+0x170/0x3f0 [ 21.564593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.564953] kthread+0x328/0x630 [ 21.565067] ret_from_fork+0x10/0x20 [ 21.565193] [ 21.565234] Allocated by task 261: [ 21.565276] kasan_save_stack+0x3c/0x68 [ 21.565412] kasan_save_track+0x20/0x40 [ 21.565461] kasan_save_alloc_info+0x40/0x58 [ 21.565507] __kasan_kmalloc+0xd4/0xd8 [ 21.565551] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.565598] kasan_bitops_generic+0xa0/0x1c8 [ 21.565645] kunit_try_run_case+0x170/0x3f0 [ 21.565706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.565760] kthread+0x328/0x630 [ 21.565823] ret_from_fork+0x10/0x20 [ 21.565902] [ 21.565933] The buggy address belongs to the object at fff00000c4035140 [ 21.565933] which belongs to the cache kmalloc-16 of size 16 [ 21.566021] The buggy address is located 8 bytes inside of [ 21.566021] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.566094] [ 21.566121] The buggy address belongs to the physical page: [ 21.566160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.566492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.566568] page_type: f5(slab) [ 21.567555] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.568145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.568225] page dumped because: kasan: bad access detected [ 21.568269] [ 21.568311] Memory state around the buggy address: [ 21.568364] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.568432] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.568484] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.568528] ^ [ 21.568572] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.568628] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.568672] ================================================================== [ 21.569740] ================================================================== [ 21.569838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 21.569921] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.570177] [ 21.570474] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.570871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.570912] Hardware name: linux,dummy-virt (DT) [ 21.571079] Call trace: [ 21.571128] show_stack+0x20/0x38 (C) [ 21.571202] dump_stack_lvl+0x8c/0xd0 [ 21.571258] print_report+0x118/0x608 [ 21.571314] kasan_report+0xdc/0x128 [ 21.571809] __asan_report_load8_noabort+0x20/0x30 [ 21.571996] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 21.572170] kasan_bitops_generic+0x110/0x1c8 [ 21.572377] kunit_try_run_case+0x170/0x3f0 [ 21.572573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.572645] kthread+0x328/0x630 [ 21.572864] ret_from_fork+0x10/0x20 [ 21.573164] [ 21.573258] Allocated by task 261: [ 21.573394] kasan_save_stack+0x3c/0x68 [ 21.573606] kasan_save_track+0x20/0x40 [ 21.573667] kasan_save_alloc_info+0x40/0x58 [ 21.574087] __kasan_kmalloc+0xd4/0xd8 [ 21.574267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.574339] kasan_bitops_generic+0xa0/0x1c8 [ 21.574543] kunit_try_run_case+0x170/0x3f0 [ 21.574606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.574849] kthread+0x328/0x630 [ 21.574949] ret_from_fork+0x10/0x20 [ 21.575103] [ 21.575131] The buggy address belongs to the object at fff00000c4035140 [ 21.575131] which belongs to the cache kmalloc-16 of size 16 [ 21.575201] The buggy address is located 8 bytes inside of [ 21.575201] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.575432] [ 21.575468] The buggy address belongs to the physical page: [ 21.575727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.575941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.576168] page_type: f5(slab) [ 21.576253] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.576317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.576669] page dumped because: kasan: bad access detected [ 21.576978] [ 21.577016] Memory state around the buggy address: [ 21.577071] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.577312] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.577585] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.577693] ^ [ 21.577754] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.578027] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.578206] ================================================================== [ 21.535510] ================================================================== [ 21.535592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 21.535668] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.535727] [ 21.535771] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.535870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.535902] Hardware name: linux,dummy-virt (DT) [ 21.535941] Call trace: [ 21.535987] show_stack+0x20/0x38 (C) [ 21.536053] dump_stack_lvl+0x8c/0xd0 [ 21.536111] print_report+0x118/0x608 [ 21.536164] kasan_report+0xdc/0x128 [ 21.536217] kasan_check_range+0x100/0x1a8 [ 21.536270] __kasan_check_write+0x20/0x30 [ 21.536326] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 21.536385] kasan_bitops_generic+0x110/0x1c8 [ 21.536439] kunit_try_run_case+0x170/0x3f0 [ 21.536488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.536544] kthread+0x328/0x630 [ 21.536594] ret_from_fork+0x10/0x20 [ 21.536648] [ 21.536671] Allocated by task 261: [ 21.536705] kasan_save_stack+0x3c/0x68 [ 21.536754] kasan_save_track+0x20/0x40 [ 21.536796] kasan_save_alloc_info+0x40/0x58 [ 21.537379] __kasan_kmalloc+0xd4/0xd8 [ 21.537507] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.537617] kasan_bitops_generic+0xa0/0x1c8 [ 21.537748] kunit_try_run_case+0x170/0x3f0 [ 21.537929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.538038] kthread+0x328/0x630 [ 21.538155] ret_from_fork+0x10/0x20 [ 21.538270] [ 21.538343] The buggy address belongs to the object at fff00000c4035140 [ 21.538343] which belongs to the cache kmalloc-16 of size 16 [ 21.538663] The buggy address is located 8 bytes inside of [ 21.538663] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.538775] [ 21.538806] The buggy address belongs to the physical page: [ 21.538848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.539225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.539486] page_type: f5(slab) [ 21.539564] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.539630] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.539866] page dumped because: kasan: bad access detected [ 21.539963] [ 21.540059] Memory state around the buggy address: [ 21.540114] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.540218] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.540306] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.540356] ^ [ 21.540402] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540742] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540821] ================================================================== [ 21.485671] ================================================================== [ 21.485997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.486242] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.486307] [ 21.486415] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.486526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.486897] Hardware name: linux,dummy-virt (DT) [ 21.486948] Call trace: [ 21.487054] show_stack+0x20/0x38 (C) [ 21.487130] dump_stack_lvl+0x8c/0xd0 [ 21.487191] print_report+0x118/0x608 [ 21.487259] kasan_report+0xdc/0x128 [ 21.487314] kasan_check_range+0x100/0x1a8 [ 21.487371] __kasan_check_write+0x20/0x30 [ 21.488107] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.488295] kasan_bitops_generic+0x110/0x1c8 [ 21.488400] kunit_try_run_case+0x170/0x3f0 [ 21.488758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.488842] kthread+0x328/0x630 [ 21.488936] ret_from_fork+0x10/0x20 [ 21.489025] [ 21.489072] Allocated by task 261: [ 21.489305] kasan_save_stack+0x3c/0x68 [ 21.489582] kasan_save_track+0x20/0x40 [ 21.489951] kasan_save_alloc_info+0x40/0x58 [ 21.490116] __kasan_kmalloc+0xd4/0xd8 [ 21.490252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.490314] kasan_bitops_generic+0xa0/0x1c8 [ 21.490633] kunit_try_run_case+0x170/0x3f0 [ 21.490759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.490827] kthread+0x328/0x630 [ 21.490934] ret_from_fork+0x10/0x20 [ 21.490993] [ 21.491024] The buggy address belongs to the object at fff00000c4035140 [ 21.491024] which belongs to the cache kmalloc-16 of size 16 [ 21.491344] The buggy address is located 8 bytes inside of [ 21.491344] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.491545] [ 21.491598] The buggy address belongs to the physical page: [ 21.491884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.492069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.492136] page_type: f5(slab) [ 21.492346] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.493299] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.493412] page dumped because: kasan: bad access detected [ 21.493455] [ 21.493499] Memory state around the buggy address: [ 21.493546] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.493614] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.493823] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.493960] ^ [ 21.494024] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.494080] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.494322] ================================================================== [ 21.553925] ================================================================== [ 21.554012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 21.554086] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.554152] [ 21.554236] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.554427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.555005] Hardware name: linux,dummy-virt (DT) [ 21.555139] Call trace: [ 21.555179] show_stack+0x20/0x38 (C) [ 21.555308] dump_stack_lvl+0x8c/0xd0 [ 21.555404] print_report+0x118/0x608 [ 21.555463] kasan_report+0xdc/0x128 [ 21.555518] kasan_check_range+0x100/0x1a8 [ 21.555628] __kasan_check_write+0x20/0x30 [ 21.555706] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 21.555776] kasan_bitops_generic+0x110/0x1c8 [ 21.555854] kunit_try_run_case+0x170/0x3f0 [ 21.555911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.556118] kthread+0x328/0x630 [ 21.556228] ret_from_fork+0x10/0x20 [ 21.556410] [ 21.556572] Allocated by task 261: [ 21.557017] kasan_save_stack+0x3c/0x68 [ 21.557221] kasan_save_track+0x20/0x40 [ 21.557502] kasan_save_alloc_info+0x40/0x58 [ 21.557579] __kasan_kmalloc+0xd4/0xd8 [ 21.557922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.558276] kasan_bitops_generic+0xa0/0x1c8 [ 21.558360] kunit_try_run_case+0x170/0x3f0 [ 21.558472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.558753] kthread+0x328/0x630 [ 21.558847] ret_from_fork+0x10/0x20 [ 21.559006] [ 21.559158] The buggy address belongs to the object at fff00000c4035140 [ 21.559158] which belongs to the cache kmalloc-16 of size 16 [ 21.559237] The buggy address is located 8 bytes inside of [ 21.559237] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.559332] [ 21.559401] The buggy address belongs to the physical page: [ 21.559488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.559764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.559832] page_type: f5(slab) [ 21.559884] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.559960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.560025] page dumped because: kasan: bad access detected [ 21.560061] [ 21.560085] Memory state around the buggy address: [ 21.560124] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.560176] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.560223] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.560873] ^ [ 21.560933] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.561049] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.561093] ================================================================== [ 21.509681] ================================================================== [ 21.509765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.509860] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.509924] [ 21.509991] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.510101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.510136] Hardware name: linux,dummy-virt (DT) [ 21.510178] Call trace: [ 21.510209] show_stack+0x20/0x38 (C) [ 21.510274] dump_stack_lvl+0x8c/0xd0 [ 21.510331] print_report+0x118/0x608 [ 21.510388] kasan_report+0xdc/0x128 [ 21.510441] kasan_check_range+0x100/0x1a8 [ 21.515424] __kasan_check_write+0x20/0x30 [ 21.515912] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.516052] kasan_bitops_generic+0x110/0x1c8 [ 21.516778] kunit_try_run_case+0x170/0x3f0 [ 21.516911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.517488] kthread+0x328/0x630 [ 21.517722] ret_from_fork+0x10/0x20 [ 21.517789] [ 21.518601] Allocated by task 261: [ 21.518999] kasan_save_stack+0x3c/0x68 [ 21.519072] kasan_save_track+0x20/0x40 [ 21.519118] kasan_save_alloc_info+0x40/0x58 [ 21.519902] __kasan_kmalloc+0xd4/0xd8 [ 21.520221] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.520499] kasan_bitops_generic+0xa0/0x1c8 [ 21.521174] kunit_try_run_case+0x170/0x3f0 [ 21.521412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.521499] kthread+0x328/0x630 [ 21.522031] ret_from_fork+0x10/0x20 [ 21.522583] [ 21.522633] The buggy address belongs to the object at fff00000c4035140 [ 21.522633] which belongs to the cache kmalloc-16 of size 16 [ 21.522713] The buggy address is located 8 bytes inside of [ 21.522713] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.523365] [ 21.523734] The buggy address belongs to the physical page: [ 21.523905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.524468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.524556] page_type: f5(slab) [ 21.525140] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.525408] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.525465] page dumped because: kasan: bad access detected [ 21.525506] [ 21.525530] Memory state around the buggy address: [ 21.525570] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.526153] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.526826] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.526881] ^ [ 21.526938] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.527001] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.527403] ================================================================== [ 21.541881] ================================================================== [ 21.542037] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 21.542192] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.542310] [ 21.542389] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.542526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.542565] Hardware name: linux,dummy-virt (DT) [ 21.543067] Call trace: [ 21.543125] show_stack+0x20/0x38 (C) [ 21.543218] dump_stack_lvl+0x8c/0xd0 [ 21.543278] print_report+0x118/0x608 [ 21.543361] kasan_report+0xdc/0x128 [ 21.543448] kasan_check_range+0x100/0x1a8 [ 21.543502] __kasan_check_write+0x20/0x30 [ 21.543557] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 21.543615] kasan_bitops_generic+0x110/0x1c8 [ 21.543667] kunit_try_run_case+0x170/0x3f0 [ 21.543718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.543775] kthread+0x328/0x630 [ 21.543824] ret_from_fork+0x10/0x20 [ 21.543877] [ 21.543902] Allocated by task 261: [ 21.543936] kasan_save_stack+0x3c/0x68 [ 21.544008] kasan_save_track+0x20/0x40 [ 21.544054] kasan_save_alloc_info+0x40/0x58 [ 21.544101] __kasan_kmalloc+0xd4/0xd8 [ 21.544142] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.544183] kasan_bitops_generic+0xa0/0x1c8 [ 21.544225] kunit_try_run_case+0x170/0x3f0 [ 21.544266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.544310] kthread+0x328/0x630 [ 21.544350] ret_from_fork+0x10/0x20 [ 21.544391] [ 21.544414] The buggy address belongs to the object at fff00000c4035140 [ 21.544414] which belongs to the cache kmalloc-16 of size 16 [ 21.544476] The buggy address is located 8 bytes inside of [ 21.544476] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.544540] [ 21.544564] The buggy address belongs to the physical page: [ 21.544597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.544653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.544705] page_type: f5(slab) [ 21.544750] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.544804] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.544850] page dumped because: kasan: bad access detected [ 21.544886] [ 21.544908] Memory state around the buggy address: [ 21.544945] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.545233] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.545283] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.545326] ^ [ 21.545369] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.545431] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.545589] ================================================================== [ 21.547223] ================================================================== [ 21.547303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 21.547379] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.547439] [ 21.547479] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.547571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.547605] Hardware name: linux,dummy-virt (DT) [ 21.547644] Call trace: [ 21.547670] show_stack+0x20/0x38 (C) [ 21.547726] dump_stack_lvl+0x8c/0xd0 [ 21.547777] print_report+0x118/0x608 [ 21.547832] kasan_report+0xdc/0x128 [ 21.547884] __asan_report_load8_noabort+0x20/0x30 [ 21.547942] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 21.548019] kasan_bitops_generic+0x110/0x1c8 [ 21.548079] kunit_try_run_case+0x170/0x3f0 [ 21.548132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.548193] kthread+0x328/0x630 [ 21.548249] ret_from_fork+0x10/0x20 [ 21.548308] [ 21.548331] Allocated by task 261: [ 21.548365] kasan_save_stack+0x3c/0x68 [ 21.548417] kasan_save_track+0x20/0x40 [ 21.548463] kasan_save_alloc_info+0x40/0x58 [ 21.548511] __kasan_kmalloc+0xd4/0xd8 [ 21.548600] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.548654] kasan_bitops_generic+0xa0/0x1c8 [ 21.548702] kunit_try_run_case+0x170/0x3f0 [ 21.548746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.548804] kthread+0x328/0x630 [ 21.548848] ret_from_fork+0x10/0x20 [ 21.548894] [ 21.549471] The buggy address belongs to the object at fff00000c4035140 [ 21.549471] which belongs to the cache kmalloc-16 of size 16 [ 21.549666] The buggy address is located 8 bytes inside of [ 21.549666] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.549922] [ 21.549954] The buggy address belongs to the physical page: [ 21.550301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.550394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.550631] page_type: f5(slab) [ 21.550816] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.550884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.551063] page dumped because: kasan: bad access detected [ 21.551145] [ 21.551198] Memory state around the buggy address: [ 21.551362] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.551626] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.552003] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.552704] ^ [ 21.552783] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.552837] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.553288] ================================================================== [ 21.495757] ================================================================== [ 21.495838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.495916] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.496329] [ 21.496639] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.496935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.497008] Hardware name: linux,dummy-virt (DT) [ 21.497072] Call trace: [ 21.497108] show_stack+0x20/0x38 (C) [ 21.497366] dump_stack_lvl+0x8c/0xd0 [ 21.497606] print_report+0x118/0x608 [ 21.497714] kasan_report+0xdc/0x128 [ 21.497857] __asan_report_load8_noabort+0x20/0x30 [ 21.497928] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.498018] kasan_bitops_generic+0x110/0x1c8 [ 21.498078] kunit_try_run_case+0x170/0x3f0 [ 21.498136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.498196] kthread+0x328/0x630 [ 21.498251] ret_from_fork+0x10/0x20 [ 21.498312] [ 21.498337] Allocated by task 261: [ 21.498375] kasan_save_stack+0x3c/0x68 [ 21.498426] kasan_save_track+0x20/0x40 [ 21.498472] kasan_save_alloc_info+0x40/0x58 [ 21.498525] __kasan_kmalloc+0xd4/0xd8 [ 21.498567] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.499863] kasan_bitops_generic+0xa0/0x1c8 [ 21.500585] kunit_try_run_case+0x170/0x3f0 [ 21.500836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.501260] kthread+0x328/0x630 [ 21.501315] ret_from_fork+0x10/0x20 [ 21.501362] [ 21.501391] The buggy address belongs to the object at fff00000c4035140 [ 21.501391] which belongs to the cache kmalloc-16 of size 16 [ 21.502548] The buggy address is located 8 bytes inside of [ 21.502548] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.502648] [ 21.502679] The buggy address belongs to the physical page: [ 21.503377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.503458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.503521] page_type: f5(slab) [ 21.503573] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.503635] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.503685] page dumped because: kasan: bad access detected [ 21.505396] [ 21.505649] Memory state around the buggy address: [ 21.506073] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.506206] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.506882] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.507075] ^ [ 21.507561] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.507661] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.507711] ================================================================== [ 21.528827] ================================================================== [ 21.528908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 21.529004] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.529066] [ 21.529114] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.529212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.529246] Hardware name: linux,dummy-virt (DT) [ 21.529287] Call trace: [ 21.529862] show_stack+0x20/0x38 (C) [ 21.530033] dump_stack_lvl+0x8c/0xd0 [ 21.530158] print_report+0x118/0x608 [ 21.530219] kasan_report+0xdc/0x128 [ 21.530275] __asan_report_load8_noabort+0x20/0x30 [ 21.530337] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 21.530400] kasan_bitops_generic+0x110/0x1c8 [ 21.530474] kunit_try_run_case+0x170/0x3f0 [ 21.530544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.531158] kthread+0x328/0x630 [ 21.531220] ret_from_fork+0x10/0x20 [ 21.531285] [ 21.531310] Allocated by task 261: [ 21.531347] kasan_save_stack+0x3c/0x68 [ 21.531399] kasan_save_track+0x20/0x40 [ 21.531578] kasan_save_alloc_info+0x40/0x58 [ 21.531660] __kasan_kmalloc+0xd4/0xd8 [ 21.531725] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.531777] kasan_bitops_generic+0xa0/0x1c8 [ 21.531821] kunit_try_run_case+0x170/0x3f0 [ 21.531863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.532141] kthread+0x328/0x630 [ 21.532216] ret_from_fork+0x10/0x20 [ 21.532290] [ 21.532337] The buggy address belongs to the object at fff00000c4035140 [ 21.532337] which belongs to the cache kmalloc-16 of size 16 [ 21.532424] The buggy address is located 8 bytes inside of [ 21.532424] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.532490] [ 21.532517] The buggy address belongs to the physical page: [ 21.532553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.532614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.532684] page_type: f5(slab) [ 21.532732] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.533241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.533296] page dumped because: kasan: bad access detected [ 21.533336] [ 21.533371] Memory state around the buggy address: [ 21.533415] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.533695] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.533839] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.533944] ^ [ 21.534066] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.534139] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.534185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 21.463349] ================================================================== [ 21.463438] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 21.463615] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259 [ 21.463681] [ 21.463730] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.463830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.463865] Hardware name: linux,dummy-virt (DT) [ 21.463906] Call trace: [ 21.463945] show_stack+0x20/0x38 (C) [ 21.464087] dump_stack_lvl+0x8c/0xd0 [ 21.464179] print_report+0x118/0x608 [ 21.464240] kasan_report+0xdc/0x128 [ 21.464295] __asan_report_load1_noabort+0x20/0x30 [ 21.464353] strnlen+0x80/0x88 [ 21.464442] kasan_strings+0x478/0xb00 [ 21.464527] kunit_try_run_case+0x170/0x3f0 [ 21.464620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.464724] kthread+0x328/0x630 [ 21.464789] ret_from_fork+0x10/0x20 [ 21.465169] [ 21.465203] Allocated by task 259: [ 21.465240] kasan_save_stack+0x3c/0x68 [ 21.465295] kasan_save_track+0x20/0x40 [ 21.465341] kasan_save_alloc_info+0x40/0x58 [ 21.465384] __kasan_kmalloc+0xd4/0xd8 [ 21.465428] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.465570] kasan_strings+0xc8/0xb00 [ 21.465622] kunit_try_run_case+0x170/0x3f0 [ 21.465666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.465718] kthread+0x328/0x630 [ 21.465760] ret_from_fork+0x10/0x20 [ 21.465833] [ 21.465870] Freed by task 259: [ 21.465908] kasan_save_stack+0x3c/0x68 [ 21.465956] kasan_save_track+0x20/0x40 [ 21.466021] kasan_save_free_info+0x4c/0x78 [ 21.466084] __kasan_slab_free+0x6c/0x98 [ 21.466167] kfree+0x214/0x3c8 [ 21.466216] kasan_strings+0x24c/0xb00 [ 21.466259] kunit_try_run_case+0x170/0x3f0 [ 21.466304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.466354] kthread+0x328/0x630 [ 21.466517] ret_from_fork+0x10/0x20 [ 21.466588] [ 21.466785] The buggy address belongs to the object at fff00000c7794c80 [ 21.466785] which belongs to the cache kmalloc-32 of size 32 [ 21.466875] The buggy address is located 16 bytes inside of [ 21.466875] freed 32-byte region [fff00000c7794c80, fff00000c7794ca0) [ 21.467375] [ 21.467554] The buggy address belongs to the physical page: [ 21.467601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 21.467742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.467834] page_type: f5(slab) [ 21.468051] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.468120] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.468175] page dumped because: kasan: bad access detected [ 21.468215] [ 21.468240] Memory state around the buggy address: [ 21.468282] fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.468615] fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.468839] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.468900] ^ [ 21.469135] fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.469818] fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.470269] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 21.342434] ================================================================== [ 21.343564] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 21.343810] Read of size 1 at addr ffff8000809d7c2a by task kunit_try_catch/249 [ 21.343880] [ 21.346494] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.346614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.346677] Hardware name: linux,dummy-virt (DT) [ 21.346721] Call trace: [ 21.346756] show_stack+0x20/0x38 (C) [ 21.346907] dump_stack_lvl+0x8c/0xd0 [ 21.347013] print_report+0x310/0x608 [ 21.347138] kasan_report+0xdc/0x128 [ 21.347201] __asan_report_load1_noabort+0x20/0x30 [ 21.347264] kasan_stack_oob+0x238/0x270 [ 21.347338] kunit_try_run_case+0x170/0x3f0 [ 21.347396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347458] kthread+0x328/0x630 [ 21.347514] ret_from_fork+0x10/0x20 [ 21.347575] [ 21.347647] The buggy address belongs to stack of task kunit_try_catch/249 [ 21.347780] and is located at offset 138 in frame: [ 21.347851] kasan_stack_oob+0x0/0x270 [ 21.348150] [ 21.348218] This frame has 4 objects: [ 21.348427] [48, 49) '__assertion' [ 21.348482] [64, 72) 'array' [ 21.348522] [96, 112) '__assertion' [ 21.348574] [128, 138) 'stack_array' [ 21.348627] [ 21.348673] The buggy address belongs to the virtual mapping at [ 21.348673] [ffff8000809d0000, ffff8000809d9000) created by: [ 21.348673] kernel_clone+0x150/0x7a8 [ 21.348765] [ 21.348802] The buggy address belongs to the physical page: [ 21.348892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 21.348961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.349055] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.349116] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.349183] page dumped because: kasan: bad access detected [ 21.349273] [ 21.349302] Memory state around the buggy address: [ 21.349343] ffff8000809d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.349397] ffff8000809d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 21.349449] >ffff8000809d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 21.349519] ^ [ 21.349575] ffff8000809d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 21.349647] ffff8000809d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 21.349701] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 21.454928] ================================================================== [ 21.454986] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 21.455048] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259 [ 21.455105] [ 21.455148] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.455246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.455282] Hardware name: linux,dummy-virt (DT) [ 21.455319] Call trace: [ 21.455349] show_stack+0x20/0x38 (C) [ 21.455413] dump_stack_lvl+0x8c/0xd0 [ 21.455467] print_report+0x118/0x608 [ 21.455539] kasan_report+0xdc/0x128 [ 21.455595] __asan_report_load1_noabort+0x20/0x30 [ 21.455666] strlen+0xa8/0xb0 [ 21.455720] kasan_strings+0x418/0xb00 [ 21.455773] kunit_try_run_case+0x170/0x3f0 [ 21.455826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.455884] kthread+0x328/0x630 [ 21.457716] ret_from_fork+0x10/0x20 [ 21.457830] [ 21.457859] Allocated by task 259: [ 21.457898] kasan_save_stack+0x3c/0x68 [ 21.457951] kasan_save_track+0x20/0x40 [ 21.458013] kasan_save_alloc_info+0x40/0x58 [ 21.458065] __kasan_kmalloc+0xd4/0xd8 [ 21.458107] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.458154] kasan_strings+0xc8/0xb00 [ 21.458196] kunit_try_run_case+0x170/0x3f0 [ 21.458242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.458291] kthread+0x328/0x630 [ 21.458336] ret_from_fork+0x10/0x20 [ 21.458381] [ 21.458405] Freed by task 259: [ 21.458438] kasan_save_stack+0x3c/0x68 [ 21.458627] kasan_save_track+0x20/0x40 [ 21.458861] kasan_save_free_info+0x4c/0x78 [ 21.458918] __kasan_slab_free+0x6c/0x98 [ 21.458964] kfree+0x214/0x3c8 [ 21.459024] kasan_strings+0x24c/0xb00 [ 21.459067] kunit_try_run_case+0x170/0x3f0 [ 21.459111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.459162] kthread+0x328/0x630 [ 21.459809] ret_from_fork+0x10/0x20 [ 21.460397] [ 21.460541] The buggy address belongs to the object at fff00000c7794c80 [ 21.460541] which belongs to the cache kmalloc-32 of size 32 [ 21.460694] The buggy address is located 16 bytes inside of [ 21.460694] freed 32-byte region [fff00000c7794c80, fff00000c7794ca0) [ 21.460768] [ 21.460796] The buggy address belongs to the physical page: [ 21.460834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 21.460898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.460958] page_type: f5(slab) [ 21.461025] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.461443] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.461510] page dumped because: kasan: bad access detected [ 21.461554] [ 21.461578] Memory state around the buggy address: [ 21.461682] fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.461771] fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.462032] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.462093] ^ [ 21.462230] fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.462495] fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.462573] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 21.450679] ================================================================== [ 21.450758] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 21.450832] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259 [ 21.451301] [ 21.451360] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.451457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.451490] Hardware name: linux,dummy-virt (DT) [ 21.451525] Call trace: [ 21.451553] show_stack+0x20/0x38 (C) [ 21.451612] dump_stack_lvl+0x8c/0xd0 [ 21.451664] print_report+0x118/0x608 [ 21.451712] kasan_report+0xdc/0x128 [ 21.451761] __asan_report_load1_noabort+0x20/0x30 [ 21.451813] kasan_strings+0x95c/0xb00 [ 21.451860] kunit_try_run_case+0x170/0x3f0 [ 21.451910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.451967] kthread+0x328/0x630 [ 21.452042] ret_from_fork+0x10/0x20 [ 21.452098] [ 21.452123] Allocated by task 259: [ 21.452156] kasan_save_stack+0x3c/0x68 [ 21.452209] kasan_save_track+0x20/0x40 [ 21.452255] kasan_save_alloc_info+0x40/0x58 [ 21.452303] __kasan_kmalloc+0xd4/0xd8 [ 21.452348] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.452393] kasan_strings+0xc8/0xb00 [ 21.452434] kunit_try_run_case+0x170/0x3f0 [ 21.452478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.452526] kthread+0x328/0x630 [ 21.452570] ret_from_fork+0x10/0x20 [ 21.452611] [ 21.452635] Freed by task 259: [ 21.452668] kasan_save_stack+0x3c/0x68 [ 21.452711] kasan_save_track+0x20/0x40 [ 21.452755] kasan_save_free_info+0x4c/0x78 [ 21.452799] __kasan_slab_free+0x6c/0x98 [ 21.452842] kfree+0x214/0x3c8 [ 21.452880] kasan_strings+0x24c/0xb00 [ 21.452921] kunit_try_run_case+0x170/0x3f0 [ 21.452965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.453676] kthread+0x328/0x630 [ 21.453754] ret_from_fork+0x10/0x20 [ 21.453801] [ 21.453854] The buggy address belongs to the object at fff00000c7794c80 [ 21.453854] which belongs to the cache kmalloc-32 of size 32 [ 21.453932] The buggy address is located 16 bytes inside of [ 21.453932] freed 32-byte region [fff00000c7794c80, fff00000c7794ca0) [ 21.454015] [ 21.454045] The buggy address belongs to the physical page: [ 21.454087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 21.454151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.454208] page_type: f5(slab) [ 21.454259] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.454321] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.454371] page dumped because: kasan: bad access detected [ 21.454410] [ 21.454433] Memory state around the buggy address: [ 21.454489] fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.454544] fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.454595] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.454640] ^ [ 21.454677] fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.454728] fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.454770] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 21.444366] ================================================================== [ 21.444430] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 21.444509] Read of size 1 at addr fff00000c7794c90 by task kunit_try_catch/259 [ 21.444566] [ 21.444619] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.444721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.444754] Hardware name: linux,dummy-virt (DT) [ 21.444796] Call trace: [ 21.444827] show_stack+0x20/0x38 (C) [ 21.444890] dump_stack_lvl+0x8c/0xd0 [ 21.444941] print_report+0x118/0x608 [ 21.445011] kasan_report+0xdc/0x128 [ 21.445065] __asan_report_load1_noabort+0x20/0x30 [ 21.445120] strcmp+0xc0/0xc8 [ 21.445166] kasan_strings+0x340/0xb00 [ 21.445215] kunit_try_run_case+0x170/0x3f0 [ 21.445268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.445326] kthread+0x328/0x630 [ 21.445837] ret_from_fork+0x10/0x20 [ 21.445940] [ 21.445984] Allocated by task 259: [ 21.446024] kasan_save_stack+0x3c/0x68 [ 21.446079] kasan_save_track+0x20/0x40 [ 21.446127] kasan_save_alloc_info+0x40/0x58 [ 21.446177] __kasan_kmalloc+0xd4/0xd8 [ 21.446222] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.446269] kasan_strings+0xc8/0xb00 [ 21.446689] kunit_try_run_case+0x170/0x3f0 [ 21.446812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.446902] kthread+0x328/0x630 [ 21.446944] ret_from_fork+0x10/0x20 [ 21.447011] [ 21.447038] Freed by task 259: [ 21.447104] kasan_save_stack+0x3c/0x68 [ 21.447170] kasan_save_track+0x20/0x40 [ 21.447265] kasan_save_free_info+0x4c/0x78 [ 21.447306] __kasan_slab_free+0x6c/0x98 [ 21.447348] kfree+0x214/0x3c8 [ 21.447382] kasan_strings+0x24c/0xb00 [ 21.447422] kunit_try_run_case+0x170/0x3f0 [ 21.447460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.447517] kthread+0x328/0x630 [ 21.447627] ret_from_fork+0x10/0x20 [ 21.447672] [ 21.447732] The buggy address belongs to the object at fff00000c7794c80 [ 21.447732] which belongs to the cache kmalloc-32 of size 32 [ 21.447817] The buggy address is located 16 bytes inside of [ 21.447817] freed 32-byte region [fff00000c7794c80, fff00000c7794ca0) [ 21.447944] [ 21.447992] The buggy address belongs to the physical page: [ 21.448106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 21.448177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.448263] page_type: f5(slab) [ 21.448386] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.448451] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.448521] page dumped because: kasan: bad access detected [ 21.448604] [ 21.448659] Memory state around the buggy address: [ 21.448711] fff00000c7794b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.448809] fff00000c7794c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.448912] >fff00000c7794c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.449527] ^ [ 21.449671] fff00000c7794d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.449896] fff00000c7794d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.449950] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 21.424940] ================================================================== [ 21.425063] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 21.425200] Read of size 1 at addr fff00000c7794ad8 by task kunit_try_catch/257 [ 21.425278] [ 21.425339] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.425454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.425745] Hardware name: linux,dummy-virt (DT) [ 21.425952] Call trace: [ 21.426064] show_stack+0x20/0x38 (C) [ 21.426508] dump_stack_lvl+0x8c/0xd0 [ 21.426842] print_report+0x118/0x608 [ 21.427112] kasan_report+0xdc/0x128 [ 21.427237] __asan_report_load1_noabort+0x20/0x30 [ 21.427343] memcmp+0x198/0x1d8 [ 21.427396] kasan_memcmp+0x16c/0x300 [ 21.427473] kunit_try_run_case+0x170/0x3f0 [ 21.427531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.427618] kthread+0x328/0x630 [ 21.427674] ret_from_fork+0x10/0x20 [ 21.427731] [ 21.427940] Allocated by task 257: [ 21.427988] kasan_save_stack+0x3c/0x68 [ 21.428144] kasan_save_track+0x20/0x40 [ 21.428214] kasan_save_alloc_info+0x40/0x58 [ 21.428281] __kasan_kmalloc+0xd4/0xd8 [ 21.428321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.428367] kasan_memcmp+0xbc/0x300 [ 21.428406] kunit_try_run_case+0x170/0x3f0 [ 21.428449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.428494] kthread+0x328/0x630 [ 21.428535] ret_from_fork+0x10/0x20 [ 21.428575] [ 21.428737] The buggy address belongs to the object at fff00000c7794ac0 [ 21.428737] which belongs to the cache kmalloc-32 of size 32 [ 21.428894] The buggy address is located 0 bytes to the right of [ 21.428894] allocated 24-byte region [fff00000c7794ac0, fff00000c7794ad8) [ 21.428998] [ 21.429055] The buggy address belongs to the physical page: [ 21.429345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 21.429423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.429501] page_type: f5(slab) [ 21.429561] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.429638] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.429692] page dumped because: kasan: bad access detected [ 21.429732] [ 21.429769] Memory state around the buggy address: [ 21.429840] fff00000c7794980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.429897] fff00000c7794a00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 21.429951] >fff00000c7794a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.430007] ^ [ 21.430057] fff00000c7794b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.430109] fff00000c7794b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.430156] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 21.293414] ================================================================== [ 21.293529] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 21.294052] Read of size 1 at addr ffff99d6cad2e60d by task kunit_try_catch/245 [ 21.294258] [ 21.294341] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.294444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.294853] Hardware name: linux,dummy-virt (DT) [ 21.294894] Call trace: [ 21.294925] show_stack+0x20/0x38 (C) [ 21.295153] dump_stack_lvl+0x8c/0xd0 [ 21.295222] print_report+0x310/0x608 [ 21.295279] kasan_report+0xdc/0x128 [ 21.295328] __asan_report_load1_noabort+0x20/0x30 [ 21.296015] kasan_global_oob_right+0x230/0x270 [ 21.296114] kunit_try_run_case+0x170/0x3f0 [ 21.296179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.296459] kthread+0x328/0x630 [ 21.296686] ret_from_fork+0x10/0x20 [ 21.296773] [ 21.297030] The buggy address belongs to the variable: [ 21.297193] global_array+0xd/0x40 [ 21.297535] [ 21.297669] The buggy address belongs to the virtual mapping at [ 21.297669] [ffff99d6c8ee0000, ffff99d6cade1000) created by: [ 21.297669] paging_init+0x66c/0x7d0 [ 21.297978] [ 21.298621] The buggy address belongs to the physical page: [ 21.298834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d2e [ 21.299032] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 21.299258] raw: 03fffe0000002000 ffffc1ffc01f4b88 ffffc1ffc01f4b88 0000000000000000 [ 21.299462] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.299521] page dumped because: kasan: bad access detected [ 21.299564] [ 21.299734] Memory state around the buggy address: [ 21.299784] ffff99d6cad2e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.299850] ffff99d6cad2e580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 21.300126] >ffff99d6cad2e600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 21.300301] ^ [ 21.300355] ffff99d6cad2e680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 21.300409] ffff99d6cad2e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.300451] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 21.245762] ================================================================== [ 21.245870] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.245963] Free of addr fff00000c6620701 by task kunit_try_catch/241 [ 21.246930] [ 21.247063] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.247232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.247640] Hardware name: linux,dummy-virt (DT) [ 21.247996] Call trace: [ 21.248050] show_stack+0x20/0x38 (C) [ 21.248439] dump_stack_lvl+0x8c/0xd0 [ 21.248522] print_report+0x118/0x608 [ 21.248874] kasan_report_invalid_free+0xc0/0xe8 [ 21.248945] check_slab_allocation+0xfc/0x108 [ 21.249023] __kasan_mempool_poison_object+0x78/0x150 [ 21.249085] mempool_free+0x28c/0x328 [ 21.249148] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.249212] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.249733] kunit_try_run_case+0x170/0x3f0 [ 21.250150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.250319] kthread+0x328/0x630 [ 21.250383] ret_from_fork+0x10/0x20 [ 21.250959] [ 21.251030] Allocated by task 241: [ 21.251081] kasan_save_stack+0x3c/0x68 [ 21.251148] kasan_save_track+0x20/0x40 [ 21.251191] kasan_save_alloc_info+0x40/0x58 [ 21.251235] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.251283] remove_element+0x130/0x1f8 [ 21.251376] mempool_alloc_preallocated+0x58/0xc0 [ 21.251431] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 21.251478] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.251749] kunit_try_run_case+0x170/0x3f0 [ 21.251802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.251847] kthread+0x328/0x630 [ 21.252342] ret_from_fork+0x10/0x20 [ 21.252680] [ 21.252710] The buggy address belongs to the object at fff00000c6620700 [ 21.252710] which belongs to the cache kmalloc-128 of size 128 [ 21.253164] The buggy address is located 1 bytes inside of [ 21.253164] 128-byte region [fff00000c6620700, fff00000c6620780) [ 21.253534] [ 21.253620] The buggy address belongs to the physical page: [ 21.253992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 21.254092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.254158] page_type: f5(slab) [ 21.254373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.254556] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.254609] page dumped because: kasan: bad access detected [ 21.254647] [ 21.254668] Memory state around the buggy address: [ 21.254710] fff00000c6620600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.254763] fff00000c6620680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.255114] >fff00000c6620700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.255174] ^ [ 21.255380] fff00000c6620780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.255544] fff00000c6620800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.255594] ================================================================== [ 21.274514] ================================================================== [ 21.274628] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.274731] Free of addr fff00000c78b8001 by task kunit_try_catch/243 [ 21.275204] [ 21.275301] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.275452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.275490] Hardware name: linux,dummy-virt (DT) [ 21.275529] Call trace: [ 21.275576] show_stack+0x20/0x38 (C) [ 21.275927] dump_stack_lvl+0x8c/0xd0 [ 21.276010] print_report+0x118/0x608 [ 21.276230] kasan_report_invalid_free+0xc0/0xe8 [ 21.276303] __kasan_mempool_poison_object+0xfc/0x150 [ 21.276378] mempool_free+0x28c/0x328 [ 21.276437] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.276496] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 21.276876] kunit_try_run_case+0x170/0x3f0 [ 21.277244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.277590] kthread+0x328/0x630 [ 21.277724] ret_from_fork+0x10/0x20 [ 21.277857] [ 21.278045] The buggy address belongs to the physical page: [ 21.278143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8 [ 21.278225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.278390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.278463] page_type: f8(unknown) [ 21.278770] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.278845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.279053] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.279166] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.279467] head: 0bfffe0000000002 ffffc1ffc31e2e01 00000000ffffffff 00000000ffffffff [ 21.279537] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.279585] page dumped because: kasan: bad access detected [ 21.279903] [ 21.279932] Memory state around the buggy address: [ 21.279994] fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.280055] fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.280145] >fff00000c78b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.280202] ^ [ 21.280399] fff00000c78b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.280459] fff00000c78b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.280506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 21.217209] ================================================================== [ 21.217296] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.217435] Free of addr fff00000c78b8000 by task kunit_try_catch/237 [ 21.217487] [ 21.217535] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.217654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.217687] Hardware name: linux,dummy-virt (DT) [ 21.217726] Call trace: [ 21.217756] show_stack+0x20/0x38 (C) [ 21.217831] dump_stack_lvl+0x8c/0xd0 [ 21.217918] print_report+0x118/0x608 [ 21.218361] kasan_report_invalid_free+0xc0/0xe8 [ 21.218429] __kasan_mempool_poison_object+0x14c/0x150 [ 21.218635] mempool_free+0x28c/0x328 [ 21.218792] mempool_double_free_helper+0x150/0x2e8 [ 21.218880] mempool_kmalloc_large_double_free+0xc0/0x118 [ 21.218944] kunit_try_run_case+0x170/0x3f0 [ 21.219015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.219245] kthread+0x328/0x630 [ 21.219305] ret_from_fork+0x10/0x20 [ 21.219545] [ 21.219587] The buggy address belongs to the physical page: [ 21.219629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8 [ 21.219694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.219750] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.219817] page_type: f8(unknown) [ 21.220131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.220199] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.220285] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.220385] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.220449] head: 0bfffe0000000002 ffffc1ffc31e2e01 00000000ffffffff 00000000ffffffff [ 21.220556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.220607] page dumped because: kasan: bad access detected [ 21.220646] [ 21.220666] Memory state around the buggy address: [ 21.220708] fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.220756] fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.220804] >fff00000c78b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.220845] ^ [ 21.220928] fff00000c78b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.220990] fff00000c78b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.221035] ================================================================== [ 21.231735] ================================================================== [ 21.231829] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.231924] Free of addr fff00000c78b8000 by task kunit_try_catch/239 [ 21.231987] [ 21.232040] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.232139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.232171] Hardware name: linux,dummy-virt (DT) [ 21.232213] Call trace: [ 21.232241] show_stack+0x20/0x38 (C) [ 21.232303] dump_stack_lvl+0x8c/0xd0 [ 21.232356] print_report+0x118/0x608 [ 21.232410] kasan_report_invalid_free+0xc0/0xe8 [ 21.232463] __kasan_mempool_poison_pages+0xe0/0xe8 [ 21.232520] mempool_free+0x24c/0x328 [ 21.232574] mempool_double_free_helper+0x150/0x2e8 [ 21.232628] mempool_page_alloc_double_free+0xbc/0x118 [ 21.232685] kunit_try_run_case+0x170/0x3f0 [ 21.232739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.232795] kthread+0x328/0x630 [ 21.232847] ret_from_fork+0x10/0x20 [ 21.232901] [ 21.232927] The buggy address belongs to the physical page: [ 21.232963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8 [ 21.233119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.233241] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.233309] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.233376] page dumped because: kasan: bad access detected [ 21.233422] [ 21.233442] Memory state around the buggy address: [ 21.233481] fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.233529] fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.233599] >fff00000c78b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.233652] ^ [ 21.233688] fff00000c78b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.233749] fff00000c78b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.233837] ================================================================== [ 21.201855] ================================================================== [ 21.201952] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.202056] Free of addr fff00000c6620300 by task kunit_try_catch/235 [ 21.202106] [ 21.202157] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.202256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.202286] Hardware name: linux,dummy-virt (DT) [ 21.202326] Call trace: [ 21.202354] show_stack+0x20/0x38 (C) [ 21.203219] dump_stack_lvl+0x8c/0xd0 [ 21.203303] print_report+0x118/0x608 [ 21.203431] kasan_report_invalid_free+0xc0/0xe8 [ 21.203572] check_slab_allocation+0xd4/0x108 [ 21.203884] __kasan_mempool_poison_object+0x78/0x150 [ 21.203958] mempool_free+0x28c/0x328 [ 21.204282] mempool_double_free_helper+0x150/0x2e8 [ 21.204339] mempool_kmalloc_double_free+0xc0/0x118 [ 21.204853] kunit_try_run_case+0x170/0x3f0 [ 21.204950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.205085] kthread+0x328/0x630 [ 21.205164] ret_from_fork+0x10/0x20 [ 21.205221] [ 21.205263] Allocated by task 235: [ 21.205357] kasan_save_stack+0x3c/0x68 [ 21.205474] kasan_save_track+0x20/0x40 [ 21.205530] kasan_save_alloc_info+0x40/0x58 [ 21.205614] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.205871] remove_element+0x130/0x1f8 [ 21.205998] mempool_alloc_preallocated+0x58/0xc0 [ 21.206300] mempool_double_free_helper+0x94/0x2e8 [ 21.206359] mempool_kmalloc_double_free+0xc0/0x118 [ 21.206444] kunit_try_run_case+0x170/0x3f0 [ 21.206511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.206561] kthread+0x328/0x630 [ 21.206602] ret_from_fork+0x10/0x20 [ 21.206662] [ 21.206686] Freed by task 235: [ 21.206718] kasan_save_stack+0x3c/0x68 [ 21.206799] kasan_save_track+0x20/0x40 [ 21.206838] kasan_save_free_info+0x4c/0x78 [ 21.206884] __kasan_mempool_poison_object+0xc0/0x150 [ 21.206930] mempool_free+0x28c/0x328 [ 21.206980] mempool_double_free_helper+0x100/0x2e8 [ 21.207032] mempool_kmalloc_double_free+0xc0/0x118 [ 21.207355] kunit_try_run_case+0x170/0x3f0 [ 21.207427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.207498] kthread+0x328/0x630 [ 21.207543] ret_from_fork+0x10/0x20 [ 21.207586] [ 21.207609] The buggy address belongs to the object at fff00000c6620300 [ 21.207609] which belongs to the cache kmalloc-128 of size 128 [ 21.207675] The buggy address is located 0 bytes inside of [ 21.207675] 128-byte region [fff00000c6620300, fff00000c6620380) [ 21.207743] [ 21.207769] The buggy address belongs to the physical page: [ 21.207808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 21.207873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.207932] page_type: f5(slab) [ 21.207991] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.208394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.208458] page dumped because: kasan: bad access detected [ 21.208506] [ 21.208531] Memory state around the buggy address: [ 21.208794] fff00000c6620200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.209135] fff00000c6620280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209241] >fff00000c6620300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.209450] ^ [ 21.209496] fff00000c6620380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209661] fff00000c6620400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.209717] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 21.121378] ================================================================== [ 21.122260] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.122400] Read of size 1 at addr fff00000c78b4000 by task kunit_try_catch/229 [ 21.122941] [ 21.123050] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.123288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.123379] Hardware name: linux,dummy-virt (DT) [ 21.123444] Call trace: [ 21.123676] show_stack+0x20/0x38 (C) [ 21.124040] dump_stack_lvl+0x8c/0xd0 [ 21.124297] print_report+0x118/0x608 [ 21.124523] kasan_report+0xdc/0x128 [ 21.124617] __asan_report_load1_noabort+0x20/0x30 [ 21.125027] mempool_uaf_helper+0x314/0x340 [ 21.125126] mempool_kmalloc_large_uaf+0xc4/0x120 [ 21.125201] kunit_try_run_case+0x170/0x3f0 [ 21.125264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.125322] kthread+0x328/0x630 [ 21.125374] ret_from_fork+0x10/0x20 [ 21.125694] [ 21.126195] The buggy address belongs to the physical page: [ 21.126247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4 [ 21.126317] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.126369] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.126706] page_type: f8(unknown) [ 21.126773] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.126842] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.126902] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.127328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.127688] head: 0bfffe0000000002 ffffc1ffc31e2d01 00000000ffffffff 00000000ffffffff [ 21.127771] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.127820] page dumped because: kasan: bad access detected [ 21.127863] [ 21.128193] Memory state around the buggy address: [ 21.128408] fff00000c78b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.128608] fff00000c78b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.128664] >fff00000c78b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.128904] ^ [ 21.129081] fff00000c78b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.129137] fff00000c78b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.129182] ================================================================== [ 21.182145] ================================================================== [ 21.182388] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.182773] Read of size 1 at addr fff00000c78b4000 by task kunit_try_catch/233 [ 21.183013] [ 21.183083] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.183203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.183235] Hardware name: linux,dummy-virt (DT) [ 21.183276] Call trace: [ 21.183309] show_stack+0x20/0x38 (C) [ 21.183534] dump_stack_lvl+0x8c/0xd0 [ 21.183739] print_report+0x118/0x608 [ 21.184080] kasan_report+0xdc/0x128 [ 21.184264] __asan_report_load1_noabort+0x20/0x30 [ 21.184553] mempool_uaf_helper+0x314/0x340 [ 21.184694] mempool_page_alloc_uaf+0xc0/0x118 [ 21.184888] kunit_try_run_case+0x170/0x3f0 [ 21.185135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185218] kthread+0x328/0x630 [ 21.185283] ret_from_fork+0x10/0x20 [ 21.185784] [ 21.185834] The buggy address belongs to the physical page: [ 21.185943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4 [ 21.186181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.186399] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.186639] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.186748] page dumped because: kasan: bad access detected [ 21.186933] [ 21.187042] Memory state around the buggy address: [ 21.187086] fff00000c78b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.187150] fff00000c78b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.187330] >fff00000c78b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.187391] ^ [ 21.187431] fff00000c78b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.187577] fff00000c78b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.187781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 21.098347] ================================================================== [ 21.098966] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.099289] Read of size 1 at addr fff00000c4065f00 by task kunit_try_catch/227 [ 21.099357] [ 21.099566] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.099781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.099855] Hardware name: linux,dummy-virt (DT) [ 21.099908] Call trace: [ 21.099984] show_stack+0x20/0x38 (C) [ 21.100111] dump_stack_lvl+0x8c/0xd0 [ 21.100191] print_report+0x118/0x608 [ 21.100245] kasan_report+0xdc/0x128 [ 21.100296] __asan_report_load1_noabort+0x20/0x30 [ 21.100354] mempool_uaf_helper+0x314/0x340 [ 21.100561] mempool_kmalloc_uaf+0xc4/0x120 [ 21.100675] kunit_try_run_case+0x170/0x3f0 [ 21.100929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.101001] kthread+0x328/0x630 [ 21.101310] ret_from_fork+0x10/0x20 [ 21.101586] [ 21.101646] Allocated by task 227: [ 21.101691] kasan_save_stack+0x3c/0x68 [ 21.101760] kasan_save_track+0x20/0x40 [ 21.101881] kasan_save_alloc_info+0x40/0x58 [ 21.101936] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.102003] remove_element+0x130/0x1f8 [ 21.102100] mempool_alloc_preallocated+0x58/0xc0 [ 21.102190] mempool_uaf_helper+0xa4/0x340 [ 21.102264] mempool_kmalloc_uaf+0xc4/0x120 [ 21.102335] kunit_try_run_case+0x170/0x3f0 [ 21.102413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.102500] kthread+0x328/0x630 [ 21.102567] ret_from_fork+0x10/0x20 [ 21.102634] [ 21.102678] Freed by task 227: [ 21.102750] kasan_save_stack+0x3c/0x68 [ 21.102797] kasan_save_track+0x20/0x40 [ 21.102840] kasan_save_free_info+0x4c/0x78 [ 21.102886] __kasan_mempool_poison_object+0xc0/0x150 [ 21.102983] mempool_free+0x28c/0x328 [ 21.103092] mempool_uaf_helper+0x104/0x340 [ 21.103142] mempool_kmalloc_uaf+0xc4/0x120 [ 21.103182] kunit_try_run_case+0x170/0x3f0 [ 21.103235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.103321] kthread+0x328/0x630 [ 21.103371] ret_from_fork+0x10/0x20 [ 21.103419] [ 21.103479] The buggy address belongs to the object at fff00000c4065f00 [ 21.103479] which belongs to the cache kmalloc-128 of size 128 [ 21.103551] The buggy address is located 0 bytes inside of [ 21.103551] freed 128-byte region [fff00000c4065f00, fff00000c4065f80) [ 21.103619] [ 21.103645] The buggy address belongs to the physical page: [ 21.103684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 21.103760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.103878] page_type: f5(slab) [ 21.103931] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.103995] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 21.104040] page dumped because: kasan: bad access detected [ 21.104073] [ 21.104638] Memory state around the buggy address: [ 21.104809] fff00000c4065e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.104873] fff00000c4065e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104926] >fff00000c4065f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.105235] ^ [ 21.105327] fff00000c4065f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.105388] fff00000c4066000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.105455] ================================================================== [ 21.144481] ================================================================== [ 21.144586] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.144752] Read of size 1 at addr fff00000c661e240 by task kunit_try_catch/231 [ 21.144836] [ 21.144891] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.145213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.145253] Hardware name: linux,dummy-virt (DT) [ 21.145548] Call trace: [ 21.145594] show_stack+0x20/0x38 (C) [ 21.145664] dump_stack_lvl+0x8c/0xd0 [ 21.145778] print_report+0x118/0x608 [ 21.145866] kasan_report+0xdc/0x128 [ 21.145920] __asan_report_load1_noabort+0x20/0x30 [ 21.145991] mempool_uaf_helper+0x314/0x340 [ 21.146049] mempool_slab_uaf+0xc0/0x118 [ 21.146112] kunit_try_run_case+0x170/0x3f0 [ 21.146176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.146490] kthread+0x328/0x630 [ 21.146573] ret_from_fork+0x10/0x20 [ 21.146634] [ 21.146659] Allocated by task 231: [ 21.146697] kasan_save_stack+0x3c/0x68 [ 21.147292] kasan_save_track+0x20/0x40 [ 21.147718] kasan_save_alloc_info+0x40/0x58 [ 21.147794] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.147867] remove_element+0x16c/0x1f8 [ 21.147922] mempool_alloc_preallocated+0x58/0xc0 [ 21.147979] mempool_uaf_helper+0xa4/0x340 [ 21.148027] mempool_slab_uaf+0xc0/0x118 [ 21.148070] kunit_try_run_case+0x170/0x3f0 [ 21.148112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.148161] kthread+0x328/0x630 [ 21.148203] ret_from_fork+0x10/0x20 [ 21.148245] [ 21.148270] Freed by task 231: [ 21.148307] kasan_save_stack+0x3c/0x68 [ 21.148352] kasan_save_track+0x20/0x40 [ 21.148392] kasan_save_free_info+0x4c/0x78 [ 21.148436] __kasan_mempool_poison_object+0xc0/0x150 [ 21.148483] mempool_free+0x28c/0x328 [ 21.149034] mempool_uaf_helper+0x104/0x340 [ 21.149189] mempool_slab_uaf+0xc0/0x118 [ 21.149242] kunit_try_run_case+0x170/0x3f0 [ 21.149304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.149674] kthread+0x328/0x630 [ 21.149734] ret_from_fork+0x10/0x20 [ 21.149849] [ 21.149883] The buggy address belongs to the object at fff00000c661e240 [ 21.149883] which belongs to the cache test_cache of size 123 [ 21.150001] The buggy address is located 0 bytes inside of [ 21.150001] freed 123-byte region [fff00000c661e240, fff00000c661e2bb) [ 21.150075] [ 21.150103] The buggy address belongs to the physical page: [ 21.150452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10661e [ 21.150549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.150615] page_type: f5(slab) [ 21.150806] raw: 0bfffe0000000000 fff00000c6617640 dead000000000122 0000000000000000 [ 21.151060] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.151107] page dumped because: kasan: bad access detected [ 21.151144] [ 21.151167] Memory state around the buggy address: [ 21.151207] fff00000c661e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.151747] fff00000c661e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.151812] >fff00000c661e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 21.151857] ^ [ 21.151900] fff00000c661e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.151955] fff00000c661e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.152073] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 21.014666] ================================================================== [ 21.014872] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.015014] Read of size 1 at addr fff00000c4065b73 by task kunit_try_catch/221 [ 21.015076] [ 21.015130] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.015234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.015265] Hardware name: linux,dummy-virt (DT) [ 21.015305] Call trace: [ 21.015333] show_stack+0x20/0x38 (C) [ 21.015392] dump_stack_lvl+0x8c/0xd0 [ 21.015446] print_report+0x118/0x608 [ 21.015500] kasan_report+0xdc/0x128 [ 21.015549] __asan_report_load1_noabort+0x20/0x30 [ 21.015605] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.015678] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.015734] kunit_try_run_case+0x170/0x3f0 [ 21.015788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.015843] kthread+0x328/0x630 [ 21.015891] ret_from_fork+0x10/0x20 [ 21.015945] [ 21.015967] Allocated by task 221: [ 21.016021] kasan_save_stack+0x3c/0x68 [ 21.016071] kasan_save_track+0x20/0x40 [ 21.016111] kasan_save_alloc_info+0x40/0x58 [ 21.016156] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.016204] remove_element+0x130/0x1f8 [ 21.016249] mempool_alloc_preallocated+0x58/0xc0 [ 21.016297] mempool_oob_right_helper+0x98/0x2f0 [ 21.016335] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.016379] kunit_try_run_case+0x170/0x3f0 [ 21.016419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.016467] kthread+0x328/0x630 [ 21.016506] ret_from_fork+0x10/0x20 [ 21.016548] [ 21.016571] The buggy address belongs to the object at fff00000c4065b00 [ 21.016571] which belongs to the cache kmalloc-128 of size 128 [ 21.016635] The buggy address is located 0 bytes to the right of [ 21.016635] allocated 115-byte region [fff00000c4065b00, fff00000c4065b73) [ 21.016703] [ 21.016728] The buggy address belongs to the physical page: [ 21.016766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 21.016829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.016888] page_type: f5(slab) [ 21.016937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.017006] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.017056] page dumped because: kasan: bad access detected [ 21.017105] [ 21.017132] Memory state around the buggy address: [ 21.017173] fff00000c4065a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.017223] fff00000c4065a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.017272] >fff00000c4065b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.017314] ^ [ 21.017359] fff00000c4065b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.017406] fff00000c4065c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.017448] ================================================================== [ 21.028681] ================================================================== [ 21.028776] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.028865] Read of size 1 at addr fff00000c78b2001 by task kunit_try_catch/223 [ 21.028926] [ 21.028990] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.029096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.029128] Hardware name: linux,dummy-virt (DT) [ 21.029165] Call trace: [ 21.029199] show_stack+0x20/0x38 (C) [ 21.029261] dump_stack_lvl+0x8c/0xd0 [ 21.029315] print_report+0x118/0x608 [ 21.029370] kasan_report+0xdc/0x128 [ 21.029421] __asan_report_load1_noabort+0x20/0x30 [ 21.029479] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.029532] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.029589] kunit_try_run_case+0x170/0x3f0 [ 21.029644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.029701] kthread+0x328/0x630 [ 21.029754] ret_from_fork+0x10/0x20 [ 21.029816] [ 21.029848] The buggy address belongs to the physical page: [ 21.029890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 21.029954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.030563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.030827] page_type: f8(unknown) [ 21.030895] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.030954] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.031023] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.031080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.031133] head: 0bfffe0000000002 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff [ 21.031215] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.031303] page dumped because: kasan: bad access detected [ 21.031343] [ 21.031678] Memory state around the buggy address: [ 21.031881] fff00000c78b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.031941] fff00000c78b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.032005] >fff00000c78b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.032266] ^ [ 21.032715] fff00000c78b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.033037] fff00000c78b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.033275] ================================================================== [ 21.045106] ================================================================== [ 21.045523] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.045770] Read of size 1 at addr fff00000c66202bb by task kunit_try_catch/225 [ 21.045909] [ 21.046020] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.046169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.046231] Hardware name: linux,dummy-virt (DT) [ 21.046323] Call trace: [ 21.046359] show_stack+0x20/0x38 (C) [ 21.046508] dump_stack_lvl+0x8c/0xd0 [ 21.046570] print_report+0x118/0x608 [ 21.046627] kasan_report+0xdc/0x128 [ 21.046682] __asan_report_load1_noabort+0x20/0x30 [ 21.046738] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.046791] mempool_slab_oob_right+0xc0/0x118 [ 21.047364] kunit_try_run_case+0x170/0x3f0 [ 21.047439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.047503] kthread+0x328/0x630 [ 21.047621] ret_from_fork+0x10/0x20 [ 21.047842] [ 21.047899] Allocated by task 225: [ 21.048136] kasan_save_stack+0x3c/0x68 [ 21.048211] kasan_save_track+0x20/0x40 [ 21.048299] kasan_save_alloc_info+0x40/0x58 [ 21.048414] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.048506] remove_element+0x16c/0x1f8 [ 21.048557] mempool_alloc_preallocated+0x58/0xc0 [ 21.048605] mempool_oob_right_helper+0x98/0x2f0 [ 21.048701] mempool_slab_oob_right+0xc0/0x118 [ 21.048897] kunit_try_run_case+0x170/0x3f0 [ 21.049173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049511] kthread+0x328/0x630 [ 21.049671] ret_from_fork+0x10/0x20 [ 21.050254] [ 21.050359] The buggy address belongs to the object at fff00000c6620240 [ 21.050359] which belongs to the cache test_cache of size 123 [ 21.050481] The buggy address is located 0 bytes to the right of [ 21.050481] allocated 123-byte region [fff00000c6620240, fff00000c66202bb) [ 21.050615] [ 21.050771] The buggy address belongs to the physical page: [ 21.050884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 21.050982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.051165] page_type: f5(slab) [ 21.051322] raw: 0bfffe0000000000 fff00000c6617500 dead000000000122 0000000000000000 [ 21.051383] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.051453] page dumped because: kasan: bad access detected [ 21.051489] [ 21.051512] Memory state around the buggy address: [ 21.051551] fff00000c6620180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.051599] fff00000c6620200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.051645] >fff00000c6620280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.051687] ^ [ 21.051728] fff00000c6620300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.051774] fff00000c6620380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.051818] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 20.438017] ================================================================== [ 20.438224] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 20.438324] Read of size 1 at addr fff00000c6617140 by task kunit_try_catch/215 [ 20.438434] [ 20.438498] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 20.438838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.438922] Hardware name: linux,dummy-virt (DT) [ 20.438991] Call trace: [ 20.439047] show_stack+0x20/0x38 (C) [ 20.439235] dump_stack_lvl+0x8c/0xd0 [ 20.439704] print_report+0x118/0x608 [ 20.439868] kasan_report+0xdc/0x128 [ 20.439997] __kasan_check_byte+0x54/0x70 [ 20.440056] kmem_cache_destroy+0x34/0x218 [ 20.440157] kmem_cache_double_destroy+0x174/0x300 [ 20.440260] kunit_try_run_case+0x170/0x3f0 [ 20.440336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.440452] kthread+0x328/0x630 [ 20.440506] ret_from_fork+0x10/0x20 [ 20.440599] [ 20.440654] Allocated by task 215: [ 20.440730] kasan_save_stack+0x3c/0x68 [ 20.440806] kasan_save_track+0x20/0x40 [ 20.440862] kasan_save_alloc_info+0x40/0x58 [ 20.440955] __kasan_slab_alloc+0xa8/0xb0 [ 20.441012] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.441062] __kmem_cache_create_args+0x178/0x280 [ 20.441165] kmem_cache_double_destroy+0xc0/0x300 [ 20.441207] kunit_try_run_case+0x170/0x3f0 [ 20.441247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.441293] kthread+0x328/0x630 [ 20.441331] ret_from_fork+0x10/0x20 [ 20.441370] [ 20.441391] Freed by task 215: [ 20.441421] kasan_save_stack+0x3c/0x68 [ 20.441462] kasan_save_track+0x20/0x40 [ 20.441500] kasan_save_free_info+0x4c/0x78 [ 20.441541] __kasan_slab_free+0x6c/0x98 [ 20.441586] kmem_cache_free+0x260/0x470 [ 20.441667] slab_kmem_cache_release+0x38/0x50 [ 20.441710] kmem_cache_release+0x1c/0x30 [ 20.441749] kobject_put+0x17c/0x430 [ 20.441791] sysfs_slab_release+0x1c/0x30 [ 20.441847] kmem_cache_destroy+0x118/0x218 [ 20.441945] kmem_cache_double_destroy+0x128/0x300 [ 20.442042] kunit_try_run_case+0x170/0x3f0 [ 20.442084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.442881] kthread+0x328/0x630 [ 20.442942] ret_from_fork+0x10/0x20 [ 20.443002] [ 20.443031] The buggy address belongs to the object at fff00000c6617140 [ 20.443031] which belongs to the cache kmem_cache of size 208 [ 20.443100] The buggy address is located 0 bytes inside of [ 20.443100] freed 208-byte region [fff00000c6617140, fff00000c6617210) [ 20.443186] [ 20.443211] The buggy address belongs to the physical page: [ 20.443248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106617 [ 20.443552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.443702] page_type: f5(slab) [ 20.443878] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 20.444151] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 20.444206] page dumped because: kasan: bad access detected [ 20.444257] [ 20.444289] Memory state around the buggy address: [ 20.444347] fff00000c6617000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.444395] fff00000c6617080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 20.444733] >fff00000c6617100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 20.444787] ^ [ 20.444828] fff00000c6617180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.444875] fff00000c6617200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.444914] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 20.155367] ================================================================== [ 20.155489] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 20.155591] Read of size 1 at addr fff00000c408a000 by task kunit_try_catch/213 [ 20.155668] [ 20.155725] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 20.155916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.155991] Hardware name: linux,dummy-virt (DT) [ 20.156085] Call trace: [ 20.156145] show_stack+0x20/0x38 (C) [ 20.156228] dump_stack_lvl+0x8c/0xd0 [ 20.156331] print_report+0x118/0x608 [ 20.156432] kasan_report+0xdc/0x128 [ 20.156533] __asan_report_load1_noabort+0x20/0x30 [ 20.156644] kmem_cache_rcu_uaf+0x388/0x468 [ 20.156708] kunit_try_run_case+0x170/0x3f0 [ 20.156806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.156915] kthread+0x328/0x630 [ 20.157052] ret_from_fork+0x10/0x20 [ 20.157119] [ 20.157141] Allocated by task 213: [ 20.157177] kasan_save_stack+0x3c/0x68 [ 20.157227] kasan_save_track+0x20/0x40 [ 20.157270] kasan_save_alloc_info+0x40/0x58 [ 20.157314] __kasan_slab_alloc+0xa8/0xb0 [ 20.157509] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.157620] kmem_cache_rcu_uaf+0x12c/0x468 [ 20.157678] kunit_try_run_case+0x170/0x3f0 [ 20.157721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.157834] kthread+0x328/0x630 [ 20.157881] ret_from_fork+0x10/0x20 [ 20.157924] [ 20.157948] Freed by task 0: [ 20.157991] kasan_save_stack+0x3c/0x68 [ 20.158039] kasan_save_track+0x20/0x40 [ 20.158079] kasan_save_free_info+0x4c/0x78 [ 20.158124] __kasan_slab_free+0x6c/0x98 [ 20.158165] slab_free_after_rcu_debug+0xd4/0x2f8 [ 20.158210] rcu_core+0x9f4/0x1e20 [ 20.158252] rcu_core_si+0x18/0x30 [ 20.158293] handle_softirqs+0x374/0xb28 [ 20.158338] __do_softirq+0x1c/0x28 [ 20.158377] [ 20.158401] Last potentially related work creation: [ 20.158430] kasan_save_stack+0x3c/0x68 [ 20.158486] kasan_record_aux_stack+0xb4/0xc8 [ 20.158531] kmem_cache_free+0x120/0x470 [ 20.158604] kmem_cache_rcu_uaf+0x16c/0x468 [ 20.158703] kunit_try_run_case+0x170/0x3f0 [ 20.158778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.158828] kthread+0x328/0x630 [ 20.158870] ret_from_fork+0x10/0x20 [ 20.158911] [ 20.158933] The buggy address belongs to the object at fff00000c408a000 [ 20.158933] which belongs to the cache test_cache of size 200 [ 20.159012] The buggy address is located 0 bytes inside of [ 20.159012] freed 200-byte region [fff00000c408a000, fff00000c408a0c8) [ 20.159083] [ 20.159111] The buggy address belongs to the physical page: [ 20.159150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10408a [ 20.159219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.159281] page_type: f5(slab) [ 20.159377] raw: 0bfffe0000000000 fff00000c6617000 dead000000000122 0000000000000000 [ 20.159491] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.159591] page dumped because: kasan: bad access detected [ 20.159649] [ 20.159675] Memory state around the buggy address: [ 20.159718] fff00000c4089f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.159789] fff00000c4089f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.159840] >fff00000c408a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.159885] ^ [ 20.159919] fff00000c408a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.159977] fff00000c408a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.160027] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 20.049194] ================================================================== [ 20.049406] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 20.049545] Free of addr fff00000c6617001 by task kunit_try_catch/211 [ 20.049600] [ 20.049654] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 20.049759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.049790] Hardware name: linux,dummy-virt (DT) [ 20.049868] Call trace: [ 20.049899] show_stack+0x20/0x38 (C) [ 20.050007] dump_stack_lvl+0x8c/0xd0 [ 20.050070] print_report+0x118/0x608 [ 20.050179] kasan_report_invalid_free+0xc0/0xe8 [ 20.050293] check_slab_allocation+0xfc/0x108 [ 20.050349] __kasan_slab_pre_free+0x2c/0x48 [ 20.050442] kmem_cache_free+0xf0/0x470 [ 20.050538] kmem_cache_invalid_free+0x184/0x3c8 [ 20.050595] kunit_try_run_case+0x170/0x3f0 [ 20.050652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.050713] kthread+0x328/0x630 [ 20.050782] ret_from_fork+0x10/0x20 [ 20.050900] [ 20.051024] Allocated by task 211: [ 20.051063] kasan_save_stack+0x3c/0x68 [ 20.051272] kasan_save_track+0x20/0x40 [ 20.051327] kasan_save_alloc_info+0x40/0x58 [ 20.051596] __kasan_slab_alloc+0xa8/0xb0 [ 20.051659] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.051967] kmem_cache_invalid_free+0x12c/0x3c8 [ 20.052261] kunit_try_run_case+0x170/0x3f0 [ 20.052326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.052449] kthread+0x328/0x630 [ 20.052827] ret_from_fork+0x10/0x20 [ 20.052886] [ 20.052912] The buggy address belongs to the object at fff00000c6617000 [ 20.052912] which belongs to the cache test_cache of size 200 [ 20.052999] The buggy address is located 1 bytes inside of [ 20.052999] 200-byte region [fff00000c6617000, fff00000c66170c8) [ 20.053065] [ 20.053433] The buggy address belongs to the physical page: [ 20.053527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106617 [ 20.053745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.053907] page_type: f5(slab) [ 20.054296] raw: 0bfffe0000000000 fff00000c1806dc0 dead000000000122 0000000000000000 [ 20.054569] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.054634] page dumped because: kasan: bad access detected [ 20.054770] [ 20.054977] Memory state around the buggy address: [ 20.055033] fff00000c6616f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.055157] fff00000c6616f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.055296] >fff00000c6617000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.055511] ^ [ 20.055752] fff00000c6617080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.056004] fff00000c6617100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.056187] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 20.012392] ================================================================== [ 20.012496] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 20.012592] Free of addr fff00000c6616000 by task kunit_try_catch/209 [ 20.012643] [ 20.012696] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 20.012794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.012823] Hardware name: linux,dummy-virt (DT) [ 20.012874] Call trace: [ 20.012935] show_stack+0x20/0x38 (C) [ 20.013219] dump_stack_lvl+0x8c/0xd0 [ 20.013341] print_report+0x118/0x608 [ 20.014006] kasan_report_invalid_free+0xc0/0xe8 [ 20.014072] check_slab_allocation+0xd4/0x108 [ 20.014144] __kasan_slab_pre_free+0x2c/0x48 [ 20.014617] kmem_cache_free+0xf0/0x470 [ 20.014696] kmem_cache_double_free+0x190/0x3c8 [ 20.014932] kunit_try_run_case+0x170/0x3f0 [ 20.015058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.015123] kthread+0x328/0x630 [ 20.015179] ret_from_fork+0x10/0x20 [ 20.015237] [ 20.015260] Allocated by task 209: [ 20.015340] kasan_save_stack+0x3c/0x68 [ 20.015451] kasan_save_track+0x20/0x40 [ 20.015537] kasan_save_alloc_info+0x40/0x58 [ 20.015581] __kasan_slab_alloc+0xa8/0xb0 [ 20.015673] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.015719] kmem_cache_double_free+0x12c/0x3c8 [ 20.015761] kunit_try_run_case+0x170/0x3f0 [ 20.015803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.015851] kthread+0x328/0x630 [ 20.015890] ret_from_fork+0x10/0x20 [ 20.015931] [ 20.015990] Freed by task 209: [ 20.016026] kasan_save_stack+0x3c/0x68 [ 20.016071] kasan_save_track+0x20/0x40 [ 20.016112] kasan_save_free_info+0x4c/0x78 [ 20.016154] __kasan_slab_free+0x6c/0x98 [ 20.016195] kmem_cache_free+0x260/0x470 [ 20.016235] kmem_cache_double_free+0x140/0x3c8 [ 20.016278] kunit_try_run_case+0x170/0x3f0 [ 20.016317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.016362] kthread+0x328/0x630 [ 20.016402] ret_from_fork+0x10/0x20 [ 20.016443] [ 20.016465] The buggy address belongs to the object at fff00000c6616000 [ 20.016465] which belongs to the cache test_cache of size 200 [ 20.016533] The buggy address is located 0 bytes inside of [ 20.016533] 200-byte region [fff00000c6616000, fff00000c66160c8) [ 20.016599] [ 20.016624] The buggy address belongs to the physical page: [ 20.016663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106616 [ 20.016736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.016857] page_type: f5(slab) [ 20.016910] raw: 0bfffe0000000000 fff00000c1806c80 dead000000000122 0000000000000000 [ 20.016967] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.017027] page dumped because: kasan: bad access detected [ 20.017064] [ 20.017083] Memory state around the buggy address: [ 20.017125] fff00000c6615f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.017173] fff00000c6615f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.017223] >fff00000c6616000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.017267] ^ [ 20.017298] fff00000c6616080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.017375] fff00000c6616100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.017422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 19.754274] ================================================================== [ 19.754477] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 19.754618] Read of size 1 at addr fff00000c66140c8 by task kunit_try_catch/207 [ 19.754682] [ 19.754831] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.755003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.755072] Hardware name: linux,dummy-virt (DT) [ 19.755116] Call trace: [ 19.755146] show_stack+0x20/0x38 (C) [ 19.755214] dump_stack_lvl+0x8c/0xd0 [ 19.755268] print_report+0x118/0x608 [ 19.755455] kasan_report+0xdc/0x128 [ 19.755608] __asan_report_load1_noabort+0x20/0x30 [ 19.755836] kmem_cache_oob+0x344/0x430 [ 19.755928] kunit_try_run_case+0x170/0x3f0 [ 19.756004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.756181] kthread+0x328/0x630 [ 19.756288] ret_from_fork+0x10/0x20 [ 19.756354] [ 19.756376] Allocated by task 207: [ 19.756410] kasan_save_stack+0x3c/0x68 [ 19.756462] kasan_save_track+0x20/0x40 [ 19.756647] kasan_save_alloc_info+0x40/0x58 [ 19.756697] __kasan_slab_alloc+0xa8/0xb0 [ 19.756740] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.756789] kmem_cache_oob+0x12c/0x430 [ 19.756830] kunit_try_run_case+0x170/0x3f0 [ 19.756872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.756921] kthread+0x328/0x630 [ 19.757211] ret_from_fork+0x10/0x20 [ 19.757400] [ 19.757509] The buggy address belongs to the object at fff00000c6614000 [ 19.757509] which belongs to the cache test_cache of size 200 [ 19.757609] The buggy address is located 0 bytes to the right of [ 19.757609] allocated 200-byte region [fff00000c6614000, fff00000c66140c8) [ 19.757689] [ 19.757845] The buggy address belongs to the physical page: [ 19.757983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.758052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.758158] page_type: f5(slab) [ 19.758216] raw: 0bfffe0000000000 fff00000c1806b40 dead000000000122 0000000000000000 [ 19.758426] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.758649] page dumped because: kasan: bad access detected [ 19.758703] [ 19.758726] Memory state around the buggy address: [ 19.758782] fff00000c6613f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.758838] fff00000c6614000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.759294] >fff00000c6614080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.759688] ^ [ 19.759801] fff00000c6614100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.759938] fff00000c6614180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.760084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 19.718170] ================================================================== [ 19.718292] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 19.718429] Read of size 8 at addr fff00000c4075100 by task kunit_try_catch/200 [ 19.718500] [ 19.718604] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.718795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.718874] Hardware name: linux,dummy-virt (DT) [ 19.718947] Call trace: [ 19.719034] show_stack+0x20/0x38 (C) [ 19.719157] dump_stack_lvl+0x8c/0xd0 [ 19.719215] print_report+0x118/0x608 [ 19.719305] kasan_report+0xdc/0x128 [ 19.719375] __asan_report_load8_noabort+0x20/0x30 [ 19.719437] workqueue_uaf+0x480/0x4a8 [ 19.719490] kunit_try_run_case+0x170/0x3f0 [ 19.719546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.719608] kthread+0x328/0x630 [ 19.719664] ret_from_fork+0x10/0x20 [ 19.719722] [ 19.719747] Allocated by task 200: [ 19.719799] kasan_save_stack+0x3c/0x68 [ 19.719907] kasan_save_track+0x20/0x40 [ 19.719955] kasan_save_alloc_info+0x40/0x58 [ 19.720038] __kasan_kmalloc+0xd4/0xd8 [ 19.720117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.720166] workqueue_uaf+0x13c/0x4a8 [ 19.720208] kunit_try_run_case+0x170/0x3f0 [ 19.720256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.720365] kthread+0x328/0x630 [ 19.720410] ret_from_fork+0x10/0x20 [ 19.720454] [ 19.720477] Freed by task 46: [ 19.720510] kasan_save_stack+0x3c/0x68 [ 19.720555] kasan_save_track+0x20/0x40 [ 19.720596] kasan_save_free_info+0x4c/0x78 [ 19.720644] __kasan_slab_free+0x6c/0x98 [ 19.720684] kfree+0x214/0x3c8 [ 19.720722] workqueue_uaf_work+0x18/0x30 [ 19.720768] process_one_work+0x530/0xf98 [ 19.720812] worker_thread+0x8ac/0xf28 [ 19.720852] kthread+0x328/0x630 [ 19.720895] ret_from_fork+0x10/0x20 [ 19.720937] [ 19.720961] Last potentially related work creation: [ 19.721005] kasan_save_stack+0x3c/0x68 [ 19.721055] kasan_record_aux_stack+0xb4/0xc8 [ 19.721101] __queue_work+0x65c/0x1010 [ 19.721172] queue_work_on+0xbc/0xf8 [ 19.721226] workqueue_uaf+0x210/0x4a8 [ 19.721292] kunit_try_run_case+0x170/0x3f0 [ 19.721624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.721878] kthread+0x328/0x630 [ 19.722108] ret_from_fork+0x10/0x20 [ 19.722386] [ 19.722424] The buggy address belongs to the object at fff00000c4075100 [ 19.722424] which belongs to the cache kmalloc-32 of size 32 [ 19.722522] The buggy address is located 0 bytes inside of [ 19.722522] freed 32-byte region [fff00000c4075100, fff00000c4075120) [ 19.722596] [ 19.722649] The buggy address belongs to the physical page: [ 19.722846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104075 [ 19.723054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.723191] page_type: f5(slab) [ 19.723251] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.723312] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.723359] page dumped because: kasan: bad access detected [ 19.723396] [ 19.723581] Memory state around the buggy address: [ 19.723713] fff00000c4075000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.723787] fff00000c4075080: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 19.723867] >fff00000c4075100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.723942] ^ [ 19.723987] fff00000c4075180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.724088] fff00000c4075200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.724135] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 19.695105] ================================================================== [ 19.695277] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 19.695378] Read of size 4 at addr fff00000c7782f00 by task swapper/1/0 [ 19.695433] [ 19.695489] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.695592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.695651] Hardware name: linux,dummy-virt (DT) [ 19.695731] Call trace: [ 19.695789] show_stack+0x20/0x38 (C) [ 19.695901] dump_stack_lvl+0x8c/0xd0 [ 19.695969] print_report+0x118/0x608 [ 19.696091] kasan_report+0xdc/0x128 [ 19.696215] __asan_report_load4_noabort+0x20/0x30 [ 19.696285] rcu_uaf_reclaim+0x64/0x70 [ 19.696338] rcu_core+0x9f4/0x1e20 [ 19.696394] rcu_core_si+0x18/0x30 [ 19.696443] handle_softirqs+0x374/0xb28 [ 19.696497] __do_softirq+0x1c/0x28 [ 19.696547] ____do_softirq+0x18/0x30 [ 19.696598] call_on_irq_stack+0x24/0x30 [ 19.696653] do_softirq_own_stack+0x24/0x38 [ 19.696705] __irq_exit_rcu+0x1fc/0x318 [ 19.696755] irq_exit_rcu+0x1c/0x80 [ 19.696805] el1_interrupt+0x38/0x58 [ 19.696859] el1h_64_irq_handler+0x18/0x28 [ 19.696912] el1h_64_irq+0x6c/0x70 [ 19.697026] arch_local_irq_enable+0x4/0x8 (P) [ 19.697092] do_idle+0x384/0x4e8 [ 19.697186] cpu_startup_entry+0x68/0x80 [ 19.697240] secondary_start_kernel+0x288/0x340 [ 19.697296] __secondary_switched+0xc0/0xc8 [ 19.697363] [ 19.697398] Allocated by task 198: [ 19.697445] kasan_save_stack+0x3c/0x68 [ 19.697508] kasan_save_track+0x20/0x40 [ 19.697561] kasan_save_alloc_info+0x40/0x58 [ 19.697608] __kasan_kmalloc+0xd4/0xd8 [ 19.697650] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.697697] rcu_uaf+0xb0/0x2d8 [ 19.697734] kunit_try_run_case+0x170/0x3f0 [ 19.697780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.697848] kthread+0x328/0x630 [ 19.697894] ret_from_fork+0x10/0x20 [ 19.697935] [ 19.698026] Freed by task 0: [ 19.698064] kasan_save_stack+0x3c/0x68 [ 19.698112] kasan_save_track+0x20/0x40 [ 19.698156] kasan_save_free_info+0x4c/0x78 [ 19.698199] __kasan_slab_free+0x6c/0x98 [ 19.698244] kfree+0x214/0x3c8 [ 19.698281] rcu_uaf_reclaim+0x28/0x70 [ 19.698326] rcu_core+0x9f4/0x1e20 [ 19.698364] rcu_core_si+0x18/0x30 [ 19.698414] handle_softirqs+0x374/0xb28 [ 19.698463] __do_softirq+0x1c/0x28 [ 19.698504] [ 19.698573] Last potentially related work creation: [ 19.698615] kasan_save_stack+0x3c/0x68 [ 19.698665] kasan_record_aux_stack+0xb4/0xc8 [ 19.698711] __call_rcu_common.constprop.0+0x70/0x8b0 [ 19.698814] call_rcu+0x18/0x30 [ 19.698859] rcu_uaf+0x14c/0x2d8 [ 19.698899] kunit_try_run_case+0x170/0x3f0 [ 19.698940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.699002] kthread+0x328/0x630 [ 19.699066] ret_from_fork+0x10/0x20 [ 19.699118] [ 19.699150] The buggy address belongs to the object at fff00000c7782f00 [ 19.699150] which belongs to the cache kmalloc-32 of size 32 [ 19.699219] The buggy address is located 0 bytes inside of [ 19.699219] freed 32-byte region [fff00000c7782f00, fff00000c7782f20) [ 19.699288] [ 19.699314] The buggy address belongs to the physical page: [ 19.699353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107782 [ 19.699418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.699481] page_type: f5(slab) [ 19.699531] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.699591] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.699638] page dumped because: kasan: bad access detected [ 19.699673] [ 19.699696] Memory state around the buggy address: [ 19.699735] fff00000c7782e00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 19.699787] fff00000c7782e80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.699836] >fff00000c7782f00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 19.699879] ^ [ 19.699911] fff00000c7782f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.699959] fff00000c7783000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.700018] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 19.545316] ================================================================== [ 19.545414] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 19.545499] Read of size 1 at addr fff00000c4065800 by task kunit_try_catch/196 [ 19.545557] [ 19.545604] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.545706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.545739] Hardware name: linux,dummy-virt (DT) [ 19.545777] Call trace: [ 19.545817] show_stack+0x20/0x38 (C) [ 19.545882] dump_stack_lvl+0x8c/0xd0 [ 19.545940] print_report+0x118/0x608 [ 19.546011] kasan_report+0xdc/0x128 [ 19.546065] __kasan_check_byte+0x54/0x70 [ 19.546116] ksize+0x30/0x88 [ 19.546167] ksize_uaf+0x168/0x5f8 [ 19.546215] kunit_try_run_case+0x170/0x3f0 [ 19.546270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.546328] kthread+0x328/0x630 [ 19.546380] ret_from_fork+0x10/0x20 [ 19.546438] [ 19.546514] Allocated by task 196: [ 19.546548] kasan_save_stack+0x3c/0x68 [ 19.546601] kasan_save_track+0x20/0x40 [ 19.546643] kasan_save_alloc_info+0x40/0x58 [ 19.546690] __kasan_kmalloc+0xd4/0xd8 [ 19.546731] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.546778] ksize_uaf+0xb8/0x5f8 [ 19.546817] kunit_try_run_case+0x170/0x3f0 [ 19.546861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.546908] kthread+0x328/0x630 [ 19.546947] ret_from_fork+0x10/0x20 [ 19.547003] [ 19.547026] Freed by task 196: [ 19.547059] kasan_save_stack+0x3c/0x68 [ 19.547104] kasan_save_track+0x20/0x40 [ 19.547167] kasan_save_free_info+0x4c/0x78 [ 19.547289] __kasan_slab_free+0x6c/0x98 [ 19.547399] kfree+0x214/0x3c8 [ 19.547454] ksize_uaf+0x11c/0x5f8 [ 19.547511] kunit_try_run_case+0x170/0x3f0 [ 19.547553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.547602] kthread+0x328/0x630 [ 19.547657] ret_from_fork+0x10/0x20 [ 19.547769] [ 19.547795] The buggy address belongs to the object at fff00000c4065800 [ 19.547795] which belongs to the cache kmalloc-128 of size 128 [ 19.547865] The buggy address is located 0 bytes inside of [ 19.547865] freed 128-byte region [fff00000c4065800, fff00000c4065880) [ 19.547932] [ 19.548131] The buggy address belongs to the physical page: [ 19.548170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.548232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.548287] page_type: f5(slab) [ 19.548338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.548395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.548439] page dumped because: kasan: bad access detected [ 19.548476] [ 19.548496] Memory state around the buggy address: [ 19.548533] fff00000c4065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.548583] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.548631] >fff00000c4065800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.548672] ^ [ 19.548705] fff00000c4065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.548779] fff00000c4065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.548824] ================================================================== [ 19.554056] ================================================================== [ 19.554130] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 19.554196] Read of size 1 at addr fff00000c4065878 by task kunit_try_catch/196 [ 19.554252] [ 19.554290] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.554384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.554416] Hardware name: linux,dummy-virt (DT) [ 19.554464] Call trace: [ 19.554494] show_stack+0x20/0x38 (C) [ 19.554551] dump_stack_lvl+0x8c/0xd0 [ 19.554604] print_report+0x118/0x608 [ 19.554688] kasan_report+0xdc/0x128 [ 19.554751] __asan_report_load1_noabort+0x20/0x30 [ 19.554809] ksize_uaf+0x544/0x5f8 [ 19.554855] kunit_try_run_case+0x170/0x3f0 [ 19.554907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.555042] kthread+0x328/0x630 [ 19.555101] ret_from_fork+0x10/0x20 [ 19.555179] [ 19.555203] Allocated by task 196: [ 19.555234] kasan_save_stack+0x3c/0x68 [ 19.555281] kasan_save_track+0x20/0x40 [ 19.555325] kasan_save_alloc_info+0x40/0x58 [ 19.555369] __kasan_kmalloc+0xd4/0xd8 [ 19.555410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.555454] ksize_uaf+0xb8/0x5f8 [ 19.555492] kunit_try_run_case+0x170/0x3f0 [ 19.555533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.555581] kthread+0x328/0x630 [ 19.555619] ret_from_fork+0x10/0x20 [ 19.555660] [ 19.555680] Freed by task 196: [ 19.555711] kasan_save_stack+0x3c/0x68 [ 19.555753] kasan_save_track+0x20/0x40 [ 19.555793] kasan_save_free_info+0x4c/0x78 [ 19.555838] __kasan_slab_free+0x6c/0x98 [ 19.555879] kfree+0x214/0x3c8 [ 19.555916] ksize_uaf+0x11c/0x5f8 [ 19.555954] kunit_try_run_case+0x170/0x3f0 [ 19.556012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.556062] kthread+0x328/0x630 [ 19.556103] ret_from_fork+0x10/0x20 [ 19.556144] [ 19.556166] The buggy address belongs to the object at fff00000c4065800 [ 19.556166] which belongs to the cache kmalloc-128 of size 128 [ 19.556230] The buggy address is located 120 bytes inside of [ 19.556230] freed 128-byte region [fff00000c4065800, fff00000c4065880) [ 19.556296] [ 19.556322] The buggy address belongs to the physical page: [ 19.556355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.556412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.556463] page_type: f5(slab) [ 19.556547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.556608] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.556660] page dumped because: kasan: bad access detected [ 19.556733] [ 19.556769] Memory state around the buggy address: [ 19.556806] fff00000c4065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.556907] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.556964] >fff00000c4065800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.557044] ^ [ 19.557103] fff00000c4065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.557150] fff00000c4065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.557192] ================================================================== [ 19.549914] ================================================================== [ 19.549994] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 19.550062] Read of size 1 at addr fff00000c4065800 by task kunit_try_catch/196 [ 19.550119] [ 19.550162] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.550262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.550316] Hardware name: linux,dummy-virt (DT) [ 19.550389] Call trace: [ 19.550418] show_stack+0x20/0x38 (C) [ 19.550524] dump_stack_lvl+0x8c/0xd0 [ 19.550579] print_report+0x118/0x608 [ 19.550633] kasan_report+0xdc/0x128 [ 19.550685] __asan_report_load1_noabort+0x20/0x30 [ 19.550741] ksize_uaf+0x598/0x5f8 [ 19.550790] kunit_try_run_case+0x170/0x3f0 [ 19.550843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.550900] kthread+0x328/0x630 [ 19.550956] ret_from_fork+0x10/0x20 [ 19.551026] [ 19.551048] Allocated by task 196: [ 19.551080] kasan_save_stack+0x3c/0x68 [ 19.551129] kasan_save_track+0x20/0x40 [ 19.551171] kasan_save_alloc_info+0x40/0x58 [ 19.551216] __kasan_kmalloc+0xd4/0xd8 [ 19.551257] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.551328] ksize_uaf+0xb8/0x5f8 [ 19.551374] kunit_try_run_case+0x170/0x3f0 [ 19.551424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.551471] kthread+0x328/0x630 [ 19.551511] ret_from_fork+0x10/0x20 [ 19.551552] [ 19.551574] Freed by task 196: [ 19.551606] kasan_save_stack+0x3c/0x68 [ 19.551646] kasan_save_track+0x20/0x40 [ 19.551687] kasan_save_free_info+0x4c/0x78 [ 19.551732] __kasan_slab_free+0x6c/0x98 [ 19.551773] kfree+0x214/0x3c8 [ 19.551839] ksize_uaf+0x11c/0x5f8 [ 19.551881] kunit_try_run_case+0x170/0x3f0 [ 19.551922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.552026] kthread+0x328/0x630 [ 19.552074] ret_from_fork+0x10/0x20 [ 19.552114] [ 19.552140] The buggy address belongs to the object at fff00000c4065800 [ 19.552140] which belongs to the cache kmalloc-128 of size 128 [ 19.552204] The buggy address is located 0 bytes inside of [ 19.552204] freed 128-byte region [fff00000c4065800, fff00000c4065880) [ 19.552353] [ 19.552481] The buggy address belongs to the physical page: [ 19.552521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.552582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.552646] page_type: f5(slab) [ 19.552736] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.552797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.552841] page dumped because: kasan: bad access detected [ 19.552876] [ 19.552897] Memory state around the buggy address: [ 19.552932] fff00000c4065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.553005] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553057] >fff00000c4065800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.553099] ^ [ 19.553134] fff00000c4065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553182] fff00000c4065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 19.533210] ================================================================== [ 19.533362] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.533437] Read of size 1 at addr fff00000c406577f by task kunit_try_catch/194 [ 19.533491] [ 19.533537] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.533633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.533677] Hardware name: linux,dummy-virt (DT) [ 19.533719] Call trace: [ 19.533748] show_stack+0x20/0x38 (C) [ 19.533846] dump_stack_lvl+0x8c/0xd0 [ 19.533910] print_report+0x118/0x608 [ 19.533994] kasan_report+0xdc/0x128 [ 19.534105] __asan_report_load1_noabort+0x20/0x30 [ 19.534192] ksize_unpoisons_memory+0x690/0x740 [ 19.534247] kunit_try_run_case+0x170/0x3f0 [ 19.534300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534356] kthread+0x328/0x630 [ 19.534408] ret_from_fork+0x10/0x20 [ 19.534507] [ 19.534531] Allocated by task 194: [ 19.534564] kasan_save_stack+0x3c/0x68 [ 19.534684] kasan_save_track+0x20/0x40 [ 19.534729] kasan_save_alloc_info+0x40/0x58 [ 19.534775] __kasan_kmalloc+0xd4/0xd8 [ 19.534815] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.534860] ksize_unpoisons_memory+0xc0/0x740 [ 19.534904] kunit_try_run_case+0x170/0x3f0 [ 19.534944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535005] kthread+0x328/0x630 [ 19.535047] ret_from_fork+0x10/0x20 [ 19.535087] [ 19.535109] The buggy address belongs to the object at fff00000c4065700 [ 19.535109] which belongs to the cache kmalloc-128 of size 128 [ 19.535197] The buggy address is located 12 bytes to the right of [ 19.535197] allocated 115-byte region [fff00000c4065700, fff00000c4065773) [ 19.535272] [ 19.535310] The buggy address belongs to the physical page: [ 19.535346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.535406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535459] page_type: f5(slab) [ 19.535507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.535629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.535765] page dumped because: kasan: bad access detected [ 19.535816] [ 19.535870] Memory state around the buggy address: [ 19.535911] fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.535969] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536089] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.536135] ^ [ 19.536183] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536230] fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536279] ================================================================== [ 19.514890] ================================================================== [ 19.516651] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.517206] Read of size 1 at addr fff00000c4065773 by task kunit_try_catch/194 [ 19.517602] [ 19.517677] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.517816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.518146] Hardware name: linux,dummy-virt (DT) [ 19.518240] Call trace: [ 19.518454] show_stack+0x20/0x38 (C) [ 19.518664] dump_stack_lvl+0x8c/0xd0 [ 19.518950] print_report+0x118/0x608 [ 19.519048] kasan_report+0xdc/0x128 [ 19.519108] __asan_report_load1_noabort+0x20/0x30 [ 19.519170] ksize_unpoisons_memory+0x628/0x740 [ 19.519722] kunit_try_run_case+0x170/0x3f0 [ 19.519867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.519938] kthread+0x328/0x630 [ 19.520199] ret_from_fork+0x10/0x20 [ 19.520441] [ 19.520851] Allocated by task 194: [ 19.521172] kasan_save_stack+0x3c/0x68 [ 19.521243] kasan_save_track+0x20/0x40 [ 19.521285] kasan_save_alloc_info+0x40/0x58 [ 19.521343] __kasan_kmalloc+0xd4/0xd8 [ 19.521394] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.521621] ksize_unpoisons_memory+0xc0/0x740 [ 19.521705] kunit_try_run_case+0x170/0x3f0 [ 19.521776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522057] kthread+0x328/0x630 [ 19.522118] ret_from_fork+0x10/0x20 [ 19.522162] [ 19.522187] The buggy address belongs to the object at fff00000c4065700 [ 19.522187] which belongs to the cache kmalloc-128 of size 128 [ 19.522258] The buggy address is located 0 bytes to the right of [ 19.522258] allocated 115-byte region [fff00000c4065700, fff00000c4065773) [ 19.522404] [ 19.522436] The buggy address belongs to the physical page: [ 19.522475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.522742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.523006] page_type: f5(slab) [ 19.523225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.523338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.523415] page dumped because: kasan: bad access detected [ 19.523457] [ 19.523486] Memory state around the buggy address: [ 19.523533] fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.523585] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.523635] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.523679] ^ [ 19.523725] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.523773] fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.523816] ================================================================== [ 19.526223] ================================================================== [ 19.526310] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.526398] Read of size 1 at addr fff00000c4065778 by task kunit_try_catch/194 [ 19.526498] [ 19.526657] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.526773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.527439] Hardware name: linux,dummy-virt (DT) [ 19.527507] Call trace: [ 19.528045] show_stack+0x20/0x38 (C) [ 19.528393] dump_stack_lvl+0x8c/0xd0 [ 19.528485] print_report+0x118/0x608 [ 19.528677] kasan_report+0xdc/0x128 [ 19.528862] __asan_report_load1_noabort+0x20/0x30 [ 19.529173] ksize_unpoisons_memory+0x618/0x740 [ 19.529250] kunit_try_run_case+0x170/0x3f0 [ 19.529361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.529515] kthread+0x328/0x630 [ 19.529966] ret_from_fork+0x10/0x20 [ 19.530048] [ 19.530073] Allocated by task 194: [ 19.530112] kasan_save_stack+0x3c/0x68 [ 19.530166] kasan_save_track+0x20/0x40 [ 19.530235] kasan_save_alloc_info+0x40/0x58 [ 19.530284] __kasan_kmalloc+0xd4/0xd8 [ 19.530328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.530487] ksize_unpoisons_memory+0xc0/0x740 [ 19.530582] kunit_try_run_case+0x170/0x3f0 [ 19.530629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530692] kthread+0x328/0x630 [ 19.530774] ret_from_fork+0x10/0x20 [ 19.530826] [ 19.530859] The buggy address belongs to the object at fff00000c4065700 [ 19.530859] which belongs to the cache kmalloc-128 of size 128 [ 19.531004] The buggy address is located 5 bytes to the right of [ 19.531004] allocated 115-byte region [fff00000c4065700, fff00000c4065773) [ 19.531227] [ 19.531317] The buggy address belongs to the physical page: [ 19.531360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.531425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.531505] page_type: f5(slab) [ 19.531561] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.531621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.531667] page dumped because: kasan: bad access detected [ 19.531704] [ 19.531725] Memory state around the buggy address: [ 19.531765] fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.531817] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.531867] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.531910] ^ [ 19.532015] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.532137] fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.532207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 19.500740] ================================================================== [ 19.500868] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 19.501037] Free of addr fff00000c4035120 by task kunit_try_catch/192 [ 19.501090] [ 19.501134] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.501232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.501263] Hardware name: linux,dummy-virt (DT) [ 19.501300] Call trace: [ 19.501328] show_stack+0x20/0x38 (C) [ 19.501388] dump_stack_lvl+0x8c/0xd0 [ 19.501442] print_report+0x118/0x608 [ 19.501493] kasan_report_invalid_free+0xc0/0xe8 [ 19.501547] check_slab_allocation+0xd4/0x108 [ 19.501601] __kasan_slab_pre_free+0x2c/0x48 [ 19.501656] kfree+0xe8/0x3c8 [ 19.501702] kfree_sensitive+0x3c/0xb0 [ 19.501753] kmalloc_double_kzfree+0x168/0x308 [ 19.501814] kunit_try_run_case+0x170/0x3f0 [ 19.501877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501938] kthread+0x328/0x630 [ 19.502419] ret_from_fork+0x10/0x20 [ 19.502758] [ 19.502796] Allocated by task 192: [ 19.502838] kasan_save_stack+0x3c/0x68 [ 19.502890] kasan_save_track+0x20/0x40 [ 19.502935] kasan_save_alloc_info+0x40/0x58 [ 19.503046] __kasan_kmalloc+0xd4/0xd8 [ 19.503129] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.503177] kmalloc_double_kzfree+0xb8/0x308 [ 19.503220] kunit_try_run_case+0x170/0x3f0 [ 19.503286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.503371] kthread+0x328/0x630 [ 19.503412] ret_from_fork+0x10/0x20 [ 19.503454] [ 19.503478] Freed by task 192: [ 19.503513] kasan_save_stack+0x3c/0x68 [ 19.503554] kasan_save_track+0x20/0x40 [ 19.503596] kasan_save_free_info+0x4c/0x78 [ 19.503639] __kasan_slab_free+0x6c/0x98 [ 19.503679] kfree+0x214/0x3c8 [ 19.503717] kfree_sensitive+0x80/0xb0 [ 19.503756] kmalloc_double_kzfree+0x11c/0x308 [ 19.503798] kunit_try_run_case+0x170/0x3f0 [ 19.503837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.503882] kthread+0x328/0x630 [ 19.503919] ret_from_fork+0x10/0x20 [ 19.503958] [ 19.503991] The buggy address belongs to the object at fff00000c4035120 [ 19.503991] which belongs to the cache kmalloc-16 of size 16 [ 19.504075] The buggy address is located 0 bytes inside of [ 19.504075] 16-byte region [fff00000c4035120, fff00000c4035130) [ 19.504197] [ 19.504259] The buggy address belongs to the physical page: [ 19.504317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 19.504380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.504433] page_type: f5(slab) [ 19.504480] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.504535] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.504580] page dumped because: kasan: bad access detected [ 19.504613] [ 19.504634] Memory state around the buggy address: [ 19.504671] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 19.504718] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.504764] >fff00000c4035100: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 19.504804] ^ [ 19.504848] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.504941] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505238] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 19.492069] ================================================================== [ 19.492215] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 19.492356] Read of size 1 at addr fff00000c4035120 by task kunit_try_catch/192 [ 19.492421] [ 19.492493] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.492827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.492891] Hardware name: linux,dummy-virt (DT) [ 19.492938] Call trace: [ 19.492968] show_stack+0x20/0x38 (C) [ 19.493337] dump_stack_lvl+0x8c/0xd0 [ 19.493456] print_report+0x118/0x608 [ 19.493510] kasan_report+0xdc/0x128 [ 19.493562] __kasan_check_byte+0x54/0x70 [ 19.493612] kfree_sensitive+0x30/0xb0 [ 19.493664] kmalloc_double_kzfree+0x168/0x308 [ 19.493714] kunit_try_run_case+0x170/0x3f0 [ 19.493775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493896] kthread+0x328/0x630 [ 19.494041] ret_from_fork+0x10/0x20 [ 19.494213] [ 19.494263] Allocated by task 192: [ 19.494308] kasan_save_stack+0x3c/0x68 [ 19.494364] kasan_save_track+0x20/0x40 [ 19.494408] kasan_save_alloc_info+0x40/0x58 [ 19.494469] __kasan_kmalloc+0xd4/0xd8 [ 19.494514] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.494559] kmalloc_double_kzfree+0xb8/0x308 [ 19.494603] kunit_try_run_case+0x170/0x3f0 [ 19.494665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.494716] kthread+0x328/0x630 [ 19.494760] ret_from_fork+0x10/0x20 [ 19.494800] [ 19.494824] Freed by task 192: [ 19.494853] kasan_save_stack+0x3c/0x68 [ 19.494895] kasan_save_track+0x20/0x40 [ 19.494937] kasan_save_free_info+0x4c/0x78 [ 19.494990] __kasan_slab_free+0x6c/0x98 [ 19.495037] kfree+0x214/0x3c8 [ 19.495073] kfree_sensitive+0x80/0xb0 [ 19.495115] kmalloc_double_kzfree+0x11c/0x308 [ 19.495159] kunit_try_run_case+0x170/0x3f0 [ 19.495943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.496067] kthread+0x328/0x630 [ 19.496127] ret_from_fork+0x10/0x20 [ 19.496171] [ 19.496200] The buggy address belongs to the object at fff00000c4035120 [ 19.496200] which belongs to the cache kmalloc-16 of size 16 [ 19.496269] The buggy address is located 0 bytes inside of [ 19.496269] freed 16-byte region [fff00000c4035120, fff00000c4035130) [ 19.496334] [ 19.496360] The buggy address belongs to the physical page: [ 19.496399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 19.496459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.496518] page_type: f5(slab) [ 19.496989] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.497422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.497661] page dumped because: kasan: bad access detected [ 19.497706] [ 19.497728] Memory state around the buggy address: [ 19.497768] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 19.497839] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.497891] >fff00000c4035100: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 19.497952] ^ [ 19.498823] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499117] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 19.471102] ================================================================== [ 19.471193] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 19.471277] Read of size 1 at addr fff00000c77800a8 by task kunit_try_catch/188 [ 19.471335] [ 19.471385] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.471483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.471516] Hardware name: linux,dummy-virt (DT) [ 19.471555] Call trace: [ 19.471583] show_stack+0x20/0x38 (C) [ 19.471643] dump_stack_lvl+0x8c/0xd0 [ 19.471698] print_report+0x118/0x608 [ 19.471750] kasan_report+0xdc/0x128 [ 19.471799] __asan_report_load1_noabort+0x20/0x30 [ 19.471856] kmalloc_uaf2+0x3f4/0x468 [ 19.471909] kunit_try_run_case+0x170/0x3f0 [ 19.471961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.472037] kthread+0x328/0x630 [ 19.472090] ret_from_fork+0x10/0x20 [ 19.472147] [ 19.472167] Allocated by task 188: [ 19.472200] kasan_save_stack+0x3c/0x68 [ 19.472249] kasan_save_track+0x20/0x40 [ 19.472305] kasan_save_alloc_info+0x40/0x58 [ 19.472349] __kasan_kmalloc+0xd4/0xd8 [ 19.472388] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.472431] kmalloc_uaf2+0xc4/0x468 [ 19.472473] kunit_try_run_case+0x170/0x3f0 [ 19.472514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.472560] kthread+0x328/0x630 [ 19.472598] ret_from_fork+0x10/0x20 [ 19.472638] [ 19.472659] Freed by task 188: [ 19.472688] kasan_save_stack+0x3c/0x68 [ 19.472726] kasan_save_track+0x20/0x40 [ 19.472762] kasan_save_free_info+0x4c/0x78 [ 19.472803] __kasan_slab_free+0x6c/0x98 [ 19.472840] kfree+0x214/0x3c8 [ 19.472874] kmalloc_uaf2+0x134/0x468 [ 19.472911] kunit_try_run_case+0x170/0x3f0 [ 19.472949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.473006] kthread+0x328/0x630 [ 19.473049] ret_from_fork+0x10/0x20 [ 19.473088] [ 19.473111] The buggy address belongs to the object at fff00000c7780080 [ 19.473111] which belongs to the cache kmalloc-64 of size 64 [ 19.473191] The buggy address is located 40 bytes inside of [ 19.473191] freed 64-byte region [fff00000c7780080, fff00000c77800c0) [ 19.473298] [ 19.473323] The buggy address belongs to the physical page: [ 19.473359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107780 [ 19.473421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.473478] page_type: f5(slab) [ 19.473527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.473587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.473636] page dumped because: kasan: bad access detected [ 19.473672] [ 19.473694] Memory state around the buggy address: [ 19.473754] fff00000c777ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.473813] fff00000c7780000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.473962] >fff00000c7780080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.474021] ^ [ 19.474060] fff00000c7780100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 19.474109] fff00000c7780180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474152] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 19.453194] ================================================================== [ 19.453286] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 19.453374] Write of size 33 at addr fff00000c7785f00 by task kunit_try_catch/186 [ 19.453433] [ 19.453482] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.453580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.454100] Hardware name: linux,dummy-virt (DT) [ 19.454617] Call trace: [ 19.454677] show_stack+0x20/0x38 (C) [ 19.454922] dump_stack_lvl+0x8c/0xd0 [ 19.455172] print_report+0x118/0x608 [ 19.455226] kasan_report+0xdc/0x128 [ 19.455276] kasan_check_range+0x100/0x1a8 [ 19.455593] __asan_memset+0x34/0x78 [ 19.455674] kmalloc_uaf_memset+0x170/0x310 [ 19.455831] kunit_try_run_case+0x170/0x3f0 [ 19.455891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.456201] kthread+0x328/0x630 [ 19.456453] ret_from_fork+0x10/0x20 [ 19.456529] [ 19.456553] Allocated by task 186: [ 19.456649] kasan_save_stack+0x3c/0x68 [ 19.456700] kasan_save_track+0x20/0x40 [ 19.456808] kasan_save_alloc_info+0x40/0x58 [ 19.457082] __kasan_kmalloc+0xd4/0xd8 [ 19.457216] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.457267] kmalloc_uaf_memset+0xb8/0x310 [ 19.457394] kunit_try_run_case+0x170/0x3f0 [ 19.457456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.457745] kthread+0x328/0x630 [ 19.457823] ret_from_fork+0x10/0x20 [ 19.457994] [ 19.458065] Freed by task 186: [ 19.458206] kasan_save_stack+0x3c/0x68 [ 19.458313] kasan_save_track+0x20/0x40 [ 19.458360] kasan_save_free_info+0x4c/0x78 [ 19.458404] __kasan_slab_free+0x6c/0x98 [ 19.458709] kfree+0x214/0x3c8 [ 19.458869] kmalloc_uaf_memset+0x11c/0x310 [ 19.458942] kunit_try_run_case+0x170/0x3f0 [ 19.459025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.459223] kthread+0x328/0x630 [ 19.459274] ret_from_fork+0x10/0x20 [ 19.459379] [ 19.459410] The buggy address belongs to the object at fff00000c7785f00 [ 19.459410] which belongs to the cache kmalloc-64 of size 64 [ 19.459510] The buggy address is located 0 bytes inside of [ 19.459510] freed 64-byte region [fff00000c7785f00, fff00000c7785f40) [ 19.459805] [ 19.459855] The buggy address belongs to the physical page: [ 19.459905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107785 [ 19.459981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.460045] page_type: f5(slab) [ 19.460099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.460433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.460694] page dumped because: kasan: bad access detected [ 19.460752] [ 19.460775] Memory state around the buggy address: [ 19.460826] fff00000c7785e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.461100] fff00000c7785e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.461156] >fff00000c7785f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.461204] ^ [ 19.461424] fff00000c7785f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.461476] fff00000c7786000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.461520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 19.431588] ================================================================== [ 19.432242] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 19.432350] Read of size 1 at addr fff00000c4035108 by task kunit_try_catch/184 [ 19.432447] [ 19.432505] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.432608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.432735] Hardware name: linux,dummy-virt (DT) [ 19.432928] Call trace: [ 19.433088] show_stack+0x20/0x38 (C) [ 19.433239] dump_stack_lvl+0x8c/0xd0 [ 19.433450] print_report+0x118/0x608 [ 19.433517] kasan_report+0xdc/0x128 [ 19.433697] __asan_report_load1_noabort+0x20/0x30 [ 19.433770] kmalloc_uaf+0x300/0x338 [ 19.434156] kunit_try_run_case+0x170/0x3f0 [ 19.434240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.434349] kthread+0x328/0x630 [ 19.435230] ret_from_fork+0x10/0x20 [ 19.435381] [ 19.435506] Allocated by task 184: [ 19.435609] kasan_save_stack+0x3c/0x68 [ 19.435665] kasan_save_track+0x20/0x40 [ 19.435706] kasan_save_alloc_info+0x40/0x58 [ 19.435881] __kasan_kmalloc+0xd4/0xd8 [ 19.436245] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.436359] kmalloc_uaf+0xb8/0x338 [ 19.436400] kunit_try_run_case+0x170/0x3f0 [ 19.436496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.436543] kthread+0x328/0x630 [ 19.436795] ret_from_fork+0x10/0x20 [ 19.436935] [ 19.437046] Freed by task 184: [ 19.437353] kasan_save_stack+0x3c/0x68 [ 19.437504] kasan_save_track+0x20/0x40 [ 19.437624] kasan_save_free_info+0x4c/0x78 [ 19.437671] __kasan_slab_free+0x6c/0x98 [ 19.437710] kfree+0x214/0x3c8 [ 19.438499] kmalloc_uaf+0x11c/0x338 [ 19.438894] kunit_try_run_case+0x170/0x3f0 [ 19.438946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.439107] kthread+0x328/0x630 [ 19.439243] ret_from_fork+0x10/0x20 [ 19.439425] [ 19.439481] The buggy address belongs to the object at fff00000c4035100 [ 19.439481] which belongs to the cache kmalloc-16 of size 16 [ 19.439747] The buggy address is located 8 bytes inside of [ 19.439747] freed 16-byte region [fff00000c4035100, fff00000c4035110) [ 19.439823] [ 19.439851] The buggy address belongs to the physical page: [ 19.439892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 19.439955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.440025] page_type: f5(slab) [ 19.440125] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.440218] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.440261] page dumped because: kasan: bad access detected [ 19.440296] [ 19.440316] Memory state around the buggy address: [ 19.440351] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 19.440406] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.440554] >fff00000c4035100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.440657] ^ [ 19.440817] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.441098] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.441147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 19.412984] ================================================================== [ 19.413102] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.413194] Read of size 64 at addr fff00000c7785c04 by task kunit_try_catch/182 [ 19.413252] [ 19.413304] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.413406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.414138] Hardware name: linux,dummy-virt (DT) [ 19.414740] Call trace: [ 19.415044] show_stack+0x20/0x38 (C) [ 19.415160] dump_stack_lvl+0x8c/0xd0 [ 19.415229] print_report+0x118/0x608 [ 19.415279] kasan_report+0xdc/0x128 [ 19.415813] kasan_check_range+0x100/0x1a8 [ 19.416197] __asan_memmove+0x3c/0x98 [ 19.416260] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.416413] kunit_try_run_case+0x170/0x3f0 [ 19.416535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.416880] kthread+0x328/0x630 [ 19.417070] ret_from_fork+0x10/0x20 [ 19.417325] [ 19.417376] Allocated by task 182: [ 19.417458] kasan_save_stack+0x3c/0x68 [ 19.417516] kasan_save_track+0x20/0x40 [ 19.417742] kasan_save_alloc_info+0x40/0x58 [ 19.417791] __kasan_kmalloc+0xd4/0xd8 [ 19.418078] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.418172] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 19.418220] kunit_try_run_case+0x170/0x3f0 [ 19.418263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.418309] kthread+0x328/0x630 [ 19.418350] ret_from_fork+0x10/0x20 [ 19.418390] [ 19.418416] The buggy address belongs to the object at fff00000c7785c00 [ 19.418416] which belongs to the cache kmalloc-64 of size 64 [ 19.418482] The buggy address is located 4 bytes inside of [ 19.418482] allocated 64-byte region [fff00000c7785c00, fff00000c7785c40) [ 19.418559] [ 19.418717] The buggy address belongs to the physical page: [ 19.418865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107785 [ 19.419156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.419229] page_type: f5(slab) [ 19.419477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.419734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.419800] page dumped because: kasan: bad access detected [ 19.419852] [ 19.420037] Memory state around the buggy address: [ 19.420208] fff00000c7785b00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.420535] fff00000c7785b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420654] >fff00000c7785c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.420727] ^ [ 19.420810] fff00000c7785c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420903] fff00000c7785d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420959] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 19.395580] ================================================================== [ 19.395683] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.396040] Read of size 18446744073709551614 at addr fff00000c7785a04 by task kunit_try_catch/180 [ 19.396265] [ 19.396429] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.397182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.397246] Hardware name: linux,dummy-virt (DT) [ 19.397315] Call trace: [ 19.397345] show_stack+0x20/0x38 (C) [ 19.397548] dump_stack_lvl+0x8c/0xd0 [ 19.397672] print_report+0x118/0x608 [ 19.397782] kasan_report+0xdc/0x128 [ 19.397926] kasan_check_range+0x100/0x1a8 [ 19.398044] __asan_memmove+0x3c/0x98 [ 19.398111] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.398221] kunit_try_run_case+0x170/0x3f0 [ 19.398321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.398408] kthread+0x328/0x630 [ 19.398526] ret_from_fork+0x10/0x20 [ 19.398591] [ 19.398614] Allocated by task 180: [ 19.398652] kasan_save_stack+0x3c/0x68 [ 19.398726] kasan_save_track+0x20/0x40 [ 19.398789] kasan_save_alloc_info+0x40/0x58 [ 19.398870] __kasan_kmalloc+0xd4/0xd8 [ 19.398917] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.399094] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 19.399158] kunit_try_run_case+0x170/0x3f0 [ 19.399203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.399271] kthread+0x328/0x630 [ 19.399312] ret_from_fork+0x10/0x20 [ 19.399356] [ 19.399382] The buggy address belongs to the object at fff00000c7785a00 [ 19.399382] which belongs to the cache kmalloc-64 of size 64 [ 19.399649] The buggy address is located 4 bytes inside of [ 19.399649] 64-byte region [fff00000c7785a00, fff00000c7785a40) [ 19.399772] [ 19.399815] The buggy address belongs to the physical page: [ 19.400012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107785 [ 19.400270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.400560] page_type: f5(slab) [ 19.400665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.400729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.400775] page dumped because: kasan: bad access detected [ 19.401053] [ 19.401097] Memory state around the buggy address: [ 19.401142] fff00000c7785900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 19.401418] fff00000c7785980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.401610] >fff00000c7785a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.401656] ^ [ 19.401690] fff00000c7785a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.402170] fff00000c7785b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.402225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 19.377319] ================================================================== [ 19.377451] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 19.377540] Write of size 16 at addr fff00000c4065669 by task kunit_try_catch/178 [ 19.377597] [ 19.377642] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.377741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.377771] Hardware name: linux,dummy-virt (DT) [ 19.377836] Call trace: [ 19.377878] show_stack+0x20/0x38 (C) [ 19.377938] dump_stack_lvl+0x8c/0xd0 [ 19.378007] print_report+0x118/0x608 [ 19.378089] kasan_report+0xdc/0x128 [ 19.378267] kasan_check_range+0x100/0x1a8 [ 19.378352] __asan_memset+0x34/0x78 [ 19.378412] kmalloc_oob_memset_16+0x150/0x2f8 [ 19.378570] kunit_try_run_case+0x170/0x3f0 [ 19.378667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.378727] kthread+0x328/0x630 [ 19.378779] ret_from_fork+0x10/0x20 [ 19.378835] [ 19.378857] Allocated by task 178: [ 19.379035] kasan_save_stack+0x3c/0x68 [ 19.379086] kasan_save_track+0x20/0x40 [ 19.379128] kasan_save_alloc_info+0x40/0x58 [ 19.379173] __kasan_kmalloc+0xd4/0xd8 [ 19.379215] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.379259] kmalloc_oob_memset_16+0xb0/0x2f8 [ 19.379435] kunit_try_run_case+0x170/0x3f0 [ 19.379593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.379756] kthread+0x328/0x630 [ 19.379811] ret_from_fork+0x10/0x20 [ 19.379854] [ 19.379900] The buggy address belongs to the object at fff00000c4065600 [ 19.379900] which belongs to the cache kmalloc-128 of size 128 [ 19.379966] The buggy address is located 105 bytes inside of [ 19.379966] allocated 120-byte region [fff00000c4065600, fff00000c4065678) [ 19.380045] [ 19.380209] The buggy address belongs to the physical page: [ 19.380277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.380339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.380405] page_type: f5(slab) [ 19.380461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.380516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.380560] page dumped because: kasan: bad access detected [ 19.380594] [ 19.380614] Memory state around the buggy address: [ 19.380652] fff00000c4065500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.380699] fff00000c4065580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.380762] >fff00000c4065600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.380803] ^ [ 19.380848] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.380893] fff00000c4065700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.380947] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 19.364469] ================================================================== [ 19.364573] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 19.364660] Write of size 8 at addr fff00000c4065571 by task kunit_try_catch/176 [ 19.364718] [ 19.364765] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.364861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.364890] Hardware name: linux,dummy-virt (DT) [ 19.364925] Call trace: [ 19.364953] show_stack+0x20/0x38 (C) [ 19.365445] dump_stack_lvl+0x8c/0xd0 [ 19.365658] print_report+0x118/0x608 [ 19.365797] kasan_report+0xdc/0x128 [ 19.365865] kasan_check_range+0x100/0x1a8 [ 19.366035] __asan_memset+0x34/0x78 [ 19.366150] kmalloc_oob_memset_8+0x150/0x2f8 [ 19.366248] kunit_try_run_case+0x170/0x3f0 [ 19.366352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.366477] kthread+0x328/0x630 [ 19.366535] ret_from_fork+0x10/0x20 [ 19.366623] [ 19.366697] Allocated by task 176: [ 19.366733] kasan_save_stack+0x3c/0x68 [ 19.366784] kasan_save_track+0x20/0x40 [ 19.366827] kasan_save_alloc_info+0x40/0x58 [ 19.366872] __kasan_kmalloc+0xd4/0xd8 [ 19.366915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.367056] kmalloc_oob_memset_8+0xb0/0x2f8 [ 19.367274] kunit_try_run_case+0x170/0x3f0 [ 19.367323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.367380] kthread+0x328/0x630 [ 19.367441] ret_from_fork+0x10/0x20 [ 19.367481] [ 19.367504] The buggy address belongs to the object at fff00000c4065500 [ 19.367504] which belongs to the cache kmalloc-128 of size 128 [ 19.367668] The buggy address is located 113 bytes inside of [ 19.367668] allocated 120-byte region [fff00000c4065500, fff00000c4065578) [ 19.367754] [ 19.367812] The buggy address belongs to the physical page: [ 19.367848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.367953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.368145] page_type: f5(slab) [ 19.368268] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.368330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.368375] page dumped because: kasan: bad access detected [ 19.368410] [ 19.368578] Memory state around the buggy address: [ 19.368645] fff00000c4065400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.368705] fff00000c4065480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.368755] >fff00000c4065500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.368796] ^ [ 19.368841] fff00000c4065580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.368887] fff00000c4065600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.368928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 19.350282] ================================================================== [ 19.350368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 19.350451] Write of size 4 at addr fff00000c4065475 by task kunit_try_catch/174 [ 19.350525] [ 19.350573] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.350672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.350701] Hardware name: linux,dummy-virt (DT) [ 19.350739] Call trace: [ 19.350768] show_stack+0x20/0x38 (C) [ 19.351248] dump_stack_lvl+0x8c/0xd0 [ 19.351310] print_report+0x118/0x608 [ 19.351364] kasan_report+0xdc/0x128 [ 19.352132] kasan_check_range+0x100/0x1a8 [ 19.352655] __asan_memset+0x34/0x78 [ 19.352787] kmalloc_oob_memset_4+0x150/0x300 [ 19.353021] kunit_try_run_case+0x170/0x3f0 [ 19.353274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.353338] kthread+0x328/0x630 [ 19.353393] ret_from_fork+0x10/0x20 [ 19.353742] [ 19.353827] Allocated by task 174: [ 19.354031] kasan_save_stack+0x3c/0x68 [ 19.354092] kasan_save_track+0x20/0x40 [ 19.354265] kasan_save_alloc_info+0x40/0x58 [ 19.354494] __kasan_kmalloc+0xd4/0xd8 [ 19.354543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.354590] kmalloc_oob_memset_4+0xb0/0x300 [ 19.354636] kunit_try_run_case+0x170/0x3f0 [ 19.354802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.355013] kthread+0x328/0x630 [ 19.355069] ret_from_fork+0x10/0x20 [ 19.355341] [ 19.355407] The buggy address belongs to the object at fff00000c4065400 [ 19.355407] which belongs to the cache kmalloc-128 of size 128 [ 19.355493] The buggy address is located 117 bytes inside of [ 19.355493] allocated 120-byte region [fff00000c4065400, fff00000c4065478) [ 19.355559] [ 19.355585] The buggy address belongs to the physical page: [ 19.355621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.355680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.355736] page_type: f5(slab) [ 19.355786] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.355841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.355885] page dumped because: kasan: bad access detected [ 19.355919] [ 19.355940] Memory state around the buggy address: [ 19.355997] fff00000c4065300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.356048] fff00000c4065380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356093] >fff00000c4065400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.356133] ^ [ 19.356176] fff00000c4065480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356220] fff00000c4065500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 19.084050] ================================================================== [ 19.084189] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 19.084293] Read of size 1 at addr fff00000c7820000 by task kunit_try_catch/154 [ 19.084428] [ 19.084484] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.084581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.084881] Hardware name: linux,dummy-virt (DT) [ 19.084960] Call trace: [ 19.085239] show_stack+0x20/0x38 (C) [ 19.085310] dump_stack_lvl+0x8c/0xd0 [ 19.085364] print_report+0x118/0x608 [ 19.085416] kasan_report+0xdc/0x128 [ 19.085466] __asan_report_load1_noabort+0x20/0x30 [ 19.085522] page_alloc_uaf+0x328/0x350 [ 19.085571] kunit_try_run_case+0x170/0x3f0 [ 19.085623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.085680] kthread+0x328/0x630 [ 19.085733] ret_from_fork+0x10/0x20 [ 19.085790] [ 19.085836] The buggy address belongs to the physical page: [ 19.085875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820 [ 19.085937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.086007] page_type: f0(buddy) [ 19.086061] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 19.086118] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 19.086162] page dumped because: kasan: bad access detected [ 19.086196] [ 19.086216] Memory state around the buggy address: [ 19.086264] fff00000c781ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.086371] fff00000c781ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.086419] >fff00000c7820000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.086459] ^ [ 19.086492] fff00000c7820080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.086538] fff00000c7820100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.086578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 19.333067] ================================================================== [ 19.333161] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 19.333253] Write of size 2 at addr fff00000c4065377 by task kunit_try_catch/172 [ 19.333308] [ 19.333357] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.333456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.333487] Hardware name: linux,dummy-virt (DT) [ 19.334019] Call trace: [ 19.334077] show_stack+0x20/0x38 (C) [ 19.334148] dump_stack_lvl+0x8c/0xd0 [ 19.334219] print_report+0x118/0x608 [ 19.334701] kasan_report+0xdc/0x128 [ 19.334967] kasan_check_range+0x100/0x1a8 [ 19.335042] __asan_memset+0x34/0x78 [ 19.335347] kmalloc_oob_memset_2+0x150/0x2f8 [ 19.335474] kunit_try_run_case+0x170/0x3f0 [ 19.335541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.335863] kthread+0x328/0x630 [ 19.335943] ret_from_fork+0x10/0x20 [ 19.336290] [ 19.336369] Allocated by task 172: [ 19.336410] kasan_save_stack+0x3c/0x68 [ 19.336479] kasan_save_track+0x20/0x40 [ 19.336761] kasan_save_alloc_info+0x40/0x58 [ 19.336845] __kasan_kmalloc+0xd4/0xd8 [ 19.336908] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.336952] kmalloc_oob_memset_2+0xb0/0x2f8 [ 19.337011] kunit_try_run_case+0x170/0x3f0 [ 19.337222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.337594] kthread+0x328/0x630 [ 19.337648] ret_from_fork+0x10/0x20 [ 19.337691] [ 19.337954] The buggy address belongs to the object at fff00000c4065300 [ 19.337954] which belongs to the cache kmalloc-128 of size 128 [ 19.338068] The buggy address is located 119 bytes inside of [ 19.338068] allocated 120-byte region [fff00000c4065300, fff00000c4065378) [ 19.338139] [ 19.338415] The buggy address belongs to the physical page: [ 19.338547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.338619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.338870] page_type: f5(slab) [ 19.339063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.339127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.339174] page dumped because: kasan: bad access detected [ 19.339211] [ 19.339232] Memory state around the buggy address: [ 19.339408] fff00000c4065200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.339483] fff00000c4065280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.339534] >fff00000c4065300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.339760] ^ [ 19.339826] fff00000c4065380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.340119] fff00000c4065400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.340259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 19.311877] ================================================================== [ 19.312013] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 19.312125] Write of size 128 at addr fff00000c4065200 by task kunit_try_catch/170 [ 19.312188] [ 19.312253] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.312627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.312783] Hardware name: linux,dummy-virt (DT) [ 19.312834] Call trace: [ 19.313034] show_stack+0x20/0x38 (C) [ 19.313108] dump_stack_lvl+0x8c/0xd0 [ 19.313169] print_report+0x118/0x608 [ 19.313226] kasan_report+0xdc/0x128 [ 19.313275] kasan_check_range+0x100/0x1a8 [ 19.313730] __asan_memset+0x34/0x78 [ 19.313857] kmalloc_oob_in_memset+0x144/0x2d0 [ 19.313933] kunit_try_run_case+0x170/0x3f0 [ 19.314008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.314071] kthread+0x328/0x630 [ 19.314288] ret_from_fork+0x10/0x20 [ 19.314363] [ 19.314387] Allocated by task 170: [ 19.314742] kasan_save_stack+0x3c/0x68 [ 19.314826] kasan_save_track+0x20/0x40 [ 19.314907] kasan_save_alloc_info+0x40/0x58 [ 19.314983] __kasan_kmalloc+0xd4/0xd8 [ 19.315117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.315211] kmalloc_oob_in_memset+0xb0/0x2d0 [ 19.315289] kunit_try_run_case+0x170/0x3f0 [ 19.315591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.315831] kthread+0x328/0x630 [ 19.315946] ret_from_fork+0x10/0x20 [ 19.316093] [ 19.316170] The buggy address belongs to the object at fff00000c4065200 [ 19.316170] which belongs to the cache kmalloc-128 of size 128 [ 19.316437] The buggy address is located 0 bytes inside of [ 19.316437] allocated 120-byte region [fff00000c4065200, fff00000c4065278) [ 19.316642] [ 19.316687] The buggy address belongs to the physical page: [ 19.316780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.316863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.316921] page_type: f5(slab) [ 19.317157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.317258] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.317414] page dumped because: kasan: bad access detected [ 19.317476] [ 19.317554] Memory state around the buggy address: [ 19.317597] fff00000c4065100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.317649] fff00000c4065180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.317981] >fff00000c4065200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.318240] ^ [ 19.318315] fff00000c4065280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.318366] fff00000c4065300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.318495] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 19.285023] ================================================================== [ 19.285120] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 19.285212] Read of size 16 at addr fff00000c40350e0 by task kunit_try_catch/168 [ 19.285268] [ 19.285316] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.285412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.286722] Hardware name: linux,dummy-virt (DT) [ 19.286929] Call trace: [ 19.286989] show_stack+0x20/0x38 (C) [ 19.287063] dump_stack_lvl+0x8c/0xd0 [ 19.287189] print_report+0x118/0x608 [ 19.287370] kasan_report+0xdc/0x128 [ 19.287486] __asan_report_load16_noabort+0x20/0x30 [ 19.287875] kmalloc_uaf_16+0x3bc/0x438 [ 19.287950] kunit_try_run_case+0x170/0x3f0 [ 19.288032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.288093] kthread+0x328/0x630 [ 19.288371] ret_from_fork+0x10/0x20 [ 19.288638] [ 19.288667] Allocated by task 168: [ 19.288732] kasan_save_stack+0x3c/0x68 [ 19.288930] kasan_save_track+0x20/0x40 [ 19.288993] kasan_save_alloc_info+0x40/0x58 [ 19.289042] __kasan_kmalloc+0xd4/0xd8 [ 19.289084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.289136] kmalloc_uaf_16+0x140/0x438 [ 19.289373] kunit_try_run_case+0x170/0x3f0 [ 19.289451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.289690] kthread+0x328/0x630 [ 19.290124] ret_from_fork+0x10/0x20 [ 19.290209] [ 19.290463] Freed by task 168: [ 19.290665] kasan_save_stack+0x3c/0x68 [ 19.291002] kasan_save_track+0x20/0x40 [ 19.291344] kasan_save_free_info+0x4c/0x78 [ 19.291415] __kasan_slab_free+0x6c/0x98 [ 19.291809] kfree+0x214/0x3c8 [ 19.291928] kmalloc_uaf_16+0x190/0x438 [ 19.291982] kunit_try_run_case+0x170/0x3f0 [ 19.292025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.292746] kthread+0x328/0x630 [ 19.292809] ret_from_fork+0x10/0x20 [ 19.293017] [ 19.293149] The buggy address belongs to the object at fff00000c40350e0 [ 19.293149] which belongs to the cache kmalloc-16 of size 16 [ 19.293304] The buggy address is located 0 bytes inside of [ 19.293304] freed 16-byte region [fff00000c40350e0, fff00000c40350f0) [ 19.293372] [ 19.293397] The buggy address belongs to the physical page: [ 19.293440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 19.293513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.293570] page_type: f5(slab) [ 19.293621] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.293677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.293721] page dumped because: kasan: bad access detected [ 19.293755] [ 19.293774] Memory state around the buggy address: [ 19.293819] fff00000c4034f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.293872] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 19.293919] >fff00000c4035080: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 19.293980] ^ [ 19.294070] fff00000c4035100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.294113] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.294186] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 19.266612] ================================================================== [ 19.267007] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 19.267129] Write of size 16 at addr fff00000c4035080 by task kunit_try_catch/166 [ 19.267190] [ 19.267785] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.267891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.267922] Hardware name: linux,dummy-virt (DT) [ 19.267960] Call trace: [ 19.268002] show_stack+0x20/0x38 (C) [ 19.268065] dump_stack_lvl+0x8c/0xd0 [ 19.268119] print_report+0x118/0x608 [ 19.268367] kasan_report+0xdc/0x128 [ 19.268423] __asan_report_store16_noabort+0x20/0x30 [ 19.268481] kmalloc_oob_16+0x3a0/0x3f8 [ 19.268634] kunit_try_run_case+0x170/0x3f0 [ 19.268705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.268775] kthread+0x328/0x630 [ 19.268832] ret_from_fork+0x10/0x20 [ 19.268889] [ 19.269137] Allocated by task 166: [ 19.269180] kasan_save_stack+0x3c/0x68 [ 19.269234] kasan_save_track+0x20/0x40 [ 19.269439] kasan_save_alloc_info+0x40/0x58 [ 19.269495] __kasan_kmalloc+0xd4/0xd8 [ 19.269546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.269648] kmalloc_oob_16+0xb4/0x3f8 [ 19.269728] kunit_try_run_case+0x170/0x3f0 [ 19.269776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.269893] kthread+0x328/0x630 [ 19.270079] ret_from_fork+0x10/0x20 [ 19.270274] [ 19.270343] The buggy address belongs to the object at fff00000c4035080 [ 19.270343] which belongs to the cache kmalloc-16 of size 16 [ 19.270418] The buggy address is located 0 bytes inside of [ 19.270418] allocated 13-byte region [fff00000c4035080, fff00000c403508d) [ 19.270513] [ 19.270569] The buggy address belongs to the physical page: [ 19.270642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 19.270739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.270807] page_type: f5(slab) [ 19.270909] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.271031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.271080] page dumped because: kasan: bad access detected [ 19.271116] [ 19.271136] Memory state around the buggy address: [ 19.271176] fff00000c4034f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271225] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 19.271272] >fff00000c4035080: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.271319] ^ [ 19.271393] fff00000c4035100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271494] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271538] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 19.247523] ================================================================== [ 19.247602] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 19.247687] Read of size 1 at addr fff00000c5b13e00 by task kunit_try_catch/164 [ 19.247743] [ 19.247788] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.248090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.248137] Hardware name: linux,dummy-virt (DT) [ 19.248207] Call trace: [ 19.248785] show_stack+0x20/0x38 (C) [ 19.248871] dump_stack_lvl+0x8c/0xd0 [ 19.248927] print_report+0x118/0x608 [ 19.248994] kasan_report+0xdc/0x128 [ 19.249252] __asan_report_load1_noabort+0x20/0x30 [ 19.249497] krealloc_uaf+0x4c8/0x520 [ 19.249791] kunit_try_run_case+0x170/0x3f0 [ 19.249881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.250122] kthread+0x328/0x630 [ 19.250192] ret_from_fork+0x10/0x20 [ 19.250252] [ 19.250275] Allocated by task 164: [ 19.250473] kasan_save_stack+0x3c/0x68 [ 19.250711] kasan_save_track+0x20/0x40 [ 19.250847] kasan_save_alloc_info+0x40/0x58 [ 19.251041] __kasan_kmalloc+0xd4/0xd8 [ 19.251095] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.251247] krealloc_uaf+0xc8/0x520 [ 19.251358] kunit_try_run_case+0x170/0x3f0 [ 19.251446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.251566] kthread+0x328/0x630 [ 19.251833] ret_from_fork+0x10/0x20 [ 19.252018] [ 19.252055] Freed by task 164: [ 19.252249] kasan_save_stack+0x3c/0x68 [ 19.252366] kasan_save_track+0x20/0x40 [ 19.252410] kasan_save_free_info+0x4c/0x78 [ 19.252481] __kasan_slab_free+0x6c/0x98 [ 19.252538] kfree+0x214/0x3c8 [ 19.252603] krealloc_uaf+0x12c/0x520 [ 19.252919] kunit_try_run_case+0x170/0x3f0 [ 19.253076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.253132] kthread+0x328/0x630 [ 19.253195] ret_from_fork+0x10/0x20 [ 19.253245] [ 19.253270] The buggy address belongs to the object at fff00000c5b13e00 [ 19.253270] which belongs to the cache kmalloc-256 of size 256 [ 19.253484] The buggy address is located 0 bytes inside of [ 19.253484] freed 256-byte region [fff00000c5b13e00, fff00000c5b13f00) [ 19.253695] [ 19.253741] The buggy address belongs to the physical page: [ 19.253781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.253870] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.253926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.254352] page_type: f5(slab) [ 19.254535] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.254658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.255028] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.255105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.255162] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.255217] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.255258] page dumped because: kasan: bad access detected [ 19.255292] [ 19.255311] Memory state around the buggy address: [ 19.255348] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255394] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255438] >fff00000c5b13e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.255476] ^ [ 19.255509] fff00000c5b13e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.255553] fff00000c5b13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255593] ================================================================== [ 19.237328] ================================================================== [ 19.237693] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 19.237798] Read of size 1 at addr fff00000c5b13e00 by task kunit_try_catch/164 [ 19.237877] [ 19.237927] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.238043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.238077] Hardware name: linux,dummy-virt (DT) [ 19.238114] Call trace: [ 19.238654] show_stack+0x20/0x38 (C) [ 19.238942] dump_stack_lvl+0x8c/0xd0 [ 19.239200] print_report+0x118/0x608 [ 19.239269] kasan_report+0xdc/0x128 [ 19.239462] __kasan_check_byte+0x54/0x70 [ 19.239519] krealloc_noprof+0x44/0x360 [ 19.240022] krealloc_uaf+0x180/0x520 [ 19.240130] kunit_try_run_case+0x170/0x3f0 [ 19.240341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.240570] kthread+0x328/0x630 [ 19.240695] ret_from_fork+0x10/0x20 [ 19.240762] [ 19.240950] Allocated by task 164: [ 19.241005] kasan_save_stack+0x3c/0x68 [ 19.241062] kasan_save_track+0x20/0x40 [ 19.241453] kasan_save_alloc_info+0x40/0x58 [ 19.241631] __kasan_kmalloc+0xd4/0xd8 [ 19.241739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.241840] krealloc_uaf+0xc8/0x520 [ 19.241898] kunit_try_run_case+0x170/0x3f0 [ 19.241945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.242210] kthread+0x328/0x630 [ 19.242273] ret_from_fork+0x10/0x20 [ 19.242332] [ 19.242361] Freed by task 164: [ 19.242394] kasan_save_stack+0x3c/0x68 [ 19.242439] kasan_save_track+0x20/0x40 [ 19.242479] kasan_save_free_info+0x4c/0x78 [ 19.242521] __kasan_slab_free+0x6c/0x98 [ 19.242561] kfree+0x214/0x3c8 [ 19.242597] krealloc_uaf+0x12c/0x520 [ 19.242636] kunit_try_run_case+0x170/0x3f0 [ 19.242675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.242723] kthread+0x328/0x630 [ 19.242761] ret_from_fork+0x10/0x20 [ 19.242801] [ 19.242838] The buggy address belongs to the object at fff00000c5b13e00 [ 19.242838] which belongs to the cache kmalloc-256 of size 256 [ 19.242962] The buggy address is located 0 bytes inside of [ 19.242962] freed 256-byte region [fff00000c5b13e00, fff00000c5b13f00) [ 19.243069] [ 19.243098] The buggy address belongs to the physical page: [ 19.243137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.243209] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.243263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.243324] page_type: f5(slab) [ 19.243374] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.243429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.243498] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.243552] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.243603] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.243674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.243733] page dumped because: kasan: bad access detected [ 19.243769] [ 19.243790] Memory state around the buggy address: [ 19.243827] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.243889] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.243936] >fff00000c5b13e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.244334] ^ [ 19.244402] fff00000c5b13e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.244453] fff00000c5b13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.244819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 19.209407] ================================================================== [ 19.209476] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 19.209549] Write of size 1 at addr fff00000c65620ea by task kunit_try_catch/162 [ 19.209605] [ 19.209645] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.209739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.209770] Hardware name: linux,dummy-virt (DT) [ 19.209805] Call trace: [ 19.209844] show_stack+0x20/0x38 (C) [ 19.209906] dump_stack_lvl+0x8c/0xd0 [ 19.209958] print_report+0x118/0x608 [ 19.210028] kasan_report+0xdc/0x128 [ 19.210081] __asan_report_store1_noabort+0x20/0x30 [ 19.210139] krealloc_less_oob_helper+0xae4/0xc50 [ 19.210192] krealloc_large_less_oob+0x20/0x38 [ 19.210245] kunit_try_run_case+0x170/0x3f0 [ 19.210296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.210354] kthread+0x328/0x630 [ 19.210406] ret_from_fork+0x10/0x20 [ 19.210691] [ 19.210724] The buggy address belongs to the physical page: [ 19.210774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.210851] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.210994] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.211054] page_type: f8(unknown) [ 19.211370] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.211453] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.211527] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.211655] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.211740] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.212073] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.212121] page dumped because: kasan: bad access detected [ 19.212168] [ 19.212233] Memory state around the buggy address: [ 19.212287] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.212510] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.212593] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.212638] ^ [ 19.212994] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.213252] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.213499] ================================================================== [ 19.133452] ================================================================== [ 19.133686] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 19.134064] Write of size 1 at addr fff00000c5b13cc9 by task kunit_try_catch/158 [ 19.134130] [ 19.134183] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.134291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.134322] Hardware name: linux,dummy-virt (DT) [ 19.134361] Call trace: [ 19.134811] show_stack+0x20/0x38 (C) [ 19.134982] dump_stack_lvl+0x8c/0xd0 [ 19.135244] print_report+0x118/0x608 [ 19.135300] kasan_report+0xdc/0x128 [ 19.135349] __asan_report_store1_noabort+0x20/0x30 [ 19.135572] krealloc_less_oob_helper+0xa48/0xc50 [ 19.135708] krealloc_less_oob+0x20/0x38 [ 19.135806] kunit_try_run_case+0x170/0x3f0 [ 19.135932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.136005] kthread+0x328/0x630 [ 19.136118] ret_from_fork+0x10/0x20 [ 19.136189] [ 19.136235] Allocated by task 158: [ 19.136314] kasan_save_stack+0x3c/0x68 [ 19.136367] kasan_save_track+0x20/0x40 [ 19.136422] kasan_save_alloc_info+0x40/0x58 [ 19.136462] __kasan_krealloc+0x118/0x178 [ 19.136501] krealloc_noprof+0x128/0x360 [ 19.136539] krealloc_less_oob_helper+0x168/0xc50 [ 19.136617] krealloc_less_oob+0x20/0x38 [ 19.136688] kunit_try_run_case+0x170/0x3f0 [ 19.137271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.137530] kthread+0x328/0x630 [ 19.137580] ret_from_fork+0x10/0x20 [ 19.137920] [ 19.137947] The buggy address belongs to the object at fff00000c5b13c00 [ 19.137947] which belongs to the cache kmalloc-256 of size 256 [ 19.138030] The buggy address is located 0 bytes to the right of [ 19.138030] allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9) [ 19.138099] [ 19.138124] The buggy address belongs to the physical page: [ 19.138163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.138222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.138274] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.138338] page_type: f5(slab) [ 19.138388] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.138455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.138516] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.138569] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.138622] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.138674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.138718] page dumped because: kasan: bad access detected [ 19.138753] [ 19.138773] Memory state around the buggy address: [ 19.139223] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.139336] fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.139390] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.139435] ^ [ 19.139491] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.139728] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.139779] ================================================================== [ 19.191826] ================================================================== [ 19.191913] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 19.192095] Write of size 1 at addr fff00000c65620c9 by task kunit_try_catch/162 [ 19.192184] [ 19.192242] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.192342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.192374] Hardware name: linux,dummy-virt (DT) [ 19.192410] Call trace: [ 19.192444] show_stack+0x20/0x38 (C) [ 19.192563] dump_stack_lvl+0x8c/0xd0 [ 19.192660] print_report+0x118/0x608 [ 19.192760] kasan_report+0xdc/0x128 [ 19.192842] __asan_report_store1_noabort+0x20/0x30 [ 19.192906] krealloc_less_oob_helper+0xa48/0xc50 [ 19.193541] krealloc_large_less_oob+0x20/0x38 [ 19.193732] kunit_try_run_case+0x170/0x3f0 [ 19.193792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.193886] kthread+0x328/0x630 [ 19.193993] ret_from_fork+0x10/0x20 [ 19.194100] [ 19.194127] The buggy address belongs to the physical page: [ 19.194165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.194225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.194277] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.194338] page_type: f8(unknown) [ 19.194388] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.194457] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.194519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.194642] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.194768] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.194876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.195169] page dumped because: kasan: bad access detected [ 19.195331] [ 19.195393] Memory state around the buggy address: [ 19.195586] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.195736] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.196014] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.196176] ^ [ 19.196390] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.196721] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.197137] ================================================================== [ 19.160968] ================================================================== [ 19.161044] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 19.161111] Write of size 1 at addr fff00000c5b13ceb by task kunit_try_catch/158 [ 19.161162] [ 19.161198] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.161282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.161310] Hardware name: linux,dummy-virt (DT) [ 19.161342] Call trace: [ 19.161365] show_stack+0x20/0x38 (C) [ 19.161418] dump_stack_lvl+0x8c/0xd0 [ 19.161468] print_report+0x118/0x608 [ 19.161518] kasan_report+0xdc/0x128 [ 19.161568] __asan_report_store1_noabort+0x20/0x30 [ 19.161622] krealloc_less_oob_helper+0xa58/0xc50 [ 19.161674] krealloc_less_oob+0x20/0x38 [ 19.161723] kunit_try_run_case+0x170/0x3f0 [ 19.161773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.161860] kthread+0x328/0x630 [ 19.161915] ret_from_fork+0x10/0x20 [ 19.162906] [ 19.162961] Allocated by task 158: [ 19.163018] kasan_save_stack+0x3c/0x68 [ 19.163072] kasan_save_track+0x20/0x40 [ 19.163114] kasan_save_alloc_info+0x40/0x58 [ 19.163156] __kasan_krealloc+0x118/0x178 [ 19.163196] krealloc_noprof+0x128/0x360 [ 19.163659] krealloc_less_oob_helper+0x168/0xc50 [ 19.163750] krealloc_less_oob+0x20/0x38 [ 19.163948] kunit_try_run_case+0x170/0x3f0 [ 19.164024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.164070] kthread+0x328/0x630 [ 19.164177] ret_from_fork+0x10/0x20 [ 19.164317] [ 19.164344] The buggy address belongs to the object at fff00000c5b13c00 [ 19.164344] which belongs to the cache kmalloc-256 of size 256 [ 19.164415] The buggy address is located 34 bytes to the right of [ 19.164415] allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9) [ 19.164479] [ 19.164502] The buggy address belongs to the physical page: [ 19.164536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.164589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.164636] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.164939] page_type: f5(slab) [ 19.165112] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.165177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.165246] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.165330] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.165404] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.165462] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.165505] page dumped because: kasan: bad access detected [ 19.165541] [ 19.165562] Memory state around the buggy address: [ 19.165619] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.165672] fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.165719] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.165936] ^ [ 19.166339] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.166559] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.166621] ================================================================== [ 19.198107] ================================================================== [ 19.198182] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 19.198330] Write of size 1 at addr fff00000c65620d0 by task kunit_try_catch/162 [ 19.198388] [ 19.198431] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.198535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.198566] Hardware name: linux,dummy-virt (DT) [ 19.198602] Call trace: [ 19.198629] show_stack+0x20/0x38 (C) [ 19.198690] dump_stack_lvl+0x8c/0xd0 [ 19.198876] print_report+0x118/0x608 [ 19.198982] kasan_report+0xdc/0x128 [ 19.199069] __asan_report_store1_noabort+0x20/0x30 [ 19.199143] krealloc_less_oob_helper+0xb9c/0xc50 [ 19.199199] krealloc_large_less_oob+0x20/0x38 [ 19.199251] kunit_try_run_case+0x170/0x3f0 [ 19.199304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.199361] kthread+0x328/0x630 [ 19.199416] ret_from_fork+0x10/0x20 [ 19.199485] [ 19.199514] The buggy address belongs to the physical page: [ 19.199551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.199612] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.199772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.199933] page_type: f8(unknown) [ 19.200191] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.200421] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.200476] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.200569] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.200623] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.200674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.200717] page dumped because: kasan: bad access detected [ 19.200758] [ 19.200795] Memory state around the buggy address: [ 19.200849] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.200951] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.201007] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.201048] ^ [ 19.201194] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.201330] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.201598] ================================================================== [ 19.141202] ================================================================== [ 19.141319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 19.141399] Write of size 1 at addr fff00000c5b13cd0 by task kunit_try_catch/158 [ 19.141453] [ 19.141706] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.141841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.141877] Hardware name: linux,dummy-virt (DT) [ 19.141914] Call trace: [ 19.141998] show_stack+0x20/0x38 (C) [ 19.142069] dump_stack_lvl+0x8c/0xd0 [ 19.142123] print_report+0x118/0x608 [ 19.142504] kasan_report+0xdc/0x128 [ 19.142659] __asan_report_store1_noabort+0x20/0x30 [ 19.142719] krealloc_less_oob_helper+0xb9c/0xc50 [ 19.142809] krealloc_less_oob+0x20/0x38 [ 19.142873] kunit_try_run_case+0x170/0x3f0 [ 19.142929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.142995] kthread+0x328/0x630 [ 19.143049] ret_from_fork+0x10/0x20 [ 19.143748] [ 19.143853] Allocated by task 158: [ 19.143890] kasan_save_stack+0x3c/0x68 [ 19.143948] kasan_save_track+0x20/0x40 [ 19.144098] kasan_save_alloc_info+0x40/0x58 [ 19.144146] __kasan_krealloc+0x118/0x178 [ 19.144187] krealloc_noprof+0x128/0x360 [ 19.144566] krealloc_less_oob_helper+0x168/0xc50 [ 19.144620] krealloc_less_oob+0x20/0x38 [ 19.144808] kunit_try_run_case+0x170/0x3f0 [ 19.144853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.145184] kthread+0x328/0x630 [ 19.145268] ret_from_fork+0x10/0x20 [ 19.145331] [ 19.145449] The buggy address belongs to the object at fff00000c5b13c00 [ 19.145449] which belongs to the cache kmalloc-256 of size 256 [ 19.145522] The buggy address is located 7 bytes to the right of [ 19.145522] allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9) [ 19.145593] [ 19.145617] The buggy address belongs to the physical page: [ 19.145652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.146137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.146261] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.146324] page_type: f5(slab) [ 19.146382] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.146473] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.146591] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.146772] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.146863] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.146916] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.146958] page dumped because: kasan: bad access detected [ 19.147004] [ 19.147025] Memory state around the buggy address: [ 19.147083] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.147137] fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.147184] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.147223] ^ [ 19.147263] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.147307] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.147346] ================================================================== [ 19.201847] ================================================================== [ 19.201900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 19.201964] Write of size 1 at addr fff00000c65620da by task kunit_try_catch/162 [ 19.202367] [ 19.202425] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.203276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.203670] Hardware name: linux,dummy-virt (DT) [ 19.203717] Call trace: [ 19.203752] show_stack+0x20/0x38 (C) [ 19.203832] dump_stack_lvl+0x8c/0xd0 [ 19.203933] print_report+0x118/0x608 [ 19.204013] kasan_report+0xdc/0x128 [ 19.204075] __asan_report_store1_noabort+0x20/0x30 [ 19.204132] krealloc_less_oob_helper+0xa80/0xc50 [ 19.204187] krealloc_large_less_oob+0x20/0x38 [ 19.204412] kunit_try_run_case+0x170/0x3f0 [ 19.204514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.204803] kthread+0x328/0x630 [ 19.204863] ret_from_fork+0x10/0x20 [ 19.205027] [ 19.205188] The buggy address belongs to the physical page: [ 19.205475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.205540] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.205608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.206178] page_type: f8(unknown) [ 19.206285] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.206359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.206485] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.206542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.206595] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.206647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.206689] page dumped because: kasan: bad access detected [ 19.207010] [ 19.207037] Memory state around the buggy address: [ 19.207086] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.207137] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.207274] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.207380] ^ [ 19.207670] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.207735] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.207866] ================================================================== [ 19.149603] ================================================================== [ 19.149821] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 19.149918] Write of size 1 at addr fff00000c5b13cda by task kunit_try_catch/158 [ 19.149986] [ 19.150031] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.150328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.150400] Hardware name: linux,dummy-virt (DT) [ 19.150440] Call trace: [ 19.150565] show_stack+0x20/0x38 (C) [ 19.150683] dump_stack_lvl+0x8c/0xd0 [ 19.150742] print_report+0x118/0x608 [ 19.150796] kasan_report+0xdc/0x128 [ 19.150870] __asan_report_store1_noabort+0x20/0x30 [ 19.150926] krealloc_less_oob_helper+0xa80/0xc50 [ 19.151097] krealloc_less_oob+0x20/0x38 [ 19.151183] kunit_try_run_case+0x170/0x3f0 [ 19.151331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.151428] kthread+0x328/0x630 [ 19.151482] ret_from_fork+0x10/0x20 [ 19.151534] [ 19.151555] Allocated by task 158: [ 19.151586] kasan_save_stack+0x3c/0x68 [ 19.151631] kasan_save_track+0x20/0x40 [ 19.151697] kasan_save_alloc_info+0x40/0x58 [ 19.151756] __kasan_krealloc+0x118/0x178 [ 19.151804] krealloc_noprof+0x128/0x360 [ 19.151888] krealloc_less_oob_helper+0x168/0xc50 [ 19.151934] krealloc_less_oob+0x20/0x38 [ 19.151981] kunit_try_run_case+0x170/0x3f0 [ 19.152032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.152121] kthread+0x328/0x630 [ 19.152192] ret_from_fork+0x10/0x20 [ 19.152263] [ 19.152307] The buggy address belongs to the object at fff00000c5b13c00 [ 19.152307] which belongs to the cache kmalloc-256 of size 256 [ 19.152366] The buggy address is located 17 bytes to the right of [ 19.152366] allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9) [ 19.152435] [ 19.152479] The buggy address belongs to the physical page: [ 19.152538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.152623] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.152671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.152778] page_type: f5(slab) [ 19.152873] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.152979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.153034] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.153082] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.153131] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.153182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.153680] page dumped because: kasan: bad access detected [ 19.153865] [ 19.153946] Memory state around the buggy address: [ 19.154031] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154142] fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.154244] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.154287] ^ [ 19.154332] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154377] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154416] ================================================================== [ 19.155062] ================================================================== [ 19.155125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 19.155196] Write of size 1 at addr fff00000c5b13cea by task kunit_try_catch/158 [ 19.155252] [ 19.155291] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.155381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.155409] Hardware name: linux,dummy-virt (DT) [ 19.155443] Call trace: [ 19.155468] show_stack+0x20/0x38 (C) [ 19.155524] dump_stack_lvl+0x8c/0xd0 [ 19.155576] print_report+0x118/0x608 [ 19.155627] kasan_report+0xdc/0x128 [ 19.155677] __asan_report_store1_noabort+0x20/0x30 [ 19.155733] krealloc_less_oob_helper+0xae4/0xc50 [ 19.155786] krealloc_less_oob+0x20/0x38 [ 19.155834] kunit_try_run_case+0x170/0x3f0 [ 19.155883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.155938] kthread+0x328/0x630 [ 19.156407] ret_from_fork+0x10/0x20 [ 19.156528] [ 19.156570] Allocated by task 158: [ 19.156630] kasan_save_stack+0x3c/0x68 [ 19.156710] kasan_save_track+0x20/0x40 [ 19.156752] kasan_save_alloc_info+0x40/0x58 [ 19.156835] __kasan_krealloc+0x118/0x178 [ 19.156914] krealloc_noprof+0x128/0x360 [ 19.157009] krealloc_less_oob_helper+0x168/0xc50 [ 19.157067] krealloc_less_oob+0x20/0x38 [ 19.157126] kunit_try_run_case+0x170/0x3f0 [ 19.157205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.157294] kthread+0x328/0x630 [ 19.157373] ret_from_fork+0x10/0x20 [ 19.157452] [ 19.157475] The buggy address belongs to the object at fff00000c5b13c00 [ 19.157475] which belongs to the cache kmalloc-256 of size 256 [ 19.157535] The buggy address is located 33 bytes to the right of [ 19.157535] allocated 201-byte region [fff00000c5b13c00, fff00000c5b13cc9) [ 19.157602] [ 19.157624] The buggy address belongs to the physical page: [ 19.157657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.157712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.157763] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.157831] page_type: f5(slab) [ 19.157881] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.157938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.158005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.158060] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.158112] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.158163] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.158204] page dumped because: kasan: bad access detected [ 19.158238] [ 19.158257] Memory state around the buggy address: [ 19.158291] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.158336] fff00000c5b13c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.158381] >fff00000c5b13c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.159379] ^ [ 19.159448] fff00000c5b13d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.159672] fff00000c5b13d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.159729] ================================================================== [ 19.214289] ================================================================== [ 19.214356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 19.214427] Write of size 1 at addr fff00000c65620eb by task kunit_try_catch/162 [ 19.214703] [ 19.214917] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.215220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.215266] Hardware name: linux,dummy-virt (DT) [ 19.215337] Call trace: [ 19.215571] show_stack+0x20/0x38 (C) [ 19.215769] dump_stack_lvl+0x8c/0xd0 [ 19.215882] print_report+0x118/0x608 [ 19.215938] kasan_report+0xdc/0x128 [ 19.216043] __asan_report_store1_noabort+0x20/0x30 [ 19.216107] krealloc_less_oob_helper+0xa58/0xc50 [ 19.216407] krealloc_large_less_oob+0x20/0x38 [ 19.216575] kunit_try_run_case+0x170/0x3f0 [ 19.216640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.216861] kthread+0x328/0x630 [ 19.217063] ret_from_fork+0x10/0x20 [ 19.217141] [ 19.217167] The buggy address belongs to the physical page: [ 19.217205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.217264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.217316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.217374] page_type: f8(unknown) [ 19.217730] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.217802] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.218161] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.218225] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.218411] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.218484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.218539] page dumped because: kasan: bad access detected [ 19.218838] [ 19.218954] Memory state around the buggy address: [ 19.219153] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.219230] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.219283] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.219502] ^ [ 19.219675] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.219928] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.220006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 19.093671] ================================================================== [ 19.093758] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.093874] Write of size 1 at addr fff00000c5b13aeb by task kunit_try_catch/156 [ 19.093993] [ 19.094043] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.094138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.094168] Hardware name: linux,dummy-virt (DT) [ 19.094205] Call trace: [ 19.094232] show_stack+0x20/0x38 (C) [ 19.094382] dump_stack_lvl+0x8c/0xd0 [ 19.094438] print_report+0x118/0x608 [ 19.094532] kasan_report+0xdc/0x128 [ 19.094583] __asan_report_store1_noabort+0x20/0x30 [ 19.094640] krealloc_more_oob_helper+0x60c/0x678 [ 19.094775] krealloc_more_oob+0x20/0x38 [ 19.094902] kunit_try_run_case+0x170/0x3f0 [ 19.094986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.095047] kthread+0x328/0x630 [ 19.095101] ret_from_fork+0x10/0x20 [ 19.095155] [ 19.095300] Allocated by task 156: [ 19.095390] kasan_save_stack+0x3c/0x68 [ 19.095471] kasan_save_track+0x20/0x40 [ 19.095509] kasan_save_alloc_info+0x40/0x58 [ 19.095794] __kasan_krealloc+0x118/0x178 [ 19.096047] krealloc_noprof+0x128/0x360 [ 19.096312] krealloc_more_oob_helper+0x168/0x678 [ 19.096361] krealloc_more_oob+0x20/0x38 [ 19.096400] kunit_try_run_case+0x170/0x3f0 [ 19.096440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.096485] kthread+0x328/0x630 [ 19.097047] ret_from_fork+0x10/0x20 [ 19.099003] [ 19.099032] The buggy address belongs to the object at fff00000c5b13a00 [ 19.099032] which belongs to the cache kmalloc-256 of size 256 [ 19.099104] The buggy address is located 0 bytes to the right of [ 19.099104] allocated 235-byte region [fff00000c5b13a00, fff00000c5b13aeb) [ 19.099210] [ 19.099256] The buggy address belongs to the physical page: [ 19.099301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.099363] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.099416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.099482] page_type: f5(slab) [ 19.099532] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.099590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.099646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.099698] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.099751] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.099824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.099867] page dumped because: kasan: bad access detected [ 19.099903] [ 19.099923] Memory state around the buggy address: [ 19.099963] fff00000c5b13980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.100023] fff00000c5b13a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.100070] >fff00000c5b13a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.100110] ^ [ 19.100152] fff00000c5b13b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.100323] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.100368] ================================================================== [ 19.175173] ================================================================== [ 19.175256] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.175340] Write of size 1 at addr fff00000c65620eb by task kunit_try_catch/160 [ 19.175396] [ 19.175441] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.175535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.175564] Hardware name: linux,dummy-virt (DT) [ 19.175608] Call trace: [ 19.175660] show_stack+0x20/0x38 (C) [ 19.175735] dump_stack_lvl+0x8c/0xd0 [ 19.175819] print_report+0x118/0x608 [ 19.175924] kasan_report+0xdc/0x128 [ 19.175985] __asan_report_store1_noabort+0x20/0x30 [ 19.176099] krealloc_more_oob_helper+0x60c/0x678 [ 19.176197] krealloc_large_more_oob+0x20/0x38 [ 19.176296] kunit_try_run_case+0x170/0x3f0 [ 19.176397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.176506] kthread+0x328/0x630 [ 19.176606] ret_from_fork+0x10/0x20 [ 19.176704] [ 19.176748] The buggy address belongs to the physical page: [ 19.176831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.176891] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.176941] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.177014] page_type: f8(unknown) [ 19.177064] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.177118] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.177254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.177387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.177443] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.177495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.177537] page dumped because: kasan: bad access detected [ 19.177573] [ 19.177593] Memory state around the buggy address: [ 19.177630] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.177677] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.177751] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.177796] ^ [ 19.177885] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.177947] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.178013] ================================================================== [ 19.101618] ================================================================== [ 19.101767] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.101869] Write of size 1 at addr fff00000c5b13af0 by task kunit_try_catch/156 [ 19.101940] [ 19.102501] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.102633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.102668] Hardware name: linux,dummy-virt (DT) [ 19.102705] Call trace: [ 19.102732] show_stack+0x20/0x38 (C) [ 19.102800] dump_stack_lvl+0x8c/0xd0 [ 19.102852] print_report+0x118/0x608 [ 19.102903] kasan_report+0xdc/0x128 [ 19.102952] __asan_report_store1_noabort+0x20/0x30 [ 19.103024] krealloc_more_oob_helper+0x5c0/0x678 [ 19.103078] krealloc_more_oob+0x20/0x38 [ 19.103126] kunit_try_run_case+0x170/0x3f0 [ 19.103177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.104782] kthread+0x328/0x630 [ 19.105410] ret_from_fork+0x10/0x20 [ 19.105938] [ 19.105966] Allocated by task 156: [ 19.106483] kasan_save_stack+0x3c/0x68 [ 19.106551] kasan_save_track+0x20/0x40 [ 19.106594] kasan_save_alloc_info+0x40/0x58 [ 19.107690] __kasan_krealloc+0x118/0x178 [ 19.107751] krealloc_noprof+0x128/0x360 [ 19.107797] krealloc_more_oob_helper+0x168/0x678 [ 19.107841] krealloc_more_oob+0x20/0x38 [ 19.107881] kunit_try_run_case+0x170/0x3f0 [ 19.107922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.107977] kthread+0x328/0x630 [ 19.108031] ret_from_fork+0x10/0x20 [ 19.108072] [ 19.108096] The buggy address belongs to the object at fff00000c5b13a00 [ 19.108096] which belongs to the cache kmalloc-256 of size 256 [ 19.109700] The buggy address is located 5 bytes to the right of [ 19.109700] allocated 235-byte region [fff00000c5b13a00, fff00000c5b13aeb) [ 19.109824] [ 19.109860] The buggy address belongs to the physical page: [ 19.109901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12 [ 19.112917] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.113024] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.113100] page_type: f5(slab) [ 19.113157] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.114332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.114528] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.114587] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.114641] head: 0bfffe0000000001 ffffc1ffc316c481 00000000ffffffff 00000000ffffffff [ 19.115266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.115679] page dumped because: kasan: bad access detected [ 19.115851] [ 19.115874] Memory state around the buggy address: [ 19.115916] fff00000c5b13980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.115965] fff00000c5b13a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.116627] >fff00000c5b13a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.116671] ^ [ 19.116731] fff00000c5b13b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.116782] fff00000c5b13b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.116824] ================================================================== [ 19.180551] ================================================================== [ 19.180631] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.180705] Write of size 1 at addr fff00000c65620f0 by task kunit_try_catch/160 [ 19.180759] [ 19.180799] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.180890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.180919] Hardware name: linux,dummy-virt (DT) [ 19.180954] Call trace: [ 19.180991] show_stack+0x20/0x38 (C) [ 19.182417] dump_stack_lvl+0x8c/0xd0 [ 19.182566] print_report+0x118/0x608 [ 19.182630] kasan_report+0xdc/0x128 [ 19.182682] __asan_report_store1_noabort+0x20/0x30 [ 19.182772] krealloc_more_oob_helper+0x5c0/0x678 [ 19.182827] krealloc_large_more_oob+0x20/0x38 [ 19.182879] kunit_try_run_case+0x170/0x3f0 [ 19.182932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.183003] kthread+0x328/0x630 [ 19.183094] ret_from_fork+0x10/0x20 [ 19.183187] [ 19.183735] The buggy address belongs to the physical page: [ 19.183860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 19.183928] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.184145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.184296] page_type: f8(unknown) [ 19.184396] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.184454] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.184508] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.184559] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.184611] head: 0bfffe0000000002 ffffc1ffc3195801 00000000ffffffff 00000000ffffffff [ 19.184662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.184714] page dumped because: kasan: bad access detected [ 19.184767] [ 19.184788] Memory state around the buggy address: [ 19.184826] fff00000c6561f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.184873] fff00000c6562000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.184918] >fff00000c6562080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.184958] ^ [ 19.185019] fff00000c6562100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.185066] fff00000c6562180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.185107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 19.057718] ================================================================== [ 19.057916] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 19.058037] Free of addr fff00000c655c001 by task kunit_try_catch/150 [ 19.058277] [ 19.058335] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.058485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.058530] Hardware name: linux,dummy-virt (DT) [ 19.058649] Call trace: [ 19.058693] show_stack+0x20/0x38 (C) [ 19.058772] dump_stack_lvl+0x8c/0xd0 [ 19.058939] print_report+0x118/0x608 [ 19.059217] kasan_report_invalid_free+0xc0/0xe8 [ 19.059774] __kasan_kfree_large+0x5c/0xa8 [ 19.059856] free_large_kmalloc+0x64/0x190 [ 19.060173] kfree+0x270/0x3c8 [ 19.060591] kmalloc_large_invalid_free+0x108/0x270 [ 19.060687] kunit_try_run_case+0x170/0x3f0 [ 19.060951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.061395] kthread+0x328/0x630 [ 19.061472] ret_from_fork+0x10/0x20 [ 19.061532] [ 19.061682] The buggy address belongs to the physical page: [ 19.061743] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c [ 19.062067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.062152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.062307] page_type: f8(unknown) [ 19.062609] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.062676] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.062735] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.062789] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.062842] head: 0bfffe0000000002 ffffc1ffc3195701 00000000ffffffff 00000000ffffffff [ 19.062895] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.062938] page dumped because: kasan: bad access detected [ 19.062986] [ 19.063008] Memory state around the buggy address: [ 19.063047] fff00000c655bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.063091] fff00000c655bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.063135] >fff00000c655c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.063172] ^ [ 19.063203] fff00000c655c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.063244] fff00000c655c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.063305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 19.025756] ================================================================== [ 19.025873] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 19.025965] Read of size 1 at addr fff00000c655c000 by task kunit_try_catch/148 [ 19.026965] [ 19.027567] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.028013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.028442] Hardware name: linux,dummy-virt (DT) [ 19.028501] Call trace: [ 19.028535] show_stack+0x20/0x38 (C) [ 19.028604] dump_stack_lvl+0x8c/0xd0 [ 19.028990] print_report+0x118/0x608 [ 19.029079] kasan_report+0xdc/0x128 [ 19.029145] __asan_report_load1_noabort+0x20/0x30 [ 19.029206] kmalloc_large_uaf+0x2cc/0x2f8 [ 19.029261] kunit_try_run_case+0x170/0x3f0 [ 19.029583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.029855] kthread+0x328/0x630 [ 19.029939] ret_from_fork+0x10/0x20 [ 19.030012] [ 19.030093] The buggy address belongs to the physical page: [ 19.030139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c [ 19.030203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.030569] raw: 0bfffe0000000000 ffffc1ffc3195808 fff00000da47dc00 0000000000000000 [ 19.030637] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.030909] page dumped because: kasan: bad access detected [ 19.030957] [ 19.030996] Memory state around the buggy address: [ 19.031039] fff00000c655bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.031089] fff00000c655bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.031281] >fff00000c655c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.031394] ^ [ 19.031477] fff00000c655c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.031538] fff00000c655c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.031581] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 19.005515] ================================================================== [ 19.005987] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 19.006168] Write of size 1 at addr fff00000c655e00a by task kunit_try_catch/146 [ 19.006229] [ 19.006456] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.006846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.006891] Hardware name: linux,dummy-virt (DT) [ 19.006953] Call trace: [ 19.007042] show_stack+0x20/0x38 (C) [ 19.007111] dump_stack_lvl+0x8c/0xd0 [ 19.007196] print_report+0x118/0x608 [ 19.007255] kasan_report+0xdc/0x128 [ 19.007592] __asan_report_store1_noabort+0x20/0x30 [ 19.007762] kmalloc_large_oob_right+0x278/0x2b8 [ 19.008010] kunit_try_run_case+0x170/0x3f0 [ 19.008082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.008551] kthread+0x328/0x630 [ 19.008886] ret_from_fork+0x10/0x20 [ 19.009086] [ 19.009153] The buggy address belongs to the physical page: [ 19.009360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655c [ 19.009661] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.009725] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.010233] page_type: f8(unknown) [ 19.010329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.010435] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.010545] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.010985] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.011067] head: 0bfffe0000000002 ffffc1ffc3195701 00000000ffffffff 00000000ffffffff [ 19.011189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.011296] page dumped because: kasan: bad access detected [ 19.011712] [ 19.011761] Memory state around the buggy address: [ 19.011912] fff00000c655df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.012075] fff00000c655df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.012124] >fff00000c655e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.012163] ^ [ 19.012197] fff00000c655e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.012239] fff00000c655e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.012284] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 18.975838] ================================================================== [ 18.976276] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.976485] Write of size 1 at addr fff00000c6595f00 by task kunit_try_catch/144 [ 18.976730] [ 18.976807] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.976911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.976942] Hardware name: linux,dummy-virt (DT) [ 18.976995] Call trace: [ 18.977027] show_stack+0x20/0x38 (C) [ 18.977090] dump_stack_lvl+0x8c/0xd0 [ 18.977144] print_report+0x118/0x608 [ 18.977194] kasan_report+0xdc/0x128 [ 18.977244] __asan_report_store1_noabort+0x20/0x30 [ 18.977300] kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.977355] kunit_try_run_case+0x170/0x3f0 [ 18.977408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.977464] kthread+0x328/0x630 [ 18.977516] ret_from_fork+0x10/0x20 [ 18.977571] [ 18.977593] Allocated by task 144: [ 18.977626] kasan_save_stack+0x3c/0x68 [ 18.977675] kasan_save_track+0x20/0x40 [ 18.977718] kasan_save_alloc_info+0x40/0x58 [ 18.977761] __kasan_kmalloc+0xd4/0xd8 [ 18.977801] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.978480] kmalloc_big_oob_right+0xb8/0x2f0 [ 18.978554] kunit_try_run_case+0x170/0x3f0 [ 18.978802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.978857] kthread+0x328/0x630 [ 18.979354] ret_from_fork+0x10/0x20 [ 18.979455] [ 18.979574] The buggy address belongs to the object at fff00000c6594000 [ 18.979574] which belongs to the cache kmalloc-8k of size 8192 [ 18.979686] The buggy address is located 0 bytes to the right of [ 18.979686] allocated 7936-byte region [fff00000c6594000, fff00000c6595f00) [ 18.979898] [ 18.980045] The buggy address belongs to the physical page: [ 18.980268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106590 [ 18.980476] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.980630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.980700] page_type: f5(slab) [ 18.980753] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 18.980811] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.980869] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 18.981567] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.981647] head: 0bfffe0000000003 ffffc1ffc3196401 00000000ffffffff 00000000ffffffff [ 18.982137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.982315] page dumped because: kasan: bad access detected [ 18.982357] [ 18.982382] Memory state around the buggy address: [ 18.982501] fff00000c6595e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.982578] fff00000c6595e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.982624] >fff00000c6595f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.982665] ^ [ 18.982699] fff00000c6595f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.982793] fff00000c6596000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.982854] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 18.936938] ================================================================== [ 18.937057] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.937151] Write of size 1 at addr fff00000c4065078 by task kunit_try_catch/142 [ 18.937271] [ 18.937357] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.937476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.937508] Hardware name: linux,dummy-virt (DT) [ 18.937546] Call trace: [ 18.937574] show_stack+0x20/0x38 (C) [ 18.937649] dump_stack_lvl+0x8c/0xd0 [ 18.937702] print_report+0x118/0x608 [ 18.937753] kasan_report+0xdc/0x128 [ 18.937803] __asan_report_store1_noabort+0x20/0x30 [ 18.937880] kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.937938] kunit_try_run_case+0x170/0x3f0 [ 18.938007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.938068] kthread+0x328/0x630 [ 18.938122] ret_from_fork+0x10/0x20 [ 18.938180] [ 18.938202] Allocated by task 142: [ 18.938773] kasan_save_stack+0x3c/0x68 [ 18.939044] kasan_save_track+0x20/0x40 [ 18.939128] kasan_save_alloc_info+0x40/0x58 [ 18.939177] __kasan_kmalloc+0xd4/0xd8 [ 18.939218] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 18.939371] kmalloc_track_caller_oob_right+0xa8/0x488 [ 18.939427] kunit_try_run_case+0x170/0x3f0 [ 18.939480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.939852] kthread+0x328/0x630 [ 18.939963] ret_from_fork+0x10/0x20 [ 18.940052] [ 18.940178] The buggy address belongs to the object at fff00000c4065000 [ 18.940178] which belongs to the cache kmalloc-128 of size 128 [ 18.940251] The buggy address is located 0 bytes to the right of [ 18.940251] allocated 120-byte region [fff00000c4065000, fff00000c4065078) [ 18.940320] [ 18.940348] The buggy address belongs to the physical page: [ 18.940384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 18.940445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.940502] page_type: f5(slab) [ 18.940553] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.940610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.940653] page dumped because: kasan: bad access detected [ 18.940687] [ 18.941082] Memory state around the buggy address: [ 18.941142] fff00000c4064f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.941253] fff00000c4064f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.941311] >fff00000c4065000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.941438] ^ [ 18.941678] fff00000c4065080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.941751] fff00000c4065100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.942092] ================================================================== [ 18.943296] ================================================================== [ 18.943364] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 18.943783] Write of size 1 at addr fff00000c4065178 by task kunit_try_catch/142 [ 18.944089] [ 18.944149] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.944409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.944445] Hardware name: linux,dummy-virt (DT) [ 18.944482] Call trace: [ 18.944508] show_stack+0x20/0x38 (C) [ 18.944580] dump_stack_lvl+0x8c/0xd0 [ 18.944631] print_report+0x118/0x608 [ 18.944680] kasan_report+0xdc/0x128 [ 18.944726] __asan_report_store1_noabort+0x20/0x30 [ 18.944778] kmalloc_track_caller_oob_right+0x418/0x488 [ 18.944985] kunit_try_run_case+0x170/0x3f0 [ 18.945052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.945173] kthread+0x328/0x630 [ 18.945236] ret_from_fork+0x10/0x20 [ 18.945294] [ 18.945357] Allocated by task 142: [ 18.945393] kasan_save_stack+0x3c/0x68 [ 18.945670] kasan_save_track+0x20/0x40 [ 18.945732] kasan_save_alloc_info+0x40/0x58 [ 18.945778] __kasan_kmalloc+0xd4/0xd8 [ 18.945828] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 18.945881] kmalloc_track_caller_oob_right+0x184/0x488 [ 18.945926] kunit_try_run_case+0x170/0x3f0 [ 18.945967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.946030] kthread+0x328/0x630 [ 18.946069] ret_from_fork+0x10/0x20 [ 18.946108] [ 18.946131] The buggy address belongs to the object at fff00000c4065100 [ 18.946131] which belongs to the cache kmalloc-128 of size 128 [ 18.946194] The buggy address is located 0 bytes to the right of [ 18.946194] allocated 120-byte region [fff00000c4065100, fff00000c4065178) [ 18.946260] [ 18.946283] The buggy address belongs to the physical page: [ 18.946317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 18.946374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.946426] page_type: f5(slab) [ 18.946658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.947005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.947122] page dumped because: kasan: bad access detected [ 18.947330] [ 18.947387] Memory state around the buggy address: [ 18.947428] fff00000c4065000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.947569] fff00000c4065080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.947724] >fff00000c4065100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.947765] ^ [ 18.948077] fff00000c4065180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.948139] fff00000c4065200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.948294] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 18.895961] ================================================================== [ 18.896428] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 18.896733] Read of size 1 at addr fff00000c6533000 by task kunit_try_catch/140 [ 18.896838] [ 18.896919] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.897736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.897890] Hardware name: linux,dummy-virt (DT) [ 18.898048] Call trace: [ 18.898107] show_stack+0x20/0x38 (C) [ 18.898248] dump_stack_lvl+0x8c/0xd0 [ 18.898417] print_report+0x118/0x608 [ 18.898668] kasan_report+0xdc/0x128 [ 18.899057] __asan_report_load1_noabort+0x20/0x30 [ 18.899310] kmalloc_node_oob_right+0x2f4/0x330 [ 18.899471] kunit_try_run_case+0x170/0x3f0 [ 18.899690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.899932] kthread+0x328/0x630 [ 18.900088] ret_from_fork+0x10/0x20 [ 18.900218] [ 18.900329] Allocated by task 140: [ 18.900401] kasan_save_stack+0x3c/0x68 [ 18.900506] kasan_save_track+0x20/0x40 [ 18.900597] kasan_save_alloc_info+0x40/0x58 [ 18.900692] __kasan_kmalloc+0xd4/0xd8 [ 18.900787] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 18.900888] kmalloc_node_oob_right+0xbc/0x330 [ 18.901291] kunit_try_run_case+0x170/0x3f0 [ 18.901401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.901516] kthread+0x328/0x630 [ 18.901696] ret_from_fork+0x10/0x20 [ 18.901910] [ 18.901966] The buggy address belongs to the object at fff00000c6532000 [ 18.901966] which belongs to the cache kmalloc-4k of size 4096 [ 18.902397] The buggy address is located 0 bytes to the right of [ 18.902397] allocated 4096-byte region [fff00000c6532000, fff00000c6533000) [ 18.902738] [ 18.902979] The buggy address belongs to the physical page: [ 18.903297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 18.904191] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.904338] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.904497] page_type: f5(slab) [ 18.904599] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 18.904716] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.904858] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 18.905309] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.906275] head: 0bfffe0000000003 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff [ 18.906864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.906997] page dumped because: kasan: bad access detected [ 18.907390] [ 18.907750] Memory state around the buggy address: [ 18.908143] fff00000c6532f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.908565] fff00000c6532f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.908850] >fff00000c6533000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.909150] ^ [ 18.909265] fff00000c6533080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.909504] fff00000c6533100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.909844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 18.866098] ================================================================== [ 18.866344] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 18.866496] Read of size 1 at addr fff00000c403505f by task kunit_try_catch/138 [ 18.866608] [ 18.866695] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.866906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.866980] Hardware name: linux,dummy-virt (DT) [ 18.867063] Call trace: [ 18.867118] show_stack+0x20/0x38 (C) [ 18.867245] dump_stack_lvl+0x8c/0xd0 [ 18.867360] print_report+0x118/0x608 [ 18.867472] kasan_report+0xdc/0x128 [ 18.867580] __asan_report_load1_noabort+0x20/0x30 [ 18.867703] kmalloc_oob_left+0x2ec/0x320 [ 18.867816] kunit_try_run_case+0x170/0x3f0 [ 18.867937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.868605] kthread+0x328/0x630 [ 18.868802] ret_from_fork+0x10/0x20 [ 18.869277] [ 18.869328] Allocated by task 26: [ 18.869420] kasan_save_stack+0x3c/0x68 [ 18.869608] kasan_save_track+0x20/0x40 [ 18.869838] kasan_save_alloc_info+0x40/0x58 [ 18.869948] __kasan_kmalloc+0xd4/0xd8 [ 18.870049] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 18.870442] kstrdup+0x54/0xc8 [ 18.870542] devtmpfs_work_loop+0x6f8/0xa58 [ 18.870764] devtmpfsd+0x50/0x58 [ 18.871262] kthread+0x328/0x630 [ 18.871429] ret_from_fork+0x10/0x20 [ 18.871554] [ 18.871634] Freed by task 26: [ 18.871763] kasan_save_stack+0x3c/0x68 [ 18.871865] kasan_save_track+0x20/0x40 [ 18.871951] kasan_save_free_info+0x4c/0x78 [ 18.872059] __kasan_slab_free+0x6c/0x98 [ 18.872552] kfree+0x214/0x3c8 [ 18.872658] devtmpfs_work_loop+0x804/0xa58 [ 18.872723] devtmpfsd+0x50/0x58 [ 18.872781] kthread+0x328/0x630 [ 18.872909] ret_from_fork+0x10/0x20 [ 18.873050] [ 18.873114] The buggy address belongs to the object at fff00000c4035040 [ 18.873114] which belongs to the cache kmalloc-16 of size 16 [ 18.873268] The buggy address is located 15 bytes to the right of [ 18.873268] allocated 16-byte region [fff00000c4035040, fff00000c4035050) [ 18.873438] [ 18.873507] The buggy address belongs to the physical page: [ 18.873591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 18.873737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.873921] page_type: f5(slab) [ 18.874090] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.874239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.874351] page dumped because: kasan: bad access detected [ 18.874424] [ 18.874511] Memory state around the buggy address: [ 18.874582] fff00000c4034f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.874682] fff00000c4034f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.874791] >fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 07 fc fc [ 18.874878] ^ [ 18.875023] fff00000c4035080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.875373] fff00000c4035100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.875695] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 18.796469] ================================================================== [ 18.796917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.798046] Write of size 1 at addr fff00000c1807f73 by task kunit_try_catch/136 [ 18.798185] [ 18.799441] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.799639] Tainted: [N]=TEST [ 18.799680] Hardware name: linux,dummy-virt (DT) [ 18.799962] Call trace: [ 18.800197] show_stack+0x20/0x38 (C) [ 18.800368] dump_stack_lvl+0x8c/0xd0 [ 18.800442] print_report+0x118/0x608 [ 18.800498] kasan_report+0xdc/0x128 [ 18.800548] __asan_report_store1_noabort+0x20/0x30 [ 18.800605] kmalloc_oob_right+0x5a4/0x660 [ 18.800654] kunit_try_run_case+0x170/0x3f0 [ 18.800709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.800766] kthread+0x328/0x630 [ 18.800817] ret_from_fork+0x10/0x20 [ 18.801024] [ 18.801082] Allocated by task 136: [ 18.801211] kasan_save_stack+0x3c/0x68 [ 18.801286] kasan_save_track+0x20/0x40 [ 18.801330] kasan_save_alloc_info+0x40/0x58 [ 18.801373] __kasan_kmalloc+0xd4/0xd8 [ 18.801411] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.801453] kmalloc_oob_right+0xb0/0x660 [ 18.801491] kunit_try_run_case+0x170/0x3f0 [ 18.801530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.801575] kthread+0x328/0x630 [ 18.801614] ret_from_fork+0x10/0x20 [ 18.801677] [ 18.801749] The buggy address belongs to the object at fff00000c1807f00 [ 18.801749] which belongs to the cache kmalloc-128 of size 128 [ 18.801872] The buggy address is located 0 bytes to the right of [ 18.801872] allocated 115-byte region [fff00000c1807f00, fff00000c1807f73) [ 18.801951] [ 18.802059] The buggy address belongs to the physical page: [ 18.802274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101807 [ 18.802609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.802986] page_type: f5(slab) [ 18.803387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.803462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.803595] page dumped because: kasan: bad access detected [ 18.803645] [ 18.803676] Memory state around the buggy address: [ 18.803953] fff00000c1807e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.804048] fff00000c1807e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.804115] >fff00000c1807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.804177] ^ [ 18.804276] fff00000c1807f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.804326] fff00000c1808000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.804398] ================================================================== [ 18.812512] ================================================================== [ 18.812647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.812869] Write of size 1 at addr fff00000c1807f78 by task kunit_try_catch/136 [ 18.813055] [ 18.813142] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.813617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.813693] Hardware name: linux,dummy-virt (DT) [ 18.813776] Call trace: [ 18.814285] show_stack+0x20/0x38 (C) [ 18.814494] dump_stack_lvl+0x8c/0xd0 [ 18.814642] print_report+0x118/0x608 [ 18.814751] kasan_report+0xdc/0x128 [ 18.814857] __asan_report_store1_noabort+0x20/0x30 [ 18.815209] kmalloc_oob_right+0x538/0x660 [ 18.815335] kunit_try_run_case+0x170/0x3f0 [ 18.815482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.815709] kthread+0x328/0x630 [ 18.816040] ret_from_fork+0x10/0x20 [ 18.816461] [ 18.816509] Allocated by task 136: [ 18.816585] kasan_save_stack+0x3c/0x68 [ 18.816680] kasan_save_track+0x20/0x40 [ 18.816764] kasan_save_alloc_info+0x40/0x58 [ 18.816875] __kasan_kmalloc+0xd4/0xd8 [ 18.817110] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.817275] kmalloc_oob_right+0xb0/0x660 [ 18.817384] kunit_try_run_case+0x170/0x3f0 [ 18.817598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.817799] kthread+0x328/0x630 [ 18.818267] ret_from_fork+0x10/0x20 [ 18.818373] [ 18.818426] The buggy address belongs to the object at fff00000c1807f00 [ 18.818426] which belongs to the cache kmalloc-128 of size 128 [ 18.818882] The buggy address is located 5 bytes to the right of [ 18.818882] allocated 115-byte region [fff00000c1807f00, fff00000c1807f73) [ 18.819121] [ 18.819284] The buggy address belongs to the physical page: [ 18.819595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101807 [ 18.819867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.820145] page_type: f5(slab) [ 18.820327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.820549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.821050] page dumped because: kasan: bad access detected [ 18.821187] [ 18.821232] Memory state around the buggy address: [ 18.821322] fff00000c1807e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.821435] fff00000c1807e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.821541] >fff00000c1807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.821634] ^ [ 18.821735] fff00000c1807f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.821858] fff00000c1808000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.821960] ================================================================== [ 18.825184] ================================================================== [ 18.825445] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.825697] Read of size 1 at addr fff00000c1807f80 by task kunit_try_catch/136 [ 18.825987] [ 18.826280] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 18.826676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.827091] Hardware name: linux,dummy-virt (DT) [ 18.827291] Call trace: [ 18.827387] show_stack+0x20/0x38 (C) [ 18.827922] dump_stack_lvl+0x8c/0xd0 [ 18.828192] print_report+0x118/0x608 [ 18.828411] kasan_report+0xdc/0x128 [ 18.828977] __asan_report_load1_noabort+0x20/0x30 [ 18.829161] kmalloc_oob_right+0x5d0/0x660 [ 18.829305] kunit_try_run_case+0x170/0x3f0 [ 18.829424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.829564] kthread+0x328/0x630 [ 18.829683] ret_from_fork+0x10/0x20 [ 18.829816] [ 18.829866] Allocated by task 136: [ 18.829943] kasan_save_stack+0x3c/0x68 [ 18.830058] kasan_save_track+0x20/0x40 [ 18.830153] kasan_save_alloc_info+0x40/0x58 [ 18.830255] __kasan_kmalloc+0xd4/0xd8 [ 18.830822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.831043] kmalloc_oob_right+0xb0/0x660 [ 18.831140] kunit_try_run_case+0x170/0x3f0 [ 18.831227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.831410] kthread+0x328/0x630 [ 18.831613] ret_from_fork+0x10/0x20 [ 18.832143] [ 18.832195] The buggy address belongs to the object at fff00000c1807f00 [ 18.832195] which belongs to the cache kmalloc-128 of size 128 [ 18.832585] The buggy address is located 13 bytes to the right of [ 18.832585] allocated 115-byte region [fff00000c1807f00, fff00000c1807f73) [ 18.832960] [ 18.833114] The buggy address belongs to the physical page: [ 18.833197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101807 [ 18.833348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.833803] page_type: f5(slab) [ 18.834070] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.834210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.834316] page dumped because: kasan: bad access detected [ 18.834737] [ 18.834810] Memory state around the buggy address: [ 18.835065] fff00000c1807e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.835353] fff00000c1807f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.835711] >fff00000c1807f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.835884] ^ [ 18.836117] fff00000c1808000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.836238] fff00000c1808080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.836332] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 101.734044] WARNING: CPU: 0 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 101.735266] Modules linked in: [ 101.735630] CPU: 0 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 101.737426] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 101.737864] Hardware name: linux,dummy-virt (DT) [ 101.738215] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 101.739069] pc : intlog10+0x38/0x48 [ 101.739434] lr : intlog10_test+0xe4/0x200 [ 101.739898] sp : ffff800082467c10 [ 101.740299] x29: ffff800082467c90 x28: 0000000000000000 x27: 0000000000000000 [ 101.740878] x26: 1ffe000019671d21 x25: 0000000000000000 x24: ffff800082467ce0 [ 101.741748] x23: ffff800082467d00 x22: 0000000000000000 x21: 1ffff0001048cf82 [ 101.742422] x20: ffff99d6c6e66fc0 x19: ffff800080087990 x18: 00000000334f0ef9 [ 101.743373] x17: fff0662a116dc000 x16: ffff800080000000 x15: 000000003eb6c79f [ 101.744032] x14: 000000006bc3d84f x13: fff00000c09d4800 x12: ffff733ad959f181 [ 101.745140] x11: 1ffff33ad959f180 x10: ffff733ad959f180 x9 : ffff99d6c441e13c [ 101.745896] x8 : ffff99d6cacf8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 101.746909] x5 : ffff70001048cf82 x4 : 1ffff00010010f3a x3 : 1ffff33ad8dccdf8 [ 101.747767] x2 : 1ffff33ad8dccdf8 x1 : 0000000000000003 x0 : 0000000000000000 [ 101.748562] Call trace: [ 101.748960] intlog10+0x38/0x48 (P) [ 101.749535] kunit_try_run_case+0x170/0x3f0 [ 101.749963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.750589] kthread+0x328/0x630 [ 101.751027] ret_from_fork+0x10/0x20 [ 101.751424] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 101.645724] WARNING: CPU: 0 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 101.647690] Modules linked in: [ 101.648212] CPU: 0 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 101.648776] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 101.649689] Hardware name: linux,dummy-virt (DT) [ 101.650223] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 101.651338] pc : intlog2+0xd8/0xf8 [ 101.652024] lr : intlog2_test+0xe4/0x200 [ 101.652604] sp : ffff8000823a7c10 [ 101.653265] x29: ffff8000823a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 101.654177] x26: 1ffe00001961ad21 x25: 0000000000000000 x24: ffff8000823a7ce0 [ 101.655418] x23: ffff8000823a7d00 x22: 0000000000000000 x21: 1ffff00010474f82 [ 101.656157] x20: ffff99d6c6e66ec0 x19: ffff800080087990 x18: fff00000c1217c98 [ 101.656898] x17: 00000000fc82b209 x16: fff00000c097583c x15: fff00000ff616b08 [ 101.657675] x14: 0000000000018fff x13: 1ffe00001b48f3c5 x12: ffff733ad959f181 [ 101.658905] x11: 1ffff33ad959f180 x10: ffff733ad959f180 x9 : ffff99d6c441e33c [ 101.659565] x8 : ffff99d6cacf8c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 101.660301] x5 : ffff700010474f82 x4 : 1ffff00010010f3a x3 : 1ffff33ad8dccdd8 [ 101.660963] x2 : 1ffff33ad8dccdd8 x1 : 0000000000000003 x0 : 0000000000000000 [ 101.661598] Call trace: [ 101.661831] intlog2+0xd8/0xf8 (P) [ 101.662338] kunit_try_run_case+0x170/0x3f0 [ 101.663211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.663704] kthread+0x328/0x630 [ 101.664070] ret_from_fork+0x10/0x20 [ 101.664620] ---[ end trace 0000000000000000 ]---