Date
May 15, 2025, 10:38 a.m.
Failure - log-parser-boot - oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti
KNOWN ISSUE - log-parser-boot/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti: Failure
[ 118.311516] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
[ 16.017860] ================================================================== [ 16.018378] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.019161] Free of addr ffff888103c60001 by task kunit_try_catch/261 [ 16.019512] [ 16.019697] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.019810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.019837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.019887] Call Trace: [ 16.019913] <TASK> [ 16.019948] dump_stack_lvl+0x73/0xb0 [ 16.020004] print_report+0xd1/0x650 [ 16.020044] ? __virt_addr_valid+0x1db/0x2d0 [ 16.020433] ? kasan_addr_to_slab+0x11/0xa0 [ 16.020470] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.020606] kasan_report_invalid_free+0x10a/0x130 [ 16.020636] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.020665] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.020689] __kasan_mempool_poison_object+0x102/0x1d0 [ 16.020714] mempool_free+0x2ec/0x380 [ 16.020738] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.020763] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 16.020791] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.020813] ? finish_task_switch.isra.0+0x153/0x700 [ 16.020839] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 16.020863] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 16.020890] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.020908] ? __pfx_mempool_kfree+0x10/0x10 [ 16.020929] ? __pfx_read_tsc+0x10/0x10 [ 16.020950] ? ktime_get_ts64+0x86/0x230 [ 16.020971] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.020997] kunit_try_run_case+0x1a5/0x480 [ 16.021022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.021045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.021068] ? __kthread_parkme+0x82/0x180 [ 16.021089] ? preempt_count_sub+0x50/0x80 [ 16.021110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.021133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.021154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.021176] kthread+0x337/0x6f0 [ 16.021195] ? trace_preempt_on+0x20/0xc0 [ 16.021217] ? __pfx_kthread+0x10/0x10 [ 16.021258] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.021280] ? calculate_sigpending+0x7b/0xa0 [ 16.021304] ? __pfx_kthread+0x10/0x10 [ 16.021326] ret_from_fork+0x116/0x1d0 [ 16.021344] ? __pfx_kthread+0x10/0x10 [ 16.021364] ret_from_fork_asm+0x1a/0x30 [ 16.021396] </TASK> [ 16.021409] [ 16.034603] The buggy address belongs to the physical page: [ 16.035138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c60 [ 16.035751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.036097] flags: 0x200000000000040(head|node=0|zone=2) [ 16.036416] page_type: f8(unknown) [ 16.036704] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.036967] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.037506] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.037911] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.038318] head: 0200000000000002 ffffea00040f1801 00000000ffffffff 00000000ffffffff [ 16.038692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.039040] page dumped because: kasan: bad access detected [ 16.039640] [ 16.039817] Memory state around the buggy address: [ 16.040147] ffff888103c5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.040388] ffff888103c5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.041010] >ffff888103c60000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.041274] ^ [ 16.041664] ffff888103c60080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.042101] ffff888103c60100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.042677] ================================================================== [ 15.983067] ================================================================== [ 15.983563] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.984494] Free of addr ffff88810231aa01 by task kunit_try_catch/259 [ 15.984727] [ 15.984875] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.985175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.985205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.985262] Call Trace: [ 15.985292] <TASK> [ 15.985328] dump_stack_lvl+0x73/0xb0 [ 15.985394] print_report+0xd1/0x650 [ 15.985445] ? __virt_addr_valid+0x1db/0x2d0 [ 15.985495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.985537] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.985577] kasan_report_invalid_free+0x10a/0x130 [ 15.985617] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.985660] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.985697] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.985730] check_slab_allocation+0x11f/0x130 [ 15.985752] __kasan_mempool_poison_object+0x91/0x1d0 [ 15.985776] mempool_free+0x2ec/0x380 [ 15.985801] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.985825] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 15.985851] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.985874] ? finish_task_switch.isra.0+0x153/0x700 [ 15.985899] mempool_kmalloc_invalid_free+0xed/0x140 [ 15.985922] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 15.985947] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.985966] ? __pfx_mempool_kfree+0x10/0x10 [ 15.985987] ? __pfx_read_tsc+0x10/0x10 [ 15.986007] ? ktime_get_ts64+0x86/0x230 [ 15.986031] kunit_try_run_case+0x1a5/0x480 [ 15.986055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.986076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.986099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.986121] ? __kthread_parkme+0x82/0x180 [ 15.986141] ? preempt_count_sub+0x50/0x80 [ 15.986164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.986186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.986208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.986252] kthread+0x337/0x6f0 [ 15.986273] ? trace_preempt_on+0x20/0xc0 [ 15.986297] ? __pfx_kthread+0x10/0x10 [ 15.986318] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.986349] ? calculate_sigpending+0x7b/0xa0 [ 15.986376] ? __pfx_kthread+0x10/0x10 [ 15.986397] ret_from_fork+0x116/0x1d0 [ 15.986416] ? __pfx_kthread+0x10/0x10 [ 15.986436] ret_from_fork_asm+0x1a/0x30 [ 15.986483] </TASK> [ 15.986503] [ 15.998698] Allocated by task 259: [ 15.998900] kasan_save_stack+0x45/0x70 [ 15.999214] kasan_save_track+0x18/0x40 [ 15.999522] kasan_save_alloc_info+0x3b/0x50 [ 15.999799] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.000011] remove_element+0x11e/0x190 [ 16.000187] mempool_alloc_preallocated+0x4d/0x90 [ 16.000395] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 16.000606] mempool_kmalloc_invalid_free+0xed/0x140 [ 16.001204] kunit_try_run_case+0x1a5/0x480 [ 16.001655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.002273] kthread+0x337/0x6f0 [ 16.002769] ret_from_fork+0x116/0x1d0 [ 16.003128] ret_from_fork_asm+0x1a/0x30 [ 16.003452] [ 16.003620] The buggy address belongs to the object at ffff88810231aa00 [ 16.003620] which belongs to the cache kmalloc-128 of size 128 [ 16.004308] The buggy address is located 1 bytes inside of [ 16.004308] 128-byte region [ffff88810231aa00, ffff88810231aa80) [ 16.004653] [ 16.004759] The buggy address belongs to the physical page: [ 16.004955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a [ 16.005228] flags: 0x200000000000000(node=0|zone=2) [ 16.005570] page_type: f5(slab) [ 16.006017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.006961] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.007636] page dumped because: kasan: bad access detected [ 16.008090] [ 16.008322] Memory state around the buggy address: [ 16.008904] ffff88810231a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.009461] ffff88810231a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.009960] >ffff88810231aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.010207] ^ [ 16.010487] ffff88810231aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.010931] ffff88810231ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.011173] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init: Failure
------------[ cut here ]------------ [ 161.155084] WARNING: CPU: 0 PID: 2556 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300 [ 161.155993] Modules linked in: [ 161.156455] CPU: 0 UID: 0 PID: 2556 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 161.157379] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 161.158779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 161.159164] RIP: 0010:drm_framebuffer_init+0x44/0x300 [ 161.159594] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41 [ 161.161406] RSP: 0000:ffff888105a77b30 EFLAGS: 00010246 [ 161.161768] RAX: dffffc0000000000 RBX: ffff888105a77c28 RCX: 0000000000000000 [ 161.162046] RDX: 1ffff11020b4ef8e RSI: ffff888105a77c28 RDI: ffff888105a77c70 [ 161.162658] RBP: ffff888105a77b70 R08: ffff888105933000 R09: ffffffffa87d64c0 [ 161.163427] R10: 0000000000000003 R11: 00000000e340e1ad R12: ffff888105933000 [ 161.164415] R13: ffff88810039fae8 R14: ffff888105a77ba8 R15: 0000000000000000 [ 161.164913] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 161.165379] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.165998] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 161.166314] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 161.167118] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 161.167809] Call Trace: [ 161.168049] <TASK> [ 161.168247] ? add_dr+0xc1/0x1d0 [ 161.169063] drm_test_framebuffer_init_bad_format+0xfc/0x240 [ 161.169797] ? add_dr+0x148/0x1d0 [ 161.170020] ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10 [ 161.170703] ? __drmm_add_action+0x1a4/0x280 [ 161.170987] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 161.171286] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 161.172103] ? __drmm_add_action_or_reset+0x22/0x50 [ 161.172464] ? __schedule+0x10cc/0x2b60 [ 161.173014] ? __pfx_read_tsc+0x10/0x10 [ 161.173210] ? ktime_get_ts64+0x86/0x230 [ 161.173658] kunit_try_run_case+0x1a5/0x480 [ 161.174084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.174399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 161.174984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 161.175303] ? __kthread_parkme+0x82/0x180 [ 161.175968] ? preempt_count_sub+0x50/0x80 [ 161.176286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.176518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 161.176774] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 161.177357] kthread+0x337/0x6f0 [ 161.177721] ? trace_preempt_on+0x20/0xc0 [ 161.178203] ? __pfx_kthread+0x10/0x10 [ 161.178827] ? _raw_spin_unlock_irq+0x47/0x80 [ 161.179226] ? calculate_sigpending+0x7b/0xa0 [ 161.180631] ? __pfx_kthread+0x10/0x10 [ 161.180936] ret_from_fork+0x116/0x1d0 [ 161.181121] ? __pfx_kthread+0x10/0x10 [ 161.181721] ret_from_fork_asm+0x1a/0x30 [ 161.182172] </TASK> [ 161.182401] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
[ 52.323997] ================================================================== [ 52.324412] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0 [ 52.324412] [ 52.325081] Use-after-free read at 0x(____ptrval____) (in kfence-#168): [ 52.325324] test_krealloc+0x6fc/0xbe0 [ 52.325599] kunit_try_run_case+0x1a5/0x480 [ 52.325836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.326027] kthread+0x337/0x6f0 [ 52.326193] ret_from_fork+0x116/0x1d0 [ 52.326378] ret_from_fork_asm+0x1a/0x30 [ 52.326734] [ 52.326916] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 52.326916] [ 52.327387] allocated by task 355 on cpu 1 at 52.323089s (0.004294s ago): [ 52.328467] test_alloc+0x364/0x10f0 [ 52.328909] test_krealloc+0xad/0xbe0 [ 52.329093] kunit_try_run_case+0x1a5/0x480 [ 52.329307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.329782] kthread+0x337/0x6f0 [ 52.330053] ret_from_fork+0x116/0x1d0 [ 52.330278] ret_from_fork_asm+0x1a/0x30 [ 52.330469] [ 52.330583] freed by task 355 on cpu 1 at 52.323438s (0.007140s ago): [ 52.331440] krealloc_noprof+0x108/0x340 [ 52.331805] test_krealloc+0x226/0xbe0 [ 52.332105] kunit_try_run_case+0x1a5/0x480 [ 52.332397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.332883] kthread+0x337/0x6f0 [ 52.333274] ret_from_fork+0x116/0x1d0 [ 52.333528] ret_from_fork_asm+0x1a/0x30 [ 52.333771] [ 52.333967] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 52.334384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.334560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 52.335262] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
[ 19.667262] ================================================================== [ 19.667605] BUG: KFENCE: invalid free in test_double_free+0x112/0x260 [ 19.667605] [ 19.667802] Invalid free of 0x(____ptrval____) (in kfence-#90): [ 19.667922] test_double_free+0x112/0x260 [ 19.668091] kunit_try_run_case+0x1a5/0x480 [ 19.668353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.668658] kthread+0x337/0x6f0 [ 19.668848] ret_from_fork+0x116/0x1d0 [ 19.669059] ret_from_fork_asm+0x1a/0x30 [ 19.669359] [ 19.669455] kfence-#90: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 19.669455] [ 19.669691] allocated by task 323 on cpu 1 at 19.667063s (0.002625s ago): [ 19.669881] test_alloc+0x2a6/0x10f0 [ 19.669971] test_double_free+0xdb/0x260 [ 19.670061] kunit_try_run_case+0x1a5/0x480 [ 19.670150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.670266] kthread+0x337/0x6f0 [ 19.670363] ret_from_fork+0x116/0x1d0 [ 19.670456] ret_from_fork_asm+0x1a/0x30 [ 19.670549] [ 19.670606] freed by task 323 on cpu 1 at 19.667114s (0.003488s ago): [ 19.670738] test_double_free+0xfa/0x260 [ 19.670829] kunit_try_run_case+0x1a5/0x480 [ 19.670920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.671192] kthread+0x337/0x6f0 [ 19.671364] ret_from_fork+0x116/0x1d0 [ 19.671544] ret_from_fork_asm+0x1a/0x30 [ 19.671775] [ 19.671905] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.672402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.672592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.673029] ================================================================== [ 19.563424] ================================================================== [ 19.563930] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260 [ 19.563930] [ 19.564129] Invalid free of 0x(____ptrval____) (in kfence-#89): [ 19.564415] test_double_free+0x1d3/0x260 [ 19.564646] kunit_try_run_case+0x1a5/0x480 [ 19.564798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.564921] kthread+0x337/0x6f0 [ 19.565012] ret_from_fork+0x116/0x1d0 [ 19.565195] ret_from_fork_asm+0x1a/0x30 [ 19.566272] [ 19.566376] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 19.566376] [ 19.566792] allocated by task 321 on cpu 0 at 19.563068s (0.003717s ago): [ 19.567117] test_alloc+0x364/0x10f0 [ 19.567338] test_double_free+0xdb/0x260 [ 19.567496] kunit_try_run_case+0x1a5/0x480 [ 19.567673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.567890] kthread+0x337/0x6f0 [ 19.568065] ret_from_fork+0x116/0x1d0 [ 19.568215] ret_from_fork_asm+0x1a/0x30 [ 19.568401] [ 19.568489] freed by task 321 on cpu 0 at 19.563167s (0.005318s ago): [ 19.568740] test_double_free+0x1e0/0x260 [ 19.568961] kunit_try_run_case+0x1a5/0x480 [ 19.569195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.569364] kthread+0x337/0x6f0 [ 19.569543] ret_from_fork+0x116/0x1d0 [ 19.569728] ret_from_fork_asm+0x1a/0x30 [ 19.569928] [ 19.570120] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.570500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.570735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.571074] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
[ 52.239776] ================================================================== [ 52.240350] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 52.240350] [ 52.240927] Use-after-free read at 0x(____ptrval____) (in kfence-#167): [ 52.241172] test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 52.241398] kunit_try_run_case+0x1a5/0x480 [ 52.241593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.241797] kthread+0x337/0x6f0 [ 52.242049] ret_from_fork+0x116/0x1d0 [ 52.242405] ret_from_fork_asm+0x1a/0x30 [ 52.242733] [ 52.242905] kfence-#167: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 52.242905] [ 52.243531] allocated by task 353 on cpu 0 at 52.218933s (0.024593s ago): [ 52.244012] test_alloc+0x2a6/0x10f0 [ 52.244299] test_memcache_typesafe_by_rcu+0x16f/0x670 [ 52.244542] kunit_try_run_case+0x1a5/0x480 [ 52.244866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.245241] kthread+0x337/0x6f0 [ 52.245522] ret_from_fork+0x116/0x1d0 [ 52.245818] ret_from_fork_asm+0x1a/0x30 [ 52.246042] [ 52.246153] freed by task 353 on cpu 0 at 52.219080s (0.027069s ago): [ 52.246638] test_memcache_typesafe_by_rcu+0x1bf/0x670 [ 52.246991] kunit_try_run_case+0x1a5/0x480 [ 52.247222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.247589] kthread+0x337/0x6f0 [ 52.247775] ret_from_fork+0x116/0x1d0 [ 52.248083] ret_from_fork_asm+0x1a/0x30 [ 52.248387] [ 52.248630] CPU: 0 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 52.249298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.249524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 52.250086] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
[ 27.275141] ================================================================== [ 27.275721] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210 [ 27.275721] [ 27.276078] Invalid read at 0x(____ptrval____): [ 27.276393] test_invalid_access+0xf0/0x210 [ 27.276626] kunit_try_run_case+0x1a5/0x480 [ 27.276776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.277017] kthread+0x337/0x6f0 [ 27.277171] ret_from_fork+0x116/0x1d0 [ 27.277285] ret_from_fork_asm+0x1a/0x30 [ 27.277409] [ 27.277498] CPU: 1 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 27.277728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.277839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.278006] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
[ 27.051369] ================================================================== [ 27.051711] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340 [ 27.051711] [ 27.051918] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#161): [ 27.052490] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 27.052709] kunit_try_run_case+0x1a5/0x480 [ 27.052908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.053138] kthread+0x337/0x6f0 [ 27.053310] ret_from_fork+0x116/0x1d0 [ 27.053401] ret_from_fork_asm+0x1a/0x30 [ 27.053492] [ 27.053547] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 27.053547] [ 27.053708] allocated by task 343 on cpu 1 at 27.051035s (0.002671s ago): [ 27.053965] test_alloc+0x364/0x10f0 [ 27.054152] test_kmalloc_aligned_oob_write+0xc8/0x340 [ 27.054409] kunit_try_run_case+0x1a5/0x480 [ 27.054594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.054802] kthread+0x337/0x6f0 [ 27.054958] ret_from_fork+0x116/0x1d0 [ 27.055118] ret_from_fork_asm+0x1a/0x30 [ 27.055269] [ 27.055333] freed by task 343 on cpu 1 at 27.051205s (0.004124s ago): [ 27.055529] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 27.055716] kunit_try_run_case+0x1a5/0x480 [ 27.055810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.055913] kthread+0x337/0x6f0 [ 27.055989] ret_from_fork+0x116/0x1d0 [ 27.056069] ret_from_fork_asm+0x1a/0x30 [ 27.056276] [ 27.056398] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 27.056826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.056998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.057395] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
[ 26.843265] ================================================================== [ 26.843607] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560 [ 26.843607] [ 26.844134] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#159): [ 26.844287] test_kmalloc_aligned_oob_read+0x27e/0x560 [ 26.844401] kunit_try_run_case+0x1a5/0x480 [ 26.844500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.844727] kthread+0x337/0x6f0 [ 26.844938] ret_from_fork+0x116/0x1d0 [ 26.845127] ret_from_fork_asm+0x1a/0x30 [ 26.845763] [ 26.846157] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 26.846157] [ 26.846533] allocated by task 341 on cpu 0 at 26.842986s (0.003544s ago): [ 26.846774] test_alloc+0x364/0x10f0 [ 26.846955] test_kmalloc_aligned_oob_read+0x105/0x560 [ 26.847129] kunit_try_run_case+0x1a5/0x480 [ 26.847277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.847455] kthread+0x337/0x6f0 [ 26.847542] ret_from_fork+0x116/0x1d0 [ 26.847630] ret_from_fork_asm+0x1a/0x30 [ 26.847722] [ 26.847804] CPU: 0 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 26.848016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.848239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.848648] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
[ 22.683250] ================================================================== [ 22.683681] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0 [ 22.683681] [ 22.683931] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#119): [ 22.684524] test_corruption+0x216/0x3e0 [ 22.684786] kunit_try_run_case+0x1a5/0x480 [ 22.684980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.685153] kthread+0x337/0x6f0 [ 22.685325] ret_from_fork+0x116/0x1d0 [ 22.685500] ret_from_fork_asm+0x1a/0x30 [ 22.685775] [ 22.685935] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 22.685935] [ 22.686566] allocated by task 331 on cpu 0 at 22.683058s (0.003503s ago): [ 22.687036] test_alloc+0x2a6/0x10f0 [ 22.687307] test_corruption+0x1cb/0x3e0 [ 22.687492] kunit_try_run_case+0x1a5/0x480 [ 22.687681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.688045] kthread+0x337/0x6f0 [ 22.688321] ret_from_fork+0x116/0x1d0 [ 22.688610] ret_from_fork_asm+0x1a/0x30 [ 22.688918] [ 22.689077] freed by task 331 on cpu 0 at 22.683114s (0.005959s ago): [ 22.689495] test_corruption+0x216/0x3e0 [ 22.689680] kunit_try_run_case+0x1a5/0x480 [ 22.689875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.690238] kthread+0x337/0x6f0 [ 22.690523] ret_from_fork+0x116/0x1d0 [ 22.690808] ret_from_fork_asm+0x1a/0x30 [ 22.691119] [ 22.691327] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 22.692023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.692259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.692590] ================================================================== [ 22.475282] ================================================================== [ 22.475724] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0 [ 22.475724] [ 22.475967] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#117): [ 22.476912] test_corruption+0x131/0x3e0 [ 22.477237] kunit_try_run_case+0x1a5/0x480 [ 22.477448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.477661] kthread+0x337/0x6f0 [ 22.477926] ret_from_fork+0x116/0x1d0 [ 22.478201] ret_from_fork_asm+0x1a/0x30 [ 22.478504] [ 22.478639] kfence-#117: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 22.478639] [ 22.478995] allocated by task 331 on cpu 0 at 22.475065s (0.003926s ago): [ 22.479264] test_alloc+0x2a6/0x10f0 [ 22.479537] test_corruption+0xe6/0x3e0 [ 22.479814] kunit_try_run_case+0x1a5/0x480 [ 22.480129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.480354] kthread+0x337/0x6f0 [ 22.480525] ret_from_fork+0x116/0x1d0 [ 22.480693] ret_from_fork_asm+0x1a/0x30 [ 22.481001] [ 22.481155] freed by task 331 on cpu 0 at 22.475154s (0.005996s ago): [ 22.481632] test_corruption+0x131/0x3e0 [ 22.481932] kunit_try_run_case+0x1a5/0x480 [ 22.482262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.482532] kthread+0x337/0x6f0 [ 22.482695] ret_from_fork+0x116/0x1d0 [ 22.482870] ret_from_fork_asm+0x1a/0x30 [ 22.483171] [ 22.483474] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 22.484233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.484491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.484906] ================================================================== [ 21.123444] ================================================================== [ 21.123857] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0 [ 21.123857] [ 21.124091] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#104): [ 21.124670] test_corruption+0x2df/0x3e0 [ 21.124997] kunit_try_run_case+0x1a5/0x480 [ 21.125562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.125819] kthread+0x337/0x6f0 [ 21.126455] ret_from_fork+0x116/0x1d0 [ 21.126834] ret_from_fork_asm+0x1a/0x30 [ 21.127207] [ 21.127426] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 21.127426] [ 21.127995] allocated by task 329 on cpu 0 at 21.123066s (0.004924s ago): [ 21.128492] test_alloc+0x364/0x10f0 [ 21.128767] test_corruption+0x1cb/0x3e0 [ 21.129050] kunit_try_run_case+0x1a5/0x480 [ 21.129315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.129694] kthread+0x337/0x6f0 [ 21.129877] ret_from_fork+0x116/0x1d0 [ 21.130161] ret_from_fork_asm+0x1a/0x30 [ 21.130445] [ 21.130593] freed by task 329 on cpu 0 at 21.123232s (0.007356s ago): [ 21.130908] test_corruption+0x2df/0x3e0 [ 21.131132] kunit_try_run_case+0x1a5/0x480 [ 21.131414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.131627] kthread+0x337/0x6f0 [ 21.131794] ret_from_fork+0x116/0x1d0 [ 21.131958] ret_from_fork_asm+0x1a/0x30 [ 21.132127] [ 21.132298] CPU: 0 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 21.133065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.133404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.133972] ================================================================== [ 20.603557] ================================================================== [ 20.603967] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0 [ 20.603967] [ 20.604257] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#99): [ 20.605423] test_corruption+0x2d2/0x3e0 [ 20.605755] kunit_try_run_case+0x1a5/0x480 [ 20.605977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.606178] kthread+0x337/0x6f0 [ 20.606518] ret_from_fork+0x116/0x1d0 [ 20.606857] ret_from_fork_asm+0x1a/0x30 [ 20.607177] [ 20.607375] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 20.607375] [ 20.607728] allocated by task 329 on cpu 0 at 20.603124s (0.004600s ago): [ 20.608212] test_alloc+0x364/0x10f0 [ 20.608531] test_corruption+0xe6/0x3e0 [ 20.608829] kunit_try_run_case+0x1a5/0x480 [ 20.609074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.609448] kthread+0x337/0x6f0 [ 20.609703] ret_from_fork+0x116/0x1d0 [ 20.609880] ret_from_fork_asm+0x1a/0x30 [ 20.610064] [ 20.610231] freed by task 329 on cpu 0 at 20.603303s (0.006923s ago): [ 20.610724] test_corruption+0x2d2/0x3e0 [ 20.611050] kunit_try_run_case+0x1a5/0x480 [ 20.611248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.611641] kthread+0x337/0x6f0 [ 20.611833] ret_from_fork+0x116/0x1d0 [ 20.612142] ret_from_fork_asm+0x1a/0x30 [ 20.612331] [ 20.612566] CPU: 0 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 20.613189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.613506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.613874] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
[ 19.771199] ================================================================== [ 19.771689] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260 [ 19.771689] [ 19.771898] Invalid free of 0x(____ptrval____) (in kfence-#91): [ 19.772131] test_invalid_addr_free+0x1e1/0x260 [ 19.772298] kunit_try_run_case+0x1a5/0x480 [ 19.772427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.772602] kthread+0x337/0x6f0 [ 19.772725] ret_from_fork+0x116/0x1d0 [ 19.772835] ret_from_fork_asm+0x1a/0x30 [ 19.773012] [ 19.773072] kfence-#91: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 19.773072] [ 19.773264] allocated by task 325 on cpu 1 at 19.771033s (0.002229s ago): [ 19.773422] test_alloc+0x364/0x10f0 [ 19.773515] test_invalid_addr_free+0xdb/0x260 [ 19.773782] kunit_try_run_case+0x1a5/0x480 [ 19.774060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.774398] kthread+0x337/0x6f0 [ 19.774631] ret_from_fork+0x116/0x1d0 [ 19.774900] ret_from_fork_asm+0x1a/0x30 [ 19.775096] [ 19.775182] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.775409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.775620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.776126] ================================================================== [ 19.875256] ================================================================== [ 19.875709] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260 [ 19.875709] [ 19.875943] Invalid free of 0x(____ptrval____) (in kfence-#92): [ 19.876067] test_invalid_addr_free+0xfb/0x260 [ 19.876168] kunit_try_run_case+0x1a5/0x480 [ 19.876295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.876405] kthread+0x337/0x6f0 [ 19.876488] ret_from_fork+0x116/0x1d0 [ 19.876575] ret_from_fork_asm+0x1a/0x30 [ 19.876663] [ 19.876745] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 19.876745] [ 19.877082] allocated by task 327 on cpu 0 at 19.875122s (0.001958s ago): [ 19.877254] test_alloc+0x2a6/0x10f0 [ 19.877345] test_invalid_addr_free+0xdb/0x260 [ 19.877442] kunit_try_run_case+0x1a5/0x480 [ 19.877667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.877939] kthread+0x337/0x6f0 [ 19.878111] ret_from_fork+0x116/0x1d0 [ 19.878314] ret_from_fork_asm+0x1a/0x30 [ 19.878520] [ 19.878644] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.879048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.879212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.879506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
[ 13.305365] ================================================================== [ 13.306203] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 13.306666] Read of size 1 at addr ffff8881029bd000 by task kunit_try_catch/158 [ 13.307215] [ 13.307448] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.307549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.307575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.307615] Call Trace: [ 13.307643] <TASK> [ 13.307682] dump_stack_lvl+0x73/0xb0 [ 13.307748] print_report+0xd1/0x650 [ 13.307787] ? __virt_addr_valid+0x1db/0x2d0 [ 13.307827] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.308057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.308100] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.308147] kasan_report+0x141/0x180 [ 13.308438] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.308552] __asan_report_load1_noabort+0x18/0x20 [ 13.308591] kmalloc_node_oob_right+0x369/0x3c0 [ 13.308636] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 13.308662] ? __schedule+0x10cc/0x2b60 [ 13.308687] ? __pfx_read_tsc+0x10/0x10 [ 13.308710] ? ktime_get_ts64+0x86/0x230 [ 13.308736] kunit_try_run_case+0x1a5/0x480 [ 13.308764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.308786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.308809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.308831] ? __kthread_parkme+0x82/0x180 [ 13.308853] ? preempt_count_sub+0x50/0x80 [ 13.308878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.308901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.308923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.308945] kthread+0x337/0x6f0 [ 13.308965] ? trace_preempt_on+0x20/0xc0 [ 13.308989] ? __pfx_kthread+0x10/0x10 [ 13.309009] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.309029] ? calculate_sigpending+0x7b/0xa0 [ 13.309055] ? __pfx_kthread+0x10/0x10 [ 13.309076] ret_from_fork+0x116/0x1d0 [ 13.309094] ? __pfx_kthread+0x10/0x10 [ 13.309115] ret_from_fork_asm+0x1a/0x30 [ 13.309148] </TASK> [ 13.309161] [ 13.321505] Allocated by task 158: [ 13.322013] kasan_save_stack+0x45/0x70 [ 13.322641] kasan_save_track+0x18/0x40 [ 13.322940] kasan_save_alloc_info+0x3b/0x50 [ 13.323106] __kasan_kmalloc+0xb7/0xc0 [ 13.323420] __kmalloc_cache_node_noprof+0x188/0x420 [ 13.324018] kmalloc_node_oob_right+0xab/0x3c0 [ 13.324414] kunit_try_run_case+0x1a5/0x480 [ 13.324881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.325118] kthread+0x337/0x6f0 [ 13.325424] ret_from_fork+0x116/0x1d0 [ 13.325872] ret_from_fork_asm+0x1a/0x30 [ 13.326275] [ 13.326431] The buggy address belongs to the object at ffff8881029bc000 [ 13.326431] which belongs to the cache kmalloc-4k of size 4096 [ 13.327406] The buggy address is located 0 bytes to the right of [ 13.327406] allocated 4096-byte region [ffff8881029bc000, ffff8881029bd000) [ 13.328248] [ 13.328653] The buggy address belongs to the physical page: [ 13.329123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b8 [ 13.330121] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.330504] flags: 0x200000000000040(head|node=0|zone=2) [ 13.330918] page_type: f5(slab) [ 13.331724] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 13.331966] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 13.332206] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 13.333027] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 13.333351] head: 0200000000000003 ffffea00040a6e01 00000000ffffffff 00000000ffffffff [ 13.334019] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 13.334365] page dumped because: kasan: bad access detected [ 13.334645] [ 13.335202] Memory state around the buggy address: [ 13.335463] ffff8881029bcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.336032] ffff8881029bcf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.336248] >ffff8881029bd000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.337245] ^ [ 13.337440] ffff8881029bd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.338129] ffff8881029bd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.338700] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
[ 13.272285] ================================================================== [ 13.272790] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 13.273448] Read of size 1 at addr ffff8881022a343f by task kunit_try_catch/156 [ 13.273784] [ 13.273999] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.274095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.274120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.274162] Call Trace: [ 13.274190] <TASK> [ 13.274241] dump_stack_lvl+0x73/0xb0 [ 13.274297] print_report+0xd1/0x650 [ 13.274343] ? __virt_addr_valid+0x1db/0x2d0 [ 13.274383] ? kmalloc_oob_left+0x361/0x3c0 [ 13.274418] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.274453] ? kmalloc_oob_left+0x361/0x3c0 [ 13.274499] kasan_report+0x141/0x180 [ 13.274535] ? kmalloc_oob_left+0x361/0x3c0 [ 13.274601] __asan_report_load1_noabort+0x18/0x20 [ 13.274643] kmalloc_oob_left+0x361/0x3c0 [ 13.274687] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 13.274732] ? __schedule+0x10cc/0x2b60 [ 13.274776] ? __pfx_read_tsc+0x10/0x10 [ 13.274818] ? ktime_get_ts64+0x86/0x230 [ 13.274869] kunit_try_run_case+0x1a5/0x480 [ 13.274930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.274964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.275021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.275043] ? __kthread_parkme+0x82/0x180 [ 13.275064] ? preempt_count_sub+0x50/0x80 [ 13.275087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.275109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.275131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.275152] kthread+0x337/0x6f0 [ 13.275170] ? trace_preempt_on+0x20/0xc0 [ 13.275193] ? __pfx_kthread+0x10/0x10 [ 13.275212] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.275247] ? calculate_sigpending+0x7b/0xa0 [ 13.275271] ? __pfx_kthread+0x10/0x10 [ 13.275291] ret_from_fork+0x116/0x1d0 [ 13.275309] ? __pfx_kthread+0x10/0x10 [ 13.275329] ret_from_fork_asm+0x1a/0x30 [ 13.275360] </TASK> [ 13.275372] [ 13.285640] Allocated by task 41: [ 13.285953] kasan_save_stack+0x45/0x70 [ 13.286329] kasan_save_track+0x18/0x40 [ 13.286883] kasan_save_alloc_info+0x3b/0x50 [ 13.287267] __kasan_kmalloc+0xb7/0xc0 [ 13.287695] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 13.287965] kvasprintf+0xc5/0x150 [ 13.288191] __kthread_create_on_node+0x18b/0x3a0 [ 13.288543] kthread_create_on_node+0xab/0xe0 [ 13.288996] create_worker+0x3e5/0x7b0 [ 13.289229] worker_thread+0x991/0x1320 [ 13.289512] kthread+0x337/0x6f0 [ 13.290009] ret_from_fork+0x116/0x1d0 [ 13.290343] ret_from_fork_asm+0x1a/0x30 [ 13.290682] [ 13.290787] The buggy address belongs to the object at ffff8881022a3420 [ 13.290787] which belongs to the cache kmalloc-16 of size 16 [ 13.291420] The buggy address is located 19 bytes to the right of [ 13.291420] allocated 12-byte region [ffff8881022a3420, ffff8881022a342c) [ 13.292061] [ 13.292217] The buggy address belongs to the physical page: [ 13.292461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 13.292776] flags: 0x200000000000000(node=0|zone=2) [ 13.293150] page_type: f5(slab) [ 13.293389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.294022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.294288] page dumped because: kasan: bad access detected [ 13.294891] [ 13.295185] Memory state around the buggy address: [ 13.296171] ffff8881022a3300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.296757] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.297127] >ffff8881022a3400: 00 05 fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc [ 13.297615] ^ [ 13.297990] ffff8881022a3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.298296] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.299278] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
[ 13.189834] ================================================================== [ 13.190750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.191714] Write of size 1 at addr ffff8881022f9b73 by task kunit_try_catch/154 [ 13.192125] [ 13.194033] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.194385] Tainted: [N]=TEST [ 13.194425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.194682] Call Trace: [ 13.194761] <TASK> [ 13.194924] dump_stack_lvl+0x73/0xb0 [ 13.195030] print_report+0xd1/0x650 [ 13.195062] ? __virt_addr_valid+0x1db/0x2d0 [ 13.195089] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.195111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.195132] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.195153] kasan_report+0x141/0x180 [ 13.195175] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.195202] __asan_report_store1_noabort+0x1b/0x30 [ 13.195234] kmalloc_oob_right+0x6f0/0x7f0 [ 13.195258] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.195282] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.195307] kunit_try_run_case+0x1a5/0x480 [ 13.195332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.195353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.195375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.195395] ? __kthread_parkme+0x82/0x180 [ 13.195415] ? preempt_count_sub+0x50/0x80 [ 13.195440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.195460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.195480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.195500] kthread+0x337/0x6f0 [ 13.195518] ? trace_preempt_on+0x20/0xc0 [ 13.195540] ? __pfx_kthread+0x10/0x10 [ 13.195559] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.195579] ? calculate_sigpending+0x7b/0xa0 [ 13.195602] ? __pfx_kthread+0x10/0x10 [ 13.195622] ret_from_fork+0x116/0x1d0 [ 13.195641] ? __pfx_kthread+0x10/0x10 [ 13.195659] ret_from_fork_asm+0x1a/0x30 [ 13.195712] </TASK> [ 13.195779] [ 13.203612] Allocated by task 154: [ 13.204091] kasan_save_stack+0x45/0x70 [ 13.204487] kasan_save_track+0x18/0x40 [ 13.204821] kasan_save_alloc_info+0x3b/0x50 [ 13.205144] __kasan_kmalloc+0xb7/0xc0 [ 13.205361] __kmalloc_cache_noprof+0x189/0x420 [ 13.205671] kmalloc_oob_right+0xa9/0x7f0 [ 13.205991] kunit_try_run_case+0x1a5/0x480 [ 13.206275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.206679] kthread+0x337/0x6f0 [ 13.206908] ret_from_fork+0x116/0x1d0 [ 13.207114] ret_from_fork_asm+0x1a/0x30 [ 13.207527] [ 13.207767] The buggy address belongs to the object at ffff8881022f9b00 [ 13.207767] which belongs to the cache kmalloc-128 of size 128 [ 13.208268] The buggy address is located 0 bytes to the right of [ 13.208268] allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73) [ 13.208714] [ 13.208945] The buggy address belongs to the physical page: [ 13.209782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 13.210834] flags: 0x200000000000000(node=0|zone=2) [ 13.211893] page_type: f5(slab) [ 13.212731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.213270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.213919] page dumped because: kasan: bad access detected [ 13.214314] [ 13.214494] Memory state around the buggy address: [ 13.215175] ffff8881022f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.215760] ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.216307] >ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.216825] ^ [ 13.217295] ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.217571] ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.218057] ================================================================== [ 13.221209] ================================================================== [ 13.221767] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 13.222052] Write of size 1 at addr ffff8881022f9b78 by task kunit_try_catch/154 [ 13.222271] [ 13.222381] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.222434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.222449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.222470] Call Trace: [ 13.222494] <TASK> [ 13.222516] dump_stack_lvl+0x73/0xb0 [ 13.222546] print_report+0xd1/0x650 [ 13.222569] ? __virt_addr_valid+0x1db/0x2d0 [ 13.222592] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.222612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.222633] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.222653] kasan_report+0x141/0x180 [ 13.222674] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.222700] __asan_report_store1_noabort+0x1b/0x30 [ 13.222720] kmalloc_oob_right+0x6bd/0x7f0 [ 13.222741] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.222765] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.222790] kunit_try_run_case+0x1a5/0x480 [ 13.222813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.222833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.222855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.222876] ? __kthread_parkme+0x82/0x180 [ 13.222896] ? preempt_count_sub+0x50/0x80 [ 13.222920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.222942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.222963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.222984] kthread+0x337/0x6f0 [ 13.223002] ? trace_preempt_on+0x20/0xc0 [ 13.223025] ? __pfx_kthread+0x10/0x10 [ 13.223045] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.223065] ? calculate_sigpending+0x7b/0xa0 [ 13.223087] ? __pfx_kthread+0x10/0x10 [ 13.223108] ret_from_fork+0x116/0x1d0 [ 13.223127] ? __pfx_kthread+0x10/0x10 [ 13.223146] ret_from_fork_asm+0x1a/0x30 [ 13.223178] </TASK> [ 13.223189] [ 13.232304] Allocated by task 154: [ 13.232611] kasan_save_stack+0x45/0x70 [ 13.232959] kasan_save_track+0x18/0x40 [ 13.233189] kasan_save_alloc_info+0x3b/0x50 [ 13.233382] __kasan_kmalloc+0xb7/0xc0 [ 13.233552] __kmalloc_cache_noprof+0x189/0x420 [ 13.233738] kmalloc_oob_right+0xa9/0x7f0 [ 13.233915] kunit_try_run_case+0x1a5/0x480 [ 13.234097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.234512] kthread+0x337/0x6f0 [ 13.234835] ret_from_fork+0x116/0x1d0 [ 13.235167] ret_from_fork_asm+0x1a/0x30 [ 13.235499] [ 13.235676] The buggy address belongs to the object at ffff8881022f9b00 [ 13.235676] which belongs to the cache kmalloc-128 of size 128 [ 13.236550] The buggy address is located 5 bytes to the right of [ 13.236550] allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73) [ 13.237131] [ 13.237256] The buggy address belongs to the physical page: [ 13.237465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 13.237735] flags: 0x200000000000000(node=0|zone=2) [ 13.237935] page_type: f5(slab) [ 13.238097] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.238654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.239211] page dumped because: kasan: bad access detected [ 13.239646] [ 13.239816] Memory state around the buggy address: [ 13.240175] ffff8881022f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.240533] ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.240770] >ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.240996] ^ [ 13.241231] ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.241719] ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.242207] ================================================================== [ 13.243400] ================================================================== [ 13.244001] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 13.244277] Read of size 1 at addr ffff8881022f9b80 by task kunit_try_catch/154 [ 13.244824] [ 13.244997] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.245086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.245109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.245159] Call Trace: [ 13.245198] <TASK> [ 13.245257] dump_stack_lvl+0x73/0xb0 [ 13.245315] print_report+0xd1/0x650 [ 13.245365] ? __virt_addr_valid+0x1db/0x2d0 [ 13.245410] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.245464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.245504] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.245545] kasan_report+0x141/0x180 [ 13.245585] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.245636] __asan_report_load1_noabort+0x18/0x20 [ 13.245676] kmalloc_oob_right+0x68a/0x7f0 [ 13.245709] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.245734] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.245758] kunit_try_run_case+0x1a5/0x480 [ 13.245781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.245801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.245823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.245853] ? __kthread_parkme+0x82/0x180 [ 13.245887] ? preempt_count_sub+0x50/0x80 [ 13.245923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.245961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.246001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.246037] kthread+0x337/0x6f0 [ 13.246068] ? trace_preempt_on+0x20/0xc0 [ 13.246107] ? __pfx_kthread+0x10/0x10 [ 13.246144] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.246182] ? calculate_sigpending+0x7b/0xa0 [ 13.246235] ? __pfx_kthread+0x10/0x10 [ 13.246276] ret_from_fork+0x116/0x1d0 [ 13.246309] ? __pfx_kthread+0x10/0x10 [ 13.246354] ret_from_fork_asm+0x1a/0x30 [ 13.246418] </TASK> [ 13.246439] [ 13.254806] Allocated by task 154: [ 13.255059] kasan_save_stack+0x45/0x70 [ 13.255419] kasan_save_track+0x18/0x40 [ 13.255640] kasan_save_alloc_info+0x3b/0x50 [ 13.255958] __kasan_kmalloc+0xb7/0xc0 [ 13.256267] __kmalloc_cache_noprof+0x189/0x420 [ 13.256498] kmalloc_oob_right+0xa9/0x7f0 [ 13.256823] kunit_try_run_case+0x1a5/0x480 [ 13.257000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.257198] kthread+0x337/0x6f0 [ 13.257366] ret_from_fork+0x116/0x1d0 [ 13.257584] ret_from_fork_asm+0x1a/0x30 [ 13.257911] [ 13.258079] The buggy address belongs to the object at ffff8881022f9b00 [ 13.258079] which belongs to the cache kmalloc-128 of size 128 [ 13.258908] The buggy address is located 13 bytes to the right of [ 13.258908] allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73) [ 13.259522] [ 13.259696] The buggy address belongs to the physical page: [ 13.259944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 13.260453] flags: 0x200000000000000(node=0|zone=2) [ 13.260747] page_type: f5(slab) [ 13.261024] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.261414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.261798] page dumped because: kasan: bad access detected [ 13.262124] [ 13.262265] Memory state around the buggy address: [ 13.262617] ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.262895] ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.263127] >ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.263556] ^ [ 13.263879] ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.264357] ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.264730] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale: Failure
------------[ cut here ]------------ [ 162.503325] WARNING: CPU: 0 PID: 2772 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190 [ 162.504114] Modules linked in: [ 162.504368] CPU: 0 UID: 0 PID: 2772 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 162.506379] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 162.507005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 162.507893] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 [ 162.508216] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 c0 03 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 162.509640] RSP: 0000:ffff88810a637c78 EFLAGS: 00010286 [ 162.509918] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 [ 162.511040] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffa88312f4 [ 162.511438] RBP: ffff88810a637ca0 R08: 0000000000000000 R09: ffffed10212a9360 [ 162.512038] R10: ffff888109549b07 R11: 0000000000000000 R12: ffffffffa88312e0 [ 162.513128] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a637d38 [ 162.514666] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 162.515409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.515681] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 162.515931] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 162.516172] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 162.516431] Call Trace: [ 162.516571] <TASK> [ 162.516714] drm_test_rect_calc_vscale+0x108/0x270 [ 162.516950] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [ 162.519016] ? __schedule+0x10cc/0x2b60 [ 162.519869] ? __pfx_read_tsc+0x10/0x10 [ 162.520331] ? ktime_get_ts64+0x86/0x230 [ 162.520761] kunit_try_run_case+0x1a5/0x480 [ 162.521001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.521414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 162.521842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 162.522126] ? __kthread_parkme+0x82/0x180 [ 162.522756] ? preempt_count_sub+0x50/0x80 [ 162.523871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.524307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 162.525008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 162.525318] kthread+0x337/0x6f0 [ 162.525747] ? trace_preempt_on+0x20/0xc0 [ 162.526114] ? __pfx_kthread+0x10/0x10 [ 162.526351] ? _raw_spin_unlock_irq+0x47/0x80 [ 162.526917] ? calculate_sigpending+0x7b/0xa0 [ 162.527613] ? __pfx_kthread+0x10/0x10 [ 162.527933] ret_from_fork+0x116/0x1d0 [ 162.528300] ? __pfx_kthread+0x10/0x10 [ 162.528514] ret_from_fork_asm+0x1a/0x30 [ 162.529073] </TASK> [ 162.529364] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 162.475548] WARNING: CPU: 0 PID: 2770 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190 [ 162.476772] Modules linked in: [ 162.477213] CPU: 0 UID: 0 PID: 2770 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 162.478119] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 162.478630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 162.480014] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 [ 162.480313] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 c0 03 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 162.481718] RSP: 0000:ffff88810a6e7c78 EFLAGS: 00010286 [ 162.481888] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 [ 162.482029] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffa88312bc [ 162.482164] RBP: ffff88810a6e7ca0 R08: 0000000000000000 R09: ffffed10212a9320 [ 162.482341] R10: ffff888109549907 R11: 0000000000000000 R12: ffffffffa88312a8 [ 162.482601] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a6e7d38 [ 162.482879] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 162.483502] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.483824] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 162.484655] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 162.484931] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 162.486013] Call Trace: [ 162.486353] <TASK> [ 162.486507] drm_test_rect_calc_vscale+0x108/0x270 [ 162.486912] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [ 162.487330] ? __schedule+0x10cc/0x2b60 [ 162.487656] ? __pfx_read_tsc+0x10/0x10 [ 162.488602] ? ktime_get_ts64+0x86/0x230 [ 162.488866] kunit_try_run_case+0x1a5/0x480 [ 162.489087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.489281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 162.489499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 162.490368] ? __kthread_parkme+0x82/0x180 [ 162.491299] ? preempt_count_sub+0x50/0x80 [ 162.491860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.492243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 162.492627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 162.493047] kthread+0x337/0x6f0 [ 162.493310] ? trace_preempt_on+0x20/0xc0 [ 162.493576] ? __pfx_kthread+0x10/0x10 [ 162.493807] ? _raw_spin_unlock_irq+0x47/0x80 [ 162.494042] ? calculate_sigpending+0x7b/0xa0 [ 162.494611] ? __pfx_kthread+0x10/0x10 [ 162.495221] ret_from_fork+0x116/0x1d0 [ 162.495847] ? __pfx_kthread+0x10/0x10 [ 162.496222] ret_from_fork_asm+0x1a/0x30 [ 162.497164] </TASK> [ 162.497430] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale: Failure
------------[ cut here ]------------ [ 162.427328] WARNING: CPU: 0 PID: 2760 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190 [ 162.428762] Modules linked in: [ 162.429311] CPU: 0 UID: 0 PID: 2760 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 162.430231] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 162.430835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 162.431174] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 [ 162.432079] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 162.433113] RSP: 0000:ffff88810a5bfc78 EFLAGS: 00010286 [ 162.433821] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 [ 162.434158] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffa88312f8 [ 162.434613] RBP: ffff88810a5bfca0 R08: 0000000000000000 R09: ffffed10212a9260 [ 162.435806] R10: ffff888109549307 R11: 0000000000000000 R12: ffffffffa88312e0 [ 162.436277] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a5bfd38 [ 162.436735] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 162.437127] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.437388] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 162.437815] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 162.438420] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 162.438803] Call Trace: [ 162.439723] <TASK> [ 162.440020] drm_test_rect_calc_hscale+0x108/0x270 [ 162.440359] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [ 162.441038] ? __schedule+0x10cc/0x2b60 [ 162.441437] ? __pfx_read_tsc+0x10/0x10 [ 162.442041] ? ktime_get_ts64+0x86/0x230 [ 162.442987] kunit_try_run_case+0x1a5/0x480 [ 162.443324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.443608] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 162.443965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 162.444775] ? __kthread_parkme+0x82/0x180 [ 162.445047] ? preempt_count_sub+0x50/0x80 [ 162.445437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.446069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 162.447079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 162.447661] kthread+0x337/0x6f0 [ 162.448156] ? trace_preempt_on+0x20/0xc0 [ 162.448462] ? __pfx_kthread+0x10/0x10 [ 162.449032] ? _raw_spin_unlock_irq+0x47/0x80 [ 162.449369] ? calculate_sigpending+0x7b/0xa0 [ 162.449884] ? __pfx_kthread+0x10/0x10 [ 162.450372] ret_from_fork+0x116/0x1d0 [ 162.450713] ? __pfx_kthread+0x10/0x10 [ 162.451070] ret_from_fork_asm+0x1a/0x30 [ 162.451466] </TASK> [ 162.451693] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 162.396275] WARNING: CPU: 1 PID: 2758 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190 [ 162.398009] Modules linked in: [ 162.398596] CPU: 1 UID: 0 PID: 2758 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 162.399326] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 162.399654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 162.400676] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 [ 162.401316] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 162.402496] RSP: 0000:ffff88810a637c78 EFLAGS: 00010286 [ 162.402979] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 [ 162.403384] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffa88312c0 [ 162.404370] RBP: ffff88810a637ca0 R08: 0000000000000000 R09: ffffed1020cc5f00 [ 162.404816] R10: ffff88810662f807 R11: 0000000000000000 R12: ffffffffa88312a8 [ 162.405380] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810a637d38 [ 162.405724] FS: 0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000 [ 162.407029] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.407498] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 162.408429] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483 [ 162.408888] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 162.409608] Call Trace: [ 162.409789] <TASK> [ 162.409952] drm_test_rect_calc_hscale+0x108/0x270 [ 162.410450] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [ 162.410760] ? __schedule+0x10cc/0x2b60 [ 162.411629] ? __pfx_read_tsc+0x10/0x10 [ 162.412403] ? ktime_get_ts64+0x86/0x230 [ 162.412949] kunit_try_run_case+0x1a5/0x480 [ 162.413316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.413904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 162.414194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 162.414885] ? __kthread_parkme+0x82/0x180 [ 162.415193] ? preempt_count_sub+0x50/0x80 [ 162.415424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.415737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 162.415960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 162.416273] kthread+0x337/0x6f0 [ 162.416608] ? trace_preempt_on+0x20/0xc0 [ 162.417190] ? __pfx_kthread+0x10/0x10 [ 162.417584] ? _raw_spin_unlock_irq+0x47/0x80 [ 162.418317] ? calculate_sigpending+0x7b/0xa0 [ 162.419101] ? __pfx_kthread+0x10/0x10 [ 162.419700] ret_from_fork+0x116/0x1d0 [ 162.420007] ? __pfx_kthread+0x10/0x10 [ 162.420258] ret_from_fork_asm+0x1a/0x30 [ 162.420680] </TASK> [ 162.420957] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
[ 19.251191] ================================================================== [ 19.251602] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 19.251602] [ 19.251823] Use-after-free read at 0x(____ptrval____) (in kfence-#86): [ 19.252108] test_use_after_free_read+0x129/0x270 [ 19.252238] kunit_try_run_case+0x1a5/0x480 [ 19.252403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.252594] kthread+0x337/0x6f0 [ 19.252687] ret_from_fork+0x116/0x1d0 [ 19.252870] ret_from_fork_asm+0x1a/0x30 [ 19.253112] [ 19.253250] kfence-#86: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 19.253250] [ 19.253470] allocated by task 315 on cpu 0 at 19.251042s (0.002425s ago): [ 19.253716] test_alloc+0x2a6/0x10f0 [ 19.253880] test_use_after_free_read+0xdc/0x270 [ 19.253987] kunit_try_run_case+0x1a5/0x480 [ 19.254084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.254256] kthread+0x337/0x6f0 [ 19.254495] ret_from_fork+0x116/0x1d0 [ 19.254705] ret_from_fork_asm+0x1a/0x30 [ 19.254965] [ 19.255092] freed by task 315 on cpu 0 at 19.251094s (0.003994s ago): [ 19.255332] test_use_after_free_read+0xfb/0x270 [ 19.255494] kunit_try_run_case+0x1a5/0x480 [ 19.255595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.255707] kthread+0x337/0x6f0 [ 19.255925] ret_from_fork+0x116/0x1d0 [ 19.256148] ret_from_fork_asm+0x1a/0x30 [ 19.256374] [ 19.256517] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.256771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.256867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.257083] ================================================================== [ 19.147373] ================================================================== [ 19.147783] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 19.147783] [ 19.148026] Use-after-free read at 0x(____ptrval____) (in kfence-#85): [ 19.148246] test_use_after_free_read+0x129/0x270 [ 19.148543] kunit_try_run_case+0x1a5/0x480 [ 19.148651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.148766] kthread+0x337/0x6f0 [ 19.149006] ret_from_fork+0x116/0x1d0 [ 19.149265] ret_from_fork_asm+0x1a/0x30 [ 19.149525] [ 19.149612] kfence-#85: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 19.149612] [ 19.149794] allocated by task 313 on cpu 1 at 19.147056s (0.002736s ago): [ 19.150192] test_alloc+0x364/0x10f0 [ 19.150301] test_use_after_free_read+0xdc/0x270 [ 19.150421] kunit_try_run_case+0x1a5/0x480 [ 19.150572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.150867] kthread+0x337/0x6f0 [ 19.151083] ret_from_fork+0x116/0x1d0 [ 19.151354] ret_from_fork_asm+0x1a/0x30 [ 19.151528] [ 19.151753] freed by task 313 on cpu 1 at 19.147152s (0.004500s ago): [ 19.152166] test_use_after_free_read+0x1e7/0x270 [ 19.152344] kunit_try_run_case+0x1a5/0x480 [ 19.152571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.152778] kthread+0x337/0x6f0 [ 19.152868] ret_from_fork+0x116/0x1d0 [ 19.153102] ret_from_fork_asm+0x1a/0x30 [ 19.153267] [ 19.153353] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.153843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.153997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.154158] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
[ 19.043104] ================================================================== [ 19.043443] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 19.043443] [ 19.043694] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#84): [ 19.043841] test_out_of_bounds_write+0x10d/0x260 [ 19.044136] kunit_try_run_case+0x1a5/0x480 [ 19.044393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.044636] kthread+0x337/0x6f0 [ 19.044735] ret_from_fork+0x116/0x1d0 [ 19.044985] ret_from_fork_asm+0x1a/0x30 [ 19.045206] [ 19.045278] kfence-#84: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 19.045278] [ 19.045662] allocated by task 311 on cpu 0 at 19.043032s (0.002627s ago): [ 19.045937] test_alloc+0x2a6/0x10f0 [ 19.046045] test_out_of_bounds_write+0xd4/0x260 [ 19.046206] kunit_try_run_case+0x1a5/0x480 [ 19.046317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.046440] kthread+0x337/0x6f0 [ 19.046660] ret_from_fork+0x116/0x1d0 [ 19.046902] ret_from_fork_asm+0x1a/0x30 [ 19.047150] [ 19.047294] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 19.047613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.047793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.047948] ================================================================== [ 18.939117] ================================================================== [ 18.939488] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 18.939488] [ 18.939709] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#83): [ 18.939846] test_out_of_bounds_write+0x10d/0x260 [ 18.940101] kunit_try_run_case+0x1a5/0x480 [ 18.940342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.940590] kthread+0x337/0x6f0 [ 18.940681] ret_from_fork+0x116/0x1d0 [ 18.940770] ret_from_fork_asm+0x1a/0x30 [ 18.940977] [ 18.941090] kfence-#83: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 18.941090] [ 18.941468] allocated by task 309 on cpu 1 at 18.938991s (0.002475s ago): [ 18.941612] test_alloc+0x364/0x10f0 [ 18.941813] test_out_of_bounds_write+0xd4/0x260 [ 18.942046] kunit_try_run_case+0x1a5/0x480 [ 18.942249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.942450] kthread+0x337/0x6f0 [ 18.942535] ret_from_fork+0x116/0x1d0 [ 18.942620] ret_from_fork_asm+0x1a/0x30 [ 18.942709] [ 18.942788] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.943405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.943600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.943947] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
[ 18.835102] ================================================================== [ 18.835647] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 18.835647] [ 18.835889] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#82): [ 18.836232] test_out_of_bounds_read+0x216/0x4e0 [ 18.836464] kunit_try_run_case+0x1a5/0x480 [ 18.836637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.836817] kthread+0x337/0x6f0 [ 18.836917] ret_from_fork+0x116/0x1d0 [ 18.837113] ret_from_fork_asm+0x1a/0x30 [ 18.837403] [ 18.837512] kfence-#82: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 18.837512] [ 18.837895] allocated by task 307 on cpu 1 at 18.835033s (0.002859s ago): [ 18.838281] test_alloc+0x2a6/0x10f0 [ 18.838576] test_out_of_bounds_read+0x1e2/0x4e0 [ 18.838860] kunit_try_run_case+0x1a5/0x480 [ 18.839089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.839339] kthread+0x337/0x6f0 [ 18.839492] ret_from_fork+0x116/0x1d0 [ 18.839664] ret_from_fork_asm+0x1a/0x30 [ 18.839920] [ 18.840083] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.840479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.840739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.841048] ================================================================== [ 18.419369] ================================================================== [ 18.419691] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 18.419691] [ 18.419904] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#78): [ 18.420046] test_out_of_bounds_read+0x126/0x4e0 [ 18.420168] kunit_try_run_case+0x1a5/0x480 [ 18.420317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.420426] kthread+0x337/0x6f0 [ 18.420508] ret_from_fork+0x116/0x1d0 [ 18.420684] ret_from_fork_asm+0x1a/0x30 [ 18.420902] [ 18.421017] kfence-#78: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 18.421017] [ 18.421299] allocated by task 307 on cpu 1 at 18.419180s (0.002117s ago): [ 18.421465] test_alloc+0x2a6/0x10f0 [ 18.421552] test_out_of_bounds_read+0xed/0x4e0 [ 18.421801] kunit_try_run_case+0x1a5/0x480 [ 18.422043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.422292] kthread+0x337/0x6f0 [ 18.422448] ret_from_fork+0x116/0x1d0 [ 18.422539] ret_from_fork_asm+0x1a/0x30 [ 18.422633] [ 18.422718] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.423025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.423258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.423682] ================================================================== [ 18.315144] ================================================================== [ 18.315480] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 18.315480] [ 18.315732] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#77): [ 18.315877] test_out_of_bounds_read+0x216/0x4e0 [ 18.316131] kunit_try_run_case+0x1a5/0x480 [ 18.316378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.316657] kthread+0x337/0x6f0 [ 18.316756] ret_from_fork+0x116/0x1d0 [ 18.316849] ret_from_fork_asm+0x1a/0x30 [ 18.316968] [ 18.317089] kfence-#77: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 18.317089] [ 18.317479] allocated by task 305 on cpu 0 at 18.315003s (0.002474s ago): [ 18.317629] test_alloc+0x364/0x10f0 [ 18.317719] test_out_of_bounds_read+0x1e2/0x4e0 [ 18.317822] kunit_try_run_case+0x1a5/0x480 [ 18.318023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.318294] kthread+0x337/0x6f0 [ 18.318486] ret_from_fork+0x116/0x1d0 [ 18.318687] ret_from_fork_asm+0x1a/0x30 [ 18.318901] [ 18.319029] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.319494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.319584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.319732] ================================================================== [ 18.212444] ================================================================== [ 18.212830] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 18.212830] [ 18.213103] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#76): [ 18.213630] test_out_of_bounds_read+0x126/0x4e0 [ 18.213900] kunit_try_run_case+0x1a5/0x480 [ 18.214138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.214261] kthread+0x337/0x6f0 [ 18.214468] ret_from_fork+0x116/0x1d0 [ 18.214701] ret_from_fork_asm+0x1a/0x30 [ 18.214898] [ 18.215119] kfence-#76: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 18.215119] [ 18.215699] allocated by task 305 on cpu 0 at 18.210961s (0.004678s ago): [ 18.216234] test_alloc+0x364/0x10f0 [ 18.216475] test_out_of_bounds_read+0xed/0x4e0 [ 18.216624] kunit_try_run_case+0x1a5/0x480 [ 18.216809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.216922] kthread+0x337/0x6f0 [ 18.217006] ret_from_fork+0x116/0x1d0 [ 18.217092] ret_from_fork_asm+0x1a/0x30 [ 18.217240] [ 18.217368] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.217957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.218170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.218541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
[ 18.065615] ================================================================== [ 18.065791] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 18.066087] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 18.066468] [ 18.066605] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.066658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.066672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.066695] Call Trace: [ 18.066712] <TASK> [ 18.066729] dump_stack_lvl+0x73/0xb0 [ 18.066758] print_report+0xd1/0x650 [ 18.066783] ? __virt_addr_valid+0x1db/0x2d0 [ 18.066807] ? strncpy_from_user+0x2e/0x1d0 [ 18.066831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.066856] ? strncpy_from_user+0x2e/0x1d0 [ 18.066880] kasan_report+0x141/0x180 [ 18.066904] ? strncpy_from_user+0x2e/0x1d0 [ 18.066934] kasan_check_range+0x10c/0x1c0 [ 18.066959] __kasan_check_write+0x18/0x20 [ 18.066981] strncpy_from_user+0x2e/0x1d0 [ 18.067009] copy_user_test_oob+0x760/0x10f0 [ 18.067036] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.067061] ? finish_task_switch.isra.0+0x153/0x700 [ 18.067083] ? __switch_to+0x47/0xf50 [ 18.067109] ? __schedule+0x10cc/0x2b60 [ 18.067133] ? __pfx_read_tsc+0x10/0x10 [ 18.067155] ? ktime_get_ts64+0x86/0x230 [ 18.067181] kunit_try_run_case+0x1a5/0x480 [ 18.067205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.067238] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.067264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.067289] ? __kthread_parkme+0x82/0x180 [ 18.067311] ? preempt_count_sub+0x50/0x80 [ 18.067335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.067360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.067385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.067409] kthread+0x337/0x6f0 [ 18.067430] ? trace_preempt_on+0x20/0xc0 [ 18.067455] ? __pfx_kthread+0x10/0x10 [ 18.067477] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.067499] ? calculate_sigpending+0x7b/0xa0 [ 18.067524] ? __pfx_kthread+0x10/0x10 [ 18.067547] ret_from_fork+0x116/0x1d0 [ 18.067567] ? __pfx_kthread+0x10/0x10 [ 18.067589] ret_from_fork_asm+0x1a/0x30 [ 18.067623] </TASK> [ 18.067635] [ 18.074366] Allocated by task 303: [ 18.074453] kasan_save_stack+0x45/0x70 [ 18.074543] kasan_save_track+0x18/0x40 [ 18.074631] kasan_save_alloc_info+0x3b/0x50 [ 18.074719] __kasan_kmalloc+0xb7/0xc0 [ 18.074803] __kmalloc_noprof+0x1c9/0x500 [ 18.075011] kunit_kmalloc_array+0x25/0x60 [ 18.075267] copy_user_test_oob+0xab/0x10f0 [ 18.075527] kunit_try_run_case+0x1a5/0x480 [ 18.075792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.075991] kthread+0x337/0x6f0 [ 18.076073] ret_from_fork+0x116/0x1d0 [ 18.076156] ret_from_fork_asm+0x1a/0x30 [ 18.076254] [ 18.076371] The buggy address belongs to the object at ffff888102b5b800 [ 18.076371] which belongs to the cache kmalloc-128 of size 128 [ 18.076993] The buggy address is located 0 bytes inside of [ 18.076993] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 18.077302] [ 18.077402] The buggy address belongs to the physical page: [ 18.077569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 18.077806] flags: 0x200000000000000(node=0|zone=2) [ 18.077911] page_type: f5(slab) [ 18.077999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.078134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.078273] page dumped because: kasan: bad access detected [ 18.078387] [ 18.078443] Memory state around the buggy address: [ 18.078540] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.078666] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.078791] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.078912] ^ [ 18.079031] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.079151] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.079332] ================================================================== [ 18.079763] ================================================================== [ 18.079907] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 18.080044] Write of size 1 at addr ffff888102b5b878 by task kunit_try_catch/303 [ 18.080176] [ 18.080254] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.080302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.080315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.080337] Call Trace: [ 18.080351] <TASK> [ 18.080366] dump_stack_lvl+0x73/0xb0 [ 18.080392] print_report+0xd1/0x650 [ 18.080416] ? __virt_addr_valid+0x1db/0x2d0 [ 18.080439] ? strncpy_from_user+0x1a5/0x1d0 [ 18.080462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.080485] ? strncpy_from_user+0x1a5/0x1d0 [ 18.080508] kasan_report+0x141/0x180 [ 18.080531] ? strncpy_from_user+0x1a5/0x1d0 [ 18.080559] __asan_report_store1_noabort+0x1b/0x30 [ 18.080581] strncpy_from_user+0x1a5/0x1d0 [ 18.080606] copy_user_test_oob+0x760/0x10f0 [ 18.080631] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.080655] ? finish_task_switch.isra.0+0x153/0x700 [ 18.080676] ? __switch_to+0x47/0xf50 [ 18.080700] ? __schedule+0x10cc/0x2b60 [ 18.080723] ? __pfx_read_tsc+0x10/0x10 [ 18.080743] ? ktime_get_ts64+0x86/0x230 [ 18.080767] kunit_try_run_case+0x1a5/0x480 [ 18.080791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.080813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.080836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.080858] ? __kthread_parkme+0x82/0x180 [ 18.080878] ? preempt_count_sub+0x50/0x80 [ 18.080901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.080925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.080948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.080971] kthread+0x337/0x6f0 [ 18.080991] ? trace_preempt_on+0x20/0xc0 [ 18.081014] ? __pfx_kthread+0x10/0x10 [ 18.081062] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.081084] ? calculate_sigpending+0x7b/0xa0 [ 18.081108] ? __pfx_kthread+0x10/0x10 [ 18.081130] ret_from_fork+0x116/0x1d0 [ 18.081149] ? __pfx_kthread+0x10/0x10 [ 18.081170] ret_from_fork_asm+0x1a/0x30 [ 18.081202] </TASK> [ 18.081213] [ 18.088191] Allocated by task 303: [ 18.088376] kasan_save_stack+0x45/0x70 [ 18.088512] kasan_save_track+0x18/0x40 [ 18.088682] kasan_save_alloc_info+0x3b/0x50 [ 18.088796] __kasan_kmalloc+0xb7/0xc0 [ 18.088962] __kmalloc_noprof+0x1c9/0x500 [ 18.089130] kunit_kmalloc_array+0x25/0x60 [ 18.089268] copy_user_test_oob+0xab/0x10f0 [ 18.089473] kunit_try_run_case+0x1a5/0x480 [ 18.089619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.089790] kthread+0x337/0x6f0 [ 18.089962] ret_from_fork+0x116/0x1d0 [ 18.090069] ret_from_fork_asm+0x1a/0x30 [ 18.090292] [ 18.090395] The buggy address belongs to the object at ffff888102b5b800 [ 18.090395] which belongs to the cache kmalloc-128 of size 128 [ 18.090660] The buggy address is located 0 bytes to the right of [ 18.090660] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 18.090988] [ 18.091108] The buggy address belongs to the physical page: [ 18.091331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 18.091577] flags: 0x200000000000000(node=0|zone=2) [ 18.091736] page_type: f5(slab) [ 18.091918] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.092186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.092445] page dumped because: kasan: bad access detected [ 18.092634] [ 18.092686] Memory state around the buggy address: [ 18.092896] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.093040] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093308] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.093542] ^ [ 18.093727] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093901] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.094023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
[ 18.021593] ================================================================== [ 18.021844] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 18.022121] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 18.022624] [ 18.022703] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.022756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.022770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.022792] Call Trace: [ 18.022812] <TASK> [ 18.022833] dump_stack_lvl+0x73/0xb0 [ 18.022864] print_report+0xd1/0x650 [ 18.022888] ? __virt_addr_valid+0x1db/0x2d0 [ 18.022912] ? copy_user_test_oob+0x4aa/0x10f0 [ 18.022937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.022961] ? copy_user_test_oob+0x4aa/0x10f0 [ 18.022986] kasan_report+0x141/0x180 [ 18.023010] ? copy_user_test_oob+0x4aa/0x10f0 [ 18.023040] kasan_check_range+0x10c/0x1c0 [ 18.023065] __kasan_check_read+0x15/0x20 [ 18.023087] copy_user_test_oob+0x4aa/0x10f0 [ 18.023114] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.023138] ? finish_task_switch.isra.0+0x153/0x700 [ 18.023161] ? __switch_to+0x47/0xf50 [ 18.023186] ? __schedule+0x10cc/0x2b60 [ 18.023210] ? __pfx_read_tsc+0x10/0x10 [ 18.023244] ? ktime_get_ts64+0x86/0x230 [ 18.023271] kunit_try_run_case+0x1a5/0x480 [ 18.023297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.023320] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.023344] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.023369] ? __kthread_parkme+0x82/0x180 [ 18.023391] ? preempt_count_sub+0x50/0x80 [ 18.023415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.023439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.023463] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.023487] kthread+0x337/0x6f0 [ 18.023508] ? trace_preempt_on+0x20/0xc0 [ 18.023532] ? __pfx_kthread+0x10/0x10 [ 18.023554] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.023574] ? calculate_sigpending+0x7b/0xa0 [ 18.023599] ? __pfx_kthread+0x10/0x10 [ 18.023621] ret_from_fork+0x116/0x1d0 [ 18.023640] ? __pfx_kthread+0x10/0x10 [ 18.023662] ret_from_fork_asm+0x1a/0x30 [ 18.023694] </TASK> [ 18.023706] [ 18.030051] Allocated by task 303: [ 18.030234] kasan_save_stack+0x45/0x70 [ 18.030341] kasan_save_track+0x18/0x40 [ 18.030541] kasan_save_alloc_info+0x3b/0x50 [ 18.030669] __kasan_kmalloc+0xb7/0xc0 [ 18.030805] __kmalloc_noprof+0x1c9/0x500 [ 18.030900] kunit_kmalloc_array+0x25/0x60 [ 18.030993] copy_user_test_oob+0xab/0x10f0 [ 18.031255] kunit_try_run_case+0x1a5/0x480 [ 18.031480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.031683] kthread+0x337/0x6f0 [ 18.031767] ret_from_fork+0x116/0x1d0 [ 18.031851] ret_from_fork_asm+0x1a/0x30 [ 18.032093] [ 18.032208] The buggy address belongs to the object at ffff888102b5b800 [ 18.032208] which belongs to the cache kmalloc-128 of size 128 [ 18.032682] The buggy address is located 0 bytes inside of [ 18.032682] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 18.032982] [ 18.033096] The buggy address belongs to the physical page: [ 18.033280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 18.033424] flags: 0x200000000000000(node=0|zone=2) [ 18.033529] page_type: f5(slab) [ 18.033617] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.033884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.034198] page dumped because: kasan: bad access detected [ 18.034478] [ 18.034605] Memory state around the buggy address: [ 18.034866] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.034999] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.035131] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.035515] ^ [ 18.035896] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.036147] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.036324] ================================================================== [ 18.004793] ================================================================== [ 18.005128] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 18.005396] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 18.005806] [ 18.005926] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.005985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.005999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.006022] Call Trace: [ 18.006040] <TASK> [ 18.006060] dump_stack_lvl+0x73/0xb0 [ 18.006100] print_report+0xd1/0x650 [ 18.006127] ? __virt_addr_valid+0x1db/0x2d0 [ 18.006150] ? copy_user_test_oob+0x3fd/0x10f0 [ 18.006176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.006199] ? copy_user_test_oob+0x3fd/0x10f0 [ 18.006309] kasan_report+0x141/0x180 [ 18.006362] ? copy_user_test_oob+0x3fd/0x10f0 [ 18.006396] kasan_check_range+0x10c/0x1c0 [ 18.006423] __kasan_check_write+0x18/0x20 [ 18.006447] copy_user_test_oob+0x3fd/0x10f0 [ 18.006475] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.006500] ? finish_task_switch.isra.0+0x153/0x700 [ 18.006526] ? __switch_to+0x47/0xf50 [ 18.006556] ? __schedule+0x10cc/0x2b60 [ 18.006581] ? __pfx_read_tsc+0x10/0x10 [ 18.006604] ? ktime_get_ts64+0x86/0x230 [ 18.006631] kunit_try_run_case+0x1a5/0x480 [ 18.006659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.006684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.006709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.006733] ? __kthread_parkme+0x82/0x180 [ 18.006756] ? preempt_count_sub+0x50/0x80 [ 18.006781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.006806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.006831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.006856] kthread+0x337/0x6f0 [ 18.006877] ? trace_preempt_on+0x20/0xc0 [ 18.006904] ? __pfx_kthread+0x10/0x10 [ 18.006926] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.006949] ? calculate_sigpending+0x7b/0xa0 [ 18.006976] ? __pfx_kthread+0x10/0x10 [ 18.006999] ret_from_fork+0x116/0x1d0 [ 18.007020] ? __pfx_kthread+0x10/0x10 [ 18.007042] ret_from_fork_asm+0x1a/0x30 [ 18.007076] </TASK> [ 18.007090] [ 18.012714] Allocated by task 303: [ 18.012960] kasan_save_stack+0x45/0x70 [ 18.013204] kasan_save_track+0x18/0x40 [ 18.014176] kasan_save_alloc_info+0x3b/0x50 [ 18.014635] __kasan_kmalloc+0xb7/0xc0 [ 18.014784] __kmalloc_noprof+0x1c9/0x500 [ 18.014999] kunit_kmalloc_array+0x25/0x60 [ 18.015170] copy_user_test_oob+0xab/0x10f0 [ 18.015352] kunit_try_run_case+0x1a5/0x480 [ 18.015448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.015735] kthread+0x337/0x6f0 [ 18.015931] ret_from_fork+0x116/0x1d0 [ 18.016148] ret_from_fork_asm+0x1a/0x30 [ 18.016296] [ 18.016356] The buggy address belongs to the object at ffff888102b5b800 [ 18.016356] which belongs to the cache kmalloc-128 of size 128 [ 18.016800] The buggy address is located 0 bytes inside of [ 18.016800] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 18.017274] [ 18.017409] The buggy address belongs to the physical page: [ 18.017633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 18.017794] flags: 0x200000000000000(node=0|zone=2) [ 18.018070] page_type: f5(slab) [ 18.018262] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.018431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.018771] page dumped because: kasan: bad access detected [ 18.018879] [ 18.018933] Memory state around the buggy address: [ 18.019042] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.019410] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.019820] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.020131] ^ [ 18.020369] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020578] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020854] ================================================================== [ 18.050406] ================================================================== [ 18.050572] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 18.050760] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 18.051061] [ 18.051200] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.051259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.051273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.051295] Call Trace: [ 18.051311] <TASK> [ 18.051327] dump_stack_lvl+0x73/0xb0 [ 18.051355] print_report+0xd1/0x650 [ 18.051378] ? __virt_addr_valid+0x1db/0x2d0 [ 18.051402] ? copy_user_test_oob+0x604/0x10f0 [ 18.051426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.051449] ? copy_user_test_oob+0x604/0x10f0 [ 18.051474] kasan_report+0x141/0x180 [ 18.051496] ? copy_user_test_oob+0x604/0x10f0 [ 18.051525] kasan_check_range+0x10c/0x1c0 [ 18.051550] __kasan_check_read+0x15/0x20 [ 18.051571] copy_user_test_oob+0x604/0x10f0 [ 18.051598] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.051620] ? finish_task_switch.isra.0+0x153/0x700 [ 18.051641] ? __switch_to+0x47/0xf50 [ 18.051667] ? __schedule+0x10cc/0x2b60 [ 18.051689] ? __pfx_read_tsc+0x10/0x10 [ 18.051709] ? ktime_get_ts64+0x86/0x230 [ 18.051733] kunit_try_run_case+0x1a5/0x480 [ 18.051757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.051779] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.051801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.051824] ? __kthread_parkme+0x82/0x180 [ 18.051844] ? preempt_count_sub+0x50/0x80 [ 18.051867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.051891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.051913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.051937] kthread+0x337/0x6f0 [ 18.051957] ? trace_preempt_on+0x20/0xc0 [ 18.051981] ? __pfx_kthread+0x10/0x10 [ 18.052002] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.052023] ? calculate_sigpending+0x7b/0xa0 [ 18.052048] ? __pfx_kthread+0x10/0x10 [ 18.052071] ret_from_fork+0x116/0x1d0 [ 18.052091] ? __pfx_kthread+0x10/0x10 [ 18.052112] ret_from_fork_asm+0x1a/0x30 [ 18.052144] </TASK> [ 18.052156] [ 18.058683] Allocated by task 303: [ 18.058850] kasan_save_stack+0x45/0x70 [ 18.058997] kasan_save_track+0x18/0x40 [ 18.059154] kasan_save_alloc_info+0x3b/0x50 [ 18.059331] __kasan_kmalloc+0xb7/0xc0 [ 18.059520] __kmalloc_noprof+0x1c9/0x500 [ 18.059664] kunit_kmalloc_array+0x25/0x60 [ 18.059841] copy_user_test_oob+0xab/0x10f0 [ 18.060034] kunit_try_run_case+0x1a5/0x480 [ 18.060127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.060241] kthread+0x337/0x6f0 [ 18.060322] ret_from_fork+0x116/0x1d0 [ 18.060407] ret_from_fork_asm+0x1a/0x30 [ 18.060494] [ 18.060546] The buggy address belongs to the object at ffff888102b5b800 [ 18.060546] which belongs to the cache kmalloc-128 of size 128 [ 18.061171] The buggy address is located 0 bytes inside of [ 18.061171] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 18.061849] [ 18.061906] The buggy address belongs to the physical page: [ 18.062009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 18.062148] flags: 0x200000000000000(node=0|zone=2) [ 18.062260] page_type: f5(slab) [ 18.062351] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.062759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.063069] page dumped because: kasan: bad access detected [ 18.063351] [ 18.063447] Memory state around the buggy address: [ 18.063701] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.063880] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064031] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.064307] ^ [ 18.064550] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064676] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064846] ================================================================== [ 18.036827] ================================================================== [ 18.037101] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 18.037390] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 18.037665] [ 18.037756] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 18.037809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.037823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.037845] Call Trace: [ 18.037863] <TASK> [ 18.037882] dump_stack_lvl+0x73/0xb0 [ 18.037912] print_report+0xd1/0x650 [ 18.037938] ? __virt_addr_valid+0x1db/0x2d0 [ 18.037962] ? copy_user_test_oob+0x557/0x10f0 [ 18.037986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.038011] ? copy_user_test_oob+0x557/0x10f0 [ 18.038037] kasan_report+0x141/0x180 [ 18.038061] ? copy_user_test_oob+0x557/0x10f0 [ 18.038091] kasan_check_range+0x10c/0x1c0 [ 18.038117] __kasan_check_write+0x18/0x20 [ 18.038138] copy_user_test_oob+0x557/0x10f0 [ 18.038166] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.038191] ? finish_task_switch.isra.0+0x153/0x700 [ 18.038214] ? __switch_to+0x47/0xf50 [ 18.038253] ? __schedule+0x10cc/0x2b60 [ 18.038277] ? __pfx_read_tsc+0x10/0x10 [ 18.038298] ? ktime_get_ts64+0x86/0x230 [ 18.038322] kunit_try_run_case+0x1a5/0x480 [ 18.038359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.038387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.038412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.038436] ? __kthread_parkme+0x82/0x180 [ 18.038458] ? preempt_count_sub+0x50/0x80 [ 18.038484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.038509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.038531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.038555] kthread+0x337/0x6f0 [ 18.038577] ? trace_preempt_on+0x20/0xc0 [ 18.038601] ? __pfx_kthread+0x10/0x10 [ 18.038623] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.038645] ? calculate_sigpending+0x7b/0xa0 [ 18.038670] ? __pfx_kthread+0x10/0x10 [ 18.038693] ret_from_fork+0x116/0x1d0 [ 18.038712] ? __pfx_kthread+0x10/0x10 [ 18.038735] ret_from_fork_asm+0x1a/0x30 [ 18.038768] </TASK> [ 18.038780] [ 18.043968] Allocated by task 303: [ 18.044064] kasan_save_stack+0x45/0x70 [ 18.044160] kasan_save_track+0x18/0x40 [ 18.044346] kasan_save_alloc_info+0x3b/0x50 [ 18.044599] __kasan_kmalloc+0xb7/0xc0 [ 18.044771] __kmalloc_noprof+0x1c9/0x500 [ 18.044948] kunit_kmalloc_array+0x25/0x60 [ 18.045139] copy_user_test_oob+0xab/0x10f0 [ 18.045382] kunit_try_run_case+0x1a5/0x480 [ 18.045623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.045871] kthread+0x337/0x6f0 [ 18.046031] ret_from_fork+0x116/0x1d0 [ 18.046192] ret_from_fork_asm+0x1a/0x30 [ 18.046294] [ 18.046358] The buggy address belongs to the object at ffff888102b5b800 [ 18.046358] which belongs to the cache kmalloc-128 of size 128 [ 18.046879] The buggy address is located 0 bytes inside of [ 18.046879] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 18.047307] [ 18.047369] The buggy address belongs to the physical page: [ 18.047476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 18.047911] flags: 0x200000000000000(node=0|zone=2) [ 18.048192] page_type: f5(slab) [ 18.048306] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.048446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.048594] page dumped because: kasan: bad access detected [ 18.048703] [ 18.048810] Memory state around the buggy address: [ 18.049047] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.049317] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049547] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.049674] ^ [ 18.049800] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.049924] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.050043] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user: Failure
[ 17.985791] ================================================================== [ 17.986122] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70 [ 17.986379] Read of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 17.986730] [ 17.986921] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.986986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.987002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.987025] Call Trace: [ 17.987044] <TASK> [ 17.987065] dump_stack_lvl+0x73/0xb0 [ 17.987107] print_report+0xd1/0x650 [ 17.987134] ? __virt_addr_valid+0x1db/0x2d0 [ 17.987175] ? _copy_to_user+0x3c/0x70 [ 17.987195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.987237] ? _copy_to_user+0x3c/0x70 [ 17.987260] kasan_report+0x141/0x180 [ 17.987285] ? _copy_to_user+0x3c/0x70 [ 17.987309] kasan_check_range+0x10c/0x1c0 [ 17.987335] __kasan_check_read+0x15/0x20 [ 17.987356] _copy_to_user+0x3c/0x70 [ 17.987376] copy_user_test_oob+0x364/0x10f0 [ 17.987416] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.987441] ? finish_task_switch.isra.0+0x153/0x700 [ 17.987478] ? __switch_to+0x47/0xf50 [ 17.987506] ? __schedule+0x10cc/0x2b60 [ 17.987543] ? __pfx_read_tsc+0x10/0x10 [ 17.987569] ? ktime_get_ts64+0x86/0x230 [ 17.987596] kunit_try_run_case+0x1a5/0x480 [ 17.987624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.987647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.987672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.987696] ? __kthread_parkme+0x82/0x180 [ 17.987719] ? preempt_count_sub+0x50/0x80 [ 17.987743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.987768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.987791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.987815] kthread+0x337/0x6f0 [ 17.987836] ? trace_preempt_on+0x20/0xc0 [ 17.987864] ? __pfx_kthread+0x10/0x10 [ 17.987885] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.987907] ? calculate_sigpending+0x7b/0xa0 [ 17.987933] ? __pfx_kthread+0x10/0x10 [ 17.987955] ret_from_fork+0x116/0x1d0 [ 17.987974] ? __pfx_kthread+0x10/0x10 [ 17.987995] ret_from_fork_asm+0x1a/0x30 [ 17.988028] </TASK> [ 17.988041] [ 17.993176] Allocated by task 303: [ 17.993271] kasan_save_stack+0x45/0x70 [ 17.993365] kasan_save_track+0x18/0x40 [ 17.993454] kasan_save_alloc_info+0x3b/0x50 [ 17.993542] __kasan_kmalloc+0xb7/0xc0 [ 17.993701] __kmalloc_noprof+0x1c9/0x500 [ 17.993944] kunit_kmalloc_array+0x25/0x60 [ 17.994226] copy_user_test_oob+0xab/0x10f0 [ 17.994491] kunit_try_run_case+0x1a5/0x480 [ 17.994771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.995037] kthread+0x337/0x6f0 [ 17.995121] ret_from_fork+0x116/0x1d0 [ 17.995209] ret_from_fork_asm+0x1a/0x30 [ 17.995312] [ 17.995366] The buggy address belongs to the object at ffff888102b5b800 [ 17.995366] which belongs to the cache kmalloc-128 of size 128 [ 17.995817] The buggy address is located 0 bytes inside of [ 17.995817] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 17.996433] [ 17.996557] The buggy address belongs to the physical page: [ 17.996748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 17.996997] flags: 0x200000000000000(node=0|zone=2) [ 17.997236] page_type: f5(slab) [ 17.997362] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.997579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.997808] page dumped because: kasan: bad access detected [ 17.998032] [ 17.998105] Memory state around the buggy address: [ 17.998283] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.998470] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.998749] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.998968] ^ [ 17.999193] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999477] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999618] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user: Failure
[ 17.967315] ================================================================== [ 17.968019] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 17.968375] Write of size 121 at addr ffff888102b5b800 by task kunit_try_catch/303 [ 17.968584] [ 17.968671] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.968731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.968746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.968772] Call Trace: [ 17.968789] <TASK> [ 17.968814] dump_stack_lvl+0x73/0xb0 [ 17.968850] print_report+0xd1/0x650 [ 17.968878] ? __virt_addr_valid+0x1db/0x2d0 [ 17.968906] ? _copy_from_user+0x32/0x90 [ 17.968926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.968951] ? _copy_from_user+0x32/0x90 [ 17.968971] kasan_report+0x141/0x180 [ 17.968994] ? _copy_from_user+0x32/0x90 [ 17.969019] kasan_check_range+0x10c/0x1c0 [ 17.969044] __kasan_check_write+0x18/0x20 [ 17.969064] _copy_from_user+0x32/0x90 [ 17.969085] copy_user_test_oob+0x2be/0x10f0 [ 17.969111] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.969136] ? finish_task_switch.isra.0+0x153/0x700 [ 17.969161] ? __switch_to+0x47/0xf50 [ 17.969191] ? __schedule+0x10cc/0x2b60 [ 17.969214] ? __pfx_read_tsc+0x10/0x10 [ 17.969250] ? ktime_get_ts64+0x86/0x230 [ 17.969277] kunit_try_run_case+0x1a5/0x480 [ 17.969303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.969324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.969349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.969372] ? __kthread_parkme+0x82/0x180 [ 17.969394] ? preempt_count_sub+0x50/0x80 [ 17.969418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.969442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.969465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.969489] kthread+0x337/0x6f0 [ 17.969509] ? trace_preempt_on+0x20/0xc0 [ 17.969536] ? __pfx_kthread+0x10/0x10 [ 17.969557] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.969578] ? calculate_sigpending+0x7b/0xa0 [ 17.969606] ? __pfx_kthread+0x10/0x10 [ 17.969627] ret_from_fork+0x116/0x1d0 [ 17.969647] ? __pfx_kthread+0x10/0x10 [ 17.969667] ret_from_fork_asm+0x1a/0x30 [ 17.969701] </TASK> [ 17.969715] [ 17.975347] Allocated by task 303: [ 17.975514] kasan_save_stack+0x45/0x70 [ 17.975693] kasan_save_track+0x18/0x40 [ 17.975838] kasan_save_alloc_info+0x3b/0x50 [ 17.976001] __kasan_kmalloc+0xb7/0xc0 [ 17.976176] __kmalloc_noprof+0x1c9/0x500 [ 17.976352] kunit_kmalloc_array+0x25/0x60 [ 17.976535] copy_user_test_oob+0xab/0x10f0 [ 17.976679] kunit_try_run_case+0x1a5/0x480 [ 17.976835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.977045] kthread+0x337/0x6f0 [ 17.977230] ret_from_fork+0x116/0x1d0 [ 17.977405] ret_from_fork_asm+0x1a/0x30 [ 17.977552] [ 17.977645] The buggy address belongs to the object at ffff888102b5b800 [ 17.977645] which belongs to the cache kmalloc-128 of size 128 [ 17.977973] The buggy address is located 0 bytes inside of [ 17.977973] allocated 120-byte region [ffff888102b5b800, ffff888102b5b878) [ 17.978170] [ 17.978235] The buggy address belongs to the physical page: [ 17.978539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 17.979013] flags: 0x200000000000000(node=0|zone=2) [ 17.979168] page_type: f5(slab) [ 17.979276] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.979421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.979848] page dumped because: kasan: bad access detected [ 17.980134] [ 17.980199] Memory state around the buggy address: [ 17.980310] ffff888102b5b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.980439] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.980565] >ffff888102b5b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.980686] ^ [ 17.980809] ffff888102b5b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.980932] ffff888102b5b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.981051] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
[ 17.913727] ================================================================== [ 17.914147] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 17.914614] Read of size 8 at addr ffff888102b5b778 by task kunit_try_catch/299 [ 17.915119] [ 17.915263] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.915325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.915339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.915365] Call Trace: [ 17.915383] <TASK> [ 17.915406] dump_stack_lvl+0x73/0xb0 [ 17.915441] print_report+0xd1/0x650 [ 17.915604] ? __virt_addr_valid+0x1db/0x2d0 [ 17.915663] ? copy_to_kernel_nofault+0x225/0x260 [ 17.915691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.915755] ? copy_to_kernel_nofault+0x225/0x260 [ 17.915785] kasan_report+0x141/0x180 [ 17.915810] ? copy_to_kernel_nofault+0x225/0x260 [ 17.915850] __asan_report_load8_noabort+0x18/0x20 [ 17.915873] copy_to_kernel_nofault+0x225/0x260 [ 17.915899] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 17.915925] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 17.915949] ? finish_task_switch.isra.0+0x153/0x700 [ 17.915973] ? __schedule+0x10cc/0x2b60 [ 17.915996] ? trace_hardirqs_on+0x37/0xe0 [ 17.916028] ? __pfx_read_tsc+0x10/0x10 [ 17.916051] ? ktime_get_ts64+0x86/0x230 [ 17.916077] kunit_try_run_case+0x1a5/0x480 [ 17.916105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.916127] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.916151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.916173] ? __kthread_parkme+0x82/0x180 [ 17.916194] ? preempt_count_sub+0x50/0x80 [ 17.916217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.916262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.916286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.916309] kthread+0x337/0x6f0 [ 17.916328] ? trace_preempt_on+0x20/0xc0 [ 17.916351] ? __pfx_kthread+0x10/0x10 [ 17.916373] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.916394] ? calculate_sigpending+0x7b/0xa0 [ 17.916421] ? __pfx_kthread+0x10/0x10 [ 17.916443] ret_from_fork+0x116/0x1d0 [ 17.916463] ? __pfx_kthread+0x10/0x10 [ 17.916484] ret_from_fork_asm+0x1a/0x30 [ 17.916520] </TASK> [ 17.916535] [ 17.924006] Allocated by task 299: [ 17.924202] kasan_save_stack+0x45/0x70 [ 17.924403] kasan_save_track+0x18/0x40 [ 17.924877] kasan_save_alloc_info+0x3b/0x50 [ 17.925007] __kasan_kmalloc+0xb7/0xc0 [ 17.925290] __kmalloc_cache_noprof+0x189/0x420 [ 17.925435] copy_to_kernel_nofault_oob+0x12f/0x560 [ 17.925696] kunit_try_run_case+0x1a5/0x480 [ 17.925850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.926043] kthread+0x337/0x6f0 [ 17.926199] ret_from_fork+0x116/0x1d0 [ 17.926340] ret_from_fork_asm+0x1a/0x30 [ 17.926570] [ 17.926630] The buggy address belongs to the object at ffff888102b5b700 [ 17.926630] which belongs to the cache kmalloc-128 of size 128 [ 17.927032] The buggy address is located 0 bytes to the right of [ 17.927032] allocated 120-byte region [ffff888102b5b700, ffff888102b5b778) [ 17.927793] [ 17.927919] The buggy address belongs to the physical page: [ 17.928093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 17.928373] flags: 0x200000000000000(node=0|zone=2) [ 17.928573] page_type: f5(slab) [ 17.928770] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.928998] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.929244] page dumped because: kasan: bad access detected [ 17.929350] [ 17.929527] Memory state around the buggy address: [ 17.929744] ffff888102b5b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.929999] ffff888102b5b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930132] >ffff888102b5b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.930426] ^ [ 17.930942] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.931174] ffff888102b5b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.931365] ================================================================== [ 17.932081] ================================================================== [ 17.932622] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 17.932904] Write of size 8 at addr ffff888102b5b778 by task kunit_try_catch/299 [ 17.933064] [ 17.933145] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.933204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.933218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.933253] Call Trace: [ 17.933269] <TASK> [ 17.933292] dump_stack_lvl+0x73/0xb0 [ 17.933325] print_report+0xd1/0x650 [ 17.933351] ? __virt_addr_valid+0x1db/0x2d0 [ 17.933378] ? copy_to_kernel_nofault+0x99/0x260 [ 17.933402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.933427] ? copy_to_kernel_nofault+0x99/0x260 [ 17.933533] kasan_report+0x141/0x180 [ 17.933564] ? copy_to_kernel_nofault+0x99/0x260 [ 17.933595] kasan_check_range+0x10c/0x1c0 [ 17.933621] __kasan_check_write+0x18/0x20 [ 17.933642] copy_to_kernel_nofault+0x99/0x260 [ 17.933669] copy_to_kernel_nofault_oob+0x288/0x560 [ 17.933694] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 17.933719] ? finish_task_switch.isra.0+0x153/0x700 [ 17.933745] ? __schedule+0x10cc/0x2b60 [ 17.933770] ? trace_hardirqs_on+0x37/0xe0 [ 17.933803] ? __pfx_read_tsc+0x10/0x10 [ 17.933825] ? ktime_get_ts64+0x86/0x230 [ 17.933851] kunit_try_run_case+0x1a5/0x480 [ 17.933878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.933900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.933925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.933947] ? __kthread_parkme+0x82/0x180 [ 17.933969] ? preempt_count_sub+0x50/0x80 [ 17.933994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.934019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.934042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.934065] kthread+0x337/0x6f0 [ 17.934085] ? trace_preempt_on+0x20/0xc0 [ 17.934108] ? __pfx_kthread+0x10/0x10 [ 17.934129] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.934150] ? calculate_sigpending+0x7b/0xa0 [ 17.934176] ? __pfx_kthread+0x10/0x10 [ 17.934198] ret_from_fork+0x116/0x1d0 [ 17.934218] ? __pfx_kthread+0x10/0x10 [ 17.934252] ret_from_fork_asm+0x1a/0x30 [ 17.934286] </TASK> [ 17.934301] [ 17.942396] Allocated by task 299: [ 17.943010] kasan_save_stack+0x45/0x70 [ 17.943364] kasan_save_track+0x18/0x40 [ 17.943698] kasan_save_alloc_info+0x3b/0x50 [ 17.944315] __kasan_kmalloc+0xb7/0xc0 [ 17.944633] __kmalloc_cache_noprof+0x189/0x420 [ 17.945186] copy_to_kernel_nofault_oob+0x12f/0x560 [ 17.945626] kunit_try_run_case+0x1a5/0x480 [ 17.945840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.946048] kthread+0x337/0x6f0 [ 17.946142] ret_from_fork+0x116/0x1d0 [ 17.946373] ret_from_fork_asm+0x1a/0x30 [ 17.946691] [ 17.947015] The buggy address belongs to the object at ffff888102b5b700 [ 17.947015] which belongs to the cache kmalloc-128 of size 128 [ 17.947337] The buggy address is located 0 bytes to the right of [ 17.947337] allocated 120-byte region [ffff888102b5b700, ffff888102b5b778) [ 17.947668] [ 17.947775] The buggy address belongs to the physical page: [ 17.948119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 17.948571] flags: 0x200000000000000(node=0|zone=2) [ 17.948707] page_type: f5(slab) [ 17.948857] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.949260] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.949399] page dumped because: kasan: bad access detected [ 17.950139] [ 17.950311] Memory state around the buggy address: [ 17.950650] ffff888102b5b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.950985] ffff888102b5b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.951159] >ffff888102b5b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.951346] ^ [ 17.951791] ffff888102b5b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.952126] ffff888102b5b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.952383] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[ 17.087873] ================================================================== [ 17.088038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 17.088183] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.088329] [ 17.088541] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.088598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.088613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.088636] Call Trace: [ 17.088654] <TASK> [ 17.088673] dump_stack_lvl+0x73/0xb0 [ 17.088704] print_report+0xd1/0x650 [ 17.088727] ? __virt_addr_valid+0x1db/0x2d0 [ 17.088753] ? kasan_atomics_helper+0xa2b/0x5450 [ 17.088775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.088798] ? kasan_atomics_helper+0xa2b/0x5450 [ 17.088819] kasan_report+0x141/0x180 [ 17.088843] ? kasan_atomics_helper+0xa2b/0x5450 [ 17.088869] kasan_check_range+0x10c/0x1c0 [ 17.088894] __kasan_check_write+0x18/0x20 [ 17.088915] kasan_atomics_helper+0xa2b/0x5450 [ 17.088938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.088961] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.088983] ? kasan_atomics+0x152/0x310 [ 17.089010] kasan_atomics+0x1dc/0x310 [ 17.089034] ? __pfx_kasan_atomics+0x10/0x10 [ 17.089058] ? __pfx_read_tsc+0x10/0x10 [ 17.089080] ? ktime_get_ts64+0x86/0x230 [ 17.089105] kunit_try_run_case+0x1a5/0x480 [ 17.089131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.089176] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.089198] ? __kthread_parkme+0x82/0x180 [ 17.089226] ? preempt_count_sub+0x50/0x80 [ 17.089257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.089306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.089330] kthread+0x337/0x6f0 [ 17.089351] ? trace_preempt_on+0x20/0xc0 [ 17.089376] ? __pfx_kthread+0x10/0x10 [ 17.089398] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.089420] ? calculate_sigpending+0x7b/0xa0 [ 17.089446] ? __pfx_kthread+0x10/0x10 [ 17.089535] ret_from_fork+0x116/0x1d0 [ 17.089556] ? __pfx_kthread+0x10/0x10 [ 17.089579] ret_from_fork_asm+0x1a/0x30 [ 17.089613] </TASK> [ 17.089627] [ 17.096374] Allocated by task 283: [ 17.096534] kasan_save_stack+0x45/0x70 [ 17.096811] kasan_save_track+0x18/0x40 [ 17.097067] kasan_save_alloc_info+0x3b/0x50 [ 17.097317] __kasan_kmalloc+0xb7/0xc0 [ 17.097557] __kmalloc_cache_noprof+0x189/0x420 [ 17.097747] kasan_atomics+0x95/0x310 [ 17.097870] kunit_try_run_case+0x1a5/0x480 [ 17.098050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.098265] kthread+0x337/0x6f0 [ 17.098403] ret_from_fork+0x116/0x1d0 [ 17.098792] ret_from_fork_asm+0x1a/0x30 [ 17.098968] [ 17.099097] The buggy address belongs to the object at ffff888102b6b880 [ 17.099097] which belongs to the cache kmalloc-64 of size 64 [ 17.099399] The buggy address is located 0 bytes to the right of [ 17.099399] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.099689] [ 17.099748] The buggy address belongs to the physical page: [ 17.099856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.100003] flags: 0x200000000000000(node=0|zone=2) [ 17.100107] page_type: f5(slab) [ 17.100293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.100815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.101243] page dumped because: kasan: bad access detected [ 17.101617] [ 17.101740] Memory state around the buggy address: [ 17.102021] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.102441] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.102780] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.102910] ^ [ 17.103011] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.103432] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.104019] ================================================================== [ 17.398548] ================================================================== [ 17.398902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.399083] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.399237] [ 17.399322] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.399379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.399395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.399422] Call Trace: [ 17.399448] <TASK> [ 17.399471] dump_stack_lvl+0x73/0xb0 [ 17.399503] print_report+0xd1/0x650 [ 17.399529] ? __virt_addr_valid+0x1db/0x2d0 [ 17.399555] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.399581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.399605] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.399629] kasan_report+0x141/0x180 [ 17.399654] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.399683] kasan_check_range+0x10c/0x1c0 [ 17.399709] __kasan_check_read+0x15/0x20 [ 17.399730] kasan_atomics_helper+0x13b5/0x5450 [ 17.399755] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.399779] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.399802] ? kasan_atomics+0x152/0x310 [ 17.399831] kasan_atomics+0x1dc/0x310 [ 17.399856] ? __pfx_kasan_atomics+0x10/0x10 [ 17.399882] ? __pfx_read_tsc+0x10/0x10 [ 17.399905] ? ktime_get_ts64+0x86/0x230 [ 17.399930] kunit_try_run_case+0x1a5/0x480 [ 17.399955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.399978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.400002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.400026] ? __kthread_parkme+0x82/0x180 [ 17.400047] ? preempt_count_sub+0x50/0x80 [ 17.400071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.400095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.400118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.400142] kthread+0x337/0x6f0 [ 17.400162] ? trace_preempt_on+0x20/0xc0 [ 17.400186] ? __pfx_kthread+0x10/0x10 [ 17.400209] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.400250] ? calculate_sigpending+0x7b/0xa0 [ 17.400991] ? __pfx_kthread+0x10/0x10 [ 17.401033] ret_from_fork+0x116/0x1d0 [ 17.401056] ? __pfx_kthread+0x10/0x10 [ 17.401079] ret_from_fork_asm+0x1a/0x30 [ 17.401113] </TASK> [ 17.401126] [ 17.408960] Allocated by task 283: [ 17.409161] kasan_save_stack+0x45/0x70 [ 17.409385] kasan_save_track+0x18/0x40 [ 17.409617] kasan_save_alloc_info+0x3b/0x50 [ 17.409854] __kasan_kmalloc+0xb7/0xc0 [ 17.409985] __kmalloc_cache_noprof+0x189/0x420 [ 17.410098] kasan_atomics+0x95/0x310 [ 17.410314] kunit_try_run_case+0x1a5/0x480 [ 17.410514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.410746] kthread+0x337/0x6f0 [ 17.410975] ret_from_fork+0x116/0x1d0 [ 17.411165] ret_from_fork_asm+0x1a/0x30 [ 17.411315] [ 17.411422] The buggy address belongs to the object at ffff888102b6b880 [ 17.411422] which belongs to the cache kmalloc-64 of size 64 [ 17.411842] The buggy address is located 0 bytes to the right of [ 17.411842] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.412216] [ 17.412329] The buggy address belongs to the physical page: [ 17.412534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.412847] flags: 0x200000000000000(node=0|zone=2) [ 17.413096] page_type: f5(slab) [ 17.413212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.413397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.413837] page dumped because: kasan: bad access detected [ 17.414065] [ 17.414121] Memory state around the buggy address: [ 17.414229] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.414376] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.414698] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.414986] ^ [ 17.415216] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.415472] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.415651] ================================================================== [ 17.241979] ================================================================== [ 17.242455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 17.243492] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.243939] [ 17.244048] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.244101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.244113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.244137] Call Trace: [ 17.244153] <TASK> [ 17.244172] dump_stack_lvl+0x73/0xb0 [ 17.244201] print_report+0xd1/0x650 [ 17.244234] ? __virt_addr_valid+0x1db/0x2d0 [ 17.244261] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.244284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.244307] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.244330] kasan_report+0x141/0x180 [ 17.244353] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.244380] kasan_check_range+0x10c/0x1c0 [ 17.244404] __kasan_check_write+0x18/0x20 [ 17.244425] kasan_atomics_helper+0xfa9/0x5450 [ 17.244447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.244471] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.244493] ? kasan_atomics+0x152/0x310 [ 17.244521] kasan_atomics+0x1dc/0x310 [ 17.244544] ? __pfx_kasan_atomics+0x10/0x10 [ 17.244569] ? __pfx_read_tsc+0x10/0x10 [ 17.244591] ? ktime_get_ts64+0x86/0x230 [ 17.244615] kunit_try_run_case+0x1a5/0x480 [ 17.244640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.244663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.244687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.244709] ? __kthread_parkme+0x82/0x180 [ 17.244730] ? preempt_count_sub+0x50/0x80 [ 17.244755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.244779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.244802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.244825] kthread+0x337/0x6f0 [ 17.244845] ? trace_preempt_on+0x20/0xc0 [ 17.244868] ? __pfx_kthread+0x10/0x10 [ 17.244890] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.244911] ? calculate_sigpending+0x7b/0xa0 [ 17.244937] ? __pfx_kthread+0x10/0x10 [ 17.244959] ret_from_fork+0x116/0x1d0 [ 17.244978] ? __pfx_kthread+0x10/0x10 [ 17.244999] ret_from_fork_asm+0x1a/0x30 [ 17.245031] </TASK> [ 17.245044] [ 17.250610] Allocated by task 283: [ 17.250696] kasan_save_stack+0x45/0x70 [ 17.250791] kasan_save_track+0x18/0x40 [ 17.250881] kasan_save_alloc_info+0x3b/0x50 [ 17.250973] __kasan_kmalloc+0xb7/0xc0 [ 17.251057] __kmalloc_cache_noprof+0x189/0x420 [ 17.251148] kasan_atomics+0x95/0x310 [ 17.251245] kunit_try_run_case+0x1a5/0x480 [ 17.251391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.251685] kthread+0x337/0x6f0 [ 17.251896] ret_from_fork+0x116/0x1d0 [ 17.252133] ret_from_fork_asm+0x1a/0x30 [ 17.252386] [ 17.252504] The buggy address belongs to the object at ffff888102b6b880 [ 17.252504] which belongs to the cache kmalloc-64 of size 64 [ 17.253022] The buggy address is located 0 bytes to the right of [ 17.253022] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.253612] [ 17.253669] The buggy address belongs to the physical page: [ 17.253774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.253915] flags: 0x200000000000000(node=0|zone=2) [ 17.254168] page_type: f5(slab) [ 17.254381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.254784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.255127] page dumped because: kasan: bad access detected [ 17.255337] [ 17.255408] Memory state around the buggy address: [ 17.255510] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.255635] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.255760] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.255876] ^ [ 17.255968] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.256090] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.256210] ================================================================== [ 16.946760] ================================================================== [ 16.947073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.947406] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.947623] [ 16.947767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.947822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.947836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.947859] Call Trace: [ 16.947878] <TASK> [ 16.947898] dump_stack_lvl+0x73/0xb0 [ 16.947928] print_report+0xd1/0x650 [ 16.947953] ? __virt_addr_valid+0x1db/0x2d0 [ 16.947978] ? kasan_atomics_helper+0x565/0x5450 [ 16.948000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.948024] ? kasan_atomics_helper+0x565/0x5450 [ 16.948048] kasan_report+0x141/0x180 [ 16.948073] ? kasan_atomics_helper+0x565/0x5450 [ 16.948102] kasan_check_range+0x10c/0x1c0 [ 16.948128] __kasan_check_write+0x18/0x20 [ 16.948149] kasan_atomics_helper+0x565/0x5450 [ 16.948173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.948203] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.948238] ? kasan_atomics+0x152/0x310 [ 16.948270] kasan_atomics+0x1dc/0x310 [ 16.948295] ? __pfx_kasan_atomics+0x10/0x10 [ 16.948321] ? __pfx_read_tsc+0x10/0x10 [ 16.948343] ? ktime_get_ts64+0x86/0x230 [ 16.948369] kunit_try_run_case+0x1a5/0x480 [ 16.948396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.948418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.948442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.948527] ? __kthread_parkme+0x82/0x180 [ 16.948551] ? preempt_count_sub+0x50/0x80 [ 16.948578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.948603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.948640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.948664] kthread+0x337/0x6f0 [ 16.948696] ? trace_preempt_on+0x20/0xc0 [ 16.948723] ? __pfx_kthread+0x10/0x10 [ 16.948746] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.948768] ? calculate_sigpending+0x7b/0xa0 [ 16.948793] ? __pfx_kthread+0x10/0x10 [ 16.948816] ret_from_fork+0x116/0x1d0 [ 16.948835] ? __pfx_kthread+0x10/0x10 [ 16.948858] ret_from_fork_asm+0x1a/0x30 [ 16.948889] </TASK> [ 16.948901] [ 16.955056] Allocated by task 283: [ 16.955285] kasan_save_stack+0x45/0x70 [ 16.955528] kasan_save_track+0x18/0x40 [ 16.955778] kasan_save_alloc_info+0x3b/0x50 [ 16.956017] __kasan_kmalloc+0xb7/0xc0 [ 16.956200] __kmalloc_cache_noprof+0x189/0x420 [ 16.956423] kasan_atomics+0x95/0x310 [ 16.956669] kunit_try_run_case+0x1a5/0x480 [ 16.956889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.957120] kthread+0x337/0x6f0 [ 16.957302] ret_from_fork+0x116/0x1d0 [ 16.957526] ret_from_fork_asm+0x1a/0x30 [ 16.957733] [ 16.958126] The buggy address belongs to the object at ffff888102b6b880 [ 16.958126] which belongs to the cache kmalloc-64 of size 64 [ 16.958355] The buggy address is located 0 bytes to the right of [ 16.958355] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.958637] [ 16.958698] The buggy address belongs to the physical page: [ 16.958861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.959336] flags: 0x200000000000000(node=0|zone=2) [ 16.959662] page_type: f5(slab) [ 16.959895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.960333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.960638] page dumped because: kasan: bad access detected [ 16.960907] [ 16.960965] Memory state around the buggy address: [ 16.961062] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.961189] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.961604] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.962008] ^ [ 16.962179] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.962697] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.962845] ================================================================== [ 17.014961] ================================================================== [ 17.015300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 17.015703] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.016007] [ 17.016118] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.016171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.016185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.016208] Call Trace: [ 17.016234] <TASK> [ 17.016258] dump_stack_lvl+0x73/0xb0 [ 17.016288] print_report+0xd1/0x650 [ 17.016312] ? __virt_addr_valid+0x1db/0x2d0 [ 17.016337] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.016360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.016384] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.016407] kasan_report+0x141/0x180 [ 17.016431] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.016475] kasan_check_range+0x10c/0x1c0 [ 17.016581] __kasan_check_write+0x18/0x20 [ 17.016605] kasan_atomics_helper+0x7c7/0x5450 [ 17.016631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.016655] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.016678] ? kasan_atomics+0x152/0x310 [ 17.016706] kasan_atomics+0x1dc/0x310 [ 17.016731] ? __pfx_kasan_atomics+0x10/0x10 [ 17.016757] ? __pfx_read_tsc+0x10/0x10 [ 17.016779] ? ktime_get_ts64+0x86/0x230 [ 17.016806] kunit_try_run_case+0x1a5/0x480 [ 17.016831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.016855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.016879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.016903] ? __kthread_parkme+0x82/0x180 [ 17.016925] ? preempt_count_sub+0x50/0x80 [ 17.016950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.016976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.017000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.017024] kthread+0x337/0x6f0 [ 17.017045] ? trace_preempt_on+0x20/0xc0 [ 17.017070] ? __pfx_kthread+0x10/0x10 [ 17.017093] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.017115] ? calculate_sigpending+0x7b/0xa0 [ 17.017140] ? __pfx_kthread+0x10/0x10 [ 17.017163] ret_from_fork+0x116/0x1d0 [ 17.017182] ? __pfx_kthread+0x10/0x10 [ 17.017203] ret_from_fork_asm+0x1a/0x30 [ 17.017252] </TASK> [ 17.017268] [ 17.024825] Allocated by task 283: [ 17.025008] kasan_save_stack+0x45/0x70 [ 17.025138] kasan_save_track+0x18/0x40 [ 17.025401] kasan_save_alloc_info+0x3b/0x50 [ 17.025703] __kasan_kmalloc+0xb7/0xc0 [ 17.026031] __kmalloc_cache_noprof+0x189/0x420 [ 17.026326] kasan_atomics+0x95/0x310 [ 17.026527] kunit_try_run_case+0x1a5/0x480 [ 17.026663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.026776] kthread+0x337/0x6f0 [ 17.026908] ret_from_fork+0x116/0x1d0 [ 17.027137] ret_from_fork_asm+0x1a/0x30 [ 17.027384] [ 17.027497] The buggy address belongs to the object at ffff888102b6b880 [ 17.027497] which belongs to the cache kmalloc-64 of size 64 [ 17.027709] The buggy address is located 0 bytes to the right of [ 17.027709] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.028166] [ 17.028319] The buggy address belongs to the physical page: [ 17.028826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.029202] flags: 0x200000000000000(node=0|zone=2) [ 17.029465] page_type: f5(slab) [ 17.029596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.029842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.030213] page dumped because: kasan: bad access detected [ 17.030331] [ 17.030399] Memory state around the buggy address: [ 17.030503] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.030631] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.030761] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.030963] ^ [ 17.031215] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.031763] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.031995] ================================================================== [ 17.336134] ================================================================== [ 17.336387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 17.336801] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.336970] [ 17.337112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.337163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.337177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.337200] Call Trace: [ 17.337216] <TASK> [ 17.337245] dump_stack_lvl+0x73/0xb0 [ 17.337274] print_report+0xd1/0x650 [ 17.337298] ? __virt_addr_valid+0x1db/0x2d0 [ 17.337322] ? kasan_atomics_helper+0x1217/0x5450 [ 17.337345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.337369] ? kasan_atomics_helper+0x1217/0x5450 [ 17.337392] kasan_report+0x141/0x180 [ 17.337416] ? kasan_atomics_helper+0x1217/0x5450 [ 17.337444] kasan_check_range+0x10c/0x1c0 [ 17.337469] __kasan_check_write+0x18/0x20 [ 17.337490] kasan_atomics_helper+0x1217/0x5450 [ 17.337515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.337539] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.337561] ? kasan_atomics+0x152/0x310 [ 17.337588] kasan_atomics+0x1dc/0x310 [ 17.337613] ? __pfx_kasan_atomics+0x10/0x10 [ 17.337638] ? __pfx_read_tsc+0x10/0x10 [ 17.337659] ? ktime_get_ts64+0x86/0x230 [ 17.337684] kunit_try_run_case+0x1a5/0x480 [ 17.337708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.337731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.337755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.337778] ? __kthread_parkme+0x82/0x180 [ 17.337799] ? preempt_count_sub+0x50/0x80 [ 17.337824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.337849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.337872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.337896] kthread+0x337/0x6f0 [ 17.337917] ? trace_preempt_on+0x20/0xc0 [ 17.337942] ? __pfx_kthread+0x10/0x10 [ 17.337963] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.337985] ? calculate_sigpending+0x7b/0xa0 [ 17.338010] ? __pfx_kthread+0x10/0x10 [ 17.338032] ret_from_fork+0x116/0x1d0 [ 17.338051] ? __pfx_kthread+0x10/0x10 [ 17.338073] ret_from_fork_asm+0x1a/0x30 [ 17.338135] </TASK> [ 17.338146] [ 17.344104] Allocated by task 283: [ 17.344191] kasan_save_stack+0x45/0x70 [ 17.344298] kasan_save_track+0x18/0x40 [ 17.344389] kasan_save_alloc_info+0x3b/0x50 [ 17.344483] __kasan_kmalloc+0xb7/0xc0 [ 17.344569] __kmalloc_cache_noprof+0x189/0x420 [ 17.344662] kasan_atomics+0x95/0x310 [ 17.344748] kunit_try_run_case+0x1a5/0x480 [ 17.344838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.344942] kthread+0x337/0x6f0 [ 17.345019] ret_from_fork+0x116/0x1d0 [ 17.345102] ret_from_fork_asm+0x1a/0x30 [ 17.345187] [ 17.345255] The buggy address belongs to the object at ffff888102b6b880 [ 17.345255] which belongs to the cache kmalloc-64 of size 64 [ 17.345875] The buggy address is located 0 bytes to the right of [ 17.345875] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.346598] [ 17.346730] The buggy address belongs to the physical page: [ 17.347079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.347563] flags: 0x200000000000000(node=0|zone=2) [ 17.347861] page_type: f5(slab) [ 17.348075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.348262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.348441] page dumped because: kasan: bad access detected [ 17.348572] [ 17.348633] Memory state around the buggy address: [ 17.348758] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.348928] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.349273] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.349685] ^ [ 17.349990] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.350438] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.350826] ================================================================== [ 17.712197] ================================================================== [ 17.712605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.712989] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.713376] [ 17.713510] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.713562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.713577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.713601] Call Trace: [ 17.713619] <TASK> [ 17.713636] dump_stack_lvl+0x73/0xb0 [ 17.713664] print_report+0xd1/0x650 [ 17.713688] ? __virt_addr_valid+0x1db/0x2d0 [ 17.713712] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.713735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.713759] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.713782] kasan_report+0x141/0x180 [ 17.713806] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.713834] kasan_check_range+0x10c/0x1c0 [ 17.713859] __kasan_check_write+0x18/0x20 [ 17.713880] kasan_atomics_helper+0x1eaa/0x5450 [ 17.713904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.713928] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.713950] ? kasan_atomics+0x152/0x310 [ 17.713978] kasan_atomics+0x1dc/0x310 [ 17.714003] ? __pfx_kasan_atomics+0x10/0x10 [ 17.714029] ? __pfx_read_tsc+0x10/0x10 [ 17.714050] ? ktime_get_ts64+0x86/0x230 [ 17.714075] kunit_try_run_case+0x1a5/0x480 [ 17.714099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.714121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.714145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.714168] ? __kthread_parkme+0x82/0x180 [ 17.714189] ? preempt_count_sub+0x50/0x80 [ 17.714213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.714272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.714307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.714347] kthread+0x337/0x6f0 [ 17.714380] ? trace_preempt_on+0x20/0xc0 [ 17.714406] ? __pfx_kthread+0x10/0x10 [ 17.714440] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.714464] ? calculate_sigpending+0x7b/0xa0 [ 17.714489] ? __pfx_kthread+0x10/0x10 [ 17.714514] ret_from_fork+0x116/0x1d0 [ 17.714534] ? __pfx_kthread+0x10/0x10 [ 17.714559] ret_from_fork_asm+0x1a/0x30 [ 17.714591] </TASK> [ 17.714604] [ 17.720203] Allocated by task 283: [ 17.720368] kasan_save_stack+0x45/0x70 [ 17.720564] kasan_save_track+0x18/0x40 [ 17.720787] kasan_save_alloc_info+0x3b/0x50 [ 17.720924] __kasan_kmalloc+0xb7/0xc0 [ 17.721069] __kmalloc_cache_noprof+0x189/0x420 [ 17.721279] kasan_atomics+0x95/0x310 [ 17.721436] kunit_try_run_case+0x1a5/0x480 [ 17.721603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.721754] kthread+0x337/0x6f0 [ 17.721924] ret_from_fork+0x116/0x1d0 [ 17.722056] ret_from_fork_asm+0x1a/0x30 [ 17.722213] [ 17.722316] The buggy address belongs to the object at ffff888102b6b880 [ 17.722316] which belongs to the cache kmalloc-64 of size 64 [ 17.722671] The buggy address is located 0 bytes to the right of [ 17.722671] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.723039] [ 17.723123] The buggy address belongs to the physical page: [ 17.723281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.723464] flags: 0x200000000000000(node=0|zone=2) [ 17.723607] page_type: f5(slab) [ 17.723711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.723892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.724136] page dumped because: kasan: bad access detected [ 17.724362] [ 17.724449] Memory state around the buggy address: [ 17.724656] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.724931] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.725205] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.725487] ^ [ 17.725693] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.725984] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.726262] ================================================================== [ 17.530094] ================================================================== [ 17.530844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.531288] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.531755] [ 17.531904] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.531955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.531968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.531991] Call Trace: [ 17.532008] <TASK> [ 17.532024] dump_stack_lvl+0x73/0xb0 [ 17.532051] print_report+0xd1/0x650 [ 17.532075] ? __virt_addr_valid+0x1db/0x2d0 [ 17.532100] ? kasan_atomics_helper+0x177f/0x5450 [ 17.532122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.532147] ? kasan_atomics_helper+0x177f/0x5450 [ 17.532170] kasan_report+0x141/0x180 [ 17.532193] ? kasan_atomics_helper+0x177f/0x5450 [ 17.532232] kasan_check_range+0x10c/0x1c0 [ 17.532262] __kasan_check_write+0x18/0x20 [ 17.532282] kasan_atomics_helper+0x177f/0x5450 [ 17.532306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.532330] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.532365] ? kasan_atomics+0x152/0x310 [ 17.532395] kasan_atomics+0x1dc/0x310 [ 17.532420] ? __pfx_kasan_atomics+0x10/0x10 [ 17.532460] ? __pfx_read_tsc+0x10/0x10 [ 17.532483] ? ktime_get_ts64+0x86/0x230 [ 17.532518] kunit_try_run_case+0x1a5/0x480 [ 17.532546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.532569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.532605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.532630] ? __kthread_parkme+0x82/0x180 [ 17.532665] ? preempt_count_sub+0x50/0x80 [ 17.532689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.532725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.532752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.532784] kthread+0x337/0x6f0 [ 17.532810] ? trace_preempt_on+0x20/0xc0 [ 17.532835] ? __pfx_kthread+0x10/0x10 [ 17.532869] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.532893] ? calculate_sigpending+0x7b/0xa0 [ 17.532929] ? __pfx_kthread+0x10/0x10 [ 17.532954] ret_from_fork+0x116/0x1d0 [ 17.532975] ? __pfx_kthread+0x10/0x10 [ 17.533009] ret_from_fork_asm+0x1a/0x30 [ 17.533043] </TASK> [ 17.533066] [ 17.539081] Allocated by task 283: [ 17.539196] kasan_save_stack+0x45/0x70 [ 17.539481] kasan_save_track+0x18/0x40 [ 17.539736] kasan_save_alloc_info+0x3b/0x50 [ 17.539950] __kasan_kmalloc+0xb7/0xc0 [ 17.540040] __kmalloc_cache_noprof+0x189/0x420 [ 17.540138] kasan_atomics+0x95/0x310 [ 17.540234] kunit_try_run_case+0x1a5/0x480 [ 17.540332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.540439] kthread+0x337/0x6f0 [ 17.540519] ret_from_fork+0x116/0x1d0 [ 17.540602] ret_from_fork_asm+0x1a/0x30 [ 17.540691] [ 17.540745] The buggy address belongs to the object at ffff888102b6b880 [ 17.540745] which belongs to the cache kmalloc-64 of size 64 [ 17.540941] The buggy address is located 0 bytes to the right of [ 17.540941] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.541365] [ 17.541493] The buggy address belongs to the physical page: [ 17.541821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.542279] flags: 0x200000000000000(node=0|zone=2) [ 17.542575] page_type: f5(slab) [ 17.542801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.543244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.543692] page dumped because: kasan: bad access detected [ 17.544001] [ 17.544113] Memory state around the buggy address: [ 17.544337] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.544646] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.544773] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.544894] ^ [ 17.544987] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.545108] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.545238] ================================================================== [ 17.741403] ================================================================== [ 17.741723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 17.742016] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.742347] [ 17.742483] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.742541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.742555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.742577] Call Trace: [ 17.742601] <TASK> [ 17.742618] dump_stack_lvl+0x73/0xb0 [ 17.742653] print_report+0xd1/0x650 [ 17.742678] ? __virt_addr_valid+0x1db/0x2d0 [ 17.742703] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.742725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.742748] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.742771] kasan_report+0x141/0x180 [ 17.742794] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.742822] __asan_report_load8_noabort+0x18/0x20 [ 17.742844] kasan_atomics_helper+0x4f71/0x5450 [ 17.742867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.742890] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.742912] ? kasan_atomics+0x152/0x310 [ 17.742940] kasan_atomics+0x1dc/0x310 [ 17.742963] ? __pfx_kasan_atomics+0x10/0x10 [ 17.742988] ? __pfx_read_tsc+0x10/0x10 [ 17.743009] ? ktime_get_ts64+0x86/0x230 [ 17.743034] kunit_try_run_case+0x1a5/0x480 [ 17.743058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.743080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.743103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.743126] ? __kthread_parkme+0x82/0x180 [ 17.743146] ? preempt_count_sub+0x50/0x80 [ 17.743169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.743193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.743215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.743250] kthread+0x337/0x6f0 [ 17.743270] ? trace_preempt_on+0x20/0xc0 [ 17.743294] ? __pfx_kthread+0x10/0x10 [ 17.743315] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.743336] ? calculate_sigpending+0x7b/0xa0 [ 17.743360] ? __pfx_kthread+0x10/0x10 [ 17.743381] ret_from_fork+0x116/0x1d0 [ 17.743400] ? __pfx_kthread+0x10/0x10 [ 17.743421] ret_from_fork_asm+0x1a/0x30 [ 17.743469] </TASK> [ 17.743483] [ 17.748264] Allocated by task 283: [ 17.748418] kasan_save_stack+0x45/0x70 [ 17.748594] kasan_save_track+0x18/0x40 [ 17.748797] kasan_save_alloc_info+0x3b/0x50 [ 17.749003] __kasan_kmalloc+0xb7/0xc0 [ 17.749183] __kmalloc_cache_noprof+0x189/0x420 [ 17.749389] kasan_atomics+0x95/0x310 [ 17.749579] kunit_try_run_case+0x1a5/0x480 [ 17.749767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.750003] kthread+0x337/0x6f0 [ 17.750160] ret_from_fork+0x116/0x1d0 [ 17.750351] ret_from_fork_asm+0x1a/0x30 [ 17.750536] [ 17.750651] The buggy address belongs to the object at ffff888102b6b880 [ 17.750651] which belongs to the cache kmalloc-64 of size 64 [ 17.751060] The buggy address is located 0 bytes to the right of [ 17.751060] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.751336] [ 17.751411] The buggy address belongs to the physical page: [ 17.751543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.751730] flags: 0x200000000000000(node=0|zone=2) [ 17.751857] page_type: f5(slab) [ 17.752021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.752325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.752636] page dumped because: kasan: bad access detected [ 17.752843] [ 17.752927] Memory state around the buggy address: [ 17.753131] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.753430] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.753719] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.753993] ^ [ 17.754249] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.754384] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.754514] ================================================================== [ 17.447343] ================================================================== [ 17.447951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.448279] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.448579] [ 17.448694] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.448746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.448759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.448782] Call Trace: [ 17.448801] <TASK> [ 17.448817] dump_stack_lvl+0x73/0xb0 [ 17.448845] print_report+0xd1/0x650 [ 17.448868] ? __virt_addr_valid+0x1db/0x2d0 [ 17.448891] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.448913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.448937] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.448960] kasan_report+0x141/0x180 [ 17.448983] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.449011] __asan_report_store8_noabort+0x1b/0x30 [ 17.449033] kasan_atomics_helper+0x50d4/0x5450 [ 17.449057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.449080] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.449102] ? kasan_atomics+0x152/0x310 [ 17.449129] kasan_atomics+0x1dc/0x310 [ 17.449152] ? __pfx_kasan_atomics+0x10/0x10 [ 17.449177] ? __pfx_read_tsc+0x10/0x10 [ 17.449199] ? ktime_get_ts64+0x86/0x230 [ 17.449234] kunit_try_run_case+0x1a5/0x480 [ 17.449262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.449287] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.449310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.449334] ? __kthread_parkme+0x82/0x180 [ 17.449356] ? preempt_count_sub+0x50/0x80 [ 17.449381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.449405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.449429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.449454] kthread+0x337/0x6f0 [ 17.449474] ? trace_preempt_on+0x20/0xc0 [ 17.449499] ? __pfx_kthread+0x10/0x10 [ 17.449522] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.449545] ? calculate_sigpending+0x7b/0xa0 [ 17.449571] ? __pfx_kthread+0x10/0x10 [ 17.449593] ret_from_fork+0x116/0x1d0 [ 17.449613] ? __pfx_kthread+0x10/0x10 [ 17.449635] ret_from_fork_asm+0x1a/0x30 [ 17.449668] </TASK> [ 17.449681] [ 17.454488] Allocated by task 283: [ 17.454682] kasan_save_stack+0x45/0x70 [ 17.454863] kasan_save_track+0x18/0x40 [ 17.455075] kasan_save_alloc_info+0x3b/0x50 [ 17.455308] __kasan_kmalloc+0xb7/0xc0 [ 17.455534] __kmalloc_cache_noprof+0x189/0x420 [ 17.455735] kasan_atomics+0x95/0x310 [ 17.455916] kunit_try_run_case+0x1a5/0x480 [ 17.456134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.456296] kthread+0x337/0x6f0 [ 17.456491] ret_from_fork+0x116/0x1d0 [ 17.456711] ret_from_fork_asm+0x1a/0x30 [ 17.456890] [ 17.456999] The buggy address belongs to the object at ffff888102b6b880 [ 17.456999] which belongs to the cache kmalloc-64 of size 64 [ 17.457378] The buggy address is located 0 bytes to the right of [ 17.457378] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.457759] [ 17.457875] The buggy address belongs to the physical page: [ 17.458042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.458361] flags: 0x200000000000000(node=0|zone=2) [ 17.458495] page_type: f5(slab) [ 17.458586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.458929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.459219] page dumped because: kasan: bad access detected [ 17.459334] [ 17.459388] Memory state around the buggy address: [ 17.459486] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.459614] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.459742] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.459864] ^ [ 17.459958] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460081] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460202] ================================================================== [ 17.366635] ================================================================== [ 17.366962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 17.367154] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.367335] [ 17.367438] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.367507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.367522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.367547] Call Trace: [ 17.367568] <TASK> [ 17.367586] dump_stack_lvl+0x73/0xb0 [ 17.367616] print_report+0xd1/0x650 [ 17.367640] ? __virt_addr_valid+0x1db/0x2d0 [ 17.367666] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.367689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.367713] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.367737] kasan_report+0x141/0x180 [ 17.367761] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.367789] kasan_check_range+0x10c/0x1c0 [ 17.367815] __kasan_check_write+0x18/0x20 [ 17.367836] kasan_atomics_helper+0x12e6/0x5450 [ 17.367861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.367885] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.367907] ? kasan_atomics+0x152/0x310 [ 17.367934] kasan_atomics+0x1dc/0x310 [ 17.367958] ? __pfx_kasan_atomics+0x10/0x10 [ 17.367983] ? __pfx_read_tsc+0x10/0x10 [ 17.368005] ? ktime_get_ts64+0x86/0x230 [ 17.368030] kunit_try_run_case+0x1a5/0x480 [ 17.368079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.368106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.368146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.368173] ? __kthread_parkme+0x82/0x180 [ 17.368193] ? preempt_count_sub+0x50/0x80 [ 17.368218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.368255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.368297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.368323] kthread+0x337/0x6f0 [ 17.368345] ? trace_preempt_on+0x20/0xc0 [ 17.368369] ? __pfx_kthread+0x10/0x10 [ 17.368393] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.368414] ? calculate_sigpending+0x7b/0xa0 [ 17.368439] ? __pfx_kthread+0x10/0x10 [ 17.368462] ret_from_fork+0x116/0x1d0 [ 17.368482] ? __pfx_kthread+0x10/0x10 [ 17.368504] ret_from_fork_asm+0x1a/0x30 [ 17.368536] </TASK> [ 17.368548] [ 17.373741] Allocated by task 283: [ 17.373857] kasan_save_stack+0x45/0x70 [ 17.373976] kasan_save_track+0x18/0x40 [ 17.374089] kasan_save_alloc_info+0x3b/0x50 [ 17.374206] __kasan_kmalloc+0xb7/0xc0 [ 17.374439] __kmalloc_cache_noprof+0x189/0x420 [ 17.374736] kasan_atomics+0x95/0x310 [ 17.374972] kunit_try_run_case+0x1a5/0x480 [ 17.375198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.375496] kthread+0x337/0x6f0 [ 17.375689] ret_from_fork+0x116/0x1d0 [ 17.375911] ret_from_fork_asm+0x1a/0x30 [ 17.376129] [ 17.376247] The buggy address belongs to the object at ffff888102b6b880 [ 17.376247] which belongs to the cache kmalloc-64 of size 64 [ 17.376822] The buggy address is located 0 bytes to the right of [ 17.376822] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.377427] [ 17.377543] The buggy address belongs to the physical page: [ 17.377738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.377881] flags: 0x200000000000000(node=0|zone=2) [ 17.377984] page_type: f5(slab) [ 17.378073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.378206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.378355] page dumped because: kasan: bad access detected [ 17.378466] [ 17.378561] Memory state around the buggy address: [ 17.378790] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.379086] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.379410] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.379692] ^ [ 17.379898] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.380187] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.380475] ================================================================== [ 16.875740] ================================================================== [ 16.876087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.876390] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.876773] [ 16.876895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.876954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.876969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.876994] Call Trace: [ 16.877019] <TASK> [ 16.877042] dump_stack_lvl+0x73/0xb0 [ 16.877074] print_report+0xd1/0x650 [ 16.877101] ? __virt_addr_valid+0x1db/0x2d0 [ 16.877127] ? kasan_atomics_helper+0x3df/0x5450 [ 16.877158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.877190] ? kasan_atomics_helper+0x3df/0x5450 [ 16.877214] kasan_report+0x141/0x180 [ 16.877258] ? kasan_atomics_helper+0x3df/0x5450 [ 16.877289] kasan_check_range+0x10c/0x1c0 [ 16.877315] __kasan_check_read+0x15/0x20 [ 16.877335] kasan_atomics_helper+0x3df/0x5450 [ 16.877360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.877384] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.877406] ? kasan_atomics+0x152/0x310 [ 16.877435] kasan_atomics+0x1dc/0x310 [ 16.877459] ? __pfx_kasan_atomics+0x10/0x10 [ 16.877485] ? __pfx_read_tsc+0x10/0x10 [ 16.877508] ? ktime_get_ts64+0x86/0x230 [ 16.877536] kunit_try_run_case+0x1a5/0x480 [ 16.877563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.877586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.877611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.877635] ? __kthread_parkme+0x82/0x180 [ 16.877658] ? preempt_count_sub+0x50/0x80 [ 16.877684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.877709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.877734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.877760] kthread+0x337/0x6f0 [ 16.877783] ? trace_preempt_on+0x20/0xc0 [ 16.877809] ? __pfx_kthread+0x10/0x10 [ 16.877833] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.877890] ? calculate_sigpending+0x7b/0xa0 [ 16.877917] ? __pfx_kthread+0x10/0x10 [ 16.877942] ret_from_fork+0x116/0x1d0 [ 16.877963] ? __pfx_kthread+0x10/0x10 [ 16.877985] ret_from_fork_asm+0x1a/0x30 [ 16.878019] </TASK> [ 16.878032] [ 16.884871] Allocated by task 283: [ 16.884990] kasan_save_stack+0x45/0x70 [ 16.885247] kasan_save_track+0x18/0x40 [ 16.885481] kasan_save_alloc_info+0x3b/0x50 [ 16.885753] __kasan_kmalloc+0xb7/0xc0 [ 16.885995] __kmalloc_cache_noprof+0x189/0x420 [ 16.886189] kasan_atomics+0x95/0x310 [ 16.886292] kunit_try_run_case+0x1a5/0x480 [ 16.886402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.886589] kthread+0x337/0x6f0 [ 16.886832] ret_from_fork+0x116/0x1d0 [ 16.887146] ret_from_fork_asm+0x1a/0x30 [ 16.887396] [ 16.887582] The buggy address belongs to the object at ffff888102b6b880 [ 16.887582] which belongs to the cache kmalloc-64 of size 64 [ 16.887827] The buggy address is located 0 bytes to the right of [ 16.887827] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.888404] [ 16.888578] The buggy address belongs to the physical page: [ 16.888835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.889140] flags: 0x200000000000000(node=0|zone=2) [ 16.889702] page_type: f5(slab) [ 16.889898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.890141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.890422] page dumped because: kasan: bad access detected [ 16.890870] [ 16.890928] Memory state around the buggy address: [ 16.891030] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891159] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891296] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.891421] ^ [ 16.891733] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892164] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.893007] ================================================================== [ 17.669961] ================================================================== [ 17.670290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.670448] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.670580] [ 17.670648] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.670697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.670710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.670734] Call Trace: [ 17.670751] <TASK> [ 17.670767] dump_stack_lvl+0x73/0xb0 [ 17.670795] print_report+0xd1/0x650 [ 17.670818] ? __virt_addr_valid+0x1db/0x2d0 [ 17.670842] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.670864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.670887] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.670910] kasan_report+0x141/0x180 [ 17.670933] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.670961] kasan_check_range+0x10c/0x1c0 [ 17.670985] __kasan_check_write+0x18/0x20 [ 17.671004] kasan_atomics_helper+0x1ce1/0x5450 [ 17.671028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.671050] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.671071] ? kasan_atomics+0x152/0x310 [ 17.671098] kasan_atomics+0x1dc/0x310 [ 17.671122] ? __pfx_kasan_atomics+0x10/0x10 [ 17.671146] ? __pfx_read_tsc+0x10/0x10 [ 17.671167] ? ktime_get_ts64+0x86/0x230 [ 17.671190] kunit_try_run_case+0x1a5/0x480 [ 17.671214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.671248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.671272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.671294] ? __kthread_parkme+0x82/0x180 [ 17.671314] ? preempt_count_sub+0x50/0x80 [ 17.671338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.671361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.671383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.671406] kthread+0x337/0x6f0 [ 17.671426] ? trace_preempt_on+0x20/0xc0 [ 17.671448] ? __pfx_kthread+0x10/0x10 [ 17.671469] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.671491] ? calculate_sigpending+0x7b/0xa0 [ 17.671513] ? __pfx_kthread+0x10/0x10 [ 17.671535] ret_from_fork+0x116/0x1d0 [ 17.671553] ? __pfx_kthread+0x10/0x10 [ 17.671574] ret_from_fork_asm+0x1a/0x30 [ 17.671605] </TASK> [ 17.671616] [ 17.676849] Allocated by task 283: [ 17.677022] kasan_save_stack+0x45/0x70 [ 17.677227] kasan_save_track+0x18/0x40 [ 17.677407] kasan_save_alloc_info+0x3b/0x50 [ 17.677608] __kasan_kmalloc+0xb7/0xc0 [ 17.677835] __kmalloc_cache_noprof+0x189/0x420 [ 17.678072] kasan_atomics+0x95/0x310 [ 17.678256] kunit_try_run_case+0x1a5/0x480 [ 17.678467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.678696] kthread+0x337/0x6f0 [ 17.678856] ret_from_fork+0x116/0x1d0 [ 17.679030] ret_from_fork_asm+0x1a/0x30 [ 17.679212] [ 17.679331] The buggy address belongs to the object at ffff888102b6b880 [ 17.679331] which belongs to the cache kmalloc-64 of size 64 [ 17.679807] The buggy address is located 0 bytes to the right of [ 17.679807] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.680010] [ 17.680065] The buggy address belongs to the physical page: [ 17.680171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.680468] flags: 0x200000000000000(node=0|zone=2) [ 17.680696] page_type: f5(slab) [ 17.680870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.681156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.681479] page dumped because: kasan: bad access detected [ 17.681700] [ 17.681783] Memory state around the buggy address: [ 17.681942] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.682145] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.682323] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.682459] ^ [ 17.682558] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.682684] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.683042] ================================================================== [ 17.070237] ================================================================== [ 17.070656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 17.071200] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.072277] [ 17.072377] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.072449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.072463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.072488] Call Trace: [ 17.072505] <TASK> [ 17.072524] dump_stack_lvl+0x73/0xb0 [ 17.072559] print_report+0xd1/0x650 [ 17.072584] ? __virt_addr_valid+0x1db/0x2d0 [ 17.072691] ? kasan_atomics_helper+0x992/0x5450 [ 17.072715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.072739] ? kasan_atomics_helper+0x992/0x5450 [ 17.072761] kasan_report+0x141/0x180 [ 17.072785] ? kasan_atomics_helper+0x992/0x5450 [ 17.072811] kasan_check_range+0x10c/0x1c0 [ 17.072836] __kasan_check_write+0x18/0x20 [ 17.072857] kasan_atomics_helper+0x992/0x5450 [ 17.072881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.072904] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.072926] ? kasan_atomics+0x152/0x310 [ 17.072953] kasan_atomics+0x1dc/0x310 [ 17.072976] ? __pfx_kasan_atomics+0x10/0x10 [ 17.073001] ? __pfx_read_tsc+0x10/0x10 [ 17.073025] ? ktime_get_ts64+0x86/0x230 [ 17.073050] kunit_try_run_case+0x1a5/0x480 [ 17.073075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.073097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.073121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.073144] ? __kthread_parkme+0x82/0x180 [ 17.073164] ? preempt_count_sub+0x50/0x80 [ 17.073188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.073212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.073256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.073280] kthread+0x337/0x6f0 [ 17.073301] ? trace_preempt_on+0x20/0xc0 [ 17.073328] ? __pfx_kthread+0x10/0x10 [ 17.073350] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.073372] ? calculate_sigpending+0x7b/0xa0 [ 17.073400] ? __pfx_kthread+0x10/0x10 [ 17.073423] ret_from_fork+0x116/0x1d0 [ 17.073443] ? __pfx_kthread+0x10/0x10 [ 17.073465] ret_from_fork_asm+0x1a/0x30 [ 17.073601] </TASK> [ 17.073620] [ 17.079770] Allocated by task 283: [ 17.079989] kasan_save_stack+0x45/0x70 [ 17.080228] kasan_save_track+0x18/0x40 [ 17.080522] kasan_save_alloc_info+0x3b/0x50 [ 17.080736] __kasan_kmalloc+0xb7/0xc0 [ 17.080883] __kmalloc_cache_noprof+0x189/0x420 [ 17.081007] kasan_atomics+0x95/0x310 [ 17.081098] kunit_try_run_case+0x1a5/0x480 [ 17.081203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.081778] kthread+0x337/0x6f0 [ 17.081976] ret_from_fork+0x116/0x1d0 [ 17.082184] ret_from_fork_asm+0x1a/0x30 [ 17.082290] [ 17.082423] The buggy address belongs to the object at ffff888102b6b880 [ 17.082423] which belongs to the cache kmalloc-64 of size 64 [ 17.082894] The buggy address is located 0 bytes to the right of [ 17.082894] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.083311] [ 17.083434] The buggy address belongs to the physical page: [ 17.083686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.083872] flags: 0x200000000000000(node=0|zone=2) [ 17.084095] page_type: f5(slab) [ 17.084284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.084419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.084601] page dumped because: kasan: bad access detected [ 17.084706] [ 17.084757] Memory state around the buggy address: [ 17.084851] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.084975] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.085308] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.085804] ^ [ 17.086116] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.086744] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.087184] ================================================================== [ 17.190019] ================================================================== [ 17.190414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 17.191476] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.191791] [ 17.191868] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.191923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.191937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.191960] Call Trace: [ 17.191984] <TASK> [ 17.192004] dump_stack_lvl+0x73/0xb0 [ 17.192039] print_report+0xd1/0x650 [ 17.192064] ? __virt_addr_valid+0x1db/0x2d0 [ 17.192089] ? kasan_atomics_helper+0xde0/0x5450 [ 17.192112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.192148] ? kasan_atomics_helper+0xde0/0x5450 [ 17.192172] kasan_report+0x141/0x180 [ 17.192206] ? kasan_atomics_helper+0xde0/0x5450 [ 17.192246] kasan_check_range+0x10c/0x1c0 [ 17.192273] __kasan_check_write+0x18/0x20 [ 17.192295] kasan_atomics_helper+0xde0/0x5450 [ 17.192318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.192342] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.192364] ? kasan_atomics+0x152/0x310 [ 17.192392] kasan_atomics+0x1dc/0x310 [ 17.192415] ? __pfx_kasan_atomics+0x10/0x10 [ 17.192440] ? __pfx_read_tsc+0x10/0x10 [ 17.192480] ? ktime_get_ts64+0x86/0x230 [ 17.192508] kunit_try_run_case+0x1a5/0x480 [ 17.192534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.192557] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.192583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.192618] ? __kthread_parkme+0x82/0x180 [ 17.192640] ? preempt_count_sub+0x50/0x80 [ 17.192674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.192711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.192805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.192831] kthread+0x337/0x6f0 [ 17.192853] ? trace_preempt_on+0x20/0xc0 [ 17.192879] ? __pfx_kthread+0x10/0x10 [ 17.192901] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.192923] ? calculate_sigpending+0x7b/0xa0 [ 17.192949] ? __pfx_kthread+0x10/0x10 [ 17.192971] ret_from_fork+0x116/0x1d0 [ 17.192991] ? __pfx_kthread+0x10/0x10 [ 17.193012] ret_from_fork_asm+0x1a/0x30 [ 17.193045] </TASK> [ 17.193058] [ 17.200153] Allocated by task 283: [ 17.200268] kasan_save_stack+0x45/0x70 [ 17.200372] kasan_save_track+0x18/0x40 [ 17.200880] kasan_save_alloc_info+0x3b/0x50 [ 17.201132] __kasan_kmalloc+0xb7/0xc0 [ 17.201370] __kmalloc_cache_noprof+0x189/0x420 [ 17.201711] kasan_atomics+0x95/0x310 [ 17.201937] kunit_try_run_case+0x1a5/0x480 [ 17.202141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.202298] kthread+0x337/0x6f0 [ 17.202574] ret_from_fork+0x116/0x1d0 [ 17.202670] ret_from_fork_asm+0x1a/0x30 [ 17.202804] [ 17.202930] The buggy address belongs to the object at ffff888102b6b880 [ 17.202930] which belongs to the cache kmalloc-64 of size 64 [ 17.203420] The buggy address is located 0 bytes to the right of [ 17.203420] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.204007] [ 17.204067] The buggy address belongs to the physical page: [ 17.204344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.204694] flags: 0x200000000000000(node=0|zone=2) [ 17.204859] page_type: f5(slab) [ 17.205070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.205326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.205852] page dumped because: kasan: bad access detected [ 17.206125] [ 17.206193] Memory state around the buggy address: [ 17.206582] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.206763] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.206895] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.207021] ^ [ 17.207301] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.207797] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.208149] ================================================================== [ 17.461154] ================================================================== [ 17.462377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.463831] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.464164] [ 17.464288] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.464338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.464353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.464376] Call Trace: [ 17.464395] <TASK> [ 17.464413] dump_stack_lvl+0x73/0xb0 [ 17.464443] print_report+0xd1/0x650 [ 17.464467] ? __virt_addr_valid+0x1db/0x2d0 [ 17.464491] ? kasan_atomics_helper+0x151d/0x5450 [ 17.464514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.464537] ? kasan_atomics_helper+0x151d/0x5450 [ 17.464560] kasan_report+0x141/0x180 [ 17.464583] ? kasan_atomics_helper+0x151d/0x5450 [ 17.464610] kasan_check_range+0x10c/0x1c0 [ 17.464634] __kasan_check_write+0x18/0x20 [ 17.464655] kasan_atomics_helper+0x151d/0x5450 [ 17.464678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.464701] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.464723] ? kasan_atomics+0x152/0x310 [ 17.464750] kasan_atomics+0x1dc/0x310 [ 17.464773] ? __pfx_kasan_atomics+0x10/0x10 [ 17.464798] ? __pfx_read_tsc+0x10/0x10 [ 17.464819] ? ktime_get_ts64+0x86/0x230 [ 17.464844] kunit_try_run_case+0x1a5/0x480 [ 17.464868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.465587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.465693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.465721] ? __kthread_parkme+0x82/0x180 [ 17.465746] ? preempt_count_sub+0x50/0x80 [ 17.465773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.465801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.465829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.465854] kthread+0x337/0x6f0 [ 17.465876] ? trace_preempt_on+0x20/0xc0 [ 17.465903] ? __pfx_kthread+0x10/0x10 [ 17.465927] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.465951] ? calculate_sigpending+0x7b/0xa0 [ 17.465977] ? __pfx_kthread+0x10/0x10 [ 17.466002] ret_from_fork+0x116/0x1d0 [ 17.466023] ? __pfx_kthread+0x10/0x10 [ 17.466046] ret_from_fork_asm+0x1a/0x30 [ 17.466081] </TASK> [ 17.466096] [ 17.473137] Allocated by task 283: [ 17.473404] kasan_save_stack+0x45/0x70 [ 17.473617] kasan_save_track+0x18/0x40 [ 17.473860] kasan_save_alloc_info+0x3b/0x50 [ 17.474076] __kasan_kmalloc+0xb7/0xc0 [ 17.474285] __kmalloc_cache_noprof+0x189/0x420 [ 17.474519] kasan_atomics+0x95/0x310 [ 17.474692] kunit_try_run_case+0x1a5/0x480 [ 17.474843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.475094] kthread+0x337/0x6f0 [ 17.475185] ret_from_fork+0x116/0x1d0 [ 17.475286] ret_from_fork_asm+0x1a/0x30 [ 17.475385] [ 17.475444] The buggy address belongs to the object at ffff888102b6b880 [ 17.475444] which belongs to the cache kmalloc-64 of size 64 [ 17.475655] The buggy address is located 0 bytes to the right of [ 17.475655] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.476053] [ 17.476184] The buggy address belongs to the physical page: [ 17.476524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.476971] flags: 0x200000000000000(node=0|zone=2) [ 17.477301] page_type: f5(slab) [ 17.477531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.477738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.477875] page dumped because: kasan: bad access detected [ 17.477980] [ 17.478033] Memory state around the buggy address: [ 17.478309] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.478508] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.478643] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.478768] ^ [ 17.478866] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.478991] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.479150] ================================================================== [ 17.138850] ================================================================== [ 17.139148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 17.139892] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.140290] [ 17.140410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.140521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.140538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.140563] Call Trace: [ 17.140585] <TASK> [ 17.140605] dump_stack_lvl+0x73/0xb0 [ 17.140639] print_report+0xd1/0x650 [ 17.140664] ? __virt_addr_valid+0x1db/0x2d0 [ 17.140691] ? kasan_atomics_helper+0xc70/0x5450 [ 17.140714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.140737] ? kasan_atomics_helper+0xc70/0x5450 [ 17.140760] kasan_report+0x141/0x180 [ 17.140784] ? kasan_atomics_helper+0xc70/0x5450 [ 17.140811] kasan_check_range+0x10c/0x1c0 [ 17.140836] __kasan_check_write+0x18/0x20 [ 17.140857] kasan_atomics_helper+0xc70/0x5450 [ 17.140880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.140904] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.140926] ? kasan_atomics+0x152/0x310 [ 17.140954] kasan_atomics+0x1dc/0x310 [ 17.140978] ? __pfx_kasan_atomics+0x10/0x10 [ 17.141004] ? __pfx_read_tsc+0x10/0x10 [ 17.141025] ? ktime_get_ts64+0x86/0x230 [ 17.141050] kunit_try_run_case+0x1a5/0x480 [ 17.141075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.141097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.141121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.141144] ? __kthread_parkme+0x82/0x180 [ 17.141165] ? preempt_count_sub+0x50/0x80 [ 17.141190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.141214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.141256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.141280] kthread+0x337/0x6f0 [ 17.141300] ? trace_preempt_on+0x20/0xc0 [ 17.141326] ? __pfx_kthread+0x10/0x10 [ 17.141348] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.141371] ? calculate_sigpending+0x7b/0xa0 [ 17.141397] ? __pfx_kthread+0x10/0x10 [ 17.141420] ret_from_fork+0x116/0x1d0 [ 17.141439] ? __pfx_kthread+0x10/0x10 [ 17.141476] ret_from_fork_asm+0x1a/0x30 [ 17.141583] </TASK> [ 17.141615] [ 17.147696] Allocated by task 283: [ 17.147942] kasan_save_stack+0x45/0x70 [ 17.148185] kasan_save_track+0x18/0x40 [ 17.148435] kasan_save_alloc_info+0x3b/0x50 [ 17.148866] __kasan_kmalloc+0xb7/0xc0 [ 17.149034] __kmalloc_cache_noprof+0x189/0x420 [ 17.149227] kasan_atomics+0x95/0x310 [ 17.149422] kunit_try_run_case+0x1a5/0x480 [ 17.149672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.149820] kthread+0x337/0x6f0 [ 17.149989] ret_from_fork+0x116/0x1d0 [ 17.150167] ret_from_fork_asm+0x1a/0x30 [ 17.150341] [ 17.150402] The buggy address belongs to the object at ffff888102b6b880 [ 17.150402] which belongs to the cache kmalloc-64 of size 64 [ 17.150916] The buggy address is located 0 bytes to the right of [ 17.150916] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.151275] [ 17.151334] The buggy address belongs to the physical page: [ 17.151497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.151889] flags: 0x200000000000000(node=0|zone=2) [ 17.152128] page_type: f5(slab) [ 17.152217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.152367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.152748] page dumped because: kasan: bad access detected [ 17.153008] [ 17.153110] Memory state around the buggy address: [ 17.153281] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.153810] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.154131] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.154330] ^ [ 17.154438] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154641] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154763] ================================================================== [ 17.497305] ================================================================== [ 17.498035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.498499] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.498912] [ 17.499079] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.499137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.499152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.499177] Call Trace: [ 17.499198] <TASK> [ 17.499218] dump_stack_lvl+0x73/0xb0 [ 17.499259] print_report+0xd1/0x650 [ 17.499284] ? __virt_addr_valid+0x1db/0x2d0 [ 17.499310] ? kasan_atomics_helper+0x164f/0x5450 [ 17.499348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.499373] ? kasan_atomics_helper+0x164f/0x5450 [ 17.499410] kasan_report+0x141/0x180 [ 17.499437] ? kasan_atomics_helper+0x164f/0x5450 [ 17.499466] kasan_check_range+0x10c/0x1c0 [ 17.499492] __kasan_check_write+0x18/0x20 [ 17.499514] kasan_atomics_helper+0x164f/0x5450 [ 17.499539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.499563] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.499587] ? kasan_atomics+0x152/0x310 [ 17.499616] kasan_atomics+0x1dc/0x310 [ 17.499641] ? __pfx_kasan_atomics+0x10/0x10 [ 17.499668] ? __pfx_read_tsc+0x10/0x10 [ 17.499690] ? ktime_get_ts64+0x86/0x230 [ 17.499717] kunit_try_run_case+0x1a5/0x480 [ 17.499744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.499778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.499807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.499832] ? __kthread_parkme+0x82/0x180 [ 17.499869] ? preempt_count_sub+0x50/0x80 [ 17.499896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.499933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.499959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.499995] kthread+0x337/0x6f0 [ 17.500020] ? trace_preempt_on+0x20/0xc0 [ 17.500056] ? __pfx_kthread+0x10/0x10 [ 17.500082] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.500106] ? calculate_sigpending+0x7b/0xa0 [ 17.500144] ? __pfx_kthread+0x10/0x10 [ 17.500169] ret_from_fork+0x116/0x1d0 [ 17.500195] ? __pfx_kthread+0x10/0x10 [ 17.500218] ret_from_fork_asm+0x1a/0x30 [ 17.500268] </TASK> [ 17.500281] [ 17.506769] Allocated by task 283: [ 17.506945] kasan_save_stack+0x45/0x70 [ 17.507071] kasan_save_track+0x18/0x40 [ 17.507277] kasan_save_alloc_info+0x3b/0x50 [ 17.507443] __kasan_kmalloc+0xb7/0xc0 [ 17.507539] __kmalloc_cache_noprof+0x189/0x420 [ 17.507889] kasan_atomics+0x95/0x310 [ 17.508051] kunit_try_run_case+0x1a5/0x480 [ 17.508334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.508593] kthread+0x337/0x6f0 [ 17.508743] ret_from_fork+0x116/0x1d0 [ 17.508833] ret_from_fork_asm+0x1a/0x30 [ 17.508927] [ 17.508982] The buggy address belongs to the object at ffff888102b6b880 [ 17.508982] which belongs to the cache kmalloc-64 of size 64 [ 17.509183] The buggy address is located 0 bytes to the right of [ 17.509183] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.509400] [ 17.509458] The buggy address belongs to the physical page: [ 17.509567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.509820] flags: 0x200000000000000(node=0|zone=2) [ 17.510043] page_type: f5(slab) [ 17.510210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.510553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.510861] page dumped because: kasan: bad access detected [ 17.511090] [ 17.511181] Memory state around the buggy address: [ 17.511400] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.511721] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.512019] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.512368] ^ [ 17.512624] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.512977] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.513335] ================================================================== [ 17.121989] ================================================================== [ 17.122192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 17.122357] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.122615] [ 17.122737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.122792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.122807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.122831] Call Trace: [ 17.122853] <TASK> [ 17.122874] dump_stack_lvl+0x73/0xb0 [ 17.122905] print_report+0xd1/0x650 [ 17.122931] ? __virt_addr_valid+0x1db/0x2d0 [ 17.122955] ? kasan_atomics_helper+0xb6a/0x5450 [ 17.122977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.123000] ? kasan_atomics_helper+0xb6a/0x5450 [ 17.123022] kasan_report+0x141/0x180 [ 17.123044] ? kasan_atomics_helper+0xb6a/0x5450 [ 17.123072] kasan_check_range+0x10c/0x1c0 [ 17.123097] __kasan_check_write+0x18/0x20 [ 17.123117] kasan_atomics_helper+0xb6a/0x5450 [ 17.123140] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.123164] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.123185] ? kasan_atomics+0x152/0x310 [ 17.123212] kasan_atomics+0x1dc/0x310 [ 17.123247] ? __pfx_kasan_atomics+0x10/0x10 [ 17.123273] ? __pfx_read_tsc+0x10/0x10 [ 17.123296] ? ktime_get_ts64+0x86/0x230 [ 17.123322] kunit_try_run_case+0x1a5/0x480 [ 17.123348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.123370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.123394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.123417] ? __kthread_parkme+0x82/0x180 [ 17.123438] ? preempt_count_sub+0x50/0x80 [ 17.123525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.123550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.123574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.123597] kthread+0x337/0x6f0 [ 17.123618] ? trace_preempt_on+0x20/0xc0 [ 17.123643] ? __pfx_kthread+0x10/0x10 [ 17.123664] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.123686] ? calculate_sigpending+0x7b/0xa0 [ 17.123712] ? __pfx_kthread+0x10/0x10 [ 17.123734] ret_from_fork+0x116/0x1d0 [ 17.123752] ? __pfx_kthread+0x10/0x10 [ 17.123774] ret_from_fork_asm+0x1a/0x30 [ 17.123805] </TASK> [ 17.123819] [ 17.130898] Allocated by task 283: [ 17.131047] kasan_save_stack+0x45/0x70 [ 17.131243] kasan_save_track+0x18/0x40 [ 17.131434] kasan_save_alloc_info+0x3b/0x50 [ 17.131640] __kasan_kmalloc+0xb7/0xc0 [ 17.131834] __kmalloc_cache_noprof+0x189/0x420 [ 17.131995] kasan_atomics+0x95/0x310 [ 17.132181] kunit_try_run_case+0x1a5/0x480 [ 17.132308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.132781] kthread+0x337/0x6f0 [ 17.132975] ret_from_fork+0x116/0x1d0 [ 17.133075] ret_from_fork_asm+0x1a/0x30 [ 17.133167] [ 17.133273] The buggy address belongs to the object at ffff888102b6b880 [ 17.133273] which belongs to the cache kmalloc-64 of size 64 [ 17.133757] The buggy address is located 0 bytes to the right of [ 17.133757] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.134183] [ 17.134308] The buggy address belongs to the physical page: [ 17.134434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.134631] flags: 0x200000000000000(node=0|zone=2) [ 17.134736] page_type: f5(slab) [ 17.134822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.134954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.135081] page dumped because: kasan: bad access detected [ 17.135181] [ 17.135846] Memory state around the buggy address: [ 17.136251] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.136718] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.137178] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.137535] ^ [ 17.137823] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.138048] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.138246] ================================================================== [ 17.032712] ================================================================== [ 17.032975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 17.033134] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.034021] [ 17.034247] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.034427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.034449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.034496] Call Trace: [ 17.034527] <TASK> [ 17.034548] dump_stack_lvl+0x73/0xb0 [ 17.034593] print_report+0xd1/0x650 [ 17.034618] ? __virt_addr_valid+0x1db/0x2d0 [ 17.034641] ? kasan_atomics_helper+0x860/0x5450 [ 17.034664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.034687] ? kasan_atomics_helper+0x860/0x5450 [ 17.034710] kasan_report+0x141/0x180 [ 17.034733] ? kasan_atomics_helper+0x860/0x5450 [ 17.034760] kasan_check_range+0x10c/0x1c0 [ 17.034784] __kasan_check_write+0x18/0x20 [ 17.034805] kasan_atomics_helper+0x860/0x5450 [ 17.034829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.034852] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.034875] ? kasan_atomics+0x152/0x310 [ 17.034903] kasan_atomics+0x1dc/0x310 [ 17.034926] ? __pfx_kasan_atomics+0x10/0x10 [ 17.034951] ? __pfx_read_tsc+0x10/0x10 [ 17.034973] ? ktime_get_ts64+0x86/0x230 [ 17.034998] kunit_try_run_case+0x1a5/0x480 [ 17.035022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.035045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.035068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.035091] ? __kthread_parkme+0x82/0x180 [ 17.035112] ? preempt_count_sub+0x50/0x80 [ 17.035137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.035161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.035185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.035208] kthread+0x337/0x6f0 [ 17.035247] ? trace_preempt_on+0x20/0xc0 [ 17.035274] ? __pfx_kthread+0x10/0x10 [ 17.035296] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.035318] ? calculate_sigpending+0x7b/0xa0 [ 17.035344] ? __pfx_kthread+0x10/0x10 [ 17.035366] ret_from_fork+0x116/0x1d0 [ 17.035385] ? __pfx_kthread+0x10/0x10 [ 17.035407] ret_from_fork_asm+0x1a/0x30 [ 17.035440] </TASK> [ 17.035465] [ 17.043023] Allocated by task 283: [ 17.043236] kasan_save_stack+0x45/0x70 [ 17.043439] kasan_save_track+0x18/0x40 [ 17.043602] kasan_save_alloc_info+0x3b/0x50 [ 17.044084] __kasan_kmalloc+0xb7/0xc0 [ 17.044256] __kmalloc_cache_noprof+0x189/0x420 [ 17.044413] kasan_atomics+0x95/0x310 [ 17.044730] kunit_try_run_case+0x1a5/0x480 [ 17.044971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.045110] kthread+0x337/0x6f0 [ 17.045261] ret_from_fork+0x116/0x1d0 [ 17.045568] ret_from_fork_asm+0x1a/0x30 [ 17.045715] [ 17.045841] The buggy address belongs to the object at ffff888102b6b880 [ 17.045841] which belongs to the cache kmalloc-64 of size 64 [ 17.046116] The buggy address is located 0 bytes to the right of [ 17.046116] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.046477] [ 17.046864] The buggy address belongs to the physical page: [ 17.047149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.047324] flags: 0x200000000000000(node=0|zone=2) [ 17.047731] page_type: f5(slab) [ 17.047935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.048571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.049098] page dumped because: kasan: bad access detected [ 17.049243] [ 17.049300] Memory state around the buggy address: [ 17.049583] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.049866] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.050193] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.050351] ^ [ 17.050610] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.050890] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.051142] ================================================================== [ 16.910987] ================================================================== [ 16.911743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.912006] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.912275] [ 16.912396] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.912503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.912520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.912545] Call Trace: [ 16.912568] <TASK> [ 16.912590] dump_stack_lvl+0x73/0xb0 [ 16.912619] print_report+0xd1/0x650 [ 16.912643] ? __virt_addr_valid+0x1db/0x2d0 [ 16.912668] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.912690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.912713] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.912735] kasan_report+0x141/0x180 [ 16.912758] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.912785] kasan_check_range+0x10c/0x1c0 [ 16.912810] __kasan_check_write+0x18/0x20 [ 16.912831] kasan_atomics_helper+0x4a0/0x5450 [ 16.912854] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.912879] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.912902] ? kasan_atomics+0x152/0x310 [ 16.912928] kasan_atomics+0x1dc/0x310 [ 16.912952] ? __pfx_kasan_atomics+0x10/0x10 [ 16.912976] ? __pfx_read_tsc+0x10/0x10 [ 16.912998] ? ktime_get_ts64+0x86/0x230 [ 16.913023] kunit_try_run_case+0x1a5/0x480 [ 16.913048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.913070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.913094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.913116] ? __kthread_parkme+0x82/0x180 [ 16.913137] ? preempt_count_sub+0x50/0x80 [ 16.913162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.913186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.913208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.913240] kthread+0x337/0x6f0 [ 16.913263] ? trace_preempt_on+0x20/0xc0 [ 16.913287] ? __pfx_kthread+0x10/0x10 [ 16.913309] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.913330] ? calculate_sigpending+0x7b/0xa0 [ 16.913355] ? __pfx_kthread+0x10/0x10 [ 16.913377] ret_from_fork+0x116/0x1d0 [ 16.913396] ? __pfx_kthread+0x10/0x10 [ 16.913417] ret_from_fork_asm+0x1a/0x30 [ 16.913499] </TASK> [ 16.913516] [ 16.919733] Allocated by task 283: [ 16.919899] kasan_save_stack+0x45/0x70 [ 16.920090] kasan_save_track+0x18/0x40 [ 16.920234] kasan_save_alloc_info+0x3b/0x50 [ 16.920417] __kasan_kmalloc+0xb7/0xc0 [ 16.920742] __kmalloc_cache_noprof+0x189/0x420 [ 16.920853] kasan_atomics+0x95/0x310 [ 16.920939] kunit_try_run_case+0x1a5/0x480 [ 16.921032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.921137] kthread+0x337/0x6f0 [ 16.921216] ret_from_fork+0x116/0x1d0 [ 16.921422] ret_from_fork_asm+0x1a/0x30 [ 16.921747] [ 16.921876] The buggy address belongs to the object at ffff888102b6b880 [ 16.921876] which belongs to the cache kmalloc-64 of size 64 [ 16.922624] The buggy address is located 0 bytes to the right of [ 16.922624] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.922940] [ 16.923061] The buggy address belongs to the physical page: [ 16.923682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.923924] flags: 0x200000000000000(node=0|zone=2) [ 16.924112] page_type: f5(slab) [ 16.924277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.925855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.926134] page dumped because: kasan: bad access detected [ 16.926329] [ 16.926540] Memory state around the buggy address: [ 16.926704] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.926944] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.927127] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.927422] ^ [ 16.927581] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.927710] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.928003] ================================================================== [ 17.155075] ================================================================== [ 17.155561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 17.156013] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.156527] [ 17.156673] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.156727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.156741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.156765] Call Trace: [ 17.156786] <TASK> [ 17.156807] dump_stack_lvl+0x73/0xb0 [ 17.156837] print_report+0xd1/0x650 [ 17.156862] ? __virt_addr_valid+0x1db/0x2d0 [ 17.156888] ? kasan_atomics_helper+0x4a84/0x5450 [ 17.156912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.156937] ? kasan_atomics_helper+0x4a84/0x5450 [ 17.156960] kasan_report+0x141/0x180 [ 17.156985] ? kasan_atomics_helper+0x4a84/0x5450 [ 17.157013] __asan_report_load4_noabort+0x18/0x20 [ 17.157036] kasan_atomics_helper+0x4a84/0x5450 [ 17.157060] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.157084] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.157107] ? kasan_atomics+0x152/0x310 [ 17.157135] kasan_atomics+0x1dc/0x310 [ 17.157159] ? __pfx_kasan_atomics+0x10/0x10 [ 17.157186] ? __pfx_read_tsc+0x10/0x10 [ 17.157208] ? ktime_get_ts64+0x86/0x230 [ 17.157245] kunit_try_run_case+0x1a5/0x480 [ 17.157273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.157295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.157319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.157342] ? __kthread_parkme+0x82/0x180 [ 17.157363] ? preempt_count_sub+0x50/0x80 [ 17.157388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.157412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.157435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.157529] kthread+0x337/0x6f0 [ 17.157554] ? trace_preempt_on+0x20/0xc0 [ 17.157582] ? __pfx_kthread+0x10/0x10 [ 17.157603] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.157626] ? calculate_sigpending+0x7b/0xa0 [ 17.157653] ? __pfx_kthread+0x10/0x10 [ 17.157676] ret_from_fork+0x116/0x1d0 [ 17.157696] ? __pfx_kthread+0x10/0x10 [ 17.157718] ret_from_fork_asm+0x1a/0x30 [ 17.157752] </TASK> [ 17.157764] [ 17.163847] Allocated by task 283: [ 17.164068] kasan_save_stack+0x45/0x70 [ 17.164271] kasan_save_track+0x18/0x40 [ 17.164551] kasan_save_alloc_info+0x3b/0x50 [ 17.164827] __kasan_kmalloc+0xb7/0xc0 [ 17.165034] __kmalloc_cache_noprof+0x189/0x420 [ 17.165204] kasan_atomics+0x95/0x310 [ 17.165305] kunit_try_run_case+0x1a5/0x480 [ 17.165400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.165884] kthread+0x337/0x6f0 [ 17.166090] ret_from_fork+0x116/0x1d0 [ 17.166355] ret_from_fork_asm+0x1a/0x30 [ 17.167375] [ 17.167521] The buggy address belongs to the object at ffff888102b6b880 [ 17.167521] which belongs to the cache kmalloc-64 of size 64 [ 17.167921] The buggy address is located 0 bytes to the right of [ 17.167921] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.168124] [ 17.168521] The buggy address belongs to the physical page: [ 17.168944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.169502] flags: 0x200000000000000(node=0|zone=2) [ 17.169890] page_type: f5(slab) [ 17.170012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.170153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.170344] page dumped because: kasan: bad access detected [ 17.170594] [ 17.170662] Memory state around the buggy address: [ 17.170816] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.171112] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.171385] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.171603] ^ [ 17.171701] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.172044] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.172780] ================================================================== [ 17.546019] ================================================================== [ 17.546463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.546889] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.547200] [ 17.547339] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.547389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.547404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.547424] Call Trace: [ 17.547440] <TASK> [ 17.547454] dump_stack_lvl+0x73/0xb0 [ 17.547480] print_report+0xd1/0x650 [ 17.547501] ? __virt_addr_valid+0x1db/0x2d0 [ 17.547525] ? kasan_atomics_helper+0x1818/0x5450 [ 17.547547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.547568] ? kasan_atomics_helper+0x1818/0x5450 [ 17.547590] kasan_report+0x141/0x180 [ 17.547614] ? kasan_atomics_helper+0x1818/0x5450 [ 17.547640] kasan_check_range+0x10c/0x1c0 [ 17.547664] __kasan_check_write+0x18/0x20 [ 17.547684] kasan_atomics_helper+0x1818/0x5450 [ 17.547707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.547730] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.547751] ? kasan_atomics+0x152/0x310 [ 17.547777] kasan_atomics+0x1dc/0x310 [ 17.547801] ? __pfx_kasan_atomics+0x10/0x10 [ 17.547825] ? __pfx_read_tsc+0x10/0x10 [ 17.547846] ? ktime_get_ts64+0x86/0x230 [ 17.547869] kunit_try_run_case+0x1a5/0x480 [ 17.547893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.547915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.547938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.547959] ? __kthread_parkme+0x82/0x180 [ 17.547980] ? preempt_count_sub+0x50/0x80 [ 17.548002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.548026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.548048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.548071] kthread+0x337/0x6f0 [ 17.548091] ? trace_preempt_on+0x20/0xc0 [ 17.548113] ? __pfx_kthread+0x10/0x10 [ 17.548135] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.548156] ? calculate_sigpending+0x7b/0xa0 [ 17.548179] ? __pfx_kthread+0x10/0x10 [ 17.548200] ret_from_fork+0x116/0x1d0 [ 17.548219] ? __pfx_kthread+0x10/0x10 [ 17.548498] ret_from_fork_asm+0x1a/0x30 [ 17.548531] </TASK> [ 17.548543] [ 17.554827] Allocated by task 283: [ 17.554932] kasan_save_stack+0x45/0x70 [ 17.555120] kasan_save_track+0x18/0x40 [ 17.555285] kasan_save_alloc_info+0x3b/0x50 [ 17.555383] __kasan_kmalloc+0xb7/0xc0 [ 17.555471] __kmalloc_cache_noprof+0x189/0x420 [ 17.555566] kasan_atomics+0x95/0x310 [ 17.555650] kunit_try_run_case+0x1a5/0x480 [ 17.555740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.555841] kthread+0x337/0x6f0 [ 17.555918] ret_from_fork+0x116/0x1d0 [ 17.556000] ret_from_fork_asm+0x1a/0x30 [ 17.556091] [ 17.556144] The buggy address belongs to the object at ffff888102b6b880 [ 17.556144] which belongs to the cache kmalloc-64 of size 64 [ 17.556678] The buggy address is located 0 bytes to the right of [ 17.556678] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.557415] [ 17.557544] The buggy address belongs to the physical page: [ 17.557887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.558358] flags: 0x200000000000000(node=0|zone=2) [ 17.558589] page_type: f5(slab) [ 17.558682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.558824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.558956] page dumped because: kasan: bad access detected [ 17.559060] [ 17.559112] Memory state around the buggy address: [ 17.559212] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.559544] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.559974] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.560378] ^ [ 17.560684] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.561106] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.561270] ================================================================== [ 16.981097] ================================================================== [ 16.981402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.981793] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.982140] [ 16.982273] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.982346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.982363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.982397] Call Trace: [ 16.982420] <TASK> [ 16.982440] dump_stack_lvl+0x73/0xb0 [ 16.982552] print_report+0xd1/0x650 [ 16.982577] ? __virt_addr_valid+0x1db/0x2d0 [ 16.982615] ? kasan_atomics_helper+0x697/0x5450 [ 16.982638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.982672] ? kasan_atomics_helper+0x697/0x5450 [ 16.982698] kasan_report+0x141/0x180 [ 16.982722] ? kasan_atomics_helper+0x697/0x5450 [ 16.982761] kasan_check_range+0x10c/0x1c0 [ 16.982788] __kasan_check_write+0x18/0x20 [ 16.982818] kasan_atomics_helper+0x697/0x5450 [ 16.982846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.982870] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.982903] ? kasan_atomics+0x152/0x310 [ 16.982933] kasan_atomics+0x1dc/0x310 [ 16.982958] ? __pfx_kasan_atomics+0x10/0x10 [ 16.982997] ? __pfx_read_tsc+0x10/0x10 [ 16.983019] ? ktime_get_ts64+0x86/0x230 [ 16.983055] kunit_try_run_case+0x1a5/0x480 [ 16.983082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.983115] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.983142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.983167] ? __kthread_parkme+0x82/0x180 [ 16.983194] ? preempt_count_sub+0x50/0x80 [ 16.983233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.983261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.983285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.983319] kthread+0x337/0x6f0 [ 16.983341] ? trace_preempt_on+0x20/0xc0 [ 16.983367] ? __pfx_kthread+0x10/0x10 [ 16.983389] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.983411] ? calculate_sigpending+0x7b/0xa0 [ 16.983436] ? __pfx_kthread+0x10/0x10 [ 16.983516] ret_from_fork+0x116/0x1d0 [ 16.983540] ? __pfx_kthread+0x10/0x10 [ 16.983563] ret_from_fork_asm+0x1a/0x30 [ 16.983595] </TASK> [ 16.983609] [ 16.989042] Allocated by task 283: [ 16.989251] kasan_save_stack+0x45/0x70 [ 16.989556] kasan_save_track+0x18/0x40 [ 16.989814] kasan_save_alloc_info+0x3b/0x50 [ 16.990086] __kasan_kmalloc+0xb7/0xc0 [ 16.990318] __kmalloc_cache_noprof+0x189/0x420 [ 16.990672] kasan_atomics+0x95/0x310 [ 16.990920] kunit_try_run_case+0x1a5/0x480 [ 16.991076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.991194] kthread+0x337/0x6f0 [ 16.991291] ret_from_fork+0x116/0x1d0 [ 16.991407] ret_from_fork_asm+0x1a/0x30 [ 16.991835] [ 16.991961] The buggy address belongs to the object at ffff888102b6b880 [ 16.991961] which belongs to the cache kmalloc-64 of size 64 [ 16.992442] The buggy address is located 0 bytes to the right of [ 16.992442] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.992952] [ 16.993024] The buggy address belongs to the physical page: [ 16.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.993638] flags: 0x200000000000000(node=0|zone=2) [ 16.994985] page_type: f5(slab) [ 16.995234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.995398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.995932] page dumped because: kasan: bad access detected [ 16.996350] [ 16.996449] Memory state around the buggy address: [ 16.996879] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.997201] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.997483] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.997719] ^ [ 16.997909] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.998139] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.998379] ================================================================== [ 16.963147] ================================================================== [ 16.963584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.964103] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.964589] [ 16.964727] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.964783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.964807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.964831] Call Trace: [ 16.964851] <TASK> [ 16.964870] dump_stack_lvl+0x73/0xb0 [ 16.964899] print_report+0xd1/0x650 [ 16.964923] ? __virt_addr_valid+0x1db/0x2d0 [ 16.964947] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.964971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.964995] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.965018] kasan_report+0x141/0x180 [ 16.965041] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.965069] kasan_check_range+0x10c/0x1c0 [ 16.965094] __kasan_check_write+0x18/0x20 [ 16.965114] kasan_atomics_helper+0x5fe/0x5450 [ 16.965138] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.965161] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.965184] ? kasan_atomics+0x152/0x310 [ 16.965211] kasan_atomics+0x1dc/0x310 [ 16.965246] ? __pfx_kasan_atomics+0x10/0x10 [ 16.965272] ? __pfx_read_tsc+0x10/0x10 [ 16.965294] ? ktime_get_ts64+0x86/0x230 [ 16.965319] kunit_try_run_case+0x1a5/0x480 [ 16.965344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.965367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.965391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.965415] ? __kthread_parkme+0x82/0x180 [ 16.965437] ? preempt_count_sub+0x50/0x80 [ 16.965546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.965573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.965608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.965635] kthread+0x337/0x6f0 [ 16.965656] ? trace_preempt_on+0x20/0xc0 [ 16.965682] ? __pfx_kthread+0x10/0x10 [ 16.965705] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.965727] ? calculate_sigpending+0x7b/0xa0 [ 16.965753] ? __pfx_kthread+0x10/0x10 [ 16.965777] ret_from_fork+0x116/0x1d0 [ 16.965795] ? __pfx_kthread+0x10/0x10 [ 16.965818] ret_from_fork_asm+0x1a/0x30 [ 16.965850] </TASK> [ 16.965862] [ 16.972509] Allocated by task 283: [ 16.972681] kasan_save_stack+0x45/0x70 [ 16.972820] kasan_save_track+0x18/0x40 [ 16.972990] kasan_save_alloc_info+0x3b/0x50 [ 16.973196] __kasan_kmalloc+0xb7/0xc0 [ 16.973310] __kmalloc_cache_noprof+0x189/0x420 [ 16.973425] kasan_atomics+0x95/0x310 [ 16.973826] kunit_try_run_case+0x1a5/0x480 [ 16.974116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.974536] kthread+0x337/0x6f0 [ 16.974768] ret_from_fork+0x116/0x1d0 [ 16.975025] ret_from_fork_asm+0x1a/0x30 [ 16.975231] [ 16.975290] The buggy address belongs to the object at ffff888102b6b880 [ 16.975290] which belongs to the cache kmalloc-64 of size 64 [ 16.975768] The buggy address is located 0 bytes to the right of [ 16.975768] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.976271] [ 16.976361] The buggy address belongs to the physical page: [ 16.976603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.976835] flags: 0x200000000000000(node=0|zone=2) [ 16.976940] page_type: f5(slab) [ 16.977030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.977163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.977300] page dumped because: kasan: bad access detected [ 16.977403] [ 16.977503] Memory state around the buggy address: [ 16.977714] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.978017] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.978356] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.978877] ^ [ 16.979098] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.979566] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.979915] ================================================================== [ 17.514110] ================================================================== [ 17.514297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.515135] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.515471] [ 17.515631] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.515685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.515699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.515733] Call Trace: [ 17.515753] <TASK> [ 17.515771] dump_stack_lvl+0x73/0xb0 [ 17.515816] print_report+0xd1/0x650 [ 17.515842] ? __virt_addr_valid+0x1db/0x2d0 [ 17.515877] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.515905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.515929] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.515966] kasan_report+0x141/0x180 [ 17.515992] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.516022] kasan_check_range+0x10c/0x1c0 [ 17.516048] __kasan_check_write+0x18/0x20 [ 17.516068] kasan_atomics_helper+0x16e7/0x5450 [ 17.516094] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.516118] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.516141] ? kasan_atomics+0x152/0x310 [ 17.516170] kasan_atomics+0x1dc/0x310 [ 17.516202] ? __pfx_kasan_atomics+0x10/0x10 [ 17.516241] ? __pfx_read_tsc+0x10/0x10 [ 17.516267] ? ktime_get_ts64+0x86/0x230 [ 17.516293] kunit_try_run_case+0x1a5/0x480 [ 17.516320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.516342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.516367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.516391] ? __kthread_parkme+0x82/0x180 [ 17.516412] ? preempt_count_sub+0x50/0x80 [ 17.516437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.516462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.516486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.516510] kthread+0x337/0x6f0 [ 17.516530] ? trace_preempt_on+0x20/0xc0 [ 17.516556] ? __pfx_kthread+0x10/0x10 [ 17.516577] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.516600] ? calculate_sigpending+0x7b/0xa0 [ 17.516625] ? __pfx_kthread+0x10/0x10 [ 17.516648] ret_from_fork+0x116/0x1d0 [ 17.516669] ? __pfx_kthread+0x10/0x10 [ 17.516691] ret_from_fork_asm+0x1a/0x30 [ 17.516725] </TASK> [ 17.516738] [ 17.522859] Allocated by task 283: [ 17.523058] kasan_save_stack+0x45/0x70 [ 17.523283] kasan_save_track+0x18/0x40 [ 17.523463] kasan_save_alloc_info+0x3b/0x50 [ 17.523658] __kasan_kmalloc+0xb7/0xc0 [ 17.523859] __kmalloc_cache_noprof+0x189/0x420 [ 17.524044] kasan_atomics+0x95/0x310 [ 17.524245] kunit_try_run_case+0x1a5/0x480 [ 17.524451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.524634] kthread+0x337/0x6f0 [ 17.524819] ret_from_fork+0x116/0x1d0 [ 17.524909] ret_from_fork_asm+0x1a/0x30 [ 17.525115] [ 17.525256] The buggy address belongs to the object at ffff888102b6b880 [ 17.525256] which belongs to the cache kmalloc-64 of size 64 [ 17.525706] The buggy address is located 0 bytes to the right of [ 17.525706] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.526040] [ 17.526099] The buggy address belongs to the physical page: [ 17.526206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.526674] flags: 0x200000000000000(node=0|zone=2) [ 17.526990] page_type: f5(slab) [ 17.527089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.527244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.527624] page dumped because: kasan: bad access detected [ 17.527911] [ 17.528033] Memory state around the buggy address: [ 17.528359] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.528599] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.528818] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.529067] ^ [ 17.529309] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529486] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529616] ================================================================== [ 16.856663] ================================================================== [ 16.857053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.857284] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.857420] [ 16.857522] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.857854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.857880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.857905] Call Trace: [ 16.857929] <TASK> [ 16.857980] dump_stack_lvl+0x73/0xb0 [ 16.858017] print_report+0xd1/0x650 [ 16.858051] ? __virt_addr_valid+0x1db/0x2d0 [ 16.858108] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.858131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.858165] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.858189] kasan_report+0x141/0x180 [ 16.858254] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.858286] __asan_report_store4_noabort+0x1b/0x30 [ 16.858317] kasan_atomics_helper+0x4b6e/0x5450 [ 16.858351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.858375] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.858397] ? kasan_atomics+0x152/0x310 [ 16.858424] kasan_atomics+0x1dc/0x310 [ 16.858447] ? __pfx_kasan_atomics+0x10/0x10 [ 16.858471] ? __pfx_read_tsc+0x10/0x10 [ 16.858493] ? ktime_get_ts64+0x86/0x230 [ 16.858518] kunit_try_run_case+0x1a5/0x480 [ 16.858543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.858707] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.858738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.858798] ? __kthread_parkme+0x82/0x180 [ 16.858822] ? preempt_count_sub+0x50/0x80 [ 16.858848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.858873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.858899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.858925] kthread+0x337/0x6f0 [ 16.858947] ? trace_preempt_on+0x20/0xc0 [ 16.858974] ? __pfx_kthread+0x10/0x10 [ 16.858997] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.859020] ? calculate_sigpending+0x7b/0xa0 [ 16.859047] ? __pfx_kthread+0x10/0x10 [ 16.859071] ret_from_fork+0x116/0x1d0 [ 16.859092] ? __pfx_kthread+0x10/0x10 [ 16.859116] ret_from_fork_asm+0x1a/0x30 [ 16.859152] </TASK> [ 16.859166] [ 16.866583] Allocated by task 283: [ 16.866980] kasan_save_stack+0x45/0x70 [ 16.867372] kasan_save_track+0x18/0x40 [ 16.867844] kasan_save_alloc_info+0x3b/0x50 [ 16.868060] __kasan_kmalloc+0xb7/0xc0 [ 16.868333] __kmalloc_cache_noprof+0x189/0x420 [ 16.868840] kasan_atomics+0x95/0x310 [ 16.869051] kunit_try_run_case+0x1a5/0x480 [ 16.869278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.869477] kthread+0x337/0x6f0 [ 16.869657] ret_from_fork+0x116/0x1d0 [ 16.869839] ret_from_fork_asm+0x1a/0x30 [ 16.869965] [ 16.870090] The buggy address belongs to the object at ffff888102b6b880 [ 16.870090] which belongs to the cache kmalloc-64 of size 64 [ 16.870385] The buggy address is located 0 bytes to the right of [ 16.870385] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.870814] [ 16.870917] The buggy address belongs to the physical page: [ 16.871109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.871631] flags: 0x200000000000000(node=0|zone=2) [ 16.871807] page_type: f5(slab) [ 16.871976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.872270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.872602] page dumped because: kasan: bad access detected [ 16.872773] [ 16.872915] Memory state around the buggy address: [ 16.873077] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.873327] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.873756] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.874177] ^ [ 16.874448] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.874750] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.875039] ================================================================== [ 17.052010] ================================================================== [ 17.052629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 17.052825] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.053216] [ 17.053349] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.053414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.053429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.053475] Call Trace: [ 17.053494] <TASK> [ 17.053514] dump_stack_lvl+0x73/0xb0 [ 17.053610] print_report+0xd1/0x650 [ 17.053662] ? __virt_addr_valid+0x1db/0x2d0 [ 17.053688] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.053720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.053746] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.053769] kasan_report+0x141/0x180 [ 17.053793] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.053820] kasan_check_range+0x10c/0x1c0 [ 17.053845] __kasan_check_write+0x18/0x20 [ 17.053865] kasan_atomics_helper+0x8f9/0x5450 [ 17.053890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.053913] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.053934] ? kasan_atomics+0x152/0x310 [ 17.053962] kasan_atomics+0x1dc/0x310 [ 17.053986] ? __pfx_kasan_atomics+0x10/0x10 [ 17.054010] ? __pfx_read_tsc+0x10/0x10 [ 17.054032] ? ktime_get_ts64+0x86/0x230 [ 17.054057] kunit_try_run_case+0x1a5/0x480 [ 17.054082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.054104] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.054128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.054151] ? __kthread_parkme+0x82/0x180 [ 17.054172] ? preempt_count_sub+0x50/0x80 [ 17.054197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.054236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.054264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.054288] kthread+0x337/0x6f0 [ 17.054309] ? trace_preempt_on+0x20/0xc0 [ 17.054342] ? __pfx_kthread+0x10/0x10 [ 17.054368] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.054391] ? calculate_sigpending+0x7b/0xa0 [ 17.054417] ? __pfx_kthread+0x10/0x10 [ 17.054440] ret_from_fork+0x116/0x1d0 [ 17.054461] ? __pfx_kthread+0x10/0x10 [ 17.054582] ret_from_fork_asm+0x1a/0x30 [ 17.054623] </TASK> [ 17.054639] [ 17.060459] Allocated by task 283: [ 17.061407] kasan_save_stack+0x45/0x70 [ 17.061749] kasan_save_track+0x18/0x40 [ 17.061905] kasan_save_alloc_info+0x3b/0x50 [ 17.062001] __kasan_kmalloc+0xb7/0xc0 [ 17.062123] __kmalloc_cache_noprof+0x189/0x420 [ 17.062352] kasan_atomics+0x95/0x310 [ 17.062919] kunit_try_run_case+0x1a5/0x480 [ 17.063207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.063340] kthread+0x337/0x6f0 [ 17.063619] ret_from_fork+0x116/0x1d0 [ 17.064130] ret_from_fork_asm+0x1a/0x30 [ 17.064282] [ 17.064378] The buggy address belongs to the object at ffff888102b6b880 [ 17.064378] which belongs to the cache kmalloc-64 of size 64 [ 17.064907] The buggy address is located 0 bytes to the right of [ 17.064907] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.065292] [ 17.065413] The buggy address belongs to the physical page: [ 17.065847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.066016] flags: 0x200000000000000(node=0|zone=2) [ 17.066135] page_type: f5(slab) [ 17.066342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.066836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.067050] page dumped because: kasan: bad access detected [ 17.067158] [ 17.067212] Memory state around the buggy address: [ 17.067485] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.067920] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.068085] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.068427] ^ [ 17.068960] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.069123] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.069329] ================================================================== [ 17.257066] ================================================================== [ 17.257424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 17.257770] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.258170] [ 17.258296] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.258355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.258370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.258393] Call Trace: [ 17.258409] <TASK> [ 17.258426] dump_stack_lvl+0x73/0xb0 [ 17.258453] print_report+0xd1/0x650 [ 17.258478] ? __virt_addr_valid+0x1db/0x2d0 [ 17.258503] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.258526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.258549] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.258572] kasan_report+0x141/0x180 [ 17.258596] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.258624] __asan_report_load4_noabort+0x18/0x20 [ 17.258646] kasan_atomics_helper+0x4a36/0x5450 [ 17.258670] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.258694] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.258715] ? kasan_atomics+0x152/0x310 [ 17.258743] kasan_atomics+0x1dc/0x310 [ 17.258768] ? __pfx_kasan_atomics+0x10/0x10 [ 17.258793] ? __pfx_read_tsc+0x10/0x10 [ 17.258814] ? ktime_get_ts64+0x86/0x230 [ 17.258840] kunit_try_run_case+0x1a5/0x480 [ 17.258865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.258888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.258912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.258936] ? __kthread_parkme+0x82/0x180 [ 17.258958] ? preempt_count_sub+0x50/0x80 [ 17.258982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.259007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.259030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.259054] kthread+0x337/0x6f0 [ 17.259075] ? trace_preempt_on+0x20/0xc0 [ 17.259098] ? __pfx_kthread+0x10/0x10 [ 17.259121] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.259143] ? calculate_sigpending+0x7b/0xa0 [ 17.259169] ? __pfx_kthread+0x10/0x10 [ 17.259192] ret_from_fork+0x116/0x1d0 [ 17.259211] ? __pfx_kthread+0x10/0x10 [ 17.259245] ret_from_fork_asm+0x1a/0x30 [ 17.259278] </TASK> [ 17.259290] [ 17.267599] Allocated by task 283: [ 17.267745] kasan_save_stack+0x45/0x70 [ 17.267864] kasan_save_track+0x18/0x40 [ 17.267956] kasan_save_alloc_info+0x3b/0x50 [ 17.268176] __kasan_kmalloc+0xb7/0xc0 [ 17.268331] __kmalloc_cache_noprof+0x189/0x420 [ 17.268593] kasan_atomics+0x95/0x310 [ 17.268744] kunit_try_run_case+0x1a5/0x480 [ 17.268871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.268988] kthread+0x337/0x6f0 [ 17.269094] ret_from_fork+0x116/0x1d0 [ 17.269291] ret_from_fork_asm+0x1a/0x30 [ 17.269544] [ 17.269677] The buggy address belongs to the object at ffff888102b6b880 [ 17.269677] which belongs to the cache kmalloc-64 of size 64 [ 17.270194] The buggy address is located 0 bytes to the right of [ 17.270194] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.270660] [ 17.270726] The buggy address belongs to the physical page: [ 17.271005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.271320] flags: 0x200000000000000(node=0|zone=2) [ 17.271511] page_type: f5(slab) [ 17.271611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.271939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.272172] page dumped because: kasan: bad access detected [ 17.272394] [ 17.272512] Memory state around the buggy address: [ 17.272699] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.272927] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.273207] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.273547] ^ [ 17.273763] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.274057] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.274418] ================================================================== [ 17.808162] ================================================================== [ 17.808721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 17.809161] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.809619] [ 17.810165] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.810235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.810251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.810275] Call Trace: [ 17.810302] <TASK> [ 17.810320] dump_stack_lvl+0x73/0xb0 [ 17.810364] print_report+0xd1/0x650 [ 17.810390] ? __virt_addr_valid+0x1db/0x2d0 [ 17.810417] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.810441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.810467] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.810491] kasan_report+0x141/0x180 [ 17.810514] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.810542] __asan_report_load8_noabort+0x18/0x20 [ 17.810564] kasan_atomics_helper+0x4fb2/0x5450 [ 17.810588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.810611] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.810634] ? kasan_atomics+0x152/0x310 [ 17.810662] kasan_atomics+0x1dc/0x310 [ 17.810686] ? __pfx_kasan_atomics+0x10/0x10 [ 17.810711] ? __pfx_read_tsc+0x10/0x10 [ 17.810732] ? ktime_get_ts64+0x86/0x230 [ 17.810757] kunit_try_run_case+0x1a5/0x480 [ 17.810782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.810804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.810828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.810851] ? __kthread_parkme+0x82/0x180 [ 17.810872] ? preempt_count_sub+0x50/0x80 [ 17.810897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.810921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.810948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.810972] kthread+0x337/0x6f0 [ 17.810992] ? trace_preempt_on+0x20/0xc0 [ 17.811017] ? __pfx_kthread+0x10/0x10 [ 17.811041] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.811062] ? calculate_sigpending+0x7b/0xa0 [ 17.811087] ? __pfx_kthread+0x10/0x10 [ 17.811109] ret_from_fork+0x116/0x1d0 [ 17.811128] ? __pfx_kthread+0x10/0x10 [ 17.811150] ret_from_fork_asm+0x1a/0x30 [ 17.811212] </TASK> [ 17.811233] [ 17.817141] Allocated by task 283: [ 17.817395] kasan_save_stack+0x45/0x70 [ 17.817648] kasan_save_track+0x18/0x40 [ 17.817891] kasan_save_alloc_info+0x3b/0x50 [ 17.818023] __kasan_kmalloc+0xb7/0xc0 [ 17.818114] __kmalloc_cache_noprof+0x189/0x420 [ 17.818211] kasan_atomics+0x95/0x310 [ 17.818460] kunit_try_run_case+0x1a5/0x480 [ 17.818749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.818901] kthread+0x337/0x6f0 [ 17.818986] ret_from_fork+0x116/0x1d0 [ 17.819070] ret_from_fork_asm+0x1a/0x30 [ 17.819156] [ 17.819209] The buggy address belongs to the object at ffff888102b6b880 [ 17.819209] which belongs to the cache kmalloc-64 of size 64 [ 17.819929] The buggy address is located 0 bytes to the right of [ 17.819929] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.820429] [ 17.820486] The buggy address belongs to the physical page: [ 17.820590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.820731] flags: 0x200000000000000(node=0|zone=2) [ 17.820834] page_type: f5(slab) [ 17.820919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.821266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.821752] page dumped because: kasan: bad access detected [ 17.822137] [ 17.822312] Memory state around the buggy address: [ 17.822655] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.822917] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.823046] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.823171] ^ [ 17.823385] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.823819] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824237] ================================================================== [ 17.656898] ================================================================== [ 17.657196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.657487] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.657670] [ 17.657802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.657866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.657880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.657902] Call Trace: [ 17.657919] <TASK> [ 17.657935] dump_stack_lvl+0x73/0xb0 [ 17.657975] print_report+0xd1/0x650 [ 17.658008] ? __virt_addr_valid+0x1db/0x2d0 [ 17.658032] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.658063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.658094] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.658118] kasan_report+0x141/0x180 [ 17.658150] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.658186] __asan_report_load8_noabort+0x18/0x20 [ 17.658216] kasan_atomics_helper+0x4f30/0x5450 [ 17.658251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.658276] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.658299] ? kasan_atomics+0x152/0x310 [ 17.658327] kasan_atomics+0x1dc/0x310 [ 17.658360] ? __pfx_kasan_atomics+0x10/0x10 [ 17.658387] ? __pfx_read_tsc+0x10/0x10 [ 17.658410] ? ktime_get_ts64+0x86/0x230 [ 17.658437] kunit_try_run_case+0x1a5/0x480 [ 17.658461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.658483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.658506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.658529] ? __kthread_parkme+0x82/0x180 [ 17.658551] ? preempt_count_sub+0x50/0x80 [ 17.658575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.658599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.658622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.658646] kthread+0x337/0x6f0 [ 17.658666] ? trace_preempt_on+0x20/0xc0 [ 17.658711] ? __pfx_kthread+0x10/0x10 [ 17.658733] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.658755] ? calculate_sigpending+0x7b/0xa0 [ 17.658780] ? __pfx_kthread+0x10/0x10 [ 17.658802] ret_from_fork+0x116/0x1d0 [ 17.658838] ? __pfx_kthread+0x10/0x10 [ 17.658862] ret_from_fork_asm+0x1a/0x30 [ 17.658895] </TASK> [ 17.658907] [ 17.663311] Allocated by task 283: [ 17.663450] kasan_save_stack+0x45/0x70 [ 17.663542] kasan_save_track+0x18/0x40 [ 17.663631] kasan_save_alloc_info+0x3b/0x50 [ 17.663792] __kasan_kmalloc+0xb7/0xc0 [ 17.663951] __kmalloc_cache_noprof+0x189/0x420 [ 17.664149] kasan_atomics+0x95/0x310 [ 17.664276] kunit_try_run_case+0x1a5/0x480 [ 17.664451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.664558] kthread+0x337/0x6f0 [ 17.664638] ret_from_fork+0x116/0x1d0 [ 17.664720] ret_from_fork_asm+0x1a/0x30 [ 17.664808] [ 17.664859] The buggy address belongs to the object at ffff888102b6b880 [ 17.664859] which belongs to the cache kmalloc-64 of size 64 [ 17.665049] The buggy address is located 0 bytes to the right of [ 17.665049] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.665255] [ 17.665311] The buggy address belongs to the physical page: [ 17.665414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.665662] flags: 0x200000000000000(node=0|zone=2) [ 17.665874] page_type: f5(slab) [ 17.666030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.666350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.666682] page dumped because: kasan: bad access detected [ 17.666913] [ 17.667017] Memory state around the buggy address: [ 17.667217] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.667558] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.667837] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.668119] ^ [ 17.668357] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.668640] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.668851] ================================================================== [ 17.275491] ================================================================== [ 17.275862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 17.276097] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.276357] [ 17.276478] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.276535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.276549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.276572] Call Trace: [ 17.276596] <TASK> [ 17.276637] dump_stack_lvl+0x73/0xb0 [ 17.276678] print_report+0xd1/0x650 [ 17.276704] ? __virt_addr_valid+0x1db/0x2d0 [ 17.276728] ? kasan_atomics_helper+0x1079/0x5450 [ 17.276759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.276792] ? kasan_atomics_helper+0x1079/0x5450 [ 17.276816] kasan_report+0x141/0x180 [ 17.276839] ? kasan_atomics_helper+0x1079/0x5450 [ 17.276866] kasan_check_range+0x10c/0x1c0 [ 17.276891] __kasan_check_write+0x18/0x20 [ 17.276912] kasan_atomics_helper+0x1079/0x5450 [ 17.276936] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.276959] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.276982] ? kasan_atomics+0x152/0x310 [ 17.277009] kasan_atomics+0x1dc/0x310 [ 17.277033] ? __pfx_kasan_atomics+0x10/0x10 [ 17.277057] ? __pfx_read_tsc+0x10/0x10 [ 17.277080] ? ktime_get_ts64+0x86/0x230 [ 17.277105] kunit_try_run_case+0x1a5/0x480 [ 17.277130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.277152] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.277175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.277197] ? __kthread_parkme+0x82/0x180 [ 17.277218] ? preempt_count_sub+0x50/0x80 [ 17.277264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.277290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.277315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.277340] kthread+0x337/0x6f0 [ 17.277360] ? trace_preempt_on+0x20/0xc0 [ 17.277387] ? __pfx_kthread+0x10/0x10 [ 17.277409] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.277432] ? calculate_sigpending+0x7b/0xa0 [ 17.277459] ? __pfx_kthread+0x10/0x10 [ 17.277482] ret_from_fork+0x116/0x1d0 [ 17.277502] ? __pfx_kthread+0x10/0x10 [ 17.277525] ret_from_fork_asm+0x1a/0x30 [ 17.277559] </TASK> [ 17.277573] [ 17.283076] Allocated by task 283: [ 17.283207] kasan_save_stack+0x45/0x70 [ 17.283360] kasan_save_track+0x18/0x40 [ 17.283483] kasan_save_alloc_info+0x3b/0x50 [ 17.283659] __kasan_kmalloc+0xb7/0xc0 [ 17.283837] __kmalloc_cache_noprof+0x189/0x420 [ 17.284054] kasan_atomics+0x95/0x310 [ 17.284251] kunit_try_run_case+0x1a5/0x480 [ 17.284464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.284722] kthread+0x337/0x6f0 [ 17.284884] ret_from_fork+0x116/0x1d0 [ 17.285061] ret_from_fork_asm+0x1a/0x30 [ 17.285263] [ 17.285363] The buggy address belongs to the object at ffff888102b6b880 [ 17.285363] which belongs to the cache kmalloc-64 of size 64 [ 17.285834] The buggy address is located 0 bytes to the right of [ 17.285834] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.286345] [ 17.286459] The buggy address belongs to the physical page: [ 17.286630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.286777] flags: 0x200000000000000(node=0|zone=2) [ 17.286886] page_type: f5(slab) [ 17.286976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.287240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.287627] page dumped because: kasan: bad access detected [ 17.287922] [ 17.288027] Memory state around the buggy address: [ 17.288311] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.288597] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.288845] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.289043] ^ [ 17.289210] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.289490] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.289706] ================================================================== [ 17.208875] ================================================================== [ 17.209606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 17.210167] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.210468] [ 17.210584] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.210651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.210667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.210693] Call Trace: [ 17.210709] <TASK> [ 17.210738] dump_stack_lvl+0x73/0xb0 [ 17.210774] print_report+0xd1/0x650 [ 17.210812] ? __virt_addr_valid+0x1db/0x2d0 [ 17.210841] ? kasan_atomics_helper+0xe78/0x5450 [ 17.210864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.210889] ? kasan_atomics_helper+0xe78/0x5450 [ 17.210914] kasan_report+0x141/0x180 [ 17.210939] ? kasan_atomics_helper+0xe78/0x5450 [ 17.210968] kasan_check_range+0x10c/0x1c0 [ 17.210995] __kasan_check_write+0x18/0x20 [ 17.211017] kasan_atomics_helper+0xe78/0x5450 [ 17.211042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.211066] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.211090] ? kasan_atomics+0x152/0x310 [ 17.211119] kasan_atomics+0x1dc/0x310 [ 17.211144] ? __pfx_kasan_atomics+0x10/0x10 [ 17.211170] ? __pfx_read_tsc+0x10/0x10 [ 17.211193] ? ktime_get_ts64+0x86/0x230 [ 17.211228] kunit_try_run_case+0x1a5/0x480 [ 17.211270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.211297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.211322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.211360] ? __kthread_parkme+0x82/0x180 [ 17.211383] ? preempt_count_sub+0x50/0x80 [ 17.211409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.211434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.211459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.211484] kthread+0x337/0x6f0 [ 17.211505] ? trace_preempt_on+0x20/0xc0 [ 17.211531] ? __pfx_kthread+0x10/0x10 [ 17.211553] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.211576] ? calculate_sigpending+0x7b/0xa0 [ 17.211603] ? __pfx_kthread+0x10/0x10 [ 17.211627] ret_from_fork+0x116/0x1d0 [ 17.211646] ? __pfx_kthread+0x10/0x10 [ 17.211669] ret_from_fork_asm+0x1a/0x30 [ 17.211703] </TASK> [ 17.211716] [ 17.217549] Allocated by task 283: [ 17.217688] kasan_save_stack+0x45/0x70 [ 17.217790] kasan_save_track+0x18/0x40 [ 17.217883] kasan_save_alloc_info+0x3b/0x50 [ 17.217977] __kasan_kmalloc+0xb7/0xc0 [ 17.218063] __kmalloc_cache_noprof+0x189/0x420 [ 17.218160] kasan_atomics+0x95/0x310 [ 17.218391] kunit_try_run_case+0x1a5/0x480 [ 17.218670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.219020] kthread+0x337/0x6f0 [ 17.219264] ret_from_fork+0x116/0x1d0 [ 17.219533] ret_from_fork_asm+0x1a/0x30 [ 17.219711] [ 17.219768] The buggy address belongs to the object at ffff888102b6b880 [ 17.219768] which belongs to the cache kmalloc-64 of size 64 [ 17.220104] The buggy address is located 0 bytes to the right of [ 17.220104] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.220641] [ 17.220743] The buggy address belongs to the physical page: [ 17.220958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.221105] flags: 0x200000000000000(node=0|zone=2) [ 17.221213] page_type: f5(slab) [ 17.221312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.221452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.221588] page dumped because: kasan: bad access detected [ 17.221698] [ 17.221755] Memory state around the buggy address: [ 17.221993] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.222448] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.222890] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.223296] ^ [ 17.223587] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224002] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224260] ================================================================== [ 17.641244] ================================================================== [ 17.641893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.642300] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.642725] [ 17.642877] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.642931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.642945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.642969] Call Trace: [ 17.642988] <TASK> [ 17.643005] dump_stack_lvl+0x73/0xb0 [ 17.643034] print_report+0xd1/0x650 [ 17.643059] ? __virt_addr_valid+0x1db/0x2d0 [ 17.643084] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.643137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.643167] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.643191] kasan_report+0x141/0x180 [ 17.643215] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.643258] kasan_check_range+0x10c/0x1c0 [ 17.643300] __kasan_check_write+0x18/0x20 [ 17.643327] kasan_atomics_helper+0x1c18/0x5450 [ 17.643353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.643378] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.643401] ? kasan_atomics+0x152/0x310 [ 17.643428] kasan_atomics+0x1dc/0x310 [ 17.643470] ? __pfx_kasan_atomics+0x10/0x10 [ 17.643496] ? __pfx_read_tsc+0x10/0x10 [ 17.643518] ? ktime_get_ts64+0x86/0x230 [ 17.643542] kunit_try_run_case+0x1a5/0x480 [ 17.643566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.643598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.643622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.643645] ? __kthread_parkme+0x82/0x180 [ 17.643666] ? preempt_count_sub+0x50/0x80 [ 17.643690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.643728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.643755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.643779] kthread+0x337/0x6f0 [ 17.643799] ? trace_preempt_on+0x20/0xc0 [ 17.643824] ? __pfx_kthread+0x10/0x10 [ 17.643845] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.643884] ? calculate_sigpending+0x7b/0xa0 [ 17.643908] ? __pfx_kthread+0x10/0x10 [ 17.643931] ret_from_fork+0x116/0x1d0 [ 17.643950] ? __pfx_kthread+0x10/0x10 [ 17.643971] ret_from_fork_asm+0x1a/0x30 [ 17.644019] </TASK> [ 17.644032] [ 17.649928] Allocated by task 283: [ 17.650122] kasan_save_stack+0x45/0x70 [ 17.650356] kasan_save_track+0x18/0x40 [ 17.650575] kasan_save_alloc_info+0x3b/0x50 [ 17.650781] __kasan_kmalloc+0xb7/0xc0 [ 17.650932] __kmalloc_cache_noprof+0x189/0x420 [ 17.651032] kasan_atomics+0x95/0x310 [ 17.651122] kunit_try_run_case+0x1a5/0x480 [ 17.651214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.651334] kthread+0x337/0x6f0 [ 17.651417] ret_from_fork+0x116/0x1d0 [ 17.651502] ret_from_fork_asm+0x1a/0x30 [ 17.651592] [ 17.651698] The buggy address belongs to the object at ffff888102b6b880 [ 17.651698] which belongs to the cache kmalloc-64 of size 64 [ 17.652152] The buggy address is located 0 bytes to the right of [ 17.652152] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.652646] [ 17.652760] The buggy address belongs to the physical page: [ 17.653011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.653344] flags: 0x200000000000000(node=0|zone=2) [ 17.653570] page_type: f5(slab) [ 17.653760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.653980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.654109] page dumped because: kasan: bad access detected [ 17.654363] [ 17.654476] Memory state around the buggy address: [ 17.654698] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.654930] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.655181] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.655424] ^ [ 17.655626] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.655858] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.656110] ================================================================== [ 17.225612] ================================================================== [ 17.226109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 17.226887] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.227363] [ 17.227511] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.227580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.227710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.227747] Call Trace: [ 17.227771] <TASK> [ 17.227794] dump_stack_lvl+0x73/0xb0 [ 17.227842] print_report+0xd1/0x650 [ 17.227869] ? __virt_addr_valid+0x1db/0x2d0 [ 17.227909] ? kasan_atomics_helper+0xf10/0x5450 [ 17.227934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.227970] ? kasan_atomics_helper+0xf10/0x5450 [ 17.227995] kasan_report+0x141/0x180 [ 17.228031] ? kasan_atomics_helper+0xf10/0x5450 [ 17.228063] kasan_check_range+0x10c/0x1c0 [ 17.228089] __kasan_check_write+0x18/0x20 [ 17.228122] kasan_atomics_helper+0xf10/0x5450 [ 17.228147] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.228181] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.228206] ? kasan_atomics+0x152/0x310 [ 17.228252] kasan_atomics+0x1dc/0x310 [ 17.228280] ? __pfx_kasan_atomics+0x10/0x10 [ 17.228307] ? __pfx_read_tsc+0x10/0x10 [ 17.228342] ? ktime_get_ts64+0x86/0x230 [ 17.228369] kunit_try_run_case+0x1a5/0x480 [ 17.228405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.228431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.228457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.228493] ? __kthread_parkme+0x82/0x180 [ 17.228516] ? preempt_count_sub+0x50/0x80 [ 17.228541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.228566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.228590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.228613] kthread+0x337/0x6f0 [ 17.228634] ? trace_preempt_on+0x20/0xc0 [ 17.228659] ? __pfx_kthread+0x10/0x10 [ 17.228681] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.228703] ? calculate_sigpending+0x7b/0xa0 [ 17.228729] ? __pfx_kthread+0x10/0x10 [ 17.228752] ret_from_fork+0x116/0x1d0 [ 17.228772] ? __pfx_kthread+0x10/0x10 [ 17.228793] ret_from_fork_asm+0x1a/0x30 [ 17.228828] </TASK> [ 17.228841] [ 17.235110] Allocated by task 283: [ 17.235328] kasan_save_stack+0x45/0x70 [ 17.235458] kasan_save_track+0x18/0x40 [ 17.235652] kasan_save_alloc_info+0x3b/0x50 [ 17.235828] __kasan_kmalloc+0xb7/0xc0 [ 17.236061] __kmalloc_cache_noprof+0x189/0x420 [ 17.236191] kasan_atomics+0x95/0x310 [ 17.236363] kunit_try_run_case+0x1a5/0x480 [ 17.236459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.236564] kthread+0x337/0x6f0 [ 17.236646] ret_from_fork+0x116/0x1d0 [ 17.236729] ret_from_fork_asm+0x1a/0x30 [ 17.236949] [ 17.237069] The buggy address belongs to the object at ffff888102b6b880 [ 17.237069] which belongs to the cache kmalloc-64 of size 64 [ 17.237676] The buggy address is located 0 bytes to the right of [ 17.237676] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.238094] [ 17.238152] The buggy address belongs to the physical page: [ 17.238361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.238798] flags: 0x200000000000000(node=0|zone=2) [ 17.238999] page_type: f5(slab) [ 17.239209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.239481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.239759] page dumped because: kasan: bad access detected [ 17.239992] [ 17.240092] Memory state around the buggy address: [ 17.240326] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.240453] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.240578] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.240697] ^ [ 17.240789] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.240910] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.241029] ================================================================== [ 17.593455] ================================================================== [ 17.593925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.594374] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.594842] [ 17.594989] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.595048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.595063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.595086] Call Trace: [ 17.595102] <TASK> [ 17.595128] dump_stack_lvl+0x73/0xb0 [ 17.595156] print_report+0xd1/0x650 [ 17.595186] ? __virt_addr_valid+0x1db/0x2d0 [ 17.595210] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.595247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.595271] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.595294] kasan_report+0x141/0x180 [ 17.595340] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.595369] kasan_check_range+0x10c/0x1c0 [ 17.595405] __kasan_check_write+0x18/0x20 [ 17.595427] kasan_atomics_helper+0x19e3/0x5450 [ 17.595462] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.595486] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.595508] ? kasan_atomics+0x152/0x310 [ 17.595550] kasan_atomics+0x1dc/0x310 [ 17.595574] ? __pfx_kasan_atomics+0x10/0x10 [ 17.595613] ? __pfx_read_tsc+0x10/0x10 [ 17.595637] ? ktime_get_ts64+0x86/0x230 [ 17.595661] kunit_try_run_case+0x1a5/0x480 [ 17.595696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.595719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.595741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.595765] ? __kthread_parkme+0x82/0x180 [ 17.595786] ? preempt_count_sub+0x50/0x80 [ 17.595810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.595833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.595856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.595879] kthread+0x337/0x6f0 [ 17.595899] ? trace_preempt_on+0x20/0xc0 [ 17.595923] ? __pfx_kthread+0x10/0x10 [ 17.595944] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.595966] ? calculate_sigpending+0x7b/0xa0 [ 17.595989] ? __pfx_kthread+0x10/0x10 [ 17.596011] ret_from_fork+0x116/0x1d0 [ 17.596030] ? __pfx_kthread+0x10/0x10 [ 17.596052] ret_from_fork_asm+0x1a/0x30 [ 17.596082] </TASK> [ 17.596094] [ 17.601631] Allocated by task 283: [ 17.601830] kasan_save_stack+0x45/0x70 [ 17.602038] kasan_save_track+0x18/0x40 [ 17.602184] kasan_save_alloc_info+0x3b/0x50 [ 17.602438] __kasan_kmalloc+0xb7/0xc0 [ 17.602605] __kmalloc_cache_noprof+0x189/0x420 [ 17.602774] kasan_atomics+0x95/0x310 [ 17.602960] kunit_try_run_case+0x1a5/0x480 [ 17.603096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.604501] kthread+0x337/0x6f0 [ 17.604866] ret_from_fork+0x116/0x1d0 [ 17.605253] ret_from_fork_asm+0x1a/0x30 [ 17.605363] [ 17.605422] The buggy address belongs to the object at ffff888102b6b880 [ 17.605422] which belongs to the cache kmalloc-64 of size 64 [ 17.605626] The buggy address is located 0 bytes to the right of [ 17.605626] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.605835] [ 17.605895] The buggy address belongs to the physical page: [ 17.606012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.606290] flags: 0x200000000000000(node=0|zone=2) [ 17.606627] page_type: f5(slab) [ 17.606893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.607332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.607696] page dumped because: kasan: bad access detected [ 17.608017] [ 17.608163] Memory state around the buggy address: [ 17.608499] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.608909] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.609216] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.609574] ^ [ 17.609862] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.610111] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.610365] ================================================================== [ 16.820070] ================================================================== [ 16.820407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.820811] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.821065] [ 16.821203] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.821265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.821297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.821320] Call Trace: [ 16.821335] <TASK> [ 16.821355] dump_stack_lvl+0x73/0xb0 [ 16.821385] print_report+0xd1/0x650 [ 16.821425] ? __virt_addr_valid+0x1db/0x2d0 [ 16.821520] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.821545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.821588] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.821612] kasan_report+0x141/0x180 [ 16.821635] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.821662] __asan_report_store4_noabort+0x1b/0x30 [ 16.821683] kasan_atomics_helper+0x4ba2/0x5450 [ 16.821720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.821746] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.821769] ? kasan_atomics+0x152/0x310 [ 16.821796] kasan_atomics+0x1dc/0x310 [ 16.821819] ? __pfx_kasan_atomics+0x10/0x10 [ 16.821843] ? __pfx_read_tsc+0x10/0x10 [ 16.821865] ? ktime_get_ts64+0x86/0x230 [ 16.821890] kunit_try_run_case+0x1a5/0x480 [ 16.821913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.821961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.821987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.822009] ? __kthread_parkme+0x82/0x180 [ 16.822030] ? preempt_count_sub+0x50/0x80 [ 16.822055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.822080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.822103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.822125] kthread+0x337/0x6f0 [ 16.822144] ? trace_preempt_on+0x20/0xc0 [ 16.822169] ? __pfx_kthread+0x10/0x10 [ 16.822190] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.822212] ? calculate_sigpending+0x7b/0xa0 [ 16.822248] ? __pfx_kthread+0x10/0x10 [ 16.822271] ret_from_fork+0x116/0x1d0 [ 16.822290] ? __pfx_kthread+0x10/0x10 [ 16.822311] ret_from_fork_asm+0x1a/0x30 [ 16.822352] </TASK> [ 16.822367] [ 16.829780] Allocated by task 283: [ 16.829996] kasan_save_stack+0x45/0x70 [ 16.830215] kasan_save_track+0x18/0x40 [ 16.830401] kasan_save_alloc_info+0x3b/0x50 [ 16.830913] __kasan_kmalloc+0xb7/0xc0 [ 16.831161] __kmalloc_cache_noprof+0x189/0x420 [ 16.831388] kasan_atomics+0x95/0x310 [ 16.831654] kunit_try_run_case+0x1a5/0x480 [ 16.831822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.831929] kthread+0x337/0x6f0 [ 16.832008] ret_from_fork+0x116/0x1d0 [ 16.832247] ret_from_fork_asm+0x1a/0x30 [ 16.832612] [ 16.832755] The buggy address belongs to the object at ffff888102b6b880 [ 16.832755] which belongs to the cache kmalloc-64 of size 64 [ 16.833205] The buggy address is located 0 bytes to the right of [ 16.833205] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.833682] [ 16.833740] The buggy address belongs to the physical page: [ 16.833849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.834276] flags: 0x200000000000000(node=0|zone=2) [ 16.834654] page_type: f5(slab) [ 16.834823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.834988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.835442] page dumped because: kasan: bad access detected [ 16.835871] [ 16.835929] Memory state around the buggy address: [ 16.836031] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.836444] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.836914] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.837208] ^ [ 16.837553] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.837714] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.837839] ================================================================== [ 16.929741] ================================================================== [ 16.930488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.930974] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.931249] [ 16.931395] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.931466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.931482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.931506] Call Trace: [ 16.931546] <TASK> [ 16.931569] dump_stack_lvl+0x73/0xb0 [ 16.931603] print_report+0xd1/0x650 [ 16.931626] ? __virt_addr_valid+0x1db/0x2d0 [ 16.931651] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.931673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.931696] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.931796] kasan_report+0x141/0x180 [ 16.931822] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.931850] __asan_report_store4_noabort+0x1b/0x30 [ 16.931872] kasan_atomics_helper+0x4b3a/0x5450 [ 16.931896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.931920] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.931943] ? kasan_atomics+0x152/0x310 [ 16.931971] kasan_atomics+0x1dc/0x310 [ 16.932004] ? __pfx_kasan_atomics+0x10/0x10 [ 16.932033] ? __pfx_read_tsc+0x10/0x10 [ 16.932056] ? ktime_get_ts64+0x86/0x230 [ 16.932093] kunit_try_run_case+0x1a5/0x480 [ 16.932119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.932142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.932166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.932189] ? __kthread_parkme+0x82/0x180 [ 16.932210] ? preempt_count_sub+0x50/0x80 [ 16.932253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.932279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.932303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.932326] kthread+0x337/0x6f0 [ 16.932348] ? trace_preempt_on+0x20/0xc0 [ 16.932374] ? __pfx_kthread+0x10/0x10 [ 16.932396] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.932419] ? calculate_sigpending+0x7b/0xa0 [ 16.932444] ? __pfx_kthread+0x10/0x10 [ 16.932480] ret_from_fork+0x116/0x1d0 [ 16.932500] ? __pfx_kthread+0x10/0x10 [ 16.932523] ret_from_fork_asm+0x1a/0x30 [ 16.932555] </TASK> [ 16.932569] [ 16.938945] Allocated by task 283: [ 16.939085] kasan_save_stack+0x45/0x70 [ 16.939190] kasan_save_track+0x18/0x40 [ 16.939505] kasan_save_alloc_info+0x3b/0x50 [ 16.939785] __kasan_kmalloc+0xb7/0xc0 [ 16.939891] __kmalloc_cache_noprof+0x189/0x420 [ 16.940090] kasan_atomics+0x95/0x310 [ 16.940233] kunit_try_run_case+0x1a5/0x480 [ 16.940419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.940816] kthread+0x337/0x6f0 [ 16.941012] ret_from_fork+0x116/0x1d0 [ 16.941190] ret_from_fork_asm+0x1a/0x30 [ 16.941347] [ 16.941543] The buggy address belongs to the object at ffff888102b6b880 [ 16.941543] which belongs to the cache kmalloc-64 of size 64 [ 16.941774] The buggy address is located 0 bytes to the right of [ 16.941774] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.941974] [ 16.942030] The buggy address belongs to the physical page: [ 16.942134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.942419] flags: 0x200000000000000(node=0|zone=2) [ 16.942783] page_type: f5(slab) [ 16.943007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.943510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.943864] page dumped because: kasan: bad access detected [ 16.943968] [ 16.944018] Memory state around the buggy address: [ 16.944113] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.944410] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.944821] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.945115] ^ [ 16.945354] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.945863] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.946143] ================================================================== [ 17.480573] ================================================================== [ 17.480977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.481322] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.482003] [ 17.482244] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.482315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.482337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.482367] Call Trace: [ 17.482393] <TASK> [ 17.482417] dump_stack_lvl+0x73/0xb0 [ 17.482453] print_report+0xd1/0x650 [ 17.482480] ? __virt_addr_valid+0x1db/0x2d0 [ 17.482507] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.482529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.482552] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.482576] kasan_report+0x141/0x180 [ 17.482614] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.482644] kasan_check_range+0x10c/0x1c0 [ 17.482685] __kasan_check_write+0x18/0x20 [ 17.482707] kasan_atomics_helper+0x15b6/0x5450 [ 17.482733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.482756] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.482779] ? kasan_atomics+0x152/0x310 [ 17.482807] kasan_atomics+0x1dc/0x310 [ 17.482832] ? __pfx_kasan_atomics+0x10/0x10 [ 17.482857] ? __pfx_read_tsc+0x10/0x10 [ 17.482881] ? ktime_get_ts64+0x86/0x230 [ 17.482907] kunit_try_run_case+0x1a5/0x480 [ 17.482933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.482956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.482981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.483004] ? __kthread_parkme+0x82/0x180 [ 17.483026] ? preempt_count_sub+0x50/0x80 [ 17.483051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.483076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.483100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.483123] kthread+0x337/0x6f0 [ 17.483143] ? trace_preempt_on+0x20/0xc0 [ 17.483169] ? __pfx_kthread+0x10/0x10 [ 17.483190] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.483213] ? calculate_sigpending+0x7b/0xa0 [ 17.483258] ? __pfx_kthread+0x10/0x10 [ 17.483281] ret_from_fork+0x116/0x1d0 [ 17.483301] ? __pfx_kthread+0x10/0x10 [ 17.483323] ret_from_fork_asm+0x1a/0x30 [ 17.483357] </TASK> [ 17.483371] [ 17.489534] Allocated by task 283: [ 17.489656] kasan_save_stack+0x45/0x70 [ 17.489771] kasan_save_track+0x18/0x40 [ 17.489871] kasan_save_alloc_info+0x3b/0x50 [ 17.489976] __kasan_kmalloc+0xb7/0xc0 [ 17.490203] __kmalloc_cache_noprof+0x189/0x420 [ 17.490554] kasan_atomics+0x95/0x310 [ 17.490835] kunit_try_run_case+0x1a5/0x480 [ 17.491149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.491510] kthread+0x337/0x6f0 [ 17.491728] ret_from_fork+0x116/0x1d0 [ 17.491844] ret_from_fork_asm+0x1a/0x30 [ 17.491943] [ 17.492004] The buggy address belongs to the object at ffff888102b6b880 [ 17.492004] which belongs to the cache kmalloc-64 of size 64 [ 17.492584] The buggy address is located 0 bytes to the right of [ 17.492584] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.492803] [ 17.492932] The buggy address belongs to the physical page: [ 17.493299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.493708] flags: 0x200000000000000(node=0|zone=2) [ 17.493957] page_type: f5(slab) [ 17.494114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.494404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.494704] page dumped because: kasan: bad access detected [ 17.494918] [ 17.495061] Memory state around the buggy address: [ 17.495237] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.495549] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.495827] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.496130] ^ [ 17.496351] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.496556] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.496684] ================================================================== [ 16.802025] ================================================================== [ 16.802458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.802838] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.803104] [ 16.803212] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.803297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.803310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.803335] Call Trace: [ 16.803349] <TASK> [ 16.803385] dump_stack_lvl+0x73/0xb0 [ 16.803416] print_report+0xd1/0x650 [ 16.803439] ? __virt_addr_valid+0x1db/0x2d0 [ 16.803482] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.803505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.803527] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.803549] kasan_report+0x141/0x180 [ 16.803573] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.803599] __asan_report_load4_noabort+0x18/0x20 [ 16.803627] kasan_atomics_helper+0x4bbc/0x5450 [ 16.803651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.803674] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.803696] ? kasan_atomics+0x152/0x310 [ 16.803722] kasan_atomics+0x1dc/0x310 [ 16.803746] ? __pfx_kasan_atomics+0x10/0x10 [ 16.803769] ? __pfx_read_tsc+0x10/0x10 [ 16.803789] ? ktime_get_ts64+0x86/0x230 [ 16.803814] kunit_try_run_case+0x1a5/0x480 [ 16.803836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.803857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.803881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.803903] ? __kthread_parkme+0x82/0x180 [ 16.803922] ? preempt_count_sub+0x50/0x80 [ 16.803946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.803969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.803991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.804014] kthread+0x337/0x6f0 [ 16.804032] ? trace_preempt_on+0x20/0xc0 [ 16.804056] ? __pfx_kthread+0x10/0x10 [ 16.804076] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.804097] ? calculate_sigpending+0x7b/0xa0 [ 16.804121] ? __pfx_kthread+0x10/0x10 [ 16.804142] ret_from_fork+0x116/0x1d0 [ 16.804159] ? __pfx_kthread+0x10/0x10 [ 16.804179] ret_from_fork_asm+0x1a/0x30 [ 16.804210] </TASK> [ 16.804230] [ 16.811059] Allocated by task 283: [ 16.811311] kasan_save_stack+0x45/0x70 [ 16.811663] kasan_save_track+0x18/0x40 [ 16.811882] kasan_save_alloc_info+0x3b/0x50 [ 16.812150] __kasan_kmalloc+0xb7/0xc0 [ 16.812247] __kmalloc_cache_noprof+0x189/0x420 [ 16.812346] kasan_atomics+0x95/0x310 [ 16.812434] kunit_try_run_case+0x1a5/0x480 [ 16.812590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.812699] kthread+0x337/0x6f0 [ 16.812780] ret_from_fork+0x116/0x1d0 [ 16.812864] ret_from_fork_asm+0x1a/0x30 [ 16.813070] [ 16.813203] The buggy address belongs to the object at ffff888102b6b880 [ 16.813203] which belongs to the cache kmalloc-64 of size 64 [ 16.813963] The buggy address is located 0 bytes to the right of [ 16.813963] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.814947] [ 16.815073] The buggy address belongs to the physical page: [ 16.815580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.815854] flags: 0x200000000000000(node=0|zone=2) [ 16.816010] page_type: f5(slab) [ 16.816232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.816392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.816585] page dumped because: kasan: bad access detected [ 16.816689] [ 16.816740] Memory state around the buggy address: [ 16.816937] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.817240] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.817623] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.818041] ^ [ 16.818408] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.818623] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.818964] ================================================================== [ 17.104446] ================================================================== [ 17.104767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 17.105077] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.105347] [ 17.105583] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.105708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.105725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.105749] Call Trace: [ 17.105770] <TASK> [ 17.105808] dump_stack_lvl+0x73/0xb0 [ 17.105848] print_report+0xd1/0x650 [ 17.105890] ? __virt_addr_valid+0x1db/0x2d0 [ 17.106172] ? kasan_atomics_helper+0xac7/0x5450 [ 17.106208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.106246] ? kasan_atomics_helper+0xac7/0x5450 [ 17.106271] kasan_report+0x141/0x180 [ 17.106295] ? kasan_atomics_helper+0xac7/0x5450 [ 17.106324] kasan_check_range+0x10c/0x1c0 [ 17.106360] __kasan_check_write+0x18/0x20 [ 17.106381] kasan_atomics_helper+0xac7/0x5450 [ 17.106406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.106430] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.106452] ? kasan_atomics+0x152/0x310 [ 17.106480] kasan_atomics+0x1dc/0x310 [ 17.106505] ? __pfx_kasan_atomics+0x10/0x10 [ 17.106530] ? __pfx_read_tsc+0x10/0x10 [ 17.106554] ? ktime_get_ts64+0x86/0x230 [ 17.106582] kunit_try_run_case+0x1a5/0x480 [ 17.106705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.106737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.106764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.106788] ? __kthread_parkme+0x82/0x180 [ 17.106812] ? preempt_count_sub+0x50/0x80 [ 17.106839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.106865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.106890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.106915] kthread+0x337/0x6f0 [ 17.106937] ? trace_preempt_on+0x20/0xc0 [ 17.106963] ? __pfx_kthread+0x10/0x10 [ 17.106987] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.107011] ? calculate_sigpending+0x7b/0xa0 [ 17.107039] ? __pfx_kthread+0x10/0x10 [ 17.107062] ret_from_fork+0x116/0x1d0 [ 17.107083] ? __pfx_kthread+0x10/0x10 [ 17.107105] ret_from_fork_asm+0x1a/0x30 [ 17.107139] </TASK> [ 17.107153] [ 17.113734] Allocated by task 283: [ 17.113846] kasan_save_stack+0x45/0x70 [ 17.113989] kasan_save_track+0x18/0x40 [ 17.114181] kasan_save_alloc_info+0x3b/0x50 [ 17.114447] __kasan_kmalloc+0xb7/0xc0 [ 17.114725] __kmalloc_cache_noprof+0x189/0x420 [ 17.115028] kasan_atomics+0x95/0x310 [ 17.115284] kunit_try_run_case+0x1a5/0x480 [ 17.115564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.115902] kthread+0x337/0x6f0 [ 17.116044] ret_from_fork+0x116/0x1d0 [ 17.116134] ret_from_fork_asm+0x1a/0x30 [ 17.116304] [ 17.116365] The buggy address belongs to the object at ffff888102b6b880 [ 17.116365] which belongs to the cache kmalloc-64 of size 64 [ 17.116614] The buggy address is located 0 bytes to the right of [ 17.116614] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.117103] [ 17.117216] The buggy address belongs to the physical page: [ 17.117610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.118013] flags: 0x200000000000000(node=0|zone=2) [ 17.118284] page_type: f5(slab) [ 17.118574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.118952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.119085] page dumped because: kasan: bad access detected [ 17.119187] [ 17.119247] Memory state around the buggy address: [ 17.119346] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120070] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120539] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.120859] ^ [ 17.121070] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121245] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121591] ================================================================== [ 16.893735] ================================================================== [ 16.894428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.895154] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.895551] [ 16.895740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.895808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.895822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.895846] Call Trace: [ 16.895871] <TASK> [ 16.895893] dump_stack_lvl+0x73/0xb0 [ 16.895924] print_report+0xd1/0x650 [ 16.895973] ? __virt_addr_valid+0x1db/0x2d0 [ 16.896001] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.896024] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.896060] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.896085] kasan_report+0x141/0x180 [ 16.896109] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.896138] __asan_report_load4_noabort+0x18/0x20 [ 16.896161] kasan_atomics_helper+0x4b54/0x5450 [ 16.896185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.896209] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.896243] ? kasan_atomics+0x152/0x310 [ 16.896290] kasan_atomics+0x1dc/0x310 [ 16.896316] ? __pfx_kasan_atomics+0x10/0x10 [ 16.896342] ? __pfx_read_tsc+0x10/0x10 [ 16.896365] ? ktime_get_ts64+0x86/0x230 [ 16.896391] kunit_try_run_case+0x1a5/0x480 [ 16.896417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.896551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.896577] ? __kthread_parkme+0x82/0x180 [ 16.896600] ? preempt_count_sub+0x50/0x80 [ 16.896625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.896693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.896718] kthread+0x337/0x6f0 [ 16.896738] ? trace_preempt_on+0x20/0xc0 [ 16.896763] ? __pfx_kthread+0x10/0x10 [ 16.896784] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.896807] ? calculate_sigpending+0x7b/0xa0 [ 16.896851] ? __pfx_kthread+0x10/0x10 [ 16.896874] ret_from_fork+0x116/0x1d0 [ 16.896894] ? __pfx_kthread+0x10/0x10 [ 16.896917] ret_from_fork_asm+0x1a/0x30 [ 16.896950] </TASK> [ 16.896963] [ 16.903411] Allocated by task 283: [ 16.903807] kasan_save_stack+0x45/0x70 [ 16.904002] kasan_save_track+0x18/0x40 [ 16.904093] kasan_save_alloc_info+0x3b/0x50 [ 16.904186] __kasan_kmalloc+0xb7/0xc0 [ 16.904282] __kmalloc_cache_noprof+0x189/0x420 [ 16.904565] kasan_atomics+0x95/0x310 [ 16.904810] kunit_try_run_case+0x1a5/0x480 [ 16.905057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.905294] kthread+0x337/0x6f0 [ 16.905520] ret_from_fork+0x116/0x1d0 [ 16.905634] ret_from_fork_asm+0x1a/0x30 [ 16.905728] [ 16.905831] The buggy address belongs to the object at ffff888102b6b880 [ 16.905831] which belongs to the cache kmalloc-64 of size 64 [ 16.906285] The buggy address is located 0 bytes to the right of [ 16.906285] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.906709] [ 16.906770] The buggy address belongs to the physical page: [ 16.906881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.907030] flags: 0x200000000000000(node=0|zone=2) [ 16.907135] page_type: f5(slab) [ 16.907230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.907373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.907876] page dumped because: kasan: bad access detected [ 16.908217] [ 16.908353] Memory state around the buggy address: [ 16.908877] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.909312] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.909546] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.909817] ^ [ 16.909992] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910118] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910251] ================================================================== [ 17.871240] ================================================================== [ 17.872168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.872516] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.872922] [ 17.873069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.873121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.873134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.873157] Call Trace: [ 17.873174] <TASK> [ 17.873190] dump_stack_lvl+0x73/0xb0 [ 17.873217] print_report+0xd1/0x650 [ 17.873252] ? __virt_addr_valid+0x1db/0x2d0 [ 17.873277] ? kasan_atomics_helper+0x5115/0x5450 [ 17.873299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.873325] ? kasan_atomics_helper+0x5115/0x5450 [ 17.873348] kasan_report+0x141/0x180 [ 17.873370] ? kasan_atomics_helper+0x5115/0x5450 [ 17.873422] __asan_report_load8_noabort+0x18/0x20 [ 17.873448] kasan_atomics_helper+0x5115/0x5450 [ 17.873472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.873495] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.873517] ? kasan_atomics+0x152/0x310 [ 17.873545] kasan_atomics+0x1dc/0x310 [ 17.873589] ? __pfx_kasan_atomics+0x10/0x10 [ 17.873615] ? __pfx_read_tsc+0x10/0x10 [ 17.873636] ? ktime_get_ts64+0x86/0x230 [ 17.873661] kunit_try_run_case+0x1a5/0x480 [ 17.873686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.873728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.873753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.873776] ? __kthread_parkme+0x82/0x180 [ 17.873797] ? preempt_count_sub+0x50/0x80 [ 17.873822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.873846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.873887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.873913] kthread+0x337/0x6f0 [ 17.873934] ? trace_preempt_on+0x20/0xc0 [ 17.873958] ? __pfx_kthread+0x10/0x10 [ 17.873979] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.874000] ? calculate_sigpending+0x7b/0xa0 [ 17.874044] ? __pfx_kthread+0x10/0x10 [ 17.874067] ret_from_fork+0x116/0x1d0 [ 17.874086] ? __pfx_kthread+0x10/0x10 [ 17.874107] ret_from_fork_asm+0x1a/0x30 [ 17.874139] </TASK> [ 17.874170] [ 17.879950] Allocated by task 283: [ 17.880035] kasan_save_stack+0x45/0x70 [ 17.880127] kasan_save_track+0x18/0x40 [ 17.880216] kasan_save_alloc_info+0x3b/0x50 [ 17.880319] __kasan_kmalloc+0xb7/0xc0 [ 17.880405] __kmalloc_cache_noprof+0x189/0x420 [ 17.880499] kasan_atomics+0x95/0x310 [ 17.880586] kunit_try_run_case+0x1a5/0x480 [ 17.880678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.880778] kthread+0x337/0x6f0 [ 17.880852] ret_from_fork+0x116/0x1d0 [ 17.880934] ret_from_fork_asm+0x1a/0x30 [ 17.881018] [ 17.881069] The buggy address belongs to the object at ffff888102b6b880 [ 17.881069] which belongs to the cache kmalloc-64 of size 64 [ 17.881343] The buggy address is located 0 bytes to the right of [ 17.881343] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.882019] [ 17.882139] The buggy address belongs to the physical page: [ 17.882482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.882929] flags: 0x200000000000000(node=0|zone=2) [ 17.883262] page_type: f5(slab) [ 17.883460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.883857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.884273] page dumped because: kasan: bad access detected [ 17.884549] [ 17.884657] Memory state around the buggy address: [ 17.884810] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.885057] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.885267] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.885388] ^ [ 17.885483] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.885604] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.885724] ================================================================== [ 17.697957] ================================================================== [ 17.698213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.698556] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.698783] [ 17.698905] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.698958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.698973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.698997] Call Trace: [ 17.699014] <TASK> [ 17.699030] dump_stack_lvl+0x73/0xb0 [ 17.699060] print_report+0xd1/0x650 [ 17.699085] ? __virt_addr_valid+0x1db/0x2d0 [ 17.699111] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.699135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.699161] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.699186] kasan_report+0x141/0x180 [ 17.699211] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.699518] kasan_check_range+0x10c/0x1c0 [ 17.699550] __kasan_check_write+0x18/0x20 [ 17.699573] kasan_atomics_helper+0x1e12/0x5450 [ 17.699600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.699626] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.699651] ? kasan_atomics+0x152/0x310 [ 17.699681] kasan_atomics+0x1dc/0x310 [ 17.699707] ? __pfx_kasan_atomics+0x10/0x10 [ 17.699733] ? __pfx_read_tsc+0x10/0x10 [ 17.699754] ? ktime_get_ts64+0x86/0x230 [ 17.699779] kunit_try_run_case+0x1a5/0x480 [ 17.699804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.699827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.699852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.699876] ? __kthread_parkme+0x82/0x180 [ 17.699897] ? preempt_count_sub+0x50/0x80 [ 17.699922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.699946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.699969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.699993] kthread+0x337/0x6f0 [ 17.700014] ? trace_preempt_on+0x20/0xc0 [ 17.700039] ? __pfx_kthread+0x10/0x10 [ 17.700061] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.700083] ? calculate_sigpending+0x7b/0xa0 [ 17.700107] ? __pfx_kthread+0x10/0x10 [ 17.700155] ret_from_fork+0x116/0x1d0 [ 17.700176] ? __pfx_kthread+0x10/0x10 [ 17.700197] ret_from_fork_asm+0x1a/0x30 [ 17.700238] </TASK> [ 17.700253] [ 17.705479] Allocated by task 283: [ 17.705643] kasan_save_stack+0x45/0x70 [ 17.705829] kasan_save_track+0x18/0x40 [ 17.706005] kasan_save_alloc_info+0x3b/0x50 [ 17.706196] __kasan_kmalloc+0xb7/0xc0 [ 17.706390] __kmalloc_cache_noprof+0x189/0x420 [ 17.706600] kasan_atomics+0x95/0x310 [ 17.706782] kunit_try_run_case+0x1a5/0x480 [ 17.706985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.707232] kthread+0x337/0x6f0 [ 17.707396] ret_from_fork+0x116/0x1d0 [ 17.707574] ret_from_fork_asm+0x1a/0x30 [ 17.707673] [ 17.707729] The buggy address belongs to the object at ffff888102b6b880 [ 17.707729] which belongs to the cache kmalloc-64 of size 64 [ 17.707929] The buggy address is located 0 bytes to the right of [ 17.707929] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.708133] [ 17.708188] The buggy address belongs to the physical page: [ 17.708407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.708721] flags: 0x200000000000000(node=0|zone=2) [ 17.708929] page_type: f5(slab) [ 17.709087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.709385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.709672] page dumped because: kasan: bad access detected [ 17.709928] [ 17.710022] Memory state around the buggy address: [ 17.710235] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.710533] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.710800] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.711060] ^ [ 17.711178] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711318] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711447] ================================================================== [ 17.290483] ================================================================== [ 17.290865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 17.291270] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.291568] [ 17.291678] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.291746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.291761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.291785] Call Trace: [ 17.291817] <TASK> [ 17.291838] dump_stack_lvl+0x73/0xb0 [ 17.291867] print_report+0xd1/0x650 [ 17.291890] ? __virt_addr_valid+0x1db/0x2d0 [ 17.291914] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.291951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.291978] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.292001] kasan_report+0x141/0x180 [ 17.292025] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.292053] __asan_report_load4_noabort+0x18/0x20 [ 17.292089] kasan_atomics_helper+0x4a1c/0x5450 [ 17.292116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.292139] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.292161] ? kasan_atomics+0x152/0x310 [ 17.292188] kasan_atomics+0x1dc/0x310 [ 17.292232] ? __pfx_kasan_atomics+0x10/0x10 [ 17.292268] ? __pfx_read_tsc+0x10/0x10 [ 17.292290] ? ktime_get_ts64+0x86/0x230 [ 17.292324] kunit_try_run_case+0x1a5/0x480 [ 17.292356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.292378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.292409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.292441] ? __kthread_parkme+0x82/0x180 [ 17.292470] ? preempt_count_sub+0x50/0x80 [ 17.292494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.292526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.292557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.292589] kthread+0x337/0x6f0 [ 17.292609] ? trace_preempt_on+0x20/0xc0 [ 17.292633] ? __pfx_kthread+0x10/0x10 [ 17.292655] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.292676] ? calculate_sigpending+0x7b/0xa0 [ 17.292701] ? __pfx_kthread+0x10/0x10 [ 17.292723] ret_from_fork+0x116/0x1d0 [ 17.292742] ? __pfx_kthread+0x10/0x10 [ 17.292764] ret_from_fork_asm+0x1a/0x30 [ 17.292796] </TASK> [ 17.292808] [ 17.298768] Allocated by task 283: [ 17.298905] kasan_save_stack+0x45/0x70 [ 17.299103] kasan_save_track+0x18/0x40 [ 17.299240] kasan_save_alloc_info+0x3b/0x50 [ 17.299426] __kasan_kmalloc+0xb7/0xc0 [ 17.299539] __kmalloc_cache_noprof+0x189/0x420 [ 17.299781] kasan_atomics+0x95/0x310 [ 17.299901] kunit_try_run_case+0x1a5/0x480 [ 17.300086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.300308] kthread+0x337/0x6f0 [ 17.300476] ret_from_fork+0x116/0x1d0 [ 17.300630] ret_from_fork_asm+0x1a/0x30 [ 17.300800] [ 17.300855] The buggy address belongs to the object at ffff888102b6b880 [ 17.300855] which belongs to the cache kmalloc-64 of size 64 [ 17.301327] The buggy address is located 0 bytes to the right of [ 17.301327] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.301665] [ 17.301768] The buggy address belongs to the physical page: [ 17.301960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.302216] flags: 0x200000000000000(node=0|zone=2) [ 17.302412] page_type: f5(slab) [ 17.302590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.302761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.303098] page dumped because: kasan: bad access detected [ 17.303254] [ 17.303356] Memory state around the buggy address: [ 17.303580] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.303831] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.304031] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.304308] ^ [ 17.304516] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.304718] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.304866] ================================================================== [ 17.416613] ================================================================== [ 17.416894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.417140] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.417433] [ 17.417640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.417694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.417708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.417732] Call Trace: [ 17.417755] <TASK> [ 17.417773] dump_stack_lvl+0x73/0xb0 [ 17.417803] print_report+0xd1/0x650 [ 17.417827] ? __virt_addr_valid+0x1db/0x2d0 [ 17.417852] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.417875] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.417899] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.417941] kasan_report+0x141/0x180 [ 17.417967] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.417995] __asan_report_load8_noabort+0x18/0x20 [ 17.418017] kasan_atomics_helper+0x4eae/0x5450 [ 17.418042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.418084] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.418108] ? kasan_atomics+0x152/0x310 [ 17.418136] kasan_atomics+0x1dc/0x310 [ 17.418160] ? __pfx_kasan_atomics+0x10/0x10 [ 17.418186] ? __pfx_read_tsc+0x10/0x10 [ 17.418209] ? ktime_get_ts64+0x86/0x230 [ 17.418262] kunit_try_run_case+0x1a5/0x480 [ 17.418288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.418311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.418342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.418368] ? __kthread_parkme+0x82/0x180 [ 17.418410] ? preempt_count_sub+0x50/0x80 [ 17.418437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.418461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.418486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.418510] kthread+0x337/0x6f0 [ 17.418531] ? trace_preempt_on+0x20/0xc0 [ 17.418556] ? __pfx_kthread+0x10/0x10 [ 17.418597] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.418620] ? calculate_sigpending+0x7b/0xa0 [ 17.418664] ? __pfx_kthread+0x10/0x10 [ 17.418688] ret_from_fork+0x116/0x1d0 [ 17.418708] ? __pfx_kthread+0x10/0x10 [ 17.418729] ret_from_fork_asm+0x1a/0x30 [ 17.418763] </TASK> [ 17.418777] [ 17.424710] Allocated by task 283: [ 17.424892] kasan_save_stack+0x45/0x70 [ 17.425027] kasan_save_track+0x18/0x40 [ 17.425206] kasan_save_alloc_info+0x3b/0x50 [ 17.425403] __kasan_kmalloc+0xb7/0xc0 [ 17.425609] __kmalloc_cache_noprof+0x189/0x420 [ 17.425812] kasan_atomics+0x95/0x310 [ 17.425973] kunit_try_run_case+0x1a5/0x480 [ 17.426204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.426410] kthread+0x337/0x6f0 [ 17.426550] ret_from_fork+0x116/0x1d0 [ 17.426750] ret_from_fork_asm+0x1a/0x30 [ 17.426879] [ 17.426980] The buggy address belongs to the object at ffff888102b6b880 [ 17.426980] which belongs to the cache kmalloc-64 of size 64 [ 17.427345] The buggy address is located 0 bytes to the right of [ 17.427345] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.427757] [ 17.427871] The buggy address belongs to the physical page: [ 17.428090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.428348] flags: 0x200000000000000(node=0|zone=2) [ 17.428515] page_type: f5(slab) [ 17.428645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.428934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.429069] page dumped because: kasan: bad access detected [ 17.429172] [ 17.429232] Memory state around the buggy address: [ 17.429442] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.429757] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.430045] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.430366] ^ [ 17.430474] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430604] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430732] ================================================================== [ 17.824779] ================================================================== [ 17.825373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 17.826081] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.826228] [ 17.826382] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.826437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.826451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.826474] Call Trace: [ 17.826494] <TASK> [ 17.826511] dump_stack_lvl+0x73/0xb0 [ 17.826540] print_report+0xd1/0x650 [ 17.826566] ? __virt_addr_valid+0x1db/0x2d0 [ 17.826591] ? kasan_atomics_helper+0x218a/0x5450 [ 17.826615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.826639] ? kasan_atomics_helper+0x218a/0x5450 [ 17.826662] kasan_report+0x141/0x180 [ 17.826685] ? kasan_atomics_helper+0x218a/0x5450 [ 17.826714] kasan_check_range+0x10c/0x1c0 [ 17.826739] __kasan_check_write+0x18/0x20 [ 17.826801] kasan_atomics_helper+0x218a/0x5450 [ 17.826830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.826854] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.826876] ? kasan_atomics+0x152/0x310 [ 17.826906] kasan_atomics+0x1dc/0x310 [ 17.826958] ? __pfx_kasan_atomics+0x10/0x10 [ 17.826984] ? __pfx_read_tsc+0x10/0x10 [ 17.827007] ? ktime_get_ts64+0x86/0x230 [ 17.827032] kunit_try_run_case+0x1a5/0x480 [ 17.827085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.827135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.827160] ? __kthread_parkme+0x82/0x180 [ 17.827206] ? preempt_count_sub+0x50/0x80 [ 17.827244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.827294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.827319] kthread+0x337/0x6f0 [ 17.827368] ? trace_preempt_on+0x20/0xc0 [ 17.827395] ? __pfx_kthread+0x10/0x10 [ 17.827417] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.827439] ? calculate_sigpending+0x7b/0xa0 [ 17.827492] ? __pfx_kthread+0x10/0x10 [ 17.827518] ret_from_fork+0x116/0x1d0 [ 17.827539] ? __pfx_kthread+0x10/0x10 [ 17.827563] ret_from_fork_asm+0x1a/0x30 [ 17.827617] </TASK> [ 17.827633] [ 17.833366] Allocated by task 283: [ 17.833582] kasan_save_stack+0x45/0x70 [ 17.833822] kasan_save_track+0x18/0x40 [ 17.834073] kasan_save_alloc_info+0x3b/0x50 [ 17.834337] __kasan_kmalloc+0xb7/0xc0 [ 17.834433] __kmalloc_cache_noprof+0x189/0x420 [ 17.834533] kasan_atomics+0x95/0x310 [ 17.834621] kunit_try_run_case+0x1a5/0x480 [ 17.834713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.834819] kthread+0x337/0x6f0 [ 17.834897] ret_from_fork+0x116/0x1d0 [ 17.834982] ret_from_fork_asm+0x1a/0x30 [ 17.835069] [ 17.835121] The buggy address belongs to the object at ffff888102b6b880 [ 17.835121] which belongs to the cache kmalloc-64 of size 64 [ 17.835821] The buggy address is located 0 bytes to the right of [ 17.835821] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.836568] [ 17.836692] The buggy address belongs to the physical page: [ 17.837032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.837423] flags: 0x200000000000000(node=0|zone=2) [ 17.837531] page_type: f5(slab) [ 17.837618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.837754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.837884] page dumped because: kasan: bad access detected [ 17.837985] [ 17.838035] Memory state around the buggy address: [ 17.838132] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.838268] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.838404] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.838531] ^ [ 17.838629] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.838913] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.839289] ================================================================== [ 17.840294] ================================================================== [ 17.840721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 17.841166] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.841600] [ 17.841737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.841788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.841802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.841825] Call Trace: [ 17.841843] <TASK> [ 17.841858] dump_stack_lvl+0x73/0xb0 [ 17.841887] print_report+0xd1/0x650 [ 17.841911] ? __virt_addr_valid+0x1db/0x2d0 [ 17.841936] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.841960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.841984] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.842007] kasan_report+0x141/0x180 [ 17.842031] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.842059] __asan_report_load8_noabort+0x18/0x20 [ 17.842082] kasan_atomics_helper+0x4fa5/0x5450 [ 17.842106] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.842130] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.842153] ? kasan_atomics+0x152/0x310 [ 17.842180] kasan_atomics+0x1dc/0x310 [ 17.842204] ? __pfx_kasan_atomics+0x10/0x10 [ 17.842243] ? __pfx_read_tsc+0x10/0x10 [ 17.842266] ? ktime_get_ts64+0x86/0x230 [ 17.842292] kunit_try_run_case+0x1a5/0x480 [ 17.842317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.842347] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.842374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.842397] ? __kthread_parkme+0x82/0x180 [ 17.842420] ? preempt_count_sub+0x50/0x80 [ 17.842446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.842473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.842497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.842521] kthread+0x337/0x6f0 [ 17.842542] ? trace_preempt_on+0x20/0xc0 [ 17.842566] ? __pfx_kthread+0x10/0x10 [ 17.842590] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.842611] ? calculate_sigpending+0x7b/0xa0 [ 17.842636] ? __pfx_kthread+0x10/0x10 [ 17.842659] ret_from_fork+0x116/0x1d0 [ 17.842678] ? __pfx_kthread+0x10/0x10 [ 17.842699] ret_from_fork_asm+0x1a/0x30 [ 17.842758] </TASK> [ 17.842772] [ 17.848445] Allocated by task 283: [ 17.848677] kasan_save_stack+0x45/0x70 [ 17.848938] kasan_save_track+0x18/0x40 [ 17.849198] kasan_save_alloc_info+0x3b/0x50 [ 17.849354] __kasan_kmalloc+0xb7/0xc0 [ 17.849446] __kmalloc_cache_noprof+0x189/0x420 [ 17.849543] kasan_atomics+0x95/0x310 [ 17.849630] kunit_try_run_case+0x1a5/0x480 [ 17.849722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.849824] kthread+0x337/0x6f0 [ 17.849901] ret_from_fork+0x116/0x1d0 [ 17.850021] ret_from_fork_asm+0x1a/0x30 [ 17.850203] [ 17.850337] The buggy address belongs to the object at ffff888102b6b880 [ 17.850337] which belongs to the cache kmalloc-64 of size 64 [ 17.851057] The buggy address is located 0 bytes to the right of [ 17.851057] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.851571] [ 17.851698] The buggy address belongs to the physical page: [ 17.851876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.852099] flags: 0x200000000000000(node=0|zone=2) [ 17.852381] page_type: f5(slab) [ 17.852469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.852749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.852878] page dumped because: kasan: bad access detected [ 17.852977] [ 17.853028] Memory state around the buggy address: [ 17.853122] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.853255] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.853379] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.853497] ^ [ 17.853589] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.853709] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.853827] ================================================================== [ 17.626681] ================================================================== [ 17.627025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.627425] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.627743] [ 17.627872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.627926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.627941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.627964] Call Trace: [ 17.627999] <TASK> [ 17.628021] dump_stack_lvl+0x73/0xb0 [ 17.628049] print_report+0xd1/0x650 [ 17.628074] ? __virt_addr_valid+0x1db/0x2d0 [ 17.628099] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.628140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.628165] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.628189] kasan_report+0x141/0x180 [ 17.628213] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.628253] kasan_check_range+0x10c/0x1c0 [ 17.628298] __kasan_check_write+0x18/0x20 [ 17.628320] kasan_atomics_helper+0x1b22/0x5450 [ 17.628345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.628369] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.628391] ? kasan_atomics+0x152/0x310 [ 17.628436] kasan_atomics+0x1dc/0x310 [ 17.628462] ? __pfx_kasan_atomics+0x10/0x10 [ 17.628489] ? __pfx_read_tsc+0x10/0x10 [ 17.628511] ? ktime_get_ts64+0x86/0x230 [ 17.628536] kunit_try_run_case+0x1a5/0x480 [ 17.628561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.628585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.628610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.628633] ? __kthread_parkme+0x82/0x180 [ 17.628654] ? preempt_count_sub+0x50/0x80 [ 17.628679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.628703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.628726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.628766] kthread+0x337/0x6f0 [ 17.628792] ? trace_preempt_on+0x20/0xc0 [ 17.628817] ? __pfx_kthread+0x10/0x10 [ 17.628840] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.628862] ? calculate_sigpending+0x7b/0xa0 [ 17.628887] ? __pfx_kthread+0x10/0x10 [ 17.628928] ret_from_fork+0x116/0x1d0 [ 17.628949] ? __pfx_kthread+0x10/0x10 [ 17.628971] ret_from_fork_asm+0x1a/0x30 [ 17.629005] </TASK> [ 17.629018] [ 17.634992] Allocated by task 283: [ 17.635141] kasan_save_stack+0x45/0x70 [ 17.635309] kasan_save_track+0x18/0x40 [ 17.635414] kasan_save_alloc_info+0x3b/0x50 [ 17.635616] __kasan_kmalloc+0xb7/0xc0 [ 17.635790] __kmalloc_cache_noprof+0x189/0x420 [ 17.635915] kasan_atomics+0x95/0x310 [ 17.636101] kunit_try_run_case+0x1a5/0x480 [ 17.636248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.636461] kthread+0x337/0x6f0 [ 17.636640] ret_from_fork+0x116/0x1d0 [ 17.636791] ret_from_fork_asm+0x1a/0x30 [ 17.637010] [ 17.637080] The buggy address belongs to the object at ffff888102b6b880 [ 17.637080] which belongs to the cache kmalloc-64 of size 64 [ 17.637450] The buggy address is located 0 bytes to the right of [ 17.637450] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.637842] [ 17.637938] The buggy address belongs to the physical page: [ 17.638171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.638438] flags: 0x200000000000000(node=0|zone=2) [ 17.638605] page_type: f5(slab) [ 17.638764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.638932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.639094] page dumped because: kasan: bad access detected [ 17.639230] [ 17.639305] Memory state around the buggy address: [ 17.639429] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.639591] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.639750] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.639898] ^ [ 17.640019] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640178] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640549] ================================================================== [ 17.562190] ================================================================== [ 17.562402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.563551] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.563785] [ 17.563930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.563994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.564009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.564034] Call Trace: [ 17.564055] <TASK> [ 17.564073] dump_stack_lvl+0x73/0xb0 [ 17.564104] print_report+0xd1/0x650 [ 17.564128] ? __virt_addr_valid+0x1db/0x2d0 [ 17.564153] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.564176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.564200] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.564272] kasan_report+0x141/0x180 [ 17.564299] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.564327] kasan_check_range+0x10c/0x1c0 [ 17.564354] __kasan_check_write+0x18/0x20 [ 17.564374] kasan_atomics_helper+0x18b1/0x5450 [ 17.564399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.564422] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.564443] ? kasan_atomics+0x152/0x310 [ 17.564471] kasan_atomics+0x1dc/0x310 [ 17.564496] ? __pfx_kasan_atomics+0x10/0x10 [ 17.564521] ? __pfx_read_tsc+0x10/0x10 [ 17.564544] ? ktime_get_ts64+0x86/0x230 [ 17.564570] kunit_try_run_case+0x1a5/0x480 [ 17.564596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.564642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.564666] ? __kthread_parkme+0x82/0x180 [ 17.564687] ? preempt_count_sub+0x50/0x80 [ 17.564710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.564757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.564794] kthread+0x337/0x6f0 [ 17.564816] ? trace_preempt_on+0x20/0xc0 [ 17.564840] ? __pfx_kthread+0x10/0x10 [ 17.564878] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.564900] ? calculate_sigpending+0x7b/0xa0 [ 17.564926] ? __pfx_kthread+0x10/0x10 [ 17.564949] ret_from_fork+0x116/0x1d0 [ 17.564969] ? __pfx_kthread+0x10/0x10 [ 17.564991] ret_from_fork_asm+0x1a/0x30 [ 17.565024] </TASK> [ 17.565036] [ 17.571131] Allocated by task 283: [ 17.571217] kasan_save_stack+0x45/0x70 [ 17.571440] kasan_save_track+0x18/0x40 [ 17.571693] kasan_save_alloc_info+0x3b/0x50 [ 17.571964] __kasan_kmalloc+0xb7/0xc0 [ 17.572056] __kmalloc_cache_noprof+0x189/0x420 [ 17.572153] kasan_atomics+0x95/0x310 [ 17.572406] kunit_try_run_case+0x1a5/0x480 [ 17.572644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.572853] kthread+0x337/0x6f0 [ 17.573063] ret_from_fork+0x116/0x1d0 [ 17.573197] ret_from_fork_asm+0x1a/0x30 [ 17.573416] [ 17.573499] The buggy address belongs to the object at ffff888102b6b880 [ 17.573499] which belongs to the cache kmalloc-64 of size 64 [ 17.573912] The buggy address is located 0 bytes to the right of [ 17.573912] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.574296] [ 17.574438] The buggy address belongs to the physical page: [ 17.574549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.574894] flags: 0x200000000000000(node=0|zone=2) [ 17.575065] page_type: f5(slab) [ 17.575274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.575525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.575683] page dumped because: kasan: bad access detected [ 17.575785] [ 17.575836] Memory state around the buggy address: [ 17.575932] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.576053] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.576176] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.576305] ^ [ 17.576401] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.576523] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.576643] ================================================================== [ 17.305773] ================================================================== [ 17.306111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 17.306462] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.306766] [ 17.306888] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.306941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.306955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.306978] Call Trace: [ 17.306996] <TASK> [ 17.307014] dump_stack_lvl+0x73/0xb0 [ 17.307041] print_report+0xd1/0x650 [ 17.307064] ? __virt_addr_valid+0x1db/0x2d0 [ 17.307089] ? kasan_atomics_helper+0x1148/0x5450 [ 17.307111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.307135] ? kasan_atomics_helper+0x1148/0x5450 [ 17.307157] kasan_report+0x141/0x180 [ 17.307180] ? kasan_atomics_helper+0x1148/0x5450 [ 17.307207] kasan_check_range+0x10c/0x1c0 [ 17.307243] __kasan_check_write+0x18/0x20 [ 17.307266] kasan_atomics_helper+0x1148/0x5450 [ 17.307289] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.307313] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.307335] ? kasan_atomics+0x152/0x310 [ 17.307363] kasan_atomics+0x1dc/0x310 [ 17.307387] ? __pfx_kasan_atomics+0x10/0x10 [ 17.307411] ? __pfx_read_tsc+0x10/0x10 [ 17.307433] ? ktime_get_ts64+0x86/0x230 [ 17.307476] kunit_try_run_case+0x1a5/0x480 [ 17.307529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.307577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.307604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.307642] ? __kthread_parkme+0x82/0x180 [ 17.307668] ? preempt_count_sub+0x50/0x80 [ 17.307704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.307729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.307753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.307788] kthread+0x337/0x6f0 [ 17.307817] ? trace_preempt_on+0x20/0xc0 [ 17.307843] ? __pfx_kthread+0x10/0x10 [ 17.307864] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.307888] ? calculate_sigpending+0x7b/0xa0 [ 17.307914] ? __pfx_kthread+0x10/0x10 [ 17.307938] ret_from_fork+0x116/0x1d0 [ 17.307973] ? __pfx_kthread+0x10/0x10 [ 17.307997] ret_from_fork_asm+0x1a/0x30 [ 17.308029] </TASK> [ 17.308041] [ 17.314063] Allocated by task 283: [ 17.314212] kasan_save_stack+0x45/0x70 [ 17.314400] kasan_save_track+0x18/0x40 [ 17.314597] kasan_save_alloc_info+0x3b/0x50 [ 17.314831] __kasan_kmalloc+0xb7/0xc0 [ 17.314976] __kmalloc_cache_noprof+0x189/0x420 [ 17.315141] kasan_atomics+0x95/0x310 [ 17.315315] kunit_try_run_case+0x1a5/0x480 [ 17.315466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.315653] kthread+0x337/0x6f0 [ 17.315786] ret_from_fork+0x116/0x1d0 [ 17.315933] ret_from_fork_asm+0x1a/0x30 [ 17.316120] [ 17.316197] The buggy address belongs to the object at ffff888102b6b880 [ 17.316197] which belongs to the cache kmalloc-64 of size 64 [ 17.316461] The buggy address is located 0 bytes to the right of [ 17.316461] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.316733] [ 17.316812] The buggy address belongs to the physical page: [ 17.316946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.317312] flags: 0x200000000000000(node=0|zone=2) [ 17.317546] page_type: f5(slab) [ 17.317717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.318038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.318366] page dumped because: kasan: bad access detected [ 17.318612] [ 17.318737] Memory state around the buggy address: [ 17.318962] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.319255] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.319499] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.319626] ^ [ 17.319723] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.319863] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.320243] ================================================================== [ 17.793887] ================================================================== [ 17.794603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 17.794866] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.795067] [ 17.795164] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.795237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.795254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.795280] Call Trace: [ 17.795305] <TASK> [ 17.795329] dump_stack_lvl+0x73/0xb0 [ 17.795360] print_report+0xd1/0x650 [ 17.795387] ? __virt_addr_valid+0x1db/0x2d0 [ 17.795413] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.795437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.795461] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.795485] kasan_report+0x141/0x180 [ 17.795508] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.795535] kasan_check_range+0x10c/0x1c0 [ 17.795561] __kasan_check_write+0x18/0x20 [ 17.795581] kasan_atomics_helper+0x20c8/0x5450 [ 17.795605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.795628] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.795650] ? kasan_atomics+0x152/0x310 [ 17.795678] kasan_atomics+0x1dc/0x310 [ 17.795702] ? __pfx_kasan_atomics+0x10/0x10 [ 17.795728] ? __pfx_read_tsc+0x10/0x10 [ 17.795749] ? ktime_get_ts64+0x86/0x230 [ 17.795774] kunit_try_run_case+0x1a5/0x480 [ 17.795800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.795823] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.795848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.795872] ? __kthread_parkme+0x82/0x180 [ 17.795894] ? preempt_count_sub+0x50/0x80 [ 17.795919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.795943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.795965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.795989] kthread+0x337/0x6f0 [ 17.796010] ? trace_preempt_on+0x20/0xc0 [ 17.796033] ? __pfx_kthread+0x10/0x10 [ 17.796055] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.796077] ? calculate_sigpending+0x7b/0xa0 [ 17.796102] ? __pfx_kthread+0x10/0x10 [ 17.796125] ret_from_fork+0x116/0x1d0 [ 17.796143] ? __pfx_kthread+0x10/0x10 [ 17.796165] ret_from_fork_asm+0x1a/0x30 [ 17.796198] </TASK> [ 17.796209] [ 17.801747] Allocated by task 283: [ 17.801847] kasan_save_stack+0x45/0x70 [ 17.801942] kasan_save_track+0x18/0x40 [ 17.802030] kasan_save_alloc_info+0x3b/0x50 [ 17.802121] __kasan_kmalloc+0xb7/0xc0 [ 17.802206] __kmalloc_cache_noprof+0x189/0x420 [ 17.802434] kasan_atomics+0x95/0x310 [ 17.802678] kunit_try_run_case+0x1a5/0x480 [ 17.802947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.803277] kthread+0x337/0x6f0 [ 17.803491] ret_from_fork+0x116/0x1d0 [ 17.803738] ret_from_fork_asm+0x1a/0x30 [ 17.804009] [ 17.804140] The buggy address belongs to the object at ffff888102b6b880 [ 17.804140] which belongs to the cache kmalloc-64 of size 64 [ 17.804439] The buggy address is located 0 bytes to the right of [ 17.804439] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.804856] [ 17.804969] The buggy address belongs to the physical page: [ 17.805161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.805400] flags: 0x200000000000000(node=0|zone=2) [ 17.805603] page_type: f5(slab) [ 17.805779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.805976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.806255] page dumped because: kasan: bad access detected [ 17.806399] [ 17.806502] Memory state around the buggy address: [ 17.806684] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.806937] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.807198] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.807340] ^ [ 17.807445] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.807576] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.807703] ================================================================== [ 17.854553] ================================================================== [ 17.855534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.856022] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.856473] [ 17.856617] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.856668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.856682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.856704] Call Trace: [ 17.856722] <TASK> [ 17.856738] dump_stack_lvl+0x73/0xb0 [ 17.856766] print_report+0xd1/0x650 [ 17.856790] ? __virt_addr_valid+0x1db/0x2d0 [ 17.856815] ? kasan_atomics_helper+0x224c/0x5450 [ 17.856838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.856862] ? kasan_atomics_helper+0x224c/0x5450 [ 17.856885] kasan_report+0x141/0x180 [ 17.856909] ? kasan_atomics_helper+0x224c/0x5450 [ 17.856937] kasan_check_range+0x10c/0x1c0 [ 17.856963] __kasan_check_write+0x18/0x20 [ 17.856984] kasan_atomics_helper+0x224c/0x5450 [ 17.857008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.857031] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.857057] ? kasan_atomics+0x152/0x310 [ 17.857084] kasan_atomics+0x1dc/0x310 [ 17.857109] ? __pfx_kasan_atomics+0x10/0x10 [ 17.857134] ? __pfx_read_tsc+0x10/0x10 [ 17.857156] ? ktime_get_ts64+0x86/0x230 [ 17.857210] kunit_try_run_case+0x1a5/0x480 [ 17.857247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.857270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.857295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.857319] ? __kthread_parkme+0x82/0x180 [ 17.857361] ? preempt_count_sub+0x50/0x80 [ 17.857387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.857412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.857437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.857462] kthread+0x337/0x6f0 [ 17.857502] ? trace_preempt_on+0x20/0xc0 [ 17.857528] ? __pfx_kthread+0x10/0x10 [ 17.857549] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.857572] ? calculate_sigpending+0x7b/0xa0 [ 17.857597] ? __pfx_kthread+0x10/0x10 [ 17.857619] ret_from_fork+0x116/0x1d0 [ 17.857639] ? __pfx_kthread+0x10/0x10 [ 17.857660] ret_from_fork_asm+0x1a/0x30 [ 17.857692] </TASK> [ 17.857704] [ 17.863744] Allocated by task 283: [ 17.863975] kasan_save_stack+0x45/0x70 [ 17.864248] kasan_save_track+0x18/0x40 [ 17.864503] kasan_save_alloc_info+0x3b/0x50 [ 17.864597] __kasan_kmalloc+0xb7/0xc0 [ 17.864684] __kmalloc_cache_noprof+0x189/0x420 [ 17.864778] kasan_atomics+0x95/0x310 [ 17.864881] kunit_try_run_case+0x1a5/0x480 [ 17.865152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.865501] kthread+0x337/0x6f0 [ 17.865731] ret_from_fork+0x116/0x1d0 [ 17.865856] ret_from_fork_asm+0x1a/0x30 [ 17.865947] [ 17.865999] The buggy address belongs to the object at ffff888102b6b880 [ 17.865999] which belongs to the cache kmalloc-64 of size 64 [ 17.866189] The buggy address is located 0 bytes to the right of [ 17.866189] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.866931] [ 17.867049] The buggy address belongs to the physical page: [ 17.867325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.867477] flags: 0x200000000000000(node=0|zone=2) [ 17.867588] page_type: f5(slab) [ 17.867681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.867819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.867953] page dumped because: kasan: bad access detected [ 17.868053] [ 17.868174] Memory state around the buggy address: [ 17.868466] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.868896] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.869292] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.869698] ^ [ 17.869968] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870347] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870519] ================================================================== [ 17.321128] ================================================================== [ 17.321573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 17.321714] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.321843] [ 17.321966] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.322036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.322050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.322089] Call Trace: [ 17.322107] <TASK> [ 17.322139] dump_stack_lvl+0x73/0xb0 [ 17.322168] print_report+0xd1/0x650 [ 17.322191] ? __virt_addr_valid+0x1db/0x2d0 [ 17.322216] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.322252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.322293] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.322319] kasan_report+0x141/0x180 [ 17.322349] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.322379] __asan_report_load4_noabort+0x18/0x20 [ 17.322401] kasan_atomics_helper+0x4a02/0x5450 [ 17.322446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.322471] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.322493] ? kasan_atomics+0x152/0x310 [ 17.322522] kasan_atomics+0x1dc/0x310 [ 17.322546] ? __pfx_kasan_atomics+0x10/0x10 [ 17.322572] ? __pfx_read_tsc+0x10/0x10 [ 17.322593] ? ktime_get_ts64+0x86/0x230 [ 17.322618] kunit_try_run_case+0x1a5/0x480 [ 17.322643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.322665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.322688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.322712] ? __kthread_parkme+0x82/0x180 [ 17.322733] ? preempt_count_sub+0x50/0x80 [ 17.322758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.322781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.322805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.322828] kthread+0x337/0x6f0 [ 17.322850] ? trace_preempt_on+0x20/0xc0 [ 17.322874] ? __pfx_kthread+0x10/0x10 [ 17.322897] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.322918] ? calculate_sigpending+0x7b/0xa0 [ 17.322943] ? __pfx_kthread+0x10/0x10 [ 17.322966] ret_from_fork+0x116/0x1d0 [ 17.322985] ? __pfx_kthread+0x10/0x10 [ 17.323007] ret_from_fork_asm+0x1a/0x30 [ 17.323039] </TASK> [ 17.323052] [ 17.329011] Allocated by task 283: [ 17.329126] kasan_save_stack+0x45/0x70 [ 17.329264] kasan_save_track+0x18/0x40 [ 17.329386] kasan_save_alloc_info+0x3b/0x50 [ 17.329507] __kasan_kmalloc+0xb7/0xc0 [ 17.329614] __kmalloc_cache_noprof+0x189/0x420 [ 17.329747] kasan_atomics+0x95/0x310 [ 17.329854] kunit_try_run_case+0x1a5/0x480 [ 17.329976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.330119] kthread+0x337/0x6f0 [ 17.330310] ret_from_fork+0x116/0x1d0 [ 17.330527] ret_from_fork_asm+0x1a/0x30 [ 17.330809] [ 17.330944] The buggy address belongs to the object at ffff888102b6b880 [ 17.330944] which belongs to the cache kmalloc-64 of size 64 [ 17.331629] The buggy address is located 0 bytes to the right of [ 17.331629] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.332348] [ 17.332474] The buggy address belongs to the physical page: [ 17.332800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.332953] flags: 0x200000000000000(node=0|zone=2) [ 17.333058] page_type: f5(slab) [ 17.333145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.333288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.333421] page dumped because: kasan: bad access detected [ 17.333524] [ 17.333574] Memory state around the buggy address: [ 17.333720] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.334033] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.334352] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.334648] ^ [ 17.334870] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.335164] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.335464] ================================================================== [ 16.998896] ================================================================== [ 16.999141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.999591] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.000027] [ 17.000169] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.000235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.000250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.000276] Call Trace: [ 17.000296] <TASK> [ 17.000316] dump_stack_lvl+0x73/0xb0 [ 17.000349] print_report+0xd1/0x650 [ 17.000373] ? __virt_addr_valid+0x1db/0x2d0 [ 17.000397] ? kasan_atomics_helper+0x72f/0x5450 [ 17.000420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.000444] ? kasan_atomics_helper+0x72f/0x5450 [ 17.000467] kasan_report+0x141/0x180 [ 17.000491] ? kasan_atomics_helper+0x72f/0x5450 [ 17.000519] kasan_check_range+0x10c/0x1c0 [ 17.000544] __kasan_check_write+0x18/0x20 [ 17.000565] kasan_atomics_helper+0x72f/0x5450 [ 17.000590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.000615] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.000638] ? kasan_atomics+0x152/0x310 [ 17.000666] kasan_atomics+0x1dc/0x310 [ 17.000690] ? __pfx_kasan_atomics+0x10/0x10 [ 17.000716] ? __pfx_read_tsc+0x10/0x10 [ 17.000738] ? ktime_get_ts64+0x86/0x230 [ 17.000764] kunit_try_run_case+0x1a5/0x480 [ 17.000789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.000895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.000920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.000945] ? __kthread_parkme+0x82/0x180 [ 17.000967] ? preempt_count_sub+0x50/0x80 [ 17.000991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.001015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.001037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.001060] kthread+0x337/0x6f0 [ 17.001081] ? trace_preempt_on+0x20/0xc0 [ 17.001106] ? __pfx_kthread+0x10/0x10 [ 17.001127] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.001277] ? calculate_sigpending+0x7b/0xa0 [ 17.001316] ? __pfx_kthread+0x10/0x10 [ 17.001343] ret_from_fork+0x116/0x1d0 [ 17.001369] ? __pfx_kthread+0x10/0x10 [ 17.001391] ret_from_fork_asm+0x1a/0x30 [ 17.001423] </TASK> [ 17.001436] [ 17.007672] Allocated by task 283: [ 17.007803] kasan_save_stack+0x45/0x70 [ 17.008011] kasan_save_track+0x18/0x40 [ 17.008187] kasan_save_alloc_info+0x3b/0x50 [ 17.008334] __kasan_kmalloc+0xb7/0xc0 [ 17.008596] __kmalloc_cache_noprof+0x189/0x420 [ 17.008779] kasan_atomics+0x95/0x310 [ 17.008980] kunit_try_run_case+0x1a5/0x480 [ 17.009130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.009359] kthread+0x337/0x6f0 [ 17.009827] ret_from_fork+0x116/0x1d0 [ 17.009953] ret_from_fork_asm+0x1a/0x30 [ 17.010109] [ 17.010213] The buggy address belongs to the object at ffff888102b6b880 [ 17.010213] which belongs to the cache kmalloc-64 of size 64 [ 17.010606] The buggy address is located 0 bytes to the right of [ 17.010606] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.010959] [ 17.011084] The buggy address belongs to the physical page: [ 17.011302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.011617] flags: 0x200000000000000(node=0|zone=2) [ 17.011721] page_type: f5(slab) [ 17.011807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.011938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.012065] page dumped because: kasan: bad access detected [ 17.012162] [ 17.012210] Memory state around the buggy address: [ 17.012423] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.012766] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.013050] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.013345] ^ [ 17.013611] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.013897] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.014174] ================================================================== [ 17.683829] ================================================================== [ 17.684145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.684485] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.684677] [ 17.684751] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.684802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.684816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.684840] Call Trace: [ 17.684861] <TASK> [ 17.684881] dump_stack_lvl+0x73/0xb0 [ 17.684910] print_report+0xd1/0x650 [ 17.684933] ? __virt_addr_valid+0x1db/0x2d0 [ 17.684957] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.684979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.685002] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.685025] kasan_report+0x141/0x180 [ 17.685049] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.685076] kasan_check_range+0x10c/0x1c0 [ 17.685100] __kasan_check_write+0x18/0x20 [ 17.685121] kasan_atomics_helper+0x1d7a/0x5450 [ 17.685145] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.685168] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.685189] ? kasan_atomics+0x152/0x310 [ 17.685216] kasan_atomics+0x1dc/0x310 [ 17.685251] ? __pfx_kasan_atomics+0x10/0x10 [ 17.685277] ? __pfx_read_tsc+0x10/0x10 [ 17.685299] ? ktime_get_ts64+0x86/0x230 [ 17.685324] kunit_try_run_case+0x1a5/0x480 [ 17.685348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.685370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.685394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.685417] ? __kthread_parkme+0x82/0x180 [ 17.685438] ? preempt_count_sub+0x50/0x80 [ 17.685462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.685486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.685510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.685533] kthread+0x337/0x6f0 [ 17.685553] ? trace_preempt_on+0x20/0xc0 [ 17.685577] ? __pfx_kthread+0x10/0x10 [ 17.685598] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.685619] ? calculate_sigpending+0x7b/0xa0 [ 17.685643] ? __pfx_kthread+0x10/0x10 [ 17.685665] ret_from_fork+0x116/0x1d0 [ 17.685684] ? __pfx_kthread+0x10/0x10 [ 17.685705] ret_from_fork_asm+0x1a/0x30 [ 17.685737] </TASK> [ 17.685749] [ 17.691037] Allocated by task 283: [ 17.691126] kasan_save_stack+0x45/0x70 [ 17.691219] kasan_save_track+0x18/0x40 [ 17.691427] kasan_save_alloc_info+0x3b/0x50 [ 17.691626] __kasan_kmalloc+0xb7/0xc0 [ 17.691797] __kmalloc_cache_noprof+0x189/0x420 [ 17.691997] kasan_atomics+0x95/0x310 [ 17.692169] kunit_try_run_case+0x1a5/0x480 [ 17.692363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.692589] kthread+0x337/0x6f0 [ 17.692744] ret_from_fork+0x116/0x1d0 [ 17.692918] ret_from_fork_asm+0x1a/0x30 [ 17.693104] [ 17.693213] The buggy address belongs to the object at ffff888102b6b880 [ 17.693213] which belongs to the cache kmalloc-64 of size 64 [ 17.693677] The buggy address is located 0 bytes to the right of [ 17.693677] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.694124] [ 17.694184] The buggy address belongs to the physical page: [ 17.694304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.694463] flags: 0x200000000000000(node=0|zone=2) [ 17.694575] page_type: f5(slab) [ 17.694738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.695047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.695335] page dumped because: kasan: bad access detected [ 17.695560] [ 17.695655] Memory state around the buggy address: [ 17.695861] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.696111] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.696361] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.696580] ^ [ 17.696745] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.696976] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.697212] ================================================================== [ 17.381097] ================================================================== [ 17.381266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 17.382112] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.382530] [ 17.382657] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.382715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.382730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.382755] Call Trace: [ 17.382775] <TASK> [ 17.382793] dump_stack_lvl+0x73/0xb0 [ 17.382833] print_report+0xd1/0x650 [ 17.382859] ? __virt_addr_valid+0x1db/0x2d0 [ 17.382886] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.382910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.382935] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.382961] kasan_report+0x141/0x180 [ 17.382985] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.383013] __asan_report_load4_noabort+0x18/0x20 [ 17.383036] kasan_atomics_helper+0x49ce/0x5450 [ 17.383061] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.383087] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.383110] ? kasan_atomics+0x152/0x310 [ 17.383139] kasan_atomics+0x1dc/0x310 [ 17.383165] ? __pfx_kasan_atomics+0x10/0x10 [ 17.383192] ? __pfx_read_tsc+0x10/0x10 [ 17.383215] ? ktime_get_ts64+0x86/0x230 [ 17.383255] kunit_try_run_case+0x1a5/0x480 [ 17.383281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.383305] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.383330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.383353] ? __kthread_parkme+0x82/0x180 [ 17.383376] ? preempt_count_sub+0x50/0x80 [ 17.383403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.383427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.383452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.383476] kthread+0x337/0x6f0 [ 17.383496] ? trace_preempt_on+0x20/0xc0 [ 17.383520] ? __pfx_kthread+0x10/0x10 [ 17.383542] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.383563] ? calculate_sigpending+0x7b/0xa0 [ 17.383588] ? __pfx_kthread+0x10/0x10 [ 17.383611] ret_from_fork+0x116/0x1d0 [ 17.383629] ? __pfx_kthread+0x10/0x10 [ 17.383651] ret_from_fork_asm+0x1a/0x30 [ 17.383683] </TASK> [ 17.383695] [ 17.389501] Allocated by task 283: [ 17.389716] kasan_save_stack+0x45/0x70 [ 17.389925] kasan_save_track+0x18/0x40 [ 17.390118] kasan_save_alloc_info+0x3b/0x50 [ 17.390380] __kasan_kmalloc+0xb7/0xc0 [ 17.390582] __kmalloc_cache_noprof+0x189/0x420 [ 17.390802] kasan_atomics+0x95/0x310 [ 17.390985] kunit_try_run_case+0x1a5/0x480 [ 17.391186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.391440] kthread+0x337/0x6f0 [ 17.391611] ret_from_fork+0x116/0x1d0 [ 17.391789] ret_from_fork_asm+0x1a/0x30 [ 17.391977] [ 17.392071] The buggy address belongs to the object at ffff888102b6b880 [ 17.392071] which belongs to the cache kmalloc-64 of size 64 [ 17.392734] The buggy address is located 0 bytes to the right of [ 17.392734] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.393330] [ 17.393501] The buggy address belongs to the physical page: [ 17.393820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.394158] flags: 0x200000000000000(node=0|zone=2) [ 17.394482] page_type: f5(slab) [ 17.394679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.395045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.395251] page dumped because: kasan: bad access detected [ 17.395361] [ 17.395418] Memory state around the buggy address: [ 17.395667] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.396091] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.396318] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.396678] ^ [ 17.396925] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.397236] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.397630] ================================================================== [ 17.577126] ================================================================== [ 17.577988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.578470] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.578947] [ 17.579100] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.579154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.579167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.579192] Call Trace: [ 17.579211] <TASK> [ 17.579237] dump_stack_lvl+0x73/0xb0 [ 17.579267] print_report+0xd1/0x650 [ 17.579292] ? __virt_addr_valid+0x1db/0x2d0 [ 17.579319] ? kasan_atomics_helper+0x194a/0x5450 [ 17.579342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.579367] ? kasan_atomics_helper+0x194a/0x5450 [ 17.579391] kasan_report+0x141/0x180 [ 17.579416] ? kasan_atomics_helper+0x194a/0x5450 [ 17.579446] kasan_check_range+0x10c/0x1c0 [ 17.579472] __kasan_check_write+0x18/0x20 [ 17.579494] kasan_atomics_helper+0x194a/0x5450 [ 17.579520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.579545] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.579567] ? kasan_atomics+0x152/0x310 [ 17.579595] kasan_atomics+0x1dc/0x310 [ 17.579619] ? __pfx_kasan_atomics+0x10/0x10 [ 17.579645] ? __pfx_read_tsc+0x10/0x10 [ 17.579668] ? ktime_get_ts64+0x86/0x230 [ 17.579692] kunit_try_run_case+0x1a5/0x480 [ 17.579717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.579740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.579763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.579786] ? __kthread_parkme+0x82/0x180 [ 17.579807] ? preempt_count_sub+0x50/0x80 [ 17.579832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.579856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.579902] kthread+0x337/0x6f0 [ 17.579922] ? trace_preempt_on+0x20/0xc0 [ 17.579947] ? __pfx_kthread+0x10/0x10 [ 17.579968] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.579990] ? calculate_sigpending+0x7b/0xa0 [ 17.580014] ? __pfx_kthread+0x10/0x10 [ 17.580037] ret_from_fork+0x116/0x1d0 [ 17.580075] ? __pfx_kthread+0x10/0x10 [ 17.580098] ret_from_fork_asm+0x1a/0x30 [ 17.580142] </TASK> [ 17.580156] [ 17.586833] Allocated by task 283: [ 17.587093] kasan_save_stack+0x45/0x70 [ 17.587261] kasan_save_track+0x18/0x40 [ 17.587358] kasan_save_alloc_info+0x3b/0x50 [ 17.587458] __kasan_kmalloc+0xb7/0xc0 [ 17.587550] __kmalloc_cache_noprof+0x189/0x420 [ 17.587649] kasan_atomics+0x95/0x310 [ 17.587736] kunit_try_run_case+0x1a5/0x480 [ 17.587828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.587935] kthread+0x337/0x6f0 [ 17.588015] ret_from_fork+0x116/0x1d0 [ 17.588097] ret_from_fork_asm+0x1a/0x30 [ 17.588185] [ 17.588249] The buggy address belongs to the object at ffff888102b6b880 [ 17.588249] which belongs to the cache kmalloc-64 of size 64 [ 17.588447] The buggy address is located 0 bytes to the right of [ 17.588447] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.588853] [ 17.588979] The buggy address belongs to the physical page: [ 17.589319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.589808] flags: 0x200000000000000(node=0|zone=2) [ 17.590118] page_type: f5(slab) [ 17.590351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.590813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.591271] page dumped because: kasan: bad access detected [ 17.591615] [ 17.591724] Memory state around the buggy address: [ 17.591823] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.591948] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.592071] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.592189] ^ [ 17.592292] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.592416] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.592535] ================================================================== [ 17.755156] ================================================================== [ 17.755438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 17.755777] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.756065] [ 17.756178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.756242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.756256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.756277] Call Trace: [ 17.756301] <TASK> [ 17.756316] dump_stack_lvl+0x73/0xb0 [ 17.756351] print_report+0xd1/0x650 [ 17.756375] ? __virt_addr_valid+0x1db/0x2d0 [ 17.756406] ? kasan_atomics_helper+0x2006/0x5450 [ 17.756437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.756468] ? kasan_atomics_helper+0x2006/0x5450 [ 17.756491] kasan_report+0x141/0x180 [ 17.756522] ? kasan_atomics_helper+0x2006/0x5450 [ 17.756558] kasan_check_range+0x10c/0x1c0 [ 17.756591] __kasan_check_write+0x18/0x20 [ 17.756612] kasan_atomics_helper+0x2006/0x5450 [ 17.756643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.756675] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.756697] ? kasan_atomics+0x152/0x310 [ 17.756733] kasan_atomics+0x1dc/0x310 [ 17.756765] ? __pfx_kasan_atomics+0x10/0x10 [ 17.756798] ? __pfx_read_tsc+0x10/0x10 [ 17.756827] ? ktime_get_ts64+0x86/0x230 [ 17.756851] kunit_try_run_case+0x1a5/0x480 [ 17.756884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.756916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.756946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.756969] ? __kthread_parkme+0x82/0x180 [ 17.756998] ? preempt_count_sub+0x50/0x80 [ 17.757030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.757053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.757084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.757116] kthread+0x337/0x6f0 [ 17.757136] ? trace_preempt_on+0x20/0xc0 [ 17.757169] ? __pfx_kthread+0x10/0x10 [ 17.757199] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.757237] ? calculate_sigpending+0x7b/0xa0 [ 17.757266] ? __pfx_kthread+0x10/0x10 [ 17.757298] ret_from_fork+0x116/0x1d0 [ 17.757328] ? __pfx_kthread+0x10/0x10 [ 17.757351] ret_from_fork_asm+0x1a/0x30 [ 17.757394] </TASK> [ 17.757415] [ 17.762427] Allocated by task 283: [ 17.762653] kasan_save_stack+0x45/0x70 [ 17.762857] kasan_save_track+0x18/0x40 [ 17.763033] kasan_save_alloc_info+0x3b/0x50 [ 17.763300] __kasan_kmalloc+0xb7/0xc0 [ 17.763499] __kmalloc_cache_noprof+0x189/0x420 [ 17.763688] kasan_atomics+0x95/0x310 [ 17.763875] kunit_try_run_case+0x1a5/0x480 [ 17.764054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.764392] kthread+0x337/0x6f0 [ 17.764505] ret_from_fork+0x116/0x1d0 [ 17.764595] ret_from_fork_asm+0x1a/0x30 [ 17.764799] [ 17.764907] The buggy address belongs to the object at ffff888102b6b880 [ 17.764907] which belongs to the cache kmalloc-64 of size 64 [ 17.766378] The buggy address is located 0 bytes to the right of [ 17.766378] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.767150] [ 17.767324] The buggy address belongs to the physical page: [ 17.767584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.767905] flags: 0x200000000000000(node=0|zone=2) [ 17.768137] page_type: f5(slab) [ 17.769472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.769641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.769779] page dumped because: kasan: bad access detected [ 17.769884] [ 17.769935] Memory state around the buggy address: [ 17.770037] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.770449] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.770779] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.771117] ^ [ 17.771385] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.771715] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.771845] ================================================================== [ 17.431577] ================================================================== [ 17.431942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.432330] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.433013] [ 17.433141] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.433193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.433206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.433238] Call Trace: [ 17.433258] <TASK> [ 17.433290] dump_stack_lvl+0x73/0xb0 [ 17.433319] print_report+0xd1/0x650 [ 17.433343] ? __virt_addr_valid+0x1db/0x2d0 [ 17.433368] ? kasan_atomics_helper+0x1467/0x5450 [ 17.433389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.433430] ? kasan_atomics_helper+0x1467/0x5450 [ 17.433454] kasan_report+0x141/0x180 [ 17.433477] ? kasan_atomics_helper+0x1467/0x5450 [ 17.433505] kasan_check_range+0x10c/0x1c0 [ 17.433529] __kasan_check_write+0x18/0x20 [ 17.433567] kasan_atomics_helper+0x1467/0x5450 [ 17.433592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.433634] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.433657] ? kasan_atomics+0x152/0x310 [ 17.433683] kasan_atomics+0x1dc/0x310 [ 17.433707] ? __pfx_kasan_atomics+0x10/0x10 [ 17.433733] ? __pfx_read_tsc+0x10/0x10 [ 17.433754] ? ktime_get_ts64+0x86/0x230 [ 17.433779] kunit_try_run_case+0x1a5/0x480 [ 17.433804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.433826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.433850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.433873] ? __kthread_parkme+0x82/0x180 [ 17.433894] ? preempt_count_sub+0x50/0x80 [ 17.433918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.433942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.433965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.433988] kthread+0x337/0x6f0 [ 17.434008] ? trace_preempt_on+0x20/0xc0 [ 17.434032] ? __pfx_kthread+0x10/0x10 [ 17.434053] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.434075] ? calculate_sigpending+0x7b/0xa0 [ 17.434099] ? __pfx_kthread+0x10/0x10 [ 17.434121] ret_from_fork+0x116/0x1d0 [ 17.434139] ? __pfx_kthread+0x10/0x10 [ 17.434161] ret_from_fork_asm+0x1a/0x30 [ 17.434207] </TASK> [ 17.434229] [ 17.439506] Allocated by task 283: [ 17.439617] kasan_save_stack+0x45/0x70 [ 17.439850] kasan_save_track+0x18/0x40 [ 17.440066] kasan_save_alloc_info+0x3b/0x50 [ 17.440286] __kasan_kmalloc+0xb7/0xc0 [ 17.440545] __kmalloc_cache_noprof+0x189/0x420 [ 17.440818] kasan_atomics+0x95/0x310 [ 17.441019] kunit_try_run_case+0x1a5/0x480 [ 17.441271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.441475] kthread+0x337/0x6f0 [ 17.441560] ret_from_fork+0x116/0x1d0 [ 17.441645] ret_from_fork_asm+0x1a/0x30 [ 17.441888] [ 17.442012] The buggy address belongs to the object at ffff888102b6b880 [ 17.442012] which belongs to the cache kmalloc-64 of size 64 [ 17.442395] The buggy address is located 0 bytes to the right of [ 17.442395] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.442784] [ 17.442865] The buggy address belongs to the physical page: [ 17.443044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.443342] flags: 0x200000000000000(node=0|zone=2) [ 17.443590] page_type: f5(slab) [ 17.443753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.443997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.444215] page dumped because: kasan: bad access detected [ 17.444454] [ 17.444542] Memory state around the buggy address: [ 17.444675] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.444922] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.445151] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.445415] ^ [ 17.445560] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.445790] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.445948] ================================================================== [ 17.173251] ================================================================== [ 17.173579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 17.173731] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.174043] [ 17.174125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.174179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.174193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.174216] Call Trace: [ 17.174249] <TASK> [ 17.174270] dump_stack_lvl+0x73/0xb0 [ 17.174300] print_report+0xd1/0x650 [ 17.174324] ? __virt_addr_valid+0x1db/0x2d0 [ 17.174360] ? kasan_atomics_helper+0xd47/0x5450 [ 17.174384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.174409] ? kasan_atomics_helper+0xd47/0x5450 [ 17.174432] kasan_report+0x141/0x180 [ 17.174457] ? kasan_atomics_helper+0xd47/0x5450 [ 17.174485] kasan_check_range+0x10c/0x1c0 [ 17.174510] __kasan_check_write+0x18/0x20 [ 17.174531] kasan_atomics_helper+0xd47/0x5450 [ 17.174555] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.174579] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.174602] ? kasan_atomics+0x152/0x310 [ 17.174631] kasan_atomics+0x1dc/0x310 [ 17.174655] ? __pfx_kasan_atomics+0x10/0x10 [ 17.174681] ? __pfx_read_tsc+0x10/0x10 [ 17.174706] ? ktime_get_ts64+0x86/0x230 [ 17.174732] kunit_try_run_case+0x1a5/0x480 [ 17.174758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.174781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.174805] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.174829] ? __kthread_parkme+0x82/0x180 [ 17.174850] ? preempt_count_sub+0x50/0x80 [ 17.174875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.174900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.174924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.175129] kthread+0x337/0x6f0 [ 17.175238] ? trace_preempt_on+0x20/0xc0 [ 17.175273] ? __pfx_kthread+0x10/0x10 [ 17.175297] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.175322] ? calculate_sigpending+0x7b/0xa0 [ 17.175348] ? __pfx_kthread+0x10/0x10 [ 17.175372] ret_from_fork+0x116/0x1d0 [ 17.175392] ? __pfx_kthread+0x10/0x10 [ 17.175415] ret_from_fork_asm+0x1a/0x30 [ 17.175448] </TASK> [ 17.175550] [ 17.181998] Allocated by task 283: [ 17.182101] kasan_save_stack+0x45/0x70 [ 17.182205] kasan_save_track+0x18/0x40 [ 17.182427] kasan_save_alloc_info+0x3b/0x50 [ 17.182747] __kasan_kmalloc+0xb7/0xc0 [ 17.182971] __kmalloc_cache_noprof+0x189/0x420 [ 17.183253] kasan_atomics+0x95/0x310 [ 17.183556] kunit_try_run_case+0x1a5/0x480 [ 17.183709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.183835] kthread+0x337/0x6f0 [ 17.183918] ret_from_fork+0x116/0x1d0 [ 17.184004] ret_from_fork_asm+0x1a/0x30 [ 17.184092] [ 17.184202] The buggy address belongs to the object at ffff888102b6b880 [ 17.184202] which belongs to the cache kmalloc-64 of size 64 [ 17.184967] The buggy address is located 0 bytes to the right of [ 17.184967] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.185607] [ 17.185669] The buggy address belongs to the physical page: [ 17.185799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.186213] flags: 0x200000000000000(node=0|zone=2) [ 17.186528] page_type: f5(slab) [ 17.186666] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.186901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.187089] page dumped because: kasan: bad access detected [ 17.187193] [ 17.187256] Memory state around the buggy address: [ 17.187356] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.187543] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.187861] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.188286] ^ [ 17.188622] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189035] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189251] ================================================================== [ 17.727295] ================================================================== [ 17.727656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 17.727969] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.728286] [ 17.728397] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.728464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.728478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.728501] Call Trace: [ 17.728518] <TASK> [ 17.728534] dump_stack_lvl+0x73/0xb0 [ 17.728562] print_report+0xd1/0x650 [ 17.728586] ? __virt_addr_valid+0x1db/0x2d0 [ 17.728629] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.728654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.728678] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.728701] kasan_report+0x141/0x180 [ 17.728726] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.728754] kasan_check_range+0x10c/0x1c0 [ 17.728799] __kasan_check_write+0x18/0x20 [ 17.728821] kasan_atomics_helper+0x1f43/0x5450 [ 17.728846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.728870] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.728893] ? kasan_atomics+0x152/0x310 [ 17.728921] kasan_atomics+0x1dc/0x310 [ 17.728945] ? __pfx_kasan_atomics+0x10/0x10 [ 17.728988] ? __pfx_read_tsc+0x10/0x10 [ 17.729012] ? ktime_get_ts64+0x86/0x230 [ 17.729038] kunit_try_run_case+0x1a5/0x480 [ 17.729064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.729087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.729111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.729153] ? __kthread_parkme+0x82/0x180 [ 17.729174] ? preempt_count_sub+0x50/0x80 [ 17.729198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.729231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.729256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.729297] kthread+0x337/0x6f0 [ 17.729320] ? trace_preempt_on+0x20/0xc0 [ 17.729354] ? __pfx_kthread+0x10/0x10 [ 17.729384] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.729414] ? calculate_sigpending+0x7b/0xa0 [ 17.729439] ? __pfx_kthread+0x10/0x10 [ 17.729470] ret_from_fork+0x116/0x1d0 [ 17.729498] ? __pfx_kthread+0x10/0x10 [ 17.729520] ret_from_fork_asm+0x1a/0x30 [ 17.729560] </TASK> [ 17.729579] [ 17.735029] Allocated by task 283: [ 17.735226] kasan_save_stack+0x45/0x70 [ 17.735382] kasan_save_track+0x18/0x40 [ 17.735569] kasan_save_alloc_info+0x3b/0x50 [ 17.735692] __kasan_kmalloc+0xb7/0xc0 [ 17.735779] __kmalloc_cache_noprof+0x189/0x420 [ 17.735873] kasan_atomics+0x95/0x310 [ 17.735957] kunit_try_run_case+0x1a5/0x480 [ 17.736046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.736149] kthread+0x337/0x6f0 [ 17.736246] ret_from_fork+0x116/0x1d0 [ 17.736439] ret_from_fork_asm+0x1a/0x30 [ 17.736640] [ 17.736755] The buggy address belongs to the object at ffff888102b6b880 [ 17.736755] which belongs to the cache kmalloc-64 of size 64 [ 17.737308] The buggy address is located 0 bytes to the right of [ 17.737308] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.737775] [ 17.737888] The buggy address belongs to the physical page: [ 17.738049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.738316] flags: 0x200000000000000(node=0|zone=2) [ 17.738455] page_type: f5(slab) [ 17.738656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.738892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.739130] page dumped because: kasan: bad access detected [ 17.739288] [ 17.739363] Memory state around the buggy address: [ 17.739488] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.739648] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.739805] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.739965] ^ [ 17.740083] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740367] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740642] ================================================================== [ 17.351389] ================================================================== [ 17.351721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 17.352029] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.352343] [ 17.352427] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.352497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.352511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.352535] Call Trace: [ 17.352552] <TASK> [ 17.352569] dump_stack_lvl+0x73/0xb0 [ 17.352597] print_report+0xd1/0x650 [ 17.352621] ? __virt_addr_valid+0x1db/0x2d0 [ 17.353594] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.353621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.353646] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.353671] kasan_report+0x141/0x180 [ 17.353696] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.353725] __asan_report_load4_noabort+0x18/0x20 [ 17.353749] kasan_atomics_helper+0x49e8/0x5450 [ 17.353774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.353797] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.353820] ? kasan_atomics+0x152/0x310 [ 17.353848] kasan_atomics+0x1dc/0x310 [ 17.353873] ? __pfx_kasan_atomics+0x10/0x10 [ 17.353898] ? __pfx_read_tsc+0x10/0x10 [ 17.354308] ? ktime_get_ts64+0x86/0x230 [ 17.354352] kunit_try_run_case+0x1a5/0x480 [ 17.354385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.354410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.354436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.354460] ? __kthread_parkme+0x82/0x180 [ 17.354483] ? preempt_count_sub+0x50/0x80 [ 17.354509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.354534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.354557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.354581] kthread+0x337/0x6f0 [ 17.354602] ? trace_preempt_on+0x20/0xc0 [ 17.354627] ? __pfx_kthread+0x10/0x10 [ 17.354648] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.354671] ? calculate_sigpending+0x7b/0xa0 [ 17.354696] ? __pfx_kthread+0x10/0x10 [ 17.354719] ret_from_fork+0x116/0x1d0 [ 17.354739] ? __pfx_kthread+0x10/0x10 [ 17.354761] ret_from_fork_asm+0x1a/0x30 [ 17.354793] </TASK> [ 17.354807] [ 17.359719] Allocated by task 283: [ 17.359841] kasan_save_stack+0x45/0x70 [ 17.360068] kasan_save_track+0x18/0x40 [ 17.360260] kasan_save_alloc_info+0x3b/0x50 [ 17.360429] __kasan_kmalloc+0xb7/0xc0 [ 17.360575] __kmalloc_cache_noprof+0x189/0x420 [ 17.360783] kasan_atomics+0x95/0x310 [ 17.360907] kunit_try_run_case+0x1a5/0x480 [ 17.361101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.361303] kthread+0x337/0x6f0 [ 17.361444] ret_from_fork+0x116/0x1d0 [ 17.361591] ret_from_fork_asm+0x1a/0x30 [ 17.361761] [ 17.361873] The buggy address belongs to the object at ffff888102b6b880 [ 17.361873] which belongs to the cache kmalloc-64 of size 64 [ 17.362204] The buggy address is located 0 bytes to the right of [ 17.362204] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.362618] [ 17.362735] The buggy address belongs to the physical page: [ 17.362910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.363165] flags: 0x200000000000000(node=0|zone=2) [ 17.363423] page_type: f5(slab) [ 17.363592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.363851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.364040] page dumped because: kasan: bad access detected [ 17.364241] [ 17.364340] Memory state around the buggy address: [ 17.364506] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.364746] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.364980] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.365173] ^ [ 17.365324] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.365485] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.365762] ================================================================== [ 17.775292] ================================================================== [ 17.777804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 17.778277] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.778672] [ 17.778820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.778878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.778892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.778917] Call Trace: [ 17.778944] <TASK> [ 17.778967] dump_stack_lvl+0x73/0xb0 [ 17.778997] print_report+0xd1/0x650 [ 17.779022] ? __virt_addr_valid+0x1db/0x2d0 [ 17.779047] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.779069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.779092] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.779114] kasan_report+0x141/0x180 [ 17.779137] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.779165] __asan_report_load8_noabort+0x18/0x20 [ 17.779187] kasan_atomics_helper+0x4f98/0x5450 [ 17.779211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.779589] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.779624] ? kasan_atomics+0x152/0x310 [ 17.779652] kasan_atomics+0x1dc/0x310 [ 17.779680] ? __pfx_kasan_atomics+0x10/0x10 [ 17.779706] ? __pfx_read_tsc+0x10/0x10 [ 17.779728] ? ktime_get_ts64+0x86/0x230 [ 17.779754] kunit_try_run_case+0x1a5/0x480 [ 17.779781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.779804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.779828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.779852] ? __kthread_parkme+0x82/0x180 [ 17.779874] ? preempt_count_sub+0x50/0x80 [ 17.779900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.779924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.779947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.779971] kthread+0x337/0x6f0 [ 17.779990] ? trace_preempt_on+0x20/0xc0 [ 17.780015] ? __pfx_kthread+0x10/0x10 [ 17.780036] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.780057] ? calculate_sigpending+0x7b/0xa0 [ 17.780082] ? __pfx_kthread+0x10/0x10 [ 17.780105] ret_from_fork+0x116/0x1d0 [ 17.780124] ? __pfx_kthread+0x10/0x10 [ 17.780144] ret_from_fork_asm+0x1a/0x30 [ 17.780176] </TASK> [ 17.780190] [ 17.786628] Allocated by task 283: [ 17.786820] kasan_save_stack+0x45/0x70 [ 17.787029] kasan_save_track+0x18/0x40 [ 17.787214] kasan_save_alloc_info+0x3b/0x50 [ 17.787428] __kasan_kmalloc+0xb7/0xc0 [ 17.787610] __kmalloc_cache_noprof+0x189/0x420 [ 17.787823] kasan_atomics+0x95/0x310 [ 17.788005] kunit_try_run_case+0x1a5/0x480 [ 17.788203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.788478] kthread+0x337/0x6f0 [ 17.788607] ret_from_fork+0x116/0x1d0 [ 17.788725] ret_from_fork_asm+0x1a/0x30 [ 17.788923] [ 17.789035] The buggy address belongs to the object at ffff888102b6b880 [ 17.789035] which belongs to the cache kmalloc-64 of size 64 [ 17.789394] The buggy address is located 0 bytes to the right of [ 17.789394] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.789643] [ 17.789762] The buggy address belongs to the physical page: [ 17.790082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.790341] flags: 0x200000000000000(node=0|zone=2) [ 17.790611] page_type: f5(slab) [ 17.790772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.790996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.791256] page dumped because: kasan: bad access detected [ 17.791361] [ 17.791413] Memory state around the buggy address: [ 17.791675] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.791973] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.792250] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.792517] ^ [ 17.792760] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.792910] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.793042] ================================================================== [ 17.611404] ================================================================== [ 17.611754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.612011] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.612260] [ 17.612410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.612488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.612513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.612538] Call Trace: [ 17.612572] <TASK> [ 17.612597] dump_stack_lvl+0x73/0xb0 [ 17.612627] print_report+0xd1/0x650 [ 17.612662] ? __virt_addr_valid+0x1db/0x2d0 [ 17.612689] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.612710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.612752] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.612777] kasan_report+0x141/0x180 [ 17.612801] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.612830] kasan_check_range+0x10c/0x1c0 [ 17.612855] __kasan_check_write+0x18/0x20 [ 17.612875] kasan_atomics_helper+0x1a7f/0x5450 [ 17.612917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.612943] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.612965] ? kasan_atomics+0x152/0x310 [ 17.612992] kasan_atomics+0x1dc/0x310 [ 17.613016] ? __pfx_kasan_atomics+0x10/0x10 [ 17.613041] ? __pfx_read_tsc+0x10/0x10 [ 17.613063] ? ktime_get_ts64+0x86/0x230 [ 17.613088] kunit_try_run_case+0x1a5/0x480 [ 17.613114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.613137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.613161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.613184] ? __kthread_parkme+0x82/0x180 [ 17.613206] ? preempt_count_sub+0x50/0x80 [ 17.613249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.613274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.613299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.613322] kthread+0x337/0x6f0 [ 17.613343] ? trace_preempt_on+0x20/0xc0 [ 17.613369] ? __pfx_kthread+0x10/0x10 [ 17.613391] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.613413] ? calculate_sigpending+0x7b/0xa0 [ 17.613438] ? __pfx_kthread+0x10/0x10 [ 17.613460] ret_from_fork+0x116/0x1d0 [ 17.613480] ? __pfx_kthread+0x10/0x10 [ 17.613501] ret_from_fork_asm+0x1a/0x30 [ 17.613535] </TASK> [ 17.613549] [ 17.619077] Allocated by task 283: [ 17.619196] kasan_save_stack+0x45/0x70 [ 17.619331] kasan_save_track+0x18/0x40 [ 17.619465] kasan_save_alloc_info+0x3b/0x50 [ 17.619700] __kasan_kmalloc+0xb7/0xc0 [ 17.619945] __kmalloc_cache_noprof+0x189/0x420 [ 17.620200] kasan_atomics+0x95/0x310 [ 17.620441] kunit_try_run_case+0x1a5/0x480 [ 17.620697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.621009] kthread+0x337/0x6f0 [ 17.621229] ret_from_fork+0x116/0x1d0 [ 17.621447] ret_from_fork_asm+0x1a/0x30 [ 17.621680] [ 17.621801] The buggy address belongs to the object at ffff888102b6b880 [ 17.621801] which belongs to the cache kmalloc-64 of size 64 [ 17.621997] The buggy address is located 0 bytes to the right of [ 17.621997] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.622288] [ 17.622400] The buggy address belongs to the physical page: [ 17.622704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.623091] flags: 0x200000000000000(node=0|zone=2) [ 17.623260] page_type: f5(slab) [ 17.623350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.623483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.623614] page dumped because: kasan: bad access detected [ 17.623713] [ 17.623763] Memory state around the buggy address: [ 17.623859] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.624208] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.624622] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.624953] ^ [ 17.625190] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625545] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625725] ================================================================== [ 16.838281] ================================================================== [ 16.838766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.839205] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.839659] [ 16.839805] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.839860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.839874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.839897] Call Trace: [ 16.839917] <TASK> [ 16.839937] dump_stack_lvl+0x73/0xb0 [ 16.839965] print_report+0xd1/0x650 [ 16.839989] ? __virt_addr_valid+0x1db/0x2d0 [ 16.840013] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.840034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.840056] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.840078] kasan_report+0x141/0x180 [ 16.840100] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.840127] __asan_report_load4_noabort+0x18/0x20 [ 16.840147] kasan_atomics_helper+0x4b88/0x5450 [ 16.840170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.840192] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.840237] ? kasan_atomics+0x152/0x310 [ 16.840268] kasan_atomics+0x1dc/0x310 [ 16.840300] ? __pfx_kasan_atomics+0x10/0x10 [ 16.840325] ? __pfx_read_tsc+0x10/0x10 [ 16.840347] ? ktime_get_ts64+0x86/0x230 [ 16.840372] kunit_try_run_case+0x1a5/0x480 [ 16.840396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.840418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.840441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.840531] ? __kthread_parkme+0x82/0x180 [ 16.840556] ? preempt_count_sub+0x50/0x80 [ 16.840597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.840625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.840648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.840671] kthread+0x337/0x6f0 [ 16.840690] ? trace_preempt_on+0x20/0xc0 [ 16.840715] ? __pfx_kthread+0x10/0x10 [ 16.840752] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.840776] ? calculate_sigpending+0x7b/0xa0 [ 16.840801] ? __pfx_kthread+0x10/0x10 [ 16.840823] ret_from_fork+0x116/0x1d0 [ 16.840842] ? __pfx_kthread+0x10/0x10 [ 16.840862] ret_from_fork_asm+0x1a/0x30 [ 16.840910] </TASK> [ 16.840923] [ 16.846944] Allocated by task 283: [ 16.847046] kasan_save_stack+0x45/0x70 [ 16.847296] kasan_save_track+0x18/0x40 [ 16.847606] kasan_save_alloc_info+0x3b/0x50 [ 16.847882] __kasan_kmalloc+0xb7/0xc0 [ 16.848102] __kmalloc_cache_noprof+0x189/0x420 [ 16.848393] kasan_atomics+0x95/0x310 [ 16.848693] kunit_try_run_case+0x1a5/0x480 [ 16.848958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.849096] kthread+0x337/0x6f0 [ 16.849307] ret_from_fork+0x116/0x1d0 [ 16.849414] ret_from_fork_asm+0x1a/0x30 [ 16.849818] [ 16.849884] The buggy address belongs to the object at ffff888102b6b880 [ 16.849884] which belongs to the cache kmalloc-64 of size 64 [ 16.850715] The buggy address is located 0 bytes to the right of [ 16.850715] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.851370] [ 16.851427] The buggy address belongs to the physical page: [ 16.851588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.851735] flags: 0x200000000000000(node=0|zone=2) [ 16.852055] page_type: f5(slab) [ 16.852240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.852740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.853101] page dumped because: kasan: bad access detected [ 16.853325] [ 16.853440] Memory state around the buggy address: [ 16.853631] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.853964] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.854091] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.854211] ^ [ 16.854316] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855013] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
[ 16.617914] ================================================================== [ 16.619251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.620080] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.620902] [ 16.621310] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.621417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.621443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.621479] Call Trace: [ 16.621507] <TASK> [ 16.621537] dump_stack_lvl+0x73/0xb0 [ 16.621609] print_report+0xd1/0x650 [ 16.621646] ? __virt_addr_valid+0x1db/0x2d0 [ 16.621685] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.621759] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621800] kasan_report+0x141/0x180 [ 16.621828] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621857] kasan_check_range+0x10c/0x1c0 [ 16.621881] __kasan_check_write+0x18/0x20 [ 16.621900] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621924] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.621950] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.621970] ? kasan_bitops_generic+0x92/0x1c0 [ 16.621995] kasan_bitops_generic+0x121/0x1c0 [ 16.622018] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.622040] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.622066] kunit_try_run_case+0x1a5/0x480 [ 16.622091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622111] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.622134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.622155] ? __kthread_parkme+0x82/0x180 [ 16.622175] ? preempt_count_sub+0x50/0x80 [ 16.622199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.622266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.622288] kthread+0x337/0x6f0 [ 16.622307] ? trace_preempt_on+0x20/0xc0 [ 16.622331] ? __pfx_kthread+0x10/0x10 [ 16.622366] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.622389] ? calculate_sigpending+0x7b/0xa0 [ 16.622414] ? __pfx_kthread+0x10/0x10 [ 16.622436] ret_from_fork+0x116/0x1d0 [ 16.622473] ? __pfx_kthread+0x10/0x10 [ 16.622510] ret_from_fork_asm+0x1a/0x30 [ 16.622562] </TASK> [ 16.622583] [ 16.634655] Allocated by task 279: [ 16.634960] kasan_save_stack+0x45/0x70 [ 16.635214] kasan_save_track+0x18/0x40 [ 16.635920] kasan_save_alloc_info+0x3b/0x50 [ 16.636206] __kasan_kmalloc+0xb7/0xc0 [ 16.636646] __kmalloc_cache_noprof+0x189/0x420 [ 16.637009] kasan_bitops_generic+0x92/0x1c0 [ 16.637313] kunit_try_run_case+0x1a5/0x480 [ 16.638061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.638406] kthread+0x337/0x6f0 [ 16.638885] ret_from_fork+0x116/0x1d0 [ 16.639150] ret_from_fork_asm+0x1a/0x30 [ 16.639716] [ 16.639900] The buggy address belongs to the object at ffff8881022a34c0 [ 16.639900] which belongs to the cache kmalloc-16 of size 16 [ 16.640578] The buggy address is located 8 bytes inside of [ 16.640578] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.641399] [ 16.641977] The buggy address belongs to the physical page: [ 16.642390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.642963] flags: 0x200000000000000(node=0|zone=2) [ 16.643342] page_type: f5(slab) [ 16.643824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.644266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.644903] page dumped because: kasan: bad access detected [ 16.645159] [ 16.645324] Memory state around the buggy address: [ 16.646002] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.646609] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.646928] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.647420] ^ [ 16.648039] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648391] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648973] ================================================================== [ 16.720704] ================================================================== [ 16.721379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.722140] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.722642] [ 16.722771] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.722839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.722853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.722875] Call Trace: [ 16.722889] <TASK> [ 16.722909] dump_stack_lvl+0x73/0xb0 [ 16.722941] print_report+0xd1/0x650 [ 16.722983] ? __virt_addr_valid+0x1db/0x2d0 [ 16.723008] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.723055] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723080] kasan_report+0x141/0x180 [ 16.723101] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723149] kasan_check_range+0x10c/0x1c0 [ 16.723172] __kasan_check_write+0x18/0x20 [ 16.723191] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723216] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.723253] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.723275] ? kasan_bitops_generic+0x92/0x1c0 [ 16.723300] kasan_bitops_generic+0x121/0x1c0 [ 16.723323] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.723345] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.723371] kunit_try_run_case+0x1a5/0x480 [ 16.723410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.723434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.723565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.723592] ? __kthread_parkme+0x82/0x180 [ 16.723614] ? preempt_count_sub+0x50/0x80 [ 16.723638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.723661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.723684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.723706] kthread+0x337/0x6f0 [ 16.723725] ? trace_preempt_on+0x20/0xc0 [ 16.723748] ? __pfx_kthread+0x10/0x10 [ 16.723769] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.723808] ? calculate_sigpending+0x7b/0xa0 [ 16.723832] ? __pfx_kthread+0x10/0x10 [ 16.723854] ret_from_fork+0x116/0x1d0 [ 16.723873] ? __pfx_kthread+0x10/0x10 [ 16.723892] ret_from_fork_asm+0x1a/0x30 [ 16.723922] </TASK> [ 16.723950] [ 16.731089] Allocated by task 279: [ 16.731194] kasan_save_stack+0x45/0x70 [ 16.731317] kasan_save_track+0x18/0x40 [ 16.731642] kasan_save_alloc_info+0x3b/0x50 [ 16.731759] __kasan_kmalloc+0xb7/0xc0 [ 16.731967] __kmalloc_cache_noprof+0x189/0x420 [ 16.732158] kasan_bitops_generic+0x92/0x1c0 [ 16.732263] kunit_try_run_case+0x1a5/0x480 [ 16.732357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.732768] kthread+0x337/0x6f0 [ 16.732944] ret_from_fork+0x116/0x1d0 [ 16.733120] ret_from_fork_asm+0x1a/0x30 [ 16.733331] [ 16.733575] The buggy address belongs to the object at ffff8881022a34c0 [ 16.733575] which belongs to the cache kmalloc-16 of size 16 [ 16.733960] The buggy address is located 8 bytes inside of [ 16.733960] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.734154] [ 16.734210] The buggy address belongs to the physical page: [ 16.734410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.734919] flags: 0x200000000000000(node=0|zone=2) [ 16.735238] page_type: f5(slab) [ 16.735367] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.735603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.735934] page dumped because: kasan: bad access detected [ 16.736276] [ 16.736400] Memory state around the buggy address: [ 16.736803] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.737088] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.737216] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.737354] ^ [ 16.737622] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.737999] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.738311] ================================================================== [ 16.757005] ================================================================== [ 16.757405] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758062] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.758198] [ 16.758285] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.758364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.758378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.758402] Call Trace: [ 16.758423] <TASK> [ 16.758444] dump_stack_lvl+0x73/0xb0 [ 16.758475] print_report+0xd1/0x650 [ 16.758500] ? __virt_addr_valid+0x1db/0x2d0 [ 16.758786] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.758841] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758869] kasan_report+0x141/0x180 [ 16.758897] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758929] kasan_check_range+0x10c/0x1c0 [ 16.758953] __kasan_check_read+0x15/0x20 [ 16.758974] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.759001] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.759029] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.759052] ? kasan_bitops_generic+0x92/0x1c0 [ 16.759079] kasan_bitops_generic+0x121/0x1c0 [ 16.759103] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.759127] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.759179] kunit_try_run_case+0x1a5/0x480 [ 16.759211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.759261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.759290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.759314] ? __kthread_parkme+0x82/0x180 [ 16.759345] ? preempt_count_sub+0x50/0x80 [ 16.759370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.759396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.759418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.759439] kthread+0x337/0x6f0 [ 16.759459] ? trace_preempt_on+0x20/0xc0 [ 16.759483] ? __pfx_kthread+0x10/0x10 [ 16.759503] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.759639] ? calculate_sigpending+0x7b/0xa0 [ 16.759665] ? __pfx_kthread+0x10/0x10 [ 16.759688] ret_from_fork+0x116/0x1d0 [ 16.759707] ? __pfx_kthread+0x10/0x10 [ 16.759728] ret_from_fork_asm+0x1a/0x30 [ 16.759760] </TASK> [ 16.759772] [ 16.767214] Allocated by task 279: [ 16.767486] kasan_save_stack+0x45/0x70 [ 16.767752] kasan_save_track+0x18/0x40 [ 16.768251] kasan_save_alloc_info+0x3b/0x50 [ 16.768365] __kasan_kmalloc+0xb7/0xc0 [ 16.768456] __kmalloc_cache_noprof+0x189/0x420 [ 16.768751] kasan_bitops_generic+0x92/0x1c0 [ 16.769040] kunit_try_run_case+0x1a5/0x480 [ 16.769317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.769731] kthread+0x337/0x6f0 [ 16.769898] ret_from_fork+0x116/0x1d0 [ 16.770008] ret_from_fork_asm+0x1a/0x30 [ 16.770101] [ 16.770154] The buggy address belongs to the object at ffff8881022a34c0 [ 16.770154] which belongs to the cache kmalloc-16 of size 16 [ 16.770989] The buggy address is located 8 bytes inside of [ 16.770989] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.771193] [ 16.771260] The buggy address belongs to the physical page: [ 16.771631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.772100] flags: 0x200000000000000(node=0|zone=2) [ 16.772217] page_type: f5(slab) [ 16.772320] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.772617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.773055] page dumped because: kasan: bad access detected [ 16.773415] [ 16.773585] Memory state around the buggy address: [ 16.773768] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.773897] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.774023] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.774303] ^ [ 16.774652] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775186] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775325] ================================================================== [ 16.681207] ================================================================== [ 16.681656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.682254] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.682765] [ 16.683023] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.683107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.683122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.683143] Call Trace: [ 16.683168] <TASK> [ 16.683191] dump_stack_lvl+0x73/0xb0 [ 16.683240] print_report+0xd1/0x650 [ 16.683269] ? __virt_addr_valid+0x1db/0x2d0 [ 16.683294] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.683341] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683366] kasan_report+0x141/0x180 [ 16.683388] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683418] kasan_check_range+0x10c/0x1c0 [ 16.683440] __kasan_check_write+0x18/0x20 [ 16.683473] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683574] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.683643] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.683668] ? kasan_bitops_generic+0x92/0x1c0 [ 16.683695] kasan_bitops_generic+0x121/0x1c0 [ 16.683718] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.683741] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.683768] kunit_try_run_case+0x1a5/0x480 [ 16.683797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.683818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.683843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.683865] ? __kthread_parkme+0x82/0x180 [ 16.683886] ? preempt_count_sub+0x50/0x80 [ 16.683909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.683931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.683952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.683974] kthread+0x337/0x6f0 [ 16.683992] ? trace_preempt_on+0x20/0xc0 [ 16.684016] ? __pfx_kthread+0x10/0x10 [ 16.684036] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.684056] ? calculate_sigpending+0x7b/0xa0 [ 16.684079] ? __pfx_kthread+0x10/0x10 [ 16.684100] ret_from_fork+0x116/0x1d0 [ 16.684118] ? __pfx_kthread+0x10/0x10 [ 16.684138] ret_from_fork_asm+0x1a/0x30 [ 16.684170] </TASK> [ 16.684182] [ 16.693963] Allocated by task 279: [ 16.694281] kasan_save_stack+0x45/0x70 [ 16.694576] kasan_save_track+0x18/0x40 [ 16.694876] kasan_save_alloc_info+0x3b/0x50 [ 16.695107] __kasan_kmalloc+0xb7/0xc0 [ 16.695379] __kmalloc_cache_noprof+0x189/0x420 [ 16.695714] kasan_bitops_generic+0x92/0x1c0 [ 16.695988] kunit_try_run_case+0x1a5/0x480 [ 16.696251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.696682] kthread+0x337/0x6f0 [ 16.696861] ret_from_fork+0x116/0x1d0 [ 16.696966] ret_from_fork_asm+0x1a/0x30 [ 16.697293] [ 16.697408] The buggy address belongs to the object at ffff8881022a34c0 [ 16.697408] which belongs to the cache kmalloc-16 of size 16 [ 16.698112] The buggy address is located 8 bytes inside of [ 16.698112] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.699019] [ 16.699127] The buggy address belongs to the physical page: [ 16.699413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.699853] flags: 0x200000000000000(node=0|zone=2) [ 16.700692] page_type: f5(slab) [ 16.700830] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.700982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.701113] page dumped because: kasan: bad access detected [ 16.701214] [ 16.701279] Memory state around the buggy address: [ 16.701536] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.701737] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.701861] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.702162] ^ [ 16.702424] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.702674] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.703029] ================================================================== [ 16.776045] ================================================================== [ 16.776197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.776700] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.777027] [ 16.777460] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.777533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.777547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.777570] Call Trace: [ 16.777593] <TASK> [ 16.777712] dump_stack_lvl+0x73/0xb0 [ 16.777745] print_report+0xd1/0x650 [ 16.777787] ? __virt_addr_valid+0x1db/0x2d0 [ 16.777814] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.777840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.777862] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.777887] kasan_report+0x141/0x180 [ 16.777925] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.777960] __asan_report_load8_noabort+0x18/0x20 [ 16.777981] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.778007] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.778034] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.778074] ? kasan_bitops_generic+0x92/0x1c0 [ 16.778102] kasan_bitops_generic+0x121/0x1c0 [ 16.778125] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.778148] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.778176] kunit_try_run_case+0x1a5/0x480 [ 16.778201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.778241] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.778268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.778290] ? __kthread_parkme+0x82/0x180 [ 16.778311] ? preempt_count_sub+0x50/0x80 [ 16.778342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.778368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.778391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.778415] kthread+0x337/0x6f0 [ 16.778434] ? trace_preempt_on+0x20/0xc0 [ 16.778483] ? __pfx_kthread+0x10/0x10 [ 16.778504] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.778526] ? calculate_sigpending+0x7b/0xa0 [ 16.778620] ? __pfx_kthread+0x10/0x10 [ 16.778662] ret_from_fork+0x116/0x1d0 [ 16.778685] ? __pfx_kthread+0x10/0x10 [ 16.778705] ret_from_fork_asm+0x1a/0x30 [ 16.778736] </TASK> [ 16.778748] [ 16.785198] Allocated by task 279: [ 16.785309] kasan_save_stack+0x45/0x70 [ 16.785804] kasan_save_track+0x18/0x40 [ 16.786144] kasan_save_alloc_info+0x3b/0x50 [ 16.786427] __kasan_kmalloc+0xb7/0xc0 [ 16.786671] __kmalloc_cache_noprof+0x189/0x420 [ 16.786772] kasan_bitops_generic+0x92/0x1c0 [ 16.786870] kunit_try_run_case+0x1a5/0x480 [ 16.787102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.787570] kthread+0x337/0x6f0 [ 16.787805] ret_from_fork+0x116/0x1d0 [ 16.787968] ret_from_fork_asm+0x1a/0x30 [ 16.788061] [ 16.788115] The buggy address belongs to the object at ffff8881022a34c0 [ 16.788115] which belongs to the cache kmalloc-16 of size 16 [ 16.788752] The buggy address is located 8 bytes inside of [ 16.788752] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.788950] [ 16.789005] The buggy address belongs to the physical page: [ 16.789108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.789259] flags: 0x200000000000000(node=0|zone=2) [ 16.789579] page_type: f5(slab) [ 16.789799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.790239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.790700] page dumped because: kasan: bad access detected [ 16.790859] [ 16.790912] Memory state around the buggy address: [ 16.791008] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.791134] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.791697] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.792156] ^ [ 16.792572] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.792856] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793095] ================================================================== [ 16.650175] ================================================================== [ 16.650919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.651419] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.652060] [ 16.652324] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.652424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.652449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.652700] Call Trace: [ 16.652744] <TASK> [ 16.652808] dump_stack_lvl+0x73/0xb0 [ 16.652888] print_report+0xd1/0x650 [ 16.652929] ? __virt_addr_valid+0x1db/0x2d0 [ 16.652963] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.653034] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653060] kasan_report+0x141/0x180 [ 16.653082] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653113] kasan_check_range+0x10c/0x1c0 [ 16.653135] __kasan_check_write+0x18/0x20 [ 16.653155] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653181] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.653206] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.653248] ? kasan_bitops_generic+0x92/0x1c0 [ 16.653278] kasan_bitops_generic+0x121/0x1c0 [ 16.653301] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.653324] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.653352] kunit_try_run_case+0x1a5/0x480 [ 16.653377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.653399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.653423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.653444] ? __kthread_parkme+0x82/0x180 [ 16.653517] ? preempt_count_sub+0x50/0x80 [ 16.653563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.653599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.653637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.653673] kthread+0x337/0x6f0 [ 16.653704] ? trace_preempt_on+0x20/0xc0 [ 16.653745] ? __pfx_kthread+0x10/0x10 [ 16.653779] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.653831] ? calculate_sigpending+0x7b/0xa0 [ 16.653857] ? __pfx_kthread+0x10/0x10 [ 16.653878] ret_from_fork+0x116/0x1d0 [ 16.653898] ? __pfx_kthread+0x10/0x10 [ 16.653918] ret_from_fork_asm+0x1a/0x30 [ 16.653950] </TASK> [ 16.653963] [ 16.667248] Allocated by task 279: [ 16.667823] kasan_save_stack+0x45/0x70 [ 16.668158] kasan_save_track+0x18/0x40 [ 16.668653] kasan_save_alloc_info+0x3b/0x50 [ 16.669029] __kasan_kmalloc+0xb7/0xc0 [ 16.669255] __kmalloc_cache_noprof+0x189/0x420 [ 16.669923] kasan_bitops_generic+0x92/0x1c0 [ 16.670288] kunit_try_run_case+0x1a5/0x480 [ 16.670835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.671239] kthread+0x337/0x6f0 [ 16.671688] ret_from_fork+0x116/0x1d0 [ 16.671857] ret_from_fork_asm+0x1a/0x30 [ 16.672169] [ 16.672338] The buggy address belongs to the object at ffff8881022a34c0 [ 16.672338] which belongs to the cache kmalloc-16 of size 16 [ 16.673017] The buggy address is located 8 bytes inside of [ 16.673017] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.673538] [ 16.673732] The buggy address belongs to the physical page: [ 16.674743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.675105] flags: 0x200000000000000(node=0|zone=2) [ 16.675736] page_type: f5(slab) [ 16.675975] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.676373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.676876] page dumped because: kasan: bad access detected [ 16.677287] [ 16.677418] Memory state around the buggy address: [ 16.678033] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.678306] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.678754] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.679026] ^ [ 16.679986] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.680266] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.680489] ================================================================== [ 16.738956] ================================================================== [ 16.739262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.739627] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.739946] [ 16.740098] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.740151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.740164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.740185] Call Trace: [ 16.740207] <TASK> [ 16.740237] dump_stack_lvl+0x73/0xb0 [ 16.740269] print_report+0xd1/0x650 [ 16.740294] ? __virt_addr_valid+0x1db/0x2d0 [ 16.740318] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.740391] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740417] kasan_report+0x141/0x180 [ 16.740438] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740467] kasan_check_range+0x10c/0x1c0 [ 16.740489] __kasan_check_write+0x18/0x20 [ 16.740508] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740533] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.740559] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.740579] ? kasan_bitops_generic+0x92/0x1c0 [ 16.740605] kasan_bitops_generic+0x121/0x1c0 [ 16.740628] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.740650] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.740677] kunit_try_run_case+0x1a5/0x480 [ 16.740702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.740725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.740747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.741022] ? __kthread_parkme+0x82/0x180 [ 16.741055] ? preempt_count_sub+0x50/0x80 [ 16.741081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.741105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.741128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.741149] kthread+0x337/0x6f0 [ 16.741167] ? trace_preempt_on+0x20/0xc0 [ 16.741193] ? __pfx_kthread+0x10/0x10 [ 16.741259] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.741281] ? calculate_sigpending+0x7b/0xa0 [ 16.741305] ? __pfx_kthread+0x10/0x10 [ 16.741326] ret_from_fork+0x116/0x1d0 [ 16.741344] ? __pfx_kthread+0x10/0x10 [ 16.741363] ret_from_fork_asm+0x1a/0x30 [ 16.741395] </TASK> [ 16.741408] [ 16.748891] Allocated by task 279: [ 16.749008] kasan_save_stack+0x45/0x70 [ 16.749294] kasan_save_track+0x18/0x40 [ 16.749548] kasan_save_alloc_info+0x3b/0x50 [ 16.749646] __kasan_kmalloc+0xb7/0xc0 [ 16.749732] __kmalloc_cache_noprof+0x189/0x420 [ 16.749852] kasan_bitops_generic+0x92/0x1c0 [ 16.750112] kunit_try_run_case+0x1a5/0x480 [ 16.750528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.750819] kthread+0x337/0x6f0 [ 16.750908] ret_from_fork+0x116/0x1d0 [ 16.751131] ret_from_fork_asm+0x1a/0x30 [ 16.751499] [ 16.751555] The buggy address belongs to the object at ffff8881022a34c0 [ 16.751555] which belongs to the cache kmalloc-16 of size 16 [ 16.751957] The buggy address is located 8 bytes inside of [ 16.751957] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.752155] [ 16.752209] The buggy address belongs to the physical page: [ 16.752324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.752809] flags: 0x200000000000000(node=0|zone=2) [ 16.753156] page_type: f5(slab) [ 16.753395] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.753591] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.753720] page dumped because: kasan: bad access detected [ 16.753818] [ 16.753866] Memory state around the buggy address: [ 16.753994] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.754846] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.755292] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.755684] ^ [ 16.755911] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.756210] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.756429] ================================================================== [ 16.703445] ================================================================== [ 16.703857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.704296] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.704616] [ 16.704740] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.704792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.704804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.704878] Call Trace: [ 16.704901] <TASK> [ 16.704923] dump_stack_lvl+0x73/0xb0 [ 16.704951] print_report+0xd1/0x650 [ 16.704975] ? __virt_addr_valid+0x1db/0x2d0 [ 16.704997] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.705044] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705069] kasan_report+0x141/0x180 [ 16.705091] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705121] kasan_check_range+0x10c/0x1c0 [ 16.705144] __kasan_check_write+0x18/0x20 [ 16.705164] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705190] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.705216] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.705250] ? kasan_bitops_generic+0x92/0x1c0 [ 16.705277] kasan_bitops_generic+0x121/0x1c0 [ 16.705300] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.705323] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.705351] kunit_try_run_case+0x1a5/0x480 [ 16.705377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.705399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.705422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.705443] ? __kthread_parkme+0x82/0x180 [ 16.705464] ? preempt_count_sub+0x50/0x80 [ 16.705498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.705523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.705546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.705585] kthread+0x337/0x6f0 [ 16.705604] ? trace_preempt_on+0x20/0xc0 [ 16.705658] ? __pfx_kthread+0x10/0x10 [ 16.705679] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.705701] ? calculate_sigpending+0x7b/0xa0 [ 16.705724] ? __pfx_kthread+0x10/0x10 [ 16.705745] ret_from_fork+0x116/0x1d0 [ 16.705764] ? __pfx_kthread+0x10/0x10 [ 16.705785] ret_from_fork_asm+0x1a/0x30 [ 16.705816] </TASK> [ 16.705828] [ 16.712726] Allocated by task 279: [ 16.712929] kasan_save_stack+0x45/0x70 [ 16.713129] kasan_save_track+0x18/0x40 [ 16.713299] kasan_save_alloc_info+0x3b/0x50 [ 16.713395] __kasan_kmalloc+0xb7/0xc0 [ 16.713547] __kmalloc_cache_noprof+0x189/0x420 [ 16.713708] kasan_bitops_generic+0x92/0x1c0 [ 16.713953] kunit_try_run_case+0x1a5/0x480 [ 16.714181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.714748] kthread+0x337/0x6f0 [ 16.714978] ret_from_fork+0x116/0x1d0 [ 16.715174] ret_from_fork_asm+0x1a/0x30 [ 16.715279] [ 16.715334] The buggy address belongs to the object at ffff8881022a34c0 [ 16.715334] which belongs to the cache kmalloc-16 of size 16 [ 16.715953] The buggy address is located 8 bytes inside of [ 16.715953] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.716147] [ 16.716200] The buggy address belongs to the physical page: [ 16.716313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.716540] flags: 0x200000000000000(node=0|zone=2) [ 16.716766] page_type: f5(slab) [ 16.716971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.717279] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.717702] page dumped because: kasan: bad access detected [ 16.718011] [ 16.718144] Memory state around the buggy address: [ 16.718393] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.718892] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.719174] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.719386] ^ [ 16.719668] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719925] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720107] ================================================================== [ 16.585357] ================================================================== [ 16.586180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.586648] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.586895] [ 16.587039] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.587759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.587785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.587836] Call Trace: [ 16.587878] <TASK> [ 16.587915] dump_stack_lvl+0x73/0xb0 [ 16.587973] print_report+0xd1/0x650 [ 16.588020] ? __virt_addr_valid+0x1db/0x2d0 [ 16.588065] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.588186] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588243] kasan_report+0x141/0x180 [ 16.588272] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588303] kasan_check_range+0x10c/0x1c0 [ 16.588326] __kasan_check_write+0x18/0x20 [ 16.588345] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588383] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.588430] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.588468] ? kasan_bitops_generic+0x92/0x1c0 [ 16.588513] kasan_bitops_generic+0x121/0x1c0 [ 16.588652] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.588694] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.588747] kunit_try_run_case+0x1a5/0x480 [ 16.588796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.588830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.589045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.589085] ? __kthread_parkme+0x82/0x180 [ 16.589125] ? preempt_count_sub+0x50/0x80 [ 16.589151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.589175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.589199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.589243] kthread+0x337/0x6f0 [ 16.589268] ? trace_preempt_on+0x20/0xc0 [ 16.589293] ? __pfx_kthread+0x10/0x10 [ 16.589314] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.589334] ? calculate_sigpending+0x7b/0xa0 [ 16.589360] ? __pfx_kthread+0x10/0x10 [ 16.589380] ret_from_fork+0x116/0x1d0 [ 16.589399] ? __pfx_kthread+0x10/0x10 [ 16.589419] ret_from_fork_asm+0x1a/0x30 [ 16.589448] </TASK> [ 16.589478] [ 16.603944] Allocated by task 279: [ 16.604455] kasan_save_stack+0x45/0x70 [ 16.605281] kasan_save_track+0x18/0x40 [ 16.605496] kasan_save_alloc_info+0x3b/0x50 [ 16.605966] __kasan_kmalloc+0xb7/0xc0 [ 16.606430] __kmalloc_cache_noprof+0x189/0x420 [ 16.606734] kasan_bitops_generic+0x92/0x1c0 [ 16.607055] kunit_try_run_case+0x1a5/0x480 [ 16.607251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.607442] kthread+0x337/0x6f0 [ 16.607746] ret_from_fork+0x116/0x1d0 [ 16.608042] ret_from_fork_asm+0x1a/0x30 [ 16.608349] [ 16.608520] The buggy address belongs to the object at ffff8881022a34c0 [ 16.608520] which belongs to the cache kmalloc-16 of size 16 [ 16.609231] The buggy address is located 8 bytes inside of [ 16.609231] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.609604] [ 16.609792] The buggy address belongs to the physical page: [ 16.610234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.611006] flags: 0x200000000000000(node=0|zone=2) [ 16.611383] page_type: f5(slab) [ 16.611695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.611961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.612463] page dumped because: kasan: bad access detected [ 16.612860] [ 16.613047] Memory state around the buggy address: [ 16.613517] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.613714] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.614265] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.614556] ^ [ 16.614766] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.615265] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.615922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
[ 16.468403] ================================================================== [ 16.469747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.470069] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.470316] [ 16.470459] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.471134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.471454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.471506] Call Trace: [ 16.471551] <TASK> [ 16.471593] dump_stack_lvl+0x73/0xb0 [ 16.471660] print_report+0xd1/0x650 [ 16.471699] ? __virt_addr_valid+0x1db/0x2d0 [ 16.471736] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.471777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.471810] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.471835] kasan_report+0x141/0x180 [ 16.471857] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.471886] kasan_check_range+0x10c/0x1c0 [ 16.471909] __kasan_check_write+0x18/0x20 [ 16.471928] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.471951] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.471976] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.472000] ? kasan_bitops_generic+0x92/0x1c0 [ 16.472026] kasan_bitops_generic+0x116/0x1c0 [ 16.472049] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.472071] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.472098] kunit_try_run_case+0x1a5/0x480 [ 16.472123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.472144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.472167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.472188] ? __kthread_parkme+0x82/0x180 [ 16.472210] ? preempt_count_sub+0x50/0x80 [ 16.472260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.472284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.472306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.472327] kthread+0x337/0x6f0 [ 16.472347] ? trace_preempt_on+0x20/0xc0 [ 16.472369] ? __pfx_kthread+0x10/0x10 [ 16.472389] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.472408] ? calculate_sigpending+0x7b/0xa0 [ 16.472432] ? __pfx_kthread+0x10/0x10 [ 16.472454] ret_from_fork+0x116/0x1d0 [ 16.472487] ? __pfx_kthread+0x10/0x10 [ 16.472519] ret_from_fork_asm+0x1a/0x30 [ 16.472602] </TASK> [ 16.472617] [ 16.483856] Allocated by task 279: [ 16.484199] kasan_save_stack+0x45/0x70 [ 16.484462] kasan_save_track+0x18/0x40 [ 16.484683] kasan_save_alloc_info+0x3b/0x50 [ 16.484998] __kasan_kmalloc+0xb7/0xc0 [ 16.485389] __kmalloc_cache_noprof+0x189/0x420 [ 16.485701] kasan_bitops_generic+0x92/0x1c0 [ 16.486006] kunit_try_run_case+0x1a5/0x480 [ 16.486359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.487160] kthread+0x337/0x6f0 [ 16.487595] ret_from_fork+0x116/0x1d0 [ 16.487907] ret_from_fork_asm+0x1a/0x30 [ 16.488205] [ 16.488373] The buggy address belongs to the object at ffff8881022a34c0 [ 16.488373] which belongs to the cache kmalloc-16 of size 16 [ 16.489083] The buggy address is located 8 bytes inside of [ 16.489083] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.489746] [ 16.489913] The buggy address belongs to the physical page: [ 16.490118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.491061] flags: 0x200000000000000(node=0|zone=2) [ 16.491429] page_type: f5(slab) [ 16.491855] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.492287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.492781] page dumped because: kasan: bad access detected [ 16.493143] [ 16.493306] Memory state around the buggy address: [ 16.495901] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.496252] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.497076] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.497389] ^ [ 16.497597] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498018] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498308] ================================================================== [ 16.439159] ================================================================== [ 16.439529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.439864] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.440776] [ 16.440977] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.441038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.441051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.441072] Call Trace: [ 16.441097] <TASK> [ 16.441119] dump_stack_lvl+0x73/0xb0 [ 16.441154] print_report+0xd1/0x650 [ 16.441178] ? __virt_addr_valid+0x1db/0x2d0 [ 16.441202] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.441247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.441271] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.441295] kasan_report+0x141/0x180 [ 16.441316] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.441344] kasan_check_range+0x10c/0x1c0 [ 16.441367] __kasan_check_write+0x18/0x20 [ 16.441385] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.441409] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.441433] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.441454] ? kasan_bitops_generic+0x92/0x1c0 [ 16.441480] kasan_bitops_generic+0x116/0x1c0 [ 16.441502] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.441524] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.441551] kunit_try_run_case+0x1a5/0x480 [ 16.441575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.441596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.441619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.441640] ? __kthread_parkme+0x82/0x180 [ 16.441660] ? preempt_count_sub+0x50/0x80 [ 16.441683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.441706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.441727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.441748] kthread+0x337/0x6f0 [ 16.441767] ? trace_preempt_on+0x20/0xc0 [ 16.441789] ? __pfx_kthread+0x10/0x10 [ 16.441809] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.441828] ? calculate_sigpending+0x7b/0xa0 [ 16.441851] ? __pfx_kthread+0x10/0x10 [ 16.441870] ret_from_fork+0x116/0x1d0 [ 16.441889] ? __pfx_kthread+0x10/0x10 [ 16.441907] ret_from_fork_asm+0x1a/0x30 [ 16.441938] </TASK> [ 16.441949] [ 16.454077] Allocated by task 279: [ 16.454242] kasan_save_stack+0x45/0x70 [ 16.454878] kasan_save_track+0x18/0x40 [ 16.455283] kasan_save_alloc_info+0x3b/0x50 [ 16.455666] __kasan_kmalloc+0xb7/0xc0 [ 16.455845] __kmalloc_cache_noprof+0x189/0x420 [ 16.456074] kasan_bitops_generic+0x92/0x1c0 [ 16.456656] kunit_try_run_case+0x1a5/0x480 [ 16.457016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.457437] kthread+0x337/0x6f0 [ 16.457955] ret_from_fork+0x116/0x1d0 [ 16.458266] ret_from_fork_asm+0x1a/0x30 [ 16.459036] [ 16.459275] The buggy address belongs to the object at ffff8881022a34c0 [ 16.459275] which belongs to the cache kmalloc-16 of size 16 [ 16.460181] The buggy address is located 8 bytes inside of [ 16.460181] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.460926] [ 16.461093] The buggy address belongs to the physical page: [ 16.461685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.462262] flags: 0x200000000000000(node=0|zone=2) [ 16.462940] page_type: f5(slab) [ 16.463183] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.463517] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.463911] page dumped because: kasan: bad access detected [ 16.464248] [ 16.464381] Memory state around the buggy address: [ 16.464635] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.465049] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.465456] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.465862] ^ [ 16.466074] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.466317] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.467302] ================================================================== [ 16.499144] ================================================================== [ 16.500078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.500687] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.501188] [ 16.501395] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.501643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.501673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.501713] Call Trace: [ 16.501751] <TASK> [ 16.501795] dump_stack_lvl+0x73/0xb0 [ 16.501860] print_report+0xd1/0x650 [ 16.501908] ? __virt_addr_valid+0x1db/0x2d0 [ 16.501952] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.501994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.502036] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.502087] kasan_report+0x141/0x180 [ 16.502133] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.502188] kasan_check_range+0x10c/0x1c0 [ 16.502247] __kasan_check_write+0x18/0x20 [ 16.502290] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.502349] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.502401] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.502430] ? kasan_bitops_generic+0x92/0x1c0 [ 16.502477] kasan_bitops_generic+0x116/0x1c0 [ 16.502534] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.502570] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.502630] kunit_try_run_case+0x1a5/0x480 [ 16.502661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.502683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.502706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.502728] ? __kthread_parkme+0x82/0x180 [ 16.502750] ? preempt_count_sub+0x50/0x80 [ 16.502774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.502795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.502816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.502837] kthread+0x337/0x6f0 [ 16.502855] ? trace_preempt_on+0x20/0xc0 [ 16.502878] ? __pfx_kthread+0x10/0x10 [ 16.502898] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.502917] ? calculate_sigpending+0x7b/0xa0 [ 16.502940] ? __pfx_kthread+0x10/0x10 [ 16.502961] ret_from_fork+0x116/0x1d0 [ 16.502979] ? __pfx_kthread+0x10/0x10 [ 16.502999] ret_from_fork_asm+0x1a/0x30 [ 16.503031] </TASK> [ 16.503043] [ 16.512982] Allocated by task 279: [ 16.513145] kasan_save_stack+0x45/0x70 [ 16.513565] kasan_save_track+0x18/0x40 [ 16.513729] kasan_save_alloc_info+0x3b/0x50 [ 16.513911] __kasan_kmalloc+0xb7/0xc0 [ 16.514078] __kmalloc_cache_noprof+0x189/0x420 [ 16.514526] kasan_bitops_generic+0x92/0x1c0 [ 16.514887] kunit_try_run_case+0x1a5/0x480 [ 16.515231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.515727] kthread+0x337/0x6f0 [ 16.515928] ret_from_fork+0x116/0x1d0 [ 16.516100] ret_from_fork_asm+0x1a/0x30 [ 16.516280] [ 16.516386] The buggy address belongs to the object at ffff8881022a34c0 [ 16.516386] which belongs to the cache kmalloc-16 of size 16 [ 16.517688] The buggy address is located 8 bytes inside of [ 16.517688] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.519240] [ 16.519476] The buggy address belongs to the physical page: [ 16.519966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.520281] flags: 0x200000000000000(node=0|zone=2) [ 16.520792] page_type: f5(slab) [ 16.521143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.521813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.522108] page dumped because: kasan: bad access detected [ 16.522321] [ 16.522434] Memory state around the buggy address: [ 16.522636] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.522881] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.523121] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.523357] ^ [ 16.523555] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523804] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.524438] ================================================================== [ 16.555743] ================================================================== [ 16.556286] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.556585] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.557074] [ 16.557446] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.557545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.557571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.557612] Call Trace: [ 16.557655] <TASK> [ 16.557695] dump_stack_lvl+0x73/0xb0 [ 16.557748] print_report+0xd1/0x650 [ 16.557790] ? __virt_addr_valid+0x1db/0x2d0 [ 16.557833] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.558245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.558394] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.558449] kasan_report+0x141/0x180 [ 16.558558] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.558683] kasan_check_range+0x10c/0x1c0 [ 16.558737] __kasan_check_write+0x18/0x20 [ 16.558774] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.558832] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.558898] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.558938] ? kasan_bitops_generic+0x92/0x1c0 [ 16.558971] kasan_bitops_generic+0x116/0x1c0 [ 16.558995] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.559018] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.559045] kunit_try_run_case+0x1a5/0x480 [ 16.559072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.559105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.559142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.559184] ? __kthread_parkme+0x82/0x180 [ 16.559233] ? preempt_count_sub+0x50/0x80 [ 16.559287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.559347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.559389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.559433] kthread+0x337/0x6f0 [ 16.559470] ? trace_preempt_on+0x20/0xc0 [ 16.559521] ? __pfx_kthread+0x10/0x10 [ 16.559564] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.559740] ? calculate_sigpending+0x7b/0xa0 [ 16.559767] ? __pfx_kthread+0x10/0x10 [ 16.559791] ret_from_fork+0x116/0x1d0 [ 16.559812] ? __pfx_kthread+0x10/0x10 [ 16.559831] ret_from_fork_asm+0x1a/0x30 [ 16.559864] </TASK> [ 16.559877] [ 16.571362] Allocated by task 279: [ 16.571641] kasan_save_stack+0x45/0x70 [ 16.572048] kasan_save_track+0x18/0x40 [ 16.572366] kasan_save_alloc_info+0x3b/0x50 [ 16.572583] __kasan_kmalloc+0xb7/0xc0 [ 16.572965] __kmalloc_cache_noprof+0x189/0x420 [ 16.573172] kasan_bitops_generic+0x92/0x1c0 [ 16.573365] kunit_try_run_case+0x1a5/0x480 [ 16.573547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.573815] kthread+0x337/0x6f0 [ 16.574280] ret_from_fork+0x116/0x1d0 [ 16.574700] ret_from_fork_asm+0x1a/0x30 [ 16.575026] [ 16.575182] The buggy address belongs to the object at ffff8881022a34c0 [ 16.575182] which belongs to the cache kmalloc-16 of size 16 [ 16.575904] The buggy address is located 8 bytes inside of [ 16.575904] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.577144] [ 16.577337] The buggy address belongs to the physical page: [ 16.577805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.578173] flags: 0x200000000000000(node=0|zone=2) [ 16.578406] page_type: f5(slab) [ 16.578579] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.579386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.580160] page dumped because: kasan: bad access detected [ 16.580643] [ 16.581084] Memory state around the buggy address: [ 16.581301] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.581543] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.582022] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.582504] ^ [ 16.583069] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.583357] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.584066] ================================================================== [ 16.380156] ================================================================== [ 16.380600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.380860] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.381162] [ 16.381314] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.381410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.381436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.381466] Call Trace: [ 16.381490] <TASK> [ 16.381513] dump_stack_lvl+0x73/0xb0 [ 16.381545] print_report+0xd1/0x650 [ 16.381570] ? __virt_addr_valid+0x1db/0x2d0 [ 16.381599] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.381640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.381661] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.381685] kasan_report+0x141/0x180 [ 16.381706] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.381735] kasan_check_range+0x10c/0x1c0 [ 16.381757] __kasan_check_write+0x18/0x20 [ 16.381776] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.381799] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.381824] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.381845] ? kasan_bitops_generic+0x92/0x1c0 [ 16.381872] kasan_bitops_generic+0x116/0x1c0 [ 16.381894] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.381916] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.381942] kunit_try_run_case+0x1a5/0x480 [ 16.381968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.381988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.382011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.382032] ? __kthread_parkme+0x82/0x180 [ 16.382053] ? preempt_count_sub+0x50/0x80 [ 16.382077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.382100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.382121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.382143] kthread+0x337/0x6f0 [ 16.382162] ? trace_preempt_on+0x20/0xc0 [ 16.382184] ? __pfx_kthread+0x10/0x10 [ 16.382204] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.382364] ? calculate_sigpending+0x7b/0xa0 [ 16.382419] ? __pfx_kthread+0x10/0x10 [ 16.382464] ret_from_fork+0x116/0x1d0 [ 16.382500] ? __pfx_kthread+0x10/0x10 [ 16.382534] ret_from_fork_asm+0x1a/0x30 [ 16.382585] </TASK> [ 16.382606] [ 16.394825] Allocated by task 279: [ 16.395140] kasan_save_stack+0x45/0x70 [ 16.395672] kasan_save_track+0x18/0x40 [ 16.396018] kasan_save_alloc_info+0x3b/0x50 [ 16.396344] __kasan_kmalloc+0xb7/0xc0 [ 16.396805] __kmalloc_cache_noprof+0x189/0x420 [ 16.397174] kasan_bitops_generic+0x92/0x1c0 [ 16.398016] kunit_try_run_case+0x1a5/0x480 [ 16.398445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398900] kthread+0x337/0x6f0 [ 16.399078] ret_from_fork+0x116/0x1d0 [ 16.399245] ret_from_fork_asm+0x1a/0x30 [ 16.399738] [ 16.399914] The buggy address belongs to the object at ffff8881022a34c0 [ 16.399914] which belongs to the cache kmalloc-16 of size 16 [ 16.400866] The buggy address is located 8 bytes inside of [ 16.400866] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.401441] [ 16.402081] The buggy address belongs to the physical page: [ 16.402339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.403031] flags: 0x200000000000000(node=0|zone=2) [ 16.403614] page_type: f5(slab) [ 16.403912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.404182] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.404715] page dumped because: kasan: bad access detected [ 16.405031] [ 16.405375] Memory state around the buggy address: [ 16.406038] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.406389] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.406991] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.407419] ^ [ 16.407986] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.408401] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.408923] ================================================================== [ 16.350801] ================================================================== [ 16.351276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.352061] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.352958] [ 16.353353] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.353432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.353447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.353481] Call Trace: [ 16.353505] <TASK> [ 16.353538] dump_stack_lvl+0x73/0xb0 [ 16.353647] print_report+0xd1/0x650 [ 16.353701] ? __virt_addr_valid+0x1db/0x2d0 [ 16.353751] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.353794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.353830] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.353873] kasan_report+0x141/0x180 [ 16.353915] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.353974] kasan_check_range+0x10c/0x1c0 [ 16.354016] __kasan_check_write+0x18/0x20 [ 16.354047] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.354073] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.354099] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.354122] ? kasan_bitops_generic+0x92/0x1c0 [ 16.354150] kasan_bitops_generic+0x116/0x1c0 [ 16.354173] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.354196] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.354246] kunit_try_run_case+0x1a5/0x480 [ 16.354277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.354298] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.354324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.354358] ? __kthread_parkme+0x82/0x180 [ 16.354382] ? preempt_count_sub+0x50/0x80 [ 16.354412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.354437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.354474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.354528] kthread+0x337/0x6f0 [ 16.354560] ? trace_preempt_on+0x20/0xc0 [ 16.354599] ? __pfx_kthread+0x10/0x10 [ 16.354644] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.354667] ? calculate_sigpending+0x7b/0xa0 [ 16.354693] ? __pfx_kthread+0x10/0x10 [ 16.354714] ret_from_fork+0x116/0x1d0 [ 16.354734] ? __pfx_kthread+0x10/0x10 [ 16.354754] ret_from_fork_asm+0x1a/0x30 [ 16.354788] </TASK> [ 16.354801] [ 16.366362] Allocated by task 279: [ 16.366754] kasan_save_stack+0x45/0x70 [ 16.367026] kasan_save_track+0x18/0x40 [ 16.367269] kasan_save_alloc_info+0x3b/0x50 [ 16.367720] __kasan_kmalloc+0xb7/0xc0 [ 16.368263] __kmalloc_cache_noprof+0x189/0x420 [ 16.368666] kasan_bitops_generic+0x92/0x1c0 [ 16.369041] kunit_try_run_case+0x1a5/0x480 [ 16.369518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.369756] kthread+0x337/0x6f0 [ 16.369914] ret_from_fork+0x116/0x1d0 [ 16.370082] ret_from_fork_asm+0x1a/0x30 [ 16.370269] [ 16.370416] The buggy address belongs to the object at ffff8881022a34c0 [ 16.370416] which belongs to the cache kmalloc-16 of size 16 [ 16.371019] The buggy address is located 8 bytes inside of [ 16.371019] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.371449] [ 16.371601] The buggy address belongs to the physical page: [ 16.371991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.372734] flags: 0x200000000000000(node=0|zone=2) [ 16.373127] page_type: f5(slab) [ 16.373308] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.373777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.374026] page dumped because: kasan: bad access detected [ 16.374228] [ 16.374379] Memory state around the buggy address: [ 16.374719] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.375202] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.375920] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.376318] ^ [ 16.377084] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.377802] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.378351] ================================================================== [ 16.409808] ================================================================== [ 16.410923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.411387] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.411778] [ 16.412103] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.412204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.412240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.412298] Call Trace: [ 16.412340] <TASK> [ 16.412387] dump_stack_lvl+0x73/0xb0 [ 16.412449] print_report+0xd1/0x650 [ 16.412523] ? __virt_addr_valid+0x1db/0x2d0 [ 16.412570] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.412617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.412662] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.412714] kasan_report+0x141/0x180 [ 16.412752] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.412810] kasan_check_range+0x10c/0x1c0 [ 16.412845] __kasan_check_write+0x18/0x20 [ 16.412895] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.412930] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.412955] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.412978] ? kasan_bitops_generic+0x92/0x1c0 [ 16.413004] kasan_bitops_generic+0x116/0x1c0 [ 16.413026] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.413048] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.413075] kunit_try_run_case+0x1a5/0x480 [ 16.413101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.413122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.413146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.413168] ? __kthread_parkme+0x82/0x180 [ 16.413190] ? preempt_count_sub+0x50/0x80 [ 16.413215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.413262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.413285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.413307] kthread+0x337/0x6f0 [ 16.413326] ? trace_preempt_on+0x20/0xc0 [ 16.413351] ? __pfx_kthread+0x10/0x10 [ 16.413371] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.413392] ? calculate_sigpending+0x7b/0xa0 [ 16.413416] ? __pfx_kthread+0x10/0x10 [ 16.413437] ret_from_fork+0x116/0x1d0 [ 16.413467] ? __pfx_kthread+0x10/0x10 [ 16.413517] ret_from_fork_asm+0x1a/0x30 [ 16.413568] </TASK> [ 16.413588] [ 16.423883] Allocated by task 279: [ 16.423995] kasan_save_stack+0x45/0x70 [ 16.424105] kasan_save_track+0x18/0x40 [ 16.424192] kasan_save_alloc_info+0x3b/0x50 [ 16.425099] __kasan_kmalloc+0xb7/0xc0 [ 16.426048] __kmalloc_cache_noprof+0x189/0x420 [ 16.426477] kasan_bitops_generic+0x92/0x1c0 [ 16.426826] kunit_try_run_case+0x1a5/0x480 [ 16.427133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.427524] kthread+0x337/0x6f0 [ 16.427793] ret_from_fork+0x116/0x1d0 [ 16.428081] ret_from_fork_asm+0x1a/0x30 [ 16.428706] [ 16.428877] The buggy address belongs to the object at ffff8881022a34c0 [ 16.428877] which belongs to the cache kmalloc-16 of size 16 [ 16.430082] The buggy address is located 8 bytes inside of [ 16.430082] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.430967] [ 16.431138] The buggy address belongs to the physical page: [ 16.431697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.431986] flags: 0x200000000000000(node=0|zone=2) [ 16.432186] page_type: f5(slab) [ 16.432645] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.433154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.434092] page dumped because: kasan: bad access detected [ 16.434670] [ 16.434833] Memory state around the buggy address: [ 16.435173] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.435722] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.436202] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.436744] ^ [ 16.436978] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.437908] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.438283] ================================================================== [ 16.525908] ================================================================== [ 16.526537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.527316] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.528090] [ 16.528347] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.528451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.528845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.528926] Call Trace: [ 16.528973] <TASK> [ 16.529023] dump_stack_lvl+0x73/0xb0 [ 16.529090] print_report+0xd1/0x650 [ 16.529136] ? __virt_addr_valid+0x1db/0x2d0 [ 16.529177] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.529218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.529273] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.529317] kasan_report+0x141/0x180 [ 16.529360] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.529419] kasan_check_range+0x10c/0x1c0 [ 16.529465] __kasan_check_write+0x18/0x20 [ 16.529515] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.529563] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.529615] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.529656] ? kasan_bitops_generic+0x92/0x1c0 [ 16.529861] kasan_bitops_generic+0x116/0x1c0 [ 16.529919] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.529980] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.530027] kunit_try_run_case+0x1a5/0x480 [ 16.530075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.530112] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.530167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.530237] ? __kthread_parkme+0x82/0x180 [ 16.530278] ? preempt_count_sub+0x50/0x80 [ 16.530321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.530377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.530429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.530598] kthread+0x337/0x6f0 [ 16.530657] ? trace_preempt_on+0x20/0xc0 [ 16.530714] ? __pfx_kthread+0x10/0x10 [ 16.530757] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.530815] ? calculate_sigpending+0x7b/0xa0 [ 16.530857] ? __pfx_kthread+0x10/0x10 [ 16.530894] ret_from_fork+0x116/0x1d0 [ 16.530919] ? __pfx_kthread+0x10/0x10 [ 16.530940] ret_from_fork_asm+0x1a/0x30 [ 16.530972] </TASK> [ 16.530986] [ 16.542000] Allocated by task 279: [ 16.542316] kasan_save_stack+0x45/0x70 [ 16.542798] kasan_save_track+0x18/0x40 [ 16.543002] kasan_save_alloc_info+0x3b/0x50 [ 16.543327] __kasan_kmalloc+0xb7/0xc0 [ 16.543791] __kmalloc_cache_noprof+0x189/0x420 [ 16.544065] kasan_bitops_generic+0x92/0x1c0 [ 16.544364] kunit_try_run_case+0x1a5/0x480 [ 16.544711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.545041] kthread+0x337/0x6f0 [ 16.545347] ret_from_fork+0x116/0x1d0 [ 16.545546] ret_from_fork_asm+0x1a/0x30 [ 16.546260] [ 16.546421] The buggy address belongs to the object at ffff8881022a34c0 [ 16.546421] which belongs to the cache kmalloc-16 of size 16 [ 16.546879] The buggy address is located 8 bytes inside of [ 16.546879] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.547892] [ 16.548073] The buggy address belongs to the physical page: [ 16.548570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.548959] flags: 0x200000000000000(node=0|zone=2) [ 16.549307] page_type: f5(slab) [ 16.550131] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.550592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.550858] page dumped because: kasan: bad access detected [ 16.551056] [ 16.551159] Memory state around the buggy address: [ 16.551359] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.551605] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.552240] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.552707] ^ [ 16.553166] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.553874] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.554667] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
[ 16.311942] ================================================================== [ 16.312369] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 16.313156] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277 [ 16.313640] [ 16.313907] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.314020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.314045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.314085] Call Trace: [ 16.314152] <TASK> [ 16.314190] dump_stack_lvl+0x73/0xb0 [ 16.314273] print_report+0xd1/0x650 [ 16.314321] ? __virt_addr_valid+0x1db/0x2d0 [ 16.314401] ? strnlen+0x73/0x80 [ 16.314490] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.314542] ? strnlen+0x73/0x80 [ 16.314612] kasan_report+0x141/0x180 [ 16.314669] ? strnlen+0x73/0x80 [ 16.314705] __asan_report_load1_noabort+0x18/0x20 [ 16.314728] strnlen+0x73/0x80 [ 16.314751] kasan_strings+0x615/0xe80 [ 16.314771] ? trace_hardirqs_on+0x37/0xe0 [ 16.314797] ? __pfx_kasan_strings+0x10/0x10 [ 16.314818] ? finish_task_switch.isra.0+0x153/0x700 [ 16.314841] ? __switch_to+0x47/0xf50 [ 16.314867] ? __schedule+0x10cc/0x2b60 [ 16.314890] ? __pfx_read_tsc+0x10/0x10 [ 16.314911] ? ktime_get_ts64+0x86/0x230 [ 16.314936] kunit_try_run_case+0x1a5/0x480 [ 16.314961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.314983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.315006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.315028] ? __kthread_parkme+0x82/0x180 [ 16.315049] ? preempt_count_sub+0x50/0x80 [ 16.315072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.315094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.315116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.315139] kthread+0x337/0x6f0 [ 16.315158] ? trace_preempt_on+0x20/0xc0 [ 16.315179] ? __pfx_kthread+0x10/0x10 [ 16.315200] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.315235] ? calculate_sigpending+0x7b/0xa0 [ 16.315265] ? __pfx_kthread+0x10/0x10 [ 16.315287] ret_from_fork+0x116/0x1d0 [ 16.315305] ? __pfx_kthread+0x10/0x10 [ 16.315326] ret_from_fork_asm+0x1a/0x30 [ 16.315356] </TASK> [ 16.315368] [ 16.327290] Allocated by task 277: [ 16.327642] kasan_save_stack+0x45/0x70 [ 16.327965] kasan_save_track+0x18/0x40 [ 16.328311] kasan_save_alloc_info+0x3b/0x50 [ 16.328563] __kasan_kmalloc+0xb7/0xc0 [ 16.329155] __kmalloc_cache_noprof+0x189/0x420 [ 16.329712] kasan_strings+0xc0/0xe80 [ 16.329880] kunit_try_run_case+0x1a5/0x480 [ 16.330024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.330193] kthread+0x337/0x6f0 [ 16.330340] ret_from_fork+0x116/0x1d0 [ 16.330677] ret_from_fork_asm+0x1a/0x30 [ 16.330882] [ 16.330987] Freed by task 277: [ 16.331135] kasan_save_stack+0x45/0x70 [ 16.331317] kasan_save_track+0x18/0x40 [ 16.331490] kasan_save_free_info+0x3f/0x60 [ 16.331670] __kasan_slab_free+0x56/0x70 [ 16.332414] kfree+0x222/0x3f0 [ 16.332708] kasan_strings+0x2aa/0xe80 [ 16.333008] kunit_try_run_case+0x1a5/0x480 [ 16.333330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.333720] kthread+0x337/0x6f0 [ 16.333877] ret_from_fork+0x116/0x1d0 [ 16.334012] ret_from_fork_asm+0x1a/0x30 [ 16.334151] [ 16.335175] The buggy address belongs to the object at ffff888102b6e280 [ 16.335175] which belongs to the cache kmalloc-32 of size 32 [ 16.336300] The buggy address is located 16 bytes inside of [ 16.336300] freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0) [ 16.336695] [ 16.336816] The buggy address belongs to the physical page: [ 16.337179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e [ 16.338209] flags: 0x200000000000000(node=0|zone=2) [ 16.338797] page_type: f5(slab) [ 16.339117] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.339527] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.340168] page dumped because: kasan: bad access detected [ 16.340744] [ 16.340949] Memory state around the buggy address: [ 16.341162] ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.341677] ffff888102b6e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.342141] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.342573] ^ [ 16.342844] ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.343423] ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.344060] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
[ 16.277353] ================================================================== [ 16.278178] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0 [ 16.278743] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277 [ 16.279095] [ 16.279252] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.279349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.279371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.279396] Call Trace: [ 16.279421] <TASK> [ 16.279443] dump_stack_lvl+0x73/0xb0 [ 16.279667] print_report+0xd1/0x650 [ 16.279721] ? __virt_addr_valid+0x1db/0x2d0 [ 16.279766] ? strlen+0x8f/0xb0 [ 16.279807] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.279852] ? strlen+0x8f/0xb0 [ 16.279894] kasan_report+0x141/0x180 [ 16.279943] ? strlen+0x8f/0xb0 [ 16.279997] __asan_report_load1_noabort+0x18/0x20 [ 16.280040] strlen+0x8f/0xb0 [ 16.280085] kasan_strings+0x57b/0xe80 [ 16.280126] ? trace_hardirqs_on+0x37/0xe0 [ 16.280174] ? __pfx_kasan_strings+0x10/0x10 [ 16.280215] ? finish_task_switch.isra.0+0x153/0x700 [ 16.280273] ? __switch_to+0x47/0xf50 [ 16.280327] ? __schedule+0x10cc/0x2b60 [ 16.280373] ? __pfx_read_tsc+0x10/0x10 [ 16.280415] ? ktime_get_ts64+0x86/0x230 [ 16.280473] kunit_try_run_case+0x1a5/0x480 [ 16.280514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.280550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.280581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.280603] ? __kthread_parkme+0x82/0x180 [ 16.280623] ? preempt_count_sub+0x50/0x80 [ 16.280645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.280667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.280689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.280711] kthread+0x337/0x6f0 [ 16.280730] ? trace_preempt_on+0x20/0xc0 [ 16.280752] ? __pfx_kthread+0x10/0x10 [ 16.280772] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.280792] ? calculate_sigpending+0x7b/0xa0 [ 16.280816] ? __pfx_kthread+0x10/0x10 [ 16.280837] ret_from_fork+0x116/0x1d0 [ 16.280854] ? __pfx_kthread+0x10/0x10 [ 16.280876] ret_from_fork_asm+0x1a/0x30 [ 16.280906] </TASK> [ 16.280918] [ 16.292819] Allocated by task 277: [ 16.293104] kasan_save_stack+0x45/0x70 [ 16.293327] kasan_save_track+0x18/0x40 [ 16.293634] kasan_save_alloc_info+0x3b/0x50 [ 16.294005] __kasan_kmalloc+0xb7/0xc0 [ 16.294189] __kmalloc_cache_noprof+0x189/0x420 [ 16.294716] kasan_strings+0xc0/0xe80 [ 16.295086] kunit_try_run_case+0x1a5/0x480 [ 16.295403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.295984] kthread+0x337/0x6f0 [ 16.296275] ret_from_fork+0x116/0x1d0 [ 16.297067] ret_from_fork_asm+0x1a/0x30 [ 16.297386] [ 16.297553] Freed by task 277: [ 16.297747] kasan_save_stack+0x45/0x70 [ 16.297909] kasan_save_track+0x18/0x40 [ 16.298146] kasan_save_free_info+0x3f/0x60 [ 16.298474] __kasan_slab_free+0x56/0x70 [ 16.298705] kfree+0x222/0x3f0 [ 16.298850] kasan_strings+0x2aa/0xe80 [ 16.299071] kunit_try_run_case+0x1a5/0x480 [ 16.299579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.299923] kthread+0x337/0x6f0 [ 16.300254] ret_from_fork+0x116/0x1d0 [ 16.300742] ret_from_fork_asm+0x1a/0x30 [ 16.301080] [ 16.301261] The buggy address belongs to the object at ffff888102b6e280 [ 16.301261] which belongs to the cache kmalloc-32 of size 32 [ 16.301772] The buggy address is located 16 bytes inside of [ 16.301772] freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0) [ 16.302135] [ 16.302262] The buggy address belongs to the physical page: [ 16.303310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e [ 16.304018] flags: 0x200000000000000(node=0|zone=2) [ 16.304426] page_type: f5(slab) [ 16.304888] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.305616] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.306201] page dumped because: kasan: bad access detected [ 16.306811] [ 16.307018] Memory state around the buggy address: [ 16.307395] ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.308243] ffff888102b6e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.308958] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.309401] ^ [ 16.309800] ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.310281] ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.310800] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
[ 16.243421] ================================================================== [ 16.243903] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80 [ 16.244258] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277 [ 16.244855] [ 16.245070] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.245178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.245218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.245270] Call Trace: [ 16.245296] <TASK> [ 16.245333] dump_stack_lvl+0x73/0xb0 [ 16.245389] print_report+0xd1/0x650 [ 16.245443] ? __virt_addr_valid+0x1db/0x2d0 [ 16.245499] ? kasan_strings+0xcbc/0xe80 [ 16.245541] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.245579] ? kasan_strings+0xcbc/0xe80 [ 16.245604] kasan_report+0x141/0x180 [ 16.245626] ? kasan_strings+0xcbc/0xe80 [ 16.245652] __asan_report_load1_noabort+0x18/0x20 [ 16.245673] kasan_strings+0xcbc/0xe80 [ 16.245694] ? trace_hardirqs_on+0x37/0xe0 [ 16.245725] ? __pfx_kasan_strings+0x10/0x10 [ 16.245756] ? finish_task_switch.isra.0+0x153/0x700 [ 16.245793] ? __switch_to+0x47/0xf50 [ 16.245841] ? __schedule+0x10cc/0x2b60 [ 16.246009] ? __pfx_read_tsc+0x10/0x10 [ 16.246062] ? ktime_get_ts64+0x86/0x230 [ 16.246109] kunit_try_run_case+0x1a5/0x480 [ 16.246156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.246192] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.246256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.246299] ? __kthread_parkme+0x82/0x180 [ 16.246347] ? preempt_count_sub+0x50/0x80 [ 16.246378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.246403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.246427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.246451] kthread+0x337/0x6f0 [ 16.246481] ? trace_preempt_on+0x20/0xc0 [ 16.246557] ? __pfx_kthread+0x10/0x10 [ 16.246594] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.246618] ? calculate_sigpending+0x7b/0xa0 [ 16.246644] ? __pfx_kthread+0x10/0x10 [ 16.246665] ret_from_fork+0x116/0x1d0 [ 16.246686] ? __pfx_kthread+0x10/0x10 [ 16.246706] ret_from_fork_asm+0x1a/0x30 [ 16.246740] </TASK> [ 16.246752] [ 16.260213] Allocated by task 277: [ 16.260497] kasan_save_stack+0x45/0x70 [ 16.261126] kasan_save_track+0x18/0x40 [ 16.261475] kasan_save_alloc_info+0x3b/0x50 [ 16.261843] __kasan_kmalloc+0xb7/0xc0 [ 16.262375] __kmalloc_cache_noprof+0x189/0x420 [ 16.262672] kasan_strings+0xc0/0xe80 [ 16.263120] kunit_try_run_case+0x1a5/0x480 [ 16.263351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.263714] kthread+0x337/0x6f0 [ 16.264060] ret_from_fork+0x116/0x1d0 [ 16.264289] ret_from_fork_asm+0x1a/0x30 [ 16.264583] [ 16.264711] Freed by task 277: [ 16.264854] kasan_save_stack+0x45/0x70 [ 16.265140] kasan_save_track+0x18/0x40 [ 16.266188] kasan_save_free_info+0x3f/0x60 [ 16.266401] __kasan_slab_free+0x56/0x70 [ 16.266717] kfree+0x222/0x3f0 [ 16.266945] kasan_strings+0x2aa/0xe80 [ 16.267174] kunit_try_run_case+0x1a5/0x480 [ 16.267388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.267653] kthread+0x337/0x6f0 [ 16.267903] ret_from_fork+0x116/0x1d0 [ 16.268136] ret_from_fork_asm+0x1a/0x30 [ 16.268383] [ 16.268491] The buggy address belongs to the object at ffff888102b6e280 [ 16.268491] which belongs to the cache kmalloc-32 of size 32 [ 16.268860] The buggy address is located 16 bytes inside of [ 16.268860] freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0) [ 16.269725] [ 16.269916] The buggy address belongs to the physical page: [ 16.270318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e [ 16.271688] flags: 0x200000000000000(node=0|zone=2) [ 16.272061] page_type: f5(slab) [ 16.272267] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.272946] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.273263] page dumped because: kasan: bad access detected [ 16.273572] [ 16.273678] Memory state around the buggy address: [ 16.274021] ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.274313] ffff888102b6e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.274772] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.275071] ^ [ 16.275545] ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.275839] ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.276066] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
[ 16.208067] ================================================================== [ 16.209652] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0 [ 16.209909] Read of size 1 at addr ffff888102b6e290 by task kunit_try_catch/277 [ 16.210055] [ 16.210133] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.210189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.210202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.210243] Call Trace: [ 16.210261] <TASK> [ 16.210282] dump_stack_lvl+0x73/0xb0 [ 16.210310] print_report+0xd1/0x650 [ 16.210349] ? __virt_addr_valid+0x1db/0x2d0 [ 16.210381] ? strcmp+0xb0/0xc0 [ 16.210403] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.210429] ? strcmp+0xb0/0xc0 [ 16.210451] kasan_report+0x141/0x180 [ 16.210475] ? strcmp+0xb0/0xc0 [ 16.210501] __asan_report_load1_noabort+0x18/0x20 [ 16.210523] strcmp+0xb0/0xc0 [ 16.210546] kasan_strings+0x431/0xe80 [ 16.210568] ? trace_hardirqs_on+0x37/0xe0 [ 16.210593] ? __pfx_kasan_strings+0x10/0x10 [ 16.210615] ? finish_task_switch.isra.0+0x153/0x700 [ 16.210639] ? __switch_to+0x47/0xf50 [ 16.210666] ? __schedule+0x10cc/0x2b60 [ 16.210690] ? __pfx_read_tsc+0x10/0x10 [ 16.210712] ? ktime_get_ts64+0x86/0x230 [ 16.210737] kunit_try_run_case+0x1a5/0x480 [ 16.210763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.210785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.210809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.210833] ? __kthread_parkme+0x82/0x180 [ 16.210855] ? preempt_count_sub+0x50/0x80 [ 16.210878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.210902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.210927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.210950] kthread+0x337/0x6f0 [ 16.210970] ? trace_preempt_on+0x20/0xc0 [ 16.210993] ? __pfx_kthread+0x10/0x10 [ 16.211015] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.211035] ? calculate_sigpending+0x7b/0xa0 [ 16.211061] ? __pfx_kthread+0x10/0x10 [ 16.211083] ret_from_fork+0x116/0x1d0 [ 16.211102] ? __pfx_kthread+0x10/0x10 [ 16.211123] ret_from_fork_asm+0x1a/0x30 [ 16.211157] </TASK> [ 16.211170] [ 16.224345] Allocated by task 277: [ 16.225079] kasan_save_stack+0x45/0x70 [ 16.225442] kasan_save_track+0x18/0x40 [ 16.225775] kasan_save_alloc_info+0x3b/0x50 [ 16.226065] __kasan_kmalloc+0xb7/0xc0 [ 16.226251] __kmalloc_cache_noprof+0x189/0x420 [ 16.226604] kasan_strings+0xc0/0xe80 [ 16.226903] kunit_try_run_case+0x1a5/0x480 [ 16.227440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.227843] kthread+0x337/0x6f0 [ 16.228123] ret_from_fork+0x116/0x1d0 [ 16.228429] ret_from_fork_asm+0x1a/0x30 [ 16.228918] [ 16.229128] Freed by task 277: [ 16.229349] kasan_save_stack+0x45/0x70 [ 16.229850] kasan_save_track+0x18/0x40 [ 16.230059] kasan_save_free_info+0x3f/0x60 [ 16.230435] __kasan_slab_free+0x56/0x70 [ 16.231235] kfree+0x222/0x3f0 [ 16.231604] kasan_strings+0x2aa/0xe80 [ 16.231952] kunit_try_run_case+0x1a5/0x480 [ 16.232196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.232776] kthread+0x337/0x6f0 [ 16.232942] ret_from_fork+0x116/0x1d0 [ 16.233191] ret_from_fork_asm+0x1a/0x30 [ 16.233384] [ 16.233671] The buggy address belongs to the object at ffff888102b6e280 [ 16.233671] which belongs to the cache kmalloc-32 of size 32 [ 16.234098] The buggy address is located 16 bytes inside of [ 16.234098] freed 32-byte region [ffff888102b6e280, ffff888102b6e2a0) [ 16.235060] [ 16.235260] The buggy address belongs to the physical page: [ 16.235496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e [ 16.236193] flags: 0x200000000000000(node=0|zone=2) [ 16.236481] page_type: f5(slab) [ 16.236769] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.237076] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.237575] page dumped because: kasan: bad access detected [ 16.237784] [ 16.237945] Memory state around the buggy address: [ 16.238899] ffff888102b6e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.239429] ffff888102b6e200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.239912] >ffff888102b6e280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.240396] ^ [ 16.240846] ffff888102b6e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.241177] ffff888102b6e380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.241745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
[ 16.175949] ================================================================== [ 16.176355] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 [ 16.176721] Read of size 1 at addr ffff888102b6e1d8 by task kunit_try_catch/275 [ 16.177280] [ 16.177431] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.177529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.177547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.177573] Call Trace: [ 16.177589] <TASK> [ 16.177611] dump_stack_lvl+0x73/0xb0 [ 16.177646] print_report+0xd1/0x650 [ 16.177679] ? __virt_addr_valid+0x1db/0x2d0 [ 16.177716] ? memcmp+0x1b4/0x1d0 [ 16.177749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.177790] ? memcmp+0x1b4/0x1d0 [ 16.177827] kasan_report+0x141/0x180 [ 16.177874] ? memcmp+0x1b4/0x1d0 [ 16.177930] __asan_report_load1_noabort+0x18/0x20 [ 16.177975] memcmp+0x1b4/0x1d0 [ 16.178013] kasan_memcmp+0x18f/0x390 [ 16.178049] ? trace_hardirqs_on+0x37/0xe0 [ 16.178095] ? __pfx_kasan_memcmp+0x10/0x10 [ 16.178135] ? finish_task_switch.isra.0+0x153/0x700 [ 16.178179] ? __switch_to+0x47/0xf50 [ 16.178252] ? __pfx_read_tsc+0x10/0x10 [ 16.178299] ? ktime_get_ts64+0x86/0x230 [ 16.178355] kunit_try_run_case+0x1a5/0x480 [ 16.178414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.178447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.178473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.178496] ? __kthread_parkme+0x82/0x180 [ 16.178518] ? preempt_count_sub+0x50/0x80 [ 16.178541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.178565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.178587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.178610] kthread+0x337/0x6f0 [ 16.178629] ? trace_preempt_on+0x20/0xc0 [ 16.178650] ? __pfx_kthread+0x10/0x10 [ 16.178670] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.178691] ? calculate_sigpending+0x7b/0xa0 [ 16.178715] ? __pfx_kthread+0x10/0x10 [ 16.178735] ret_from_fork+0x116/0x1d0 [ 16.178752] ? __pfx_kthread+0x10/0x10 [ 16.178773] ret_from_fork_asm+0x1a/0x30 [ 16.178804] </TASK> [ 16.178817] [ 16.186728] Allocated by task 275: [ 16.186950] kasan_save_stack+0x45/0x70 [ 16.187149] kasan_save_track+0x18/0x40 [ 16.187437] kasan_save_alloc_info+0x3b/0x50 [ 16.187696] __kasan_kmalloc+0xb7/0xc0 [ 16.187882] __kmalloc_cache_noprof+0x189/0x420 [ 16.188212] kasan_memcmp+0xb7/0x390 [ 16.188437] kunit_try_run_case+0x1a5/0x480 [ 16.188655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.188895] kthread+0x337/0x6f0 [ 16.189116] ret_from_fork+0x116/0x1d0 [ 16.189292] ret_from_fork_asm+0x1a/0x30 [ 16.189578] [ 16.189718] The buggy address belongs to the object at ffff888102b6e1c0 [ 16.189718] which belongs to the cache kmalloc-32 of size 32 [ 16.190315] The buggy address is located 0 bytes to the right of [ 16.190315] allocated 24-byte region [ffff888102b6e1c0, ffff888102b6e1d8) [ 16.190812] [ 16.190926] The buggy address belongs to the physical page: [ 16.191278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6e [ 16.191658] flags: 0x200000000000000(node=0|zone=2) [ 16.191865] page_type: f5(slab) [ 16.192033] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.192329] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.192803] page dumped because: kasan: bad access detected [ 16.193174] [ 16.193339] Memory state around the buggy address: [ 16.193686] ffff888102b6e080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.194052] ffff888102b6e100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 16.194374] >ffff888102b6e180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.194739] ^ [ 16.195029] ffff888102b6e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.195326] ffff888102b6e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.195726] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
[ 16.141141] ================================================================== [ 16.141588] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390 [ 16.142097] Read of size 1 at addr ffff888103bffc4a by task kunit_try_catch/271 [ 16.143816] [ 16.144007] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.144106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.144132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.144175] Call Trace: [ 16.144229] <TASK> [ 16.144266] dump_stack_lvl+0x73/0xb0 [ 16.144325] print_report+0xd1/0x650 [ 16.144367] ? __virt_addr_valid+0x1db/0x2d0 [ 16.144409] ? kasan_alloca_oob_right+0x329/0x390 [ 16.144451] ? kasan_addr_to_slab+0x11/0xa0 [ 16.144486] ? kasan_alloca_oob_right+0x329/0x390 [ 16.144515] kasan_report+0x141/0x180 [ 16.144538] ? kasan_alloca_oob_right+0x329/0x390 [ 16.144566] __asan_report_load1_noabort+0x18/0x20 [ 16.144588] kasan_alloca_oob_right+0x329/0x390 [ 16.144610] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.144632] ? finish_task_switch.isra.0+0x153/0x700 [ 16.144654] ? rt_mutex_adjust_prio_chain+0x68e/0x20e0 [ 16.144680] ? trace_hardirqs_on+0x37/0xe0 [ 16.144704] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 16.144730] ? __schedule+0x10cc/0x2b60 [ 16.144751] ? __pfx_read_tsc+0x10/0x10 [ 16.144771] ? ktime_get_ts64+0x86/0x230 [ 16.144795] kunit_try_run_case+0x1a5/0x480 [ 16.144821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.144864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.144886] ? __kthread_parkme+0x82/0x180 [ 16.144907] ? preempt_count_sub+0x50/0x80 [ 16.144930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.144974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.144996] kthread+0x337/0x6f0 [ 16.145015] ? trace_preempt_on+0x20/0xc0 [ 16.145037] ? __pfx_kthread+0x10/0x10 [ 16.145057] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.145076] ? calculate_sigpending+0x7b/0xa0 [ 16.145101] ? __pfx_kthread+0x10/0x10 [ 16.145121] ret_from_fork+0x116/0x1d0 [ 16.145139] ? __pfx_kthread+0x10/0x10 [ 16.145158] ret_from_fork_asm+0x1a/0x30 [ 16.145190] </TASK> [ 16.145203] [ 16.157185] The buggy address belongs to stack of task kunit_try_catch/271 [ 16.157559] [ 16.157691] The buggy address belongs to the physical page: [ 16.157899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bff [ 16.158934] flags: 0x200000000000000(node=0|zone=2) [ 16.159339] raw: 0200000000000000 ffffea00040effc8 ffffea00040effc8 0000000000000000 [ 16.159826] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.160170] page dumped because: kasan: bad access detected [ 16.160727] [ 16.160891] Memory state around the buggy address: [ 16.161154] ffff888103bffb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.162082] ffff888103bffb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.162657] >ffff888103bffc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 16.163033] ^ [ 16.163390] ffff888103bffc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 16.164026] ffff888103bffd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.164664] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
[ 16.112393] ================================================================== [ 16.113251] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 16.113856] Read of size 1 at addr ffff888103bc7c3f by task kunit_try_catch/269 [ 16.114448] [ 16.114652] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.114796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.114824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.114861] Call Trace: [ 16.114887] <TASK> [ 16.114923] dump_stack_lvl+0x73/0xb0 [ 16.114983] print_report+0xd1/0x650 [ 16.115029] ? __virt_addr_valid+0x1db/0x2d0 [ 16.115075] ? kasan_alloca_oob_left+0x320/0x380 [ 16.115116] ? kasan_addr_to_slab+0x11/0xa0 [ 16.115150] ? kasan_alloca_oob_left+0x320/0x380 [ 16.115190] kasan_report+0x141/0x180 [ 16.115240] ? kasan_alloca_oob_left+0x320/0x380 [ 16.115334] __asan_report_load1_noabort+0x18/0x20 [ 16.115400] kasan_alloca_oob_left+0x320/0x380 [ 16.115443] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.115484] ? finish_task_switch.isra.0+0x153/0x700 [ 16.115519] ? rt_mutex_adjust_prio_chain+0x68e/0x20e0 [ 16.115556] ? trace_hardirqs_on+0x37/0xe0 [ 16.115760] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 16.115804] ? __schedule+0x10cc/0x2b60 [ 16.115858] ? __pfx_read_tsc+0x10/0x10 [ 16.115882] ? ktime_get_ts64+0x86/0x230 [ 16.115906] kunit_try_run_case+0x1a5/0x480 [ 16.115933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.115954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.115976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.115997] ? __kthread_parkme+0x82/0x180 [ 16.116018] ? preempt_count_sub+0x50/0x80 [ 16.116041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.116062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.116083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.116104] kthread+0x337/0x6f0 [ 16.116123] ? trace_preempt_on+0x20/0xc0 [ 16.116144] ? __pfx_kthread+0x10/0x10 [ 16.116163] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.116183] ? calculate_sigpending+0x7b/0xa0 [ 16.116206] ? __pfx_kthread+0x10/0x10 [ 16.116248] ret_from_fork+0x116/0x1d0 [ 16.116269] ? __pfx_kthread+0x10/0x10 [ 16.116288] ret_from_fork_asm+0x1a/0x30 [ 16.116318] </TASK> [ 16.116332] [ 16.127218] The buggy address belongs to stack of task kunit_try_catch/269 [ 16.128313] [ 16.128683] The buggy address belongs to the physical page: [ 16.129255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bc7 [ 16.129858] flags: 0x200000000000000(node=0|zone=2) [ 16.130198] raw: 0200000000000000 ffffea00040ef1c8 ffffea00040ef1c8 0000000000000000 [ 16.130836] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.131234] page dumped because: kasan: bad access detected [ 16.131448] [ 16.131601] Memory state around the buggy address: [ 16.131903] ffff888103bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.132329] ffff888103bc7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.132700] >ffff888103bc7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 16.132928] ^ [ 16.133642] ffff888103bc7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 16.134098] ffff888103bc7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.134515] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
[ 16.080785] ================================================================== [ 16.081381] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 16.081839] Read of size 1 at addr ffff888103bffd02 by task kunit_try_catch/267 [ 16.082201] [ 16.082605] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.082705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.082730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.082774] Call Trace: [ 16.082793] <TASK> [ 16.082826] dump_stack_lvl+0x73/0xb0 [ 16.082887] print_report+0xd1/0x650 [ 16.082928] ? __virt_addr_valid+0x1db/0x2d0 [ 16.082963] ? kasan_stack_oob+0x2b5/0x300 [ 16.082995] ? kasan_addr_to_slab+0x11/0xa0 [ 16.083031] ? kasan_stack_oob+0x2b5/0x300 [ 16.083071] kasan_report+0x141/0x180 [ 16.083110] ? kasan_stack_oob+0x2b5/0x300 [ 16.083161] __asan_report_load1_noabort+0x18/0x20 [ 16.083202] kasan_stack_oob+0x2b5/0x300 [ 16.083257] ? __pfx_kasan_stack_oob+0x10/0x10 [ 16.083298] ? finish_task_switch.isra.0+0x153/0x700 [ 16.083339] ? __switch_to+0x47/0xf50 [ 16.083371] ? __schedule+0x10cc/0x2b60 [ 16.083396] ? __pfx_read_tsc+0x10/0x10 [ 16.083417] ? ktime_get_ts64+0x86/0x230 [ 16.083442] kunit_try_run_case+0x1a5/0x480 [ 16.083475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.083536] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.083571] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.083605] ? __kthread_parkme+0x82/0x180 [ 16.083637] ? preempt_count_sub+0x50/0x80 [ 16.083735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.083786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.083834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.083882] kthread+0x337/0x6f0 [ 16.083921] ? trace_preempt_on+0x20/0xc0 [ 16.083971] ? __pfx_kthread+0x10/0x10 [ 16.084014] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.084057] ? calculate_sigpending+0x7b/0xa0 [ 16.084104] ? __pfx_kthread+0x10/0x10 [ 16.084146] ret_from_fork+0x116/0x1d0 [ 16.084172] ? __pfx_kthread+0x10/0x10 [ 16.084192] ret_from_fork_asm+0x1a/0x30 [ 16.084244] </TASK> [ 16.084259] [ 16.095342] The buggy address belongs to stack of task kunit_try_catch/267 [ 16.096179] and is located at offset 138 in frame: [ 16.097067] kasan_stack_oob+0x0/0x300 [ 16.097895] [ 16.098134] This frame has 4 objects: [ 16.098779] [48, 49) '__assertion' [ 16.098874] [64, 72) 'array' [ 16.099089] [96, 112) '__assertion' [ 16.099271] [128, 138) 'stack_array' [ 16.099817] [ 16.100296] The buggy address belongs to the physical page: [ 16.101041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bff [ 16.101369] flags: 0x200000000000000(node=0|zone=2) [ 16.101965] raw: 0200000000000000 ffffea00040effc8 ffffea00040effc8 0000000000000000 [ 16.102432] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.103092] page dumped because: kasan: bad access detected [ 16.103379] [ 16.103729] Memory state around the buggy address: [ 16.104071] ffff888103bffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.104908] ffff888103bffc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 16.105278] >ffff888103bffd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.105858] ^ [ 16.106103] ffff888103bffd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 16.106636] ffff888103bffe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.107147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
[ 16.050123] ================================================================== [ 16.051021] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 16.051454] Read of size 1 at addr ffffffffaa85fecd by task kunit_try_catch/263 [ 16.052809] [ 16.053002] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.053079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.053100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.053139] Call Trace: [ 16.053165] <TASK> [ 16.053231] dump_stack_lvl+0x73/0xb0 [ 16.053306] print_report+0xd1/0x650 [ 16.053352] ? __virt_addr_valid+0x1db/0x2d0 [ 16.053411] ? kasan_global_oob_right+0x286/0x2d0 [ 16.053457] ? kasan_addr_to_slab+0x11/0xa0 [ 16.053495] ? kasan_global_oob_right+0x286/0x2d0 [ 16.053540] kasan_report+0x141/0x180 [ 16.053573] ? kasan_global_oob_right+0x286/0x2d0 [ 16.053616] __asan_report_load1_noabort+0x18/0x20 [ 16.053649] kasan_global_oob_right+0x286/0x2d0 [ 16.053677] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 16.053701] ? __schedule+0x10cc/0x2b60 [ 16.053724] ? __pfx_read_tsc+0x10/0x10 [ 16.053746] ? ktime_get_ts64+0x86/0x230 [ 16.053772] kunit_try_run_case+0x1a5/0x480 [ 16.053797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.053818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.053840] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.053861] ? __kthread_parkme+0x82/0x180 [ 16.053883] ? preempt_count_sub+0x50/0x80 [ 16.053907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.053929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.053950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.053971] kthread+0x337/0x6f0 [ 16.053990] ? trace_preempt_on+0x20/0xc0 [ 16.054014] ? __pfx_kthread+0x10/0x10 [ 16.054033] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.054054] ? calculate_sigpending+0x7b/0xa0 [ 16.054078] ? __pfx_kthread+0x10/0x10 [ 16.054099] ret_from_fork+0x116/0x1d0 [ 16.054116] ? __pfx_kthread+0x10/0x10 [ 16.054136] ret_from_fork_asm+0x1a/0x30 [ 16.054167] </TASK> [ 16.054180] [ 16.063483] The buggy address belongs to the variable: [ 16.063926] global_array+0xd/0x40 [ 16.064299] [ 16.064514] The buggy address belongs to the physical page: [ 16.064991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2d25f [ 16.065298] flags: 0x100000000002000(reserved|node=0|zone=1) [ 16.065714] raw: 0100000000002000 ffffea0000b497c8 ffffea0000b497c8 0000000000000000 [ 16.066328] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 16.067127] page dumped because: kasan: bad access detected [ 16.067369] [ 16.067536] Memory state around the buggy address: [ 16.068186] ffffffffaa85fd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.069949] ffffffffaa85fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.070203] >ffffffffaa85fe80: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 16.070685] ^ [ 16.071106] ffffffffaa85ff00: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 16.071957] ffffffffaa85ff80: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 16.072424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
[ 15.926734] ================================================================== [ 15.927173] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 15.927724] Free of addr ffff8881029a4000 by task kunit_try_catch/255 [ 15.928017] [ 15.928760] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.928916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.928946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.929115] Call Trace: [ 15.929153] <TASK> [ 15.929187] dump_stack_lvl+0x73/0xb0 [ 15.929254] print_report+0xd1/0x650 [ 15.929283] ? __virt_addr_valid+0x1db/0x2d0 [ 15.929311] ? kasan_addr_to_slab+0x11/0xa0 [ 15.929333] ? mempool_double_free_helper+0x184/0x370 [ 15.929359] kasan_report_invalid_free+0x10a/0x130 [ 15.929385] ? mempool_double_free_helper+0x184/0x370 [ 15.929413] ? mempool_double_free_helper+0x184/0x370 [ 15.929436] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 15.929482] mempool_free+0x2ec/0x380 [ 15.929524] mempool_double_free_helper+0x184/0x370 [ 15.929562] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 15.929609] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.929635] ? finish_task_switch.isra.0+0x153/0x700 [ 15.929664] mempool_kmalloc_large_double_free+0xed/0x140 [ 15.929690] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 15.929717] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.929735] ? __pfx_mempool_kfree+0x10/0x10 [ 15.929756] ? __pfx_read_tsc+0x10/0x10 [ 15.929778] ? ktime_get_ts64+0x86/0x230 [ 15.929803] kunit_try_run_case+0x1a5/0x480 [ 15.929828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.929872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.929893] ? __kthread_parkme+0x82/0x180 [ 15.929914] ? preempt_count_sub+0x50/0x80 [ 15.929937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.929981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.930002] kthread+0x337/0x6f0 [ 15.930020] ? trace_preempt_on+0x20/0xc0 [ 15.930045] ? __pfx_kthread+0x10/0x10 [ 15.930065] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.930085] ? calculate_sigpending+0x7b/0xa0 [ 15.930109] ? __pfx_kthread+0x10/0x10 [ 15.930130] ret_from_fork+0x116/0x1d0 [ 15.930148] ? __pfx_kthread+0x10/0x10 [ 15.930167] ret_from_fork_asm+0x1a/0x30 [ 15.930199] </TASK> [ 15.930212] [ 15.941314] The buggy address belongs to the physical page: [ 15.941717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 15.942478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.942803] flags: 0x200000000000040(head|node=0|zone=2) [ 15.943577] page_type: f8(unknown) [ 15.943759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.944410] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.944852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.945314] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.945460] head: 0200000000000002 ffffea00040a6901 00000000ffffffff 00000000ffffffff [ 15.945591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.946789] page dumped because: kasan: bad access detected [ 15.947127] [ 15.947307] Memory state around the buggy address: [ 15.947633] ffff8881029a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.947873] ffff8881029a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.948192] >ffff8881029a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.948644] ^ [ 15.948908] ffff8881029a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.949197] ffff8881029a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.949491] ================================================================== [ 15.883059] ================================================================== [ 15.883536] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 15.884485] Free of addr ffff88810231a600 by task kunit_try_catch/253 [ 15.884924] [ 15.885658] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.885728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.885741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.885764] Call Trace: [ 15.885780] <TASK> [ 15.885802] dump_stack_lvl+0x73/0xb0 [ 15.885838] print_report+0xd1/0x650 [ 15.885862] ? __virt_addr_valid+0x1db/0x2d0 [ 15.885886] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.885907] ? mempool_double_free_helper+0x184/0x370 [ 15.885929] kasan_report_invalid_free+0x10a/0x130 [ 15.885952] ? mempool_double_free_helper+0x184/0x370 [ 15.885976] ? mempool_double_free_helper+0x184/0x370 [ 15.885998] ? mempool_double_free_helper+0x184/0x370 [ 15.886020] check_slab_allocation+0x101/0x130 [ 15.886041] __kasan_mempool_poison_object+0x91/0x1d0 [ 15.886064] mempool_free+0x2ec/0x380 [ 15.886088] mempool_double_free_helper+0x184/0x370 [ 15.886111] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 15.886136] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.886156] ? irqentry_exit+0x2a/0x60 [ 15.886177] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.886201] mempool_kmalloc_double_free+0xed/0x140 [ 15.886244] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 15.886287] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.886318] ? __pfx_mempool_kfree+0x10/0x10 [ 15.886369] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 15.886418] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 15.886460] kunit_try_run_case+0x1a5/0x480 [ 15.886514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.886586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.886621] ? __kthread_parkme+0x82/0x180 [ 15.886657] ? preempt_count_sub+0x50/0x80 [ 15.886695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.886768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.886805] kthread+0x337/0x6f0 [ 15.886837] ? trace_preempt_on+0x20/0xc0 [ 15.886875] ? __pfx_kthread+0x10/0x10 [ 15.886908] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.886943] ? calculate_sigpending+0x7b/0xa0 [ 15.886979] ? __pfx_kthread+0x10/0x10 [ 15.887014] ret_from_fork+0x116/0x1d0 [ 15.887052] ? __pfx_kthread+0x10/0x10 [ 15.887090] ret_from_fork_asm+0x1a/0x30 [ 15.887151] </TASK> [ 15.887167] [ 15.900713] Allocated by task 253: [ 15.901649] kasan_save_stack+0x45/0x70 [ 15.902016] kasan_save_track+0x18/0x40 [ 15.902174] kasan_save_alloc_info+0x3b/0x50 [ 15.902336] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.902862] remove_element+0x11e/0x190 [ 15.903139] mempool_alloc_preallocated+0x4d/0x90 [ 15.903400] mempool_double_free_helper+0x8a/0x370 [ 15.904624] mempool_kmalloc_double_free+0xed/0x140 [ 15.905046] kunit_try_run_case+0x1a5/0x480 [ 15.905319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.905862] kthread+0x337/0x6f0 [ 15.906096] ret_from_fork+0x116/0x1d0 [ 15.906268] ret_from_fork_asm+0x1a/0x30 [ 15.906512] [ 15.906743] Freed by task 253: [ 15.907178] kasan_save_stack+0x45/0x70 [ 15.907738] kasan_save_track+0x18/0x40 [ 15.908204] kasan_save_free_info+0x3f/0x60 [ 15.908504] __kasan_mempool_poison_object+0x131/0x1d0 [ 15.909081] mempool_free+0x2ec/0x380 [ 15.909284] mempool_double_free_helper+0x109/0x370 [ 15.909697] mempool_kmalloc_double_free+0xed/0x140 [ 15.909912] kunit_try_run_case+0x1a5/0x480 [ 15.910560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.910865] kthread+0x337/0x6f0 [ 15.911135] ret_from_fork+0x116/0x1d0 [ 15.911363] ret_from_fork_asm+0x1a/0x30 [ 15.912133] [ 15.912258] The buggy address belongs to the object at ffff88810231a600 [ 15.912258] which belongs to the cache kmalloc-128 of size 128 [ 15.912908] The buggy address is located 0 bytes inside of [ 15.912908] 128-byte region [ffff88810231a600, ffff88810231a680) [ 15.913479] [ 15.913651] The buggy address belongs to the physical page: [ 15.913945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a [ 15.914435] flags: 0x200000000000000(node=0|zone=2) [ 15.914920] page_type: f5(slab) [ 15.915111] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.915388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.916319] page dumped because: kasan: bad access detected [ 15.916903] [ 15.917074] Memory state around the buggy address: [ 15.917431] ffff88810231a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.918079] ffff88810231a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.918681] >ffff88810231a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.918947] ^ [ 15.919238] ffff88810231a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920079] ffff88810231a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.920558] ================================================================== [ 15.954383] ================================================================== [ 15.955523] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 15.956218] Free of addr ffff888103c2c000 by task kunit_try_catch/257 [ 15.956461] [ 15.956648] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.956706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.956719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.956742] Call Trace: [ 15.956758] <TASK> [ 15.956778] dump_stack_lvl+0x73/0xb0 [ 15.956812] print_report+0xd1/0x650 [ 15.956836] ? __virt_addr_valid+0x1db/0x2d0 [ 15.956862] ? kasan_addr_to_slab+0x11/0xa0 [ 15.956882] ? mempool_double_free_helper+0x184/0x370 [ 15.956906] kasan_report_invalid_free+0x10a/0x130 [ 15.956929] ? mempool_double_free_helper+0x184/0x370 [ 15.956955] ? mempool_double_free_helper+0x184/0x370 [ 15.956977] __kasan_mempool_poison_pages+0x115/0x130 [ 15.957001] mempool_free+0x290/0x380 [ 15.957024] mempool_double_free_helper+0x184/0x370 [ 15.957048] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 15.957073] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.957095] ? finish_task_switch.isra.0+0x153/0x700 [ 15.957121] mempool_page_alloc_double_free+0xe8/0x140 [ 15.957145] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 15.957171] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 15.957189] ? __pfx_mempool_free_pages+0x10/0x10 [ 15.957210] ? __pfx_read_tsc+0x10/0x10 [ 15.957271] ? ktime_get_ts64+0x86/0x230 [ 15.957300] kunit_try_run_case+0x1a5/0x480 [ 15.957327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.957371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.957395] ? __kthread_parkme+0x82/0x180 [ 15.957425] ? preempt_count_sub+0x50/0x80 [ 15.957470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.957553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.958015] kthread+0x337/0x6f0 [ 15.958086] ? trace_preempt_on+0x20/0xc0 [ 15.958133] ? __pfx_kthread+0x10/0x10 [ 15.958170] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.958207] ? calculate_sigpending+0x7b/0xa0 [ 15.958263] ? __pfx_kthread+0x10/0x10 [ 15.958356] ret_from_fork+0x116/0x1d0 [ 15.958397] ? __pfx_kthread+0x10/0x10 [ 15.958437] ret_from_fork_asm+0x1a/0x30 [ 15.958713] </TASK> [ 15.958761] [ 15.971285] The buggy address belongs to the physical page: [ 15.971827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c [ 15.972447] flags: 0x200000000000000(node=0|zone=2) [ 15.973039] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 15.973426] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.974164] page dumped because: kasan: bad access detected [ 15.974560] [ 15.974672] Memory state around the buggy address: [ 15.975164] ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.975617] ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.975998] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.976295] ^ [ 15.976515] ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.976854] ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.977173] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
[ 15.853734] ================================================================== [ 15.854210] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.854782] Read of size 1 at addr ffff888103c2c000 by task kunit_try_catch/251 [ 15.855058] [ 15.855319] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.855931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.855957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.855996] Call Trace: [ 15.856024] <TASK> [ 15.856059] dump_stack_lvl+0x73/0xb0 [ 15.856399] print_report+0xd1/0x650 [ 15.856429] ? __virt_addr_valid+0x1db/0x2d0 [ 15.856456] ? mempool_uaf_helper+0x392/0x400 [ 15.856617] ? kasan_addr_to_slab+0x11/0xa0 [ 15.856649] ? mempool_uaf_helper+0x392/0x400 [ 15.856672] kasan_report+0x141/0x180 [ 15.856696] ? mempool_uaf_helper+0x392/0x400 [ 15.856722] __asan_report_load1_noabort+0x18/0x20 [ 15.856742] mempool_uaf_helper+0x392/0x400 [ 15.856764] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.856788] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.856810] ? finish_task_switch.isra.0+0x153/0x700 [ 15.856835] mempool_page_alloc_uaf+0xed/0x140 [ 15.856858] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 15.856883] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 15.856905] ? __pfx_mempool_free_pages+0x10/0x10 [ 15.856927] ? __pfx_read_tsc+0x10/0x10 [ 15.856948] ? ktime_get_ts64+0x86/0x230 [ 15.856972] kunit_try_run_case+0x1a5/0x480 [ 15.856997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.857018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.857040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.857062] ? __kthread_parkme+0x82/0x180 [ 15.857083] ? preempt_count_sub+0x50/0x80 [ 15.857105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.857127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.857149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.857171] kthread+0x337/0x6f0 [ 15.857189] ? trace_preempt_on+0x20/0xc0 [ 15.857212] ? __pfx_kthread+0x10/0x10 [ 15.857255] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.857275] ? calculate_sigpending+0x7b/0xa0 [ 15.857298] ? __pfx_kthread+0x10/0x10 [ 15.857319] ret_from_fork+0x116/0x1d0 [ 15.857337] ? __pfx_kthread+0x10/0x10 [ 15.857356] ret_from_fork_asm+0x1a/0x30 [ 15.857388] </TASK> [ 15.857401] [ 15.870560] The buggy address belongs to the physical page: [ 15.871493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c [ 15.872347] flags: 0x200000000000000(node=0|zone=2) [ 15.872922] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 15.873435] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.873914] page dumped because: kasan: bad access detected [ 15.874139] [ 15.874321] Memory state around the buggy address: [ 15.874550] ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.874866] ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.875332] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.876178] ^ [ 15.876445] ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.877084] ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.877423] ================================================================== [ 15.772423] ================================================================== [ 15.773192] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.773647] Read of size 1 at addr ffff888103c2c000 by task kunit_try_catch/247 [ 15.774105] [ 15.774269] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.774381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.774408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.774449] Call Trace: [ 15.774475] <TASK> [ 15.774508] dump_stack_lvl+0x73/0xb0 [ 15.774565] print_report+0xd1/0x650 [ 15.774613] ? __virt_addr_valid+0x1db/0x2d0 [ 15.774663] ? mempool_uaf_helper+0x392/0x400 [ 15.774710] ? kasan_addr_to_slab+0x11/0xa0 [ 15.774751] ? mempool_uaf_helper+0x392/0x400 [ 15.774790] kasan_report+0x141/0x180 [ 15.774834] ? mempool_uaf_helper+0x392/0x400 [ 15.774886] __asan_report_load1_noabort+0x18/0x20 [ 15.774924] mempool_uaf_helper+0x392/0x400 [ 15.774965] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.775014] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.775058] ? finish_task_switch.isra.0+0x153/0x700 [ 15.775118] mempool_kmalloc_large_uaf+0xef/0x140 [ 15.775155] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 15.775214] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.775265] ? __pfx_mempool_kfree+0x10/0x10 [ 15.775304] ? __pfx_read_tsc+0x10/0x10 [ 15.775343] ? ktime_get_ts64+0x86/0x230 [ 15.775388] kunit_try_run_case+0x1a5/0x480 [ 15.775431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.775493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.775539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.775587] ? __kthread_parkme+0x82/0x180 [ 15.775626] ? preempt_count_sub+0x50/0x80 [ 15.775667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.775708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.775751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.775790] kthread+0x337/0x6f0 [ 15.775819] ? trace_preempt_on+0x20/0xc0 [ 15.775855] ? __pfx_kthread+0x10/0x10 [ 15.775888] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.775928] ? calculate_sigpending+0x7b/0xa0 [ 15.775974] ? __pfx_kthread+0x10/0x10 [ 15.776035] ret_from_fork+0x116/0x1d0 [ 15.776056] ? __pfx_kthread+0x10/0x10 [ 15.776077] ret_from_fork_asm+0x1a/0x30 [ 15.776109] </TASK> [ 15.776123] [ 15.786754] The buggy address belongs to the physical page: [ 15.787162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c [ 15.787860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.788268] flags: 0x200000000000040(head|node=0|zone=2) [ 15.788751] page_type: f8(unknown) [ 15.788937] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.789433] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.789992] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.790851] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.791425] head: 0200000000000002 ffffea00040f0b01 00000000ffffffff 00000000ffffffff [ 15.791931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.792312] page dumped because: kasan: bad access detected [ 15.792718] [ 15.792888] Memory state around the buggy address: [ 15.793143] ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.793580] ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.793848] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.794278] ^ [ 15.794676] ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.795154] ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.795412] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
[ 15.805408] ================================================================== [ 15.806446] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.807328] Read of size 1 at addr ffff888102b6a240 by task kunit_try_catch/249 [ 15.807655] [ 15.807821] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.807982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.808011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.808054] Call Trace: [ 15.808084] <TASK> [ 15.808122] dump_stack_lvl+0x73/0xb0 [ 15.808189] print_report+0xd1/0x650 [ 15.808256] ? __virt_addr_valid+0x1db/0x2d0 [ 15.808312] ? mempool_uaf_helper+0x392/0x400 [ 15.808353] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.808405] ? mempool_uaf_helper+0x392/0x400 [ 15.808652] kasan_report+0x141/0x180 [ 15.808718] ? mempool_uaf_helper+0x392/0x400 [ 15.808780] __asan_report_load1_noabort+0x18/0x20 [ 15.808818] mempool_uaf_helper+0x392/0x400 [ 15.808858] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.808916] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.808947] ? finish_task_switch.isra.0+0x153/0x700 [ 15.808976] mempool_slab_uaf+0xea/0x140 [ 15.808999] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 15.809023] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 15.809048] ? __pfx_mempool_free_slab+0x10/0x10 [ 15.809072] ? __pfx_read_tsc+0x10/0x10 [ 15.809095] ? ktime_get_ts64+0x86/0x230 [ 15.809123] kunit_try_run_case+0x1a5/0x480 [ 15.809152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.809175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.809200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.809245] ? __kthread_parkme+0x82/0x180 [ 15.809272] ? preempt_count_sub+0x50/0x80 [ 15.809297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.809322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.809346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.809370] kthread+0x337/0x6f0 [ 15.809391] ? trace_preempt_on+0x20/0xc0 [ 15.809417] ? __pfx_kthread+0x10/0x10 [ 15.809438] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.809465] ? calculate_sigpending+0x7b/0xa0 [ 15.809512] ? __pfx_kthread+0x10/0x10 [ 15.809546] ret_from_fork+0x116/0x1d0 [ 15.809576] ? __pfx_kthread+0x10/0x10 [ 15.809619] ret_from_fork_asm+0x1a/0x30 [ 15.809655] </TASK> [ 15.809669] [ 15.821046] Allocated by task 249: [ 15.821208] kasan_save_stack+0x45/0x70 [ 15.822388] kasan_save_track+0x18/0x40 [ 15.822601] kasan_save_alloc_info+0x3b/0x50 [ 15.822752] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 15.824219] remove_element+0x11e/0x190 [ 15.824681] mempool_alloc_preallocated+0x4d/0x90 [ 15.824988] mempool_uaf_helper+0x96/0x400 [ 15.825219] mempool_slab_uaf+0xea/0x140 [ 15.825436] kunit_try_run_case+0x1a5/0x480 [ 15.825664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.825983] kthread+0x337/0x6f0 [ 15.826186] ret_from_fork+0x116/0x1d0 [ 15.826423] ret_from_fork_asm+0x1a/0x30 [ 15.826621] [ 15.826731] Freed by task 249: [ 15.826885] kasan_save_stack+0x45/0x70 [ 15.827177] kasan_save_track+0x18/0x40 [ 15.827517] kasan_save_free_info+0x3f/0x60 [ 15.827922] __kasan_mempool_poison_object+0x131/0x1d0 [ 15.829068] mempool_free+0x2ec/0x380 [ 15.829398] mempool_uaf_helper+0x11a/0x400 [ 15.829908] mempool_slab_uaf+0xea/0x140 [ 15.830174] kunit_try_run_case+0x1a5/0x480 [ 15.830738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.831137] kthread+0x337/0x6f0 [ 15.831357] ret_from_fork+0x116/0x1d0 [ 15.832050] ret_from_fork_asm+0x1a/0x30 [ 15.832450] [ 15.832892] The buggy address belongs to the object at ffff888102b6a240 [ 15.832892] which belongs to the cache test_cache of size 123 [ 15.833781] The buggy address is located 0 bytes inside of [ 15.833781] freed 123-byte region [ffff888102b6a240, ffff888102b6a2bb) [ 15.834429] [ 15.834853] The buggy address belongs to the physical page: [ 15.835262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6a [ 15.835667] flags: 0x200000000000000(node=0|zone=2) [ 15.835922] page_type: f5(slab) [ 15.836203] raw: 0200000000000000 ffff8881009b3dc0 dead000000000122 0000000000000000 [ 15.837285] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 15.837933] page dumped because: kasan: bad access detected [ 15.838510] [ 15.838857] Memory state around the buggy address: [ 15.839293] ffff888102b6a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840160] ffff888102b6a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.840631] >ffff888102b6a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 15.841069] ^ [ 15.841604] ffff888102b6a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.842014] ffff888102b6a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842342] ================================================================== [ 15.731092] ================================================================== [ 15.731578] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.732529] Read of size 1 at addr ffff88810231a200 by task kunit_try_catch/245 [ 15.732934] [ 15.733386] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.733493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.733515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.733554] Call Trace: [ 15.733576] <TASK> [ 15.733608] dump_stack_lvl+0x73/0xb0 [ 15.733660] print_report+0xd1/0x650 [ 15.733702] ? __virt_addr_valid+0x1db/0x2d0 [ 15.733744] ? mempool_uaf_helper+0x392/0x400 [ 15.733777] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.733817] ? mempool_uaf_helper+0x392/0x400 [ 15.733857] kasan_report+0x141/0x180 [ 15.733899] ? mempool_uaf_helper+0x392/0x400 [ 15.733949] __asan_report_load1_noabort+0x18/0x20 [ 15.733983] mempool_uaf_helper+0x392/0x400 [ 15.734025] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.734070] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.734109] ? irqentry_exit+0x2a/0x60 [ 15.734150] mempool_kmalloc_uaf+0xef/0x140 [ 15.734185] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 15.734212] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.734265] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.734298] ? __pfx_mempool_kfree+0x10/0x10 [ 15.734342] ? __pfx_read_tsc+0x10/0x10 [ 15.734383] ? ktime_get_ts64+0x86/0x230 [ 15.734433] kunit_try_run_case+0x1a5/0x480 [ 15.734473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.734563] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.734642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.734686] ? __kthread_parkme+0x82/0x180 [ 15.734717] ? preempt_count_sub+0x50/0x80 [ 15.734741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.734763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.734785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.734806] kthread+0x337/0x6f0 [ 15.734825] ? trace_preempt_on+0x20/0xc0 [ 15.734848] ? __pfx_kthread+0x10/0x10 [ 15.734867] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.734887] ? calculate_sigpending+0x7b/0xa0 [ 15.734910] ? __pfx_kthread+0x10/0x10 [ 15.734930] ret_from_fork+0x116/0x1d0 [ 15.734948] ? __pfx_kthread+0x10/0x10 [ 15.734966] ret_from_fork_asm+0x1a/0x30 [ 15.734996] </TASK> [ 15.735010] [ 15.745304] Allocated by task 245: [ 15.745489] kasan_save_stack+0x45/0x70 [ 15.745688] kasan_save_track+0x18/0x40 [ 15.745859] kasan_save_alloc_info+0x3b/0x50 [ 15.746031] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.746406] remove_element+0x11e/0x190 [ 15.746693] mempool_alloc_preallocated+0x4d/0x90 [ 15.747038] mempool_uaf_helper+0x96/0x400 [ 15.747945] mempool_kmalloc_uaf+0xef/0x140 [ 15.748292] kunit_try_run_case+0x1a5/0x480 [ 15.748759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749002] kthread+0x337/0x6f0 [ 15.749168] ret_from_fork+0x116/0x1d0 [ 15.749899] ret_from_fork_asm+0x1a/0x30 [ 15.750252] [ 15.750423] Freed by task 245: [ 15.750839] kasan_save_stack+0x45/0x70 [ 15.751156] kasan_save_track+0x18/0x40 [ 15.751351] kasan_save_free_info+0x3f/0x60 [ 15.751792] __kasan_mempool_poison_object+0x131/0x1d0 [ 15.752062] mempool_free+0x2ec/0x380 [ 15.752325] mempool_uaf_helper+0x11a/0x400 [ 15.752662] mempool_kmalloc_uaf+0xef/0x140 [ 15.752996] kunit_try_run_case+0x1a5/0x480 [ 15.753230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.753434] kthread+0x337/0x6f0 [ 15.755448] ret_from_fork+0x116/0x1d0 [ 15.756250] ret_from_fork_asm+0x1a/0x30 [ 15.757153] [ 15.757638] The buggy address belongs to the object at ffff88810231a200 [ 15.757638] which belongs to the cache kmalloc-128 of size 128 [ 15.759663] The buggy address is located 0 bytes inside of [ 15.759663] freed 128-byte region [ffff88810231a200, ffff88810231a280) [ 15.760197] [ 15.760326] The buggy address belongs to the physical page: [ 15.760604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a [ 15.760933] flags: 0x200000000000000(node=0|zone=2) [ 15.761923] page_type: f5(slab) [ 15.762183] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.762647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.763147] page dumped because: kasan: bad access detected [ 15.763356] [ 15.764034] Memory state around the buggy address: [ 15.764366] ffff88810231a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.764801] ffff88810231a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765268] >ffff88810231a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.765546] ^ [ 15.765790] ffff88810231a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.766030] ffff88810231a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.766504] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
[ 15.690966] ================================================================== [ 15.691410] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.691928] Read of size 1 at addr ffff888102b682bb by task kunit_try_catch/243 [ 15.692667] [ 15.692924] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.693344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.693382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.693451] Call Trace: [ 15.693479] <TASK> [ 15.693520] dump_stack_lvl+0x73/0xb0 [ 15.693631] print_report+0xd1/0x650 [ 15.693678] ? __virt_addr_valid+0x1db/0x2d0 [ 15.693725] ? mempool_oob_right_helper+0x318/0x380 [ 15.693769] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.693812] ? mempool_oob_right_helper+0x318/0x380 [ 15.693855] kasan_report+0x141/0x180 [ 15.693896] ? mempool_oob_right_helper+0x318/0x380 [ 15.693933] __asan_report_load1_noabort+0x18/0x20 [ 15.693956] mempool_oob_right_helper+0x318/0x380 [ 15.693984] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.694014] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.694042] ? finish_task_switch.isra.0+0x153/0x700 [ 15.694073] mempool_slab_oob_right+0xed/0x140 [ 15.694098] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 15.694125] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 15.694149] ? __pfx_mempool_free_slab+0x10/0x10 [ 15.694174] ? __pfx_read_tsc+0x10/0x10 [ 15.694197] ? ktime_get_ts64+0x86/0x230 [ 15.694248] kunit_try_run_case+0x1a5/0x480 [ 15.694280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.694306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.694341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.694376] ? __kthread_parkme+0x82/0x180 [ 15.694403] ? preempt_count_sub+0x50/0x80 [ 15.694430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.694462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.694534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.694580] kthread+0x337/0x6f0 [ 15.694614] ? trace_preempt_on+0x20/0xc0 [ 15.694654] ? __pfx_kthread+0x10/0x10 [ 15.694676] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.694698] ? calculate_sigpending+0x7b/0xa0 [ 15.694724] ? __pfx_kthread+0x10/0x10 [ 15.694747] ret_from_fork+0x116/0x1d0 [ 15.694766] ? __pfx_kthread+0x10/0x10 [ 15.694788] ret_from_fork_asm+0x1a/0x30 [ 15.694822] </TASK> [ 15.694835] [ 15.706611] Allocated by task 243: [ 15.706905] kasan_save_stack+0x45/0x70 [ 15.707247] kasan_save_track+0x18/0x40 [ 15.707549] kasan_save_alloc_info+0x3b/0x50 [ 15.707857] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 15.708754] remove_element+0x11e/0x190 [ 15.709054] mempool_alloc_preallocated+0x4d/0x90 [ 15.709352] mempool_oob_right_helper+0x8a/0x380 [ 15.709805] mempool_slab_oob_right+0xed/0x140 [ 15.710133] kunit_try_run_case+0x1a5/0x480 [ 15.710426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.710937] kthread+0x337/0x6f0 [ 15.711198] ret_from_fork+0x116/0x1d0 [ 15.711414] ret_from_fork_asm+0x1a/0x30 [ 15.712109] [ 15.712254] The buggy address belongs to the object at ffff888102b68240 [ 15.712254] which belongs to the cache test_cache of size 123 [ 15.713076] The buggy address is located 0 bytes to the right of [ 15.713076] allocated 123-byte region [ffff888102b68240, ffff888102b682bb) [ 15.713704] [ 15.713859] The buggy address belongs to the physical page: [ 15.714234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68 [ 15.714924] flags: 0x200000000000000(node=0|zone=2) [ 15.715164] page_type: f5(slab) [ 15.715444] raw: 0200000000000000 ffff8881009b3c80 dead000000000122 0000000000000000 [ 15.716190] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 15.716847] page dumped because: kasan: bad access detected [ 15.717092] [ 15.717195] Memory state around the buggy address: [ 15.717699] ffff888102b68180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.718111] ffff888102b68200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 15.718648] >ffff888102b68280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 15.719048] ^ [ 15.719299] ffff888102b68300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720167] ffff888102b68380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720741] ================================================================== [ 15.660100] ================================================================== [ 15.660553] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.661334] Read of size 1 at addr ffff888103c2a001 by task kunit_try_catch/241 [ 15.662112] [ 15.662303] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.662414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.662433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.662460] Call Trace: [ 15.662486] <TASK> [ 15.662515] dump_stack_lvl+0x73/0xb0 [ 15.662556] print_report+0xd1/0x650 [ 15.662580] ? __virt_addr_valid+0x1db/0x2d0 [ 15.662605] ? mempool_oob_right_helper+0x318/0x380 [ 15.662628] ? kasan_addr_to_slab+0x11/0xa0 [ 15.662648] ? mempool_oob_right_helper+0x318/0x380 [ 15.662670] kasan_report+0x141/0x180 [ 15.662691] ? mempool_oob_right_helper+0x318/0x380 [ 15.662718] __asan_report_load1_noabort+0x18/0x20 [ 15.662737] mempool_oob_right_helper+0x318/0x380 [ 15.662761] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.662786] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.662810] ? finish_task_switch.isra.0+0x153/0x700 [ 15.662836] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 15.662859] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 15.662884] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.662906] ? __pfx_mempool_kfree+0x10/0x10 [ 15.662927] ? __pfx_read_tsc+0x10/0x10 [ 15.662948] ? ktime_get_ts64+0x86/0x230 [ 15.662973] kunit_try_run_case+0x1a5/0x480 [ 15.662999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.663019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.663042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.663064] ? __kthread_parkme+0x82/0x180 [ 15.663085] ? preempt_count_sub+0x50/0x80 [ 15.663107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.663129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.663151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.663173] kthread+0x337/0x6f0 [ 15.663192] ? trace_preempt_on+0x20/0xc0 [ 15.663214] ? __pfx_kthread+0x10/0x10 [ 15.663261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.663431] ? calculate_sigpending+0x7b/0xa0 [ 15.663575] ? __pfx_kthread+0x10/0x10 [ 15.663621] ret_from_fork+0x116/0x1d0 [ 15.663663] ? __pfx_kthread+0x10/0x10 [ 15.663707] ret_from_fork_asm+0x1a/0x30 [ 15.663791] </TASK> [ 15.663817] [ 15.674855] The buggy address belongs to the physical page: [ 15.675313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c28 [ 15.675830] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.676563] flags: 0x200000000000040(head|node=0|zone=2) [ 15.676922] page_type: f8(unknown) [ 15.677264] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.677886] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.678340] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.678782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.679179] head: 0200000000000002 ffffea00040f0a01 00000000ffffffff 00000000ffffffff [ 15.679681] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.679940] page dumped because: kasan: bad access detected [ 15.680133] [ 15.680315] Memory state around the buggy address: [ 15.680747] ffff888103c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.681385] ffff888103c29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.681865] >ffff888103c2a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.682371] ^ [ 15.682546] ffff888103c2a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.683151] ffff888103c2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.683693] ================================================================== [ 15.625661] ================================================================== [ 15.626110] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.626869] Read of size 1 at addr ffff888102b5b373 by task kunit_try_catch/239 [ 15.627435] [ 15.628046] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.628169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.628194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.628250] Call Trace: [ 15.628292] <TASK> [ 15.628384] dump_stack_lvl+0x73/0xb0 [ 15.628560] print_report+0xd1/0x650 [ 15.628628] ? __virt_addr_valid+0x1db/0x2d0 [ 15.628674] ? mempool_oob_right_helper+0x318/0x380 [ 15.628704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.628727] ? mempool_oob_right_helper+0x318/0x380 [ 15.628751] kasan_report+0x141/0x180 [ 15.628773] ? mempool_oob_right_helper+0x318/0x380 [ 15.628802] __asan_report_load1_noabort+0x18/0x20 [ 15.628823] mempool_oob_right_helper+0x318/0x380 [ 15.628848] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.628875] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.628899] ? irqentry_exit+0x2a/0x60 [ 15.628922] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.628949] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.628973] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.629001] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.629022] ? __pfx_mempool_kfree+0x10/0x10 [ 15.629043] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.629069] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.629094] kunit_try_run_case+0x1a5/0x480 [ 15.629121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.629142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.629165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.629187] ? __kthread_parkme+0x82/0x180 [ 15.629210] ? preempt_count_sub+0x50/0x80 [ 15.629257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.629283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.629307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.629329] kthread+0x337/0x6f0 [ 15.629349] ? trace_preempt_on+0x20/0xc0 [ 15.629372] ? __pfx_kthread+0x10/0x10 [ 15.629392] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.629414] ? calculate_sigpending+0x7b/0xa0 [ 15.629440] ? __pfx_kthread+0x10/0x10 [ 15.629476] ret_from_fork+0x116/0x1d0 [ 15.629523] ? __pfx_kthread+0x10/0x10 [ 15.629557] ret_from_fork_asm+0x1a/0x30 [ 15.629610] </TASK> [ 15.629630] [ 15.639245] Allocated by task 239: [ 15.639428] kasan_save_stack+0x45/0x70 [ 15.639639] kasan_save_track+0x18/0x40 [ 15.639936] kasan_save_alloc_info+0x3b/0x50 [ 15.640340] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.640769] remove_element+0x11e/0x190 [ 15.641071] mempool_alloc_preallocated+0x4d/0x90 [ 15.641318] mempool_oob_right_helper+0x8a/0x380 [ 15.641504] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.641696] kunit_try_run_case+0x1a5/0x480 [ 15.642011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.642395] kthread+0x337/0x6f0 [ 15.642678] ret_from_fork+0x116/0x1d0 [ 15.642940] ret_from_fork_asm+0x1a/0x30 [ 15.643114] [ 15.643414] The buggy address belongs to the object at ffff888102b5b300 [ 15.643414] which belongs to the cache kmalloc-128 of size 128 [ 15.644881] The buggy address is located 0 bytes to the right of [ 15.644881] allocated 115-byte region [ffff888102b5b300, ffff888102b5b373) [ 15.645518] [ 15.645826] The buggy address belongs to the physical page: [ 15.646134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 15.646780] flags: 0x200000000000000(node=0|zone=2) [ 15.647129] page_type: f5(slab) [ 15.647432] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.647732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.647988] page dumped because: kasan: bad access detected [ 15.648187] [ 15.648560] Memory state around the buggy address: [ 15.648925] ffff888102b5b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.649403] ffff888102b5b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.650416] >ffff888102b5b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.651004] ^ [ 15.651264] ffff888102b5b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651735] ffff888102b5b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.652267] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
[ 15.034267] ================================================================== [ 15.034788] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 15.035324] Read of size 1 at addr ffff8881009b3a00 by task kunit_try_catch/233 [ 15.035678] [ 15.035821] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.036053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.036077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.036116] Call Trace: [ 15.036140] <TASK> [ 15.036174] dump_stack_lvl+0x73/0xb0 [ 15.036248] print_report+0xd1/0x650 [ 15.036298] ? __virt_addr_valid+0x1db/0x2d0 [ 15.036350] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.036395] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.036443] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.036484] kasan_report+0x141/0x180 [ 15.036523] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.036562] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.036596] __kasan_check_byte+0x3d/0x50 [ 15.036638] kmem_cache_destroy+0x25/0x1d0 [ 15.036684] kmem_cache_double_destroy+0x1bf/0x380 [ 15.036720] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 15.036982] ? finish_task_switch.isra.0+0x153/0x700 [ 15.037034] ? __switch_to+0x47/0xf50 [ 15.037109] ? __pfx_read_tsc+0x10/0x10 [ 15.037172] ? ktime_get_ts64+0x86/0x230 [ 15.037234] kunit_try_run_case+0x1a5/0x480 [ 15.037273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037298] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.037323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.037346] ? __kthread_parkme+0x82/0x180 [ 15.037376] ? preempt_count_sub+0x50/0x80 [ 15.037416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.037498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.037540] kthread+0x337/0x6f0 [ 15.037587] ? trace_preempt_on+0x20/0xc0 [ 15.037650] ? __pfx_kthread+0x10/0x10 [ 15.037694] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.037730] ? calculate_sigpending+0x7b/0xa0 [ 15.037778] ? __pfx_kthread+0x10/0x10 [ 15.037820] ret_from_fork+0x116/0x1d0 [ 15.037955] ? __pfx_kthread+0x10/0x10 [ 15.037995] ret_from_fork_asm+0x1a/0x30 [ 15.038056] </TASK> [ 15.038077] [ 15.050094] Allocated by task 233: [ 15.050465] kasan_save_stack+0x45/0x70 [ 15.050861] kasan_save_track+0x18/0x40 [ 15.051056] kasan_save_alloc_info+0x3b/0x50 [ 15.051250] __kasan_slab_alloc+0x91/0xa0 [ 15.051559] kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.052698] __kmem_cache_create_args+0x169/0x240 [ 15.053113] kmem_cache_double_destroy+0xd5/0x380 [ 15.053656] kunit_try_run_case+0x1a5/0x480 [ 15.053978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.054433] kthread+0x337/0x6f0 [ 15.054846] ret_from_fork+0x116/0x1d0 [ 15.055059] ret_from_fork_asm+0x1a/0x30 [ 15.055239] [ 15.055328] Freed by task 233: [ 15.055629] kasan_save_stack+0x45/0x70 [ 15.056464] kasan_save_track+0x18/0x40 [ 15.057065] kasan_save_free_info+0x3f/0x60 [ 15.057372] __kasan_slab_free+0x56/0x70 [ 15.057692] kmem_cache_free+0x249/0x420 [ 15.057930] slab_kmem_cache_release+0x2e/0x40 [ 15.058284] kmem_cache_release+0x16/0x20 [ 15.058723] kobject_put+0x181/0x450 [ 15.058967] sysfs_slab_release+0x16/0x20 [ 15.059333] kmem_cache_destroy+0xf0/0x1d0 [ 15.059575] kmem_cache_double_destroy+0x14e/0x380 [ 15.059770] kunit_try_run_case+0x1a5/0x480 [ 15.060874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.061572] kthread+0x337/0x6f0 [ 15.061854] ret_from_fork+0x116/0x1d0 [ 15.062120] ret_from_fork_asm+0x1a/0x30 [ 15.062441] [ 15.062568] The buggy address belongs to the object at ffff8881009b3a00 [ 15.062568] which belongs to the cache kmem_cache of size 208 [ 15.063330] The buggy address is located 0 bytes inside of [ 15.063330] freed 208-byte region [ffff8881009b3a00, ffff8881009b3ad0) [ 15.064063] [ 15.064181] The buggy address belongs to the physical page: [ 15.064393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009b3 [ 15.064850] flags: 0x200000000000000(node=0|zone=2) [ 15.065347] page_type: f5(slab) [ 15.065706] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000 [ 15.066163] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 15.067261] page dumped because: kasan: bad access detected [ 15.067506] [ 15.067615] Memory state around the buggy address: [ 15.067813] ffff8881009b3900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.068373] ffff8881009b3980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.068990] >ffff8881009b3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.069560] ^ [ 15.069991] ffff8881009b3a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 15.070419] ffff8881009b3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.071269] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
[ 14.962943] ================================================================== [ 14.963524] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510 [ 14.964518] Read of size 1 at addr ffff888102316000 by task kunit_try_catch/231 [ 14.964942] [ 14.965098] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.965315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.965337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.965381] Call Trace: [ 14.965409] <TASK> [ 14.965444] dump_stack_lvl+0x73/0xb0 [ 14.965522] print_report+0xd1/0x650 [ 14.965570] ? __virt_addr_valid+0x1db/0x2d0 [ 14.965612] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 14.965647] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.966101] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 14.966129] kasan_report+0x141/0x180 [ 14.966153] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 14.966179] __asan_report_load1_noabort+0x18/0x20 [ 14.966198] kmem_cache_rcu_uaf+0x3e3/0x510 [ 14.966238] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [ 14.966266] ? finish_task_switch.isra.0+0x153/0x700 [ 14.966292] ? __switch_to+0x47/0xf50 [ 14.966321] ? __pfx_read_tsc+0x10/0x10 [ 14.966354] ? ktime_get_ts64+0x86/0x230 [ 14.966381] kunit_try_run_case+0x1a5/0x480 [ 14.966409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.966430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.966858] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.966886] ? __kthread_parkme+0x82/0x180 [ 14.966911] ? preempt_count_sub+0x50/0x80 [ 14.966935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.966957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.966979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.967001] kthread+0x337/0x6f0 [ 14.967021] ? trace_preempt_on+0x20/0xc0 [ 14.967045] ? __pfx_kthread+0x10/0x10 [ 14.967064] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.967085] ? calculate_sigpending+0x7b/0xa0 [ 14.967109] ? __pfx_kthread+0x10/0x10 [ 14.967130] ret_from_fork+0x116/0x1d0 [ 14.967148] ? __pfx_kthread+0x10/0x10 [ 14.967168] ret_from_fork_asm+0x1a/0x30 [ 14.967200] </TASK> [ 14.967213] [ 14.977464] Allocated by task 231: [ 14.977900] kasan_save_stack+0x45/0x70 [ 14.978273] kasan_save_track+0x18/0x40 [ 14.978765] kasan_save_alloc_info+0x3b/0x50 [ 14.979049] __kasan_slab_alloc+0x91/0xa0 [ 14.979235] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.979629] kmem_cache_rcu_uaf+0x155/0x510 [ 14.980557] kunit_try_run_case+0x1a5/0x480 [ 14.981239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.981839] kthread+0x337/0x6f0 [ 14.982094] ret_from_fork+0x116/0x1d0 [ 14.982361] ret_from_fork_asm+0x1a/0x30 [ 14.982605] [ 14.982762] Freed by task 0: [ 14.982945] kasan_save_stack+0x45/0x70 [ 14.983869] kasan_save_track+0x18/0x40 [ 14.984200] kasan_save_free_info+0x3f/0x60 [ 14.984922] __kasan_slab_free+0x56/0x70 [ 14.985191] slab_free_after_rcu_debug+0xe4/0x310 [ 14.985688] rcu_core+0x66f/0x1c40 [ 14.985877] rcu_core_si+0x12/0x20 [ 14.986161] handle_softirqs+0x209/0x730 [ 14.986404] __irq_exit_rcu+0xc9/0x110 [ 14.986573] irq_exit_rcu+0x12/0x20 [ 14.986754] sysvec_apic_timer_interrupt+0x81/0x90 [ 14.987201] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 14.987726] [ 14.988295] Last potentially related work creation: [ 14.988570] kasan_save_stack+0x45/0x70 [ 14.989094] kasan_record_aux_stack+0xb2/0xc0 [ 14.989338] kmem_cache_free+0x131/0x420 [ 14.989670] kmem_cache_rcu_uaf+0x194/0x510 [ 14.990194] kunit_try_run_case+0x1a5/0x480 [ 14.990410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.990915] kthread+0x337/0x6f0 [ 14.991088] ret_from_fork+0x116/0x1d0 [ 14.991363] ret_from_fork_asm+0x1a/0x30 [ 14.992057] [ 14.992263] The buggy address belongs to the object at ffff888102316000 [ 14.992263] which belongs to the cache test_cache of size 200 [ 14.992848] The buggy address is located 0 bytes inside of [ 14.992848] freed 200-byte region [ffff888102316000, ffff8881023160c8) [ 14.993667] [ 14.993786] The buggy address belongs to the physical page: [ 14.994431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102316 [ 14.994836] flags: 0x200000000000000(node=0|zone=2) [ 14.995121] page_type: f5(slab) [ 14.995333] raw: 0200000000000000 ffff888102312140 dead000000000122 0000000000000000 [ 14.996259] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.996530] page dumped because: kasan: bad access detected [ 14.996894] [ 14.997049] Memory state around the buggy address: [ 14.997544] ffff888102315f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998125] ffff888102315f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998636] >ffff888102316000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.999054] ^ [ 14.999397] ffff888102316080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 15.000230] ffff888102316100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
[ 14.891230] ================================================================== [ 14.891765] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 14.892031] Free of addr ffff888102b5f001 by task kunit_try_catch/229 [ 14.892254] [ 14.892852] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.892982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.893028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.893076] Call Trace: [ 14.893123] <TASK> [ 14.893164] dump_stack_lvl+0x73/0xb0 [ 14.893247] print_report+0xd1/0x650 [ 14.893300] ? __virt_addr_valid+0x1db/0x2d0 [ 14.893353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.893393] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.893434] kasan_report_invalid_free+0x10a/0x130 [ 14.893494] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.893541] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.893586] check_slab_allocation+0x11f/0x130 [ 14.893627] __kasan_slab_pre_free+0x28/0x40 [ 14.893670] kmem_cache_free+0xed/0x420 [ 14.893718] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.893793] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.893856] kmem_cache_invalid_free+0x1d8/0x460 [ 14.893901] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 14.893943] ? finish_task_switch.isra.0+0x153/0x700 [ 14.893996] ? __switch_to+0x47/0xf50 [ 14.894062] ? __pfx_read_tsc+0x10/0x10 [ 14.894109] ? ktime_get_ts64+0x86/0x230 [ 14.894154] kunit_try_run_case+0x1a5/0x480 [ 14.894197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.894242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.894302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.894328] ? __kthread_parkme+0x82/0x180 [ 14.894364] ? preempt_count_sub+0x50/0x80 [ 14.894390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.894416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.894443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.894474] kthread+0x337/0x6f0 [ 14.894522] ? trace_preempt_on+0x20/0xc0 [ 14.894587] ? __pfx_kthread+0x10/0x10 [ 14.894609] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.894631] ? calculate_sigpending+0x7b/0xa0 [ 14.894657] ? __pfx_kthread+0x10/0x10 [ 14.894679] ret_from_fork+0x116/0x1d0 [ 14.894698] ? __pfx_kthread+0x10/0x10 [ 14.894719] ret_from_fork_asm+0x1a/0x30 [ 14.894754] </TASK> [ 14.894767] [ 14.906180] Allocated by task 229: [ 14.906391] kasan_save_stack+0x45/0x70 [ 14.907013] kasan_save_track+0x18/0x40 [ 14.907380] kasan_save_alloc_info+0x3b/0x50 [ 14.907835] __kasan_slab_alloc+0x91/0xa0 [ 14.908165] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.908585] kmem_cache_invalid_free+0x157/0x460 [ 14.908959] kunit_try_run_case+0x1a5/0x480 [ 14.909298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.909813] kthread+0x337/0x6f0 [ 14.910012] ret_from_fork+0x116/0x1d0 [ 14.910321] ret_from_fork_asm+0x1a/0x30 [ 14.910696] [ 14.910811] The buggy address belongs to the object at ffff888102b5f000 [ 14.910811] which belongs to the cache test_cache of size 200 [ 14.911689] The buggy address is located 1 bytes inside of [ 14.911689] 200-byte region [ffff888102b5f000, ffff888102b5f0c8) [ 14.912386] [ 14.912639] The buggy address belongs to the physical page: [ 14.913037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5f [ 14.913713] flags: 0x200000000000000(node=0|zone=2) [ 14.914096] page_type: f5(slab) [ 14.914314] raw: 0200000000000000 ffff8881009b38c0 dead000000000122 0000000000000000 [ 14.914906] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.915445] page dumped because: kasan: bad access detected [ 14.915851] [ 14.916009] Memory state around the buggy address: [ 14.916319] ffff888102b5ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.916985] ffff888102b5ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917335] >ffff888102b5f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.917888] ^ [ 14.918157] ffff888102b5f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 14.918534] ffff888102b5f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.918995] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
[ 14.844989] ================================================================== [ 14.845972] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480 [ 14.846405] Free of addr ffff888102314000 by task kunit_try_catch/227 [ 14.846840] [ 14.846995] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.847091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.847114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.847153] Call Trace: [ 14.847177] <TASK> [ 14.847210] dump_stack_lvl+0x73/0xb0 [ 14.847285] print_report+0xd1/0x650 [ 14.847333] ? __virt_addr_valid+0x1db/0x2d0 [ 14.847387] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.847430] ? kmem_cache_double_free+0x1e5/0x480 [ 14.847886] kasan_report_invalid_free+0x10a/0x130 [ 14.847959] ? kmem_cache_double_free+0x1e5/0x480 [ 14.848007] ? kmem_cache_double_free+0x1e5/0x480 [ 14.848045] check_slab_allocation+0x101/0x130 [ 14.848082] __kasan_slab_pre_free+0x28/0x40 [ 14.848115] kmem_cache_free+0xed/0x420 [ 14.848153] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.848191] ? kmem_cache_double_free+0x1e5/0x480 [ 14.848249] kmem_cache_double_free+0x1e5/0x480 [ 14.848295] ? __pfx_kmem_cache_double_free+0x10/0x10 [ 14.848335] ? finish_task_switch.isra.0+0x153/0x700 [ 14.848386] ? __switch_to+0x47/0xf50 [ 14.848448] ? __pfx_read_tsc+0x10/0x10 [ 14.848526] ? ktime_get_ts64+0x86/0x230 [ 14.848571] kunit_try_run_case+0x1a5/0x480 [ 14.848618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.848651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.848685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.848708] ? __kthread_parkme+0x82/0x180 [ 14.848730] ? preempt_count_sub+0x50/0x80 [ 14.848754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.848777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.848821] kthread+0x337/0x6f0 [ 14.848840] ? trace_preempt_on+0x20/0xc0 [ 14.848864] ? __pfx_kthread+0x10/0x10 [ 14.848884] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.848904] ? calculate_sigpending+0x7b/0xa0 [ 14.848928] ? __pfx_kthread+0x10/0x10 [ 14.848948] ret_from_fork+0x116/0x1d0 [ 14.848966] ? __pfx_kthread+0x10/0x10 [ 14.848986] ret_from_fork_asm+0x1a/0x30 [ 14.849019] </TASK> [ 14.849032] [ 14.861870] Allocated by task 227: [ 14.862188] kasan_save_stack+0x45/0x70 [ 14.863109] kasan_save_track+0x18/0x40 [ 14.863403] kasan_save_alloc_info+0x3b/0x50 [ 14.863890] __kasan_slab_alloc+0x91/0xa0 [ 14.864077] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.864431] kmem_cache_double_free+0x14f/0x480 [ 14.864686] kunit_try_run_case+0x1a5/0x480 [ 14.864885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.865093] kthread+0x337/0x6f0 [ 14.865365] ret_from_fork+0x116/0x1d0 [ 14.865622] ret_from_fork_asm+0x1a/0x30 [ 14.865833] [ 14.865992] Freed by task 227: [ 14.866159] kasan_save_stack+0x45/0x70 [ 14.866957] kasan_save_track+0x18/0x40 [ 14.867165] kasan_save_free_info+0x3f/0x60 [ 14.867663] __kasan_slab_free+0x56/0x70 [ 14.867993] kmem_cache_free+0x249/0x420 [ 14.868304] kmem_cache_double_free+0x16a/0x480 [ 14.868624] kunit_try_run_case+0x1a5/0x480 [ 14.868959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.869378] kthread+0x337/0x6f0 [ 14.869717] ret_from_fork+0x116/0x1d0 [ 14.870083] ret_from_fork_asm+0x1a/0x30 [ 14.870400] [ 14.870592] The buggy address belongs to the object at ffff888102314000 [ 14.870592] which belongs to the cache test_cache of size 200 [ 14.871417] The buggy address is located 0 bytes inside of [ 14.871417] 200-byte region [ffff888102314000, ffff8881023140c8) [ 14.871933] [ 14.872091] The buggy address belongs to the physical page: [ 14.872906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 14.873585] flags: 0x200000000000000(node=0|zone=2) [ 14.873799] page_type: f5(slab) [ 14.874239] raw: 0200000000000000 ffff888102312000 dead000000000122 0000000000000000 [ 14.874668] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.875167] page dumped because: kasan: bad access detected [ 14.875965] [ 14.876094] Memory state around the buggy address: [ 14.876291] ffff888102313f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.876760] ffff888102313f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877078] >ffff888102314000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.878008] ^ [ 14.878320] ffff888102314080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 14.879015] ffff888102314100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
[ 14.796769] ================================================================== [ 14.797743] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 14.798207] Read of size 1 at addr ffff888102b5e0c8 by task kunit_try_catch/225 [ 14.798599] [ 14.798813] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.798960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.798982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.799039] Call Trace: [ 14.799065] <TASK> [ 14.799098] dump_stack_lvl+0x73/0xb0 [ 14.799162] print_report+0xd1/0x650 [ 14.799210] ? __virt_addr_valid+0x1db/0x2d0 [ 14.799269] ? kmem_cache_oob+0x402/0x530 [ 14.799308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.799343] ? kmem_cache_oob+0x402/0x530 [ 14.799375] kasan_report+0x141/0x180 [ 14.799415] ? kmem_cache_oob+0x402/0x530 [ 14.799488] __asan_report_load1_noabort+0x18/0x20 [ 14.799528] kmem_cache_oob+0x402/0x530 [ 14.799576] ? trace_hardirqs_on+0x37/0xe0 [ 14.799622] ? __pfx_kmem_cache_oob+0x10/0x10 [ 14.799662] ? finish_task_switch.isra.0+0x153/0x700 [ 14.799699] ? __switch_to+0x47/0xf50 [ 14.799759] ? __pfx_read_tsc+0x10/0x10 [ 14.799797] ? ktime_get_ts64+0x86/0x230 [ 14.799841] kunit_try_run_case+0x1a5/0x480 [ 14.799894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.799937] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.799977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.800008] ? __kthread_parkme+0x82/0x180 [ 14.800031] ? preempt_count_sub+0x50/0x80 [ 14.800053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.800077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.800099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.800120] kthread+0x337/0x6f0 [ 14.800139] ? trace_preempt_on+0x20/0xc0 [ 14.800160] ? __pfx_kthread+0x10/0x10 [ 14.800180] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.800200] ? calculate_sigpending+0x7b/0xa0 [ 14.800244] ? __pfx_kthread+0x10/0x10 [ 14.800268] ret_from_fork+0x116/0x1d0 [ 14.800286] ? __pfx_kthread+0x10/0x10 [ 14.800306] ret_from_fork_asm+0x1a/0x30 [ 14.800339] </TASK> [ 14.800352] [ 14.812514] Allocated by task 225: [ 14.812928] kasan_save_stack+0x45/0x70 [ 14.813131] kasan_save_track+0x18/0x40 [ 14.813516] kasan_save_alloc_info+0x3b/0x50 [ 14.813796] __kasan_slab_alloc+0x91/0xa0 [ 14.813969] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.814131] kmem_cache_oob+0x157/0x530 [ 14.814467] kunit_try_run_case+0x1a5/0x480 [ 14.814859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.815272] kthread+0x337/0x6f0 [ 14.815570] ret_from_fork+0x116/0x1d0 [ 14.816168] ret_from_fork_asm+0x1a/0x30 [ 14.816583] [ 14.816723] The buggy address belongs to the object at ffff888102b5e000 [ 14.816723] which belongs to the cache test_cache of size 200 [ 14.817108] The buggy address is located 0 bytes to the right of [ 14.817108] allocated 200-byte region [ffff888102b5e000, ffff888102b5e0c8) [ 14.817718] [ 14.817826] The buggy address belongs to the physical page: [ 14.818107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5e [ 14.818546] flags: 0x200000000000000(node=0|zone=2) [ 14.818764] page_type: f5(slab) [ 14.819024] raw: 0200000000000000 ffff8881009b3780 dead000000000122 0000000000000000 [ 14.819400] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.819674] page dumped because: kasan: bad access detected [ 14.819872] [ 14.819972] Memory state around the buggy address: [ 14.820301] ffff888102b5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820730] ffff888102b5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.821180] >ffff888102b5e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 14.821635] ^ [ 14.822471] ffff888102b5e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.823081] ffff888102b5e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.823431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
[ 14.745144] ================================================================== [ 14.746104] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560 [ 14.746708] Read of size 8 at addr ffff88810230d400 by task kunit_try_catch/218 [ 14.747121] [ 14.747353] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.747454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.747479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.747518] Call Trace: [ 14.747545] <TASK> [ 14.747583] dump_stack_lvl+0x73/0xb0 [ 14.747683] print_report+0xd1/0x650 [ 14.747745] ? __virt_addr_valid+0x1db/0x2d0 [ 14.747790] ? workqueue_uaf+0x4d6/0x560 [ 14.747834] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.747879] ? workqueue_uaf+0x4d6/0x560 [ 14.747924] kasan_report+0x141/0x180 [ 14.747964] ? workqueue_uaf+0x4d6/0x560 [ 14.748009] __asan_report_load8_noabort+0x18/0x20 [ 14.748050] workqueue_uaf+0x4d6/0x560 [ 14.748094] ? __pfx_workqueue_uaf+0x10/0x10 [ 14.748136] ? irqentry_exit+0x2a/0x60 [ 14.748177] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.748234] ? __pfx_read_tsc+0x10/0x10 [ 14.748268] ? ktime_get_ts64+0x86/0x230 [ 14.748308] kunit_try_run_case+0x1a5/0x480 [ 14.748348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.748417] ? __kthread_parkme+0x82/0x180 [ 14.748488] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 14.748629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.748732] kthread+0x337/0x6f0 [ 14.748761] ? trace_preempt_on+0x20/0xc0 [ 14.748797] ? __pfx_kthread+0x10/0x10 [ 14.748829] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.748852] ? calculate_sigpending+0x7b/0xa0 [ 14.748874] ? __pfx_kthread+0x10/0x10 [ 14.748894] ret_from_fork+0x116/0x1d0 [ 14.748912] ? __pfx_kthread+0x10/0x10 [ 14.748931] ret_from_fork_asm+0x1a/0x30 [ 14.748961] </TASK> [ 14.748974] [ 14.760359] Allocated by task 218: [ 14.760705] kasan_save_stack+0x45/0x70 [ 14.761024] kasan_save_track+0x18/0x40 [ 14.761907] kasan_save_alloc_info+0x3b/0x50 [ 14.762164] __kasan_kmalloc+0xb7/0xc0 [ 14.762478] __kmalloc_cache_noprof+0x189/0x420 [ 14.762944] workqueue_uaf+0x152/0x560 [ 14.763301] kunit_try_run_case+0x1a5/0x480 [ 14.763746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.764194] kthread+0x337/0x6f0 [ 14.764461] ret_from_fork+0x116/0x1d0 [ 14.764764] ret_from_fork_asm+0x1a/0x30 [ 14.765058] [ 14.765219] Freed by task 24: [ 14.765457] kasan_save_stack+0x45/0x70 [ 14.765666] kasan_save_track+0x18/0x40 [ 14.765838] kasan_save_free_info+0x3f/0x60 [ 14.766014] __kasan_slab_free+0x56/0x70 [ 14.766170] kfree+0x222/0x3f0 [ 14.766687] workqueue_uaf_work+0x12/0x20 [ 14.767082] process_one_work+0x5ee/0xf60 [ 14.767984] worker_thread+0x725/0x1320 [ 14.768591] kthread+0x337/0x6f0 [ 14.769117] ret_from_fork+0x116/0x1d0 [ 14.769442] ret_from_fork_asm+0x1a/0x30 [ 14.769790] [ 14.769942] Last potentially related work creation: [ 14.770154] kasan_save_stack+0x45/0x70 [ 14.770450] kasan_record_aux_stack+0xb2/0xc0 [ 14.770814] __queue_work+0x626/0xeb0 [ 14.771042] queue_work_on+0xb6/0xc0 [ 14.771338] workqueue_uaf+0x26d/0x560 [ 14.771566] kunit_try_run_case+0x1a5/0x480 [ 14.771880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.772128] kthread+0x337/0x6f0 [ 14.772296] ret_from_fork+0x116/0x1d0 [ 14.772453] ret_from_fork_asm+0x1a/0x30 [ 14.772626] [ 14.772780] The buggy address belongs to the object at ffff88810230d400 [ 14.772780] which belongs to the cache kmalloc-32 of size 32 [ 14.774472] The buggy address is located 0 bytes inside of [ 14.774472] freed 32-byte region [ffff88810230d400, ffff88810230d420) [ 14.775463] [ 14.775651] The buggy address belongs to the physical page: [ 14.775934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d [ 14.776271] flags: 0x200000000000000(node=0|zone=2) [ 14.776479] page_type: f5(slab) [ 14.776748] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.777572] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.777910] page dumped because: kasan: bad access detected [ 14.778620] [ 14.778808] Memory state around the buggy address: [ 14.779116] ffff88810230d300: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.779797] ffff88810230d380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.780125] >ffff88810230d400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780893] ^ [ 14.781197] ffff88810230d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.781634] ffff88810230d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.782032] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
[ 14.696712] ================================================================== [ 14.697201] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 14.697707] Read of size 4 at addr ffff88810230d380 by task swapper/1/0 [ 14.698267] [ 14.698448] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.698540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.698561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.698589] Call Trace: [ 14.698629] <IRQ> [ 14.698652] dump_stack_lvl+0x73/0xb0 [ 14.698691] print_report+0xd1/0x650 [ 14.698716] ? __virt_addr_valid+0x1db/0x2d0 [ 14.698741] ? rcu_uaf_reclaim+0x50/0x60 [ 14.698761] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.698782] ? rcu_uaf_reclaim+0x50/0x60 [ 14.698802] kasan_report+0x141/0x180 [ 14.698822] ? rcu_uaf_reclaim+0x50/0x60 [ 14.698847] __asan_report_load4_noabort+0x18/0x20 [ 14.698867] rcu_uaf_reclaim+0x50/0x60 [ 14.698886] rcu_core+0x66f/0x1c40 [ 14.698914] ? __pfx_rcu_core+0x10/0x10 [ 14.698935] ? ktime_get+0x6b/0x150 [ 14.698956] ? handle_softirqs+0x18e/0x730 [ 14.698982] rcu_core_si+0x12/0x20 [ 14.699001] handle_softirqs+0x209/0x730 [ 14.699019] ? hrtimer_interrupt+0x2fe/0x780 [ 14.699041] ? __pfx_handle_softirqs+0x10/0x10 [ 14.699066] __irq_exit_rcu+0xc9/0x110 [ 14.699085] irq_exit_rcu+0x12/0x20 [ 14.699103] sysvec_apic_timer_interrupt+0x81/0x90 [ 14.699127] </IRQ> [ 14.699156] <TASK> [ 14.699166] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 14.699302] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 14.699888] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d a3 36 23 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 14.700059] RSP: 0000:ffff888100877dc8 EFLAGS: 00010202 [ 14.700243] RAX: ffff8881b0976000 RBX: ffff888100853000 RCX: ffffffffa82583e5 [ 14.700321] RDX: ffffed102b62618b RSI: 0000000000000004 RDI: 000000000000c084 [ 14.700390] RBP: ffff888100877dd0 R08: 0000000000000001 R09: ffffed102b62618a [ 14.700475] R10: ffff88815b130c53 R11: 0000000000016400 R12: 0000000000000001 [ 14.700555] R13: ffffed102010a600 R14: ffffffffa9fb0b90 R15: 0000000000000000 [ 14.700671] ? ct_kernel_exit.constprop.0+0xa5/0xd0 [ 14.700802] ? default_idle+0xd/0x20 [ 14.700832] arch_cpu_idle+0xd/0x20 [ 14.700855] default_idle_call+0x48/0x80 [ 14.700875] do_idle+0x379/0x4f0 [ 14.700898] ? __pfx_do_idle+0x10/0x10 [ 14.700915] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 14.700937] ? complete+0x15b/0x1d0 [ 14.700959] cpu_startup_entry+0x5c/0x70 [ 14.700978] start_secondary+0x211/0x290 [ 14.701000] ? __pfx_start_secondary+0x10/0x10 [ 14.701024] common_startup_64+0x13e/0x148 [ 14.701057] </TASK> [ 14.701069] [ 14.715046] Allocated by task 216: [ 14.715624] kasan_save_stack+0x45/0x70 [ 14.716199] kasan_save_track+0x18/0x40 [ 14.716374] kasan_save_alloc_info+0x3b/0x50 [ 14.716686] __kasan_kmalloc+0xb7/0xc0 [ 14.716998] __kmalloc_cache_noprof+0x189/0x420 [ 14.717262] rcu_uaf+0xb0/0x330 [ 14.717760] kunit_try_run_case+0x1a5/0x480 [ 14.718082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.718405] kthread+0x337/0x6f0 [ 14.718836] ret_from_fork+0x116/0x1d0 [ 14.719120] ret_from_fork_asm+0x1a/0x30 [ 14.719449] [ 14.719768] Freed by task 0: [ 14.719927] kasan_save_stack+0x45/0x70 [ 14.720196] kasan_save_track+0x18/0x40 [ 14.720888] kasan_save_free_info+0x3f/0x60 [ 14.721196] __kasan_slab_free+0x56/0x70 [ 14.721389] kfree+0x222/0x3f0 [ 14.721645] rcu_uaf_reclaim+0x1f/0x60 [ 14.721861] rcu_core+0x66f/0x1c40 [ 14.722375] rcu_core_si+0x12/0x20 [ 14.722686] handle_softirqs+0x209/0x730 [ 14.722943] __irq_exit_rcu+0xc9/0x110 [ 14.723113] irq_exit_rcu+0x12/0x20 [ 14.723309] sysvec_apic_timer_interrupt+0x81/0x90 [ 14.723870] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 14.724330] [ 14.724558] Last potentially related work creation: [ 14.725077] kasan_save_stack+0x45/0x70 [ 14.725397] kasan_record_aux_stack+0xb2/0xc0 [ 14.725589] __call_rcu_common.constprop.0+0x72/0x9d0 [ 14.725903] call_rcu+0x12/0x20 [ 14.726378] rcu_uaf+0x168/0x330 [ 14.726975] kunit_try_run_case+0x1a5/0x480 [ 14.727296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.727758] kthread+0x337/0x6f0 [ 14.728048] ret_from_fork+0x116/0x1d0 [ 14.728317] ret_from_fork_asm+0x1a/0x30 [ 14.728809] [ 14.728959] The buggy address belongs to the object at ffff88810230d380 [ 14.728959] which belongs to the cache kmalloc-32 of size 32 [ 14.729843] The buggy address is located 0 bytes inside of [ 14.729843] freed 32-byte region [ffff88810230d380, ffff88810230d3a0) [ 14.730576] [ 14.730762] The buggy address belongs to the physical page: [ 14.731263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d [ 14.732091] flags: 0x200000000000000(node=0|zone=2) [ 14.732629] page_type: f5(slab) [ 14.732917] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.733252] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.733902] page dumped because: kasan: bad access detected [ 14.734091] [ 14.734214] Memory state around the buggy address: [ 14.734695] ffff88810230d280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.734923] ffff88810230d300: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 14.735380] >ffff88810230d380: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735907] ^ [ 14.736136] ffff88810230d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.736555] ffff88810230d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.736968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
[ 14.601965] ================================================================== [ 14.602407] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 14.603102] Read of size 1 at addr ffff888102b5b000 by task kunit_try_catch/214 [ 14.603439] [ 14.603644] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.603738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.603761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.603801] Call Trace: [ 14.603828] <TASK> [ 14.603863] dump_stack_lvl+0x73/0xb0 [ 14.603910] print_report+0xd1/0x650 [ 14.603936] ? __virt_addr_valid+0x1db/0x2d0 [ 14.603961] ? ksize_uaf+0x19d/0x6c0 [ 14.603981] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.604002] ? ksize_uaf+0x19d/0x6c0 [ 14.604025] kasan_report+0x141/0x180 [ 14.604060] ? ksize_uaf+0x19d/0x6c0 [ 14.604097] ? ksize_uaf+0x19d/0x6c0 [ 14.604128] __kasan_check_byte+0x3d/0x50 [ 14.604160] ksize+0x20/0x60 [ 14.604196] ksize_uaf+0x19d/0x6c0 [ 14.604247] ? __pfx_ksize_uaf+0x10/0x10 [ 14.604291] ? __schedule+0x10cc/0x2b60 [ 14.604337] ? __pfx_read_tsc+0x10/0x10 [ 14.604378] ? ktime_get_ts64+0x86/0x230 [ 14.604427] kunit_try_run_case+0x1a5/0x480 [ 14.604476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.604519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.604553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.604576] ? __kthread_parkme+0x82/0x180 [ 14.604599] ? preempt_count_sub+0x50/0x80 [ 14.604623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.604647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.604668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.604690] kthread+0x337/0x6f0 [ 14.604709] ? trace_preempt_on+0x20/0xc0 [ 14.604732] ? __pfx_kthread+0x10/0x10 [ 14.604751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.604771] ? calculate_sigpending+0x7b/0xa0 [ 14.604795] ? __pfx_kthread+0x10/0x10 [ 14.604816] ret_from_fork+0x116/0x1d0 [ 14.604833] ? __pfx_kthread+0x10/0x10 [ 14.604853] ret_from_fork_asm+0x1a/0x30 [ 14.604885] </TASK> [ 14.604897] [ 14.613017] Allocated by task 214: [ 14.613339] kasan_save_stack+0x45/0x70 [ 14.613669] kasan_save_track+0x18/0x40 [ 14.613966] kasan_save_alloc_info+0x3b/0x50 [ 14.614360] __kasan_kmalloc+0xb7/0xc0 [ 14.614701] __kmalloc_cache_noprof+0x189/0x420 [ 14.615039] ksize_uaf+0xaa/0x6c0 [ 14.615370] kunit_try_run_case+0x1a5/0x480 [ 14.615642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.616014] kthread+0x337/0x6f0 [ 14.616265] ret_from_fork+0x116/0x1d0 [ 14.616587] ret_from_fork_asm+0x1a/0x30 [ 14.616769] [ 14.616871] Freed by task 214: [ 14.617010] kasan_save_stack+0x45/0x70 [ 14.617183] kasan_save_track+0x18/0x40 [ 14.617486] kasan_save_free_info+0x3f/0x60 [ 14.617808] __kasan_slab_free+0x56/0x70 [ 14.618119] kfree+0x222/0x3f0 [ 14.618444] ksize_uaf+0x12c/0x6c0 [ 14.618782] kunit_try_run_case+0x1a5/0x480 [ 14.619125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.619517] kthread+0x337/0x6f0 [ 14.619782] ret_from_fork+0x116/0x1d0 [ 14.620098] ret_from_fork_asm+0x1a/0x30 [ 14.620283] [ 14.620386] The buggy address belongs to the object at ffff888102b5b000 [ 14.620386] which belongs to the cache kmalloc-128 of size 128 [ 14.620747] The buggy address is located 0 bytes inside of [ 14.620747] freed 128-byte region [ffff888102b5b000, ffff888102b5b080) [ 14.621101] [ 14.621263] The buggy address belongs to the physical page: [ 14.621685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 14.622214] flags: 0x200000000000000(node=0|zone=2) [ 14.622595] page_type: f5(slab) [ 14.622880] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.623323] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.623571] page dumped because: kasan: bad access detected [ 14.623855] [ 14.624008] Memory state around the buggy address: [ 14.624406] ffff888102b5af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.624927] ffff888102b5af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.625306] >ffff888102b5b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.625816] ^ [ 14.626025] ffff888102b5b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626486] ffff888102b5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626825] ================================================================== [ 14.628129] ================================================================== [ 14.628539] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 14.628813] Read of size 1 at addr ffff888102b5b000 by task kunit_try_catch/214 [ 14.629016] [ 14.629128] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.629203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.629233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.629265] Call Trace: [ 14.629299] <TASK> [ 14.629327] dump_stack_lvl+0x73/0xb0 [ 14.629369] print_report+0xd1/0x650 [ 14.629402] ? __virt_addr_valid+0x1db/0x2d0 [ 14.629434] ? ksize_uaf+0x5fe/0x6c0 [ 14.629476] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.629508] ? ksize_uaf+0x5fe/0x6c0 [ 14.629540] kasan_report+0x141/0x180 [ 14.629577] ? ksize_uaf+0x5fe/0x6c0 [ 14.629619] __asan_report_load1_noabort+0x18/0x20 [ 14.629731] ksize_uaf+0x5fe/0x6c0 [ 14.629771] ? __pfx_ksize_uaf+0x10/0x10 [ 14.629816] ? __schedule+0x10cc/0x2b60 [ 14.629860] ? __pfx_read_tsc+0x10/0x10 [ 14.629901] ? ktime_get_ts64+0x86/0x230 [ 14.629944] kunit_try_run_case+0x1a5/0x480 [ 14.629990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.630030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.630075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.630119] ? __kthread_parkme+0x82/0x180 [ 14.630163] ? preempt_count_sub+0x50/0x80 [ 14.630213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.630295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.630354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.630396] kthread+0x337/0x6f0 [ 14.630433] ? trace_preempt_on+0x20/0xc0 [ 14.630481] ? __pfx_kthread+0x10/0x10 [ 14.630550] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.630619] ? calculate_sigpending+0x7b/0xa0 [ 14.630667] ? __pfx_kthread+0x10/0x10 [ 14.630727] ret_from_fork+0x116/0x1d0 [ 14.630767] ? __pfx_kthread+0x10/0x10 [ 14.630810] ret_from_fork_asm+0x1a/0x30 [ 14.630879] </TASK> [ 14.630905] [ 14.641720] Allocated by task 214: [ 14.641960] kasan_save_stack+0x45/0x70 [ 14.642247] kasan_save_track+0x18/0x40 [ 14.642534] kasan_save_alloc_info+0x3b/0x50 [ 14.642711] __kasan_kmalloc+0xb7/0xc0 [ 14.642901] __kmalloc_cache_noprof+0x189/0x420 [ 14.643234] ksize_uaf+0xaa/0x6c0 [ 14.643520] kunit_try_run_case+0x1a5/0x480 [ 14.643846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.644180] kthread+0x337/0x6f0 [ 14.644462] ret_from_fork+0x116/0x1d0 [ 14.644688] ret_from_fork_asm+0x1a/0x30 [ 14.644860] [ 14.644963] Freed by task 214: [ 14.645105] kasan_save_stack+0x45/0x70 [ 14.645323] kasan_save_track+0x18/0x40 [ 14.645615] kasan_save_free_info+0x3f/0x60 [ 14.645924] __kasan_slab_free+0x56/0x70 [ 14.646245] kfree+0x222/0x3f0 [ 14.646505] ksize_uaf+0x12c/0x6c0 [ 14.646800] kunit_try_run_case+0x1a5/0x480 [ 14.647141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647490] kthread+0x337/0x6f0 [ 14.647651] ret_from_fork+0x116/0x1d0 [ 14.647818] ret_from_fork_asm+0x1a/0x30 [ 14.648114] [ 14.648300] The buggy address belongs to the object at ffff888102b5b000 [ 14.648300] which belongs to the cache kmalloc-128 of size 128 [ 14.649075] The buggy address is located 0 bytes inside of [ 14.649075] freed 128-byte region [ffff888102b5b000, ffff888102b5b080) [ 14.649523] [ 14.649635] The buggy address belongs to the physical page: [ 14.650011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 14.650550] flags: 0x200000000000000(node=0|zone=2) [ 14.650874] page_type: f5(slab) [ 14.651047] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.651563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.651981] page dumped because: kasan: bad access detected [ 14.652174] [ 14.652315] Memory state around the buggy address: [ 14.652681] ffff888102b5af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653160] ffff888102b5af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653484] >ffff888102b5b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.653848] ^ [ 14.654046] ffff888102b5b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.654427] ffff888102b5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.654666] ================================================================== [ 14.656094] ================================================================== [ 14.656870] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 14.657362] Read of size 1 at addr ffff888102b5b078 by task kunit_try_catch/214 [ 14.657844] [ 14.658047] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.658141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.658163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.658202] Call Trace: [ 14.658826] <TASK> [ 14.658888] dump_stack_lvl+0x73/0xb0 [ 14.658953] print_report+0xd1/0x650 [ 14.659002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.659053] ? ksize_uaf+0x5e4/0x6c0 [ 14.659098] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.659143] ? ksize_uaf+0x5e4/0x6c0 [ 14.659187] kasan_report+0x141/0x180 [ 14.659243] ? ksize_uaf+0x5e4/0x6c0 [ 14.659299] __asan_report_load1_noabort+0x18/0x20 [ 14.659341] ksize_uaf+0x5e4/0x6c0 [ 14.659383] ? __pfx_ksize_uaf+0x10/0x10 [ 14.659428] ? __schedule+0x10cc/0x2b60 [ 14.659472] ? __pfx_read_tsc+0x10/0x10 [ 14.659514] ? ktime_get_ts64+0x86/0x230 [ 14.659561] kunit_try_run_case+0x1a5/0x480 [ 14.659608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.659650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.659696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.659736] ? __kthread_parkme+0x82/0x180 [ 14.659764] ? preempt_count_sub+0x50/0x80 [ 14.659787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.659810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.659832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.659854] kthread+0x337/0x6f0 [ 14.659872] ? trace_preempt_on+0x20/0xc0 [ 14.659896] ? __pfx_kthread+0x10/0x10 [ 14.659917] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.659936] ? calculate_sigpending+0x7b/0xa0 [ 14.659960] ? __pfx_kthread+0x10/0x10 [ 14.659980] ret_from_fork+0x116/0x1d0 [ 14.659998] ? __pfx_kthread+0x10/0x10 [ 14.660018] ret_from_fork_asm+0x1a/0x30 [ 14.660050] </TASK> [ 14.660061] [ 14.667721] Allocated by task 214: [ 14.668022] kasan_save_stack+0x45/0x70 [ 14.668369] kasan_save_track+0x18/0x40 [ 14.668673] kasan_save_alloc_info+0x3b/0x50 [ 14.668980] __kasan_kmalloc+0xb7/0xc0 [ 14.669289] __kmalloc_cache_noprof+0x189/0x420 [ 14.670145] ksize_uaf+0xaa/0x6c0 [ 14.670806] kunit_try_run_case+0x1a5/0x480 [ 14.671508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.671743] kthread+0x337/0x6f0 [ 14.671897] ret_from_fork+0x116/0x1d0 [ 14.671990] ret_from_fork_asm+0x1a/0x30 [ 14.672082] [ 14.672134] Freed by task 214: [ 14.672209] kasan_save_stack+0x45/0x70 [ 14.673171] kasan_save_track+0x18/0x40 [ 14.673544] kasan_save_free_info+0x3f/0x60 [ 14.673845] __kasan_slab_free+0x56/0x70 [ 14.674056] kfree+0x222/0x3f0 [ 14.674328] ksize_uaf+0x12c/0x6c0 [ 14.674580] kunit_try_run_case+0x1a5/0x480 [ 14.674915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675146] kthread+0x337/0x6f0 [ 14.675450] ret_from_fork+0x116/0x1d0 [ 14.675651] ret_from_fork_asm+0x1a/0x30 [ 14.675950] [ 14.676080] The buggy address belongs to the object at ffff888102b5b000 [ 14.676080] which belongs to the cache kmalloc-128 of size 128 [ 14.676594] The buggy address is located 120 bytes inside of [ 14.676594] freed 128-byte region [ffff888102b5b000, ffff888102b5b080) [ 14.677260] [ 14.677436] The buggy address belongs to the physical page: [ 14.677724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 14.678039] flags: 0x200000000000000(node=0|zone=2) [ 14.678420] page_type: f5(slab) [ 14.678690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.679081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.679447] page dumped because: kasan: bad access detected [ 14.679746] [ 14.679912] Memory state around the buggy address: [ 14.680146] ffff888102b5af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.680386] ffff888102b5af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.680891] >ffff888102b5b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.681327] ^ [ 14.681678] ffff888102b5b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.682076] ffff888102b5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.682473] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
[ 14.540253] ================================================================== [ 14.540927] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.541209] Read of size 1 at addr ffff888102b48f78 by task kunit_try_catch/212 [ 14.541884] [ 14.542100] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.542199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.542231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.542270] Call Trace: [ 14.542298] <TASK> [ 14.542339] dump_stack_lvl+0x73/0xb0 [ 14.542401] print_report+0xd1/0x650 [ 14.542449] ? __virt_addr_valid+0x1db/0x2d0 [ 14.542660] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.542746] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542799] kasan_report+0x141/0x180 [ 14.542842] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542905] __asan_report_load1_noabort+0x18/0x20 [ 14.542938] ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542978] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.543016] ? finish_task_switch.isra.0+0x153/0x700 [ 14.543056] ? __switch_to+0x47/0xf50 [ 14.543104] ? __schedule+0x10cc/0x2b60 [ 14.543150] ? __pfx_read_tsc+0x10/0x10 [ 14.543189] ? ktime_get_ts64+0x86/0x230 [ 14.543246] kunit_try_run_case+0x1a5/0x480 [ 14.543290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.543319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.543342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.543363] ? __kthread_parkme+0x82/0x180 [ 14.543385] ? preempt_count_sub+0x50/0x80 [ 14.543407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.543432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.543469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.543541] kthread+0x337/0x6f0 [ 14.543576] ? trace_preempt_on+0x20/0xc0 [ 14.543627] ? __pfx_kthread+0x10/0x10 [ 14.543650] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.543671] ? calculate_sigpending+0x7b/0xa0 [ 14.543695] ? __pfx_kthread+0x10/0x10 [ 14.543716] ret_from_fork+0x116/0x1d0 [ 14.543734] ? __pfx_kthread+0x10/0x10 [ 14.543754] ret_from_fork_asm+0x1a/0x30 [ 14.543785] </TASK> [ 14.543797] [ 14.556847] Allocated by task 212: [ 14.557169] kasan_save_stack+0x45/0x70 [ 14.557515] kasan_save_track+0x18/0x40 [ 14.557806] kasan_save_alloc_info+0x3b/0x50 [ 14.558024] __kasan_kmalloc+0xb7/0xc0 [ 14.558356] __kmalloc_cache_noprof+0x189/0x420 [ 14.558589] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.559035] kunit_try_run_case+0x1a5/0x480 [ 14.559349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559722] kthread+0x337/0x6f0 [ 14.559924] ret_from_fork+0x116/0x1d0 [ 14.560090] ret_from_fork_asm+0x1a/0x30 [ 14.561134] [ 14.561320] The buggy address belongs to the object at ffff888102b48f00 [ 14.561320] which belongs to the cache kmalloc-128 of size 128 [ 14.562022] The buggy address is located 5 bytes to the right of [ 14.562022] allocated 115-byte region [ffff888102b48f00, ffff888102b48f73) [ 14.562721] [ 14.562976] The buggy address belongs to the physical page: [ 14.563897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.564215] flags: 0x200000000000000(node=0|zone=2) [ 14.565076] page_type: f5(slab) [ 14.565270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.565499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.565859] page dumped because: kasan: bad access detected [ 14.566785] [ 14.567105] Memory state around the buggy address: [ 14.567302] ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.567658] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.568083] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.568375] ^ [ 14.568839] ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.569241] ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.569592] ================================================================== [ 14.512077] ================================================================== [ 14.512564] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 14.513157] Read of size 1 at addr ffff888102b48f73 by task kunit_try_catch/212 [ 14.513761] [ 14.513880] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.513937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.513949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.513972] Call Trace: [ 14.513987] <TASK> [ 14.514008] dump_stack_lvl+0x73/0xb0 [ 14.514042] print_report+0xd1/0x650 [ 14.514067] ? __virt_addr_valid+0x1db/0x2d0 [ 14.514090] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.514135] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514158] kasan_report+0x141/0x180 [ 14.514179] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514207] __asan_report_load1_noabort+0x18/0x20 [ 14.514246] ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514272] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.514294] ? finish_task_switch.isra.0+0x153/0x700 [ 14.514319] ? __switch_to+0x47/0xf50 [ 14.514362] ? __schedule+0x10cc/0x2b60 [ 14.514387] ? __pfx_read_tsc+0x10/0x10 [ 14.514410] ? ktime_get_ts64+0x86/0x230 [ 14.514436] kunit_try_run_case+0x1a5/0x480 [ 14.514474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.514508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.514547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.514584] ? __kthread_parkme+0x82/0x180 [ 14.514622] ? preempt_count_sub+0x50/0x80 [ 14.514670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.514716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.514760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.514948] kthread+0x337/0x6f0 [ 14.515001] ? trace_preempt_on+0x20/0xc0 [ 14.515053] ? __pfx_kthread+0x10/0x10 [ 14.515097] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.515136] ? calculate_sigpending+0x7b/0xa0 [ 14.515176] ? __pfx_kthread+0x10/0x10 [ 14.515213] ret_from_fork+0x116/0x1d0 [ 14.515262] ? __pfx_kthread+0x10/0x10 [ 14.515300] ret_from_fork_asm+0x1a/0x30 [ 14.515364] </TASK> [ 14.515389] [ 14.526426] Allocated by task 212: [ 14.526909] kasan_save_stack+0x45/0x70 [ 14.527162] kasan_save_track+0x18/0x40 [ 14.527667] kasan_save_alloc_info+0x3b/0x50 [ 14.527957] __kasan_kmalloc+0xb7/0xc0 [ 14.528156] __kmalloc_cache_noprof+0x189/0x420 [ 14.528737] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.529089] kunit_try_run_case+0x1a5/0x480 [ 14.529449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.529915] kthread+0x337/0x6f0 [ 14.530164] ret_from_fork+0x116/0x1d0 [ 14.530629] ret_from_fork_asm+0x1a/0x30 [ 14.530873] [ 14.531038] The buggy address belongs to the object at ffff888102b48f00 [ 14.531038] which belongs to the cache kmalloc-128 of size 128 [ 14.531743] The buggy address is located 0 bytes to the right of [ 14.531743] allocated 115-byte region [ffff888102b48f00, ffff888102b48f73) [ 14.532367] [ 14.532694] The buggy address belongs to the physical page: [ 14.532992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.533423] flags: 0x200000000000000(node=0|zone=2) [ 14.533979] page_type: f5(slab) [ 14.534277] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.534882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.535319] page dumped because: kasan: bad access detected [ 14.535797] [ 14.535903] Memory state around the buggy address: [ 14.536125] ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.536366] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.536860] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.537139] ^ [ 14.537775] ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.538158] ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.538831] ================================================================== [ 14.572160] ================================================================== [ 14.572855] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.573365] Read of size 1 at addr ffff888102b48f7f by task kunit_try_catch/212 [ 14.573670] [ 14.573921] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.574045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.574071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.574114] Call Trace: [ 14.574142] <TASK> [ 14.574177] dump_stack_lvl+0x73/0xb0 [ 14.574247] print_report+0xd1/0x650 [ 14.574293] ? __virt_addr_valid+0x1db/0x2d0 [ 14.574410] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.574499] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574546] kasan_report+0x141/0x180 [ 14.574587] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574644] __asan_report_load1_noabort+0x18/0x20 [ 14.574683] ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574712] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.574734] ? finish_task_switch.isra.0+0x153/0x700 [ 14.574759] ? __switch_to+0x47/0xf50 [ 14.574786] ? __schedule+0x10cc/0x2b60 [ 14.574809] ? __pfx_read_tsc+0x10/0x10 [ 14.574831] ? ktime_get_ts64+0x86/0x230 [ 14.574855] kunit_try_run_case+0x1a5/0x480 [ 14.574882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.574903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.574925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.574947] ? __kthread_parkme+0x82/0x180 [ 14.574970] ? preempt_count_sub+0x50/0x80 [ 14.574993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.575015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.575037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.575058] kthread+0x337/0x6f0 [ 14.575077] ? trace_preempt_on+0x20/0xc0 [ 14.575101] ? __pfx_kthread+0x10/0x10 [ 14.575122] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.575142] ? calculate_sigpending+0x7b/0xa0 [ 14.575166] ? __pfx_kthread+0x10/0x10 [ 14.575187] ret_from_fork+0x116/0x1d0 [ 14.575204] ? __pfx_kthread+0x10/0x10 [ 14.575245] ret_from_fork_asm+0x1a/0x30 [ 14.575280] </TASK> [ 14.575292] [ 14.583581] Allocated by task 212: [ 14.583934] kasan_save_stack+0x45/0x70 [ 14.584300] kasan_save_track+0x18/0x40 [ 14.584574] kasan_save_alloc_info+0x3b/0x50 [ 14.584894] __kasan_kmalloc+0xb7/0xc0 [ 14.585186] __kmalloc_cache_noprof+0x189/0x420 [ 14.585583] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.585943] kunit_try_run_case+0x1a5/0x480 [ 14.586232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.586571] kthread+0x337/0x6f0 [ 14.586734] ret_from_fork+0x116/0x1d0 [ 14.586907] ret_from_fork_asm+0x1a/0x30 [ 14.587083] [ 14.587190] The buggy address belongs to the object at ffff888102b48f00 [ 14.587190] which belongs to the cache kmalloc-128 of size 128 [ 14.587577] The buggy address is located 12 bytes to the right of [ 14.587577] allocated 115-byte region [ffff888102b48f00, ffff888102b48f73) [ 14.588447] [ 14.588645] The buggy address belongs to the physical page: [ 14.589024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.589637] flags: 0x200000000000000(node=0|zone=2) [ 14.590045] page_type: f5(slab) [ 14.590331] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.590876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.591446] page dumped because: kasan: bad access detected [ 14.591822] [ 14.591966] Memory state around the buggy address: [ 14.592275] ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.592688] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.592972] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.593201] ^ [ 14.593727] ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.594247] ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.594630] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
[ 14.480234] ================================================================== [ 14.480850] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 [ 14.481333] Free of addr ffff888102817b60 by task kunit_try_catch/210 [ 14.481732] [ 14.481904] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.481998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.482020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.482057] Call Trace: [ 14.482083] <TASK> [ 14.482119] dump_stack_lvl+0x73/0xb0 [ 14.482183] print_report+0xd1/0x650 [ 14.482466] ? __virt_addr_valid+0x1db/0x2d0 [ 14.482547] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.482612] ? kfree_sensitive+0x2e/0x90 [ 14.482661] kasan_report_invalid_free+0x10a/0x130 [ 14.482718] ? kfree_sensitive+0x2e/0x90 [ 14.482769] ? kfree_sensitive+0x2e/0x90 [ 14.482812] check_slab_allocation+0x101/0x130 [ 14.482861] __kasan_slab_pre_free+0x28/0x40 [ 14.482903] kfree+0xf0/0x3f0 [ 14.482936] ? kfree_sensitive+0x2e/0x90 [ 14.482982] kfree_sensitive+0x2e/0x90 [ 14.483021] kmalloc_double_kzfree+0x19c/0x350 [ 14.483115] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 14.483166] ? __schedule+0x10cc/0x2b60 [ 14.483210] ? __pfx_read_tsc+0x10/0x10 [ 14.483291] ? ktime_get_ts64+0x86/0x230 [ 14.483335] kunit_try_run_case+0x1a5/0x480 [ 14.483379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.483423] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.483471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.483513] ? __kthread_parkme+0x82/0x180 [ 14.483551] ? preempt_count_sub+0x50/0x80 [ 14.483586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.483612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.483636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.483661] kthread+0x337/0x6f0 [ 14.483681] ? trace_preempt_on+0x20/0xc0 [ 14.483706] ? __pfx_kthread+0x10/0x10 [ 14.483727] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.483750] ? calculate_sigpending+0x7b/0xa0 [ 14.483775] ? __pfx_kthread+0x10/0x10 [ 14.483797] ret_from_fork+0x116/0x1d0 [ 14.483816] ? __pfx_kthread+0x10/0x10 [ 14.483837] ret_from_fork_asm+0x1a/0x30 [ 14.483872] </TASK> [ 14.483886] [ 14.492419] Allocated by task 210: [ 14.492684] kasan_save_stack+0x45/0x70 [ 14.493019] kasan_save_track+0x18/0x40 [ 14.493328] kasan_save_alloc_info+0x3b/0x50 [ 14.493645] __kasan_kmalloc+0xb7/0xc0 [ 14.493852] __kmalloc_cache_noprof+0x189/0x420 [ 14.494196] kmalloc_double_kzfree+0xa9/0x350 [ 14.494406] kunit_try_run_case+0x1a5/0x480 [ 14.494747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.495023] kthread+0x337/0x6f0 [ 14.495290] ret_from_fork+0x116/0x1d0 [ 14.495501] ret_from_fork_asm+0x1a/0x30 [ 14.495686] [ 14.495793] Freed by task 210: [ 14.495940] kasan_save_stack+0x45/0x70 [ 14.496112] kasan_save_track+0x18/0x40 [ 14.496292] kasan_save_free_info+0x3f/0x60 [ 14.496506] __kasan_slab_free+0x56/0x70 [ 14.496806] kfree+0x222/0x3f0 [ 14.497101] kfree_sensitive+0x67/0x90 [ 14.497412] kmalloc_double_kzfree+0x12b/0x350 [ 14.497760] kunit_try_run_case+0x1a5/0x480 [ 14.498091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.498513] kthread+0x337/0x6f0 [ 14.498798] ret_from_fork+0x116/0x1d0 [ 14.499025] ret_from_fork_asm+0x1a/0x30 [ 14.499213] [ 14.499385] The buggy address belongs to the object at ffff888102817b60 [ 14.499385] which belongs to the cache kmalloc-16 of size 16 [ 14.500054] The buggy address is located 0 bytes inside of [ 14.500054] 16-byte region [ffff888102817b60, ffff888102817b70) [ 14.500600] [ 14.500736] The buggy address belongs to the physical page: [ 14.500966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102817 [ 14.501247] flags: 0x200000000000000(node=0|zone=2) [ 14.501448] page_type: f5(slab) [ 14.501611] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.501863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.502104] page dumped because: kasan: bad access detected [ 14.502371] [ 14.502535] Memory state around the buggy address: [ 14.502903] ffff888102817a00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.503419] ffff888102817a80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.503873] >ffff888102817b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.504332] ^ [ 14.504760] ffff888102817b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.505236] ffff888102817c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.505709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
[ 14.450150] ================================================================== [ 14.451403] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350 [ 14.451962] Read of size 1 at addr ffff888102817b60 by task kunit_try_catch/210 [ 14.452682] [ 14.452853] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.452964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.452987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.453025] Call Trace: [ 14.453052] <TASK> [ 14.453092] dump_stack_lvl+0x73/0xb0 [ 14.453168] print_report+0xd1/0x650 [ 14.453216] ? __virt_addr_valid+0x1db/0x2d0 [ 14.453271] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.453298] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.453322] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.453346] kasan_report+0x141/0x180 [ 14.453369] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.453396] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.453420] __kasan_check_byte+0x3d/0x50 [ 14.453443] kfree_sensitive+0x22/0x90 [ 14.453467] kmalloc_double_kzfree+0x19c/0x350 [ 14.453490] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 14.453515] ? __schedule+0x10cc/0x2b60 [ 14.453537] ? __pfx_read_tsc+0x10/0x10 [ 14.453559] ? ktime_get_ts64+0x86/0x230 [ 14.453584] kunit_try_run_case+0x1a5/0x480 [ 14.453610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.453632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.453656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.453679] ? __kthread_parkme+0x82/0x180 [ 14.453702] ? preempt_count_sub+0x50/0x80 [ 14.453726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.453750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.453773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.453796] kthread+0x337/0x6f0 [ 14.453815] ? trace_preempt_on+0x20/0xc0 [ 14.453839] ? __pfx_kthread+0x10/0x10 [ 14.453860] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.453880] ? calculate_sigpending+0x7b/0xa0 [ 14.453906] ? __pfx_kthread+0x10/0x10 [ 14.453928] ret_from_fork+0x116/0x1d0 [ 14.453946] ? __pfx_kthread+0x10/0x10 [ 14.453967] ret_from_fork_asm+0x1a/0x30 [ 14.453999] </TASK> [ 14.454011] [ 14.462562] Allocated by task 210: [ 14.462896] kasan_save_stack+0x45/0x70 [ 14.463253] kasan_save_track+0x18/0x40 [ 14.463563] kasan_save_alloc_info+0x3b/0x50 [ 14.463914] __kasan_kmalloc+0xb7/0xc0 [ 14.464241] __kmalloc_cache_noprof+0x189/0x420 [ 14.464484] kmalloc_double_kzfree+0xa9/0x350 [ 14.464682] kunit_try_run_case+0x1a5/0x480 [ 14.465032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.465461] kthread+0x337/0x6f0 [ 14.465699] ret_from_fork+0x116/0x1d0 [ 14.465910] ret_from_fork_asm+0x1a/0x30 [ 14.466216] [ 14.466407] Freed by task 210: [ 14.466600] kasan_save_stack+0x45/0x70 [ 14.466784] kasan_save_track+0x18/0x40 [ 14.466962] kasan_save_free_info+0x3f/0x60 [ 14.467143] __kasan_slab_free+0x56/0x70 [ 14.467452] kfree+0x222/0x3f0 [ 14.467735] kfree_sensitive+0x67/0x90 [ 14.468049] kmalloc_double_kzfree+0x12b/0x350 [ 14.468409] kunit_try_run_case+0x1a5/0x480 [ 14.468747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.469163] kthread+0x337/0x6f0 [ 14.469461] ret_from_fork+0x116/0x1d0 [ 14.469725] ret_from_fork_asm+0x1a/0x30 [ 14.469916] [ 14.470027] The buggy address belongs to the object at ffff888102817b60 [ 14.470027] which belongs to the cache kmalloc-16 of size 16 [ 14.470855] The buggy address is located 0 bytes inside of [ 14.470855] freed 16-byte region [ffff888102817b60, ffff888102817b70) [ 14.471530] [ 14.471722] The buggy address belongs to the physical page: [ 14.471949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102817 [ 14.472507] flags: 0x200000000000000(node=0|zone=2) [ 14.472871] page_type: f5(slab) [ 14.473074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.473492] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.473905] page dumped because: kasan: bad access detected [ 14.474254] [ 14.474423] Memory state around the buggy address: [ 14.474729] ffff888102817a00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.475095] ffff888102817a80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.475543] >ffff888102817b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.475840] ^ [ 14.476263] ffff888102817b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.476630] ffff888102817c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.476927] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
[ 14.410184] ================================================================== [ 14.411237] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520 [ 14.411574] Read of size 1 at addr ffff888102b50fa8 by task kunit_try_catch/206 [ 14.411946] [ 14.412139] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.412240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.412266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.412308] Call Trace: [ 14.412332] <TASK> [ 14.412365] dump_stack_lvl+0x73/0xb0 [ 14.412423] print_report+0xd1/0x650 [ 14.412461] ? __virt_addr_valid+0x1db/0x2d0 [ 14.412505] ? kmalloc_uaf2+0x4a8/0x520 [ 14.412543] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.412583] ? kmalloc_uaf2+0x4a8/0x520 [ 14.412624] kasan_report+0x141/0x180 [ 14.412663] ? kmalloc_uaf2+0x4a8/0x520 [ 14.412707] __asan_report_load1_noabort+0x18/0x20 [ 14.412744] kmalloc_uaf2+0x4a8/0x520 [ 14.412784] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 14.412822] ? finish_task_switch.isra.0+0x153/0x700 [ 14.412864] ? __switch_to+0x47/0xf50 [ 14.412910] ? __schedule+0x10cc/0x2b60 [ 14.412952] ? __pfx_read_tsc+0x10/0x10 [ 14.412994] ? ktime_get_ts64+0x86/0x230 [ 14.413043] kunit_try_run_case+0x1a5/0x480 [ 14.413093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.413127] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.413161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.413193] ? __kthread_parkme+0x82/0x180 [ 14.413236] ? preempt_count_sub+0x50/0x80 [ 14.413289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.413316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.413339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.413360] kthread+0x337/0x6f0 [ 14.413380] ? trace_preempt_on+0x20/0xc0 [ 14.413404] ? __pfx_kthread+0x10/0x10 [ 14.413424] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.413444] ? calculate_sigpending+0x7b/0xa0 [ 14.413480] ? __pfx_kthread+0x10/0x10 [ 14.413514] ret_from_fork+0x116/0x1d0 [ 14.413564] ? __pfx_kthread+0x10/0x10 [ 14.413586] ret_from_fork_asm+0x1a/0x30 [ 14.413618] </TASK> [ 14.413631] [ 14.422516] Allocated by task 206: [ 14.422923] kasan_save_stack+0x45/0x70 [ 14.423265] kasan_save_track+0x18/0x40 [ 14.423677] kasan_save_alloc_info+0x3b/0x50 [ 14.424022] __kasan_kmalloc+0xb7/0xc0 [ 14.424228] __kmalloc_cache_noprof+0x189/0x420 [ 14.424420] kmalloc_uaf2+0xc6/0x520 [ 14.424580] kunit_try_run_case+0x1a5/0x480 [ 14.424852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.425246] kthread+0x337/0x6f0 [ 14.425995] ret_from_fork+0x116/0x1d0 [ 14.426354] ret_from_fork_asm+0x1a/0x30 [ 14.426815] [ 14.426982] Freed by task 206: [ 14.427133] kasan_save_stack+0x45/0x70 [ 14.427398] kasan_save_track+0x18/0x40 [ 14.427775] kasan_save_free_info+0x3f/0x60 [ 14.427951] __kasan_slab_free+0x56/0x70 [ 14.428256] kfree+0x222/0x3f0 [ 14.428497] kmalloc_uaf2+0x14c/0x520 [ 14.428708] kunit_try_run_case+0x1a5/0x480 [ 14.428959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429228] kthread+0x337/0x6f0 [ 14.429488] ret_from_fork+0x116/0x1d0 [ 14.429760] ret_from_fork_asm+0x1a/0x30 [ 14.429938] [ 14.430041] The buggy address belongs to the object at ffff888102b50f80 [ 14.430041] which belongs to the cache kmalloc-64 of size 64 [ 14.431138] The buggy address is located 40 bytes inside of [ 14.431138] freed 64-byte region [ffff888102b50f80, ffff888102b50fc0) [ 14.432039] [ 14.432156] The buggy address belongs to the physical page: [ 14.432407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50 [ 14.432672] flags: 0x200000000000000(node=0|zone=2) [ 14.433107] page_type: f5(slab) [ 14.433424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.434059] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 14.434433] page dumped because: kasan: bad access detected [ 14.434634] [ 14.435237] Memory state around the buggy address: [ 14.435584] ffff888102b50e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.436050] ffff888102b50f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.436492] >ffff888102b50f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.436742] ^ [ 14.437043] ffff888102b51000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.437478] ffff888102b51080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.438259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
[ 14.371646] ================================================================== [ 14.372461] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360 [ 14.373175] Write of size 33 at addr ffff888102b50e80 by task kunit_try_catch/204 [ 14.373670] [ 14.374063] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.374169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.374194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.374252] Call Trace: [ 14.374280] <TASK> [ 14.374327] dump_stack_lvl+0x73/0xb0 [ 14.374402] print_report+0xd1/0x650 [ 14.374491] ? __virt_addr_valid+0x1db/0x2d0 [ 14.374545] ? kmalloc_uaf_memset+0x1a3/0x360 [ 14.374583] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.374618] ? kmalloc_uaf_memset+0x1a3/0x360 [ 14.374642] kasan_report+0x141/0x180 [ 14.374665] ? kmalloc_uaf_memset+0x1a3/0x360 [ 14.374691] kasan_check_range+0x10c/0x1c0 [ 14.374714] __asan_memset+0x27/0x50 [ 14.374733] kmalloc_uaf_memset+0x1a3/0x360 [ 14.374753] ? __pfx_kmalloc_uaf_memset+0x10/0x10 [ 14.374775] ? __schedule+0x10cc/0x2b60 [ 14.374797] ? __pfx_read_tsc+0x10/0x10 [ 14.374819] ? ktime_get_ts64+0x86/0x230 [ 14.374843] kunit_try_run_case+0x1a5/0x480 [ 14.374869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.374891] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.374912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.374933] ? __kthread_parkme+0x82/0x180 [ 14.374954] ? preempt_count_sub+0x50/0x80 [ 14.374977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.374999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.375021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.375042] kthread+0x337/0x6f0 [ 14.375060] ? trace_preempt_on+0x20/0xc0 [ 14.375083] ? __pfx_kthread+0x10/0x10 [ 14.375103] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.375123] ? calculate_sigpending+0x7b/0xa0 [ 14.375146] ? __pfx_kthread+0x10/0x10 [ 14.375167] ret_from_fork+0x116/0x1d0 [ 14.375184] ? __pfx_kthread+0x10/0x10 [ 14.375204] ret_from_fork_asm+0x1a/0x30 [ 14.375255] </TASK> [ 14.375269] [ 14.385969] Allocated by task 204: [ 14.386255] kasan_save_stack+0x45/0x70 [ 14.386755] kasan_save_track+0x18/0x40 [ 14.387057] kasan_save_alloc_info+0x3b/0x50 [ 14.387374] __kasan_kmalloc+0xb7/0xc0 [ 14.388053] __kmalloc_cache_noprof+0x189/0x420 [ 14.388367] kmalloc_uaf_memset+0xa9/0x360 [ 14.388810] kunit_try_run_case+0x1a5/0x480 [ 14.389022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.389377] kthread+0x337/0x6f0 [ 14.389837] ret_from_fork+0x116/0x1d0 [ 14.390154] ret_from_fork_asm+0x1a/0x30 [ 14.390640] [ 14.390809] Freed by task 204: [ 14.391041] kasan_save_stack+0x45/0x70 [ 14.391326] kasan_save_track+0x18/0x40 [ 14.392063] kasan_save_free_info+0x3f/0x60 [ 14.392321] __kasan_slab_free+0x56/0x70 [ 14.392809] kfree+0x222/0x3f0 [ 14.392992] kmalloc_uaf_memset+0x12b/0x360 [ 14.393279] kunit_try_run_case+0x1a5/0x480 [ 14.393697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.394087] kthread+0x337/0x6f0 [ 14.394261] ret_from_fork+0x116/0x1d0 [ 14.394718] ret_from_fork_asm+0x1a/0x30 [ 14.395043] [ 14.395211] The buggy address belongs to the object at ffff888102b50e80 [ 14.395211] which belongs to the cache kmalloc-64 of size 64 [ 14.396202] The buggy address is located 0 bytes inside of [ 14.396202] freed 64-byte region [ffff888102b50e80, ffff888102b50ec0) [ 14.396991] [ 14.397118] The buggy address belongs to the physical page: [ 14.397633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50 [ 14.398102] flags: 0x200000000000000(node=0|zone=2) [ 14.398425] page_type: f5(slab) [ 14.398865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.399175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.399434] page dumped because: kasan: bad access detected [ 14.400286] [ 14.400600] Memory state around the buggy address: [ 14.400956] ffff888102b50d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.401314] ffff888102b50e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.401884] >ffff888102b50e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.402182] ^ [ 14.402604] ffff888102b50f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.403002] ffff888102b50f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.403304] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
[ 14.334777] ================================================================== [ 14.335252] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 14.335702] Read of size 1 at addr ffff8881022a34a8 by task kunit_try_catch/202 [ 14.336325] [ 14.336499] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.336581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.337042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.337087] Call Trace: [ 14.337118] <TASK> [ 14.337162] dump_stack_lvl+0x73/0xb0 [ 14.337252] print_report+0xd1/0x650 [ 14.337314] ? __virt_addr_valid+0x1db/0x2d0 [ 14.337353] ? kmalloc_uaf+0x320/0x380 [ 14.337380] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.337407] ? kmalloc_uaf+0x320/0x380 [ 14.337433] kasan_report+0x141/0x180 [ 14.337466] ? kmalloc_uaf+0x320/0x380 [ 14.337561] __asan_report_load1_noabort+0x18/0x20 [ 14.337636] kmalloc_uaf+0x320/0x380 [ 14.337666] ? __pfx_kmalloc_uaf+0x10/0x10 [ 14.337693] ? __schedule+0x10cc/0x2b60 [ 14.337724] ? __pfx_read_tsc+0x10/0x10 [ 14.337751] ? ktime_get_ts64+0x86/0x230 [ 14.337782] kunit_try_run_case+0x1a5/0x480 [ 14.337814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.337840] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.337867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.337893] ? __kthread_parkme+0x82/0x180 [ 14.337919] ? preempt_count_sub+0x50/0x80 [ 14.337950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.337977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.338003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.338030] kthread+0x337/0x6f0 [ 14.338054] ? trace_preempt_on+0x20/0xc0 [ 14.338082] ? __pfx_kthread+0x10/0x10 [ 14.338107] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.338132] ? calculate_sigpending+0x7b/0xa0 [ 14.338162] ? __pfx_kthread+0x10/0x10 [ 14.338188] ret_from_fork+0x116/0x1d0 [ 14.338211] ? __pfx_kthread+0x10/0x10 [ 14.338262] ret_from_fork_asm+0x1a/0x30 [ 14.338298] </TASK> [ 14.338311] [ 14.347725] Allocated by task 202: [ 14.347880] kasan_save_stack+0x45/0x70 [ 14.348054] kasan_save_track+0x18/0x40 [ 14.348207] kasan_save_alloc_info+0x3b/0x50 [ 14.348441] __kasan_kmalloc+0xb7/0xc0 [ 14.349043] __kmalloc_cache_noprof+0x189/0x420 [ 14.349426] kmalloc_uaf+0xaa/0x380 [ 14.350586] kunit_try_run_case+0x1a5/0x480 [ 14.351048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.351346] kthread+0x337/0x6f0 [ 14.352643] ret_from_fork+0x116/0x1d0 [ 14.352935] ret_from_fork_asm+0x1a/0x30 [ 14.353246] [ 14.353399] Freed by task 202: [ 14.353654] kasan_save_stack+0x45/0x70 [ 14.354306] kasan_save_track+0x18/0x40 [ 14.354651] kasan_save_free_info+0x3f/0x60 [ 14.355179] __kasan_slab_free+0x56/0x70 [ 14.355502] kfree+0x222/0x3f0 [ 14.355772] kmalloc_uaf+0x12c/0x380 [ 14.355969] kunit_try_run_case+0x1a5/0x480 [ 14.356346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.356878] kthread+0x337/0x6f0 [ 14.357118] ret_from_fork+0x116/0x1d0 [ 14.357309] ret_from_fork_asm+0x1a/0x30 [ 14.357747] [ 14.357908] The buggy address belongs to the object at ffff8881022a34a0 [ 14.357908] which belongs to the cache kmalloc-16 of size 16 [ 14.358506] The buggy address is located 8 bytes inside of [ 14.358506] freed 16-byte region [ffff8881022a34a0, ffff8881022a34b0) [ 14.359154] [ 14.359337] The buggy address belongs to the physical page: [ 14.359696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 14.360672] flags: 0x200000000000000(node=0|zone=2) [ 14.361132] page_type: f5(slab) [ 14.361399] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.362159] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.362730] page dumped because: kasan: bad access detected [ 14.363118] [ 14.363504] Memory state around the buggy address: [ 14.363867] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.364151] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 14.364784] >ffff8881022a3480: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 14.365021] ^ [ 14.365310] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.365815] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.366268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
[ 14.309832] ================================================================== [ 14.310311] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.311155] Read of size 64 at addr ffff88810230b104 by task kunit_try_catch/200 [ 14.311474] [ 14.311677] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.311772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.311794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.311820] Call Trace: [ 14.311835] <TASK> [ 14.311862] dump_stack_lvl+0x73/0xb0 [ 14.311898] print_report+0xd1/0x650 [ 14.311921] ? __virt_addr_valid+0x1db/0x2d0 [ 14.311954] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.311990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.312022] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.312062] kasan_report+0x141/0x180 [ 14.312103] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.312159] kasan_check_range+0x10c/0x1c0 [ 14.312206] __asan_memmove+0x27/0x70 [ 14.312261] kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.312310] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 14.312360] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 14.312415] kunit_try_run_case+0x1a5/0x480 [ 14.312445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.312489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.312509] ? __kthread_parkme+0x82/0x180 [ 14.312529] ? preempt_count_sub+0x50/0x80 [ 14.312554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.312617] kthread+0x337/0x6f0 [ 14.312635] ? trace_preempt_on+0x20/0xc0 [ 14.312658] ? __pfx_kthread+0x10/0x10 [ 14.312678] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.312697] ? calculate_sigpending+0x7b/0xa0 [ 14.312720] ? __pfx_kthread+0x10/0x10 [ 14.312740] ret_from_fork+0x116/0x1d0 [ 14.312758] ? __pfx_kthread+0x10/0x10 [ 14.312777] ret_from_fork_asm+0x1a/0x30 [ 14.312808] </TASK> [ 14.312820] [ 14.319761] Allocated by task 200: [ 14.320066] kasan_save_stack+0x45/0x70 [ 14.320399] kasan_save_track+0x18/0x40 [ 14.320681] kasan_save_alloc_info+0x3b/0x50 [ 14.321001] __kasan_kmalloc+0xb7/0xc0 [ 14.321319] __kmalloc_cache_noprof+0x189/0x420 [ 14.321657] kmalloc_memmove_invalid_size+0xac/0x330 [ 14.322046] kunit_try_run_case+0x1a5/0x480 [ 14.322377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.322774] kthread+0x337/0x6f0 [ 14.323054] ret_from_fork+0x116/0x1d0 [ 14.323374] ret_from_fork_asm+0x1a/0x30 [ 14.323690] [ 14.323806] The buggy address belongs to the object at ffff88810230b100 [ 14.323806] which belongs to the cache kmalloc-64 of size 64 [ 14.324281] The buggy address is located 4 bytes inside of [ 14.324281] allocated 64-byte region [ffff88810230b100, ffff88810230b140) [ 14.324829] [ 14.324990] The buggy address belongs to the physical page: [ 14.325282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230b [ 14.325660] flags: 0x200000000000000(node=0|zone=2) [ 14.325923] page_type: f5(slab) [ 14.326088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.326607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.326939] page dumped because: kasan: bad access detected [ 14.327290] [ 14.327433] Memory state around the buggy address: [ 14.327704] ffff88810230b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.328107] ffff88810230b080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.328504] >ffff88810230b100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.328777] ^ [ 14.329044] ffff88810230b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.329359] ffff88810230b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.329641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
[ 14.279087] ================================================================== [ 14.279653] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 14.280200] Read of size 18446744073709551614 at addr ffff88810230b084 by task kunit_try_catch/198 [ 14.280546] [ 14.280686] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.280774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.280789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.280810] Call Trace: [ 14.280825] <TASK> [ 14.280845] dump_stack_lvl+0x73/0xb0 [ 14.280876] print_report+0xd1/0x650 [ 14.280902] ? __virt_addr_valid+0x1db/0x2d0 [ 14.280938] ? kmalloc_memmove_negative_size+0x171/0x330 [ 14.280969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.280989] ? kmalloc_memmove_negative_size+0x171/0x330 [ 14.281037] kasan_report+0x141/0x180 [ 14.281059] ? kmalloc_memmove_negative_size+0x171/0x330 [ 14.281086] kasan_check_range+0x10c/0x1c0 [ 14.281107] __asan_memmove+0x27/0x70 [ 14.281126] kmalloc_memmove_negative_size+0x171/0x330 [ 14.281148] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 14.281171] ? __schedule+0x10cc/0x2b60 [ 14.281192] ? __pfx_read_tsc+0x10/0x10 [ 14.281212] ? ktime_get_ts64+0x86/0x230 [ 14.281522] kunit_try_run_case+0x1a5/0x480 [ 14.281573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.281609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.281653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.281695] ? __kthread_parkme+0x82/0x180 [ 14.281738] ? preempt_count_sub+0x50/0x80 [ 14.281787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.281833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.281878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.281921] kthread+0x337/0x6f0 [ 14.281960] ? trace_preempt_on+0x20/0xc0 [ 14.282006] ? __pfx_kthread+0x10/0x10 [ 14.282046] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.282087] ? calculate_sigpending+0x7b/0xa0 [ 14.282120] ? __pfx_kthread+0x10/0x10 [ 14.282184] ret_from_fork+0x116/0x1d0 [ 14.282212] ? __pfx_kthread+0x10/0x10 [ 14.282245] ret_from_fork_asm+0x1a/0x30 [ 14.282277] </TASK> [ 14.282289] [ 14.292037] Allocated by task 198: [ 14.292443] kasan_save_stack+0x45/0x70 [ 14.292651] kasan_save_track+0x18/0x40 [ 14.292822] kasan_save_alloc_info+0x3b/0x50 [ 14.292997] __kasan_kmalloc+0xb7/0xc0 [ 14.293161] __kmalloc_cache_noprof+0x189/0x420 [ 14.293355] kmalloc_memmove_negative_size+0xac/0x330 [ 14.294037] kunit_try_run_case+0x1a5/0x480 [ 14.294405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.295048] kthread+0x337/0x6f0 [ 14.295436] ret_from_fork+0x116/0x1d0 [ 14.295950] ret_from_fork_asm+0x1a/0x30 [ 14.296423] [ 14.296777] The buggy address belongs to the object at ffff88810230b080 [ 14.296777] which belongs to the cache kmalloc-64 of size 64 [ 14.297362] The buggy address is located 4 bytes inside of [ 14.297362] 64-byte region [ffff88810230b080, ffff88810230b0c0) [ 14.297991] [ 14.298154] The buggy address belongs to the physical page: [ 14.298559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230b [ 14.299060] flags: 0x200000000000000(node=0|zone=2) [ 14.299519] page_type: f5(slab) [ 14.299887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.300163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.300417] page dumped because: kasan: bad access detected [ 14.300619] [ 14.300720] Memory state around the buggy address: [ 14.301219] ffff88810230af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.301960] ffff88810230b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.302589] >ffff88810230b080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.302822] ^ [ 14.303040] ffff88810230b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.303775] ffff88810230b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.304306] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
[ 14.244142] ================================================================== [ 14.244610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 14.245662] Write of size 16 at addr ffff8881022f9f69 by task kunit_try_catch/196 [ 14.246612] [ 14.246889] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.246989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.247013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.247053] Call Trace: [ 14.247078] <TASK> [ 14.247109] dump_stack_lvl+0x73/0xb0 [ 14.247180] print_report+0xd1/0x650 [ 14.247251] ? __virt_addr_valid+0x1db/0x2d0 [ 14.247303] ? kmalloc_oob_memset_16+0x166/0x330 [ 14.247347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.247377] ? kmalloc_oob_memset_16+0x166/0x330 [ 14.247400] kasan_report+0x141/0x180 [ 14.247423] ? kmalloc_oob_memset_16+0x166/0x330 [ 14.247450] kasan_check_range+0x10c/0x1c0 [ 14.247488] __asan_memset+0x27/0x50 [ 14.247520] kmalloc_oob_memset_16+0x166/0x330 [ 14.247556] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 14.247593] ? __schedule+0x10cc/0x2b60 [ 14.247628] ? __pfx_read_tsc+0x10/0x10 [ 14.247661] ? ktime_get_ts64+0x86/0x230 [ 14.247699] kunit_try_run_case+0x1a5/0x480 [ 14.247739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.247774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.247812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.247849] ? __kthread_parkme+0x82/0x180 [ 14.247885] ? preempt_count_sub+0x50/0x80 [ 14.247911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.247935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.247959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.247982] kthread+0x337/0x6f0 [ 14.248001] ? trace_preempt_on+0x20/0xc0 [ 14.248027] ? __pfx_kthread+0x10/0x10 [ 14.248047] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.248068] ? calculate_sigpending+0x7b/0xa0 [ 14.248093] ? __pfx_kthread+0x10/0x10 [ 14.248114] ret_from_fork+0x116/0x1d0 [ 14.248133] ? __pfx_kthread+0x10/0x10 [ 14.248152] ret_from_fork_asm+0x1a/0x30 [ 14.248184] </TASK> [ 14.248196] [ 14.258378] Allocated by task 196: [ 14.258606] kasan_save_stack+0x45/0x70 [ 14.258882] kasan_save_track+0x18/0x40 [ 14.259106] kasan_save_alloc_info+0x3b/0x50 [ 14.260310] __kasan_kmalloc+0xb7/0xc0 [ 14.260822] __kmalloc_cache_noprof+0x189/0x420 [ 14.261041] kmalloc_oob_memset_16+0xac/0x330 [ 14.261236] kunit_try_run_case+0x1a5/0x480 [ 14.261419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.261772] kthread+0x337/0x6f0 [ 14.262173] ret_from_fork+0x116/0x1d0 [ 14.262713] ret_from_fork_asm+0x1a/0x30 [ 14.263388] [ 14.263871] The buggy address belongs to the object at ffff8881022f9f00 [ 14.263871] which belongs to the cache kmalloc-128 of size 128 [ 14.264879] The buggy address is located 105 bytes inside of [ 14.264879] allocated 120-byte region [ffff8881022f9f00, ffff8881022f9f78) [ 14.265665] [ 14.265929] The buggy address belongs to the physical page: [ 14.266372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 14.267185] flags: 0x200000000000000(node=0|zone=2) [ 14.267770] page_type: f5(slab) [ 14.268039] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.268769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.268987] page dumped because: kasan: bad access detected [ 14.269471] [ 14.269579] Memory state around the buggy address: [ 14.269942] ffff8881022f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.270533] ffff8881022f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.271357] >ffff8881022f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.272045] ^ [ 14.272669] ffff8881022f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.273263] ffff8881022fa000: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc [ 14.273847] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
[ 14.211778] ================================================================== [ 14.212207] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 14.212757] Write of size 8 at addr ffff888102b48e71 by task kunit_try_catch/194 [ 14.213353] [ 14.213887] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.213988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.214012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.214050] Call Trace: [ 14.214114] <TASK> [ 14.214147] dump_stack_lvl+0x73/0xb0 [ 14.214205] print_report+0xd1/0x650 [ 14.214264] ? __virt_addr_valid+0x1db/0x2d0 [ 14.214310] ? kmalloc_oob_memset_8+0x166/0x330 [ 14.214357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.214382] ? kmalloc_oob_memset_8+0x166/0x330 [ 14.214406] kasan_report+0x141/0x180 [ 14.214430] ? kmalloc_oob_memset_8+0x166/0x330 [ 14.214472] kasan_check_range+0x10c/0x1c0 [ 14.214535] __asan_memset+0x27/0x50 [ 14.214567] kmalloc_oob_memset_8+0x166/0x330 [ 14.214603] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 14.214628] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.214652] ? trace_hardirqs_on+0x37/0xe0 [ 14.214677] ? __pfx_read_tsc+0x10/0x10 [ 14.214699] ? ktime_get_ts64+0x86/0x230 [ 14.214724] kunit_try_run_case+0x1a5/0x480 [ 14.214748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.214771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.214794] ? __kthread_parkme+0x82/0x180 [ 14.214814] ? preempt_count_sub+0x50/0x80 [ 14.214837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.214860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.214881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.214903] kthread+0x337/0x6f0 [ 14.214921] ? trace_preempt_on+0x20/0xc0 [ 14.214942] ? __pfx_kthread+0x10/0x10 [ 14.214962] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.214981] ? calculate_sigpending+0x7b/0xa0 [ 14.215006] ? __pfx_kthread+0x10/0x10 [ 14.215027] ret_from_fork+0x116/0x1d0 [ 14.215044] ? __pfx_kthread+0x10/0x10 [ 14.215064] ret_from_fork_asm+0x1a/0x30 [ 14.215097] </TASK> [ 14.215110] [ 14.225521] Allocated by task 194: [ 14.225803] kasan_save_stack+0x45/0x70 [ 14.226077] kasan_save_track+0x18/0x40 [ 14.226296] kasan_save_alloc_info+0x3b/0x50 [ 14.226561] __kasan_kmalloc+0xb7/0xc0 [ 14.227296] __kmalloc_cache_noprof+0x189/0x420 [ 14.227714] kmalloc_oob_memset_8+0xac/0x330 [ 14.228027] kunit_try_run_case+0x1a5/0x480 [ 14.228347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.228718] kthread+0x337/0x6f0 [ 14.228985] ret_from_fork+0x116/0x1d0 [ 14.229168] ret_from_fork_asm+0x1a/0x30 [ 14.229762] [ 14.229923] The buggy address belongs to the object at ffff888102b48e00 [ 14.229923] which belongs to the cache kmalloc-128 of size 128 [ 14.230581] The buggy address is located 113 bytes inside of [ 14.230581] allocated 120-byte region [ffff888102b48e00, ffff888102b48e78) [ 14.231741] [ 14.231909] The buggy address belongs to the physical page: [ 14.232119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.232708] flags: 0x200000000000000(node=0|zone=2) [ 14.233091] page_type: f5(slab) [ 14.233638] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.234635] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.235308] page dumped because: kasan: bad access detected [ 14.235708] [ 14.236158] Memory state around the buggy address: [ 14.236533] ffff888102b48d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.236818] ffff888102b48d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.237156] >ffff888102b48e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.237522] ^ [ 14.238446] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.239039] ffff888102b48f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.239364] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
[ 14.178086] ================================================================== [ 14.178539] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 14.179323] Write of size 4 at addr ffff8881022f9e75 by task kunit_try_catch/192 [ 14.179874] [ 14.180130] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.180236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.180261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.180300] Call Trace: [ 14.180355] <TASK> [ 14.180391] dump_stack_lvl+0x73/0xb0 [ 14.180512] print_report+0xd1/0x650 [ 14.180562] ? __virt_addr_valid+0x1db/0x2d0 [ 14.180614] ? kmalloc_oob_memset_4+0x166/0x330 [ 14.180655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.180687] ? kmalloc_oob_memset_4+0x166/0x330 [ 14.180709] kasan_report+0x141/0x180 [ 14.180732] ? kmalloc_oob_memset_4+0x166/0x330 [ 14.180758] kasan_check_range+0x10c/0x1c0 [ 14.180781] __asan_memset+0x27/0x50 [ 14.180800] kmalloc_oob_memset_4+0x166/0x330 [ 14.180822] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 14.180844] ? __schedule+0x10cc/0x2b60 [ 14.180867] ? __pfx_read_tsc+0x10/0x10 [ 14.180888] ? ktime_get_ts64+0x86/0x230 [ 14.180913] kunit_try_run_case+0x1a5/0x480 [ 14.180939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.180960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.180982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.181003] ? __kthread_parkme+0x82/0x180 [ 14.181025] ? preempt_count_sub+0x50/0x80 [ 14.181050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.181072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.181095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.181117] kthread+0x337/0x6f0 [ 14.181136] ? trace_preempt_on+0x20/0xc0 [ 14.181159] ? __pfx_kthread+0x10/0x10 [ 14.181179] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.181199] ? calculate_sigpending+0x7b/0xa0 [ 14.181242] ? __pfx_kthread+0x10/0x10 [ 14.181287] ret_from_fork+0x116/0x1d0 [ 14.181314] ? __pfx_kthread+0x10/0x10 [ 14.181362] ret_from_fork_asm+0x1a/0x30 [ 14.181407] </TASK> [ 14.181421] [ 14.191920] Allocated by task 192: [ 14.192062] kasan_save_stack+0x45/0x70 [ 14.192209] kasan_save_track+0x18/0x40 [ 14.192385] kasan_save_alloc_info+0x3b/0x50 [ 14.192785] __kasan_kmalloc+0xb7/0xc0 [ 14.193132] __kmalloc_cache_noprof+0x189/0x420 [ 14.193479] kmalloc_oob_memset_4+0xac/0x330 [ 14.193849] kunit_try_run_case+0x1a5/0x480 [ 14.194047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.194259] kthread+0x337/0x6f0 [ 14.194547] ret_from_fork+0x116/0x1d0 [ 14.194857] ret_from_fork_asm+0x1a/0x30 [ 14.195173] [ 14.196485] The buggy address belongs to the object at ffff8881022f9e00 [ 14.196485] which belongs to the cache kmalloc-128 of size 128 [ 14.197351] The buggy address is located 117 bytes inside of [ 14.197351] allocated 120-byte region [ffff8881022f9e00, ffff8881022f9e78) [ 14.198339] [ 14.198516] The buggy address belongs to the physical page: [ 14.198721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 14.198967] flags: 0x200000000000000(node=0|zone=2) [ 14.199364] page_type: f5(slab) [ 14.199655] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.200104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.200805] page dumped because: kasan: bad access detected [ 14.201176] [ 14.201279] Memory state around the buggy address: [ 14.201470] ffff8881022f9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.202464] ffff8881022f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.202987] >ffff8881022f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.203300] ^ [ 14.203886] ffff8881022f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.204243] ffff8881022f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.204907] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
[ 14.143160] ================================================================== [ 14.143881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 14.144082] Write of size 2 at addr ffff8881022f9d77 by task kunit_try_catch/190 [ 14.144216] [ 14.144361] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.144450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.144470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.144504] Call Trace: [ 14.144529] <TASK> [ 14.144562] dump_stack_lvl+0x73/0xb0 [ 14.144611] print_report+0xd1/0x650 [ 14.144647] ? __virt_addr_valid+0x1db/0x2d0 [ 14.144682] ? kmalloc_oob_memset_2+0x166/0x330 [ 14.145153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.145206] ? kmalloc_oob_memset_2+0x166/0x330 [ 14.145256] kasan_report+0x141/0x180 [ 14.145302] ? kmalloc_oob_memset_2+0x166/0x330 [ 14.145390] kasan_check_range+0x10c/0x1c0 [ 14.145607] __asan_memset+0x27/0x50 [ 14.145672] kmalloc_oob_memset_2+0x166/0x330 [ 14.145710] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 14.145734] ? __schedule+0x10cc/0x2b60 [ 14.145758] ? __pfx_read_tsc+0x10/0x10 [ 14.145779] ? ktime_get_ts64+0x86/0x230 [ 14.145803] kunit_try_run_case+0x1a5/0x480 [ 14.145827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.145847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.145870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.145890] ? __kthread_parkme+0x82/0x180 [ 14.145911] ? preempt_count_sub+0x50/0x80 [ 14.145934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.145957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.145978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.145999] kthread+0x337/0x6f0 [ 14.146017] ? trace_preempt_on+0x20/0xc0 [ 14.146041] ? __pfx_kthread+0x10/0x10 [ 14.146061] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.146080] ? calculate_sigpending+0x7b/0xa0 [ 14.146104] ? __pfx_kthread+0x10/0x10 [ 14.146124] ret_from_fork+0x116/0x1d0 [ 14.146142] ? __pfx_kthread+0x10/0x10 [ 14.146161] ret_from_fork_asm+0x1a/0x30 [ 14.146192] </TASK> [ 14.146204] [ 14.157858] Allocated by task 190: [ 14.158079] kasan_save_stack+0x45/0x70 [ 14.158657] kasan_save_track+0x18/0x40 [ 14.158914] kasan_save_alloc_info+0x3b/0x50 [ 14.159097] __kasan_kmalloc+0xb7/0xc0 [ 14.159345] __kmalloc_cache_noprof+0x189/0x420 [ 14.160257] kmalloc_oob_memset_2+0xac/0x330 [ 14.160882] kunit_try_run_case+0x1a5/0x480 [ 14.161285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.161664] kthread+0x337/0x6f0 [ 14.162028] ret_from_fork+0x116/0x1d0 [ 14.162411] ret_from_fork_asm+0x1a/0x30 [ 14.162844] [ 14.163011] The buggy address belongs to the object at ffff8881022f9d00 [ 14.163011] which belongs to the cache kmalloc-128 of size 128 [ 14.164183] The buggy address is located 119 bytes inside of [ 14.164183] allocated 120-byte region [ffff8881022f9d00, ffff8881022f9d78) [ 14.164741] [ 14.164918] The buggy address belongs to the physical page: [ 14.165357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 14.165987] flags: 0x200000000000000(node=0|zone=2) [ 14.166439] page_type: f5(slab) [ 14.166868] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.167316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.168125] page dumped because: kasan: bad access detected [ 14.168785] [ 14.168990] Memory state around the buggy address: [ 14.169233] ffff8881022f9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.169599] ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.170258] >ffff8881022f9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.170879] ^ [ 14.171235] ffff8881022f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.171527] ffff8881022f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.171992] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
[ 14.110649] ================================================================== [ 14.111266] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 14.112029] Write of size 128 at addr ffff8881022f9c00 by task kunit_try_catch/188 [ 14.112612] [ 14.112887] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.112976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.113309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.113335] Call Trace: [ 14.113351] <TASK> [ 14.113374] dump_stack_lvl+0x73/0xb0 [ 14.113413] print_report+0xd1/0x650 [ 14.113437] ? __virt_addr_valid+0x1db/0x2d0 [ 14.113469] ? kmalloc_oob_in_memset+0x15f/0x320 [ 14.113531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.113567] ? kmalloc_oob_in_memset+0x15f/0x320 [ 14.113619] kasan_report+0x141/0x180 [ 14.113643] ? kmalloc_oob_in_memset+0x15f/0x320 [ 14.113668] kasan_check_range+0x10c/0x1c0 [ 14.113690] __asan_memset+0x27/0x50 [ 14.113709] kmalloc_oob_in_memset+0x15f/0x320 [ 14.113730] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 14.113750] ? __schedule+0x10cc/0x2b60 [ 14.113772] ? __pfx_read_tsc+0x10/0x10 [ 14.113793] ? ktime_get_ts64+0x86/0x230 [ 14.113817] kunit_try_run_case+0x1a5/0x480 [ 14.113843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.113862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.113883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.113903] ? __kthread_parkme+0x82/0x180 [ 14.113924] ? preempt_count_sub+0x50/0x80 [ 14.113949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.113970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.113990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.114010] kthread+0x337/0x6f0 [ 14.114028] ? trace_preempt_on+0x20/0xc0 [ 14.114051] ? __pfx_kthread+0x10/0x10 [ 14.114070] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.114089] ? calculate_sigpending+0x7b/0xa0 [ 14.114112] ? __pfx_kthread+0x10/0x10 [ 14.114132] ret_from_fork+0x116/0x1d0 [ 14.114149] ? __pfx_kthread+0x10/0x10 [ 14.114168] ret_from_fork_asm+0x1a/0x30 [ 14.114198] </TASK> [ 14.114211] [ 14.124232] Allocated by task 188: [ 14.124675] kasan_save_stack+0x45/0x70 [ 14.125067] kasan_save_track+0x18/0x40 [ 14.125277] kasan_save_alloc_info+0x3b/0x50 [ 14.125800] __kasan_kmalloc+0xb7/0xc0 [ 14.126130] __kmalloc_cache_noprof+0x189/0x420 [ 14.126450] kmalloc_oob_in_memset+0xac/0x320 [ 14.126972] kunit_try_run_case+0x1a5/0x480 [ 14.127314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.127646] kthread+0x337/0x6f0 [ 14.127814] ret_from_fork+0x116/0x1d0 [ 14.128106] ret_from_fork_asm+0x1a/0x30 [ 14.128775] [ 14.128954] The buggy address belongs to the object at ffff8881022f9c00 [ 14.128954] which belongs to the cache kmalloc-128 of size 128 [ 14.129739] The buggy address is located 0 bytes inside of [ 14.129739] allocated 120-byte region [ffff8881022f9c00, ffff8881022f9c78) [ 14.130707] [ 14.130890] The buggy address belongs to the physical page: [ 14.131316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 14.131789] flags: 0x200000000000000(node=0|zone=2) [ 14.132204] page_type: f5(slab) [ 14.132717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.133267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.133904] page dumped because: kasan: bad access detected [ 14.134292] [ 14.134611] Memory state around the buggy address: [ 14.135002] ffff8881022f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.135399] ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.136023] >ffff8881022f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.136705] ^ [ 14.137119] ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.137402] ffff8881022f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.138019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
[ 14.068884] ================================================================== [ 14.069367] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 14.069866] Read of size 16 at addr ffff888102817b40 by task kunit_try_catch/186 [ 14.070080] [ 14.070185] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.070266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.070286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.070324] Call Trace: [ 14.070357] <TASK> [ 14.070391] dump_stack_lvl+0x73/0xb0 [ 14.070795] print_report+0xd1/0x650 [ 14.070908] ? __virt_addr_valid+0x1db/0x2d0 [ 14.070972] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.071026] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.071077] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.071124] kasan_report+0x141/0x180 [ 14.071167] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.071218] __asan_report_load16_noabort+0x18/0x20 [ 14.071272] kmalloc_uaf_16+0x47b/0x4c0 [ 14.071334] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 14.071384] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 14.071435] kunit_try_run_case+0x1a5/0x480 [ 14.071521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.071562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.071741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.071781] ? __kthread_parkme+0x82/0x180 [ 14.071813] ? preempt_count_sub+0x50/0x80 [ 14.071842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.071866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.071938] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.071963] kthread+0x337/0x6f0 [ 14.071983] ? trace_preempt_on+0x20/0xc0 [ 14.072009] ? __pfx_kthread+0x10/0x10 [ 14.072029] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.072050] ? calculate_sigpending+0x7b/0xa0 [ 14.072074] ? __pfx_kthread+0x10/0x10 [ 14.072095] ret_from_fork+0x116/0x1d0 [ 14.072115] ? __pfx_kthread+0x10/0x10 [ 14.072135] ret_from_fork_asm+0x1a/0x30 [ 14.072167] </TASK> [ 14.072180] [ 14.083314] Allocated by task 186: [ 14.083676] kasan_save_stack+0x45/0x70 [ 14.084078] kasan_save_track+0x18/0x40 [ 14.084406] kasan_save_alloc_info+0x3b/0x50 [ 14.084813] __kasan_kmalloc+0xb7/0xc0 [ 14.085153] __kmalloc_cache_noprof+0x189/0x420 [ 14.085682] kmalloc_uaf_16+0x15b/0x4c0 [ 14.086028] kunit_try_run_case+0x1a5/0x480 [ 14.086479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.086947] kthread+0x337/0x6f0 [ 14.087252] ret_from_fork+0x116/0x1d0 [ 14.087620] ret_from_fork_asm+0x1a/0x30 [ 14.087969] [ 14.088249] Freed by task 186: [ 14.088511] kasan_save_stack+0x45/0x70 [ 14.088859] kasan_save_track+0x18/0x40 [ 14.089155] kasan_save_free_info+0x3f/0x60 [ 14.089570] __kasan_slab_free+0x56/0x70 [ 14.089785] kfree+0x222/0x3f0 [ 14.089973] kmalloc_uaf_16+0x1d6/0x4c0 [ 14.090358] kunit_try_run_case+0x1a5/0x480 [ 14.090786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091198] kthread+0x337/0x6f0 [ 14.091603] ret_from_fork+0x116/0x1d0 [ 14.092067] ret_from_fork_asm+0x1a/0x30 [ 14.092398] [ 14.092609] The buggy address belongs to the object at ffff888102817b40 [ 14.092609] which belongs to the cache kmalloc-16 of size 16 [ 14.093446] The buggy address is located 0 bytes inside of [ 14.093446] freed 16-byte region [ffff888102817b40, ffff888102817b50) [ 14.094091] [ 14.094293] The buggy address belongs to the physical page: [ 14.094779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102817 [ 14.095644] flags: 0x200000000000000(node=0|zone=2) [ 14.096026] page_type: f5(slab) [ 14.096386] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.096899] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.097879] page dumped because: kasan: bad access detected [ 14.098247] [ 14.098404] Memory state around the buggy address: [ 14.098691] ffff888102817a00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.099910] ffff888102817a80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.100268] >ffff888102817b00: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 14.100723] ^ [ 14.100952] ffff888102817b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.103435] ffff888102817c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.104005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
[ 14.036681] ================================================================== [ 14.037276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 14.038346] Write of size 16 at addr ffff8881022a3460 by task kunit_try_catch/184 [ 14.039025] [ 14.039200] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.039313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.039350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.039388] Call Trace: [ 14.039417] <TASK> [ 14.039451] dump_stack_lvl+0x73/0xb0 [ 14.039519] print_report+0xd1/0x650 [ 14.039589] ? __virt_addr_valid+0x1db/0x2d0 [ 14.039629] ? kmalloc_oob_16+0x452/0x4a0 [ 14.039664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.039693] ? kmalloc_oob_16+0x452/0x4a0 [ 14.039713] kasan_report+0x141/0x180 [ 14.039734] ? kmalloc_oob_16+0x452/0x4a0 [ 14.039759] __asan_report_store16_noabort+0x1b/0x30 [ 14.039778] kmalloc_oob_16+0x452/0x4a0 [ 14.039798] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 14.039819] ? __schedule+0x10cc/0x2b60 [ 14.039840] ? __pfx_read_tsc+0x10/0x10 [ 14.039861] ? ktime_get_ts64+0x86/0x230 [ 14.039884] kunit_try_run_case+0x1a5/0x480 [ 14.039909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.039929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.039950] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.039972] ? __kthread_parkme+0x82/0x180 [ 14.039993] ? preempt_count_sub+0x50/0x80 [ 14.040016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.040037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.040058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.040078] kthread+0x337/0x6f0 [ 14.040096] ? trace_preempt_on+0x20/0xc0 [ 14.040119] ? __pfx_kthread+0x10/0x10 [ 14.040139] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.040158] ? calculate_sigpending+0x7b/0xa0 [ 14.040180] ? __pfx_kthread+0x10/0x10 [ 14.040200] ret_from_fork+0x116/0x1d0 [ 14.040217] ? __pfx_kthread+0x10/0x10 [ 14.040260] ret_from_fork_asm+0x1a/0x30 [ 14.040292] </TASK> [ 14.040304] [ 14.048761] Allocated by task 184: [ 14.049057] kasan_save_stack+0x45/0x70 [ 14.049385] kasan_save_track+0x18/0x40 [ 14.049686] kasan_save_alloc_info+0x3b/0x50 [ 14.050007] __kasan_kmalloc+0xb7/0xc0 [ 14.050853] __kmalloc_cache_noprof+0x189/0x420 [ 14.051212] kmalloc_oob_16+0xa8/0x4a0 [ 14.051704] kunit_try_run_case+0x1a5/0x480 [ 14.052056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.052318] kthread+0x337/0x6f0 [ 14.052784] ret_from_fork+0x116/0x1d0 [ 14.053031] ret_from_fork_asm+0x1a/0x30 [ 14.053357] [ 14.053707] The buggy address belongs to the object at ffff8881022a3460 [ 14.053707] which belongs to the cache kmalloc-16 of size 16 [ 14.054346] The buggy address is located 0 bytes inside of [ 14.054346] allocated 13-byte region [ffff8881022a3460, ffff8881022a346d) [ 14.055363] [ 14.055808] The buggy address belongs to the physical page: [ 14.056970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 14.057290] flags: 0x200000000000000(node=0|zone=2) [ 14.057922] page_type: f5(slab) [ 14.058318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.058874] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.059100] page dumped because: kasan: bad access detected [ 14.059484] [ 14.059637] Memory state around the buggy address: [ 14.059881] ffff8881022a3300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.060158] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.060994] >ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 14.061534] ^ [ 14.062014] ffff8881022a3480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.062882] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.063169] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
[ 13.961779] ================================================================== [ 13.962343] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 13.963033] Read of size 1 at addr ffff888100ab3800 by task kunit_try_catch/182 [ 13.963271] [ 13.963483] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.963576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.963599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.963638] Call Trace: [ 13.963666] <TASK> [ 13.963702] dump_stack_lvl+0x73/0xb0 [ 13.963766] print_report+0xd1/0x650 [ 13.963814] ? __virt_addr_valid+0x1db/0x2d0 [ 13.963858] ? krealloc_uaf+0x1b8/0x5e0 [ 13.963895] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.963937] ? krealloc_uaf+0x1b8/0x5e0 [ 13.963978] kasan_report+0x141/0x180 [ 13.964019] ? krealloc_uaf+0x1b8/0x5e0 [ 13.964060] ? krealloc_uaf+0x1b8/0x5e0 [ 13.964097] __kasan_check_byte+0x3d/0x50 [ 13.964136] krealloc_noprof+0x3f/0x340 [ 13.964183] krealloc_uaf+0x1b8/0x5e0 [ 13.964669] ? __pfx_krealloc_uaf+0x10/0x10 [ 13.964723] ? finish_task_switch.isra.0+0x153/0x700 [ 13.964750] ? __switch_to+0x47/0xf50 [ 13.964778] ? __schedule+0x10cc/0x2b60 [ 13.964800] ? __pfx_read_tsc+0x10/0x10 [ 13.964821] ? ktime_get_ts64+0x86/0x230 [ 13.964845] kunit_try_run_case+0x1a5/0x480 [ 13.964872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.964893] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.964915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.964936] ? __kthread_parkme+0x82/0x180 [ 13.964958] ? preempt_count_sub+0x50/0x80 [ 13.964979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.965001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.965021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.965042] kthread+0x337/0x6f0 [ 13.965060] ? trace_preempt_on+0x20/0xc0 [ 13.965083] ? __pfx_kthread+0x10/0x10 [ 13.965104] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.965123] ? calculate_sigpending+0x7b/0xa0 [ 13.965147] ? __pfx_kthread+0x10/0x10 [ 13.965167] ret_from_fork+0x116/0x1d0 [ 13.965185] ? __pfx_kthread+0x10/0x10 [ 13.965204] ret_from_fork_asm+0x1a/0x30 [ 13.965251] </TASK> [ 13.965266] [ 13.974960] Allocated by task 182: [ 13.975244] kasan_save_stack+0x45/0x70 [ 13.975799] kasan_save_track+0x18/0x40 [ 13.976135] kasan_save_alloc_info+0x3b/0x50 [ 13.977005] __kasan_kmalloc+0xb7/0xc0 [ 13.977352] __kmalloc_cache_noprof+0x189/0x420 [ 13.977847] krealloc_uaf+0xbb/0x5e0 [ 13.978141] kunit_try_run_case+0x1a5/0x480 [ 13.978644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.979050] kthread+0x337/0x6f0 [ 13.979347] ret_from_fork+0x116/0x1d0 [ 13.979786] ret_from_fork_asm+0x1a/0x30 [ 13.979970] [ 13.980219] Freed by task 182: [ 13.980693] kasan_save_stack+0x45/0x70 [ 13.981141] kasan_save_track+0x18/0x40 [ 13.981329] kasan_save_free_info+0x3f/0x60 [ 13.981851] __kasan_slab_free+0x56/0x70 [ 13.982198] kfree+0x222/0x3f0 [ 13.982626] krealloc_uaf+0x13d/0x5e0 [ 13.982962] kunit_try_run_case+0x1a5/0x480 [ 13.983140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.983888] kthread+0x337/0x6f0 [ 13.984135] ret_from_fork+0x116/0x1d0 [ 13.984436] ret_from_fork_asm+0x1a/0x30 [ 13.985213] [ 13.985362] The buggy address belongs to the object at ffff888100ab3800 [ 13.985362] which belongs to the cache kmalloc-256 of size 256 [ 13.985844] The buggy address is located 0 bytes inside of [ 13.985844] freed 256-byte region [ffff888100ab3800, ffff888100ab3900) [ 13.986504] [ 13.986676] The buggy address belongs to the physical page: [ 13.987067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 13.987967] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.988359] flags: 0x200000000000040(head|node=0|zone=2) [ 13.989062] page_type: f5(slab) [ 13.989297] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.989949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.990393] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.991075] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.991582] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 13.991858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.992408] page dumped because: kasan: bad access detected [ 13.993046] [ 13.993238] Memory state around the buggy address: [ 13.993760] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.994159] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.994666] >ffff888100ab3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.994913] ^ [ 13.995237] ffff888100ab3880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.995615] ffff888100ab3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.996047] ================================================================== [ 13.997346] ================================================================== [ 13.997659] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 13.998873] Read of size 1 at addr ffff888100ab3800 by task kunit_try_catch/182 [ 13.999286] [ 13.999441] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.999543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.999660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.999701] Call Trace: [ 13.999743] <TASK> [ 14.000306] dump_stack_lvl+0x73/0xb0 [ 14.000362] print_report+0xd1/0x650 [ 14.000388] ? __virt_addr_valid+0x1db/0x2d0 [ 14.000413] ? krealloc_uaf+0x53c/0x5e0 [ 14.000433] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.000456] ? krealloc_uaf+0x53c/0x5e0 [ 14.000489] kasan_report+0x141/0x180 [ 14.000544] ? krealloc_uaf+0x53c/0x5e0 [ 14.000584] __asan_report_load1_noabort+0x18/0x20 [ 14.000615] krealloc_uaf+0x53c/0x5e0 [ 14.000664] ? __pfx_krealloc_uaf+0x10/0x10 [ 14.000687] ? finish_task_switch.isra.0+0x153/0x700 [ 14.000709] ? __switch_to+0x47/0xf50 [ 14.000735] ? __schedule+0x10cc/0x2b60 [ 14.000756] ? __pfx_read_tsc+0x10/0x10 [ 14.000777] ? ktime_get_ts64+0x86/0x230 [ 14.000800] kunit_try_run_case+0x1a5/0x480 [ 14.000825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.000846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.000867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.000887] ? __kthread_parkme+0x82/0x180 [ 14.000908] ? preempt_count_sub+0x50/0x80 [ 14.000930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.000951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.000971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.000991] kthread+0x337/0x6f0 [ 14.001009] ? trace_preempt_on+0x20/0xc0 [ 14.001032] ? __pfx_kthread+0x10/0x10 [ 14.001052] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.001071] ? calculate_sigpending+0x7b/0xa0 [ 14.001093] ? __pfx_kthread+0x10/0x10 [ 14.001113] ret_from_fork+0x116/0x1d0 [ 14.001130] ? __pfx_kthread+0x10/0x10 [ 14.001149] ret_from_fork_asm+0x1a/0x30 [ 14.001178] </TASK> [ 14.001191] [ 14.012592] Allocated by task 182: [ 14.012731] kasan_save_stack+0x45/0x70 [ 14.012886] kasan_save_track+0x18/0x40 [ 14.013012] kasan_save_alloc_info+0x3b/0x50 [ 14.013146] __kasan_kmalloc+0xb7/0xc0 [ 14.013277] __kmalloc_cache_noprof+0x189/0x420 [ 14.013424] krealloc_uaf+0xbb/0x5e0 [ 14.013549] kunit_try_run_case+0x1a5/0x480 [ 14.013687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.013847] kthread+0x337/0x6f0 [ 14.013970] ret_from_fork+0x116/0x1d0 [ 14.014100] ret_from_fork_asm+0x1a/0x30 [ 14.016197] [ 14.016382] Freed by task 182: [ 14.016817] kasan_save_stack+0x45/0x70 [ 14.017050] kasan_save_track+0x18/0x40 [ 14.017265] kasan_save_free_info+0x3f/0x60 [ 14.017588] __kasan_slab_free+0x56/0x70 [ 14.017860] kfree+0x222/0x3f0 [ 14.018087] krealloc_uaf+0x13d/0x5e0 [ 14.018360] kunit_try_run_case+0x1a5/0x480 [ 14.018593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.018944] kthread+0x337/0x6f0 [ 14.019192] ret_from_fork+0x116/0x1d0 [ 14.020036] ret_from_fork_asm+0x1a/0x30 [ 14.020377] [ 14.020518] The buggy address belongs to the object at ffff888100ab3800 [ 14.020518] which belongs to the cache kmalloc-256 of size 256 [ 14.021021] The buggy address is located 0 bytes inside of [ 14.021021] freed 256-byte region [ffff888100ab3800, ffff888100ab3900) [ 14.021741] [ 14.021942] The buggy address belongs to the physical page: [ 14.022194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 14.022554] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.023014] flags: 0x200000000000040(head|node=0|zone=2) [ 14.023887] page_type: f5(slab) [ 14.024084] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.024455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.025109] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.025437] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.026419] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 14.026904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.027201] page dumped because: kasan: bad access detected [ 14.027564] [ 14.027692] Memory state around the buggy address: [ 14.027930] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.028427] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.028673] >ffff888100ab3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.029780] ^ [ 14.030065] ffff888100ab3880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.030622] ffff888100ab3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.031022] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
[ 13.881635] ================================================================== [ 13.881867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.882148] Write of size 1 at addr ffff88810298e0da by task kunit_try_catch/180 [ 13.882953] [ 13.883557] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.883657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.883682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.883720] Call Trace: [ 13.883761] <TASK> [ 13.883796] dump_stack_lvl+0x73/0xb0 [ 13.883883] print_report+0xd1/0x650 [ 13.884091] ? __virt_addr_valid+0x1db/0x2d0 [ 13.884146] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.884195] ? kasan_addr_to_slab+0x11/0xa0 [ 13.884249] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.884298] kasan_report+0x141/0x180 [ 13.884336] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.884389] __asan_report_store1_noabort+0x1b/0x30 [ 13.884423] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.884478] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.884516] ? finish_task_switch.isra.0+0x153/0x700 [ 13.884550] ? __switch_to+0x47/0xf50 [ 13.884592] ? __schedule+0x10cc/0x2b60 [ 13.884620] ? __pfx_read_tsc+0x10/0x10 [ 13.884645] krealloc_large_less_oob+0x1c/0x30 [ 13.884668] kunit_try_run_case+0x1a5/0x480 [ 13.884695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.884715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.884737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.884758] ? __kthread_parkme+0x82/0x180 [ 13.884779] ? preempt_count_sub+0x50/0x80 [ 13.884801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.884823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.884844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.884865] kthread+0x337/0x6f0 [ 13.884884] ? trace_preempt_on+0x20/0xc0 [ 13.884907] ? __pfx_kthread+0x10/0x10 [ 13.884926] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.884946] ? calculate_sigpending+0x7b/0xa0 [ 13.884970] ? __pfx_kthread+0x10/0x10 [ 13.884990] ret_from_fork+0x116/0x1d0 [ 13.885008] ? __pfx_kthread+0x10/0x10 [ 13.885028] ret_from_fork_asm+0x1a/0x30 [ 13.885060] </TASK> [ 13.885072] [ 13.896777] The buggy address belongs to the physical page: [ 13.897158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.897682] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.898175] flags: 0x200000000000040(head|node=0|zone=2) [ 13.899160] page_type: f8(unknown) [ 13.899654] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.900162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.900637] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.900882] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.901685] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff [ 13.902097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.902420] page dumped because: kasan: bad access detected [ 13.902882] [ 13.903047] Memory state around the buggy address: [ 13.903762] ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.904175] ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.904741] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.905101] ^ [ 13.905653] ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.905955] ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.906430] ================================================================== [ 13.643860] ================================================================== [ 13.644449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.644887] Write of size 1 at addr ffff888100ab36d0 by task kunit_try_catch/176 [ 13.645261] [ 13.645459] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.645547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.645570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.645608] Call Trace: [ 13.645640] <TASK> [ 13.645672] dump_stack_lvl+0x73/0xb0 [ 13.645727] print_report+0xd1/0x650 [ 13.645772] ? __virt_addr_valid+0x1db/0x2d0 [ 13.645818] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.645863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.645907] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.645952] kasan_report+0x141/0x180 [ 13.645990] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.646039] __asan_report_store1_noabort+0x1b/0x30 [ 13.646075] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.646121] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.646166] ? finish_task_switch.isra.0+0x153/0x700 [ 13.646207] ? __switch_to+0x47/0xf50 [ 13.646271] ? __schedule+0x10cc/0x2b60 [ 13.646314] ? __pfx_read_tsc+0x10/0x10 [ 13.646373] krealloc_less_oob+0x1c/0x30 [ 13.646418] kunit_try_run_case+0x1a5/0x480 [ 13.646469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.646511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.646556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.646592] ? __kthread_parkme+0x82/0x180 [ 13.646626] ? preempt_count_sub+0x50/0x80 [ 13.646669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.646708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.646745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.646784] kthread+0x337/0x6f0 [ 13.646818] ? trace_preempt_on+0x20/0xc0 [ 13.646860] ? __pfx_kthread+0x10/0x10 [ 13.646896] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.646930] ? calculate_sigpending+0x7b/0xa0 [ 13.646970] ? __pfx_kthread+0x10/0x10 [ 13.647011] ret_from_fork+0x116/0x1d0 [ 13.647049] ? __pfx_kthread+0x10/0x10 [ 13.647091] ret_from_fork_asm+0x1a/0x30 [ 13.647151] </TASK> [ 13.647170] [ 13.657063] Allocated by task 176: [ 13.657327] kasan_save_stack+0x45/0x70 [ 13.657755] kasan_save_track+0x18/0x40 [ 13.658007] kasan_save_alloc_info+0x3b/0x50 [ 13.658190] __kasan_krealloc+0x190/0x1f0 [ 13.658951] krealloc_noprof+0xf3/0x340 [ 13.659154] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.659507] krealloc_less_oob+0x1c/0x30 [ 13.659687] kunit_try_run_case+0x1a5/0x480 [ 13.659976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.660362] kthread+0x337/0x6f0 [ 13.660620] ret_from_fork+0x116/0x1d0 [ 13.660906] ret_from_fork_asm+0x1a/0x30 [ 13.661100] [ 13.661423] The buggy address belongs to the object at ffff888100ab3600 [ 13.661423] which belongs to the cache kmalloc-256 of size 256 [ 13.661966] The buggy address is located 7 bytes to the right of [ 13.661966] allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9) [ 13.663085] [ 13.663273] The buggy address belongs to the physical page: [ 13.663706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 13.664030] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.664403] flags: 0x200000000000040(head|node=0|zone=2) [ 13.664917] page_type: f5(slab) [ 13.665091] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.665613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.666126] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.666984] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.667334] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 13.668008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.668351] page dumped because: kasan: bad access detected [ 13.668865] [ 13.669032] Memory state around the buggy address: [ 13.669267] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.669819] ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.670283] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.671113] ^ [ 13.671438] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.671903] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.672448] ================================================================== [ 13.673386] ================================================================== [ 13.673932] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.674394] Write of size 1 at addr ffff888100ab36da by task kunit_try_catch/176 [ 13.675295] [ 13.675620] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.675740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.675761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.675795] Call Trace: [ 13.675827] <TASK> [ 13.675859] dump_stack_lvl+0x73/0xb0 [ 13.675918] print_report+0xd1/0x650 [ 13.675963] ? __virt_addr_valid+0x1db/0x2d0 [ 13.676009] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.676055] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.676099] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.676145] kasan_report+0x141/0x180 [ 13.676191] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.676254] __asan_report_store1_noabort+0x1b/0x30 [ 13.676290] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.676329] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.676369] ? finish_task_switch.isra.0+0x153/0x700 [ 13.676408] ? __switch_to+0x47/0xf50 [ 13.676451] ? __schedule+0x10cc/0x2b60 [ 13.676659] ? __pfx_read_tsc+0x10/0x10 [ 13.676709] krealloc_less_oob+0x1c/0x30 [ 13.676755] kunit_try_run_case+0x1a5/0x480 [ 13.676804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.676847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.676887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.676922] ? __kthread_parkme+0x82/0x180 [ 13.676954] ? preempt_count_sub+0x50/0x80 [ 13.676992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.677030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.677071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.677115] kthread+0x337/0x6f0 [ 13.677154] ? trace_preempt_on+0x20/0xc0 [ 13.677202] ? __pfx_kthread+0x10/0x10 [ 13.677254] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.677297] ? calculate_sigpending+0x7b/0xa0 [ 13.677343] ? __pfx_kthread+0x10/0x10 [ 13.677387] ret_from_fork+0x116/0x1d0 [ 13.677421] ? __pfx_kthread+0x10/0x10 [ 13.677557] ret_from_fork_asm+0x1a/0x30 [ 13.677625] </TASK> [ 13.677640] [ 13.691284] Allocated by task 176: [ 13.691674] kasan_save_stack+0x45/0x70 [ 13.691927] kasan_save_track+0x18/0x40 [ 13.692123] kasan_save_alloc_info+0x3b/0x50 [ 13.692296] __kasan_krealloc+0x190/0x1f0 [ 13.692607] krealloc_noprof+0xf3/0x340 [ 13.692810] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.693011] krealloc_less_oob+0x1c/0x30 [ 13.693976] kunit_try_run_case+0x1a5/0x480 [ 13.694196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.694398] kthread+0x337/0x6f0 [ 13.695128] ret_from_fork+0x116/0x1d0 [ 13.695580] ret_from_fork_asm+0x1a/0x30 [ 13.696091] [ 13.696191] The buggy address belongs to the object at ffff888100ab3600 [ 13.696191] which belongs to the cache kmalloc-256 of size 256 [ 13.697085] The buggy address is located 17 bytes to the right of [ 13.697085] allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9) [ 13.697546] [ 13.697701] The buggy address belongs to the physical page: [ 13.697881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 13.698458] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.698748] flags: 0x200000000000040(head|node=0|zone=2) [ 13.699097] page_type: f5(slab) [ 13.699776] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.700071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.700337] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.700850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.701442] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 13.701908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.702423] page dumped because: kasan: bad access detected [ 13.702931] [ 13.703047] Memory state around the buggy address: [ 13.703437] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.704160] ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.704490] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.704852] ^ [ 13.705457] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.705919] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.706318] ================================================================== [ 13.854821] ================================================================== [ 13.855356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.855858] Write of size 1 at addr ffff88810298e0d0 by task kunit_try_catch/180 [ 13.856239] [ 13.856386] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.856491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.856516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.856553] Call Trace: [ 13.856578] <TASK> [ 13.856611] dump_stack_lvl+0x73/0xb0 [ 13.856727] print_report+0xd1/0x650 [ 13.856769] ? __virt_addr_valid+0x1db/0x2d0 [ 13.856816] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.856872] ? kasan_addr_to_slab+0x11/0xa0 [ 13.856915] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.856971] kasan_report+0x141/0x180 [ 13.857026] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.857088] __asan_report_store1_noabort+0x1b/0x30 [ 13.857136] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.857178] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.857217] ? finish_task_switch.isra.0+0x153/0x700 [ 13.857268] ? __switch_to+0x47/0xf50 [ 13.857317] ? __schedule+0x10cc/0x2b60 [ 13.857362] ? __pfx_read_tsc+0x10/0x10 [ 13.857415] krealloc_large_less_oob+0x1c/0x30 [ 13.857486] kunit_try_run_case+0x1a5/0x480 [ 13.857538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.857580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.857626] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.857665] ? __kthread_parkme+0x82/0x180 [ 13.857702] ? preempt_count_sub+0x50/0x80 [ 13.857737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.857773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.857813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.857873] kthread+0x337/0x6f0 [ 13.857911] ? trace_preempt_on+0x20/0xc0 [ 13.857948] ? __pfx_kthread+0x10/0x10 [ 13.857980] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.858027] ? calculate_sigpending+0x7b/0xa0 [ 13.858063] ? __pfx_kthread+0x10/0x10 [ 13.858097] ret_from_fork+0x116/0x1d0 [ 13.858128] ? __pfx_kthread+0x10/0x10 [ 13.858162] ret_from_fork_asm+0x1a/0x30 [ 13.858215] </TASK> [ 13.858245] [ 13.867170] The buggy address belongs to the physical page: [ 13.868625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.869279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.871379] flags: 0x200000000000040(head|node=0|zone=2) [ 13.871774] page_type: f8(unknown) [ 13.872042] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.872580] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.873419] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.875606] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.875939] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff [ 13.876514] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.876958] page dumped because: kasan: bad access detected [ 13.877266] [ 13.877397] Memory state around the buggy address: [ 13.877681] ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.877962] ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.878997] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.879659] ^ [ 13.880211] ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.880730] ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.881032] ================================================================== [ 13.932386] ================================================================== [ 13.932964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.933330] Write of size 1 at addr ffff88810298e0eb by task kunit_try_catch/180 [ 13.933749] [ 13.933931] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.934014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.934035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.934071] Call Trace: [ 13.934107] <TASK> [ 13.934143] dump_stack_lvl+0x73/0xb0 [ 13.934199] print_report+0xd1/0x650 [ 13.934259] ? __virt_addr_valid+0x1db/0x2d0 [ 13.934305] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.934356] ? kasan_addr_to_slab+0x11/0xa0 [ 13.934392] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.934433] kasan_report+0x141/0x180 [ 13.934474] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.934531] __asan_report_store1_noabort+0x1b/0x30 [ 13.934570] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.934618] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.934660] ? finish_task_switch.isra.0+0x153/0x700 [ 13.934701] ? __switch_to+0x47/0xf50 [ 13.934748] ? __schedule+0x10cc/0x2b60 [ 13.934789] ? __pfx_read_tsc+0x10/0x10 [ 13.934837] krealloc_large_less_oob+0x1c/0x30 [ 13.934878] kunit_try_run_case+0x1a5/0x480 [ 13.934925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.934960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.934999] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.935040] ? __kthread_parkme+0x82/0x180 [ 13.935074] ? preempt_count_sub+0x50/0x80 [ 13.935098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.935120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.935142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.935164] kthread+0x337/0x6f0 [ 13.935183] ? trace_preempt_on+0x20/0xc0 [ 13.935207] ? __pfx_kthread+0x10/0x10 [ 13.935275] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.935313] ? calculate_sigpending+0x7b/0xa0 [ 13.935348] ? __pfx_kthread+0x10/0x10 [ 13.935401] ret_from_fork+0x116/0x1d0 [ 13.935436] ? __pfx_kthread+0x10/0x10 [ 13.935488] ret_from_fork_asm+0x1a/0x30 [ 13.935549] </TASK> [ 13.935568] [ 13.945604] The buggy address belongs to the physical page: [ 13.945918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.946296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.946564] flags: 0x200000000000040(head|node=0|zone=2) [ 13.946935] page_type: f8(unknown) [ 13.947205] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.947929] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.948567] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.948823] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.949074] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff [ 13.949418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.949912] page dumped because: kasan: bad access detected [ 13.950743] [ 13.950922] Memory state around the buggy address: [ 13.951249] ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.951967] ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.952245] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.952474] ^ [ 13.953151] ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.953834] ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.954185] ================================================================== [ 13.708030] ================================================================== [ 13.708367] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.708996] Write of size 1 at addr ffff888100ab36ea by task kunit_try_catch/176 [ 13.710025] [ 13.710291] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.710392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.710416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.710487] Call Trace: [ 13.710537] <TASK> [ 13.710581] dump_stack_lvl+0x73/0xb0 [ 13.710635] print_report+0xd1/0x650 [ 13.710678] ? __virt_addr_valid+0x1db/0x2d0 [ 13.710720] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.710763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.710806] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.710851] kasan_report+0x141/0x180 [ 13.710886] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.710916] __asan_report_store1_noabort+0x1b/0x30 [ 13.710936] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.710960] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.710982] ? finish_task_switch.isra.0+0x153/0x700 [ 13.711005] ? __switch_to+0x47/0xf50 [ 13.711042] ? __schedule+0x10cc/0x2b60 [ 13.711078] ? __pfx_read_tsc+0x10/0x10 [ 13.711104] krealloc_less_oob+0x1c/0x30 [ 13.711124] kunit_try_run_case+0x1a5/0x480 [ 13.711148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.711169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.711191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.711212] ? __kthread_parkme+0x82/0x180 [ 13.711252] ? preempt_count_sub+0x50/0x80 [ 13.711275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.711297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.711318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.711339] kthread+0x337/0x6f0 [ 13.711357] ? trace_preempt_on+0x20/0xc0 [ 13.711381] ? __pfx_kthread+0x10/0x10 [ 13.711400] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.711420] ? calculate_sigpending+0x7b/0xa0 [ 13.711443] ? __pfx_kthread+0x10/0x10 [ 13.711484] ret_from_fork+0x116/0x1d0 [ 13.711515] ? __pfx_kthread+0x10/0x10 [ 13.711545] ret_from_fork_asm+0x1a/0x30 [ 13.711617] </TASK> [ 13.711631] [ 13.722326] Allocated by task 176: [ 13.722630] kasan_save_stack+0x45/0x70 [ 13.723084] kasan_save_track+0x18/0x40 [ 13.723423] kasan_save_alloc_info+0x3b/0x50 [ 13.723881] __kasan_krealloc+0x190/0x1f0 [ 13.724130] krealloc_noprof+0xf3/0x340 [ 13.724295] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.724990] krealloc_less_oob+0x1c/0x30 [ 13.725289] kunit_try_run_case+0x1a5/0x480 [ 13.725670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.725875] kthread+0x337/0x6f0 [ 13.726035] ret_from_fork+0x116/0x1d0 [ 13.726202] ret_from_fork_asm+0x1a/0x30 [ 13.726767] [ 13.726994] The buggy address belongs to the object at ffff888100ab3600 [ 13.726994] which belongs to the cache kmalloc-256 of size 256 [ 13.727789] The buggy address is located 33 bytes to the right of [ 13.727789] allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9) [ 13.729011] [ 13.729341] The buggy address belongs to the physical page: [ 13.729941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 13.730301] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.730575] flags: 0x200000000000040(head|node=0|zone=2) [ 13.730949] page_type: f5(slab) [ 13.731401] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.731929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.732939] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.733233] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.734042] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 13.734468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.734718] page dumped because: kasan: bad access detected [ 13.734953] [ 13.735111] Memory state around the buggy address: [ 13.735477] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.736261] ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.736975] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.737454] ^ [ 13.737983] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.738624] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.738992] ================================================================== [ 13.907378] ================================================================== [ 13.907809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 13.908366] Write of size 1 at addr ffff88810298e0ea by task kunit_try_catch/180 [ 13.908834] [ 13.909025] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.909117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.909140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.909177] Call Trace: [ 13.909215] <TASK> [ 13.909262] dump_stack_lvl+0x73/0xb0 [ 13.909322] print_report+0xd1/0x650 [ 13.909363] ? __virt_addr_valid+0x1db/0x2d0 [ 13.909409] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.909607] ? kasan_addr_to_slab+0x11/0xa0 [ 13.909670] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.909714] kasan_report+0x141/0x180 [ 13.909754] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 13.909806] __asan_report_store1_noabort+0x1b/0x30 [ 13.909848] krealloc_less_oob_helper+0xe90/0x11d0 [ 13.909897] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.909936] ? finish_task_switch.isra.0+0x153/0x700 [ 13.909977] ? __switch_to+0x47/0xf50 [ 13.910023] ? __schedule+0x10cc/0x2b60 [ 13.910062] ? __pfx_read_tsc+0x10/0x10 [ 13.910111] krealloc_large_less_oob+0x1c/0x30 [ 13.910155] kunit_try_run_case+0x1a5/0x480 [ 13.910198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.910290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.910328] ? __kthread_parkme+0x82/0x180 [ 13.910373] ? preempt_count_sub+0x50/0x80 [ 13.910418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.910607] kthread+0x337/0x6f0 [ 13.910642] ? trace_preempt_on+0x20/0xc0 [ 13.910681] ? __pfx_kthread+0x10/0x10 [ 13.910714] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.910749] ? calculate_sigpending+0x7b/0xa0 [ 13.910786] ? __pfx_kthread+0x10/0x10 [ 13.910821] ret_from_fork+0x116/0x1d0 [ 13.910853] ? __pfx_kthread+0x10/0x10 [ 13.910885] ret_from_fork_asm+0x1a/0x30 [ 13.910920] </TASK> [ 13.910933] [ 13.920845] The buggy address belongs to the physical page: [ 13.921134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.921419] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.921910] flags: 0x200000000000040(head|node=0|zone=2) [ 13.922283] page_type: f8(unknown) [ 13.923057] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.923586] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.923920] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.924173] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.924434] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff [ 13.925021] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.925520] page dumped because: kasan: bad access detected [ 13.925900] [ 13.926052] Memory state around the buggy address: [ 13.926405] ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.926691] ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.926934] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.927210] ^ [ 13.928163] ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.928817] ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.929274] ================================================================== [ 13.740084] ================================================================== [ 13.740556] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 13.741089] Write of size 1 at addr ffff888100ab36eb by task kunit_try_catch/176 [ 13.741688] [ 13.741934] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.742056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.742086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.742124] Call Trace: [ 13.742177] <TASK> [ 13.742214] dump_stack_lvl+0x73/0xb0 [ 13.742282] print_report+0xd1/0x650 [ 13.742328] ? __virt_addr_valid+0x1db/0x2d0 [ 13.742383] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.742438] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.742496] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.742550] kasan_report+0x141/0x180 [ 13.742674] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 13.742735] __asan_report_store1_noabort+0x1b/0x30 [ 13.742780] krealloc_less_oob_helper+0xd47/0x11d0 [ 13.742827] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.742871] ? finish_task_switch.isra.0+0x153/0x700 [ 13.742913] ? __switch_to+0x47/0xf50 [ 13.743062] ? __schedule+0x10cc/0x2b60 [ 13.743110] ? __pfx_read_tsc+0x10/0x10 [ 13.743161] krealloc_less_oob+0x1c/0x30 [ 13.743207] kunit_try_run_case+0x1a5/0x480 [ 13.743272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.743317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.743359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.743395] ? __kthread_parkme+0x82/0x180 [ 13.743421] ? preempt_count_sub+0x50/0x80 [ 13.743445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.743477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.743543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.743577] kthread+0x337/0x6f0 [ 13.743608] ? trace_preempt_on+0x20/0xc0 [ 13.743645] ? __pfx_kthread+0x10/0x10 [ 13.743676] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.743709] ? calculate_sigpending+0x7b/0xa0 [ 13.743746] ? __pfx_kthread+0x10/0x10 [ 13.743780] ret_from_fork+0x116/0x1d0 [ 13.743813] ? __pfx_kthread+0x10/0x10 [ 13.743847] ret_from_fork_asm+0x1a/0x30 [ 13.743886] </TASK> [ 13.743899] [ 13.756868] Allocated by task 176: [ 13.757445] kasan_save_stack+0x45/0x70 [ 13.757655] kasan_save_track+0x18/0x40 [ 13.758119] kasan_save_alloc_info+0x3b/0x50 [ 13.758630] __kasan_krealloc+0x190/0x1f0 [ 13.758966] krealloc_noprof+0xf3/0x340 [ 13.759188] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.759548] krealloc_less_oob+0x1c/0x30 [ 13.759813] kunit_try_run_case+0x1a5/0x480 [ 13.759993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.760406] kthread+0x337/0x6f0 [ 13.760963] ret_from_fork+0x116/0x1d0 [ 13.761275] ret_from_fork_asm+0x1a/0x30 [ 13.761598] [ 13.761755] The buggy address belongs to the object at ffff888100ab3600 [ 13.761755] which belongs to the cache kmalloc-256 of size 256 [ 13.762618] The buggy address is located 34 bytes to the right of [ 13.762618] allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9) [ 13.763284] [ 13.763462] The buggy address belongs to the physical page: [ 13.763899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 13.764296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.764546] flags: 0x200000000000040(head|node=0|zone=2) [ 13.764958] page_type: f5(slab) [ 13.765518] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.766294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.766772] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.767234] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.768024] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 13.768568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.769124] page dumped because: kasan: bad access detected [ 13.769374] [ 13.769532] Memory state around the buggy address: [ 13.769886] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.770708] ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.771185] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.771838] ^ [ 13.772156] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.772748] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.773248] ================================================================== [ 13.611596] ================================================================== [ 13.612214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.613124] Write of size 1 at addr ffff888100ab36c9 by task kunit_try_catch/176 [ 13.613978] [ 13.614356] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.614488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.614513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.614548] Call Trace: [ 13.614573] <TASK> [ 13.614604] dump_stack_lvl+0x73/0xb0 [ 13.614809] print_report+0xd1/0x650 [ 13.614838] ? __virt_addr_valid+0x1db/0x2d0 [ 13.614864] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.614888] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.614910] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.614933] kasan_report+0x141/0x180 [ 13.614955] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.614983] __asan_report_store1_noabort+0x1b/0x30 [ 13.615004] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.615029] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.615053] ? finish_task_switch.isra.0+0x153/0x700 [ 13.615076] ? __switch_to+0x47/0xf50 [ 13.615104] ? __schedule+0x10cc/0x2b60 [ 13.615126] ? __pfx_read_tsc+0x10/0x10 [ 13.615152] krealloc_less_oob+0x1c/0x30 [ 13.615173] kunit_try_run_case+0x1a5/0x480 [ 13.615199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.615231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.615259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.615282] ? __kthread_parkme+0x82/0x180 [ 13.615304] ? preempt_count_sub+0x50/0x80 [ 13.615327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.615351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.615374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.615396] kthread+0x337/0x6f0 [ 13.615416] ? trace_preempt_on+0x20/0xc0 [ 13.615438] ? __pfx_kthread+0x10/0x10 [ 13.615474] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.615508] ? calculate_sigpending+0x7b/0xa0 [ 13.615541] ? __pfx_kthread+0x10/0x10 [ 13.615574] ret_from_fork+0x116/0x1d0 [ 13.615604] ? __pfx_kthread+0x10/0x10 [ 13.615634] ret_from_fork_asm+0x1a/0x30 [ 13.615683] </TASK> [ 13.615702] [ 13.628028] Allocated by task 176: [ 13.628351] kasan_save_stack+0x45/0x70 [ 13.628671] kasan_save_track+0x18/0x40 [ 13.629180] kasan_save_alloc_info+0x3b/0x50 [ 13.629416] __kasan_krealloc+0x190/0x1f0 [ 13.629564] krealloc_noprof+0xf3/0x340 [ 13.629721] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.630045] krealloc_less_oob+0x1c/0x30 [ 13.630273] kunit_try_run_case+0x1a5/0x480 [ 13.630498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.631207] kthread+0x337/0x6f0 [ 13.631573] ret_from_fork+0x116/0x1d0 [ 13.631747] ret_from_fork_asm+0x1a/0x30 [ 13.632061] [ 13.632895] The buggy address belongs to the object at ffff888100ab3600 [ 13.632895] which belongs to the cache kmalloc-256 of size 256 [ 13.633345] The buggy address is located 0 bytes to the right of [ 13.633345] allocated 201-byte region [ffff888100ab3600, ffff888100ab36c9) [ 13.633949] [ 13.634122] The buggy address belongs to the physical page: [ 13.634472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab2 [ 13.634782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.635177] flags: 0x200000000000040(head|node=0|zone=2) [ 13.636258] page_type: f5(slab) [ 13.636660] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.637362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.637800] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.638261] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.638541] head: 0200000000000001 ffffea000402ac81 00000000ffffffff 00000000ffffffff [ 13.638947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.639168] page dumped because: kasan: bad access detected [ 13.639353] [ 13.639519] Memory state around the buggy address: [ 13.639995] ffff888100ab3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.640208] ffff888100ab3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.641373] >ffff888100ab3680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.642010] ^ [ 13.642567] ffff888100ab3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.642838] ffff888100ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.643050] ================================================================== [ 13.830916] ================================================================== [ 13.831430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.831988] Write of size 1 at addr ffff88810298e0c9 by task kunit_try_catch/180 [ 13.832400] [ 13.832576] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.832639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.832652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.832676] Call Trace: [ 13.832692] <TASK> [ 13.832714] dump_stack_lvl+0x73/0xb0 [ 13.832765] print_report+0xd1/0x650 [ 13.832811] ? __virt_addr_valid+0x1db/0x2d0 [ 13.832858] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.832904] ? kasan_addr_to_slab+0x11/0xa0 [ 13.832940] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.832977] kasan_report+0x141/0x180 [ 13.833000] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.833028] __asan_report_store1_noabort+0x1b/0x30 [ 13.833048] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.833073] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.833096] ? finish_task_switch.isra.0+0x153/0x700 [ 13.833120] ? __switch_to+0x47/0xf50 [ 13.833147] ? __schedule+0x10cc/0x2b60 [ 13.833170] ? __pfx_read_tsc+0x10/0x10 [ 13.833196] krealloc_large_less_oob+0x1c/0x30 [ 13.833218] kunit_try_run_case+0x1a5/0x480 [ 13.833897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.833940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.833976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.834014] ? __kthread_parkme+0x82/0x180 [ 13.834054] ? preempt_count_sub+0x50/0x80 [ 13.834099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.834137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.834171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.834195] kthread+0x337/0x6f0 [ 13.834214] ? trace_preempt_on+0x20/0xc0 [ 13.834265] ? __pfx_kthread+0x10/0x10 [ 13.834286] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.834306] ? calculate_sigpending+0x7b/0xa0 [ 13.834330] ? __pfx_kthread+0x10/0x10 [ 13.834365] ret_from_fork+0x116/0x1d0 [ 13.834385] ? __pfx_kthread+0x10/0x10 [ 13.834406] ret_from_fork_asm+0x1a/0x30 [ 13.834439] </TASK> [ 13.834453] [ 13.845684] The buggy address belongs to the physical page: [ 13.846079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.846758] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.847254] flags: 0x200000000000040(head|node=0|zone=2) [ 13.847649] page_type: f8(unknown) [ 13.847869] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.848442] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.848657] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.849157] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.849646] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff [ 13.850076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.850511] page dumped because: kasan: bad access detected [ 13.850869] [ 13.850991] Memory state around the buggy address: [ 13.851212] ffff88810298df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.851704] ffff88810298e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.852354] >ffff88810298e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 13.852666] ^ [ 13.852935] ffff88810298e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.853463] ffff88810298e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.853728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
[ 13.778991] ================================================================== [ 13.779429] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 13.780164] Write of size 1 at addr ffff8881025060eb by task kunit_try_catch/178 [ 13.780502] [ 13.780635] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.781486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.781518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.781552] Call Trace: [ 13.781577] <TASK> [ 13.781618] dump_stack_lvl+0x73/0xb0 [ 13.781664] print_report+0xd1/0x650 [ 13.781689] ? __virt_addr_valid+0x1db/0x2d0 [ 13.781714] ? krealloc_more_oob_helper+0x821/0x930 [ 13.781736] ? kasan_addr_to_slab+0x11/0xa0 [ 13.781755] ? krealloc_more_oob_helper+0x821/0x930 [ 13.781777] kasan_report+0x141/0x180 [ 13.781798] ? krealloc_more_oob_helper+0x821/0x930 [ 13.781824] __asan_report_store1_noabort+0x1b/0x30 [ 13.781843] krealloc_more_oob_helper+0x821/0x930 [ 13.781864] ? __schedule+0x10cc/0x2b60 [ 13.781885] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.781907] ? finish_task_switch.isra.0+0x153/0x700 [ 13.781928] ? __switch_to+0x47/0xf50 [ 13.781953] ? __schedule+0x10cc/0x2b60 [ 13.781973] ? __pfx_read_tsc+0x10/0x10 [ 13.781996] krealloc_large_more_oob+0x1c/0x30 [ 13.782018] kunit_try_run_case+0x1a5/0x480 [ 13.782040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.782060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.782082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.782102] ? __kthread_parkme+0x82/0x180 [ 13.782123] ? preempt_count_sub+0x50/0x80 [ 13.782145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.782167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.782187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.782208] kthread+0x337/0x6f0 [ 13.782246] ? trace_preempt_on+0x20/0xc0 [ 13.782272] ? __pfx_kthread+0x10/0x10 [ 13.782292] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.782313] ? calculate_sigpending+0x7b/0xa0 [ 13.782349] ? __pfx_kthread+0x10/0x10 [ 13.782374] ret_from_fork+0x116/0x1d0 [ 13.782392] ? __pfx_kthread+0x10/0x10 [ 13.782412] ret_from_fork_asm+0x1a/0x30 [ 13.782443] </TASK> [ 13.782457] [ 13.793783] The buggy address belongs to the physical page: [ 13.794010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102504 [ 13.794657] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.795203] flags: 0x200000000000040(head|node=0|zone=2) [ 13.795799] page_type: f8(unknown) [ 13.796031] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.796601] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.796878] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.797126] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.797785] head: 0200000000000002 ffffea0004094101 00000000ffffffff 00000000ffffffff [ 13.798307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.799002] page dumped because: kasan: bad access detected [ 13.799411] [ 13.799798] Memory state around the buggy address: [ 13.800155] ffff888102505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.800781] ffff888102506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.801066] >ffff888102506080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 13.801705] ^ [ 13.802050] ffff888102506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.802300] ffff888102506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.802940] ================================================================== [ 13.804255] ================================================================== [ 13.804917] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 13.805233] Write of size 1 at addr ffff8881025060f0 by task kunit_try_catch/178 [ 13.805897] [ 13.806057] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.806168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.806191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.806236] Call Trace: [ 13.806261] <TASK> [ 13.806292] dump_stack_lvl+0x73/0xb0 [ 13.806375] print_report+0xd1/0x650 [ 13.806425] ? __virt_addr_valid+0x1db/0x2d0 [ 13.806546] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.806634] ? kasan_addr_to_slab+0x11/0xa0 [ 13.806664] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.806703] kasan_report+0x141/0x180 [ 13.806742] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.806794] __asan_report_store1_noabort+0x1b/0x30 [ 13.806834] krealloc_more_oob_helper+0x7eb/0x930 [ 13.806876] ? __schedule+0x10cc/0x2b60 [ 13.806921] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.806962] ? finish_task_switch.isra.0+0x153/0x700 [ 13.807028] ? __switch_to+0x47/0xf50 [ 13.807077] ? __schedule+0x10cc/0x2b60 [ 13.807117] ? __pfx_read_tsc+0x10/0x10 [ 13.807166] krealloc_large_more_oob+0x1c/0x30 [ 13.807214] kunit_try_run_case+0x1a5/0x480 [ 13.807274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.807298] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.807322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.807344] ? __kthread_parkme+0x82/0x180 [ 13.807366] ? preempt_count_sub+0x50/0x80 [ 13.807388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.807410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.807432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.807454] kthread+0x337/0x6f0 [ 13.807484] ? trace_preempt_on+0x20/0xc0 [ 13.807545] ? __pfx_kthread+0x10/0x10 [ 13.807575] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.807623] ? calculate_sigpending+0x7b/0xa0 [ 13.807655] ? __pfx_kthread+0x10/0x10 [ 13.807683] ret_from_fork+0x116/0x1d0 [ 13.807709] ? __pfx_kthread+0x10/0x10 [ 13.807736] ret_from_fork_asm+0x1a/0x30 [ 13.807779] </TASK> [ 13.807797] [ 13.816571] The buggy address belongs to the physical page: [ 13.816790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102504 [ 13.817070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.817595] flags: 0x200000000000040(head|node=0|zone=2) [ 13.818000] page_type: f8(unknown) [ 13.818315] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.818949] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.819250] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.819510] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.819761] head: 0200000000000002 ffffea0004094101 00000000ffffffff 00000000ffffffff [ 13.820316] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.820810] page dumped because: kasan: bad access detected [ 13.821191] [ 13.821361] Memory state around the buggy address: [ 13.821816] ffff888102505f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.822361] ffff888102506000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.822606] >ffff888102506080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 13.822839] ^ [ 13.823075] ffff888102506100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.823459] ffff888102506180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.823906] ================================================================== [ 13.553128] ================================================================== [ 13.553605] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 13.554006] Write of size 1 at addr ffff88810033eeeb by task kunit_try_catch/174 [ 13.554954] [ 13.555287] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.555413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.555436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.555461] Call Trace: [ 13.555478] <TASK> [ 13.555498] dump_stack_lvl+0x73/0xb0 [ 13.555535] print_report+0xd1/0x650 [ 13.555559] ? __virt_addr_valid+0x1db/0x2d0 [ 13.555583] ? krealloc_more_oob_helper+0x821/0x930 [ 13.555606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.555628] ? krealloc_more_oob_helper+0x821/0x930 [ 13.555651] kasan_report+0x141/0x180 [ 13.555673] ? krealloc_more_oob_helper+0x821/0x930 [ 13.555701] __asan_report_store1_noabort+0x1b/0x30 [ 13.555721] krealloc_more_oob_helper+0x821/0x930 [ 13.555743] ? __schedule+0x10cc/0x2b60 [ 13.555765] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.555789] ? finish_task_switch.isra.0+0x153/0x700 [ 13.555811] ? __switch_to+0x47/0xf50 [ 13.555838] ? __schedule+0x10cc/0x2b60 [ 13.555858] ? __pfx_read_tsc+0x10/0x10 [ 13.555882] krealloc_more_oob+0x1c/0x30 [ 13.555904] kunit_try_run_case+0x1a5/0x480 [ 13.555928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.555949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.555971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.555993] ? __kthread_parkme+0x82/0x180 [ 13.556013] ? preempt_count_sub+0x50/0x80 [ 13.556035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.556057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.556079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.556102] kthread+0x337/0x6f0 [ 13.556121] ? trace_preempt_on+0x20/0xc0 [ 13.556144] ? __pfx_kthread+0x10/0x10 [ 13.556164] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.556184] ? calculate_sigpending+0x7b/0xa0 [ 13.556208] ? __pfx_kthread+0x10/0x10 [ 13.556249] ret_from_fork+0x116/0x1d0 [ 13.556269] ? __pfx_kthread+0x10/0x10 [ 13.556289] ret_from_fork_asm+0x1a/0x30 [ 13.556321] </TASK> [ 13.556333] [ 13.564629] Allocated by task 174: [ 13.564803] kasan_save_stack+0x45/0x70 [ 13.565102] kasan_save_track+0x18/0x40 [ 13.565385] kasan_save_alloc_info+0x3b/0x50 [ 13.565696] __kasan_krealloc+0x190/0x1f0 [ 13.565925] krealloc_noprof+0xf3/0x340 [ 13.566097] krealloc_more_oob_helper+0x1a9/0x930 [ 13.566302] krealloc_more_oob+0x1c/0x30 [ 13.566490] kunit_try_run_case+0x1a5/0x480 [ 13.566781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.567171] kthread+0x337/0x6f0 [ 13.567454] ret_from_fork+0x116/0x1d0 [ 13.567743] ret_from_fork_asm+0x1a/0x30 [ 13.568050] [ 13.568204] The buggy address belongs to the object at ffff88810033ee00 [ 13.568204] which belongs to the cache kmalloc-256 of size 256 [ 13.568684] The buggy address is located 0 bytes to the right of [ 13.568684] allocated 235-byte region [ffff88810033ee00, ffff88810033eeeb) [ 13.569106] [ 13.569265] The buggy address belongs to the physical page: [ 13.569639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e [ 13.570134] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.570649] flags: 0x200000000000040(head|node=0|zone=2) [ 13.570946] page_type: f5(slab) [ 13.571115] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.571382] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.571637] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.571896] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.572142] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff [ 13.572650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.573124] page dumped because: kasan: bad access detected [ 13.573521] [ 13.573671] Memory state around the buggy address: [ 13.574015] ffff88810033ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.574522] ffff88810033ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.574985] >ffff88810033ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 13.575337] ^ [ 13.575685] ffff88810033ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.576011] ffff88810033ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.576259] ================================================================== [ 13.578868] ================================================================== [ 13.579428] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 13.580094] Write of size 1 at addr ffff88810033eef0 by task kunit_try_catch/174 [ 13.580608] [ 13.580807] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.580897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.580918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.580954] Call Trace: [ 13.580980] <TASK> [ 13.581012] dump_stack_lvl+0x73/0xb0 [ 13.581065] print_report+0xd1/0x650 [ 13.581108] ? __virt_addr_valid+0x1db/0x2d0 [ 13.581150] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.581195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.581248] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.581296] kasan_report+0x141/0x180 [ 13.581341] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.581395] __asan_report_store1_noabort+0x1b/0x30 [ 13.581437] krealloc_more_oob_helper+0x7eb/0x930 [ 13.581480] ? __schedule+0x10cc/0x2b60 [ 13.581526] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.581573] ? finish_task_switch.isra.0+0x153/0x700 [ 13.581615] ? __switch_to+0x47/0xf50 [ 13.581663] ? __schedule+0x10cc/0x2b60 [ 13.581699] ? __pfx_read_tsc+0x10/0x10 [ 13.581741] krealloc_more_oob+0x1c/0x30 [ 13.581779] kunit_try_run_case+0x1a5/0x480 [ 13.581824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.581864] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.581908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.581952] ? __kthread_parkme+0x82/0x180 [ 13.581992] ? preempt_count_sub+0x50/0x80 [ 13.582039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.582079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.582121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.582166] kthread+0x337/0x6f0 [ 13.582204] ? trace_preempt_on+0x20/0xc0 [ 13.582264] ? __pfx_kthread+0x10/0x10 [ 13.582307] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.582358] ? calculate_sigpending+0x7b/0xa0 [ 13.582409] ? __pfx_kthread+0x10/0x10 [ 13.582455] ret_from_fork+0x116/0x1d0 [ 13.582701] ? __pfx_kthread+0x10/0x10 [ 13.582753] ret_from_fork_asm+0x1a/0x30 [ 13.582813] </TASK> [ 13.582834] [ 13.592187] Allocated by task 174: [ 13.592395] kasan_save_stack+0x45/0x70 [ 13.592597] kasan_save_track+0x18/0x40 [ 13.592788] kasan_save_alloc_info+0x3b/0x50 [ 13.592980] __kasan_krealloc+0x190/0x1f0 [ 13.593113] krealloc_noprof+0xf3/0x340 [ 13.594462] krealloc_more_oob_helper+0x1a9/0x930 [ 13.595193] krealloc_more_oob+0x1c/0x30 [ 13.595768] kunit_try_run_case+0x1a5/0x480 [ 13.596091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.596299] kthread+0x337/0x6f0 [ 13.596553] ret_from_fork+0x116/0x1d0 [ 13.596842] ret_from_fork_asm+0x1a/0x30 [ 13.597054] [ 13.597210] The buggy address belongs to the object at ffff88810033ee00 [ 13.597210] which belongs to the cache kmalloc-256 of size 256 [ 13.597656] The buggy address is located 5 bytes to the right of [ 13.597656] allocated 235-byte region [ffff88810033ee00, ffff88810033eeeb) [ 13.598384] [ 13.598499] The buggy address belongs to the physical page: [ 13.598873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e [ 13.599288] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.599655] flags: 0x200000000000040(head|node=0|zone=2) [ 13.599956] page_type: f5(slab) [ 13.600177] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.600585] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.600853] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.601101] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.601525] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff [ 13.602039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.602524] page dumped because: kasan: bad access detected [ 13.602740] [ 13.602893] Memory state around the buggy address: [ 13.603162] ffff88810033ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.603512] ffff88810033ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.603924] >ffff88810033ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 13.604289] ^ [ 13.604607] ffff88810033ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.604940] ffff88810033ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.605270] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
[ 13.529147] ================================================================== [ 13.529764] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 13.530119] Read of size 1 at addr ffff888103bc0000 by task kunit_try_catch/172 [ 13.530436] [ 13.530588] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.530683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.530709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.530739] Call Trace: [ 13.530755] <TASK> [ 13.530776] dump_stack_lvl+0x73/0xb0 [ 13.530808] print_report+0xd1/0x650 [ 13.530832] ? __virt_addr_valid+0x1db/0x2d0 [ 13.530857] ? page_alloc_uaf+0x356/0x3d0 [ 13.530893] ? kasan_addr_to_slab+0x11/0xa0 [ 13.530974] ? page_alloc_uaf+0x356/0x3d0 [ 13.531023] kasan_report+0x141/0x180 [ 13.531068] ? page_alloc_uaf+0x356/0x3d0 [ 13.531122] __asan_report_load1_noabort+0x18/0x20 [ 13.531164] page_alloc_uaf+0x356/0x3d0 [ 13.531212] ? __pfx_page_alloc_uaf+0x10/0x10 [ 13.531269] ? __schedule+0x10cc/0x2b60 [ 13.531316] ? __pfx_read_tsc+0x10/0x10 [ 13.531357] ? ktime_get_ts64+0x86/0x230 [ 13.531407] kunit_try_run_case+0x1a5/0x480 [ 13.531458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.531502] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.531547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.531592] ? __kthread_parkme+0x82/0x180 [ 13.531631] ? preempt_count_sub+0x50/0x80 [ 13.531669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.531702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.531745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.531778] kthread+0x337/0x6f0 [ 13.531807] ? trace_preempt_on+0x20/0xc0 [ 13.531845] ? __pfx_kthread+0x10/0x10 [ 13.531875] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.531906] ? calculate_sigpending+0x7b/0xa0 [ 13.531941] ? __pfx_kthread+0x10/0x10 [ 13.531977] ret_from_fork+0x116/0x1d0 [ 13.532009] ? __pfx_kthread+0x10/0x10 [ 13.532040] ret_from_fork_asm+0x1a/0x30 [ 13.532092] </TASK> [ 13.532110] [ 13.540946] The buggy address belongs to the physical page: [ 13.541313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bc0 [ 13.541686] flags: 0x200000000000000(node=0|zone=2) [ 13.541898] page_type: f0(buddy) [ 13.542061] raw: 0200000000000000 ffff88817fffb4f0 ffff88817fffb4f0 0000000000000000 [ 13.542980] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 13.543524] page dumped because: kasan: bad access detected [ 13.544038] [ 13.544208] Memory state around the buggy address: [ 13.544958] ffff888103bbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.545502] ffff888103bbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.545887] >ffff888103bc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.546123] ^ [ 13.546752] ffff888103bc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.547006] ffff888103bc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.547510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
[ 13.496113] ================================================================== [ 13.496695] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 13.497343] Free of addr ffff88810298c001 by task kunit_try_catch/168 [ 13.498124] [ 13.498283] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.498351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.498365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.498389] Call Trace: [ 13.498405] <TASK> [ 13.498424] dump_stack_lvl+0x73/0xb0 [ 13.498465] print_report+0xd1/0x650 [ 13.498732] ? __virt_addr_valid+0x1db/0x2d0 [ 13.498785] ? kasan_addr_to_slab+0x11/0xa0 [ 13.498826] ? kfree+0x274/0x3f0 [ 13.498870] kasan_report_invalid_free+0x10a/0x130 [ 13.498913] ? kfree+0x274/0x3f0 [ 13.498946] ? kfree+0x274/0x3f0 [ 13.498976] __kasan_kfree_large+0x86/0xd0 [ 13.499017] free_large_kmalloc+0x4b/0x110 [ 13.499065] kfree+0x274/0x3f0 [ 13.499105] kmalloc_large_invalid_free+0x120/0x2b0 [ 13.499144] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 13.499189] ? __schedule+0x10cc/0x2b60 [ 13.499242] ? __pfx_read_tsc+0x10/0x10 [ 13.499287] ? ktime_get_ts64+0x86/0x230 [ 13.499338] kunit_try_run_case+0x1a5/0x480 [ 13.499376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.499398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.499421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.499443] ? __kthread_parkme+0x82/0x180 [ 13.499487] ? preempt_count_sub+0x50/0x80 [ 13.499524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.499558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.499592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.499640] kthread+0x337/0x6f0 [ 13.499663] ? trace_preempt_on+0x20/0xc0 [ 13.499688] ? __pfx_kthread+0x10/0x10 [ 13.499708] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.499728] ? calculate_sigpending+0x7b/0xa0 [ 13.499752] ? __pfx_kthread+0x10/0x10 [ 13.499773] ret_from_fork+0x116/0x1d0 [ 13.499792] ? __pfx_kthread+0x10/0x10 [ 13.499812] ret_from_fork_asm+0x1a/0x30 [ 13.499844] </TASK> [ 13.499856] [ 13.512153] The buggy address belongs to the physical page: [ 13.512481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.512878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.513190] flags: 0x200000000000040(head|node=0|zone=2) [ 13.513454] page_type: f8(unknown) [ 13.513712] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.514027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.515198] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.515655] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.516133] head: 0200000000000002 ffffea00040a6301 00000000ffffffff 00000000ffffffff [ 13.516723] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.516949] page dumped because: kasan: bad access detected [ 13.517111] [ 13.517191] Memory state around the buggy address: [ 13.517352] ffff88810298bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.518240] ffff88810298bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.518780] >ffff88810298c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.519160] ^ [ 13.519318] ffff88810298c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.519661] ffff88810298c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.520302] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
[ 13.470442] ================================================================== [ 13.470975] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 13.471275] Read of size 1 at addr ffff88810298c000 by task kunit_try_catch/166 [ 13.471607] [ 13.471753] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.471833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.471852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.471885] Call Trace: [ 13.471908] <TASK> [ 13.471941] dump_stack_lvl+0x73/0xb0 [ 13.472000] print_report+0xd1/0x650 [ 13.472045] ? __virt_addr_valid+0x1db/0x2d0 [ 13.472092] ? kmalloc_large_uaf+0x2f1/0x340 [ 13.472120] ? kasan_addr_to_slab+0x11/0xa0 [ 13.472141] ? kmalloc_large_uaf+0x2f1/0x340 [ 13.472161] kasan_report+0x141/0x180 [ 13.472182] ? kmalloc_large_uaf+0x2f1/0x340 [ 13.472207] __asan_report_load1_noabort+0x18/0x20 [ 13.472282] kmalloc_large_uaf+0x2f1/0x340 [ 13.472314] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 13.472347] ? __schedule+0x10cc/0x2b60 [ 13.472383] ? __pfx_read_tsc+0x10/0x10 [ 13.472420] ? ktime_get_ts64+0x86/0x230 [ 13.472463] kunit_try_run_case+0x1a5/0x480 [ 13.472923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.472971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.473008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.473031] ? __kthread_parkme+0x82/0x180 [ 13.473053] ? preempt_count_sub+0x50/0x80 [ 13.473077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.473099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.473121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.473142] kthread+0x337/0x6f0 [ 13.473160] ? trace_preempt_on+0x20/0xc0 [ 13.473183] ? __pfx_kthread+0x10/0x10 [ 13.473202] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.473243] ? calculate_sigpending+0x7b/0xa0 [ 13.473271] ? __pfx_kthread+0x10/0x10 [ 13.473292] ret_from_fork+0x116/0x1d0 [ 13.473311] ? __pfx_kthread+0x10/0x10 [ 13.473331] ret_from_fork_asm+0x1a/0x30 [ 13.473362] </TASK> [ 13.473374] [ 13.484388] The buggy address belongs to the physical page: [ 13.485195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c [ 13.485915] flags: 0x200000000000000(node=0|zone=2) [ 13.486286] raw: 0200000000000000 ffffea00040a6408 ffff88815b039f80 0000000000000000 [ 13.486960] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 13.487408] page dumped because: kasan: bad access detected [ 13.487900] [ 13.488064] Memory state around the buggy address: [ 13.488257] ffff88810298bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.488669] ffff88810298bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.489050] >ffff88810298c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.489726] ^ [ 13.489894] ffff88810298c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.490237] ffff88810298c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.490679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[ 13.441780] ================================================================== [ 13.442272] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 13.442931] Write of size 1 at addr ffff88810250200a by task kunit_try_catch/164 [ 13.443205] [ 13.443366] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.443462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.443479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.443502] Call Trace: [ 13.443518] <TASK> [ 13.443544] dump_stack_lvl+0x73/0xb0 [ 13.443594] print_report+0xd1/0x650 [ 13.443630] ? __virt_addr_valid+0x1db/0x2d0 [ 13.443667] ? kmalloc_large_oob_right+0x2e9/0x330 [ 13.443702] ? kasan_addr_to_slab+0x11/0xa0 [ 13.443728] ? kmalloc_large_oob_right+0x2e9/0x330 [ 13.443749] kasan_report+0x141/0x180 [ 13.443770] ? kmalloc_large_oob_right+0x2e9/0x330 [ 13.443797] __asan_report_store1_noabort+0x1b/0x30 [ 13.443816] kmalloc_large_oob_right+0x2e9/0x330 [ 13.443836] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 13.443859] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 13.443883] kunit_try_run_case+0x1a5/0x480 [ 13.443906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.443925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.443947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.443967] ? __kthread_parkme+0x82/0x180 [ 13.443988] ? preempt_count_sub+0x50/0x80 [ 13.444010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.444032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.444052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.444072] kthread+0x337/0x6f0 [ 13.444090] ? trace_preempt_on+0x20/0xc0 [ 13.444112] ? __pfx_kthread+0x10/0x10 [ 13.444131] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.444150] ? calculate_sigpending+0x7b/0xa0 [ 13.444172] ? __pfx_kthread+0x10/0x10 [ 13.444192] ret_from_fork+0x116/0x1d0 [ 13.444209] ? __pfx_kthread+0x10/0x10 [ 13.444252] ret_from_fork_asm+0x1a/0x30 [ 13.444306] </TASK> [ 13.444328] [ 13.454687] The buggy address belongs to the physical page: [ 13.455265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102500 [ 13.456208] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.456848] flags: 0x200000000000040(head|node=0|zone=2) [ 13.457325] page_type: f8(unknown) [ 13.457958] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.458775] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.459197] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.459727] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.460190] head: 0200000000000002 ffffea0004094001 00000000ffffffff 00000000ffffffff [ 13.460579] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.461251] page dumped because: kasan: bad access detected [ 13.461494] [ 13.461657] Memory state around the buggy address: [ 13.462105] ffff888102501f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.462825] ffff888102501f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.463042] >ffff888102502000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.463467] ^ [ 13.463741] ffff888102502080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.464227] ffff888102502100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.464873] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
[ 13.407191] ================================================================== [ 13.407749] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 13.408210] Write of size 1 at addr ffff888101f8df00 by task kunit_try_catch/162 [ 13.408620] [ 13.408780] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.408870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.408891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.408928] Call Trace: [ 13.408953] <TASK> [ 13.408986] dump_stack_lvl+0x73/0xb0 [ 13.409049] print_report+0xd1/0x650 [ 13.409096] ? __virt_addr_valid+0x1db/0x2d0 [ 13.409138] ? kmalloc_big_oob_right+0x316/0x370 [ 13.409175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.409214] ? kmalloc_big_oob_right+0x316/0x370 [ 13.409379] kasan_report+0x141/0x180 [ 13.409423] ? kmalloc_big_oob_right+0x316/0x370 [ 13.409468] __asan_report_store1_noabort+0x1b/0x30 [ 13.409605] kmalloc_big_oob_right+0x316/0x370 [ 13.409637] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 13.409672] ? __schedule+0x10cc/0x2b60 [ 13.409712] ? __pfx_read_tsc+0x10/0x10 [ 13.409752] ? ktime_get_ts64+0x86/0x230 [ 13.409794] kunit_try_run_case+0x1a5/0x480 [ 13.409839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.409876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.409916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.409952] ? __kthread_parkme+0x82/0x180 [ 13.409988] ? preempt_count_sub+0x50/0x80 [ 13.410029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.410070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.410111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.410152] kthread+0x337/0x6f0 [ 13.410188] ? trace_preempt_on+0x20/0xc0 [ 13.410246] ? __pfx_kthread+0x10/0x10 [ 13.410295] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.410326] ? calculate_sigpending+0x7b/0xa0 [ 13.410375] ? __pfx_kthread+0x10/0x10 [ 13.410441] ret_from_fork+0x116/0x1d0 [ 13.410471] ? __pfx_kthread+0x10/0x10 [ 13.410521] ret_from_fork_asm+0x1a/0x30 [ 13.410573] </TASK> [ 13.410587] [ 13.420970] Allocated by task 162: [ 13.421196] kasan_save_stack+0x45/0x70 [ 13.421871] kasan_save_track+0x18/0x40 [ 13.422193] kasan_save_alloc_info+0x3b/0x50 [ 13.422696] __kasan_kmalloc+0xb7/0xc0 [ 13.423023] __kmalloc_cache_noprof+0x189/0x420 [ 13.423404] kmalloc_big_oob_right+0xa9/0x370 [ 13.423856] kunit_try_run_case+0x1a5/0x480 [ 13.424062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.424248] kthread+0x337/0x6f0 [ 13.424400] ret_from_fork+0x116/0x1d0 [ 13.424832] ret_from_fork_asm+0x1a/0x30 [ 13.425053] [ 13.425195] The buggy address belongs to the object at ffff888101f8c000 [ 13.425195] which belongs to the cache kmalloc-8k of size 8192 [ 13.426193] The buggy address is located 0 bytes to the right of [ 13.426193] allocated 7936-byte region [ffff888101f8c000, ffff888101f8df00) [ 13.427041] [ 13.427206] The buggy address belongs to the physical page: [ 13.427716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f88 [ 13.428099] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.428697] flags: 0x200000000000040(head|node=0|zone=2) [ 13.429054] page_type: f5(slab) [ 13.429233] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 13.429857] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 13.430248] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 13.431206] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 13.431604] head: 0200000000000003 ffffea000407e201 00000000ffffffff 00000000ffffffff [ 13.431869] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 13.432314] page dumped because: kasan: bad access detected [ 13.432773] [ 13.432930] Memory state around the buggy address: [ 13.433129] ffff888101f8de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.433566] ffff888101f8de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.433884] >ffff888101f8df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.434323] ^ [ 13.434645] ffff888101f8df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435070] ffff888101f8e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435942] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
[ 13.345213] ================================================================== [ 13.345879] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.346697] Write of size 1 at addr ffff888102b48c78 by task kunit_try_catch/160 [ 13.347068] [ 13.347296] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.347395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.347417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.347502] Call Trace: [ 13.347542] <TASK> [ 13.347576] dump_stack_lvl+0x73/0xb0 [ 13.347632] print_report+0xd1/0x650 [ 13.347671] ? __virt_addr_valid+0x1db/0x2d0 [ 13.347869] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.347922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.348009] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.348077] kasan_report+0x141/0x180 [ 13.348134] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.348198] __asan_report_store1_noabort+0x1b/0x30 [ 13.348253] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.348298] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 13.348339] ? __schedule+0x10cc/0x2b60 [ 13.348363] ? __pfx_read_tsc+0x10/0x10 [ 13.348385] ? ktime_get_ts64+0x86/0x230 [ 13.348410] kunit_try_run_case+0x1a5/0x480 [ 13.348437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.348463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.348527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.348562] ? __kthread_parkme+0x82/0x180 [ 13.348614] ? preempt_count_sub+0x50/0x80 [ 13.348641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.348664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.348687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.348708] kthread+0x337/0x6f0 [ 13.348727] ? trace_preempt_on+0x20/0xc0 [ 13.348752] ? __pfx_kthread+0x10/0x10 [ 13.348772] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.348793] ? calculate_sigpending+0x7b/0xa0 [ 13.348818] ? __pfx_kthread+0x10/0x10 [ 13.348839] ret_from_fork+0x116/0x1d0 [ 13.348858] ? __pfx_kthread+0x10/0x10 [ 13.348879] ret_from_fork_asm+0x1a/0x30 [ 13.348913] </TASK> [ 13.348924] [ 13.359712] Allocated by task 160: [ 13.360264] kasan_save_stack+0x45/0x70 [ 13.360530] kasan_save_track+0x18/0x40 [ 13.360860] kasan_save_alloc_info+0x3b/0x50 [ 13.361105] __kasan_kmalloc+0xb7/0xc0 [ 13.361494] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 13.362068] kmalloc_track_caller_oob_right+0x99/0x520 [ 13.362816] kunit_try_run_case+0x1a5/0x480 [ 13.363081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.363681] kthread+0x337/0x6f0 [ 13.363929] ret_from_fork+0x116/0x1d0 [ 13.364147] ret_from_fork_asm+0x1a/0x30 [ 13.364488] [ 13.364663] The buggy address belongs to the object at ffff888102b48c00 [ 13.364663] which belongs to the cache kmalloc-128 of size 128 [ 13.365284] The buggy address is located 0 bytes to the right of [ 13.365284] allocated 120-byte region [ffff888102b48c00, ffff888102b48c78) [ 13.365743] [ 13.365915] The buggy address belongs to the physical page: [ 13.366686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 13.367015] flags: 0x200000000000000(node=0|zone=2) [ 13.367623] page_type: f5(slab) [ 13.367939] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.368313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.368860] page dumped because: kasan: bad access detected [ 13.369173] [ 13.369346] Memory state around the buggy address: [ 13.369627] ffff888102b48b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.370019] ffff888102b48b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.370691] >ffff888102b48c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.371165] ^ [ 13.371744] ffff888102b48c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.372540] ffff888102b48d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.373107] ================================================================== [ 13.375183] ================================================================== [ 13.375545] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 13.376289] Write of size 1 at addr ffff888102b48d78 by task kunit_try_catch/160 [ 13.376570] [ 13.376900] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.376998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.377021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.377058] Call Trace: [ 13.377146] <TASK> [ 13.377200] dump_stack_lvl+0x73/0xb0 [ 13.377264] print_report+0xd1/0x650 [ 13.377292] ? __virt_addr_valid+0x1db/0x2d0 [ 13.377316] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 13.377340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.377362] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 13.377390] kasan_report+0x141/0x180 [ 13.377424] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 13.377571] __asan_report_store1_noabort+0x1b/0x30 [ 13.377629] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 13.377690] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 13.377736] ? __schedule+0x10cc/0x2b60 [ 13.377791] ? __pfx_read_tsc+0x10/0x10 [ 13.377840] ? ktime_get_ts64+0x86/0x230 [ 13.377890] kunit_try_run_case+0x1a5/0x480 [ 13.377940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.377983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.378019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.378041] ? __kthread_parkme+0x82/0x180 [ 13.378063] ? preempt_count_sub+0x50/0x80 [ 13.378087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.378109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.378131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.378153] kthread+0x337/0x6f0 [ 13.378172] ? trace_preempt_on+0x20/0xc0 [ 13.378195] ? __pfx_kthread+0x10/0x10 [ 13.378215] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.378259] ? calculate_sigpending+0x7b/0xa0 [ 13.378283] ? __pfx_kthread+0x10/0x10 [ 13.378305] ret_from_fork+0x116/0x1d0 [ 13.378323] ? __pfx_kthread+0x10/0x10 [ 13.378359] ret_from_fork_asm+0x1a/0x30 [ 13.378393] </TASK> [ 13.378405] [ 13.389956] Allocated by task 160: [ 13.390188] kasan_save_stack+0x45/0x70 [ 13.390366] kasan_save_track+0x18/0x40 [ 13.390590] kasan_save_alloc_info+0x3b/0x50 [ 13.390907] __kasan_kmalloc+0xb7/0xc0 [ 13.391405] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 13.391760] kmalloc_track_caller_oob_right+0x19a/0x520 [ 13.391977] kunit_try_run_case+0x1a5/0x480 [ 13.392180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.392555] kthread+0x337/0x6f0 [ 13.392850] ret_from_fork+0x116/0x1d0 [ 13.393100] ret_from_fork_asm+0x1a/0x30 [ 13.393361] [ 13.393512] The buggy address belongs to the object at ffff888102b48d00 [ 13.393512] which belongs to the cache kmalloc-128 of size 128 [ 13.393895] The buggy address is located 0 bytes to the right of [ 13.393895] allocated 120-byte region [ffff888102b48d00, ffff888102b48d78) [ 13.394701] [ 13.394870] The buggy address belongs to the physical page: [ 13.395212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 13.396027] flags: 0x200000000000000(node=0|zone=2) [ 13.396281] page_type: f5(slab) [ 13.396610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.396919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.397300] page dumped because: kasan: bad access detected [ 13.397615] [ 13.397890] Memory state around the buggy address: [ 13.398093] ffff888102b48c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.398688] ffff888102b48c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.399012] >ffff888102b48d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.399260] ^ [ 13.399714] ffff888102b48d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.400347] ffff888102b48e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.400719] ==================================================================
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count
KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count: Failure
------------[ cut here ]------------ [ 161.368019] drm-kunit-mock-device drm_gem_shmem_test_get_pages_sgt.drm-kunit-mock-device: [drm] drm_WARN_ON(refcount_read(&shmem->pages_pin_count)) [ 161.368231] WARNING: CPU: 0 PID: 2575 at drivers/gpu/drm/drm_gem_shmem_helper.c:180 drm_gem_shmem_free+0x3ed/0x6c0 [ 161.370972] Modules linked in: [ 161.371367] CPU: 0 UID: 0 PID: 2575 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 161.372155] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 161.372675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 161.373091] RIP: 0010:drm_gem_shmem_free+0x3ed/0x6c0 [ 161.373540] Code: 85 f6 0f 84 ba 01 00 00 4c 89 e7 e8 dd 16 80 00 48 c7 c1 a0 61 7e a8 4c 89 f2 48 c7 c7 60 5e 7e a8 48 89 c6 e8 84 a9 78 fe 90 <0f> 0b 90 90 e9 09 ff ff ff 90 48 b8 00 00 00 00 00 fc ff df 48 8d [ 161.374719] RSP: 0000:ffff888105a0fd18 EFLAGS: 00010286 [ 161.375013] RAX: 0000000000000000 RBX: ffff888108fea000 RCX: 1ffffffff52a4d18 [ 161.375930] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 161.376624] RBP: ffff888105a0fd48 R08: 0000000000000000 R09: fffffbfff52a4d18 [ 161.376975] R10: 0000000000000003 R11: 00000000000394a8 R12: ffff888105a71800 [ 161.377257] R13: ffff888108fea0f8 R14: ffff88810b4ffb80 R15: ffff88810039fb40 [ 161.377793] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 161.378410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.379675] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 161.380062] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 161.380348] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 161.380877] Call Trace: [ 161.381395] <TASK> [ 161.381818] ? trace_preempt_on+0x20/0xc0 [ 161.382264] ? __pfx_drm_gem_shmem_free_wrapper+0x10/0x10 [ 161.382654] drm_gem_shmem_free_wrapper+0x12/0x20 [ 161.383342] __kunit_action_free+0x57/0x70 [ 161.383860] kunit_remove_resource+0x133/0x200 [ 161.384245] ? preempt_count_sub+0x50/0x80 [ 161.384499] kunit_cleanup+0x7a/0x120 [ 161.384940] kunit_try_run_case_cleanup+0xbd/0xf0 [ 161.385444] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 [ 161.386647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 161.387377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 161.388115] kthread+0x337/0x6f0 [ 161.388949] ? trace_preempt_on+0x20/0xc0 [ 161.389224] ? __pfx_kthread+0x10/0x10 [ 161.389432] ? _raw_spin_unlock_irq+0x47/0x80 [ 161.389847] ? calculate_sigpending+0x7b/0xa0 [ 161.390438] ? __pfx_kthread+0x10/0x10 [ 161.390874] ret_from_fork+0x116/0x1d0 [ 161.391291] ? __pfx_kthread+0x10/0x10 [ 161.392223] ret_from_fork_asm+0x1a/0x30 [ 161.392865] </TASK> [ 161.393134] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head
KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head: Failure
------------[ cut here ]------------ [ 161.099000] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 161.099255] WARNING: CPU: 1 PID: 2552 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x13f/0x1c0 [ 161.100816] Modules linked in: [ 161.101374] CPU: 1 UID: 0 PID: 2552 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 161.102111] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 161.102691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 161.103415] RIP: 0010:drm_framebuffer_free+0x13f/0x1c0 [ 161.103846] Code: 8b 7d 50 4d 85 ff 74 2b 4c 89 ef e8 eb 2f 87 00 48 c7 c1 80 14 7d a8 4c 89 fa 48 c7 c7 e0 14 7d a8 48 89 c6 e8 92 c2 7f fe 90 <0f> 0b 90 90 e9 1c ff ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 ea [ 161.105392] RSP: 0000:ffff888105aa7b68 EFLAGS: 00010282 [ 161.105880] RAX: 0000000000000000 RBX: ffff888105aa7c40 RCX: 1ffffffff52a4d18 [ 161.106963] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 161.107321] RBP: ffff888105aa7b90 R08: 0000000000000000 R09: fffffbfff52a4d18 [ 161.107723] R10: 0000000000000003 R11: 0000000000037be8 R12: ffff888105aa7c18 [ 161.108198] R13: ffff888109f56000 R14: ffff888105977000 R15: ffff88810b4c5080 [ 161.109074] FS: 0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000 [ 161.109633] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.109903] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 161.110343] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483 [ 161.111416] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 161.111987] Call Trace: [ 161.112379] <TASK> [ 161.112887] drm_test_framebuffer_free+0x1ab/0x610 [ 161.113349] ? __pfx_drm_test_framebuffer_free+0x10/0x10 [ 161.113989] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 161.114304] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 161.115075] ? __drmm_add_action_or_reset+0x22/0x50 [ 161.115683] ? __schedule+0x10cc/0x2b60 [ 161.116142] ? __pfx_read_tsc+0x10/0x10 [ 161.116667] ? ktime_get_ts64+0x86/0x230 [ 161.116965] kunit_try_run_case+0x1a5/0x480 [ 161.117174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.117761] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 161.118215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 161.118669] ? __kthread_parkme+0x82/0x180 [ 161.119128] ? preempt_count_sub+0x50/0x80 [ 161.119711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.120049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 161.120657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 161.120927] kthread+0x337/0x6f0 [ 161.121135] ? trace_preempt_on+0x20/0xc0 [ 161.121517] ? __pfx_kthread+0x10/0x10 [ 161.121876] ? _raw_spin_unlock_irq+0x47/0x80 [ 161.123439] ? calculate_sigpending+0x7b/0xa0 [ 161.124076] ? __pfx_kthread+0x10/0x10 [ 161.124635] ret_from_fork+0x116/0x1d0 [ 161.125001] ? __pfx_kthread+0x10/0x10 [ 161.125323] ret_from_fork_asm+0x1a/0x30 [ 161.125754] </TASK> [ 161.126012] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register: Failure
------------[ cut here ]------------ [ 158.951765] WARNING: CPU: 0 PID: 1990 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110 [ 158.952465] Modules linked in: [ 158.952782] CPU: 0 UID: 0 PID: 1990 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 158.953296] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 158.953885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 158.955169] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110 [ 158.955838] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d e9 90 4d 25 02 48 89 df e8 d8 [ 158.957221] RSP: 0000:ffff888100e27c90 EFLAGS: 00010246 [ 158.957729] RAX: dffffc0000000000 RBX: ffff888104faa000 RCX: 0000000000000000 [ 158.958657] RDX: 1ffff110209f5432 RSI: ffffffffa59f79a8 RDI: ffff888104faa190 [ 158.959119] RBP: ffff888100e27ca0 R08: 1ffff11020073f69 R09: ffffed10201c4f65 [ 158.960059] R10: 0000000000000003 R11: ffffffffa4f833e8 R12: 0000000000000000 [ 158.960436] R13: ffff888100e27d38 R14: ffff88810039fc50 R15: ffff88810039fc58 [ 158.961101] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 158.961446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 158.962387] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 158.963086] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 158.963427] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 158.964163] Call Trace: [ 158.964588] <TASK> [ 158.964774] drm_test_drm_connector_dynamic_register_no_init+0x104/0x290 [ 158.965368] ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10 [ 158.965739] ? __schedule+0x10cc/0x2b60 [ 158.966013] ? __pfx_read_tsc+0x10/0x10 [ 158.967086] ? ktime_get_ts64+0x86/0x230 [ 158.967374] kunit_try_run_case+0x1a5/0x480 [ 158.967795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.968102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 158.968924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 158.969345] ? __kthread_parkme+0x82/0x180 [ 158.970088] ? preempt_count_sub+0x50/0x80 [ 158.970363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.971077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 158.971457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 158.972373] kthread+0x337/0x6f0 [ 158.972995] ? trace_preempt_on+0x20/0xc0 [ 158.973273] ? __pfx_kthread+0x10/0x10 [ 158.974071] ? _raw_spin_unlock_irq+0x47/0x80 [ 158.974448] ? calculate_sigpending+0x7b/0xa0 [ 158.975329] ? __pfx_kthread+0x10/0x10 [ 158.976017] ret_from_fork+0x116/0x1d0 [ 158.976345] ? __pfx_kthread+0x10/0x10 [ 158.976562] ret_from_fork_asm+0x1a/0x30 [ 158.976847] </TASK> [ 158.977018] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 158.831633] WARNING: CPU: 0 PID: 1982 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110 [ 158.832352] Modules linked in: [ 158.832814] CPU: 0 UID: 0 PID: 1982 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 158.833774] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 158.835246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 158.836027] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110 [ 158.836657] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d e9 90 4d 25 02 48 89 df e8 d8 [ 158.837773] RSP: 0000:ffff888103b37c90 EFLAGS: 00010246 [ 158.838111] RAX: dffffc0000000000 RBX: ffff888100f2e000 RCX: 0000000000000000 [ 158.838358] RDX: 1ffff110201e5c32 RSI: ffffffffa59f79a8 RDI: ffff888100f2e190 [ 158.838986] RBP: ffff888103b37ca0 R08: 1ffff11020073f69 R09: ffffed1020766f65 [ 158.839362] R10: 0000000000000003 R11: ffffffffa4f833e8 R12: 0000000000000000 [ 158.840069] R13: ffff888103b37d38 R14: ffff88810039fc50 R15: ffff88810039fc58 [ 158.840488] FS: 0000000000000000(0000) GS:ffff8881b0876000(0000) knlGS:0000000000000000 [ 158.841012] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 158.841556] CR2: 00007ffff7ffe000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 158.842089] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e482 [ 158.842602] DR3: ffffffffaa84e483 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 158.842991] Call Trace: [ 158.843143] <TASK> [ 158.843420] drm_test_drm_connector_dynamic_register_early_no_init+0x104/0x290 [ 158.843992] ? __pfx_drm_test_drm_connector_dynamic_register_early_no_init+0x10/0x10 [ 158.844320] ? __schedule+0x10cc/0x2b60 [ 158.844922] ? __pfx_read_tsc+0x10/0x10 [ 158.845440] ? ktime_get_ts64+0x86/0x230 [ 158.845872] kunit_try_run_case+0x1a5/0x480 [ 158.846098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.846348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 158.846718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 158.847122] ? __kthread_parkme+0x82/0x180 [ 158.847741] ? preempt_count_sub+0x50/0x80 [ 158.848061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.848301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 158.848923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 158.849272] kthread+0x337/0x6f0 [ 158.849604] ? trace_preempt_on+0x20/0xc0 [ 158.849846] ? __pfx_kthread+0x10/0x10 [ 158.850088] ? _raw_spin_unlock_irq+0x47/0x80 [ 158.850629] ? calculate_sigpending+0x7b/0xa0 [ 158.851033] ? __pfx_kthread+0x10/0x10 [ 158.851332] ret_from_fork+0x116/0x1d0 [ 158.851663] ? __pfx_kthread+0x10/0x10 [ 158.851964] ret_from_fork_asm+0x1a/0x30 [ 158.852370] </TASK> [ 158.852696] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
------------[ cut here ]------------ [ 119.035888] WARNING: CPU: 1 PID: 674 at lib/math/int_log.c:120 intlog10+0x2a/0x40 [ 119.036257] Modules linked in: [ 119.036876] CPU: 1 UID: 0 PID: 674 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 119.037619] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 119.038237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 119.038976] RIP: 0010:intlog10+0x2a/0x40 [ 119.039322] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f e9 57 cb 85 02 90 <0f> 0b 90 31 c0 e9 4c cb 85 02 66 2e 0f 1f 84 00 00 00 00 00 66 90 [ 119.040630] RSP: 0000:ffff88810ad07cb0 EFLAGS: 00010246 [ 119.040965] RAX: 0000000000000000 RBX: ffff88810039fae8 RCX: 1ffff110215a0fb4 [ 119.041387] RDX: 1ffffffff50d2a4c RSI: 1ffff110215a0fb3 RDI: 0000000000000000 [ 119.041689] RBP: ffff88810ad07d60 R08: 0000000000000000 R09: ffffed1020598c80 [ 119.042585] R10: ffff888102cc6407 R11: 0000000000000000 R12: 1ffff110215a0f97 [ 119.042958] R13: ffffffffa8695260 R14: 0000000000000000 R15: ffff88810ad07d38 [ 119.043469] FS: 0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000 [ 119.043920] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.044355] CR2: ffff88815a952000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 119.045251] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483 [ 119.045578] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 119.046036] Call Trace: [ 119.046508] <TASK> [ 119.046783] ? intlog10_test+0xf2/0x220 [ 119.047309] ? __pfx_intlog10_test+0x10/0x10 [ 119.047720] ? __schedule+0x10cc/0x2b60 [ 119.047922] ? __pfx_read_tsc+0x10/0x10 [ 119.048106] ? ktime_get_ts64+0x86/0x230 [ 119.048452] kunit_try_run_case+0x1a5/0x480 [ 119.048928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 119.049357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 119.049886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 119.050261] ? __kthread_parkme+0x82/0x180 [ 119.050845] ? preempt_count_sub+0x50/0x80 [ 119.051251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 119.051764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 119.052026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 119.052270] kthread+0x337/0x6f0 [ 119.052569] ? trace_preempt_on+0x20/0xc0 [ 119.052836] ? __pfx_kthread+0x10/0x10 [ 119.053098] ? _raw_spin_unlock_irq+0x47/0x80 [ 119.053317] ? calculate_sigpending+0x7b/0xa0 [ 119.053588] ? __pfx_kthread+0x10/0x10 [ 119.053773] ret_from_fork+0x116/0x1d0 [ 119.054046] ? __pfx_kthread+0x10/0x10 [ 119.054867] ret_from_fork_asm+0x1a/0x30 [ 119.055272] </TASK> [ 119.055440] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
------------[ cut here ]------------ [ 118.982650] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:63 intlog2+0xdf/0x110 [ 118.983433] Modules linked in: [ 118.984168] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 118.985249] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 118.985628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 118.986453] RIP: 0010:intlog2+0xdf/0x110 [ 118.986993] Code: 69 a8 c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d e9 c2 cb 85 02 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 89 45 e4 e8 ef a0 56 ff 8b 45 e4 eb [ 118.987677] RSP: 0000:ffff88810aef7cb0 EFLAGS: 00010246 [ 118.988130] RAX: 0000000000000000 RBX: ffff88810039fae8 RCX: 1ffff110215defb4 [ 118.988672] RDX: 1ffffffff50d2aa0 RSI: 1ffff110215defb3 RDI: 0000000000000000 [ 118.989027] RBP: ffff88810aef7d60 R08: 0000000000000000 R09: ffffed1020452360 [ 118.989653] R10: ffff888102291b07 R11: 0000000000000000 R12: 1ffff110215def97 [ 118.990088] R13: ffffffffa8695500 R14: 0000000000000000 R15: ffff88810aef7d38 [ 118.990726] FS: 0000000000000000(0000) GS:ffff8881b0976000(0000) knlGS:0000000000000000 [ 118.991213] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.991624] CR2: ffff88815a952000 CR3: 000000002bebc000 CR4: 00000000000006f0 [ 118.991878] DR0: ffffffffaa84e480 DR1: ffffffffaa84e481 DR2: ffffffffaa84e483 [ 118.992207] DR3: ffffffffaa84e485 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 118.992574] Call Trace: [ 118.992804] <TASK> [ 118.993007] ? intlog2_test+0xf2/0x220 [ 118.993570] ? __pfx_intlog2_test+0x10/0x10 [ 118.993913] ? __schedule+0x10cc/0x2b60 [ 118.994262] ? __pfx_read_tsc+0x10/0x10 [ 118.994751] ? ktime_get_ts64+0x86/0x230 [ 118.995150] kunit_try_run_case+0x1a5/0x480 [ 118.995621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 118.996020] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 118.996323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 118.996873] ? __kthread_parkme+0x82/0x180 [ 118.997169] ? preempt_count_sub+0x50/0x80 [ 118.997673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 118.998055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 118.998618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 118.998958] kthread+0x337/0x6f0 [ 118.999247] ? trace_preempt_on+0x20/0xc0 [ 118.999768] ? __pfx_kthread+0x10/0x10 [ 119.000077] ? _raw_spin_unlock_irq+0x47/0x80 [ 119.000437] ? calculate_sigpending+0x7b/0xa0 [ 119.000890] ? __pfx_kthread+0x10/0x10 [ 119.001236] ret_from_fork+0x116/0x1d0 [ 119.001657] ? __pfx_kthread+0x10/0x10 [ 119.001997] ret_from_fork_asm+0x1a/0x30 [ 119.002431] </TASK> [ 119.003060] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
<8>[ 366.792065] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
<8>[ 366.475847] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>