Date
May 15, 2025, 10:38 a.m.
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
[ 23.286396] ================================================================== [ 23.286488] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 23.286488] [ 23.286555] Corrupted memory at 0x000000001e27fb41 [ ! . . . . . . . . . . . . . . . ] (in kfence-#100): [ 23.286871] test_corruption+0x120/0x378 [ 23.286920] kunit_try_run_case+0x170/0x3f0 [ 23.286965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.287009] kthread+0x328/0x630 [ 23.287049] ret_from_fork+0x10/0x20 [ 23.287089] [ 23.287112] kfence-#100: 0x0000000065344787-0x0000000087cb509d, size=32, cache=test [ 23.287112] [ 23.287175] allocated by task 313 on cpu 1 at 23.286256s (0.000916s ago): [ 23.287240] test_alloc+0x230/0x628 [ 23.287283] test_corruption+0xdc/0x378 [ 23.287324] kunit_try_run_case+0x170/0x3f0 [ 23.287361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.287403] kthread+0x328/0x630 [ 23.287441] ret_from_fork+0x10/0x20 [ 23.287481] [ 23.287504] freed by task 313 on cpu 1 at 23.286313s (0.001188s ago): [ 23.287563] test_corruption+0x120/0x378 [ 23.287600] kunit_try_run_case+0x170/0x3f0 [ 23.287638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.287678] kthread+0x328/0x630 [ 23.287719] ret_from_fork+0x10/0x20 [ 23.287756] [ 23.287798] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 23.287877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.287908] Hardware name: linux,dummy-virt (DT) [ 23.287940] ================================================================== [ 23.702349] ================================================================== [ 23.702437] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 23.702437] [ 23.702496] Corrupted memory at 0x0000000012766279 [ ! ] (in kfence-#104): [ 23.702611] test_corruption+0x1d8/0x378 [ 23.702656] kunit_try_run_case+0x170/0x3f0 [ 23.702699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.702748] kthread+0x328/0x630 [ 23.702789] ret_from_fork+0x10/0x20 [ 23.702828] [ 23.702851] kfence-#104: 0x000000007c17a602-0x00000000912418c3, size=32, cache=test [ 23.702851] [ 23.702905] allocated by task 313 on cpu 1 at 23.702208s (0.000693s ago): [ 23.702966] test_alloc+0x230/0x628 [ 23.703006] test_corruption+0x198/0x378 [ 23.703045] kunit_try_run_case+0x170/0x3f0 [ 23.703083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.703125] kthread+0x328/0x630 [ 23.703175] ret_from_fork+0x10/0x20 [ 23.703214] [ 23.703237] freed by task 313 on cpu 1 at 23.702266s (0.000967s ago): [ 23.703296] test_corruption+0x1d8/0x378 [ 23.703334] kunit_try_run_case+0x170/0x3f0 [ 23.703371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.703414] kthread+0x328/0x630 [ 23.703451] ret_from_fork+0x10/0x20 [ 23.703490] [ 23.703529] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 23.703608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.703639] Hardware name: linux,dummy-virt (DT) [ 23.703673] ================================================================== [ 22.974445] ================================================================== [ 22.974537] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 22.974537] [ 22.974597] Corrupted memory at 0x000000003202b637 [ ! ] (in kfence-#97): [ 22.974731] test_corruption+0x284/0x378 [ 22.974779] kunit_try_run_case+0x170/0x3f0 [ 22.974820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.974863] kthread+0x328/0x630 [ 22.974904] ret_from_fork+0x10/0x20 [ 22.974942] [ 22.974966] kfence-#97: 0x0000000063f888f8-0x00000000218016ba, size=32, cache=kmalloc-32 [ 22.974966] [ 22.975019] allocated by task 311 on cpu 1 at 22.974169s (0.000847s ago): [ 22.975080] test_alloc+0x29c/0x628 [ 22.975119] test_corruption+0x198/0x378 [ 22.975169] kunit_try_run_case+0x170/0x3f0 [ 22.975208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.975250] kthread+0x328/0x630 [ 22.975289] ret_from_fork+0x10/0x20 [ 22.975326] [ 22.975349] freed by task 311 on cpu 1 at 22.974273s (0.001072s ago): [ 22.975407] test_corruption+0x284/0x378 [ 22.975446] kunit_try_run_case+0x170/0x3f0 [ 22.975484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.975527] kthread+0x328/0x630 [ 22.975564] ret_from_fork+0x10/0x20 [ 22.975601] [ 22.975643] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.975723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.975753] Hardware name: linux,dummy-virt (DT) [ 22.975786] ================================================================== [ 22.766465] ================================================================== [ 22.766570] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 22.766570] [ 22.766638] Corrupted memory at 0x000000008f5eeef1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#95): [ 22.767764] test_corruption+0x278/0x378 [ 22.767816] kunit_try_run_case+0x170/0x3f0 [ 22.767863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.767907] kthread+0x328/0x630 [ 22.767949] ret_from_fork+0x10/0x20 [ 22.767990] [ 22.768014] kfence-#95: 0x0000000049730b14-0x0000000098c4f873, size=32, cache=kmalloc-32 [ 22.768014] [ 22.768068] allocated by task 311 on cpu 1 at 22.766185s (0.001880s ago): [ 22.768131] test_alloc+0x29c/0x628 [ 22.768183] test_corruption+0xdc/0x378 [ 22.768223] kunit_try_run_case+0x170/0x3f0 [ 22.768261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.768304] kthread+0x328/0x630 [ 22.768342] ret_from_fork+0x10/0x20 [ 22.768379] [ 22.768402] freed by task 311 on cpu 1 at 22.766294s (0.002105s ago): [ 22.768461] test_corruption+0x278/0x378 [ 22.768499] kunit_try_run_case+0x170/0x3f0 [ 22.768537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.768578] kthread+0x328/0x630 [ 22.768617] ret_from_fork+0x10/0x20 [ 22.768654] [ 22.768694] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.768775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.768803] Hardware name: linux,dummy-virt (DT) [ 22.768837] ==================================================================
Failure - kunit - lib_ratelimit_lib_ratelimit
KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
<8>[ 263.434960] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
[ 18.482844] ================================================================== [ 18.482980] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 18.483583] Read of size 4 at addr fff00000c17649c0 by task swapper/1/0 [ 18.483662] [ 18.483855] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.483978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.484432] Hardware name: linux,dummy-virt (DT) [ 18.484547] Call trace: [ 18.484906] show_stack+0x20/0x38 (C) [ 18.485433] dump_stack_lvl+0x8c/0xd0 [ 18.485539] print_report+0x118/0x608 [ 18.485890] kasan_report+0xdc/0x128 [ 18.486092] __asan_report_load4_noabort+0x20/0x30 [ 18.486303] rcu_uaf_reclaim+0x64/0x70 [ 18.486461] rcu_core+0x9f4/0x1e20 [ 18.486698] rcu_core_si+0x18/0x30 [ 18.486908] handle_softirqs+0x374/0xb28 [ 18.487001] __do_softirq+0x1c/0x28 [ 18.487088] ____do_softirq+0x18/0x30 [ 18.487442] call_on_irq_stack+0x24/0x30 [ 18.487714] do_softirq_own_stack+0x24/0x38 [ 18.487829] __irq_exit_rcu+0x1fc/0x318 [ 18.488092] irq_exit_rcu+0x1c/0x80 [ 18.488325] el1_interrupt+0x38/0x58 [ 18.488376] el1h_64_irq_handler+0x18/0x28 [ 18.488422] el1h_64_irq+0x6c/0x70 [ 18.489171] arch_local_irq_enable+0x4/0x8 (P) [ 18.489624] do_idle+0x384/0x4e8 [ 18.489731] cpu_startup_entry+0x64/0x80 [ 18.490250] secondary_start_kernel+0x288/0x340 [ 18.490309] __secondary_switched+0xc0/0xc8 [ 18.490638] [ 18.490688] Allocated by task 198: [ 18.490720] kasan_save_stack+0x3c/0x68 [ 18.491098] kasan_save_track+0x20/0x40 [ 18.491210] kasan_save_alloc_info+0x40/0x58 [ 18.491383] __kasan_kmalloc+0xd4/0xd8 [ 18.491655] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.491782] rcu_uaf+0xb0/0x2d8 [ 18.491818] kunit_try_run_case+0x170/0x3f0 [ 18.491928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.492055] kthread+0x328/0x630 [ 18.492514] ret_from_fork+0x10/0x20 [ 18.492673] [ 18.492761] Freed by task 0: [ 18.492985] kasan_save_stack+0x3c/0x68 [ 18.493252] kasan_save_track+0x20/0x40 [ 18.493302] kasan_save_free_info+0x4c/0x78 [ 18.493785] __kasan_slab_free+0x6c/0x98 [ 18.493828] kfree+0x214/0x3c8 [ 18.493870] rcu_uaf_reclaim+0x28/0x70 [ 18.494052] rcu_core+0x9f4/0x1e20 [ 18.494412] rcu_core_si+0x18/0x30 [ 18.494460] handle_softirqs+0x374/0xb28 [ 18.494687] __do_softirq+0x1c/0x28 [ 18.494722] [ 18.494759] Last potentially related work creation: [ 18.495361] kasan_save_stack+0x3c/0x68 [ 18.495450] kasan_record_aux_stack+0xb4/0xc8 [ 18.495679] __call_rcu_common.constprop.0+0x70/0x8b0 [ 18.496259] call_rcu+0x18/0x30 [ 18.496392] rcu_uaf+0x14c/0x2d8 [ 18.496427] kunit_try_run_case+0x170/0x3f0 [ 18.496998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.497115] kthread+0x328/0x630 [ 18.497412] ret_from_fork+0x10/0x20 [ 18.497477] [ 18.497803] The buggy address belongs to the object at fff00000c17649c0 [ 18.497803] which belongs to the cache kmalloc-32 of size 32 [ 18.497872] The buggy address is located 0 bytes inside of [ 18.497872] freed 32-byte region [fff00000c17649c0, fff00000c17649e0) [ 18.498207] [ 18.498235] The buggy address belongs to the physical page: [ 18.498268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101764 [ 18.498777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.499369] page_type: f5(slab) [ 18.499650] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.499989] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.500362] page dumped because: kasan: bad access detected [ 18.500399] [ 18.500576] Memory state around the buggy address: [ 18.500787] fff00000c1764880: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 18.501094] fff00000c1764900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 18.501440] >fff00000c1764980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.501693] ^ [ 18.502049] fff00000c1764a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.502103] fff00000c1764a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.502310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
[ 18.318646] ================================================================== [ 18.318952] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.319013] Read of size 1 at addr fff00000c68f1978 by task kunit_try_catch/196 [ 18.319317] [ 18.319614] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.319732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.319762] Hardware name: linux,dummy-virt (DT) [ 18.319902] Call trace: [ 18.320076] show_stack+0x20/0x38 (C) [ 18.320288] dump_stack_lvl+0x8c/0xd0 [ 18.320376] print_report+0x118/0x608 [ 18.320532] kasan_report+0xdc/0x128 [ 18.320593] __asan_report_load1_noabort+0x20/0x30 [ 18.320674] ksize_uaf+0x544/0x5f8 [ 18.320728] kunit_try_run_case+0x170/0x3f0 [ 18.321099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.321185] kthread+0x328/0x630 [ 18.321240] ret_from_fork+0x10/0x20 [ 18.321389] [ 18.321416] Allocated by task 196: [ 18.321443] kasan_save_stack+0x3c/0x68 [ 18.321484] kasan_save_track+0x20/0x40 [ 18.321521] kasan_save_alloc_info+0x40/0x58 [ 18.321559] __kasan_kmalloc+0xd4/0xd8 [ 18.321594] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.321634] ksize_uaf+0xb8/0x5f8 [ 18.321665] kunit_try_run_case+0x170/0x3f0 [ 18.321702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.322147] kthread+0x328/0x630 [ 18.322272] ret_from_fork+0x10/0x20 [ 18.322312] [ 18.322332] Freed by task 196: [ 18.322798] kasan_save_stack+0x3c/0x68 [ 18.322893] kasan_save_track+0x20/0x40 [ 18.323188] kasan_save_free_info+0x4c/0x78 [ 18.323435] __kasan_slab_free+0x6c/0x98 [ 18.323608] kfree+0x214/0x3c8 [ 18.323771] ksize_uaf+0x11c/0x5f8 [ 18.323812] kunit_try_run_case+0x170/0x3f0 [ 18.324026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.324196] kthread+0x328/0x630 [ 18.324314] ret_from_fork+0x10/0x20 [ 18.324546] [ 18.324670] The buggy address belongs to the object at fff00000c68f1900 [ 18.324670] which belongs to the cache kmalloc-128 of size 128 [ 18.324798] The buggy address is located 120 bytes inside of [ 18.324798] freed 128-byte region [fff00000c68f1900, fff00000c68f1980) [ 18.325037] [ 18.325281] The buggy address belongs to the physical page: [ 18.325396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.325525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.325677] page_type: f5(slab) [ 18.325923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.326196] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.326282] page dumped because: kasan: bad access detected [ 18.326358] [ 18.326386] Memory state around the buggy address: [ 18.326460] fff00000c68f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.326506] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.326573] >fff00000c68f1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.326614] ^ [ 18.326656] fff00000c68f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.327068] fff00000c68f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.327139] ================================================================== [ 18.305381] ================================================================== [ 18.305543] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.305709] Read of size 1 at addr fff00000c68f1900 by task kunit_try_catch/196 [ 18.305928] [ 18.305990] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.306539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.306665] Hardware name: linux,dummy-virt (DT) [ 18.306713] Call trace: [ 18.306865] show_stack+0x20/0x38 (C) [ 18.307005] dump_stack_lvl+0x8c/0xd0 [ 18.307136] print_report+0x118/0x608 [ 18.307452] kasan_report+0xdc/0x128 [ 18.307575] __asan_report_load1_noabort+0x20/0x30 [ 18.307793] ksize_uaf+0x598/0x5f8 [ 18.307896] kunit_try_run_case+0x170/0x3f0 [ 18.308011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.308317] kthread+0x328/0x630 [ 18.308645] ret_from_fork+0x10/0x20 [ 18.308758] [ 18.308837] Allocated by task 196: [ 18.309046] kasan_save_stack+0x3c/0x68 [ 18.309298] kasan_save_track+0x20/0x40 [ 18.309443] kasan_save_alloc_info+0x40/0x58 [ 18.309607] __kasan_kmalloc+0xd4/0xd8 [ 18.309760] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.310045] ksize_uaf+0xb8/0x5f8 [ 18.310292] kunit_try_run_case+0x170/0x3f0 [ 18.310473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.310625] kthread+0x328/0x630 [ 18.310795] ret_from_fork+0x10/0x20 [ 18.310839] [ 18.310859] Freed by task 196: [ 18.311109] kasan_save_stack+0x3c/0x68 [ 18.311769] kasan_save_track+0x20/0x40 [ 18.312010] kasan_save_free_info+0x4c/0x78 [ 18.312202] __kasan_slab_free+0x6c/0x98 [ 18.312368] kfree+0x214/0x3c8 [ 18.312426] ksize_uaf+0x11c/0x5f8 [ 18.312836] kunit_try_run_case+0x170/0x3f0 [ 18.313372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.313670] kthread+0x328/0x630 [ 18.314140] ret_from_fork+0x10/0x20 [ 18.314198] [ 18.314371] The buggy address belongs to the object at fff00000c68f1900 [ 18.314371] which belongs to the cache kmalloc-128 of size 128 [ 18.314464] The buggy address is located 0 bytes inside of [ 18.314464] freed 128-byte region [fff00000c68f1900, fff00000c68f1980) [ 18.315001] [ 18.315123] The buggy address belongs to the physical page: [ 18.315304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.315488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.315640] page_type: f5(slab) [ 18.315769] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.316117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.316236] page dumped because: kasan: bad access detected [ 18.316469] [ 18.316599] Memory state around the buggy address: [ 18.316670] fff00000c68f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.316748] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.316791] >fff00000c68f1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.316833] ^ [ 18.316871] fff00000c68f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.316913] fff00000c68f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.316958] ================================================================== [ 18.293218] ================================================================== [ 18.293280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.293331] Read of size 1 at addr fff00000c68f1900 by task kunit_try_catch/196 [ 18.293925] [ 18.294011] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.294261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.294418] Hardware name: linux,dummy-virt (DT) [ 18.294611] Call trace: [ 18.294661] show_stack+0x20/0x38 (C) [ 18.294801] dump_stack_lvl+0x8c/0xd0 [ 18.294918] print_report+0x118/0x608 [ 18.295095] kasan_report+0xdc/0x128 [ 18.295191] __kasan_check_byte+0x54/0x70 [ 18.295677] ksize+0x30/0x88 [ 18.295803] ksize_uaf+0x168/0x5f8 [ 18.295976] kunit_try_run_case+0x170/0x3f0 [ 18.296111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.296175] kthread+0x328/0x630 [ 18.296500] ret_from_fork+0x10/0x20 [ 18.296664] [ 18.296837] Allocated by task 196: [ 18.296952] kasan_save_stack+0x3c/0x68 [ 18.297262] kasan_save_track+0x20/0x40 [ 18.297447] kasan_save_alloc_info+0x40/0x58 [ 18.297534] __kasan_kmalloc+0xd4/0xd8 [ 18.297891] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.297966] ksize_uaf+0xb8/0x5f8 [ 18.298114] kunit_try_run_case+0x170/0x3f0 [ 18.298274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.298383] kthread+0x328/0x630 [ 18.298599] ret_from_fork+0x10/0x20 [ 18.299038] [ 18.299121] Freed by task 196: [ 18.299275] kasan_save_stack+0x3c/0x68 [ 18.299450] kasan_save_track+0x20/0x40 [ 18.299588] kasan_save_free_info+0x4c/0x78 [ 18.299985] __kasan_slab_free+0x6c/0x98 [ 18.300054] kfree+0x214/0x3c8 [ 18.300086] ksize_uaf+0x11c/0x5f8 [ 18.300130] kunit_try_run_case+0x170/0x3f0 [ 18.300229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.300275] kthread+0x328/0x630 [ 18.300318] ret_from_fork+0x10/0x20 [ 18.300355] [ 18.300383] The buggy address belongs to the object at fff00000c68f1900 [ 18.300383] which belongs to the cache kmalloc-128 of size 128 [ 18.300451] The buggy address is located 0 bytes inside of [ 18.300451] freed 128-byte region [fff00000c68f1900, fff00000c68f1980) [ 18.300511] [ 18.300530] The buggy address belongs to the physical page: [ 18.300560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.300620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.300677] page_type: f5(slab) [ 18.300721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.300770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.300816] page dumped because: kasan: bad access detected [ 18.300846] [ 18.300865] Memory state around the buggy address: [ 18.300895] fff00000c68f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.300946] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300987] >fff00000c68f1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.301024] ^ [ 18.301058] fff00000c68f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.301100] fff00000c68f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.301138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
[ 18.267553] ================================================================== [ 18.267607] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.267660] Read of size 1 at addr fff00000c68f1878 by task kunit_try_catch/194 [ 18.267985] [ 18.268034] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.268122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.268148] Hardware name: linux,dummy-virt (DT) [ 18.268300] Call trace: [ 18.268509] show_stack+0x20/0x38 (C) [ 18.268635] dump_stack_lvl+0x8c/0xd0 [ 18.268770] print_report+0x118/0x608 [ 18.268867] kasan_report+0xdc/0x128 [ 18.268962] __asan_report_load1_noabort+0x20/0x30 [ 18.269225] ksize_unpoisons_memory+0x618/0x740 [ 18.269303] kunit_try_run_case+0x170/0x3f0 [ 18.269387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.269457] kthread+0x328/0x630 [ 18.269690] ret_from_fork+0x10/0x20 [ 18.270026] [ 18.270064] Allocated by task 194: [ 18.270177] kasan_save_stack+0x3c/0x68 [ 18.270511] kasan_save_track+0x20/0x40 [ 18.270608] kasan_save_alloc_info+0x40/0x58 [ 18.270825] __kasan_kmalloc+0xd4/0xd8 [ 18.271019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.271274] ksize_unpoisons_memory+0xc0/0x740 [ 18.271507] kunit_try_run_case+0x170/0x3f0 [ 18.271651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.271826] kthread+0x328/0x630 [ 18.271948] ret_from_fork+0x10/0x20 [ 18.272115] [ 18.272145] The buggy address belongs to the object at fff00000c68f1800 [ 18.272145] which belongs to the cache kmalloc-128 of size 128 [ 18.272557] The buggy address is located 5 bytes to the right of [ 18.272557] allocated 115-byte region [fff00000c68f1800, fff00000c68f1873) [ 18.272740] [ 18.272790] The buggy address belongs to the physical page: [ 18.272829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.272882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.272932] page_type: f5(slab) [ 18.272984] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.273035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.273084] page dumped because: kasan: bad access detected [ 18.273115] [ 18.273141] Memory state around the buggy address: [ 18.273184] fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.273235] fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.273278] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.273326] ^ [ 18.273378] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.273421] fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.273464] ================================================================== [ 18.252728] ================================================================== [ 18.252784] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.252836] Read of size 1 at addr fff00000c68f1873 by task kunit_try_catch/194 [ 18.252886] [ 18.252944] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.253038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.253066] Hardware name: linux,dummy-virt (DT) [ 18.253102] Call trace: [ 18.253124] show_stack+0x20/0x38 (C) [ 18.253187] dump_stack_lvl+0x8c/0xd0 [ 18.253232] print_report+0x118/0x608 [ 18.253690] kasan_report+0xdc/0x128 [ 18.253865] __asan_report_load1_noabort+0x20/0x30 [ 18.254449] ksize_unpoisons_memory+0x628/0x740 [ 18.254510] kunit_try_run_case+0x170/0x3f0 [ 18.255540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.255763] kthread+0x328/0x630 [ 18.255827] ret_from_fork+0x10/0x20 [ 18.256128] [ 18.256346] Allocated by task 194: [ 18.256450] kasan_save_stack+0x3c/0x68 [ 18.256621] kasan_save_track+0x20/0x40 [ 18.256907] kasan_save_alloc_info+0x40/0x58 [ 18.257051] __kasan_kmalloc+0xd4/0xd8 [ 18.257280] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.257701] ksize_unpoisons_memory+0xc0/0x740 [ 18.257934] kunit_try_run_case+0x170/0x3f0 [ 18.257976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.258046] kthread+0x328/0x630 [ 18.258356] ret_from_fork+0x10/0x20 [ 18.258506] [ 18.258549] The buggy address belongs to the object at fff00000c68f1800 [ 18.258549] which belongs to the cache kmalloc-128 of size 128 [ 18.258887] The buggy address is located 0 bytes to the right of [ 18.258887] allocated 115-byte region [fff00000c68f1800, fff00000c68f1873) [ 18.259025] [ 18.259048] The buggy address belongs to the physical page: [ 18.259244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.259472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.259527] page_type: f5(slab) [ 18.259567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.259934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.260074] page dumped because: kasan: bad access detected [ 18.260166] [ 18.260184] Memory state around the buggy address: [ 18.260246] fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.260310] fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.260494] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.260760] ^ [ 18.261110] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.261224] fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.261322] ================================================================== [ 18.275711] ================================================================== [ 18.275765] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.275840] Read of size 1 at addr fff00000c68f187f by task kunit_try_catch/194 [ 18.275892] [ 18.275928] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.276197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.276426] Hardware name: linux,dummy-virt (DT) [ 18.276471] Call trace: [ 18.276579] show_stack+0x20/0x38 (C) [ 18.276651] dump_stack_lvl+0x8c/0xd0 [ 18.276727] print_report+0x118/0x608 [ 18.276849] kasan_report+0xdc/0x128 [ 18.277054] __asan_report_load1_noabort+0x20/0x30 [ 18.277253] ksize_unpoisons_memory+0x690/0x740 [ 18.277366] kunit_try_run_case+0x170/0x3f0 [ 18.277418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.277472] kthread+0x328/0x630 [ 18.277584] ret_from_fork+0x10/0x20 [ 18.277635] [ 18.277653] Allocated by task 194: [ 18.277768] kasan_save_stack+0x3c/0x68 [ 18.277814] kasan_save_track+0x20/0x40 [ 18.278468] kasan_save_alloc_info+0x40/0x58 [ 18.278568] __kasan_kmalloc+0xd4/0xd8 [ 18.278731] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.279121] ksize_unpoisons_memory+0xc0/0x740 [ 18.279322] kunit_try_run_case+0x170/0x3f0 [ 18.279448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.279666] kthread+0x328/0x630 [ 18.279986] ret_from_fork+0x10/0x20 [ 18.280254] [ 18.280387] The buggy address belongs to the object at fff00000c68f1800 [ 18.280387] which belongs to the cache kmalloc-128 of size 128 [ 18.280519] The buggy address is located 12 bytes to the right of [ 18.280519] allocated 115-byte region [fff00000c68f1800, fff00000c68f1873) [ 18.280693] [ 18.280735] The buggy address belongs to the physical page: [ 18.281132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.281327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.281534] page_type: f5(slab) [ 18.281600] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.281680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.282030] page dumped because: kasan: bad access detected [ 18.282103] [ 18.282541] Memory state around the buggy address: [ 18.282592] fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.282638] fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.283066] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.283149] ^ [ 18.283202] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.283346] fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.283387] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[ 20.269569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 20.438253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 20.427238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
[ 20.191031] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
[ 94.879904] Internal error: Oops: 0000000096000005 [#1] SMP [ 94.884566] Modules linked in: [ 94.886321] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 94.887463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.888068] Hardware name: linux,dummy-virt (DT) [ 94.888827] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.889844] pc : kunit_test_null_dereference+0x70/0x170 [ 94.890693] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.891510] sp : ffff800080ef7d30 [ 94.892067] x29: ffff800080ef7d90 x28: 0000000000000000 x27: 0000000000000000 [ 94.893320] x26: 1ffe0000182e5c81 x25: 0000000000000000 x24: 0000000000000004 [ 94.894326] x23: fff00000c172e40c x22: ffff950701a0e460 x21: fff00000c3ed0d88 [ 94.895408] x20: 1ffff000101defa6 x19: ffff800080087990 x18: fff00000c000b5b0 [ 94.895999] x17: 0000000000000001 x16: fff00000c097583c x15: fff00000ff616b08 [ 94.896362] x14: 0000000000018fff x13: 1ffe00001b48e9c5 x12: fffd80001829062c [ 94.896699] x11: 1ffe00001829062b x10: fffd80001829062b x9 : ffff950701a058c8 [ 94.897083] x8 : ffff800080ef7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 94.898033] x5 : ffff7000101defa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 94.898996] x2 : dfff800000000000 x1 : fff00000c1482880 x0 : ffff800080087990 [ 94.899833] Call trace: [ 94.900178] kunit_test_null_dereference+0x70/0x170 (P) [ 94.900737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.901323] kthread+0x328/0x630 [ 94.901715] ret_from_fork+0x10/0x20 [ 94.902484] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 94.903515] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
[ 51.471171] ================================================================== [ 51.471232] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.471232] [ 51.471314] Use-after-free read at 0x00000000c93cc991 (in kfence-#154): [ 51.471364] test_krealloc+0x51c/0x830 [ 51.471408] kunit_try_run_case+0x170/0x3f0 [ 51.471453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.471497] kthread+0x328/0x630 [ 51.471539] ret_from_fork+0x10/0x20 [ 51.471579] [ 51.471602] kfence-#154: 0x00000000c93cc991-0x000000005d7f3a1e, size=32, cache=kmalloc-32 [ 51.471602] [ 51.471656] allocated by task 337 on cpu 0 at 51.470477s (0.001175s ago): [ 51.471724] test_alloc+0x29c/0x628 [ 51.471765] test_krealloc+0xc0/0x830 [ 51.471803] kunit_try_run_case+0x170/0x3f0 [ 51.471841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.471883] kthread+0x328/0x630 [ 51.471923] ret_from_fork+0x10/0x20 [ 51.471962] [ 51.471985] freed by task 337 on cpu 0 at 51.470773s (0.001208s ago): [ 51.472043] krealloc_noprof+0x148/0x360 [ 51.472082] test_krealloc+0x1dc/0x830 [ 51.472121] kunit_try_run_case+0x170/0x3f0 [ 51.472170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.472211] kthread+0x328/0x630 [ 51.472249] ret_from_fork+0x10/0x20 [ 51.472287] [ 51.472331] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.472416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.472450] Hardware name: linux,dummy-virt (DT) [ 51.472482] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
[ 51.378527] ================================================================== [ 51.378618] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.378618] [ 51.378715] Use-after-free read at 0x000000007911c1c7 (in kfence-#153): [ 51.378774] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.378822] kunit_try_run_case+0x170/0x3f0 [ 51.378866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.378910] kthread+0x328/0x630 [ 51.378953] ret_from_fork+0x10/0x20 [ 51.378992] [ 51.379016] kfence-#153: 0x000000007911c1c7-0x000000001774f692, size=32, cache=test [ 51.379016] [ 51.379066] allocated by task 335 on cpu 1 at 51.366505s (0.012557s ago): [ 51.379134] test_alloc+0x230/0x628 [ 51.379188] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.379231] kunit_try_run_case+0x170/0x3f0 [ 51.379268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.379310] kthread+0x328/0x630 [ 51.379348] ret_from_fork+0x10/0x20 [ 51.379387] [ 51.379411] freed by task 335 on cpu 1 at 51.366614s (0.012793s ago): [ 51.379465] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.379507] kunit_try_run_case+0x170/0x3f0 [ 51.379544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.379585] kthread+0x328/0x630 [ 51.379624] ret_from_fork+0x10/0x20 [ 51.379662] [ 51.379707] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.379788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.379816] Hardware name: linux,dummy-virt (DT) [ 51.379851] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
[ 28.613710] ================================================================== [ 28.613976] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 28.613976] [ 28.614107] Invalid read at 0x00000000306ea4c7: [ 28.614215] test_invalid_access+0xdc/0x1f0 [ 28.614274] kunit_try_run_case+0x170/0x3f0 [ 28.614324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.614544] kthread+0x328/0x630 [ 28.614755] ret_from_fork+0x10/0x20 [ 28.615257] [ 28.616252] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.617134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.617201] Hardware name: linux,dummy-virt (DT) [ 28.617315] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
[ 21.815540] ================================================================== [ 21.815662] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 21.815662] [ 21.816119] Out-of-bounds write at 0x00000000692ce2bd (1B left of kfence-#86): [ 21.816292] test_out_of_bounds_write+0x100/0x240 [ 21.816425] kunit_try_run_case+0x170/0x3f0 [ 21.816476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.816908] kthread+0x328/0x630 [ 21.816970] ret_from_fork+0x10/0x20 [ 21.817141] [ 21.817189] kfence-#86: 0x000000001d58a2f2-0x00000000347cd8f9, size=32, cache=test [ 21.817189] [ 21.817486] allocated by task 293 on cpu 0 at 21.815401s (0.001839s ago): [ 21.817898] test_alloc+0x230/0x628 [ 21.818115] test_out_of_bounds_write+0xc8/0x240 [ 21.818174] kunit_try_run_case+0x170/0x3f0 [ 21.818359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.818685] kthread+0x328/0x630 [ 21.818813] ret_from_fork+0x10/0x20 [ 21.818964] [ 21.819078] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.819289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.819343] Hardware name: linux,dummy-virt (DT) [ 21.819728] ================================================================== [ 21.708716] ================================================================== [ 21.708962] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 21.708962] [ 21.709065] Out-of-bounds write at 0x0000000065b761bb (1B left of kfence-#85): [ 21.709421] test_out_of_bounds_write+0x100/0x240 [ 21.709522] kunit_try_run_case+0x170/0x3f0 [ 21.709927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.710129] kthread+0x328/0x630 [ 21.710212] ret_from_fork+0x10/0x20 [ 21.710436] [ 21.710568] kfence-#85: 0x00000000af1f5610-0x000000005607c3d3, size=32, cache=kmalloc-32 [ 21.710568] [ 21.710762] allocated by task 291 on cpu 0 at 21.708083s (0.002657s ago): [ 21.710843] test_alloc+0x29c/0x628 [ 21.710900] test_out_of_bounds_write+0xc8/0x240 [ 21.711124] kunit_try_run_case+0x170/0x3f0 [ 21.711381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.711502] kthread+0x328/0x630 [ 21.711567] ret_from_fork+0x10/0x20 [ 21.711943] [ 21.712364] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.712875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.713000] Hardware name: linux,dummy-virt (DT) [ 21.713078] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
[ 28.382492] ================================================================== [ 28.382590] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.382590] [ 28.382656] Corrupted memory at 0x0000000062639798 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149): [ 28.382983] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.383035] kunit_try_run_case+0x170/0x3f0 [ 28.383077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.383119] kthread+0x328/0x630 [ 28.383176] ret_from_fork+0x10/0x20 [ 28.383216] [ 28.383242] kfence-#149: 0x0000000053595d44-0x0000000096fad8d4, size=73, cache=kmalloc-96 [ 28.383242] [ 28.383295] allocated by task 325 on cpu 0 at 28.382219s (0.001072s ago): [ 28.383357] test_alloc+0x29c/0x628 [ 28.383396] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 28.383439] kunit_try_run_case+0x170/0x3f0 [ 28.383478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.383522] kthread+0x328/0x630 [ 28.383561] ret_from_fork+0x10/0x20 [ 28.383601] [ 28.383626] freed by task 325 on cpu 0 at 28.382352s (0.001270s ago): [ 28.383686] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.383729] kunit_try_run_case+0x170/0x3f0 [ 28.383768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.383810] kthread+0x328/0x630 [ 28.383850] ret_from_fork+0x10/0x20 [ 28.383890] [ 28.383934] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.384021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.384052] Hardware name: linux,dummy-virt (DT) [ 28.384087] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
[ 28.070403] ================================================================== [ 28.070506] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.070506] [ 28.070610] Out-of-bounds read at 0x00000000c962e85d (105B right of kfence-#146): [ 28.070673] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.070728] kunit_try_run_case+0x170/0x3f0 [ 28.070774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.070819] kthread+0x328/0x630 [ 28.070861] ret_from_fork+0x10/0x20 [ 28.070900] [ 28.070925] kfence-#146: 0x000000006696a400-0x0000000058d17b05, size=73, cache=kmalloc-96 [ 28.070925] [ 28.070979] allocated by task 323 on cpu 0 at 28.070166s (0.000809s ago): [ 28.071052] test_alloc+0x29c/0x628 [ 28.071095] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.071138] kunit_try_run_case+0x170/0x3f0 [ 28.071189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.071232] kthread+0x328/0x630 [ 28.071271] ret_from_fork+0x10/0x20 [ 28.071312] [ 28.071359] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.071442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.071473] Hardware name: linux,dummy-virt (DT) [ 28.071508] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
[ 22.559042] ================================================================== [ 22.559131] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 22.559131] [ 22.559204] Invalid free of 0x000000001e561d7b (in kfence-#93): [ 22.559258] test_invalid_addr_free+0x1ac/0x238 [ 22.559307] kunit_try_run_case+0x170/0x3f0 [ 22.559352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.559395] kthread+0x328/0x630 [ 22.559438] ret_from_fork+0x10/0x20 [ 22.559478] [ 22.559502] kfence-#93: 0x00000000a0c95fc0-0x0000000049c60dc3, size=32, cache=kmalloc-32 [ 22.559502] [ 22.559556] allocated by task 307 on cpu 0 at 22.558906s (0.000647s ago): [ 22.559620] test_alloc+0x29c/0x628 [ 22.559660] test_invalid_addr_free+0xd4/0x238 [ 22.559702] kunit_try_run_case+0x170/0x3f0 [ 22.559742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.559782] kthread+0x328/0x630 [ 22.559821] ret_from_fork+0x10/0x20 [ 22.559860] [ 22.559903] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.559986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.560015] Hardware name: linux,dummy-virt (DT) [ 22.560050] ================================================================== [ 22.662320] ================================================================== [ 22.662409] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 22.662409] [ 22.662469] Invalid free of 0x00000000f418ffab (in kfence-#94): [ 22.662523] test_invalid_addr_free+0xec/0x238 [ 22.662568] kunit_try_run_case+0x170/0x3f0 [ 22.662612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.662653] kthread+0x328/0x630 [ 22.662695] ret_from_fork+0x10/0x20 [ 22.662742] [ 22.662765] kfence-#94: 0x00000000a6f78ade-0x000000007118df67, size=32, cache=test [ 22.662765] [ 22.662816] allocated by task 309 on cpu 1 at 22.662194s (0.000618s ago): [ 22.662878] test_alloc+0x230/0x628 [ 22.662916] test_invalid_addr_free+0xd4/0x238 [ 22.662959] kunit_try_run_case+0x170/0x3f0 [ 22.662999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.663039] kthread+0x328/0x630 [ 22.663079] ret_from_fork+0x10/0x20 [ 22.663117] [ 22.663174] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.663257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.663286] Hardware name: linux,dummy-virt (DT) [ 22.663321] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
[ 22.455415] ================================================================== [ 22.455495] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 22.455495] [ 22.455555] Invalid free of 0x000000005fd9151c (in kfence-#92): [ 22.455741] test_double_free+0x100/0x238 [ 22.455803] kunit_try_run_case+0x170/0x3f0 [ 22.455964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.456052] kthread+0x328/0x630 [ 22.456117] ret_from_fork+0x10/0x20 [ 22.456244] [ 22.456292] kfence-#92: 0x000000005fd9151c-0x00000000fd9f3de0, size=32, cache=test [ 22.456292] [ 22.456346] allocated by task 305 on cpu 0 at 22.454857s (0.001485s ago): [ 22.456648] test_alloc+0x230/0x628 [ 22.456708] test_double_free+0xd4/0x238 [ 22.456881] kunit_try_run_case+0x170/0x3f0 [ 22.456934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.456978] kthread+0x328/0x630 [ 22.457046] ret_from_fork+0x10/0x20 [ 22.457089] [ 22.457235] freed by task 305 on cpu 0 at 22.455048s (0.002158s ago): [ 22.457539] test_double_free+0xf0/0x238 [ 22.457679] kunit_try_run_case+0x170/0x3f0 [ 22.457829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.458199] kthread+0x328/0x630 [ 22.458486] ret_from_fork+0x10/0x20 [ 22.458535] [ 22.459103] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.459354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.459612] Hardware name: linux,dummy-virt (DT) [ 22.459904] ================================================================== [ 22.353584] ================================================================== [ 22.353684] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 22.353684] [ 22.353757] Invalid free of 0x00000000490fc580 (in kfence-#91): [ 22.354089] test_double_free+0x1bc/0x238 [ 22.354310] kunit_try_run_case+0x170/0x3f0 [ 22.354451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.354546] kthread+0x328/0x630 [ 22.354595] ret_from_fork+0x10/0x20 [ 22.354863] [ 22.355430] kfence-#91: 0x00000000490fc580-0x0000000043916d6b, size=32, cache=kmalloc-32 [ 22.355430] [ 22.355985] allocated by task 303 on cpu 0 at 22.352883s (0.003096s ago): [ 22.356517] test_alloc+0x29c/0x628 [ 22.356598] test_double_free+0xd4/0x238 [ 22.356661] kunit_try_run_case+0x170/0x3f0 [ 22.356709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.356757] kthread+0x328/0x630 [ 22.356808] ret_from_fork+0x10/0x20 [ 22.356857] [ 22.356882] freed by task 303 on cpu 0 at 22.352961s (0.003918s ago): [ 22.356958] test_double_free+0x1ac/0x238 [ 22.357004] kunit_try_run_case+0x170/0x3f0 [ 22.357055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.357106] kthread+0x328/0x630 [ 22.357165] ret_from_fork+0x10/0x20 [ 22.357205] [ 22.357259] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.357342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.357386] Hardware name: linux,dummy-virt (DT) [ 22.357435] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
[ 22.027856] ================================================================== [ 22.027936] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.027936] [ 22.028291] Use-after-free read at 0x0000000015d6621c (in kfence-#88): [ 22.028383] test_use_after_free_read+0x114/0x248 [ 22.028437] kunit_try_run_case+0x170/0x3f0 [ 22.028483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028526] kthread+0x328/0x630 [ 22.028569] ret_from_fork+0x10/0x20 [ 22.028608] [ 22.028633] kfence-#88: 0x0000000015d6621c-0x0000000020ccf0e5, size=32, cache=test [ 22.028633] [ 22.028682] allocated by task 297 on cpu 0 at 22.027399s (0.001280s ago): [ 22.028759] test_alloc+0x230/0x628 [ 22.028802] test_use_after_free_read+0xd0/0x248 [ 22.028843] kunit_try_run_case+0x170/0x3f0 [ 22.028881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028922] kthread+0x328/0x630 [ 22.028964] ret_from_fork+0x10/0x20 [ 22.029004] [ 22.029038] freed by task 297 on cpu 0 at 22.027697s (0.001337s ago): [ 22.029140] test_use_after_free_read+0xf0/0x248 [ 22.029197] kunit_try_run_case+0x170/0x3f0 [ 22.029235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.029276] kthread+0x328/0x630 [ 22.029314] ret_from_fork+0x10/0x20 [ 22.029354] [ 22.029399] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.029492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.029531] Hardware name: linux,dummy-virt (DT) [ 22.029566] ================================================================== [ 21.919797] ================================================================== [ 21.919877] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 21.919877] [ 21.920031] Use-after-free read at 0x000000000d27104c (in kfence-#87): [ 21.920086] test_use_after_free_read+0x114/0x248 [ 21.920481] kunit_try_run_case+0x170/0x3f0 [ 21.920560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.920606] kthread+0x328/0x630 [ 21.920649] ret_from_fork+0x10/0x20 [ 21.920771] [ 21.920800] kfence-#87: 0x000000000d27104c-0x000000001071f8e7, size=32, cache=kmalloc-32 [ 21.920800] [ 21.920903] allocated by task 295 on cpu 0 at 21.919069s (0.001786s ago): [ 21.921315] test_alloc+0x29c/0x628 [ 21.921368] test_use_after_free_read+0xd0/0x248 [ 21.921417] kunit_try_run_case+0x170/0x3f0 [ 21.921793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.921896] kthread+0x328/0x630 [ 21.921937] ret_from_fork+0x10/0x20 [ 21.922211] [ 21.922908] freed by task 295 on cpu 0 at 21.919144s (0.003453s ago): [ 21.923064] test_use_after_free_read+0x1c0/0x248 [ 21.923429] kunit_try_run_case+0x170/0x3f0 [ 21.923728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.923923] kthread+0x328/0x630 [ 21.924295] ret_from_fork+0x10/0x20 [ 21.924383] [ 21.924448] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.924536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.924566] Hardware name: linux,dummy-virt (DT) [ 21.924602] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
[ 21.167347] ================================================================== [ 21.167557] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.167557] [ 21.167829] Out-of-bounds read at 0x000000000c6d2d65 (1B left of kfence-#80): [ 21.168001] test_out_of_bounds_read+0x114/0x3e0 [ 21.168058] kunit_try_run_case+0x170/0x3f0 [ 21.168126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.168190] kthread+0x328/0x630 [ 21.168299] ret_from_fork+0x10/0x20 [ 21.168390] [ 21.168499] kfence-#80: 0x00000000b3877aec-0x00000000b4727e9d, size=32, cache=kmalloc-32 [ 21.168499] [ 21.168723] allocated by task 287 on cpu 0 at 21.166405s (0.002300s ago): [ 21.169059] test_alloc+0x29c/0x628 [ 21.169166] test_out_of_bounds_read+0xdc/0x3e0 [ 21.169222] kunit_try_run_case+0x170/0x3f0 [ 21.169417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.169529] kthread+0x328/0x630 [ 21.169568] ret_from_fork+0x10/0x20 [ 21.169625] [ 21.169677] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.169773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.169803] Hardware name: linux,dummy-virt (DT) [ 21.169837] ================================================================== [ 21.491279] ================================================================== [ 21.491354] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.491354] [ 21.491462] Out-of-bounds read at 0x00000000e80a7474 (1B left of kfence-#83): [ 21.491667] test_out_of_bounds_read+0x114/0x3e0 [ 21.491717] kunit_try_run_case+0x170/0x3f0 [ 21.491757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.491799] kthread+0x328/0x630 [ 21.491839] ret_from_fork+0x10/0x20 [ 21.491879] [ 21.491903] kfence-#83: 0x000000007eafdb5d-0x000000008f45ec79, size=32, cache=test [ 21.491903] [ 21.491951] allocated by task 289 on cpu 0 at 21.491200s (0.000747s ago): [ 21.492065] test_alloc+0x230/0x628 [ 21.492107] test_out_of_bounds_read+0xdc/0x3e0 [ 21.492149] kunit_try_run_case+0x170/0x3f0 [ 21.492212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.492255] kthread+0x328/0x630 [ 21.492292] ret_from_fork+0x10/0x20 [ 21.492331] [ 21.492375] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.492690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.492856] Hardware name: linux,dummy-virt (DT) [ 21.493012] ================================================================== [ 21.383149] ================================================================== [ 21.383270] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.383270] [ 21.383480] Out-of-bounds read at 0x000000008fa86d37 (32B right of kfence-#82): [ 21.383576] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.383637] kunit_try_run_case+0x170/0x3f0 [ 21.383681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.383739] kthread+0x328/0x630 [ 21.383895] ret_from_fork+0x10/0x20 [ 21.384035] [ 21.384079] kfence-#82: 0x00000000277bebb5-0x00000000bf3ac5d1, size=32, cache=kmalloc-32 [ 21.384079] [ 21.384202] allocated by task 287 on cpu 0 at 21.382715s (0.001483s ago): [ 21.384273] test_alloc+0x29c/0x628 [ 21.384313] test_out_of_bounds_read+0x198/0x3e0 [ 21.384353] kunit_try_run_case+0x170/0x3f0 [ 21.384533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.384576] kthread+0x328/0x630 [ 21.384614] ret_from_fork+0x10/0x20 [ 21.384702] [ 21.384818] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.384902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.384931] Hardware name: linux,dummy-virt (DT) [ 21.384980] ================================================================== [ 21.600490] ================================================================== [ 21.600577] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.600577] [ 21.600777] Out-of-bounds read at 0x00000000990e02c1 (32B right of kfence-#84): [ 21.600942] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.600990] kunit_try_run_case+0x170/0x3f0 [ 21.601040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.601175] kthread+0x328/0x630 [ 21.601257] ret_from_fork+0x10/0x20 [ 21.601297] [ 21.601616] kfence-#84: 0x00000000988e48a1-0x000000002ddd932b, size=32, cache=test [ 21.601616] [ 21.603760] allocated by task 289 on cpu 0 at 21.600414s (0.003339s ago): [ 21.603971] test_alloc+0x230/0x628 [ 21.604096] test_out_of_bounds_read+0x198/0x3e0 [ 21.604229] kunit_try_run_case+0x170/0x3f0 [ 21.604272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.604313] kthread+0x328/0x630 [ 21.604362] ret_from_fork+0x10/0x20 [ 21.604402] [ 21.604448] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.604531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.604601] Hardware name: linux,dummy-virt (DT) [ 21.604635] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-write-in-__memset
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-write-in-__memset: Failure
[ 18.171528] ================================================================== [ 18.171621] BUG: KFENCE: use-after-free write in __memset+0xc/0x20 [ 18.171621] [ 18.171702] Use-after-free write at 0x000000003bfa5165 (in kfence-#58): [ 18.172196] __memset+0xc/0x20 [ 18.172255] kmalloc_uaf_memset+0x170/0x310 [ 18.172295] kunit_try_run_case+0x170/0x3f0 [ 18.172345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.172393] kthread+0x328/0x630 [ 18.172437] ret_from_fork+0x10/0x20 [ 18.172490] [ 18.172667] kfence-#58: 0x000000003bfa5165-0x00000000fadb8304, size=33, cache=kmalloc-64 [ 18.172667] [ 18.172869] allocated by task 186 on cpu 1 at 18.169071s (0.003731s ago): [ 18.174687] kmalloc_uaf_memset+0xb8/0x310 [ 18.174800] kunit_try_run_case+0x170/0x3f0 [ 18.174896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.175357] kthread+0x328/0x630 [ 18.175456] ret_from_fork+0x10/0x20 [ 18.175650] [ 18.176584] freed by task 186 on cpu 1 at 18.169150s (0.006943s ago): [ 18.177931] kmalloc_uaf_memset+0x11c/0x310 [ 18.178007] kunit_try_run_case+0x170/0x3f0 [ 18.178111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.178225] kthread+0x328/0x630 [ 18.178403] ret_from_fork+0x10/0x20 [ 18.178790] [ 18.179537] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.179932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.180268] Hardware name: linux,dummy-virt (DT) [ 18.180402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
[ 20.864821] ================================================================== [ 20.864884] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 20.864950] Write of size 1 at addr fff00000c1729a78 by task kunit_try_catch/285 [ 20.865013] [ 20.865054] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.865305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.865431] Hardware name: linux,dummy-virt (DT) [ 20.865582] Call trace: [ 20.865606] show_stack+0x20/0x38 (C) [ 20.865657] dump_stack_lvl+0x8c/0xd0 [ 20.866002] print_report+0x118/0x608 [ 20.866060] kasan_report+0xdc/0x128 [ 20.866170] __asan_report_store1_noabort+0x20/0x30 [ 20.866262] strncpy_from_user+0x270/0x2a0 [ 20.866310] copy_user_test_oob+0x5c0/0xec8 [ 20.866359] kunit_try_run_case+0x170/0x3f0 [ 20.866416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866481] kthread+0x328/0x630 [ 20.866639] ret_from_fork+0x10/0x20 [ 20.866794] [ 20.866818] Allocated by task 285: [ 20.866873] kasan_save_stack+0x3c/0x68 [ 20.867052] kasan_save_track+0x20/0x40 [ 20.867097] kasan_save_alloc_info+0x40/0x58 [ 20.867140] __kasan_kmalloc+0xd4/0xd8 [ 20.867441] __kmalloc_noprof+0x190/0x4d0 [ 20.867487] kunit_kmalloc_array+0x34/0x88 [ 20.867527] copy_user_test_oob+0xac/0xec8 [ 20.867566] kunit_try_run_case+0x170/0x3f0 [ 20.867621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.867836] kthread+0x328/0x630 [ 20.867873] ret_from_fork+0x10/0x20 [ 20.867956] [ 20.868328] The buggy address belongs to the object at fff00000c1729a00 [ 20.868328] which belongs to the cache kmalloc-128 of size 128 [ 20.868464] The buggy address is located 0 bytes to the right of [ 20.868464] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.868530] [ 20.868604] The buggy address belongs to the physical page: [ 20.868748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.868845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.868912] page_type: f5(slab) [ 20.869020] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.869145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.869269] page dumped because: kasan: bad access detected [ 20.869390] [ 20.869432] Memory state around the buggy address: [ 20.869474] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.869553] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869628] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.869669] ^ [ 20.869711] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869755] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869797] ================================================================== [ 20.858859] ================================================================== [ 20.859039] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 20.859181] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.859418] [ 20.859578] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.859954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.859984] Hardware name: linux,dummy-virt (DT) [ 20.860062] Call trace: [ 20.860803] show_stack+0x20/0x38 (C) [ 20.860979] dump_stack_lvl+0x8c/0xd0 [ 20.861232] print_report+0x118/0x608 [ 20.861319] kasan_report+0xdc/0x128 [ 20.861510] kasan_check_range+0x100/0x1a8 [ 20.861676] __kasan_check_write+0x20/0x30 [ 20.861793] strncpy_from_user+0x3c/0x2a0 [ 20.861894] copy_user_test_oob+0x5c0/0xec8 [ 20.862001] kunit_try_run_case+0x170/0x3f0 [ 20.862051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.862105] kthread+0x328/0x630 [ 20.862152] ret_from_fork+0x10/0x20 [ 20.862210] [ 20.862230] Allocated by task 285: [ 20.862258] kasan_save_stack+0x3c/0x68 [ 20.862316] kasan_save_track+0x20/0x40 [ 20.862358] kasan_save_alloc_info+0x40/0x58 [ 20.862405] __kasan_kmalloc+0xd4/0xd8 [ 20.862443] __kmalloc_noprof+0x190/0x4d0 [ 20.862480] kunit_kmalloc_array+0x34/0x88 [ 20.862542] copy_user_test_oob+0xac/0xec8 [ 20.862583] kunit_try_run_case+0x170/0x3f0 [ 20.862621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.862735] kthread+0x328/0x630 [ 20.862812] ret_from_fork+0x10/0x20 [ 20.862894] [ 20.862915] The buggy address belongs to the object at fff00000c1729a00 [ 20.862915] which belongs to the cache kmalloc-128 of size 128 [ 20.862975] The buggy address is located 0 bytes inside of [ 20.862975] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.863048] [ 20.863069] The buggy address belongs to the physical page: [ 20.863121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.863223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.863361] page_type: f5(slab) [ 20.863430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.863483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.863525] page dumped because: kasan: bad access detected [ 20.863559] [ 20.863580] Memory state around the buggy address: [ 20.863624] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.863678] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.863722] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.863773] ^ [ 20.863814] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.863893] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.863991] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
[ 20.851837] ================================================================== [ 20.851889] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 20.851955] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.852006] [ 20.852037] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.852149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.852239] Hardware name: linux,dummy-virt (DT) [ 20.852371] Call trace: [ 20.852495] show_stack+0x20/0x38 (C) [ 20.852547] dump_stack_lvl+0x8c/0xd0 [ 20.852593] print_report+0x118/0x608 [ 20.852651] kasan_report+0xdc/0x128 [ 20.852709] kasan_check_range+0x100/0x1a8 [ 20.853063] __kasan_check_read+0x20/0x30 [ 20.853121] copy_user_test_oob+0x4a0/0xec8 [ 20.853313] kunit_try_run_case+0x170/0x3f0 [ 20.853363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.853427] kthread+0x328/0x630 [ 20.853473] ret_from_fork+0x10/0x20 [ 20.853523] [ 20.853544] Allocated by task 285: [ 20.853573] kasan_save_stack+0x3c/0x68 [ 20.853622] kasan_save_track+0x20/0x40 [ 20.854142] kasan_save_alloc_info+0x40/0x58 [ 20.854336] __kasan_kmalloc+0xd4/0xd8 [ 20.854376] __kmalloc_noprof+0x190/0x4d0 [ 20.854534] kunit_kmalloc_array+0x34/0x88 [ 20.854640] copy_user_test_oob+0xac/0xec8 [ 20.854682] kunit_try_run_case+0x170/0x3f0 [ 20.854721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.854769] kthread+0x328/0x630 [ 20.854808] ret_from_fork+0x10/0x20 [ 20.854846] [ 20.854870] The buggy address belongs to the object at fff00000c1729a00 [ 20.854870] which belongs to the cache kmalloc-128 of size 128 [ 20.854930] The buggy address is located 0 bytes inside of [ 20.854930] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.855056] [ 20.855086] The buggy address belongs to the physical page: [ 20.855118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.855180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.855229] page_type: f5(slab) [ 20.855311] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.855860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.855905] page dumped because: kasan: bad access detected [ 20.855990] [ 20.856094] Memory state around the buggy address: [ 20.856185] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.856237] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.856279] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.856640] ^ [ 20.856680] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.856780] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.857141] ================================================================== [ 20.847347] ================================================================== [ 20.847415] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 20.847464] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.847516] [ 20.847546] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.847633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.847671] Hardware name: linux,dummy-virt (DT) [ 20.847754] Call trace: [ 20.847779] show_stack+0x20/0x38 (C) [ 20.847831] dump_stack_lvl+0x8c/0xd0 [ 20.847877] print_report+0x118/0x608 [ 20.847925] kasan_report+0xdc/0x128 [ 20.847982] kasan_check_range+0x100/0x1a8 [ 20.848043] __kasan_check_write+0x20/0x30 [ 20.848149] copy_user_test_oob+0x434/0xec8 [ 20.848215] kunit_try_run_case+0x170/0x3f0 [ 20.848449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.848505] kthread+0x328/0x630 [ 20.848551] ret_from_fork+0x10/0x20 [ 20.848606] [ 20.848712] Allocated by task 285: [ 20.848829] kasan_save_stack+0x3c/0x68 [ 20.848870] kasan_save_track+0x20/0x40 [ 20.848972] kasan_save_alloc_info+0x40/0x58 [ 20.849021] __kasan_kmalloc+0xd4/0xd8 [ 20.849178] __kmalloc_noprof+0x190/0x4d0 [ 20.849218] kunit_kmalloc_array+0x34/0x88 [ 20.849255] copy_user_test_oob+0xac/0xec8 [ 20.849292] kunit_try_run_case+0x170/0x3f0 [ 20.849331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.849384] kthread+0x328/0x630 [ 20.849424] ret_from_fork+0x10/0x20 [ 20.849473] [ 20.849495] The buggy address belongs to the object at fff00000c1729a00 [ 20.849495] which belongs to the cache kmalloc-128 of size 128 [ 20.849554] The buggy address is located 0 bytes inside of [ 20.849554] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.849736] [ 20.849760] The buggy address belongs to the physical page: [ 20.849936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.850039] page_type: f5(slab) [ 20.850084] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.850165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.850215] page dumped because: kasan: bad access detected [ 20.850293] [ 20.850313] Memory state around the buggy address: [ 20.850346] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.850392] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850445] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.850495] ^ [ 20.850535] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850581] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850620] ================================================================== [ 20.835374] ================================================================== [ 20.835437] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 20.835489] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.835947] [ 20.836093] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.836245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.836273] Hardware name: linux,dummy-virt (DT) [ 20.836308] Call trace: [ 20.836332] show_stack+0x20/0x38 (C) [ 20.836934] dump_stack_lvl+0x8c/0xd0 [ 20.837234] print_report+0x118/0x608 [ 20.837340] kasan_report+0xdc/0x128 [ 20.837388] kasan_check_range+0x100/0x1a8 [ 20.837439] __kasan_check_write+0x20/0x30 [ 20.837489] copy_user_test_oob+0x35c/0xec8 [ 20.837538] kunit_try_run_case+0x170/0x3f0 [ 20.837585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.837638] kthread+0x328/0x630 [ 20.837687] ret_from_fork+0x10/0x20 [ 20.837985] [ 20.838024] Allocated by task 285: [ 20.838070] kasan_save_stack+0x3c/0x68 [ 20.838114] kasan_save_track+0x20/0x40 [ 20.838154] kasan_save_alloc_info+0x40/0x58 [ 20.838207] __kasan_kmalloc+0xd4/0xd8 [ 20.838247] __kmalloc_noprof+0x190/0x4d0 [ 20.838285] kunit_kmalloc_array+0x34/0x88 [ 20.838323] copy_user_test_oob+0xac/0xec8 [ 20.838753] kunit_try_run_case+0x170/0x3f0 [ 20.838943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.839058] kthread+0x328/0x630 [ 20.839108] ret_from_fork+0x10/0x20 [ 20.839484] [ 20.839560] The buggy address belongs to the object at fff00000c1729a00 [ 20.839560] which belongs to the cache kmalloc-128 of size 128 [ 20.839656] The buggy address is located 0 bytes inside of [ 20.839656] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.839728] [ 20.839751] The buggy address belongs to the physical page: [ 20.839785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.839979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.840290] page_type: f5(slab) [ 20.840402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.840531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.840589] page dumped because: kasan: bad access detected [ 20.840623] [ 20.840645] Memory state around the buggy address: [ 20.840690] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.840777] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.840923] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.841258] ^ [ 20.841431] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.841479] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.841556] ================================================================== [ 20.820317] ================================================================== [ 20.820371] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 20.820423] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.820475] [ 20.820507] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.821482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.821526] Hardware name: linux,dummy-virt (DT) [ 20.821785] Call trace: [ 20.821818] show_stack+0x20/0x38 (C) [ 20.821876] dump_stack_lvl+0x8c/0xd0 [ 20.821923] print_report+0x118/0x608 [ 20.821971] kasan_report+0xdc/0x128 [ 20.822018] kasan_check_range+0x100/0x1a8 [ 20.822343] __kasan_check_read+0x20/0x30 [ 20.822640] copy_user_test_oob+0x728/0xec8 [ 20.822763] kunit_try_run_case+0x170/0x3f0 [ 20.822814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.822880] kthread+0x328/0x630 [ 20.822928] ret_from_fork+0x10/0x20 [ 20.823384] [ 20.823510] Allocated by task 285: [ 20.823551] kasan_save_stack+0x3c/0x68 [ 20.823596] kasan_save_track+0x20/0x40 [ 20.823634] kasan_save_alloc_info+0x40/0x58 [ 20.823696] __kasan_kmalloc+0xd4/0xd8 [ 20.823887] __kmalloc_noprof+0x190/0x4d0 [ 20.823929] kunit_kmalloc_array+0x34/0x88 [ 20.823966] copy_user_test_oob+0xac/0xec8 [ 20.824007] kunit_try_run_case+0x170/0x3f0 [ 20.824188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.824284] kthread+0x328/0x630 [ 20.824366] ret_from_fork+0x10/0x20 [ 20.824404] [ 20.824476] The buggy address belongs to the object at fff00000c1729a00 [ 20.824476] which belongs to the cache kmalloc-128 of size 128 [ 20.824685] The buggy address is located 0 bytes inside of [ 20.824685] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.824750] [ 20.824772] The buggy address belongs to the physical page: [ 20.824812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.825078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.825455] page_type: f5(slab) [ 20.825594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.825694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.825884] page dumped because: kasan: bad access detected [ 20.826179] [ 20.826204] Memory state around the buggy address: [ 20.826300] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.826377] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.826423] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.826465] ^ [ 20.826704] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.826758] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.827149] ================================================================== [ 20.806813] ================================================================== [ 20.807142] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 20.807652] Write of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.807710] [ 20.807761] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.807985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.808015] Hardware name: linux,dummy-virt (DT) [ 20.808055] Call trace: [ 20.808088] show_stack+0x20/0x38 (C) [ 20.808143] dump_stack_lvl+0x8c/0xd0 [ 20.808208] print_report+0x118/0x608 [ 20.808255] kasan_report+0xdc/0x128 [ 20.808302] kasan_check_range+0x100/0x1a8 [ 20.808350] __kasan_check_write+0x20/0x30 [ 20.808400] copy_user_test_oob+0x234/0xec8 [ 20.808449] kunit_try_run_case+0x170/0x3f0 [ 20.808502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.808554] kthread+0x328/0x630 [ 20.808603] ret_from_fork+0x10/0x20 [ 20.808662] [ 20.808761] Allocated by task 285: [ 20.808838] kasan_save_stack+0x3c/0x68 [ 20.808968] kasan_save_track+0x20/0x40 [ 20.809015] kasan_save_alloc_info+0x40/0x58 [ 20.809150] __kasan_kmalloc+0xd4/0xd8 [ 20.809431] __kmalloc_noprof+0x190/0x4d0 [ 20.809675] kunit_kmalloc_array+0x34/0x88 [ 20.809723] copy_user_test_oob+0xac/0xec8 [ 20.809766] kunit_try_run_case+0x170/0x3f0 [ 20.809880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.810003] kthread+0x328/0x630 [ 20.810351] ret_from_fork+0x10/0x20 [ 20.810515] [ 20.810547] The buggy address belongs to the object at fff00000c1729a00 [ 20.810547] which belongs to the cache kmalloc-128 of size 128 [ 20.810752] The buggy address is located 0 bytes inside of [ 20.810752] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.810829] [ 20.810856] The buggy address belongs to the physical page: [ 20.810893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.810957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.811028] page_type: f5(slab) [ 20.811174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.811237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.811280] page dumped because: kasan: bad access detected [ 20.811316] [ 20.811339] Memory state around the buggy address: [ 20.811374] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.811419] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.811463] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.811920] ^ [ 20.812024] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.812226] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.812293] ================================================================== [ 20.842740] ================================================================== [ 20.842798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 20.842864] Read of size 121 at addr fff00000c1729a00 by task kunit_try_catch/285 [ 20.842926] [ 20.842979] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.843198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.843301] Hardware name: linux,dummy-virt (DT) [ 20.843333] Call trace: [ 20.843357] show_stack+0x20/0x38 (C) [ 20.843409] dump_stack_lvl+0x8c/0xd0 [ 20.843455] print_report+0x118/0x608 [ 20.844004] kasan_report+0xdc/0x128 [ 20.844060] kasan_check_range+0x100/0x1a8 [ 20.844110] __kasan_check_read+0x20/0x30 [ 20.844179] copy_user_test_oob+0x3c8/0xec8 [ 20.844237] kunit_try_run_case+0x170/0x3f0 [ 20.844286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.844339] kthread+0x328/0x630 [ 20.844385] ret_from_fork+0x10/0x20 [ 20.844521] [ 20.844622] Allocated by task 285: [ 20.844705] kasan_save_stack+0x3c/0x68 [ 20.844754] kasan_save_track+0x20/0x40 [ 20.844935] kasan_save_alloc_info+0x40/0x58 [ 20.844977] __kasan_kmalloc+0xd4/0xd8 [ 20.845020] __kmalloc_noprof+0x190/0x4d0 [ 20.845211] kunit_kmalloc_array+0x34/0x88 [ 20.845268] copy_user_test_oob+0xac/0xec8 [ 20.845320] kunit_try_run_case+0x170/0x3f0 [ 20.845468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.845512] kthread+0x328/0x630 [ 20.845550] ret_from_fork+0x10/0x20 [ 20.845593] [ 20.845710] The buggy address belongs to the object at fff00000c1729a00 [ 20.845710] which belongs to the cache kmalloc-128 of size 128 [ 20.846234] The buggy address is located 0 bytes inside of [ 20.846234] allocated 120-byte region [fff00000c1729a00, fff00000c1729a78) [ 20.846300] [ 20.846324] The buggy address belongs to the physical page: [ 20.846357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.846409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.846457] page_type: f5(slab) [ 20.846496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.846547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.846590] page dumped because: kasan: bad access detected [ 20.846637] [ 20.846657] Memory state around the buggy address: [ 20.846690] fff00000c1729900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.846739] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.846784] >fff00000c1729a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.846822] ^ [ 20.846862] fff00000c1729a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.847020] fff00000c1729b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.847084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
[ 20.755614] ================================================================== [ 20.756385] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.756475] Read of size 8 at addr fff00000c1729978 by task kunit_try_catch/281 [ 20.756670] [ 20.756708] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.756798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.756828] Hardware name: linux,dummy-virt (DT) [ 20.756870] Call trace: [ 20.756896] show_stack+0x20/0x38 (C) [ 20.757274] dump_stack_lvl+0x8c/0xd0 [ 20.757338] print_report+0x118/0x608 [ 20.757389] kasan_report+0xdc/0x128 [ 20.757802] __asan_report_load8_noabort+0x20/0x30 [ 20.757870] copy_to_kernel_nofault+0x204/0x250 [ 20.758062] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.758193] kunit_try_run_case+0x170/0x3f0 [ 20.758244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.758297] kthread+0x328/0x630 [ 20.758345] ret_from_fork+0x10/0x20 [ 20.758397] [ 20.758698] Allocated by task 281: [ 20.758783] kasan_save_stack+0x3c/0x68 [ 20.758895] kasan_save_track+0x20/0x40 [ 20.758935] kasan_save_alloc_info+0x40/0x58 [ 20.758977] __kasan_kmalloc+0xd4/0xd8 [ 20.759014] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.759057] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.759097] kunit_try_run_case+0x170/0x3f0 [ 20.759136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.759190] kthread+0x328/0x630 [ 20.759227] ret_from_fork+0x10/0x20 [ 20.759264] [ 20.759289] The buggy address belongs to the object at fff00000c1729900 [ 20.759289] which belongs to the cache kmalloc-128 of size 128 [ 20.759373] The buggy address is located 0 bytes to the right of [ 20.759373] allocated 120-byte region [fff00000c1729900, fff00000c1729978) [ 20.759549] [ 20.759622] The buggy address belongs to the physical page: [ 20.759719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.759896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.760138] page_type: f5(slab) [ 20.760203] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.760255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.760297] page dumped because: kasan: bad access detected [ 20.760332] [ 20.760354] Memory state around the buggy address: [ 20.760390] fff00000c1729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.761174] fff00000c1729880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761251] >fff00000c1729900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.761293] ^ [ 20.761711] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761815] fff00000c1729a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761857] ================================================================== [ 20.762782] ================================================================== [ 20.762874] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.763060] Write of size 8 at addr fff00000c1729978 by task kunit_try_catch/281 [ 20.763209] [ 20.763241] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.763328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.763357] Hardware name: linux,dummy-virt (DT) [ 20.763389] Call trace: [ 20.763423] show_stack+0x20/0x38 (C) [ 20.763474] dump_stack_lvl+0x8c/0xd0 [ 20.763780] print_report+0x118/0x608 [ 20.763973] kasan_report+0xdc/0x128 [ 20.764023] kasan_check_range+0x100/0x1a8 [ 20.764229] __kasan_check_write+0x20/0x30 [ 20.764418] copy_to_kernel_nofault+0x8c/0x250 [ 20.764739] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.764848] kunit_try_run_case+0x170/0x3f0 [ 20.764931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.764986] kthread+0x328/0x630 [ 20.765035] ret_from_fork+0x10/0x20 [ 20.765084] [ 20.765112] Allocated by task 281: [ 20.765262] kasan_save_stack+0x3c/0x68 [ 20.765304] kasan_save_track+0x20/0x40 [ 20.765503] kasan_save_alloc_info+0x40/0x58 [ 20.765695] __kasan_kmalloc+0xd4/0xd8 [ 20.765931] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.766060] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.766118] kunit_try_run_case+0x170/0x3f0 [ 20.766175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766220] kthread+0x328/0x630 [ 20.766269] ret_from_fork+0x10/0x20 [ 20.766308] [ 20.766423] The buggy address belongs to the object at fff00000c1729900 [ 20.766423] which belongs to the cache kmalloc-128 of size 128 [ 20.766688] The buggy address is located 0 bytes to the right of [ 20.766688] allocated 120-byte region [fff00000c1729900, fff00000c1729978) [ 20.766766] [ 20.766788] The buggy address belongs to the physical page: [ 20.766824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.766879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.767484] page_type: f5(slab) [ 20.767577] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.767631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.767847] page dumped because: kasan: bad access detected [ 20.768002] [ 20.768123] Memory state around the buggy address: [ 20.768176] fff00000c1729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.768283] fff00000c1729880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.768439] >fff00000c1729900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.768483] ^ [ 20.768526] fff00000c1729980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769055] fff00000c1729a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
[ 20.712723] ================================================================== [ 20.712762] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.712804] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 20.712854] [ 20.712881] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.712968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.712998] Hardware name: linux,dummy-virt (DT) [ 20.713031] Call trace: [ 20.713055] show_stack+0x20/0x38 (C) [ 20.713103] dump_stack_lvl+0x8c/0xd0 [ 20.713152] print_report+0x310/0x608 [ 20.713240] kasan_report+0xdc/0x128 [ 20.713288] __asan_report_load1_noabort+0x20/0x30 [ 20.713340] vmalloc_oob+0x51c/0x5d0 [ 20.713386] kunit_try_run_case+0x170/0x3f0 [ 20.713434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.713488] kthread+0x328/0x630 [ 20.713533] ret_from_fork+0x10/0x20 [ 20.713581] [ 20.713608] The buggy address belongs to the virtual mapping at [ 20.713608] [ffff8000800fe000, ffff800080100000) created by: [ 20.713608] vmalloc_oob+0x98/0x5d0 [ 20.713678] [ 20.713701] The buggy address belongs to the physical page: [ 20.713731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107676 [ 20.713814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.713906] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.713957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.713999] page dumped because: kasan: bad access detected [ 20.714062] [ 20.714082] Memory state around the buggy address: [ 20.714117] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.714172] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.714217] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.714279] ^ [ 20.714321] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.714382] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.714571] ================================================================== [ 20.710736] ================================================================== [ 20.710811] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.711091] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 20.711145] [ 20.711192] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.711282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.711310] Hardware name: linux,dummy-virt (DT) [ 20.711343] Call trace: [ 20.711367] show_stack+0x20/0x38 (C) [ 20.711421] dump_stack_lvl+0x8c/0xd0 [ 20.711470] print_report+0x310/0x608 [ 20.711520] kasan_report+0xdc/0x128 [ 20.711566] __asan_report_load1_noabort+0x20/0x30 [ 20.711618] vmalloc_oob+0x578/0x5d0 [ 20.711664] kunit_try_run_case+0x170/0x3f0 [ 20.711713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.711768] kthread+0x328/0x630 [ 20.711815] ret_from_fork+0x10/0x20 [ 20.711868] [ 20.711899] The buggy address belongs to the virtual mapping at [ 20.711899] [ffff8000800fe000, ffff800080100000) created by: [ 20.711899] vmalloc_oob+0x98/0x5d0 [ 20.711975] [ 20.711999] The buggy address belongs to the physical page: [ 20.712034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107676 [ 20.712087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.712154] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.712217] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.712260] page dumped because: kasan: bad access detected [ 20.712295] [ 20.712315] Memory state around the buggy address: [ 20.712349] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.712395] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.712439] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.712480] ^ [ 20.712519] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.712563] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.712604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[ 20.641031] ================================================================== [ 20.641272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.641428] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.641514] [ 20.641566] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.641669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.641772] Hardware name: linux,dummy-virt (DT) [ 20.641847] Call trace: [ 20.641872] show_stack+0x20/0x38 (C) [ 20.641923] dump_stack_lvl+0x8c/0xd0 [ 20.641973] print_report+0x118/0x608 [ 20.642129] kasan_report+0xdc/0x128 [ 20.642198] kasan_check_range+0x100/0x1a8 [ 20.642284] __kasan_check_write+0x20/0x30 [ 20.642373] kasan_atomics_helper+0x1414/0x4858 [ 20.642490] kasan_atomics+0x198/0x2e0 [ 20.642590] kunit_try_run_case+0x170/0x3f0 [ 20.642950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.643018] kthread+0x328/0x630 [ 20.643064] ret_from_fork+0x10/0x20 [ 20.643409] [ 20.643522] Allocated by task 265: [ 20.643822] kasan_save_stack+0x3c/0x68 [ 20.643925] kasan_save_track+0x20/0x40 [ 20.644057] kasan_save_alloc_info+0x40/0x58 [ 20.644136] __kasan_kmalloc+0xd4/0xd8 [ 20.644200] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.644241] kasan_atomics+0xb8/0x2e0 [ 20.644474] kunit_try_run_case+0x170/0x3f0 [ 20.644602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.644703] kthread+0x328/0x630 [ 20.644893] ret_from_fork+0x10/0x20 [ 20.645067] [ 20.645139] The buggy address belongs to the object at fff00000c7832f80 [ 20.645139] which belongs to the cache kmalloc-64 of size 64 [ 20.645309] The buggy address is located 0 bytes to the right of [ 20.645309] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.645404] [ 20.645426] The buggy address belongs to the physical page: [ 20.645679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.645821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.645957] page_type: f5(slab) [ 20.646103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.646312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.646367] page dumped because: kasan: bad access detected [ 20.646465] [ 20.646544] Memory state around the buggy address: [ 20.646579] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.646647] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.646691] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.646734] ^ [ 20.646768] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.646813] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.646852] ================================================================== [ 20.610772] ================================================================== [ 20.610852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.610926] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.610994] [ 20.611042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.611149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.611439] Hardware name: linux,dummy-virt (DT) [ 20.611472] Call trace: [ 20.611503] show_stack+0x20/0x38 (C) [ 20.611572] dump_stack_lvl+0x8c/0xd0 [ 20.611627] print_report+0x118/0x608 [ 20.611704] kasan_report+0xdc/0x128 [ 20.611786] kasan_check_range+0x100/0x1a8 [ 20.611867] __kasan_check_write+0x20/0x30 [ 20.611921] kasan_atomics_helper+0x1128/0x4858 [ 20.612013] kasan_atomics+0x198/0x2e0 [ 20.612103] kunit_try_run_case+0x170/0x3f0 [ 20.612180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.612281] kthread+0x328/0x630 [ 20.612330] ret_from_fork+0x10/0x20 [ 20.612379] [ 20.612401] Allocated by task 265: [ 20.612686] kasan_save_stack+0x3c/0x68 [ 20.612730] kasan_save_track+0x20/0x40 [ 20.612787] kasan_save_alloc_info+0x40/0x58 [ 20.612849] __kasan_kmalloc+0xd4/0xd8 [ 20.612896] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.612939] kasan_atomics+0xb8/0x2e0 [ 20.612975] kunit_try_run_case+0x170/0x3f0 [ 20.613020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.613075] kthread+0x328/0x630 [ 20.613112] ret_from_fork+0x10/0x20 [ 20.613151] [ 20.613180] The buggy address belongs to the object at fff00000c7832f80 [ 20.613180] which belongs to the cache kmalloc-64 of size 64 [ 20.613239] The buggy address is located 0 bytes to the right of [ 20.613239] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.613314] [ 20.613337] The buggy address belongs to the physical page: [ 20.613369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.613436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.613492] page_type: f5(slab) [ 20.613530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.613581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.613621] page dumped because: kasan: bad access detected [ 20.613656] [ 20.613676] Memory state around the buggy address: [ 20.613714] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.613788] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.613832] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.613872] ^ [ 20.613905] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.613948] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.613990] ================================================================== [ 20.614185] ================================================================== [ 20.614232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.614280] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.614331] [ 20.614361] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.614464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.614592] Hardware name: linux,dummy-virt (DT) [ 20.614628] Call trace: [ 20.614668] show_stack+0x20/0x38 (C) [ 20.614975] dump_stack_lvl+0x8c/0xd0 [ 20.615070] print_report+0x118/0x608 [ 20.615147] kasan_report+0xdc/0x128 [ 20.615279] kasan_check_range+0x100/0x1a8 [ 20.615347] __kasan_check_write+0x20/0x30 [ 20.615403] kasan_atomics_helper+0x1190/0x4858 [ 20.615517] kasan_atomics+0x198/0x2e0 [ 20.615594] kunit_try_run_case+0x170/0x3f0 [ 20.615659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.615720] kthread+0x328/0x630 [ 20.615808] ret_from_fork+0x10/0x20 [ 20.615885] [ 20.615925] Allocated by task 265: [ 20.615981] kasan_save_stack+0x3c/0x68 [ 20.616099] kasan_save_track+0x20/0x40 [ 20.616138] kasan_save_alloc_info+0x40/0x58 [ 20.616189] __kasan_kmalloc+0xd4/0xd8 [ 20.616227] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.616268] kasan_atomics+0xb8/0x2e0 [ 20.616306] kunit_try_run_case+0x170/0x3f0 [ 20.616345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.616641] kthread+0x328/0x630 [ 20.616687] ret_from_fork+0x10/0x20 [ 20.616775] [ 20.616858] The buggy address belongs to the object at fff00000c7832f80 [ 20.616858] which belongs to the cache kmalloc-64 of size 64 [ 20.616924] The buggy address is located 0 bytes to the right of [ 20.616924] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.617015] [ 20.617039] The buggy address belongs to the physical page: [ 20.617334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.617429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.617495] page_type: f5(slab) [ 20.617534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.617623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.617667] page dumped because: kasan: bad access detected [ 20.617717] [ 20.617813] Memory state around the buggy address: [ 20.617854] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.617898] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.617943] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.617982] ^ [ 20.618017] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.618457] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.618586] ================================================================== [ 20.546513] ================================================================== [ 20.546559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.546607] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.546658] [ 20.546687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.546783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.546813] Hardware name: linux,dummy-virt (DT) [ 20.546846] Call trace: [ 20.546869] show_stack+0x20/0x38 (C) [ 20.546919] dump_stack_lvl+0x8c/0xd0 [ 20.547670] print_report+0x118/0x608 [ 20.547783] kasan_report+0xdc/0x128 [ 20.547833] __asan_report_load4_noabort+0x20/0x30 [ 20.547887] kasan_atomics_helper+0x3e04/0x4858 [ 20.547937] kasan_atomics+0x198/0x2e0 [ 20.547984] kunit_try_run_case+0x170/0x3f0 [ 20.548034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548089] kthread+0x328/0x630 [ 20.548140] ret_from_fork+0x10/0x20 [ 20.548716] [ 20.549051] Allocated by task 265: [ 20.549227] kasan_save_stack+0x3c/0x68 [ 20.549330] kasan_save_track+0x20/0x40 [ 20.549371] kasan_save_alloc_info+0x40/0x58 [ 20.549413] __kasan_kmalloc+0xd4/0xd8 [ 20.549667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.549809] kasan_atomics+0xb8/0x2e0 [ 20.549846] kunit_try_run_case+0x170/0x3f0 [ 20.549886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.550220] kthread+0x328/0x630 [ 20.550267] ret_from_fork+0x10/0x20 [ 20.550339] [ 20.550361] The buggy address belongs to the object at fff00000c7832f80 [ 20.550361] which belongs to the cache kmalloc-64 of size 64 [ 20.550432] The buggy address is located 0 bytes to the right of [ 20.550432] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.550499] [ 20.550520] The buggy address belongs to the physical page: [ 20.550553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.550775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.551113] page_type: f5(slab) [ 20.551251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.551398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.551467] page dumped because: kasan: bad access detected [ 20.551590] [ 20.551650] Memory state around the buggy address: [ 20.551684] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.551754] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.551798] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.551839] ^ [ 20.551875] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.551919] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.552010] ================================================================== [ 20.601124] ================================================================== [ 20.601188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.601591] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.601684] [ 20.601835] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.602216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.602252] Hardware name: linux,dummy-virt (DT) [ 20.602394] Call trace: [ 20.602553] show_stack+0x20/0x38 (C) [ 20.602654] dump_stack_lvl+0x8c/0xd0 [ 20.602752] print_report+0x118/0x608 [ 20.602826] kasan_report+0xdc/0x128 [ 20.602875] kasan_check_range+0x100/0x1a8 [ 20.602927] __kasan_check_write+0x20/0x30 [ 20.603122] kasan_atomics_helper+0x1058/0x4858 [ 20.603265] kasan_atomics+0x198/0x2e0 [ 20.603317] kunit_try_run_case+0x170/0x3f0 [ 20.603372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.603654] kthread+0x328/0x630 [ 20.603762] ret_from_fork+0x10/0x20 [ 20.603812] [ 20.603834] Allocated by task 265: [ 20.603909] kasan_save_stack+0x3c/0x68 [ 20.604140] kasan_save_track+0x20/0x40 [ 20.604370] kasan_save_alloc_info+0x40/0x58 [ 20.604416] __kasan_kmalloc+0xd4/0xd8 [ 20.604455] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.604496] kasan_atomics+0xb8/0x2e0 [ 20.604534] kunit_try_run_case+0x170/0x3f0 [ 20.604574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.604620] kthread+0x328/0x630 [ 20.604659] ret_from_fork+0x10/0x20 [ 20.604736] [ 20.604808] The buggy address belongs to the object at fff00000c7832f80 [ 20.604808] which belongs to the cache kmalloc-64 of size 64 [ 20.604874] The buggy address is located 0 bytes to the right of [ 20.604874] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.604939] [ 20.605011] The buggy address belongs to the physical page: [ 20.605047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.605115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.605205] page_type: f5(slab) [ 20.605243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.605296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.605337] page dumped because: kasan: bad access detected [ 20.605371] [ 20.605391] Memory state around the buggy address: [ 20.605424] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.605468] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.605512] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.605551] ^ [ 20.605586] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.606033] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.606105] ================================================================== [ 20.606596] ================================================================== [ 20.606650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.606698] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.606774] [ 20.606819] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.607118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.607166] Hardware name: linux,dummy-virt (DT) [ 20.607199] Call trace: [ 20.607241] show_stack+0x20/0x38 (C) [ 20.607296] dump_stack_lvl+0x8c/0xd0 [ 20.607431] print_report+0x118/0x608 [ 20.607509] kasan_report+0xdc/0x128 [ 20.607575] kasan_check_range+0x100/0x1a8 [ 20.607645] __kasan_check_write+0x20/0x30 [ 20.607712] kasan_atomics_helper+0x10c0/0x4858 [ 20.607829] kasan_atomics+0x198/0x2e0 [ 20.607878] kunit_try_run_case+0x170/0x3f0 [ 20.607935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.607991] kthread+0x328/0x630 [ 20.608038] ret_from_fork+0x10/0x20 [ 20.608087] [ 20.608214] Allocated by task 265: [ 20.608249] kasan_save_stack+0x3c/0x68 [ 20.608356] kasan_save_track+0x20/0x40 [ 20.608403] kasan_save_alloc_info+0x40/0x58 [ 20.608445] __kasan_kmalloc+0xd4/0xd8 [ 20.608484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.608524] kasan_atomics+0xb8/0x2e0 [ 20.608563] kunit_try_run_case+0x170/0x3f0 [ 20.608612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.608658] kthread+0x328/0x630 [ 20.608774] ret_from_fork+0x10/0x20 [ 20.608814] [ 20.608876] The buggy address belongs to the object at fff00000c7832f80 [ 20.608876] which belongs to the cache kmalloc-64 of size 64 [ 20.608938] The buggy address is located 0 bytes to the right of [ 20.608938] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.609002] [ 20.609025] The buggy address belongs to the physical page: [ 20.609254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.609411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.609488] page_type: f5(slab) [ 20.609563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.609616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.609685] page dumped because: kasan: bad access detected [ 20.610023] [ 20.610093] Memory state around the buggy address: [ 20.610129] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.610184] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.610228] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.610268] ^ [ 20.610305] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.610368] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.610409] ================================================================== [ 20.690979] ================================================================== [ 20.691024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.691071] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.691121] [ 20.691167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.691252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.691281] Hardware name: linux,dummy-virt (DT) [ 20.691313] Call trace: [ 20.691336] show_stack+0x20/0x38 (C) [ 20.691384] dump_stack_lvl+0x8c/0xd0 [ 20.691617] print_report+0x118/0x608 [ 20.691698] kasan_report+0xdc/0x128 [ 20.691826] __asan_report_load8_noabort+0x20/0x30 [ 20.691879] kasan_atomics_helper+0x3e20/0x4858 [ 20.691956] kasan_atomics+0x198/0x2e0 [ 20.692124] kunit_try_run_case+0x170/0x3f0 [ 20.692184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.692259] kthread+0x328/0x630 [ 20.692334] ret_from_fork+0x10/0x20 [ 20.692401] [ 20.692457] Allocated by task 265: [ 20.692553] kasan_save_stack+0x3c/0x68 [ 20.692612] kasan_save_track+0x20/0x40 [ 20.692669] kasan_save_alloc_info+0x40/0x58 [ 20.692732] __kasan_kmalloc+0xd4/0xd8 [ 20.692844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.692891] kasan_atomics+0xb8/0x2e0 [ 20.692948] kunit_try_run_case+0x170/0x3f0 [ 20.692987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.693057] kthread+0x328/0x630 [ 20.693141] ret_from_fork+0x10/0x20 [ 20.693247] [ 20.693270] The buggy address belongs to the object at fff00000c7832f80 [ 20.693270] which belongs to the cache kmalloc-64 of size 64 [ 20.693330] The buggy address is located 0 bytes to the right of [ 20.693330] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.693525] [ 20.693614] The buggy address belongs to the physical page: [ 20.693685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.693783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.693902] page_type: f5(slab) [ 20.694039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.694123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.694218] page dumped because: kasan: bad access detected [ 20.694260] [ 20.694280] Memory state around the buggy address: [ 20.694328] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.694392] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.694437] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.694479] ^ [ 20.694901] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.694946] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.694986] ================================================================== [ 20.558770] ================================================================== [ 20.558837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.558889] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.558942] [ 20.558972] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.559058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.559088] Hardware name: linux,dummy-virt (DT) [ 20.559122] Call trace: [ 20.559146] show_stack+0x20/0x38 (C) [ 20.559211] dump_stack_lvl+0x8c/0xd0 [ 20.559285] print_report+0x118/0x608 [ 20.559338] kasan_report+0xdc/0x128 [ 20.559387] __asan_report_load8_noabort+0x20/0x30 [ 20.559749] kasan_atomics_helper+0x3f58/0x4858 [ 20.559813] kasan_atomics+0x198/0x2e0 [ 20.560031] kunit_try_run_case+0x170/0x3f0 [ 20.560278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.560852] kthread+0x328/0x630 [ 20.560914] ret_from_fork+0x10/0x20 [ 20.561098] [ 20.561121] Allocated by task 265: [ 20.561151] kasan_save_stack+0x3c/0x68 [ 20.561211] kasan_save_track+0x20/0x40 [ 20.561406] kasan_save_alloc_info+0x40/0x58 [ 20.561606] __kasan_kmalloc+0xd4/0xd8 [ 20.561651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.561721] kasan_atomics+0xb8/0x2e0 [ 20.561797] kunit_try_run_case+0x170/0x3f0 [ 20.561838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.561882] kthread+0x328/0x630 [ 20.561920] ret_from_fork+0x10/0x20 [ 20.561958] [ 20.561981] The buggy address belongs to the object at fff00000c7832f80 [ 20.561981] which belongs to the cache kmalloc-64 of size 64 [ 20.562269] The buggy address is located 0 bytes to the right of [ 20.562269] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.562566] [ 20.562890] The buggy address belongs to the physical page: [ 20.562929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.562984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.563034] page_type: f5(slab) [ 20.563092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.563203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.563566] page dumped because: kasan: bad access detected [ 20.563604] [ 20.563626] Memory state around the buggy address: [ 20.563667] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.563841] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.563886] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.563926] ^ [ 20.564038] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.564167] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.564226] ================================================================== [ 20.665859] ================================================================== [ 20.665903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.665952] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.666003] [ 20.666034] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.666118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.666146] Hardware name: linux,dummy-virt (DT) [ 20.666193] Call trace: [ 20.666216] show_stack+0x20/0x38 (C) [ 20.666266] dump_stack_lvl+0x8c/0xd0 [ 20.666314] print_report+0x118/0x608 [ 20.666376] kasan_report+0xdc/0x128 [ 20.666472] __asan_report_load8_noabort+0x20/0x30 [ 20.666525] kasan_atomics_helper+0x3db0/0x4858 [ 20.666579] kasan_atomics+0x198/0x2e0 [ 20.666702] kunit_try_run_case+0x170/0x3f0 [ 20.666760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.666846] kthread+0x328/0x630 [ 20.666894] ret_from_fork+0x10/0x20 [ 20.667032] [ 20.667062] Allocated by task 265: [ 20.667094] kasan_save_stack+0x3c/0x68 [ 20.667136] kasan_save_track+0x20/0x40 [ 20.667209] kasan_save_alloc_info+0x40/0x58 [ 20.667356] __kasan_kmalloc+0xd4/0xd8 [ 20.667528] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.667628] kasan_atomics+0xb8/0x2e0 [ 20.667724] kunit_try_run_case+0x170/0x3f0 [ 20.667790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.667866] kthread+0x328/0x630 [ 20.667929] ret_from_fork+0x10/0x20 [ 20.667995] [ 20.668035] The buggy address belongs to the object at fff00000c7832f80 [ 20.668035] which belongs to the cache kmalloc-64 of size 64 [ 20.668100] The buggy address is located 0 bytes to the right of [ 20.668100] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.668176] [ 20.668198] The buggy address belongs to the physical page: [ 20.668230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.668284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.668330] page_type: f5(slab) [ 20.668368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.668419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.668479] page dumped because: kasan: bad access detected [ 20.668558] [ 20.668598] Memory state around the buggy address: [ 20.668647] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.668693] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.668745] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.668786] ^ [ 20.668820] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.668865] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.669109] ================================================================== [ 20.492101] ================================================================== [ 20.492169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.492222] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.492274] [ 20.492621] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.492793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.492825] Hardware name: linux,dummy-virt (DT) [ 20.492857] Call trace: [ 20.492885] show_stack+0x20/0x38 (C) [ 20.493318] dump_stack_lvl+0x8c/0xd0 [ 20.493370] print_report+0x118/0x608 [ 20.493419] kasan_report+0xdc/0x128 [ 20.493973] kasan_check_range+0x100/0x1a8 [ 20.494043] __kasan_check_write+0x20/0x30 [ 20.494243] kasan_atomics_helper+0xad4/0x4858 [ 20.494330] kasan_atomics+0x198/0x2e0 [ 20.494473] kunit_try_run_case+0x170/0x3f0 [ 20.494523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.494801] kthread+0x328/0x630 [ 20.495253] ret_from_fork+0x10/0x20 [ 20.495342] [ 20.495402] Allocated by task 265: [ 20.495431] kasan_save_stack+0x3c/0x68 [ 20.495507] kasan_save_track+0x20/0x40 [ 20.495547] kasan_save_alloc_info+0x40/0x58 [ 20.495589] __kasan_kmalloc+0xd4/0xd8 [ 20.495649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.496004] kasan_atomics+0xb8/0x2e0 [ 20.496042] kunit_try_run_case+0x170/0x3f0 [ 20.496099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.497166] [ 20.497225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.497278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.497597] page_type: f5(slab) [ 20.497743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.498332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.498394] page dumped because: kasan: bad access detected [ 20.498452] [ 20.498475] Memory state around the buggy address: [ 20.498510] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.498554] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.498633] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.498719] ^ [ 20.498768] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.498990] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.499041] ================================================================== [ 20.624488] ================================================================== [ 20.624538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.624586] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.624636] [ 20.624667] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.624752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.624781] Hardware name: linux,dummy-virt (DT) [ 20.624812] Call trace: [ 20.624836] show_stack+0x20/0x38 (C) [ 20.624884] dump_stack_lvl+0x8c/0xd0 [ 20.624964] print_report+0x118/0x608 [ 20.625026] kasan_report+0xdc/0x128 [ 20.625091] kasan_check_range+0x100/0x1a8 [ 20.625142] __kasan_check_write+0x20/0x30 [ 20.625240] kasan_atomics_helper+0x126c/0x4858 [ 20.625408] kasan_atomics+0x198/0x2e0 [ 20.625562] kunit_try_run_case+0x170/0x3f0 [ 20.625631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.625704] kthread+0x328/0x630 [ 20.625943] ret_from_fork+0x10/0x20 [ 20.626101] [ 20.626224] Allocated by task 265: [ 20.626325] kasan_save_stack+0x3c/0x68 [ 20.626412] kasan_save_track+0x20/0x40 [ 20.626533] kasan_save_alloc_info+0x40/0x58 [ 20.626578] __kasan_kmalloc+0xd4/0xd8 [ 20.626640] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.626683] kasan_atomics+0xb8/0x2e0 [ 20.626721] kunit_try_run_case+0x170/0x3f0 [ 20.627043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.627166] kthread+0x328/0x630 [ 20.627224] ret_from_fork+0x10/0x20 [ 20.627263] [ 20.627293] The buggy address belongs to the object at fff00000c7832f80 [ 20.627293] which belongs to the cache kmalloc-64 of size 64 [ 20.627353] The buggy address is located 0 bytes to the right of [ 20.627353] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.627435] [ 20.627459] The buggy address belongs to the physical page: [ 20.627491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.627554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.627607] page_type: f5(slab) [ 20.627650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.627702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.627744] page dumped because: kasan: bad access detected [ 20.627794] [ 20.627815] Memory state around the buggy address: [ 20.627848] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.627898] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.627941] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.627995] ^ [ 20.628042] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.628108] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.628149] ================================================================== [ 20.674501] ================================================================== [ 20.674550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.674599] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.674649] [ 20.674681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.674770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.674801] Hardware name: linux,dummy-virt (DT) [ 20.674832] Call trace: [ 20.674857] show_stack+0x20/0x38 (C) [ 20.674905] dump_stack_lvl+0x8c/0xd0 [ 20.674954] print_report+0x118/0x608 [ 20.675001] kasan_report+0xdc/0x128 [ 20.675049] __asan_report_load8_noabort+0x20/0x30 [ 20.675102] kasan_atomics_helper+0x3df4/0x4858 [ 20.675150] kasan_atomics+0x198/0x2e0 [ 20.675223] kunit_try_run_case+0x170/0x3f0 [ 20.675294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.675350] kthread+0x328/0x630 [ 20.675414] ret_from_fork+0x10/0x20 [ 20.675465] [ 20.675495] Allocated by task 265: [ 20.675526] kasan_save_stack+0x3c/0x68 [ 20.675569] kasan_save_track+0x20/0x40 [ 20.675609] kasan_save_alloc_info+0x40/0x58 [ 20.675650] __kasan_kmalloc+0xd4/0xd8 [ 20.675687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.675728] kasan_atomics+0xb8/0x2e0 [ 20.675764] kunit_try_run_case+0x170/0x3f0 [ 20.675812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.675858] kthread+0x328/0x630 [ 20.675894] ret_from_fork+0x10/0x20 [ 20.675933] [ 20.675962] The buggy address belongs to the object at fff00000c7832f80 [ 20.675962] which belongs to the cache kmalloc-64 of size 64 [ 20.676021] The buggy address is located 0 bytes to the right of [ 20.676021] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.676096] [ 20.676119] The buggy address belongs to the physical page: [ 20.676150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.676212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.676260] page_type: f5(slab) [ 20.676297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.676349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.676404] page dumped because: kasan: bad access detected [ 20.676438] [ 20.676458] Memory state around the buggy address: [ 20.676490] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.676534] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.676579] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.676618] ^ [ 20.676656] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.676700] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.676742] ================================================================== [ 20.686646] ================================================================== [ 20.686696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.686912] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.686970] [ 20.687002] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.687088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.687117] Hardware name: linux,dummy-virt (DT) [ 20.687148] Call trace: [ 20.687186] show_stack+0x20/0x38 (C) [ 20.687426] dump_stack_lvl+0x8c/0xd0 [ 20.687505] print_report+0x118/0x608 [ 20.687602] kasan_report+0xdc/0x128 [ 20.687684] kasan_check_range+0x100/0x1a8 [ 20.687751] __kasan_check_write+0x20/0x30 [ 20.687828] kasan_atomics_helper+0x175c/0x4858 [ 20.687879] kasan_atomics+0x198/0x2e0 [ 20.688051] kunit_try_run_case+0x170/0x3f0 [ 20.688101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.688199] kthread+0x328/0x630 [ 20.688276] ret_from_fork+0x10/0x20 [ 20.688342] [ 20.688372] Allocated by task 265: [ 20.688430] kasan_save_stack+0x3c/0x68 [ 20.688548] kasan_save_track+0x20/0x40 [ 20.688606] kasan_save_alloc_info+0x40/0x58 [ 20.688675] __kasan_kmalloc+0xd4/0xd8 [ 20.688714] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.688837] kasan_atomics+0xb8/0x2e0 [ 20.688964] kunit_try_run_case+0x170/0x3f0 [ 20.689005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.689209] kthread+0x328/0x630 [ 20.689252] ret_from_fork+0x10/0x20 [ 20.689290] [ 20.689312] The buggy address belongs to the object at fff00000c7832f80 [ 20.689312] which belongs to the cache kmalloc-64 of size 64 [ 20.689372] The buggy address is located 0 bytes to the right of [ 20.689372] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.689470] [ 20.689541] The buggy address belongs to the physical page: [ 20.689693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.689762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.689862] page_type: f5(slab) [ 20.689914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.690176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.690219] page dumped because: kasan: bad access detected [ 20.690254] [ 20.690274] Memory state around the buggy address: [ 20.690308] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.690378] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.690468] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.690540] ^ [ 20.690592] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.690671] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.690720] ================================================================== [ 20.457649] ================================================================== [ 20.458124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.458327] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.458401] [ 20.458445] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.458781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.458934] Hardware name: linux,dummy-virt (DT) [ 20.459117] Call trace: [ 20.464568] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.469507] __kasan_kmalloc+0xd4/0xd8 [ 20.469545] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.469586] kasan_atomics+0xb8/0x2e0 [ 20.469624] kunit_try_run_case+0x170/0x3f0 [ 20.469663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.469709] kthread+0x328/0x630 [ 20.469747] ret_from_fork+0x10/0x20 [ 20.469785] [ 20.469835] The buggy address belongs to the object at fff00000c7832f80 [ 20.469835] which belongs to the cache kmalloc-64 of size 64 [ 20.469899] The buggy address is located 0 bytes to the right of [ 20.469899] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.469964] [ 20.469986] The buggy address belongs to the physical page: [ 20.470019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.470072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.470216] page_type: f5(slab) [ 20.470282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.470405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.470493] page dumped because: kasan: bad access detected [ 20.470959] [ 20.471009] Memory state around the buggy address: [ 20.471063] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.471142] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.471195] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.471263] ^ [ 20.471299] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.471344] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.471385] ================================================================== [ 20.647040] ================================================================== [ 20.647086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.647132] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.647199] [ 20.647229] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.647317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.647344] Hardware name: linux,dummy-virt (DT) [ 20.647377] Call trace: [ 20.647401] show_stack+0x20/0x38 (C) [ 20.647451] dump_stack_lvl+0x8c/0xd0 [ 20.647497] print_report+0x118/0x608 [ 20.647545] kasan_report+0xdc/0x128 [ 20.647592] kasan_check_range+0x100/0x1a8 [ 20.647640] __kasan_check_write+0x20/0x30 [ 20.647690] kasan_atomics_helper+0x147c/0x4858 [ 20.647752] kasan_atomics+0x198/0x2e0 [ 20.647809] kunit_try_run_case+0x170/0x3f0 [ 20.647858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.647913] kthread+0x328/0x630 [ 20.647958] ret_from_fork+0x10/0x20 [ 20.648015] [ 20.648038] Allocated by task 265: [ 20.648076] kasan_save_stack+0x3c/0x68 [ 20.648117] kasan_save_track+0x20/0x40 [ 20.648166] kasan_save_alloc_info+0x40/0x58 [ 20.648209] __kasan_kmalloc+0xd4/0xd8 [ 20.648248] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.648290] kasan_atomics+0xb8/0x2e0 [ 20.648328] kunit_try_run_case+0x170/0x3f0 [ 20.648367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.648413] kthread+0x328/0x630 [ 20.648451] ret_from_fork+0x10/0x20 [ 20.648490] [ 20.648511] The buggy address belongs to the object at fff00000c7832f80 [ 20.648511] which belongs to the cache kmalloc-64 of size 64 [ 20.648569] The buggy address is located 0 bytes to the right of [ 20.648569] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.648634] [ 20.648655] The buggy address belongs to the physical page: [ 20.648698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.648758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.648806] page_type: f5(slab) [ 20.648844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.648893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.648936] page dumped because: kasan: bad access detected [ 20.648970] [ 20.648991] Memory state around the buggy address: [ 20.649023] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.649068] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.649120] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.649176] ^ [ 20.649209] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.649253] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.649292] ================================================================== [ 20.631711] ================================================================== [ 20.631759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.631860] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.631959] [ 20.632024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.632169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.632235] Hardware name: linux,dummy-virt (DT) [ 20.632285] Call trace: [ 20.632311] show_stack+0x20/0x38 (C) [ 20.632545] dump_stack_lvl+0x8c/0xd0 [ 20.632623] print_report+0x118/0x608 [ 20.632689] kasan_report+0xdc/0x128 [ 20.632765] kasan_check_range+0x100/0x1a8 [ 20.632832] __kasan_check_write+0x20/0x30 [ 20.632882] kasan_atomics_helper+0x1384/0x4858 [ 20.632970] kasan_atomics+0x198/0x2e0 [ 20.633090] kunit_try_run_case+0x170/0x3f0 [ 20.633140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.633221] kthread+0x328/0x630 [ 20.633479] ret_from_fork+0x10/0x20 [ 20.633529] [ 20.633571] Allocated by task 265: [ 20.633629] kasan_save_stack+0x3c/0x68 [ 20.633688] kasan_save_track+0x20/0x40 [ 20.633768] kasan_save_alloc_info+0x40/0x58 [ 20.633846] __kasan_kmalloc+0xd4/0xd8 [ 20.633916] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.634085] kasan_atomics+0xb8/0x2e0 [ 20.634294] kunit_try_run_case+0x170/0x3f0 [ 20.634441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.634532] kthread+0x328/0x630 [ 20.634590] ret_from_fork+0x10/0x20 [ 20.634638] [ 20.634661] The buggy address belongs to the object at fff00000c7832f80 [ 20.634661] which belongs to the cache kmalloc-64 of size 64 [ 20.634719] The buggy address is located 0 bytes to the right of [ 20.634719] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.634790] [ 20.634812] The buggy address belongs to the physical page: [ 20.634846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.634897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.635223] page_type: f5(slab) [ 20.635299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.635437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.635552] page dumped because: kasan: bad access detected [ 20.635600] [ 20.635641] Memory state around the buggy address: [ 20.635737] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.635782] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.635825] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.635998] ^ [ 20.636038] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.636171] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.636273] ================================================================== [ 20.484676] ================================================================== [ 20.484842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.484906] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.485067] [ 20.485193] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.485722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.485841] Hardware name: linux,dummy-virt (DT) [ 20.485875] Call trace: [ 20.485900] show_stack+0x20/0x38 (C) [ 20.485955] dump_stack_lvl+0x8c/0xd0 [ 20.486007] print_report+0x118/0x608 [ 20.486056] kasan_report+0xdc/0x128 [ 20.486103] kasan_check_range+0x100/0x1a8 [ 20.486151] __kasan_check_write+0x20/0x30 [ 20.486225] kasan_atomics_helper+0xa6c/0x4858 [ 20.486275] kasan_atomics+0x198/0x2e0 [ 20.486505] kunit_try_run_case+0x170/0x3f0 [ 20.486789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.487436] kthread+0x328/0x630 [ 20.487770] ret_from_fork+0x10/0x20 [ 20.487822] [ 20.487844] Allocated by task 265: [ 20.487878] kasan_save_stack+0x3c/0x68 [ 20.488338] kasan_save_track+0x20/0x40 [ 20.488418] kasan_save_alloc_info+0x40/0x58 [ 20.488524] __kasan_kmalloc+0xd4/0xd8 [ 20.488596] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.488666] kasan_atomics+0xb8/0x2e0 [ 20.488846] kunit_try_run_case+0x170/0x3f0 [ 20.488887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488932] kthread+0x328/0x630 [ 20.488969] ret_from_fork+0x10/0x20 [ 20.489008] [ 20.489031] The buggy address belongs to the object at fff00000c7832f80 [ 20.489031] which belongs to the cache kmalloc-64 of size 64 [ 20.489102] The buggy address is located 0 bytes to the right of [ 20.489102] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.489178] [ 20.489200] The buggy address belongs to the physical page: [ 20.489233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.489309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.489360] page_type: f5(slab) [ 20.489397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.489450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.490440] page dumped because: kasan: bad access detected [ 20.490541] [ 20.490581] Memory state around the buggy address: [ 20.490635] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.490825] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.490992] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.491044] ^ [ 20.491083] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.491253] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.491295] ================================================================== [ 20.636696] ================================================================== [ 20.636742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.636790] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.636884] [ 20.637013] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.637109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.637310] Hardware name: linux,dummy-virt (DT) [ 20.637354] Call trace: [ 20.637394] show_stack+0x20/0x38 (C) [ 20.637467] dump_stack_lvl+0x8c/0xd0 [ 20.637560] print_report+0x118/0x608 [ 20.637627] kasan_report+0xdc/0x128 [ 20.637719] __asan_report_load8_noabort+0x20/0x30 [ 20.637780] kasan_atomics_helper+0x3f04/0x4858 [ 20.637831] kasan_atomics+0x198/0x2e0 [ 20.637878] kunit_try_run_case+0x170/0x3f0 [ 20.637928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.638004] kthread+0x328/0x630 [ 20.638053] ret_from_fork+0x10/0x20 [ 20.638103] [ 20.638142] Allocated by task 265: [ 20.638304] kasan_save_stack+0x3c/0x68 [ 20.638410] kasan_save_track+0x20/0x40 [ 20.638744] kasan_save_alloc_info+0x40/0x58 [ 20.638817] __kasan_kmalloc+0xd4/0xd8 [ 20.638879] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.638920] kasan_atomics+0xb8/0x2e0 [ 20.638958] kunit_try_run_case+0x170/0x3f0 [ 20.638997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.639042] kthread+0x328/0x630 [ 20.639252] ret_from_fork+0x10/0x20 [ 20.639342] [ 20.639489] The buggy address belongs to the object at fff00000c7832f80 [ 20.639489] which belongs to the cache kmalloc-64 of size 64 [ 20.639619] The buggy address is located 0 bytes to the right of [ 20.639619] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.639965] [ 20.640076] The buggy address belongs to the physical page: [ 20.640167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.640222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.640269] page_type: f5(slab) [ 20.640317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.640369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.640411] page dumped because: kasan: bad access detected [ 20.640444] [ 20.640472] Memory state around the buggy address: [ 20.640506] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.640558] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.640602] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.640651] ^ [ 20.640701] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.640756] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.640806] ================================================================== [ 20.534855] ================================================================== [ 20.534918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.535058] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.535168] [ 20.535201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.535288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.535318] Hardware name: linux,dummy-virt (DT) [ 20.535350] Call trace: [ 20.535375] show_stack+0x20/0x38 (C) [ 20.535427] dump_stack_lvl+0x8c/0xd0 [ 20.535480] print_report+0x118/0x608 [ 20.535609] kasan_report+0xdc/0x128 [ 20.535688] __asan_report_load4_noabort+0x20/0x30 [ 20.535948] kasan_atomics_helper+0x3dd8/0x4858 [ 20.536472] kasan_atomics+0x198/0x2e0 [ 20.536670] kunit_try_run_case+0x170/0x3f0 [ 20.536720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.537353] kthread+0x328/0x630 [ 20.537572] ret_from_fork+0x10/0x20 [ 20.537637] [ 20.537781] Allocated by task 265: [ 20.537816] kasan_save_stack+0x3c/0x68 [ 20.537858] kasan_save_track+0x20/0x40 [ 20.537898] kasan_save_alloc_info+0x40/0x58 [ 20.537941] __kasan_kmalloc+0xd4/0xd8 [ 20.537980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.538020] kasan_atomics+0xb8/0x2e0 [ 20.538258] kunit_try_run_case+0x170/0x3f0 [ 20.538300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.538343] kthread+0x328/0x630 [ 20.539312] ret_from_fork+0x10/0x20 [ 20.539372] [ 20.539395] The buggy address belongs to the object at fff00000c7832f80 [ 20.539395] which belongs to the cache kmalloc-64 of size 64 [ 20.539953] The buggy address is located 0 bytes to the right of [ 20.539953] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.540043] [ 20.540065] The buggy address belongs to the physical page: [ 20.540099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.540151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.540414] page_type: f5(slab) [ 20.540456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.540766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.540820] page dumped because: kasan: bad access detected [ 20.540866] [ 20.540888] Memory state around the buggy address: [ 20.540920] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.541082] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.541181] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.541222] ^ [ 20.541336] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.541452] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.541493] ================================================================== [ 20.661322] ================================================================== [ 20.661369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.661427] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.661478] [ 20.661508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.661594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.661621] Hardware name: linux,dummy-virt (DT) [ 20.661653] Call trace: [ 20.661677] show_stack+0x20/0x38 (C) [ 20.661727] dump_stack_lvl+0x8c/0xd0 [ 20.661812] print_report+0x118/0x608 [ 20.661861] kasan_report+0xdc/0x128 [ 20.661908] kasan_check_range+0x100/0x1a8 [ 20.661956] __kasan_check_write+0x20/0x30 [ 20.662007] kasan_atomics_helper+0x15b4/0x4858 [ 20.662057] kasan_atomics+0x198/0x2e0 [ 20.662103] kunit_try_run_case+0x170/0x3f0 [ 20.662200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.662430] kthread+0x328/0x630 [ 20.662585] ret_from_fork+0x10/0x20 [ 20.662776] [ 20.662865] Allocated by task 265: [ 20.662897] kasan_save_stack+0x3c/0x68 [ 20.662938] kasan_save_track+0x20/0x40 [ 20.662978] kasan_save_alloc_info+0x40/0x58 [ 20.663020] __kasan_kmalloc+0xd4/0xd8 [ 20.663059] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.663116] kasan_atomics+0xb8/0x2e0 [ 20.663164] kunit_try_run_case+0x170/0x3f0 [ 20.663203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.663373] kthread+0x328/0x630 [ 20.663532] ret_from_fork+0x10/0x20 [ 20.663689] [ 20.663809] The buggy address belongs to the object at fff00000c7832f80 [ 20.663809] which belongs to the cache kmalloc-64 of size 64 [ 20.663886] The buggy address is located 0 bytes to the right of [ 20.663886] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.664179] [ 20.664292] The buggy address belongs to the physical page: [ 20.664413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.664524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.664571] page_type: f5(slab) [ 20.664611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.664952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.665082] page dumped because: kasan: bad access detected [ 20.665396] [ 20.665418] Memory state around the buggy address: [ 20.665452] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.665498] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.665542] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.665581] ^ [ 20.665614] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.665659] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.665699] ================================================================== [ 20.681340] ================================================================== [ 20.681406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.681494] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.681546] [ 20.681599] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.681722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.681751] Hardware name: linux,dummy-virt (DT) [ 20.681831] Call trace: [ 20.681966] show_stack+0x20/0x38 (C) [ 20.682085] dump_stack_lvl+0x8c/0xd0 [ 20.682259] print_report+0x118/0x608 [ 20.682326] kasan_report+0xdc/0x128 [ 20.682372] __asan_report_load8_noabort+0x20/0x30 [ 20.682587] kasan_atomics_helper+0x3e10/0x4858 [ 20.682638] kasan_atomics+0x198/0x2e0 [ 20.682684] kunit_try_run_case+0x170/0x3f0 [ 20.682739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.682794] kthread+0x328/0x630 [ 20.682841] ret_from_fork+0x10/0x20 [ 20.682983] [ 20.683146] Allocated by task 265: [ 20.683237] kasan_save_stack+0x3c/0x68 [ 20.683301] kasan_save_track+0x20/0x40 [ 20.683372] kasan_save_alloc_info+0x40/0x58 [ 20.683763] __kasan_kmalloc+0xd4/0xd8 [ 20.683827] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.683969] kasan_atomics+0xb8/0x2e0 [ 20.684087] kunit_try_run_case+0x170/0x3f0 [ 20.684217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684271] kthread+0x328/0x630 [ 20.684310] ret_from_fork+0x10/0x20 [ 20.684391] [ 20.684556] The buggy address belongs to the object at fff00000c7832f80 [ 20.684556] which belongs to the cache kmalloc-64 of size 64 [ 20.684617] The buggy address is located 0 bytes to the right of [ 20.684617] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.684722] [ 20.684857] The buggy address belongs to the physical page: [ 20.684917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.685145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.685208] page_type: f5(slab) [ 20.685246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.685342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.685466] page dumped because: kasan: bad access detected [ 20.685539] [ 20.685668] Memory state around the buggy address: [ 20.685751] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.685796] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.685840] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.685879] ^ [ 20.685914] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.685958] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.686149] ================================================================== [ 20.695344] ================================================================== [ 20.695450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.695533] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.695585] [ 20.695645] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.695840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.695870] Hardware name: linux,dummy-virt (DT) [ 20.695903] Call trace: [ 20.695926] show_stack+0x20/0x38 (C) [ 20.695977] dump_stack_lvl+0x8c/0xd0 [ 20.696032] print_report+0x118/0x608 [ 20.696110] kasan_report+0xdc/0x128 [ 20.696169] kasan_check_range+0x100/0x1a8 [ 20.696219] __kasan_check_write+0x20/0x30 [ 20.696287] kasan_atomics_helper+0x17ec/0x4858 [ 20.696355] kasan_atomics+0x198/0x2e0 [ 20.696447] kunit_try_run_case+0x170/0x3f0 [ 20.696544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.696653] kthread+0x328/0x630 [ 20.696739] ret_from_fork+0x10/0x20 [ 20.696799] [ 20.696841] Allocated by task 265: [ 20.696937] kasan_save_stack+0x3c/0x68 [ 20.697005] kasan_save_track+0x20/0x40 [ 20.697047] kasan_save_alloc_info+0x40/0x58 [ 20.697089] __kasan_kmalloc+0xd4/0xd8 [ 20.697128] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.697327] kasan_atomics+0xb8/0x2e0 [ 20.697368] kunit_try_run_case+0x170/0x3f0 [ 20.697505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.697582] kthread+0x328/0x630 [ 20.697649] ret_from_fork+0x10/0x20 [ 20.697704] [ 20.697727] The buggy address belongs to the object at fff00000c7832f80 [ 20.697727] which belongs to the cache kmalloc-64 of size 64 [ 20.697990] The buggy address is located 0 bytes to the right of [ 20.697990] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.698186] [ 20.698222] The buggy address belongs to the physical page: [ 20.698269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.698322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.698370] page_type: f5(slab) [ 20.698635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.698692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.698739] page dumped because: kasan: bad access detected [ 20.698772] [ 20.698792] Memory state around the buggy address: [ 20.698826] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.698914] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.699023] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.699177] ^ [ 20.699269] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.699354] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.699446] ================================================================== [ 20.552618] ================================================================== [ 20.552979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.553259] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.553342] [ 20.553374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.553467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.553613] Hardware name: linux,dummy-virt (DT) [ 20.553781] Call trace: [ 20.553807] show_stack+0x20/0x38 (C) [ 20.553860] dump_stack_lvl+0x8c/0xd0 [ 20.554086] print_report+0x118/0x608 [ 20.554144] kasan_report+0xdc/0x128 [ 20.554203] kasan_check_range+0x100/0x1a8 [ 20.554255] __kasan_check_read+0x20/0x30 [ 20.554308] kasan_atomics_helper+0xdd4/0x4858 [ 20.554521] kasan_atomics+0x198/0x2e0 [ 20.554735] kunit_try_run_case+0x170/0x3f0 [ 20.554850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.554965] kthread+0x328/0x630 [ 20.555140] ret_from_fork+0x10/0x20 [ 20.555217] [ 20.555238] Allocated by task 265: [ 20.555269] kasan_save_stack+0x3c/0x68 [ 20.555364] kasan_save_track+0x20/0x40 [ 20.555553] kasan_save_alloc_info+0x40/0x58 [ 20.555734] __kasan_kmalloc+0xd4/0xd8 [ 20.555774] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.555815] kasan_atomics+0xb8/0x2e0 [ 20.555851] kunit_try_run_case+0x170/0x3f0 [ 20.555891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.555937] kthread+0x328/0x630 [ 20.555973] ret_from_fork+0x10/0x20 [ 20.556010] [ 20.556031] The buggy address belongs to the object at fff00000c7832f80 [ 20.556031] which belongs to the cache kmalloc-64 of size 64 [ 20.556115] The buggy address is located 0 bytes to the right of [ 20.556115] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.556223] [ 20.556244] The buggy address belongs to the physical page: [ 20.556277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.556328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.556375] page_type: f5(slab) [ 20.556414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.556610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.556658] page dumped because: kasan: bad access detected [ 20.556692] [ 20.557144] Memory state around the buggy address: [ 20.557567] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.557779] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.557838] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.557880] ^ [ 20.557915] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.557959] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.557999] ================================================================== [ 20.472097] ================================================================== [ 20.472278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.472331] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.472441] [ 20.472556] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.472646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.472675] Hardware name: linux,dummy-virt (DT) [ 20.472734] Call trace: [ 20.472789] show_stack+0x20/0x38 (C) [ 20.472857] dump_stack_lvl+0x8c/0xd0 [ 20.472916] print_report+0x118/0x608 [ 20.472974] kasan_report+0xdc/0x128 [ 20.473023] kasan_check_range+0x100/0x1a8 [ 20.473072] __kasan_check_write+0x20/0x30 [ 20.473122] kasan_atomics_helper+0x99c/0x4858 [ 20.473181] kasan_atomics+0x198/0x2e0 [ 20.473227] kunit_try_run_case+0x170/0x3f0 [ 20.473274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.473336] kthread+0x328/0x630 [ 20.473382] ret_from_fork+0x10/0x20 [ 20.473431] [ 20.473451] Allocated by task 265: [ 20.473481] kasan_save_stack+0x3c/0x68 [ 20.473521] kasan_save_track+0x20/0x40 [ 20.473561] kasan_save_alloc_info+0x40/0x58 [ 20.473601] __kasan_kmalloc+0xd4/0xd8 [ 20.473640] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.474005] kasan_atomics+0xb8/0x2e0 [ 20.474354] kunit_try_run_case+0x170/0x3f0 [ 20.474441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474522] kthread+0x328/0x630 [ 20.474637] ret_from_fork+0x10/0x20 [ 20.474719] [ 20.474841] The buggy address belongs to the object at fff00000c7832f80 [ 20.474841] which belongs to the cache kmalloc-64 of size 64 [ 20.474945] The buggy address is located 0 bytes to the right of [ 20.474945] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.475018] [ 20.475251] The buggy address belongs to the physical page: [ 20.475343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.475532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.475759] page_type: f5(slab) [ 20.475836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.475917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.476033] page dumped because: kasan: bad access detected [ 20.476129] [ 20.476178] Memory state around the buggy address: [ 20.476214] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.476427] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.476578] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.476721] ^ [ 20.476779] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.476847] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.477028] ================================================================== [ 20.589590] ================================================================== [ 20.589757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.589948] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.590026] [ 20.590169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.590322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.590369] Hardware name: linux,dummy-virt (DT) [ 20.590401] Call trace: [ 20.590557] show_stack+0x20/0x38 (C) [ 20.590784] dump_stack_lvl+0x8c/0xd0 [ 20.590891] print_report+0x118/0x608 [ 20.591025] kasan_report+0xdc/0x128 [ 20.591102] kasan_check_range+0x100/0x1a8 [ 20.591206] __kasan_check_write+0x20/0x30 [ 20.591284] kasan_atomics_helper+0xf88/0x4858 [ 20.591335] kasan_atomics+0x198/0x2e0 [ 20.591420] kunit_try_run_case+0x170/0x3f0 [ 20.591470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.591715] kthread+0x328/0x630 [ 20.591826] ret_from_fork+0x10/0x20 [ 20.591963] [ 20.592087] Allocated by task 265: [ 20.592118] kasan_save_stack+0x3c/0x68 [ 20.592169] kasan_save_track+0x20/0x40 [ 20.592209] kasan_save_alloc_info+0x40/0x58 [ 20.592251] __kasan_kmalloc+0xd4/0xd8 [ 20.592290] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.592332] kasan_atomics+0xb8/0x2e0 [ 20.592370] kunit_try_run_case+0x170/0x3f0 [ 20.592410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.592454] kthread+0x328/0x630 [ 20.592492] ret_from_fork+0x10/0x20 [ 20.592880] [ 20.592904] The buggy address belongs to the object at fff00000c7832f80 [ 20.592904] which belongs to the cache kmalloc-64 of size 64 [ 20.592965] The buggy address is located 0 bytes to the right of [ 20.592965] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.593497] [ 20.593523] The buggy address belongs to the physical page: [ 20.593555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.593609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.593658] page_type: f5(slab) [ 20.593697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.594301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.594517] page dumped because: kasan: bad access detected [ 20.594580] [ 20.594601] Memory state around the buggy address: [ 20.594681] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.594881] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.594996] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.595039] ^ [ 20.595072] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.595139] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.595189] ================================================================== [ 20.578236] ================================================================== [ 20.578287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.578344] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.578587] [ 20.578710] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.578804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.578834] Hardware name: linux,dummy-virt (DT) [ 20.578901] Call trace: [ 20.579014] show_stack+0x20/0x38 (C) [ 20.579146] dump_stack_lvl+0x8c/0xd0 [ 20.579204] print_report+0x118/0x608 [ 20.579258] kasan_report+0xdc/0x128 [ 20.579408] kasan_check_range+0x100/0x1a8 [ 20.579509] __kasan_check_write+0x20/0x30 [ 20.579695] kasan_atomics_helper+0xeb8/0x4858 [ 20.579751] kasan_atomics+0x198/0x2e0 [ 20.579956] kunit_try_run_case+0x170/0x3f0 [ 20.580013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.580075] kthread+0x328/0x630 [ 20.580126] ret_from_fork+0x10/0x20 [ 20.580497] [ 20.580524] Allocated by task 265: [ 20.580645] kasan_save_stack+0x3c/0x68 [ 20.581199] kasan_save_track+0x20/0x40 [ 20.581256] kasan_save_alloc_info+0x40/0x58 [ 20.581301] __kasan_kmalloc+0xd4/0xd8 [ 20.581340] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.581381] kasan_atomics+0xb8/0x2e0 [ 20.581419] kunit_try_run_case+0x170/0x3f0 [ 20.581459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.581504] kthread+0x328/0x630 [ 20.581543] ret_from_fork+0x10/0x20 [ 20.581581] [ 20.581604] The buggy address belongs to the object at fff00000c7832f80 [ 20.581604] which belongs to the cache kmalloc-64 of size 64 [ 20.581663] The buggy address is located 0 bytes to the right of [ 20.581663] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.581727] [ 20.581757] The buggy address belongs to the physical page: [ 20.581789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.581840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.581889] page_type: f5(slab) [ 20.581927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.581979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.582022] page dumped because: kasan: bad access detected [ 20.582057] [ 20.582077] Memory state around the buggy address: [ 20.582110] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.582164] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.582288] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.582400] ^ [ 20.582478] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.582530] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.582571] ================================================================== [ 20.656371] ================================================================== [ 20.656433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.656558] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.656635] [ 20.656700] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.656792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.656838] Hardware name: linux,dummy-virt (DT) [ 20.656872] Call trace: [ 20.656895] show_stack+0x20/0x38 (C) [ 20.656945] dump_stack_lvl+0x8c/0xd0 [ 20.656991] print_report+0x118/0x608 [ 20.657172] kasan_report+0xdc/0x128 [ 20.657374] kasan_check_range+0x100/0x1a8 [ 20.657451] __kasan_check_write+0x20/0x30 [ 20.657508] kasan_atomics_helper+0x154c/0x4858 [ 20.657558] kasan_atomics+0x198/0x2e0 [ 20.657665] kunit_try_run_case+0x170/0x3f0 [ 20.657716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.657776] kthread+0x328/0x630 [ 20.657822] ret_from_fork+0x10/0x20 [ 20.657871] [ 20.657893] Allocated by task 265: [ 20.657923] kasan_save_stack+0x3c/0x68 [ 20.657982] kasan_save_track+0x20/0x40 [ 20.658024] kasan_save_alloc_info+0x40/0x58 [ 20.658067] __kasan_kmalloc+0xd4/0xd8 [ 20.658106] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.658147] kasan_atomics+0xb8/0x2e0 [ 20.658197] kunit_try_run_case+0x170/0x3f0 [ 20.658236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.658281] kthread+0x328/0x630 [ 20.658320] ret_from_fork+0x10/0x20 [ 20.658358] [ 20.658408] The buggy address belongs to the object at fff00000c7832f80 [ 20.658408] which belongs to the cache kmalloc-64 of size 64 [ 20.658524] The buggy address is located 0 bytes to the right of [ 20.658524] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.658715] [ 20.658897] The buggy address belongs to the physical page: [ 20.659074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.659212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.659356] page_type: f5(slab) [ 20.659477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.659527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.659593] page dumped because: kasan: bad access detected [ 20.659627] [ 20.659648] Memory state around the buggy address: [ 20.659681] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.659993] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.660111] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.660275] ^ [ 20.660350] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.660544] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.660805] ================================================================== [ 20.564963] ================================================================== [ 20.565067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.565118] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.565235] [ 20.565273] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.565540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.565688] Hardware name: linux,dummy-virt (DT) [ 20.565824] Call trace: [ 20.566087] show_stack+0x20/0x38 (C) [ 20.566368] dump_stack_lvl+0x8c/0xd0 [ 20.566524] print_report+0x118/0x608 [ 20.566829] kasan_report+0xdc/0x128 [ 20.566883] kasan_check_range+0x100/0x1a8 [ 20.566990] __kasan_check_write+0x20/0x30 [ 20.567113] kasan_atomics_helper+0xe44/0x4858 [ 20.567236] kasan_atomics+0x198/0x2e0 [ 20.567454] kunit_try_run_case+0x170/0x3f0 [ 20.567504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.567643] kthread+0x328/0x630 [ 20.567711] ret_from_fork+0x10/0x20 [ 20.567761] [ 20.567866] Allocated by task 265: [ 20.567900] kasan_save_stack+0x3c/0x68 [ 20.567980] kasan_save_track+0x20/0x40 [ 20.568114] kasan_save_alloc_info+0x40/0x58 [ 20.568171] __kasan_kmalloc+0xd4/0xd8 [ 20.568212] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.568253] kasan_atomics+0xb8/0x2e0 [ 20.568291] kunit_try_run_case+0x170/0x3f0 [ 20.568331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.568375] kthread+0x328/0x630 [ 20.568414] ret_from_fork+0x10/0x20 [ 20.568452] [ 20.568850] The buggy address belongs to the object at fff00000c7832f80 [ 20.568850] which belongs to the cache kmalloc-64 of size 64 [ 20.569004] The buggy address is located 0 bytes to the right of [ 20.569004] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.569142] [ 20.569200] The buggy address belongs to the physical page: [ 20.569302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.569393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.569580] page_type: f5(slab) [ 20.569621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.569679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.569807] page dumped because: kasan: bad access detected [ 20.569842] [ 20.569862] Memory state around the buggy address: [ 20.569897] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.569957] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.570000] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.570040] ^ [ 20.570074] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.570253] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.570305] ================================================================== [ 20.669245] ================================================================== [ 20.669288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.669333] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.669383] [ 20.669413] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.669498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.669527] Hardware name: linux,dummy-virt (DT) [ 20.669558] Call trace: [ 20.669582] show_stack+0x20/0x38 (C) [ 20.669630] dump_stack_lvl+0x8c/0xd0 [ 20.669695] print_report+0x118/0x608 [ 20.669744] kasan_report+0xdc/0x128 [ 20.669791] kasan_check_range+0x100/0x1a8 [ 20.669841] __kasan_check_write+0x20/0x30 [ 20.669898] kasan_atomics_helper+0x1644/0x4858 [ 20.669947] kasan_atomics+0x198/0x2e0 [ 20.669994] kunit_try_run_case+0x170/0x3f0 [ 20.670042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.670143] kthread+0x328/0x630 [ 20.670220] ret_from_fork+0x10/0x20 [ 20.670270] [ 20.670292] Allocated by task 265: [ 20.670321] kasan_save_stack+0x3c/0x68 [ 20.670362] kasan_save_track+0x20/0x40 [ 20.670401] kasan_save_alloc_info+0x40/0x58 [ 20.670443] __kasan_kmalloc+0xd4/0xd8 [ 20.670481] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.670643] kasan_atomics+0xb8/0x2e0 [ 20.670682] kunit_try_run_case+0x170/0x3f0 [ 20.670721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.670773] kthread+0x328/0x630 [ 20.670871] ret_from_fork+0x10/0x20 [ 20.671044] [ 20.671164] The buggy address belongs to the object at fff00000c7832f80 [ 20.671164] which belongs to the cache kmalloc-64 of size 64 [ 20.671437] The buggy address is located 0 bytes to the right of [ 20.671437] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.671648] [ 20.671785] The buggy address belongs to the physical page: [ 20.671882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.672064] page_type: f5(slab) [ 20.672102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.672320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.672480] page dumped because: kasan: bad access detected [ 20.672660] [ 20.672794] Memory state around the buggy address: [ 20.672922] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.673161] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.673287] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.673407] ^ [ 20.673509] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.673561] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.673717] ================================================================== [ 20.628362] ================================================================== [ 20.628409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.628455] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.628505] [ 20.628535] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.628618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.628647] Hardware name: linux,dummy-virt (DT) [ 20.628678] Call trace: [ 20.628702] show_stack+0x20/0x38 (C) [ 20.628748] dump_stack_lvl+0x8c/0xd0 [ 20.628796] print_report+0x118/0x608 [ 20.628842] kasan_report+0xdc/0x128 [ 20.628889] kasan_check_range+0x100/0x1a8 [ 20.628971] __kasan_check_write+0x20/0x30 [ 20.629035] kasan_atomics_helper+0x12d8/0x4858 [ 20.629092] kasan_atomics+0x198/0x2e0 [ 20.629192] kunit_try_run_case+0x170/0x3f0 [ 20.629289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.629346] kthread+0x328/0x630 [ 20.629398] ret_from_fork+0x10/0x20 [ 20.629494] [ 20.629538] Allocated by task 265: [ 20.629586] kasan_save_stack+0x3c/0x68 [ 20.629643] kasan_save_track+0x20/0x40 [ 20.629682] kasan_save_alloc_info+0x40/0x58 [ 20.629723] __kasan_kmalloc+0xd4/0xd8 [ 20.629786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.629837] kasan_atomics+0xb8/0x2e0 [ 20.629876] kunit_try_run_case+0x170/0x3f0 [ 20.629926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.629971] kthread+0x328/0x630 [ 20.630010] ret_from_fork+0x10/0x20 [ 20.630072] [ 20.630184] The buggy address belongs to the object at fff00000c7832f80 [ 20.630184] which belongs to the cache kmalloc-64 of size 64 [ 20.630326] The buggy address is located 0 bytes to the right of [ 20.630326] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.630412] [ 20.630472] The buggy address belongs to the physical page: [ 20.630542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.630596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.630642] page_type: f5(slab) [ 20.630688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.630743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.630806] page dumped because: kasan: bad access detected [ 20.630917] [ 20.631006] Memory state around the buggy address: [ 20.631091] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.631207] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.631282] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.631322] ^ [ 20.631357] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.631402] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.631451] ================================================================== [ 20.570834] ================================================================== [ 20.571010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.571064] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.571116] [ 20.571146] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.571407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.571442] Hardware name: linux,dummy-virt (DT) [ 20.571476] Call trace: [ 20.571501] show_stack+0x20/0x38 (C) [ 20.571563] dump_stack_lvl+0x8c/0xd0 [ 20.571612] print_report+0x118/0x608 [ 20.571661] kasan_report+0xdc/0x128 [ 20.571955] __asan_report_store8_noabort+0x20/0x30 [ 20.572066] kasan_atomics_helper+0x3e5c/0x4858 [ 20.572270] kasan_atomics+0x198/0x2e0 [ 20.572332] kunit_try_run_case+0x170/0x3f0 [ 20.572382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.572436] kthread+0x328/0x630 [ 20.572484] ret_from_fork+0x10/0x20 [ 20.572830] [ 20.573057] Allocated by task 265: [ 20.573433] kasan_save_stack+0x3c/0x68 [ 20.573543] kasan_save_track+0x20/0x40 [ 20.573874] kasan_save_alloc_info+0x40/0x58 [ 20.574007] __kasan_kmalloc+0xd4/0xd8 [ 20.574048] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.574257] kasan_atomics+0xb8/0x2e0 [ 20.574305] kunit_try_run_case+0x170/0x3f0 [ 20.574345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574446] kthread+0x328/0x630 [ 20.574714] ret_from_fork+0x10/0x20 [ 20.574836] [ 20.574861] The buggy address belongs to the object at fff00000c7832f80 [ 20.574861] which belongs to the cache kmalloc-64 of size 64 [ 20.575199] The buggy address is located 0 bytes to the right of [ 20.575199] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.575302] [ 20.575325] The buggy address belongs to the physical page: [ 20.575357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.575421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.575470] page_type: f5(slab) [ 20.575509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.576062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.576417] page dumped because: kasan: bad access detected [ 20.576690] [ 20.576714] Memory state around the buggy address: [ 20.576749] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.576842] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.577268] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.577446] ^ [ 20.577598] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.577699] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.577767] ================================================================== [ 20.619435] ================================================================== [ 20.619519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.619623] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.619730] [ 20.619762] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.619847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.619876] Hardware name: linux,dummy-virt (DT) [ 20.620145] Call trace: [ 20.620182] show_stack+0x20/0x38 (C) [ 20.620261] dump_stack_lvl+0x8c/0xd0 [ 20.620327] print_report+0x118/0x608 [ 20.620390] kasan_report+0xdc/0x128 [ 20.620474] kasan_check_range+0x100/0x1a8 [ 20.620530] __kasan_check_write+0x20/0x30 [ 20.620616] kasan_atomics_helper+0x11f8/0x4858 [ 20.620668] kasan_atomics+0x198/0x2e0 [ 20.620831] kunit_try_run_case+0x170/0x3f0 [ 20.620978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.621036] kthread+0x328/0x630 [ 20.621081] ret_from_fork+0x10/0x20 [ 20.621149] [ 20.621208] Allocated by task 265: [ 20.621282] kasan_save_stack+0x3c/0x68 [ 20.621325] kasan_save_track+0x20/0x40 [ 20.621402] kasan_save_alloc_info+0x40/0x58 [ 20.621446] __kasan_kmalloc+0xd4/0xd8 [ 20.621764] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.622033] kasan_atomics+0xb8/0x2e0 [ 20.622639] kunit_try_run_case+0x170/0x3f0 [ 20.622695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.622773] kthread+0x328/0x630 [ 20.622812] ret_from_fork+0x10/0x20 [ 20.622851] [ 20.622874] The buggy address belongs to the object at fff00000c7832f80 [ 20.622874] which belongs to the cache kmalloc-64 of size 64 [ 20.622934] The buggy address is located 0 bytes to the right of [ 20.622934] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.622999] [ 20.623022] The buggy address belongs to the physical page: [ 20.623055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.623108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.623164] page_type: f5(slab) [ 20.623289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.623410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.623522] page dumped because: kasan: bad access detected [ 20.623557] [ 20.623578] Memory state around the buggy address: [ 20.623611] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.623944] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.624076] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.624127] ^ [ 20.624185] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.624242] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.624291] ================================================================== [ 20.649393] ================================================================== [ 20.649433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.649476] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.649525] [ 20.649553] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.650075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.650262] Hardware name: linux,dummy-virt (DT) [ 20.650316] Call trace: [ 20.650340] show_stack+0x20/0x38 (C) [ 20.650392] dump_stack_lvl+0x8c/0xd0 [ 20.650438] print_report+0x118/0x608 [ 20.650499] kasan_report+0xdc/0x128 [ 20.650554] kasan_check_range+0x100/0x1a8 [ 20.650603] __kasan_check_write+0x20/0x30 [ 20.650654] kasan_atomics_helper+0x14e4/0x4858 [ 20.650703] kasan_atomics+0x198/0x2e0 [ 20.650777] kunit_try_run_case+0x170/0x3f0 [ 20.650828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.650902] kthread+0x328/0x630 [ 20.651023] ret_from_fork+0x10/0x20 [ 20.651233] [ 20.651313] Allocated by task 265: [ 20.651636] kasan_save_stack+0x3c/0x68 [ 20.651710] kasan_save_track+0x20/0x40 [ 20.651854] kasan_save_alloc_info+0x40/0x58 [ 20.651916] __kasan_kmalloc+0xd4/0xd8 [ 20.651955] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.652253] kasan_atomics+0xb8/0x2e0 [ 20.652364] kunit_try_run_case+0x170/0x3f0 [ 20.652499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.652632] kthread+0x328/0x630 [ 20.652912] ret_from_fork+0x10/0x20 [ 20.652963] [ 20.653095] The buggy address belongs to the object at fff00000c7832f80 [ 20.653095] which belongs to the cache kmalloc-64 of size 64 [ 20.653296] The buggy address is located 0 bytes to the right of [ 20.653296] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.653465] [ 20.653572] The buggy address belongs to the physical page: [ 20.653625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.653677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.653961] page_type: f5(slab) [ 20.654298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.654435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.654627] page dumped because: kasan: bad access detected [ 20.654844] [ 20.654935] Memory state around the buggy address: [ 20.655056] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.655123] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.655177] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.655243] ^ [ 20.655334] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.655489] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.655677] ================================================================== [ 20.595877] ================================================================== [ 20.595955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.596151] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.596215] [ 20.596247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.596336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.596367] Hardware name: linux,dummy-virt (DT) [ 20.596398] Call trace: [ 20.596422] show_stack+0x20/0x38 (C) [ 20.596526] dump_stack_lvl+0x8c/0xd0 [ 20.596827] print_report+0x118/0x608 [ 20.596893] kasan_report+0xdc/0x128 [ 20.596981] kasan_check_range+0x100/0x1a8 [ 20.597032] __kasan_check_write+0x20/0x30 [ 20.597299] kasan_atomics_helper+0xff0/0x4858 [ 20.597353] kasan_atomics+0x198/0x2e0 [ 20.597401] kunit_try_run_case+0x170/0x3f0 [ 20.597451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.597505] kthread+0x328/0x630 [ 20.597552] ret_from_fork+0x10/0x20 [ 20.597601] [ 20.597623] Allocated by task 265: [ 20.597658] kasan_save_stack+0x3c/0x68 [ 20.597816] kasan_save_track+0x20/0x40 [ 20.597858] kasan_save_alloc_info+0x40/0x58 [ 20.597900] __kasan_kmalloc+0xd4/0xd8 [ 20.597937] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.597979] kasan_atomics+0xb8/0x2e0 [ 20.598593] kunit_try_run_case+0x170/0x3f0 [ 20.598722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.598776] kthread+0x328/0x630 [ 20.598816] ret_from_fork+0x10/0x20 [ 20.598866] [ 20.598888] The buggy address belongs to the object at fff00000c7832f80 [ 20.598888] which belongs to the cache kmalloc-64 of size 64 [ 20.598955] The buggy address is located 0 bytes to the right of [ 20.598955] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.599355] [ 20.599410] The buggy address belongs to the physical page: [ 20.599445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.599521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.599729] page_type: f5(slab) [ 20.599767] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.599905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.600014] page dumped because: kasan: bad access detected [ 20.600099] [ 20.600153] Memory state around the buggy address: [ 20.600197] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.600332] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.600411] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.600518] ^ [ 20.600620] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.600718] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.600841] ================================================================== [ 20.676876] ================================================================== [ 20.676919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.676964] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.677014] [ 20.677042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.677127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.677166] Hardware name: linux,dummy-virt (DT) [ 20.677199] Call trace: [ 20.677221] show_stack+0x20/0x38 (C) [ 20.677271] dump_stack_lvl+0x8c/0xd0 [ 20.677317] print_report+0x118/0x608 [ 20.677364] kasan_report+0xdc/0x128 [ 20.677410] kasan_check_range+0x100/0x1a8 [ 20.677460] __kasan_check_write+0x20/0x30 [ 20.677509] kasan_atomics_helper+0x16d0/0x4858 [ 20.677567] kasan_atomics+0x198/0x2e0 [ 20.677615] kunit_try_run_case+0x170/0x3f0 [ 20.677662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.677716] kthread+0x328/0x630 [ 20.677772] ret_from_fork+0x10/0x20 [ 20.677821] [ 20.677843] Allocated by task 265: [ 20.677872] kasan_save_stack+0x3c/0x68 [ 20.677914] kasan_save_track+0x20/0x40 [ 20.677954] kasan_save_alloc_info+0x40/0x58 [ 20.677996] __kasan_kmalloc+0xd4/0xd8 [ 20.678033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.678075] kasan_atomics+0xb8/0x2e0 [ 20.678184] kunit_try_run_case+0x170/0x3f0 [ 20.678265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.678466] kthread+0x328/0x630 [ 20.678633] ret_from_fork+0x10/0x20 [ 20.678702] [ 20.678727] The buggy address belongs to the object at fff00000c7832f80 [ 20.678727] which belongs to the cache kmalloc-64 of size 64 [ 20.678801] The buggy address is located 0 bytes to the right of [ 20.678801] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.678882] [ 20.678906] The buggy address belongs to the physical page: [ 20.678938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.678989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.679323] page_type: f5(slab) [ 20.679428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.679553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.679724] page dumped because: kasan: bad access detected [ 20.679785] [ 20.680091] Memory state around the buggy address: [ 20.680168] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.680215] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.680260] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.680591] ^ [ 20.680673] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.680810] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.680929] ================================================================== [ 20.582817] ================================================================== [ 20.582870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.582944] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.583003] [ 20.583131] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.583229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.583259] Hardware name: linux,dummy-virt (DT) [ 20.583299] Call trace: [ 20.583423] show_stack+0x20/0x38 (C) [ 20.584018] dump_stack_lvl+0x8c/0xd0 [ 20.584067] print_report+0x118/0x608 [ 20.584115] kasan_report+0xdc/0x128 [ 20.584172] kasan_check_range+0x100/0x1a8 [ 20.584222] __kasan_check_write+0x20/0x30 [ 20.584273] kasan_atomics_helper+0xf20/0x4858 [ 20.584323] kasan_atomics+0x198/0x2e0 [ 20.584369] kunit_try_run_case+0x170/0x3f0 [ 20.584419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.584480] kthread+0x328/0x630 [ 20.584709] ret_from_fork+0x10/0x20 [ 20.584954] [ 20.585059] Allocated by task 265: [ 20.585134] kasan_save_stack+0x3c/0x68 [ 20.585184] kasan_save_track+0x20/0x40 [ 20.585222] kasan_save_alloc_info+0x40/0x58 [ 20.585265] __kasan_kmalloc+0xd4/0xd8 [ 20.585304] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.585346] kasan_atomics+0xb8/0x2e0 [ 20.585384] kunit_try_run_case+0x170/0x3f0 [ 20.585423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.585468] kthread+0x328/0x630 [ 20.585517] ret_from_fork+0x10/0x20 [ 20.586020] [ 20.586169] The buggy address belongs to the object at fff00000c7832f80 [ 20.586169] which belongs to the cache kmalloc-64 of size 64 [ 20.586348] The buggy address is located 0 bytes to the right of [ 20.586348] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.586418] [ 20.586893] The buggy address belongs to the physical page: [ 20.586930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.586984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.587035] page_type: f5(slab) [ 20.587074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.587125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.587566] page dumped because: kasan: bad access detected [ 20.587981] [ 20.588005] Memory state around the buggy address: [ 20.588109] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.588527] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.588591] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.588723] ^ [ 20.588992] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.589184] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.589267] ================================================================== [ 20.542553] ================================================================== [ 20.542623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.542685] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.542865] [ 20.542899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.542990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.543281] Hardware name: linux,dummy-virt (DT) [ 20.543357] Call trace: [ 20.543381] show_stack+0x20/0x38 (C) [ 20.543441] dump_stack_lvl+0x8c/0xd0 [ 20.543702] print_report+0x118/0x608 [ 20.543833] kasan_report+0xdc/0x128 [ 20.543880] kasan_check_range+0x100/0x1a8 [ 20.543930] __kasan_check_write+0x20/0x30 [ 20.543980] kasan_atomics_helper+0xd3c/0x4858 [ 20.544037] kasan_atomics+0x198/0x2e0 [ 20.544306] kunit_try_run_case+0x170/0x3f0 [ 20.544476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.544593] kthread+0x328/0x630 [ 20.544817] ret_from_fork+0x10/0x20 [ 20.545002] [ 20.545059] Allocated by task 265: [ 20.545090] kasan_save_stack+0x3c/0x68 [ 20.545141] kasan_save_track+0x20/0x40 [ 20.545200] kasan_save_alloc_info+0x40/0x58 [ 20.545243] __kasan_kmalloc+0xd4/0xd8 [ 20.545282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.545323] kasan_atomics+0xb8/0x2e0 [ 20.545361] kunit_try_run_case+0x170/0x3f0 [ 20.545400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.545443] kthread+0x328/0x630 [ 20.545480] ret_from_fork+0x10/0x20 [ 20.545518] [ 20.545539] The buggy address belongs to the object at fff00000c7832f80 [ 20.545539] which belongs to the cache kmalloc-64 of size 64 [ 20.545597] The buggy address is located 0 bytes to the right of [ 20.545597] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.545661] [ 20.545682] The buggy address belongs to the physical page: [ 20.545714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.545790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.545839] page_type: f5(slab) [ 20.545878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.545931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.545973] page dumped because: kasan: bad access detected [ 20.546007] [ 20.546027] Memory state around the buggy address: [ 20.546060] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.546104] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.546148] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.546197] ^ [ 20.546231] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.546274] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.546313] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
[ 20.089477] ================================================================== [ 20.089728] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 20.089845] Read of size 1 at addr fff00000c7833ad8 by task kunit_try_catch/257 [ 20.089990] [ 20.090044] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.090379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.090414] Hardware name: linux,dummy-virt (DT) [ 20.090464] Call trace: [ 20.090519] show_stack+0x20/0x38 (C) [ 20.090644] dump_stack_lvl+0x8c/0xd0 [ 20.090721] print_report+0x118/0x608 [ 20.090850] kasan_report+0xdc/0x128 [ 20.090939] __asan_report_load1_noabort+0x20/0x30 [ 20.091019] memcmp+0x198/0x1d8 [ 20.091065] kasan_memcmp+0x16c/0x300 [ 20.091339] kunit_try_run_case+0x170/0x3f0 [ 20.091485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.091552] kthread+0x328/0x630 [ 20.091616] ret_from_fork+0x10/0x20 [ 20.091696] [ 20.091727] Allocated by task 257: [ 20.091757] kasan_save_stack+0x3c/0x68 [ 20.091819] kasan_save_track+0x20/0x40 [ 20.091886] kasan_save_alloc_info+0x40/0x58 [ 20.092008] __kasan_kmalloc+0xd4/0xd8 [ 20.092086] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.092129] kasan_memcmp+0xbc/0x300 [ 20.092176] kunit_try_run_case+0x170/0x3f0 [ 20.092213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.092279] kthread+0x328/0x630 [ 20.092316] ret_from_fork+0x10/0x20 [ 20.092371] [ 20.092391] The buggy address belongs to the object at fff00000c7833ac0 [ 20.092391] which belongs to the cache kmalloc-32 of size 32 [ 20.092452] The buggy address is located 0 bytes to the right of [ 20.092452] allocated 24-byte region [fff00000c7833ac0, fff00000c7833ad8) [ 20.092528] [ 20.092551] The buggy address belongs to the physical page: [ 20.092600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107833 [ 20.092657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.092718] page_type: f5(slab) [ 20.092761] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.092814] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.092872] page dumped because: kasan: bad access detected [ 20.092907] [ 20.092943] Memory state around the buggy address: [ 20.092978] fff00000c7833980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 20.093024] fff00000c7833a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.093087] >fff00000c7833a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.093127] ^ [ 20.093581] fff00000c7833b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.093656] fff00000c7833b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.093824] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
[ 20.073782] ================================================================== [ 20.073841] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 20.073894] Read of size 1 at addr ffff800080a37b4a by task kunit_try_catch/253 [ 20.073944] [ 20.074194] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.074335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.074405] Hardware name: linux,dummy-virt (DT) [ 20.074506] Call trace: [ 20.074543] show_stack+0x20/0x38 (C) [ 20.074618] dump_stack_lvl+0x8c/0xd0 [ 20.074668] print_report+0x310/0x608 [ 20.074715] kasan_report+0xdc/0x128 [ 20.074769] __asan_report_load1_noabort+0x20/0x30 [ 20.074823] kasan_alloca_oob_right+0x2dc/0x340 [ 20.074873] kunit_try_run_case+0x170/0x3f0 [ 20.074923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.075069] kthread+0x328/0x630 [ 20.075123] ret_from_fork+0x10/0x20 [ 20.075219] [ 20.075270] The buggy address belongs to stack of task kunit_try_catch/253 [ 20.075361] [ 20.075401] The buggy address belongs to the virtual mapping at [ 20.075401] [ffff800080a30000, ffff800080a39000) created by: [ 20.075401] kernel_clone+0x150/0x7a8 [ 20.075480] [ 20.075504] The buggy address belongs to the physical page: [ 20.075537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f7 [ 20.075590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.075651] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.075781] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.075859] page dumped because: kasan: bad access detected [ 20.075921] [ 20.075941] Memory state around the buggy address: [ 20.075973] ffff800080a37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.076226] ffff800080a37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.076304] >ffff800080a37b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.076417] ^ [ 20.076472] ffff800080a37b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.076541] ffff800080a37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.076645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
[ 20.065811] ================================================================== [ 20.065906] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 20.066015] Read of size 1 at addr ffff800080a37b5f by task kunit_try_catch/251 [ 20.066191] [ 20.066230] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.066323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.066352] Hardware name: linux,dummy-virt (DT) [ 20.066384] Call trace: [ 20.066409] show_stack+0x20/0x38 (C) [ 20.066462] dump_stack_lvl+0x8c/0xd0 [ 20.066630] print_report+0x310/0x608 [ 20.066712] kasan_report+0xdc/0x128 [ 20.066797] __asan_report_load1_noabort+0x20/0x30 [ 20.066893] kasan_alloca_oob_left+0x2b8/0x310 [ 20.066972] kunit_try_run_case+0x170/0x3f0 [ 20.067064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.067129] kthread+0x328/0x630 [ 20.067189] ret_from_fork+0x10/0x20 [ 20.067241] [ 20.067264] The buggy address belongs to stack of task kunit_try_catch/251 [ 20.067427] [ 20.067523] The buggy address belongs to the virtual mapping at [ 20.067523] [ffff800080a30000, ffff800080a39000) created by: [ 20.067523] kernel_clone+0x150/0x7a8 [ 20.067637] [ 20.067694] The buggy address belongs to the physical page: [ 20.067735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f7 [ 20.067789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.067944] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.068051] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.068119] page dumped because: kasan: bad access detected [ 20.068179] [ 20.068231] Memory state around the buggy address: [ 20.068309] ffff800080a37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.068396] ffff800080a37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.068459] >ffff800080a37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 20.068498] ^ [ 20.068725] ffff800080a37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.068803] ffff800080a37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.068885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
[ 20.052821] ================================================================== [ 20.052944] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.053025] Read of size 1 at addr ffff800080a37c2a by task kunit_try_catch/249 [ 20.053101] [ 20.053138] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.053253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.053281] Hardware name: linux,dummy-virt (DT) [ 20.053318] Call trace: [ 20.053347] show_stack+0x20/0x38 (C) [ 20.053418] dump_stack_lvl+0x8c/0xd0 [ 20.053463] print_report+0x310/0x608 [ 20.053509] kasan_report+0xdc/0x128 [ 20.053552] __asan_report_load1_noabort+0x20/0x30 [ 20.053601] kasan_stack_oob+0x238/0x270 [ 20.053647] kunit_try_run_case+0x170/0x3f0 [ 20.053692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.053743] kthread+0x328/0x630 [ 20.053787] ret_from_fork+0x10/0x20 [ 20.053842] [ 20.053900] The buggy address belongs to stack of task kunit_try_catch/249 [ 20.054124] and is located at offset 138 in frame: [ 20.054197] kasan_stack_oob+0x0/0x270 [ 20.054490] [ 20.054521] This frame has 4 objects: [ 20.054873] [48, 49) '__assertion' [ 20.055010] [64, 72) 'array' [ 20.055077] [96, 112) '__assertion' [ 20.055226] [128, 138) 'stack_array' [ 20.055300] [ 20.055961] The buggy address belongs to the virtual mapping at [ 20.055961] [ffff800080a30000, ffff800080a39000) created by: [ 20.055961] kernel_clone+0x150/0x7a8 [ 20.056075] [ 20.056121] The buggy address belongs to the physical page: [ 20.056451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f7 [ 20.056523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.056625] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.056726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.056841] page dumped because: kasan: bad access detected [ 20.056914] [ 20.056963] Memory state around the buggy address: [ 20.057038] ffff800080a37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.057144] ffff800080a37b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 20.057230] >ffff800080a37c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 20.057293] ^ [ 20.057335] ffff800080a37c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 20.057376] ffff800080a37d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.057698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
[ 20.040649] ================================================================== [ 20.040710] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.040767] Read of size 1 at addr ffff9507083405cd by task kunit_try_catch/245 [ 20.040819] [ 20.040864] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.040950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.040977] Hardware name: linux,dummy-virt (DT) [ 20.041008] Call trace: [ 20.041048] show_stack+0x20/0x38 (C) [ 20.041098] dump_stack_lvl+0x8c/0xd0 [ 20.041146] print_report+0x310/0x608 [ 20.041505] kasan_report+0xdc/0x128 [ 20.041567] __asan_report_load1_noabort+0x20/0x30 [ 20.041664] kasan_global_oob_right+0x230/0x270 [ 20.041738] kunit_try_run_case+0x170/0x3f0 [ 20.041834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.041915] kthread+0x328/0x630 [ 20.041960] ret_from_fork+0x10/0x20 [ 20.042015] [ 20.042062] The buggy address belongs to the variable: [ 20.042091] global_array+0xd/0x40 [ 20.042139] [ 20.042354] The buggy address belongs to the virtual mapping at [ 20.042354] [ffff9507064f0000, ffff950708401000) created by: [ 20.042354] paging_init+0x66c/0x7d0 [ 20.042441] [ 20.042567] The buggy address belongs to the physical page: [ 20.042628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d40 [ 20.042715] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.042796] raw: 03fffe0000002000 ffffc1ffc01f5008 ffffc1ffc01f5008 0000000000000000 [ 20.042869] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.042990] page dumped because: kasan: bad access detected [ 20.043084] [ 20.043129] Memory state around the buggy address: [ 20.043237] ffff950708340480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.043315] ffff950708340500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.043381] >ffff950708340580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 20.043500] ^ [ 20.043568] ffff950708340600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 20.043641] ffff950708340680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 20.043678] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
[ 20.020022] ================================================================== [ 20.020213] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.020278] Free of addr fff00000c1729501 by task kunit_try_catch/241 [ 20.020377] [ 20.020411] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.020495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.020520] Hardware name: linux,dummy-virt (DT) [ 20.020647] Call trace: [ 20.020689] show_stack+0x20/0x38 (C) [ 20.020812] dump_stack_lvl+0x8c/0xd0 [ 20.020898] print_report+0x118/0x608 [ 20.021008] kasan_report_invalid_free+0xc0/0xe8 [ 20.021087] check_slab_allocation+0xfc/0x108 [ 20.021140] __kasan_mempool_poison_object+0x78/0x150 [ 20.021229] mempool_free+0x28c/0x328 [ 20.021294] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.021346] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.021421] kunit_try_run_case+0x170/0x3f0 [ 20.021530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.021625] kthread+0x328/0x630 [ 20.021776] ret_from_fork+0x10/0x20 [ 20.021915] [ 20.022034] Allocated by task 241: [ 20.022129] kasan_save_stack+0x3c/0x68 [ 20.022182] kasan_save_track+0x20/0x40 [ 20.022248] kasan_save_alloc_info+0x40/0x58 [ 20.022287] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.022330] remove_element+0x130/0x1f8 [ 20.022363] mempool_alloc_preallocated+0x58/0xc0 [ 20.022625] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.022718] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.022816] kunit_try_run_case+0x170/0x3f0 [ 20.022943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.023008] kthread+0x328/0x630 [ 20.023104] ret_from_fork+0x10/0x20 [ 20.023231] [ 20.023336] The buggy address belongs to the object at fff00000c1729500 [ 20.023336] which belongs to the cache kmalloc-128 of size 128 [ 20.023414] The buggy address is located 1 bytes inside of [ 20.023414] 128-byte region [fff00000c1729500, fff00000c1729580) [ 20.023619] [ 20.023775] The buggy address belongs to the physical page: [ 20.023824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 20.023908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.024014] page_type: f5(slab) [ 20.024092] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.024142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.024210] page dumped because: kasan: bad access detected [ 20.024243] [ 20.024261] Memory state around the buggy address: [ 20.024290] fff00000c1729400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.024344] fff00000c1729480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.024386] >fff00000c1729500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.024423] ^ [ 20.024450] fff00000c1729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.024497] fff00000c1729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.024536] ================================================================== [ 20.031077] ================================================================== [ 20.031172] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.031261] Free of addr fff00000c786c001 by task kunit_try_catch/243 [ 20.031358] [ 20.031396] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.031482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.031742] Hardware name: linux,dummy-virt (DT) [ 20.031779] Call trace: [ 20.031809] show_stack+0x20/0x38 (C) [ 20.031901] dump_stack_lvl+0x8c/0xd0 [ 20.031978] print_report+0x118/0x608 [ 20.032044] kasan_report_invalid_free+0xc0/0xe8 [ 20.032124] __kasan_mempool_poison_object+0xfc/0x150 [ 20.032187] mempool_free+0x28c/0x328 [ 20.032233] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.032285] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.032377] kunit_try_run_case+0x170/0x3f0 [ 20.032423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.032475] kthread+0x328/0x630 [ 20.032551] ret_from_fork+0x10/0x20 [ 20.032796] [ 20.032834] The buggy address belongs to the physical page: [ 20.032893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 20.032966] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.033433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.033513] page_type: f8(unknown) [ 20.033558] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.033633] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.033683] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.034043] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.034145] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 20.034279] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.034424] page dumped because: kasan: bad access detected [ 20.034497] [ 20.034539] Memory state around the buggy address: [ 20.034605] fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.034646] fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.034844] >fff00000c786c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.034887] ^ [ 20.034914] fff00000c786c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.034954] fff00000c786c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.035146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
[ 20.004035] ================================================================== [ 20.004088] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.004141] Free of addr fff00000c7868000 by task kunit_try_catch/237 [ 20.004198] [ 20.004228] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.004311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.004337] Hardware name: linux,dummy-virt (DT) [ 20.004368] Call trace: [ 20.004390] show_stack+0x20/0x38 (C) [ 20.004440] dump_stack_lvl+0x8c/0xd0 [ 20.004486] print_report+0x118/0x608 [ 20.004532] kasan_report_invalid_free+0xc0/0xe8 [ 20.004581] __kasan_mempool_poison_object+0x14c/0x150 [ 20.004633] mempool_free+0x28c/0x328 [ 20.004680] mempool_double_free_helper+0x150/0x2e8 [ 20.004728] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.004778] kunit_try_run_case+0x170/0x3f0 [ 20.004823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.004874] kthread+0x328/0x630 [ 20.004919] ret_from_fork+0x10/0x20 [ 20.004964] [ 20.004984] The buggy address belongs to the physical page: [ 20.005016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 20.005069] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.005115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.005199] page_type: f8(unknown) [ 20.005239] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.005286] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.005344] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.005394] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.005443] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 20.005492] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.005532] page dumped because: kasan: bad access detected [ 20.005570] [ 20.005588] Memory state around the buggy address: [ 20.005627] fff00000c7867f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.005681] fff00000c7867f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.005723] >fff00000c7868000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.005759] ^ [ 20.005785] fff00000c7868080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.005826] fff00000c7868100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.005864] ================================================================== [ 20.012327] ================================================================== [ 20.012447] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.012506] Free of addr fff00000c786c000 by task kunit_try_catch/239 [ 20.012600] [ 20.012679] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.012792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.012820] Hardware name: linux,dummy-virt (DT) [ 20.012869] Call trace: [ 20.012901] show_stack+0x20/0x38 (C) [ 20.012952] dump_stack_lvl+0x8c/0xd0 [ 20.012998] print_report+0x118/0x608 [ 20.013044] kasan_report_invalid_free+0xc0/0xe8 [ 20.013197] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.013298] mempool_free+0x24c/0x328 [ 20.013385] mempool_double_free_helper+0x150/0x2e8 [ 20.013436] mempool_page_alloc_double_free+0xbc/0x118 [ 20.013486] kunit_try_run_case+0x170/0x3f0 [ 20.013533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.013584] kthread+0x328/0x630 [ 20.013630] ret_from_fork+0x10/0x20 [ 20.013772] [ 20.013855] The buggy address belongs to the physical page: [ 20.013926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 20.014007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.014102] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.014215] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.014276] page dumped because: kasan: bad access detected [ 20.014320] [ 20.014338] Memory state around the buggy address: [ 20.014371] fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014414] fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014456] >fff00000c786c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014599] ^ [ 20.014669] fff00000c786c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014847] fff00000c786c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.015016] ================================================================== [ 19.993797] ================================================================== [ 19.993932] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.994098] Free of addr fff00000c1729100 by task kunit_try_catch/235 [ 19.994264] [ 19.994333] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.994425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.994473] Hardware name: linux,dummy-virt (DT) [ 19.994502] Call trace: [ 19.994531] show_stack+0x20/0x38 (C) [ 19.994581] dump_stack_lvl+0x8c/0xd0 [ 19.994629] print_report+0x118/0x608 [ 19.994674] kasan_report_invalid_free+0xc0/0xe8 [ 19.994729] check_slab_allocation+0xd4/0x108 [ 19.994775] __kasan_mempool_poison_object+0x78/0x150 [ 19.994827] mempool_free+0x28c/0x328 [ 19.994874] mempool_double_free_helper+0x150/0x2e8 [ 19.994922] mempool_kmalloc_double_free+0xc0/0x118 [ 19.994970] kunit_try_run_case+0x170/0x3f0 [ 19.995016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.995068] kthread+0x328/0x630 [ 19.995112] ret_from_fork+0x10/0x20 [ 19.995167] [ 19.995188] Allocated by task 235: [ 19.995215] kasan_save_stack+0x3c/0x68 [ 19.995255] kasan_save_track+0x20/0x40 [ 19.995292] kasan_save_alloc_info+0x40/0x58 [ 19.995331] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.995371] remove_element+0x130/0x1f8 [ 19.995417] mempool_alloc_preallocated+0x58/0xc0 [ 19.995470] mempool_double_free_helper+0x94/0x2e8 [ 19.995572] mempool_kmalloc_double_free+0xc0/0x118 [ 19.995671] kunit_try_run_case+0x170/0x3f0 [ 19.995744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.995861] kthread+0x328/0x630 [ 19.995940] ret_from_fork+0x10/0x20 [ 19.996008] [ 19.996072] Freed by task 235: [ 19.996099] kasan_save_stack+0x3c/0x68 [ 19.996379] kasan_save_track+0x20/0x40 [ 19.996480] kasan_save_free_info+0x4c/0x78 [ 19.996581] __kasan_mempool_poison_object+0xc0/0x150 [ 19.996633] mempool_free+0x28c/0x328 [ 19.996670] mempool_double_free_helper+0x100/0x2e8 [ 19.996709] mempool_kmalloc_double_free+0xc0/0x118 [ 19.996757] kunit_try_run_case+0x170/0x3f0 [ 19.996801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.996842] kthread+0x328/0x630 [ 19.996886] ret_from_fork+0x10/0x20 [ 19.996927] [ 19.996945] The buggy address belongs to the object at fff00000c1729100 [ 19.996945] which belongs to the cache kmalloc-128 of size 128 [ 19.997013] The buggy address is located 0 bytes inside of [ 19.997013] 128-byte region [fff00000c1729100, fff00000c1729180) [ 19.997069] [ 19.997098] The buggy address belongs to the physical page: [ 19.997128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 19.997188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.997236] page_type: f5(slab) [ 19.997275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.997324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.997364] page dumped because: kasan: bad access detected [ 19.997395] [ 19.997412] Memory state around the buggy address: [ 19.997443] fff00000c1729000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.997486] fff00000c1729080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997527] >fff00000c1729100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.997564] ^ [ 19.997589] fff00000c1729180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997630] fff00000c1729200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.997669] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
[ 18.582185] ================================================================== [ 18.582244] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 18.582311] Read of size 1 at addr fff00000c17330c8 by task kunit_try_catch/207 [ 18.582408] [ 18.582452] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.582565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.582623] Hardware name: linux,dummy-virt (DT) [ 18.582700] Call trace: [ 18.582745] show_stack+0x20/0x38 (C) [ 18.582800] dump_stack_lvl+0x8c/0xd0 [ 18.582893] print_report+0x118/0x608 [ 18.582971] kasan_report+0xdc/0x128 [ 18.583018] __asan_report_load1_noabort+0x20/0x30 [ 18.583083] kmem_cache_oob+0x344/0x430 [ 18.583190] kunit_try_run_case+0x170/0x3f0 [ 18.583241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.583312] kthread+0x328/0x630 [ 18.583366] ret_from_fork+0x10/0x20 [ 18.583417] [ 18.583435] Allocated by task 207: [ 18.583466] kasan_save_stack+0x3c/0x68 [ 18.583505] kasan_save_track+0x20/0x40 [ 18.583542] kasan_save_alloc_info+0x40/0x58 [ 18.583784] __kasan_slab_alloc+0xa8/0xb0 [ 18.583846] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.583955] kmem_cache_oob+0x12c/0x430 [ 18.583991] kunit_try_run_case+0x170/0x3f0 [ 18.584027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.584085] kthread+0x328/0x630 [ 18.584120] ret_from_fork+0x10/0x20 [ 18.584166] [ 18.584187] The buggy address belongs to the object at fff00000c1733000 [ 18.584187] which belongs to the cache test_cache of size 200 [ 18.584282] The buggy address is located 0 bytes to the right of [ 18.584282] allocated 200-byte region [fff00000c1733000, fff00000c17330c8) [ 18.584347] [ 18.584395] The buggy address belongs to the physical page: [ 18.584431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101733 [ 18.584534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.584587] page_type: f5(slab) [ 18.584645] raw: 0bfffe0000000000 fff00000c1736000 dead000000000122 0000000000000000 [ 18.584730] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.584795] page dumped because: kasan: bad access detected [ 18.584828] [ 18.584845] Memory state around the buggy address: [ 18.585015] fff00000c1732f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.585061] fff00000c1733000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.585102] >fff00000c1733080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.585151] ^ [ 18.585196] fff00000c1733100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.585253] fff00000c1733180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.585310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
[ 18.529804] ================================================================== [ 18.530202] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 18.530530] Read of size 8 at addr fff00000c1764bc0 by task kunit_try_catch/200 [ 18.531179] [ 18.531377] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.531890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.532083] Hardware name: linux,dummy-virt (DT) [ 18.532254] Call trace: [ 18.532373] show_stack+0x20/0x38 (C) [ 18.532630] dump_stack_lvl+0x8c/0xd0 [ 18.533054] print_report+0x118/0x608 [ 18.533231] kasan_report+0xdc/0x128 [ 18.533619] __asan_report_load8_noabort+0x20/0x30 [ 18.533674] workqueue_uaf+0x480/0x4a8 [ 18.534243] kunit_try_run_case+0x170/0x3f0 [ 18.534377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.534714] kthread+0x328/0x630 [ 18.535094] ret_from_fork+0x10/0x20 [ 18.535154] [ 18.535434] Allocated by task 200: [ 18.535643] kasan_save_stack+0x3c/0x68 [ 18.535944] kasan_save_track+0x20/0x40 [ 18.536151] kasan_save_alloc_info+0x40/0x58 [ 18.536342] __kasan_kmalloc+0xd4/0xd8 [ 18.536400] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.536441] workqueue_uaf+0x13c/0x4a8 [ 18.536841] kunit_try_run_case+0x170/0x3f0 [ 18.536937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.537275] kthread+0x328/0x630 [ 18.537631] ret_from_fork+0x10/0x20 [ 18.537797] [ 18.537820] Freed by task 47: [ 18.538106] kasan_save_stack+0x3c/0x68 [ 18.538170] kasan_save_track+0x20/0x40 [ 18.538232] kasan_save_free_info+0x4c/0x78 [ 18.538347] __kasan_slab_free+0x6c/0x98 [ 18.538431] kfree+0x214/0x3c8 [ 18.538763] workqueue_uaf_work+0x18/0x30 [ 18.539065] process_one_work+0x530/0xf98 [ 18.539443] worker_thread+0x8ac/0xf28 [ 18.539725] kthread+0x328/0x630 [ 18.539837] ret_from_fork+0x10/0x20 [ 18.540442] [ 18.540485] Last potentially related work creation: [ 18.540515] kasan_save_stack+0x3c/0x68 [ 18.540559] kasan_record_aux_stack+0xb4/0xc8 [ 18.540601] __queue_work+0x65c/0x1010 [ 18.540637] queue_work_on+0xbc/0xf8 [ 18.540672] workqueue_uaf+0x210/0x4a8 [ 18.541470] kunit_try_run_case+0x170/0x3f0 [ 18.541542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.541604] kthread+0x328/0x630 [ 18.541809] ret_from_fork+0x10/0x20 [ 18.541848] [ 18.542051] The buggy address belongs to the object at fff00000c1764bc0 [ 18.542051] which belongs to the cache kmalloc-32 of size 32 [ 18.542126] The buggy address is located 0 bytes inside of [ 18.542126] freed 32-byte region [fff00000c1764bc0, fff00000c1764be0) [ 18.542709] [ 18.542744] The buggy address belongs to the physical page: [ 18.542785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101764 [ 18.543144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.543722] page_type: f5(slab) [ 18.543778] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.544015] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.544143] page dumped because: kasan: bad access detected [ 18.544553] [ 18.544577] Memory state around the buggy address: [ 18.544825] fff00000c1764a80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 18.545180] fff00000c1764b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.545238] >fff00000c1764b80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 18.545496] ^ [ 18.545693] fff00000c1764c00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.545865] fff00000c1764c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.545980] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
[ 19.944830] ================================================================== [ 19.944885] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.944934] Read of size 1 at addr fff00000c7750000 by task kunit_try_catch/229 [ 19.944983] [ 19.945010] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.945094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.945120] Hardware name: linux,dummy-virt (DT) [ 19.945151] Call trace: [ 19.945188] show_stack+0x20/0x38 (C) [ 19.945234] dump_stack_lvl+0x8c/0xd0 [ 19.945280] print_report+0x118/0x608 [ 19.945368] kasan_report+0xdc/0x128 [ 19.945427] __asan_report_load1_noabort+0x20/0x30 [ 19.945477] mempool_uaf_helper+0x314/0x340 [ 19.945520] mempool_kmalloc_large_uaf+0xc4/0x120 [ 19.945566] kunit_try_run_case+0x170/0x3f0 [ 19.945629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.945692] kthread+0x328/0x630 [ 19.945764] ret_from_fork+0x10/0x20 [ 19.945808] [ 19.945836] The buggy address belongs to the physical page: [ 19.945868] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107750 [ 19.945920] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.945966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.946016] page_type: f8(unknown) [ 19.946052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.946102] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.946151] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.946292] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.946343] head: 0bfffe0000000002 ffffc1ffc31dd401 00000000ffffffff 00000000ffffffff [ 19.946393] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.946432] page dumped because: kasan: bad access detected [ 19.946485] [ 19.946504] Memory state around the buggy address: [ 19.946536] fff00000c774ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.946580] fff00000c774ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.946623] >fff00000c7750000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.946691] ^ [ 19.946722] fff00000c7750080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.946827] fff00000c7750100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.946919] ================================================================== [ 19.981390] ================================================================== [ 19.981501] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.981618] Read of size 1 at addr fff00000c7868000 by task kunit_try_catch/233 [ 19.981696] [ 19.981731] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.981898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.982023] Hardware name: linux,dummy-virt (DT) [ 19.982062] Call trace: [ 19.982087] show_stack+0x20/0x38 (C) [ 19.982136] dump_stack_lvl+0x8c/0xd0 [ 19.982195] print_report+0x118/0x608 [ 19.982402] kasan_report+0xdc/0x128 [ 19.982447] __asan_report_load1_noabort+0x20/0x30 [ 19.982495] mempool_uaf_helper+0x314/0x340 [ 19.982540] mempool_page_alloc_uaf+0xc0/0x118 [ 19.982585] kunit_try_run_case+0x170/0x3f0 [ 19.982665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.982867] kthread+0x328/0x630 [ 19.982937] ret_from_fork+0x10/0x20 [ 19.985170] [ 19.985201] The buggy address belongs to the physical page: [ 19.985233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 19.985287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.985350] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.985398] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.985438] page dumped because: kasan: bad access detected [ 19.985470] [ 19.985488] Memory state around the buggy address: [ 19.985519] fff00000c7867f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.985560] fff00000c7867f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.985601] >fff00000c7868000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.985638] ^ [ 19.985666] fff00000c7868080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.985707] fff00000c7868100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.985744] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
[ 19.957958] ================================================================== [ 19.958108] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.958216] Read of size 1 at addr fff00000c1729240 by task kunit_try_catch/231 [ 19.958322] [ 19.958362] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.958447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.958498] Hardware name: linux,dummy-virt (DT) [ 19.958527] Call trace: [ 19.958550] show_stack+0x20/0x38 (C) [ 19.958599] dump_stack_lvl+0x8c/0xd0 [ 19.958916] print_report+0x118/0x608 [ 19.959083] kasan_report+0xdc/0x128 [ 19.959205] __asan_report_load1_noabort+0x20/0x30 [ 19.959334] mempool_uaf_helper+0x314/0x340 [ 19.959476] mempool_slab_uaf+0xc0/0x118 [ 19.959623] kunit_try_run_case+0x170/0x3f0 [ 19.959667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.959753] kthread+0x328/0x630 [ 19.959918] ret_from_fork+0x10/0x20 [ 19.959974] [ 19.959994] Allocated by task 231: [ 19.960020] kasan_save_stack+0x3c/0x68 [ 19.960291] kasan_save_track+0x20/0x40 [ 19.960366] kasan_save_alloc_info+0x40/0x58 [ 19.960408] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.960620] remove_element+0x16c/0x1f8 [ 19.960789] mempool_alloc_preallocated+0x58/0xc0 [ 19.960914] mempool_uaf_helper+0xa4/0x340 [ 19.961004] mempool_slab_uaf+0xc0/0x118 [ 19.961101] kunit_try_run_case+0x170/0x3f0 [ 19.961207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.961250] kthread+0x328/0x630 [ 19.961291] ret_from_fork+0x10/0x20 [ 19.961326] [ 19.961346] Freed by task 231: [ 19.961372] kasan_save_stack+0x3c/0x68 [ 19.961419] kasan_save_track+0x20/0x40 [ 19.961462] kasan_save_free_info+0x4c/0x78 [ 19.961508] __kasan_mempool_poison_object+0xc0/0x150 [ 19.961547] mempool_free+0x28c/0x328 [ 19.961586] mempool_uaf_helper+0x104/0x340 [ 19.961629] mempool_slab_uaf+0xc0/0x118 [ 19.961681] kunit_try_run_case+0x170/0x3f0 [ 19.961726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.961777] kthread+0x328/0x630 [ 19.961812] ret_from_fork+0x10/0x20 [ 19.961846] [ 19.961865] The buggy address belongs to the object at fff00000c1729240 [ 19.961865] which belongs to the cache test_cache of size 123 [ 19.961933] The buggy address is located 0 bytes inside of [ 19.961933] freed 123-byte region [fff00000c1729240, fff00000c17292bb) [ 19.961992] [ 19.962012] The buggy address belongs to the physical page: [ 19.962066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 19.962133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.962207] page_type: f5(slab) [ 19.962249] raw: 0bfffe0000000000 fff00000c1736a00 dead000000000122 0000000000000000 [ 19.962299] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.962356] page dumped because: kasan: bad access detected [ 19.962400] [ 19.962418] Memory state around the buggy address: [ 19.962463] fff00000c1729100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.962506] fff00000c1729180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.962548] >fff00000c1729200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.962585] ^ [ 19.962625] fff00000c1729280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.962667] fff00000c1729300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962711] ================================================================== [ 19.934765] ================================================================== [ 19.934887] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.935059] Read of size 1 at addr fff00000c1718d00 by task kunit_try_catch/227 [ 19.935179] [ 19.935217] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.935304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.935331] Hardware name: linux,dummy-virt (DT) [ 19.935365] Call trace: [ 19.935388] show_stack+0x20/0x38 (C) [ 19.935442] dump_stack_lvl+0x8c/0xd0 [ 19.935515] print_report+0x118/0x608 [ 19.935563] kasan_report+0xdc/0x128 [ 19.935607] __asan_report_load1_noabort+0x20/0x30 [ 19.935658] mempool_uaf_helper+0x314/0x340 [ 19.935702] mempool_kmalloc_uaf+0xc4/0x120 [ 19.935748] kunit_try_run_case+0x170/0x3f0 [ 19.935822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.935942] kthread+0x328/0x630 [ 19.936008] ret_from_fork+0x10/0x20 [ 19.936190] [ 19.936281] Allocated by task 227: [ 19.936343] kasan_save_stack+0x3c/0x68 [ 19.936431] kasan_save_track+0x20/0x40 [ 19.936579] kasan_save_alloc_info+0x40/0x58 [ 19.936702] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.936862] remove_element+0x130/0x1f8 [ 19.936920] mempool_alloc_preallocated+0x58/0xc0 [ 19.936959] mempool_uaf_helper+0xa4/0x340 [ 19.936995] mempool_kmalloc_uaf+0xc4/0x120 [ 19.937053] kunit_try_run_case+0x170/0x3f0 [ 19.937089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.937132] kthread+0x328/0x630 [ 19.937176] ret_from_fork+0x10/0x20 [ 19.937214] [ 19.937232] Freed by task 227: [ 19.937259] kasan_save_stack+0x3c/0x68 [ 19.937370] kasan_save_track+0x20/0x40 [ 19.937534] kasan_save_free_info+0x4c/0x78 [ 19.937698] __kasan_mempool_poison_object+0xc0/0x150 [ 19.937816] mempool_free+0x28c/0x328 [ 19.937965] mempool_uaf_helper+0x104/0x340 [ 19.938093] mempool_kmalloc_uaf+0xc4/0x120 [ 19.938132] kunit_try_run_case+0x170/0x3f0 [ 19.938177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.938249] kthread+0x328/0x630 [ 19.938286] ret_from_fork+0x10/0x20 [ 19.938323] [ 19.938354] The buggy address belongs to the object at fff00000c1718d00 [ 19.938354] which belongs to the cache kmalloc-128 of size 128 [ 19.938421] The buggy address is located 0 bytes inside of [ 19.938421] freed 128-byte region [fff00000c1718d00, fff00000c1718d80) [ 19.938481] [ 19.938501] The buggy address belongs to the physical page: [ 19.938534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101718 [ 19.938588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.938663] page_type: f5(slab) [ 19.938706] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.938762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.938800] page dumped because: kasan: bad access detected [ 19.938832] [ 19.938849] Memory state around the buggy address: [ 19.938883] fff00000c1718c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.938925] fff00000c1718c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.938980] >fff00000c1718d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.939061] ^ [ 19.939118] fff00000c1718d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.939187] fff00000c1718e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.939279] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
[ 19.884210] ================================================================== [ 19.884269] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.884319] Read of size 1 at addr fff00000c774e001 by task kunit_try_catch/223 [ 19.884374] [ 19.884404] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.884488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.884514] Hardware name: linux,dummy-virt (DT) [ 19.884544] Call trace: [ 19.884567] show_stack+0x20/0x38 (C) [ 19.884615] dump_stack_lvl+0x8c/0xd0 [ 19.884661] print_report+0x118/0x608 [ 19.884707] kasan_report+0xdc/0x128 [ 19.884751] __asan_report_load1_noabort+0x20/0x30 [ 19.884801] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.884848] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.884897] kunit_try_run_case+0x170/0x3f0 [ 19.884943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.884993] kthread+0x328/0x630 [ 19.885038] ret_from_fork+0x10/0x20 [ 19.885086] [ 19.885106] The buggy address belongs to the physical page: [ 19.885312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 19.885383] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.885432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.885526] page_type: f8(unknown) [ 19.885564] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.885613] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.885662] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.885708] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.885784] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 19.885847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.885886] page dumped because: kasan: bad access detected [ 19.885917] [ 19.885935] Memory state around the buggy address: [ 19.885966] fff00000c774df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.886008] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.886048] >fff00000c774e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.886090] ^ [ 19.886131] fff00000c774e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.886183] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.886318] ================================================================== [ 19.876013] ================================================================== [ 19.876093] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.876187] Read of size 1 at addr fff00000c1718973 by task kunit_try_catch/221 [ 19.876238] [ 19.876279] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.876371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876398] Hardware name: linux,dummy-virt (DT) [ 19.876433] Call trace: [ 19.876458] show_stack+0x20/0x38 (C) [ 19.876512] dump_stack_lvl+0x8c/0xd0 [ 19.876562] print_report+0x118/0x608 [ 19.876609] kasan_report+0xdc/0x128 [ 19.876656] __asan_report_load1_noabort+0x20/0x30 [ 19.876706] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.876753] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.876802] kunit_try_run_case+0x170/0x3f0 [ 19.876852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.876903] kthread+0x328/0x630 [ 19.876949] ret_from_fork+0x10/0x20 [ 19.876998] [ 19.877017] Allocated by task 221: [ 19.877047] kasan_save_stack+0x3c/0x68 [ 19.877088] kasan_save_track+0x20/0x40 [ 19.877126] kasan_save_alloc_info+0x40/0x58 [ 19.877176] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.877218] remove_element+0x130/0x1f8 [ 19.877255] mempool_alloc_preallocated+0x58/0xc0 [ 19.877293] mempool_oob_right_helper+0x98/0x2f0 [ 19.877330] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.877367] kunit_try_run_case+0x170/0x3f0 [ 19.877406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.877449] kthread+0x328/0x630 [ 19.877483] ret_from_fork+0x10/0x20 [ 19.877520] [ 19.877540] The buggy address belongs to the object at fff00000c1718900 [ 19.877540] which belongs to the cache kmalloc-128 of size 128 [ 19.877597] The buggy address is located 0 bytes to the right of [ 19.877597] allocated 115-byte region [fff00000c1718900, fff00000c1718973) [ 19.877659] [ 19.877681] The buggy address belongs to the physical page: [ 19.877713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101718 [ 19.877767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.877820] page_type: f5(slab) [ 19.877860] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.877909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.877950] page dumped because: kasan: bad access detected [ 19.877982] [ 19.878001] Memory state around the buggy address: [ 19.878035] fff00000c1718800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.878077] fff00000c1718880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.878119] >fff00000c1718900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.878166] ^ [ 19.878204] fff00000c1718980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.878245] fff00000c1718a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.878284] ================================================================== [ 19.897281] ================================================================== [ 19.897342] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.897405] Read of size 1 at addr fff00000c76702bb by task kunit_try_catch/225 [ 19.897454] [ 19.897486] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.897581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.897664] Hardware name: linux,dummy-virt (DT) [ 19.897707] Call trace: [ 19.897731] show_stack+0x20/0x38 (C) [ 19.897792] dump_stack_lvl+0x8c/0xd0 [ 19.898044] print_report+0x118/0x608 [ 19.898111] kasan_report+0xdc/0x128 [ 19.898226] __asan_report_load1_noabort+0x20/0x30 [ 19.898346] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.898479] mempool_slab_oob_right+0xc0/0x118 [ 19.898582] kunit_try_run_case+0x170/0x3f0 [ 19.898664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899690] kthread+0x328/0x630 [ 19.899794] ret_from_fork+0x10/0x20 [ 19.899945] [ 19.899995] Allocated by task 225: [ 19.900184] kasan_save_stack+0x3c/0x68 [ 19.900233] kasan_save_track+0x20/0x40 [ 19.900303] kasan_save_alloc_info+0x40/0x58 [ 19.900607] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.900659] remove_element+0x16c/0x1f8 [ 19.900697] mempool_alloc_preallocated+0x58/0xc0 [ 19.901064] mempool_oob_right_helper+0x98/0x2f0 [ 19.901179] mempool_slab_oob_right+0xc0/0x118 [ 19.901226] kunit_try_run_case+0x170/0x3f0 [ 19.901264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.901557] kthread+0x328/0x630 [ 19.901720] ret_from_fork+0x10/0x20 [ 19.902001] [ 19.902029] The buggy address belongs to the object at fff00000c7670240 [ 19.902029] which belongs to the cache test_cache of size 123 [ 19.902103] The buggy address is located 0 bytes to the right of [ 19.902103] allocated 123-byte region [fff00000c7670240, fff00000c76702bb) [ 19.902177] [ 19.902199] The buggy address belongs to the physical page: [ 19.902690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107670 [ 19.902995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.903314] page_type: f5(slab) [ 19.903522] raw: 0bfffe0000000000 fff00000c17368c0 dead000000000122 0000000000000000 [ 19.903596] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.903638] page dumped because: kasan: bad access detected [ 19.904020] [ 19.904040] Memory state around the buggy address: [ 19.904143] fff00000c7670180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.904196] fff00000c7670200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.904239] >fff00000c7670280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.904276] ^ [ 19.904579] fff00000c7670300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904840] fff00000c7670380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
[ 19.320622] ================================================================== [ 19.320695] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.320763] Read of size 1 at addr fff00000c1736500 by task kunit_try_catch/215 [ 19.320812] [ 19.320851] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.320940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.320967] Hardware name: linux,dummy-virt (DT) [ 19.321001] Call trace: [ 19.321026] show_stack+0x20/0x38 (C) [ 19.321079] dump_stack_lvl+0x8c/0xd0 [ 19.321130] print_report+0x118/0x608 [ 19.321192] kasan_report+0xdc/0x128 [ 19.321239] __kasan_check_byte+0x54/0x70 [ 19.321285] kmem_cache_destroy+0x34/0x218 [ 19.321334] kmem_cache_double_destroy+0x174/0x300 [ 19.321384] kunit_try_run_case+0x170/0x3f0 [ 19.321433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.321485] kthread+0x328/0x630 [ 19.321533] ret_from_fork+0x10/0x20 [ 19.321581] [ 19.321601] Allocated by task 215: [ 19.321631] kasan_save_stack+0x3c/0x68 [ 19.321673] kasan_save_track+0x20/0x40 [ 19.321711] kasan_save_alloc_info+0x40/0x58 [ 19.321754] __kasan_slab_alloc+0xa8/0xb0 [ 19.321795] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.321843] __kmem_cache_create_args+0x178/0x280 [ 19.321883] kmem_cache_double_destroy+0xc0/0x300 [ 19.321923] kunit_try_run_case+0x170/0x3f0 [ 19.321961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.322004] kthread+0x328/0x630 [ 19.322041] ret_from_fork+0x10/0x20 [ 19.322079] [ 19.322097] Freed by task 215: [ 19.322124] kasan_save_stack+0x3c/0x68 [ 19.322169] kasan_save_track+0x20/0x40 [ 19.322206] kasan_save_free_info+0x4c/0x78 [ 19.322244] __kasan_slab_free+0x6c/0x98 [ 19.322280] kmem_cache_free+0x260/0x470 [ 19.322317] slab_kmem_cache_release+0x38/0x50 [ 19.322356] kmem_cache_release+0x1c/0x30 [ 19.322393] kobject_put+0x17c/0x430 [ 19.322432] sysfs_slab_release+0x1c/0x30 [ 19.322471] kmem_cache_destroy+0x118/0x218 [ 19.322507] kmem_cache_double_destroy+0x128/0x300 [ 19.322546] kunit_try_run_case+0x170/0x3f0 [ 19.322582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.322625] kthread+0x328/0x630 [ 19.322660] ret_from_fork+0x10/0x20 [ 19.322696] [ 19.322717] The buggy address belongs to the object at fff00000c1736500 [ 19.322717] which belongs to the cache kmem_cache of size 208 [ 19.322778] The buggy address is located 0 bytes inside of [ 19.322778] freed 208-byte region [fff00000c1736500, fff00000c17365d0) [ 19.322838] [ 19.322860] The buggy address belongs to the physical page: [ 19.322891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101736 [ 19.322946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.322996] page_type: f5(slab) [ 19.323038] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.323087] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.323127] page dumped because: kasan: bad access detected [ 19.323168] [ 19.323186] Memory state around the buggy address: [ 19.323221] fff00000c1736400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.323266] fff00000c1736480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.323309] >fff00000c1736500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.323347] ^ [ 19.323374] fff00000c1736580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.323417] fff00000c1736600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.323456] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
[ 19.262437] ================================================================== [ 19.262543] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 19.262625] Read of size 1 at addr fff00000c6891000 by task kunit_try_catch/213 [ 19.262676] [ 19.262721] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.262816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.262843] Hardware name: linux,dummy-virt (DT) [ 19.262878] Call trace: [ 19.262902] show_stack+0x20/0x38 (C) [ 19.262955] dump_stack_lvl+0x8c/0xd0 [ 19.263006] print_report+0x118/0x608 [ 19.263053] kasan_report+0xdc/0x128 [ 19.263099] __asan_report_load1_noabort+0x20/0x30 [ 19.263149] kmem_cache_rcu_uaf+0x388/0x468 [ 19.263210] kunit_try_run_case+0x170/0x3f0 [ 19.263259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.263311] kthread+0x328/0x630 [ 19.263360] ret_from_fork+0x10/0x20 [ 19.263409] [ 19.263429] Allocated by task 213: [ 19.263458] kasan_save_stack+0x3c/0x68 [ 19.263499] kasan_save_track+0x20/0x40 [ 19.263535] kasan_save_alloc_info+0x40/0x58 [ 19.263575] __kasan_slab_alloc+0xa8/0xb0 [ 19.263610] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.263651] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.263688] kunit_try_run_case+0x170/0x3f0 [ 19.263725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.263765] kthread+0x328/0x630 [ 19.263801] ret_from_fork+0x10/0x20 [ 19.263835] [ 19.263854] Freed by task 0: [ 19.263882] kasan_save_stack+0x3c/0x68 [ 19.263920] kasan_save_track+0x20/0x40 [ 19.263955] kasan_save_free_info+0x4c/0x78 [ 19.263994] __kasan_slab_free+0x6c/0x98 [ 19.264029] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.264067] rcu_core+0x9f4/0x1e20 [ 19.264103] rcu_core_si+0x18/0x30 [ 19.264137] handle_softirqs+0x374/0xb28 [ 19.264182] __do_softirq+0x1c/0x28 [ 19.264217] [ 19.264237] Last potentially related work creation: [ 19.264263] kasan_save_stack+0x3c/0x68 [ 19.264299] kasan_record_aux_stack+0xb4/0xc8 [ 19.264339] kmem_cache_free+0x120/0x470 [ 19.264375] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.264413] kunit_try_run_case+0x170/0x3f0 [ 19.264449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.264491] kthread+0x328/0x630 [ 19.264527] ret_from_fork+0x10/0x20 [ 19.264562] [ 19.264580] The buggy address belongs to the object at fff00000c6891000 [ 19.264580] which belongs to the cache test_cache of size 200 [ 19.264638] The buggy address is located 0 bytes inside of [ 19.264638] freed 200-byte region [fff00000c6891000, fff00000c68910c8) [ 19.264699] [ 19.264722] The buggy address belongs to the physical page: [ 19.264756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106891 [ 19.264813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.264866] page_type: f5(slab) [ 19.264909] raw: 0bfffe0000000000 fff00000c17363c0 dead000000000122 0000000000000000 [ 19.264958] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.264999] page dumped because: kasan: bad access detected [ 19.265030] [ 19.265050] Memory state around the buggy address: [ 19.265083] fff00000c6890f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.265125] fff00000c6890f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.265178] >fff00000c6891000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.265215] ^ [ 19.265243] fff00000c6891080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.265285] fff00000c6891100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.265323] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
[ 18.808371] ================================================================== [ 18.808437] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 18.808957] Free of addr fff00000c6890001 by task kunit_try_catch/211 [ 18.809016] [ 18.809055] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.810322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.810392] Hardware name: linux,dummy-virt (DT) [ 18.810473] Call trace: [ 18.810499] show_stack+0x20/0x38 (C) [ 18.810553] dump_stack_lvl+0x8c/0xd0 [ 18.811143] print_report+0x118/0x608 [ 18.811332] kasan_report_invalid_free+0xc0/0xe8 [ 18.811384] check_slab_allocation+0xfc/0x108 [ 18.811459] __kasan_slab_pre_free+0x2c/0x48 [ 18.811508] kmem_cache_free+0xf0/0x470 [ 18.811557] kmem_cache_invalid_free+0x184/0x3c8 [ 18.812185] kunit_try_run_case+0x170/0x3f0 [ 18.812499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.812678] kthread+0x328/0x630 [ 18.812794] ret_from_fork+0x10/0x20 [ 18.813108] [ 18.813133] Allocated by task 211: [ 18.813177] kasan_save_stack+0x3c/0x68 [ 18.813220] kasan_save_track+0x20/0x40 [ 18.813257] kasan_save_alloc_info+0x40/0x58 [ 18.813536] __kasan_slab_alloc+0xa8/0xb0 [ 18.813587] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.813662] kmem_cache_invalid_free+0x12c/0x3c8 [ 18.813869] kunit_try_run_case+0x170/0x3f0 [ 18.814199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.814243] kthread+0x328/0x630 [ 18.814279] ret_from_fork+0x10/0x20 [ 18.814322] [ 18.814342] The buggy address belongs to the object at fff00000c6890000 [ 18.814342] which belongs to the cache test_cache of size 200 [ 18.814399] The buggy address is located 1 bytes inside of [ 18.814399] 200-byte region [fff00000c6890000, fff00000c68900c8) [ 18.814944] [ 18.815115] The buggy address belongs to the physical page: [ 18.815151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106890 [ 18.815279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.815333] page_type: f5(slab) [ 18.815375] raw: 0bfffe0000000000 fff00000c1736280 dead000000000122 0000000000000000 [ 18.815961] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.816446] page dumped because: kasan: bad access detected [ 18.816697] [ 18.816718] Memory state around the buggy address: [ 18.816988] fff00000c688ff00: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 18.817239] fff00000c688ff80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 18.817295] >fff00000c6890000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.817335] ^ [ 18.817362] fff00000c6890080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.817414] fff00000c6890100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.817451] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
[ 18.764423] ================================================================== [ 18.765234] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 18.765878] Free of addr fff00000c1732000 by task kunit_try_catch/209 [ 18.765989] [ 18.766214] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.766745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.767027] Hardware name: linux,dummy-virt (DT) [ 18.767463] Call trace: [ 18.767493] show_stack+0x20/0x38 (C) [ 18.768106] dump_stack_lvl+0x8c/0xd0 [ 18.768290] print_report+0x118/0x608 [ 18.768338] kasan_report_invalid_free+0xc0/0xe8 [ 18.768396] check_slab_allocation+0xd4/0x108 [ 18.768445] __kasan_slab_pre_free+0x2c/0x48 [ 18.768963] kmem_cache_free+0xf0/0x470 [ 18.769192] kmem_cache_double_free+0x190/0x3c8 [ 18.769254] kunit_try_run_case+0x170/0x3f0 [ 18.769316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.769366] kthread+0x328/0x630 [ 18.769414] ret_from_fork+0x10/0x20 [ 18.769465] [ 18.769484] Allocated by task 209: [ 18.769774] kasan_save_stack+0x3c/0x68 [ 18.769831] kasan_save_track+0x20/0x40 [ 18.769868] kasan_save_alloc_info+0x40/0x58 [ 18.770204] __kasan_slab_alloc+0xa8/0xb0 [ 18.770429] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.770469] kmem_cache_double_free+0x12c/0x3c8 [ 18.770507] kunit_try_run_case+0x170/0x3f0 [ 18.770665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.770714] kthread+0x328/0x630 [ 18.770754] ret_from_fork+0x10/0x20 [ 18.771143] [ 18.771176] Freed by task 209: [ 18.771203] kasan_save_stack+0x3c/0x68 [ 18.771244] kasan_save_track+0x20/0x40 [ 18.771279] kasan_save_free_info+0x4c/0x78 [ 18.771694] __kasan_slab_free+0x6c/0x98 [ 18.771740] kmem_cache_free+0x260/0x470 [ 18.771777] kmem_cache_double_free+0x140/0x3c8 [ 18.772453] kunit_try_run_case+0x170/0x3f0 [ 18.772505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.772573] kthread+0x328/0x630 [ 18.772776] ret_from_fork+0x10/0x20 [ 18.772850] [ 18.772870] The buggy address belongs to the object at fff00000c1732000 [ 18.772870] which belongs to the cache test_cache of size 200 [ 18.773397] The buggy address is located 0 bytes inside of [ 18.773397] 200-byte region [fff00000c1732000, fff00000c17320c8) [ 18.773462] [ 18.773484] The buggy address belongs to the physical page: [ 18.773815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101732 [ 18.774117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.774204] page_type: f5(slab) [ 18.774435] raw: 0bfffe0000000000 fff00000c1736140 dead000000000122 0000000000000000 [ 18.774491] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.774532] page dumped because: kasan: bad access detected [ 18.774571] [ 18.774591] Memory state around the buggy address: [ 18.774678] fff00000c1731f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.774922] fff00000c1731f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.774968] >fff00000c1732000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.775005] ^ [ 18.775238] fff00000c1732080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.775588] fff00000c1732100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.775631] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
[ 18.236181] ================================================================== [ 18.236252] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 18.236301] Free of addr fff00000c5ccd320 by task kunit_try_catch/192 [ 18.236678] [ 18.236743] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.236842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.236870] Hardware name: linux,dummy-virt (DT) [ 18.236900] Call trace: [ 18.236923] show_stack+0x20/0x38 (C) [ 18.236979] dump_stack_lvl+0x8c/0xd0 [ 18.237036] print_report+0x118/0x608 [ 18.237082] kasan_report_invalid_free+0xc0/0xe8 [ 18.237133] check_slab_allocation+0xd4/0x108 [ 18.237199] __kasan_slab_pre_free+0x2c/0x48 [ 18.237247] kfree+0xe8/0x3c8 [ 18.237289] kfree_sensitive+0x3c/0xb0 [ 18.237337] kmalloc_double_kzfree+0x168/0x308 [ 18.237383] kunit_try_run_case+0x170/0x3f0 [ 18.237434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.237490] kthread+0x328/0x630 [ 18.237535] ret_from_fork+0x10/0x20 [ 18.237581] [ 18.237599] Allocated by task 192: [ 18.237634] kasan_save_stack+0x3c/0x68 [ 18.237677] kasan_save_track+0x20/0x40 [ 18.237714] kasan_save_alloc_info+0x40/0x58 [ 18.238305] __kasan_kmalloc+0xd4/0xd8 [ 18.238679] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.238830] kmalloc_double_kzfree+0xb8/0x308 [ 18.239012] kunit_try_run_case+0x170/0x3f0 [ 18.239088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.239209] kthread+0x328/0x630 [ 18.239341] ret_from_fork+0x10/0x20 [ 18.239380] [ 18.239400] Freed by task 192: [ 18.239722] kasan_save_stack+0x3c/0x68 [ 18.239835] kasan_save_track+0x20/0x40 [ 18.239921] kasan_save_free_info+0x4c/0x78 [ 18.240100] __kasan_slab_free+0x6c/0x98 [ 18.240288] kfree+0x214/0x3c8 [ 18.240356] kfree_sensitive+0x80/0xb0 [ 18.240415] kmalloc_double_kzfree+0x11c/0x308 [ 18.240735] kunit_try_run_case+0x170/0x3f0 [ 18.240865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.241033] kthread+0x328/0x630 [ 18.241225] ret_from_fork+0x10/0x20 [ 18.241303] [ 18.241351] The buggy address belongs to the object at fff00000c5ccd320 [ 18.241351] which belongs to the cache kmalloc-16 of size 16 [ 18.241706] The buggy address is located 0 bytes inside of [ 18.241706] 16-byte region [fff00000c5ccd320, fff00000c5ccd330) [ 18.241925] [ 18.242041] The buggy address belongs to the physical page: [ 18.242139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd [ 18.242285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.242343] page_type: f5(slab) [ 18.242386] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.242706] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.242794] page dumped because: kasan: bad access detected [ 18.242882] [ 18.243074] Memory state around the buggy address: [ 18.243182] fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 18.243309] fff00000c5ccd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.243402] >fff00000c5ccd300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 18.243443] ^ [ 18.243810] fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.243955] fff00000c5ccd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.244125] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
[ 18.221352] ================================================================== [ 18.221471] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 18.221541] Read of size 1 at addr fff00000c5ccd320 by task kunit_try_catch/192 [ 18.221590] [ 18.222037] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.222425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.222636] Hardware name: linux,dummy-virt (DT) [ 18.222777] Call trace: [ 18.222801] show_stack+0x20/0x38 (C) [ 18.223212] dump_stack_lvl+0x8c/0xd0 [ 18.223674] print_report+0x118/0x608 [ 18.223799] kasan_report+0xdc/0x128 [ 18.223952] __kasan_check_byte+0x54/0x70 [ 18.224172] kfree_sensitive+0x30/0xb0 [ 18.224402] kmalloc_double_kzfree+0x168/0x308 [ 18.224612] kunit_try_run_case+0x170/0x3f0 [ 18.224901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.224973] kthread+0x328/0x630 [ 18.225466] ret_from_fork+0x10/0x20 [ 18.225943] [ 18.225996] Allocated by task 192: [ 18.226070] kasan_save_stack+0x3c/0x68 [ 18.226131] kasan_save_track+0x20/0x40 [ 18.226199] kasan_save_alloc_info+0x40/0x58 [ 18.226603] __kasan_kmalloc+0xd4/0xd8 [ 18.226710] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.227002] kmalloc_double_kzfree+0xb8/0x308 [ 18.227194] kunit_try_run_case+0x170/0x3f0 [ 18.227345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.227608] kthread+0x328/0x630 [ 18.228145] ret_from_fork+0x10/0x20 [ 18.228362] [ 18.228596] Freed by task 192: [ 18.228695] kasan_save_stack+0x3c/0x68 [ 18.228834] kasan_save_track+0x20/0x40 [ 18.228932] kasan_save_free_info+0x4c/0x78 [ 18.229052] __kasan_slab_free+0x6c/0x98 [ 18.229209] kfree+0x214/0x3c8 [ 18.229592] kfree_sensitive+0x80/0xb0 [ 18.229860] kmalloc_double_kzfree+0x11c/0x308 [ 18.230171] kunit_try_run_case+0x170/0x3f0 [ 18.230411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.230643] kthread+0x328/0x630 [ 18.230780] ret_from_fork+0x10/0x20 [ 18.230866] [ 18.230936] The buggy address belongs to the object at fff00000c5ccd320 [ 18.230936] which belongs to the cache kmalloc-16 of size 16 [ 18.231406] The buggy address is located 0 bytes inside of [ 18.231406] freed 16-byte region [fff00000c5ccd320, fff00000c5ccd330) [ 18.231516] [ 18.231562] The buggy address belongs to the physical page: [ 18.231793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd [ 18.231940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.232270] page_type: f5(slab) [ 18.232469] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.232550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.232678] page dumped because: kasan: bad access detected [ 18.232864] [ 18.232955] Memory state around the buggy address: [ 18.233305] fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 18.233421] fff00000c5ccd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.233581] >fff00000c5ccd300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 18.233658] ^ [ 18.233801] fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.234099] fff00000c5ccd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.234305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
[ 18.193787] ================================================================== [ 18.193851] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 18.194124] Read of size 1 at addr fff00000c6879fa8 by task kunit_try_catch/188 [ 18.194516] [ 18.194748] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.195327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.195409] Hardware name: linux,dummy-virt (DT) [ 18.195525] Call trace: [ 18.195584] show_stack+0x20/0x38 (C) [ 18.195771] dump_stack_lvl+0x8c/0xd0 [ 18.195876] print_report+0x118/0x608 [ 18.196243] kasan_report+0xdc/0x128 [ 18.196367] __asan_report_load1_noabort+0x20/0x30 [ 18.196447] kmalloc_uaf2+0x3f4/0x468 [ 18.196635] kunit_try_run_case+0x170/0x3f0 [ 18.196913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.196979] kthread+0x328/0x630 [ 18.197048] ret_from_fork+0x10/0x20 [ 18.197099] [ 18.197119] Allocated by task 188: [ 18.197147] kasan_save_stack+0x3c/0x68 [ 18.197201] kasan_save_track+0x20/0x40 [ 18.197237] kasan_save_alloc_info+0x40/0x58 [ 18.197276] __kasan_kmalloc+0xd4/0xd8 [ 18.197312] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.197349] kmalloc_uaf2+0xc4/0x468 [ 18.197382] kunit_try_run_case+0x170/0x3f0 [ 18.197419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.197460] kthread+0x328/0x630 [ 18.197494] ret_from_fork+0x10/0x20 [ 18.197554] [ 18.197571] Freed by task 188: [ 18.197596] kasan_save_stack+0x3c/0x68 [ 18.197640] kasan_save_track+0x20/0x40 [ 18.197683] kasan_save_free_info+0x4c/0x78 [ 18.197982] __kasan_slab_free+0x6c/0x98 [ 18.198374] kfree+0x214/0x3c8 [ 18.198549] kmalloc_uaf2+0x134/0x468 [ 18.198713] kunit_try_run_case+0x170/0x3f0 [ 18.198940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.199055] kthread+0x328/0x630 [ 18.199210] ret_from_fork+0x10/0x20 [ 18.199268] [ 18.199466] The buggy address belongs to the object at fff00000c6879f80 [ 18.199466] which belongs to the cache kmalloc-64 of size 64 [ 18.199642] The buggy address is located 40 bytes inside of [ 18.199642] freed 64-byte region [fff00000c6879f80, fff00000c6879fc0) [ 18.199804] [ 18.199905] The buggy address belongs to the physical page: [ 18.200014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106879 [ 18.200397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.200595] page_type: f5(slab) [ 18.200663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.200815] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 18.200883] page dumped because: kasan: bad access detected [ 18.200964] [ 18.201032] Memory state around the buggy address: [ 18.201095] fff00000c6879e80: 00 00 00 00 02 fc fc fc fc fc fc fc fc fc fc fc [ 18.201321] fff00000c6879f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.201804] >fff00000c6879f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.202124] ^ [ 18.202200] fff00000c687a000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.202306] fff00000c687a080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.202463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
[ 18.145457] ================================================================== [ 18.145772] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 18.146132] Read of size 1 at addr fff00000c5ccd308 by task kunit_try_catch/184 [ 18.146690] [ 18.147052] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.147193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.147488] Hardware name: linux,dummy-virt (DT) [ 18.147600] Call trace: [ 18.147625] show_stack+0x20/0x38 (C) [ 18.147956] dump_stack_lvl+0x8c/0xd0 [ 18.148108] print_report+0x118/0x608 [ 18.148510] kasan_report+0xdc/0x128 [ 18.148650] __asan_report_load1_noabort+0x20/0x30 [ 18.148878] kmalloc_uaf+0x300/0x338 [ 18.149125] kunit_try_run_case+0x170/0x3f0 [ 18.149253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.149311] kthread+0x328/0x630 [ 18.149519] ret_from_fork+0x10/0x20 [ 18.149753] [ 18.149839] Allocated by task 184: [ 18.149869] kasan_save_stack+0x3c/0x68 [ 18.150055] kasan_save_track+0x20/0x40 [ 18.150314] kasan_save_alloc_info+0x40/0x58 [ 18.150486] __kasan_kmalloc+0xd4/0xd8 [ 18.150578] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.150895] kmalloc_uaf+0xb8/0x338 [ 18.151039] kunit_try_run_case+0x170/0x3f0 [ 18.151222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.151469] kthread+0x328/0x630 [ 18.151580] ret_from_fork+0x10/0x20 [ 18.151621] [ 18.151686] Freed by task 184: [ 18.152136] kasan_save_stack+0x3c/0x68 [ 18.152262] kasan_save_track+0x20/0x40 [ 18.152302] kasan_save_free_info+0x4c/0x78 [ 18.152406] __kasan_slab_free+0x6c/0x98 [ 18.152625] kfree+0x214/0x3c8 [ 18.152795] kmalloc_uaf+0x11c/0x338 [ 18.152966] kunit_try_run_case+0x170/0x3f0 [ 18.153095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.153274] kthread+0x328/0x630 [ 18.153650] ret_from_fork+0x10/0x20 [ 18.153857] [ 18.153882] The buggy address belongs to the object at fff00000c5ccd300 [ 18.153882] which belongs to the cache kmalloc-16 of size 16 [ 18.153965] The buggy address is located 8 bytes inside of [ 18.153965] freed 16-byte region [fff00000c5ccd300, fff00000c5ccd310) [ 18.154302] [ 18.154479] The buggy address belongs to the physical page: [ 18.154524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd [ 18.154854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.155012] page_type: f5(slab) [ 18.155218] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.155453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.155540] page dumped because: kasan: bad access detected [ 18.155736] [ 18.155949] Memory state around the buggy address: [ 18.156100] fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 18.156343] fff00000c5ccd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.156576] >fff00000c5ccd300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.156686] ^ [ 18.156826] fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.156973] fff00000c5ccd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.157109] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
[ 18.130736] ================================================================== [ 18.131235] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 18.131305] Read of size 64 at addr fff00000c6879a04 by task kunit_try_catch/182 [ 18.131459] [ 18.131546] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.131728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.131786] Hardware name: linux,dummy-virt (DT) [ 18.131816] Call trace: [ 18.131837] show_stack+0x20/0x38 (C) [ 18.131893] dump_stack_lvl+0x8c/0xd0 [ 18.131938] print_report+0x118/0x608 [ 18.132287] kasan_report+0xdc/0x128 [ 18.132366] kasan_check_range+0x100/0x1a8 [ 18.132496] __asan_memmove+0x3c/0x98 [ 18.132549] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 18.132636] kunit_try_run_case+0x170/0x3f0 [ 18.132823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.132892] kthread+0x328/0x630 [ 18.132938] ret_from_fork+0x10/0x20 [ 18.133123] [ 18.133149] Allocated by task 182: [ 18.133199] kasan_save_stack+0x3c/0x68 [ 18.133242] kasan_save_track+0x20/0x40 [ 18.133278] kasan_save_alloc_info+0x40/0x58 [ 18.133459] __kasan_kmalloc+0xd4/0xd8 [ 18.133545] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.133601] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 18.133948] kunit_try_run_case+0x170/0x3f0 [ 18.134117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.134454] kthread+0x328/0x630 [ 18.134752] ret_from_fork+0x10/0x20 [ 18.134952] [ 18.135034] The buggy address belongs to the object at fff00000c6879a00 [ 18.135034] which belongs to the cache kmalloc-64 of size 64 [ 18.135259] The buggy address is located 4 bytes inside of [ 18.135259] allocated 64-byte region [fff00000c6879a00, fff00000c6879a40) [ 18.135430] [ 18.135753] The buggy address belongs to the physical page: [ 18.135887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106879 [ 18.135993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.136148] page_type: f5(slab) [ 18.136227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.136433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.136538] page dumped because: kasan: bad access detected [ 18.136701] [ 18.136745] Memory state around the buggy address: [ 18.136843] fff00000c6879900: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.136927] fff00000c6879980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.137003] >fff00000c6879a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.137041] ^ [ 18.137343] fff00000c6879a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.137532] fff00000c6879b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.137621] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
[ 18.110273] ================================================================== [ 18.110714] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.110822] Read of size 18446744073709551614 at addr fff00000c6879804 by task kunit_try_catch/180 [ 18.111228] [ 18.111417] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.111619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.111809] Hardware name: linux,dummy-virt (DT) [ 18.111862] Call trace: [ 18.111886] show_stack+0x20/0x38 (C) [ 18.111995] dump_stack_lvl+0x8c/0xd0 [ 18.112485] print_report+0x118/0x608 [ 18.113784] kasan_report+0xdc/0x128 [ 18.114042] kasan_check_range+0x100/0x1a8 [ 18.114294] __asan_memmove+0x3c/0x98 [ 18.114343] kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.114399] kunit_try_run_case+0x170/0x3f0 [ 18.114676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.115082] kthread+0x328/0x630 [ 18.115561] ret_from_fork+0x10/0x20 [ 18.115927] [ 18.116190] Allocated by task 180: [ 18.116235] kasan_save_stack+0x3c/0x68 [ 18.116361] kasan_save_track+0x20/0x40 [ 18.116505] kasan_save_alloc_info+0x40/0x58 [ 18.116831] __kasan_kmalloc+0xd4/0xd8 [ 18.116959] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.117048] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 18.117338] kunit_try_run_case+0x170/0x3f0 [ 18.117552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.117617] kthread+0x328/0x630 [ 18.117820] ret_from_fork+0x10/0x20 [ 18.117868] [ 18.118002] The buggy address belongs to the object at fff00000c6879800 [ 18.118002] which belongs to the cache kmalloc-64 of size 64 [ 18.118546] The buggy address is located 4 bytes inside of [ 18.118546] 64-byte region [fff00000c6879800, fff00000c6879840) [ 18.118625] [ 18.118864] The buggy address belongs to the physical page: [ 18.119037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106879 [ 18.119316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.119416] page_type: f5(slab) [ 18.119590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.119712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.119756] page dumped because: kasan: bad access detected [ 18.119999] [ 18.120068] Memory state around the buggy address: [ 18.120264] fff00000c6879700: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 18.120415] fff00000c6879780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.120710] >fff00000c6879800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.120816] ^ [ 18.120885] fff00000c6879880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.120930] fff00000c6879900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.120979] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
[ 18.085143] ================================================================== [ 18.085470] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 18.085523] Write of size 16 at addr fff00000c68f1669 by task kunit_try_catch/178 [ 18.085926] [ 18.086020] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.086395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.086438] Hardware name: linux,dummy-virt (DT) [ 18.086473] Call trace: [ 18.086497] show_stack+0x20/0x38 (C) [ 18.087092] dump_stack_lvl+0x8c/0xd0 [ 18.087241] print_report+0x118/0x608 [ 18.087334] kasan_report+0xdc/0x128 [ 18.087454] kasan_check_range+0x100/0x1a8 [ 18.087547] __asan_memset+0x34/0x78 [ 18.087928] kmalloc_oob_memset_16+0x150/0x2f8 [ 18.088008] kunit_try_run_case+0x170/0x3f0 [ 18.088181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.088349] kthread+0x328/0x630 [ 18.088427] ret_from_fork+0x10/0x20 [ 18.088866] [ 18.088967] Allocated by task 178: [ 18.089094] kasan_save_stack+0x3c/0x68 [ 18.089231] kasan_save_track+0x20/0x40 [ 18.089362] kasan_save_alloc_info+0x40/0x58 [ 18.089406] __kasan_kmalloc+0xd4/0xd8 [ 18.089486] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.089669] kmalloc_oob_memset_16+0xb0/0x2f8 [ 18.089950] kunit_try_run_case+0x170/0x3f0 [ 18.090122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.090222] kthread+0x328/0x630 [ 18.090279] ret_from_fork+0x10/0x20 [ 18.090554] [ 18.090698] The buggy address belongs to the object at fff00000c68f1600 [ 18.090698] which belongs to the cache kmalloc-128 of size 128 [ 18.090768] The buggy address is located 105 bytes inside of [ 18.090768] allocated 120-byte region [fff00000c68f1600, fff00000c68f1678) [ 18.090861] [ 18.091017] The buggy address belongs to the physical page: [ 18.091230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.091435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.091580] page_type: f5(slab) [ 18.091666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.091722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.091917] page dumped because: kasan: bad access detected [ 18.092142] [ 18.092306] Memory state around the buggy address: [ 18.092469] fff00000c68f1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.092578] fff00000c68f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.092664] >fff00000c68f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.092949] ^ [ 18.093136] fff00000c68f1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093214] fff00000c68f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093396] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
[ 18.067998] ================================================================== [ 18.068056] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 18.068128] Write of size 8 at addr fff00000c68f1571 by task kunit_try_catch/176 [ 18.068229] [ 18.068269] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.068352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.068377] Hardware name: linux,dummy-virt (DT) [ 18.068407] Call trace: [ 18.068436] show_stack+0x20/0x38 (C) [ 18.068484] dump_stack_lvl+0x8c/0xd0 [ 18.068529] print_report+0x118/0x608 [ 18.068583] kasan_report+0xdc/0x128 [ 18.068635] kasan_check_range+0x100/0x1a8 [ 18.068682] __asan_memset+0x34/0x78 [ 18.068736] kmalloc_oob_memset_8+0x150/0x2f8 [ 18.068781] kunit_try_run_case+0x170/0x3f0 [ 18.068825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.068883] kthread+0x328/0x630 [ 18.068927] ret_from_fork+0x10/0x20 [ 18.068977] [ 18.069001] Allocated by task 176: [ 18.069028] kasan_save_stack+0x3c/0x68 [ 18.069066] kasan_save_track+0x20/0x40 [ 18.069101] kasan_save_alloc_info+0x40/0x58 [ 18.069138] __kasan_kmalloc+0xd4/0xd8 [ 18.069972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.070072] kmalloc_oob_memset_8+0xb0/0x2f8 [ 18.070110] kunit_try_run_case+0x170/0x3f0 [ 18.070943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.071017] kthread+0x328/0x630 [ 18.071094] ret_from_fork+0x10/0x20 [ 18.071756] [ 18.071818] The buggy address belongs to the object at fff00000c68f1500 [ 18.071818] which belongs to the cache kmalloc-128 of size 128 [ 18.071948] The buggy address is located 113 bytes inside of [ 18.071948] allocated 120-byte region [fff00000c68f1500, fff00000c68f1578) [ 18.072029] [ 18.072052] The buggy address belongs to the physical page: [ 18.072434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.072492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.072941] page_type: f5(slab) [ 18.073021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.073281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.073484] page dumped because: kasan: bad access detected [ 18.073750] [ 18.074093] Memory state around the buggy address: [ 18.074149] fff00000c68f1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.074542] fff00000c68f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.074633] >fff00000c68f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.074736] ^ [ 18.074816] fff00000c68f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.075052] fff00000c68f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.075305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
[ 18.052676] ================================================================== [ 18.052758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 18.052888] Write of size 4 at addr fff00000c68f1475 by task kunit_try_catch/174 [ 18.053040] [ 18.053075] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.053171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.053197] Hardware name: linux,dummy-virt (DT) [ 18.053225] Call trace: [ 18.053370] show_stack+0x20/0x38 (C) [ 18.053430] dump_stack_lvl+0x8c/0xd0 [ 18.053476] print_report+0x118/0x608 [ 18.053529] kasan_report+0xdc/0x128 [ 18.053573] kasan_check_range+0x100/0x1a8 [ 18.053620] __asan_memset+0x34/0x78 [ 18.053664] kmalloc_oob_memset_4+0x150/0x300 [ 18.053708] kunit_try_run_case+0x170/0x3f0 [ 18.053759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.053810] kthread+0x328/0x630 [ 18.054336] ret_from_fork+0x10/0x20 [ 18.054563] [ 18.054634] Allocated by task 174: [ 18.054683] kasan_save_stack+0x3c/0x68 [ 18.054991] kasan_save_track+0x20/0x40 [ 18.055077] kasan_save_alloc_info+0x40/0x58 [ 18.055218] __kasan_kmalloc+0xd4/0xd8 [ 18.055346] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.055434] kmalloc_oob_memset_4+0xb0/0x300 [ 18.055586] kunit_try_run_case+0x170/0x3f0 [ 18.055625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.055695] kthread+0x328/0x630 [ 18.056016] ret_from_fork+0x10/0x20 [ 18.056128] [ 18.056205] The buggy address belongs to the object at fff00000c68f1400 [ 18.056205] which belongs to the cache kmalloc-128 of size 128 [ 18.056364] The buggy address is located 117 bytes inside of [ 18.056364] allocated 120-byte region [fff00000c68f1400, fff00000c68f1478) [ 18.056525] [ 18.056548] The buggy address belongs to the physical page: [ 18.056607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.056693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.056868] page_type: f5(slab) [ 18.057195] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.057332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.057413] page dumped because: kasan: bad access detected [ 18.057445] [ 18.057470] Memory state around the buggy address: [ 18.057554] fff00000c68f1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.057597] fff00000c68f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.057671] >fff00000c68f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.057723] ^ [ 18.057768] fff00000c68f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.057809] fff00000c68f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.057854] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
[ 18.032217] ================================================================== [ 18.032271] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 18.032318] Write of size 2 at addr fff00000c68f1377 by task kunit_try_catch/172 [ 18.032798] [ 18.033058] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.033415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.033690] Hardware name: linux,dummy-virt (DT) [ 18.033778] Call trace: [ 18.034119] show_stack+0x20/0x38 (C) [ 18.034354] dump_stack_lvl+0x8c/0xd0 [ 18.034717] print_report+0x118/0x608 [ 18.034892] kasan_report+0xdc/0x128 [ 18.035056] kasan_check_range+0x100/0x1a8 [ 18.035152] __asan_memset+0x34/0x78 [ 18.035355] kmalloc_oob_memset_2+0x150/0x2f8 [ 18.035493] kunit_try_run_case+0x170/0x3f0 [ 18.035541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.035741] kthread+0x328/0x630 [ 18.035909] ret_from_fork+0x10/0x20 [ 18.036120] [ 18.036367] Allocated by task 172: [ 18.036538] kasan_save_stack+0x3c/0x68 [ 18.036625] kasan_save_track+0x20/0x40 [ 18.036797] kasan_save_alloc_info+0x40/0x58 [ 18.036954] __kasan_kmalloc+0xd4/0xd8 [ 18.037034] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.037273] kmalloc_oob_memset_2+0xb0/0x2f8 [ 18.037334] kunit_try_run_case+0x170/0x3f0 [ 18.037370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.037411] kthread+0x328/0x630 [ 18.037583] ret_from_fork+0x10/0x20 [ 18.037656] [ 18.037686] The buggy address belongs to the object at fff00000c68f1300 [ 18.037686] which belongs to the cache kmalloc-128 of size 128 [ 18.037974] The buggy address is located 119 bytes inside of [ 18.037974] allocated 120-byte region [fff00000c68f1300, fff00000c68f1378) [ 18.038194] [ 18.038261] The buggy address belongs to the physical page: [ 18.038660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.038739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.038964] page_type: f5(slab) [ 18.039342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.039431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.039722] page dumped because: kasan: bad access detected [ 18.039795] [ 18.039862] Memory state around the buggy address: [ 18.040300] fff00000c68f1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.040386] fff00000c68f1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.040826] >fff00000c68f1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.040923] ^ [ 18.040993] fff00000c68f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.041369] fff00000c68f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.041535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
[ 18.018218] ================================================================== [ 18.018677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 18.018737] Write of size 128 at addr fff00000c68f1200 by task kunit_try_catch/170 [ 18.018792] [ 18.019143] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.019355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.019456] Hardware name: linux,dummy-virt (DT) [ 18.019630] Call trace: [ 18.019710] show_stack+0x20/0x38 (C) [ 18.019825] dump_stack_lvl+0x8c/0xd0 [ 18.020046] print_report+0x118/0x608 [ 18.020130] kasan_report+0xdc/0x128 [ 18.020339] kasan_check_range+0x100/0x1a8 [ 18.020477] __asan_memset+0x34/0x78 [ 18.020606] kmalloc_oob_in_memset+0x144/0x2d0 [ 18.020755] kunit_try_run_case+0x170/0x3f0 [ 18.021089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.021253] kthread+0x328/0x630 [ 18.021474] ret_from_fork+0x10/0x20 [ 18.021592] [ 18.021694] Allocated by task 170: [ 18.021770] kasan_save_stack+0x3c/0x68 [ 18.021811] kasan_save_track+0x20/0x40 [ 18.021853] kasan_save_alloc_info+0x40/0x58 [ 18.022172] __kasan_kmalloc+0xd4/0xd8 [ 18.022375] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.022472] kmalloc_oob_in_memset+0xb0/0x2d0 [ 18.022590] kunit_try_run_case+0x170/0x3f0 [ 18.022821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.022885] kthread+0x328/0x630 [ 18.023084] ret_from_fork+0x10/0x20 [ 18.023181] [ 18.023204] The buggy address belongs to the object at fff00000c68f1200 [ 18.023204] which belongs to the cache kmalloc-128 of size 128 [ 18.023269] The buggy address is located 0 bytes inside of [ 18.023269] allocated 120-byte region [fff00000c68f1200, fff00000c68f1278) [ 18.023328] [ 18.023348] The buggy address belongs to the physical page: [ 18.023378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.023428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.023474] page_type: f5(slab) [ 18.023521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.023582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.023634] page dumped because: kasan: bad access detected [ 18.023674] [ 18.023692] Memory state around the buggy address: [ 18.023724] fff00000c68f1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.023764] fff00000c68f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.023804] >fff00000c68f1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.023849] ^ [ 18.023886] fff00000c68f1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.023927] fff00000c68f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.023963] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
[ 18.003610] ================================================================== [ 18.003711] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 18.003765] Read of size 16 at addr fff00000c5ccd2e0 by task kunit_try_catch/168 [ 18.003825] [ 18.004067] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.004177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.004204] Hardware name: linux,dummy-virt (DT) [ 18.004341] Call trace: [ 18.004399] show_stack+0x20/0x38 (C) [ 18.004452] dump_stack_lvl+0x8c/0xd0 [ 18.004779] print_report+0x118/0x608 [ 18.004892] kasan_report+0xdc/0x128 [ 18.004942] __asan_report_load16_noabort+0x20/0x30 [ 18.005227] kmalloc_uaf_16+0x3bc/0x438 [ 18.005323] kunit_try_run_case+0x170/0x3f0 [ 18.005388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.005441] kthread+0x328/0x630 [ 18.005683] ret_from_fork+0x10/0x20 [ 18.006213] [ 18.006234] Allocated by task 168: [ 18.006285] kasan_save_stack+0x3c/0x68 [ 18.006646] kasan_save_track+0x20/0x40 [ 18.006740] kasan_save_alloc_info+0x40/0x58 [ 18.006782] __kasan_kmalloc+0xd4/0xd8 [ 18.006826] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.006864] kmalloc_uaf_16+0x140/0x438 [ 18.006897] kunit_try_run_case+0x170/0x3f0 [ 18.006941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.006989] kthread+0x328/0x630 [ 18.007023] ret_from_fork+0x10/0x20 [ 18.007057] [ 18.007076] Freed by task 168: [ 18.007102] kasan_save_stack+0x3c/0x68 [ 18.007138] kasan_save_track+0x20/0x40 [ 18.007185] kasan_save_free_info+0x4c/0x78 [ 18.007222] __kasan_slab_free+0x6c/0x98 [ 18.007258] kfree+0x214/0x3c8 [ 18.007298] kmalloc_uaf_16+0x190/0x438 [ 18.007339] kunit_try_run_case+0x170/0x3f0 [ 18.007374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.007429] kthread+0x328/0x630 [ 18.007462] ret_from_fork+0x10/0x20 [ 18.007496] [ 18.007525] The buggy address belongs to the object at fff00000c5ccd2e0 [ 18.007525] which belongs to the cache kmalloc-16 of size 16 [ 18.007580] The buggy address is located 0 bytes inside of [ 18.007580] freed 16-byte region [fff00000c5ccd2e0, fff00000c5ccd2f0) [ 18.007637] [ 18.007656] The buggy address belongs to the physical page: [ 18.007686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd [ 18.007743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.007790] page_type: f5(slab) [ 18.007833] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.007903] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.007951] page dumped because: kasan: bad access detected [ 18.007989] [ 18.008007] Memory state around the buggy address: [ 18.008037] fff00000c5ccd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.008077] fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 18.008132] >fff00000c5ccd280: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 18.008917] ^ [ 18.009011] fff00000c5ccd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.009077] fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.009131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
[ 17.987033] ================================================================== [ 17.987245] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 17.987298] Write of size 16 at addr fff00000c5ccd280 by task kunit_try_catch/166 [ 17.987415] [ 17.987581] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.987667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.987708] Hardware name: linux,dummy-virt (DT) [ 17.987766] Call trace: [ 17.987790] show_stack+0x20/0x38 (C) [ 17.987875] dump_stack_lvl+0x8c/0xd0 [ 17.987942] print_report+0x118/0x608 [ 17.988008] kasan_report+0xdc/0x128 [ 17.988140] __asan_report_store16_noabort+0x20/0x30 [ 17.988214] kmalloc_oob_16+0x3a0/0x3f8 [ 17.988263] kunit_try_run_case+0x170/0x3f0 [ 17.988447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.988510] kthread+0x328/0x630 [ 17.988555] ret_from_fork+0x10/0x20 [ 17.988602] [ 17.988619] Allocated by task 166: [ 17.988655] kasan_save_stack+0x3c/0x68 [ 17.988695] kasan_save_track+0x20/0x40 [ 17.988730] kasan_save_alloc_info+0x40/0x58 [ 17.988776] __kasan_kmalloc+0xd4/0xd8 [ 17.988811] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.988847] kmalloc_oob_16+0xb4/0x3f8 [ 17.988881] kunit_try_run_case+0x170/0x3f0 [ 17.988915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.988955] kthread+0x328/0x630 [ 17.988989] ret_from_fork+0x10/0x20 [ 17.989196] [ 17.989379] The buggy address belongs to the object at fff00000c5ccd280 [ 17.989379] which belongs to the cache kmalloc-16 of size 16 [ 17.989464] The buggy address is located 0 bytes inside of [ 17.989464] allocated 13-byte region [fff00000c5ccd280, fff00000c5ccd28d) [ 17.989603] [ 17.989625] The buggy address belongs to the physical page: [ 17.989758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd [ 17.989863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.990122] page_type: f5(slab) [ 17.990277] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.990430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.990627] page dumped because: kasan: bad access detected [ 17.990882] [ 17.990964] Memory state around the buggy address: [ 17.991085] fff00000c5ccd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.991130] fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 17.991534] >fff00000c5ccd280: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.991622] ^ [ 17.991735] fff00000c5ccd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.991804] fff00000c5ccd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.991866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
[ 17.977080] ================================================================== [ 17.977127] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 17.977189] Read of size 1 at addr fff00000c473de00 by task kunit_try_catch/164 [ 17.977349] [ 17.977425] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.977562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.977617] Hardware name: linux,dummy-virt (DT) [ 17.977647] Call trace: [ 17.977669] show_stack+0x20/0x38 (C) [ 17.977719] dump_stack_lvl+0x8c/0xd0 [ 17.977949] print_report+0x118/0x608 [ 17.978072] kasan_report+0xdc/0x128 [ 17.978196] __asan_report_load1_noabort+0x20/0x30 [ 17.978308] krealloc_uaf+0x4c8/0x520 [ 17.978429] kunit_try_run_case+0x170/0x3f0 [ 17.978554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978637] kthread+0x328/0x630 [ 17.978683] ret_from_fork+0x10/0x20 [ 17.978756] [ 17.978775] Allocated by task 164: [ 17.978801] kasan_save_stack+0x3c/0x68 [ 17.979016] kasan_save_track+0x20/0x40 [ 17.979122] kasan_save_alloc_info+0x40/0x58 [ 17.979220] __kasan_kmalloc+0xd4/0xd8 [ 17.979294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.979393] krealloc_uaf+0xc8/0x520 [ 17.979426] kunit_try_run_case+0x170/0x3f0 [ 17.979609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.979786] kthread+0x328/0x630 [ 17.979933] ret_from_fork+0x10/0x20 [ 17.980020] [ 17.980041] Freed by task 164: [ 17.980068] kasan_save_stack+0x3c/0x68 [ 17.980298] kasan_save_track+0x20/0x40 [ 17.980407] kasan_save_free_info+0x4c/0x78 [ 17.980446] __kasan_slab_free+0x6c/0x98 [ 17.980716] kfree+0x214/0x3c8 [ 17.980825] krealloc_uaf+0x12c/0x520 [ 17.980924] kunit_try_run_case+0x170/0x3f0 [ 17.980981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.981021] kthread+0x328/0x630 [ 17.981065] ret_from_fork+0x10/0x20 [ 17.981099] [ 17.981118] The buggy address belongs to the object at fff00000c473de00 [ 17.981118] which belongs to the cache kmalloc-256 of size 256 [ 17.981183] The buggy address is located 0 bytes inside of [ 17.981183] freed 256-byte region [fff00000c473de00, fff00000c473df00) [ 17.981241] [ 17.981269] The buggy address belongs to the physical page: [ 17.981306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.981374] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.981426] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.981475] page_type: f5(slab) [ 17.981526] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.981584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.981631] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.981687] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.981762] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.981811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.981849] page dumped because: kasan: bad access detected [ 17.981878] [ 17.981895] Memory state around the buggy address: [ 17.982059] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.982222] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.982330] >fff00000c473de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.982399] ^ [ 17.982427] fff00000c473de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.982520] fff00000c473df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.982587] ================================================================== [ 17.969192] ================================================================== [ 17.969333] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 17.969396] Read of size 1 at addr fff00000c473de00 by task kunit_try_catch/164 [ 17.969443] [ 17.969551] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.969851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.969922] Hardware name: linux,dummy-virt (DT) [ 17.969980] Call trace: [ 17.970074] show_stack+0x20/0x38 (C) [ 17.970210] dump_stack_lvl+0x8c/0xd0 [ 17.970316] print_report+0x118/0x608 [ 17.970378] kasan_report+0xdc/0x128 [ 17.970459] __kasan_check_byte+0x54/0x70 [ 17.970606] krealloc_noprof+0x44/0x360 [ 17.970705] krealloc_uaf+0x180/0x520 [ 17.970829] kunit_try_run_case+0x170/0x3f0 [ 17.970940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.971041] kthread+0x328/0x630 [ 17.971086] ret_from_fork+0x10/0x20 [ 17.971141] [ 17.971169] Allocated by task 164: [ 17.971316] kasan_save_stack+0x3c/0x68 [ 17.971550] kasan_save_track+0x20/0x40 [ 17.971648] kasan_save_alloc_info+0x40/0x58 [ 17.971772] __kasan_kmalloc+0xd4/0xd8 [ 17.971841] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.971946] krealloc_uaf+0xc8/0x520 [ 17.971979] kunit_try_run_case+0x170/0x3f0 [ 17.972044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.972358] kthread+0x328/0x630 [ 17.972448] ret_from_fork+0x10/0x20 [ 17.972549] [ 17.972645] Freed by task 164: [ 17.972754] kasan_save_stack+0x3c/0x68 [ 17.972848] kasan_save_track+0x20/0x40 [ 17.973228] kasan_save_free_info+0x4c/0x78 [ 17.973283] __kasan_slab_free+0x6c/0x98 [ 17.973319] kfree+0x214/0x3c8 [ 17.973501] krealloc_uaf+0x12c/0x520 [ 17.973690] kunit_try_run_case+0x170/0x3f0 [ 17.973867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.973912] kthread+0x328/0x630 [ 17.973947] ret_from_fork+0x10/0x20 [ 17.974015] [ 17.974040] The buggy address belongs to the object at fff00000c473de00 [ 17.974040] which belongs to the cache kmalloc-256 of size 256 [ 17.974379] The buggy address is located 0 bytes inside of [ 17.974379] freed 256-byte region [fff00000c473de00, fff00000c473df00) [ 17.974462] [ 17.974499] The buggy address belongs to the physical page: [ 17.974566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.974615] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.974681] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.974942] page_type: f5(slab) [ 17.975029] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.975169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.975281] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.975362] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.975409] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.975455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.975509] page dumped because: kasan: bad access detected [ 17.975547] [ 17.975566] Memory state around the buggy address: [ 17.975596] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.975635] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.975674] >fff00000c473de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.975715] ^ [ 17.975741] fff00000c473de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.975790] fff00000c473df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.975841] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
[ 17.962584] ================================================================== [ 17.962625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.962667] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/162 [ 17.962714] [ 17.962746] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.962824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.962864] Hardware name: linux,dummy-virt (DT) [ 17.962892] Call trace: [ 17.962912] show_stack+0x20/0x38 (C) [ 17.962971] dump_stack_lvl+0x8c/0xd0 [ 17.963014] print_report+0x118/0x608 [ 17.963058] kasan_report+0xdc/0x128 [ 17.963102] __asan_report_store1_noabort+0x20/0x30 [ 17.963151] krealloc_less_oob_helper+0xa58/0xc50 [ 17.963208] krealloc_large_less_oob+0x20/0x38 [ 17.963253] kunit_try_run_case+0x170/0x3f0 [ 17.963306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.963356] kthread+0x328/0x630 [ 17.963411] ret_from_fork+0x10/0x20 [ 17.963456] [ 17.963474] The buggy address belongs to the physical page: [ 17.963503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.963551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.963614] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.963691] page_type: f8(unknown) [ 17.963727] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.963774] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.963839] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.963948] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.964013] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.964060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.964116] page dumped because: kasan: bad access detected [ 17.964171] [ 17.964189] Memory state around the buggy address: [ 17.964217] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.964280] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.964590] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.964646] ^ [ 17.964755] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.964823] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.964880] ================================================================== [ 17.880805] ================================================================== [ 17.880868] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.880919] Write of size 1 at addr fff00000c473dcc9 by task kunit_try_catch/158 [ 17.881200] [ 17.881260] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.881346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.881372] Hardware name: linux,dummy-virt (DT) [ 17.881403] Call trace: [ 17.881625] show_stack+0x20/0x38 (C) [ 17.881710] dump_stack_lvl+0x8c/0xd0 [ 17.881798] print_report+0x118/0x608 [ 17.881884] kasan_report+0xdc/0x128 [ 17.881947] __asan_report_store1_noabort+0x20/0x30 [ 17.882011] krealloc_less_oob_helper+0xa48/0xc50 [ 17.882292] krealloc_less_oob+0x20/0x38 [ 17.882447] kunit_try_run_case+0x170/0x3f0 [ 17.882512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.882883] kthread+0x328/0x630 [ 17.883018] ret_from_fork+0x10/0x20 [ 17.883098] [ 17.883414] Allocated by task 158: [ 17.883460] kasan_save_stack+0x3c/0x68 [ 17.883587] kasan_save_track+0x20/0x40 [ 17.883780] kasan_save_alloc_info+0x40/0x58 [ 17.883841] __kasan_krealloc+0x118/0x178 [ 17.884029] krealloc_noprof+0x128/0x360 [ 17.884186] krealloc_less_oob_helper+0x168/0xc50 [ 17.884262] krealloc_less_oob+0x20/0x38 [ 17.884399] kunit_try_run_case+0x170/0x3f0 [ 17.884436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.884778] kthread+0x328/0x630 [ 17.884889] ret_from_fork+0x10/0x20 [ 17.885094] [ 17.885135] The buggy address belongs to the object at fff00000c473dc00 [ 17.885135] which belongs to the cache kmalloc-256 of size 256 [ 17.885485] The buggy address is located 0 bytes to the right of [ 17.885485] allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9) [ 17.885592] [ 17.885613] The buggy address belongs to the physical page: [ 17.885681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.886055] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.886113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.886178] page_type: f5(slab) [ 17.886217] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.886566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.886639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.886943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.887148] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.887551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.887618] page dumped because: kasan: bad access detected [ 17.887747] [ 17.887800] Memory state around the buggy address: [ 17.887968] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.888091] fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.888138] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.888392] ^ [ 17.888592] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.888685] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.888819] ================================================================== [ 17.910397] ================================================================== [ 17.910467] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.910689] Write of size 1 at addr fff00000c473dceb by task kunit_try_catch/158 [ 17.910789] [ 17.910858] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.910939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.910965] Hardware name: linux,dummy-virt (DT) [ 17.910994] Call trace: [ 17.911075] show_stack+0x20/0x38 (C) [ 17.911131] dump_stack_lvl+0x8c/0xd0 [ 17.911218] print_report+0x118/0x608 [ 17.911264] kasan_report+0xdc/0x128 [ 17.911308] __asan_report_store1_noabort+0x20/0x30 [ 17.911358] krealloc_less_oob_helper+0xa58/0xc50 [ 17.911434] krealloc_less_oob+0x20/0x38 [ 17.911530] kunit_try_run_case+0x170/0x3f0 [ 17.911607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.911660] kthread+0x328/0x630 [ 17.911732] ret_from_fork+0x10/0x20 [ 17.911809] [ 17.911846] Allocated by task 158: [ 17.911873] kasan_save_stack+0x3c/0x68 [ 17.911911] kasan_save_track+0x20/0x40 [ 17.911982] kasan_save_alloc_info+0x40/0x58 [ 17.912021] __kasan_krealloc+0x118/0x178 [ 17.912267] krealloc_noprof+0x128/0x360 [ 17.912334] krealloc_less_oob_helper+0x168/0xc50 [ 17.912436] krealloc_less_oob+0x20/0x38 [ 17.912474] kunit_try_run_case+0x170/0x3f0 [ 17.912509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.912568] kthread+0x328/0x630 [ 17.912603] ret_from_fork+0x10/0x20 [ 17.912637] [ 17.912749] The buggy address belongs to the object at fff00000c473dc00 [ 17.912749] which belongs to the cache kmalloc-256 of size 256 [ 17.912817] The buggy address is located 34 bytes to the right of [ 17.912817] allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9) [ 17.912987] [ 17.913047] The buggy address belongs to the physical page: [ 17.913107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.913185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.913230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.913308] page_type: f5(slab) [ 17.913445] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.913682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.913782] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.913881] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.913929] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.913991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.914153] page dumped because: kasan: bad access detected [ 17.914231] [ 17.914328] Memory state around the buggy address: [ 17.914415] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.914518] fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.914568] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.914605] ^ [ 17.914641] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.914681] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.914716] ================================================================== [ 17.960474] ================================================================== [ 17.960507] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.960547] Write of size 1 at addr fff00000c77560ea by task kunit_try_catch/162 [ 17.960592] [ 17.960629] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.960708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.960732] Hardware name: linux,dummy-virt (DT) [ 17.960760] Call trace: [ 17.960780] show_stack+0x20/0x38 (C) [ 17.960825] dump_stack_lvl+0x8c/0xd0 [ 17.960869] print_report+0x118/0x608 [ 17.960928] kasan_report+0xdc/0x128 [ 17.960975] __asan_report_store1_noabort+0x20/0x30 [ 17.961032] krealloc_less_oob_helper+0xae4/0xc50 [ 17.961079] krealloc_large_less_oob+0x20/0x38 [ 17.961125] kunit_try_run_case+0x170/0x3f0 [ 17.961180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.961231] kthread+0x328/0x630 [ 17.961275] ret_from_fork+0x10/0x20 [ 17.961319] [ 17.961337] The buggy address belongs to the physical page: [ 17.961366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.961416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.961459] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.961517] page_type: f8(unknown) [ 17.961552] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.961598] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.961645] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.961691] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.961770] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.961817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.961855] page dumped because: kasan: bad access detected [ 17.961884] [ 17.961901] Memory state around the buggy address: [ 17.961929] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.961968] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.962019] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.962054] ^ [ 17.962101] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.962140] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.962185] ================================================================== [ 17.944007] ================================================================== [ 17.944061] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.944111] Write of size 1 at addr fff00000c77560c9 by task kunit_try_catch/162 [ 17.944993] [ 17.945035] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.945268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.945317] Hardware name: linux,dummy-virt (DT) [ 17.945365] Call trace: [ 17.945403] show_stack+0x20/0x38 (C) [ 17.945605] dump_stack_lvl+0x8c/0xd0 [ 17.945916] print_report+0x118/0x608 [ 17.946266] kasan_report+0xdc/0x128 [ 17.946409] __asan_report_store1_noabort+0x20/0x30 [ 17.946485] krealloc_less_oob_helper+0xa48/0xc50 [ 17.946533] krealloc_large_less_oob+0x20/0x38 [ 17.946608] kunit_try_run_case+0x170/0x3f0 [ 17.946983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.947108] kthread+0x328/0x630 [ 17.947304] ret_from_fork+0x10/0x20 [ 17.947487] [ 17.947509] The buggy address belongs to the physical page: [ 17.947539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.947875] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.947993] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.948202] page_type: f8(unknown) [ 17.948410] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.948481] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.948607] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.948760] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.948858] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.949248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.949308] page dumped because: kasan: bad access detected [ 17.949443] [ 17.949474] Memory state around the buggy address: [ 17.949582] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.949666] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.949808] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.949926] ^ [ 17.949987] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.950136] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.950398] ================================================================== [ 17.907345] ================================================================== [ 17.907388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.907434] Write of size 1 at addr fff00000c473dcea by task kunit_try_catch/158 [ 17.907481] [ 17.907510] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.907590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.907615] Hardware name: linux,dummy-virt (DT) [ 17.907647] Call trace: [ 17.907669] show_stack+0x20/0x38 (C) [ 17.907717] dump_stack_lvl+0x8c/0xd0 [ 17.907762] print_report+0x118/0x608 [ 17.907806] kasan_report+0xdc/0x128 [ 17.907850] __asan_report_store1_noabort+0x20/0x30 [ 17.907900] krealloc_less_oob_helper+0xae4/0xc50 [ 17.907946] krealloc_less_oob+0x20/0x38 [ 17.907990] kunit_try_run_case+0x170/0x3f0 [ 17.908034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.908084] kthread+0x328/0x630 [ 17.908127] ret_from_fork+0x10/0x20 [ 17.908186] [ 17.908204] Allocated by task 158: [ 17.908230] kasan_save_stack+0x3c/0x68 [ 17.908267] kasan_save_track+0x20/0x40 [ 17.908302] kasan_save_alloc_info+0x40/0x58 [ 17.908339] __kasan_krealloc+0x118/0x178 [ 17.908375] krealloc_noprof+0x128/0x360 [ 17.908409] krealloc_less_oob_helper+0x168/0xc50 [ 17.908445] krealloc_less_oob+0x20/0x38 [ 17.908479] kunit_try_run_case+0x170/0x3f0 [ 17.908513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.908553] kthread+0x328/0x630 [ 17.908586] ret_from_fork+0x10/0x20 [ 17.908619] [ 17.908637] The buggy address belongs to the object at fff00000c473dc00 [ 17.908637] which belongs to the cache kmalloc-256 of size 256 [ 17.908689] The buggy address is located 33 bytes to the right of [ 17.908689] allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9) [ 17.908749] [ 17.908767] The buggy address belongs to the physical page: [ 17.908796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.908845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.908888] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.908936] page_type: f5(slab) [ 17.908970] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.909018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.909066] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.909112] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.909192] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.909268] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.909335] page dumped because: kasan: bad access detected [ 17.909393] [ 17.909422] Memory state around the buggy address: [ 17.909490] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.909558] fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.909629] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.909676] ^ [ 17.909714] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910109] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910170] ================================================================== [ 17.958267] ================================================================== [ 17.958309] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.958352] Write of size 1 at addr fff00000c77560da by task kunit_try_catch/162 [ 17.958399] [ 17.958426] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.958980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.959016] Hardware name: linux,dummy-virt (DT) [ 17.959045] Call trace: [ 17.959066] show_stack+0x20/0x38 (C) [ 17.959115] dump_stack_lvl+0x8c/0xd0 [ 17.959171] print_report+0x118/0x608 [ 17.959215] kasan_report+0xdc/0x128 [ 17.959259] __asan_report_store1_noabort+0x20/0x30 [ 17.959308] krealloc_less_oob_helper+0xa80/0xc50 [ 17.959354] krealloc_large_less_oob+0x20/0x38 [ 17.959400] kunit_try_run_case+0x170/0x3f0 [ 17.959444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.959493] kthread+0x328/0x630 [ 17.959536] ret_from_fork+0x10/0x20 [ 17.959581] [ 17.959600] The buggy address belongs to the physical page: [ 17.959628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.959678] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.959721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.959768] page_type: f8(unknown) [ 17.959803] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.959850] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.959898] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.959944] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.959990] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.960036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.960074] page dumped because: kasan: bad access detected [ 17.960102] [ 17.960120] Memory state around the buggy address: [ 17.960148] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.960196] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.960236] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.960300] ^ [ 17.960336] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.960382] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.960418] ================================================================== [ 17.897052] ================================================================== [ 17.897096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.897142] Write of size 1 at addr fff00000c473dcda by task kunit_try_catch/158 [ 17.897754] [ 17.897931] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.898169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.898207] Hardware name: linux,dummy-virt (DT) [ 17.898266] Call trace: [ 17.898288] show_stack+0x20/0x38 (C) [ 17.898671] dump_stack_lvl+0x8c/0xd0 [ 17.898806] print_report+0x118/0x608 [ 17.898950] kasan_report+0xdc/0x128 [ 17.899106] __asan_report_store1_noabort+0x20/0x30 [ 17.899233] krealloc_less_oob_helper+0xa80/0xc50 [ 17.899305] krealloc_less_oob+0x20/0x38 [ 17.899640] kunit_try_run_case+0x170/0x3f0 [ 17.899750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.899861] kthread+0x328/0x630 [ 17.900064] ret_from_fork+0x10/0x20 [ 17.900153] [ 17.900186] Allocated by task 158: [ 17.900426] kasan_save_stack+0x3c/0x68 [ 17.900514] kasan_save_track+0x20/0x40 [ 17.900581] kasan_save_alloc_info+0x40/0x58 [ 17.900983] __kasan_krealloc+0x118/0x178 [ 17.901101] krealloc_noprof+0x128/0x360 [ 17.901256] krealloc_less_oob_helper+0x168/0xc50 [ 17.901422] krealloc_less_oob+0x20/0x38 [ 17.901531] kunit_try_run_case+0x170/0x3f0 [ 17.901935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.902091] kthread+0x328/0x630 [ 17.902334] ret_from_fork+0x10/0x20 [ 17.902537] [ 17.902588] The buggy address belongs to the object at fff00000c473dc00 [ 17.902588] which belongs to the cache kmalloc-256 of size 256 [ 17.903028] The buggy address is located 17 bytes to the right of [ 17.903028] allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9) [ 17.903166] [ 17.903305] The buggy address belongs to the physical page: [ 17.903376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.903546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.903604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.903692] page_type: f5(slab) [ 17.903963] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.904121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.904866] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.904940] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.905023] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.905099] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.905231] page dumped because: kasan: bad access detected [ 17.905263] [ 17.905466] Memory state around the buggy address: [ 17.905731] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906213] fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.906258] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.906295] ^ [ 17.906330] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906858] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906915] ================================================================== [ 17.952860] ================================================================== [ 17.952940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.953016] Write of size 1 at addr fff00000c77560d0 by task kunit_try_catch/162 [ 17.953082] [ 17.953383] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.953560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.953618] Hardware name: linux,dummy-virt (DT) [ 17.953676] Call trace: [ 17.953770] show_stack+0x20/0x38 (C) [ 17.953845] dump_stack_lvl+0x8c/0xd0 [ 17.953957] print_report+0x118/0x608 [ 17.954077] kasan_report+0xdc/0x128 [ 17.954253] __asan_report_store1_noabort+0x20/0x30 [ 17.954429] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.954675] krealloc_large_less_oob+0x20/0x38 [ 17.954786] kunit_try_run_case+0x170/0x3f0 [ 17.954935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.954988] kthread+0x328/0x630 [ 17.955290] ret_from_fork+0x10/0x20 [ 17.955420] [ 17.955465] The buggy address belongs to the physical page: [ 17.955710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.955808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.955913] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.956224] page_type: f8(unknown) [ 17.956286] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.956483] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.956636] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.956743] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.956848] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.956934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.957765] page dumped because: kasan: bad access detected [ 17.957809] [ 17.957827] Memory state around the buggy address: [ 17.957865] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.957907] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.957950] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.957988] ^ [ 17.958023] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.958064] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.958100] ================================================================== [ 17.890012] ================================================================== [ 17.890057] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.890420] Write of size 1 at addr fff00000c473dcd0 by task kunit_try_catch/158 [ 17.890593] [ 17.890632] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.890813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.890841] Hardware name: linux,dummy-virt (DT) [ 17.891124] Call trace: [ 17.891195] show_stack+0x20/0x38 (C) [ 17.891314] dump_stack_lvl+0x8c/0xd0 [ 17.891400] print_report+0x118/0x608 [ 17.891511] kasan_report+0xdc/0x128 [ 17.891673] __asan_report_store1_noabort+0x20/0x30 [ 17.891810] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.892246] krealloc_less_oob+0x20/0x38 [ 17.892329] kunit_try_run_case+0x170/0x3f0 [ 17.892524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.892735] kthread+0x328/0x630 [ 17.892819] ret_from_fork+0x10/0x20 [ 17.892989] [ 17.893172] Allocated by task 158: [ 17.893231] kasan_save_stack+0x3c/0x68 [ 17.893385] kasan_save_track+0x20/0x40 [ 17.893582] kasan_save_alloc_info+0x40/0x58 [ 17.893681] __kasan_krealloc+0x118/0x178 [ 17.893859] krealloc_noprof+0x128/0x360 [ 17.893899] krealloc_less_oob_helper+0x168/0xc50 [ 17.893960] krealloc_less_oob+0x20/0x38 [ 17.893998] kunit_try_run_case+0x170/0x3f0 [ 17.894319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.894479] kthread+0x328/0x630 [ 17.894589] ret_from_fork+0x10/0x20 [ 17.894711] [ 17.894805] The buggy address belongs to the object at fff00000c473dc00 [ 17.894805] which belongs to the cache kmalloc-256 of size 256 [ 17.894940] The buggy address is located 7 bytes to the right of [ 17.894940] allocated 201-byte region [fff00000c473dc00, fff00000c473dcc9) [ 17.895003] [ 17.895022] The buggy address belongs to the physical page: [ 17.895420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.895657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.895726] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.895789] page_type: f5(slab) [ 17.895835] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.895884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.895946] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.896002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.896050] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.896106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.896166] page dumped because: kasan: bad access detected [ 17.896205] [ 17.896223] Memory state around the buggy address: [ 17.896261] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.896301] fff00000c473dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.896349] >fff00000c473dc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.896384] ^ [ 17.896434] fff00000c473dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.896474] fff00000c473dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.896527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
[ 17.863372] ================================================================== [ 17.863493] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.863545] Write of size 1 at addr fff00000c473daf0 by task kunit_try_catch/156 [ 17.863648] [ 17.863720] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.863803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.864135] Hardware name: linux,dummy-virt (DT) [ 17.864222] Call trace: [ 17.864253] show_stack+0x20/0x38 (C) [ 17.864306] dump_stack_lvl+0x8c/0xd0 [ 17.864428] print_report+0x118/0x608 [ 17.864518] kasan_report+0xdc/0x128 [ 17.864625] __asan_report_store1_noabort+0x20/0x30 [ 17.864679] krealloc_more_oob_helper+0x5c0/0x678 [ 17.864763] krealloc_more_oob+0x20/0x38 [ 17.865071] kunit_try_run_case+0x170/0x3f0 [ 17.865151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.865306] kthread+0x328/0x630 [ 17.865358] ret_from_fork+0x10/0x20 [ 17.865415] [ 17.865492] Allocated by task 156: [ 17.865540] kasan_save_stack+0x3c/0x68 [ 17.865629] kasan_save_track+0x20/0x40 [ 17.865665] kasan_save_alloc_info+0x40/0x58 [ 17.865702] __kasan_krealloc+0x118/0x178 [ 17.865916] krealloc_noprof+0x128/0x360 [ 17.865964] krealloc_more_oob_helper+0x168/0x678 [ 17.866209] krealloc_more_oob+0x20/0x38 [ 17.866376] kunit_try_run_case+0x170/0x3f0 [ 17.866518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.866606] kthread+0x328/0x630 [ 17.866803] ret_from_fork+0x10/0x20 [ 17.866949] [ 17.866971] The buggy address belongs to the object at fff00000c473da00 [ 17.866971] which belongs to the cache kmalloc-256 of size 256 [ 17.867355] The buggy address is located 5 bytes to the right of [ 17.867355] allocated 235-byte region [fff00000c473da00, fff00000c473daeb) [ 17.867493] [ 17.867570] The buggy address belongs to the physical page: [ 17.867686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.867782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.867873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.868199] page_type: f5(slab) [ 17.868269] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.868423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.868646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.868748] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.869208] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.869483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.869623] page dumped because: kasan: bad access detected [ 17.869655] [ 17.869818] Memory state around the buggy address: [ 17.869972] fff00000c473d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870052] fff00000c473da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.870110] >fff00000c473da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.870147] ^ [ 17.870243] fff00000c473db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870609] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870694] ================================================================== [ 17.852844] ================================================================== [ 17.852899] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.852951] Write of size 1 at addr fff00000c473daeb by task kunit_try_catch/156 [ 17.852999] [ 17.853031] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.853113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.853139] Hardware name: linux,dummy-virt (DT) [ 17.853733] Call trace: [ 17.854281] show_stack+0x20/0x38 (C) [ 17.854373] dump_stack_lvl+0x8c/0xd0 [ 17.854442] print_report+0x118/0x608 [ 17.854515] kasan_report+0xdc/0x128 [ 17.854595] __asan_report_store1_noabort+0x20/0x30 [ 17.854666] krealloc_more_oob_helper+0x60c/0x678 [ 17.854747] krealloc_more_oob+0x20/0x38 [ 17.855071] kunit_try_run_case+0x170/0x3f0 [ 17.855149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.855295] kthread+0x328/0x630 [ 17.855379] ret_from_fork+0x10/0x20 [ 17.855751] [ 17.855799] Allocated by task 156: [ 17.855861] kasan_save_stack+0x3c/0x68 [ 17.855924] kasan_save_track+0x20/0x40 [ 17.856059] kasan_save_alloc_info+0x40/0x58 [ 17.856206] __kasan_krealloc+0x118/0x178 [ 17.856340] krealloc_noprof+0x128/0x360 [ 17.856434] krealloc_more_oob_helper+0x168/0x678 [ 17.856743] krealloc_more_oob+0x20/0x38 [ 17.856813] kunit_try_run_case+0x170/0x3f0 [ 17.856885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.856974] kthread+0x328/0x630 [ 17.857093] ret_from_fork+0x10/0x20 [ 17.857146] [ 17.857176] The buggy address belongs to the object at fff00000c473da00 [ 17.857176] which belongs to the cache kmalloc-256 of size 256 [ 17.857483] The buggy address is located 0 bytes to the right of [ 17.857483] allocated 235-byte region [fff00000c473da00, fff00000c473daeb) [ 17.857917] [ 17.858015] The buggy address belongs to the physical page: [ 17.858180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10473c [ 17.858238] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.858311] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.858672] page_type: f5(slab) [ 17.858767] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.858876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.859057] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.859243] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.859320] head: 0bfffe0000000001 ffffc1ffc311cf01 00000000ffffffff 00000000ffffffff [ 17.859382] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.859700] page dumped because: kasan: bad access detected [ 17.859785] [ 17.859923] Memory state around the buggy address: [ 17.860108] fff00000c473d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.860241] fff00000c473da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.860323] >fff00000c473da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.860366] ^ [ 17.860760] fff00000c473db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.860856] fff00000c473db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.860957] ================================================================== [ 17.929018] ================================================================== [ 17.929073] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.929141] Write of size 1 at addr fff00000c77560f0 by task kunit_try_catch/160 [ 17.929630] [ 17.929675] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.930108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.930237] Hardware name: linux,dummy-virt (DT) [ 17.930286] Call trace: [ 17.930308] show_stack+0x20/0x38 (C) [ 17.930608] dump_stack_lvl+0x8c/0xd0 [ 17.930717] print_report+0x118/0x608 [ 17.930886] kasan_report+0xdc/0x128 [ 17.931079] __asan_report_store1_noabort+0x20/0x30 [ 17.931693] krealloc_more_oob_helper+0x5c0/0x678 [ 17.931760] krealloc_large_more_oob+0x20/0x38 [ 17.932220] kunit_try_run_case+0x170/0x3f0 [ 17.932570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.932651] kthread+0x328/0x630 [ 17.932922] ret_from_fork+0x10/0x20 [ 17.933111] [ 17.933223] The buggy address belongs to the physical page: [ 17.933273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.933536] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.933827] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.934204] page_type: f8(unknown) [ 17.934342] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.934548] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.934600] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.934648] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.934695] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.934750] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.934790] page dumped because: kasan: bad access detected [ 17.934820] [ 17.934838] Memory state around the buggy address: [ 17.935029] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.935388] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.935450] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.935574] ^ [ 17.935704] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.935788] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.935892] ================================================================== [ 17.921767] ================================================================== [ 17.922058] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.922115] Write of size 1 at addr fff00000c77560eb by task kunit_try_catch/160 [ 17.922424] [ 17.922591] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.922754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.922845] Hardware name: linux,dummy-virt (DT) [ 17.922987] Call trace: [ 17.923078] show_stack+0x20/0x38 (C) [ 17.923396] dump_stack_lvl+0x8c/0xd0 [ 17.923448] print_report+0x118/0x608 [ 17.923778] kasan_report+0xdc/0x128 [ 17.923859] __asan_report_store1_noabort+0x20/0x30 [ 17.923993] krealloc_more_oob_helper+0x60c/0x678 [ 17.924173] krealloc_large_more_oob+0x20/0x38 [ 17.924294] kunit_try_run_case+0x170/0x3f0 [ 17.924410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.924500] kthread+0x328/0x630 [ 17.924855] ret_from_fork+0x10/0x20 [ 17.924939] [ 17.924990] The buggy address belongs to the physical page: [ 17.925148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107754 [ 17.925240] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.925509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.925879] page_type: f8(unknown) [ 17.925956] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.926038] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.926227] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.926305] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.926560] head: 0bfffe0000000002 ffffc1ffc31dd501 00000000ffffffff 00000000ffffffff [ 17.926638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.926828] page dumped because: kasan: bad access detected [ 17.927071] [ 17.927212] Memory state around the buggy address: [ 17.927298] fff00000c7755f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.927343] fff00000c7756000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.927755] >fff00000c7756080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.927841] ^ [ 17.927915] fff00000c7756100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.927963] fff00000c7756180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.927999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
[ 17.839457] ================================================================== [ 17.839518] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 17.839637] Read of size 1 at addr fff00000c77a0000 by task kunit_try_catch/154 [ 17.839689] [ 17.839751] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.840090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.840123] Hardware name: linux,dummy-virt (DT) [ 17.840370] Call trace: [ 17.840427] show_stack+0x20/0x38 (C) [ 17.840519] dump_stack_lvl+0x8c/0xd0 [ 17.840573] print_report+0x118/0x608 [ 17.840700] kasan_report+0xdc/0x128 [ 17.840792] __asan_report_load1_noabort+0x20/0x30 [ 17.840845] page_alloc_uaf+0x328/0x350 [ 17.840890] kunit_try_run_case+0x170/0x3f0 [ 17.840992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.841047] kthread+0x328/0x630 [ 17.841092] ret_from_fork+0x10/0x20 [ 17.841206] [ 17.841273] The buggy address belongs to the physical page: [ 17.841512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0 [ 17.841583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.842042] page_type: f0(buddy) [ 17.842126] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 17.842318] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 17.842420] page dumped because: kasan: bad access detected [ 17.842490] [ 17.842509] Memory state around the buggy address: [ 17.842542] fff00000c779ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.842881] fff00000c779ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.842939] >fff00000c77a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.843396] ^ [ 17.843435] fff00000c77a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.843741] fff00000c77a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.844056] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
[ 17.811626] ================================================================== [ 17.811714] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 17.811771] Free of addr fff00000c67ec001 by task kunit_try_catch/150 [ 17.811825] [ 17.811943] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.812183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.812208] Hardware name: linux,dummy-virt (DT) [ 17.812237] Call trace: [ 17.812823] show_stack+0x20/0x38 (C) [ 17.812952] dump_stack_lvl+0x8c/0xd0 [ 17.813023] print_report+0x118/0x608 [ 17.813095] kasan_report_invalid_free+0xc0/0xe8 [ 17.814198] __kasan_kfree_large+0x5c/0xa8 [ 17.814285] free_large_kmalloc+0x64/0x190 [ 17.814332] kfree+0x270/0x3c8 [ 17.814373] kmalloc_large_invalid_free+0x108/0x270 [ 17.814421] kunit_try_run_case+0x170/0x3f0 [ 17.814470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.814522] kthread+0x328/0x630 [ 17.814569] ret_from_fork+0x10/0x20 [ 17.814617] [ 17.814638] The buggy address belongs to the physical page: [ 17.814668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067ec [ 17.814718] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.814767] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.815212] page_type: f8(unknown) [ 17.815252] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.815299] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.815941] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.815997] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.816044] head: 0bfffe0000000002 ffffc1ffc319fb01 00000000ffffffff 00000000ffffffff [ 17.816090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.816130] page dumped because: kasan: bad access detected [ 17.816176] [ 17.816194] Memory state around the buggy address: [ 17.816224] fff00000c67ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816264] fff00000c67ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816364] >fff00000c67ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.816404] ^ [ 17.816432] fff00000c67ec080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.816473] fff00000c67ec100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.816522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
[ 17.801723] ================================================================== [ 17.801868] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 17.802117] Read of size 1 at addr fff00000c67ec000 by task kunit_try_catch/148 [ 17.802275] [ 17.802305] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.802471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.802543] Hardware name: linux,dummy-virt (DT) [ 17.802579] Call trace: [ 17.802678] show_stack+0x20/0x38 (C) [ 17.802763] dump_stack_lvl+0x8c/0xd0 [ 17.802808] print_report+0x118/0x608 [ 17.802872] kasan_report+0xdc/0x128 [ 17.802916] __asan_report_load1_noabort+0x20/0x30 [ 17.802965] kmalloc_large_uaf+0x2cc/0x2f8 [ 17.803008] kunit_try_run_case+0x170/0x3f0 [ 17.803317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.803382] kthread+0x328/0x630 [ 17.803586] ret_from_fork+0x10/0x20 [ 17.803637] [ 17.803676] The buggy address belongs to the physical page: [ 17.803705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067ec [ 17.803776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.803898] raw: 0bfffe0000000000 fff00000da478c00 fff00000da478c00 0000000000000000 [ 17.804023] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 17.804133] page dumped because: kasan: bad access detected [ 17.804206] [ 17.804224] Memory state around the buggy address: [ 17.804254] fff00000c67ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804304] fff00000c67ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804448] >fff00000c67ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.804541] ^ [ 17.804596] fff00000c67ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.804635] fff00000c67ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.804671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[ 17.791999] ================================================================== [ 17.792063] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 17.792420] Write of size 1 at addr fff00000c67ee00a by task kunit_try_catch/146 [ 17.792492] [ 17.792531] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.792655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.792680] Hardware name: linux,dummy-virt (DT) [ 17.792709] Call trace: [ 17.792730] show_stack+0x20/0x38 (C) [ 17.792777] dump_stack_lvl+0x8c/0xd0 [ 17.792881] print_report+0x118/0x608 [ 17.792930] kasan_report+0xdc/0x128 [ 17.793050] __asan_report_store1_noabort+0x20/0x30 [ 17.793208] kmalloc_large_oob_right+0x278/0x2b8 [ 17.793255] kunit_try_run_case+0x170/0x3f0 [ 17.793299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.793349] kthread+0x328/0x630 [ 17.793395] ret_from_fork+0x10/0x20 [ 17.793441] [ 17.793476] The buggy address belongs to the physical page: [ 17.793507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067ec [ 17.793556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.793600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.793654] page_type: f8(unknown) [ 17.793691] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.793854] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.793978] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.794050] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.794098] head: 0bfffe0000000002 ffffc1ffc319fb01 00000000ffffffff 00000000ffffffff [ 17.794144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.794195] page dumped because: kasan: bad access detected [ 17.794277] [ 17.794296] Memory state around the buggy address: [ 17.794338] fff00000c67edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.794378] fff00000c67edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.794418] >fff00000c67ee000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794454] ^ [ 17.794481] fff00000c67ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794536] fff00000c67ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794635] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
[ 17.778644] ================================================================== [ 17.778955] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.779221] Write of size 1 at addr fff00000c683df00 by task kunit_try_catch/144 [ 17.779342] [ 17.779371] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.779494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.780076] Hardware name: linux,dummy-virt (DT) [ 17.780153] Call trace: [ 17.780186] show_stack+0x20/0x38 (C) [ 17.780237] dump_stack_lvl+0x8c/0xd0 [ 17.780735] print_report+0x118/0x608 [ 17.780842] kasan_report+0xdc/0x128 [ 17.780939] __asan_report_store1_noabort+0x20/0x30 [ 17.781192] kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.781291] kunit_try_run_case+0x170/0x3f0 [ 17.781340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.781391] kthread+0x328/0x630 [ 17.781482] ret_from_fork+0x10/0x20 [ 17.781575] [ 17.781653] Allocated by task 144: [ 17.781679] kasan_save_stack+0x3c/0x68 [ 17.781719] kasan_save_track+0x20/0x40 [ 17.781798] kasan_save_alloc_info+0x40/0x58 [ 17.781837] __kasan_kmalloc+0xd4/0xd8 [ 17.782364] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.782422] kmalloc_big_oob_right+0xb8/0x2f0 [ 17.782595] kunit_try_run_case+0x170/0x3f0 [ 17.782636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.782840] kthread+0x328/0x630 [ 17.782919] ret_from_fork+0x10/0x20 [ 17.782995] [ 17.783015] The buggy address belongs to the object at fff00000c683c000 [ 17.783015] which belongs to the cache kmalloc-8k of size 8192 [ 17.783350] The buggy address is located 0 bytes to the right of [ 17.783350] allocated 7936-byte region [fff00000c683c000, fff00000c683df00) [ 17.783533] [ 17.783556] The buggy address belongs to the physical page: [ 17.783586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106838 [ 17.783637] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.783863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.783997] page_type: f5(slab) [ 17.784039] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.784090] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.784138] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.784199] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.784247] head: 0bfffe0000000003 ffffc1ffc31a0e01 00000000ffffffff 00000000ffffffff [ 17.784293] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.784331] page dumped because: kasan: bad access detected [ 17.784953] [ 17.784976] Memory state around the buggy address: [ 17.785078] fff00000c683de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.785142] fff00000c683de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.785192] >fff00000c683df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.785256] ^ [ 17.785406] fff00000c683df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.785464] fff00000c683e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.785581] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
[ 17.766684] ================================================================== [ 17.766737] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 17.766785] Write of size 1 at addr fff00000c68f1178 by task kunit_try_catch/142 [ 17.766831] [ 17.766860] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.766940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.766966] Hardware name: linux,dummy-virt (DT) [ 17.766995] Call trace: [ 17.767244] show_stack+0x20/0x38 (C) [ 17.767937] dump_stack_lvl+0x8c/0xd0 [ 17.768180] print_report+0x118/0x608 [ 17.768228] kasan_report+0xdc/0x128 [ 17.768626] __asan_report_store1_noabort+0x20/0x30 [ 17.768879] kmalloc_track_caller_oob_right+0x418/0x488 [ 17.768930] kunit_try_run_case+0x170/0x3f0 [ 17.768976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.769822] kthread+0x328/0x630 [ 17.770046] ret_from_fork+0x10/0x20 [ 17.770189] [ 17.770208] Allocated by task 142: [ 17.770245] kasan_save_stack+0x3c/0x68 [ 17.770371] kasan_save_track+0x20/0x40 [ 17.770408] kasan_save_alloc_info+0x40/0x58 [ 17.770446] __kasan_kmalloc+0xd4/0xd8 [ 17.770480] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 17.770756] kmalloc_track_caller_oob_right+0x184/0x488 [ 17.770872] kunit_try_run_case+0x170/0x3f0 [ 17.770950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.770991] kthread+0x328/0x630 [ 17.771025] ret_from_fork+0x10/0x20 [ 17.771060] [ 17.771079] The buggy address belongs to the object at fff00000c68f1100 [ 17.771079] which belongs to the cache kmalloc-128 of size 128 [ 17.771134] The buggy address is located 0 bytes to the right of [ 17.771134] allocated 120-byte region [fff00000c68f1100, fff00000c68f1178) [ 17.771215] [ 17.771234] The buggy address belongs to the physical page: [ 17.771262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 17.771580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.771629] page_type: f5(slab) [ 17.771875] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.772225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.772272] page dumped because: kasan: bad access detected [ 17.772426] [ 17.772469] Memory state around the buggy address: [ 17.772564] fff00000c68f1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.772615] fff00000c68f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.772714] >fff00000c68f1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.772802] ^ [ 17.772876] fff00000c68f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.772950] fff00000c68f1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.773041] ================================================================== [ 17.763476] ================================================================== [ 17.763544] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.763602] Write of size 1 at addr fff00000c68f1078 by task kunit_try_catch/142 [ 17.763650] [ 17.763686] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.763769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.763795] Hardware name: linux,dummy-virt (DT) [ 17.763825] Call trace: [ 17.763848] show_stack+0x20/0x38 (C) [ 17.763896] dump_stack_lvl+0x8c/0xd0 [ 17.763942] print_report+0x118/0x608 [ 17.763987] kasan_report+0xdc/0x128 [ 17.764032] __asan_report_store1_noabort+0x20/0x30 [ 17.764082] kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.764130] kunit_try_run_case+0x170/0x3f0 [ 17.764204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.764255] kthread+0x328/0x630 [ 17.764334] ret_from_fork+0x10/0x20 [ 17.764383] [ 17.764414] Allocated by task 142: [ 17.764441] kasan_save_stack+0x3c/0x68 [ 17.764480] kasan_save_track+0x20/0x40 [ 17.764515] kasan_save_alloc_info+0x40/0x58 [ 17.764553] __kasan_kmalloc+0xd4/0xd8 [ 17.764605] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 17.764662] kmalloc_track_caller_oob_right+0xa8/0x488 [ 17.764715] kunit_try_run_case+0x170/0x3f0 [ 17.764749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.764790] kthread+0x328/0x630 [ 17.764824] ret_from_fork+0x10/0x20 [ 17.764858] [ 17.764876] The buggy address belongs to the object at fff00000c68f1000 [ 17.764876] which belongs to the cache kmalloc-128 of size 128 [ 17.764930] The buggy address is located 0 bytes to the right of [ 17.764930] allocated 120-byte region [fff00000c68f1000, fff00000c68f1078) [ 17.764990] [ 17.765009] The buggy address belongs to the physical page: [ 17.765039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 17.765090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.765139] page_type: f5(slab) [ 17.765186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.765235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.765274] page dumped because: kasan: bad access detected [ 17.765303] [ 17.765321] Memory state around the buggy address: [ 17.765351] fff00000c68f0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.765393] fff00000c68f0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.765433] >fff00000c68f1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.765469] ^ [ 17.765507] fff00000c68f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.765548] fff00000c68f1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.765585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
[ 17.729303] ================================================================== [ 17.729368] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.729421] Read of size 1 at addr fff00000c67b7000 by task kunit_try_catch/140 [ 17.729467] [ 17.729501] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.730680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.730733] Hardware name: linux,dummy-virt (DT) [ 17.730778] Call trace: [ 17.730801] show_stack+0x20/0x38 (C) [ 17.731107] dump_stack_lvl+0x8c/0xd0 [ 17.731238] print_report+0x118/0x608 [ 17.731288] kasan_report+0xdc/0x128 [ 17.731333] __asan_report_load1_noabort+0x20/0x30 [ 17.731382] kmalloc_node_oob_right+0x2f4/0x330 [ 17.731428] kunit_try_run_case+0x170/0x3f0 [ 17.731474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.731524] kthread+0x328/0x630 [ 17.731569] ret_from_fork+0x10/0x20 [ 17.731615] [ 17.731634] Allocated by task 140: [ 17.731786] kasan_save_stack+0x3c/0x68 [ 17.731890] kasan_save_track+0x20/0x40 [ 17.731955] kasan_save_alloc_info+0x40/0x58 [ 17.732269] __kasan_kmalloc+0xd4/0xd8 [ 17.732309] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 17.732356] kmalloc_node_oob_right+0xbc/0x330 [ 17.732392] kunit_try_run_case+0x170/0x3f0 [ 17.732805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.733310] kthread+0x328/0x630 [ 17.733375] ret_from_fork+0x10/0x20 [ 17.733419] [ 17.734021] The buggy address belongs to the object at fff00000c67b6000 [ 17.734021] which belongs to the cache kmalloc-4k of size 4096 [ 17.734650] The buggy address is located 0 bytes to the right of [ 17.734650] allocated 4096-byte region [fff00000c67b6000, fff00000c67b7000) [ 17.735112] [ 17.735134] The buggy address belongs to the physical page: [ 17.735354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067b0 [ 17.736335] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.736512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.736946] page_type: f5(slab) [ 17.737145] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.737339] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.737615] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.737666] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.738088] head: 0bfffe0000000003 ffffc1ffc319ec01 00000000ffffffff 00000000ffffffff [ 17.738524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.738580] page dumped because: kasan: bad access detected [ 17.738621] [ 17.738639] Memory state around the buggy address: [ 17.738934] fff00000c67b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.739677] fff00000c67b6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.739769] >fff00000c67b7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740084] ^ [ 17.740191] fff00000c67b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740234] fff00000c67b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740272] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
[ 17.701877] ================================================================== [ 17.701947] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.702004] Read of size 1 at addr fff00000c5ccd25f by task kunit_try_catch/138 [ 17.702060] [ 17.702095] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.702186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.702212] Hardware name: linux,dummy-virt (DT) [ 17.702243] Call trace: [ 17.702265] show_stack+0x20/0x38 (C) [ 17.702313] dump_stack_lvl+0x8c/0xd0 [ 17.702359] print_report+0x118/0x608 [ 17.702406] kasan_report+0xdc/0x128 [ 17.702451] __asan_report_load1_noabort+0x20/0x30 [ 17.702500] kmalloc_oob_left+0x2ec/0x320 [ 17.702544] kunit_try_run_case+0x170/0x3f0 [ 17.702590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.702640] kthread+0x328/0x630 [ 17.705832] ret_from_fork+0x10/0x20 [ 17.706261] [ 17.706336] Allocated by task 24: [ 17.706368] kasan_save_stack+0x3c/0x68 [ 17.707039] kasan_save_track+0x20/0x40 [ 17.707165] kasan_save_alloc_info+0x40/0x58 [ 17.707208] __kasan_kmalloc+0xd4/0xd8 [ 17.707244] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 17.708118] kvasprintf+0xe0/0x180 [ 17.708373] __kthread_create_on_node+0x16c/0x350 [ 17.708413] kthread_create_on_node+0xe4/0x130 [ 17.708449] create_worker+0x380/0x6b8 [ 17.709085] worker_thread+0x5dc/0xf28 [ 17.709552] kthread+0x328/0x630 [ 17.709779] ret_from_fork+0x10/0x20 [ 17.709822] [ 17.710144] The buggy address belongs to the object at fff00000c5ccd240 [ 17.710144] which belongs to the cache kmalloc-16 of size 16 [ 17.710456] The buggy address is located 19 bytes to the right of [ 17.710456] allocated 12-byte region [fff00000c5ccd240, fff00000c5ccd24c) [ 17.711146] [ 17.711418] The buggy address belongs to the physical page: [ 17.711581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ccd [ 17.711905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.712362] page_type: f5(slab) [ 17.712522] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.713592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.713768] page dumped because: kasan: bad access detected [ 17.713954] [ 17.714092] Memory state around the buggy address: [ 17.714125] fff00000c5ccd100: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 17.714444] fff00000c5ccd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.714489] >fff00000c5ccd200: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc [ 17.714525] ^ [ 17.714561] fff00000c5ccd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.714600] fff00000c5ccd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.714636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
[ 17.638709] ================================================================== [ 17.638755] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.638800] Write of size 1 at addr fff00000c5c44f78 by task kunit_try_catch/136 [ 17.638846] [ 17.638874] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.638967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.638992] Hardware name: linux,dummy-virt (DT) [ 17.639020] Call trace: [ 17.639041] show_stack+0x20/0x38 (C) [ 17.639954] dump_stack_lvl+0x8c/0xd0 [ 17.640025] print_report+0x118/0x608 [ 17.640399] kasan_report+0xdc/0x128 [ 17.640495] __asan_report_store1_noabort+0x20/0x30 [ 17.640556] kmalloc_oob_right+0x538/0x660 [ 17.640768] kunit_try_run_case+0x170/0x3f0 [ 17.640897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.641061] kthread+0x328/0x630 [ 17.641112] ret_from_fork+0x10/0x20 [ 17.641172] [ 17.641191] Allocated by task 136: [ 17.641219] kasan_save_stack+0x3c/0x68 [ 17.641258] kasan_save_track+0x20/0x40 [ 17.641294] kasan_save_alloc_info+0x40/0x58 [ 17.641331] __kasan_kmalloc+0xd4/0xd8 [ 17.641376] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.641417] kmalloc_oob_right+0xb0/0x660 [ 17.641697] kunit_try_run_case+0x170/0x3f0 [ 17.642050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.642320] kthread+0x328/0x630 [ 17.642363] ret_from_fork+0x10/0x20 [ 17.642883] [ 17.643056] The buggy address belongs to the object at fff00000c5c44f00 [ 17.643056] which belongs to the cache kmalloc-128 of size 128 [ 17.643600] The buggy address is located 5 bytes to the right of [ 17.643600] allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73) [ 17.644315] [ 17.644433] The buggy address belongs to the physical page: [ 17.644565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44 [ 17.644892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.645471] page_type: f5(slab) [ 17.645518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.646109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.646461] page dumped because: kasan: bad access detected [ 17.647150] [ 17.647475] Memory state around the buggy address: [ 17.647554] fff00000c5c44e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.647865] fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.647909] >fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.647946] ^ [ 17.648313] fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.649058] fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.649947] ================================================================== [ 17.655673] ================================================================== [ 17.655805] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.655855] Read of size 1 at addr fff00000c5c44f80 by task kunit_try_catch/136 [ 17.655907] [ 17.655940] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.657134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.657342] Hardware name: linux,dummy-virt (DT) [ 17.657696] Call trace: [ 17.658226] show_stack+0x20/0x38 (C) [ 17.658796] dump_stack_lvl+0x8c/0xd0 [ 17.659551] print_report+0x118/0x608 [ 17.659921] kasan_report+0xdc/0x128 [ 17.660390] __asan_report_load1_noabort+0x20/0x30 [ 17.660931] kmalloc_oob_right+0x5d0/0x660 [ 17.661318] kunit_try_run_case+0x170/0x3f0 [ 17.662113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.662307] kthread+0x328/0x630 [ 17.662888] ret_from_fork+0x10/0x20 [ 17.663569] [ 17.663685] Allocated by task 136: [ 17.663715] kasan_save_stack+0x3c/0x68 [ 17.663770] kasan_save_track+0x20/0x40 [ 17.663807] kasan_save_alloc_info+0x40/0x58 [ 17.663844] __kasan_kmalloc+0xd4/0xd8 [ 17.664752] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.664802] kmalloc_oob_right+0xb0/0x660 [ 17.664838] kunit_try_run_case+0x170/0x3f0 [ 17.665563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.665662] kthread+0x328/0x630 [ 17.665764] ret_from_fork+0x10/0x20 [ 17.666135] [ 17.666389] The buggy address belongs to the object at fff00000c5c44f00 [ 17.666389] which belongs to the cache kmalloc-128 of size 128 [ 17.667080] The buggy address is located 13 bytes to the right of [ 17.667080] allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73) [ 17.667763] [ 17.667788] The buggy address belongs to the physical page: [ 17.668540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44 [ 17.668786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.668844] page_type: f5(slab) [ 17.668898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.669976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.670663] page dumped because: kasan: bad access detected [ 17.670869] [ 17.670989] Memory state around the buggy address: [ 17.671023] fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671066] fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.671107] >fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671656] ^ [ 17.672569] fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.672661] fff00000c5c45080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 17.672699] ================================================================== [ 17.626952] ================================================================== [ 17.627287] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.628085] Write of size 1 at addr fff00000c5c44f73 by task kunit_try_catch/136 [ 17.628199] [ 17.629072] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.629273] Tainted: [N]=TEST [ 17.629687] Hardware name: linux,dummy-virt (DT) [ 17.630323] Call trace: [ 17.630525] show_stack+0x20/0x38 (C) [ 17.631347] dump_stack_lvl+0x8c/0xd0 [ 17.631770] print_report+0x118/0x608 [ 17.631968] kasan_report+0xdc/0x128 [ 17.632087] __asan_report_store1_noabort+0x20/0x30 [ 17.632250] kmalloc_oob_right+0x5a4/0x660 [ 17.632296] kunit_try_run_case+0x170/0x3f0 [ 17.632371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.632492] kthread+0x328/0x630 [ 17.632743] ret_from_fork+0x10/0x20 [ 17.633020] [ 17.633082] Allocated by task 136: [ 17.633501] kasan_save_stack+0x3c/0x68 [ 17.633796] kasan_save_track+0x20/0x40 [ 17.633850] kasan_save_alloc_info+0x40/0x58 [ 17.633888] __kasan_kmalloc+0xd4/0xd8 [ 17.633937] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.633976] kmalloc_oob_right+0xb0/0x660 [ 17.634020] kunit_try_run_case+0x170/0x3f0 [ 17.634062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.634111] kthread+0x328/0x630 [ 17.634154] ret_from_fork+0x10/0x20 [ 17.634219] [ 17.634303] The buggy address belongs to the object at fff00000c5c44f00 [ 17.634303] which belongs to the cache kmalloc-128 of size 128 [ 17.634425] The buggy address is located 0 bytes to the right of [ 17.634425] allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73) [ 17.634491] [ 17.634574] The buggy address belongs to the physical page: [ 17.634986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44 [ 17.635828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.636326] page_type: f5(slab) [ 17.636951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.637014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.637520] page dumped because: kasan: bad access detected [ 17.637568] [ 17.637593] Memory state around the buggy address: [ 17.637832] fff00000c5c44e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.637898] fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.637950] >fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.638001] ^ [ 17.638082] fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.638123] fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.638196] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
------------[ cut here ]------------ [ 95.807831] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 95.809533] Modules linked in: [ 95.810059] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 95.811324] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 95.811551] Hardware name: linux,dummy-virt (DT) [ 95.811750] pstate: 11400009 (nzcV daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 95.812024] pc : intlog10+0x38/0x48 [ 95.812222] lr : intlog10_test+0xe4/0x200 [ 95.812411] sp : ffff8000820a7c10 [ 95.812570] x29: ffff8000820a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.812927] x26: 1ffe0000191d51a1 x25: 0000000000000000 x24: ffff8000820a7ce0 [ 95.813575] x23: ffff8000820a7d00 x22: 0000000000000000 x21: 1ffff00010414f82 [ 95.814517] x20: ffff950704478400 x19: ffff800080087990 x18: fff00000c10ebc30 [ 95.815528] x17: 0000000067c0eb91 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 95.816311] x14: 00000000f1f1f1f1 x13: 1ffe00001b48a5c5 x12: ffff72a0e1061579 [ 95.817068] x11: 1ffff2a0e1061578 x10: ffff72a0e1061578 x9 : ffff950701a20e84 [ 95.817868] x8 : ffff95070830abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.818621] x5 : ffff700010414f82 x4 : 1ffff00010010f3a x3 : 1ffff2a0e088f080 [ 95.819372] x2 : 1ffff2a0e088f080 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.820121] Call trace: [ 95.820425] intlog10+0x38/0x48 (P) [ 95.820826] kunit_try_run_case+0x170/0x3f0 [ 95.821277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.821887] kthread+0x328/0x630 [ 95.822384] ret_from_fork+0x10/0x20 [ 95.822888] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
------------[ cut here ]------------ [ 95.756894] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 95.759030] Modules linked in: [ 95.759716] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 95.760853] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 95.761072] Hardware name: linux,dummy-virt (DT) [ 95.761739] pstate: 11400009 (nzcV daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 95.762829] pc : intlog2+0xd8/0xf8 [ 95.763295] lr : intlog2_test+0xe4/0x200 [ 95.763928] sp : ffff8000820a7c10 [ 95.764417] x29: ffff8000820a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.765213] x26: 1ffe0000182e4661 x25: 0000000000000000 x24: ffff8000820a7ce0 [ 95.766168] x23: ffff8000820a7d00 x22: 0000000000000000 x21: 1ffff00010414f82 [ 95.766988] x20: ffff950704478300 x19: ffff800080087990 x18: 00000000f82703a8 [ 95.767349] x17: 00000000b72a11d1 x16: 0000000000000100 x15: 00000000005fc93d [ 95.767683] x14: 00000000f1f1f1f1 x13: 1ffe00001b48e981 x12: ffff72a0e1061579 [ 95.768015] x11: 1ffff2a0e1061578 x10: ffff72a0e1061578 x9 : ffff950701a21084 [ 95.769121] x8 : ffff95070830abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.770279] x5 : ffff700010414f82 x4 : 1ffff00010010f3a x3 : 1ffff2a0e088f060 [ 95.771479] x2 : 1ffff2a0e088f060 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.772393] Call trace: [ 95.772897] intlog2+0xd8/0xf8 (P) [ 95.773499] kunit_try_run_case+0x170/0x3f0 [ 95.774059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.774843] kthread+0x328/0x630 [ 95.775363] ret_from_fork+0x10/0x20 [ 95.775845] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
<8>[ 263.203859] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>