Date
May 15, 2025, 10:38 a.m.
Failure - log-parser-test - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
[ 71.156299] ================================================================== [ 71.156417] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 71.156417] [ 71.156545] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#138): [ 71.156705] test_corruption+0x284/0x378 [ 71.160252] kunit_try_run_case+0x170/0x3f0 [ 71.164419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.169888] kthread+0x328/0x630 [ 71.173099] ret_from_fork+0x10/0x20 [ 71.176658] [ 71.178137] kfence-#138: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 71.178137] [ 71.187771] allocated by task 356 on cpu 6 at 71.156241s (0.031528s ago): [ 71.194553] test_alloc+0x29c/0x628 [ 71.198012] test_corruption+0x198/0x378 [ 71.201918] kunit_try_run_case+0x170/0x3f0 [ 71.206085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.211553] kthread+0x328/0x630 [ 71.214765] ret_from_fork+0x10/0x20 [ 71.218324] [ 71.219805] freed by task 356 on cpu 6 at 71.156256s (0.063545s ago): [ 71.226238] test_corruption+0x284/0x378 [ 71.230129] kunit_try_run_case+0x170/0x3f0 [ 71.234296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.239765] kthread+0x328/0x630 [ 71.242977] ret_from_fork+0x10/0x20 [ 71.246536] [ 71.248021] CPU: 6 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 71.259130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.263290] Hardware name: WinLink E850-96 board (DT) [ 71.268326] ================================================================== [ 71.376295] ================================================================== [ 71.376416] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 71.376416] [ 71.376547] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 71.378950] test_corruption+0x120/0x378 [ 71.382856] kunit_try_run_case+0x170/0x3f0 [ 71.387023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.392492] kthread+0x328/0x630 [ 71.395704] ret_from_fork+0x10/0x20 [ 71.399264] [ 71.400742] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.400742] [ 71.409856] allocated by task 358 on cpu 6 at 71.376236s (0.033617s ago): [ 71.416640] test_alloc+0x230/0x628 [ 71.420096] test_corruption+0xdc/0x378 [ 71.423915] kunit_try_run_case+0x170/0x3f0 [ 71.428082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.433551] kthread+0x328/0x630 [ 71.436762] ret_from_fork+0x10/0x20 [ 71.440321] [ 71.441801] freed by task 358 on cpu 6 at 71.376250s (0.065546s ago): [ 71.448237] test_corruption+0x120/0x378 [ 71.452127] kunit_try_run_case+0x170/0x3f0 [ 71.456294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.461762] kthread+0x328/0x630 [ 71.464974] ret_from_fork+0x10/0x20 [ 71.468535] [ 71.470020] CPU: 6 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 71.481127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.485287] Hardware name: WinLink E850-96 board (DT) [ 71.490324] ================================================================== [ 70.932318] ================================================================== [ 70.932449] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 70.932449] [ 70.932583] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#136): [ 70.934983] test_corruption+0x278/0x378 [ 70.938888] kunit_try_run_case+0x170/0x3f0 [ 70.943054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.948523] kthread+0x328/0x630 [ 70.951735] ret_from_fork+0x10/0x20 [ 70.955295] [ 70.956773] kfence-#136: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.956773] [ 70.966407] allocated by task 356 on cpu 6 at 70.932253s (0.034152s ago): [ 70.973192] test_alloc+0x29c/0x628 [ 70.976648] test_corruption+0xdc/0x378 [ 70.980468] kunit_try_run_case+0x170/0x3f0 [ 70.984634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.990102] kthread+0x328/0x630 [ 70.993314] ret_from_fork+0x10/0x20 [ 70.996873] [ 70.998354] freed by task 356 on cpu 6 at 70.932268s (0.066082s ago): [ 71.004789] test_corruption+0x278/0x378 [ 71.008678] kunit_try_run_case+0x170/0x3f0 [ 71.012845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.018314] kthread+0x328/0x630 [ 71.021526] ret_from_fork+0x10/0x20 [ 71.025086] [ 71.026571] CPU: 6 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 71.037680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.041839] Hardware name: WinLink E850-96 board (DT) [ 71.046875] ================================================================== [ 71.600301] ================================================================== [ 71.600417] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 71.600417] [ 71.600544] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#142): [ 71.600701] test_corruption+0x1d8/0x378 [ 71.604253] kunit_try_run_case+0x170/0x3f0 [ 71.608420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.613888] kthread+0x328/0x630 [ 71.617100] ret_from_fork+0x10/0x20 [ 71.620661] [ 71.622138] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.622138] [ 71.631252] allocated by task 358 on cpu 6 at 71.600242s (0.031007s ago): [ 71.638033] test_alloc+0x230/0x628 [ 71.641492] test_corruption+0x198/0x378 [ 71.645398] kunit_try_run_case+0x170/0x3f0 [ 71.649565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.655034] kthread+0x328/0x630 [ 71.658245] ret_from_fork+0x10/0x20 [ 71.661804] [ 71.663284] freed by task 358 on cpu 6 at 71.600256s (0.063024s ago): [ 71.669719] test_corruption+0x1d8/0x378 [ 71.673610] kunit_try_run_case+0x170/0x3f0 [ 71.677776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.683245] kthread+0x328/0x630 [ 71.686457] ret_from_fork+0x10/0x20 [ 71.690017] [ 71.691502] CPU: 6 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 71.702611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.706770] Hardware name: WinLink E850-96 board (DT) [ 71.711807] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
[ 33.711297] ================================================================== [ 33.711476] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.711602] Free of addr ffff000801ee6000 by task kunit_try_catch/254 [ 33.713008] [ 33.714496] CPU: 6 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 33.714555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.714572] Hardware name: WinLink E850-96 board (DT) [ 33.714594] Call trace: [ 33.714606] show_stack+0x20/0x38 (C) [ 33.714644] dump_stack_lvl+0x8c/0xd0 [ 33.714677] print_report+0x118/0x608 [ 33.714713] kasan_report_invalid_free+0xc0/0xe8 [ 33.714746] check_slab_allocation+0xd4/0x108 [ 33.714783] __kasan_slab_pre_free+0x2c/0x48 [ 33.714813] kmem_cache_free+0xf0/0x470 [ 33.714846] kmem_cache_double_free+0x190/0x3c8 [ 33.714875] kunit_try_run_case+0x170/0x3f0 [ 33.714910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.714946] kthread+0x328/0x630 [ 33.714980] ret_from_fork+0x10/0x20 [ 33.715015] [ 33.787572] Allocated by task 254: [ 33.790960] kasan_save_stack+0x3c/0x68 [ 33.794776] kasan_save_track+0x20/0x40 [ 33.798597] kasan_save_alloc_info+0x40/0x58 [ 33.802849] __kasan_slab_alloc+0xa8/0xb0 [ 33.806842] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 33.811443] kmem_cache_double_free+0x12c/0x3c8 [ 33.815957] kunit_try_run_case+0x170/0x3f0 [ 33.820123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.825592] kthread+0x328/0x630 [ 33.828803] ret_from_fork+0x10/0x20 [ 33.832362] [ 33.833839] Freed by task 254: [ 33.836877] kasan_save_stack+0x3c/0x68 [ 33.840696] kasan_save_track+0x20/0x40 [ 33.844515] kasan_save_free_info+0x4c/0x78 [ 33.848681] __kasan_slab_free+0x6c/0x98 [ 33.852589] kmem_cache_free+0x260/0x470 [ 33.856494] kmem_cache_double_free+0x140/0x3c8 [ 33.861008] kunit_try_run_case+0x170/0x3f0 [ 33.865175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.870643] kthread+0x328/0x630 [ 33.873855] ret_from_fork+0x10/0x20 [ 33.877414] [ 33.878891] The buggy address belongs to the object at ffff000801ee6000 [ 33.878891] which belongs to the cache test_cache of size 200 [ 33.891304] The buggy address is located 0 bytes inside of [ 33.891304] 200-byte region [ffff000801ee6000, ffff000801ee60c8) [ 33.902847] [ 33.904327] The buggy address belongs to the physical page: [ 33.909883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ee6 [ 33.917868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.925507] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.932449] page_type: f5(slab) [ 33.935587] raw: 0bfffe0000000040 ffff000801ee4000 dead000000000122 0000000000000000 [ 33.943305] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.951032] head: 0bfffe0000000040 ffff000801ee4000 dead000000000122 0000000000000000 [ 33.958843] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.966656] head: 0bfffe0000000001 fffffdffe007b981 00000000ffffffff 00000000ffffffff [ 33.974467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.982273] page dumped because: kasan: bad access detected [ 33.987828] [ 33.989304] Memory state around the buggy address: [ 33.994086] ffff000801ee5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.001287] ffff000801ee5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.008494] >ffff000801ee6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.015693] ^ [ 34.018908] ffff000801ee6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.026113] ffff000801ee6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.033316] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
[ 26.186501] ================================================================== [ 26.193607] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.200198] Read of size 1 at addr ffff0008034c8a00 by task kunit_try_catch/209 [ 26.207489] [ 26.208971] CPU: 7 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 26.209020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.209035] Hardware name: WinLink E850-96 board (DT) [ 26.209054] Call trace: [ 26.209068] show_stack+0x20/0x38 (C) [ 26.209099] dump_stack_lvl+0x8c/0xd0 [ 26.209130] print_report+0x118/0x608 [ 26.209163] kasan_report+0xdc/0x128 [ 26.209192] __asan_report_load1_noabort+0x20/0x30 [ 26.209225] krealloc_uaf+0x4c8/0x520 [ 26.209251] kunit_try_run_case+0x170/0x3f0 [ 26.209280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.209312] kthread+0x328/0x630 [ 26.209344] ret_from_fork+0x10/0x20 [ 26.209374] [ 26.272505] Allocated by task 209: [ 26.275892] kasan_save_stack+0x3c/0x68 [ 26.279710] kasan_save_track+0x20/0x40 [ 26.283529] kasan_save_alloc_info+0x40/0x58 [ 26.287783] __kasan_kmalloc+0xd4/0xd8 [ 26.291515] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.296029] krealloc_uaf+0xc8/0x520 [ 26.299588] kunit_try_run_case+0x170/0x3f0 [ 26.303754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.309223] kthread+0x328/0x630 [ 26.312435] ret_from_fork+0x10/0x20 [ 26.315994] [ 26.317470] Freed by task 209: [ 26.320509] kasan_save_stack+0x3c/0x68 [ 26.324327] kasan_save_track+0x20/0x40 [ 26.328147] kasan_save_free_info+0x4c/0x78 [ 26.332313] __kasan_slab_free+0x6c/0x98 [ 26.336220] kfree+0x214/0x3c8 [ 26.339258] krealloc_uaf+0x12c/0x520 [ 26.342903] kunit_try_run_case+0x170/0x3f0 [ 26.347070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.352539] kthread+0x328/0x630 [ 26.355750] ret_from_fork+0x10/0x20 [ 26.359310] [ 26.360787] The buggy address belongs to the object at ffff0008034c8a00 [ 26.360787] which belongs to the cache kmalloc-256 of size 256 [ 26.373287] The buggy address is located 0 bytes inside of [ 26.373287] freed 256-byte region [ffff0008034c8a00, ffff0008034c8b00) [ 26.385351] [ 26.386828] The buggy address belongs to the physical page: [ 26.392385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8 [ 26.400368] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.408008] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.414951] page_type: f5(slab) [ 26.418084] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.425808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.433534] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.441346] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.449159] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff [ 26.456971] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.464778] page dumped because: kasan: bad access detected [ 26.470332] [ 26.471807] Memory state around the buggy address: [ 26.476586] ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.483790] ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.490995] >ffff0008034c8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.498196] ^ [ 26.501412] ffff0008034c8a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.508616] ffff0008034c8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.515818] ================================================================== [ 25.844008] ================================================================== [ 25.853942] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.860534] Read of size 1 at addr ffff0008034c8a00 by task kunit_try_catch/209 [ 25.867825] [ 25.869310] CPU: 7 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 25.869366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.869384] Hardware name: WinLink E850-96 board (DT) [ 25.869405] Call trace: [ 25.869419] show_stack+0x20/0x38 (C) [ 25.869454] dump_stack_lvl+0x8c/0xd0 [ 25.869486] print_report+0x118/0x608 [ 25.869518] kasan_report+0xdc/0x128 [ 25.869547] __kasan_check_byte+0x54/0x70 [ 25.869578] krealloc_noprof+0x44/0x360 [ 25.869612] krealloc_uaf+0x180/0x520 [ 25.869639] kunit_try_run_case+0x170/0x3f0 [ 25.869671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.869703] kthread+0x328/0x630 [ 25.869737] ret_from_fork+0x10/0x20 [ 25.869771] [ 25.935878] Allocated by task 209: [ 25.939267] kasan_save_stack+0x3c/0x68 [ 25.943083] kasan_save_track+0x20/0x40 [ 25.946904] kasan_save_alloc_info+0x40/0x58 [ 25.951156] __kasan_kmalloc+0xd4/0xd8 [ 25.954888] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.959402] krealloc_uaf+0xc8/0x520 [ 25.962961] kunit_try_run_case+0x170/0x3f0 [ 25.967128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.972597] kthread+0x328/0x630 [ 25.975808] ret_from_fork+0x10/0x20 [ 25.979367] [ 25.980844] Freed by task 209: [ 25.983884] kasan_save_stack+0x3c/0x68 [ 25.987701] kasan_save_track+0x20/0x40 [ 25.991520] kasan_save_free_info+0x4c/0x78 [ 25.995686] __kasan_slab_free+0x6c/0x98 [ 25.999593] kfree+0x214/0x3c8 [ 26.002631] krealloc_uaf+0x12c/0x520 [ 26.006276] kunit_try_run_case+0x170/0x3f0 [ 26.010443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.015912] kthread+0x328/0x630 [ 26.019124] ret_from_fork+0x10/0x20 [ 26.022682] [ 26.024161] The buggy address belongs to the object at ffff0008034c8a00 [ 26.024161] which belongs to the cache kmalloc-256 of size 256 [ 26.036662] The buggy address is located 0 bytes inside of [ 26.036662] freed 256-byte region [ffff0008034c8a00, ffff0008034c8b00) [ 26.048725] [ 26.050203] The buggy address belongs to the physical page: [ 26.055759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8 [ 26.063744] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.071382] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.078326] page_type: f5(slab) [ 26.081463] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.089181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.096908] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.104719] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.112532] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff [ 26.120344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.128149] page dumped because: kasan: bad access detected [ 26.133705] [ 26.135180] Memory state around the buggy address: [ 26.139962] ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.147164] ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.154371] >ffff0008034c8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.161570] ^ [ 26.164784] ffff0008034c8a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.171990] ffff0008034c8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.179192] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
[ 75.817964] ================================================================== [ 75.818151] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 75.818151] [ 75.818304] Invalid read at 0x(____ptrval____): [ 75.819420] test_invalid_access+0xdc/0x1f0 [ 75.823663] kunit_try_run_case+0x170/0x3f0 [ 75.827789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.833252] kthread+0x328/0x630 [ 75.836465] ret_from_fork+0x10/0x20 [ 75.839993] [ 75.841506] CPU: 0 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 75.852616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.856774] Hardware name: WinLink E850-96 board (DT) [ 75.861812] ==================================================================
Failure - log-parser-test - internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-test/internal-error-oops-oops-smp: Failure
[ 162.104747] Internal error: Oops: 0000000096000005 [#1] SMP [ 162.110317] Modules linked in: [ 162.113361] CPU: 1 UID: 0 PID: 577 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 162.124469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 162.128627] Hardware name: WinLink E850-96 board (DT) [ 162.133664] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 162.140605] pc : kunit_test_null_dereference+0x70/0x170 [ 162.145813] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.151629] sp : ffff80008a4f7d30 [ 162.154927] x29: ffff80008a4f7d90 x28: 0000000000000000 x27: 0000000000000000 [ 162.162045] x26: 1fffe0010007eba1 x25: 0000000000000000 x24: 0000000000000004 [ 162.169163] x23: ffff0008003f5d0c x22: ffff80008120e460 x21: ffff0008069ced88 [ 162.176281] x20: 1ffff0001149efa6 x19: ffff800087d07990 x18: ffff800087d07b00 [ 162.183399] x17: 0000000000000001 x16: ffff00085af42ce8 x15: ffff8000811fec90 [ 162.190517] x14: ffff8000808dfd0c x13: 1fffe0010b5e8581 x12: ffff600100c50dc4 [ 162.197636] x11: 1fffe00100c50dc3 x10: ffff600100c50dc3 x9 : ffff8000812058c8 [ 162.204753] x8 : ffff80008a4f7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 162.211871] x5 : ffff70001149efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 162.218989] x2 : dfff800000000000 x1 : ffff000806286540 x0 : ffff800087d07990 [ 162.226110] Call trace: [ 162.228542] kunit_test_null_dereference+0x70/0x170 (P) [ 162.233749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.239214] kthread+0x328/0x630 [ 162.242426] ret_from_fork+0x10/0x20 [ 162.246000] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 162.252067] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
KNOWN ISSUE - log-parser-test/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block: Failure
[ 250.890304] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 250.898545] SMP: stopping secondary CPUs [ 250.902469] Kernel Offset: disabled [ 250.905919] CPU features: 0x0800,00000000,02004ca0,0400721b [ 250.911475] Memory Limit: none [ 250.914546] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-test - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
[ 99.352323] ================================================================== [ 99.352455] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 99.352455] [ 99.352596] Use-after-free read at 0x(____ptrval____) (in kfence-#186): [ 99.352704] test_krealloc+0x51c/0x830 [ 99.355855] kunit_try_run_case+0x170/0x3f0 [ 99.360022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.365491] kthread+0x328/0x630 [ 99.368702] ret_from_fork+0x10/0x20 [ 99.372261] [ 99.373741] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 99.373741] [ 99.383374] allocated by task 382 on cpu 0 at 99.352232s (0.031140s ago): [ 99.390161] test_alloc+0x29c/0x628 [ 99.393615] test_krealloc+0xc0/0x830 [ 99.397261] kunit_try_run_case+0x170/0x3f0 [ 99.401428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.406896] kthread+0x328/0x630 [ 99.410108] ret_from_fork+0x10/0x20 [ 99.413668] [ 99.415145] freed by task 382 on cpu 0 at 99.352262s (0.062880s ago): [ 99.421586] krealloc_noprof+0x148/0x360 [ 99.425472] test_krealloc+0x1dc/0x830 [ 99.429205] kunit_try_run_case+0x170/0x3f0 [ 99.433372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.438842] kthread+0x328/0x630 [ 99.442052] ret_from_fork+0x10/0x20 [ 99.445612] [ 99.447097] CPU: 0 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 99.458205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 99.462366] Hardware name: WinLink E850-96 board (DT) [ 99.467403] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
[ 99.127957] ================================================================== [ 99.128101] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 99.128101] [ 99.128259] Use-after-free read at 0x(____ptrval____) (in kfence-#184): [ 99.129156] test_memcache_typesafe_by_rcu+0x280/0x560 [ 99.134277] kunit_try_run_case+0x170/0x3f0 [ 99.138443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.143912] kthread+0x328/0x630 [ 99.147124] ret_from_fork+0x10/0x20 [ 99.150683] [ 99.152162] kfence-#184: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 99.152162] [ 99.161275] allocated by task 380 on cpu 1 at 99.092283s (0.068991s ago): [ 99.168061] test_alloc+0x230/0x628 [ 99.171516] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 99.176639] kunit_try_run_case+0x170/0x3f0 [ 99.180804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.186272] kthread+0x328/0x630 [ 99.189484] ret_from_fork+0x10/0x20 [ 99.193043] [ 99.194521] freed by task 380 on cpu 1 at 99.092298s (0.102221s ago): [ 99.200957] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 99.206064] kunit_try_run_case+0x170/0x3f0 [ 99.210230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.215699] kthread+0x328/0x630 [ 99.218911] ret_from_fork+0x10/0x20 [ 99.222472] [ 99.223956] CPU: 1 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 99.235064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 99.239224] Hardware name: WinLink E850-96 board (DT) [ 99.244261] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
[ 38.259468] ================================================================== [ 38.270208] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.277325] Free of addr ffff0008034a0000 by task kunit_try_catch/284 [ 38.283746] [ 38.285232] CPU: 6 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 38.285292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.285310] Hardware name: WinLink E850-96 board (DT) [ 38.285334] Call trace: [ 38.285349] show_stack+0x20/0x38 (C) [ 38.285385] dump_stack_lvl+0x8c/0xd0 [ 38.285418] print_report+0x118/0x608 [ 38.285455] kasan_report_invalid_free+0xc0/0xe8 [ 38.285490] __kasan_mempool_poison_pages+0xe0/0xe8 [ 38.285523] mempool_free+0x24c/0x328 [ 38.285561] mempool_double_free_helper+0x150/0x2e8 [ 38.285594] mempool_page_alloc_double_free+0xbc/0x118 [ 38.285627] kunit_try_run_case+0x170/0x3f0 [ 38.285661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.285696] kthread+0x328/0x630 [ 38.285731] ret_from_fork+0x10/0x20 [ 38.285767] [ 38.359876] The buggy address belongs to the physical page: [ 38.365431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834a0 [ 38.373416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.379938] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.387656] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.395375] page dumped because: kasan: bad access detected [ 38.400930] [ 38.402406] Memory state around the buggy address: [ 38.407188] ffff00080349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.414389] ffff00080349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.421595] >ffff0008034a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.428795] ^ [ 38.432010] ffff0008034a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.439215] ffff0008034a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.446417] ================================================================== [ 38.021360] ================================================================== [ 38.031154] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.038265] Free of addr ffff0008067b4000 by task kunit_try_catch/282 [ 38.044687] [ 38.046174] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 38.046228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.046244] Hardware name: WinLink E850-96 board (DT) [ 38.046264] Call trace: [ 38.046276] show_stack+0x20/0x38 (C) [ 38.046311] dump_stack_lvl+0x8c/0xd0 [ 38.046346] print_report+0x118/0x608 [ 38.046380] kasan_report_invalid_free+0xc0/0xe8 [ 38.046414] __kasan_mempool_poison_object+0x14c/0x150 [ 38.046448] mempool_free+0x28c/0x328 [ 38.046488] mempool_double_free_helper+0x150/0x2e8 [ 38.046521] mempool_kmalloc_large_double_free+0xc0/0x118 [ 38.046553] kunit_try_run_case+0x170/0x3f0 [ 38.046585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.046620] kthread+0x328/0x630 [ 38.046655] ret_from_fork+0x10/0x20 [ 38.046687] [ 38.121337] The buggy address belongs to the physical page: [ 38.126893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b4 [ 38.134877] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.142519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.149460] page_type: f8(unknown) [ 38.152857] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.160576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.168302] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.176113] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.183927] head: 0bfffe0000000002 fffffdffe019ed01 00000000ffffffff 00000000ffffffff [ 38.191739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.199544] page dumped because: kasan: bad access detected [ 38.205100] [ 38.206575] Memory state around the buggy address: [ 38.211357] ffff0008067b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.218562] ffff0008067b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.225763] >ffff0008067b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.232964] ^ [ 38.236180] ffff0008067b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.243384] ffff0008067b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.250587] ================================================================== [ 37.646161] ================================================================== [ 37.655895] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.663012] Free of addr ffff000801edec00 by task kunit_try_catch/280 [ 37.669432] [ 37.670919] CPU: 6 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 37.670981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.670998] Hardware name: WinLink E850-96 board (DT) [ 37.671021] Call trace: [ 37.671035] show_stack+0x20/0x38 (C) [ 37.671072] dump_stack_lvl+0x8c/0xd0 [ 37.671108] print_report+0x118/0x608 [ 37.671143] kasan_report_invalid_free+0xc0/0xe8 [ 37.671180] check_slab_allocation+0xd4/0x108 [ 37.671212] __kasan_mempool_poison_object+0x78/0x150 [ 37.671250] mempool_free+0x28c/0x328 [ 37.671287] mempool_double_free_helper+0x150/0x2e8 [ 37.671317] mempool_kmalloc_double_free+0xc0/0x118 [ 37.671349] kunit_try_run_case+0x170/0x3f0 [ 37.671382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.671417] kthread+0x328/0x630 [ 37.671452] ret_from_fork+0x10/0x20 [ 37.671489] [ 37.749813] Allocated by task 280: [ 37.753200] kasan_save_stack+0x3c/0x68 [ 37.757017] kasan_save_track+0x20/0x40 [ 37.760836] kasan_save_alloc_info+0x40/0x58 [ 37.765089] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.770384] remove_element+0x130/0x1f8 [ 37.774204] mempool_alloc_preallocated+0x58/0xc0 [ 37.778891] mempool_double_free_helper+0x94/0x2e8 [ 37.783665] mempool_kmalloc_double_free+0xc0/0x118 [ 37.788527] kunit_try_run_case+0x170/0x3f0 [ 37.792693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.798161] kthread+0x328/0x630 [ 37.801373] ret_from_fork+0x10/0x20 [ 37.804932] [ 37.806410] Freed by task 280: [ 37.809449] kasan_save_stack+0x3c/0x68 [ 37.813266] kasan_save_track+0x20/0x40 [ 37.817085] kasan_save_free_info+0x4c/0x78 [ 37.821252] __kasan_mempool_poison_object+0xc0/0x150 [ 37.826286] mempool_free+0x28c/0x328 [ 37.829932] mempool_double_free_helper+0x100/0x2e8 [ 37.834793] mempool_kmalloc_double_free+0xc0/0x118 [ 37.839654] kunit_try_run_case+0x170/0x3f0 [ 37.843822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.849289] kthread+0x328/0x630 [ 37.852501] ret_from_fork+0x10/0x20 [ 37.856060] [ 37.857538] The buggy address belongs to the object at ffff000801edec00 [ 37.857538] which belongs to the cache kmalloc-128 of size 128 [ 37.870039] The buggy address is located 0 bytes inside of [ 37.870039] 128-byte region [ffff000801edec00, ffff000801edec80) [ 37.881580] [ 37.883061] The buggy address belongs to the physical page: [ 37.888616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 37.896599] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.904240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.911183] page_type: f5(slab) [ 37.914319] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.922038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.929765] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.937576] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.945389] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 37.953201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.961006] page dumped because: kasan: bad access detected [ 37.966562] [ 37.968037] Memory state around the buggy address: [ 37.972819] ffff000801edeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.980022] ffff000801edeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.987225] >ffff000801edec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.994426] ^ [ 37.997641] ffff000801edec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.004847] ffff000801eded00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.012049] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
[ 36.901109] ================================================================== [ 36.910338] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.917014] Read of size 1 at addr ffff0008026a0000 by task kunit_try_catch/274 [ 36.924305] [ 36.925791] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 36.925854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.925872] Hardware name: WinLink E850-96 board (DT) [ 36.925893] Call trace: [ 36.925905] show_stack+0x20/0x38 (C) [ 36.925942] dump_stack_lvl+0x8c/0xd0 [ 36.925974] print_report+0x118/0x608 [ 36.926006] kasan_report+0xdc/0x128 [ 36.926040] __asan_report_load1_noabort+0x20/0x30 [ 36.926077] mempool_uaf_helper+0x314/0x340 [ 36.926105] mempool_kmalloc_large_uaf+0xc4/0x120 [ 36.926135] kunit_try_run_case+0x170/0x3f0 [ 36.926167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.926203] kthread+0x328/0x630 [ 36.926237] ret_from_fork+0x10/0x20 [ 36.926273] [ 36.994531] The buggy address belongs to the physical page: [ 37.000087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8826a0 [ 37.008071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.015710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.022654] page_type: f8(unknown) [ 37.026052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.033770] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.041496] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.049307] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.057121] head: 0bfffe0000000002 fffffdffe009a801 00000000ffffffff 00000000ffffffff [ 37.064933] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.072739] page dumped because: kasan: bad access detected [ 37.078294] [ 37.079769] Memory state around the buggy address: [ 37.084550] ffff00080269ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.091753] ffff00080269ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.098959] >ffff0008026a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.106158] ^ [ 37.109374] ffff0008026a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.116578] ffff0008026a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.123781] ================================================================== [ 37.462727] ================================================================== [ 37.466748] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.473428] Read of size 1 at addr ffff0008067b4000 by task kunit_try_catch/278 [ 37.480720] [ 37.482206] CPU: 7 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 37.482270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.482287] Hardware name: WinLink E850-96 board (DT) [ 37.482309] Call trace: [ 37.482323] show_stack+0x20/0x38 (C) [ 37.482363] dump_stack_lvl+0x8c/0xd0 [ 37.482396] print_report+0x118/0x608 [ 37.482431] kasan_report+0xdc/0x128 [ 37.482462] __asan_report_load1_noabort+0x20/0x30 [ 37.482503] mempool_uaf_helper+0x314/0x340 [ 37.482530] mempool_page_alloc_uaf+0xc0/0x118 [ 37.482561] kunit_try_run_case+0x170/0x3f0 [ 37.482595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.482632] kthread+0x328/0x630 [ 37.482666] ret_from_fork+0x10/0x20 [ 37.482700] [ 37.550686] The buggy address belongs to the physical page: [ 37.556242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b4 [ 37.564227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.570748] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.578466] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.586187] page dumped because: kasan: bad access detected [ 37.591741] [ 37.593216] Memory state around the buggy address: [ 37.598001] ffff0008067b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.605200] ffff0008067b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.612406] >ffff0008067b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.619605] ^ [ 37.622821] ffff0008067b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.630025] ffff0008067b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.637228] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
[ 75.464327] ================================================================== [ 75.464451] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.464451] [ 75.464596] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#179): [ 75.468288] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.473496] kunit_try_run_case+0x170/0x3f0 [ 75.477663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.483131] kthread+0x328/0x630 [ 75.486343] ret_from_fork+0x10/0x20 [ 75.489903] [ 75.491380] kfence-#179: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 75.491380] [ 75.501017] allocated by task 370 on cpu 7 at 75.464262s (0.036753s ago): [ 75.507799] test_alloc+0x29c/0x628 [ 75.511256] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 75.516378] kunit_try_run_case+0x170/0x3f0 [ 75.520544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.526013] kthread+0x328/0x630 [ 75.529224] ret_from_fork+0x10/0x20 [ 75.532784] [ 75.534262] freed by task 370 on cpu 7 at 75.464277s (0.069982s ago): [ 75.540697] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.545891] kunit_try_run_case+0x170/0x3f0 [ 75.550058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.555526] kthread+0x328/0x630 [ 75.558738] ret_from_fork+0x10/0x20 [ 75.562300] [ 75.563783] CPU: 7 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 75.574892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.579052] Hardware name: WinLink E850-96 board (DT) [ 75.584088] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
[ 75.152275] ================================================================== [ 75.152415] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 75.152415] [ 75.152575] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#176): [ 75.154249] test_kmalloc_aligned_oob_read+0x238/0x468 [ 75.159371] kunit_try_run_case+0x170/0x3f0 [ 75.163537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.169006] kthread+0x328/0x630 [ 75.172218] ret_from_fork+0x10/0x20 [ 75.175777] [ 75.177256] kfence-#176: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 75.177256] [ 75.186891] allocated by task 368 on cpu 1 at 75.152237s (0.034651s ago): [ 75.193675] test_alloc+0x29c/0x628 [ 75.197131] test_kmalloc_aligned_oob_read+0x100/0x468 [ 75.202254] kunit_try_run_case+0x170/0x3f0 [ 75.206419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.211887] kthread+0x328/0x630 [ 75.215099] ret_from_fork+0x10/0x20 [ 75.218659] [ 75.220145] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 75.231252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.235412] Hardware name: WinLink E850-96 board (DT) [ 75.240449] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
[ 70.512305] ================================================================== [ 70.512430] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 70.512430] [ 70.512567] Invalid free of 0x(____ptrval____) (in kfence-#132): [ 70.512670] test_invalid_addr_free+0x1ac/0x238 [ 70.516178] kunit_try_run_case+0x170/0x3f0 [ 70.520345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.525813] kthread+0x328/0x630 [ 70.529025] ret_from_fork+0x10/0x20 [ 70.532585] [ 70.534064] kfence-#132: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.534064] [ 70.543697] allocated by task 352 on cpu 6 at 70.512253s (0.031442s ago): [ 70.550479] test_alloc+0x29c/0x628 [ 70.553938] test_invalid_addr_free+0xd4/0x238 [ 70.558365] kunit_try_run_case+0x170/0x3f0 [ 70.562531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.568000] kthread+0x328/0x630 [ 70.571212] ret_from_fork+0x10/0x20 [ 70.574773] [ 70.576258] CPU: 6 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 70.587367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.591526] Hardware name: WinLink E850-96 board (DT) [ 70.596562] ================================================================== [ 70.720298] ================================================================== [ 70.720420] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 70.720420] [ 70.720550] Invalid free of 0x(____ptrval____) (in kfence-#134): [ 70.720652] test_invalid_addr_free+0xec/0x238 [ 70.723996] kunit_try_run_case+0x170/0x3f0 [ 70.728162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.733631] kthread+0x328/0x630 [ 70.736843] ret_from_fork+0x10/0x20 [ 70.740403] [ 70.741881] kfence-#134: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.741881] [ 70.750995] allocated by task 354 on cpu 7 at 70.720249s (0.030744s ago): [ 70.757776] test_alloc+0x230/0x628 [ 70.761234] test_invalid_addr_free+0xd4/0x238 [ 70.765662] kunit_try_run_case+0x170/0x3f0 [ 70.769828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.775298] kthread+0x328/0x630 [ 70.778509] ret_from_fork+0x10/0x20 [ 70.782069] [ 70.783556] CPU: 7 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 70.794664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.798822] Hardware name: WinLink E850-96 board (DT) [ 70.803859] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
[ 70.072334] ================================================================== [ 70.072459] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 70.072459] [ 70.072587] Invalid free of 0x(____ptrval____) (in kfence-#128): [ 70.072687] test_double_free+0x1bc/0x238 [ 70.075165] kunit_try_run_case+0x170/0x3f0 [ 70.079332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.084801] kthread+0x328/0x630 [ 70.088012] ret_from_fork+0x10/0x20 [ 70.091573] [ 70.093051] kfence-#128: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.093051] [ 70.102685] allocated by task 348 on cpu 6 at 70.072258s (0.030424s ago): [ 70.109468] test_alloc+0x29c/0x628 [ 70.112925] test_double_free+0xd4/0x238 [ 70.116833] kunit_try_run_case+0x170/0x3f0 [ 70.120998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.126467] kthread+0x328/0x630 [ 70.129678] ret_from_fork+0x10/0x20 [ 70.133237] [ 70.134716] freed by task 348 on cpu 6 at 70.072274s (0.062440s ago): [ 70.141151] test_double_free+0x1ac/0x238 [ 70.145130] kunit_try_run_case+0x170/0x3f0 [ 70.149296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.154765] kthread+0x328/0x630 [ 70.157977] ret_from_fork+0x10/0x20 [ 70.161537] [ 70.163023] CPU: 6 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 70.174131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.178290] Hardware name: WinLink E850-96 board (DT) [ 70.183327] ================================================================== [ 70.292338] ================================================================== [ 70.292473] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 70.292473] [ 70.292597] Invalid free of 0x(____ptrval____) (in kfence-#130): [ 70.292703] test_double_free+0x100/0x238 [ 70.295180] kunit_try_run_case+0x170/0x3f0 [ 70.299346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.304815] kthread+0x328/0x630 [ 70.308027] ret_from_fork+0x10/0x20 [ 70.311586] [ 70.313064] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.313064] [ 70.322179] allocated by task 350 on cpu 0 at 70.292262s (0.029915s ago): [ 70.328960] test_alloc+0x230/0x628 [ 70.332419] test_double_free+0xd4/0x238 [ 70.336325] kunit_try_run_case+0x170/0x3f0 [ 70.340492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.345961] kthread+0x328/0x630 [ 70.349172] ret_from_fork+0x10/0x20 [ 70.352731] [ 70.354211] freed by task 350 on cpu 0 at 70.292278s (0.061929s ago): [ 70.360646] test_double_free+0xf0/0x238 [ 70.364537] kunit_try_run_case+0x170/0x3f0 [ 70.368703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.374172] kthread+0x328/0x630 [ 70.377384] ret_from_fork+0x10/0x20 [ 70.380946] [ 70.382429] CPU: 0 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 70.393538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.397697] Hardware name: WinLink E850-96 board (DT) [ 70.402733] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
[ 69.640293] ================================================================== [ 69.640429] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 69.640429] [ 69.640585] Use-after-free read at 0x(____ptrval____) (in kfence-#124): [ 69.641052] test_use_after_free_read+0x114/0x248 [ 69.645740] kunit_try_run_case+0x170/0x3f0 [ 69.649907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.655375] kthread+0x328/0x630 [ 69.658587] ret_from_fork+0x10/0x20 [ 69.662146] [ 69.663625] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.663625] [ 69.672739] allocated by task 342 on cpu 3 at 69.640234s (0.032502s ago): [ 69.679524] test_alloc+0x230/0x628 [ 69.682979] test_use_after_free_read+0xd0/0x248 [ 69.687580] kunit_try_run_case+0x170/0x3f0 [ 69.691747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.697215] kthread+0x328/0x630 [ 69.700426] ret_from_fork+0x10/0x20 [ 69.703985] [ 69.705464] freed by task 342 on cpu 3 at 69.640251s (0.065210s ago): [ 69.711903] test_use_after_free_read+0xf0/0x248 [ 69.716485] kunit_try_run_case+0x170/0x3f0 [ 69.720652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.726120] kthread+0x328/0x630 [ 69.729332] ret_from_fork+0x10/0x20 [ 69.732893] [ 69.734378] CPU: 3 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 69.745486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.749645] Hardware name: WinLink E850-96 board (DT) [ 69.754683] ================================================================== [ 69.416308] ================================================================== [ 69.416435] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 69.416435] [ 69.416589] Use-after-free read at 0x(____ptrval____) (in kfence-#122): [ 69.417058] test_use_after_free_read+0x114/0x248 [ 69.421745] kunit_try_run_case+0x170/0x3f0 [ 69.425911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.431380] kthread+0x328/0x630 [ 69.434592] ret_from_fork+0x10/0x20 [ 69.438151] [ 69.439630] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.439630] [ 69.449265] allocated by task 340 on cpu 6 at 69.416253s (0.033010s ago): [ 69.456050] test_alloc+0x29c/0x628 [ 69.459504] test_use_after_free_read+0xd0/0x248 [ 69.464106] kunit_try_run_case+0x170/0x3f0 [ 69.468272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.473740] kthread+0x328/0x630 [ 69.476952] ret_from_fork+0x10/0x20 [ 69.480513] [ 69.481989] freed by task 340 on cpu 6 at 69.416268s (0.065719s ago): [ 69.488428] test_use_after_free_read+0x1c0/0x248 [ 69.493098] kunit_try_run_case+0x170/0x3f0 [ 69.497265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.502733] kthread+0x328/0x630 [ 69.505945] ret_from_fork+0x10/0x20 [ 69.509505] [ 69.510991] CPU: 6 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 69.522099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.526258] Hardware name: WinLink E850-96 board (DT) [ 69.531294] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
[ 37.133333] ================================================================== [ 37.142710] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.149823] Read of size 1 at addr ffff0008065c6240 by task kunit_try_catch/276 [ 37.157113] [ 37.158597] CPU: 5 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 37.158654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.158673] Hardware name: WinLink E850-96 board (DT) [ 37.158693] Call trace: [ 37.158705] show_stack+0x20/0x38 (C) [ 37.158743] dump_stack_lvl+0x8c/0xd0 [ 37.158777] print_report+0x118/0x608 [ 37.158813] kasan_report+0xdc/0x128 [ 37.158844] __asan_report_load1_noabort+0x20/0x30 [ 37.158881] mempool_uaf_helper+0x314/0x340 [ 37.158907] mempool_slab_uaf+0xc0/0x118 [ 37.158940] kunit_try_run_case+0x170/0x3f0 [ 37.158974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.159008] kthread+0x328/0x630 [ 37.159044] ret_from_fork+0x10/0x20 [ 37.159081] [ 37.226558] Allocated by task 276: [ 37.229944] kasan_save_stack+0x3c/0x68 [ 37.233761] kasan_save_track+0x20/0x40 [ 37.237580] kasan_save_alloc_info+0x40/0x58 [ 37.241833] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.247041] remove_element+0x16c/0x1f8 [ 37.250861] mempool_alloc_preallocated+0x58/0xc0 [ 37.255548] mempool_uaf_helper+0xa4/0x340 [ 37.259628] mempool_slab_uaf+0xc0/0x118 [ 37.263534] kunit_try_run_case+0x170/0x3f0 [ 37.267700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.273169] kthread+0x328/0x630 [ 37.276381] ret_from_fork+0x10/0x20 [ 37.279940] [ 37.281417] Freed by task 276: [ 37.284454] kasan_save_stack+0x3c/0x68 [ 37.288274] kasan_save_track+0x20/0x40 [ 37.292092] kasan_save_free_info+0x4c/0x78 [ 37.296260] __kasan_mempool_poison_object+0xc0/0x150 [ 37.301294] mempool_free+0x28c/0x328 [ 37.304940] mempool_uaf_helper+0x104/0x340 [ 37.309107] mempool_slab_uaf+0xc0/0x118 [ 37.313012] kunit_try_run_case+0x170/0x3f0 [ 37.317179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.322648] kthread+0x328/0x630 [ 37.325860] ret_from_fork+0x10/0x20 [ 37.329419] [ 37.330896] The buggy address belongs to the object at ffff0008065c6240 [ 37.330896] which belongs to the cache test_cache of size 123 [ 37.343309] The buggy address is located 0 bytes inside of [ 37.343309] freed 123-byte region [ffff0008065c6240, ffff0008065c62bb) [ 37.355373] [ 37.356853] The buggy address belongs to the physical page: [ 37.362408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c6 [ 37.370393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.376903] page_type: f5(slab) [ 37.380039] raw: 0bfffe0000000000 ffff000801eae000 dead000000000122 0000000000000000 [ 37.387758] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.395477] page dumped because: kasan: bad access detected [ 37.401032] [ 37.402507] Memory state around the buggy address: [ 37.407288] ffff0008065c6100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.414491] ffff0008065c6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.421695] >ffff0008065c6200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 37.428896] ^ [ 37.434195] ffff0008065c6280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.441400] ffff0008065c6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.448602] ================================================================== [ 36.546600] ================================================================== [ 36.547839] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.554954] Read of size 1 at addr ffff000801f1c700 by task kunit_try_catch/272 [ 36.562245] [ 36.563731] CPU: 7 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 36.563794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.563812] Hardware name: WinLink E850-96 board (DT) [ 36.563834] Call trace: [ 36.563850] show_stack+0x20/0x38 (C) [ 36.563886] dump_stack_lvl+0x8c/0xd0 [ 36.563920] print_report+0x118/0x608 [ 36.563953] kasan_report+0xdc/0x128 [ 36.563982] __asan_report_load1_noabort+0x20/0x30 [ 36.564021] mempool_uaf_helper+0x314/0x340 [ 36.564049] mempool_kmalloc_uaf+0xc4/0x120 [ 36.564077] kunit_try_run_case+0x170/0x3f0 [ 36.564109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.564141] kthread+0x328/0x630 [ 36.564175] ret_from_fork+0x10/0x20 [ 36.564208] [ 36.631949] Allocated by task 272: [ 36.635336] kasan_save_stack+0x3c/0x68 [ 36.639151] kasan_save_track+0x20/0x40 [ 36.642971] kasan_save_alloc_info+0x40/0x58 [ 36.647224] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.652519] remove_element+0x130/0x1f8 [ 36.656339] mempool_alloc_preallocated+0x58/0xc0 [ 36.661026] mempool_uaf_helper+0xa4/0x340 [ 36.665106] mempool_kmalloc_uaf+0xc4/0x120 [ 36.669274] kunit_try_run_case+0x170/0x3f0 [ 36.673439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.678909] kthread+0x328/0x630 [ 36.682119] ret_from_fork+0x10/0x20 [ 36.685679] [ 36.687155] Freed by task 272: [ 36.690194] kasan_save_stack+0x3c/0x68 [ 36.694012] kasan_save_track+0x20/0x40 [ 36.697831] kasan_save_free_info+0x4c/0x78 [ 36.701998] __kasan_mempool_poison_object+0xc0/0x150 [ 36.707032] mempool_free+0x28c/0x328 [ 36.710678] mempool_uaf_helper+0x104/0x340 [ 36.714845] mempool_kmalloc_uaf+0xc4/0x120 [ 36.719011] kunit_try_run_case+0x170/0x3f0 [ 36.723179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.728646] kthread+0x328/0x630 [ 36.731858] ret_from_fork+0x10/0x20 [ 36.735417] [ 36.736895] The buggy address belongs to the object at ffff000801f1c700 [ 36.736895] which belongs to the cache kmalloc-128 of size 128 [ 36.749397] The buggy address is located 0 bytes inside of [ 36.749397] freed 128-byte region [ffff000801f1c700, ffff000801f1c780) [ 36.761459] [ 36.762938] The buggy address belongs to the physical page: [ 36.768494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 36.776477] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.784116] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.791060] page_type: f5(slab) [ 36.794198] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.801916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.809642] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.817454] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.825267] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 36.833079] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.840884] page dumped because: kasan: bad access detected [ 36.846440] [ 36.847915] Memory state around the buggy address: [ 36.852699] ffff000801f1c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.859898] ffff000801f1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.867104] >ffff000801f1c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.874304] ^ [ 36.877519] ffff000801f1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.884726] ffff000801f1c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.891927] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
[ 35.722626] ================================================================== [ 35.722794] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.722921] Read of size 1 at addr ffff000801adc773 by task kunit_try_catch/266 [ 35.729360] [ 35.730844] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 35.730902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.730918] Hardware name: WinLink E850-96 board (DT) [ 35.730940] Call trace: [ 35.730960] show_stack+0x20/0x38 (C) [ 35.730996] dump_stack_lvl+0x8c/0xd0 [ 35.731029] print_report+0x118/0x608 [ 35.731062] kasan_report+0xdc/0x128 [ 35.731093] __asan_report_load1_noabort+0x20/0x30 [ 35.731131] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.731161] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.731192] kunit_try_run_case+0x170/0x3f0 [ 35.731226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.731261] kthread+0x328/0x630 [ 35.731296] ret_from_fork+0x10/0x20 [ 35.731330] [ 35.800103] Allocated by task 266: [ 35.803490] kasan_save_stack+0x3c/0x68 [ 35.807306] kasan_save_track+0x20/0x40 [ 35.811126] kasan_save_alloc_info+0x40/0x58 [ 35.815379] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.820674] remove_element+0x130/0x1f8 [ 35.824493] mempool_alloc_preallocated+0x58/0xc0 [ 35.829182] mempool_oob_right_helper+0x98/0x2f0 [ 35.833781] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.838469] kunit_try_run_case+0x170/0x3f0 [ 35.842635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.848103] kthread+0x328/0x630 [ 35.851316] ret_from_fork+0x10/0x20 [ 35.854875] [ 35.856352] The buggy address belongs to the object at ffff000801adc700 [ 35.856352] which belongs to the cache kmalloc-128 of size 128 [ 35.868853] The buggy address is located 0 bytes to the right of [ 35.868853] allocated 115-byte region [ffff000801adc700, ffff000801adc773) [ 35.881784] [ 35.883263] The buggy address belongs to the physical page: [ 35.888819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc [ 35.896804] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.904443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.911386] page_type: f5(slab) [ 35.914524] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.922241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.929968] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.937779] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.945592] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff [ 35.953404] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.961212] page dumped because: kasan: bad access detected [ 35.966765] [ 35.968241] Memory state around the buggy address: [ 35.973023] ffff000801adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.980223] ffff000801adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.987430] >ffff000801adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.994630] ^ [ 36.001491] ffff000801adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.008697] ffff000801adc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.015900] ================================================================== [ 36.024956] ================================================================== [ 36.034827] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.042375] Read of size 1 at addr ffff0008067b2001 by task kunit_try_catch/268 [ 36.049665] [ 36.051152] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 36.051209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.051225] Hardware name: WinLink E850-96 board (DT) [ 36.051246] Call trace: [ 36.051258] show_stack+0x20/0x38 (C) [ 36.051294] dump_stack_lvl+0x8c/0xd0 [ 36.051324] print_report+0x118/0x608 [ 36.051361] kasan_report+0xdc/0x128 [ 36.051391] __asan_report_load1_noabort+0x20/0x30 [ 36.051430] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.051463] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 36.051498] kunit_try_run_case+0x170/0x3f0 [ 36.051531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.051564] kthread+0x328/0x630 [ 36.051599] ret_from_fork+0x10/0x20 [ 36.051634] [ 36.120932] The buggy address belongs to the physical page: [ 36.126490] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b0 [ 36.134474] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.142114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.149056] page_type: f8(unknown) [ 36.152453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.160172] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.167898] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.175710] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.183523] head: 0bfffe0000000002 fffffdffe019ec01 00000000ffffffff 00000000ffffffff [ 36.191335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.199140] page dumped because: kasan: bad access detected [ 36.204696] [ 36.206172] Memory state around the buggy address: [ 36.210952] ffff0008067b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.218154] ffff0008067b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.225361] >ffff0008067b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.232560] ^ [ 36.235776] ffff0008067b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.242981] ffff0008067b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.250183] ================================================================== [ 36.259805] ================================================================== [ 36.269633] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.277180] Read of size 1 at addr ffff0008068622bb by task kunit_try_catch/270 [ 36.284471] [ 36.285957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 36.286016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.286032] Hardware name: WinLink E850-96 board (DT) [ 36.286053] Call trace: [ 36.286067] show_stack+0x20/0x38 (C) [ 36.286105] dump_stack_lvl+0x8c/0xd0 [ 36.286136] print_report+0x118/0x608 [ 36.286170] kasan_report+0xdc/0x128 [ 36.286200] __asan_report_load1_noabort+0x20/0x30 [ 36.286237] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.286271] mempool_slab_oob_right+0xc0/0x118 [ 36.286305] kunit_try_run_case+0x170/0x3f0 [ 36.286340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.286374] kthread+0x328/0x630 [ 36.286407] ret_from_fork+0x10/0x20 [ 36.286444] [ 36.354957] Allocated by task 270: [ 36.358342] kasan_save_stack+0x3c/0x68 [ 36.362160] kasan_save_track+0x20/0x40 [ 36.365978] kasan_save_alloc_info+0x40/0x58 [ 36.370232] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.375440] remove_element+0x16c/0x1f8 [ 36.379259] mempool_alloc_preallocated+0x58/0xc0 [ 36.383948] mempool_oob_right_helper+0x98/0x2f0 [ 36.388548] mempool_slab_oob_right+0xc0/0x118 [ 36.392975] kunit_try_run_case+0x170/0x3f0 [ 36.397141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.402610] kthread+0x328/0x630 [ 36.405822] ret_from_fork+0x10/0x20 [ 36.409380] [ 36.410858] The buggy address belongs to the object at ffff000806862240 [ 36.410858] which belongs to the cache test_cache of size 123 [ 36.423273] The buggy address is located 0 bytes to the right of [ 36.423273] allocated 123-byte region [ffff000806862240, ffff0008068622bb) [ 36.436203] [ 36.437683] The buggy address belongs to the physical page: [ 36.443237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862 [ 36.451223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.457731] page_type: f5(slab) [ 36.460870] raw: 0bfffe0000000000 ffff000802403400 dead000000000122 0000000000000000 [ 36.468588] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.476306] page dumped because: kasan: bad access detected [ 36.481862] [ 36.483338] Memory state around the buggy address: [ 36.488118] ffff000806862180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.495322] ffff000806862200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.502527] >ffff000806862280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.509726] ^ [ 36.514765] ffff000806862300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.521969] ffff000806862380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.529172] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
[ 34.835274] ================================================================== [ 34.835453] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.835584] Read of size 1 at addr ffff00080241c000 by task kunit_try_catch/260 [ 34.839151] [ 34.840638] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 34.840699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.840715] Hardware name: WinLink E850-96 board (DT) [ 34.840737] Call trace: [ 34.840749] show_stack+0x20/0x38 (C) [ 34.840789] dump_stack_lvl+0x8c/0xd0 [ 34.840822] print_report+0x118/0x608 [ 34.840855] kasan_report+0xdc/0x128 [ 34.840885] __kasan_check_byte+0x54/0x70 [ 34.840918] kmem_cache_destroy+0x34/0x218 [ 34.840952] kmem_cache_double_destroy+0x174/0x300 [ 34.840981] kunit_try_run_case+0x170/0x3f0 [ 34.841014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.841048] kthread+0x328/0x630 [ 34.841085] ret_from_fork+0x10/0x20 [ 34.841120] [ 34.908596] Allocated by task 260: [ 34.911983] kasan_save_stack+0x3c/0x68 [ 34.915799] kasan_save_track+0x20/0x40 [ 34.919619] kasan_save_alloc_info+0x40/0x58 [ 34.923872] __kasan_slab_alloc+0xa8/0xb0 [ 34.927866] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.932466] __kmem_cache_create_args+0x178/0x280 [ 34.937153] kmem_cache_double_destroy+0xc0/0x300 [ 34.941841] kunit_try_run_case+0x170/0x3f0 [ 34.946007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.951476] kthread+0x328/0x630 [ 34.954687] ret_from_fork+0x10/0x20 [ 34.958247] [ 34.959724] Freed by task 260: [ 34.962764] kasan_save_stack+0x3c/0x68 [ 34.966580] kasan_save_track+0x20/0x40 [ 34.970399] kasan_save_free_info+0x4c/0x78 [ 34.974566] __kasan_slab_free+0x6c/0x98 [ 34.978472] kmem_cache_free+0x260/0x470 [ 34.982378] slab_kmem_cache_release+0x38/0x50 [ 34.986805] kmem_cache_release+0x1c/0x30 [ 34.990798] kobject_put+0x17c/0x430 [ 34.994359] sysfs_slab_release+0x1c/0x30 [ 34.998350] kmem_cache_destroy+0x118/0x218 [ 35.002517] kmem_cache_double_destroy+0x128/0x300 [ 35.007291] kunit_try_run_case+0x170/0x3f0 [ 35.011457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.016926] kthread+0x328/0x630 [ 35.020137] ret_from_fork+0x10/0x20 [ 35.023697] [ 35.025175] The buggy address belongs to the object at ffff00080241c000 [ 35.025175] which belongs to the cache kmem_cache of size 208 [ 35.037589] The buggy address is located 0 bytes inside of [ 35.037589] freed 208-byte region [ffff00080241c000, ffff00080241c0d0) [ 35.049651] [ 35.051131] The buggy address belongs to the physical page: [ 35.056686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88241c [ 35.064670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.072311] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.079254] page_type: f5(slab) [ 35.082391] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.090109] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.097836] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.105647] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.113461] head: 0bfffe0000000001 fffffdffe0090701 00000000ffffffff 00000000ffffffff [ 35.121271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.129079] page dumped because: kasan: bad access detected [ 35.134633] [ 35.136107] Memory state around the buggy address: [ 35.140891] ffff00080241bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.148091] ffff00080241bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.155298] >ffff00080241c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.162497] ^ [ 35.165712] ffff00080241c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 35.172917] ffff00080241c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.180120] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
[ 34.440184] ================================================================== [ 34.440370] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 34.440496] Read of size 1 at addr ffff000801f20000 by task kunit_try_catch/258 [ 34.443892] [ 34.445379] CPU: 7 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 34.445436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.445453] Hardware name: WinLink E850-96 board (DT) [ 34.445473] Call trace: [ 34.445485] show_stack+0x20/0x38 (C) [ 34.445522] dump_stack_lvl+0x8c/0xd0 [ 34.445554] print_report+0x118/0x608 [ 34.445587] kasan_report+0xdc/0x128 [ 34.445618] __asan_report_load1_noabort+0x20/0x30 [ 34.445656] kmem_cache_rcu_uaf+0x388/0x468 [ 34.445685] kunit_try_run_case+0x170/0x3f0 [ 34.445717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.445753] kthread+0x328/0x630 [ 34.445789] ret_from_fork+0x10/0x20 [ 34.445822] [ 34.509430] Allocated by task 258: [ 34.512817] kasan_save_stack+0x3c/0x68 [ 34.516633] kasan_save_track+0x20/0x40 [ 34.520454] kasan_save_alloc_info+0x40/0x58 [ 34.524705] __kasan_slab_alloc+0xa8/0xb0 [ 34.528701] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.533299] kmem_cache_rcu_uaf+0x12c/0x468 [ 34.537466] kunit_try_run_case+0x170/0x3f0 [ 34.541632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.547101] kthread+0x328/0x630 [ 34.550313] ret_from_fork+0x10/0x20 [ 34.553872] [ 34.555349] Freed by task 0: [ 34.558214] kasan_save_stack+0x3c/0x68 [ 34.562031] kasan_save_track+0x20/0x40 [ 34.565851] kasan_save_free_info+0x4c/0x78 [ 34.570017] __kasan_slab_free+0x6c/0x98 [ 34.573923] slab_free_after_rcu_debug+0xd4/0x2f8 [ 34.578611] rcu_core+0x9f4/0x1e20 [ 34.581996] rcu_core_si+0x18/0x30 [ 34.585382] handle_softirqs+0x374/0xb28 [ 34.589288] __do_softirq+0x1c/0x28 [ 34.592762] [ 34.594237] Last potentially related work creation: [ 34.599098] kasan_save_stack+0x3c/0x68 [ 34.602916] kasan_record_aux_stack+0xb4/0xc8 [ 34.607257] kmem_cache_free+0x120/0x470 [ 34.611163] kmem_cache_rcu_uaf+0x16c/0x468 [ 34.615329] kunit_try_run_case+0x170/0x3f0 [ 34.619496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.624966] kthread+0x328/0x630 [ 34.628176] ret_from_fork+0x10/0x20 [ 34.631737] [ 34.633210] The buggy address belongs to the object at ffff000801f20000 [ 34.633210] which belongs to the cache test_cache of size 200 [ 34.645627] The buggy address is located 0 bytes inside of [ 34.645627] freed 200-byte region [ffff000801f20000, ffff000801f200c8) [ 34.657690] [ 34.659169] The buggy address belongs to the physical page: [ 34.664725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f20 [ 34.672708] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.680349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.687292] page_type: f5(slab) [ 34.690429] raw: 0bfffe0000000040 ffff000801f1e000 dead000000000122 0000000000000000 [ 34.698147] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.705873] head: 0bfffe0000000040 ffff000801f1e000 dead000000000122 0000000000000000 [ 34.713685] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.721498] head: 0bfffe0000000001 fffffdffe007c801 00000000ffffffff 00000000ffffffff [ 34.729310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.737115] page dumped because: kasan: bad access detected [ 34.742671] [ 34.744146] Memory state around the buggy address: [ 34.748928] ffff000801f1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.756129] ffff000801f1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.763336] >ffff000801f20000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.770535] ^ [ 34.773751] ffff000801f20080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.780956] ffff000801f20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.788159] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
[ 68.584280] ================================================================== [ 68.584406] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.584406] [ 68.584562] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#114): [ 68.585724] test_out_of_bounds_write+0x100/0x240 [ 68.590411] kunit_try_run_case+0x170/0x3f0 [ 68.594578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.600047] kthread+0x328/0x630 [ 68.603258] ret_from_fork+0x10/0x20 [ 68.606819] [ 68.608297] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.608297] [ 68.617932] allocated by task 336 on cpu 6 at 68.584247s (0.033682s ago): [ 68.624717] test_alloc+0x29c/0x628 [ 68.628171] test_out_of_bounds_write+0xc8/0x240 [ 68.632772] kunit_try_run_case+0x170/0x3f0 [ 68.636938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.642407] kthread+0x328/0x630 [ 68.645619] ret_from_fork+0x10/0x20 [ 68.649180] [ 68.650665] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 68.661773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.665932] Hardware name: WinLink E850-96 board (DT) [ 68.670969] ================================================================== [ 69.208266] ================================================================== [ 69.208394] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 69.208394] [ 69.208550] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#120): [ 69.209713] test_out_of_bounds_write+0x100/0x240 [ 69.214399] kunit_try_run_case+0x170/0x3f0 [ 69.218565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.224034] kthread+0x328/0x630 [ 69.227246] ret_from_fork+0x10/0x20 [ 69.230806] [ 69.232284] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.232284] [ 69.241398] allocated by task 338 on cpu 7 at 69.208235s (0.033161s ago): [ 69.248184] test_alloc+0x230/0x628 [ 69.251637] test_out_of_bounds_write+0xc8/0x240 [ 69.256240] kunit_try_run_case+0x170/0x3f0 [ 69.260405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.265873] kthread+0x328/0x630 [ 69.269085] ret_from_fork+0x10/0x20 [ 69.272646] [ 69.274131] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 69.285240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.289399] Hardware name: WinLink E850-96 board (DT) [ 69.294436] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
[ 68.368261] ================================================================== [ 68.373790] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 68.373790] [ 68.382816] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#112): [ 68.390194] test_out_of_bounds_read+0x1c8/0x3e0 [ 68.394795] kunit_try_run_case+0x170/0x3f0 [ 68.398961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.404430] kthread+0x328/0x630 [ 68.407641] ret_from_fork+0x10/0x20 [ 68.411200] [ 68.412678] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.412678] [ 68.421791] allocated by task 334 on cpu 7 at 68.368233s (0.053556s ago): [ 68.428579] test_alloc+0x230/0x628 [ 68.432034] test_out_of_bounds_read+0x198/0x3e0 [ 68.436634] kunit_try_run_case+0x170/0x3f0 [ 68.440801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.446270] kthread+0x328/0x630 [ 68.449481] ret_from_fork+0x10/0x20 [ 68.453042] [ 68.454524] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 68.465633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.469795] Hardware name: WinLink E850-96 board (DT) [ 68.474831] ================================================================== [ 68.264272] ================================================================== [ 68.264398] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 68.264398] [ 68.264551] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#111): [ 68.265458] test_out_of_bounds_read+0x114/0x3e0 [ 68.270057] kunit_try_run_case+0x170/0x3f0 [ 68.274223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.279692] kthread+0x328/0x630 [ 68.282904] ret_from_fork+0x10/0x20 [ 68.286464] [ 68.287942] kfence-#111: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.287942] [ 68.297056] allocated by task 334 on cpu 7 at 68.264236s (0.032818s ago): [ 68.303841] test_alloc+0x230/0x628 [ 68.307296] test_out_of_bounds_read+0xdc/0x3e0 [ 68.311810] kunit_try_run_case+0x170/0x3f0 [ 68.315978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.321445] kthread+0x328/0x630 [ 68.324657] ret_from_fork+0x10/0x20 [ 68.328217] [ 68.329702] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 68.340809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.344970] Hardware name: WinLink E850-96 board (DT) [ 68.350006] ================================================================== [ 67.840266] ================================================================== [ 67.845530] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 67.845530] [ 67.854557] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#107): [ 67.861935] test_out_of_bounds_read+0x1c8/0x3e0 [ 67.866536] kunit_try_run_case+0x170/0x3f0 [ 67.870702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.876170] kthread+0x328/0x630 [ 67.879382] ret_from_fork+0x10/0x20 [ 67.882941] [ 67.884418] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.884418] [ 67.894053] allocated by task 332 on cpu 6 at 67.840239s (0.053812s ago): [ 67.900839] test_alloc+0x29c/0x628 [ 67.904297] test_out_of_bounds_read+0x198/0x3e0 [ 67.908896] kunit_try_run_case+0x170/0x3f0 [ 67.913063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.918531] kthread+0x328/0x630 [ 67.921743] ret_from_fork+0x10/0x20 [ 67.925302] [ 67.926786] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 67.937895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.942055] Hardware name: WinLink E850-96 board (DT) [ 67.947091] ================================================================== [ 67.736275] ================================================================== [ 67.736399] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.736399] [ 67.736557] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#106): [ 67.737458] test_out_of_bounds_read+0x114/0x3e0 [ 67.742058] kunit_try_run_case+0x170/0x3f0 [ 67.746224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.751693] kthread+0x328/0x630 [ 67.754905] ret_from_fork+0x10/0x20 [ 67.758464] [ 67.759943] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.759943] [ 67.769578] allocated by task 332 on cpu 6 at 67.736243s (0.033332s ago): [ 67.776363] test_alloc+0x29c/0x628 [ 67.779818] test_out_of_bounds_read+0xdc/0x3e0 [ 67.784332] kunit_try_run_case+0x170/0x3f0 [ 67.788498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.793967] kthread+0x328/0x630 [ 67.797178] ret_from_fork+0x10/0x20 [ 67.800739] [ 67.802224] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 67.813331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.817492] Hardware name: WinLink E850-96 board (DT) [ 67.822529] ==================================================================
Failure - log-parser-test - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-test/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right: Failure
[ 20.739634] ================================================================== [ 20.762432] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 20.762432] [ 20.771980] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#38): [ 20.781356] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.786563] kunit_try_run_case+0x170/0x3f0 [ 20.790730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.796198] kthread+0x328/0x630 [ 20.799410] ret_from_fork+0x10/0x20 [ 20.802970] [ 20.804449] kfence-#38: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 20.804449] [ 20.814170] allocated by task 187 on cpu 5 at 20.739296s (0.074872s ago): [ 20.820955] kmalloc_track_caller_oob_right+0x184/0x488 [ 20.826146] kunit_try_run_case+0x170/0x3f0 [ 20.830312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.835781] kthread+0x328/0x630 [ 20.838993] ret_from_fork+0x10/0x20 [ 20.842552] [ 20.844033] freed by task 187 on cpu 5 at 20.739599s (0.104430s ago): [ 20.850466] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.855659] kunit_try_run_case+0x170/0x3f0 [ 20.859826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865295] kthread+0x328/0x630 [ 20.868506] ret_from_fork+0x10/0x20 [ 20.872067] [ 20.873550] CPU: 5 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.884660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888820] Hardware name: WinLink E850-96 board (DT) [ 20.893856] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
[ 66.613638] ================================================================== [ 66.620736] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 66.627592] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 66.635142] [ 66.636627] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 66.636683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.636699] Hardware name: WinLink E850-96 board (DT) [ 66.636719] Call trace: [ 66.636733] show_stack+0x20/0x38 (C) [ 66.636768] dump_stack_lvl+0x8c/0xd0 [ 66.636798] print_report+0x118/0x608 [ 66.636835] kasan_report+0xdc/0x128 [ 66.636866] kasan_check_range+0x100/0x1a8 [ 66.636900] __kasan_check_write+0x20/0x30 [ 66.636936] strncpy_from_user+0x3c/0x2a0 [ 66.636974] copy_user_test_oob+0x5c0/0xec8 [ 66.637006] kunit_try_run_case+0x170/0x3f0 [ 66.637039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.637074] kthread+0x328/0x630 [ 66.637108] ret_from_fork+0x10/0x20 [ 66.637140] [ 66.708059] Allocated by task 330: [ 66.711445] kasan_save_stack+0x3c/0x68 [ 66.715262] kasan_save_track+0x20/0x40 [ 66.719083] kasan_save_alloc_info+0x40/0x58 [ 66.723335] __kasan_kmalloc+0xd4/0xd8 [ 66.727068] __kmalloc_noprof+0x190/0x4d0 [ 66.731061] kunit_kmalloc_array+0x34/0x88 [ 66.735141] copy_user_test_oob+0xac/0xec8 [ 66.739220] kunit_try_run_case+0x170/0x3f0 [ 66.743387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.748856] kthread+0x328/0x630 [ 66.752068] ret_from_fork+0x10/0x20 [ 66.755627] [ 66.757104] The buggy address belongs to the object at ffff000803cf7000 [ 66.757104] which belongs to the cache kmalloc-128 of size 128 [ 66.769604] The buggy address is located 0 bytes inside of [ 66.769604] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 66.782015] [ 66.783491] The buggy address belongs to the physical page: [ 66.789052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 66.797036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.804673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.811616] page_type: f5(slab) [ 66.814751] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.822472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.830199] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.838010] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.845823] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 66.853635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.861441] page dumped because: kasan: bad access detected [ 66.866996] [ 66.868472] Memory state around the buggy address: [ 66.873254] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.880455] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.887659] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.894860] ^ [ 66.901982] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.909187] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.916388] ================================================================== [ 66.923850] ================================================================== [ 66.930804] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 66.937742] Write of size 1 at addr ffff000803cf7078 by task kunit_try_catch/330 [ 66.945120] [ 66.946604] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 66.946661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.946678] Hardware name: WinLink E850-96 board (DT) [ 66.946697] Call trace: [ 66.946711] show_stack+0x20/0x38 (C) [ 66.946745] dump_stack_lvl+0x8c/0xd0 [ 66.946778] print_report+0x118/0x608 [ 66.946811] kasan_report+0xdc/0x128 [ 66.946844] __asan_report_store1_noabort+0x20/0x30 [ 66.946884] strncpy_from_user+0x270/0x2a0 [ 66.946917] copy_user_test_oob+0x5c0/0xec8 [ 66.946949] kunit_try_run_case+0x170/0x3f0 [ 66.946980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.947017] kthread+0x328/0x630 [ 66.947051] ret_from_fork+0x10/0x20 [ 66.947085] [ 67.014824] Allocated by task 330: [ 67.018211] kasan_save_stack+0x3c/0x68 [ 67.022029] kasan_save_track+0x20/0x40 [ 67.025849] kasan_save_alloc_info+0x40/0x58 [ 67.030101] __kasan_kmalloc+0xd4/0xd8 [ 67.033834] __kmalloc_noprof+0x190/0x4d0 [ 67.037827] kunit_kmalloc_array+0x34/0x88 [ 67.041907] copy_user_test_oob+0xac/0xec8 [ 67.045987] kunit_try_run_case+0x170/0x3f0 [ 67.050153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.055622] kthread+0x328/0x630 [ 67.058834] ret_from_fork+0x10/0x20 [ 67.062393] [ 67.063870] The buggy address belongs to the object at ffff000803cf7000 [ 67.063870] which belongs to the cache kmalloc-128 of size 128 [ 67.076371] The buggy address is located 0 bytes to the right of [ 67.076371] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 67.089302] [ 67.090778] The buggy address belongs to the physical page: [ 67.096336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 67.104321] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 67.111960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 67.118902] page_type: f5(slab) [ 67.122038] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 67.129760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.137486] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 67.145297] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.153110] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 67.160922] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 67.168728] page dumped because: kasan: bad access detected [ 67.174283] [ 67.175759] Memory state around the buggy address: [ 67.180540] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.187742] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.194946] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 67.202148] ^ [ 67.209269] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.216474] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.223675] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
[ 66.001325] ================================================================== [ 66.008420] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 66.015447] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 66.022998] [ 66.024483] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 66.024541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.024558] Hardware name: WinLink E850-96 board (DT) [ 66.024580] Call trace: [ 66.024596] show_stack+0x20/0x38 (C) [ 66.024634] dump_stack_lvl+0x8c/0xd0 [ 66.024667] print_report+0x118/0x608 [ 66.024702] kasan_report+0xdc/0x128 [ 66.024733] kasan_check_range+0x100/0x1a8 [ 66.024767] __kasan_check_write+0x20/0x30 [ 66.024801] copy_user_test_oob+0x434/0xec8 [ 66.024832] kunit_try_run_case+0x170/0x3f0 [ 66.024864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.024902] kthread+0x328/0x630 [ 66.024937] ret_from_fork+0x10/0x20 [ 66.024973] [ 66.091922] Allocated by task 330: [ 66.095309] kasan_save_stack+0x3c/0x68 [ 66.099126] kasan_save_track+0x20/0x40 [ 66.102946] kasan_save_alloc_info+0x40/0x58 [ 66.107199] __kasan_kmalloc+0xd4/0xd8 [ 66.110931] __kmalloc_noprof+0x190/0x4d0 [ 66.114924] kunit_kmalloc_array+0x34/0x88 [ 66.119004] copy_user_test_oob+0xac/0xec8 [ 66.123084] kunit_try_run_case+0x170/0x3f0 [ 66.127250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.132719] kthread+0x328/0x630 [ 66.135932] ret_from_fork+0x10/0x20 [ 66.139490] [ 66.140967] The buggy address belongs to the object at ffff000803cf7000 [ 66.140967] which belongs to the cache kmalloc-128 of size 128 [ 66.153469] The buggy address is located 0 bytes inside of [ 66.153469] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 66.165878] [ 66.167356] The buggy address belongs to the physical page: [ 66.172913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 66.180897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.188536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.195480] page_type: f5(slab) [ 66.198618] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.206336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.214062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.221873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.229687] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 66.237498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.245304] page dumped because: kasan: bad access detected [ 66.250860] [ 66.252335] Memory state around the buggy address: [ 66.257117] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.264318] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.271524] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.278724] ^ [ 66.285845] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.293050] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.300253] ================================================================== [ 66.307584] ================================================================== [ 66.314666] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.321692] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 66.329157] [ 66.330641] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 66.330696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.330710] Hardware name: WinLink E850-96 board (DT) [ 66.330731] Call trace: [ 66.330746] show_stack+0x20/0x38 (C) [ 66.330779] dump_stack_lvl+0x8c/0xd0 [ 66.330809] print_report+0x118/0x608 [ 66.330840] kasan_report+0xdc/0x128 [ 66.330870] kasan_check_range+0x100/0x1a8 [ 66.330904] __kasan_check_read+0x20/0x30 [ 66.330935] copy_user_test_oob+0x4a0/0xec8 [ 66.330966] kunit_try_run_case+0x170/0x3f0 [ 66.330998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.331035] kthread+0x328/0x630 [ 66.331071] ret_from_fork+0x10/0x20 [ 66.331102] [ 66.397993] Allocated by task 330: [ 66.401380] kasan_save_stack+0x3c/0x68 [ 66.405198] kasan_save_track+0x20/0x40 [ 66.409019] kasan_save_alloc_info+0x40/0x58 [ 66.413271] __kasan_kmalloc+0xd4/0xd8 [ 66.417003] __kmalloc_noprof+0x190/0x4d0 [ 66.420996] kunit_kmalloc_array+0x34/0x88 [ 66.425076] copy_user_test_oob+0xac/0xec8 [ 66.429156] kunit_try_run_case+0x170/0x3f0 [ 66.433322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.438791] kthread+0x328/0x630 [ 66.442004] ret_from_fork+0x10/0x20 [ 66.445561] [ 66.447037] The buggy address belongs to the object at ffff000803cf7000 [ 66.447037] which belongs to the cache kmalloc-128 of size 128 [ 66.459540] The buggy address is located 0 bytes inside of [ 66.459540] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 66.471950] [ 66.473426] The buggy address belongs to the physical page: [ 66.478987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 66.486969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.494608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.501550] page_type: f5(slab) [ 66.504687] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.512408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.520134] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.527945] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.535758] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 66.543570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.551376] page dumped because: kasan: bad access detected [ 66.556931] [ 66.558408] Memory state around the buggy address: [ 66.563187] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.570390] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.577595] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.584795] ^ [ 66.591917] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.599122] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.606325] ================================================================== [ 65.083291] ================================================================== [ 65.090030] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 65.097058] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 65.104524] [ 65.106009] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 65.106066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.106087] Hardware name: WinLink E850-96 board (DT) [ 65.106107] Call trace: [ 65.106122] show_stack+0x20/0x38 (C) [ 65.106158] dump_stack_lvl+0x8c/0xd0 [ 65.106192] print_report+0x118/0x608 [ 65.106228] kasan_report+0xdc/0x128 [ 65.106258] kasan_check_range+0x100/0x1a8 [ 65.106295] __kasan_check_read+0x20/0x30 [ 65.106331] copy_user_test_oob+0x728/0xec8 [ 65.106363] kunit_try_run_case+0x170/0x3f0 [ 65.106399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.106437] kthread+0x328/0x630 [ 65.106472] ret_from_fork+0x10/0x20 [ 65.106508] [ 65.173359] Allocated by task 330: [ 65.176746] kasan_save_stack+0x3c/0x68 [ 65.180563] kasan_save_track+0x20/0x40 [ 65.184384] kasan_save_alloc_info+0x40/0x58 [ 65.188636] __kasan_kmalloc+0xd4/0xd8 [ 65.192368] __kmalloc_noprof+0x190/0x4d0 [ 65.196361] kunit_kmalloc_array+0x34/0x88 [ 65.200441] copy_user_test_oob+0xac/0xec8 [ 65.204521] kunit_try_run_case+0x170/0x3f0 [ 65.208688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.214157] kthread+0x328/0x630 [ 65.217370] ret_from_fork+0x10/0x20 [ 65.220927] [ 65.222405] The buggy address belongs to the object at ffff000803cf7000 [ 65.222405] which belongs to the cache kmalloc-128 of size 128 [ 65.234905] The buggy address is located 0 bytes inside of [ 65.234905] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 65.247316] [ 65.248795] The buggy address belongs to the physical page: [ 65.254351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 65.262334] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.269975] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.276916] page_type: f5(slab) [ 65.280054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.287773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.295499] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.303311] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.311124] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.318936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.326742] page dumped because: kasan: bad access detected [ 65.332297] [ 65.333772] Memory state around the buggy address: [ 65.338555] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.345757] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.352962] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.360161] ^ [ 65.367283] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.374487] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.381689] ================================================================== [ 65.389222] ================================================================== [ 65.396104] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.403131] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 65.410683] [ 65.412165] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 65.412223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.412240] Hardware name: WinLink E850-96 board (DT) [ 65.412258] Call trace: [ 65.412273] show_stack+0x20/0x38 (C) [ 65.412311] dump_stack_lvl+0x8c/0xd0 [ 65.412345] print_report+0x118/0x608 [ 65.412379] kasan_report+0xdc/0x128 [ 65.412411] kasan_check_range+0x100/0x1a8 [ 65.412446] __kasan_check_write+0x20/0x30 [ 65.412480] copy_user_test_oob+0x35c/0xec8 [ 65.412511] kunit_try_run_case+0x170/0x3f0 [ 65.412545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.412583] kthread+0x328/0x630 [ 65.412618] ret_from_fork+0x10/0x20 [ 65.412657] [ 65.479606] Allocated by task 330: [ 65.482993] kasan_save_stack+0x3c/0x68 [ 65.486810] kasan_save_track+0x20/0x40 [ 65.490630] kasan_save_alloc_info+0x40/0x58 [ 65.494882] __kasan_kmalloc+0xd4/0xd8 [ 65.498614] __kmalloc_noprof+0x190/0x4d0 [ 65.502607] kunit_kmalloc_array+0x34/0x88 [ 65.506687] copy_user_test_oob+0xac/0xec8 [ 65.510767] kunit_try_run_case+0x170/0x3f0 [ 65.514933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.520402] kthread+0x328/0x630 [ 65.523615] ret_from_fork+0x10/0x20 [ 65.527172] [ 65.528650] The buggy address belongs to the object at ffff000803cf7000 [ 65.528650] which belongs to the cache kmalloc-128 of size 128 [ 65.541151] The buggy address is located 0 bytes inside of [ 65.541151] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 65.553561] [ 65.555040] The buggy address belongs to the physical page: [ 65.560596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 65.568581] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.576220] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.583163] page_type: f5(slab) [ 65.586298] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.594019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.601745] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.609556] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.617369] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.625181] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.632987] page dumped because: kasan: bad access detected [ 65.638542] [ 65.640018] Memory state around the buggy address: [ 65.644800] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.652001] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.659207] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.666407] ^ [ 65.673528] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.680733] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.687934] ================================================================== [ 64.771337] ================================================================== [ 64.783789] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.790812] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 64.798366] [ 64.799852] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 64.799914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.799933] Hardware name: WinLink E850-96 board (DT) [ 64.799957] Call trace: [ 64.799971] show_stack+0x20/0x38 (C) [ 64.800006] dump_stack_lvl+0x8c/0xd0 [ 64.800041] print_report+0x118/0x608 [ 64.800077] kasan_report+0xdc/0x128 [ 64.800111] kasan_check_range+0x100/0x1a8 [ 64.800147] __kasan_check_write+0x20/0x30 [ 64.800181] copy_user_test_oob+0x234/0xec8 [ 64.800212] kunit_try_run_case+0x170/0x3f0 [ 64.800246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.800281] kthread+0x328/0x630 [ 64.800317] ret_from_fork+0x10/0x20 [ 64.800353] [ 64.867289] Allocated by task 330: [ 64.870677] kasan_save_stack+0x3c/0x68 [ 64.874492] kasan_save_track+0x20/0x40 [ 64.878312] kasan_save_alloc_info+0x40/0x58 [ 64.882564] __kasan_kmalloc+0xd4/0xd8 [ 64.886297] __kmalloc_noprof+0x190/0x4d0 [ 64.890290] kunit_kmalloc_array+0x34/0x88 [ 64.894369] copy_user_test_oob+0xac/0xec8 [ 64.898449] kunit_try_run_case+0x170/0x3f0 [ 64.902616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.908085] kthread+0x328/0x630 [ 64.911298] ret_from_fork+0x10/0x20 [ 64.914855] [ 64.916333] The buggy address belongs to the object at ffff000803cf7000 [ 64.916333] which belongs to the cache kmalloc-128 of size 128 [ 64.928833] The buggy address is located 0 bytes inside of [ 64.928833] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 64.941244] [ 64.942724] The buggy address belongs to the physical page: [ 64.948279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 64.956263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.963902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.970846] page_type: f5(slab) [ 64.973984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.981701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.989430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.997239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.005052] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.012864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.020670] page dumped because: kasan: bad access detected [ 65.026225] [ 65.027701] Memory state around the buggy address: [ 65.032483] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.039684] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.046890] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.054089] ^ [ 65.061211] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.068416] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.075618] ================================================================== [ 65.695262] ================================================================== [ 65.702347] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.709375] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 65.716840] [ 65.718325] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 65.718376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.718394] Hardware name: WinLink E850-96 board (DT) [ 65.718417] Call trace: [ 65.718431] show_stack+0x20/0x38 (C) [ 65.718463] dump_stack_lvl+0x8c/0xd0 [ 65.718494] print_report+0x118/0x608 [ 65.718526] kasan_report+0xdc/0x128 [ 65.718558] kasan_check_range+0x100/0x1a8 [ 65.718594] __kasan_check_read+0x20/0x30 [ 65.718628] copy_user_test_oob+0x3c8/0xec8 [ 65.718660] kunit_try_run_case+0x170/0x3f0 [ 65.718690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.718727] kthread+0x328/0x630 [ 65.718759] ret_from_fork+0x10/0x20 [ 65.718794] [ 65.785675] Allocated by task 330: [ 65.789063] kasan_save_stack+0x3c/0x68 [ 65.792881] kasan_save_track+0x20/0x40 [ 65.796701] kasan_save_alloc_info+0x40/0x58 [ 65.800953] __kasan_kmalloc+0xd4/0xd8 [ 65.804686] __kmalloc_noprof+0x190/0x4d0 [ 65.808679] kunit_kmalloc_array+0x34/0x88 [ 65.812758] copy_user_test_oob+0xac/0xec8 [ 65.816839] kunit_try_run_case+0x170/0x3f0 [ 65.821005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.826474] kthread+0x328/0x630 [ 65.829687] ret_from_fork+0x10/0x20 [ 65.833245] [ 65.834720] The buggy address belongs to the object at ffff000803cf7000 [ 65.834720] which belongs to the cache kmalloc-128 of size 128 [ 65.847224] The buggy address is located 0 bytes inside of [ 65.847224] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 65.859633] [ 65.861112] The buggy address belongs to the physical page: [ 65.866668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 65.874652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.882292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.889234] page_type: f5(slab) [ 65.892369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.900090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.907817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.915628] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.923441] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.931253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.939058] page dumped because: kasan: bad access detected [ 65.944614] [ 65.946090] Memory state around the buggy address: [ 65.950872] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.958072] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.965279] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.972478] ^ [ 65.979600] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.986805] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.994006] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
[ 64.143983] ================================================================== [ 64.158190] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 64.165563] Read of size 8 at addr ffff000801adc978 by task kunit_try_catch/326 [ 64.172854] [ 64.174339] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 64.174398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.174416] Hardware name: WinLink E850-96 board (DT) [ 64.174438] Call trace: [ 64.174453] show_stack+0x20/0x38 (C) [ 64.174491] dump_stack_lvl+0x8c/0xd0 [ 64.174524] print_report+0x118/0x608 [ 64.174556] kasan_report+0xdc/0x128 [ 64.174588] __asan_report_load8_noabort+0x20/0x30 [ 64.174627] copy_to_kernel_nofault+0x204/0x250 [ 64.174662] copy_to_kernel_nofault_oob+0x158/0x418 [ 64.174696] kunit_try_run_case+0x170/0x3f0 [ 64.174728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.174767] kthread+0x328/0x630 [ 64.174805] ret_from_fork+0x10/0x20 [ 64.174841] [ 64.243599] Allocated by task 326: [ 64.246988] kasan_save_stack+0x3c/0x68 [ 64.250803] kasan_save_track+0x20/0x40 [ 64.254622] kasan_save_alloc_info+0x40/0x58 [ 64.258876] __kasan_kmalloc+0xd4/0xd8 [ 64.262609] __kmalloc_cache_noprof+0x15c/0x3c0 [ 64.267122] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.271897] kunit_try_run_case+0x170/0x3f0 [ 64.276062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.281532] kthread+0x328/0x630 [ 64.284743] ret_from_fork+0x10/0x20 [ 64.288303] [ 64.289780] The buggy address belongs to the object at ffff000801adc900 [ 64.289780] which belongs to the cache kmalloc-128 of size 128 [ 64.302281] The buggy address is located 0 bytes to the right of [ 64.302281] allocated 120-byte region [ffff000801adc900, ffff000801adc978) [ 64.315212] [ 64.316691] The buggy address belongs to the physical page: [ 64.322247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc [ 64.330230] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.337870] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.344813] page_type: f5(slab) [ 64.347952] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.355669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.363395] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.371207] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.379020] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff [ 64.386832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.394637] page dumped because: kasan: bad access detected [ 64.400193] [ 64.401668] Memory state around the buggy address: [ 64.406452] ffff000801adc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.413651] ffff000801adc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.420857] >ffff000801adc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.428057] ^ [ 64.435179] ffff000801adc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.442385] ffff000801adca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.449586] ================================================================== [ 64.456927] ================================================================== [ 64.463998] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 64.471286] Write of size 8 at addr ffff000801adc978 by task kunit_try_catch/326 [ 64.478664] [ 64.480149] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 64.480209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.480227] Hardware name: WinLink E850-96 board (DT) [ 64.480247] Call trace: [ 64.480260] show_stack+0x20/0x38 (C) [ 64.480296] dump_stack_lvl+0x8c/0xd0 [ 64.480330] print_report+0x118/0x608 [ 64.480367] kasan_report+0xdc/0x128 [ 64.480397] kasan_check_range+0x100/0x1a8 [ 64.480434] __kasan_check_write+0x20/0x30 [ 64.480468] copy_to_kernel_nofault+0x8c/0x250 [ 64.480502] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 64.480535] kunit_try_run_case+0x170/0x3f0 [ 64.480569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.480605] kthread+0x328/0x630 [ 64.480640] ret_from_fork+0x10/0x20 [ 64.480677] [ 64.552709] Allocated by task 326: [ 64.556096] kasan_save_stack+0x3c/0x68 [ 64.559913] kasan_save_track+0x20/0x40 [ 64.563732] kasan_save_alloc_info+0x40/0x58 [ 64.567986] __kasan_kmalloc+0xd4/0xd8 [ 64.571720] __kmalloc_cache_noprof+0x15c/0x3c0 [ 64.576232] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.581006] kunit_try_run_case+0x170/0x3f0 [ 64.585173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.590642] kthread+0x328/0x630 [ 64.593853] ret_from_fork+0x10/0x20 [ 64.597412] [ 64.598890] The buggy address belongs to the object at ffff000801adc900 [ 64.598890] which belongs to the cache kmalloc-128 of size 128 [ 64.611390] The buggy address is located 0 bytes to the right of [ 64.611390] allocated 120-byte region [ffff000801adc900, ffff000801adc978) [ 64.624321] [ 64.625800] The buggy address belongs to the physical page: [ 64.631357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc [ 64.639340] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.646979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.653922] page_type: f5(slab) [ 64.657057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.664779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.672506] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.680317] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.688129] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff [ 64.695942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.703749] page dumped because: kasan: bad access detected [ 64.709303] [ 64.710778] Memory state around the buggy address: [ 64.715558] ffff000801adc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.722761] ffff000801adc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.729968] >ffff000801adc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.737167] ^ [ 64.744289] ffff000801adc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.751494] ffff000801adca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.758695] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
[ 63.702306] ================================================================== [ 63.716700] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 63.723382] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/314 [ 63.730673] [ 63.732157] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 63.732216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.732235] Hardware name: WinLink E850-96 board (DT) [ 63.732257] Call trace: [ 63.732275] show_stack+0x20/0x38 (C) [ 63.732313] dump_stack_lvl+0x8c/0xd0 [ 63.732347] print_report+0x310/0x608 [ 63.732382] kasan_report+0xdc/0x128 [ 63.732416] __asan_report_load1_noabort+0x20/0x30 [ 63.732456] vmalloc_oob+0x578/0x5d0 [ 63.732484] kunit_try_run_case+0x170/0x3f0 [ 63.732519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.732557] kthread+0x328/0x630 [ 63.732592] ret_from_fork+0x10/0x20 [ 63.732627] [ 63.795608] The buggy address belongs to the virtual mapping at [ 63.795608] [ffff800087c7d000, ffff800087c7f000) created by: [ 63.795608] vmalloc_oob+0x98/0x5d0 [ 63.810705] [ 63.812185] The buggy address belongs to the physical page: [ 63.817739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886979 [ 63.825725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.832247] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.839965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.847684] page dumped because: kasan: bad access detected [ 63.853239] [ 63.854715] Memory state around the buggy address: [ 63.859496] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.866698] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.873904] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.881104] ^ [ 63.887966] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.895170] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.902374] ================================================================== [ 63.909876] ================================================================== [ 63.916785] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 63.923464] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/314 [ 63.930756] [ 63.932241] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 63.932298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.932313] Hardware name: WinLink E850-96 board (DT) [ 63.932334] Call trace: [ 63.932348] show_stack+0x20/0x38 (C) [ 63.932388] dump_stack_lvl+0x8c/0xd0 [ 63.932423] print_report+0x310/0x608 [ 63.932456] kasan_report+0xdc/0x128 [ 63.932485] __asan_report_load1_noabort+0x20/0x30 [ 63.932522] vmalloc_oob+0x51c/0x5d0 [ 63.932549] kunit_try_run_case+0x170/0x3f0 [ 63.932583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.932620] kthread+0x328/0x630 [ 63.932654] ret_from_fork+0x10/0x20 [ 63.932689] [ 63.995690] The buggy address belongs to the virtual mapping at [ 63.995690] [ffff800087c7d000, ffff800087c7f000) created by: [ 63.995690] vmalloc_oob+0x98/0x5d0 [ 64.010789] [ 64.012269] The buggy address belongs to the physical page: [ 64.017824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886979 [ 64.025808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.032326] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 64.040048] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 64.047767] page dumped because: kasan: bad access detected [ 64.053323] [ 64.054799] Memory state around the buggy address: [ 64.059578] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.066782] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.073988] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 64.081187] ^ [ 64.088310] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 64.095514] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 64.102716] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
[ 56.031314] ================================================================== [ 56.038257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 56.045631] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.052923] [ 56.054406] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.054457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.054471] Hardware name: WinLink E850-96 board (DT) [ 56.054490] Call trace: [ 56.054503] show_stack+0x20/0x38 (C) [ 56.054536] dump_stack_lvl+0x8c/0xd0 [ 56.054567] print_report+0x118/0x608 [ 56.054599] kasan_report+0xdc/0x128 [ 56.054630] __asan_report_load8_noabort+0x20/0x30 [ 56.054666] kasan_atomics_helper+0x3f58/0x4858 [ 56.054699] kasan_atomics+0x198/0x2e0 [ 56.054729] kunit_try_run_case+0x170/0x3f0 [ 56.054762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.054798] kthread+0x328/0x630 [ 56.054830] ret_from_fork+0x10/0x20 [ 56.054863] [ 56.122539] Allocated by task 310: [ 56.125928] kasan_save_stack+0x3c/0x68 [ 56.129744] kasan_save_track+0x20/0x40 [ 56.133564] kasan_save_alloc_info+0x40/0x58 [ 56.137817] __kasan_kmalloc+0xd4/0xd8 [ 56.141550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.146063] kasan_atomics+0xb8/0x2e0 [ 56.149709] kunit_try_run_case+0x170/0x3f0 [ 56.153876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.159345] kthread+0x328/0x630 [ 56.162556] ret_from_fork+0x10/0x20 [ 56.166115] [ 56.167592] The buggy address belongs to the object at ffff00080243ed00 [ 56.167592] which belongs to the cache kmalloc-64 of size 64 [ 56.179919] The buggy address is located 0 bytes to the right of [ 56.179919] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.192764] [ 56.194240] The buggy address belongs to the physical page: [ 56.199798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.207783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.214293] page_type: f5(slab) [ 56.217426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.225149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.232868] page dumped because: kasan: bad access detected [ 56.238423] [ 56.239899] Memory state around the buggy address: [ 56.244678] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.251882] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.259088] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.266287] ^ [ 56.271065] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.278272] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.285471] ================================================================== [ 60.261671] ================================================================== [ 60.268746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.276123] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.283502] [ 60.284984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.285033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.285048] Hardware name: WinLink E850-96 board (DT) [ 60.285067] Call trace: [ 60.285081] show_stack+0x20/0x38 (C) [ 60.285114] dump_stack_lvl+0x8c/0xd0 [ 60.285146] print_report+0x118/0x608 [ 60.285179] kasan_report+0xdc/0x128 [ 60.285210] kasan_check_range+0x100/0x1a8 [ 60.285241] __kasan_check_write+0x20/0x30 [ 60.285276] kasan_atomics_helper+0x1414/0x4858 [ 60.285308] kasan_atomics+0x198/0x2e0 [ 60.285339] kunit_try_run_case+0x170/0x3f0 [ 60.285370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.285405] kthread+0x328/0x630 [ 60.285437] ret_from_fork+0x10/0x20 [ 60.285469] [ 60.356503] Allocated by task 310: [ 60.359891] kasan_save_stack+0x3c/0x68 [ 60.363709] kasan_save_track+0x20/0x40 [ 60.367528] kasan_save_alloc_info+0x40/0x58 [ 60.371781] __kasan_kmalloc+0xd4/0xd8 [ 60.375514] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.380028] kasan_atomics+0xb8/0x2e0 [ 60.383673] kunit_try_run_case+0x170/0x3f0 [ 60.387840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.393309] kthread+0x328/0x630 [ 60.396520] ret_from_fork+0x10/0x20 [ 60.400080] [ 60.401556] The buggy address belongs to the object at ffff00080243ed00 [ 60.401556] which belongs to the cache kmalloc-64 of size 64 [ 60.413883] The buggy address is located 0 bytes to the right of [ 60.413883] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.426728] [ 60.428204] The buggy address belongs to the physical page: [ 60.433763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.441748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.448257] page_type: f5(slab) [ 60.451389] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.459113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.466832] page dumped because: kasan: bad access detected [ 60.472387] [ 60.473863] Memory state around the buggy address: [ 60.478644] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.485846] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.493052] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.500251] ^ [ 60.505029] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.512236] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.519435] ================================================================== [ 56.557759] ================================================================== [ 56.564810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.572186] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.579564] [ 56.581046] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.581095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.581112] Hardware name: WinLink E850-96 board (DT) [ 56.581134] Call trace: [ 56.581149] show_stack+0x20/0x38 (C) [ 56.581183] dump_stack_lvl+0x8c/0xd0 [ 56.581216] print_report+0x118/0x608 [ 56.581246] kasan_report+0xdc/0x128 [ 56.581278] __asan_report_store8_noabort+0x20/0x30 [ 56.581315] kasan_atomics_helper+0x3e5c/0x4858 [ 56.581348] kasan_atomics+0x198/0x2e0 [ 56.581377] kunit_try_run_case+0x170/0x3f0 [ 56.581407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.581443] kthread+0x328/0x630 [ 56.581473] ret_from_fork+0x10/0x20 [ 56.581508] [ 56.649268] Allocated by task 310: [ 56.652656] kasan_save_stack+0x3c/0x68 [ 56.656473] kasan_save_track+0x20/0x40 [ 56.660292] kasan_save_alloc_info+0x40/0x58 [ 56.664545] __kasan_kmalloc+0xd4/0xd8 [ 56.668278] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.672792] kasan_atomics+0xb8/0x2e0 [ 56.676437] kunit_try_run_case+0x170/0x3f0 [ 56.680604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.686073] kthread+0x328/0x630 [ 56.689285] ret_from_fork+0x10/0x20 [ 56.692843] [ 56.694321] The buggy address belongs to the object at ffff00080243ed00 [ 56.694321] which belongs to the cache kmalloc-64 of size 64 [ 56.706647] The buggy address is located 0 bytes to the right of [ 56.706647] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.719492] [ 56.720968] The buggy address belongs to the physical page: [ 56.726527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.734511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.741021] page_type: f5(slab) [ 56.744153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.751877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.759596] page dumped because: kasan: bad access detected [ 56.765151] [ 56.766627] Memory state around the buggy address: [ 56.771405] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.778610] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.785816] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.793015] ^ [ 56.797794] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.805000] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.812199] ================================================================== [ 49.692931] ================================================================== [ 49.699984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.707272] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.714650] [ 49.716131] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.716180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.716196] Hardware name: WinLink E850-96 board (DT) [ 49.716216] Call trace: [ 49.716231] show_stack+0x20/0x38 (C) [ 49.716263] dump_stack_lvl+0x8c/0xd0 [ 49.716295] print_report+0x118/0x608 [ 49.716326] kasan_report+0xdc/0x128 [ 49.716355] kasan_check_range+0x100/0x1a8 [ 49.716389] __kasan_check_write+0x20/0x30 [ 49.716425] kasan_atomics_helper+0x54c/0x4858 [ 49.716457] kasan_atomics+0x198/0x2e0 [ 49.716487] kunit_try_run_case+0x170/0x3f0 [ 49.716519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.716553] kthread+0x328/0x630 [ 49.716584] ret_from_fork+0x10/0x20 [ 49.716615] [ 49.787565] Allocated by task 310: [ 49.790953] kasan_save_stack+0x3c/0x68 [ 49.794770] kasan_save_track+0x20/0x40 [ 49.798589] kasan_save_alloc_info+0x40/0x58 [ 49.802843] __kasan_kmalloc+0xd4/0xd8 [ 49.806575] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.811089] kasan_atomics+0xb8/0x2e0 [ 49.814735] kunit_try_run_case+0x170/0x3f0 [ 49.818901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.824370] kthread+0x328/0x630 [ 49.827582] ret_from_fork+0x10/0x20 [ 49.831141] [ 49.832616] The buggy address belongs to the object at ffff00080243ed00 [ 49.832616] which belongs to the cache kmalloc-64 of size 64 [ 49.844945] The buggy address is located 0 bytes to the right of [ 49.844945] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.857790] [ 49.859266] The buggy address belongs to the physical page: [ 49.864825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.872809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.879317] page_type: f5(slab) [ 49.882450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.890175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.897893] page dumped because: kasan: bad access detected [ 49.903448] [ 49.904924] Memory state around the buggy address: [ 49.909703] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.916907] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.924112] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.931313] ^ [ 49.936091] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.943296] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.950496] ================================================================== [ 51.282498] ================================================================== [ 51.289542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.296831] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.304209] [ 51.305692] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.305740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.305756] Hardware name: WinLink E850-96 board (DT) [ 51.305776] Call trace: [ 51.305789] show_stack+0x20/0x38 (C) [ 51.305822] dump_stack_lvl+0x8c/0xd0 [ 51.305851] print_report+0x118/0x608 [ 51.305881] kasan_report+0xdc/0x128 [ 51.305911] kasan_check_range+0x100/0x1a8 [ 51.305944] __kasan_check_write+0x20/0x30 [ 51.305976] kasan_atomics_helper+0x7cc/0x4858 [ 51.306008] kasan_atomics+0x198/0x2e0 [ 51.306036] kunit_try_run_case+0x170/0x3f0 [ 51.306069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.306105] kthread+0x328/0x630 [ 51.306135] ret_from_fork+0x10/0x20 [ 51.306166] [ 51.377124] Allocated by task 310: [ 51.380512] kasan_save_stack+0x3c/0x68 [ 51.384329] kasan_save_track+0x20/0x40 [ 51.388149] kasan_save_alloc_info+0x40/0x58 [ 51.392402] __kasan_kmalloc+0xd4/0xd8 [ 51.396135] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.400648] kasan_atomics+0xb8/0x2e0 [ 51.404294] kunit_try_run_case+0x170/0x3f0 [ 51.408461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.413930] kthread+0x328/0x630 [ 51.417141] ret_from_fork+0x10/0x20 [ 51.420700] [ 51.422176] The buggy address belongs to the object at ffff00080243ed00 [ 51.422176] which belongs to the cache kmalloc-64 of size 64 [ 51.434502] The buggy address is located 0 bytes to the right of [ 51.434502] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.447349] [ 51.448825] The buggy address belongs to the physical page: [ 51.454384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.462368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.468878] page_type: f5(slab) [ 51.472009] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.479734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.487453] page dumped because: kasan: bad access detected [ 51.493008] [ 51.494484] Memory state around the buggy address: [ 51.499263] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.506467] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.513671] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.520873] ^ [ 51.525651] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.532857] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.540056] ================================================================== [ 47.315147] ================================================================== [ 47.322240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.329530] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.336908] [ 47.338390] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.338443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.338460] Hardware name: WinLink E850-96 board (DT) [ 47.338479] Call trace: [ 47.338495] show_stack+0x20/0x38 (C) [ 47.338530] dump_stack_lvl+0x8c/0xd0 [ 47.338561] print_report+0x118/0x608 [ 47.338594] kasan_report+0xdc/0x128 [ 47.338627] kasan_check_range+0x100/0x1a8 [ 47.338658] __kasan_check_write+0x20/0x30 [ 47.338693] kasan_atomics_helper+0x24c/0x4858 [ 47.338725] kasan_atomics+0x198/0x2e0 [ 47.338754] kunit_try_run_case+0x170/0x3f0 [ 47.338789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.338824] kthread+0x328/0x630 [ 47.338856] ret_from_fork+0x10/0x20 [ 47.338887] [ 47.409823] Allocated by task 310: [ 47.413210] kasan_save_stack+0x3c/0x68 [ 47.417028] kasan_save_track+0x20/0x40 [ 47.420847] kasan_save_alloc_info+0x40/0x58 [ 47.425101] __kasan_kmalloc+0xd4/0xd8 [ 47.428834] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.433347] kasan_atomics+0xb8/0x2e0 [ 47.436993] kunit_try_run_case+0x170/0x3f0 [ 47.441160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.446628] kthread+0x328/0x630 [ 47.449840] ret_from_fork+0x10/0x20 [ 47.453399] [ 47.454876] The buggy address belongs to the object at ffff00080243ed00 [ 47.454876] which belongs to the cache kmalloc-64 of size 64 [ 47.467203] The buggy address is located 0 bytes to the right of [ 47.467203] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 47.480048] [ 47.481524] The buggy address belongs to the physical page: [ 47.487083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 47.495067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.501577] page_type: f5(slab) [ 47.504708] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.512432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.520151] page dumped because: kasan: bad access detected [ 47.525707] [ 47.527182] Memory state around the buggy address: [ 47.531962] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.539165] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.546370] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.553571] ^ [ 47.558349] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.565555] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.572755] ================================================================== [ 48.371488] ================================================================== [ 48.378475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.385850] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.393229] [ 48.394710] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.394763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.394777] Hardware name: WinLink E850-96 board (DT) [ 48.394796] Call trace: [ 48.394811] show_stack+0x20/0x38 (C) [ 48.394842] dump_stack_lvl+0x8c/0xd0 [ 48.394875] print_report+0x118/0x608 [ 48.394905] kasan_report+0xdc/0x128 [ 48.394938] __asan_report_store4_noabort+0x20/0x30 [ 48.394978] kasan_atomics_helper+0x3f94/0x4858 [ 48.395009] kasan_atomics+0x198/0x2e0 [ 48.395037] kunit_try_run_case+0x170/0x3f0 [ 48.395067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.395101] kthread+0x328/0x630 [ 48.395133] ret_from_fork+0x10/0x20 [ 48.395166] [ 48.462932] Allocated by task 310: [ 48.466320] kasan_save_stack+0x3c/0x68 [ 48.470137] kasan_save_track+0x20/0x40 [ 48.473957] kasan_save_alloc_info+0x40/0x58 [ 48.478210] __kasan_kmalloc+0xd4/0xd8 [ 48.481942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.486456] kasan_atomics+0xb8/0x2e0 [ 48.490102] kunit_try_run_case+0x170/0x3f0 [ 48.494268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.499737] kthread+0x328/0x630 [ 48.502949] ret_from_fork+0x10/0x20 [ 48.506508] [ 48.507985] The buggy address belongs to the object at ffff00080243ed00 [ 48.507985] which belongs to the cache kmalloc-64 of size 64 [ 48.520310] The buggy address is located 0 bytes to the right of [ 48.520310] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.533157] [ 48.534633] The buggy address belongs to the physical page: [ 48.540191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.548176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.554686] page_type: f5(slab) [ 48.557817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.565542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.573261] page dumped because: kasan: bad access detected [ 48.578816] [ 48.580291] Memory state around the buggy address: [ 48.585070] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.592274] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.599479] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.606680] ^ [ 48.611458] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.618664] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.625864] ================================================================== [ 51.017638] ================================================================== [ 51.024616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 51.031905] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.039283] [ 51.040765] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.040817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.040833] Hardware name: WinLink E850-96 board (DT) [ 51.040854] Call trace: [ 51.040867] show_stack+0x20/0x38 (C) [ 51.040902] dump_stack_lvl+0x8c/0xd0 [ 51.040933] print_report+0x118/0x608 [ 51.040966] kasan_report+0xdc/0x128 [ 51.040998] kasan_check_range+0x100/0x1a8 [ 51.041030] __kasan_check_write+0x20/0x30 [ 51.041066] kasan_atomics_helper+0x760/0x4858 [ 51.041096] kasan_atomics+0x198/0x2e0 [ 51.041126] kunit_try_run_case+0x170/0x3f0 [ 51.041157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.041192] kthread+0x328/0x630 [ 51.041226] ret_from_fork+0x10/0x20 [ 51.041256] [ 51.112197] Allocated by task 310: [ 51.115585] kasan_save_stack+0x3c/0x68 [ 51.119403] kasan_save_track+0x20/0x40 [ 51.123222] kasan_save_alloc_info+0x40/0x58 [ 51.127476] __kasan_kmalloc+0xd4/0xd8 [ 51.131208] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.135722] kasan_atomics+0xb8/0x2e0 [ 51.139368] kunit_try_run_case+0x170/0x3f0 [ 51.143534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.149003] kthread+0x328/0x630 [ 51.152215] ret_from_fork+0x10/0x20 [ 51.155773] [ 51.157251] The buggy address belongs to the object at ffff00080243ed00 [ 51.157251] which belongs to the cache kmalloc-64 of size 64 [ 51.169578] The buggy address is located 0 bytes to the right of [ 51.169578] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.182423] [ 51.183899] The buggy address belongs to the physical page: [ 51.189457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.197442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.203951] page_type: f5(slab) [ 51.207083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.214807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.222526] page dumped because: kasan: bad access detected [ 51.228082] [ 51.229557] Memory state around the buggy address: [ 51.234337] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.241540] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.248745] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.255946] ^ [ 51.260724] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.267930] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.275130] ================================================================== [ 50.222786] ================================================================== [ 50.229837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.237125] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 50.244503] [ 50.245984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 50.246035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.246052] Hardware name: WinLink E850-96 board (DT) [ 50.246072] Call trace: [ 50.246086] show_stack+0x20/0x38 (C) [ 50.246116] dump_stack_lvl+0x8c/0xd0 [ 50.246147] print_report+0x118/0x608 [ 50.246177] kasan_report+0xdc/0x128 [ 50.246206] kasan_check_range+0x100/0x1a8 [ 50.246240] __kasan_check_write+0x20/0x30 [ 50.246274] kasan_atomics_helper+0x61c/0x4858 [ 50.246307] kasan_atomics+0x198/0x2e0 [ 50.246335] kunit_try_run_case+0x170/0x3f0 [ 50.246369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.246404] kthread+0x328/0x630 [ 50.246435] ret_from_fork+0x10/0x20 [ 50.246465] [ 50.317418] Allocated by task 310: [ 50.320804] kasan_save_stack+0x3c/0x68 [ 50.324623] kasan_save_track+0x20/0x40 [ 50.328443] kasan_save_alloc_info+0x40/0x58 [ 50.332696] __kasan_kmalloc+0xd4/0xd8 [ 50.336429] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.340942] kasan_atomics+0xb8/0x2e0 [ 50.344588] kunit_try_run_case+0x170/0x3f0 [ 50.348755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.354223] kthread+0x328/0x630 [ 50.357435] ret_from_fork+0x10/0x20 [ 50.360994] [ 50.362471] The buggy address belongs to the object at ffff00080243ed00 [ 50.362471] which belongs to the cache kmalloc-64 of size 64 [ 50.374798] The buggy address is located 0 bytes to the right of [ 50.374798] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.387643] [ 50.389119] The buggy address belongs to the physical page: [ 50.394678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.402662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.409172] page_type: f5(slab) [ 50.412303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.420028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.427746] page dumped because: kasan: bad access detected [ 50.433302] [ 50.434777] Memory state around the buggy address: [ 50.439555] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.446760] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.453965] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.461166] ^ [ 50.465944] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.473150] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.480350] ================================================================== [ 54.978375] ================================================================== [ 54.985322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 54.992695] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.999987] [ 55.001470] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.001521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.001537] Hardware name: WinLink E850-96 board (DT) [ 55.001558] Call trace: [ 55.001573] show_stack+0x20/0x38 (C) [ 55.001607] dump_stack_lvl+0x8c/0xd0 [ 55.001639] print_report+0x118/0x608 [ 55.001672] kasan_report+0xdc/0x128 [ 55.001703] __asan_report_load4_noabort+0x20/0x30 [ 55.001740] kasan_atomics_helper+0x3dd8/0x4858 [ 55.001773] kasan_atomics+0x198/0x2e0 [ 55.001803] kunit_try_run_case+0x170/0x3f0 [ 55.001836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.001872] kthread+0x328/0x630 [ 55.001903] ret_from_fork+0x10/0x20 [ 55.001935] [ 55.069605] Allocated by task 310: [ 55.072991] kasan_save_stack+0x3c/0x68 [ 55.076808] kasan_save_track+0x20/0x40 [ 55.080628] kasan_save_alloc_info+0x40/0x58 [ 55.084882] __kasan_kmalloc+0xd4/0xd8 [ 55.088614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.093128] kasan_atomics+0xb8/0x2e0 [ 55.096774] kunit_try_run_case+0x170/0x3f0 [ 55.100940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.106409] kthread+0x328/0x630 [ 55.109621] ret_from_fork+0x10/0x20 [ 55.113180] [ 55.114655] The buggy address belongs to the object at ffff00080243ed00 [ 55.114655] which belongs to the cache kmalloc-64 of size 64 [ 55.126983] The buggy address is located 0 bytes to the right of [ 55.126983] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.139828] [ 55.141305] The buggy address belongs to the physical page: [ 55.146864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.154847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.161356] page_type: f5(slab) [ 55.164489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.172213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.179932] page dumped because: kasan: bad access detected [ 55.185487] [ 55.186963] Memory state around the buggy address: [ 55.191745] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.198946] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.206151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.213352] ^ [ 55.218130] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.225336] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.232536] ================================================================== [ 59.469895] ================================================================== [ 59.476922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.484295] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 59.491673] [ 59.493155] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 59.493204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.493219] Hardware name: WinLink E850-96 board (DT) [ 59.493237] Call trace: [ 59.493252] show_stack+0x20/0x38 (C) [ 59.493285] dump_stack_lvl+0x8c/0xd0 [ 59.493318] print_report+0x118/0x608 [ 59.493348] kasan_report+0xdc/0x128 [ 59.493379] kasan_check_range+0x100/0x1a8 [ 59.493412] __kasan_check_write+0x20/0x30 [ 59.493449] kasan_atomics_helper+0x12d8/0x4858 [ 59.493480] kasan_atomics+0x198/0x2e0 [ 59.493509] kunit_try_run_case+0x170/0x3f0 [ 59.493540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.493575] kthread+0x328/0x630 [ 59.493605] ret_from_fork+0x10/0x20 [ 59.493638] [ 59.564675] Allocated by task 310: [ 59.568062] kasan_save_stack+0x3c/0x68 [ 59.571880] kasan_save_track+0x20/0x40 [ 59.575700] kasan_save_alloc_info+0x40/0x58 [ 59.579953] __kasan_kmalloc+0xd4/0xd8 [ 59.583686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.588199] kasan_atomics+0xb8/0x2e0 [ 59.591845] kunit_try_run_case+0x170/0x3f0 [ 59.596012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.601480] kthread+0x328/0x630 [ 59.604692] ret_from_fork+0x10/0x20 [ 59.608251] [ 59.609728] The buggy address belongs to the object at ffff00080243ed00 [ 59.609728] which belongs to the cache kmalloc-64 of size 64 [ 59.622056] The buggy address is located 0 bytes to the right of [ 59.622056] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.634900] [ 59.636376] The buggy address belongs to the physical page: [ 59.641935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.649920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.656427] page_type: f5(slab) [ 59.659562] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.667284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.675004] page dumped because: kasan: bad access detected [ 59.680559] [ 59.682034] Memory state around the buggy address: [ 59.686814] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.694017] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.701222] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.708423] ^ [ 59.713201] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.720408] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.727607] ================================================================== [ 57.084535] ================================================================== [ 57.091539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 57.098827] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.106205] [ 57.107688] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.107738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.107755] Hardware name: WinLink E850-96 board (DT) [ 57.107774] Call trace: [ 57.107789] show_stack+0x20/0x38 (C) [ 57.107821] dump_stack_lvl+0x8c/0xd0 [ 57.107851] print_report+0x118/0x608 [ 57.107883] kasan_report+0xdc/0x128 [ 57.107915] kasan_check_range+0x100/0x1a8 [ 57.107949] __kasan_check_write+0x20/0x30 [ 57.107980] kasan_atomics_helper+0xf20/0x4858 [ 57.108012] kasan_atomics+0x198/0x2e0 [ 57.108040] kunit_try_run_case+0x170/0x3f0 [ 57.108074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.108112] kthread+0x328/0x630 [ 57.108143] ret_from_fork+0x10/0x20 [ 57.108174] [ 57.179121] Allocated by task 310: [ 57.182508] kasan_save_stack+0x3c/0x68 [ 57.186326] kasan_save_track+0x20/0x40 [ 57.190145] kasan_save_alloc_info+0x40/0x58 [ 57.194399] __kasan_kmalloc+0xd4/0xd8 [ 57.198131] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.202645] kasan_atomics+0xb8/0x2e0 [ 57.206291] kunit_try_run_case+0x170/0x3f0 [ 57.210457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.215926] kthread+0x328/0x630 [ 57.219137] ret_from_fork+0x10/0x20 [ 57.222697] [ 57.224172] The buggy address belongs to the object at ffff00080243ed00 [ 57.224172] which belongs to the cache kmalloc-64 of size 64 [ 57.236500] The buggy address is located 0 bytes to the right of [ 57.236500] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 57.249346] [ 57.250823] The buggy address belongs to the physical page: [ 57.256379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 57.264365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.270873] page_type: f5(slab) [ 57.274007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.281730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.289449] page dumped because: kasan: bad access detected [ 57.295004] [ 57.296480] Memory state around the buggy address: [ 57.301260] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.308463] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.315667] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.322869] ^ [ 57.327647] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.334853] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.342053] ================================================================== [ 53.660267] ================================================================== [ 53.667283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.674573] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.681951] [ 53.683432] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.683482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.683500] Hardware name: WinLink E850-96 board (DT) [ 53.683519] Call trace: [ 53.683535] show_stack+0x20/0x38 (C) [ 53.683568] dump_stack_lvl+0x8c/0xd0 [ 53.683599] print_report+0x118/0x608 [ 53.683632] kasan_report+0xdc/0x128 [ 53.683662] kasan_check_range+0x100/0x1a8 [ 53.683695] __kasan_check_write+0x20/0x30 [ 53.683730] kasan_atomics_helper+0xb70/0x4858 [ 53.683763] kasan_atomics+0x198/0x2e0 [ 53.683794] kunit_try_run_case+0x170/0x3f0 [ 53.683821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.683858] kthread+0x328/0x630 [ 53.683890] ret_from_fork+0x10/0x20 [ 53.683919] [ 53.754866] Allocated by task 310: [ 53.758254] kasan_save_stack+0x3c/0x68 [ 53.762071] kasan_save_track+0x20/0x40 [ 53.765891] kasan_save_alloc_info+0x40/0x58 [ 53.770144] __kasan_kmalloc+0xd4/0xd8 [ 53.773877] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.778390] kasan_atomics+0xb8/0x2e0 [ 53.782037] kunit_try_run_case+0x170/0x3f0 [ 53.786203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.791672] kthread+0x328/0x630 [ 53.794883] ret_from_fork+0x10/0x20 [ 53.798443] [ 53.799918] The buggy address belongs to the object at ffff00080243ed00 [ 53.799918] which belongs to the cache kmalloc-64 of size 64 [ 53.812246] The buggy address is located 0 bytes to the right of [ 53.812246] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.825091] [ 53.826567] The buggy address belongs to the physical page: [ 53.832125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.840109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.846619] page_type: f5(slab) [ 53.849752] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.857476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.865195] page dumped because: kasan: bad access detected [ 53.870750] [ 53.872226] Memory state around the buggy address: [ 53.877006] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.884209] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.891414] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.898615] ^ [ 53.903393] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.910598] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.917798] ================================================================== [ 58.674540] ================================================================== [ 58.681617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.688994] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.696372] [ 58.697855] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.697906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.697921] Hardware name: WinLink E850-96 board (DT) [ 58.697942] Call trace: [ 58.697954] show_stack+0x20/0x38 (C) [ 58.697984] dump_stack_lvl+0x8c/0xd0 [ 58.698016] print_report+0x118/0x608 [ 58.698048] kasan_report+0xdc/0x128 [ 58.698077] kasan_check_range+0x100/0x1a8 [ 58.698111] __kasan_check_write+0x20/0x30 [ 58.698147] kasan_atomics_helper+0x1190/0x4858 [ 58.698178] kasan_atomics+0x198/0x2e0 [ 58.698208] kunit_try_run_case+0x170/0x3f0 [ 58.698239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.698276] kthread+0x328/0x630 [ 58.698308] ret_from_fork+0x10/0x20 [ 58.698339] [ 58.769374] Allocated by task 310: [ 58.772762] kasan_save_stack+0x3c/0x68 [ 58.776580] kasan_save_track+0x20/0x40 [ 58.780399] kasan_save_alloc_info+0x40/0x58 [ 58.784652] __kasan_kmalloc+0xd4/0xd8 [ 58.788385] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.792899] kasan_atomics+0xb8/0x2e0 [ 58.796545] kunit_try_run_case+0x170/0x3f0 [ 58.800711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.806179] kthread+0x328/0x630 [ 58.809391] ret_from_fork+0x10/0x20 [ 58.812951] [ 58.814426] The buggy address belongs to the object at ffff00080243ed00 [ 58.814426] which belongs to the cache kmalloc-64 of size 64 [ 58.826754] The buggy address is located 0 bytes to the right of [ 58.826754] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.839599] [ 58.841075] The buggy address belongs to the physical page: [ 58.846634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.854619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.861127] page_type: f5(slab) [ 58.864260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.871984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.879703] page dumped because: kasan: bad access detected [ 58.885258] [ 58.886734] Memory state around the buggy address: [ 58.891512] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.898717] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.905921] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.913123] ^ [ 58.917901] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.925107] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.932307] ================================================================== [ 61.057073] ================================================================== [ 61.064048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 61.071424] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.078802] [ 61.080284] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.080333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.080350] Hardware name: WinLink E850-96 board (DT) [ 61.080370] Call trace: [ 61.080385] show_stack+0x20/0x38 (C) [ 61.080418] dump_stack_lvl+0x8c/0xd0 [ 61.080448] print_report+0x118/0x608 [ 61.080482] kasan_report+0xdc/0x128 [ 61.080514] kasan_check_range+0x100/0x1a8 [ 61.080546] __kasan_check_write+0x20/0x30 [ 61.080582] kasan_atomics_helper+0x154c/0x4858 [ 61.080614] kasan_atomics+0x198/0x2e0 [ 61.080643] kunit_try_run_case+0x170/0x3f0 [ 61.080674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.080710] kthread+0x328/0x630 [ 61.080743] ret_from_fork+0x10/0x20 [ 61.080775] [ 61.151804] Allocated by task 310: [ 61.155191] kasan_save_stack+0x3c/0x68 [ 61.159009] kasan_save_track+0x20/0x40 [ 61.162829] kasan_save_alloc_info+0x40/0x58 [ 61.167082] __kasan_kmalloc+0xd4/0xd8 [ 61.170814] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.175328] kasan_atomics+0xb8/0x2e0 [ 61.178974] kunit_try_run_case+0x170/0x3f0 [ 61.183141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.188609] kthread+0x328/0x630 [ 61.191821] ret_from_fork+0x10/0x20 [ 61.195380] [ 61.196857] The buggy address belongs to the object at ffff00080243ed00 [ 61.196857] which belongs to the cache kmalloc-64 of size 64 [ 61.209182] The buggy address is located 0 bytes to the right of [ 61.209182] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 61.222029] [ 61.223505] The buggy address belongs to the physical page: [ 61.229063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 61.237048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.243558] page_type: f5(slab) [ 61.246689] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.254413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.262132] page dumped because: kasan: bad access detected [ 61.267688] [ 61.269163] Memory state around the buggy address: [ 61.273943] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.281147] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.288351] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.295552] ^ [ 61.300330] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.307536] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.314736] ================================================================== [ 57.879293] ================================================================== [ 57.886317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.893694] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.901072] [ 57.902553] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.902601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.902619] Hardware name: WinLink E850-96 board (DT) [ 57.902638] Call trace: [ 57.902653] show_stack+0x20/0x38 (C) [ 57.902687] dump_stack_lvl+0x8c/0xd0 [ 57.902719] print_report+0x118/0x608 [ 57.902750] kasan_report+0xdc/0x128 [ 57.902781] kasan_check_range+0x100/0x1a8 [ 57.902814] __kasan_check_write+0x20/0x30 [ 57.902848] kasan_atomics_helper+0x1058/0x4858 [ 57.902880] kasan_atomics+0x198/0x2e0 [ 57.902908] kunit_try_run_case+0x170/0x3f0 [ 57.902937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.902973] kthread+0x328/0x630 [ 57.903003] ret_from_fork+0x10/0x20 [ 57.903034] [ 57.974074] Allocated by task 310: [ 57.977461] kasan_save_stack+0x3c/0x68 [ 57.981279] kasan_save_track+0x20/0x40 [ 57.985098] kasan_save_alloc_info+0x40/0x58 [ 57.989352] __kasan_kmalloc+0xd4/0xd8 [ 57.993085] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.997598] kasan_atomics+0xb8/0x2e0 [ 58.001244] kunit_try_run_case+0x170/0x3f0 [ 58.005410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.010879] kthread+0x328/0x630 [ 58.014091] ret_from_fork+0x10/0x20 [ 58.017650] [ 58.019125] The buggy address belongs to the object at ffff00080243ed00 [ 58.019125] which belongs to the cache kmalloc-64 of size 64 [ 58.031452] The buggy address is located 0 bytes to the right of [ 58.031452] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.044299] [ 58.045775] The buggy address belongs to the physical page: [ 58.051334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.059317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.065827] page_type: f5(slab) [ 58.068959] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.076683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.084402] page dumped because: kasan: bad access detected [ 58.089958] [ 58.091433] Memory state around the buggy address: [ 58.096212] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.103417] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.110621] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.117822] ^ [ 58.122600] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.129806] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.137006] ================================================================== [ 49.957962] ================================================================== [ 49.964914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.972198] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.979576] [ 49.981059] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.981111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.981129] Hardware name: WinLink E850-96 board (DT) [ 49.981150] Call trace: [ 49.981165] show_stack+0x20/0x38 (C) [ 49.981199] dump_stack_lvl+0x8c/0xd0 [ 49.981230] print_report+0x118/0x608 [ 49.981262] kasan_report+0xdc/0x128 [ 49.981295] kasan_check_range+0x100/0x1a8 [ 49.981328] __kasan_check_write+0x20/0x30 [ 49.981364] kasan_atomics_helper+0x5b4/0x4858 [ 49.981395] kasan_atomics+0x198/0x2e0 [ 49.981425] kunit_try_run_case+0x170/0x3f0 [ 49.981454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.981489] kthread+0x328/0x630 [ 49.981521] ret_from_fork+0x10/0x20 [ 49.981554] [ 50.052492] Allocated by task 310: [ 50.055879] kasan_save_stack+0x3c/0x68 [ 50.059696] kasan_save_track+0x20/0x40 [ 50.063516] kasan_save_alloc_info+0x40/0x58 [ 50.067770] __kasan_kmalloc+0xd4/0xd8 [ 50.071502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.076016] kasan_atomics+0xb8/0x2e0 [ 50.079662] kunit_try_run_case+0x170/0x3f0 [ 50.083828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.089296] kthread+0x328/0x630 [ 50.092509] ret_from_fork+0x10/0x20 [ 50.096068] [ 50.097544] The buggy address belongs to the object at ffff00080243ed00 [ 50.097544] which belongs to the cache kmalloc-64 of size 64 [ 50.109871] The buggy address is located 0 bytes to the right of [ 50.109871] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.122717] [ 50.124192] The buggy address belongs to the physical page: [ 50.129752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.137736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.144245] page_type: f5(slab) [ 50.147377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.155101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.162820] page dumped because: kasan: bad access detected [ 50.168375] [ 50.169851] Memory state around the buggy address: [ 50.174633] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.181834] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.189039] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.196240] ^ [ 50.201018] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.208224] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.215423] ================================================================== [ 54.713339] ================================================================== [ 54.720392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.727682] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.735061] [ 54.736543] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 54.736597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.736612] Hardware name: WinLink E850-96 board (DT) [ 54.736634] Call trace: [ 54.736647] show_stack+0x20/0x38 (C) [ 54.736676] dump_stack_lvl+0x8c/0xd0 [ 54.736709] print_report+0x118/0x608 [ 54.736739] kasan_report+0xdc/0x128 [ 54.736770] kasan_check_range+0x100/0x1a8 [ 54.736803] __kasan_check_write+0x20/0x30 [ 54.736836] kasan_atomics_helper+0xca0/0x4858 [ 54.736869] kasan_atomics+0x198/0x2e0 [ 54.736898] kunit_try_run_case+0x170/0x3f0 [ 54.736928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.736962] kthread+0x328/0x630 [ 54.736993] ret_from_fork+0x10/0x20 [ 54.737025] [ 54.807975] Allocated by task 310: [ 54.811363] kasan_save_stack+0x3c/0x68 [ 54.815181] kasan_save_track+0x20/0x40 [ 54.819000] kasan_save_alloc_info+0x40/0x58 [ 54.823253] __kasan_kmalloc+0xd4/0xd8 [ 54.826986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.831500] kasan_atomics+0xb8/0x2e0 [ 54.835145] kunit_try_run_case+0x170/0x3f0 [ 54.839312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.844781] kthread+0x328/0x630 [ 54.847993] ret_from_fork+0x10/0x20 [ 54.851552] [ 54.853029] The buggy address belongs to the object at ffff00080243ed00 [ 54.853029] which belongs to the cache kmalloc-64 of size 64 [ 54.865355] The buggy address is located 0 bytes to the right of [ 54.865355] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.878201] [ 54.879676] The buggy address belongs to the physical page: [ 54.885235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.893218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.899730] page_type: f5(slab) [ 54.902861] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.910585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.918304] page dumped because: kasan: bad access detected [ 54.923860] [ 54.925335] Memory state around the buggy address: [ 54.930113] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.937318] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.944522] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.951724] ^ [ 54.956501] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.963708] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.970908] ================================================================== [ 48.898219] ================================================================== [ 48.905202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.912492] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.919870] [ 48.921351] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.921398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.921415] Hardware name: WinLink E850-96 board (DT) [ 48.921433] Call trace: [ 48.921447] show_stack+0x20/0x38 (C) [ 48.921482] dump_stack_lvl+0x8c/0xd0 [ 48.921513] print_report+0x118/0x608 [ 48.921545] kasan_report+0xdc/0x128 [ 48.921575] kasan_check_range+0x100/0x1a8 [ 48.921609] __kasan_check_write+0x20/0x30 [ 48.921643] kasan_atomics_helper+0x414/0x4858 [ 48.921673] kasan_atomics+0x198/0x2e0 [ 48.921702] kunit_try_run_case+0x170/0x3f0 [ 48.921732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.921765] kthread+0x328/0x630 [ 48.921798] ret_from_fork+0x10/0x20 [ 48.921829] [ 48.992785] Allocated by task 310: [ 48.996173] kasan_save_stack+0x3c/0x68 [ 48.999990] kasan_save_track+0x20/0x40 [ 49.003810] kasan_save_alloc_info+0x40/0x58 [ 49.008063] __kasan_kmalloc+0xd4/0xd8 [ 49.011796] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.016309] kasan_atomics+0xb8/0x2e0 [ 49.019955] kunit_try_run_case+0x170/0x3f0 [ 49.024122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.029590] kthread+0x328/0x630 [ 49.032802] ret_from_fork+0x10/0x20 [ 49.036361] [ 49.037838] The buggy address belongs to the object at ffff00080243ed00 [ 49.037838] which belongs to the cache kmalloc-64 of size 64 [ 49.050165] The buggy address is located 0 bytes to the right of [ 49.050165] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.063010] [ 49.064486] The buggy address belongs to the physical page: [ 49.070044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.078029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.084537] page_type: f5(slab) [ 49.087670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.095395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.103114] page dumped because: kasan: bad access detected [ 49.108669] [ 49.110144] Memory state around the buggy address: [ 49.114923] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.122127] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.129332] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.136533] ^ [ 49.141311] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.148517] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.155717] ================================================================== [ 50.487739] ================================================================== [ 50.494761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.502051] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 50.509430] [ 50.510911] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 50.510959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.510976] Hardware name: WinLink E850-96 board (DT) [ 50.510995] Call trace: [ 50.511006] show_stack+0x20/0x38 (C) [ 50.511038] dump_stack_lvl+0x8c/0xd0 [ 50.511069] print_report+0x118/0x608 [ 50.511101] kasan_report+0xdc/0x128 [ 50.511131] kasan_check_range+0x100/0x1a8 [ 50.511164] __kasan_check_write+0x20/0x30 [ 50.511198] kasan_atomics_helper+0x684/0x4858 [ 50.511228] kasan_atomics+0x198/0x2e0 [ 50.511256] kunit_try_run_case+0x170/0x3f0 [ 50.511286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.511321] kthread+0x328/0x630 [ 50.511353] ret_from_fork+0x10/0x20 [ 50.511382] [ 50.582345] Allocated by task 310: [ 50.585732] kasan_save_stack+0x3c/0x68 [ 50.589550] kasan_save_track+0x20/0x40 [ 50.593369] kasan_save_alloc_info+0x40/0x58 [ 50.597622] __kasan_kmalloc+0xd4/0xd8 [ 50.601355] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.605869] kasan_atomics+0xb8/0x2e0 [ 50.609515] kunit_try_run_case+0x170/0x3f0 [ 50.613681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.619150] kthread+0x328/0x630 [ 50.622362] ret_from_fork+0x10/0x20 [ 50.625921] [ 50.627398] The buggy address belongs to the object at ffff00080243ed00 [ 50.627398] which belongs to the cache kmalloc-64 of size 64 [ 50.639723] The buggy address is located 0 bytes to the right of [ 50.639723] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.652569] [ 50.654045] The buggy address belongs to the physical page: [ 50.659604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.667588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.674098] page_type: f5(slab) [ 50.677230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.684954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.692673] page dumped because: kasan: bad access detected [ 50.698228] [ 50.699704] Memory state around the buggy address: [ 50.704482] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.711687] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.718892] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.726092] ^ [ 50.730871] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.738077] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.745276] ================================================================== [ 55.766428] ================================================================== [ 55.773501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.780792] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 55.788083] [ 55.789566] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.789615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.789631] Hardware name: WinLink E850-96 board (DT) [ 55.789650] Call trace: [ 55.789661] show_stack+0x20/0x38 (C) [ 55.789694] dump_stack_lvl+0x8c/0xd0 [ 55.789724] print_report+0x118/0x608 [ 55.789755] kasan_report+0xdc/0x128 [ 55.789787] kasan_check_range+0x100/0x1a8 [ 55.789820] __kasan_check_read+0x20/0x30 [ 55.789855] kasan_atomics_helper+0xdd4/0x4858 [ 55.789886] kasan_atomics+0x198/0x2e0 [ 55.789916] kunit_try_run_case+0x170/0x3f0 [ 55.789946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.789981] kthread+0x328/0x630 [ 55.790015] ret_from_fork+0x10/0x20 [ 55.790048] [ 55.860913] Allocated by task 310: [ 55.864299] kasan_save_stack+0x3c/0x68 [ 55.868116] kasan_save_track+0x20/0x40 [ 55.871936] kasan_save_alloc_info+0x40/0x58 [ 55.876189] __kasan_kmalloc+0xd4/0xd8 [ 55.879922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.884435] kasan_atomics+0xb8/0x2e0 [ 55.888081] kunit_try_run_case+0x170/0x3f0 [ 55.892248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.897716] kthread+0x328/0x630 [ 55.900928] ret_from_fork+0x10/0x20 [ 55.904487] [ 55.905964] The buggy address belongs to the object at ffff00080243ed00 [ 55.905964] which belongs to the cache kmalloc-64 of size 64 [ 55.918293] The buggy address is located 0 bytes to the right of [ 55.918293] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.931136] [ 55.932612] The buggy address belongs to the physical page: [ 55.938171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.946155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.952665] page_type: f5(slab) [ 55.955797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.963521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.971240] page dumped because: kasan: bad access detected [ 55.976795] [ 55.978271] Memory state around the buggy address: [ 55.983050] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.990253] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.997458] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.004659] ^ [ 56.009437] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.016644] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.023843] ================================================================== [ 57.614338] ================================================================== [ 57.621391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.628681] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.636059] [ 57.637540] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.637588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.637606] Hardware name: WinLink E850-96 board (DT) [ 57.637625] Call trace: [ 57.637642] show_stack+0x20/0x38 (C) [ 57.637675] dump_stack_lvl+0x8c/0xd0 [ 57.637707] print_report+0x118/0x608 [ 57.637737] kasan_report+0xdc/0x128 [ 57.637769] kasan_check_range+0x100/0x1a8 [ 57.637803] __kasan_check_write+0x20/0x30 [ 57.637838] kasan_atomics_helper+0xff0/0x4858 [ 57.637870] kasan_atomics+0x198/0x2e0 [ 57.637898] kunit_try_run_case+0x170/0x3f0 [ 57.637930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.637967] kthread+0x328/0x630 [ 57.637998] ret_from_fork+0x10/0x20 [ 57.638030] [ 57.708974] Allocated by task 310: [ 57.712361] kasan_save_stack+0x3c/0x68 [ 57.716179] kasan_save_track+0x20/0x40 [ 57.719998] kasan_save_alloc_info+0x40/0x58 [ 57.724251] __kasan_kmalloc+0xd4/0xd8 [ 57.727984] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.732498] kasan_atomics+0xb8/0x2e0 [ 57.736144] kunit_try_run_case+0x170/0x3f0 [ 57.740310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.745779] kthread+0x328/0x630 [ 57.748991] ret_from_fork+0x10/0x20 [ 57.752549] [ 57.754027] The buggy address belongs to the object at ffff00080243ed00 [ 57.754027] which belongs to the cache kmalloc-64 of size 64 [ 57.766352] The buggy address is located 0 bytes to the right of [ 57.766352] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 57.779199] [ 57.780674] The buggy address belongs to the physical page: [ 57.786232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 57.794216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.800726] page_type: f5(slab) [ 57.803859] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.811584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.819302] page dumped because: kasan: bad access detected [ 57.824858] [ 57.826333] Memory state around the buggy address: [ 57.831111] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.838316] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.845521] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.852722] ^ [ 57.857500] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.864706] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.871906] ================================================================== [ 47.050390] ================================================================== [ 47.057489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 47.064776] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.072068] [ 47.073549] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.073606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.073622] Hardware name: WinLink E850-96 board (DT) [ 47.073641] Call trace: [ 47.073654] show_stack+0x20/0x38 (C) [ 47.073689] dump_stack_lvl+0x8c/0xd0 [ 47.073724] print_report+0x118/0x608 [ 47.073755] kasan_report+0xdc/0x128 [ 47.073785] kasan_check_range+0x100/0x1a8 [ 47.073820] __kasan_check_read+0x20/0x30 [ 47.073854] kasan_atomics_helper+0x1ec/0x4858 [ 47.073886] kasan_atomics+0x198/0x2e0 [ 47.073917] kunit_try_run_case+0x170/0x3f0 [ 47.073950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.073985] kthread+0x328/0x630 [ 47.074018] ret_from_fork+0x10/0x20 [ 47.074051] [ 47.144896] Allocated by task 310: [ 47.148284] kasan_save_stack+0x3c/0x68 [ 47.152101] kasan_save_track+0x20/0x40 [ 47.155921] kasan_save_alloc_info+0x40/0x58 [ 47.160174] __kasan_kmalloc+0xd4/0xd8 [ 47.163907] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.168421] kasan_atomics+0xb8/0x2e0 [ 47.172066] kunit_try_run_case+0x170/0x3f0 [ 47.176233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.181703] kthread+0x328/0x630 [ 47.184913] ret_from_fork+0x10/0x20 [ 47.188472] [ 47.189951] The buggy address belongs to the object at ffff00080243ed00 [ 47.189951] which belongs to the cache kmalloc-64 of size 64 [ 47.202276] The buggy address is located 0 bytes to the right of [ 47.202276] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 47.215121] [ 47.216597] The buggy address belongs to the physical page: [ 47.222156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 47.230141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.236650] page_type: f5(slab) [ 47.239781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.247506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.255225] page dumped because: kasan: bad access detected [ 47.260780] [ 47.262256] Memory state around the buggy address: [ 47.267034] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.274239] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.281444] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.288644] ^ [ 47.293423] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.300629] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.307828] ================================================================== [ 56.819584] ================================================================== [ 56.826612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.833900] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.841278] [ 56.842761] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.842812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.842828] Hardware name: WinLink E850-96 board (DT) [ 56.842848] Call trace: [ 56.842863] show_stack+0x20/0x38 (C) [ 56.842894] dump_stack_lvl+0x8c/0xd0 [ 56.842925] print_report+0x118/0x608 [ 56.842957] kasan_report+0xdc/0x128 [ 56.842987] kasan_check_range+0x100/0x1a8 [ 56.843021] __kasan_check_write+0x20/0x30 [ 56.843056] kasan_atomics_helper+0xeb8/0x4858 [ 56.843089] kasan_atomics+0x198/0x2e0 [ 56.843118] kunit_try_run_case+0x170/0x3f0 [ 56.843150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.843184] kthread+0x328/0x630 [ 56.843216] ret_from_fork+0x10/0x20 [ 56.843250] [ 56.914194] Allocated by task 310: [ 56.917582] kasan_save_stack+0x3c/0x68 [ 56.921400] kasan_save_track+0x20/0x40 [ 56.925218] kasan_save_alloc_info+0x40/0x58 [ 56.929472] __kasan_kmalloc+0xd4/0xd8 [ 56.933205] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.937718] kasan_atomics+0xb8/0x2e0 [ 56.941364] kunit_try_run_case+0x170/0x3f0 [ 56.945531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.950999] kthread+0x328/0x630 [ 56.954211] ret_from_fork+0x10/0x20 [ 56.957770] [ 56.959247] The buggy address belongs to the object at ffff00080243ed00 [ 56.959247] which belongs to the cache kmalloc-64 of size 64 [ 56.971575] The buggy address is located 0 bytes to the right of [ 56.971575] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.984419] [ 56.985895] The buggy address belongs to the physical page: [ 56.991454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.999437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.005946] page_type: f5(slab) [ 57.009081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.016803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.024523] page dumped because: kasan: bad access detected [ 57.030078] [ 57.031553] Memory state around the buggy address: [ 57.036331] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.043536] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.050741] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.057942] ^ [ 57.062720] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.069926] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.077126] ================================================================== [ 48.106552] ================================================================== [ 48.113547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.120837] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.128215] [ 48.129697] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.129749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.129765] Hardware name: WinLink E850-96 board (DT) [ 48.129786] Call trace: [ 48.129799] show_stack+0x20/0x38 (C) [ 48.129834] dump_stack_lvl+0x8c/0xd0 [ 48.129865] print_report+0x118/0x608 [ 48.129899] kasan_report+0xdc/0x128 [ 48.129929] kasan_check_range+0x100/0x1a8 [ 48.129960] __kasan_check_write+0x20/0x30 [ 48.129995] kasan_atomics_helper+0x32c/0x4858 [ 48.130026] kasan_atomics+0x198/0x2e0 [ 48.130056] kunit_try_run_case+0x170/0x3f0 [ 48.130086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.130121] kthread+0x328/0x630 [ 48.130153] ret_from_fork+0x10/0x20 [ 48.130187] [ 48.201131] Allocated by task 310: [ 48.204520] kasan_save_stack+0x3c/0x68 [ 48.208336] kasan_save_track+0x20/0x40 [ 48.212155] kasan_save_alloc_info+0x40/0x58 [ 48.216408] __kasan_kmalloc+0xd4/0xd8 [ 48.220141] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.224655] kasan_atomics+0xb8/0x2e0 [ 48.228300] kunit_try_run_case+0x170/0x3f0 [ 48.232467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.237936] kthread+0x328/0x630 [ 48.241147] ret_from_fork+0x10/0x20 [ 48.244706] [ 48.246184] The buggy address belongs to the object at ffff00080243ed00 [ 48.246184] which belongs to the cache kmalloc-64 of size 64 [ 48.258509] The buggy address is located 0 bytes to the right of [ 48.258509] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.271355] [ 48.272831] The buggy address belongs to the physical page: [ 48.278389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.286373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.292884] page_type: f5(slab) [ 48.296019] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.303740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.311459] page dumped because: kasan: bad access detected [ 48.317014] [ 48.318490] Memory state around the buggy address: [ 48.323270] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.330473] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.337677] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.344878] ^ [ 48.349657] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.356863] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.364062] ================================================================== [ 51.812349] ================================================================== [ 51.819394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.826771] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.834062] [ 51.835542] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.835591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.835606] Hardware name: WinLink E850-96 board (DT) [ 51.835626] Call trace: [ 51.835641] show_stack+0x20/0x38 (C) [ 51.835674] dump_stack_lvl+0x8c/0xd0 [ 51.835707] print_report+0x118/0x608 [ 51.835738] kasan_report+0xdc/0x128 [ 51.835768] __asan_report_load4_noabort+0x20/0x30 [ 51.835806] kasan_atomics_helper+0x42d8/0x4858 [ 51.835838] kasan_atomics+0x198/0x2e0 [ 51.835869] kunit_try_run_case+0x170/0x3f0 [ 51.835900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.835937] kthread+0x328/0x630 [ 51.835969] ret_from_fork+0x10/0x20 [ 51.836002] [ 51.903679] Allocated by task 310: [ 51.907067] kasan_save_stack+0x3c/0x68 [ 51.910884] kasan_save_track+0x20/0x40 [ 51.914704] kasan_save_alloc_info+0x40/0x58 [ 51.918957] __kasan_kmalloc+0xd4/0xd8 [ 51.922690] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.927203] kasan_atomics+0xb8/0x2e0 [ 51.930849] kunit_try_run_case+0x170/0x3f0 [ 51.935016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.940484] kthread+0x328/0x630 [ 51.943696] ret_from_fork+0x10/0x20 [ 51.947255] [ 51.948730] The buggy address belongs to the object at ffff00080243ed00 [ 51.948730] which belongs to the cache kmalloc-64 of size 64 [ 51.961057] The buggy address is located 0 bytes to the right of [ 51.961057] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.973904] [ 51.975380] The buggy address belongs to the physical page: [ 51.980939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.988923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.995431] page_type: f5(slab) [ 51.998564] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.006289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.014007] page dumped because: kasan: bad access detected [ 52.019563] [ 52.021038] Memory state around the buggy address: [ 52.025816] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.033021] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.040226] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.047427] ^ [ 52.052205] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.059411] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.066611] ================================================================== [ 61.587194] ================================================================== [ 61.594248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.601624] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.608915] [ 61.610397] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.610446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.610464] Hardware name: WinLink E850-96 board (DT) [ 61.610486] Call trace: [ 61.610499] show_stack+0x20/0x38 (C) [ 61.610533] dump_stack_lvl+0x8c/0xd0 [ 61.610565] print_report+0x118/0x608 [ 61.610598] kasan_report+0xdc/0x128 [ 61.610629] __asan_report_load8_noabort+0x20/0x30 [ 61.610666] kasan_atomics_helper+0x3db0/0x4858 [ 61.610698] kasan_atomics+0x198/0x2e0 [ 61.610727] kunit_try_run_case+0x170/0x3f0 [ 61.610756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.610792] kthread+0x328/0x630 [ 61.610823] ret_from_fork+0x10/0x20 [ 61.610857] [ 61.678532] Allocated by task 310: [ 61.681921] kasan_save_stack+0x3c/0x68 [ 61.685737] kasan_save_track+0x20/0x40 [ 61.689557] kasan_save_alloc_info+0x40/0x58 [ 61.693810] __kasan_kmalloc+0xd4/0xd8 [ 61.697543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.702057] kasan_atomics+0xb8/0x2e0 [ 61.705702] kunit_try_run_case+0x170/0x3f0 [ 61.709869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.715337] kthread+0x328/0x630 [ 61.718549] ret_from_fork+0x10/0x20 [ 61.722108] [ 61.723583] The buggy address belongs to the object at ffff00080243ed00 [ 61.723583] which belongs to the cache kmalloc-64 of size 64 [ 61.735912] The buggy address is located 0 bytes to the right of [ 61.735912] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 61.748757] [ 61.750233] The buggy address belongs to the physical page: [ 61.755792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 61.763775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.770286] page_type: f5(slab) [ 61.773417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.781142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.788861] page dumped because: kasan: bad access detected [ 61.794416] [ 61.795892] Memory state around the buggy address: [ 61.800671] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.807874] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.815079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.822280] ^ [ 61.827058] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.834264] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.841464] ================================================================== [ 63.429010] ================================================================== [ 63.436063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.443437] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 63.450815] [ 63.452296] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 63.452343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.452361] Hardware name: WinLink E850-96 board (DT) [ 63.452382] Call trace: [ 63.452393] show_stack+0x20/0x38 (C) [ 63.452426] dump_stack_lvl+0x8c/0xd0 [ 63.452457] print_report+0x118/0x608 [ 63.452488] kasan_report+0xdc/0x128 [ 63.452519] kasan_check_range+0x100/0x1a8 [ 63.452554] __kasan_check_write+0x20/0x30 [ 63.452589] kasan_atomics_helper+0x17ec/0x4858 [ 63.452622] kasan_atomics+0x198/0x2e0 [ 63.452651] kunit_try_run_case+0x170/0x3f0 [ 63.452681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.452718] kthread+0x328/0x630 [ 63.452750] ret_from_fork+0x10/0x20 [ 63.452782] [ 63.523817] Allocated by task 310: [ 63.527204] kasan_save_stack+0x3c/0x68 [ 63.531022] kasan_save_track+0x20/0x40 [ 63.534842] kasan_save_alloc_info+0x40/0x58 [ 63.539095] __kasan_kmalloc+0xd4/0xd8 [ 63.542827] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.547341] kasan_atomics+0xb8/0x2e0 [ 63.550987] kunit_try_run_case+0x170/0x3f0 [ 63.555154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.560622] kthread+0x328/0x630 [ 63.563834] ret_from_fork+0x10/0x20 [ 63.567393] [ 63.568870] The buggy address belongs to the object at ffff00080243ed00 [ 63.568870] which belongs to the cache kmalloc-64 of size 64 [ 63.581197] The buggy address is located 0 bytes to the right of [ 63.581197] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 63.594042] [ 63.595518] The buggy address belongs to the physical page: [ 63.601077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 63.609061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.615571] page_type: f5(slab) [ 63.618702] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.626426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.634145] page dumped because: kasan: bad access detected [ 63.639700] [ 63.641176] Memory state around the buggy address: [ 63.645956] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.653159] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.660364] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.667565] ^ [ 63.672343] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.679549] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.686749] ================================================================== [ 52.074086] ================================================================== [ 52.081024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 52.088313] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.095690] [ 52.097173] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.097224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.097240] Hardware name: WinLink E850-96 board (DT) [ 52.097262] Call trace: [ 52.097274] show_stack+0x20/0x38 (C) [ 52.097308] dump_stack_lvl+0x8c/0xd0 [ 52.097340] print_report+0x118/0x608 [ 52.097371] kasan_report+0xdc/0x128 [ 52.097401] kasan_check_range+0x100/0x1a8 [ 52.097433] __kasan_check_write+0x20/0x30 [ 52.097468] kasan_atomics_helper+0x934/0x4858 [ 52.097500] kasan_atomics+0x198/0x2e0 [ 52.097529] kunit_try_run_case+0x170/0x3f0 [ 52.097560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.097594] kthread+0x328/0x630 [ 52.097628] ret_from_fork+0x10/0x20 [ 52.097659] [ 52.168605] Allocated by task 310: [ 52.171995] kasan_save_stack+0x3c/0x68 [ 52.175811] kasan_save_track+0x20/0x40 [ 52.179630] kasan_save_alloc_info+0x40/0x58 [ 52.183883] __kasan_kmalloc+0xd4/0xd8 [ 52.187616] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.192130] kasan_atomics+0xb8/0x2e0 [ 52.195776] kunit_try_run_case+0x170/0x3f0 [ 52.199942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.205411] kthread+0x328/0x630 [ 52.208623] ret_from_fork+0x10/0x20 [ 52.212182] [ 52.213658] The buggy address belongs to the object at ffff00080243ed00 [ 52.213658] which belongs to the cache kmalloc-64 of size 64 [ 52.225984] The buggy address is located 0 bytes to the right of [ 52.225984] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 52.238830] [ 52.240308] The buggy address belongs to the physical page: [ 52.245865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 52.253850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.260358] page_type: f5(slab) [ 52.263491] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.271215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.278934] page dumped because: kasan: bad access detected [ 52.284489] [ 52.285965] Memory state around the buggy address: [ 52.290745] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.297948] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.305153] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.312354] ^ [ 52.317131] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.324338] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.331538] ================================================================== [ 46.788771] ================================================================== [ 46.795688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.803061] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 46.810440] [ 46.811925] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.811980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.811997] Hardware name: WinLink E850-96 board (DT) [ 46.812019] Call trace: [ 46.812034] show_stack+0x20/0x38 (C) [ 46.812072] dump_stack_lvl+0x8c/0xd0 [ 46.812104] print_report+0x118/0x608 [ 46.812137] kasan_report+0xdc/0x128 [ 46.812167] __asan_report_store4_noabort+0x20/0x30 [ 46.812204] kasan_atomics_helper+0x3f7c/0x4858 [ 46.812240] kasan_atomics+0x198/0x2e0 [ 46.812269] kunit_try_run_case+0x170/0x3f0 [ 46.812303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.812343] kthread+0x328/0x630 [ 46.812381] ret_from_fork+0x10/0x20 [ 46.812418] [ 46.880143] Allocated by task 310: [ 46.883532] kasan_save_stack+0x3c/0x68 [ 46.887348] kasan_save_track+0x20/0x40 [ 46.891168] kasan_save_alloc_info+0x40/0x58 [ 46.895421] __kasan_kmalloc+0xd4/0xd8 [ 46.899154] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.903667] kasan_atomics+0xb8/0x2e0 [ 46.907313] kunit_try_run_case+0x170/0x3f0 [ 46.911480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.916948] kthread+0x328/0x630 [ 46.920160] ret_from_fork+0x10/0x20 [ 46.923719] [ 46.925198] The buggy address belongs to the object at ffff00080243ed00 [ 46.925198] which belongs to the cache kmalloc-64 of size 64 [ 46.937525] The buggy address is located 0 bytes to the right of [ 46.937525] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 46.950368] [ 46.951846] The buggy address belongs to the physical page: [ 46.957403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 46.965387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.971897] page_type: f5(slab) [ 46.975032] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.982753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.990472] page dumped because: kasan: bad access detected [ 46.996027] [ 46.997503] Memory state around the buggy address: [ 47.002281] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.009486] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.016692] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.023891] ^ [ 47.028669] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.035875] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.043077] ================================================================== [ 52.603827] ================================================================== [ 52.610877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.618166] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.625543] [ 52.627024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.627071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.627088] Hardware name: WinLink E850-96 board (DT) [ 52.627110] Call trace: [ 52.627123] show_stack+0x20/0x38 (C) [ 52.627155] dump_stack_lvl+0x8c/0xd0 [ 52.627185] print_report+0x118/0x608 [ 52.627216] kasan_report+0xdc/0x128 [ 52.627246] kasan_check_range+0x100/0x1a8 [ 52.627278] __kasan_check_write+0x20/0x30 [ 52.627313] kasan_atomics_helper+0xa04/0x4858 [ 52.627347] kasan_atomics+0x198/0x2e0 [ 52.627375] kunit_try_run_case+0x170/0x3f0 [ 52.627406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.627440] kthread+0x328/0x630 [ 52.627470] ret_from_fork+0x10/0x20 [ 52.627502] [ 52.698459] Allocated by task 310: [ 52.701846] kasan_save_stack+0x3c/0x68 [ 52.705664] kasan_save_track+0x20/0x40 [ 52.709483] kasan_save_alloc_info+0x40/0x58 [ 52.713737] __kasan_kmalloc+0xd4/0xd8 [ 52.717469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.721983] kasan_atomics+0xb8/0x2e0 [ 52.725629] kunit_try_run_case+0x170/0x3f0 [ 52.729795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.735264] kthread+0x328/0x630 [ 52.738476] ret_from_fork+0x10/0x20 [ 52.742035] [ 52.743512] The buggy address belongs to the object at ffff00080243ed00 [ 52.743512] which belongs to the cache kmalloc-64 of size 64 [ 52.755838] The buggy address is located 0 bytes to the right of [ 52.755838] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 52.768684] [ 52.770159] The buggy address belongs to the physical page: [ 52.775718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 52.783702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.790211] page_type: f5(slab) [ 52.793344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.801068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.808787] page dumped because: kasan: bad access detected [ 52.814342] [ 52.815818] Memory state around the buggy address: [ 52.820596] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.827801] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.835007] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.842207] ^ [ 52.846984] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.854191] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.861391] ================================================================== [ 53.398612] ================================================================== [ 53.405655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.413032] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.420323] [ 53.421804] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.421854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.421871] Hardware name: WinLink E850-96 board (DT) [ 53.421890] Call trace: [ 53.421905] show_stack+0x20/0x38 (C) [ 53.421939] dump_stack_lvl+0x8c/0xd0 [ 53.421971] print_report+0x118/0x608 [ 53.422004] kasan_report+0xdc/0x128 [ 53.422034] __asan_report_load4_noabort+0x20/0x30 [ 53.422071] kasan_atomics_helper+0x3dcc/0x4858 [ 53.422102] kasan_atomics+0x198/0x2e0 [ 53.422131] kunit_try_run_case+0x170/0x3f0 [ 53.422161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.422199] kthread+0x328/0x630 [ 53.422231] ret_from_fork+0x10/0x20 [ 53.422261] [ 53.489940] Allocated by task 310: [ 53.493328] kasan_save_stack+0x3c/0x68 [ 53.497145] kasan_save_track+0x20/0x40 [ 53.500965] kasan_save_alloc_info+0x40/0x58 [ 53.505218] __kasan_kmalloc+0xd4/0xd8 [ 53.508950] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.513464] kasan_atomics+0xb8/0x2e0 [ 53.517110] kunit_try_run_case+0x170/0x3f0 [ 53.521277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.526745] kthread+0x328/0x630 [ 53.529957] ret_from_fork+0x10/0x20 [ 53.533516] [ 53.534991] The buggy address belongs to the object at ffff00080243ed00 [ 53.534991] which belongs to the cache kmalloc-64 of size 64 [ 53.547320] The buggy address is located 0 bytes to the right of [ 53.547320] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.560165] [ 53.561641] The buggy address belongs to the physical page: [ 53.567199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.575182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.581692] page_type: f5(slab) [ 53.584825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.592550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.600268] page dumped because: kasan: bad access detected [ 53.605824] [ 53.607299] Memory state around the buggy address: [ 53.612078] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.619282] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.626487] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.633688] ^ [ 53.638466] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.645672] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.652872] ================================================================== [ 47.844821] ================================================================== [ 47.851919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.859295] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.866587] [ 47.868067] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.868119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.868135] Hardware name: WinLink E850-96 board (DT) [ 47.868155] Call trace: [ 47.868167] show_stack+0x20/0x38 (C) [ 47.868204] dump_stack_lvl+0x8c/0xd0 [ 47.868236] print_report+0x118/0x608 [ 47.868268] kasan_report+0xdc/0x128 [ 47.868299] __asan_report_load4_noabort+0x20/0x30 [ 47.868335] kasan_atomics_helper+0x40fc/0x4858 [ 47.868366] kasan_atomics+0x198/0x2e0 [ 47.868395] kunit_try_run_case+0x170/0x3f0 [ 47.868425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.868461] kthread+0x328/0x630 [ 47.868492] ret_from_fork+0x10/0x20 [ 47.868525] [ 47.936205] Allocated by task 310: [ 47.939593] kasan_save_stack+0x3c/0x68 [ 47.943409] kasan_save_track+0x20/0x40 [ 47.947228] kasan_save_alloc_info+0x40/0x58 [ 47.951482] __kasan_kmalloc+0xd4/0xd8 [ 47.955214] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.959728] kasan_atomics+0xb8/0x2e0 [ 47.963374] kunit_try_run_case+0x170/0x3f0 [ 47.967541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.973011] kthread+0x328/0x630 [ 47.976221] ret_from_fork+0x10/0x20 [ 47.979780] [ 47.981257] The buggy address belongs to the object at ffff00080243ed00 [ 47.981257] which belongs to the cache kmalloc-64 of size 64 [ 47.993582] The buggy address is located 0 bytes to the right of [ 47.993582] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.006429] [ 48.007904] The buggy address belongs to the physical page: [ 48.013462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.021447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.027958] page_type: f5(slab) [ 48.031089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.038813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.046532] page dumped because: kasan: bad access detected [ 48.052087] [ 48.053563] Memory state around the buggy address: [ 48.058343] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.065546] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.072751] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.079952] ^ [ 48.084730] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.091936] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.099136] ================================================================== [ 49.163060] ================================================================== [ 49.170131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.177418] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.184796] [ 49.186280] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.186328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.186343] Hardware name: WinLink E850-96 board (DT) [ 49.186365] Call trace: [ 49.186378] show_stack+0x20/0x38 (C) [ 49.186411] dump_stack_lvl+0x8c/0xd0 [ 49.186441] print_report+0x118/0x608 [ 49.186470] kasan_report+0xdc/0x128 [ 49.186501] kasan_check_range+0x100/0x1a8 [ 49.186535] __kasan_check_write+0x20/0x30 [ 49.186568] kasan_atomics_helper+0x47c/0x4858 [ 49.186602] kasan_atomics+0x198/0x2e0 [ 49.186632] kunit_try_run_case+0x170/0x3f0 [ 49.186663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.186696] kthread+0x328/0x630 [ 49.186727] ret_from_fork+0x10/0x20 [ 49.186760] [ 49.257712] Allocated by task 310: [ 49.261100] kasan_save_stack+0x3c/0x68 [ 49.264917] kasan_save_track+0x20/0x40 [ 49.268736] kasan_save_alloc_info+0x40/0x58 [ 49.272990] __kasan_kmalloc+0xd4/0xd8 [ 49.276722] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.281236] kasan_atomics+0xb8/0x2e0 [ 49.284882] kunit_try_run_case+0x170/0x3f0 [ 49.289048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.294517] kthread+0x328/0x630 [ 49.297729] ret_from_fork+0x10/0x20 [ 49.301288] [ 49.302763] The buggy address belongs to the object at ffff00080243ed00 [ 49.302763] which belongs to the cache kmalloc-64 of size 64 [ 49.315091] The buggy address is located 0 bytes to the right of [ 49.315091] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.327937] [ 49.329412] The buggy address belongs to the physical page: [ 49.334972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.342956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.349464] page_type: f5(slab) [ 49.352597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.360321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.368040] page dumped because: kasan: bad access detected [ 49.373596] [ 49.375071] Memory state around the buggy address: [ 49.379850] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.387054] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.394259] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.401460] ^ [ 49.406238] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.413444] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.420644] ================================================================== [ 54.451743] ================================================================== [ 54.458765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.466141] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.473432] [ 54.474915] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 54.474967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.474982] Hardware name: WinLink E850-96 board (DT) [ 54.475004] Call trace: [ 54.475018] show_stack+0x20/0x38 (C) [ 54.475049] dump_stack_lvl+0x8c/0xd0 [ 54.475081] print_report+0x118/0x608 [ 54.475110] kasan_report+0xdc/0x128 [ 54.475139] __asan_report_load4_noabort+0x20/0x30 [ 54.475176] kasan_atomics_helper+0x3de4/0x4858 [ 54.475208] kasan_atomics+0x198/0x2e0 [ 54.475237] kunit_try_run_case+0x170/0x3f0 [ 54.475268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.475303] kthread+0x328/0x630 [ 54.475335] ret_from_fork+0x10/0x20 [ 54.475366] [ 54.543049] Allocated by task 310: [ 54.546437] kasan_save_stack+0x3c/0x68 [ 54.550254] kasan_save_track+0x20/0x40 [ 54.554074] kasan_save_alloc_info+0x40/0x58 [ 54.558327] __kasan_kmalloc+0xd4/0xd8 [ 54.562060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.566573] kasan_atomics+0xb8/0x2e0 [ 54.570219] kunit_try_run_case+0x170/0x3f0 [ 54.574386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.579854] kthread+0x328/0x630 [ 54.583066] ret_from_fork+0x10/0x20 [ 54.586625] [ 54.588101] The buggy address belongs to the object at ffff00080243ed00 [ 54.588101] which belongs to the cache kmalloc-64 of size 64 [ 54.600429] The buggy address is located 0 bytes to the right of [ 54.600429] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.613274] [ 54.614750] The buggy address belongs to the physical page: [ 54.620309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.628293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.634803] page_type: f5(slab) [ 54.637936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.645659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.653377] page dumped because: kasan: bad access detected [ 54.658933] [ 54.660408] Memory state around the buggy address: [ 54.665187] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.672391] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.679596] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.686797] ^ [ 54.691575] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.698781] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.705981] ================================================================== [ 62.640657] ================================================================== [ 62.647706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.655081] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.662372] [ 62.663853] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.663902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.663918] Hardware name: WinLink E850-96 board (DT) [ 62.663939] Call trace: [ 62.663953] show_stack+0x20/0x38 (C) [ 62.663986] dump_stack_lvl+0x8c/0xd0 [ 62.664017] print_report+0x118/0x608 [ 62.664048] kasan_report+0xdc/0x128 [ 62.664080] __asan_report_load8_noabort+0x20/0x30 [ 62.664116] kasan_atomics_helper+0x3e10/0x4858 [ 62.664148] kasan_atomics+0x198/0x2e0 [ 62.664177] kunit_try_run_case+0x170/0x3f0 [ 62.664211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.664245] kthread+0x328/0x630 [ 62.664276] ret_from_fork+0x10/0x20 [ 62.664307] [ 62.731988] Allocated by task 310: [ 62.735376] kasan_save_stack+0x3c/0x68 [ 62.739194] kasan_save_track+0x20/0x40 [ 62.743013] kasan_save_alloc_info+0x40/0x58 [ 62.747267] __kasan_kmalloc+0xd4/0xd8 [ 62.750999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.755513] kasan_atomics+0xb8/0x2e0 [ 62.759159] kunit_try_run_case+0x170/0x3f0 [ 62.763325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.768794] kthread+0x328/0x630 [ 62.772006] ret_from_fork+0x10/0x20 [ 62.775565] [ 62.777042] The buggy address belongs to the object at ffff00080243ed00 [ 62.777042] which belongs to the cache kmalloc-64 of size 64 [ 62.789368] The buggy address is located 0 bytes to the right of [ 62.789368] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.802213] [ 62.803689] The buggy address belongs to the physical page: [ 62.809248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.817233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.823742] page_type: f5(slab) [ 62.826874] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.834598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.842317] page dumped because: kasan: bad access detected [ 62.847872] [ 62.849348] Memory state around the buggy address: [ 62.854126] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.861331] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.868536] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.875737] ^ [ 62.880515] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.887721] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.894920] ================================================================== [ 63.167385] ================================================================== [ 63.174433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.181809] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 63.189100] [ 63.190581] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 63.190630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.190647] Hardware name: WinLink E850-96 board (DT) [ 63.190663] Call trace: [ 63.190676] show_stack+0x20/0x38 (C) [ 63.190710] dump_stack_lvl+0x8c/0xd0 [ 63.190742] print_report+0x118/0x608 [ 63.190774] kasan_report+0xdc/0x128 [ 63.190804] __asan_report_load8_noabort+0x20/0x30 [ 63.190839] kasan_atomics_helper+0x3e20/0x4858 [ 63.190871] kasan_atomics+0x198/0x2e0 [ 63.190902] kunit_try_run_case+0x170/0x3f0 [ 63.190933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.190968] kthread+0x328/0x630 [ 63.191003] ret_from_fork+0x10/0x20 [ 63.191034] [ 63.258717] Allocated by task 310: [ 63.262104] kasan_save_stack+0x3c/0x68 [ 63.265922] kasan_save_track+0x20/0x40 [ 63.269742] kasan_save_alloc_info+0x40/0x58 [ 63.273995] __kasan_kmalloc+0xd4/0xd8 [ 63.277727] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.282241] kasan_atomics+0xb8/0x2e0 [ 63.285887] kunit_try_run_case+0x170/0x3f0 [ 63.290054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.295522] kthread+0x328/0x630 [ 63.298734] ret_from_fork+0x10/0x20 [ 63.302293] [ 63.303770] The buggy address belongs to the object at ffff00080243ed00 [ 63.303770] which belongs to the cache kmalloc-64 of size 64 [ 63.316095] The buggy address is located 0 bytes to the right of [ 63.316095] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 63.328942] [ 63.330418] The buggy address belongs to the physical page: [ 63.335975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 63.343961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.350471] page_type: f5(slab) [ 63.353602] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.361326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.369045] page dumped because: kasan: bad access detected [ 63.374601] [ 63.376076] Memory state around the buggy address: [ 63.380856] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.388059] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.395264] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.402465] ^ [ 63.407243] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.414449] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.421649] ================================================================== [ 47.580079] ================================================================== [ 47.587165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.594458] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.601748] [ 47.603229] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.603282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.603298] Hardware name: WinLink E850-96 board (DT) [ 47.603317] Call trace: [ 47.603332] show_stack+0x20/0x38 (C) [ 47.603365] dump_stack_lvl+0x8c/0xd0 [ 47.603398] print_report+0x118/0x608 [ 47.603431] kasan_report+0xdc/0x128 [ 47.603461] kasan_check_range+0x100/0x1a8 [ 47.603495] __kasan_check_read+0x20/0x30 [ 47.603530] kasan_atomics_helper+0x2b0/0x4858 [ 47.603562] kasan_atomics+0x198/0x2e0 [ 47.603591] kunit_try_run_case+0x170/0x3f0 [ 47.603624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.603660] kthread+0x328/0x630 [ 47.603691] ret_from_fork+0x10/0x20 [ 47.603724] [ 47.674576] Allocated by task 310: [ 47.677963] kasan_save_stack+0x3c/0x68 [ 47.681781] kasan_save_track+0x20/0x40 [ 47.685600] kasan_save_alloc_info+0x40/0x58 [ 47.689854] __kasan_kmalloc+0xd4/0xd8 [ 47.693587] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.698100] kasan_atomics+0xb8/0x2e0 [ 47.701746] kunit_try_run_case+0x170/0x3f0 [ 47.705912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.711382] kthread+0x328/0x630 [ 47.714592] ret_from_fork+0x10/0x20 [ 47.718152] [ 47.719629] The buggy address belongs to the object at ffff00080243ed00 [ 47.719629] which belongs to the cache kmalloc-64 of size 64 [ 47.731954] The buggy address is located 0 bytes to the right of [ 47.731954] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 47.744801] [ 47.746276] The buggy address belongs to the physical page: [ 47.751834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 47.759820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.766329] page_type: f5(slab) [ 47.769461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.777185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.784904] page dumped because: kasan: bad access detected [ 47.790459] [ 47.791935] Memory state around the buggy address: [ 47.796716] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.803918] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.811123] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.818324] ^ [ 47.823102] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.830308] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.837508] ================================================================== [ 59.204777] ================================================================== [ 59.211820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.219195] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 59.226573] [ 59.228054] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 59.228106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.228121] Hardware name: WinLink E850-96 board (DT) [ 59.228139] Call trace: [ 59.228154] show_stack+0x20/0x38 (C) [ 59.228188] dump_stack_lvl+0x8c/0xd0 [ 59.228219] print_report+0x118/0x608 [ 59.228250] kasan_report+0xdc/0x128 [ 59.228281] kasan_check_range+0x100/0x1a8 [ 59.228312] __kasan_check_write+0x20/0x30 [ 59.228347] kasan_atomics_helper+0x126c/0x4858 [ 59.228377] kasan_atomics+0x198/0x2e0 [ 59.228407] kunit_try_run_case+0x170/0x3f0 [ 59.228439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.228475] kthread+0x328/0x630 [ 59.228505] ret_from_fork+0x10/0x20 [ 59.228538] [ 59.299575] Allocated by task 310: [ 59.302962] kasan_save_stack+0x3c/0x68 [ 59.306780] kasan_save_track+0x20/0x40 [ 59.310599] kasan_save_alloc_info+0x40/0x58 [ 59.314853] __kasan_kmalloc+0xd4/0xd8 [ 59.318586] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.323099] kasan_atomics+0xb8/0x2e0 [ 59.326745] kunit_try_run_case+0x170/0x3f0 [ 59.330911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.336380] kthread+0x328/0x630 [ 59.339592] ret_from_fork+0x10/0x20 [ 59.343151] [ 59.344628] The buggy address belongs to the object at ffff00080243ed00 [ 59.344628] which belongs to the cache kmalloc-64 of size 64 [ 59.356954] The buggy address is located 0 bytes to the right of [ 59.356954] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.369800] [ 59.371276] The buggy address belongs to the physical page: [ 59.376835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.384818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.391327] page_type: f5(slab) [ 59.394460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.402184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.409903] page dumped because: kasan: bad access detected [ 59.415459] [ 59.416934] Memory state around the buggy address: [ 59.421714] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.428917] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.436122] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.443323] ^ [ 59.448101] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.455307] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.462507] ================================================================== [ 59.734972] ================================================================== [ 59.742018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.749395] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 59.756773] [ 59.758255] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 59.758308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.758322] Hardware name: WinLink E850-96 board (DT) [ 59.758341] Call trace: [ 59.758355] show_stack+0x20/0x38 (C) [ 59.758390] dump_stack_lvl+0x8c/0xd0 [ 59.758423] print_report+0x118/0x608 [ 59.758455] kasan_report+0xdc/0x128 [ 59.758485] kasan_check_range+0x100/0x1a8 [ 59.758519] __kasan_check_write+0x20/0x30 [ 59.758554] kasan_atomics_helper+0x1384/0x4858 [ 59.758586] kasan_atomics+0x198/0x2e0 [ 59.758615] kunit_try_run_case+0x170/0x3f0 [ 59.758646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.758682] kthread+0x328/0x630 [ 59.758715] ret_from_fork+0x10/0x20 [ 59.758748] [ 59.829775] Allocated by task 310: [ 59.833163] kasan_save_stack+0x3c/0x68 [ 59.836980] kasan_save_track+0x20/0x40 [ 59.840800] kasan_save_alloc_info+0x40/0x58 [ 59.845053] __kasan_kmalloc+0xd4/0xd8 [ 59.848786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.853300] kasan_atomics+0xb8/0x2e0 [ 59.856945] kunit_try_run_case+0x170/0x3f0 [ 59.861112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.866580] kthread+0x328/0x630 [ 59.869792] ret_from_fork+0x10/0x20 [ 59.873352] [ 59.874827] The buggy address belongs to the object at ffff00080243ed00 [ 59.874827] which belongs to the cache kmalloc-64 of size 64 [ 59.887156] The buggy address is located 0 bytes to the right of [ 59.887156] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.900000] [ 59.901476] The buggy address belongs to the physical page: [ 59.907033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.915019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.921529] page_type: f5(slab) [ 59.924660] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.932385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.940104] page dumped because: kasan: bad access detected [ 59.945659] [ 59.947135] Memory state around the buggy address: [ 59.951913] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.959118] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.966323] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.973523] ^ [ 59.978301] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.985507] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.992707] ================================================================== [ 55.504829] ================================================================== [ 55.511876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.519250] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 55.526542] [ 55.528024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.528071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.528087] Hardware name: WinLink E850-96 board (DT) [ 55.528109] Call trace: [ 55.528122] show_stack+0x20/0x38 (C) [ 55.528154] dump_stack_lvl+0x8c/0xd0 [ 55.528187] print_report+0x118/0x608 [ 55.528218] kasan_report+0xdc/0x128 [ 55.528250] __asan_report_load4_noabort+0x20/0x30 [ 55.528286] kasan_atomics_helper+0x3e04/0x4858 [ 55.528319] kasan_atomics+0x198/0x2e0 [ 55.528349] kunit_try_run_case+0x170/0x3f0 [ 55.528378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.528415] kthread+0x328/0x630 [ 55.528449] ret_from_fork+0x10/0x20 [ 55.528484] [ 55.596158] Allocated by task 310: [ 55.599547] kasan_save_stack+0x3c/0x68 [ 55.603364] kasan_save_track+0x20/0x40 [ 55.607183] kasan_save_alloc_info+0x40/0x58 [ 55.611436] __kasan_kmalloc+0xd4/0xd8 [ 55.615169] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.619683] kasan_atomics+0xb8/0x2e0 [ 55.623328] kunit_try_run_case+0x170/0x3f0 [ 55.627495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.632964] kthread+0x328/0x630 [ 55.636175] ret_from_fork+0x10/0x20 [ 55.639734] [ 55.641210] The buggy address belongs to the object at ffff00080243ed00 [ 55.641210] which belongs to the cache kmalloc-64 of size 64 [ 55.653537] The buggy address is located 0 bytes to the right of [ 55.653537] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.666383] [ 55.667859] The buggy address belongs to the physical page: [ 55.673416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.681402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.687912] page_type: f5(slab) [ 55.691045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.698768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.706487] page dumped because: kasan: bad access detected [ 55.712042] [ 55.713518] Memory state around the buggy address: [ 55.718297] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.725501] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.732707] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.739906] ^ [ 55.744684] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.751889] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.759090] ================================================================== [ 49.428008] ================================================================== [ 49.435055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.442345] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.449723] [ 49.451204] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.451256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.451272] Hardware name: WinLink E850-96 board (DT) [ 49.451292] Call trace: [ 49.451306] show_stack+0x20/0x38 (C) [ 49.451337] dump_stack_lvl+0x8c/0xd0 [ 49.451368] print_report+0x118/0x608 [ 49.451398] kasan_report+0xdc/0x128 [ 49.451428] kasan_check_range+0x100/0x1a8 [ 49.451461] __kasan_check_write+0x20/0x30 [ 49.451496] kasan_atomics_helper+0x4e4/0x4858 [ 49.451526] kasan_atomics+0x198/0x2e0 [ 49.451556] kunit_try_run_case+0x170/0x3f0 [ 49.451586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.451620] kthread+0x328/0x630 [ 49.451655] ret_from_fork+0x10/0x20 [ 49.451686] [ 49.522639] Allocated by task 310: [ 49.526026] kasan_save_stack+0x3c/0x68 [ 49.529844] kasan_save_track+0x20/0x40 [ 49.533663] kasan_save_alloc_info+0x40/0x58 [ 49.537916] __kasan_kmalloc+0xd4/0xd8 [ 49.541649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.546163] kasan_atomics+0xb8/0x2e0 [ 49.549808] kunit_try_run_case+0x170/0x3f0 [ 49.553975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.559443] kthread+0x328/0x630 [ 49.562655] ret_from_fork+0x10/0x20 [ 49.566215] [ 49.567691] The buggy address belongs to the object at ffff00080243ed00 [ 49.567691] which belongs to the cache kmalloc-64 of size 64 [ 49.580016] The buggy address is located 0 bytes to the right of [ 49.580016] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.592863] [ 49.594339] The buggy address belongs to the physical page: [ 49.599898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.607884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.614391] page_type: f5(slab) [ 49.617524] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.625248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.632967] page dumped because: kasan: bad access detected [ 49.638522] [ 49.639998] Memory state around the buggy address: [ 49.644777] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.651981] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.659186] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.666387] ^ [ 49.671164] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.678369] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.685570] ================================================================== [ 56.292834] ================================================================== [ 56.299883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.307172] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.314550] [ 56.316033] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.316085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.316099] Hardware name: WinLink E850-96 board (DT) [ 56.316118] Call trace: [ 56.316131] show_stack+0x20/0x38 (C) [ 56.316165] dump_stack_lvl+0x8c/0xd0 [ 56.316198] print_report+0x118/0x608 [ 56.316229] kasan_report+0xdc/0x128 [ 56.316261] kasan_check_range+0x100/0x1a8 [ 56.316293] __kasan_check_write+0x20/0x30 [ 56.316330] kasan_atomics_helper+0xe44/0x4858 [ 56.316363] kasan_atomics+0x198/0x2e0 [ 56.316392] kunit_try_run_case+0x170/0x3f0 [ 56.316422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.316459] kthread+0x328/0x630 [ 56.316490] ret_from_fork+0x10/0x20 [ 56.316521] [ 56.387466] Allocated by task 310: [ 56.390854] kasan_save_stack+0x3c/0x68 [ 56.394671] kasan_save_track+0x20/0x40 [ 56.398490] kasan_save_alloc_info+0x40/0x58 [ 56.402744] __kasan_kmalloc+0xd4/0xd8 [ 56.406476] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.410990] kasan_atomics+0xb8/0x2e0 [ 56.414636] kunit_try_run_case+0x170/0x3f0 [ 56.418802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.424271] kthread+0x328/0x630 [ 56.427483] ret_from_fork+0x10/0x20 [ 56.431042] [ 56.432519] The buggy address belongs to the object at ffff00080243ed00 [ 56.432519] which belongs to the cache kmalloc-64 of size 64 [ 56.444847] The buggy address is located 0 bytes to the right of [ 56.444847] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.457691] [ 56.459166] The buggy address belongs to the physical page: [ 56.464725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.472709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.479219] page_type: f5(slab) [ 56.482351] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.490075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.497794] page dumped because: kasan: bad access detected [ 56.503350] [ 56.504825] Memory state around the buggy address: [ 56.509604] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.516808] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.524013] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.531214] ^ [ 56.535992] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.543198] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.550398] ================================================================== [ 54.186763] ================================================================== [ 54.193838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.201127] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.208506] [ 54.209988] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 54.210035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.210053] Hardware name: WinLink E850-96 board (DT) [ 54.210072] Call trace: [ 54.210086] show_stack+0x20/0x38 (C) [ 54.210120] dump_stack_lvl+0x8c/0xd0 [ 54.210152] print_report+0x118/0x608 [ 54.210185] kasan_report+0xdc/0x128 [ 54.210215] kasan_check_range+0x100/0x1a8 [ 54.210249] __kasan_check_write+0x20/0x30 [ 54.210284] kasan_atomics_helper+0xc08/0x4858 [ 54.210315] kasan_atomics+0x198/0x2e0 [ 54.210346] kunit_try_run_case+0x170/0x3f0 [ 54.210378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.210412] kthread+0x328/0x630 [ 54.210444] ret_from_fork+0x10/0x20 [ 54.210473] [ 54.281421] Allocated by task 310: [ 54.284810] kasan_save_stack+0x3c/0x68 [ 54.288626] kasan_save_track+0x20/0x40 [ 54.292446] kasan_save_alloc_info+0x40/0x58 [ 54.296699] __kasan_kmalloc+0xd4/0xd8 [ 54.300431] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.304945] kasan_atomics+0xb8/0x2e0 [ 54.308591] kunit_try_run_case+0x170/0x3f0 [ 54.312758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.318226] kthread+0x328/0x630 [ 54.321438] ret_from_fork+0x10/0x20 [ 54.324997] [ 54.326474] The buggy address belongs to the object at ffff00080243ed00 [ 54.326474] which belongs to the cache kmalloc-64 of size 64 [ 54.338801] The buggy address is located 0 bytes to the right of [ 54.338801] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.351646] [ 54.353122] The buggy address belongs to the physical page: [ 54.358681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.366665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.373175] page_type: f5(slab) [ 54.376306] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.384031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.391750] page dumped because: kasan: bad access detected [ 54.397305] [ 54.398780] Memory state around the buggy address: [ 54.403559] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.410763] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.417968] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.425169] ^ [ 54.429947] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.437153] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.444353] ================================================================== [ 60.000245] ================================================================== [ 60.007119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 60.014495] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.021786] [ 60.023270] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.023322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.023338] Hardware name: WinLink E850-96 board (DT) [ 60.023358] Call trace: [ 60.023373] show_stack+0x20/0x38 (C) [ 60.023406] dump_stack_lvl+0x8c/0xd0 [ 60.023439] print_report+0x118/0x608 [ 60.023472] kasan_report+0xdc/0x128 [ 60.023503] __asan_report_load8_noabort+0x20/0x30 [ 60.023542] kasan_atomics_helper+0x3f04/0x4858 [ 60.023573] kasan_atomics+0x198/0x2e0 [ 60.023603] kunit_try_run_case+0x170/0x3f0 [ 60.023637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.023675] kthread+0x328/0x630 [ 60.023706] ret_from_fork+0x10/0x20 [ 60.023741] [ 60.091403] Allocated by task 310: [ 60.094791] kasan_save_stack+0x3c/0x68 [ 60.098609] kasan_save_track+0x20/0x40 [ 60.102428] kasan_save_alloc_info+0x40/0x58 [ 60.106681] __kasan_kmalloc+0xd4/0xd8 [ 60.110414] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.114927] kasan_atomics+0xb8/0x2e0 [ 60.118573] kunit_try_run_case+0x170/0x3f0 [ 60.122740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.128208] kthread+0x328/0x630 [ 60.131420] ret_from_fork+0x10/0x20 [ 60.134979] [ 60.136456] The buggy address belongs to the object at ffff00080243ed00 [ 60.136456] which belongs to the cache kmalloc-64 of size 64 [ 60.148784] The buggy address is located 0 bytes to the right of [ 60.148784] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.161628] [ 60.163106] The buggy address belongs to the physical page: [ 60.168662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.176647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.183157] page_type: f5(slab) [ 60.186291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.194013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.201732] page dumped because: kasan: bad access detected [ 60.207287] [ 60.208762] Memory state around the buggy address: [ 60.213543] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.220746] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.227950] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.235152] ^ [ 60.239929] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.247135] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.254335] ================================================================== [ 53.133710] ================================================================== [ 53.140730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.148018] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.155397] [ 53.156878] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.156928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.156948] Hardware name: WinLink E850-96 board (DT) [ 53.156969] Call trace: [ 53.156981] show_stack+0x20/0x38 (C) [ 53.157014] dump_stack_lvl+0x8c/0xd0 [ 53.157047] print_report+0x118/0x608 [ 53.157078] kasan_report+0xdc/0x128 [ 53.157109] kasan_check_range+0x100/0x1a8 [ 53.157141] __kasan_check_write+0x20/0x30 [ 53.157176] kasan_atomics_helper+0xad4/0x4858 [ 53.157207] kasan_atomics+0x198/0x2e0 [ 53.157238] kunit_try_run_case+0x170/0x3f0 [ 53.157266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.157301] kthread+0x328/0x630 [ 53.157333] ret_from_fork+0x10/0x20 [ 53.157365] [ 53.228312] Allocated by task 310: [ 53.231701] kasan_save_stack+0x3c/0x68 [ 53.235517] kasan_save_track+0x20/0x40 [ 53.239336] kasan_save_alloc_info+0x40/0x58 [ 53.243590] __kasan_kmalloc+0xd4/0xd8 [ 53.247322] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.251836] kasan_atomics+0xb8/0x2e0 [ 53.255482] kunit_try_run_case+0x170/0x3f0 [ 53.259649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.265117] kthread+0x328/0x630 [ 53.268329] ret_from_fork+0x10/0x20 [ 53.271888] [ 53.273365] The buggy address belongs to the object at ffff00080243ed00 [ 53.273365] which belongs to the cache kmalloc-64 of size 64 [ 53.285693] The buggy address is located 0 bytes to the right of [ 53.285693] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.298537] [ 53.300012] The buggy address belongs to the physical page: [ 53.305572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.313554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.320064] page_type: f5(slab) [ 53.323199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.330922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.338640] page dumped because: kasan: bad access detected [ 53.344196] [ 53.345671] Memory state around the buggy address: [ 53.350450] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.357654] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.364859] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.372060] ^ [ 53.376838] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.384044] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.391244] ================================================================== [ 61.848891] ================================================================== [ 61.855878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.863252] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.870631] [ 61.872112] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.872162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.872175] Hardware name: WinLink E850-96 board (DT) [ 61.872196] Call trace: [ 61.872213] show_stack+0x20/0x38 (C) [ 61.872246] dump_stack_lvl+0x8c/0xd0 [ 61.872275] print_report+0x118/0x608 [ 61.872307] kasan_report+0xdc/0x128 [ 61.872338] kasan_check_range+0x100/0x1a8 [ 61.872372] __kasan_check_write+0x20/0x30 [ 61.872407] kasan_atomics_helper+0x1644/0x4858 [ 61.872439] kasan_atomics+0x198/0x2e0 [ 61.872471] kunit_try_run_case+0x170/0x3f0 [ 61.872503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.872539] kthread+0x328/0x630 [ 61.872571] ret_from_fork+0x10/0x20 [ 61.872603] [ 61.943632] Allocated by task 310: [ 61.947019] kasan_save_stack+0x3c/0x68 [ 61.950838] kasan_save_track+0x20/0x40 [ 61.954657] kasan_save_alloc_info+0x40/0x58 [ 61.958910] __kasan_kmalloc+0xd4/0xd8 [ 61.962643] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.967157] kasan_atomics+0xb8/0x2e0 [ 61.970802] kunit_try_run_case+0x170/0x3f0 [ 61.974969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.980438] kthread+0x328/0x630 [ 61.983649] ret_from_fork+0x10/0x20 [ 61.987208] [ 61.988685] The buggy address belongs to the object at ffff00080243ed00 [ 61.988685] which belongs to the cache kmalloc-64 of size 64 [ 62.001013] The buggy address is located 0 bytes to the right of [ 62.001013] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.013857] [ 62.015334] The buggy address belongs to the physical page: [ 62.020892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.028875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.035386] page_type: f5(slab) [ 62.038517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.046242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.053961] page dumped because: kasan: bad access detected [ 62.059516] [ 62.060992] Memory state around the buggy address: [ 62.065772] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.072975] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.080180] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.087380] ^ [ 62.092158] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.099365] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.106564] ================================================================== [ 55.239904] ================================================================== [ 55.246948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.254236] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 55.261615] [ 55.263098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.263147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.263165] Hardware name: WinLink E850-96 board (DT) [ 55.263182] Call trace: [ 55.263197] show_stack+0x20/0x38 (C) [ 55.263230] dump_stack_lvl+0x8c/0xd0 [ 55.263263] print_report+0x118/0x608 [ 55.263297] kasan_report+0xdc/0x128 [ 55.263327] kasan_check_range+0x100/0x1a8 [ 55.263361] __kasan_check_write+0x20/0x30 [ 55.263395] kasan_atomics_helper+0xd3c/0x4858 [ 55.263428] kasan_atomics+0x198/0x2e0 [ 55.263457] kunit_try_run_case+0x170/0x3f0 [ 55.263487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.263521] kthread+0x328/0x630 [ 55.263553] ret_from_fork+0x10/0x20 [ 55.263584] [ 55.334531] Allocated by task 310: [ 55.337919] kasan_save_stack+0x3c/0x68 [ 55.341735] kasan_save_track+0x20/0x40 [ 55.345555] kasan_save_alloc_info+0x40/0x58 [ 55.349808] __kasan_kmalloc+0xd4/0xd8 [ 55.353540] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.358055] kasan_atomics+0xb8/0x2e0 [ 55.361700] kunit_try_run_case+0x170/0x3f0 [ 55.365867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.371335] kthread+0x328/0x630 [ 55.374547] ret_from_fork+0x10/0x20 [ 55.378106] [ 55.379583] The buggy address belongs to the object at ffff00080243ed00 [ 55.379583] which belongs to the cache kmalloc-64 of size 64 [ 55.391908] The buggy address is located 0 bytes to the right of [ 55.391908] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.404755] [ 55.406231] The buggy address belongs to the physical page: [ 55.411790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.419774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.426284] page_type: f5(slab) [ 55.429415] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.437140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.444859] page dumped because: kasan: bad access detected [ 55.450414] [ 55.451890] Memory state around the buggy address: [ 55.456670] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.463873] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.471077] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.478278] ^ [ 55.483056] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.490262] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.497462] ================================================================== [ 46.519832] ================================================================== [ 46.534061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.541435] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 46.548726] [ 46.550212] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.550273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.550292] Hardware name: WinLink E850-96 board (DT) [ 46.550315] Call trace: [ 46.550330] show_stack+0x20/0x38 (C) [ 46.550367] dump_stack_lvl+0x8c/0xd0 [ 46.550401] print_report+0x118/0x608 [ 46.550439] kasan_report+0xdc/0x128 [ 46.550469] __asan_report_load4_noabort+0x20/0x30 [ 46.550508] kasan_atomics_helper+0x40a8/0x4858 [ 46.550544] kasan_atomics+0x198/0x2e0 [ 46.550572] kunit_try_run_case+0x170/0x3f0 [ 46.550606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.550647] kthread+0x328/0x630 [ 46.550684] ret_from_fork+0x10/0x20 [ 46.550720] [ 46.618343] Allocated by task 310: [ 46.621731] kasan_save_stack+0x3c/0x68 [ 46.625546] kasan_save_track+0x20/0x40 [ 46.629366] kasan_save_alloc_info+0x40/0x58 [ 46.633620] __kasan_kmalloc+0xd4/0xd8 [ 46.637352] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.641866] kasan_atomics+0xb8/0x2e0 [ 46.645512] kunit_try_run_case+0x170/0x3f0 [ 46.649678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.655147] kthread+0x328/0x630 [ 46.658358] ret_from_fork+0x10/0x20 [ 46.661918] [ 46.663396] The buggy address belongs to the object at ffff00080243ed00 [ 46.663396] which belongs to the cache kmalloc-64 of size 64 [ 46.675724] The buggy address is located 0 bytes to the right of [ 46.675724] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 46.688567] [ 46.690046] The buggy address belongs to the physical page: [ 46.695601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 46.703586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.710096] page_type: f5(slab) [ 46.713234] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.720951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.728670] page dumped because: kasan: bad access detected [ 46.734225] [ 46.735701] Memory state around the buggy address: [ 46.740482] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.747684] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.754890] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.762090] ^ [ 46.766868] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.774074] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.781275] ================================================================== [ 53.925211] ================================================================== [ 53.932211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.939586] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.946878] [ 53.948360] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.948407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.948423] Hardware name: WinLink E850-96 board (DT) [ 53.948445] Call trace: [ 53.948458] show_stack+0x20/0x38 (C) [ 53.948490] dump_stack_lvl+0x8c/0xd0 [ 53.948521] print_report+0x118/0x608 [ 53.948554] kasan_report+0xdc/0x128 [ 53.948588] __asan_report_load4_noabort+0x20/0x30 [ 53.948623] kasan_atomics_helper+0x3dbc/0x4858 [ 53.948654] kasan_atomics+0x198/0x2e0 [ 53.948683] kunit_try_run_case+0x170/0x3f0 [ 53.948714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.948749] kthread+0x328/0x630 [ 53.948785] ret_from_fork+0x10/0x20 [ 53.948815] [ 54.016495] Allocated by task 310: [ 54.019884] kasan_save_stack+0x3c/0x68 [ 54.023699] kasan_save_track+0x20/0x40 [ 54.027519] kasan_save_alloc_info+0x40/0x58 [ 54.031773] __kasan_kmalloc+0xd4/0xd8 [ 54.035505] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.040019] kasan_atomics+0xb8/0x2e0 [ 54.043665] kunit_try_run_case+0x170/0x3f0 [ 54.047831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.053300] kthread+0x328/0x630 [ 54.056512] ret_from_fork+0x10/0x20 [ 54.060071] [ 54.061546] The buggy address belongs to the object at ffff00080243ed00 [ 54.061546] which belongs to the cache kmalloc-64 of size 64 [ 54.073874] The buggy address is located 0 bytes to the right of [ 54.073874] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.086719] [ 54.088197] The buggy address belongs to the physical page: [ 54.093754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.101739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.108248] page_type: f5(slab) [ 54.111380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.119104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.126823] page dumped because: kasan: bad access detected [ 54.132378] [ 54.133854] Memory state around the buggy address: [ 54.138634] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.145837] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.153041] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.160243] ^ [ 54.165021] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.172227] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.179426] ================================================================== [ 50.752607] ================================================================== [ 50.759689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.766978] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 50.774356] [ 50.775839] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 50.775892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.775909] Hardware name: WinLink E850-96 board (DT) [ 50.775929] Call trace: [ 50.775941] show_stack+0x20/0x38 (C) [ 50.775974] dump_stack_lvl+0x8c/0xd0 [ 50.776004] print_report+0x118/0x608 [ 50.776033] kasan_report+0xdc/0x128 [ 50.776064] kasan_check_range+0x100/0x1a8 [ 50.776097] __kasan_check_write+0x20/0x30 [ 50.776132] kasan_atomics_helper+0x6ec/0x4858 [ 50.776164] kasan_atomics+0x198/0x2e0 [ 50.776193] kunit_try_run_case+0x170/0x3f0 [ 50.776223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.776257] kthread+0x328/0x630 [ 50.776288] ret_from_fork+0x10/0x20 [ 50.776318] [ 50.847271] Allocated by task 310: [ 50.850659] kasan_save_stack+0x3c/0x68 [ 50.854476] kasan_save_track+0x20/0x40 [ 50.858296] kasan_save_alloc_info+0x40/0x58 [ 50.862549] __kasan_kmalloc+0xd4/0xd8 [ 50.866282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.870795] kasan_atomics+0xb8/0x2e0 [ 50.874441] kunit_try_run_case+0x170/0x3f0 [ 50.878608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.884076] kthread+0x328/0x630 [ 50.887288] ret_from_fork+0x10/0x20 [ 50.890847] [ 50.892324] The buggy address belongs to the object at ffff00080243ed00 [ 50.892324] which belongs to the cache kmalloc-64 of size 64 [ 50.904650] The buggy address is located 0 bytes to the right of [ 50.904650] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.917496] [ 50.918972] The buggy address belongs to the physical page: [ 50.924531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.932515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.939025] page_type: f5(slab) [ 50.942156] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.949881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.957600] page dumped because: kasan: bad access detected [ 50.963155] [ 50.964631] Memory state around the buggy address: [ 50.969411] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.976614] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.983818] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.991019] ^ [ 50.995797] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.003003] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.010203] ================================================================== [ 52.338872] ================================================================== [ 52.345950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.353239] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.360617] [ 52.362098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.362149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.362165] Hardware name: WinLink E850-96 board (DT) [ 52.362186] Call trace: [ 52.362200] show_stack+0x20/0x38 (C) [ 52.362235] dump_stack_lvl+0x8c/0xd0 [ 52.362267] print_report+0x118/0x608 [ 52.362299] kasan_report+0xdc/0x128 [ 52.362327] kasan_check_range+0x100/0x1a8 [ 52.362358] __kasan_check_write+0x20/0x30 [ 52.362393] kasan_atomics_helper+0x99c/0x4858 [ 52.362424] kasan_atomics+0x198/0x2e0 [ 52.362454] kunit_try_run_case+0x170/0x3f0 [ 52.362484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.362520] kthread+0x328/0x630 [ 52.362550] ret_from_fork+0x10/0x20 [ 52.362582] [ 52.433532] Allocated by task 310: [ 52.436919] kasan_save_stack+0x3c/0x68 [ 52.440737] kasan_save_track+0x20/0x40 [ 52.444557] kasan_save_alloc_info+0x40/0x58 [ 52.448810] __kasan_kmalloc+0xd4/0xd8 [ 52.452542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.457056] kasan_atomics+0xb8/0x2e0 [ 52.460702] kunit_try_run_case+0x170/0x3f0 [ 52.464869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.470337] kthread+0x328/0x630 [ 52.473549] ret_from_fork+0x10/0x20 [ 52.477108] [ 52.478584] The buggy address belongs to the object at ffff00080243ed00 [ 52.478584] which belongs to the cache kmalloc-64 of size 64 [ 52.490911] The buggy address is located 0 bytes to the right of [ 52.490911] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 52.503757] [ 52.505233] The buggy address belongs to the physical page: [ 52.510792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 52.518775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.525284] page_type: f5(slab) [ 52.528417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.536142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.543861] page dumped because: kasan: bad access detected [ 52.549416] [ 52.550891] Memory state around the buggy address: [ 52.555670] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.562874] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.570079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.577280] ^ [ 52.582058] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.589264] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.596464] ================================================================== [ 52.868841] ================================================================== [ 52.875802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.883092] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.890470] [ 52.891953] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.892003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.892021] Hardware name: WinLink E850-96 board (DT) [ 52.892040] Call trace: [ 52.892055] show_stack+0x20/0x38 (C) [ 52.892088] dump_stack_lvl+0x8c/0xd0 [ 52.892120] print_report+0x118/0x608 [ 52.892151] kasan_report+0xdc/0x128 [ 52.892180] kasan_check_range+0x100/0x1a8 [ 52.892212] __kasan_check_write+0x20/0x30 [ 52.892247] kasan_atomics_helper+0xa6c/0x4858 [ 52.892278] kasan_atomics+0x198/0x2e0 [ 52.892308] kunit_try_run_case+0x170/0x3f0 [ 52.892337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.892374] kthread+0x328/0x630 [ 52.892407] ret_from_fork+0x10/0x20 [ 52.892439] [ 52.963385] Allocated by task 310: [ 52.966773] kasan_save_stack+0x3c/0x68 [ 52.970591] kasan_save_track+0x20/0x40 [ 52.974410] kasan_save_alloc_info+0x40/0x58 [ 52.978663] __kasan_kmalloc+0xd4/0xd8 [ 52.982395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.986910] kasan_atomics+0xb8/0x2e0 [ 52.990555] kunit_try_run_case+0x170/0x3f0 [ 52.994722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.000190] kthread+0x328/0x630 [ 53.003402] ret_from_fork+0x10/0x20 [ 53.006961] [ 53.008438] The buggy address belongs to the object at ffff00080243ed00 [ 53.008438] which belongs to the cache kmalloc-64 of size 64 [ 53.020765] The buggy address is located 0 bytes to the right of [ 53.020765] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.033610] [ 53.035087] The buggy address belongs to the physical page: [ 53.040645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.048628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.055138] page_type: f5(slab) [ 53.058272] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.065995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.073714] page dumped because: kasan: bad access detected [ 53.079269] [ 53.080745] Memory state around the buggy address: [ 53.085524] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.092728] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.099932] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.107133] ^ [ 53.111911] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.119117] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.126317] ================================================================== [ 57.349409] ================================================================== [ 57.356464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.363754] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.371132] [ 57.372614] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.372664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.372679] Hardware name: WinLink E850-96 board (DT) [ 57.372697] Call trace: [ 57.372712] show_stack+0x20/0x38 (C) [ 57.372747] dump_stack_lvl+0x8c/0xd0 [ 57.372778] print_report+0x118/0x608 [ 57.372810] kasan_report+0xdc/0x128 [ 57.372840] kasan_check_range+0x100/0x1a8 [ 57.372873] __kasan_check_write+0x20/0x30 [ 57.372907] kasan_atomics_helper+0xf88/0x4858 [ 57.372937] kasan_atomics+0x198/0x2e0 [ 57.372966] kunit_try_run_case+0x170/0x3f0 [ 57.372999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.373033] kthread+0x328/0x630 [ 57.373066] ret_from_fork+0x10/0x20 [ 57.373097] [ 57.444047] Allocated by task 310: [ 57.447435] kasan_save_stack+0x3c/0x68 [ 57.451252] kasan_save_track+0x20/0x40 [ 57.455072] kasan_save_alloc_info+0x40/0x58 [ 57.459325] __kasan_kmalloc+0xd4/0xd8 [ 57.463058] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.467571] kasan_atomics+0xb8/0x2e0 [ 57.471217] kunit_try_run_case+0x170/0x3f0 [ 57.475384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.480852] kthread+0x328/0x630 [ 57.484064] ret_from_fork+0x10/0x20 [ 57.487623] [ 57.489098] The buggy address belongs to the object at ffff00080243ed00 [ 57.489098] which belongs to the cache kmalloc-64 of size 64 [ 57.501428] The buggy address is located 0 bytes to the right of [ 57.501428] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 57.514272] [ 57.515748] The buggy address belongs to the physical page: [ 57.521305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 57.529290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.535800] page_type: f5(slab) [ 57.538933] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.546657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.554376] page dumped because: kasan: bad access detected [ 57.559931] [ 57.561406] Memory state around the buggy address: [ 57.566186] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.573390] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.580594] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.587795] ^ [ 57.592573] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.599779] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.606979] ================================================================== [ 62.375582] ================================================================== [ 62.382604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.389981] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.397359] [ 62.398841] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.398892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.398906] Hardware name: WinLink E850-96 board (DT) [ 62.398927] Call trace: [ 62.398942] show_stack+0x20/0x38 (C) [ 62.398974] dump_stack_lvl+0x8c/0xd0 [ 62.399006] print_report+0x118/0x608 [ 62.399035] kasan_report+0xdc/0x128 [ 62.399065] kasan_check_range+0x100/0x1a8 [ 62.399098] __kasan_check_write+0x20/0x30 [ 62.399131] kasan_atomics_helper+0x16d0/0x4858 [ 62.399162] kasan_atomics+0x198/0x2e0 [ 62.399191] kunit_try_run_case+0x170/0x3f0 [ 62.399222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.399258] kthread+0x328/0x630 [ 62.399290] ret_from_fork+0x10/0x20 [ 62.399323] [ 62.470361] Allocated by task 310: [ 62.473748] kasan_save_stack+0x3c/0x68 [ 62.477566] kasan_save_track+0x20/0x40 [ 62.481385] kasan_save_alloc_info+0x40/0x58 [ 62.485638] __kasan_kmalloc+0xd4/0xd8 [ 62.489371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.493885] kasan_atomics+0xb8/0x2e0 [ 62.497530] kunit_try_run_case+0x170/0x3f0 [ 62.501697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.507166] kthread+0x328/0x630 [ 62.510378] ret_from_fork+0x10/0x20 [ 62.513936] [ 62.515414] The buggy address belongs to the object at ffff00080243ed00 [ 62.515414] which belongs to the cache kmalloc-64 of size 64 [ 62.527740] The buggy address is located 0 bytes to the right of [ 62.527740] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.540586] [ 62.542061] The buggy address belongs to the physical page: [ 62.547619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.555604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.562114] page_type: f5(slab) [ 62.565246] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.572970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.580689] page dumped because: kasan: bad access detected [ 62.586244] [ 62.587720] Memory state around the buggy address: [ 62.592498] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.599703] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.606908] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.614109] ^ [ 62.618887] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.626093] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.633292] ================================================================== [ 60.791930] ================================================================== [ 60.798948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.806324] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.813702] [ 60.815184] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.815232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.815248] Hardware name: WinLink E850-96 board (DT) [ 60.815267] Call trace: [ 60.815283] show_stack+0x20/0x38 (C) [ 60.815317] dump_stack_lvl+0x8c/0xd0 [ 60.815352] print_report+0x118/0x608 [ 60.815385] kasan_report+0xdc/0x128 [ 60.815414] kasan_check_range+0x100/0x1a8 [ 60.815447] __kasan_check_write+0x20/0x30 [ 60.815480] kasan_atomics_helper+0x14e4/0x4858 [ 60.815513] kasan_atomics+0x198/0x2e0 [ 60.815541] kunit_try_run_case+0x170/0x3f0 [ 60.815571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.815605] kthread+0x328/0x630 [ 60.815637] ret_from_fork+0x10/0x20 [ 60.815668] [ 60.886704] Allocated by task 310: [ 60.890091] kasan_save_stack+0x3c/0x68 [ 60.893909] kasan_save_track+0x20/0x40 [ 60.897729] kasan_save_alloc_info+0x40/0x58 [ 60.901982] __kasan_kmalloc+0xd4/0xd8 [ 60.905714] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.910228] kasan_atomics+0xb8/0x2e0 [ 60.913874] kunit_try_run_case+0x170/0x3f0 [ 60.918040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.923509] kthread+0x328/0x630 [ 60.926721] ret_from_fork+0x10/0x20 [ 60.930280] [ 60.931757] The buggy address belongs to the object at ffff00080243ed00 [ 60.931757] which belongs to the cache kmalloc-64 of size 64 [ 60.944082] The buggy address is located 0 bytes to the right of [ 60.944082] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.956929] [ 60.958406] The buggy address belongs to the physical page: [ 60.963963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.971948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.978458] page_type: f5(slab) [ 60.981589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.989314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.997032] page dumped because: kasan: bad access detected [ 61.002588] [ 61.004063] Memory state around the buggy address: [ 61.008841] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.016046] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.023251] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.030452] ^ [ 61.035230] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.042436] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.049636] ================================================================== [ 62.902388] ================================================================== [ 62.909335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.916709] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.924087] [ 62.925569] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.925618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.925635] Hardware name: WinLink E850-96 board (DT) [ 62.925654] Call trace: [ 62.925665] show_stack+0x20/0x38 (C) [ 62.925699] dump_stack_lvl+0x8c/0xd0 [ 62.925732] print_report+0x118/0x608 [ 62.925764] kasan_report+0xdc/0x128 [ 62.925794] kasan_check_range+0x100/0x1a8 [ 62.925828] __kasan_check_write+0x20/0x30 [ 62.925864] kasan_atomics_helper+0x175c/0x4858 [ 62.925896] kasan_atomics+0x198/0x2e0 [ 62.925924] kunit_try_run_case+0x170/0x3f0 [ 62.925958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.925993] kthread+0x328/0x630 [ 62.926025] ret_from_fork+0x10/0x20 [ 62.926056] [ 62.997089] Allocated by task 310: [ 63.000476] kasan_save_stack+0x3c/0x68 [ 63.004294] kasan_save_track+0x20/0x40 [ 63.008113] kasan_save_alloc_info+0x40/0x58 [ 63.012367] __kasan_kmalloc+0xd4/0xd8 [ 63.016099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.020613] kasan_atomics+0xb8/0x2e0 [ 63.024259] kunit_try_run_case+0x170/0x3f0 [ 63.028425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.033894] kthread+0x328/0x630 [ 63.037106] ret_from_fork+0x10/0x20 [ 63.040665] [ 63.042140] The buggy address belongs to the object at ffff00080243ed00 [ 63.042140] which belongs to the cache kmalloc-64 of size 64 [ 63.054469] The buggy address is located 0 bytes to the right of [ 63.054469] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 63.067314] [ 63.068790] The buggy address belongs to the physical page: [ 63.074349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 63.082334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.088843] page_type: f5(slab) [ 63.091976] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.099698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.107417] page dumped because: kasan: bad access detected [ 63.112973] [ 63.114448] Memory state around the buggy address: [ 63.119229] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.126431] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.133636] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.140837] ^ [ 63.145615] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.152821] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.160021] ================================================================== [ 60.526766] ================================================================== [ 60.533848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.541224] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.548602] [ 60.550083] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.550130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.550150] Hardware name: WinLink E850-96 board (DT) [ 60.550170] Call trace: [ 60.550185] show_stack+0x20/0x38 (C) [ 60.550216] dump_stack_lvl+0x8c/0xd0 [ 60.550248] print_report+0x118/0x608 [ 60.550280] kasan_report+0xdc/0x128 [ 60.550311] kasan_check_range+0x100/0x1a8 [ 60.550343] __kasan_check_write+0x20/0x30 [ 60.550378] kasan_atomics_helper+0x147c/0x4858 [ 60.550411] kasan_atomics+0x198/0x2e0 [ 60.550440] kunit_try_run_case+0x170/0x3f0 [ 60.550473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.550509] kthread+0x328/0x630 [ 60.550541] ret_from_fork+0x10/0x20 [ 60.550572] [ 60.621603] Allocated by task 310: [ 60.624991] kasan_save_stack+0x3c/0x68 [ 60.628809] kasan_save_track+0x20/0x40 [ 60.632628] kasan_save_alloc_info+0x40/0x58 [ 60.636881] __kasan_kmalloc+0xd4/0xd8 [ 60.640614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.645128] kasan_atomics+0xb8/0x2e0 [ 60.648773] kunit_try_run_case+0x170/0x3f0 [ 60.652940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.658409] kthread+0x328/0x630 [ 60.661621] ret_from_fork+0x10/0x20 [ 60.665180] [ 60.666657] The buggy address belongs to the object at ffff00080243ed00 [ 60.666657] which belongs to the cache kmalloc-64 of size 64 [ 60.678985] The buggy address is located 0 bytes to the right of [ 60.678985] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.691829] [ 60.693304] The buggy address belongs to the physical page: [ 60.698862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.706847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.713357] page_type: f5(slab) [ 60.716489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.724214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.731932] page dumped because: kasan: bad access detected [ 60.737487] [ 60.738963] Memory state around the buggy address: [ 60.743741] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.750946] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.758151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.765352] ^ [ 60.770130] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.777336] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.784536] ================================================================== [ 51.547447] ================================================================== [ 51.554469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.561758] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.569136] [ 51.570616] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.570665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.570682] Hardware name: WinLink E850-96 board (DT) [ 51.570702] Call trace: [ 51.570716] show_stack+0x20/0x38 (C) [ 51.570751] dump_stack_lvl+0x8c/0xd0 [ 51.570782] print_report+0x118/0x608 [ 51.570814] kasan_report+0xdc/0x128 [ 51.570843] kasan_check_range+0x100/0x1a8 [ 51.570878] __kasan_check_write+0x20/0x30 [ 51.570911] kasan_atomics_helper+0x894/0x4858 [ 51.570942] kasan_atomics+0x198/0x2e0 [ 51.570970] kunit_try_run_case+0x170/0x3f0 [ 51.571001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.571036] kthread+0x328/0x630 [ 51.571070] ret_from_fork+0x10/0x20 [ 51.571103] [ 51.642051] Allocated by task 310: [ 51.645438] kasan_save_stack+0x3c/0x68 [ 51.649256] kasan_save_track+0x20/0x40 [ 51.653076] kasan_save_alloc_info+0x40/0x58 [ 51.657329] __kasan_kmalloc+0xd4/0xd8 [ 51.661061] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.665575] kasan_atomics+0xb8/0x2e0 [ 51.669221] kunit_try_run_case+0x170/0x3f0 [ 51.673387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.678856] kthread+0x328/0x630 [ 51.682068] ret_from_fork+0x10/0x20 [ 51.685627] [ 51.687104] The buggy address belongs to the object at ffff00080243ed00 [ 51.687104] which belongs to the cache kmalloc-64 of size 64 [ 51.699429] The buggy address is located 0 bytes to the right of [ 51.699429] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.712276] [ 51.713752] The buggy address belongs to the physical page: [ 51.719311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.727295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.733803] page_type: f5(slab) [ 51.736936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.744661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.752379] page dumped because: kasan: bad access detected [ 51.757935] [ 51.759410] Memory state around the buggy address: [ 51.764189] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.771393] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.778598] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.785799] ^ [ 51.790577] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.797783] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.804983] ================================================================== [ 58.939740] ================================================================== [ 58.946719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.954095] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.961473] [ 58.962954] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.963008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.963023] Hardware name: WinLink E850-96 board (DT) [ 58.963042] Call trace: [ 58.963057] show_stack+0x20/0x38 (C) [ 58.963094] dump_stack_lvl+0x8c/0xd0 [ 58.963128] print_report+0x118/0x608 [ 58.963160] kasan_report+0xdc/0x128 [ 58.963190] kasan_check_range+0x100/0x1a8 [ 58.963224] __kasan_check_write+0x20/0x30 [ 58.963257] kasan_atomics_helper+0x11f8/0x4858 [ 58.963288] kasan_atomics+0x198/0x2e0 [ 58.963317] kunit_try_run_case+0x170/0x3f0 [ 58.963348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.963386] kthread+0x328/0x630 [ 58.963417] ret_from_fork+0x10/0x20 [ 58.963449] [ 59.034475] Allocated by task 310: [ 59.037862] kasan_save_stack+0x3c/0x68 [ 59.041680] kasan_save_track+0x20/0x40 [ 59.045499] kasan_save_alloc_info+0x40/0x58 [ 59.049753] __kasan_kmalloc+0xd4/0xd8 [ 59.053485] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.057999] kasan_atomics+0xb8/0x2e0 [ 59.061645] kunit_try_run_case+0x170/0x3f0 [ 59.065811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.071280] kthread+0x328/0x630 [ 59.074492] ret_from_fork+0x10/0x20 [ 59.078051] [ 59.079526] The buggy address belongs to the object at ffff00080243ed00 [ 59.079526] which belongs to the cache kmalloc-64 of size 64 [ 59.091854] The buggy address is located 0 bytes to the right of [ 59.091854] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.104699] [ 59.106175] The buggy address belongs to the physical page: [ 59.111735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.119718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.126227] page_type: f5(slab) [ 59.129362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.137084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.144803] page dumped because: kasan: bad access detected [ 59.150358] [ 59.151834] Memory state around the buggy address: [ 59.156615] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.163817] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.171021] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.178223] ^ [ 59.183001] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.190207] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.197408] ================================================================== [ 48.633261] ================================================================== [ 48.640275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.647565] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.654943] [ 48.656423] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.656472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.656490] Hardware name: WinLink E850-96 board (DT) [ 48.656511] Call trace: [ 48.656525] show_stack+0x20/0x38 (C) [ 48.656559] dump_stack_lvl+0x8c/0xd0 [ 48.656591] print_report+0x118/0x608 [ 48.656621] kasan_report+0xdc/0x128 [ 48.656653] kasan_check_range+0x100/0x1a8 [ 48.656685] __kasan_check_write+0x20/0x30 [ 48.656720] kasan_atomics_helper+0x3ac/0x4858 [ 48.656753] kasan_atomics+0x198/0x2e0 [ 48.656781] kunit_try_run_case+0x170/0x3f0 [ 48.656812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.656849] kthread+0x328/0x630 [ 48.656880] ret_from_fork+0x10/0x20 [ 48.656911] [ 48.727859] Allocated by task 310: [ 48.731248] kasan_save_stack+0x3c/0x68 [ 48.735064] kasan_save_track+0x20/0x40 [ 48.738883] kasan_save_alloc_info+0x40/0x58 [ 48.743136] __kasan_kmalloc+0xd4/0xd8 [ 48.746869] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.751383] kasan_atomics+0xb8/0x2e0 [ 48.755029] kunit_try_run_case+0x170/0x3f0 [ 48.759195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.764664] kthread+0x328/0x630 [ 48.767875] ret_from_fork+0x10/0x20 [ 48.771435] [ 48.772910] The buggy address belongs to the object at ffff00080243ed00 [ 48.772910] which belongs to the cache kmalloc-64 of size 64 [ 48.785237] The buggy address is located 0 bytes to the right of [ 48.785237] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.798083] [ 48.799559] The buggy address belongs to the physical page: [ 48.805117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.813101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.819612] page_type: f5(slab) [ 48.822744] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.830468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.838187] page dumped because: kasan: bad access detected [ 48.843742] [ 48.845218] Memory state around the buggy address: [ 48.849996] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.857201] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.864406] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.871607] ^ [ 48.876385] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.883591] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.890791] ================================================================== [ 61.322126] ================================================================== [ 61.329147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.336524] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.343902] [ 61.345383] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.345433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.345450] Hardware name: WinLink E850-96 board (DT) [ 61.345471] Call trace: [ 61.345485] show_stack+0x20/0x38 (C) [ 61.345518] dump_stack_lvl+0x8c/0xd0 [ 61.345550] print_report+0x118/0x608 [ 61.345580] kasan_report+0xdc/0x128 [ 61.345611] kasan_check_range+0x100/0x1a8 [ 61.345645] __kasan_check_write+0x20/0x30 [ 61.345679] kasan_atomics_helper+0x15b4/0x4858 [ 61.345712] kasan_atomics+0x198/0x2e0 [ 61.345742] kunit_try_run_case+0x170/0x3f0 [ 61.345773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.345809] kthread+0x328/0x630 [ 61.345843] ret_from_fork+0x10/0x20 [ 61.345875] [ 61.416904] Allocated by task 310: [ 61.420292] kasan_save_stack+0x3c/0x68 [ 61.424109] kasan_save_track+0x20/0x40 [ 61.427929] kasan_save_alloc_info+0x40/0x58 [ 61.432182] __kasan_kmalloc+0xd4/0xd8 [ 61.435915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.440428] kasan_atomics+0xb8/0x2e0 [ 61.444074] kunit_try_run_case+0x170/0x3f0 [ 61.448241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.453709] kthread+0x328/0x630 [ 61.456921] ret_from_fork+0x10/0x20 [ 61.460480] [ 61.461957] The buggy address belongs to the object at ffff00080243ed00 [ 61.461957] which belongs to the cache kmalloc-64 of size 64 [ 61.474285] The buggy address is located 0 bytes to the right of [ 61.474285] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 61.487129] [ 61.488605] The buggy address belongs to the physical page: [ 61.494164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 61.502148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.508658] page_type: f5(slab) [ 61.511789] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.519514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.527233] page dumped because: kasan: bad access detected [ 61.532788] [ 61.534263] Memory state around the buggy address: [ 61.539043] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.546247] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.553451] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.560652] ^ [ 61.565430] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.572636] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.579836] ================================================================== [ 58.409492] ================================================================== [ 58.416517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.423894] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.431272] [ 58.432755] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.432806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.432823] Hardware name: WinLink E850-96 board (DT) [ 58.432841] Call trace: [ 58.432853] show_stack+0x20/0x38 (C) [ 58.432887] dump_stack_lvl+0x8c/0xd0 [ 58.432919] print_report+0x118/0x608 [ 58.432951] kasan_report+0xdc/0x128 [ 58.432981] kasan_check_range+0x100/0x1a8 [ 58.433018] __kasan_check_write+0x20/0x30 [ 58.433051] kasan_atomics_helper+0x1128/0x4858 [ 58.433084] kasan_atomics+0x198/0x2e0 [ 58.433112] kunit_try_run_case+0x170/0x3f0 [ 58.433143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.433178] kthread+0x328/0x630 [ 58.433210] ret_from_fork+0x10/0x20 [ 58.433241] [ 58.504274] Allocated by task 310: [ 58.507662] kasan_save_stack+0x3c/0x68 [ 58.511480] kasan_save_track+0x20/0x40 [ 58.515299] kasan_save_alloc_info+0x40/0x58 [ 58.519552] __kasan_kmalloc+0xd4/0xd8 [ 58.523285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.527798] kasan_atomics+0xb8/0x2e0 [ 58.531444] kunit_try_run_case+0x170/0x3f0 [ 58.535611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.541080] kthread+0x328/0x630 [ 58.544291] ret_from_fork+0x10/0x20 [ 58.547850] [ 58.549326] The buggy address belongs to the object at ffff00080243ed00 [ 58.549326] which belongs to the cache kmalloc-64 of size 64 [ 58.561654] The buggy address is located 0 bytes to the right of [ 58.561654] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.574499] [ 58.575975] The buggy address belongs to the physical page: [ 58.581534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.589518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.596027] page_type: f5(slab) [ 58.599159] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.606884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.614603] page dumped because: kasan: bad access detected [ 58.620158] [ 58.621634] Memory state around the buggy address: [ 58.626413] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.633617] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.640823] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.648023] ^ [ 58.652800] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.660007] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.667206] ================================================================== [ 58.144366] ================================================================== [ 58.151417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.158794] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.166172] [ 58.167653] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.167703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.167718] Hardware name: WinLink E850-96 board (DT) [ 58.167739] Call trace: [ 58.167754] show_stack+0x20/0x38 (C) [ 58.167786] dump_stack_lvl+0x8c/0xd0 [ 58.167817] print_report+0x118/0x608 [ 58.167849] kasan_report+0xdc/0x128 [ 58.167879] kasan_check_range+0x100/0x1a8 [ 58.167911] __kasan_check_write+0x20/0x30 [ 58.167943] kasan_atomics_helper+0x10c0/0x4858 [ 58.167975] kasan_atomics+0x198/0x2e0 [ 58.168004] kunit_try_run_case+0x170/0x3f0 [ 58.168035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.168071] kthread+0x328/0x630 [ 58.168102] ret_from_fork+0x10/0x20 [ 58.168133] [ 58.239174] Allocated by task 310: [ 58.242562] kasan_save_stack+0x3c/0x68 [ 58.246379] kasan_save_track+0x20/0x40 [ 58.250199] kasan_save_alloc_info+0x40/0x58 [ 58.254452] __kasan_kmalloc+0xd4/0xd8 [ 58.258185] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.262698] kasan_atomics+0xb8/0x2e0 [ 58.266344] kunit_try_run_case+0x170/0x3f0 [ 58.270511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.275979] kthread+0x328/0x630 [ 58.279191] ret_from_fork+0x10/0x20 [ 58.282750] [ 58.284225] The buggy address belongs to the object at ffff00080243ed00 [ 58.284225] which belongs to the cache kmalloc-64 of size 64 [ 58.296553] The buggy address is located 0 bytes to the right of [ 58.296553] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.309399] [ 58.310875] The buggy address belongs to the physical page: [ 58.316434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.324417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.330927] page_type: f5(slab) [ 58.334060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.341784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.349503] page dumped because: kasan: bad access detected [ 58.355058] [ 58.356533] Memory state around the buggy address: [ 58.361312] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.368516] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.375721] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.382922] ^ [ 58.387700] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.394907] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.402106] ================================================================== [ 62.113899] ================================================================== [ 62.120977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 62.128352] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.135644] [ 62.137126] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.137177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.137191] Hardware name: WinLink E850-96 board (DT) [ 62.137209] Call trace: [ 62.137225] show_stack+0x20/0x38 (C) [ 62.137256] dump_stack_lvl+0x8c/0xd0 [ 62.137287] print_report+0x118/0x608 [ 62.137319] kasan_report+0xdc/0x128 [ 62.137348] __asan_report_load8_noabort+0x20/0x30 [ 62.137383] kasan_atomics_helper+0x3df4/0x4858 [ 62.137417] kasan_atomics+0x198/0x2e0 [ 62.137447] kunit_try_run_case+0x170/0x3f0 [ 62.137478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.137512] kthread+0x328/0x630 [ 62.137543] ret_from_fork+0x10/0x20 [ 62.137574] [ 62.205261] Allocated by task 310: [ 62.208647] kasan_save_stack+0x3c/0x68 [ 62.212466] kasan_save_track+0x20/0x40 [ 62.216285] kasan_save_alloc_info+0x40/0x58 [ 62.220538] __kasan_kmalloc+0xd4/0xd8 [ 62.224271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.228785] kasan_atomics+0xb8/0x2e0 [ 62.232430] kunit_try_run_case+0x170/0x3f0 [ 62.236597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.242066] kthread+0x328/0x630 [ 62.245277] ret_from_fork+0x10/0x20 [ 62.248837] [ 62.250313] The buggy address belongs to the object at ffff00080243ed00 [ 62.250313] which belongs to the cache kmalloc-64 of size 64 [ 62.262640] The buggy address is located 0 bytes to the right of [ 62.262640] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.275485] [ 62.276961] The buggy address belongs to the physical page: [ 62.282520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.290504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.297014] page_type: f5(slab) [ 62.300146] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.307870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.315589] page dumped because: kasan: bad access detected [ 62.321144] [ 62.322620] Memory state around the buggy address: [ 62.327399] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.334603] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.341808] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.349009] ^ [ 62.353786] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.360993] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.368193] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
[ 44.107415] ================================================================== [ 44.114475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.123328] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.130706] [ 44.132187] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.132236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.132252] Hardware name: WinLink E850-96 board (DT) [ 44.132268] Call trace: [ 44.132281] show_stack+0x20/0x38 (C) [ 44.132313] dump_stack_lvl+0x8c/0xd0 [ 44.132343] print_report+0x118/0x608 [ 44.132373] kasan_report+0xdc/0x128 [ 44.132405] kasan_check_range+0x100/0x1a8 [ 44.132438] __kasan_check_write+0x20/0x30 [ 44.132473] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.132511] kasan_bitops_generic+0x11c/0x1c8 [ 44.132543] kunit_try_run_case+0x170/0x3f0 [ 44.132573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.132607] kthread+0x328/0x630 [ 44.132639] ret_from_fork+0x10/0x20 [ 44.132670] [ 44.205791] Allocated by task 306: [ 44.209178] kasan_save_stack+0x3c/0x68 [ 44.212996] kasan_save_track+0x20/0x40 [ 44.216816] kasan_save_alloc_info+0x40/0x58 [ 44.221069] __kasan_kmalloc+0xd4/0xd8 [ 44.224802] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.229315] kasan_bitops_generic+0xa0/0x1c8 [ 44.233569] kunit_try_run_case+0x170/0x3f0 [ 44.237735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.243204] kthread+0x328/0x630 [ 44.246416] ret_from_fork+0x10/0x20 [ 44.249975] [ 44.251450] The buggy address belongs to the object at ffff000800e200a0 [ 44.251450] which belongs to the cache kmalloc-16 of size 16 [ 44.263780] The buggy address is located 8 bytes inside of [ 44.263780] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.276016] [ 44.277492] The buggy address belongs to the physical page: [ 44.283047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.291033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.297545] page_type: f5(slab) [ 44.300677] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.308401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.316120] page dumped because: kasan: bad access detected [ 44.321675] [ 44.323150] Memory state around the buggy address: [ 44.327929] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.335133] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.342338] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.349539] ^ [ 44.354057] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.361261] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.368463] ================================================================== [ 45.708252] ================================================================== [ 45.715319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.724259] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 45.731636] [ 45.733118] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 45.733166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.733182] Hardware name: WinLink E850-96 board (DT) [ 45.733202] Call trace: [ 45.733216] show_stack+0x20/0x38 (C) [ 45.733246] dump_stack_lvl+0x8c/0xd0 [ 45.733277] print_report+0x118/0x608 [ 45.733307] kasan_report+0xdc/0x128 [ 45.733338] kasan_check_range+0x100/0x1a8 [ 45.733371] __kasan_check_write+0x20/0x30 [ 45.733405] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.733440] kasan_bitops_generic+0x11c/0x1c8 [ 45.733472] kunit_try_run_case+0x170/0x3f0 [ 45.733504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.733538] kthread+0x328/0x630 [ 45.733572] ret_from_fork+0x10/0x20 [ 45.733602] [ 45.806809] Allocated by task 306: [ 45.810196] kasan_save_stack+0x3c/0x68 [ 45.814014] kasan_save_track+0x20/0x40 [ 45.817833] kasan_save_alloc_info+0x40/0x58 [ 45.822087] __kasan_kmalloc+0xd4/0xd8 [ 45.825819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.830333] kasan_bitops_generic+0xa0/0x1c8 [ 45.834586] kunit_try_run_case+0x170/0x3f0 [ 45.838753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.844222] kthread+0x328/0x630 [ 45.847433] ret_from_fork+0x10/0x20 [ 45.850992] [ 45.852469] The buggy address belongs to the object at ffff000800e200a0 [ 45.852469] which belongs to the cache kmalloc-16 of size 16 [ 45.864796] The buggy address is located 8 bytes inside of [ 45.864796] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.877034] [ 45.878509] The buggy address belongs to the physical page: [ 45.884067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.892051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.898561] page_type: f5(slab) [ 45.901694] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.909418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.917137] page dumped because: kasan: bad access detected [ 45.922693] [ 45.924168] Memory state around the buggy address: [ 45.928949] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.936151] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.943356] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.950557] ^ [ 45.955074] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.962279] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.969480] ================================================================== [ 44.909481] ================================================================== [ 44.916546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.925486] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.932777] [ 44.934257] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.934306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.934322] Hardware name: WinLink E850-96 board (DT) [ 44.934339] Call trace: [ 44.934352] show_stack+0x20/0x38 (C) [ 44.934384] dump_stack_lvl+0x8c/0xd0 [ 44.934417] print_report+0x118/0x608 [ 44.934449] kasan_report+0xdc/0x128 [ 44.934477] __asan_report_load8_noabort+0x20/0x30 [ 44.934512] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.934545] kasan_bitops_generic+0x11c/0x1c8 [ 44.934575] kunit_try_run_case+0x170/0x3f0 [ 44.934605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.934638] kthread+0x328/0x630 [ 44.934670] ret_from_fork+0x10/0x20 [ 44.934701] [ 45.004564] Allocated by task 306: [ 45.007950] kasan_save_stack+0x3c/0x68 [ 45.011769] kasan_save_track+0x20/0x40 [ 45.015588] kasan_save_alloc_info+0x40/0x58 [ 45.019841] __kasan_kmalloc+0xd4/0xd8 [ 45.023574] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.028088] kasan_bitops_generic+0xa0/0x1c8 [ 45.032341] kunit_try_run_case+0x170/0x3f0 [ 45.036508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.041977] kthread+0x328/0x630 [ 45.045189] ret_from_fork+0x10/0x20 [ 45.048748] [ 45.050223] The buggy address belongs to the object at ffff000800e200a0 [ 45.050223] which belongs to the cache kmalloc-16 of size 16 [ 45.062550] The buggy address is located 8 bytes inside of [ 45.062550] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.074789] [ 45.076264] The buggy address belongs to the physical page: [ 45.081821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.089807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.096316] page_type: f5(slab) [ 45.099449] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.107173] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.114892] page dumped because: kasan: bad access detected [ 45.120448] [ 45.121923] Memory state around the buggy address: [ 45.126701] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.133906] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.141111] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.148312] ^ [ 45.152829] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.160034] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.167235] ================================================================== [ 46.241952] ================================================================== [ 46.248991] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.257931] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 46.265222] [ 46.266703] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.266751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.266766] Hardware name: WinLink E850-96 board (DT) [ 46.266784] Call trace: [ 46.266794] show_stack+0x20/0x38 (C) [ 46.266826] dump_stack_lvl+0x8c/0xd0 [ 46.266856] print_report+0x118/0x608 [ 46.266889] kasan_report+0xdc/0x128 [ 46.266919] __asan_report_load8_noabort+0x20/0x30 [ 46.266955] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.266990] kasan_bitops_generic+0x11c/0x1c8 [ 46.267021] kunit_try_run_case+0x170/0x3f0 [ 46.267052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.267086] kthread+0x328/0x630 [ 46.267118] ret_from_fork+0x10/0x20 [ 46.267148] [ 46.337009] Allocated by task 306: [ 46.340395] kasan_save_stack+0x3c/0x68 [ 46.344214] kasan_save_track+0x20/0x40 [ 46.348034] kasan_save_alloc_info+0x40/0x58 [ 46.352287] __kasan_kmalloc+0xd4/0xd8 [ 46.356019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.360533] kasan_bitops_generic+0xa0/0x1c8 [ 46.364787] kunit_try_run_case+0x170/0x3f0 [ 46.368953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.374422] kthread+0x328/0x630 [ 46.377634] ret_from_fork+0x10/0x20 [ 46.381193] [ 46.382668] The buggy address belongs to the object at ffff000800e200a0 [ 46.382668] which belongs to the cache kmalloc-16 of size 16 [ 46.394995] The buggy address is located 8 bytes inside of [ 46.394995] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 46.407234] [ 46.408710] The buggy address belongs to the physical page: [ 46.414267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 46.422251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.428761] page_type: f5(slab) [ 46.431894] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.439618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.447338] page dumped because: kasan: bad access detected [ 46.452893] [ 46.454368] Memory state around the buggy address: [ 46.459147] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.466352] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.473556] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.480757] ^ [ 46.485274] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.492480] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.499680] ================================================================== [ 44.375813] ================================================================== [ 44.382873] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.391813] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.399104] [ 44.400584] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.400633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.400649] Hardware name: WinLink E850-96 board (DT) [ 44.400667] Call trace: [ 44.400679] show_stack+0x20/0x38 (C) [ 44.400711] dump_stack_lvl+0x8c/0xd0 [ 44.400741] print_report+0x118/0x608 [ 44.400772] kasan_report+0xdc/0x128 [ 44.400804] __asan_report_load8_noabort+0x20/0x30 [ 44.400838] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.400877] kasan_bitops_generic+0x11c/0x1c8 [ 44.400908] kunit_try_run_case+0x170/0x3f0 [ 44.400936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.400970] kthread+0x328/0x630 [ 44.401000] ret_from_fork+0x10/0x20 [ 44.401031] [ 44.470891] Allocated by task 306: [ 44.474277] kasan_save_stack+0x3c/0x68 [ 44.478096] kasan_save_track+0x20/0x40 [ 44.481916] kasan_save_alloc_info+0x40/0x58 [ 44.486169] __kasan_kmalloc+0xd4/0xd8 [ 44.489902] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.494416] kasan_bitops_generic+0xa0/0x1c8 [ 44.498669] kunit_try_run_case+0x170/0x3f0 [ 44.502835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.508304] kthread+0x328/0x630 [ 44.511516] ret_from_fork+0x10/0x20 [ 44.515075] [ 44.516550] The buggy address belongs to the object at ffff000800e200a0 [ 44.516550] which belongs to the cache kmalloc-16 of size 16 [ 44.528877] The buggy address is located 8 bytes inside of [ 44.528877] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.541116] [ 44.542592] The buggy address belongs to the physical page: [ 44.548148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.556133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.562644] page_type: f5(slab) [ 44.565777] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.573501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.581220] page dumped because: kasan: bad access detected [ 44.586775] [ 44.588250] Memory state around the buggy address: [ 44.593029] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.600234] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.607439] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.614639] ^ [ 44.619157] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.626362] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.633563] ================================================================== [ 45.174610] ================================================================== [ 45.181646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.190586] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 45.197964] [ 45.199446] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 45.199496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.199513] Hardware name: WinLink E850-96 board (DT) [ 45.199532] Call trace: [ 45.199544] show_stack+0x20/0x38 (C) [ 45.199577] dump_stack_lvl+0x8c/0xd0 [ 45.199609] print_report+0x118/0x608 [ 45.199639] kasan_report+0xdc/0x128 [ 45.199671] kasan_check_range+0x100/0x1a8 [ 45.199704] __kasan_check_write+0x20/0x30 [ 45.199737] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.199775] kasan_bitops_generic+0x11c/0x1c8 [ 45.199805] kunit_try_run_case+0x170/0x3f0 [ 45.199837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.199871] kthread+0x328/0x630 [ 45.199904] ret_from_fork+0x10/0x20 [ 45.199934] [ 45.273136] Allocated by task 306: [ 45.276523] kasan_save_stack+0x3c/0x68 [ 45.280341] kasan_save_track+0x20/0x40 [ 45.284161] kasan_save_alloc_info+0x40/0x58 [ 45.288414] __kasan_kmalloc+0xd4/0xd8 [ 45.292147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.296660] kasan_bitops_generic+0xa0/0x1c8 [ 45.300914] kunit_try_run_case+0x170/0x3f0 [ 45.305081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.310549] kthread+0x328/0x630 [ 45.313761] ret_from_fork+0x10/0x20 [ 45.317320] [ 45.318795] The buggy address belongs to the object at ffff000800e200a0 [ 45.318795] which belongs to the cache kmalloc-16 of size 16 [ 45.331124] The buggy address is located 8 bytes inside of [ 45.331124] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.343361] [ 45.344837] The buggy address belongs to the physical page: [ 45.350396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.358378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.364890] page_type: f5(slab) [ 45.368021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.375746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.383465] page dumped because: kasan: bad access detected [ 45.389020] [ 45.390496] Memory state around the buggy address: [ 45.395276] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.402479] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.409683] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.416884] ^ [ 45.421402] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.428607] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.435808] ================================================================== [ 45.443129] ================================================================== [ 45.450219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.459158] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 45.466449] [ 45.467929] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 45.467977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.467995] Hardware name: WinLink E850-96 board (DT) [ 45.468012] Call trace: [ 45.468026] show_stack+0x20/0x38 (C) [ 45.468059] dump_stack_lvl+0x8c/0xd0 [ 45.468088] print_report+0x118/0x608 [ 45.468120] kasan_report+0xdc/0x128 [ 45.468151] __asan_report_load8_noabort+0x20/0x30 [ 45.468188] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.468224] kasan_bitops_generic+0x11c/0x1c8 [ 45.468254] kunit_try_run_case+0x170/0x3f0 [ 45.468284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.468318] kthread+0x328/0x630 [ 45.468349] ret_from_fork+0x10/0x20 [ 45.468379] [ 45.538236] Allocated by task 306: [ 45.541622] kasan_save_stack+0x3c/0x68 [ 45.545441] kasan_save_track+0x20/0x40 [ 45.549261] kasan_save_alloc_info+0x40/0x58 [ 45.553514] __kasan_kmalloc+0xd4/0xd8 [ 45.557247] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.561761] kasan_bitops_generic+0xa0/0x1c8 [ 45.566014] kunit_try_run_case+0x170/0x3f0 [ 45.570181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.575649] kthread+0x328/0x630 [ 45.578861] ret_from_fork+0x10/0x20 [ 45.582420] [ 45.583896] The buggy address belongs to the object at ffff000800e200a0 [ 45.583896] which belongs to the cache kmalloc-16 of size 16 [ 45.596224] The buggy address is located 8 bytes inside of [ 45.596224] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 45.608461] [ 45.609937] The buggy address belongs to the physical page: [ 45.615493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 45.623479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.629989] page_type: f5(slab) [ 45.633122] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.640846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.648564] page dumped because: kasan: bad access detected [ 45.654120] [ 45.655596] Memory state around the buggy address: [ 45.660375] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.667579] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.674783] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.681984] ^ [ 45.686502] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.693707] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.700908] ================================================================== [ 44.640940] ================================================================== [ 44.647975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.656913] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 44.664292] [ 44.665772] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 44.665819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.665837] Hardware name: WinLink E850-96 board (DT) [ 44.665855] Call trace: [ 44.665866] show_stack+0x20/0x38 (C) [ 44.665898] dump_stack_lvl+0x8c/0xd0 [ 44.665929] print_report+0x118/0x608 [ 44.665960] kasan_report+0xdc/0x128 [ 44.665990] kasan_check_range+0x100/0x1a8 [ 44.666022] __kasan_check_write+0x20/0x30 [ 44.666056] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.666091] kasan_bitops_generic+0x11c/0x1c8 [ 44.666124] kunit_try_run_case+0x170/0x3f0 [ 44.666156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.666190] kthread+0x328/0x630 [ 44.666223] ret_from_fork+0x10/0x20 [ 44.666252] [ 44.739464] Allocated by task 306: [ 44.742849] kasan_save_stack+0x3c/0x68 [ 44.746669] kasan_save_track+0x20/0x40 [ 44.750488] kasan_save_alloc_info+0x40/0x58 [ 44.754742] __kasan_kmalloc+0xd4/0xd8 [ 44.758474] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.762988] kasan_bitops_generic+0xa0/0x1c8 [ 44.767241] kunit_try_run_case+0x170/0x3f0 [ 44.771408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.776877] kthread+0x328/0x630 [ 44.780088] ret_from_fork+0x10/0x20 [ 44.783647] [ 44.785123] The buggy address belongs to the object at ffff000800e200a0 [ 44.785123] which belongs to the cache kmalloc-16 of size 16 [ 44.797449] The buggy address is located 8 bytes inside of [ 44.797449] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.809689] [ 44.811164] The buggy address belongs to the physical page: [ 44.816722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.824709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.831216] page_type: f5(slab) [ 44.834349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.842073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.849792] page dumped because: kasan: bad access detected [ 44.855347] [ 44.856823] Memory state around the buggy address: [ 44.861601] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.868806] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.876011] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.883212] ^ [ 44.887729] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.894934] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.902135] ================================================================== [ 45.976828] ================================================================== [ 45.983891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.992831] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 46.000122] [ 46.001603] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.001650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.001664] Hardware name: WinLink E850-96 board (DT) [ 46.001684] Call trace: [ 46.001697] show_stack+0x20/0x38 (C) [ 46.001726] dump_stack_lvl+0x8c/0xd0 [ 46.001757] print_report+0x118/0x608 [ 46.001789] kasan_report+0xdc/0x128 [ 46.001819] __asan_report_load8_noabort+0x20/0x30 [ 46.001855] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 46.001894] kasan_bitops_generic+0x11c/0x1c8 [ 46.001925] kunit_try_run_case+0x170/0x3f0 [ 46.001955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.001988] kthread+0x328/0x630 [ 46.002019] ret_from_fork+0x10/0x20 [ 46.002049] [ 46.071909] Allocated by task 306: [ 46.075294] kasan_save_stack+0x3c/0x68 [ 46.079114] kasan_save_track+0x20/0x40 [ 46.082934] kasan_save_alloc_info+0x40/0x58 [ 46.087187] __kasan_kmalloc+0xd4/0xd8 [ 46.090919] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.095433] kasan_bitops_generic+0xa0/0x1c8 [ 46.099686] kunit_try_run_case+0x170/0x3f0 [ 46.103853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.109322] kthread+0x328/0x630 [ 46.112533] ret_from_fork+0x10/0x20 [ 46.116093] [ 46.117568] The buggy address belongs to the object at ffff000800e200a0 [ 46.117568] which belongs to the cache kmalloc-16 of size 16 [ 46.129895] The buggy address is located 8 bytes inside of [ 46.129895] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 46.142134] [ 46.143609] The buggy address belongs to the physical page: [ 46.149167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 46.157152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.163661] page_type: f5(slab) [ 46.166794] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.174518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.182237] page dumped because: kasan: bad access detected [ 46.187792] [ 46.189268] Memory state around the buggy address: [ 46.194048] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.201251] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.208456] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.215657] ^ [ 46.220174] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.227379] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.234580] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
[ 43.046281] ================================================================== [ 43.053381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.061538] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.068829] [ 43.070312] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.070365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.070382] Hardware name: WinLink E850-96 board (DT) [ 43.070404] Call trace: [ 43.070419] show_stack+0x20/0x38 (C) [ 43.070451] dump_stack_lvl+0x8c/0xd0 [ 43.070482] print_report+0x118/0x608 [ 43.070514] kasan_report+0xdc/0x128 [ 43.070543] __asan_report_load8_noabort+0x20/0x30 [ 43.070582] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.070616] kasan_bitops_generic+0x110/0x1c8 [ 43.070646] kunit_try_run_case+0x170/0x3f0 [ 43.070679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.070714] kthread+0x328/0x630 [ 43.070745] ret_from_fork+0x10/0x20 [ 43.070777] [ 43.139835] Allocated by task 306: [ 43.143223] kasan_save_stack+0x3c/0x68 [ 43.147040] kasan_save_track+0x20/0x40 [ 43.150859] kasan_save_alloc_info+0x40/0x58 [ 43.155113] __kasan_kmalloc+0xd4/0xd8 [ 43.158845] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.163359] kasan_bitops_generic+0xa0/0x1c8 [ 43.167613] kunit_try_run_case+0x170/0x3f0 [ 43.171779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.177248] kthread+0x328/0x630 [ 43.180459] ret_from_fork+0x10/0x20 [ 43.184018] [ 43.185494] The buggy address belongs to the object at ffff000800e200a0 [ 43.185494] which belongs to the cache kmalloc-16 of size 16 [ 43.197824] The buggy address is located 8 bytes inside of [ 43.197824] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 43.210060] [ 43.211535] The buggy address belongs to the physical page: [ 43.217095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 43.225077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.231589] page_type: f5(slab) [ 43.234720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.242445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.250163] page dumped because: kasan: bad access detected [ 43.255719] [ 43.257194] Memory state around the buggy address: [ 43.261972] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.269177] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.276382] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.283583] ^ [ 43.288100] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.295305] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.302506] ================================================================== [ 41.448930] ================================================================== [ 41.458268] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.466424] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 41.473802] [ 41.475288] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 41.475343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.475363] Hardware name: WinLink E850-96 board (DT) [ 41.475387] Call trace: [ 41.475402] show_stack+0x20/0x38 (C) [ 41.475442] dump_stack_lvl+0x8c/0xd0 [ 41.475477] print_report+0x118/0x608 [ 41.475513] kasan_report+0xdc/0x128 [ 41.475546] kasan_check_range+0x100/0x1a8 [ 41.475584] __kasan_check_write+0x20/0x30 [ 41.475624] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.475657] kasan_bitops_generic+0x110/0x1c8 [ 41.475689] kunit_try_run_case+0x170/0x3f0 [ 41.475723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.475761] kthread+0x328/0x630 [ 41.475798] ret_from_fork+0x10/0x20 [ 41.475834] [ 41.548193] Allocated by task 306: [ 41.551581] kasan_save_stack+0x3c/0x68 [ 41.555397] kasan_save_track+0x20/0x40 [ 41.559217] kasan_save_alloc_info+0x40/0x58 [ 41.563470] __kasan_kmalloc+0xd4/0xd8 [ 41.567204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.571716] kasan_bitops_generic+0xa0/0x1c8 [ 41.575970] kunit_try_run_case+0x170/0x3f0 [ 41.580135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.585605] kthread+0x328/0x630 [ 41.588817] ret_from_fork+0x10/0x20 [ 41.592376] [ 41.593853] The buggy address belongs to the object at ffff000800e200a0 [ 41.593853] which belongs to the cache kmalloc-16 of size 16 [ 41.606180] The buggy address is located 8 bytes inside of [ 41.606180] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 41.618417] [ 41.619897] The buggy address belongs to the physical page: [ 41.625452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 41.633437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.639946] page_type: f5(slab) [ 41.643084] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.650802] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.658523] page dumped because: kasan: bad access detected [ 41.664076] [ 41.665551] Memory state around the buggy address: [ 41.670333] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.677535] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.684739] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.691940] ^ [ 41.696458] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.703662] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.710865] ================================================================== [ 41.981786] ================================================================== [ 41.988814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.996971] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.004349] [ 42.005832] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.005882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.005899] Hardware name: WinLink E850-96 board (DT) [ 42.005919] Call trace: [ 42.005936] show_stack+0x20/0x38 (C) [ 42.005971] dump_stack_lvl+0x8c/0xd0 [ 42.006002] print_report+0x118/0x608 [ 42.006034] kasan_report+0xdc/0x128 [ 42.006066] kasan_check_range+0x100/0x1a8 [ 42.006100] __kasan_check_write+0x20/0x30 [ 42.006136] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 42.006170] kasan_bitops_generic+0x110/0x1c8 [ 42.006202] kunit_try_run_case+0x170/0x3f0 [ 42.006233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.006268] kthread+0x328/0x630 [ 42.006301] ret_from_fork+0x10/0x20 [ 42.006335] [ 42.078740] Allocated by task 306: [ 42.082127] kasan_save_stack+0x3c/0x68 [ 42.085945] kasan_save_track+0x20/0x40 [ 42.089764] kasan_save_alloc_info+0x40/0x58 [ 42.094018] __kasan_kmalloc+0xd4/0xd8 [ 42.097750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.102264] kasan_bitops_generic+0xa0/0x1c8 [ 42.106517] kunit_try_run_case+0x170/0x3f0 [ 42.110684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.116153] kthread+0x328/0x630 [ 42.119364] ret_from_fork+0x10/0x20 [ 42.122923] [ 42.124400] The buggy address belongs to the object at ffff000800e200a0 [ 42.124400] which belongs to the cache kmalloc-16 of size 16 [ 42.136728] The buggy address is located 8 bytes inside of [ 42.136728] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.148964] [ 42.150442] The buggy address belongs to the physical page: [ 42.155999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.163985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.170493] page_type: f5(slab) [ 42.173625] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.181349] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.189070] page dumped because: kasan: bad access detected [ 42.194623] [ 42.196098] Memory state around the buggy address: [ 42.200878] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.208082] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.215289] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.222488] ^ [ 42.227005] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.234210] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.241411] ================================================================== [ 43.843851] ================================================================== [ 43.850937] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.859095] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.866387] [ 43.867868] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.867917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.867933] Hardware name: WinLink E850-96 board (DT) [ 43.867953] Call trace: [ 43.867964] show_stack+0x20/0x38 (C) [ 43.867994] dump_stack_lvl+0x8c/0xd0 [ 43.868027] print_report+0x118/0x608 [ 43.868060] kasan_report+0xdc/0x128 [ 43.868090] __asan_report_load8_noabort+0x20/0x30 [ 43.868128] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.868163] kasan_bitops_generic+0x110/0x1c8 [ 43.868193] kunit_try_run_case+0x170/0x3f0 [ 43.868223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.868256] kthread+0x328/0x630 [ 43.868289] ret_from_fork+0x10/0x20 [ 43.868322] [ 43.937392] Allocated by task 306: [ 43.940778] kasan_save_stack+0x3c/0x68 [ 43.944597] kasan_save_track+0x20/0x40 [ 43.948417] kasan_save_alloc_info+0x40/0x58 [ 43.952670] __kasan_kmalloc+0xd4/0xd8 [ 43.956403] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.960917] kasan_bitops_generic+0xa0/0x1c8 [ 43.965170] kunit_try_run_case+0x170/0x3f0 [ 43.969336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.974805] kthread+0x328/0x630 [ 43.978017] ret_from_fork+0x10/0x20 [ 43.981576] [ 43.983051] The buggy address belongs to the object at ffff000800e200a0 [ 43.983051] which belongs to the cache kmalloc-16 of size 16 [ 43.995380] The buggy address is located 8 bytes inside of [ 43.995380] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 44.007617] [ 44.009093] The buggy address belongs to the physical page: [ 44.014651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 44.022635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.029144] page_type: f5(slab) [ 44.032278] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.040002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.047721] page dumped because: kasan: bad access detected [ 44.053276] [ 44.054752] Memory state around the buggy address: [ 44.059530] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.066735] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.073939] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.081140] ^ [ 44.085658] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.092863] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.100064] ================================================================== [ 42.512257] ================================================================== [ 42.519363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.527518] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.534896] [ 42.536380] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.536430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.536447] Hardware name: WinLink E850-96 board (DT) [ 42.536467] Call trace: [ 42.536482] show_stack+0x20/0x38 (C) [ 42.536518] dump_stack_lvl+0x8c/0xd0 [ 42.536549] print_report+0x118/0x608 [ 42.536580] kasan_report+0xdc/0x128 [ 42.536610] kasan_check_range+0x100/0x1a8 [ 42.536644] __kasan_check_write+0x20/0x30 [ 42.536678] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.536711] kasan_bitops_generic+0x110/0x1c8 [ 42.536742] kunit_try_run_case+0x170/0x3f0 [ 42.536775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.536809] kthread+0x328/0x630 [ 42.536844] ret_from_fork+0x10/0x20 [ 42.536876] [ 42.609287] Allocated by task 306: [ 42.612675] kasan_save_stack+0x3c/0x68 [ 42.616492] kasan_save_track+0x20/0x40 [ 42.620312] kasan_save_alloc_info+0x40/0x58 [ 42.624565] __kasan_kmalloc+0xd4/0xd8 [ 42.628298] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.632811] kasan_bitops_generic+0xa0/0x1c8 [ 42.637065] kunit_try_run_case+0x170/0x3f0 [ 42.641232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.646700] kthread+0x328/0x630 [ 42.649912] ret_from_fork+0x10/0x20 [ 42.653471] [ 42.654948] The buggy address belongs to the object at ffff000800e200a0 [ 42.654948] which belongs to the cache kmalloc-16 of size 16 [ 42.667276] The buggy address is located 8 bytes inside of [ 42.667276] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.679512] [ 42.680988] The buggy address belongs to the physical page: [ 42.686546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.694531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.701041] page_type: f5(slab) [ 42.704176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.711897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.719617] page dumped because: kasan: bad access detected [ 42.725171] [ 42.726646] Memory state around the buggy address: [ 42.731428] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.738630] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.745834] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.753035] ^ [ 42.757553] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.764758] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.771960] ================================================================== [ 42.248710] ================================================================== [ 42.255823] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.263980] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.271272] [ 42.272754] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.272803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.272822] Hardware name: WinLink E850-96 board (DT) [ 42.272839] Call trace: [ 42.272853] show_stack+0x20/0x38 (C) [ 42.272884] dump_stack_lvl+0x8c/0xd0 [ 42.272914] print_report+0x118/0x608 [ 42.272946] kasan_report+0xdc/0x128 [ 42.272978] __asan_report_load8_noabort+0x20/0x30 [ 42.273016] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.273049] kasan_bitops_generic+0x110/0x1c8 [ 42.273080] kunit_try_run_case+0x170/0x3f0 [ 42.273110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.273144] kthread+0x328/0x630 [ 42.273176] ret_from_fork+0x10/0x20 [ 42.273205] [ 42.342277] Allocated by task 306: [ 42.345665] kasan_save_stack+0x3c/0x68 [ 42.349483] kasan_save_track+0x20/0x40 [ 42.353302] kasan_save_alloc_info+0x40/0x58 [ 42.357555] __kasan_kmalloc+0xd4/0xd8 [ 42.361288] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.365801] kasan_bitops_generic+0xa0/0x1c8 [ 42.370055] kunit_try_run_case+0x170/0x3f0 [ 42.374222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.379690] kthread+0x328/0x630 [ 42.382902] ret_from_fork+0x10/0x20 [ 42.386461] [ 42.387937] The buggy address belongs to the object at ffff000800e200a0 [ 42.387937] which belongs to the cache kmalloc-16 of size 16 [ 42.400265] The buggy address is located 8 bytes inside of [ 42.400265] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.412502] [ 42.413978] The buggy address belongs to the physical page: [ 42.419537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.427521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.434031] page_type: f5(slab) [ 42.437163] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.444887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.452607] page dumped because: kasan: bad access detected [ 42.458161] [ 42.459637] Memory state around the buggy address: [ 42.464418] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.471620] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.478824] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.486025] ^ [ 42.490543] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.497748] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.504949] ================================================================== [ 42.779268] ================================================================== [ 42.786373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.794528] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 42.801906] [ 42.803389] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 42.803440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.803456] Hardware name: WinLink E850-96 board (DT) [ 42.803477] Call trace: [ 42.803492] show_stack+0x20/0x38 (C) [ 42.803525] dump_stack_lvl+0x8c/0xd0 [ 42.803559] print_report+0x118/0x608 [ 42.803589] kasan_report+0xdc/0x128 [ 42.803618] kasan_check_range+0x100/0x1a8 [ 42.803651] __kasan_check_write+0x20/0x30 [ 42.803684] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.803718] kasan_bitops_generic+0x110/0x1c8 [ 42.803748] kunit_try_run_case+0x170/0x3f0 [ 42.803780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.803815] kthread+0x328/0x630 [ 42.803845] ret_from_fork+0x10/0x20 [ 42.803876] [ 42.876298] Allocated by task 306: [ 42.879685] kasan_save_stack+0x3c/0x68 [ 42.883502] kasan_save_track+0x20/0x40 [ 42.887321] kasan_save_alloc_info+0x40/0x58 [ 42.891575] __kasan_kmalloc+0xd4/0xd8 [ 42.895307] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.899821] kasan_bitops_generic+0xa0/0x1c8 [ 42.904075] kunit_try_run_case+0x170/0x3f0 [ 42.908241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.913710] kthread+0x328/0x630 [ 42.916922] ret_from_fork+0x10/0x20 [ 42.920480] [ 42.921958] The buggy address belongs to the object at ffff000800e200a0 [ 42.921958] which belongs to the cache kmalloc-16 of size 16 [ 42.934286] The buggy address is located 8 bytes inside of [ 42.934286] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 42.946522] [ 42.947998] The buggy address belongs to the physical page: [ 42.953557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 42.961539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.968051] page_type: f5(slab) [ 42.971184] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.978907] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.986626] page dumped because: kasan: bad access detected [ 42.992181] [ 42.993657] Memory state around the buggy address: [ 42.998436] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.005639] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.012844] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.020045] ^ [ 43.024563] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.031768] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.038969] ================================================================== [ 43.576898] ================================================================== [ 43.583927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.592085] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.599464] [ 43.600945] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.600997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.601012] Hardware name: WinLink E850-96 board (DT) [ 43.601031] Call trace: [ 43.601044] show_stack+0x20/0x38 (C) [ 43.601074] dump_stack_lvl+0x8c/0xd0 [ 43.601107] print_report+0x118/0x608 [ 43.601138] kasan_report+0xdc/0x128 [ 43.601170] kasan_check_range+0x100/0x1a8 [ 43.601204] __kasan_check_write+0x20/0x30 [ 43.601239] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.601273] kasan_bitops_generic+0x110/0x1c8 [ 43.601302] kunit_try_run_case+0x170/0x3f0 [ 43.601330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.601365] kthread+0x328/0x630 [ 43.601396] ret_from_fork+0x10/0x20 [ 43.601427] [ 43.673854] Allocated by task 306: [ 43.677242] kasan_save_stack+0x3c/0x68 [ 43.681060] kasan_save_track+0x20/0x40 [ 43.684879] kasan_save_alloc_info+0x40/0x58 [ 43.689132] __kasan_kmalloc+0xd4/0xd8 [ 43.692865] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.697379] kasan_bitops_generic+0xa0/0x1c8 [ 43.701632] kunit_try_run_case+0x170/0x3f0 [ 43.705799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.711267] kthread+0x328/0x630 [ 43.714479] ret_from_fork+0x10/0x20 [ 43.718038] [ 43.719515] The buggy address belongs to the object at ffff000800e200a0 [ 43.719515] which belongs to the cache kmalloc-16 of size 16 [ 43.731842] The buggy address is located 8 bytes inside of [ 43.731842] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 43.744080] [ 43.745555] The buggy address belongs to the physical page: [ 43.751114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 43.759097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.765608] page_type: f5(slab) [ 43.768740] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.776464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.784183] page dumped because: kasan: bad access detected [ 43.789739] [ 43.791214] Memory state around the buggy address: [ 43.795994] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.803197] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.810402] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.817603] ^ [ 43.822120] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.829325] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.836526] ================================================================== [ 43.309874] ================================================================== [ 43.316918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.325076] Write of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 43.332454] [ 43.333935] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 43.333985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.334002] Hardware name: WinLink E850-96 board (DT) [ 43.334017] Call trace: [ 43.334031] show_stack+0x20/0x38 (C) [ 43.334063] dump_stack_lvl+0x8c/0xd0 [ 43.334092] print_report+0x118/0x608 [ 43.334123] kasan_report+0xdc/0x128 [ 43.334151] kasan_check_range+0x100/0x1a8 [ 43.334185] __kasan_check_write+0x20/0x30 [ 43.334220] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.334252] kasan_bitops_generic+0x110/0x1c8 [ 43.334283] kunit_try_run_case+0x170/0x3f0 [ 43.334311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.334346] kthread+0x328/0x630 [ 43.334379] ret_from_fork+0x10/0x20 [ 43.334409] [ 43.406845] Allocated by task 306: [ 43.410232] kasan_save_stack+0x3c/0x68 [ 43.414050] kasan_save_track+0x20/0x40 [ 43.417869] kasan_save_alloc_info+0x40/0x58 [ 43.422122] __kasan_kmalloc+0xd4/0xd8 [ 43.425855] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.430369] kasan_bitops_generic+0xa0/0x1c8 [ 43.434622] kunit_try_run_case+0x170/0x3f0 [ 43.438789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.444258] kthread+0x328/0x630 [ 43.447469] ret_from_fork+0x10/0x20 [ 43.451028] [ 43.452504] The buggy address belongs to the object at ffff000800e200a0 [ 43.452504] which belongs to the cache kmalloc-16 of size 16 [ 43.464830] The buggy address is located 8 bytes inside of [ 43.464830] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 43.477070] [ 43.478545] The buggy address belongs to the physical page: [ 43.484103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 43.492087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.498598] page_type: f5(slab) [ 43.501730] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.509454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.517173] page dumped because: kasan: bad access detected [ 43.522728] [ 43.524204] Memory state around the buggy address: [ 43.528982] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.536187] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.543392] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.550593] ^ [ 43.555110] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.562315] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.569516] ================================================================== [ 41.718171] ================================================================== [ 41.725277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.733432] Read of size 8 at addr ffff000800e200a8 by task kunit_try_catch/306 [ 41.740724] [ 41.742211] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 41.742264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.742280] Hardware name: WinLink E850-96 board (DT) [ 41.742300] Call trace: [ 41.742316] show_stack+0x20/0x38 (C) [ 41.742348] dump_stack_lvl+0x8c/0xd0 [ 41.742380] print_report+0x118/0x608 [ 41.742414] kasan_report+0xdc/0x128 [ 41.742445] __asan_report_load8_noabort+0x20/0x30 [ 41.742483] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.742516] kasan_bitops_generic+0x110/0x1c8 [ 41.742548] kunit_try_run_case+0x170/0x3f0 [ 41.742580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.742613] kthread+0x328/0x630 [ 41.742644] ret_from_fork+0x10/0x20 [ 41.742677] [ 41.811730] Allocated by task 306: [ 41.815117] kasan_save_stack+0x3c/0x68 [ 41.818935] kasan_save_track+0x20/0x40 [ 41.822754] kasan_save_alloc_info+0x40/0x58 [ 41.827008] __kasan_kmalloc+0xd4/0xd8 [ 41.830740] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.835254] kasan_bitops_generic+0xa0/0x1c8 [ 41.839507] kunit_try_run_case+0x170/0x3f0 [ 41.843674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.849143] kthread+0x328/0x630 [ 41.852354] ret_from_fork+0x10/0x20 [ 41.855914] [ 41.857391] The buggy address belongs to the object at ffff000800e200a0 [ 41.857391] which belongs to the cache kmalloc-16 of size 16 [ 41.869718] The buggy address is located 8 bytes inside of [ 41.869718] allocated 9-byte region [ffff000800e200a0, ffff000800e200a9) [ 41.881955] [ 41.883431] The buggy address belongs to the physical page: [ 41.888989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 41.896973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.903483] page_type: f5(slab) [ 41.906615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.914339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.922058] page dumped because: kasan: bad access detected [ 41.927613] [ 41.929089] Memory state around the buggy address: [ 41.933869] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.941072] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.948277] >ffff000800e20080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.955478] ^ [ 41.959995] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.967200] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.974402] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
[ 41.147017] ================================================================== [ 41.154102] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 41.160091] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304 [ 41.167382] [ 41.168865] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 41.168914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.168930] Hardware name: WinLink E850-96 board (DT) [ 41.168951] Call trace: [ 41.168961] show_stack+0x20/0x38 (C) [ 41.168996] dump_stack_lvl+0x8c/0xd0 [ 41.169029] print_report+0x118/0x608 [ 41.169064] kasan_report+0xdc/0x128 [ 41.169096] __asan_report_load1_noabort+0x20/0x30 [ 41.169131] strnlen+0x80/0x88 [ 41.169161] kasan_strings+0x478/0xb00 [ 41.169189] kunit_try_run_case+0x170/0x3f0 [ 41.169221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.169258] kthread+0x328/0x630 [ 41.169295] ret_from_fork+0x10/0x20 [ 41.169328] [ 41.235523] Allocated by task 304: [ 41.238909] kasan_save_stack+0x3c/0x68 [ 41.242728] kasan_save_track+0x20/0x40 [ 41.246548] kasan_save_alloc_info+0x40/0x58 [ 41.250801] __kasan_kmalloc+0xd4/0xd8 [ 41.254534] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.259047] kasan_strings+0xc8/0xb00 [ 41.262693] kunit_try_run_case+0x170/0x3f0 [ 41.266860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.272328] kthread+0x328/0x630 [ 41.275540] ret_from_fork+0x10/0x20 [ 41.279099] [ 41.280574] Freed by task 304: [ 41.283614] kasan_save_stack+0x3c/0x68 [ 41.287433] kasan_save_track+0x20/0x40 [ 41.291253] kasan_save_free_info+0x4c/0x78 [ 41.295418] __kasan_slab_free+0x6c/0x98 [ 41.299325] kfree+0x214/0x3c8 [ 41.302362] kasan_strings+0x24c/0xb00 [ 41.306095] kunit_try_run_case+0x170/0x3f0 [ 41.310262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.315730] kthread+0x328/0x630 [ 41.318942] ret_from_fork+0x10/0x20 [ 41.322501] [ 41.323977] The buggy address belongs to the object at ffff0008065c9300 [ 41.323977] which belongs to the cache kmalloc-32 of size 32 [ 41.336305] The buggy address is located 16 bytes inside of [ 41.336305] freed 32-byte region [ffff0008065c9300, ffff0008065c9320) [ 41.348369] [ 41.349845] The buggy address belongs to the physical page: [ 41.355403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9 [ 41.363387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.369898] page_type: f5(slab) [ 41.373031] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.380754] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.388474] page dumped because: kasan: bad access detected [ 41.394028] [ 41.395503] Memory state around the buggy address: [ 41.400283] ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.407486] ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 41.414691] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.421892] ^ [ 41.425628] ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.432833] ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.440034] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
[ 40.846946] ================================================================== [ 40.853935] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 40.859835] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304 [ 40.867126] [ 40.868611] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 40.868666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.868684] Hardware name: WinLink E850-96 board (DT) [ 40.868707] Call trace: [ 40.868722] show_stack+0x20/0x38 (C) [ 40.868759] dump_stack_lvl+0x8c/0xd0 [ 40.868792] print_report+0x118/0x608 [ 40.868825] kasan_report+0xdc/0x128 [ 40.868856] __asan_report_load1_noabort+0x20/0x30 [ 40.868894] strlen+0xa8/0xb0 [ 40.868928] kasan_strings+0x418/0xb00 [ 40.868957] kunit_try_run_case+0x170/0x3f0 [ 40.868988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.869026] kthread+0x328/0x630 [ 40.869061] ret_from_fork+0x10/0x20 [ 40.869095] [ 40.935180] Allocated by task 304: [ 40.938568] kasan_save_stack+0x3c/0x68 [ 40.942386] kasan_save_track+0x20/0x40 [ 40.946205] kasan_save_alloc_info+0x40/0x58 [ 40.950458] __kasan_kmalloc+0xd4/0xd8 [ 40.954191] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.958704] kasan_strings+0xc8/0xb00 [ 40.962350] kunit_try_run_case+0x170/0x3f0 [ 40.966517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.971986] kthread+0x328/0x630 [ 40.975197] ret_from_fork+0x10/0x20 [ 40.978757] [ 40.980234] Freed by task 304: [ 40.983273] kasan_save_stack+0x3c/0x68 [ 40.987090] kasan_save_track+0x20/0x40 [ 40.990911] kasan_save_free_info+0x4c/0x78 [ 40.995076] __kasan_slab_free+0x6c/0x98 [ 40.998982] kfree+0x214/0x3c8 [ 41.002020] kasan_strings+0x24c/0xb00 [ 41.005753] kunit_try_run_case+0x170/0x3f0 [ 41.009919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.015388] kthread+0x328/0x630 [ 41.018599] ret_from_fork+0x10/0x20 [ 41.022159] [ 41.023636] The buggy address belongs to the object at ffff0008065c9300 [ 41.023636] which belongs to the cache kmalloc-32 of size 32 [ 41.035963] The buggy address is located 16 bytes inside of [ 41.035963] freed 32-byte region [ffff0008065c9300, ffff0008065c9320) [ 41.048026] [ 41.049504] The buggy address belongs to the physical page: [ 41.055061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9 [ 41.063045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.069555] page_type: f5(slab) [ 41.072691] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.080411] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.088130] page dumped because: kasan: bad access detected [ 41.093685] [ 41.095160] Memory state around the buggy address: [ 41.099944] ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.107144] ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 41.114348] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.121549] ^ [ 41.125285] ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.132491] ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.139692] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
[ 40.548846] ================================================================== [ 40.555938] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 40.562617] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304 [ 40.569909] [ 40.571393] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 40.571449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.571469] Hardware name: WinLink E850-96 board (DT) [ 40.571490] Call trace: [ 40.571504] show_stack+0x20/0x38 (C) [ 40.571542] dump_stack_lvl+0x8c/0xd0 [ 40.571573] print_report+0x118/0x608 [ 40.571605] kasan_report+0xdc/0x128 [ 40.571635] __asan_report_load1_noabort+0x20/0x30 [ 40.571672] kasan_strings+0x95c/0xb00 [ 40.571700] kunit_try_run_case+0x170/0x3f0 [ 40.571732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.571768] kthread+0x328/0x630 [ 40.571803] ret_from_fork+0x10/0x20 [ 40.571838] [ 40.635011] Allocated by task 304: [ 40.638399] kasan_save_stack+0x3c/0x68 [ 40.642217] kasan_save_track+0x20/0x40 [ 40.646036] kasan_save_alloc_info+0x40/0x58 [ 40.650289] __kasan_kmalloc+0xd4/0xd8 [ 40.654022] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.658536] kasan_strings+0xc8/0xb00 [ 40.662181] kunit_try_run_case+0x170/0x3f0 [ 40.666348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.671817] kthread+0x328/0x630 [ 40.675028] ret_from_fork+0x10/0x20 [ 40.678587] [ 40.680063] Freed by task 304: [ 40.683103] kasan_save_stack+0x3c/0x68 [ 40.686920] kasan_save_track+0x20/0x40 [ 40.690740] kasan_save_free_info+0x4c/0x78 [ 40.694907] __kasan_slab_free+0x6c/0x98 [ 40.698813] kfree+0x214/0x3c8 [ 40.701851] kasan_strings+0x24c/0xb00 [ 40.705583] kunit_try_run_case+0x170/0x3f0 [ 40.709750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.715219] kthread+0x328/0x630 [ 40.718431] ret_from_fork+0x10/0x20 [ 40.721990] [ 40.723465] The buggy address belongs to the object at ffff0008065c9300 [ 40.723465] which belongs to the cache kmalloc-32 of size 32 [ 40.735793] The buggy address is located 16 bytes inside of [ 40.735793] freed 32-byte region [ffff0008065c9300, ffff0008065c9320) [ 40.747857] [ 40.749336] The buggy address belongs to the physical page: [ 40.754892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9 [ 40.762874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.769385] page_type: f5(slab) [ 40.772521] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.780242] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.787962] page dumped because: kasan: bad access detected [ 40.793516] [ 40.794992] Memory state around the buggy address: [ 40.799772] ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.806975] ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 40.814181] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.821380] ^ [ 40.825117] ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.832321] ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.839525] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
[ 40.232043] ================================================================== [ 40.255770] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 40.261668] Read of size 1 at addr ffff0008065c9310 by task kunit_try_catch/304 [ 40.268959] [ 40.270446] CPU: 6 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 40.270504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.270521] Hardware name: WinLink E850-96 board (DT) [ 40.270545] Call trace: [ 40.270559] show_stack+0x20/0x38 (C) [ 40.270598] dump_stack_lvl+0x8c/0xd0 [ 40.270631] print_report+0x118/0x608 [ 40.270667] kasan_report+0xdc/0x128 [ 40.270698] __asan_report_load1_noabort+0x20/0x30 [ 40.270739] strcmp+0xc0/0xc8 [ 40.270776] kasan_strings+0x340/0xb00 [ 40.270807] kunit_try_run_case+0x170/0x3f0 [ 40.270841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.270877] kthread+0x328/0x630 [ 40.270916] ret_from_fork+0x10/0x20 [ 40.270953] [ 40.337014] Allocated by task 304: [ 40.340402] kasan_save_stack+0x3c/0x68 [ 40.344218] kasan_save_track+0x20/0x40 [ 40.348037] kasan_save_alloc_info+0x40/0x58 [ 40.352290] __kasan_kmalloc+0xd4/0xd8 [ 40.356024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.360537] kasan_strings+0xc8/0xb00 [ 40.364182] kunit_try_run_case+0x170/0x3f0 [ 40.368349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.373817] kthread+0x328/0x630 [ 40.377030] ret_from_fork+0x10/0x20 [ 40.380588] [ 40.382065] Freed by task 304: [ 40.385105] kasan_save_stack+0x3c/0x68 [ 40.388921] kasan_save_track+0x20/0x40 [ 40.392742] kasan_save_free_info+0x4c/0x78 [ 40.396907] __kasan_slab_free+0x6c/0x98 [ 40.400814] kfree+0x214/0x3c8 [ 40.403852] kasan_strings+0x24c/0xb00 [ 40.407585] kunit_try_run_case+0x170/0x3f0 [ 40.411751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.417220] kthread+0x328/0x630 [ 40.420432] ret_from_fork+0x10/0x20 [ 40.423990] [ 40.425468] The buggy address belongs to the object at ffff0008065c9300 [ 40.425468] which belongs to the cache kmalloc-32 of size 32 [ 40.437794] The buggy address is located 16 bytes inside of [ 40.437794] freed 32-byte region [ffff0008065c9300, ffff0008065c9320) [ 40.449858] [ 40.451337] The buggy address belongs to the physical page: [ 40.456893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865c9 [ 40.464879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.471387] page_type: f5(slab) [ 40.474525] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.482243] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.489961] page dumped because: kasan: bad access detected [ 40.495517] [ 40.496993] Memory state around the buggy address: [ 40.501776] ffff0008065c9200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.508976] ffff0008065c9280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 40.516180] >ffff0008065c9300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.523381] ^ [ 40.527118] ffff0008065c9380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.534323] ffff0008065c9400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.541525] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
[ 39.932496] ================================================================== [ 39.942666] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 39.948652] Read of size 1 at addr ffff00080691e118 by task kunit_try_catch/302 [ 39.955944] [ 39.957430] CPU: 5 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 39.957492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.957511] Hardware name: WinLink E850-96 board (DT) [ 39.957535] Call trace: [ 39.957553] show_stack+0x20/0x38 (C) [ 39.957590] dump_stack_lvl+0x8c/0xd0 [ 39.957627] print_report+0x118/0x608 [ 39.957666] kasan_report+0xdc/0x128 [ 39.957699] __asan_report_load1_noabort+0x20/0x30 [ 39.957739] memcmp+0x198/0x1d8 [ 39.957774] kasan_memcmp+0x16c/0x300 [ 39.957804] kunit_try_run_case+0x170/0x3f0 [ 39.957837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.957875] kthread+0x328/0x630 [ 39.957913] ret_from_fork+0x10/0x20 [ 39.957949] [ 40.024084] Allocated by task 302: [ 40.027472] kasan_save_stack+0x3c/0x68 [ 40.031288] kasan_save_track+0x20/0x40 [ 40.035108] kasan_save_alloc_info+0x40/0x58 [ 40.039361] __kasan_kmalloc+0xd4/0xd8 [ 40.043094] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.047607] kasan_memcmp+0xbc/0x300 [ 40.051166] kunit_try_run_case+0x170/0x3f0 [ 40.055333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.060801] kthread+0x328/0x630 [ 40.064013] ret_from_fork+0x10/0x20 [ 40.067572] [ 40.069049] The buggy address belongs to the object at ffff00080691e100 [ 40.069049] which belongs to the cache kmalloc-32 of size 32 [ 40.081377] The buggy address is located 0 bytes to the right of [ 40.081377] allocated 24-byte region [ffff00080691e100, ffff00080691e118) [ 40.094221] [ 40.095700] The buggy address belongs to the physical page: [ 40.101256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88691e [ 40.109240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.115750] page_type: f5(slab) [ 40.118888] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.126606] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.134326] page dumped because: kasan: bad access detected [ 40.139880] [ 40.141356] Memory state around the buggy address: [ 40.146140] ffff00080691e000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.153339] ffff00080691e080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.160545] >ffff00080691e100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.167744] ^ [ 40.171741] ffff00080691e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.178947] ffff00080691e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.186148] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
[ 39.698461] ================================================================== [ 39.708207] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 39.715757] Read of size 1 at addr ffff800089497b4a by task kunit_try_catch/298 [ 39.723046] [ 39.724532] CPU: 7 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 39.724591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.724609] Hardware name: WinLink E850-96 board (DT) [ 39.724630] Call trace: [ 39.724645] show_stack+0x20/0x38 (C) [ 39.724684] dump_stack_lvl+0x8c/0xd0 [ 39.724718] print_report+0x310/0x608 [ 39.724754] kasan_report+0xdc/0x128 [ 39.724786] __asan_report_load1_noabort+0x20/0x30 [ 39.724824] kasan_alloca_oob_right+0x2dc/0x340 [ 39.724854] kunit_try_run_case+0x170/0x3f0 [ 39.724888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.724931] kthread+0x328/0x630 [ 39.724967] ret_from_fork+0x10/0x20 [ 39.725001] [ 39.788935] The buggy address belongs to stack of task kunit_try_catch/298 [ 39.795812] [ 39.797268] The buggy address belongs to the virtual mapping at [ 39.797268] [ffff800089490000, ffff800089499000) created by: [ 39.797268] kernel_clone+0x150/0x7a8 [ 39.812542] [ 39.814022] The buggy address belongs to the physical page: [ 39.819577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8869a2 [ 39.827562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.834084] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.841801] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.849520] page dumped because: kasan: bad access detected [ 39.855075] [ 39.856551] Memory state around the buggy address: [ 39.861332] ffff800089497a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.868534] ffff800089497a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.875741] >ffff800089497b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 39.882939] ^ [ 39.888499] ffff800089497b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.895704] ffff800089497c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.902907] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
[ 39.485499] ================================================================== [ 39.494580] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 39.502045] Read of size 1 at addr ffff800089477b5f by task kunit_try_catch/296 [ 39.509335] [ 39.510820] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 39.510880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.510898] Hardware name: WinLink E850-96 board (DT) [ 39.510923] Call trace: [ 39.510938] show_stack+0x20/0x38 (C) [ 39.510976] dump_stack_lvl+0x8c/0xd0 [ 39.511011] print_report+0x310/0x608 [ 39.511048] kasan_report+0xdc/0x128 [ 39.511080] __asan_report_load1_noabort+0x20/0x30 [ 39.511120] kasan_alloca_oob_left+0x2b8/0x310 [ 39.511153] kunit_try_run_case+0x170/0x3f0 [ 39.511188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.511227] kthread+0x328/0x630 [ 39.511264] ret_from_fork+0x10/0x20 [ 39.511300] [ 39.575136] The buggy address belongs to stack of task kunit_try_catch/296 [ 39.582013] [ 39.583470] The buggy address belongs to the virtual mapping at [ 39.583470] [ffff800089470000, ffff800089479000) created by: [ 39.583470] kernel_clone+0x150/0x7a8 [ 39.598742] [ 39.600221] The buggy address belongs to the physical page: [ 39.605777] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88698d [ 39.613762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.620283] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.628002] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.635721] page dumped because: kasan: bad access detected [ 39.641276] [ 39.642752] Memory state around the buggy address: [ 39.647535] ffff800089477a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.654735] ffff800089477a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.661939] >ffff800089477b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.669141] ^ [ 39.675221] ffff800089477b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.682425] ffff800089477c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.689629] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
[ 39.242398] ================================================================== [ 39.256824] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 39.263679] Read of size 1 at addr ffff800089457c2a by task kunit_try_catch/294 [ 39.270969] [ 39.272457] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 39.272522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.272541] Hardware name: WinLink E850-96 board (DT) [ 39.272565] Call trace: [ 39.272580] show_stack+0x20/0x38 (C) [ 39.272620] dump_stack_lvl+0x8c/0xd0 [ 39.272657] print_report+0x310/0x608 [ 39.272691] kasan_report+0xdc/0x128 [ 39.272723] __asan_report_load1_noabort+0x20/0x30 [ 39.272762] kasan_stack_oob+0x238/0x270 [ 39.272799] kunit_try_run_case+0x170/0x3f0 [ 39.272831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.272868] kthread+0x328/0x630 [ 39.272903] ret_from_fork+0x10/0x20 [ 39.272939] [ 39.336252] The buggy address belongs to stack of task kunit_try_catch/294 [ 39.343105] and is located at offset 138 in frame: [ 39.347965] kasan_stack_oob+0x0/0x270 [ 39.351703] [ 39.353173] This frame has 4 objects: [ 39.356823] [48, 49) '__assertion' [ 39.356846] [64, 72) 'array' [ 39.360293] [96, 112) '__assertion' [ 39.363246] [128, 138) 'stack_array' [ 39.366801] [ 39.371928] The buggy address belongs to the virtual mapping at [ 39.371928] [ffff800089450000, ffff800089459000) created by: [ 39.371928] kernel_clone+0x150/0x7a8 [ 39.387200] [ 39.388681] The buggy address belongs to the physical page: [ 39.394235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886979 [ 39.402221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.408743] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.416460] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.424179] page dumped because: kasan: bad access detected [ 39.429734] [ 39.431210] Memory state around the buggy address: [ 39.435992] ffff800089457b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.443193] ffff800089457b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 39.450399] >ffff800089457c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 39.457599] ^ [ 39.462116] ffff800089457c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 39.469321] ffff800089457d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.476524] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
[ 39.022769] ================================================================== [ 39.033391] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 39.040941] Read of size 1 at addr ffff800087b405cd by task kunit_try_catch/290 [ 39.048232] [ 39.049717] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 39.049779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.049799] Hardware name: WinLink E850-96 board (DT) [ 39.049824] Call trace: [ 39.049840] show_stack+0x20/0x38 (C) [ 39.049879] dump_stack_lvl+0x8c/0xd0 [ 39.049913] print_report+0x310/0x608 [ 39.049946] kasan_report+0xdc/0x128 [ 39.049978] __asan_report_load1_noabort+0x20/0x30 [ 39.050016] kasan_global_oob_right+0x230/0x270 [ 39.050052] kunit_try_run_case+0x170/0x3f0 [ 39.050086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.050124] kthread+0x328/0x630 [ 39.050160] ret_from_fork+0x10/0x20 [ 39.050194] [ 39.114116] The buggy address belongs to the variable: [ 39.119235] global_array+0xd/0x40 [ 39.122621] [ 39.124111] The buggy address belongs to the virtual mapping at [ 39.124111] [ffff800085cf0000, ffff800087c01000) created by: [ 39.124111] paging_init+0x66c/0x7d0 [ 39.139287] [ 39.140767] The buggy address belongs to the physical page: [ 39.146323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b40 [ 39.154220] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.161524] raw: 03fffe0000002000 fffffdffc01ed008 fffffdffc01ed008 0000000000000000 [ 39.169242] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.176960] page dumped because: kasan: bad access detected [ 39.182516] [ 39.183991] Memory state around the buggy address: [ 39.188775] ffff800087b40480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.195974] ffff800087b40500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.203181] >ffff800087b40580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 39.210380] ^ [ 39.215941] ffff800087b40600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 39.223144] ffff800087b40680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 39.230347] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
[ 38.782600] ================================================================== [ 38.792597] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.800579] Free of addr ffff0008034a0001 by task kunit_try_catch/288 [ 38.807002] [ 38.808490] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 38.808551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.808569] Hardware name: WinLink E850-96 board (DT) [ 38.808591] Call trace: [ 38.808608] show_stack+0x20/0x38 (C) [ 38.808645] dump_stack_lvl+0x8c/0xd0 [ 38.808678] print_report+0x118/0x608 [ 38.808711] kasan_report_invalid_free+0xc0/0xe8 [ 38.808748] __kasan_mempool_poison_object+0xfc/0x150 [ 38.808787] mempool_free+0x28c/0x328 [ 38.808824] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.808860] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.808894] kunit_try_run_case+0x170/0x3f0 [ 38.808927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.808965] kthread+0x328/0x630 [ 38.809001] ret_from_fork+0x10/0x20 [ 38.809035] [ 38.884433] The buggy address belongs to the physical page: [ 38.889989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834a0 [ 38.897973] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.905612] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.912556] page_type: f8(unknown) [ 38.915954] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.923672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.931398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.939210] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.947023] head: 0bfffe0000000002 fffffdffe00d2801 00000000ffffffff 00000000ffffffff [ 38.954835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.962641] page dumped because: kasan: bad access detected [ 38.968196] [ 38.969672] Memory state around the buggy address: [ 38.974455] ffff00080349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.981654] ffff00080349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.988860] >ffff0008034a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.996060] ^ [ 38.999276] ffff0008034a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.006481] ffff0008034a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.013683] ================================================================== [ 38.455485] ================================================================== [ 38.465779] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.473759] Free of addr ffff000801f1cb01 by task kunit_try_catch/286 [ 38.480184] [ 38.481670] CPU: 7 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 38.481727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.481744] Hardware name: WinLink E850-96 board (DT) [ 38.481767] Call trace: [ 38.481780] show_stack+0x20/0x38 (C) [ 38.481820] dump_stack_lvl+0x8c/0xd0 [ 38.481855] print_report+0x118/0x608 [ 38.481888] kasan_report_invalid_free+0xc0/0xe8 [ 38.481922] check_slab_allocation+0xfc/0x108 [ 38.481953] __kasan_mempool_poison_object+0x78/0x150 [ 38.481989] mempool_free+0x28c/0x328 [ 38.482027] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.482060] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.482089] kunit_try_run_case+0x170/0x3f0 [ 38.482123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.482157] kthread+0x328/0x630 [ 38.482191] ret_from_fork+0x10/0x20 [ 38.482226] [ 38.561433] Allocated by task 286: [ 38.564821] kasan_save_stack+0x3c/0x68 [ 38.568636] kasan_save_track+0x20/0x40 [ 38.572455] kasan_save_alloc_info+0x40/0x58 [ 38.576709] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.582004] remove_element+0x130/0x1f8 [ 38.585824] mempool_alloc_preallocated+0x58/0xc0 [ 38.590511] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.596067] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.601014] kunit_try_run_case+0x170/0x3f0 [ 38.605181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.610649] kthread+0x328/0x630 [ 38.613861] ret_from_fork+0x10/0x20 [ 38.617420] [ 38.618897] The buggy address belongs to the object at ffff000801f1cb00 [ 38.618897] which belongs to the cache kmalloc-128 of size 128 [ 38.631398] The buggy address is located 1 bytes inside of [ 38.631398] 128-byte region [ffff000801f1cb00, ffff000801f1cb80) [ 38.642941] [ 38.644420] The buggy address belongs to the physical page: [ 38.649976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 38.657959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.665600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.672543] page_type: f5(slab) [ 38.675679] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.683398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.691124] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.698936] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.706749] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 38.714561] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.722367] page dumped because: kasan: bad access detected [ 38.727922] [ 38.729397] Memory state around the buggy address: [ 38.734179] ffff000801f1ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.741381] ffff000801f1ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.748587] >ffff000801f1cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.755786] ^ [ 38.759002] ffff000801f1cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.766208] ffff000801f1cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.773409] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
[ 34.050991] ================================================================== [ 34.051980] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 34.058923] Free of addr ffff00080241c001 by task kunit_try_catch/256 [ 34.065346] [ 34.066833] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 34.066893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.066911] Hardware name: WinLink E850-96 board (DT) [ 34.066934] Call trace: [ 34.066948] show_stack+0x20/0x38 (C) [ 34.066988] dump_stack_lvl+0x8c/0xd0 [ 34.067020] print_report+0x118/0x608 [ 34.067054] kasan_report_invalid_free+0xc0/0xe8 [ 34.067088] check_slab_allocation+0xfc/0x108 [ 34.067123] __kasan_slab_pre_free+0x2c/0x48 [ 34.067154] kmem_cache_free+0xf0/0x470 [ 34.067185] kmem_cache_invalid_free+0x184/0x3c8 [ 34.067215] kunit_try_run_case+0x170/0x3f0 [ 34.067249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.067284] kthread+0x328/0x630 [ 34.067320] ret_from_fork+0x10/0x20 [ 34.067354] [ 34.139999] Allocated by task 256: [ 34.143386] kasan_save_stack+0x3c/0x68 [ 34.147203] kasan_save_track+0x20/0x40 [ 34.151022] kasan_save_alloc_info+0x40/0x58 [ 34.155274] __kasan_slab_alloc+0xa8/0xb0 [ 34.159267] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.163868] kmem_cache_invalid_free+0x12c/0x3c8 [ 34.168468] kunit_try_run_case+0x170/0x3f0 [ 34.172635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.178104] kthread+0x328/0x630 [ 34.181315] ret_from_fork+0x10/0x20 [ 34.184874] [ 34.186353] The buggy address belongs to the object at ffff00080241c000 [ 34.186353] which belongs to the cache test_cache of size 200 [ 34.198765] The buggy address is located 1 bytes inside of [ 34.198765] 200-byte region [ffff00080241c000, ffff00080241c0c8) [ 34.210308] [ 34.211787] The buggy address belongs to the physical page: [ 34.217343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88241c [ 34.225327] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.232966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.239910] page_type: f5(slab) [ 34.243048] raw: 0bfffe0000000040 ffff000802403180 dead000000000122 0000000000000000 [ 34.250766] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.258492] head: 0bfffe0000000040 ffff000802403180 dead000000000122 0000000000000000 [ 34.266303] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.274116] head: 0bfffe0000000001 fffffdffe0090701 00000000ffffffff 00000000ffffffff [ 34.281928] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.289734] page dumped because: kasan: bad access detected [ 34.295289] [ 34.296765] Memory state around the buggy address: [ 34.301549] ffff00080241bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.308748] ffff00080241bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.315954] >ffff00080241c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.323154] ^ [ 34.326369] ffff00080241c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.333575] ffff00080241c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.340778] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
[ 33.375395] ================================================================== [ 33.384852] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 33.391533] Read of size 1 at addr ffff00080241a0c8 by task kunit_try_catch/252 [ 33.398826] [ 33.400311] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 33.400374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.400388] Hardware name: WinLink E850-96 board (DT) [ 33.400411] Call trace: [ 33.400426] show_stack+0x20/0x38 (C) [ 33.400460] dump_stack_lvl+0x8c/0xd0 [ 33.400494] print_report+0x118/0x608 [ 33.400528] kasan_report+0xdc/0x128 [ 33.400560] __asan_report_load1_noabort+0x20/0x30 [ 33.400597] kmem_cache_oob+0x344/0x430 [ 33.400624] kunit_try_run_case+0x170/0x3f0 [ 33.400657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.400692] kthread+0x328/0x630 [ 33.400726] ret_from_fork+0x10/0x20 [ 33.400761] [ 33.464016] Allocated by task 252: [ 33.467403] kasan_save_stack+0x3c/0x68 [ 33.471219] kasan_save_track+0x20/0x40 [ 33.475038] kasan_save_alloc_info+0x40/0x58 [ 33.479292] __kasan_slab_alloc+0xa8/0xb0 [ 33.483286] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 33.487885] kmem_cache_oob+0x12c/0x430 [ 33.491705] kunit_try_run_case+0x170/0x3f0 [ 33.495871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.501341] kthread+0x328/0x630 [ 33.504552] ret_from_fork+0x10/0x20 [ 33.508111] [ 33.509589] The buggy address belongs to the object at ffff00080241a000 [ 33.509589] which belongs to the cache test_cache of size 200 [ 33.522002] The buggy address is located 0 bytes to the right of [ 33.522002] allocated 200-byte region [ffff00080241a000, ffff00080241a0c8) [ 33.534934] [ 33.536413] The buggy address belongs to the physical page: [ 33.541969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88241a [ 33.549952] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.557593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.564536] page_type: f5(slab) [ 33.567673] raw: 0bfffe0000000040 ffff000802403040 dead000000000122 0000000000000000 [ 33.575391] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.583118] head: 0bfffe0000000040 ffff000802403040 dead000000000122 0000000000000000 [ 33.590929] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.598742] head: 0bfffe0000000001 fffffdffe0090681 00000000ffffffff 00000000ffffffff [ 33.606554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.614359] page dumped because: kasan: bad access detected [ 33.619915] [ 33.621390] Memory state around the buggy address: [ 33.626171] ffff000802419f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633373] ffff00080241a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.640580] >ffff00080241a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.647779] ^ [ 33.653338] ffff00080241a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.660543] ffff00080241a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.667746] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
[ 33.029418] ================================================================== [ 33.036595] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 33.043278] Read of size 8 at addr ffff000800e21a00 by task kunit_try_catch/245 [ 33.050567] [ 33.052053] CPU: 7 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 33.052113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.052127] Hardware name: WinLink E850-96 board (DT) [ 33.052144] Call trace: [ 33.052157] show_stack+0x20/0x38 (C) [ 33.052193] dump_stack_lvl+0x8c/0xd0 [ 33.052224] print_report+0x118/0x608 [ 33.052256] kasan_report+0xdc/0x128 [ 33.052286] __asan_report_load8_noabort+0x20/0x30 [ 33.052324] workqueue_uaf+0x480/0x4a8 [ 33.052352] kunit_try_run_case+0x170/0x3f0 [ 33.052386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.052421] kthread+0x328/0x630 [ 33.052455] ret_from_fork+0x10/0x20 [ 33.052490] [ 33.115669] Allocated by task 245: [ 33.119058] kasan_save_stack+0x3c/0x68 [ 33.122874] kasan_save_track+0x20/0x40 [ 33.126693] kasan_save_alloc_info+0x40/0x58 [ 33.130947] __kasan_kmalloc+0xd4/0xd8 [ 33.134679] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.139193] workqueue_uaf+0x13c/0x4a8 [ 33.142925] kunit_try_run_case+0x170/0x3f0 [ 33.147092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.152561] kthread+0x328/0x630 [ 33.155772] ret_from_fork+0x10/0x20 [ 33.159332] [ 33.160808] Freed by task 84: [ 33.163760] kasan_save_stack+0x3c/0x68 [ 33.167578] kasan_save_track+0x20/0x40 [ 33.171397] kasan_save_free_info+0x4c/0x78 [ 33.175564] __kasan_slab_free+0x6c/0x98 [ 33.179470] kfree+0x214/0x3c8 [ 33.182508] workqueue_uaf_work+0x18/0x30 [ 33.186501] process_one_work+0x530/0xf98 [ 33.190494] worker_thread+0x8ac/0xf28 [ 33.194227] kthread+0x328/0x630 [ 33.197439] ret_from_fork+0x10/0x20 [ 33.200998] [ 33.202475] Last potentially related work creation: [ 33.207336] kasan_save_stack+0x3c/0x68 [ 33.211154] kasan_record_aux_stack+0xb4/0xc8 [ 33.215494] __queue_work+0x65c/0x1010 [ 33.219226] queue_work_on+0xbc/0xf8 [ 33.222785] workqueue_uaf+0x210/0x4a8 [ 33.226518] kunit_try_run_case+0x170/0x3f0 [ 33.230684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.236153] kthread+0x328/0x630 [ 33.239365] ret_from_fork+0x10/0x20 [ 33.242924] [ 33.244401] The buggy address belongs to the object at ffff000800e21a00 [ 33.244401] which belongs to the cache kmalloc-32 of size 32 [ 33.256728] The buggy address is located 0 bytes inside of [ 33.256728] freed 32-byte region [ffff000800e21a00, ffff000800e21a20) [ 33.268705] [ 33.270184] The buggy address belongs to the physical page: [ 33.275740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e21 [ 33.283725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.290234] page_type: f5(slab) [ 33.293372] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 33.301091] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.308810] page dumped because: kasan: bad access detected [ 33.314364] [ 33.315839] Memory state around the buggy address: [ 33.320622] ffff000800e21900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.327822] ffff000800e21980: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc [ 33.335027] >ffff000800e21a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.342228] ^ [ 33.345444] ffff000800e21a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352649] ffff000800e21b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.359851] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
[ 32.660143] ================================================================== [ 32.660322] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.660441] Read of size 4 at addr ffff000803280c40 by task swapper/6/0 [ 32.661511] [ 32.662997] CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 32.663054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.663072] Hardware name: WinLink E850-96 board (DT) [ 32.663093] Call trace: [ 32.663105] show_stack+0x20/0x38 (C) [ 32.663142] dump_stack_lvl+0x8c/0xd0 [ 32.663174] print_report+0x118/0x608 [ 32.663210] kasan_report+0xdc/0x128 [ 32.663241] __asan_report_load4_noabort+0x20/0x30 [ 32.663279] rcu_uaf_reclaim+0x64/0x70 [ 32.663307] rcu_core+0x9f4/0x1e20 [ 32.663339] rcu_core_si+0x18/0x30 [ 32.663366] handle_softirqs+0x374/0xb28 [ 32.663396] __do_softirq+0x1c/0x28 [ 32.663426] ____do_softirq+0x18/0x30 [ 32.663457] call_on_irq_stack+0x24/0x30 [ 32.663489] do_softirq_own_stack+0x24/0x38 [ 32.663519] __irq_exit_rcu+0x1fc/0x318 [ 32.663547] irq_exit_rcu+0x1c/0x80 [ 32.663575] el1_interrupt+0x38/0x58 [ 32.663608] el1h_64_irq_handler+0x18/0x28 [ 32.663640] el1h_64_irq+0x6c/0x70 [ 32.663665] arch_local_irq_enable+0x4/0x8 (P) [ 32.663701] do_idle+0x384/0x4e8 [ 32.663732] cpu_startup_entry+0x64/0x80 [ 32.663764] secondary_start_kernel+0x288/0x340 [ 32.663795] __secondary_switched+0xc0/0xc8 [ 32.663836] [ 32.773921] Allocated by task 243: [ 32.777310] kasan_save_stack+0x3c/0x68 [ 32.781125] kasan_save_track+0x20/0x40 [ 32.784945] kasan_save_alloc_info+0x40/0x58 [ 32.789198] __kasan_kmalloc+0xd4/0xd8 [ 32.792932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.797445] rcu_uaf+0xb0/0x2d8 [ 32.800570] kunit_try_run_case+0x170/0x3f0 [ 32.804736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.810205] kthread+0x328/0x630 [ 32.813417] ret_from_fork+0x10/0x20 [ 32.816976] [ 32.818452] Freed by task 0: [ 32.821318] kasan_save_stack+0x3c/0x68 [ 32.825135] kasan_save_track+0x20/0x40 [ 32.828955] kasan_save_free_info+0x4c/0x78 [ 32.833121] __kasan_slab_free+0x6c/0x98 [ 32.837028] kfree+0x214/0x3c8 [ 32.840066] rcu_uaf_reclaim+0x28/0x70 [ 32.843798] rcu_core+0x9f4/0x1e20 [ 32.847183] rcu_core_si+0x18/0x30 [ 32.850570] handle_softirqs+0x374/0xb28 [ 32.854475] __do_softirq+0x1c/0x28 [ 32.857947] [ 32.859424] Last potentially related work creation: [ 32.864285] kasan_save_stack+0x3c/0x68 [ 32.868103] kasan_record_aux_stack+0xb4/0xc8 [ 32.872444] __call_rcu_common.constprop.0+0x70/0x8b0 [ 32.877478] call_rcu+0x18/0x30 [ 32.880603] rcu_uaf+0x14c/0x2d8 [ 32.883815] kunit_try_run_case+0x170/0x3f0 [ 32.887982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.893450] kthread+0x328/0x630 [ 32.896662] ret_from_fork+0x10/0x20 [ 32.900221] [ 32.901698] The buggy address belongs to the object at ffff000803280c40 [ 32.901698] which belongs to the cache kmalloc-32 of size 32 [ 32.914026] The buggy address is located 0 bytes inside of [ 32.914026] freed 32-byte region [ffff000803280c40, ffff000803280c60) [ 32.926002] [ 32.927481] The buggy address belongs to the physical page: [ 32.933037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883280 [ 32.941022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.947531] page_type: f5(slab) [ 32.950669] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 32.958386] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.966106] page dumped because: kasan: bad access detected [ 32.971661] [ 32.973136] Memory state around the buggy address: [ 32.977919] ffff000803280b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.985119] ffff000803280b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.992327] >ffff000803280c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.999525] ^ [ 33.004824] ffff000803280c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.012029] ffff000803280d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.019231] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
[ 32.277307] ================================================================== [ 32.284400] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.290731] Read of size 1 at addr ffff000801f1c478 by task kunit_try_catch/241 [ 32.298022] [ 32.299506] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 32.299560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.299575] Hardware name: WinLink E850-96 board (DT) [ 32.299593] Call trace: [ 32.299606] show_stack+0x20/0x38 (C) [ 32.299639] dump_stack_lvl+0x8c/0xd0 [ 32.299670] print_report+0x118/0x608 [ 32.299703] kasan_report+0xdc/0x128 [ 32.299731] __asan_report_load1_noabort+0x20/0x30 [ 32.299764] ksize_uaf+0x544/0x5f8 [ 32.299791] kunit_try_run_case+0x170/0x3f0 [ 32.299820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299857] kthread+0x328/0x630 [ 32.299888] ret_from_fork+0x10/0x20 [ 32.299919] [ 32.362778] Allocated by task 241: [ 32.366167] kasan_save_stack+0x3c/0x68 [ 32.369983] kasan_save_track+0x20/0x40 [ 32.373803] kasan_save_alloc_info+0x40/0x58 [ 32.378056] __kasan_kmalloc+0xd4/0xd8 [ 32.381788] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.386302] ksize_uaf+0xb8/0x5f8 [ 32.389601] kunit_try_run_case+0x170/0x3f0 [ 32.393767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.399237] kthread+0x328/0x630 [ 32.402449] ret_from_fork+0x10/0x20 [ 32.406007] [ 32.407482] Freed by task 241: [ 32.410521] kasan_save_stack+0x3c/0x68 [ 32.414340] kasan_save_track+0x20/0x40 [ 32.418159] kasan_save_free_info+0x4c/0x78 [ 32.422326] __kasan_slab_free+0x6c/0x98 [ 32.426232] kfree+0x214/0x3c8 [ 32.429270] ksize_uaf+0x11c/0x5f8 [ 32.432656] kunit_try_run_case+0x170/0x3f0 [ 32.436822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.442291] kthread+0x328/0x630 [ 32.445503] ret_from_fork+0x10/0x20 [ 32.449062] [ 32.450537] The buggy address belongs to the object at ffff000801f1c400 [ 32.450537] which belongs to the cache kmalloc-128 of size 128 [ 32.463039] The buggy address is located 120 bytes inside of [ 32.463039] freed 128-byte region [ffff000801f1c400, ffff000801f1c480) [ 32.475277] [ 32.476754] The buggy address belongs to the physical page: [ 32.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 32.490296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.497934] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.504878] page_type: f5(slab) [ 32.508011] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.515734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.523460] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.531272] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.539085] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 32.546897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.554704] page dumped because: kasan: bad access detected [ 32.560258] [ 32.561733] Memory state around the buggy address: [ 32.566512] ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.573716] ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580921] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.588122] ^ [ 32.595244] ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.602449] ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.609650] ================================================================== [ 31.941783] ================================================================== [ 31.948815] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.955146] Read of size 1 at addr ffff000801f1c400 by task kunit_try_catch/241 [ 31.962437] [ 31.963922] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 31.963975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.963989] Hardware name: WinLink E850-96 board (DT) [ 31.964012] Call trace: [ 31.964027] show_stack+0x20/0x38 (C) [ 31.964061] dump_stack_lvl+0x8c/0xd0 [ 31.964091] print_report+0x118/0x608 [ 31.964122] kasan_report+0xdc/0x128 [ 31.964151] __asan_report_load1_noabort+0x20/0x30 [ 31.964185] ksize_uaf+0x598/0x5f8 [ 31.964212] kunit_try_run_case+0x170/0x3f0 [ 31.964244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.964278] kthread+0x328/0x630 [ 31.964311] ret_from_fork+0x10/0x20 [ 31.964346] [ 32.027193] Allocated by task 241: [ 32.030581] kasan_save_stack+0x3c/0x68 [ 32.034398] kasan_save_track+0x20/0x40 [ 32.038217] kasan_save_alloc_info+0x40/0x58 [ 32.042471] __kasan_kmalloc+0xd4/0xd8 [ 32.046203] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.050717] ksize_uaf+0xb8/0x5f8 [ 32.054016] kunit_try_run_case+0x170/0x3f0 [ 32.058182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.063651] kthread+0x328/0x630 [ 32.066862] ret_from_fork+0x10/0x20 [ 32.070422] [ 32.071897] Freed by task 241: [ 32.074935] kasan_save_stack+0x3c/0x68 [ 32.078755] kasan_save_track+0x20/0x40 [ 32.082574] kasan_save_free_info+0x4c/0x78 [ 32.086741] __kasan_slab_free+0x6c/0x98 [ 32.090647] kfree+0x214/0x3c8 [ 32.093685] ksize_uaf+0x11c/0x5f8 [ 32.097071] kunit_try_run_case+0x170/0x3f0 [ 32.101237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.106706] kthread+0x328/0x630 [ 32.109917] ret_from_fork+0x10/0x20 [ 32.113477] [ 32.114954] The buggy address belongs to the object at ffff000801f1c400 [ 32.114954] which belongs to the cache kmalloc-128 of size 128 [ 32.127455] The buggy address is located 0 bytes inside of [ 32.127455] freed 128-byte region [ffff000801f1c400, ffff000801f1c480) [ 32.139517] [ 32.140996] The buggy address belongs to the physical page: [ 32.146552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 32.154537] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.162175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.169118] page_type: f5(slab) [ 32.172254] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.179975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.187702] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.195513] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.203326] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 32.211138] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.218944] page dumped because: kasan: bad access detected [ 32.224499] [ 32.225974] Memory state around the buggy address: [ 32.230753] ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.237958] ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.245162] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.252363] ^ [ 32.255579] ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.262784] ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.269985] ================================================================== [ 31.601493] ================================================================== [ 31.611146] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.617479] Read of size 1 at addr ffff000801f1c400 by task kunit_try_catch/241 [ 31.624770] [ 31.626256] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 31.626316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.626334] Hardware name: WinLink E850-96 board (DT) [ 31.626355] Call trace: [ 31.626371] show_stack+0x20/0x38 (C) [ 31.626409] dump_stack_lvl+0x8c/0xd0 [ 31.626442] print_report+0x118/0x608 [ 31.626475] kasan_report+0xdc/0x128 [ 31.626506] __kasan_check_byte+0x54/0x70 [ 31.626537] ksize+0x30/0x88 [ 31.626567] ksize_uaf+0x168/0x5f8 [ 31.626596] kunit_try_run_case+0x170/0x3f0 [ 31.626630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.626665] kthread+0x328/0x630 [ 31.626700] ret_from_fork+0x10/0x20 [ 31.626733] [ 31.691611] Allocated by task 241: [ 31.694997] kasan_save_stack+0x3c/0x68 [ 31.698813] kasan_save_track+0x20/0x40 [ 31.702634] kasan_save_alloc_info+0x40/0x58 [ 31.706885] __kasan_kmalloc+0xd4/0xd8 [ 31.710618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.715132] ksize_uaf+0xb8/0x5f8 [ 31.718430] kunit_try_run_case+0x170/0x3f0 [ 31.722597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.728067] kthread+0x328/0x630 [ 31.731277] ret_from_fork+0x10/0x20 [ 31.734836] [ 31.736313] Freed by task 241: [ 31.739350] kasan_save_stack+0x3c/0x68 [ 31.743170] kasan_save_track+0x20/0x40 [ 31.746989] kasan_save_free_info+0x4c/0x78 [ 31.751156] __kasan_slab_free+0x6c/0x98 [ 31.755062] kfree+0x214/0x3c8 [ 31.758100] ksize_uaf+0x11c/0x5f8 [ 31.761485] kunit_try_run_case+0x170/0x3f0 [ 31.765652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.771120] kthread+0x328/0x630 [ 31.774332] ret_from_fork+0x10/0x20 [ 31.777891] [ 31.779369] The buggy address belongs to the object at ffff000801f1c400 [ 31.779369] which belongs to the cache kmalloc-128 of size 128 [ 31.791871] The buggy address is located 0 bytes inside of [ 31.791871] freed 128-byte region [ffff000801f1c400, ffff000801f1c480) [ 31.803934] [ 31.805412] The buggy address belongs to the physical page: [ 31.810967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 31.818952] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.826591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.833535] page_type: f5(slab) [ 31.836673] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.844390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.852116] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.859928] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.867741] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 31.875553] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.883360] page dumped because: kasan: bad access detected [ 31.888914] [ 31.890389] Memory state around the buggy address: [ 31.895174] ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.902373] ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.909579] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.916778] ^ [ 31.919993] ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.927198] ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.934401] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
[ 31.299098] ================================================================== [ 31.306202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.313577] Read of size 1 at addr ffff000801ede97f by task kunit_try_catch/239 [ 31.320868] [ 31.322350] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 31.322402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.322418] Hardware name: WinLink E850-96 board (DT) [ 31.322439] Call trace: [ 31.322454] show_stack+0x20/0x38 (C) [ 31.322489] dump_stack_lvl+0x8c/0xd0 [ 31.322519] print_report+0x118/0x608 [ 31.322550] kasan_report+0xdc/0x128 [ 31.322579] __asan_report_load1_noabort+0x20/0x30 [ 31.322612] ksize_unpoisons_memory+0x690/0x740 [ 31.322642] kunit_try_run_case+0x170/0x3f0 [ 31.322677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.322711] kthread+0x328/0x630 [ 31.322745] ret_from_fork+0x10/0x20 [ 31.322778] [ 31.386751] Allocated by task 239: [ 31.390139] kasan_save_stack+0x3c/0x68 [ 31.393956] kasan_save_track+0x20/0x40 [ 31.397777] kasan_save_alloc_info+0x40/0x58 [ 31.402029] __kasan_kmalloc+0xd4/0xd8 [ 31.405763] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.410275] ksize_unpoisons_memory+0xc0/0x740 [ 31.414702] kunit_try_run_case+0x170/0x3f0 [ 31.418869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.424337] kthread+0x328/0x630 [ 31.427549] ret_from_fork+0x10/0x20 [ 31.431108] [ 31.432586] The buggy address belongs to the object at ffff000801ede900 [ 31.432586] which belongs to the cache kmalloc-128 of size 128 [ 31.445086] The buggy address is located 12 bytes to the right of [ 31.445086] allocated 115-byte region [ffff000801ede900, ffff000801ede973) [ 31.458104] [ 31.459582] The buggy address belongs to the physical page: [ 31.465140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 31.473123] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.480760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.487706] page_type: f5(slab) [ 31.490842] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.498562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.506288] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.514100] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.521913] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 31.529725] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.537532] page dumped because: kasan: bad access detected [ 31.543085] [ 31.544561] Memory state around the buggy address: [ 31.549342] ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.556544] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.563749] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.570950] ^ [ 31.578072] ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.585278] ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.592478] ================================================================== [ 30.998495] ================================================================== [ 31.005599] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.012973] Read of size 1 at addr ffff000801ede978 by task kunit_try_catch/239 [ 31.020264] [ 31.021748] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 31.021799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.021817] Hardware name: WinLink E850-96 board (DT) [ 31.021835] Call trace: [ 31.021849] show_stack+0x20/0x38 (C) [ 31.021887] dump_stack_lvl+0x8c/0xd0 [ 31.021919] print_report+0x118/0x608 [ 31.021950] kasan_report+0xdc/0x128 [ 31.021982] __asan_report_load1_noabort+0x20/0x30 [ 31.022018] ksize_unpoisons_memory+0x618/0x740 [ 31.022050] kunit_try_run_case+0x170/0x3f0 [ 31.022084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.022116] kthread+0x328/0x630 [ 31.022149] ret_from_fork+0x10/0x20 [ 31.022179] [ 31.086148] Allocated by task 239: [ 31.089537] kasan_save_stack+0x3c/0x68 [ 31.093353] kasan_save_track+0x20/0x40 [ 31.097172] kasan_save_alloc_info+0x40/0x58 [ 31.101426] __kasan_kmalloc+0xd4/0xd8 [ 31.105158] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.109672] ksize_unpoisons_memory+0xc0/0x740 [ 31.114099] kunit_try_run_case+0x170/0x3f0 [ 31.118266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.123734] kthread+0x328/0x630 [ 31.126946] ret_from_fork+0x10/0x20 [ 31.130505] [ 31.131982] The buggy address belongs to the object at ffff000801ede900 [ 31.131982] which belongs to the cache kmalloc-128 of size 128 [ 31.144481] The buggy address is located 5 bytes to the right of [ 31.144481] allocated 115-byte region [ffff000801ede900, ffff000801ede973) [ 31.157414] [ 31.158892] The buggy address belongs to the physical page: [ 31.164450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 31.172432] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.180072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.187017] page_type: f5(slab) [ 31.190151] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.197872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.205598] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.213410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.221224] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 31.229034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.236842] page dumped because: kasan: bad access detected [ 31.242396] [ 31.243871] Memory state around the buggy address: [ 31.248650] ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.255855] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263061] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.270260] ^ [ 31.277382] ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.284588] ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.291787] ================================================================== [ 30.695512] ================================================================== [ 30.705256] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.712631] Read of size 1 at addr ffff000801ede973 by task kunit_try_catch/239 [ 30.719921] [ 30.721406] CPU: 6 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 30.721465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.721483] Hardware name: WinLink E850-96 board (DT) [ 30.721504] Call trace: [ 30.721520] show_stack+0x20/0x38 (C) [ 30.721559] dump_stack_lvl+0x8c/0xd0 [ 30.721594] print_report+0x118/0x608 [ 30.721627] kasan_report+0xdc/0x128 [ 30.721656] __asan_report_load1_noabort+0x20/0x30 [ 30.721693] ksize_unpoisons_memory+0x628/0x740 [ 30.721726] kunit_try_run_case+0x170/0x3f0 [ 30.721760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.721794] kthread+0x328/0x630 [ 30.721828] ret_from_fork+0x10/0x20 [ 30.721865] [ 30.785805] Allocated by task 239: [ 30.789194] kasan_save_stack+0x3c/0x68 [ 30.793010] kasan_save_track+0x20/0x40 [ 30.796829] kasan_save_alloc_info+0x40/0x58 [ 30.801083] __kasan_kmalloc+0xd4/0xd8 [ 30.804817] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.809330] ksize_unpoisons_memory+0xc0/0x740 [ 30.813756] kunit_try_run_case+0x170/0x3f0 [ 30.817923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.823392] kthread+0x328/0x630 [ 30.826603] ret_from_fork+0x10/0x20 [ 30.830162] [ 30.831641] The buggy address belongs to the object at ffff000801ede900 [ 30.831641] which belongs to the cache kmalloc-128 of size 128 [ 30.844141] The buggy address is located 0 bytes to the right of [ 30.844141] allocated 115-byte region [ffff000801ede900, ffff000801ede973) [ 30.857072] [ 30.858551] The buggy address belongs to the physical page: [ 30.864106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 30.872091] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.879731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.886675] page_type: f5(slab) [ 30.889810] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.897529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.905256] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.913067] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.920880] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 30.928692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.936497] page dumped because: kasan: bad access detected [ 30.942053] [ 30.943528] Memory state around the buggy address: [ 30.948309] ffff000801ede800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.955512] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.962716] >ffff000801ede900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.969917] ^ [ 30.976778] ffff000801ede980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983985] ffff000801edea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.991186] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
[ 30.381406] ================================================================== [ 30.388420] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.394405] Free of addr ffff000801dde600 by task kunit_try_catch/237 [ 30.400828] [ 30.402315] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 30.402373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.402390] Hardware name: WinLink E850-96 board (DT) [ 30.402410] Call trace: [ 30.402423] show_stack+0x20/0x38 (C) [ 30.402458] dump_stack_lvl+0x8c/0xd0 [ 30.402489] print_report+0x118/0x608 [ 30.402520] kasan_report_invalid_free+0xc0/0xe8 [ 30.402553] check_slab_allocation+0xd4/0x108 [ 30.402583] __kasan_slab_pre_free+0x2c/0x48 [ 30.402615] kfree+0xe8/0x3c8 [ 30.402642] kfree_sensitive+0x3c/0xb0 [ 30.402671] kmalloc_double_kzfree+0x168/0x308 [ 30.402704] kunit_try_run_case+0x170/0x3f0 [ 30.402737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.402772] kthread+0x328/0x630 [ 30.402803] ret_from_fork+0x10/0x20 [ 30.402836] [ 30.478172] Allocated by task 237: [ 30.481558] kasan_save_stack+0x3c/0x68 [ 30.485376] kasan_save_track+0x20/0x40 [ 30.489195] kasan_save_alloc_info+0x40/0x58 [ 30.493449] __kasan_kmalloc+0xd4/0xd8 [ 30.497181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.501695] kmalloc_double_kzfree+0xb8/0x308 [ 30.506035] kunit_try_run_case+0x170/0x3f0 [ 30.510202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.515671] kthread+0x328/0x630 [ 30.518882] ret_from_fork+0x10/0x20 [ 30.522441] [ 30.523917] Freed by task 237: [ 30.526956] kasan_save_stack+0x3c/0x68 [ 30.530775] kasan_save_track+0x20/0x40 [ 30.534594] kasan_save_free_info+0x4c/0x78 [ 30.538760] __kasan_slab_free+0x6c/0x98 [ 30.542668] kfree+0x214/0x3c8 [ 30.545705] kfree_sensitive+0x80/0xb0 [ 30.549437] kmalloc_double_kzfree+0x11c/0x308 [ 30.553864] kunit_try_run_case+0x170/0x3f0 [ 30.558031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.563500] kthread+0x328/0x630 [ 30.566712] ret_from_fork+0x10/0x20 [ 30.570271] [ 30.571748] The buggy address belongs to the object at ffff000801dde600 [ 30.571748] which belongs to the cache kmalloc-16 of size 16 [ 30.584075] The buggy address is located 0 bytes inside of [ 30.584075] 16-byte region [ffff000801dde600, ffff000801dde610) [ 30.595530] [ 30.597009] The buggy address belongs to the physical page: [ 30.602565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dde [ 30.610551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.617060] page_type: f5(slab) [ 30.620195] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.627915] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.635635] page dumped because: kasan: bad access detected [ 30.641189] [ 30.642665] Memory state around the buggy address: [ 30.647446] ffff000801dde500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.654648] ffff000801dde580: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 30.661854] >ffff000801dde600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.669054] ^ [ 30.672269] ffff000801dde680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.679474] ffff000801dde700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.686677] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
[ 30.068236] ================================================================== [ 30.081567] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.088942] Read of size 1 at addr ffff000801dde600 by task kunit_try_catch/237 [ 30.096232] [ 30.097721] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 30.097780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.097799] Hardware name: WinLink E850-96 board (DT) [ 30.097821] Call trace: [ 30.097835] show_stack+0x20/0x38 (C) [ 30.097871] dump_stack_lvl+0x8c/0xd0 [ 30.097903] print_report+0x118/0x608 [ 30.097937] kasan_report+0xdc/0x128 [ 30.097969] __kasan_check_byte+0x54/0x70 [ 30.098003] kfree_sensitive+0x30/0xb0 [ 30.098035] kmalloc_double_kzfree+0x168/0x308 [ 30.098064] kunit_try_run_case+0x170/0x3f0 [ 30.098098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.098135] kthread+0x328/0x630 [ 30.098173] ret_from_fork+0x10/0x20 [ 30.098207] [ 30.164981] Allocated by task 237: [ 30.168370] kasan_save_stack+0x3c/0x68 [ 30.172186] kasan_save_track+0x20/0x40 [ 30.176005] kasan_save_alloc_info+0x40/0x58 [ 30.180259] __kasan_kmalloc+0xd4/0xd8 [ 30.183991] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.188505] kmalloc_double_kzfree+0xb8/0x308 [ 30.192846] kunit_try_run_case+0x170/0x3f0 [ 30.197012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.202481] kthread+0x328/0x630 [ 30.205692] ret_from_fork+0x10/0x20 [ 30.209251] [ 30.210728] Freed by task 237: [ 30.213767] kasan_save_stack+0x3c/0x68 [ 30.217585] kasan_save_track+0x20/0x40 [ 30.221404] kasan_save_free_info+0x4c/0x78 [ 30.225571] __kasan_slab_free+0x6c/0x98 [ 30.229478] kfree+0x214/0x3c8 [ 30.232515] kfree_sensitive+0x80/0xb0 [ 30.236248] kmalloc_double_kzfree+0x11c/0x308 [ 30.240675] kunit_try_run_case+0x170/0x3f0 [ 30.244842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.250310] kthread+0x328/0x630 [ 30.253522] ret_from_fork+0x10/0x20 [ 30.257082] [ 30.258558] The buggy address belongs to the object at ffff000801dde600 [ 30.258558] which belongs to the cache kmalloc-16 of size 16 [ 30.270886] The buggy address is located 0 bytes inside of [ 30.270886] freed 16-byte region [ffff000801dde600, ffff000801dde610) [ 30.282861] [ 30.284341] The buggy address belongs to the physical page: [ 30.289897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dde [ 30.297883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.304391] page_type: f5(slab) [ 30.307527] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.315246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.322965] page dumped because: kasan: bad access detected [ 30.328520] [ 30.329996] Memory state around the buggy address: [ 30.334779] ffff000801dde500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.341979] ffff000801dde580: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 30.349185] >ffff000801dde600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.356386] ^ [ 30.359600] ffff000801dde680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.366805] ffff000801dde700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.374007] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
[ 29.763217] ================================================================== [ 29.772546] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.779138] Read of size 1 at addr ffff000800de74a8 by task kunit_try_catch/233 [ 29.786430] [ 29.787915] CPU: 7 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 29.787974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.787992] Hardware name: WinLink E850-96 board (DT) [ 29.788013] Call trace: [ 29.788026] show_stack+0x20/0x38 (C) [ 29.788063] dump_stack_lvl+0x8c/0xd0 [ 29.788099] print_report+0x118/0x608 [ 29.788132] kasan_report+0xdc/0x128 [ 29.788163] __asan_report_load1_noabort+0x20/0x30 [ 29.788199] kmalloc_uaf2+0x3f4/0x468 [ 29.788227] kunit_try_run_case+0x170/0x3f0 [ 29.788259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.788294] kthread+0x328/0x630 [ 29.788329] ret_from_fork+0x10/0x20 [ 29.788365] [ 29.851444] Allocated by task 233: [ 29.854833] kasan_save_stack+0x3c/0x68 [ 29.858649] kasan_save_track+0x20/0x40 [ 29.862470] kasan_save_alloc_info+0x40/0x58 [ 29.866722] __kasan_kmalloc+0xd4/0xd8 [ 29.870454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.874969] kmalloc_uaf2+0xc4/0x468 [ 29.878528] kunit_try_run_case+0x170/0x3f0 [ 29.882694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.888162] kthread+0x328/0x630 [ 29.891375] ret_from_fork+0x10/0x20 [ 29.894933] [ 29.896410] Freed by task 233: [ 29.899447] kasan_save_stack+0x3c/0x68 [ 29.903267] kasan_save_track+0x20/0x40 [ 29.907086] kasan_save_free_info+0x4c/0x78 [ 29.911252] __kasan_slab_free+0x6c/0x98 [ 29.915160] kfree+0x214/0x3c8 [ 29.918197] kmalloc_uaf2+0x134/0x468 [ 29.921843] kunit_try_run_case+0x170/0x3f0 [ 29.926009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.931478] kthread+0x328/0x630 [ 29.934690] ret_from_fork+0x10/0x20 [ 29.938249] [ 29.939726] The buggy address belongs to the object at ffff000800de7480 [ 29.939726] which belongs to the cache kmalloc-64 of size 64 [ 29.952054] The buggy address is located 40 bytes inside of [ 29.952054] freed 64-byte region [ffff000800de7480, ffff000800de74c0) [ 29.964116] [ 29.965596] The buggy address belongs to the physical page: [ 29.971151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de7 [ 29.979136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.985644] page_type: f5(slab) [ 29.988784] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.996501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.004221] page dumped because: kasan: bad access detected [ 30.009775] [ 30.011251] Memory state around the buggy address: [ 30.016033] ffff000800de7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.023234] ffff000800de7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.030438] >ffff000800de7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.037640] ^ [ 30.042157] ffff000800de7500: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.049362] ffff000800de7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.056564] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
[ 29.457814] ================================================================== [ 29.466472] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.473591] Write of size 33 at addr ffff000804b57380 by task kunit_try_catch/231 [ 29.481051] [ 29.482539] CPU: 6 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 29.482595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.482614] Hardware name: WinLink E850-96 board (DT) [ 29.482634] Call trace: [ 29.482647] show_stack+0x20/0x38 (C) [ 29.482687] dump_stack_lvl+0x8c/0xd0 [ 29.482719] print_report+0x118/0x608 [ 29.482752] kasan_report+0xdc/0x128 [ 29.482782] kasan_check_range+0x100/0x1a8 [ 29.482814] __asan_memset+0x34/0x78 [ 29.482849] kmalloc_uaf_memset+0x170/0x310 [ 29.482877] kunit_try_run_case+0x170/0x3f0 [ 29.482910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.482949] kthread+0x328/0x630 [ 29.482982] ret_from_fork+0x10/0x20 [ 29.483014] [ 29.549454] Allocated by task 231: [ 29.552842] kasan_save_stack+0x3c/0x68 [ 29.556657] kasan_save_track+0x20/0x40 [ 29.560477] kasan_save_alloc_info+0x40/0x58 [ 29.564730] __kasan_kmalloc+0xd4/0xd8 [ 29.568463] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.572976] kmalloc_uaf_memset+0xb8/0x310 [ 29.577057] kunit_try_run_case+0x170/0x3f0 [ 29.581223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.586692] kthread+0x328/0x630 [ 29.589903] ret_from_fork+0x10/0x20 [ 29.593462] [ 29.594939] Freed by task 231: [ 29.597979] kasan_save_stack+0x3c/0x68 [ 29.601796] kasan_save_track+0x20/0x40 [ 29.605615] kasan_save_free_info+0x4c/0x78 [ 29.609781] __kasan_slab_free+0x6c/0x98 [ 29.613688] kfree+0x214/0x3c8 [ 29.616726] kmalloc_uaf_memset+0x11c/0x310 [ 29.620892] kunit_try_run_case+0x170/0x3f0 [ 29.625059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.630529] kthread+0x328/0x630 [ 29.633740] ret_from_fork+0x10/0x20 [ 29.637299] [ 29.638776] The buggy address belongs to the object at ffff000804b57380 [ 29.638776] which belongs to the cache kmalloc-64 of size 64 [ 29.651104] The buggy address is located 0 bytes inside of [ 29.651104] freed 64-byte region [ffff000804b57380, ffff000804b573c0) [ 29.663079] [ 29.664559] The buggy address belongs to the physical page: [ 29.670114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b57 [ 29.678100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.684609] page_type: f5(slab) [ 29.687746] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.695464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.703183] page dumped because: kasan: bad access detected [ 29.708738] [ 29.710214] Memory state around the buggy address: [ 29.714997] ffff000804b57280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.722199] ffff000804b57300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.729403] >ffff000804b57380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.736602] ^ [ 29.739819] ffff000804b57400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.747023] ffff000804b57480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.754225] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
[ 29.155922] ================================================================== [ 29.166218] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.172727] Read of size 1 at addr ffff000800e20088 by task kunit_try_catch/229 [ 29.180015] [ 29.181502] CPU: 7 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 29.181568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.181585] Hardware name: WinLink E850-96 board (DT) [ 29.181604] Call trace: [ 29.181617] show_stack+0x20/0x38 (C) [ 29.181655] dump_stack_lvl+0x8c/0xd0 [ 29.181687] print_report+0x118/0x608 [ 29.181722] kasan_report+0xdc/0x128 [ 29.181754] __asan_report_load1_noabort+0x20/0x30 [ 29.181792] kmalloc_uaf+0x300/0x338 [ 29.181819] kunit_try_run_case+0x170/0x3f0 [ 29.181854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.181891] kthread+0x328/0x630 [ 29.181928] ret_from_fork+0x10/0x20 [ 29.181963] [ 29.244945] Allocated by task 229: [ 29.248331] kasan_save_stack+0x3c/0x68 [ 29.252148] kasan_save_track+0x20/0x40 [ 29.255967] kasan_save_alloc_info+0x40/0x58 [ 29.260220] __kasan_kmalloc+0xd4/0xd8 [ 29.263954] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.268467] kmalloc_uaf+0xb8/0x338 [ 29.271939] kunit_try_run_case+0x170/0x3f0 [ 29.276105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.281575] kthread+0x328/0x630 [ 29.284786] ret_from_fork+0x10/0x20 [ 29.288345] [ 29.289822] Freed by task 229: [ 29.292859] kasan_save_stack+0x3c/0x68 [ 29.296679] kasan_save_track+0x20/0x40 [ 29.300498] kasan_save_free_info+0x4c/0x78 [ 29.304665] __kasan_slab_free+0x6c/0x98 [ 29.308572] kfree+0x214/0x3c8 [ 29.311609] kmalloc_uaf+0x11c/0x338 [ 29.315168] kunit_try_run_case+0x170/0x3f0 [ 29.319334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.324803] kthread+0x328/0x630 [ 29.328015] ret_from_fork+0x10/0x20 [ 29.331574] [ 29.333051] The buggy address belongs to the object at ffff000800e20080 [ 29.333051] which belongs to the cache kmalloc-16 of size 16 [ 29.345378] The buggy address is located 8 bytes inside of [ 29.345378] freed 16-byte region [ffff000800e20080, ffff000800e20090) [ 29.357355] [ 29.358834] The buggy address belongs to the physical page: [ 29.364390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 29.372375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.378884] page_type: f5(slab) [ 29.382021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 29.389739] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.397460] page dumped because: kasan: bad access detected [ 29.403014] [ 29.404489] Memory state around the buggy address: [ 29.409272] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.416474] ffff000800e20000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.423678] >ffff000800e20080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.430878] ^ [ 29.434354] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.441559] ffff000800e20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.448761] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
[ 28.887789] ================================================================== [ 28.898165] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.906062] Read of size 64 at addr ffff000804b57304 by task kunit_try_catch/227 [ 28.913438] [ 28.914926] CPU: 6 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.914987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.915003] Hardware name: WinLink E850-96 board (DT) [ 28.915023] Call trace: [ 28.915035] show_stack+0x20/0x38 (C) [ 28.915073] dump_stack_lvl+0x8c/0xd0 [ 28.915107] print_report+0x118/0x608 [ 28.915142] kasan_report+0xdc/0x128 [ 28.915174] kasan_check_range+0x100/0x1a8 [ 28.915208] __asan_memmove+0x3c/0x98 [ 28.915242] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.915275] kunit_try_run_case+0x170/0x3f0 [ 28.915309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.915344] kthread+0x328/0x630 [ 28.915379] ret_from_fork+0x10/0x20 [ 28.915413] [ 28.982796] Allocated by task 227: [ 28.986183] kasan_save_stack+0x3c/0x68 [ 28.990000] kasan_save_track+0x20/0x40 [ 28.993819] kasan_save_alloc_info+0x40/0x58 [ 28.998072] __kasan_kmalloc+0xd4/0xd8 [ 29.001804] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.006319] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 29.011268] kunit_try_run_case+0x170/0x3f0 [ 29.015433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.020901] kthread+0x328/0x630 [ 29.024113] ret_from_fork+0x10/0x20 [ 29.027672] [ 29.029150] The buggy address belongs to the object at ffff000804b57300 [ 29.029150] which belongs to the cache kmalloc-64 of size 64 [ 29.041478] The buggy address is located 4 bytes inside of [ 29.041478] allocated 64-byte region [ffff000804b57300, ffff000804b57340) [ 29.053800] [ 29.055280] The buggy address belongs to the physical page: [ 29.060835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b57 [ 29.068821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.075330] page_type: f5(slab) [ 29.078465] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.086185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.093904] page dumped because: kasan: bad access detected [ 29.099459] [ 29.100935] Memory state around the buggy address: [ 29.105718] ffff000804b57200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.112917] ffff000804b57280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.120123] >ffff000804b57300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.127323] ^ [ 29.132622] ffff000804b57380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139829] ffff000804b57400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.147030] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
[ 28.621914] ================================================================== [ 28.631589] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.639140] Read of size 18446744073709551614 at addr ffff000800de7404 by task kunit_try_catch/225 [ 28.648079] [ 28.649565] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.649624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.649642] Hardware name: WinLink E850-96 board (DT) [ 28.649665] Call trace: [ 28.649679] show_stack+0x20/0x38 (C) [ 28.649715] dump_stack_lvl+0x8c/0xd0 [ 28.649747] print_report+0x118/0x608 [ 28.649778] kasan_report+0xdc/0x128 [ 28.649808] kasan_check_range+0x100/0x1a8 [ 28.649844] __asan_memmove+0x3c/0x98 [ 28.649877] kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.649909] kunit_try_run_case+0x170/0x3f0 [ 28.649943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.649981] kthread+0x328/0x630 [ 28.650015] ret_from_fork+0x10/0x20 [ 28.650050] [ 28.717522] Allocated by task 225: [ 28.720909] kasan_save_stack+0x3c/0x68 [ 28.724726] kasan_save_track+0x20/0x40 [ 28.728546] kasan_save_alloc_info+0x40/0x58 [ 28.732798] __kasan_kmalloc+0xd4/0xd8 [ 28.736531] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.741045] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 28.746079] kunit_try_run_case+0x170/0x3f0 [ 28.750246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.755715] kthread+0x328/0x630 [ 28.758926] ret_from_fork+0x10/0x20 [ 28.762485] [ 28.763962] The buggy address belongs to the object at ffff000800de7400 [ 28.763962] which belongs to the cache kmalloc-64 of size 64 [ 28.776289] The buggy address is located 4 bytes inside of [ 28.776289] 64-byte region [ffff000800de7400, ffff000800de7440) [ 28.787745] [ 28.789225] The buggy address belongs to the physical page: [ 28.794780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de7 [ 28.802765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.809275] page_type: f5(slab) [ 28.812412] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 28.820129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.827849] page dumped because: kasan: bad access detected [ 28.833404] [ 28.834879] Memory state around the buggy address: [ 28.839662] ffff000800de7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.846864] ffff000800de7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.854067] >ffff000800de7400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 28.861269] ^ [ 28.864484] ffff000800de7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.871689] ffff000800de7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.878891] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
[ 28.314757] ================================================================== [ 28.324389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 28.331678] Write of size 16 at addr ffff000801ede869 by task kunit_try_catch/223 [ 28.339141] [ 28.340628] CPU: 6 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.340688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.340705] Hardware name: WinLink E850-96 board (DT) [ 28.340725] Call trace: [ 28.340738] show_stack+0x20/0x38 (C) [ 28.340776] dump_stack_lvl+0x8c/0xd0 [ 28.340807] print_report+0x118/0x608 [ 28.340842] kasan_report+0xdc/0x128 [ 28.340872] kasan_check_range+0x100/0x1a8 [ 28.340905] __asan_memset+0x34/0x78 [ 28.340937] kmalloc_oob_memset_16+0x150/0x2f8 [ 28.340966] kunit_try_run_case+0x170/0x3f0 [ 28.340998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.341037] kthread+0x328/0x630 [ 28.341071] ret_from_fork+0x10/0x20 [ 28.341104] [ 28.407804] Allocated by task 223: [ 28.411192] kasan_save_stack+0x3c/0x68 [ 28.415008] kasan_save_track+0x20/0x40 [ 28.418827] kasan_save_alloc_info+0x40/0x58 [ 28.423081] __kasan_kmalloc+0xd4/0xd8 [ 28.426813] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.431327] kmalloc_oob_memset_16+0xb0/0x2f8 [ 28.435669] kunit_try_run_case+0x170/0x3f0 [ 28.439834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.445302] kthread+0x328/0x630 [ 28.448514] ret_from_fork+0x10/0x20 [ 28.452073] [ 28.453551] The buggy address belongs to the object at ffff000801ede800 [ 28.453551] which belongs to the cache kmalloc-128 of size 128 [ 28.466052] The buggy address is located 105 bytes inside of [ 28.466052] allocated 120-byte region [ffff000801ede800, ffff000801ede878) [ 28.478636] [ 28.480115] The buggy address belongs to the physical page: [ 28.485670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 28.493655] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.501293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.508237] page_type: f5(slab) [ 28.511375] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.519093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.526819] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.534630] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.542444] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 28.550255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.558061] page dumped because: kasan: bad access detected [ 28.563617] [ 28.565092] Memory state around the buggy address: [ 28.569876] ffff000801ede700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.577075] ffff000801ede780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.584282] >ffff000801ede800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.591481] ^ [ 28.598603] ffff000801ede880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.605807] ffff000801ede900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.613010] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
[ 28.008063] ================================================================== [ 28.017624] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 28.024825] Write of size 8 at addr ffff000801f1c371 by task kunit_try_catch/221 [ 28.032201] [ 28.033688] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 28.033743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.033758] Hardware name: WinLink E850-96 board (DT) [ 28.033779] Call trace: [ 28.033794] show_stack+0x20/0x38 (C) [ 28.033831] dump_stack_lvl+0x8c/0xd0 [ 28.033866] print_report+0x118/0x608 [ 28.033899] kasan_report+0xdc/0x128 [ 28.033929] kasan_check_range+0x100/0x1a8 [ 28.033964] __asan_memset+0x34/0x78 [ 28.033998] kmalloc_oob_memset_8+0x150/0x2f8 [ 28.034026] kunit_try_run_case+0x170/0x3f0 [ 28.034056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.034091] kthread+0x328/0x630 [ 28.034126] ret_from_fork+0x10/0x20 [ 28.034158] [ 28.100777] Allocated by task 221: [ 28.104165] kasan_save_stack+0x3c/0x68 [ 28.107981] kasan_save_track+0x20/0x40 [ 28.111801] kasan_save_alloc_info+0x40/0x58 [ 28.116054] __kasan_kmalloc+0xd4/0xd8 [ 28.119786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.124300] kmalloc_oob_memset_8+0xb0/0x2f8 [ 28.128554] kunit_try_run_case+0x170/0x3f0 [ 28.132720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.138189] kthread+0x328/0x630 [ 28.141401] ret_from_fork+0x10/0x20 [ 28.144960] [ 28.146436] The buggy address belongs to the object at ffff000801f1c300 [ 28.146436] which belongs to the cache kmalloc-128 of size 128 [ 28.158938] The buggy address is located 113 bytes inside of [ 28.158938] allocated 120-byte region [ffff000801f1c300, ffff000801f1c378) [ 28.171522] [ 28.173001] The buggy address belongs to the physical page: [ 28.178557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 28.186541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.194179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.201123] page_type: f5(slab) [ 28.204261] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.211979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.219706] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.227517] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.235330] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 28.243142] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.250949] page dumped because: kasan: bad access detected [ 28.256503] [ 28.257979] Memory state around the buggy address: [ 28.262758] ffff000801f1c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.269962] ffff000801f1c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.277166] >ffff000801f1c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.284367] ^ [ 28.291489] ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.298695] ffff000801f1c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.305896] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
[ 27.701457] ================================================================== [ 27.710858] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 27.718059] Write of size 4 at addr ffff000801ede775 by task kunit_try_catch/219 [ 27.725435] [ 27.726922] CPU: 6 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 27.726981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.726998] Hardware name: WinLink E850-96 board (DT) [ 27.727020] Call trace: [ 27.727033] show_stack+0x20/0x38 (C) [ 27.727070] dump_stack_lvl+0x8c/0xd0 [ 27.727101] print_report+0x118/0x608 [ 27.727135] kasan_report+0xdc/0x128 [ 27.727164] kasan_check_range+0x100/0x1a8 [ 27.727195] __asan_memset+0x34/0x78 [ 27.727225] kmalloc_oob_memset_4+0x150/0x300 [ 27.727252] kunit_try_run_case+0x170/0x3f0 [ 27.727282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.727317] kthread+0x328/0x630 [ 27.727352] ret_from_fork+0x10/0x20 [ 27.727386] [ 27.794011] Allocated by task 219: [ 27.797398] kasan_save_stack+0x3c/0x68 [ 27.801215] kasan_save_track+0x20/0x40 [ 27.805034] kasan_save_alloc_info+0x40/0x58 [ 27.809288] __kasan_kmalloc+0xd4/0xd8 [ 27.813020] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.817534] kmalloc_oob_memset_4+0xb0/0x300 [ 27.821789] kunit_try_run_case+0x170/0x3f0 [ 27.825954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.831423] kthread+0x328/0x630 [ 27.834636] ret_from_fork+0x10/0x20 [ 27.838193] [ 27.839671] The buggy address belongs to the object at ffff000801ede700 [ 27.839671] which belongs to the cache kmalloc-128 of size 128 [ 27.852173] The buggy address is located 117 bytes inside of [ 27.852173] allocated 120-byte region [ffff000801ede700, ffff000801ede778) [ 27.864756] [ 27.866235] The buggy address belongs to the physical page: [ 27.871790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 27.879775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.887414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.894358] page_type: f5(slab) [ 27.897495] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.905213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.912940] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.920751] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.928564] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 27.936376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.944181] page dumped because: kasan: bad access detected [ 27.949738] [ 27.951212] Memory state around the buggy address: [ 27.955995] ffff000801ede600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.963195] ffff000801ede680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.970400] >ffff000801ede700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.977601] ^ [ 27.984723] ffff000801ede780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.991929] ffff000801ede800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.999130] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
[ 27.394420] ================================================================== [ 27.404090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 27.411292] Write of size 2 at addr ffff000801f1c277 by task kunit_try_catch/217 [ 27.418670] [ 27.420153] CPU: 7 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 27.420207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.420221] Hardware name: WinLink E850-96 board (DT) [ 27.420241] Call trace: [ 27.420255] show_stack+0x20/0x38 (C) [ 27.420290] dump_stack_lvl+0x8c/0xd0 [ 27.420321] print_report+0x118/0x608 [ 27.420356] kasan_report+0xdc/0x128 [ 27.420387] kasan_check_range+0x100/0x1a8 [ 27.420419] __asan_memset+0x34/0x78 [ 27.420450] kmalloc_oob_memset_2+0x150/0x2f8 [ 27.420480] kunit_try_run_case+0x170/0x3f0 [ 27.420510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.420545] kthread+0x328/0x630 [ 27.420581] ret_from_fork+0x10/0x20 [ 27.420613] [ 27.487245] Allocated by task 217: [ 27.490633] kasan_save_stack+0x3c/0x68 [ 27.494449] kasan_save_track+0x20/0x40 [ 27.498268] kasan_save_alloc_info+0x40/0x58 [ 27.502521] __kasan_kmalloc+0xd4/0xd8 [ 27.506254] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.510768] kmalloc_oob_memset_2+0xb0/0x2f8 [ 27.515021] kunit_try_run_case+0x170/0x3f0 [ 27.519188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.524657] kthread+0x328/0x630 [ 27.527868] ret_from_fork+0x10/0x20 [ 27.531427] [ 27.532905] The buggy address belongs to the object at ffff000801f1c200 [ 27.532905] which belongs to the cache kmalloc-128 of size 128 [ 27.545405] The buggy address is located 119 bytes inside of [ 27.545405] allocated 120-byte region [ffff000801f1c200, ffff000801f1c278) [ 27.557989] [ 27.559469] The buggy address belongs to the physical page: [ 27.565024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c [ 27.573009] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.580648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.587592] page_type: f5(slab) [ 27.590729] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.598447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.606173] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.613985] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.621798] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff [ 27.629610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.637417] page dumped because: kasan: bad access detected [ 27.642971] [ 27.644446] Memory state around the buggy address: [ 27.649229] ffff000801f1c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.656429] ffff000801f1c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.663636] >ffff000801f1c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.670835] ^ [ 27.677956] ffff000801f1c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.685161] ffff000801f1c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.692364] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
[ 27.087843] ================================================================== [ 27.096978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 27.104266] Write of size 128 at addr ffff000801ede600 by task kunit_try_catch/215 [ 27.111817] [ 27.113302] CPU: 6 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 27.113358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.113375] Hardware name: WinLink E850-96 board (DT) [ 27.113395] Call trace: [ 27.113407] show_stack+0x20/0x38 (C) [ 27.113443] dump_stack_lvl+0x8c/0xd0 [ 27.113478] print_report+0x118/0x608 [ 27.113512] kasan_report+0xdc/0x128 [ 27.113541] kasan_check_range+0x100/0x1a8 [ 27.113578] __asan_memset+0x34/0x78 [ 27.113611] kmalloc_oob_in_memset+0x144/0x2d0 [ 27.113641] kunit_try_run_case+0x170/0x3f0 [ 27.113674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.113711] kthread+0x328/0x630 [ 27.113745] ret_from_fork+0x10/0x20 [ 27.113779] [ 27.180478] Allocated by task 215: [ 27.183866] kasan_save_stack+0x3c/0x68 [ 27.187683] kasan_save_track+0x20/0x40 [ 27.191502] kasan_save_alloc_info+0x40/0x58 [ 27.195755] __kasan_kmalloc+0xd4/0xd8 [ 27.199488] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.204002] kmalloc_oob_in_memset+0xb0/0x2d0 [ 27.208342] kunit_try_run_case+0x170/0x3f0 [ 27.212508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.217977] kthread+0x328/0x630 [ 27.221189] ret_from_fork+0x10/0x20 [ 27.224748] [ 27.226225] The buggy address belongs to the object at ffff000801ede600 [ 27.226225] which belongs to the cache kmalloc-128 of size 128 [ 27.238726] The buggy address is located 0 bytes inside of [ 27.238726] allocated 120-byte region [ffff000801ede600, ffff000801ede678) [ 27.251136] [ 27.252616] The buggy address belongs to the physical page: [ 27.258171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 27.266155] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.273795] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.280738] page_type: f5(slab) [ 27.283876] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.291594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.299321] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.307132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.314945] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 27.322757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.330562] page dumped because: kasan: bad access detected [ 27.336118] [ 27.337593] Memory state around the buggy address: [ 27.342376] ffff000801ede500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.349576] ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.356782] >ffff000801ede600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.363982] ^ [ 27.371103] ffff000801ede680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.378308] ffff000801ede700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.385511] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
[ 26.783133] ================================================================== [ 26.792296] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.799062] Read of size 16 at addr ffff000800e20060 by task kunit_try_catch/213 [ 26.806440] [ 26.807925] CPU: 7 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 26.807980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.807996] Hardware name: WinLink E850-96 board (DT) [ 26.808017] Call trace: [ 26.808031] show_stack+0x20/0x38 (C) [ 26.808067] dump_stack_lvl+0x8c/0xd0 [ 26.808100] print_report+0x118/0x608 [ 26.808133] kasan_report+0xdc/0x128 [ 26.808162] __asan_report_load16_noabort+0x20/0x30 [ 26.808197] kmalloc_uaf_16+0x3bc/0x438 [ 26.808222] kunit_try_run_case+0x170/0x3f0 [ 26.808255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.808289] kthread+0x328/0x630 [ 26.808324] ret_from_fork+0x10/0x20 [ 26.808357] [ 26.871716] Allocated by task 213: [ 26.875104] kasan_save_stack+0x3c/0x68 [ 26.878920] kasan_save_track+0x20/0x40 [ 26.882739] kasan_save_alloc_info+0x40/0x58 [ 26.886993] __kasan_kmalloc+0xd4/0xd8 [ 26.890725] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.895239] kmalloc_uaf_16+0x140/0x438 [ 26.899058] kunit_try_run_case+0x170/0x3f0 [ 26.903225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.908694] kthread+0x328/0x630 [ 26.911905] ret_from_fork+0x10/0x20 [ 26.915464] [ 26.916941] Freed by task 213: [ 26.919978] kasan_save_stack+0x3c/0x68 [ 26.923798] kasan_save_track+0x20/0x40 [ 26.927618] kasan_save_free_info+0x4c/0x78 [ 26.931783] __kasan_slab_free+0x6c/0x98 [ 26.935690] kfree+0x214/0x3c8 [ 26.938728] kmalloc_uaf_16+0x190/0x438 [ 26.942547] kunit_try_run_case+0x170/0x3f0 [ 26.946714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.952182] kthread+0x328/0x630 [ 26.955394] ret_from_fork+0x10/0x20 [ 26.958953] [ 26.960431] The buggy address belongs to the object at ffff000800e20060 [ 26.960431] which belongs to the cache kmalloc-16 of size 16 [ 26.972759] The buggy address is located 0 bytes inside of [ 26.972759] freed 16-byte region [ffff000800e20060, ffff000800e20070) [ 26.984734] [ 26.986213] The buggy address belongs to the physical page: [ 26.991769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 26.999753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.006263] page_type: f5(slab) [ 27.009401] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 27.017119] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.024839] page dumped because: kasan: bad access detected [ 27.030393] [ 27.031868] Memory state around the buggy address: [ 27.036651] ffff000800e1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.043852] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.051058] >ffff000800e20000: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.058257] ^ [ 27.064598] ffff000800e20080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.071802] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.079005] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
[ 26.524626] ================================================================== [ 26.533617] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.540298] Write of size 16 at addr ffff000800da9680 by task kunit_try_catch/211 [ 26.547763] [ 26.549248] CPU: 6 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 26.549303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.549317] Hardware name: WinLink E850-96 board (DT) [ 26.549337] Call trace: [ 26.549349] show_stack+0x20/0x38 (C) [ 26.549386] dump_stack_lvl+0x8c/0xd0 [ 26.549420] print_report+0x118/0x608 [ 26.549454] kasan_report+0xdc/0x128 [ 26.549484] __asan_report_store16_noabort+0x20/0x30 [ 26.549523] kmalloc_oob_16+0x3a0/0x3f8 [ 26.549551] kunit_try_run_case+0x170/0x3f0 [ 26.549585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.549618] kthread+0x328/0x630 [ 26.549655] ret_from_fork+0x10/0x20 [ 26.549691] [ 26.613125] Allocated by task 211: [ 26.616514] kasan_save_stack+0x3c/0x68 [ 26.620330] kasan_save_track+0x20/0x40 [ 26.624149] kasan_save_alloc_info+0x40/0x58 [ 26.628403] __kasan_kmalloc+0xd4/0xd8 [ 26.632135] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.636649] kmalloc_oob_16+0xb4/0x3f8 [ 26.640381] kunit_try_run_case+0x170/0x3f0 [ 26.644548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.650017] kthread+0x328/0x630 [ 26.653229] ret_from_fork+0x10/0x20 [ 26.656787] [ 26.658267] The buggy address belongs to the object at ffff000800da9680 [ 26.658267] which belongs to the cache kmalloc-16 of size 16 [ 26.670592] The buggy address is located 0 bytes inside of [ 26.670592] allocated 13-byte region [ffff000800da9680, ffff000800da968d) [ 26.682916] [ 26.684395] The buggy address belongs to the physical page: [ 26.689951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da9 [ 26.697936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.704444] page_type: f5(slab) [ 26.707583] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.715301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.723019] page dumped because: kasan: bad access detected [ 26.728575] [ 26.730050] Memory state around the buggy address: [ 26.734834] ffff000800da9580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.742035] ffff000800da9600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.749238] >ffff000800da9680: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.756439] ^ [ 26.759915] ffff000800da9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.767120] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.774322] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
[ 23.283866] ================================================================== [ 23.290956] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.298505] Write of size 1 at addr ffff00080348ceda by task kunit_try_catch/203 [ 23.305883] [ 23.307366] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 23.307418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.307435] Hardware name: WinLink E850-96 board (DT) [ 23.307453] Call trace: [ 23.307465] show_stack+0x20/0x38 (C) [ 23.307499] dump_stack_lvl+0x8c/0xd0 [ 23.307529] print_report+0x118/0x608 [ 23.307562] kasan_report+0xdc/0x128 [ 23.307590] __asan_report_store1_noabort+0x20/0x30 [ 23.307624] krealloc_less_oob_helper+0xa80/0xc50 [ 23.307653] krealloc_less_oob+0x20/0x38 [ 23.307681] kunit_try_run_case+0x170/0x3f0 [ 23.307712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.307749] kthread+0x328/0x630 [ 23.307784] ret_from_fork+0x10/0x20 [ 23.307815] [ 23.375934] Allocated by task 203: [ 23.379321] kasan_save_stack+0x3c/0x68 [ 23.383139] kasan_save_track+0x20/0x40 [ 23.386960] kasan_save_alloc_info+0x40/0x58 [ 23.391212] __kasan_krealloc+0x118/0x178 [ 23.395205] krealloc_noprof+0x128/0x360 [ 23.399111] krealloc_less_oob_helper+0x168/0xc50 [ 23.403798] krealloc_less_oob+0x20/0x38 [ 23.407704] kunit_try_run_case+0x170/0x3f0 [ 23.411871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.417339] kthread+0x328/0x630 [ 23.420553] ret_from_fork+0x10/0x20 [ 23.424109] [ 23.425587] The buggy address belongs to the object at ffff00080348ce00 [ 23.425587] which belongs to the cache kmalloc-256 of size 256 [ 23.438088] The buggy address is located 17 bytes to the right of [ 23.438088] allocated 201-byte region [ffff00080348ce00, ffff00080348cec9) [ 23.451106] [ 23.452584] The buggy address belongs to the physical page: [ 23.458141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c [ 23.466125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.473764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.480709] page_type: f5(slab) [ 23.483845] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.491564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.499290] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.507102] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.514915] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff [ 23.522727] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.530532] page dumped because: kasan: bad access detected [ 23.536088] [ 23.537563] Memory state around the buggy address: [ 23.542345] ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.549546] ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.556753] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.563952] ^ [ 23.570032] ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.577237] ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.584438] ================================================================== [ 25.145382] ================================================================== [ 25.152475] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 25.160022] Write of size 1 at addr ffff00080349a0da by task kunit_try_catch/207 [ 25.167400] [ 25.168884] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 25.168936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.168950] Hardware name: WinLink E850-96 board (DT) [ 25.168967] Call trace: [ 25.168979] show_stack+0x20/0x38 (C) [ 25.169012] dump_stack_lvl+0x8c/0xd0 [ 25.169043] print_report+0x118/0x608 [ 25.169076] kasan_report+0xdc/0x128 [ 25.169105] __asan_report_store1_noabort+0x20/0x30 [ 25.169139] krealloc_less_oob_helper+0xa80/0xc50 [ 25.169170] krealloc_large_less_oob+0x20/0x38 [ 25.169199] kunit_try_run_case+0x170/0x3f0 [ 25.169230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.169263] kthread+0x328/0x630 [ 25.169296] ret_from_fork+0x10/0x20 [ 25.169329] [ 25.237974] The buggy address belongs to the physical page: [ 25.243531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 25.251515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.259155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.266097] page_type: f8(unknown) [ 25.269491] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.277214] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.284940] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.292752] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.300565] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 25.308377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.316183] page dumped because: kasan: bad access detected [ 25.321738] [ 25.323214] Memory state around the buggy address: [ 25.327994] ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.335197] ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.342401] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.349602] ^ [ 25.355682] ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.362887] ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.370088] ================================================================== [ 22.976557] ================================================================== [ 22.983410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.990958] Write of size 1 at addr ffff00080348ced0 by task kunit_try_catch/203 [ 22.998336] [ 22.999820] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.999877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.999894] Hardware name: WinLink E850-96 board (DT) [ 22.999912] Call trace: [ 22.999925] show_stack+0x20/0x38 (C) [ 22.999959] dump_stack_lvl+0x8c/0xd0 [ 22.999990] print_report+0x118/0x608 [ 23.000021] kasan_report+0xdc/0x128 [ 23.000049] __asan_report_store1_noabort+0x20/0x30 [ 23.000085] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.000115] krealloc_less_oob+0x20/0x38 [ 23.000142] kunit_try_run_case+0x170/0x3f0 [ 23.000177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.000210] kthread+0x328/0x630 [ 23.000244] ret_from_fork+0x10/0x20 [ 23.000275] [ 23.068386] Allocated by task 203: [ 23.071774] kasan_save_stack+0x3c/0x68 [ 23.075591] kasan_save_track+0x20/0x40 [ 23.079412] kasan_save_alloc_info+0x40/0x58 [ 23.083664] __kasan_krealloc+0x118/0x178 [ 23.087657] krealloc_noprof+0x128/0x360 [ 23.091563] krealloc_less_oob_helper+0x168/0xc50 [ 23.096251] krealloc_less_oob+0x20/0x38 [ 23.100157] kunit_try_run_case+0x170/0x3f0 [ 23.104323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.109792] kthread+0x328/0x630 [ 23.113005] ret_from_fork+0x10/0x20 [ 23.116563] [ 23.118040] The buggy address belongs to the object at ffff00080348ce00 [ 23.118040] which belongs to the cache kmalloc-256 of size 256 [ 23.130541] The buggy address is located 7 bytes to the right of [ 23.130541] allocated 201-byte region [ffff00080348ce00, ffff00080348cec9) [ 23.143472] [ 23.144950] The buggy address belongs to the physical page: [ 23.150507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c [ 23.158491] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.166128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.173074] page_type: f5(slab) [ 23.176208] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.183930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.191656] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.199467] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.207280] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff [ 23.215092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.222898] page dumped because: kasan: bad access detected [ 23.228453] [ 23.229929] Memory state around the buggy address: [ 23.234709] ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.241912] ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.249117] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.256318] ^ [ 23.262137] ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.269342] ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.276543] ================================================================== [ 23.900260] ================================================================== [ 23.907267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.914815] Write of size 1 at addr ffff00080348ceeb by task kunit_try_catch/203 [ 23.922193] [ 23.923676] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 23.923729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.923743] Hardware name: WinLink E850-96 board (DT) [ 23.923761] Call trace: [ 23.923775] show_stack+0x20/0x38 (C) [ 23.923808] dump_stack_lvl+0x8c/0xd0 [ 23.923840] print_report+0x118/0x608 [ 23.923872] kasan_report+0xdc/0x128 [ 23.923900] __asan_report_store1_noabort+0x20/0x30 [ 23.923937] krealloc_less_oob_helper+0xa58/0xc50 [ 23.923968] krealloc_less_oob+0x20/0x38 [ 23.923998] kunit_try_run_case+0x170/0x3f0 [ 23.924028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.924062] kthread+0x328/0x630 [ 23.924093] ret_from_fork+0x10/0x20 [ 23.924123] [ 23.992244] Allocated by task 203: [ 23.995632] kasan_save_stack+0x3c/0x68 [ 23.999449] kasan_save_track+0x20/0x40 [ 24.003268] kasan_save_alloc_info+0x40/0x58 [ 24.007522] __kasan_krealloc+0x118/0x178 [ 24.011515] krealloc_noprof+0x128/0x360 [ 24.015421] krealloc_less_oob_helper+0x168/0xc50 [ 24.020108] krealloc_less_oob+0x20/0x38 [ 24.024015] kunit_try_run_case+0x170/0x3f0 [ 24.028181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.033650] kthread+0x328/0x630 [ 24.036861] ret_from_fork+0x10/0x20 [ 24.040420] [ 24.041898] The buggy address belongs to the object at ffff00080348ce00 [ 24.041898] which belongs to the cache kmalloc-256 of size 256 [ 24.054399] The buggy address is located 34 bytes to the right of [ 24.054399] allocated 201-byte region [ffff00080348ce00, ffff00080348cec9) [ 24.067417] [ 24.068894] The buggy address belongs to the physical page: [ 24.074452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c [ 24.082436] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.090076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.097018] page_type: f5(slab) [ 24.100155] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.107874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.115600] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.123412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.131225] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff [ 24.139037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.146842] page dumped because: kasan: bad access detected [ 24.152398] [ 24.153874] Memory state around the buggy address: [ 24.158653] ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.165857] ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.173063] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.180262] ^ [ 24.186863] ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.194068] ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.201269] ================================================================== [ 24.679225] ================================================================== [ 24.689200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.696751] Write of size 1 at addr ffff00080349a0c9 by task kunit_try_catch/207 [ 24.704126] [ 24.705612] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 24.705672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.705688] Hardware name: WinLink E850-96 board (DT) [ 24.705708] Call trace: [ 24.705720] show_stack+0x20/0x38 (C) [ 24.705755] dump_stack_lvl+0x8c/0xd0 [ 24.705788] print_report+0x118/0x608 [ 24.705821] kasan_report+0xdc/0x128 [ 24.705852] __asan_report_store1_noabort+0x20/0x30 [ 24.705890] krealloc_less_oob_helper+0xa48/0xc50 [ 24.705920] krealloc_large_less_oob+0x20/0x38 [ 24.705949] kunit_try_run_case+0x170/0x3f0 [ 24.705982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.706016] kthread+0x328/0x630 [ 24.706051] ret_from_fork+0x10/0x20 [ 24.706085] [ 24.774699] The buggy address belongs to the physical page: [ 24.780257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 24.788241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.795882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.802824] page_type: f8(unknown) [ 24.806222] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.813939] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.821666] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.829478] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.837291] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 24.845102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.852910] page dumped because: kasan: bad access detected [ 24.858464] [ 24.859939] Memory state around the buggy address: [ 24.864719] ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.871923] ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.879127] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.886328] ^ [ 24.891887] ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.899092] ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.906295] ================================================================== [ 25.609947] ================================================================== [ 25.617050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.624598] Write of size 1 at addr ffff00080349a0eb by task kunit_try_catch/207 [ 25.631976] [ 25.633458] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 25.633505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.633520] Hardware name: WinLink E850-96 board (DT) [ 25.633537] Call trace: [ 25.633549] show_stack+0x20/0x38 (C) [ 25.633581] dump_stack_lvl+0x8c/0xd0 [ 25.633611] print_report+0x118/0x608 [ 25.633643] kasan_report+0xdc/0x128 [ 25.633672] __asan_report_store1_noabort+0x20/0x30 [ 25.633705] krealloc_less_oob_helper+0xa58/0xc50 [ 25.633738] krealloc_large_less_oob+0x20/0x38 [ 25.633767] kunit_try_run_case+0x170/0x3f0 [ 25.633797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.633833] kthread+0x328/0x630 [ 25.633868] ret_from_fork+0x10/0x20 [ 25.633900] [ 25.702550] The buggy address belongs to the physical page: [ 25.708107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 25.716092] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.723729] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.730673] page_type: f8(unknown) [ 25.734069] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.741790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.749517] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.757328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.765142] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 25.772953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.780759] page dumped because: kasan: bad access detected [ 25.786314] [ 25.787790] Memory state around the buggy address: [ 25.792574] ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.799773] ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.806980] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.814178] ^ [ 25.820779] ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.827984] ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.835186] ================================================================== [ 24.913812] ================================================================== [ 24.920708] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.928255] Write of size 1 at addr ffff00080349a0d0 by task kunit_try_catch/207 [ 24.935633] [ 24.937117] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 24.937173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.937190] Hardware name: WinLink E850-96 board (DT) [ 24.937208] Call trace: [ 24.937222] show_stack+0x20/0x38 (C) [ 24.937253] dump_stack_lvl+0x8c/0xd0 [ 24.937283] print_report+0x118/0x608 [ 24.937315] kasan_report+0xdc/0x128 [ 24.937347] __asan_report_store1_noabort+0x20/0x30 [ 24.937384] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.937414] krealloc_large_less_oob+0x20/0x38 [ 24.937444] kunit_try_run_case+0x170/0x3f0 [ 24.937474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.937506] kthread+0x328/0x630 [ 24.937538] ret_from_fork+0x10/0x20 [ 24.937571] [ 25.006205] The buggy address belongs to the physical page: [ 25.011764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 25.019748] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.027387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.034331] page_type: f8(unknown) [ 25.037727] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.045447] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.053173] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.060985] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.068798] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 25.076610] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.084418] page dumped because: kasan: bad access detected [ 25.089970] [ 25.091446] Memory state around the buggy address: [ 25.096224] ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.103429] ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.110634] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.117835] ^ [ 25.123655] ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.130859] ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.138062] ================================================================== [ 23.591776] ================================================================== [ 23.598849] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.606400] Write of size 1 at addr ffff00080348ceea by task kunit_try_catch/203 [ 23.613778] [ 23.615261] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 23.615310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.615324] Hardware name: WinLink E850-96 board (DT) [ 23.615342] Call trace: [ 23.615352] show_stack+0x20/0x38 (C) [ 23.615382] dump_stack_lvl+0x8c/0xd0 [ 23.615413] print_report+0x118/0x608 [ 23.615444] kasan_report+0xdc/0x128 [ 23.615473] __asan_report_store1_noabort+0x20/0x30 [ 23.615511] krealloc_less_oob_helper+0xae4/0xc50 [ 23.615542] krealloc_less_oob+0x20/0x38 [ 23.615569] kunit_try_run_case+0x170/0x3f0 [ 23.615599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.615630] kthread+0x328/0x630 [ 23.615664] ret_from_fork+0x10/0x20 [ 23.615696] [ 23.683828] Allocated by task 203: [ 23.687216] kasan_save_stack+0x3c/0x68 [ 23.691034] kasan_save_track+0x20/0x40 [ 23.694853] kasan_save_alloc_info+0x40/0x58 [ 23.699107] __kasan_krealloc+0x118/0x178 [ 23.703099] krealloc_noprof+0x128/0x360 [ 23.707006] krealloc_less_oob_helper+0x168/0xc50 [ 23.711693] krealloc_less_oob+0x20/0x38 [ 23.715599] kunit_try_run_case+0x170/0x3f0 [ 23.719766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.725234] kthread+0x328/0x630 [ 23.728446] ret_from_fork+0x10/0x20 [ 23.732005] [ 23.733480] The buggy address belongs to the object at ffff00080348ce00 [ 23.733480] which belongs to the cache kmalloc-256 of size 256 [ 23.745981] The buggy address is located 33 bytes to the right of [ 23.745981] allocated 201-byte region [ffff00080348ce00, ffff00080348cec9) [ 23.759001] [ 23.760477] The buggy address belongs to the physical page: [ 23.766037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c [ 23.774020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.781657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.788602] page_type: f5(slab) [ 23.791736] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.799459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.807185] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.814997] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.822810] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff [ 23.830621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.838429] page dumped because: kasan: bad access detected [ 23.843983] [ 23.845458] Memory state around the buggy address: [ 23.850238] ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857441] ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.864647] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.871847] ^ [ 23.878448] ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.885652] ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.892854] ================================================================== [ 25.377378] ================================================================== [ 25.384499] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.392050] Write of size 1 at addr ffff00080349a0ea by task kunit_try_catch/207 [ 25.399428] [ 25.400909] CPU: 6 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 25.400956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.400971] Hardware name: WinLink E850-96 board (DT) [ 25.400987] Call trace: [ 25.400997] show_stack+0x20/0x38 (C) [ 25.401030] dump_stack_lvl+0x8c/0xd0 [ 25.401061] print_report+0x118/0x608 [ 25.401093] kasan_report+0xdc/0x128 [ 25.401122] __asan_report_store1_noabort+0x20/0x30 [ 25.401159] krealloc_less_oob_helper+0xae4/0xc50 [ 25.401188] krealloc_large_less_oob+0x20/0x38 [ 25.401217] kunit_try_run_case+0x170/0x3f0 [ 25.401247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.401283] kthread+0x328/0x630 [ 25.401317] ret_from_fork+0x10/0x20 [ 25.401348] [ 25.470001] The buggy address belongs to the physical page: [ 25.475559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 25.483542] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.491183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.498124] page_type: f8(unknown) [ 25.501519] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.509242] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.516968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.524781] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.532593] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 25.540405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.548211] page dumped because: kasan: bad access detected [ 25.553766] [ 25.555241] Memory state around the buggy address: [ 25.560019] ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.567224] ffff00080349a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.574429] >ffff00080349a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.581630] ^ [ 25.588231] ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.595436] ffff00080349a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.602637] ================================================================== [ 22.666757] ================================================================== [ 22.676124] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.683674] Write of size 1 at addr ffff00080348cec9 by task kunit_try_catch/203 [ 22.691051] [ 22.692536] CPU: 6 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.692599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.692617] Hardware name: WinLink E850-96 board (DT) [ 22.692638] Call trace: [ 22.692650] show_stack+0x20/0x38 (C) [ 22.692688] dump_stack_lvl+0x8c/0xd0 [ 22.692721] print_report+0x118/0x608 [ 22.692757] kasan_report+0xdc/0x128 [ 22.692790] __asan_report_store1_noabort+0x20/0x30 [ 22.692828] krealloc_less_oob_helper+0xa48/0xc50 [ 22.692860] krealloc_less_oob+0x20/0x38 [ 22.692888] kunit_try_run_case+0x170/0x3f0 [ 22.692922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.692955] kthread+0x328/0x630 [ 22.692988] ret_from_fork+0x10/0x20 [ 22.693024] [ 22.761101] Allocated by task 203: [ 22.764489] kasan_save_stack+0x3c/0x68 [ 22.768305] kasan_save_track+0x20/0x40 [ 22.772125] kasan_save_alloc_info+0x40/0x58 [ 22.776377] __kasan_krealloc+0x118/0x178 [ 22.780370] krealloc_noprof+0x128/0x360 [ 22.784276] krealloc_less_oob_helper+0x168/0xc50 [ 22.788964] krealloc_less_oob+0x20/0x38 [ 22.792870] kunit_try_run_case+0x170/0x3f0 [ 22.797037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.802505] kthread+0x328/0x630 [ 22.805718] ret_from_fork+0x10/0x20 [ 22.809276] [ 22.810753] The buggy address belongs to the object at ffff00080348ce00 [ 22.810753] which belongs to the cache kmalloc-256 of size 256 [ 22.823254] The buggy address is located 0 bytes to the right of [ 22.823254] allocated 201-byte region [ffff00080348ce00, ffff00080348cec9) [ 22.836185] [ 22.837665] The buggy address belongs to the physical page: [ 22.843220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88348c [ 22.851204] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.858843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.865787] page_type: f5(slab) [ 22.868925] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.876643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.884369] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.892180] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.899993] head: 0bfffe0000000002 fffffdffe00d2301 00000000ffffffff 00000000ffffffff [ 22.907805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.915611] page dumped because: kasan: bad access detected [ 22.921166] [ 22.922642] Memory state around the buggy address: [ 22.927425] ffff00080348cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.934627] ffff00080348ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.941831] >ffff00080348ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.949031] ^ [ 22.954590] ffff00080348cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.961797] ffff00080348cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.968998] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
[ 24.210139] ================================================================== [ 24.219507] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.227054] Write of size 1 at addr ffff0008067a20eb by task kunit_try_catch/205 [ 24.234429] [ 24.235916] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 24.235972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.235988] Hardware name: WinLink E850-96 board (DT) [ 24.236008] Call trace: [ 24.236020] show_stack+0x20/0x38 (C) [ 24.236057] dump_stack_lvl+0x8c/0xd0 [ 24.236088] print_report+0x118/0x608 [ 24.236119] kasan_report+0xdc/0x128 [ 24.236148] __asan_report_store1_noabort+0x20/0x30 [ 24.236185] krealloc_more_oob_helper+0x60c/0x678 [ 24.236215] krealloc_large_more_oob+0x20/0x38 [ 24.236243] kunit_try_run_case+0x170/0x3f0 [ 24.236278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.236312] kthread+0x328/0x630 [ 24.236346] ret_from_fork+0x10/0x20 [ 24.236381] [ 24.305004] The buggy address belongs to the physical page: [ 24.310559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867a0 [ 24.318543] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.326184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.333126] page_type: f8(unknown) [ 24.336524] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.344242] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.351968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.359780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.367593] head: 0bfffe0000000002 fffffdffe019e801 00000000ffffffff 00000000ffffffff [ 24.375405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.383212] page dumped because: kasan: bad access detected [ 24.388767] [ 24.390241] Memory state around the buggy address: [ 24.395024] ffff0008067a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.402224] ffff0008067a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.409429] >ffff0008067a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.416630] ^ [ 24.423231] ffff0008067a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.430436] ffff0008067a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.437638] ================================================================== [ 22.046304] ================================================================== [ 22.055385] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.062935] Write of size 1 at addr ffff0008034c88eb by task kunit_try_catch/201 [ 22.070313] [ 22.071799] CPU: 7 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.071857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.071874] Hardware name: WinLink E850-96 board (DT) [ 22.071896] Call trace: [ 22.071910] show_stack+0x20/0x38 (C) [ 22.071947] dump_stack_lvl+0x8c/0xd0 [ 22.071980] print_report+0x118/0x608 [ 22.072014] kasan_report+0xdc/0x128 [ 22.072045] __asan_report_store1_noabort+0x20/0x30 [ 22.072082] krealloc_more_oob_helper+0x60c/0x678 [ 22.072111] krealloc_more_oob+0x20/0x38 [ 22.072138] kunit_try_run_case+0x170/0x3f0 [ 22.072172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.072208] kthread+0x328/0x630 [ 22.072242] ret_from_fork+0x10/0x20 [ 22.072276] [ 22.140362] Allocated by task 201: [ 22.143752] kasan_save_stack+0x3c/0x68 [ 22.147568] kasan_save_track+0x20/0x40 [ 22.151387] kasan_save_alloc_info+0x40/0x58 [ 22.155640] __kasan_krealloc+0x118/0x178 [ 22.159633] krealloc_noprof+0x128/0x360 [ 22.163539] krealloc_more_oob_helper+0x168/0x678 [ 22.168226] krealloc_more_oob+0x20/0x38 [ 22.172133] kunit_try_run_case+0x170/0x3f0 [ 22.176299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.181768] kthread+0x328/0x630 [ 22.184981] ret_from_fork+0x10/0x20 [ 22.188539] [ 22.190017] The buggy address belongs to the object at ffff0008034c8800 [ 22.190017] which belongs to the cache kmalloc-256 of size 256 [ 22.202517] The buggy address is located 0 bytes to the right of [ 22.202517] allocated 235-byte region [ffff0008034c8800, ffff0008034c88eb) [ 22.215448] [ 22.216928] The buggy address belongs to the physical page: [ 22.222483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8 [ 22.230467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.238106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.245050] page_type: f5(slab) [ 22.248188] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.255905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.263632] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.271443] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.279256] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff [ 22.287068] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.294874] page dumped because: kasan: bad access detected [ 22.300429] [ 22.301905] Memory state around the buggy address: [ 22.306687] ffff0008034c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.313889] ffff0008034c8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.321094] >ffff0008034c8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.328294] ^ [ 22.334894] ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.342099] ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.349302] ================================================================== [ 22.356624] ================================================================== [ 22.363713] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.371262] Write of size 1 at addr ffff0008034c88f0 by task kunit_try_catch/201 [ 22.378640] [ 22.380125] CPU: 7 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 22.380176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.380192] Hardware name: WinLink E850-96 board (DT) [ 22.380209] Call trace: [ 22.380223] show_stack+0x20/0x38 (C) [ 22.380255] dump_stack_lvl+0x8c/0xd0 [ 22.380286] print_report+0x118/0x608 [ 22.380319] kasan_report+0xdc/0x128 [ 22.380347] __asan_report_store1_noabort+0x20/0x30 [ 22.380382] krealloc_more_oob_helper+0x5c0/0x678 [ 22.380411] krealloc_more_oob+0x20/0x38 [ 22.380440] kunit_try_run_case+0x170/0x3f0 [ 22.380470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.380502] kthread+0x328/0x630 [ 22.380534] ret_from_fork+0x10/0x20 [ 22.380567] [ 22.448691] Allocated by task 201: [ 22.452077] kasan_save_stack+0x3c/0x68 [ 22.455896] kasan_save_track+0x20/0x40 [ 22.459717] kasan_save_alloc_info+0x40/0x58 [ 22.463968] __kasan_krealloc+0x118/0x178 [ 22.467961] krealloc_noprof+0x128/0x360 [ 22.471868] krealloc_more_oob_helper+0x168/0x678 [ 22.476555] krealloc_more_oob+0x20/0x38 [ 22.480461] kunit_try_run_case+0x170/0x3f0 [ 22.484628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.490097] kthread+0x328/0x630 [ 22.493308] ret_from_fork+0x10/0x20 [ 22.496867] [ 22.498345] The buggy address belongs to the object at ffff0008034c8800 [ 22.498345] which belongs to the cache kmalloc-256 of size 256 [ 22.510845] The buggy address is located 5 bytes to the right of [ 22.510845] allocated 235-byte region [ffff0008034c8800, ffff0008034c88eb) [ 22.523777] [ 22.525252] The buggy address belongs to the physical page: [ 22.530812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834c8 [ 22.538794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.546434] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.553377] page_type: f5(slab) [ 22.556513] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.564234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.571960] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.579772] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.587585] head: 0bfffe0000000002 fffffdffe00d3201 00000000ffffffff 00000000ffffffff [ 22.595397] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.603202] page dumped because: kasan: bad access detected [ 22.608758] [ 22.610233] Memory state around the buggy address: [ 22.615013] ffff0008034c8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622218] ffff0008034c8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.629421] >ffff0008034c8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.636622] ^ [ 22.643483] ffff0008034c8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.650688] ffff0008034c8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.657889] ================================================================== [ 24.444944] ================================================================== [ 24.452051] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.459599] Write of size 1 at addr ffff0008067a20f0 by task kunit_try_catch/205 [ 24.466977] [ 24.468459] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 24.468508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.468523] Hardware name: WinLink E850-96 board (DT) [ 24.468543] Call trace: [ 24.468554] show_stack+0x20/0x38 (C) [ 24.468584] dump_stack_lvl+0x8c/0xd0 [ 24.468614] print_report+0x118/0x608 [ 24.468644] kasan_report+0xdc/0x128 [ 24.468673] __asan_report_store1_noabort+0x20/0x30 [ 24.468708] krealloc_more_oob_helper+0x5c0/0x678 [ 24.468737] krealloc_large_more_oob+0x20/0x38 [ 24.468767] kunit_try_run_case+0x170/0x3f0 [ 24.468796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.468828] kthread+0x328/0x630 [ 24.468862] ret_from_fork+0x10/0x20 [ 24.468892] [ 24.537549] The buggy address belongs to the physical page: [ 24.543107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867a0 [ 24.551090] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.558731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.565673] page_type: f8(unknown) [ 24.569066] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.576790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.584517] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.592328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.600141] head: 0bfffe0000000002 fffffdffe019e801 00000000ffffffff 00000000ffffffff [ 24.607953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.615760] page dumped because: kasan: bad access detected [ 24.621315] [ 24.622790] Memory state around the buggy address: [ 24.627568] ffff0008067a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.634773] ffff0008067a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.641978] >ffff0008067a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.649179] ^ [ 24.656040] ffff0008067a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.663245] ffff0008067a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.670446] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
[ 21.854485] ================================================================== [ 21.868842] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 21.875177] Read of size 1 at addr ffff0008067a0000 by task kunit_try_catch/199 [ 21.882469] [ 21.883952] CPU: 6 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.884014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.884030] Hardware name: WinLink E850-96 board (DT) [ 21.884048] Call trace: [ 21.884061] show_stack+0x20/0x38 (C) [ 21.884098] dump_stack_lvl+0x8c/0xd0 [ 21.884129] print_report+0x118/0x608 [ 21.884165] kasan_report+0xdc/0x128 [ 21.884196] __asan_report_load1_noabort+0x20/0x30 [ 21.884234] page_alloc_uaf+0x328/0x350 [ 21.884263] kunit_try_run_case+0x170/0x3f0 [ 21.884296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.884329] kthread+0x328/0x630 [ 21.884364] ret_from_fork+0x10/0x20 [ 21.884396] [ 21.947660] The buggy address belongs to the physical page: [ 21.953216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867a0 [ 21.961201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.967711] page_type: f0(buddy) [ 21.970935] raw: 0bfffe0000000000 ffff00087f61bcc8 ffff00087f61bcc8 0000000000000000 [ 21.978652] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 21.986372] page dumped because: kasan: bad access detected [ 21.991927] [ 21.993403] Memory state around the buggy address: [ 21.998186] ffff00080679ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.005386] ffff00080679ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.012590] >ffff0008067a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.019791] ^ [ 22.023007] ffff0008067a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.030211] ffff0008067a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.037414] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-invalid-free-in-kfree: Failure
[ 21.618143] ================================================================== [ 21.627354] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 21.632735] Free of addr ffff000803498001 by task kunit_try_catch/195 [ 21.639156] [ 21.640642] CPU: 6 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.640699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.640716] Hardware name: WinLink E850-96 board (DT) [ 21.640738] Call trace: [ 21.640750] show_stack+0x20/0x38 (C) [ 21.640790] dump_stack_lvl+0x8c/0xd0 [ 21.640823] print_report+0x118/0x608 [ 21.640859] kasan_report_invalid_free+0xc0/0xe8 [ 21.640893] __kasan_kfree_large+0x5c/0xa8 [ 21.640927] free_large_kmalloc+0x64/0x190 [ 21.640957] kfree+0x270/0x3c8 [ 21.640984] kmalloc_large_invalid_free+0x108/0x270 [ 21.641015] kunit_try_run_case+0x170/0x3f0 [ 21.641047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.641083] kthread+0x328/0x630 [ 21.641119] ret_from_fork+0x10/0x20 [ 21.641151] [ 21.712856] The buggy address belongs to the physical page: [ 21.718411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 21.726394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.734034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.740977] page_type: f8(unknown) [ 21.744374] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.752093] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.759821] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.767631] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.775444] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 21.783256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.791063] page dumped because: kasan: bad access detected [ 21.796617] [ 21.798092] Memory state around the buggy address: [ 21.802873] ffff000803497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.810076] ffff000803497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.817282] >ffff000803498000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.824481] ^ [ 21.827697] ffff000803498080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.834902] ffff000803498100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.842104] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
[ 21.433627] ================================================================== [ 21.443329] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 21.449923] Read of size 1 at addr ffff000803500000 by task kunit_try_catch/193 [ 21.457214] [ 21.458701] CPU: 7 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.458755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.458772] Hardware name: WinLink E850-96 board (DT) [ 21.458793] Call trace: [ 21.458806] show_stack+0x20/0x38 (C) [ 21.458844] dump_stack_lvl+0x8c/0xd0 [ 21.458876] print_report+0x118/0x608 [ 21.458909] kasan_report+0xdc/0x128 [ 21.458943] __asan_report_load1_noabort+0x20/0x30 [ 21.458981] kmalloc_large_uaf+0x2cc/0x2f8 [ 21.459007] kunit_try_run_case+0x170/0x3f0 [ 21.459039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.459073] kthread+0x328/0x630 [ 21.459107] ret_from_fork+0x10/0x20 [ 21.459143] [ 21.522667] The buggy address belongs to the physical page: [ 21.528222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883500 [ 21.536209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.542730] raw: 0bfffe0000000000 ffff00085b012f00 ffff00085b012f00 0000000000000000 [ 21.550447] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.558168] page dumped because: kasan: bad access detected [ 21.563722] [ 21.565197] Memory state around the buggy address: [ 21.569981] ffff0008034fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.577180] ffff0008034fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.584387] >ffff000803500000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.591586] ^ [ 21.594801] ffff000803500080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.602006] ffff000803500100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.609209] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
[ 21.204636] ================================================================== [ 21.214255] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 21.221716] Write of size 1 at addr ffff00080349a00a by task kunit_try_catch/191 [ 21.229093] [ 21.230580] CPU: 6 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 21.230637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.230654] Hardware name: WinLink E850-96 board (DT) [ 21.230675] Call trace: [ 21.230688] show_stack+0x20/0x38 (C) [ 21.230727] dump_stack_lvl+0x8c/0xd0 [ 21.230759] print_report+0x118/0x608 [ 21.230792] kasan_report+0xdc/0x128 [ 21.230822] __asan_report_store1_noabort+0x20/0x30 [ 21.230859] kmalloc_large_oob_right+0x278/0x2b8 [ 21.230887] kunit_try_run_case+0x170/0x3f0 [ 21.230918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.230953] kthread+0x328/0x630 [ 21.230987] ret_from_fork+0x10/0x20 [ 21.231023] [ 21.295153] The buggy address belongs to the physical page: [ 21.300709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883498 [ 21.308693] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.316333] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.323275] page_type: f8(unknown) [ 21.326673] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.334391] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.342118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.349929] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.357742] head: 0bfffe0000000002 fffffdffe00d2601 00000000ffffffff 00000000ffffffff [ 21.365554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.373360] page dumped because: kasan: bad access detected [ 21.378915] [ 21.380391] Memory state around the buggy address: [ 21.385172] ffff000803499f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.392374] ffff000803499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.399580] >ffff00080349a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.406780] ^ [ 21.410256] ffff00080349a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.417460] ffff00080349a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.424663] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
[ 20.903028] ================================================================== [ 20.913484] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.920767] Write of size 1 at addr ffff000806189f00 by task kunit_try_catch/189 [ 20.928141] [ 20.929629] CPU: 7 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.929687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.929702] Hardware name: WinLink E850-96 board (DT) [ 20.929723] Call trace: [ 20.929735] show_stack+0x20/0x38 (C) [ 20.929772] dump_stack_lvl+0x8c/0xd0 [ 20.929806] print_report+0x118/0x608 [ 20.929842] kasan_report+0xdc/0x128 [ 20.929872] __asan_report_store1_noabort+0x20/0x30 [ 20.929911] kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.929939] kunit_try_run_case+0x170/0x3f0 [ 20.929972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.930007] kthread+0x328/0x630 [ 20.930042] ret_from_fork+0x10/0x20 [ 20.930078] [ 20.994026] Allocated by task 189: [ 20.997415] kasan_save_stack+0x3c/0x68 [ 21.001230] kasan_save_track+0x20/0x40 [ 21.005049] kasan_save_alloc_info+0x40/0x58 [ 21.009303] __kasan_kmalloc+0xd4/0xd8 [ 21.013036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.017549] kmalloc_big_oob_right+0xb8/0x2f0 [ 21.021891] kunit_try_run_case+0x170/0x3f0 [ 21.026056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.031525] kthread+0x328/0x630 [ 21.034737] ret_from_fork+0x10/0x20 [ 21.038295] [ 21.039774] The buggy address belongs to the object at ffff000806188000 [ 21.039774] which belongs to the cache kmalloc-8k of size 8192 [ 21.052274] The buggy address is located 0 bytes to the right of [ 21.052274] allocated 7936-byte region [ffff000806188000, ffff000806189f00) [ 21.065292] [ 21.066771] The buggy address belongs to the physical page: [ 21.072326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886188 [ 21.080310] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.087949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.094894] page_type: f5(slab) [ 21.098031] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.105749] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.113475] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.121287] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.129100] head: 0bfffe0000000003 fffffdffe0186201 00000000ffffffff 00000000ffffffff [ 21.136912] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.144719] page dumped because: kasan: bad access detected [ 21.150273] [ 21.151749] Memory state around the buggy address: [ 21.156531] ffff000806189e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.163731] ffff000806189e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.170936] >ffff000806189f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178137] ^ [ 21.181353] ffff000806189f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188559] ffff00080618a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195760] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
[ 20.432603] ================================================================== [ 20.442304] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.450372] Write of size 1 at addr ffff000801eaa178 by task kunit_try_catch/187 [ 20.457750] [ 20.459236] CPU: 5 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.459292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.459308] Hardware name: WinLink E850-96 board (DT) [ 20.459329] Call trace: [ 20.459343] show_stack+0x20/0x38 (C) [ 20.459382] dump_stack_lvl+0x8c/0xd0 [ 20.459417] print_report+0x118/0x608 [ 20.459451] kasan_report+0xdc/0x128 [ 20.459481] __asan_report_store1_noabort+0x20/0x30 [ 20.459518] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.459551] kunit_try_run_case+0x170/0x3f0 [ 20.459583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.459616] kthread+0x328/0x630 [ 20.459652] ret_from_fork+0x10/0x20 [ 20.459684] [ 20.524415] Allocated by task 187: [ 20.527802] kasan_save_stack+0x3c/0x68 [ 20.531619] kasan_save_track+0x20/0x40 [ 20.535438] kasan_save_alloc_info+0x40/0x58 [ 20.539692] __kasan_kmalloc+0xd4/0xd8 [ 20.543425] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 20.548980] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.554101] kunit_try_run_case+0x170/0x3f0 [ 20.558268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.563737] kthread+0x328/0x630 [ 20.566948] ret_from_fork+0x10/0x20 [ 20.570507] [ 20.571985] The buggy address belongs to the object at ffff000801eaa100 [ 20.571985] which belongs to the cache kmalloc-128 of size 128 [ 20.584487] The buggy address is located 0 bytes to the right of [ 20.584487] allocated 120-byte region [ffff000801eaa100, ffff000801eaa178) [ 20.597416] [ 20.598896] The buggy address belongs to the physical page: [ 20.604452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881eaa [ 20.612436] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.620075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.627018] page_type: f5(slab) [ 20.630156] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.637874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.645601] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.653412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.661225] head: 0bfffe0000000001 fffffdffe007aa81 00000000ffffffff 00000000ffffffff [ 20.669037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.676843] page dumped because: kasan: bad access detected [ 20.682398] [ 20.683873] Memory state around the buggy address: [ 20.688656] ffff000801eaa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.695856] ffff000801eaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.703061] >ffff000801eaa100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.710262] ^ [ 20.717384] ffff000801eaa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724590] ffff000801eaa200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.731792] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
[ 20.131718] ================================================================== [ 20.140921] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 20.148295] Read of size 1 at addr ffff000805615000 by task kunit_try_catch/185 [ 20.155585] [ 20.157069] CPU: 6 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.157126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.157143] Hardware name: WinLink E850-96 board (DT) [ 20.157165] Call trace: [ 20.157180] show_stack+0x20/0x38 (C) [ 20.157217] dump_stack_lvl+0x8c/0xd0 [ 20.157248] print_report+0x118/0x608 [ 20.157281] kasan_report+0xdc/0x128 [ 20.157314] __asan_report_load1_noabort+0x20/0x30 [ 20.157349] kmalloc_node_oob_right+0x2f4/0x330 [ 20.157379] kunit_try_run_case+0x170/0x3f0 [ 20.157410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.157444] kthread+0x328/0x630 [ 20.157479] ret_from_fork+0x10/0x20 [ 20.157512] [ 20.221469] Allocated by task 185: [ 20.224855] kasan_save_stack+0x3c/0x68 [ 20.228673] kasan_save_track+0x20/0x40 [ 20.232492] kasan_save_alloc_info+0x40/0x58 [ 20.236745] __kasan_kmalloc+0xd4/0xd8 [ 20.240478] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 20.245426] kmalloc_node_oob_right+0xbc/0x330 [ 20.249854] kunit_try_run_case+0x170/0x3f0 [ 20.254019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.259487] kthread+0x328/0x630 [ 20.262701] ret_from_fork+0x10/0x20 [ 20.266259] [ 20.267736] The buggy address belongs to the object at ffff000805614000 [ 20.267736] which belongs to the cache kmalloc-4k of size 4096 [ 20.280237] The buggy address is located 0 bytes to the right of [ 20.280237] allocated 4096-byte region [ffff000805614000, ffff000805615000) [ 20.293255] [ 20.294735] The buggy address belongs to the physical page: [ 20.300290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885610 [ 20.308273] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.315913] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.322857] page_type: f5(slab) [ 20.325994] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.333712] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.341441] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.349250] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.357063] head: 0bfffe0000000003 fffffdffe0158401 00000000ffffffff 00000000ffffffff [ 20.364875] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.372680] page dumped because: kasan: bad access detected [ 20.378236] [ 20.379711] Memory state around the buggy address: [ 20.384494] ffff000805614f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.391696] ffff000805614f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.398901] >ffff000805615000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.406100] ^ [ 20.409315] ffff000805615080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.416521] ffff000805615100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.423723] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
[ 19.864318] ================================================================== [ 19.873477] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 19.880329] Read of size 1 at addr ffff000800e2001f by task kunit_try_catch/183 [ 19.887620] [ 19.889106] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.889162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.889178] Hardware name: WinLink E850-96 board (DT) [ 19.889202] Call trace: [ 19.889215] show_stack+0x20/0x38 (C) [ 19.889253] dump_stack_lvl+0x8c/0xd0 [ 19.889285] print_report+0x118/0x608 [ 19.889317] kasan_report+0xdc/0x128 [ 19.889349] __asan_report_load1_noabort+0x20/0x30 [ 19.889385] kmalloc_oob_left+0x2ec/0x320 [ 19.889411] kunit_try_run_case+0x170/0x3f0 [ 19.889443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.889479] kthread+0x328/0x630 [ 19.889513] ret_from_fork+0x10/0x20 [ 19.889548] [ 19.952984] Allocated by task 54: [ 19.956284] kasan_save_stack+0x3c/0x68 [ 19.960099] kasan_save_track+0x20/0x40 [ 19.963919] kasan_save_alloc_info+0x40/0x58 [ 19.968174] __kasan_kmalloc+0xd4/0xd8 [ 19.971905] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 19.977461] kvasprintf+0xe0/0x180 [ 19.980846] __kthread_create_on_node+0x16c/0x350 [ 19.985534] kthread_create_on_node+0xe4/0x130 [ 19.989962] create_worker+0x380/0x6b8 [ 19.993693] worker_thread+0x5dc/0xf28 [ 19.997426] kthread+0x328/0x630 [ 20.000637] ret_from_fork+0x10/0x20 [ 20.004196] [ 20.005674] The buggy address belongs to the object at ffff000800e20000 [ 20.005674] which belongs to the cache kmalloc-16 of size 16 [ 20.018001] The buggy address is located 19 bytes to the right of [ 20.018001] allocated 12-byte region [ffff000800e20000, ffff000800e2000c) [ 20.030932] [ 20.032412] The buggy address belongs to the physical page: [ 20.037967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e20 [ 20.045953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.052462] page_type: f5(slab) [ 20.055599] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 20.063317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.071036] page dumped because: kasan: bad access detected [ 20.076591] [ 20.078067] Memory state around the buggy address: [ 20.082849] ffff000800e1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.090050] ffff000800e1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.097256] >ffff000800e20000: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 20.104455] ^ [ 20.108452] ffff000800e20080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.115657] ffff000800e20100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.122859] ==================================================================
Failure - log-parser-test - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
[ 19.567151] ================================================================== [ 19.574258] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.581200] Read of size 1 at addr ffff000801ede580 by task kunit_try_catch/181 [ 19.588491] [ 19.589975] CPU: 6 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.590027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.590041] Hardware name: WinLink E850-96 board (DT) [ 19.590059] Call trace: [ 19.590071] show_stack+0x20/0x38 (C) [ 19.590104] dump_stack_lvl+0x8c/0xd0 [ 19.590134] print_report+0x118/0x608 [ 19.590165] kasan_report+0xdc/0x128 [ 19.590194] __asan_report_load1_noabort+0x20/0x30 [ 19.590228] kmalloc_oob_right+0x5d0/0x660 [ 19.590257] kunit_try_run_case+0x170/0x3f0 [ 19.590288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.590324] kthread+0x328/0x630 [ 19.590356] ret_from_fork+0x10/0x20 [ 19.590387] [ 19.653941] Allocated by task 181: [ 19.657329] kasan_save_stack+0x3c/0x68 [ 19.661146] kasan_save_track+0x20/0x40 [ 19.664966] kasan_save_alloc_info+0x40/0x58 [ 19.669219] __kasan_kmalloc+0xd4/0xd8 [ 19.672951] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.677465] kmalloc_oob_right+0xb0/0x660 [ 19.681458] kunit_try_run_case+0x170/0x3f0 [ 19.685625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.691094] kthread+0x328/0x630 [ 19.694305] ret_from_fork+0x10/0x20 [ 19.697864] [ 19.699340] The buggy address belongs to the object at ffff000801ede500 [ 19.699340] which belongs to the cache kmalloc-128 of size 128 [ 19.711842] The buggy address is located 13 bytes to the right of [ 19.711842] allocated 115-byte region [ffff000801ede500, ffff000801ede573) [ 19.724860] [ 19.726337] The buggy address belongs to the physical page: [ 19.731895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 19.739880] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.747518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.754462] page_type: f5(slab) [ 19.757597] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.765318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.773044] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.780856] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.788669] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 19.796480] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.804288] page dumped because: kasan: bad access detected [ 19.809842] [ 19.811317] Memory state around the buggy address: [ 19.816095] ffff000801ede480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.823300] ffff000801ede500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.830506] >ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.837706] ^ [ 19.840921] ffff000801ede600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.848126] ffff000801ede680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855327] ================================================================== [ 18.964925] ================================================================== [ 18.971492] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.978433] Write of size 1 at addr ffff000801ede573 by task kunit_try_catch/181 [ 18.985809] [ 18.987298] CPU: 6 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.987356] Tainted: [N]=TEST [ 18.987369] Hardware name: WinLink E850-96 board (DT) [ 18.987388] Call trace: [ 18.987403] show_stack+0x20/0x38 (C) [ 18.987441] dump_stack_lvl+0x8c/0xd0 [ 18.987472] print_report+0x118/0x608 [ 18.987506] kasan_report+0xdc/0x128 [ 18.987538] __asan_report_store1_noabort+0x20/0x30 [ 18.987575] kmalloc_oob_right+0x5a4/0x660 [ 18.987607] kunit_try_run_case+0x170/0x3f0 [ 18.987638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.987674] kthread+0x328/0x630 [ 18.987707] ret_from_fork+0x10/0x20 [ 18.987741] [ 19.050133] Allocated by task 181: [ 19.053520] kasan_save_stack+0x3c/0x68 [ 19.057336] kasan_save_track+0x20/0x40 [ 19.061155] kasan_save_alloc_info+0x40/0x58 [ 19.065408] __kasan_kmalloc+0xd4/0xd8 [ 19.069142] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.073655] kmalloc_oob_right+0xb0/0x660 [ 19.077648] kunit_try_run_case+0x170/0x3f0 [ 19.081815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.087283] kthread+0x328/0x630 [ 19.090495] ret_from_fork+0x10/0x20 [ 19.094054] [ 19.095531] The buggy address belongs to the object at ffff000801ede500 [ 19.095531] which belongs to the cache kmalloc-128 of size 128 [ 19.108032] The buggy address is located 0 bytes to the right of [ 19.108032] allocated 115-byte region [ffff000801ede500, ffff000801ede573) [ 19.120963] [ 19.122443] The buggy address belongs to the physical page: [ 19.127999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 19.135982] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.143622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.150565] page_type: f5(slab) [ 19.153703] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.161421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.169147] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.176958] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.184772] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 19.192583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.200389] page dumped because: kasan: bad access detected [ 19.205944] [ 19.207420] Memory state around the buggy address: [ 19.212200] ffff000801ede400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.219403] ffff000801ede480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.226608] >ffff000801ede500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.233809] ^ [ 19.240670] ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.247876] ffff000801ede600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255077] ================================================================== [ 19.267735] ================================================================== [ 19.274786] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.281726] Write of size 1 at addr ffff000801ede578 by task kunit_try_catch/181 [ 19.289103] [ 19.290589] CPU: 6 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.290644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.290660] Hardware name: WinLink E850-96 board (DT) [ 19.290681] Call trace: [ 19.290694] show_stack+0x20/0x38 (C) [ 19.290727] dump_stack_lvl+0x8c/0xd0 [ 19.290757] print_report+0x118/0x608 [ 19.290788] kasan_report+0xdc/0x128 [ 19.290815] __asan_report_store1_noabort+0x20/0x30 [ 19.290849] kmalloc_oob_right+0x538/0x660 [ 19.290876] kunit_try_run_case+0x170/0x3f0 [ 19.290906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.290941] kthread+0x328/0x630 [ 19.290977] ret_from_fork+0x10/0x20 [ 19.291011] [ 19.354640] Allocated by task 181: [ 19.358028] kasan_save_stack+0x3c/0x68 [ 19.361845] kasan_save_track+0x20/0x40 [ 19.365664] kasan_save_alloc_info+0x40/0x58 [ 19.369918] __kasan_kmalloc+0xd4/0xd8 [ 19.373650] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.378164] kmalloc_oob_right+0xb0/0x660 [ 19.382157] kunit_try_run_case+0x170/0x3f0 [ 19.386324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.391793] kthread+0x328/0x630 [ 19.395004] ret_from_fork+0x10/0x20 [ 19.398563] [ 19.400040] The buggy address belongs to the object at ffff000801ede500 [ 19.400040] which belongs to the cache kmalloc-128 of size 128 [ 19.412542] The buggy address is located 5 bytes to the right of [ 19.412542] allocated 115-byte region [ffff000801ede500, ffff000801ede573) [ 19.425472] [ 19.426950] The buggy address belongs to the physical page: [ 19.432509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede [ 19.440491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.448128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.455074] page_type: f5(slab) [ 19.458209] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.465930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.473656] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.481468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.489281] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff [ 19.497093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.504899] page dumped because: kasan: bad access detected [ 19.510454] [ 19.511929] Memory state around the buggy address: [ 19.516708] ffff000801ede400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.523912] ffff000801ede480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.531117] >ffff000801ede500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.538318] ^ [ 19.545440] ffff000801ede580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.552646] ffff000801ede600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.559846] ==================================================================
Failure - log-parser-test - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
------------[ cut here ]------------ [ 163.423309] WARNING: CPU: 0 PID: 701 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 163.430772] Modules linked in: [ 163.433822] CPU: 0 UID: 0 PID: 701 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 163.444933] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 163.450736] Hardware name: WinLink E850-96 board (DT) [ 163.455774] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 163.462714] pc : intlog10+0x38/0x48 [ 163.466186] lr : intlog10_test+0xe4/0x200 [ 163.470179] sp : ffff80008ac77c10 [ 163.473477] x29: ffff80008ac77c90 x28: 0000000000000000 x27: 0000000000000000 [ 163.480595] x26: 1fffe00100f8d941 x25: 0000000000000000 x24: ffff80008ac77ce0 [ 163.487715] x23: ffff80008ac77d00 x22: 0000000000000000 x21: 1ffff0001158ef82 [ 163.494831] x20: ffff800083c78400 x19: ffff800087d07990 x18: 00000000aeee72a7 [ 163.501949] x17: 00000000e55e74f9 x16: 0000000070aadd38 x15: 00000000e28c8275 [ 163.509067] x14: 0000000072f3f0b5 x13: 1fffe0010b5e4181 x12: ffff700010f61579 [ 163.516185] x11: 1ffff00010f61578 x10: ffff700010f61578 x9 : ffff800081220e84 [ 163.523303] x8 : ffff800087b0abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 163.530421] x5 : ffff70001158ef82 x4 : 1ffff00010fa0f3a x3 : 1ffff0001078f080 [ 163.537539] x2 : 1ffff0001078f080 x1 : 0000000000000003 x0 : 0000000000000000 [ 163.544659] Call trace: [ 163.547090] intlog10+0x38/0x48 (P) [ 163.550563] kunit_try_run_case+0x170/0x3f0 [ 163.554728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 163.560197] kthread+0x328/0x630 [ 163.563408] ret_from_fork+0x10/0x20 [ 163.566971] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
------------[ cut here ]------------ [ 163.219667] WARNING: CPU: 0 PID: 683 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 163.226957] Modules linked in: [ 163.230004] CPU: 0 UID: 0 PID: 683 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 163.241115] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 163.246052] Hardware name: WinLink E850-96 board (DT) [ 163.251088] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 163.258029] pc : intlog2+0xd8/0xf8 [ 163.261415] lr : intlog2_test+0xe4/0x200 [ 163.265321] sp : ffff80008ab57c10 [ 163.268619] x29: ffff80008ab57c90 x28: 0000000000000000 x27: 0000000000000000 [ 163.275737] x26: 1fffe00100f8db81 x25: 0000000000000000 x24: ffff80008ab57ce0 [ 163.282855] x23: ffff80008ab57d00 x22: 0000000000000000 x21: 1ffff0001156af82 [ 163.289973] x20: ffff800083c78300 x19: ffff800087d07990 x18: 00000000ba9a0737 [ 163.297091] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 163.304209] x14: 00000000f1f1f1f1 x13: 1fffe0010b5e4181 x12: ffff700010f61579 [ 163.311327] x11: 1ffff00010f61578 x10: ffff700010f61578 x9 : ffff800081221084 [ 163.318445] x8 : ffff800087b0abc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 163.325563] x5 : ffff70001156af82 x4 : 1ffff00010fa0f3a x3 : 1ffff0001078f060 [ 163.332681] x2 : 1ffff0001078f060 x1 : 0000000000000003 x0 : 0000000000000000 [ 163.339803] Call trace: [ 163.342232] intlog2+0xd8/0xf8 (P) [ 163.345618] kunit_try_run_case+0x170/0x3f0 [ 163.349783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 163.355252] kthread+0x328/0x630 [ 163.358462] ret_from_fork+0x10/0x20 [ 163.362025] ---[ end trace 0000000000000000 ]---
Failure - lava - job
KNOWN ISSUE - lava/job: Failure
(no logs available)
Failure - lava - fastboot-boot
KNOWN ISSUE - lava/fastboot-boot: Failure
(no logs available)
Failure - lava - auto-login-action
KNOWN ISSUE - lava/auto-login-action: Failure
(no logs available)
Failure - lava - login-action
KNOWN ISSUE - lava/login-action: Failure
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
KNOWN ISSUE - boot/gcc-13-lkftconfig-kunit: Failure
(no logs available)