Date
May 26, 2025, 9:10 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
Automatically assigned
[ 16.764230] ================================================================== [ 16.764662] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.765597] Write of size 1 at addr fff00000c3ef0a73 by task kunit_try_catch/136 [ 16.765714] [ 16.767069] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.767407] Tainted: [N]=TEST [ 16.767480] Hardware name: linux,dummy-virt (DT) [ 16.767803] Call trace: [ 16.767999] show_stack+0x20/0x38 (C) [ 16.768165] dump_stack_lvl+0x8c/0xd0 [ 16.768248] print_report+0x118/0x608 [ 16.768308] kasan_report+0xdc/0x128 [ 16.768391] __asan_report_store1_noabort+0x20/0x30 [ 16.768458] kmalloc_oob_right+0x5a4/0x660 [ 16.768520] kunit_try_run_case+0x170/0x3f0 [ 16.768583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.768643] kthread+0x328/0x630 [ 16.768695] ret_from_fork+0x10/0x20 [ 16.768870] [ 16.768913] Allocated by task 136: [ 16.769093] kasan_save_stack+0x3c/0x68 [ 16.769169] kasan_save_track+0x20/0x40 [ 16.769207] kasan_save_alloc_info+0x40/0x58 [ 16.769245] __kasan_kmalloc+0xd4/0xd8 [ 16.769279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.769330] kmalloc_oob_right+0xb0/0x660 [ 16.769369] kunit_try_run_case+0x170/0x3f0 [ 16.769405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.769445] kthread+0x328/0x630 [ 16.769476] ret_from_fork+0x10/0x20 [ 16.769532] [ 16.769597] The buggy address belongs to the object at fff00000c3ef0a00 [ 16.769597] which belongs to the cache kmalloc-128 of size 128 [ 16.769696] The buggy address is located 0 bytes to the right of [ 16.769696] allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73) [ 16.769759] [ 16.769854] The buggy address belongs to the physical page: [ 16.770083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.770403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.770732] page_type: f5(slab) [ 16.771278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.771429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.771625] page dumped because: kasan: bad access detected [ 16.771709] [ 16.771746] Memory state around the buggy address: [ 16.772007] fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.772082] fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772139] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.772195] ^ [ 16.772283] fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772351] fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772422] ================================================================== [ 16.786382] ================================================================== [ 16.786479] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.786585] Read of size 1 at addr fff00000c3ef0a80 by task kunit_try_catch/136 [ 16.786697] [ 16.786996] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.787181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.787469] Hardware name: linux,dummy-virt (DT) [ 16.787537] Call trace: [ 16.787586] show_stack+0x20/0x38 (C) [ 16.787698] dump_stack_lvl+0x8c/0xd0 [ 16.787821] print_report+0x118/0x608 [ 16.787943] kasan_report+0xdc/0x128 [ 16.788046] __asan_report_load1_noabort+0x20/0x30 [ 16.788211] kmalloc_oob_right+0x5d0/0x660 [ 16.788416] kunit_try_run_case+0x170/0x3f0 [ 16.788609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.788741] kthread+0x328/0x630 [ 16.789028] ret_from_fork+0x10/0x20 [ 16.789410] [ 16.789455] Allocated by task 136: [ 16.789711] kasan_save_stack+0x3c/0x68 [ 16.789891] kasan_save_track+0x20/0x40 [ 16.789977] kasan_save_alloc_info+0x40/0x58 [ 16.790061] __kasan_kmalloc+0xd4/0xd8 [ 16.790456] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.790594] kmalloc_oob_right+0xb0/0x660 [ 16.790682] kunit_try_run_case+0x170/0x3f0 [ 16.790816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.790949] kthread+0x328/0x630 [ 16.791194] ret_from_fork+0x10/0x20 [ 16.791278] [ 16.791316] The buggy address belongs to the object at fff00000c3ef0a00 [ 16.791316] which belongs to the cache kmalloc-128 of size 128 [ 16.791429] The buggy address is located 13 bytes to the right of [ 16.791429] allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73) [ 16.791551] [ 16.791589] The buggy address belongs to the physical page: [ 16.791645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.792001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.792164] page_type: f5(slab) [ 16.792275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.792390] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.792532] page dumped because: kasan: bad access detected [ 16.792639] [ 16.792692] Memory state around the buggy address: [ 16.792760] fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.792855] fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.792947] >fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793031] ^ [ 16.793092] fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793189] fff00000c3ef0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793307] ================================================================== [ 16.773787] ================================================================== [ 16.773868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.773971] Write of size 1 at addr fff00000c3ef0a78 by task kunit_try_catch/136 [ 16.774076] [ 16.774142] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.774332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.774392] Hardware name: linux,dummy-virt (DT) [ 16.774457] Call trace: [ 16.774508] show_stack+0x20/0x38 (C) [ 16.774633] dump_stack_lvl+0x8c/0xd0 [ 16.774747] print_report+0x118/0x608 [ 16.774859] kasan_report+0xdc/0x128 [ 16.774971] __asan_report_store1_noabort+0x20/0x30 [ 16.775094] kmalloc_oob_right+0x538/0x660 [ 16.775208] kunit_try_run_case+0x170/0x3f0 [ 16.777881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.778105] kthread+0x328/0x630 [ 16.778616] ret_from_fork+0x10/0x20 [ 16.779103] [ 16.779154] Allocated by task 136: [ 16.779211] kasan_save_stack+0x3c/0x68 [ 16.779596] kasan_save_track+0x20/0x40 [ 16.779905] kasan_save_alloc_info+0x40/0x58 [ 16.780017] __kasan_kmalloc+0xd4/0xd8 [ 16.780099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.780797] kmalloc_oob_right+0xb0/0x660 [ 16.781198] kunit_try_run_case+0x170/0x3f0 [ 16.781288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.781616] kthread+0x328/0x630 [ 16.781878] ret_from_fork+0x10/0x20 [ 16.781957] [ 16.782423] The buggy address belongs to the object at fff00000c3ef0a00 [ 16.782423] which belongs to the cache kmalloc-128 of size 128 [ 16.782575] The buggy address is located 5 bytes to the right of [ 16.782575] allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73) [ 16.782959] [ 16.783014] The buggy address belongs to the physical page: [ 16.783413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.783544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.783645] page_type: f5(slab) [ 16.784003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.784194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.784566] page dumped because: kasan: bad access detected [ 16.784822] [ 16.785057] Memory state around the buggy address: [ 16.785368] fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.785476] fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785566] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.785654] ^ [ 16.785743] fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785839] fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785924] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 20.557603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 20.586796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 20.568635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 20.560893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
Automatically assigned
[ 93.570458] Internal error: Oops: 0000000096000005 [#1] SMP [ 93.577609] Modules linked in: [ 93.579087] CPU: 1 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 93.579726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 93.580120] Hardware name: linux,dummy-virt (DT) [ 93.580758] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 93.581342] pc : kunit_test_null_dereference+0x70/0x170 [ 93.581753] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.582187] sp : ffff800082197d30 [ 93.582591] x29: ffff800082197d90 x28: 0000000000000000 x27: 0000000000000000 [ 93.583420] x26: 1ffe000018fad6a1 x25: 0000000000000000 x24: 0000000000000004 [ 93.584080] x23: fff00000c7d6b50c x22: ffffa1327c855688 x21: fff00000c1cde008 [ 93.584752] x20: 1ffff00010432fa6 x19: ffff800080087990 x18: fff00000c17653a8 [ 93.585400] x17: 0000000000000001 x16: fff00000da466d28 x15: fff00000ff616b08 [ 93.586059] x14: 0000000000018fff x13: 1ffe00001b48cd89 x12: fffd800018d1eb3c [ 93.586699] x11: 1ffe000018d1eb3b x10: fffd800018d1eb3b x9 : ffffa1327c84caf0 [ 93.587389] x8 : ffff800082197c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 93.587911] x5 : ffff700010432fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 93.588581] x2 : dfff800000000000 x1 : fff00000c68f5100 x0 : ffff800080087990 [ 93.589217] Call trace: [ 93.589503] kunit_test_null_dereference+0x70/0x170 (P) [ 93.590014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.590467] kthread+0x328/0x630 [ 93.590759] ret_from_fork+0x10/0x20 [ 93.591528] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 93.592432] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
Automatically assigned
[ 51.800025] ================================================================== [ 51.800143] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.800143] [ 51.800257] Use-after-free read at 0x00000000456a4f77 (in kfence-#172): [ 51.800334] test_krealloc+0x51c/0x830 [ 51.800390] kunit_try_run_case+0x170/0x3f0 [ 51.800449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.800506] kthread+0x328/0x630 [ 51.800549] ret_from_fork+0x10/0x20 [ 51.800593] [ 51.800625] kfence-#172: 0x00000000456a4f77-0x00000000d1cf39cf, size=32, cache=kmalloc-32 [ 51.800625] [ 51.800688] allocated by task 337 on cpu 1 at 51.799255s (0.001428s ago): [ 51.800764] test_alloc+0x29c/0x628 [ 51.800804] test_krealloc+0xc0/0x830 [ 51.800844] kunit_try_run_case+0x170/0x3f0 [ 51.800885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.800929] kthread+0x328/0x630 [ 51.800965] ret_from_fork+0x10/0x20 [ 51.801004] [ 51.801029] freed by task 337 on cpu 1 at 51.799584s (0.001441s ago): [ 51.801091] krealloc_noprof+0x148/0x360 [ 51.801130] test_krealloc+0x1dc/0x830 [ 51.801168] kunit_try_run_case+0x170/0x3f0 [ 51.801207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.801249] kthread+0x328/0x630 [ 51.801284] ret_from_fork+0x10/0x20 [ 51.801332] [ 51.801378] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 51.801461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.801493] Hardware name: linux,dummy-virt (DT) [ 51.801527] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
Automatically assigned
[ 51.703801] ================================================================== [ 51.703922] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.703922] [ 51.704036] Use-after-free read at 0x00000000a2c176bf (in kfence-#171): [ 51.704095] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.704144] kunit_try_run_case+0x170/0x3f0 [ 51.704191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.704236] kthread+0x328/0x630 [ 51.704273] ret_from_fork+0x10/0x20 [ 51.704312] [ 51.704355] kfence-#171: 0x00000000a2c176bf-0x000000000108ae3c, size=32, cache=test [ 51.704355] [ 51.704411] allocated by task 335 on cpu 1 at 51.691328s (0.013079s ago): [ 51.704494] test_alloc+0x230/0x628 [ 51.704543] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.704587] kunit_try_run_case+0x170/0x3f0 [ 51.704627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.704671] kthread+0x328/0x630 [ 51.704704] ret_from_fork+0x10/0x20 [ 51.704741] [ 51.704767] freed by task 335 on cpu 1 at 51.691457s (0.013306s ago): [ 51.704823] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.704865] kunit_try_run_case+0x170/0x3f0 [ 51.704904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.704945] kthread+0x328/0x630 [ 51.704977] ret_from_fork+0x10/0x20 [ 51.705016] [ 51.705063] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 51.705140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.705168] Hardware name: linux,dummy-virt (DT) [ 51.705202] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
Automatically assigned
[ 29.248436] ================================================================== [ 29.248653] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 29.248653] [ 29.248802] Invalid read at 0x00000000a32ecd8d: [ 29.248950] test_invalid_access+0xdc/0x1f0 [ 29.249042] kunit_try_run_case+0x170/0x3f0 [ 29.249104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.249158] kthread+0x328/0x630 [ 29.249311] ret_from_fork+0x10/0x20 [ 29.249450] [ 29.249561] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 29.249970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.250143] Hardware name: linux,dummy-virt (DT) [ 29.250347] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
Automatically assigned
[ 22.561856] ================================================================== [ 22.562037] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.562037] [ 22.562214] Out-of-bounds write at 0x000000003122ac8e (1B left of kfence-#104): [ 22.562345] test_out_of_bounds_write+0x100/0x240 [ 22.562440] kunit_try_run_case+0x170/0x3f0 [ 22.562976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.563869] kthread+0x328/0x630 [ 22.563986] ret_from_fork+0x10/0x20 [ 22.564094] [ 22.564153] kfence-#104: 0x00000000d78e7a82-0x000000009288fc6d, size=32, cache=test [ 22.564153] [ 22.564275] allocated by task 293 on cpu 0 at 22.561069s (0.003198s ago): [ 22.564427] test_alloc+0x230/0x628 [ 22.564527] test_out_of_bounds_write+0xc8/0x240 [ 22.564624] kunit_try_run_case+0x170/0x3f0 [ 22.564729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.564824] kthread+0x328/0x630 [ 22.564900] ret_from_fork+0x10/0x20 [ 22.564991] [ 22.565085] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 22.565265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.565342] Hardware name: linux,dummy-virt (DT) [ 22.565411] ================================================================== [ 22.456696] ================================================================== [ 22.457852] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.457852] [ 22.458119] Out-of-bounds write at 0x00000000fb6870c5 (1B left of kfence-#103): [ 22.458389] test_out_of_bounds_write+0x100/0x240 [ 22.458748] kunit_try_run_case+0x170/0x3f0 [ 22.459110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.459499] kthread+0x328/0x630 [ 22.459693] ret_from_fork+0x10/0x20 [ 22.459784] [ 22.460223] kfence-#103: 0x0000000078bdd4fd-0x0000000046ce4f0e, size=32, cache=kmalloc-32 [ 22.460223] [ 22.460364] allocated by task 291 on cpu 0 at 22.456411s (0.003944s ago): [ 22.460737] test_alloc+0x29c/0x628 [ 22.461047] test_out_of_bounds_write+0xc8/0x240 [ 22.461373] kunit_try_run_case+0x170/0x3f0 [ 22.461814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.462154] kthread+0x328/0x630 [ 22.462239] ret_from_fork+0x10/0x20 [ 22.462567] [ 22.462821] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 22.462999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.463052] Hardware name: linux,dummy-virt (DT) [ 22.463365] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
Automatically assigned
[ 29.007942] ================================================================== [ 29.008053] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 29.008053] [ 29.008122] Corrupted memory at 0x00000000bd2894e9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#166): [ 29.008437] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 29.008504] kunit_try_run_case+0x170/0x3f0 [ 29.008551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.008594] kthread+0x328/0x630 [ 29.008631] ret_from_fork+0x10/0x20 [ 29.008671] [ 29.008696] kfence-#166: 0x00000000ac65a7c9-0x00000000c108eb28, size=73, cache=kmalloc-96 [ 29.008696] [ 29.008756] allocated by task 325 on cpu 1 at 29.007643s (0.001108s ago): [ 29.008818] test_alloc+0x29c/0x628 [ 29.008861] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 29.008905] kunit_try_run_case+0x170/0x3f0 [ 29.008945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.008989] kthread+0x328/0x630 [ 29.009024] ret_from_fork+0x10/0x20 [ 29.009063] [ 29.009089] freed by task 325 on cpu 1 at 29.007798s (0.001287s ago): [ 29.009150] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 29.009194] kunit_try_run_case+0x170/0x3f0 [ 29.009234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.009277] kthread+0x328/0x630 [ 29.009313] ret_from_fork+0x10/0x20 [ 29.009365] [ 29.009411] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 29.009494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.009524] Hardware name: linux,dummy-virt (DT) [ 29.009557] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
Automatically assigned
[ 28.592000] ================================================================== [ 28.592122] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.592122] [ 28.592242] Out-of-bounds read at 0x000000002a18ba02 (105B right of kfence-#162): [ 28.592310] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.592392] kunit_try_run_case+0x170/0x3f0 [ 28.592444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.592507] kthread+0x328/0x630 [ 28.592550] ret_from_fork+0x10/0x20 [ 28.592594] [ 28.592623] kfence-#162: 0x000000006291d453-0x000000007cff0b7a, size=73, cache=kmalloc-96 [ 28.592623] [ 28.592685] allocated by task 323 on cpu 1 at 28.591610s (0.001070s ago): [ 28.592766] test_alloc+0x29c/0x628 [ 28.592812] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.592861] kunit_try_run_case+0x170/0x3f0 [ 28.592905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.592951] kthread+0x328/0x630 [ 28.592992] ret_from_fork+0x10/0x20 [ 28.593036] [ 28.593089] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 28.593183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.593218] Hardware name: linux,dummy-virt (DT) [ 28.593260] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
Automatically assigned
[ 23.498283] ================================================================== [ 23.498479] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 23.498479] [ 23.498802] Corrupted memory at 0x000000002d44de56 [ ! . . . . . . . . . . . . . . . ] (in kfence-#113): [ 23.500069] test_corruption+0x278/0x378 [ 23.500158] kunit_try_run_case+0x170/0x3f0 [ 23.500393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.500467] kthread+0x328/0x630 [ 23.500520] ret_from_fork+0x10/0x20 [ 23.500580] [ 23.500609] kfence-#113: 0x0000000027f97248-0x000000009c1f9c55, size=32, cache=kmalloc-32 [ 23.500609] [ 23.500675] allocated by task 311 on cpu 0 at 23.497442s (0.003228s ago): [ 23.501224] test_alloc+0x29c/0x628 [ 23.501441] test_corruption+0xdc/0x378 [ 23.501574] kunit_try_run_case+0x170/0x3f0 [ 23.501623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.502011] kthread+0x328/0x630 [ 23.502054] ret_from_fork+0x10/0x20 [ 23.502351] [ 23.502445] freed by task 311 on cpu 0 at 23.497572s (0.004864s ago): [ 23.502742] test_corruption+0x278/0x378 [ 23.502791] kunit_try_run_case+0x170/0x3f0 [ 23.502837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.503270] kthread+0x328/0x630 [ 23.503543] ret_from_fork+0x10/0x20 [ 23.503617] [ 23.503796] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.503927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.503970] Hardware name: linux,dummy-virt (DT) [ 23.504132] ================================================================== [ 23.807890] ================================================================== [ 23.808011] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 23.808011] [ 23.808091] Corrupted memory at 0x0000000007b932bc [ ! . . . . . . . . . . . . . . . ] (in kfence-#116): [ 23.808450] test_corruption+0x120/0x378 [ 23.808520] kunit_try_run_case+0x170/0x3f0 [ 23.808574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.808625] kthread+0x328/0x630 [ 23.808668] ret_from_fork+0x10/0x20 [ 23.808712] [ 23.808741] kfence-#116: 0x00000000a151ee2a-0x0000000005d026de, size=32, cache=test [ 23.808741] [ 23.808802] allocated by task 313 on cpu 0 at 23.807720s (0.001078s ago): [ 23.808874] test_alloc+0x230/0x628 [ 23.808918] test_corruption+0xdc/0x378 [ 23.808963] kunit_try_run_case+0x170/0x3f0 [ 23.809006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.809053] kthread+0x328/0x630 [ 23.809093] ret_from_fork+0x10/0x20 [ 23.809136] [ 23.809162] freed by task 313 on cpu 0 at 23.807787s (0.001371s ago): [ 23.809224] test_corruption+0x120/0x378 [ 23.809265] kunit_try_run_case+0x170/0x3f0 [ 23.809306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.809363] kthread+0x328/0x630 [ 23.809402] ret_from_fork+0x10/0x20 [ 23.809442] [ 23.809490] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.809573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.809606] Hardware name: linux,dummy-virt (DT) [ 23.809642] ================================================================== [ 24.119774] ================================================================== [ 24.119932] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 24.119932] [ 24.120008] Corrupted memory at 0x00000000c54a0522 [ ! ] (in kfence-#119): [ 24.120142] test_corruption+0x1d8/0x378 [ 24.120196] kunit_try_run_case+0x170/0x3f0 [ 24.120245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.120296] kthread+0x328/0x630 [ 24.120364] ret_from_fork+0x10/0x20 [ 24.120410] [ 24.120437] kfence-#119: 0x00000000ca1c910e-0x00000000ca49a93f, size=32, cache=test [ 24.120437] [ 24.120514] allocated by task 313 on cpu 0 at 24.119515s (0.000994s ago): [ 24.120588] test_alloc+0x230/0x628 [ 24.120636] test_corruption+0x198/0x378 [ 24.120681] kunit_try_run_case+0x170/0x3f0 [ 24.120725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.120772] kthread+0x328/0x630 [ 24.120811] ret_from_fork+0x10/0x20 [ 24.120854] [ 24.120880] freed by task 313 on cpu 0 at 24.119614s (0.001262s ago): [ 24.120948] test_corruption+0x1d8/0x378 [ 24.120992] kunit_try_run_case+0x170/0x3f0 [ 24.121033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.121081] kthread+0x328/0x630 [ 24.121120] ret_from_fork+0x10/0x20 [ 24.121162] [ 24.121211] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 24.121302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.121347] Hardware name: linux,dummy-virt (DT) [ 24.121388] ================================================================== [ 23.599831] ================================================================== [ 23.599956] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 23.599956] [ 23.600030] Corrupted memory at 0x000000007da9dd45 [ ! ] (in kfence-#114): [ 23.600175] test_corruption+0x284/0x378 [ 23.600230] kunit_try_run_case+0x170/0x3f0 [ 23.600278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.600338] kthread+0x328/0x630 [ 23.600386] ret_from_fork+0x10/0x20 [ 23.600431] [ 23.600467] kfence-#114: 0x00000000d7ed66a0-0x0000000007007fd7, size=32, cache=kmalloc-32 [ 23.600467] [ 23.600541] allocated by task 311 on cpu 0 at 23.599494s (0.001042s ago): [ 23.600613] test_alloc+0x29c/0x628 [ 23.600661] test_corruption+0x198/0x378 [ 23.600702] kunit_try_run_case+0x170/0x3f0 [ 23.600746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.600793] kthread+0x328/0x630 [ 23.600833] ret_from_fork+0x10/0x20 [ 23.600873] [ 23.600898] freed by task 311 on cpu 0 at 23.599617s (0.001277s ago): [ 23.600962] test_corruption+0x284/0x378 [ 23.601005] kunit_try_run_case+0x170/0x3f0 [ 23.601049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.601094] kthread+0x328/0x630 [ 23.601131] ret_from_fork+0x10/0x20 [ 23.601172] [ 23.601218] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.601306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.601349] Hardware name: linux,dummy-virt (DT) [ 23.601388] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
Automatically assigned
[ 23.287469] ================================================================== [ 23.287566] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 23.287566] [ 23.287634] Invalid free of 0x0000000090129151 (in kfence-#111): [ 23.287690] test_invalid_addr_free+0x1ac/0x238 [ 23.287742] kunit_try_run_case+0x170/0x3f0 [ 23.287791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.287837] kthread+0x328/0x630 [ 23.287876] ret_from_fork+0x10/0x20 [ 23.287918] [ 23.287945] kfence-#111: 0x00000000ea84e820-0x00000000ca35bded, size=32, cache=kmalloc-32 [ 23.287945] [ 23.288006] allocated by task 307 on cpu 0 at 23.287285s (0.000717s ago): [ 23.288073] test_alloc+0x29c/0x628 [ 23.288116] test_invalid_addr_free+0xd4/0x238 [ 23.288170] kunit_try_run_case+0x170/0x3f0 [ 23.288221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.288264] kthread+0x328/0x630 [ 23.288340] ret_from_fork+0x10/0x20 [ 23.288425] [ 23.288548] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.288693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.288725] Hardware name: linux,dummy-virt (DT) [ 23.288798] ================================================================== [ 23.391668] ================================================================== [ 23.391766] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 23.391766] [ 23.391830] Invalid free of 0x00000000d929a14b (in kfence-#112): [ 23.391889] test_invalid_addr_free+0xec/0x238 [ 23.391938] kunit_try_run_case+0x170/0x3f0 [ 23.391985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.392031] kthread+0x328/0x630 [ 23.392069] ret_from_fork+0x10/0x20 [ 23.392111] [ 23.392137] kfence-#112: 0x000000009e6bfb40-0x00000000055ec2a5, size=32, cache=test [ 23.392137] [ 23.392196] allocated by task 309 on cpu 0 at 23.391514s (0.000677s ago): [ 23.392266] test_alloc+0x230/0x628 [ 23.392311] test_invalid_addr_free+0xd4/0x238 [ 23.392370] kunit_try_run_case+0x170/0x3f0 [ 23.392414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.392468] kthread+0x328/0x630 [ 23.392514] ret_from_fork+0x10/0x20 [ 23.392558] [ 23.392612] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.392705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.392739] Hardware name: linux,dummy-virt (DT) [ 23.392778] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
Automatically assigned
[ 23.082237] ================================================================== [ 23.082472] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 23.082472] [ 23.082621] Invalid free of 0x0000000016d85281 (in kfence-#109): [ 23.082828] test_double_free+0x1bc/0x238 [ 23.082961] kunit_try_run_case+0x170/0x3f0 [ 23.083067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.083145] kthread+0x328/0x630 [ 23.083218] ret_from_fork+0x10/0x20 [ 23.083302] [ 23.083382] kfence-#109: 0x0000000016d85281-0x00000000714381cb, size=32, cache=kmalloc-32 [ 23.083382] [ 23.083543] allocated by task 303 on cpu 0 at 23.081268s (0.002220s ago): [ 23.083766] test_alloc+0x29c/0x628 [ 23.083899] test_double_free+0xd4/0x238 [ 23.084003] kunit_try_run_case+0x170/0x3f0 [ 23.084130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.084305] kthread+0x328/0x630 [ 23.084505] ret_from_fork+0x10/0x20 [ 23.084601] [ 23.084864] freed by task 303 on cpu 0 at 23.081436s (0.003414s ago): [ 23.085077] test_double_free+0x1ac/0x238 [ 23.085200] kunit_try_run_case+0x170/0x3f0 [ 23.085341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.085440] kthread+0x328/0x630 [ 23.085526] ret_from_fork+0x10/0x20 [ 23.085852] [ 23.085948] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.086231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.086430] Hardware name: linux,dummy-virt (DT) [ 23.086585] ================================================================== [ 23.184009] ================================================================== [ 23.184103] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 23.184103] [ 23.184164] Invalid free of 0x00000000e1cdb67a (in kfence-#110): [ 23.184221] test_double_free+0x100/0x238 [ 23.184365] kunit_try_run_case+0x170/0x3f0 [ 23.184422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.184478] kthread+0x328/0x630 [ 23.184530] ret_from_fork+0x10/0x20 [ 23.184571] [ 23.184599] kfence-#110: 0x00000000e1cdb67a-0x00000000504e2f1d, size=32, cache=test [ 23.184599] [ 23.184661] allocated by task 305 on cpu 0 at 23.183265s (0.001391s ago): [ 23.184729] test_alloc+0x230/0x628 [ 23.184770] test_double_free+0xd4/0x238 [ 23.185311] kunit_try_run_case+0x170/0x3f0 [ 23.185443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.185500] kthread+0x328/0x630 [ 23.185538] ret_from_fork+0x10/0x20 [ 23.185621] [ 23.185653] freed by task 305 on cpu 0 at 23.183357s (0.002290s ago): [ 23.185731] test_double_free+0xf0/0x238 [ 23.186105] kunit_try_run_case+0x170/0x3f0 [ 23.186421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.186493] kthread+0x328/0x630 [ 23.186531] ret_from_fork+0x10/0x20 [ 23.186798] [ 23.187178] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 23.187439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.187640] Hardware name: linux,dummy-virt (DT) [ 23.187897] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
Automatically assigned
[ 22.770350] ================================================================== [ 22.770505] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.770505] [ 22.771022] Use-after-free read at 0x000000000ccb60a1 (in kfence-#106): [ 22.771162] test_use_after_free_read+0x114/0x248 [ 22.771774] kunit_try_run_case+0x170/0x3f0 [ 22.771886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.771991] kthread+0x328/0x630 [ 22.772422] ret_from_fork+0x10/0x20 [ 22.772598] [ 22.772673] kfence-#106: 0x000000000ccb60a1-0x000000006644583e, size=32, cache=test [ 22.772673] [ 22.773204] allocated by task 297 on cpu 0 at 22.768672s (0.004521s ago): [ 22.773368] test_alloc+0x230/0x628 [ 22.773809] test_use_after_free_read+0xd0/0x248 [ 22.773908] kunit_try_run_case+0x170/0x3f0 [ 22.773989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.774476] kthread+0x328/0x630 [ 22.774578] ret_from_fork+0x10/0x20 [ 22.774961] [ 22.775059] freed by task 297 on cpu 0 at 22.768773s (0.006277s ago): [ 22.775502] test_use_after_free_read+0xf0/0x248 [ 22.775610] kunit_try_run_case+0x170/0x3f0 [ 22.775700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.776131] kthread+0x328/0x630 [ 22.776219] ret_from_fork+0x10/0x20 [ 22.776302] [ 22.776892] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 22.777262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.777458] Hardware name: linux,dummy-virt (DT) [ 22.777883] ================================================================== [ 22.665748] ================================================================== [ 22.666238] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.666238] [ 22.666859] Use-after-free read at 0x00000000fa56cf99 (in kfence-#105): [ 22.667007] test_use_after_free_read+0x114/0x248 [ 22.667118] kunit_try_run_case+0x170/0x3f0 [ 22.667198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.667270] kthread+0x328/0x630 [ 22.667349] ret_from_fork+0x10/0x20 [ 22.667410] [ 22.667454] kfence-#105: 0x00000000fa56cf99-0x000000003c485cfb, size=32, cache=kmalloc-32 [ 22.667454] [ 22.667557] allocated by task 295 on cpu 0 at 22.664487s (0.003062s ago): [ 22.667701] test_alloc+0x29c/0x628 [ 22.667786] test_use_after_free_read+0xd0/0x248 [ 22.668212] kunit_try_run_case+0x170/0x3f0 [ 22.668338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.668708] kthread+0x328/0x630 [ 22.668791] ret_from_fork+0x10/0x20 [ 22.668884] [ 22.668936] freed by task 295 on cpu 0 at 22.664940s (0.003988s ago): [ 22.669074] test_use_after_free_read+0x1c0/0x248 [ 22.669165] kunit_try_run_case+0x170/0x3f0 [ 22.669259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.670105] kthread+0x328/0x630 [ 22.670209] ret_from_fork+0x10/0x20 [ 22.670403] [ 22.670559] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 22.670968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.671118] Hardware name: linux,dummy-virt (DT) [ 22.671202] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
Automatically assigned
[ 22.250237] ================================================================== [ 22.250502] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 22.250502] [ 22.250783] Out-of-bounds read at 0x00000000a9cb5eb2 (32B right of kfence-#101): [ 22.250909] test_out_of_bounds_read+0x1c8/0x3e0 [ 22.251013] kunit_try_run_case+0x170/0x3f0 [ 22.251104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.251200] kthread+0x328/0x630 [ 22.251279] ret_from_fork+0x10/0x20 [ 22.251377] [ 22.251434] kfence-#101: 0x00000000a0d9fa4e-0x00000000537914da, size=32, cache=test [ 22.251434] [ 22.251899] allocated by task 289 on cpu 0 at 22.249721s (0.002153s ago): [ 22.252124] test_alloc+0x230/0x628 [ 22.252225] test_out_of_bounds_read+0x198/0x3e0 [ 22.252442] kunit_try_run_case+0x170/0x3f0 [ 22.252735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.252828] kthread+0x328/0x630 [ 22.253042] ret_from_fork+0x10/0x20 [ 22.253355] [ 22.253578] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 22.254013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.254269] Hardware name: linux,dummy-virt (DT) [ 22.254435] ================================================================== [ 21.832931] ================================================================== [ 21.833162] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.833162] [ 21.833414] Out-of-bounds read at 0x00000000d53b03bc (32B right of kfence-#97): [ 21.833539] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.833650] kunit_try_run_case+0x170/0x3f0 [ 21.833733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.833813] kthread+0x328/0x630 [ 21.833888] ret_from_fork+0x10/0x20 [ 21.833961] [ 21.834018] kfence-#97: 0x00000000c46db671-0x000000007d182a7a, size=32, cache=kmalloc-32 [ 21.834018] [ 21.834139] allocated by task 287 on cpu 0 at 21.832369s (0.001761s ago): [ 21.834304] test_alloc+0x29c/0x628 [ 21.834394] test_out_of_bounds_read+0x198/0x3e0 [ 21.834476] kunit_try_run_case+0x170/0x3f0 [ 21.834550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.834639] kthread+0x328/0x630 [ 21.834717] ret_from_fork+0x10/0x20 [ 21.834918] [ 21.835020] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.835307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.835717] Hardware name: linux,dummy-virt (DT) [ 21.835817] ================================================================== [ 22.044082] ================================================================== [ 22.044358] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 22.044358] [ 22.044970] Out-of-bounds read at 0x0000000016f85214 (1B left of kfence-#99): [ 22.045566] test_out_of_bounds_read+0x114/0x3e0 [ 22.046340] kunit_try_run_case+0x170/0x3f0 [ 22.046588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.046696] kthread+0x328/0x630 [ 22.046789] ret_from_fork+0x10/0x20 [ 22.046876] [ 22.047642] kfence-#99: 0x000000002dfe1980-0x00000000d625c233, size=32, cache=test [ 22.047642] [ 22.047904] allocated by task 289 on cpu 0 at 22.042213s (0.005652s ago): [ 22.048599] test_alloc+0x230/0x628 [ 22.048928] test_out_of_bounds_read+0xdc/0x3e0 [ 22.049333] kunit_try_run_case+0x170/0x3f0 [ 22.049656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.050190] kthread+0x328/0x630 [ 22.050367] ret_from_fork+0x10/0x20 [ 22.050453] [ 22.051061] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 22.051514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.051581] Hardware name: linux,dummy-virt (DT) [ 22.051913] ================================================================== [ 21.624938] ================================================================== [ 21.625163] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.625163] [ 21.625474] Out-of-bounds read at 0x00000000da348c44 (1B left of kfence-#95): [ 21.625688] test_out_of_bounds_read+0x114/0x3e0 [ 21.625806] kunit_try_run_case+0x170/0x3f0 [ 21.625903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.626002] kthread+0x328/0x630 [ 21.626095] ret_from_fork+0x10/0x20 [ 21.626221] [ 21.626301] kfence-#95: 0x0000000045dd50ac-0x00000000961b10b2, size=32, cache=kmalloc-32 [ 21.626301] [ 21.626419] allocated by task 287 on cpu 0 at 21.624466s (0.001945s ago): [ 21.626570] test_alloc+0x29c/0x628 [ 21.626696] test_out_of_bounds_read+0xdc/0x3e0 [ 21.627088] kunit_try_run_case+0x170/0x3f0 [ 21.627196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.627282] kthread+0x328/0x630 [ 21.627366] ret_from_fork+0x10/0x20 [ 21.627838] [ 21.627940] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.628125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.628195] Hardware name: linux,dummy-virt (DT) [ 21.628284] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
Automatically assigned
[ 21.337614] ================================================================== [ 21.337739] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 21.337851] Write of size 1 at addr fff00000c7893378 by task kunit_try_catch/285 [ 21.338290] [ 21.338549] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.338808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.338866] Hardware name: linux,dummy-virt (DT) [ 21.338943] Call trace: [ 21.339152] show_stack+0x20/0x38 (C) [ 21.339395] dump_stack_lvl+0x8c/0xd0 [ 21.339551] print_report+0x118/0x608 [ 21.339656] kasan_report+0xdc/0x128 [ 21.339964] __asan_report_store1_noabort+0x20/0x30 [ 21.340091] strncpy_from_user+0x270/0x2a0 [ 21.340208] copy_user_test_oob+0x5c0/0xec8 [ 21.340316] kunit_try_run_case+0x170/0x3f0 [ 21.340463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.340581] kthread+0x328/0x630 [ 21.340691] ret_from_fork+0x10/0x20 [ 21.340794] [ 21.340844] Allocated by task 285: [ 21.340906] kasan_save_stack+0x3c/0x68 [ 21.341006] kasan_save_track+0x20/0x40 [ 21.341269] kasan_save_alloc_info+0x40/0x58 [ 21.341473] __kasan_kmalloc+0xd4/0xd8 [ 21.341755] __kmalloc_noprof+0x190/0x4d0 [ 21.341987] kunit_kmalloc_array+0x34/0x88 [ 21.342074] copy_user_test_oob+0xac/0xec8 [ 21.342399] kunit_try_run_case+0x170/0x3f0 [ 21.342632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.342805] kthread+0x328/0x630 [ 21.342882] ret_from_fork+0x10/0x20 [ 21.342987] [ 21.343043] The buggy address belongs to the object at fff00000c7893300 [ 21.343043] which belongs to the cache kmalloc-128 of size 128 [ 21.343238] The buggy address is located 0 bytes to the right of [ 21.343238] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.343481] [ 21.343539] The buggy address belongs to the physical page: [ 21.343612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.343704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.343833] page_type: f5(slab) [ 21.343922] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.344032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.344129] page dumped because: kasan: bad access detected [ 21.344274] [ 21.344372] Memory state around the buggy address: [ 21.344478] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.344603] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.344739] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.344842] ^ [ 21.344979] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.345095] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.345197] ================================================================== [ 21.325635] ================================================================== [ 21.325747] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 21.325914] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.326077] [ 21.326180] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.326404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.326466] Hardware name: linux,dummy-virt (DT) [ 21.326532] Call trace: [ 21.326807] show_stack+0x20/0x38 (C) [ 21.327147] dump_stack_lvl+0x8c/0xd0 [ 21.327375] print_report+0x118/0x608 [ 21.327515] kasan_report+0xdc/0x128 [ 21.327630] kasan_check_range+0x100/0x1a8 [ 21.328160] __kasan_check_write+0x20/0x30 [ 21.328288] strncpy_from_user+0x3c/0x2a0 [ 21.328751] copy_user_test_oob+0x5c0/0xec8 [ 21.328971] kunit_try_run_case+0x170/0x3f0 [ 21.329290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.329443] kthread+0x328/0x630 [ 21.329662] ret_from_fork+0x10/0x20 [ 21.329794] [ 21.329881] Allocated by task 285: [ 21.329948] kasan_save_stack+0x3c/0x68 [ 21.330036] kasan_save_track+0x20/0x40 [ 21.330113] kasan_save_alloc_info+0x40/0x58 [ 21.330201] __kasan_kmalloc+0xd4/0xd8 [ 21.330315] __kmalloc_noprof+0x190/0x4d0 [ 21.330707] kunit_kmalloc_array+0x34/0x88 [ 21.330982] copy_user_test_oob+0xac/0xec8 [ 21.331155] kunit_try_run_case+0x170/0x3f0 [ 21.331241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.331580] kthread+0x328/0x630 [ 21.331733] ret_from_fork+0x10/0x20 [ 21.331819] [ 21.332142] The buggy address belongs to the object at fff00000c7893300 [ 21.332142] which belongs to the cache kmalloc-128 of size 128 [ 21.332392] The buggy address is located 0 bytes inside of [ 21.332392] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.332800] [ 21.332869] The buggy address belongs to the physical page: [ 21.333080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.333833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.333977] page_type: f5(slab) [ 21.334202] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.334383] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.334480] page dumped because: kasan: bad access detected [ 21.334813] [ 21.334859] Memory state around the buggy address: [ 21.334990] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.335256] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.335369] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.335455] ^ [ 21.335531] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.335622] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.335711] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
Automatically assigned
[ 21.301953] ================================================================== [ 21.302086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.302198] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.302312] [ 21.302392] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.302576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.302631] Hardware name: linux,dummy-virt (DT) [ 21.302704] Call trace: [ 21.302755] show_stack+0x20/0x38 (C) [ 21.303649] dump_stack_lvl+0x8c/0xd0 [ 21.303919] print_report+0x118/0x608 [ 21.304488] kasan_report+0xdc/0x128 [ 21.304616] kasan_check_range+0x100/0x1a8 [ 21.304855] __kasan_check_write+0x20/0x30 [ 21.305233] copy_user_test_oob+0x434/0xec8 [ 21.305355] kunit_try_run_case+0x170/0x3f0 [ 21.305471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.305581] kthread+0x328/0x630 [ 21.305964] ret_from_fork+0x10/0x20 [ 21.306171] [ 21.306602] Allocated by task 285: [ 21.306689] kasan_save_stack+0x3c/0x68 [ 21.306995] kasan_save_track+0x20/0x40 [ 21.307122] kasan_save_alloc_info+0x40/0x58 [ 21.307553] __kasan_kmalloc+0xd4/0xd8 [ 21.307735] __kmalloc_noprof+0x190/0x4d0 [ 21.308033] kunit_kmalloc_array+0x34/0x88 [ 21.308209] copy_user_test_oob+0xac/0xec8 [ 21.308284] kunit_try_run_case+0x170/0x3f0 [ 21.308368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.308474] kthread+0x328/0x630 [ 21.309295] ret_from_fork+0x10/0x20 [ 21.309396] [ 21.309444] The buggy address belongs to the object at fff00000c7893300 [ 21.309444] which belongs to the cache kmalloc-128 of size 128 [ 21.309587] The buggy address is located 0 bytes inside of [ 21.309587] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.309740] [ 21.309793] The buggy address belongs to the physical page: [ 21.310346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.310537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.310649] page_type: f5(slab) [ 21.310738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.310895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.310998] page dumped because: kasan: bad access detected [ 21.311213] [ 21.311378] Memory state around the buggy address: [ 21.311595] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.311697] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.311887] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.312175] ^ [ 21.312282] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.312393] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.312625] ================================================================== [ 21.285138] ================================================================== [ 21.285562] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.285707] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.285838] [ 21.285931] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.286148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.286217] Hardware name: linux,dummy-virt (DT) [ 21.286297] Call trace: [ 21.286356] show_stack+0x20/0x38 (C) [ 21.286465] dump_stack_lvl+0x8c/0xd0 [ 21.286573] print_report+0x118/0x608 [ 21.286681] kasan_report+0xdc/0x128 [ 21.286793] kasan_check_range+0x100/0x1a8 [ 21.286909] __kasan_check_write+0x20/0x30 [ 21.287010] copy_user_test_oob+0x35c/0xec8 [ 21.287120] kunit_try_run_case+0x170/0x3f0 [ 21.287234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.287366] kthread+0x328/0x630 [ 21.287464] ret_from_fork+0x10/0x20 [ 21.287573] [ 21.287618] Allocated by task 285: [ 21.287681] kasan_save_stack+0x3c/0x68 [ 21.287773] kasan_save_track+0x20/0x40 [ 21.287855] kasan_save_alloc_info+0x40/0x58 [ 21.287944] __kasan_kmalloc+0xd4/0xd8 [ 21.288023] __kmalloc_noprof+0x190/0x4d0 [ 21.288115] kunit_kmalloc_array+0x34/0x88 [ 21.289455] copy_user_test_oob+0xac/0xec8 [ 21.289613] kunit_try_run_case+0x170/0x3f0 [ 21.289690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.289772] kthread+0x328/0x630 [ 21.289842] ret_from_fork+0x10/0x20 [ 21.289938] [ 21.290068] The buggy address belongs to the object at fff00000c7893300 [ 21.290068] which belongs to the cache kmalloc-128 of size 128 [ 21.290200] The buggy address is located 0 bytes inside of [ 21.290200] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.290348] [ 21.290489] The buggy address belongs to the physical page: [ 21.290579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.290696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.290809] page_type: f5(slab) [ 21.290893] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.290996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.291265] page dumped because: kasan: bad access detected [ 21.291468] [ 21.291768] Memory state around the buggy address: [ 21.291881] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.292163] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.292284] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.292598] ^ [ 21.292905] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.293012] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.293311] ================================================================== [ 21.249936] ================================================================== [ 21.250594] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.251174] Write of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.251696] [ 21.251814] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.252016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.252524] Hardware name: linux,dummy-virt (DT) [ 21.252944] Call trace: [ 21.253089] show_stack+0x20/0x38 (C) [ 21.253386] dump_stack_lvl+0x8c/0xd0 [ 21.253957] print_report+0x118/0x608 [ 21.254129] kasan_report+0xdc/0x128 [ 21.254229] kasan_check_range+0x100/0x1a8 [ 21.254342] __kasan_check_write+0x20/0x30 [ 21.254459] copy_user_test_oob+0x234/0xec8 [ 21.254564] kunit_try_run_case+0x170/0x3f0 [ 21.254675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.255063] kthread+0x328/0x630 [ 21.255179] ret_from_fork+0x10/0x20 [ 21.255238] [ 21.255261] Allocated by task 285: [ 21.255299] kasan_save_stack+0x3c/0x68 [ 21.255432] kasan_save_track+0x20/0x40 [ 21.255537] kasan_save_alloc_info+0x40/0x58 [ 21.255652] __kasan_kmalloc+0xd4/0xd8 [ 21.255740] __kmalloc_noprof+0x190/0x4d0 [ 21.255835] kunit_kmalloc_array+0x34/0x88 [ 21.255956] copy_user_test_oob+0xac/0xec8 [ 21.256029] kunit_try_run_case+0x170/0x3f0 [ 21.256100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.256207] kthread+0x328/0x630 [ 21.256278] ret_from_fork+0x10/0x20 [ 21.256371] [ 21.256420] The buggy address belongs to the object at fff00000c7893300 [ 21.256420] which belongs to the cache kmalloc-128 of size 128 [ 21.256640] The buggy address is located 0 bytes inside of [ 21.256640] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.256803] [ 21.256857] The buggy address belongs to the physical page: [ 21.256986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.257184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.257364] page_type: f5(slab) [ 21.257476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.257593] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.257690] page dumped because: kasan: bad access detected [ 21.257794] [ 21.257853] Memory state around the buggy address: [ 21.257948] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.258105] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.258211] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.258304] ^ [ 21.258407] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.258528] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.258655] ================================================================== [ 21.314428] ================================================================== [ 21.314542] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.314649] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.314764] [ 21.315437] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.315707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.315993] Hardware name: linux,dummy-virt (DT) [ 21.316114] Call trace: [ 21.316164] show_stack+0x20/0x38 (C) [ 21.316275] dump_stack_lvl+0x8c/0xd0 [ 21.316413] print_report+0x118/0x608 [ 21.316603] kasan_report+0xdc/0x128 [ 21.316918] kasan_check_range+0x100/0x1a8 [ 21.317025] __kasan_check_read+0x20/0x30 [ 21.317135] copy_user_test_oob+0x4a0/0xec8 [ 21.317298] kunit_try_run_case+0x170/0x3f0 [ 21.317491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.317628] kthread+0x328/0x630 [ 21.317721] ret_from_fork+0x10/0x20 [ 21.317826] [ 21.317872] Allocated by task 285: [ 21.317940] kasan_save_stack+0x3c/0x68 [ 21.318028] kasan_save_track+0x20/0x40 [ 21.318125] kasan_save_alloc_info+0x40/0x58 [ 21.318212] __kasan_kmalloc+0xd4/0xd8 [ 21.318291] __kmalloc_noprof+0x190/0x4d0 [ 21.318703] kunit_kmalloc_array+0x34/0x88 [ 21.318865] copy_user_test_oob+0xac/0xec8 [ 21.319011] kunit_try_run_case+0x170/0x3f0 [ 21.319136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.319279] kthread+0x328/0x630 [ 21.319377] ret_from_fork+0x10/0x20 [ 21.319446] [ 21.319484] The buggy address belongs to the object at fff00000c7893300 [ 21.319484] which belongs to the cache kmalloc-128 of size 128 [ 21.319626] The buggy address is located 0 bytes inside of [ 21.319626] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.319913] [ 21.319957] The buggy address belongs to the physical page: [ 21.320024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.320142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.320271] page_type: f5(slab) [ 21.320390] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.320561] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.320693] page dumped because: kasan: bad access detected [ 21.320817] [ 21.320863] Memory state around the buggy address: [ 21.320934] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.321306] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.321416] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.321505] ^ [ 21.321621] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.321731] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.321823] ================================================================== [ 21.294752] ================================================================== [ 21.294897] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.294962] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.295014] [ 21.295051] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.295137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.295167] Hardware name: linux,dummy-virt (DT) [ 21.295201] Call trace: [ 21.295226] show_stack+0x20/0x38 (C) [ 21.295276] dump_stack_lvl+0x8c/0xd0 [ 21.295345] print_report+0x118/0x608 [ 21.295399] kasan_report+0xdc/0x128 [ 21.295444] kasan_check_range+0x100/0x1a8 [ 21.295492] __kasan_check_read+0x20/0x30 [ 21.295538] copy_user_test_oob+0x3c8/0xec8 [ 21.295583] kunit_try_run_case+0x170/0x3f0 [ 21.295631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.295683] kthread+0x328/0x630 [ 21.295723] ret_from_fork+0x10/0x20 [ 21.295771] [ 21.295793] Allocated by task 285: [ 21.295822] kasan_save_stack+0x3c/0x68 [ 21.295866] kasan_save_track+0x20/0x40 [ 21.295906] kasan_save_alloc_info+0x40/0x58 [ 21.295948] __kasan_kmalloc+0xd4/0xd8 [ 21.295984] __kmalloc_noprof+0x190/0x4d0 [ 21.296026] kunit_kmalloc_array+0x34/0x88 [ 21.296064] copy_user_test_oob+0xac/0xec8 [ 21.296101] kunit_try_run_case+0x170/0x3f0 [ 21.296141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.296185] kthread+0x328/0x630 [ 21.296218] ret_from_fork+0x10/0x20 [ 21.296257] [ 21.296278] The buggy address belongs to the object at fff00000c7893300 [ 21.296278] which belongs to the cache kmalloc-128 of size 128 [ 21.296472] The buggy address is located 0 bytes inside of [ 21.296472] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.296813] [ 21.296987] The buggy address belongs to the physical page: [ 21.297279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.297613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.297748] page_type: f5(slab) [ 21.297956] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.298099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.298346] page dumped because: kasan: bad access detected [ 21.298469] [ 21.298783] Memory state around the buggy address: [ 21.298991] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.299243] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299412] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.299766] ^ [ 21.300038] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.300138] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.300464] ================================================================== [ 21.266652] ================================================================== [ 21.266843] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.266978] Read of size 121 at addr fff00000c7893300 by task kunit_try_catch/285 [ 21.267107] [ 21.267201] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.267418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267487] Hardware name: linux,dummy-virt (DT) [ 21.267746] Call trace: [ 21.267837] show_stack+0x20/0x38 (C) [ 21.267949] dump_stack_lvl+0x8c/0xd0 [ 21.268043] print_report+0x118/0x608 [ 21.268153] kasan_report+0xdc/0x128 [ 21.268259] kasan_check_range+0x100/0x1a8 [ 21.268411] __kasan_check_read+0x20/0x30 [ 21.268620] copy_user_test_oob+0x728/0xec8 [ 21.268781] kunit_try_run_case+0x170/0x3f0 [ 21.269359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.269490] kthread+0x328/0x630 [ 21.269588] ret_from_fork+0x10/0x20 [ 21.269701] [ 21.269751] Allocated by task 285: [ 21.269817] kasan_save_stack+0x3c/0x68 [ 21.269913] kasan_save_track+0x20/0x40 [ 21.270001] kasan_save_alloc_info+0x40/0x58 [ 21.270100] __kasan_kmalloc+0xd4/0xd8 [ 21.270186] __kmalloc_noprof+0x190/0x4d0 [ 21.270278] kunit_kmalloc_array+0x34/0x88 [ 21.270380] copy_user_test_oob+0xac/0xec8 [ 21.270468] kunit_try_run_case+0x170/0x3f0 [ 21.270600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.270712] kthread+0x328/0x630 [ 21.270810] ret_from_fork+0x10/0x20 [ 21.270945] [ 21.271005] The buggy address belongs to the object at fff00000c7893300 [ 21.271005] which belongs to the cache kmalloc-128 of size 128 [ 21.271146] The buggy address is located 0 bytes inside of [ 21.271146] allocated 120-byte region [fff00000c7893300, fff00000c7893378) [ 21.271278] [ 21.271331] The buggy address belongs to the physical page: [ 21.271404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.271526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.271669] page_type: f5(slab) [ 21.271757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.271903] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.272016] page dumped because: kasan: bad access detected [ 21.272090] [ 21.272194] Memory state around the buggy address: [ 21.272377] fff00000c7893200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.272497] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.272709] >fff00000c7893300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.272836] ^ [ 21.272968] fff00000c7893380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.273066] fff00000c7893400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.273148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
Automatically assigned
[ 21.165350] ================================================================== [ 21.165529] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 21.165731] Read of size 8 at addr fff00000c7893278 by task kunit_try_catch/281 [ 21.165854] [ 21.165988] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.166269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.166347] Hardware name: linux,dummy-virt (DT) [ 21.166454] Call trace: [ 21.166535] show_stack+0x20/0x38 (C) [ 21.166700] dump_stack_lvl+0x8c/0xd0 [ 21.166866] print_report+0x118/0x608 [ 21.166971] kasan_report+0xdc/0x128 [ 21.167078] __asan_report_load8_noabort+0x20/0x30 [ 21.167189] copy_to_kernel_nofault+0x204/0x250 [ 21.167292] copy_to_kernel_nofault_oob+0x158/0x418 [ 21.167417] kunit_try_run_case+0x170/0x3f0 [ 21.167536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.167681] kthread+0x328/0x630 [ 21.167969] ret_from_fork+0x10/0x20 [ 21.168146] [ 21.168198] Allocated by task 281: [ 21.168276] kasan_save_stack+0x3c/0x68 [ 21.168387] kasan_save_track+0x20/0x40 [ 21.168486] kasan_save_alloc_info+0x40/0x58 [ 21.169065] __kasan_kmalloc+0xd4/0xd8 [ 21.169332] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.169627] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.169945] kunit_try_run_case+0x170/0x3f0 [ 21.170107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.170445] kthread+0x328/0x630 [ 21.170530] ret_from_fork+0x10/0x20 [ 21.170793] [ 21.170924] The buggy address belongs to the object at fff00000c7893200 [ 21.170924] which belongs to the cache kmalloc-128 of size 128 [ 21.171044] The buggy address is located 0 bytes to the right of [ 21.171044] allocated 120-byte region [fff00000c7893200, fff00000c7893278) [ 21.171180] [ 21.171575] The buggy address belongs to the physical page: [ 21.171801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.171931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.172276] page_type: f5(slab) [ 21.172484] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.172645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.172993] page dumped because: kasan: bad access detected [ 21.173088] [ 21.173217] Memory state around the buggy address: [ 21.173500] fff00000c7893100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.173701] fff00000c7893180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.174094] >fff00000c7893200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.174195] ^ [ 21.174678] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.174835] fff00000c7893300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.174947] ================================================================== [ 21.176186] ================================================================== [ 21.176362] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 21.176539] Write of size 8 at addr fff00000c7893278 by task kunit_try_catch/281 [ 21.176701] [ 21.176800] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.177049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.177137] Hardware name: linux,dummy-virt (DT) [ 21.177233] Call trace: [ 21.177304] show_stack+0x20/0x38 (C) [ 21.177408] dump_stack_lvl+0x8c/0xd0 [ 21.177506] print_report+0x118/0x608 [ 21.178127] kasan_report+0xdc/0x128 [ 21.178325] kasan_check_range+0x100/0x1a8 [ 21.178475] __kasan_check_write+0x20/0x30 [ 21.178605] copy_to_kernel_nofault+0x8c/0x250 [ 21.178728] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 21.178951] kunit_try_run_case+0x170/0x3f0 [ 21.179071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.179196] kthread+0x328/0x630 [ 21.179287] ret_from_fork+0x10/0x20 [ 21.179682] [ 21.179724] Allocated by task 281: [ 21.179806] kasan_save_stack+0x3c/0x68 [ 21.179913] kasan_save_track+0x20/0x40 [ 21.180011] kasan_save_alloc_info+0x40/0x58 [ 21.180110] __kasan_kmalloc+0xd4/0xd8 [ 21.180206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.180335] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.180416] kunit_try_run_case+0x170/0x3f0 [ 21.180492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.180582] kthread+0x328/0x630 [ 21.180650] ret_from_fork+0x10/0x20 [ 21.180744] [ 21.180808] The buggy address belongs to the object at fff00000c7893200 [ 21.180808] which belongs to the cache kmalloc-128 of size 128 [ 21.180947] The buggy address is located 0 bytes to the right of [ 21.180947] allocated 120-byte region [fff00000c7893200, fff00000c7893278) [ 21.181162] [ 21.181214] The buggy address belongs to the physical page: [ 21.181287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107893 [ 21.181772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.181961] page_type: f5(slab) [ 21.182058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.182456] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.182645] page dumped because: kasan: bad access detected [ 21.182846] [ 21.182897] Memory state around the buggy address: [ 21.182984] fff00000c7893100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.183090] fff00000c7893180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183192] >fff00000c7893200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.183275] ^ [ 21.183359] fff00000c7893280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183452] fff00000c7893300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183543] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
Automatically assigned
[ 21.069004] ================================================================== [ 21.069626] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 21.069792] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 21.069929] [ 21.070053] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.070466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.070538] Hardware name: linux,dummy-virt (DT) [ 21.070622] Call trace: [ 21.070750] show_stack+0x20/0x38 (C) [ 21.070911] dump_stack_lvl+0x8c/0xd0 [ 21.071013] print_report+0x310/0x608 [ 21.071142] kasan_report+0xdc/0x128 [ 21.071245] __asan_report_load1_noabort+0x20/0x30 [ 21.071358] vmalloc_oob+0x51c/0x5d0 [ 21.071450] kunit_try_run_case+0x170/0x3f0 [ 21.071549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.071673] kthread+0x328/0x630 [ 21.071777] ret_from_fork+0x10/0x20 [ 21.071900] [ 21.071981] The buggy address belongs to the virtual mapping at [ 21.071981] [ffff8000800fe000, ffff800080100000) created by: [ 21.071981] vmalloc_oob+0x98/0x5d0 [ 21.072161] [ 21.072236] The buggy address belongs to the physical page: [ 21.072367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c [ 21.072503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.072689] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.072855] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.072990] page dumped because: kasan: bad access detected [ 21.073101] [ 21.073170] Memory state around the buggy address: [ 21.073242] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.073358] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.073455] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 21.073550] ^ [ 21.073663] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.073754] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.073841] ================================================================== [ 21.058756] ================================================================== [ 21.059145] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 21.059291] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 21.061003] [ 21.061325] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 21.062228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.062314] Hardware name: linux,dummy-virt (DT) [ 21.062581] Call trace: [ 21.062951] show_stack+0x20/0x38 (C) [ 21.063086] dump_stack_lvl+0x8c/0xd0 [ 21.063652] print_report+0x310/0x608 [ 21.063886] kasan_report+0xdc/0x128 [ 21.064430] __asan_report_load1_noabort+0x20/0x30 [ 21.064616] vmalloc_oob+0x578/0x5d0 [ 21.064722] kunit_try_run_case+0x170/0x3f0 [ 21.064875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065015] kthread+0x328/0x630 [ 21.065154] ret_from_fork+0x10/0x20 [ 21.065286] [ 21.065361] The buggy address belongs to the virtual mapping at [ 21.065361] [ffff8000800fe000, ffff800080100000) created by: [ 21.065361] vmalloc_oob+0x98/0x5d0 [ 21.065529] [ 21.065872] The buggy address belongs to the physical page: [ 21.065984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c [ 21.066136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.066303] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.066463] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.066570] page dumped because: kasan: bad access detected [ 21.066640] [ 21.066682] Memory state around the buggy address: [ 21.066757] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.067040] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.067210] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 21.067352] ^ [ 21.067450] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.067534] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.067608] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 20.792864] ================================================================== [ 20.792989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.793106] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.793222] [ 20.793301] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.794698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.794998] Hardware name: linux,dummy-virt (DT) [ 20.795103] Call trace: [ 20.795315] show_stack+0x20/0x38 (C) [ 20.795441] dump_stack_lvl+0x8c/0xd0 [ 20.795537] print_report+0x118/0x608 [ 20.795636] kasan_report+0xdc/0x128 [ 20.796044] kasan_check_range+0x100/0x1a8 [ 20.796925] __kasan_check_write+0x20/0x30 [ 20.797046] kasan_atomics_helper+0x1384/0x4858 [ 20.797165] kasan_atomics+0x198/0x2e0 [ 20.797412] kunit_try_run_case+0x170/0x3f0 [ 20.797654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.797797] kthread+0x328/0x630 [ 20.797899] ret_from_fork+0x10/0x20 [ 20.798017] [ 20.798065] Allocated by task 265: [ 20.798150] kasan_save_stack+0x3c/0x68 [ 20.798253] kasan_save_track+0x20/0x40 [ 20.798623] kasan_save_alloc_info+0x40/0x58 [ 20.798751] __kasan_kmalloc+0xd4/0xd8 [ 20.798837] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.798925] kasan_atomics+0xb8/0x2e0 [ 20.798994] kunit_try_run_case+0x170/0x3f0 [ 20.799080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.799186] kthread+0x328/0x630 [ 20.799266] ret_from_fork+0x10/0x20 [ 20.800821] [ 20.800895] The buggy address belongs to the object at fff00000c7892700 [ 20.800895] which belongs to the cache kmalloc-64 of size 64 [ 20.801885] The buggy address is located 0 bytes to the right of [ 20.801885] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.802604] [ 20.802668] The buggy address belongs to the physical page: [ 20.803146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.803272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.803944] page_type: f5(slab) [ 20.804133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.804746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.805176] page dumped because: kasan: bad access detected [ 20.805282] [ 20.805482] Memory state around the buggy address: [ 20.805687] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.805796] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.805889] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.806267] ^ [ 20.806519] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806978] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.807228] ================================================================== [ 20.711516] ================================================================== [ 20.711589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.711658] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.711715] [ 20.711755] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.711849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.711882] Hardware name: linux,dummy-virt (DT) [ 20.711917] Call trace: [ 20.711946] show_stack+0x20/0x38 (C) [ 20.712003] dump_stack_lvl+0x8c/0xd0 [ 20.712057] print_report+0x118/0x608 [ 20.712110] kasan_report+0xdc/0x128 [ 20.712163] kasan_check_range+0x100/0x1a8 [ 20.712218] __kasan_check_write+0x20/0x30 [ 20.712269] kasan_atomics_helper+0xff0/0x4858 [ 20.712337] kasan_atomics+0x198/0x2e0 [ 20.712398] kunit_try_run_case+0x170/0x3f0 [ 20.713333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.713856] kthread+0x328/0x630 [ 20.713952] ret_from_fork+0x10/0x20 [ 20.714011] [ 20.714035] Allocated by task 265: [ 20.714067] kasan_save_stack+0x3c/0x68 [ 20.714116] kasan_save_track+0x20/0x40 [ 20.714289] kasan_save_alloc_info+0x40/0x58 [ 20.714404] __kasan_kmalloc+0xd4/0xd8 [ 20.714546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.714670] kasan_atomics+0xb8/0x2e0 [ 20.714750] kunit_try_run_case+0x170/0x3f0 [ 20.714860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.714922] kthread+0x328/0x630 [ 20.714963] ret_from_fork+0x10/0x20 [ 20.715005] [ 20.715030] The buggy address belongs to the object at fff00000c7892700 [ 20.715030] which belongs to the cache kmalloc-64 of size 64 [ 20.715093] The buggy address is located 0 bytes to the right of [ 20.715093] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.715158] [ 20.715181] The buggy address belongs to the physical page: [ 20.715216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.715505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.715754] page_type: f5(slab) [ 20.715813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.716025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.716087] page dumped because: kasan: bad access detected [ 20.716259] [ 20.716287] Memory state around the buggy address: [ 20.716480] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.716543] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.716743] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.716861] ^ [ 20.716915] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.716965] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.717008] ================================================================== [ 20.954257] ================================================================== [ 20.954384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.954548] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.954789] [ 20.954874] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.955061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.955152] Hardware name: linux,dummy-virt (DT) [ 20.955227] Call trace: [ 20.955274] show_stack+0x20/0x38 (C) [ 20.955384] dump_stack_lvl+0x8c/0xd0 [ 20.955514] print_report+0x118/0x608 [ 20.955628] kasan_report+0xdc/0x128 [ 20.955731] __asan_report_load8_noabort+0x20/0x30 [ 20.955844] kasan_atomics_helper+0x3e10/0x4858 [ 20.955974] kasan_atomics+0x198/0x2e0 [ 20.956226] kunit_try_run_case+0x170/0x3f0 [ 20.956384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.956573] kthread+0x328/0x630 [ 20.956669] ret_from_fork+0x10/0x20 [ 20.956829] [ 20.956930] Allocated by task 265: [ 20.957173] kasan_save_stack+0x3c/0x68 [ 20.957400] kasan_save_track+0x20/0x40 [ 20.957529] kasan_save_alloc_info+0x40/0x58 [ 20.957661] __kasan_kmalloc+0xd4/0xd8 [ 20.957782] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.957910] kasan_atomics+0xb8/0x2e0 [ 20.958007] kunit_try_run_case+0x170/0x3f0 [ 20.958106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.958204] kthread+0x328/0x630 [ 20.958279] ret_from_fork+0x10/0x20 [ 20.958406] [ 20.958452] The buggy address belongs to the object at fff00000c7892700 [ 20.958452] which belongs to the cache kmalloc-64 of size 64 [ 20.958827] The buggy address is located 0 bytes to the right of [ 20.958827] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.959050] [ 20.959095] The buggy address belongs to the physical page: [ 20.959171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.959561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.959861] page_type: f5(slab) [ 20.960144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.960291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.960417] page dumped because: kasan: bad access detected [ 20.960513] [ 20.960611] Memory state around the buggy address: [ 20.960863] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961291] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961758] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.962187] ^ [ 20.962291] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962406] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963247] ================================================================== [ 20.827907] ================================================================== [ 20.828168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.828298] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.828534] [ 20.828636] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.828842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.828907] Hardware name: linux,dummy-virt (DT) [ 20.828978] Call trace: [ 20.829031] show_stack+0x20/0x38 (C) [ 20.829145] dump_stack_lvl+0x8c/0xd0 [ 20.829910] print_report+0x118/0x608 [ 20.830338] kasan_report+0xdc/0x128 [ 20.830450] kasan_check_range+0x100/0x1a8 [ 20.830861] __kasan_check_write+0x20/0x30 [ 20.831008] kasan_atomics_helper+0x1414/0x4858 [ 20.831103] kasan_atomics+0x198/0x2e0 [ 20.831194] kunit_try_run_case+0x170/0x3f0 [ 20.831291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.831394] kthread+0x328/0x630 [ 20.831481] ret_from_fork+0x10/0x20 [ 20.831590] [ 20.832852] Allocated by task 265: [ 20.832952] kasan_save_stack+0x3c/0x68 [ 20.833063] kasan_save_track+0x20/0x40 [ 20.833159] kasan_save_alloc_info+0x40/0x58 [ 20.833761] __kasan_kmalloc+0xd4/0xd8 [ 20.833871] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.834369] kasan_atomics+0xb8/0x2e0 [ 20.834462] kunit_try_run_case+0x170/0x3f0 [ 20.834557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.834671] kthread+0x328/0x630 [ 20.834759] ret_from_fork+0x10/0x20 [ 20.834842] [ 20.835225] The buggy address belongs to the object at fff00000c7892700 [ 20.835225] which belongs to the cache kmalloc-64 of size 64 [ 20.835388] The buggy address is located 0 bytes to the right of [ 20.835388] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.835518] [ 20.835560] The buggy address belongs to the physical page: [ 20.835634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.835755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.836876] page_type: f5(slab) [ 20.837337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.837582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.837703] page dumped because: kasan: bad access detected [ 20.837921] [ 20.837983] Memory state around the buggy address: [ 20.838078] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.838186] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.838738] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.838843] ^ [ 20.839184] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839331] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839434] ================================================================== [ 20.718098] ================================================================== [ 20.718330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.718473] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.718539] [ 20.718578] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.718666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.718715] Hardware name: linux,dummy-virt (DT) [ 20.718796] Call trace: [ 20.718848] show_stack+0x20/0x38 (C) [ 20.718921] dump_stack_lvl+0x8c/0xd0 [ 20.718976] print_report+0x118/0x608 [ 20.719026] kasan_report+0xdc/0x128 [ 20.719073] kasan_check_range+0x100/0x1a8 [ 20.719121] __kasan_check_write+0x20/0x30 [ 20.719180] kasan_atomics_helper+0x1058/0x4858 [ 20.719230] kasan_atomics+0x198/0x2e0 [ 20.719279] kunit_try_run_case+0x170/0x3f0 [ 20.719419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.719536] kthread+0x328/0x630 [ 20.719654] ret_from_fork+0x10/0x20 [ 20.719711] [ 20.719733] Allocated by task 265: [ 20.719773] kasan_save_stack+0x3c/0x68 [ 20.719823] kasan_save_track+0x20/0x40 [ 20.719863] kasan_save_alloc_info+0x40/0x58 [ 20.719908] __kasan_kmalloc+0xd4/0xd8 [ 20.720108] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.720173] kasan_atomics+0xb8/0x2e0 [ 20.720371] kunit_try_run_case+0x170/0x3f0 [ 20.720649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720709] kthread+0x328/0x630 [ 20.720747] ret_from_fork+0x10/0x20 [ 20.720787] [ 20.721119] The buggy address belongs to the object at fff00000c7892700 [ 20.721119] which belongs to the cache kmalloc-64 of size 64 [ 20.721329] The buggy address is located 0 bytes to the right of [ 20.721329] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.721619] [ 20.721844] The buggy address belongs to the physical page: [ 20.721896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.721963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.722026] page_type: f5(slab) [ 20.722071] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.722505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.722832] page dumped because: kasan: bad access detected [ 20.722885] [ 20.722907] Memory state around the buggy address: [ 20.722947] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.722992] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.723035] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.723076] ^ [ 20.723114] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.723176] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.723214] ================================================================== [ 20.841941] ================================================================== [ 20.842096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.842224] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.842354] [ 20.842439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.842654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.843667] Hardware name: linux,dummy-virt (DT) [ 20.843802] Call trace: [ 20.844519] show_stack+0x20/0x38 (C) [ 20.845112] dump_stack_lvl+0x8c/0xd0 [ 20.845267] print_report+0x118/0x608 [ 20.845396] kasan_report+0xdc/0x128 [ 20.845516] kasan_check_range+0x100/0x1a8 [ 20.845634] __kasan_check_write+0x20/0x30 [ 20.845744] kasan_atomics_helper+0x147c/0x4858 [ 20.845864] kasan_atomics+0x198/0x2e0 [ 20.845970] kunit_try_run_case+0x170/0x3f0 [ 20.846098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.846231] kthread+0x328/0x630 [ 20.847445] ret_from_fork+0x10/0x20 [ 20.847957] [ 20.848008] Allocated by task 265: [ 20.848074] kasan_save_stack+0x3c/0x68 [ 20.848169] kasan_save_track+0x20/0x40 [ 20.848260] kasan_save_alloc_info+0x40/0x58 [ 20.848373] __kasan_kmalloc+0xd4/0xd8 [ 20.848479] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.848585] kasan_atomics+0xb8/0x2e0 [ 20.848672] kunit_try_run_case+0x170/0x3f0 [ 20.849844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.850021] kthread+0x328/0x630 [ 20.850104] ret_from_fork+0x10/0x20 [ 20.850193] [ 20.850247] The buggy address belongs to the object at fff00000c7892700 [ 20.850247] which belongs to the cache kmalloc-64 of size 64 [ 20.851076] The buggy address is located 0 bytes to the right of [ 20.851076] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.851263] [ 20.851315] The buggy address belongs to the physical page: [ 20.852278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.852447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.852588] page_type: f5(slab) [ 20.852688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.852808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.852921] page dumped because: kasan: bad access detected [ 20.853006] [ 20.853054] Memory state around the buggy address: [ 20.854484] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.854621] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.855168] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.855283] ^ [ 20.855615] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855728] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855822] ================================================================== [ 20.605138] ================================================================== [ 20.605208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 20.605270] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.605337] [ 20.605374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.605464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.605494] Hardware name: linux,dummy-virt (DT) [ 20.605526] Call trace: [ 20.605551] show_stack+0x20/0x38 (C) [ 20.605602] dump_stack_lvl+0x8c/0xd0 [ 20.605653] print_report+0x118/0x608 [ 20.605700] kasan_report+0xdc/0x128 [ 20.605746] kasan_check_range+0x100/0x1a8 [ 20.605795] __kasan_check_write+0x20/0x30 [ 20.605841] kasan_atomics_helper+0x934/0x4858 [ 20.605889] kasan_atomics+0x198/0x2e0 [ 20.606964] kunit_try_run_case+0x170/0x3f0 [ 20.607069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.607176] kthread+0x328/0x630 [ 20.607222] ret_from_fork+0x10/0x20 [ 20.607270] [ 20.607347] Allocated by task 265: [ 20.607419] kasan_save_stack+0x3c/0x68 [ 20.607524] kasan_save_track+0x20/0x40 [ 20.607574] kasan_save_alloc_info+0x40/0x58 [ 20.607616] __kasan_kmalloc+0xd4/0xd8 [ 20.607654] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.607696] kasan_atomics+0xb8/0x2e0 [ 20.607734] kunit_try_run_case+0x170/0x3f0 [ 20.607773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.608005] kthread+0x328/0x630 [ 20.608075] ret_from_fork+0x10/0x20 [ 20.608253] [ 20.608373] The buggy address belongs to the object at fff00000c7892700 [ 20.608373] which belongs to the cache kmalloc-64 of size 64 [ 20.608444] The buggy address is located 0 bytes to the right of [ 20.608444] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.608521] [ 20.608546] The buggy address belongs to the physical page: [ 20.608580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.608637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.608691] page_type: f5(slab) [ 20.608736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.608788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.608831] page dumped because: kasan: bad access detected [ 20.609180] [ 20.609209] Memory state around the buggy address: [ 20.609252] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.609679] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.609801] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.609847] ^ [ 20.609902] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.610119] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.610177] ================================================================== [ 20.964503] ================================================================== [ 20.964637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.964752] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.964867] [ 20.964940] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.965130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.965199] Hardware name: linux,dummy-virt (DT) [ 20.965271] Call trace: [ 20.965338] show_stack+0x20/0x38 (C) [ 20.965809] dump_stack_lvl+0x8c/0xd0 [ 20.966187] print_report+0x118/0x608 [ 20.966326] kasan_report+0xdc/0x128 [ 20.966514] kasan_check_range+0x100/0x1a8 [ 20.966622] __kasan_check_write+0x20/0x30 [ 20.966813] kasan_atomics_helper+0x175c/0x4858 [ 20.967131] kasan_atomics+0x198/0x2e0 [ 20.967397] kunit_try_run_case+0x170/0x3f0 [ 20.967825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.967947] kthread+0x328/0x630 [ 20.968048] ret_from_fork+0x10/0x20 [ 20.968205] [ 20.968276] Allocated by task 265: [ 20.968375] kasan_save_stack+0x3c/0x68 [ 20.968534] kasan_save_track+0x20/0x40 [ 20.968671] kasan_save_alloc_info+0x40/0x58 [ 20.968801] __kasan_kmalloc+0xd4/0xd8 [ 20.968922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.969022] kasan_atomics+0xb8/0x2e0 [ 20.969121] kunit_try_run_case+0x170/0x3f0 [ 20.969225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.969357] kthread+0x328/0x630 [ 20.969426] ret_from_fork+0x10/0x20 [ 20.969501] [ 20.969548] The buggy address belongs to the object at fff00000c7892700 [ 20.969548] which belongs to the cache kmalloc-64 of size 64 [ 20.969677] The buggy address is located 0 bytes to the right of [ 20.969677] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.969818] [ 20.969866] The buggy address belongs to the physical page: [ 20.969946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.970182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.970613] page_type: f5(slab) [ 20.970737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.971101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.971367] page dumped because: kasan: bad access detected [ 20.971449] [ 20.971494] Memory state around the buggy address: [ 20.971555] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.971660] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.971756] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.971851] ^ [ 20.971927] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.972042] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.972140] ================================================================== [ 20.905541] ================================================================== [ 20.905661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.905769] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.905878] [ 20.905955] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.907477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.907579] Hardware name: linux,dummy-virt (DT) [ 20.907677] Call trace: [ 20.907751] show_stack+0x20/0x38 (C) [ 20.908008] dump_stack_lvl+0x8c/0xd0 [ 20.909108] print_report+0x118/0x608 [ 20.909639] kasan_report+0xdc/0x128 [ 20.909773] __asan_report_load8_noabort+0x20/0x30 [ 20.909890] kasan_atomics_helper+0x3db0/0x4858 [ 20.910001] kasan_atomics+0x198/0x2e0 [ 20.911117] kunit_try_run_case+0x170/0x3f0 [ 20.911267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.911478] kthread+0x328/0x630 [ 20.911605] ret_from_fork+0x10/0x20 [ 20.911785] [ 20.911861] Allocated by task 265: [ 20.912350] kasan_save_stack+0x3c/0x68 [ 20.912832] kasan_save_track+0x20/0x40 [ 20.912953] kasan_save_alloc_info+0x40/0x58 [ 20.913052] __kasan_kmalloc+0xd4/0xd8 [ 20.913137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.913637] kasan_atomics+0xb8/0x2e0 [ 20.913753] kunit_try_run_case+0x170/0x3f0 [ 20.913850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.913953] kthread+0x328/0x630 [ 20.914034] ret_from_fork+0x10/0x20 [ 20.914550] [ 20.914800] The buggy address belongs to the object at fff00000c7892700 [ 20.914800] which belongs to the cache kmalloc-64 of size 64 [ 20.915129] The buggy address is located 0 bytes to the right of [ 20.915129] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.915423] [ 20.915465] The buggy address belongs to the physical page: [ 20.915903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.916051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.916568] page_type: f5(slab) [ 20.917001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.917145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.917254] page dumped because: kasan: bad access detected [ 20.917701] [ 20.917821] Memory state around the buggy address: [ 20.917951] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.918419] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.918586] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.918684] ^ [ 20.918802] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918963] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.919047] ================================================================== [ 20.472076] ================================================================== [ 20.489587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 20.490126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.490390] show_stack+0x20/0x38 (C) [ 20.490845] kasan_atomics_helper+0x40a8/0x4858 [ 20.491937] kasan_save_stack+0x3c/0x68 [ 20.492697] The buggy address is located 0 bytes to the right of [ 20.492697] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.493660] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.493720] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.494333] ================================================================== [ 20.859131] ================================================================== [ 20.859276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.859397] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.859982] [ 20.860497] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.860734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.860916] Hardware name: linux,dummy-virt (DT) [ 20.860992] Call trace: [ 20.861044] show_stack+0x20/0x38 (C) [ 20.861161] dump_stack_lvl+0x8c/0xd0 [ 20.861951] print_report+0x118/0x608 [ 20.862086] kasan_report+0xdc/0x128 [ 20.862194] kasan_check_range+0x100/0x1a8 [ 20.862412] __kasan_check_write+0x20/0x30 [ 20.862506] kasan_atomics_helper+0x14e4/0x4858 [ 20.863038] kasan_atomics+0x198/0x2e0 [ 20.863408] kunit_try_run_case+0x170/0x3f0 [ 20.863651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.863759] kthread+0x328/0x630 [ 20.863854] ret_from_fork+0x10/0x20 [ 20.864313] [ 20.864657] Allocated by task 265: [ 20.864754] kasan_save_stack+0x3c/0x68 [ 20.864851] kasan_save_track+0x20/0x40 [ 20.865199] kasan_save_alloc_info+0x40/0x58 [ 20.865473] __kasan_kmalloc+0xd4/0xd8 [ 20.865570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.865961] kasan_atomics+0xb8/0x2e0 [ 20.866085] kunit_try_run_case+0x170/0x3f0 [ 20.866186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866829] kthread+0x328/0x630 [ 20.866930] ret_from_fork+0x10/0x20 [ 20.866999] [ 20.867627] The buggy address belongs to the object at fff00000c7892700 [ 20.867627] which belongs to the cache kmalloc-64 of size 64 [ 20.867781] The buggy address is located 0 bytes to the right of [ 20.867781] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.868288] [ 20.868373] The buggy address belongs to the physical page: [ 20.868468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.868906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.869494] page_type: f5(slab) [ 20.869620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.869738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.869851] page dumped because: kasan: bad access detected [ 20.869941] [ 20.869989] Memory state around the buggy address: [ 20.870079] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.870188] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.870285] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.870390] ^ [ 20.870490] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.870935] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.871037] ================================================================== [ 20.733910] ================================================================== [ 20.734311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.734441] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.734623] [ 20.735247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.735438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.735635] Hardware name: linux,dummy-virt (DT) [ 20.735824] Call trace: [ 20.735929] show_stack+0x20/0x38 (C) [ 20.735993] dump_stack_lvl+0x8c/0xd0 [ 20.736365] print_report+0x118/0x608 [ 20.736638] kasan_report+0xdc/0x128 [ 20.736701] kasan_check_range+0x100/0x1a8 [ 20.736777] __kasan_check_write+0x20/0x30 [ 20.737211] kasan_atomics_helper+0x1128/0x4858 [ 20.737336] kasan_atomics+0x198/0x2e0 [ 20.737389] kunit_try_run_case+0x170/0x3f0 [ 20.737444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.738070] kthread+0x328/0x630 [ 20.738139] ret_from_fork+0x10/0x20 [ 20.738198] [ 20.738221] Allocated by task 265: [ 20.738315] kasan_save_stack+0x3c/0x68 [ 20.738479] kasan_save_track+0x20/0x40 [ 20.738636] kasan_save_alloc_info+0x40/0x58 [ 20.738717] __kasan_kmalloc+0xd4/0xd8 [ 20.739079] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.739373] kasan_atomics+0xb8/0x2e0 [ 20.739448] kunit_try_run_case+0x170/0x3f0 [ 20.739527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.739574] kthread+0x328/0x630 [ 20.739610] ret_from_fork+0x10/0x20 [ 20.739650] [ 20.739675] The buggy address belongs to the object at fff00000c7892700 [ 20.739675] which belongs to the cache kmalloc-64 of size 64 [ 20.739971] The buggy address is located 0 bytes to the right of [ 20.739971] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.740045] [ 20.740071] The buggy address belongs to the physical page: [ 20.740109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.740528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.740593] page_type: f5(slab) [ 20.740641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.740964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.741342] page dumped because: kasan: bad access detected [ 20.741550] [ 20.741578] Memory state around the buggy address: [ 20.741832] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.741930] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.741986] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.742029] ^ [ 20.742072] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.742120] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.742165] ================================================================== [ 20.701899] ================================================================== [ 20.701988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.702065] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.702561] [ 20.702607] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.702713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.702746] Hardware name: linux,dummy-virt (DT) [ 20.703131] Call trace: [ 20.703176] show_stack+0x20/0x38 (C) [ 20.703236] dump_stack_lvl+0x8c/0xd0 [ 20.703692] print_report+0x118/0x608 [ 20.703795] kasan_report+0xdc/0x128 [ 20.703850] kasan_check_range+0x100/0x1a8 [ 20.703900] __kasan_check_write+0x20/0x30 [ 20.703963] kasan_atomics_helper+0xf88/0x4858 [ 20.704013] kasan_atomics+0x198/0x2e0 [ 20.704059] kunit_try_run_case+0x170/0x3f0 [ 20.704111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.704165] kthread+0x328/0x630 [ 20.704207] ret_from_fork+0x10/0x20 [ 20.704258] [ 20.704280] Allocated by task 265: [ 20.704314] kasan_save_stack+0x3c/0x68 [ 20.704540] kasan_save_track+0x20/0x40 [ 20.704914] kasan_save_alloc_info+0x40/0x58 [ 20.705212] __kasan_kmalloc+0xd4/0xd8 [ 20.705279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.705343] kasan_atomics+0xb8/0x2e0 [ 20.705387] kunit_try_run_case+0x170/0x3f0 [ 20.706143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.706229] kthread+0x328/0x630 [ 20.706279] ret_from_fork+0x10/0x20 [ 20.706328] [ 20.706367] The buggy address belongs to the object at fff00000c7892700 [ 20.706367] which belongs to the cache kmalloc-64 of size 64 [ 20.706430] The buggy address is located 0 bytes to the right of [ 20.706430] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.706696] [ 20.706741] The buggy address belongs to the physical page: [ 20.706970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.707034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.707409] page_type: f5(slab) [ 20.707629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.707720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.707942] page dumped because: kasan: bad access detected [ 20.708219] [ 20.708246] Memory state around the buggy address: [ 20.708289] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.708421] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.708489] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.708685] ^ [ 20.708730] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.708790] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.709241] ================================================================== [ 20.809692] ================================================================== [ 20.809819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.809944] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.810062] [ 20.810142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.810350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.810422] Hardware name: linux,dummy-virt (DT) [ 20.810505] Call trace: [ 20.810560] show_stack+0x20/0x38 (C) [ 20.810678] dump_stack_lvl+0x8c/0xd0 [ 20.812015] print_report+0x118/0x608 [ 20.812298] kasan_report+0xdc/0x128 [ 20.812589] __asan_report_load8_noabort+0x20/0x30 [ 20.812747] kasan_atomics_helper+0x3f04/0x4858 [ 20.813009] kasan_atomics+0x198/0x2e0 [ 20.813332] kunit_try_run_case+0x170/0x3f0 [ 20.814027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.814176] kthread+0x328/0x630 [ 20.814277] ret_from_fork+0x10/0x20 [ 20.814803] [ 20.814910] Allocated by task 265: [ 20.815086] kasan_save_stack+0x3c/0x68 [ 20.815183] kasan_save_track+0x20/0x40 [ 20.815754] kasan_save_alloc_info+0x40/0x58 [ 20.815875] __kasan_kmalloc+0xd4/0xd8 [ 20.815963] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.816056] kasan_atomics+0xb8/0x2e0 [ 20.816221] kunit_try_run_case+0x170/0x3f0 [ 20.816334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.817030] kthread+0x328/0x630 [ 20.817135] ret_from_fork+0x10/0x20 [ 20.817473] [ 20.817769] The buggy address belongs to the object at fff00000c7892700 [ 20.817769] which belongs to the cache kmalloc-64 of size 64 [ 20.818565] The buggy address is located 0 bytes to the right of [ 20.818565] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.818786] [ 20.818868] The buggy address belongs to the physical page: [ 20.819495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.819698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.820030] page_type: f5(slab) [ 20.820590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.820845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.821246] page dumped because: kasan: bad access detected [ 20.821365] [ 20.821658] Memory state around the buggy address: [ 20.821743] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.822146] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.822426] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.822527] ^ [ 20.822834] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.823849] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.824289] ================================================================== [ 20.686819] ================================================================== [ 20.686895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.687097] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.687348] [ 20.687544] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.687773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.687847] Hardware name: linux,dummy-virt (DT) [ 20.687951] Call trace: [ 20.688097] show_stack+0x20/0x38 (C) [ 20.688158] dump_stack_lvl+0x8c/0xd0 [ 20.688217] print_report+0x118/0x608 [ 20.688308] kasan_report+0xdc/0x128 [ 20.688559] kasan_check_range+0x100/0x1a8 [ 20.688751] __kasan_check_write+0x20/0x30 [ 20.688801] kasan_atomics_helper+0xeb8/0x4858 [ 20.688987] kasan_atomics+0x198/0x2e0 [ 20.689077] kunit_try_run_case+0x170/0x3f0 [ 20.689334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.689442] kthread+0x328/0x630 [ 20.689512] ret_from_fork+0x10/0x20 [ 20.689701] [ 20.689743] Allocated by task 265: [ 20.689816] kasan_save_stack+0x3c/0x68 [ 20.689864] kasan_save_track+0x20/0x40 [ 20.689907] kasan_save_alloc_info+0x40/0x58 [ 20.689950] __kasan_kmalloc+0xd4/0xd8 [ 20.689988] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.690028] kasan_atomics+0xb8/0x2e0 [ 20.690065] kunit_try_run_case+0x170/0x3f0 [ 20.690104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.690654] kthread+0x328/0x630 [ 20.690700] ret_from_fork+0x10/0x20 [ 20.690791] [ 20.691010] The buggy address belongs to the object at fff00000c7892700 [ 20.691010] which belongs to the cache kmalloc-64 of size 64 [ 20.691658] The buggy address is located 0 bytes to the right of [ 20.691658] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.692118] [ 20.692176] The buggy address belongs to the physical page: [ 20.692213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.692272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.692339] page_type: f5(slab) [ 20.692386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.692442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.693369] page dumped because: kasan: bad access detected [ 20.693430] [ 20.693453] Memory state around the buggy address: [ 20.693492] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.693541] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.693628] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.693670] ^ [ 20.693747] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.693826] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.693866] ================================================================== [ 20.618357] ================================================================== [ 20.618415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.618474] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.618526] [ 20.618560] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.618648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.618676] Hardware name: linux,dummy-virt (DT) [ 20.618707] Call trace: [ 20.618732] show_stack+0x20/0x38 (C) [ 20.619669] dump_stack_lvl+0x8c/0xd0 [ 20.619769] print_report+0x118/0x608 [ 20.619820] kasan_report+0xdc/0x128 [ 20.620014] kasan_check_range+0x100/0x1a8 [ 20.620074] __kasan_check_write+0x20/0x30 [ 20.620120] kasan_atomics_helper+0xa04/0x4858 [ 20.620264] kasan_atomics+0x198/0x2e0 [ 20.620422] kunit_try_run_case+0x170/0x3f0 [ 20.620548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.620754] kthread+0x328/0x630 [ 20.620862] ret_from_fork+0x10/0x20 [ 20.620993] [ 20.621015] Allocated by task 265: [ 20.621049] kasan_save_stack+0x3c/0x68 [ 20.621095] kasan_save_track+0x20/0x40 [ 20.621164] kasan_save_alloc_info+0x40/0x58 [ 20.621348] __kasan_kmalloc+0xd4/0xd8 [ 20.621569] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.621667] kasan_atomics+0xb8/0x2e0 [ 20.621717] kunit_try_run_case+0x170/0x3f0 [ 20.621758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.621802] kthread+0x328/0x630 [ 20.621834] ret_from_fork+0x10/0x20 [ 20.621870] [ 20.622176] The buggy address belongs to the object at fff00000c7892700 [ 20.622176] which belongs to the cache kmalloc-64 of size 64 [ 20.622246] The buggy address is located 0 bytes to the right of [ 20.622246] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.622453] [ 20.622481] The buggy address belongs to the physical page: [ 20.622525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.622856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.622944] page_type: f5(slab) [ 20.622996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.623140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.623185] page dumped because: kasan: bad access detected [ 20.623220] [ 20.623241] Memory state around the buggy address: [ 20.623276] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.623352] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.623402] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.623448] ^ [ 20.623484] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.623526] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.623564] ================================================================== [ 20.873564] ================================================================== [ 20.873686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.873797] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.873907] [ 20.874616] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.875426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.875512] Hardware name: linux,dummy-virt (DT) [ 20.875604] Call trace: [ 20.875672] show_stack+0x20/0x38 (C) [ 20.876071] dump_stack_lvl+0x8c/0xd0 [ 20.876205] print_report+0x118/0x608 [ 20.876314] kasan_report+0xdc/0x128 [ 20.876440] kasan_check_range+0x100/0x1a8 [ 20.876570] __kasan_check_write+0x20/0x30 [ 20.877363] kasan_atomics_helper+0x154c/0x4858 [ 20.877504] kasan_atomics+0x198/0x2e0 [ 20.877606] kunit_try_run_case+0x170/0x3f0 [ 20.877722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877841] kthread+0x328/0x630 [ 20.878804] ret_from_fork+0x10/0x20 [ 20.879166] [ 20.879231] Allocated by task 265: [ 20.879330] kasan_save_stack+0x3c/0x68 [ 20.879553] kasan_save_track+0x20/0x40 [ 20.879640] kasan_save_alloc_info+0x40/0x58 [ 20.879730] __kasan_kmalloc+0xd4/0xd8 [ 20.880271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.880841] kasan_atomics+0xb8/0x2e0 [ 20.880943] kunit_try_run_case+0x170/0x3f0 [ 20.881493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.881646] kthread+0x328/0x630 [ 20.881733] ret_from_fork+0x10/0x20 [ 20.882159] [ 20.882468] The buggy address belongs to the object at fff00000c7892700 [ 20.882468] which belongs to the cache kmalloc-64 of size 64 [ 20.882802] The buggy address is located 0 bytes to the right of [ 20.882802] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.882992] [ 20.883044] The buggy address belongs to the physical page: [ 20.883684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.884055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.884594] page_type: f5(slab) [ 20.884859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.884993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.885096] page dumped because: kasan: bad access detected [ 20.885174] [ 20.885220] Memory state around the buggy address: [ 20.885764] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885889] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885989] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.886523] ^ [ 20.886937] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.887248] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.887606] ================================================================== [ 20.778432] ================================================================== [ 20.778551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.778716] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.779067] [ 20.779160] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.779368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.779449] Hardware name: linux,dummy-virt (DT) [ 20.779559] Call trace: [ 20.779622] show_stack+0x20/0x38 (C) [ 20.779796] dump_stack_lvl+0x8c/0xd0 [ 20.779933] print_report+0x118/0x608 [ 20.780070] kasan_report+0xdc/0x128 [ 20.780173] kasan_check_range+0x100/0x1a8 [ 20.780432] __kasan_check_write+0x20/0x30 [ 20.780557] kasan_atomics_helper+0x12d8/0x4858 [ 20.780822] kasan_atomics+0x198/0x2e0 [ 20.781018] kunit_try_run_case+0x170/0x3f0 [ 20.781249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.781386] kthread+0x328/0x630 [ 20.781488] ret_from_fork+0x10/0x20 [ 20.782074] [ 20.782229] Allocated by task 265: [ 20.782446] kasan_save_stack+0x3c/0x68 [ 20.782911] kasan_save_track+0x20/0x40 [ 20.783548] kasan_save_alloc_info+0x40/0x58 [ 20.784019] __kasan_kmalloc+0xd4/0xd8 [ 20.784123] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.784647] kasan_atomics+0xb8/0x2e0 [ 20.784749] kunit_try_run_case+0x170/0x3f0 [ 20.784905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.785387] kthread+0x328/0x630 [ 20.787067] ret_from_fork+0x10/0x20 [ 20.787204] [ 20.787257] The buggy address belongs to the object at fff00000c7892700 [ 20.787257] which belongs to the cache kmalloc-64 of size 64 [ 20.787570] The buggy address is located 0 bytes to the right of [ 20.787570] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.787710] [ 20.787758] The buggy address belongs to the physical page: [ 20.787835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.787963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.788085] page_type: f5(slab) [ 20.788182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.788303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.788400] page dumped because: kasan: bad access detected [ 20.788477] [ 20.788523] Memory state around the buggy address: [ 20.788600] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.788702] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.788816] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.788896] ^ [ 20.789199] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.789694] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.789807] ================================================================== [ 20.743400] ================================================================== [ 20.743665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.743881] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.743989] [ 20.744031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.744121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.744152] Hardware name: linux,dummy-virt (DT) [ 20.744187] Call trace: [ 20.744213] show_stack+0x20/0x38 (C) [ 20.744268] dump_stack_lvl+0x8c/0xd0 [ 20.744333] print_report+0x118/0x608 [ 20.744386] kasan_report+0xdc/0x128 [ 20.744437] kasan_check_range+0x100/0x1a8 [ 20.744631] __kasan_check_write+0x20/0x30 [ 20.744754] kasan_atomics_helper+0x1190/0x4858 [ 20.744874] kasan_atomics+0x198/0x2e0 [ 20.744983] kunit_try_run_case+0x170/0x3f0 [ 20.745103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.745233] kthread+0x328/0x630 [ 20.745382] ret_from_fork+0x10/0x20 [ 20.745505] [ 20.745554] Allocated by task 265: [ 20.745626] kasan_save_stack+0x3c/0x68 [ 20.746209] kasan_save_track+0x20/0x40 [ 20.747155] kasan_save_alloc_info+0x40/0x58 [ 20.747294] __kasan_kmalloc+0xd4/0xd8 [ 20.747551] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.747675] kasan_atomics+0xb8/0x2e0 [ 20.747771] kunit_try_run_case+0x170/0x3f0 [ 20.747867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.747975] kthread+0x328/0x630 [ 20.748063] ret_from_fork+0x10/0x20 [ 20.748157] [ 20.748213] The buggy address belongs to the object at fff00000c7892700 [ 20.748213] which belongs to the cache kmalloc-64 of size 64 [ 20.748356] The buggy address is located 0 bytes to the right of [ 20.748356] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.748750] [ 20.748805] The buggy address belongs to the physical page: [ 20.748948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.749384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.749684] page_type: f5(slab) [ 20.749840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.749956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.750056] page dumped because: kasan: bad access detected [ 20.750163] [ 20.750216] Memory state around the buggy address: [ 20.750316] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.750483] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.750797] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.750891] ^ [ 20.750976] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.751184] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.751361] ================================================================== [ 20.973037] ================================================================== [ 20.973330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.973647] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.973830] [ 20.973908] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.974109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.974178] Hardware name: linux,dummy-virt (DT) [ 20.974251] Call trace: [ 20.974302] show_stack+0x20/0x38 (C) [ 20.974433] dump_stack_lvl+0x8c/0xd0 [ 20.974533] print_report+0x118/0x608 [ 20.974642] kasan_report+0xdc/0x128 [ 20.974749] __asan_report_load8_noabort+0x20/0x30 [ 20.974907] kasan_atomics_helper+0x3e20/0x4858 [ 20.975029] kasan_atomics+0x198/0x2e0 [ 20.975459] kunit_try_run_case+0x170/0x3f0 [ 20.975646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.975977] kthread+0x328/0x630 [ 20.976092] ret_from_fork+0x10/0x20 [ 20.976358] [ 20.976546] Allocated by task 265: [ 20.976777] kasan_save_stack+0x3c/0x68 [ 20.976863] kasan_save_track+0x20/0x40 [ 20.976962] kasan_save_alloc_info+0x40/0x58 [ 20.977052] __kasan_kmalloc+0xd4/0xd8 [ 20.977150] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.977235] kasan_atomics+0xb8/0x2e0 [ 20.977329] kunit_try_run_case+0x170/0x3f0 [ 20.977422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.977530] kthread+0x328/0x630 [ 20.977604] ret_from_fork+0x10/0x20 [ 20.977683] [ 20.977976] The buggy address belongs to the object at fff00000c7892700 [ 20.977976] which belongs to the cache kmalloc-64 of size 64 [ 20.978741] The buggy address is located 0 bytes to the right of [ 20.978741] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.978942] [ 20.978991] The buggy address belongs to the physical page: [ 20.979066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.979200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.979312] page_type: f5(slab) [ 20.979430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.979724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.979886] page dumped because: kasan: bad access detected [ 20.980024] [ 20.980072] Memory state around the buggy address: [ 20.980354] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.980489] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.980642] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.980754] ^ [ 20.980862] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.981028] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.981171] ================================================================== [ 20.921748] ================================================================== [ 20.922280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.922436] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.922545] [ 20.923066] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.923395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.923534] Hardware name: linux,dummy-virt (DT) [ 20.923601] Call trace: [ 20.923820] show_stack+0x20/0x38 (C) [ 20.923944] dump_stack_lvl+0x8c/0xd0 [ 20.924332] print_report+0x118/0x608 [ 20.924463] kasan_report+0xdc/0x128 [ 20.924573] kasan_check_range+0x100/0x1a8 [ 20.924897] __kasan_check_write+0x20/0x30 [ 20.925407] kasan_atomics_helper+0x1644/0x4858 [ 20.925745] kasan_atomics+0x198/0x2e0 [ 20.925858] kunit_try_run_case+0x170/0x3f0 [ 20.925982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.926105] kthread+0x328/0x630 [ 20.926204] ret_from_fork+0x10/0x20 [ 20.926309] [ 20.926367] Allocated by task 265: [ 20.927119] kasan_save_stack+0x3c/0x68 [ 20.927619] kasan_save_track+0x20/0x40 [ 20.927866] kasan_save_alloc_info+0x40/0x58 [ 20.927971] __kasan_kmalloc+0xd4/0xd8 [ 20.928406] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.928521] kasan_atomics+0xb8/0x2e0 [ 20.928991] kunit_try_run_case+0x170/0x3f0 [ 20.929104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.929539] kthread+0x328/0x630 [ 20.929624] ret_from_fork+0x10/0x20 [ 20.929703] [ 20.929750] The buggy address belongs to the object at fff00000c7892700 [ 20.929750] which belongs to the cache kmalloc-64 of size 64 [ 20.930234] The buggy address is located 0 bytes to the right of [ 20.930234] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.930694] [ 20.930750] The buggy address belongs to the physical page: [ 20.930821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.931287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.931596] page_type: f5(slab) [ 20.931902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.932007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.932228] page dumped because: kasan: bad access detected [ 20.932471] [ 20.932684] Memory state around the buggy address: [ 20.932953] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.933213] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.933329] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.933473] ^ [ 20.933557] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.933686] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.933788] ================================================================== [ 20.664069] ================================================================== [ 20.664118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.664195] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.664248] [ 20.664279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.664379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.664410] Hardware name: linux,dummy-virt (DT) [ 20.664444] Call trace: [ 20.664484] show_stack+0x20/0x38 (C) [ 20.664541] dump_stack_lvl+0x8c/0xd0 [ 20.664593] print_report+0x118/0x608 [ 20.664667] kasan_report+0xdc/0x128 [ 20.664723] kasan_check_range+0x100/0x1a8 [ 20.664778] __kasan_check_write+0x20/0x30 [ 20.664829] kasan_atomics_helper+0xd3c/0x4858 [ 20.664894] kasan_atomics+0x198/0x2e0 [ 20.665000] kunit_try_run_case+0x170/0x3f0 [ 20.665055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.665115] kthread+0x328/0x630 [ 20.665162] ret_from_fork+0x10/0x20 [ 20.665216] [ 20.665241] Allocated by task 265: [ 20.665273] kasan_save_stack+0x3c/0x68 [ 20.665327] kasan_save_track+0x20/0x40 [ 20.665372] kasan_save_alloc_info+0x40/0x58 [ 20.665413] __kasan_kmalloc+0xd4/0xd8 [ 20.665451] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.665491] kasan_atomics+0xb8/0x2e0 [ 20.665527] kunit_try_run_case+0x170/0x3f0 [ 20.665563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.665608] kthread+0x328/0x630 [ 20.665640] ret_from_fork+0x10/0x20 [ 20.665675] [ 20.665698] The buggy address belongs to the object at fff00000c7892700 [ 20.665698] which belongs to the cache kmalloc-64 of size 64 [ 20.665753] The buggy address is located 0 bytes to the right of [ 20.665753] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.665814] [ 20.665838] The buggy address belongs to the physical page: [ 20.665869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.665919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.665967] page_type: f5(slab) [ 20.666009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.666060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.666100] page dumped because: kasan: bad access detected [ 20.666132] [ 20.666159] Memory state around the buggy address: [ 20.666228] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.666311] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.666369] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.666408] ^ [ 20.666442] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.666483] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.666533] ================================================================== [ 20.630225] ================================================================== [ 20.630275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.630667] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.630774] [ 20.630862] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.630969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.631000] Hardware name: linux,dummy-virt (DT) [ 20.631132] Call trace: [ 20.631162] show_stack+0x20/0x38 (C) [ 20.631254] dump_stack_lvl+0x8c/0xd0 [ 20.631451] print_report+0x118/0x608 [ 20.631640] kasan_report+0xdc/0x128 [ 20.631830] kasan_check_range+0x100/0x1a8 [ 20.631950] __kasan_check_write+0x20/0x30 [ 20.632084] kasan_atomics_helper+0xad4/0x4858 [ 20.632312] kasan_atomics+0x198/0x2e0 [ 20.632398] kunit_try_run_case+0x170/0x3f0 [ 20.632613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.632783] kthread+0x328/0x630 [ 20.632832] ret_from_fork+0x10/0x20 [ 20.632883] [ 20.632905] Allocated by task 265: [ 20.633131] kasan_save_stack+0x3c/0x68 [ 20.633393] kasan_save_track+0x20/0x40 [ 20.633471] kasan_save_alloc_info+0x40/0x58 [ 20.633716] __kasan_kmalloc+0xd4/0xd8 [ 20.633782] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.633826] kasan_atomics+0xb8/0x2e0 [ 20.633908] kunit_try_run_case+0x170/0x3f0 [ 20.633955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.634005] kthread+0x328/0x630 [ 20.634077] ret_from_fork+0x10/0x20 [ 20.634588] [ 20.634670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.634723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.634773] page_type: f5(slab) [ 20.634856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.634968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.635030] page dumped because: kasan: bad access detected [ 20.635075] [ 20.635130] Memory state around the buggy address: [ 20.635189] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.635233] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.635389] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.636144] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.636602] kasan_report+0xdc/0x128 [ 20.638157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.639199] [ 20.639328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.643813] [ 20.644124] kunit_try_run_case+0x170/0x3f0 [ 20.645046] [ 20.645505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.645977] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.646421] ^ [ 20.647027] ================================================================== [ 20.598803] ================================================================== [ 20.598856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.599071] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.599144] [ 20.599181] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.599293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.599336] Hardware name: linux,dummy-virt (DT) [ 20.599372] Call trace: [ 20.599395] show_stack+0x20/0x38 (C) [ 20.599450] dump_stack_lvl+0x8c/0xd0 [ 20.599501] print_report+0x118/0x608 [ 20.599548] kasan_report+0xdc/0x128 [ 20.599769] __asan_report_load4_noabort+0x20/0x30 [ 20.599966] kasan_atomics_helper+0x42d8/0x4858 [ 20.600148] kasan_atomics+0x198/0x2e0 [ 20.600576] kunit_try_run_case+0x170/0x3f0 [ 20.600670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.600732] kthread+0x328/0x630 [ 20.600779] ret_from_fork+0x10/0x20 [ 20.600834] [ 20.600857] Allocated by task 265: [ 20.600890] kasan_save_stack+0x3c/0x68 [ 20.600940] kasan_save_track+0x20/0x40 [ 20.600983] kasan_save_alloc_info+0x40/0x58 [ 20.601948] __kasan_kmalloc+0xd4/0xd8 [ 20.602218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.602269] kasan_atomics+0xb8/0x2e0 [ 20.602306] kunit_try_run_case+0x170/0x3f0 [ 20.602363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.602410] kthread+0x328/0x630 [ 20.602446] ret_from_fork+0x10/0x20 [ 20.602484] [ 20.602508] The buggy address belongs to the object at fff00000c7892700 [ 20.602508] which belongs to the cache kmalloc-64 of size 64 [ 20.602568] The buggy address is located 0 bytes to the right of [ 20.602568] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.602632] [ 20.602656] The buggy address belongs to the physical page: [ 20.602871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.603057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.603127] page_type: f5(slab) [ 20.603218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.603293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.603397] page dumped because: kasan: bad access detected [ 20.603446] [ 20.603467] Memory state around the buggy address: [ 20.603554] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.603620] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.603664] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.603712] ^ [ 20.603968] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.604035] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.604078] ================================================================== [ 20.944686] ================================================================== [ 20.944822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.944990] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.945112] [ 20.945188] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.945385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.945440] Hardware name: linux,dummy-virt (DT) [ 20.945502] Call trace: [ 20.945548] show_stack+0x20/0x38 (C) [ 20.945649] dump_stack_lvl+0x8c/0xd0 [ 20.945750] print_report+0x118/0x608 [ 20.945853] kasan_report+0xdc/0x128 [ 20.945956] kasan_check_range+0x100/0x1a8 [ 20.946087] __kasan_check_write+0x20/0x30 [ 20.946357] kasan_atomics_helper+0x16d0/0x4858 [ 20.946799] kasan_atomics+0x198/0x2e0 [ 20.947067] kunit_try_run_case+0x170/0x3f0 [ 20.947477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.947635] kthread+0x328/0x630 [ 20.947726] ret_from_fork+0x10/0x20 [ 20.947812] [ 20.947849] Allocated by task 265: [ 20.947913] kasan_save_stack+0x3c/0x68 [ 20.948004] kasan_save_track+0x20/0x40 [ 20.948182] kasan_save_alloc_info+0x40/0x58 [ 20.948286] __kasan_kmalloc+0xd4/0xd8 [ 20.948482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.949045] kasan_atomics+0xb8/0x2e0 [ 20.949139] kunit_try_run_case+0x170/0x3f0 [ 20.949300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949432] kthread+0x328/0x630 [ 20.949514] ret_from_fork+0x10/0x20 [ 20.949604] [ 20.949653] The buggy address belongs to the object at fff00000c7892700 [ 20.949653] which belongs to the cache kmalloc-64 of size 64 [ 20.949795] The buggy address is located 0 bytes to the right of [ 20.949795] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.949982] [ 20.950033] The buggy address belongs to the physical page: [ 20.950114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.950264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.950400] page_type: f5(slab) [ 20.950528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.950651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.950760] page dumped because: kasan: bad access detected [ 20.951013] [ 20.951080] Memory state around the buggy address: [ 20.951164] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951439] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.952005] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.952214] ^ [ 20.952601] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.952858] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.952963] ================================================================== [ 20.612568] ================================================================== [ 20.612657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.612759] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.612814] [ 20.612848] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.612936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.612965] Hardware name: linux,dummy-virt (DT) [ 20.612999] Call trace: [ 20.613023] show_stack+0x20/0x38 (C) [ 20.613078] dump_stack_lvl+0x8c/0xd0 [ 20.613128] print_report+0x118/0x608 [ 20.613174] kasan_report+0xdc/0x128 [ 20.613221] kasan_check_range+0x100/0x1a8 [ 20.613268] __kasan_check_write+0x20/0x30 [ 20.613313] kasan_atomics_helper+0x99c/0x4858 [ 20.613377] kasan_atomics+0x198/0x2e0 [ 20.613424] kunit_try_run_case+0x170/0x3f0 [ 20.613496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.613679] kthread+0x328/0x630 [ 20.613883] ret_from_fork+0x10/0x20 [ 20.614247] [ 20.614279] Allocated by task 265: [ 20.614312] kasan_save_stack+0x3c/0x68 [ 20.614438] kasan_save_track+0x20/0x40 [ 20.614491] kasan_save_alloc_info+0x40/0x58 [ 20.614646] __kasan_kmalloc+0xd4/0xd8 [ 20.614905] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.614986] kasan_atomics+0xb8/0x2e0 [ 20.615099] kunit_try_run_case+0x170/0x3f0 [ 20.615377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.615433] kthread+0x328/0x630 [ 20.615470] ret_from_fork+0x10/0x20 [ 20.615555] [ 20.615581] The buggy address belongs to the object at fff00000c7892700 [ 20.615581] which belongs to the cache kmalloc-64 of size 64 [ 20.615807] The buggy address is located 0 bytes to the right of [ 20.615807] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.616148] [ 20.616178] The buggy address belongs to the physical page: [ 20.616213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.616268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.616341] page_type: f5(slab) [ 20.616390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.616444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.616882] page dumped because: kasan: bad access detected [ 20.616931] [ 20.616958] Memory state around the buggy address: [ 20.617019] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.617314] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.617379] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.617480] ^ [ 20.617520] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.617566] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.618027] ================================================================== [ 20.680153] ================================================================== [ 20.680205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.680259] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.680313] [ 20.680358] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.680449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.680492] Hardware name: linux,dummy-virt (DT) [ 20.680527] Call trace: [ 20.680554] show_stack+0x20/0x38 (C) [ 20.680607] dump_stack_lvl+0x8c/0xd0 [ 20.680657] print_report+0x118/0x608 [ 20.680706] kasan_report+0xdc/0x128 [ 20.680766] kasan_check_range+0x100/0x1a8 [ 20.680824] __kasan_check_write+0x20/0x30 [ 20.680869] kasan_atomics_helper+0xe44/0x4858 [ 20.680919] kasan_atomics+0x198/0x2e0 [ 20.680967] kunit_try_run_case+0x170/0x3f0 [ 20.681016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.681129] kthread+0x328/0x630 [ 20.681180] ret_from_fork+0x10/0x20 [ 20.681231] [ 20.681252] Allocated by task 265: [ 20.681283] kasan_save_stack+0x3c/0x68 [ 20.681338] kasan_save_track+0x20/0x40 [ 20.681382] kasan_save_alloc_info+0x40/0x58 [ 20.681426] __kasan_kmalloc+0xd4/0xd8 [ 20.681465] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.681505] kasan_atomics+0xb8/0x2e0 [ 20.681542] kunit_try_run_case+0x170/0x3f0 [ 20.681582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.681626] kthread+0x328/0x630 [ 20.681660] ret_from_fork+0x10/0x20 [ 20.681708] [ 20.681734] The buggy address belongs to the object at fff00000c7892700 [ 20.681734] which belongs to the cache kmalloc-64 of size 64 [ 20.681794] The buggy address is located 0 bytes to the right of [ 20.681794] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.681857] [ 20.681878] The buggy address belongs to the physical page: [ 20.681910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.681959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.682007] page_type: f5(slab) [ 20.682048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.682169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.682239] page dumped because: kasan: bad access detected [ 20.682274] [ 20.682294] Memory state around the buggy address: [ 20.682342] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.682388] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.682431] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.682469] ^ [ 20.682504] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.682545] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.682583] ================================================================== [ 20.671155] ================================================================== [ 20.671224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.671287] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.671349] [ 20.671385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.671472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.671502] Hardware name: linux,dummy-virt (DT) [ 20.671536] Call trace: [ 20.671562] show_stack+0x20/0x38 (C) [ 20.672539] dump_stack_lvl+0x8c/0xd0 [ 20.672754] print_report+0x118/0x608 [ 20.672805] kasan_report+0xdc/0x128 [ 20.672853] kasan_check_range+0x100/0x1a8 [ 20.672902] __kasan_check_read+0x20/0x30 [ 20.672948] kasan_atomics_helper+0xdd4/0x4858 [ 20.672997] kasan_atomics+0x198/0x2e0 [ 20.673044] kunit_try_run_case+0x170/0x3f0 [ 20.673094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.673147] kthread+0x328/0x630 [ 20.673189] ret_from_fork+0x10/0x20 [ 20.673240] [ 20.673261] Allocated by task 265: [ 20.673294] kasan_save_stack+0x3c/0x68 [ 20.673699] kasan_save_track+0x20/0x40 [ 20.673753] kasan_save_alloc_info+0x40/0x58 [ 20.673798] __kasan_kmalloc+0xd4/0xd8 [ 20.673848] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.674100] kasan_atomics+0xb8/0x2e0 [ 20.674148] kunit_try_run_case+0x170/0x3f0 [ 20.674207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.674467] kthread+0x328/0x630 [ 20.674505] ret_from_fork+0x10/0x20 [ 20.674562] [ 20.674649] The buggy address belongs to the object at fff00000c7892700 [ 20.674649] which belongs to the cache kmalloc-64 of size 64 [ 20.675155] The buggy address is located 0 bytes to the right of [ 20.675155] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.675240] [ 20.675279] The buggy address belongs to the physical page: [ 20.675317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.675674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.675804] page_type: f5(slab) [ 20.675912] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.676011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.676054] page dumped because: kasan: bad access detected [ 20.676088] [ 20.676108] Memory state around the buggy address: [ 20.676164] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.676209] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.676252] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.676291] ^ [ 20.676336] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.676562] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.676630] ================================================================== [ 20.725675] ================================================================== [ 20.725746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.725811] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.725865] [ 20.725899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.725987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.726017] Hardware name: linux,dummy-virt (DT) [ 20.726050] Call trace: [ 20.726075] show_stack+0x20/0x38 (C) [ 20.726127] dump_stack_lvl+0x8c/0xd0 [ 20.726178] print_report+0x118/0x608 [ 20.726228] kasan_report+0xdc/0x128 [ 20.726273] kasan_check_range+0x100/0x1a8 [ 20.729098] __kasan_check_write+0x20/0x30 [ 20.729478] kasan_atomics_helper+0x10c0/0x4858 [ 20.729753] kasan_atomics+0x198/0x2e0 [ 20.729970] kunit_try_run_case+0x170/0x3f0 [ 20.730307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.730456] kthread+0x328/0x630 [ 20.730562] ret_from_fork+0x10/0x20 [ 20.730665] [ 20.730688] Allocated by task 265: [ 20.730721] kasan_save_stack+0x3c/0x68 [ 20.731087] kasan_save_track+0x20/0x40 [ 20.731162] kasan_save_alloc_info+0x40/0x58 [ 20.731214] __kasan_kmalloc+0xd4/0xd8 [ 20.731281] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.731333] kasan_atomics+0xb8/0x2e0 [ 20.731393] kunit_try_run_case+0x170/0x3f0 [ 20.731439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.731485] kthread+0x328/0x630 [ 20.731519] ret_from_fork+0x10/0x20 [ 20.731559] [ 20.731606] The buggy address belongs to the object at fff00000c7892700 [ 20.731606] which belongs to the cache kmalloc-64 of size 64 [ 20.731670] The buggy address is located 0 bytes to the right of [ 20.731670] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.731734] [ 20.731758] The buggy address belongs to the physical page: [ 20.731793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.731847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.731929] page_type: f5(slab) [ 20.732270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.732357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.732414] page dumped because: kasan: bad access detected [ 20.732513] [ 20.732540] Memory state around the buggy address: [ 20.732578] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.732665] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.732727] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.732798] ^ [ 20.732838] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732885] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732926] ================================================================== [ 20.761864] ================================================================== [ 20.762022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.762179] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.762345] [ 20.762434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.762632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.762696] Hardware name: linux,dummy-virt (DT) [ 20.762799] Call trace: [ 20.762848] show_stack+0x20/0x38 (C) [ 20.762950] dump_stack_lvl+0x8c/0xd0 [ 20.763297] print_report+0x118/0x608 [ 20.763441] kasan_report+0xdc/0x128 [ 20.763532] kasan_check_range+0x100/0x1a8 [ 20.763636] __kasan_check_write+0x20/0x30 [ 20.763964] kasan_atomics_helper+0x126c/0x4858 [ 20.764120] kasan_atomics+0x198/0x2e0 [ 20.764296] kunit_try_run_case+0x170/0x3f0 [ 20.764655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.764849] kthread+0x328/0x630 [ 20.764950] ret_from_fork+0x10/0x20 [ 20.765271] [ 20.765436] Allocated by task 265: [ 20.765538] kasan_save_stack+0x3c/0x68 [ 20.765765] kasan_save_track+0x20/0x40 [ 20.766081] kasan_save_alloc_info+0x40/0x58 [ 20.766246] __kasan_kmalloc+0xd4/0xd8 [ 20.766552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.766752] kasan_atomics+0xb8/0x2e0 [ 20.766872] kunit_try_run_case+0x170/0x3f0 [ 20.766971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.767079] kthread+0x328/0x630 [ 20.767163] ret_from_fork+0x10/0x20 [ 20.767251] [ 20.767302] The buggy address belongs to the object at fff00000c7892700 [ 20.767302] which belongs to the cache kmalloc-64 of size 64 [ 20.767451] The buggy address is located 0 bytes to the right of [ 20.767451] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.767606] [ 20.768441] The buggy address belongs to the physical page: [ 20.768570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.769099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.769405] page_type: f5(slab) [ 20.769730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.770466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.770981] page dumped because: kasan: bad access detected [ 20.771862] [ 20.771972] Memory state around the buggy address: [ 20.772222] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.773009] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.773504] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.774217] ^ [ 20.774315] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.774438] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.774536] ================================================================== [ 20.661132] ================================================================== [ 20.661224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.661283] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.661351] [ 20.661386] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.661476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.661506] Hardware name: linux,dummy-virt (DT) [ 20.661541] Call trace: [ 20.661567] show_stack+0x20/0x38 (C) [ 20.661616] dump_stack_lvl+0x8c/0xd0 [ 20.661665] print_report+0x118/0x608 [ 20.661713] kasan_report+0xdc/0x128 [ 20.661760] __asan_report_load4_noabort+0x20/0x30 [ 20.661813] kasan_atomics_helper+0x3dd8/0x4858 [ 20.661861] kasan_atomics+0x198/0x2e0 [ 20.661907] kunit_try_run_case+0x170/0x3f0 [ 20.661956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.662011] kthread+0x328/0x630 [ 20.662052] ret_from_fork+0x10/0x20 [ 20.662101] [ 20.662122] Allocated by task 265: [ 20.662151] kasan_save_stack+0x3c/0x68 [ 20.662194] kasan_save_track+0x20/0x40 [ 20.662233] kasan_save_alloc_info+0x40/0x58 [ 20.662274] __kasan_kmalloc+0xd4/0xd8 [ 20.662313] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.662365] kasan_atomics+0xb8/0x2e0 [ 20.662402] kunit_try_run_case+0x170/0x3f0 [ 20.662442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.662484] kthread+0x328/0x630 [ 20.662517] ret_from_fork+0x10/0x20 [ 20.662734] [ 20.662811] The buggy address belongs to the object at fff00000c7892700 [ 20.662811] which belongs to the cache kmalloc-64 of size 64 [ 20.662872] The buggy address is located 0 bytes to the right of [ 20.662872] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.662936] [ 20.662958] The buggy address belongs to the physical page: [ 20.662990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.663041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.663092] page_type: f5(slab) [ 20.663132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.663184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.663225] page dumped because: kasan: bad access detected [ 20.663255] [ 20.663276] Memory state around the buggy address: [ 20.663306] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.663362] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.663407] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.663446] ^ [ 20.663480] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.663522] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.663617] ================================================================== [ 20.695499] ================================================================== [ 20.695665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.695778] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.695843] [ 20.695878] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.695963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.695994] Hardware name: linux,dummy-virt (DT) [ 20.696026] Call trace: [ 20.696050] show_stack+0x20/0x38 (C) [ 20.696102] dump_stack_lvl+0x8c/0xd0 [ 20.696151] print_report+0x118/0x608 [ 20.696199] kasan_report+0xdc/0x128 [ 20.696246] kasan_check_range+0x100/0x1a8 [ 20.696295] __kasan_check_write+0x20/0x30 [ 20.696354] kasan_atomics_helper+0xf20/0x4858 [ 20.696405] kasan_atomics+0x198/0x2e0 [ 20.696463] kunit_try_run_case+0x170/0x3f0 [ 20.697407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.697920] kthread+0x328/0x630 [ 20.697973] ret_from_fork+0x10/0x20 [ 20.698103] [ 20.698128] Allocated by task 265: [ 20.698160] kasan_save_stack+0x3c/0x68 [ 20.698205] kasan_save_track+0x20/0x40 [ 20.698244] kasan_save_alloc_info+0x40/0x58 [ 20.698337] __kasan_kmalloc+0xd4/0xd8 [ 20.698461] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.698507] kasan_atomics+0xb8/0x2e0 [ 20.698545] kunit_try_run_case+0x170/0x3f0 [ 20.698597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.698946] kthread+0x328/0x630 [ 20.699347] ret_from_fork+0x10/0x20 [ 20.699430] [ 20.699689] The buggy address belongs to the object at fff00000c7892700 [ 20.699689] which belongs to the cache kmalloc-64 of size 64 [ 20.699775] The buggy address is located 0 bytes to the right of [ 20.699775] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.699846] [ 20.699869] The buggy address belongs to the physical page: [ 20.699918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.699969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.700031] page_type: f5(slab) [ 20.700090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.700161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.700219] page dumped because: kasan: bad access detected [ 20.700269] [ 20.700507] Memory state around the buggy address: [ 20.700563] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.700615] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.701002] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.701065] ^ [ 20.701108] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.701152] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.701192] ================================================================== [ 20.982922] ================================================================== [ 20.983200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.983382] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.983526] [ 20.983600] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.983764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.983829] Hardware name: linux,dummy-virt (DT) [ 20.984471] Call trace: [ 20.984755] show_stack+0x20/0x38 (C) [ 20.984949] dump_stack_lvl+0x8c/0xd0 [ 20.985077] print_report+0x118/0x608 [ 20.985203] kasan_report+0xdc/0x128 [ 20.985311] kasan_check_range+0x100/0x1a8 [ 20.985645] __kasan_check_write+0x20/0x30 [ 20.986016] kasan_atomics_helper+0x17ec/0x4858 [ 20.986381] kasan_atomics+0x198/0x2e0 [ 20.986494] kunit_try_run_case+0x170/0x3f0 [ 20.986620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.986733] kthread+0x328/0x630 [ 20.986993] ret_from_fork+0x10/0x20 [ 20.987141] [ 20.987354] Allocated by task 265: [ 20.987440] kasan_save_stack+0x3c/0x68 [ 20.987545] kasan_save_track+0x20/0x40 [ 20.987634] kasan_save_alloc_info+0x40/0x58 [ 20.987768] __kasan_kmalloc+0xd4/0xd8 [ 20.987853] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.988005] kasan_atomics+0xb8/0x2e0 [ 20.988077] kunit_try_run_case+0x170/0x3f0 [ 20.988495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.988726] kthread+0x328/0x630 [ 20.988820] ret_from_fork+0x10/0x20 [ 20.989112] [ 20.989216] The buggy address belongs to the object at fff00000c7892700 [ 20.989216] which belongs to the cache kmalloc-64 of size 64 [ 20.989451] The buggy address is located 0 bytes to the right of [ 20.989451] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.989598] [ 20.989650] The buggy address belongs to the physical page: [ 20.989716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.989833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.990259] page_type: f5(slab) [ 20.990655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.990844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.990937] page dumped because: kasan: bad access detected [ 20.990997] [ 20.991083] Memory state around the buggy address: [ 20.991159] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.991258] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.991374] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.991711] ^ [ 20.991827] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.992010] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.992213] ================================================================== [ 20.624573] ================================================================== [ 20.624646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.625092] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.625161] [ 20.625210] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.625346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.625386] Hardware name: linux,dummy-virt (DT) [ 20.625620] Call trace: [ 20.625673] show_stack+0x20/0x38 (C) [ 20.625823] dump_stack_lvl+0x8c/0xd0 [ 20.625878] print_report+0x118/0x608 [ 20.626031] kasan_report+0xdc/0x128 [ 20.626084] kasan_check_range+0x100/0x1a8 [ 20.626400] __kasan_check_write+0x20/0x30 [ 20.626484] kasan_atomics_helper+0xa6c/0x4858 [ 20.626538] kasan_atomics+0x198/0x2e0 [ 20.626585] kunit_try_run_case+0x170/0x3f0 [ 20.626637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.626692] kthread+0x328/0x630 [ 20.626736] ret_from_fork+0x10/0x20 [ 20.626823] [ 20.626846] Allocated by task 265: [ 20.626879] kasan_save_stack+0x3c/0x68 [ 20.626950] kasan_save_track+0x20/0x40 [ 20.627049] kasan_save_alloc_info+0x40/0x58 [ 20.627126] __kasan_kmalloc+0xd4/0xd8 [ 20.627192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.627234] kasan_atomics+0xb8/0x2e0 [ 20.627270] kunit_try_run_case+0x170/0x3f0 [ 20.627310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.627367] kthread+0x328/0x630 [ 20.627403] ret_from_fork+0x10/0x20 [ 20.627440] [ 20.627979] The buggy address belongs to the object at fff00000c7892700 [ 20.627979] which belongs to the cache kmalloc-64 of size 64 [ 20.628050] The buggy address is located 0 bytes to the right of [ 20.628050] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.628126] [ 20.628151] The buggy address belongs to the physical page: [ 20.628437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.628582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.628635] page_type: f5(slab) [ 20.628947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.629003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.629085] page dumped because: kasan: bad access detected [ 20.629291] [ 20.629437] Memory state around the buggy address: [ 20.629573] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.629746] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.629794] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.629834] ^ [ 20.629870] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.629925] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.629966] ================================================================== [ 20.890691] ================================================================== [ 20.890958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.891103] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.891207] [ 20.891283] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.892235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.892625] Hardware name: linux,dummy-virt (DT) [ 20.892723] Call trace: [ 20.892795] show_stack+0x20/0x38 (C) [ 20.892920] dump_stack_lvl+0x8c/0xd0 [ 20.893043] print_report+0x118/0x608 [ 20.893582] kasan_report+0xdc/0x128 [ 20.893984] kasan_check_range+0x100/0x1a8 [ 20.894174] __kasan_check_write+0x20/0x30 [ 20.894445] kasan_atomics_helper+0x15b4/0x4858 [ 20.894827] kasan_atomics+0x198/0x2e0 [ 20.895142] kunit_try_run_case+0x170/0x3f0 [ 20.895698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.895834] kthread+0x328/0x630 [ 20.895918] ret_from_fork+0x10/0x20 [ 20.896720] [ 20.896804] Allocated by task 265: [ 20.897046] kasan_save_stack+0x3c/0x68 [ 20.897594] kasan_save_track+0x20/0x40 [ 20.897990] kasan_save_alloc_info+0x40/0x58 [ 20.898532] __kasan_kmalloc+0xd4/0xd8 [ 20.898684] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.898962] kasan_atomics+0xb8/0x2e0 [ 20.899053] kunit_try_run_case+0x170/0x3f0 [ 20.899470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.899674] kthread+0x328/0x630 [ 20.899751] ret_from_fork+0x10/0x20 [ 20.899832] [ 20.900651] The buggy address belongs to the object at fff00000c7892700 [ 20.900651] which belongs to the cache kmalloc-64 of size 64 [ 20.900807] The buggy address is located 0 bytes to the right of [ 20.900807] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.901329] [ 20.901546] The buggy address belongs to the physical page: [ 20.901635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.901758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.901872] page_type: f5(slab) [ 20.902195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.902341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.902460] page dumped because: kasan: bad access detected [ 20.902542] [ 20.902593] Memory state around the buggy address: [ 20.902671] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.902772] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.902867] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.902969] ^ [ 20.903078] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.903209] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.903303] ================================================================== [ 20.677494] ================================================================== [ 20.677559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.677622] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.677672] [ 20.677707] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.677817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.677848] Hardware name: linux,dummy-virt (DT) [ 20.677883] Call trace: [ 20.677908] show_stack+0x20/0x38 (C) [ 20.677961] dump_stack_lvl+0x8c/0xd0 [ 20.678009] print_report+0x118/0x608 [ 20.678058] kasan_report+0xdc/0x128 [ 20.678107] __asan_report_load8_noabort+0x20/0x30 [ 20.678160] kasan_atomics_helper+0x3f58/0x4858 [ 20.678211] kasan_atomics+0x198/0x2e0 [ 20.678259] kunit_try_run_case+0x170/0x3f0 [ 20.678308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.678380] kthread+0x328/0x630 [ 20.678426] ret_from_fork+0x10/0x20 [ 20.678474] [ 20.678494] Allocated by task 265: [ 20.678525] kasan_save_stack+0x3c/0x68 [ 20.678568] kasan_save_track+0x20/0x40 [ 20.678608] kasan_save_alloc_info+0x40/0x58 [ 20.678649] __kasan_kmalloc+0xd4/0xd8 [ 20.678686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.678732] kasan_atomics+0xb8/0x2e0 [ 20.678803] kunit_try_run_case+0x170/0x3f0 [ 20.678840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.678884] kthread+0x328/0x630 [ 20.678918] ret_from_fork+0x10/0x20 [ 20.678962] [ 20.678999] The buggy address belongs to the object at fff00000c7892700 [ 20.678999] which belongs to the cache kmalloc-64 of size 64 [ 20.679093] The buggy address is located 0 bytes to the right of [ 20.679093] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.679159] [ 20.679198] The buggy address belongs to the physical page: [ 20.679271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.679337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.679392] page_type: f5(slab) [ 20.679432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.679484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.679525] page dumped because: kasan: bad access detected [ 20.679558] [ 20.679578] Memory state around the buggy address: [ 20.679609] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.679652] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.679695] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.679733] ^ [ 20.679780] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.679832] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.679873] ================================================================== [ 20.682685] ================================================================== [ 20.682730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.682793] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.682845] [ 20.682879] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.682963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.682992] Hardware name: linux,dummy-virt (DT) [ 20.683026] Call trace: [ 20.683051] show_stack+0x20/0x38 (C) [ 20.683102] dump_stack_lvl+0x8c/0xd0 [ 20.683163] print_report+0x118/0x608 [ 20.683266] kasan_report+0xdc/0x128 [ 20.683314] __asan_report_store8_noabort+0x20/0x30 [ 20.683376] kasan_atomics_helper+0x3e5c/0x4858 [ 20.683426] kasan_atomics+0x198/0x2e0 [ 20.683473] kunit_try_run_case+0x170/0x3f0 [ 20.683521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.683575] kthread+0x328/0x630 [ 20.683620] ret_from_fork+0x10/0x20 [ 20.683669] [ 20.683694] Allocated by task 265: [ 20.683725] kasan_save_stack+0x3c/0x68 [ 20.683769] kasan_save_track+0x20/0x40 [ 20.683811] kasan_save_alloc_info+0x40/0x58 [ 20.683854] __kasan_kmalloc+0xd4/0xd8 [ 20.683893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.683935] kasan_atomics+0xb8/0x2e0 [ 20.683985] kunit_try_run_case+0x170/0x3f0 [ 20.684028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684073] kthread+0x328/0x630 [ 20.684105] ret_from_fork+0x10/0x20 [ 20.684143] [ 20.684164] The buggy address belongs to the object at fff00000c7892700 [ 20.684164] which belongs to the cache kmalloc-64 of size 64 [ 20.684224] The buggy address is located 0 bytes to the right of [ 20.684224] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.684289] [ 20.684310] The buggy address belongs to the physical page: [ 20.684351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.684957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.685032] page_type: f5(slab) [ 20.685081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.685137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.685180] page dumped because: kasan: bad access detected [ 20.685256] [ 20.685315] Memory state around the buggy address: [ 20.685425] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.685481] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.685526] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.685564] ^ [ 20.685600] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.685642] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.685680] ================================================================== [ 20.753135] ================================================================== [ 20.753291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.753421] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.753542] [ 20.753616] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.754288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.754391] Hardware name: linux,dummy-virt (DT) [ 20.754462] Call trace: [ 20.754513] show_stack+0x20/0x38 (C) [ 20.754632] dump_stack_lvl+0x8c/0xd0 [ 20.754737] print_report+0x118/0x608 [ 20.754882] kasan_report+0xdc/0x128 [ 20.755047] kasan_check_range+0x100/0x1a8 [ 20.755310] __kasan_check_write+0x20/0x30 [ 20.755405] kasan_atomics_helper+0x11f8/0x4858 [ 20.755532] kasan_atomics+0x198/0x2e0 [ 20.755633] kunit_try_run_case+0x170/0x3f0 [ 20.755779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.755957] kthread+0x328/0x630 [ 20.756092] ret_from_fork+0x10/0x20 [ 20.756249] [ 20.756328] Allocated by task 265: [ 20.756436] kasan_save_stack+0x3c/0x68 [ 20.756587] kasan_save_track+0x20/0x40 [ 20.756717] kasan_save_alloc_info+0x40/0x58 [ 20.756834] __kasan_kmalloc+0xd4/0xd8 [ 20.756925] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.757049] kasan_atomics+0xb8/0x2e0 [ 20.757181] kunit_try_run_case+0x170/0x3f0 [ 20.757303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.757425] kthread+0x328/0x630 [ 20.757504] ret_from_fork+0x10/0x20 [ 20.757587] [ 20.757996] The buggy address belongs to the object at fff00000c7892700 [ 20.757996] which belongs to the cache kmalloc-64 of size 64 [ 20.758353] The buggy address is located 0 bytes to the right of [ 20.758353] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.758534] [ 20.758578] The buggy address belongs to the physical page: [ 20.758643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.758753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.759047] page_type: f5(slab) [ 20.759173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.759281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.759386] page dumped because: kasan: bad access detected [ 20.759459] [ 20.759501] Memory state around the buggy address: [ 20.759569] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.759671] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.759774] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.759855] ^ [ 20.760139] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.760291] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.760428] ================================================================== [ 20.936259] ================================================================== [ 20.936386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.936514] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.936668] [ 20.936959] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.937165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.937233] Hardware name: linux,dummy-virt (DT) [ 20.937511] Call trace: [ 20.937723] show_stack+0x20/0x38 (C) [ 20.938810] dump_stack_lvl+0x8c/0xd0 [ 20.938938] print_report+0x118/0x608 [ 20.939045] kasan_report+0xdc/0x128 [ 20.939142] __asan_report_load8_noabort+0x20/0x30 [ 20.939376] kasan_atomics_helper+0x3df4/0x4858 [ 20.939473] kasan_atomics+0x198/0x2e0 [ 20.939588] kunit_try_run_case+0x170/0x3f0 [ 20.939703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.939828] kthread+0x328/0x630 [ 20.939923] ret_from_fork+0x10/0x20 [ 20.940031] [ 20.940074] Allocated by task 265: [ 20.940146] kasan_save_stack+0x3c/0x68 [ 20.940222] kasan_save_track+0x20/0x40 [ 20.940297] kasan_save_alloc_info+0x40/0x58 [ 20.940399] __kasan_kmalloc+0xd4/0xd8 [ 20.940503] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.940648] kasan_atomics+0xb8/0x2e0 [ 20.940737] kunit_try_run_case+0x170/0x3f0 [ 20.940827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.940930] kthread+0x328/0x630 [ 20.941018] ret_from_fork+0x10/0x20 [ 20.941131] [ 20.941176] The buggy address belongs to the object at fff00000c7892700 [ 20.941176] which belongs to the cache kmalloc-64 of size 64 [ 20.941309] The buggy address is located 0 bytes to the right of [ 20.941309] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.941447] [ 20.941492] The buggy address belongs to the physical page: [ 20.941608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.941766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.942074] page_type: f5(slab) [ 20.942168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.942279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.942419] page dumped because: kasan: bad access detected [ 20.942536] [ 20.942596] Memory state around the buggy address: [ 20.942697] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.942811] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.942902] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.943035] ^ [ 20.943117] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.943220] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.943314] ================================================================== [ 20.666623] ================================================================== [ 20.666673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.666736] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265 [ 20.666817] [ 20.666849] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.666933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.666963] Hardware name: linux,dummy-virt (DT) [ 20.666995] Call trace: [ 20.667019] show_stack+0x20/0x38 (C) [ 20.667069] dump_stack_lvl+0x8c/0xd0 [ 20.667116] print_report+0x118/0x608 [ 20.667162] kasan_report+0xdc/0x128 [ 20.667259] __asan_report_load4_noabort+0x20/0x30 [ 20.667668] kasan_atomics_helper+0x3e04/0x4858 [ 20.667801] kasan_atomics+0x198/0x2e0 [ 20.667851] kunit_try_run_case+0x170/0x3f0 [ 20.667902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.667956] kthread+0x328/0x630 [ 20.667998] ret_from_fork+0x10/0x20 [ 20.668048] [ 20.668070] Allocated by task 265: [ 20.668102] kasan_save_stack+0x3c/0x68 [ 20.668145] kasan_save_track+0x20/0x40 [ 20.668276] kasan_save_alloc_info+0x40/0x58 [ 20.668444] __kasan_kmalloc+0xd4/0xd8 [ 20.668604] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.668649] kasan_atomics+0xb8/0x2e0 [ 20.668687] kunit_try_run_case+0x170/0x3f0 [ 20.668777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.668841] kthread+0x328/0x630 [ 20.668873] ret_from_fork+0x10/0x20 [ 20.668911] [ 20.668945] The buggy address belongs to the object at fff00000c7892700 [ 20.668945] which belongs to the cache kmalloc-64 of size 64 [ 20.669005] The buggy address is located 0 bytes to the right of [ 20.669005] allocated 48-byte region [fff00000c7892700, fff00000c7892730) [ 20.669068] [ 20.669090] The buggy address belongs to the physical page: [ 20.669123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 20.669175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.669248] page_type: f5(slab) [ 20.669315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.669382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.669447] page dumped because: kasan: bad access detected [ 20.669517] [ 20.669566] Memory state around the buggy address: [ 20.669606] fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.669704] fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.669795] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.669832] ^ [ 20.669864] fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.669906] fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.669944] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
Automatically assigned
[ 20.445874] ================================================================== [ 20.447492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 20.447746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.448162] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 20.448411] kthread+0x328/0x630 [ 20.448532] [ 20.448725] __kasan_kmalloc+0xd4/0xd8 [ 20.448764] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.449123] The buggy address is located 8 bytes inside of [ 20.449123] allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9) [ 20.450412] page dumped because: kasan: bad access detected [ 20.450978] fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.451123] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
Automatically assigned
[ 20.368527] ================================================================== [ 20.368654] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.368931] Write of size 8 at addr fff00000c3eeb5e8 by task kunit_try_catch/261 [ 20.369120] [ 20.369311] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.370043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.370140] Hardware name: linux,dummy-virt (DT) [ 20.370427] Call trace: [ 20.370714] show_stack+0x20/0x38 (C) [ 20.371212] dump_stack_lvl+0x8c/0xd0 [ 20.371464] print_report+0x118/0x608 [ 20.371739] kasan_report+0xdc/0x128 [ 20.372104] kasan_check_range+0x100/0x1a8 [ 20.372173] __kasan_check_write+0x20/0x30 [ 20.372225] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.372279] kasan_bitops_generic+0x110/0x1c8 [ 20.372341] kunit_try_run_case+0x170/0x3f0 [ 20.372398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.372506] kthread+0x328/0x630 [ 20.372618] ret_from_fork+0x10/0x20 [ 20.372685] [ 20.372737] Allocated by task 261: [ 20.372773] kasan_save_stack+0x3c/0x68 [ 20.372820] kasan_save_track+0x20/0x40 [ 20.372862] kasan_save_alloc_info+0x40/0x58 [ 20.372904] __kasan_kmalloc+0xd4/0xd8 [ 20.372942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.372988] kasan_bitops_generic+0xa0/0x1c8 [ 20.373028] kunit_try_run_case+0x170/0x3f0 [ 20.373067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.373122] kthread+0x328/0x630 [ 20.373189] ret_from_fork+0x10/0x20 [ 20.373246] [ 20.373269] The buggy address belongs to the object at fff00000c3eeb5e0 [ 20.373269] which belongs to the cache kmalloc-16 of size 16 [ 20.373347] The buggy address is located 8 bytes inside of [ 20.373347] allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9) [ 20.373472] [ 20.373499] The buggy address belongs to the physical page: [ 20.373562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 20.373618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.373673] page_type: f5(slab) [ 20.373720] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.373776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.373816] page dumped because: kasan: bad access detected [ 20.373850] [ 20.373869] Memory state around the buggy address: [ 20.374024] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.375539] kasan_report+0xdc/0x128 [ 20.375964] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.376226] kunit_try_run_case+0x170/0x3f0 [ 20.377406] kasan_save_alloc_info+0x40/0x58 [ 20.378011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.378695] [ 20.379422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.380045] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.382031] show_stack+0x20/0x38 (C) [ 20.383484] kunit_try_run_case+0x170/0x3f0 [ 20.383636] [ 20.383717] The buggy address is located 8 bytes inside of [ 20.383717] allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9) [ 20.383939] page_type: f5(slab) [ 20.386530] Call trace: [ 20.387272] kasan_save_stack+0x3c/0x68 [ 20.389495] [ 20.390248] page_type: f5(slab) [ 20.397292] kunit_try_run_case+0x170/0x3f0 [ 20.398727] kasan_save_track+0x20/0x40 [ 20.399896] kthread+0x328/0x630 [ 20.400408] [ 20.400886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.404019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.406045] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
Automatically assigned
[ 20.342880] ================================================================== [ 20.342995] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 20.343103] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259 [ 20.343215] [ 20.343287] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.343493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.343558] Hardware name: linux,dummy-virt (DT) [ 20.343628] Call trace: [ 20.343680] show_stack+0x20/0x38 (C) [ 20.343791] dump_stack_lvl+0x8c/0xd0 [ 20.343895] print_report+0x118/0x608 [ 20.344002] kasan_report+0xdc/0x128 [ 20.344106] __asan_report_load1_noabort+0x20/0x30 [ 20.344222] strnlen+0x80/0x88 [ 20.344802] kasan_strings+0x478/0xb00 [ 20.344972] kunit_try_run_case+0x170/0x3f0 [ 20.345096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.345358] kthread+0x328/0x630 [ 20.345513] ret_from_fork+0x10/0x20 [ 20.345778] [ 20.345825] Allocated by task 259: [ 20.345890] kasan_save_stack+0x3c/0x68 [ 20.345993] kasan_save_track+0x20/0x40 [ 20.346094] kasan_save_alloc_info+0x40/0x58 [ 20.346170] __kasan_kmalloc+0xd4/0xd8 [ 20.346228] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.346294] kasan_strings+0xc8/0xb00 [ 20.346377] kunit_try_run_case+0x170/0x3f0 [ 20.346485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.346618] kthread+0x328/0x630 [ 20.346693] ret_from_fork+0x10/0x20 [ 20.346776] [ 20.346814] Freed by task 259: [ 20.346875] kasan_save_stack+0x3c/0x68 [ 20.347233] kasan_save_track+0x20/0x40 [ 20.347405] kasan_save_free_info+0x4c/0x78 [ 20.347497] __kasan_slab_free+0x6c/0x98 [ 20.347579] kfree+0x214/0x3c8 [ 20.347649] kasan_strings+0x24c/0xb00 [ 20.347716] kunit_try_run_case+0x170/0x3f0 [ 20.347779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.347865] kthread+0x328/0x630 [ 20.347932] ret_from_fork+0x10/0x20 [ 20.348012] [ 20.348058] The buggy address belongs to the object at fff00000c7896b80 [ 20.348058] which belongs to the cache kmalloc-32 of size 32 [ 20.348186] The buggy address is located 16 bytes inside of [ 20.348186] freed 32-byte region [fff00000c7896b80, fff00000c7896ba0) [ 20.348336] [ 20.348378] The buggy address belongs to the physical page: [ 20.348446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896 [ 20.348883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.349007] page_type: f5(slab) [ 20.349133] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.349247] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.349347] page dumped because: kasan: bad access detected [ 20.349432] [ 20.349495] Memory state around the buggy address: [ 20.349594] fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.349729] fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.349831] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.349935] ^ [ 20.350005] fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.350100] fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.350188] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
Automatically assigned
[ 20.332786] ================================================================== [ 20.332908] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 20.333024] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259 [ 20.333146] [ 20.333471] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.333752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.333998] Hardware name: linux,dummy-virt (DT) [ 20.334096] Call trace: [ 20.334155] show_stack+0x20/0x38 (C) [ 20.334276] dump_stack_lvl+0x8c/0xd0 [ 20.334440] print_report+0x118/0x608 [ 20.334570] kasan_report+0xdc/0x128 [ 20.334738] __asan_report_load1_noabort+0x20/0x30 [ 20.335017] strlen+0xa8/0xb0 [ 20.335108] kasan_strings+0x418/0xb00 [ 20.335796] kunit_try_run_case+0x170/0x3f0 [ 20.335923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.336054] kthread+0x328/0x630 [ 20.336185] ret_from_fork+0x10/0x20 [ 20.336315] [ 20.336378] Allocated by task 259: [ 20.336439] kasan_save_stack+0x3c/0x68 [ 20.336543] kasan_save_track+0x20/0x40 [ 20.336852] kasan_save_alloc_info+0x40/0x58 [ 20.336998] __kasan_kmalloc+0xd4/0xd8 [ 20.337115] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.337230] kasan_strings+0xc8/0xb00 [ 20.337342] kunit_try_run_case+0x170/0x3f0 [ 20.337450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.337541] kthread+0x328/0x630 [ 20.337618] ret_from_fork+0x10/0x20 [ 20.337693] [ 20.337737] Freed by task 259: [ 20.337806] kasan_save_stack+0x3c/0x68 [ 20.337883] kasan_save_track+0x20/0x40 [ 20.338159] kasan_save_free_info+0x4c/0x78 [ 20.338267] __kasan_slab_free+0x6c/0x98 [ 20.338363] kfree+0x214/0x3c8 [ 20.338436] kasan_strings+0x24c/0xb00 [ 20.338506] kunit_try_run_case+0x170/0x3f0 [ 20.338592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.338699] kthread+0x328/0x630 [ 20.338767] ret_from_fork+0x10/0x20 [ 20.339031] [ 20.339076] The buggy address belongs to the object at fff00000c7896b80 [ 20.339076] which belongs to the cache kmalloc-32 of size 32 [ 20.339244] The buggy address is located 16 bytes inside of [ 20.339244] freed 32-byte region [fff00000c7896b80, fff00000c7896ba0) [ 20.339434] [ 20.339482] The buggy address belongs to the physical page: [ 20.339556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896 [ 20.339672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.339766] page_type: f5(slab) [ 20.340165] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.340347] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.340480] page dumped because: kasan: bad access detected [ 20.340569] [ 20.340628] Memory state around the buggy address: [ 20.340711] fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.340824] fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.340973] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.341064] ^ [ 20.341336] fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.341549] fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.341771] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
Automatically assigned
[ 20.218012] ================================================================== [ 20.218198] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 20.218314] Read of size 1 at addr ffff800080a17b5f by task kunit_try_catch/251 [ 20.218707] [ 20.218854] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.219040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.219099] Hardware name: linux,dummy-virt (DT) [ 20.219186] Call trace: [ 20.219254] show_stack+0x20/0x38 (C) [ 20.219428] dump_stack_lvl+0x8c/0xd0 [ 20.219514] print_report+0x310/0x608 [ 20.219595] kasan_report+0xdc/0x128 [ 20.219679] __asan_report_load1_noabort+0x20/0x30 [ 20.219793] kasan_alloca_oob_left+0x2b8/0x310 [ 20.219899] kunit_try_run_case+0x170/0x3f0 [ 20.220044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.220157] kthread+0x328/0x630 [ 20.220461] ret_from_fork+0x10/0x20 [ 20.220583] [ 20.220672] The buggy address belongs to stack of task kunit_try_catch/251 [ 20.220810] [ 20.220874] The buggy address belongs to the virtual mapping at [ 20.220874] [ffff800080a10000, ffff800080a19000) created by: [ 20.220874] kernel_clone+0x150/0x7a8 [ 20.221050] [ 20.221098] The buggy address belongs to the physical page: [ 20.221171] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8 [ 20.221298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.221713] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.221878] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.221998] page dumped because: kasan: bad access detected [ 20.222096] [ 20.222148] Memory state around the buggy address: [ 20.222223] ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.222330] ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.222420] >ffff800080a17b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 20.222508] ^ [ 20.222592] ffff800080a17b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.222696] ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.222929] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
Automatically assigned
[ 20.322326] ================================================================== [ 20.322508] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 20.322635] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259 [ 20.322813] [ 20.322871] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.322966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.322996] Hardware name: linux,dummy-virt (DT) [ 20.323030] Call trace: [ 20.323058] show_stack+0x20/0x38 (C) [ 20.323111] dump_stack_lvl+0x8c/0xd0 [ 20.323161] print_report+0x118/0x608 [ 20.323209] kasan_report+0xdc/0x128 [ 20.323256] __asan_report_load1_noabort+0x20/0x30 [ 20.323308] kasan_strings+0x95c/0xb00 [ 20.323400] kunit_try_run_case+0x170/0x3f0 [ 20.323500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.323612] kthread+0x328/0x630 [ 20.324102] ret_from_fork+0x10/0x20 [ 20.324223] [ 20.324264] Allocated by task 259: [ 20.324476] kasan_save_stack+0x3c/0x68 [ 20.324644] kasan_save_track+0x20/0x40 [ 20.325144] kasan_save_alloc_info+0x40/0x58 [ 20.325240] __kasan_kmalloc+0xd4/0xd8 [ 20.325512] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.325981] kasan_strings+0xc8/0xb00 [ 20.326067] kunit_try_run_case+0x170/0x3f0 [ 20.326181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.326392] kthread+0x328/0x630 [ 20.326843] ret_from_fork+0x10/0x20 [ 20.327117] [ 20.327181] Freed by task 259: [ 20.327473] kasan_save_stack+0x3c/0x68 [ 20.327598] kasan_save_track+0x20/0x40 [ 20.327697] kasan_save_free_info+0x4c/0x78 [ 20.327774] __kasan_slab_free+0x6c/0x98 [ 20.327993] kfree+0x214/0x3c8 [ 20.328138] kasan_strings+0x24c/0xb00 [ 20.328341] kunit_try_run_case+0x170/0x3f0 [ 20.328460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.328651] kthread+0x328/0x630 [ 20.328739] ret_from_fork+0x10/0x20 [ 20.328847] [ 20.328917] The buggy address belongs to the object at fff00000c7896b80 [ 20.328917] which belongs to the cache kmalloc-32 of size 32 [ 20.329054] The buggy address is located 16 bytes inside of [ 20.329054] freed 32-byte region [fff00000c7896b80, fff00000c7896ba0) [ 20.329209] [ 20.329280] The buggy address belongs to the physical page: [ 20.329369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896 [ 20.329495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.329608] page_type: f5(slab) [ 20.329700] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.329865] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.330005] page dumped because: kasan: bad access detected [ 20.330106] [ 20.330171] Memory state around the buggy address: [ 20.330271] fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.330384] fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.330477] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.330565] ^ [ 20.331074] fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.331173] fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.331256] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
Automatically assigned
[ 20.305104] ================================================================== [ 20.305231] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 20.306739] Read of size 1 at addr fff00000c7896b90 by task kunit_try_catch/259 [ 20.307164] [ 20.309234] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.310826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.311007] Hardware name: linux,dummy-virt (DT) [ 20.311176] Call trace: [ 20.311226] show_stack+0x20/0x38 (C) [ 20.311505] dump_stack_lvl+0x8c/0xd0 [ 20.311725] print_report+0x118/0x608 [ 20.311838] kasan_report+0xdc/0x128 [ 20.311949] __asan_report_load1_noabort+0x20/0x30 [ 20.312071] strcmp+0xc0/0xc8 [ 20.312171] kasan_strings+0x340/0xb00 [ 20.312271] kunit_try_run_case+0x170/0x3f0 [ 20.314015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.314972] kthread+0x328/0x630 [ 20.315085] ret_from_fork+0x10/0x20 [ 20.315419] [ 20.315469] Allocated by task 259: [ 20.315520] kasan_save_stack+0x3c/0x68 [ 20.315575] kasan_save_track+0x20/0x40 [ 20.315618] kasan_save_alloc_info+0x40/0x58 [ 20.315746] __kasan_kmalloc+0xd4/0xd8 [ 20.316072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.316183] kasan_strings+0xc8/0xb00 [ 20.316291] kunit_try_run_case+0x170/0x3f0 [ 20.316394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.316580] kthread+0x328/0x630 [ 20.316698] ret_from_fork+0x10/0x20 [ 20.316867] [ 20.316958] Freed by task 259: [ 20.317041] kasan_save_stack+0x3c/0x68 [ 20.317191] kasan_save_track+0x20/0x40 [ 20.317326] kasan_save_free_info+0x4c/0x78 [ 20.317722] __kasan_slab_free+0x6c/0x98 [ 20.317841] kfree+0x214/0x3c8 [ 20.317928] kasan_strings+0x24c/0xb00 [ 20.318013] kunit_try_run_case+0x170/0x3f0 [ 20.318333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.318495] kthread+0x328/0x630 [ 20.318579] ret_from_fork+0x10/0x20 [ 20.318694] [ 20.318746] The buggy address belongs to the object at fff00000c7896b80 [ 20.318746] which belongs to the cache kmalloc-32 of size 32 [ 20.318923] The buggy address is located 16 bytes inside of [ 20.318923] freed 32-byte region [fff00000c7896b80, fff00000c7896ba0) [ 20.319071] [ 20.319142] The buggy address belongs to the physical page: [ 20.319248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896 [ 20.319366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.319468] page_type: f5(slab) [ 20.319559] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.319676] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.319774] page dumped because: kasan: bad access detected [ 20.319848] [ 20.319892] Memory state around the buggy address: [ 20.319967] fff00000c7896a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.320070] fff00000c7896b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.320171] >fff00000c7896b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.320262] ^ [ 20.320343] fff00000c7896c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.320444] fff00000c7896c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.320551] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
Automatically assigned
[ 20.265095] ================================================================== [ 20.265330] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 20.265505] Read of size 1 at addr fff00000c78969d8 by task kunit_try_catch/257 [ 20.265608] [ 20.265727] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.265965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.266063] Hardware name: linux,dummy-virt (DT) [ 20.266172] Call trace: [ 20.266247] show_stack+0x20/0x38 (C) [ 20.266429] dump_stack_lvl+0x8c/0xd0 [ 20.266577] print_report+0x118/0x608 [ 20.266727] kasan_report+0xdc/0x128 [ 20.266868] __asan_report_load1_noabort+0x20/0x30 [ 20.266980] memcmp+0x198/0x1d8 [ 20.267071] kasan_memcmp+0x16c/0x300 [ 20.267205] kunit_try_run_case+0x170/0x3f0 [ 20.267334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.267441] kthread+0x328/0x630 [ 20.267545] ret_from_fork+0x10/0x20 [ 20.267643] [ 20.267678] Allocated by task 257: [ 20.267742] kasan_save_stack+0x3c/0x68 [ 20.267830] kasan_save_track+0x20/0x40 [ 20.267939] kasan_save_alloc_info+0x40/0x58 [ 20.268135] __kasan_kmalloc+0xd4/0xd8 [ 20.268251] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.268405] kasan_memcmp+0xbc/0x300 [ 20.268489] kunit_try_run_case+0x170/0x3f0 [ 20.268583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.268694] kthread+0x328/0x630 [ 20.268873] ret_from_fork+0x10/0x20 [ 20.269054] [ 20.269127] The buggy address belongs to the object at fff00000c78969c0 [ 20.269127] which belongs to the cache kmalloc-32 of size 32 [ 20.269349] The buggy address is located 0 bytes to the right of [ 20.269349] allocated 24-byte region [fff00000c78969c0, fff00000c78969d8) [ 20.269549] [ 20.269615] The buggy address belongs to the physical page: [ 20.269692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107896 [ 20.270081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.270207] page_type: f5(slab) [ 20.270303] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.270434] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.270582] page dumped because: kasan: bad access detected [ 20.270691] [ 20.270755] Memory state around the buggy address: [ 20.270865] fff00000c7896880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.270969] fff00000c7896900: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.271102] >fff00000c7896980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.271199] ^ [ 20.271305] fff00000c7896a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.271430] fff00000c7896a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.271511] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
Automatically assigned
[ 20.236855] ================================================================== [ 20.236998] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 20.237519] Read of size 1 at addr ffff800080a17b4a by task kunit_try_catch/253 [ 20.237861] [ 20.237960] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.238275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.238347] Hardware name: linux,dummy-virt (DT) [ 20.238700] Call trace: [ 20.238842] show_stack+0x20/0x38 (C) [ 20.238969] dump_stack_lvl+0x8c/0xd0 [ 20.239066] print_report+0x310/0x608 [ 20.239147] kasan_report+0xdc/0x128 [ 20.239233] __asan_report_load1_noabort+0x20/0x30 [ 20.239350] kasan_alloca_oob_right+0x2dc/0x340 [ 20.239515] kunit_try_run_case+0x170/0x3f0 [ 20.239665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.239821] kthread+0x328/0x630 [ 20.239950] ret_from_fork+0x10/0x20 [ 20.240063] [ 20.240132] The buggy address belongs to stack of task kunit_try_catch/253 [ 20.240252] [ 20.240313] The buggy address belongs to the virtual mapping at [ 20.240313] [ffff800080a10000, ffff800080a19000) created by: [ 20.240313] kernel_clone+0x150/0x7a8 [ 20.240511] [ 20.240578] The buggy address belongs to the physical page: [ 20.240667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8 [ 20.240834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.241029] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.241194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.241292] page dumped because: kasan: bad access detected [ 20.241366] [ 20.241403] Memory state around the buggy address: [ 20.241476] ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.241573] ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.241677] >ffff800080a17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.241920] ^ [ 20.242045] ffff800080a17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.242429] ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.242651] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
Automatically assigned
[ 20.189718] ================================================================== [ 20.190347] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.190735] Read of size 1 at addr ffff800080a17c2a by task kunit_try_catch/249 [ 20.191078] [ 20.191246] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.191460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.191509] Hardware name: linux,dummy-virt (DT) [ 20.191571] Call trace: [ 20.191619] show_stack+0x20/0x38 (C) [ 20.191754] dump_stack_lvl+0x8c/0xd0 [ 20.191863] print_report+0x310/0x608 [ 20.191964] kasan_report+0xdc/0x128 [ 20.192062] __asan_report_load1_noabort+0x20/0x30 [ 20.192178] kasan_stack_oob+0x238/0x270 [ 20.192274] kunit_try_run_case+0x170/0x3f0 [ 20.192395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.192530] kthread+0x328/0x630 [ 20.192649] ret_from_fork+0x10/0x20 [ 20.192792] [ 20.192954] The buggy address belongs to stack of task kunit_try_catch/249 [ 20.193172] and is located at offset 138 in frame: [ 20.193518] kasan_stack_oob+0x0/0x270 [ 20.194157] [ 20.194270] This frame has 4 objects: [ 20.194485] [48, 49) '__assertion' [ 20.194606] [64, 72) 'array' [ 20.194681] [96, 112) '__assertion' [ 20.195386] [128, 138) 'stack_array' [ 20.195651] [ 20.195966] The buggy address belongs to the virtual mapping at [ 20.195966] [ffff800080a10000, ffff800080a19000) created by: [ 20.195966] kernel_clone+0x150/0x7a8 [ 20.196195] [ 20.196249] The buggy address belongs to the physical page: [ 20.196339] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8 [ 20.196762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.197410] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.197575] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.197845] page dumped because: kasan: bad access detected [ 20.197943] [ 20.198187] Memory state around the buggy address: [ 20.198344] ffff800080a17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.198453] ffff800080a17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 20.198795] >ffff800080a17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 20.198863] ^ [ 20.198929] ffff800080a17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 20.199040] ffff800080a17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.199228] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
Automatically assigned
[ 20.120881] ================================================================== [ 20.121222] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.121451] Read of size 1 at addr ffffa132831b15cd by task kunit_try_catch/245 [ 20.121570] [ 20.121676] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.121877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.122592] Hardware name: linux,dummy-virt (DT) [ 20.122755] Call trace: [ 20.122850] show_stack+0x20/0x38 (C) [ 20.123009] dump_stack_lvl+0x8c/0xd0 [ 20.123135] print_report+0x310/0x608 [ 20.123285] kasan_report+0xdc/0x128 [ 20.123618] __asan_report_load1_noabort+0x20/0x30 [ 20.123750] kasan_global_oob_right+0x230/0x270 [ 20.123853] kunit_try_run_case+0x170/0x3f0 [ 20.124090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.124284] kthread+0x328/0x630 [ 20.124507] ret_from_fork+0x10/0x20 [ 20.124659] [ 20.125033] The buggy address belongs to the variable: [ 20.125118] global_array+0xd/0x40 [ 20.125229] [ 20.125602] The buggy address belongs to the virtual mapping at [ 20.125602] [ffffa13281350000, ffffa13283271000) created by: [ 20.125602] paging_init+0x66c/0x7d0 [ 20.126353] [ 20.126602] The buggy address belongs to the physical page: [ 20.126683] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db1 [ 20.127024] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.127213] raw: 03fffe0000002000 ffffc1ffc01f6c48 ffffc1ffc01f6c48 0000000000000000 [ 20.127619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.127708] page dumped because: kasan: bad access detected [ 20.127766] [ 20.127799] Memory state around the buggy address: [ 20.127871] ffffa132831b1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.128216] ffffa132831b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.129647] >ffffa132831b1580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 20.129733] ^ [ 20.129818] ffffa132831b1600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 20.129913] ffffa132831b1680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 20.130003] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
Automatically assigned
[ 20.060808] ================================================================== [ 20.060982] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.061166] Free of addr fff00000c78c2e01 by task kunit_try_catch/241 [ 20.061298] [ 20.061394] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.061678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.061766] Hardware name: linux,dummy-virt (DT) [ 20.061876] Call trace: [ 20.061937] show_stack+0x20/0x38 (C) [ 20.062071] dump_stack_lvl+0x8c/0xd0 [ 20.062215] print_report+0x118/0x608 [ 20.062356] kasan_report_invalid_free+0xc0/0xe8 [ 20.062458] check_slab_allocation+0xfc/0x108 [ 20.062659] __kasan_mempool_poison_object+0x78/0x150 [ 20.062850] mempool_free+0x28c/0x328 [ 20.062966] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.063089] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.063203] kunit_try_run_case+0x170/0x3f0 [ 20.063356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.063489] kthread+0x328/0x630 [ 20.063577] ret_from_fork+0x10/0x20 [ 20.063677] [ 20.063716] Allocated by task 241: [ 20.063769] kasan_save_stack+0x3c/0x68 [ 20.064073] kasan_save_track+0x20/0x40 [ 20.064204] kasan_save_alloc_info+0x40/0x58 [ 20.064375] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.064495] remove_element+0x130/0x1f8 [ 20.064595] mempool_alloc_preallocated+0x58/0xc0 [ 20.064888] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.065000] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.065381] kunit_try_run_case+0x170/0x3f0 [ 20.065552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.065654] kthread+0x328/0x630 [ 20.065735] ret_from_fork+0x10/0x20 [ 20.066066] [ 20.066264] The buggy address belongs to the object at fff00000c78c2e00 [ 20.066264] which belongs to the cache kmalloc-128 of size 128 [ 20.066426] The buggy address is located 1 bytes inside of [ 20.066426] 128-byte region [fff00000c78c2e00, fff00000c78c2e80) [ 20.066573] [ 20.066849] The buggy address belongs to the physical page: [ 20.066928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 20.067496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.067630] page_type: f5(slab) [ 20.068055] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.068181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.068280] page dumped because: kasan: bad access detected [ 20.068892] [ 20.068946] Memory state around the buggy address: [ 20.069111] fff00000c78c2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.069294] fff00000c78c2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.069443] >fff00000c78c2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.069533] ^ [ 20.069602] fff00000c78c2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.069710] fff00000c78c2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.070281] ================================================================== [ 20.096617] ================================================================== [ 20.096781] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.097404] Free of addr fff00000c79cc001 by task kunit_try_catch/243 [ 20.097527] [ 20.097609] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.098184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.098273] Hardware name: linux,dummy-virt (DT) [ 20.098358] Call trace: [ 20.098435] show_stack+0x20/0x38 (C) [ 20.098570] dump_stack_lvl+0x8c/0xd0 [ 20.098890] print_report+0x118/0x608 [ 20.098987] kasan_report_invalid_free+0xc0/0xe8 [ 20.099111] __kasan_mempool_poison_object+0xfc/0x150 [ 20.099270] mempool_free+0x28c/0x328 [ 20.099368] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.099588] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.099745] kunit_try_run_case+0x170/0x3f0 [ 20.099860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.100174] kthread+0x328/0x630 [ 20.100496] ret_from_fork+0x10/0x20 [ 20.100668] [ 20.100730] The buggy address belongs to the physical page: [ 20.100893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079cc [ 20.101061] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.101569] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.102064] page_type: f8(unknown) [ 20.102189] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.102328] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.102746] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.102917] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.103024] head: 0bfffe0000000002 ffffc1ffc31e7301 00000000ffffffff 00000000ffffffff [ 20.103120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.103208] page dumped because: kasan: bad access detected [ 20.103271] [ 20.103340] Memory state around the buggy address: [ 20.103418] fff00000c79cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.103695] fff00000c79cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.103836] >fff00000c79cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.103924] ^ [ 20.104030] fff00000c79cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.104127] fff00000c79cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.104375] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
Automatically assigned
[ 20.012924] ================================================================== [ 20.013055] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.013172] Free of addr fff00000c79cc000 by task kunit_try_catch/237 [ 20.013272] [ 20.013688] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.013927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.013998] Hardware name: linux,dummy-virt (DT) [ 20.014068] Call trace: [ 20.014173] show_stack+0x20/0x38 (C) [ 20.014301] dump_stack_lvl+0x8c/0xd0 [ 20.014422] print_report+0x118/0x608 [ 20.014784] kasan_report_invalid_free+0xc0/0xe8 [ 20.014902] __kasan_mempool_poison_object+0x14c/0x150 [ 20.015197] mempool_free+0x28c/0x328 [ 20.015305] mempool_double_free_helper+0x150/0x2e8 [ 20.015430] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.015544] kunit_try_run_case+0x170/0x3f0 [ 20.015647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.015763] kthread+0x328/0x630 [ 20.015865] ret_from_fork+0x10/0x20 [ 20.015959] [ 20.016000] The buggy address belongs to the physical page: [ 20.016059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079cc [ 20.016188] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.016341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.016469] page_type: f8(unknown) [ 20.016557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.016662] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.016932] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.017049] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.017164] head: 0bfffe0000000002 ffffc1ffc31e7301 00000000ffffffff 00000000ffffffff [ 20.017274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.017371] page dumped because: kasan: bad access detected [ 20.017446] [ 20.017495] Memory state around the buggy address: [ 20.017646] fff00000c79cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.017758] fff00000c79cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.018129] >fff00000c79cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.018243] ^ [ 20.018634] fff00000c79cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.018781] fff00000c79cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.018838] ================================================================== [ 20.044421] ================================================================== [ 20.044692] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.045081] Free of addr fff00000c79cc000 by task kunit_try_catch/239 [ 20.045270] [ 20.045379] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.045894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.045967] Hardware name: linux,dummy-virt (DT) [ 20.046042] Call trace: [ 20.046095] show_stack+0x20/0x38 (C) [ 20.046211] dump_stack_lvl+0x8c/0xd0 [ 20.046327] print_report+0x118/0x608 [ 20.046436] kasan_report_invalid_free+0xc0/0xe8 [ 20.046552] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.046669] mempool_free+0x24c/0x328 [ 20.046810] mempool_double_free_helper+0x150/0x2e8 [ 20.046920] mempool_page_alloc_double_free+0xbc/0x118 [ 20.047276] kunit_try_run_case+0x170/0x3f0 [ 20.047612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.047782] kthread+0x328/0x630 [ 20.048026] ret_from_fork+0x10/0x20 [ 20.048148] [ 20.048226] The buggy address belongs to the physical page: [ 20.048333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079cc [ 20.048497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.048652] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.048915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.049242] page dumped because: kasan: bad access detected [ 20.049351] [ 20.049420] Memory state around the buggy address: [ 20.049543] fff00000c79cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.049693] fff00000c79cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.049828] >fff00000c79cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.049918] ^ [ 20.050007] fff00000c79cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.050108] fff00000c79cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.050200] ================================================================== [ 19.984983] ================================================================== [ 19.985653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.986329] Free of addr fff00000c78c2a00 by task kunit_try_catch/235 [ 19.986502] [ 19.986651] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.986857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.986915] Hardware name: linux,dummy-virt (DT) [ 19.986987] Call trace: [ 19.987039] show_stack+0x20/0x38 (C) [ 19.987148] dump_stack_lvl+0x8c/0xd0 [ 19.987249] print_report+0x118/0x608 [ 19.987365] kasan_report_invalid_free+0xc0/0xe8 [ 19.987474] check_slab_allocation+0xd4/0x108 [ 19.987580] __kasan_mempool_poison_object+0x78/0x150 [ 19.987693] mempool_free+0x28c/0x328 [ 19.987790] mempool_double_free_helper+0x150/0x2e8 [ 19.987898] mempool_kmalloc_double_free+0xc0/0x118 [ 19.988002] kunit_try_run_case+0x170/0x3f0 [ 19.988116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.988237] kthread+0x328/0x630 [ 19.989986] ret_from_fork+0x10/0x20 [ 19.990169] [ 19.990232] Allocated by task 235: [ 19.990316] kasan_save_stack+0x3c/0x68 [ 19.990430] kasan_save_track+0x20/0x40 [ 19.990522] kasan_save_alloc_info+0x40/0x58 [ 19.990608] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.990699] remove_element+0x130/0x1f8 [ 19.991294] mempool_alloc_preallocated+0x58/0xc0 [ 19.991483] mempool_double_free_helper+0x94/0x2e8 [ 19.991654] mempool_kmalloc_double_free+0xc0/0x118 [ 19.991815] kunit_try_run_case+0x170/0x3f0 [ 19.992002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.992108] kthread+0x328/0x630 [ 19.992338] ret_from_fork+0x10/0x20 [ 19.992784] [ 19.992947] Freed by task 235: [ 19.993343] kasan_save_stack+0x3c/0x68 [ 19.993872] kasan_save_track+0x20/0x40 [ 19.993958] kasan_save_free_info+0x4c/0x78 [ 19.994481] __kasan_mempool_poison_object+0xc0/0x150 [ 19.994575] mempool_free+0x28c/0x328 [ 19.994944] mempool_double_free_helper+0x100/0x2e8 [ 19.995044] mempool_kmalloc_double_free+0xc0/0x118 [ 19.995143] kunit_try_run_case+0x170/0x3f0 [ 19.995402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.995570] kthread+0x328/0x630 [ 19.995662] ret_from_fork+0x10/0x20 [ 19.995739] [ 19.995845] The buggy address belongs to the object at fff00000c78c2a00 [ 19.995845] which belongs to the cache kmalloc-128 of size 128 [ 19.996074] The buggy address is located 0 bytes inside of [ 19.996074] 128-byte region [fff00000c78c2a00, fff00000c78c2a80) [ 19.996256] [ 19.996327] The buggy address belongs to the physical page: [ 19.996424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 19.996573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.996705] page_type: f5(slab) [ 19.996795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.996916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.997013] page dumped because: kasan: bad access detected [ 19.997087] [ 19.997150] Memory state around the buggy address: [ 19.997234] fff00000c78c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.997348] fff00000c78c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997466] >fff00000c78c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.997571] ^ [ 19.997646] fff00000c78c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997746] fff00000c78c2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.997838] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 19.881307] ================================================================== [ 19.881645] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.881778] Read of size 1 at addr fff00000c797c000 by task kunit_try_catch/229 [ 19.881885] [ 19.881964] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.882226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.882288] Hardware name: linux,dummy-virt (DT) [ 19.882374] Call trace: [ 19.882430] show_stack+0x20/0x38 (C) [ 19.882551] dump_stack_lvl+0x8c/0xd0 [ 19.882680] print_report+0x118/0x608 [ 19.882820] kasan_report+0xdc/0x128 [ 19.882970] __asan_report_load1_noabort+0x20/0x30 [ 19.883123] mempool_uaf_helper+0x314/0x340 [ 19.883238] mempool_kmalloc_large_uaf+0xc4/0x120 [ 19.883332] kunit_try_run_case+0x170/0x3f0 [ 19.883420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.883525] kthread+0x328/0x630 [ 19.883632] ret_from_fork+0x10/0x20 [ 19.883732] [ 19.883777] The buggy address belongs to the physical page: [ 19.883946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797c [ 19.884219] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.884393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.884546] page_type: f8(unknown) [ 19.884641] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.884740] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.884848] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.885170] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.885387] head: 0bfffe0000000002 ffffc1ffc31e5f01 00000000ffffffff 00000000ffffffff [ 19.885571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.885675] page dumped because: kasan: bad access detected [ 19.885749] [ 19.885787] Memory state around the buggy address: [ 19.886371] fff00000c797bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.886813] fff00000c797bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.886916] >fff00000c797c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.887126] ^ [ 19.887197] fff00000c797c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.887420] fff00000c797c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.887523] ================================================================== [ 19.960628] ================================================================== [ 19.960819] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.960969] Read of size 1 at addr fff00000c797c000 by task kunit_try_catch/233 [ 19.961086] [ 19.961195] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.961476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.961577] Hardware name: linux,dummy-virt (DT) [ 19.961682] Call trace: [ 19.961769] show_stack+0x20/0x38 (C) [ 19.961887] dump_stack_lvl+0x8c/0xd0 [ 19.962050] print_report+0x118/0x608 [ 19.962188] kasan_report+0xdc/0x128 [ 19.962309] __asan_report_load1_noabort+0x20/0x30 [ 19.962422] mempool_uaf_helper+0x314/0x340 [ 19.962520] mempool_page_alloc_uaf+0xc0/0x118 [ 19.962632] kunit_try_run_case+0x170/0x3f0 [ 19.962808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.962934] kthread+0x328/0x630 [ 19.963047] ret_from_fork+0x10/0x20 [ 19.963162] [ 19.963214] The buggy address belongs to the physical page: [ 19.963286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797c [ 19.963439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.963638] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.963793] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.963906] page dumped because: kasan: bad access detected [ 19.964028] [ 19.964072] Memory state around the buggy address: [ 19.964361] fff00000c797bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.964626] fff00000c797bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.964814] >fff00000c797c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.964896] ^ [ 19.964952] fff00000c797c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.965050] fff00000c797c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.965649] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 19.909963] ================================================================== [ 19.910117] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.910246] Read of size 1 at addr fff00000c789d240 by task kunit_try_catch/231 [ 19.910371] [ 19.910783] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.911722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.911780] Hardware name: linux,dummy-virt (DT) [ 19.911855] Call trace: [ 19.911904] show_stack+0x20/0x38 (C) [ 19.912033] dump_stack_lvl+0x8c/0xd0 [ 19.912140] print_report+0x118/0x608 [ 19.912249] kasan_report+0xdc/0x128 [ 19.912360] __asan_report_load1_noabort+0x20/0x30 [ 19.912482] mempool_uaf_helper+0x314/0x340 [ 19.912583] mempool_slab_uaf+0xc0/0x118 [ 19.912686] kunit_try_run_case+0x170/0x3f0 [ 19.912795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.913086] kthread+0x328/0x630 [ 19.913212] ret_from_fork+0x10/0x20 [ 19.913838] [ 19.913890] Allocated by task 231: [ 19.913960] kasan_save_stack+0x3c/0x68 [ 19.914065] kasan_save_track+0x20/0x40 [ 19.914164] kasan_save_alloc_info+0x40/0x58 [ 19.914264] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.914384] remove_element+0x16c/0x1f8 [ 19.914702] mempool_alloc_preallocated+0x58/0xc0 [ 19.914864] mempool_uaf_helper+0xa4/0x340 [ 19.914959] mempool_slab_uaf+0xc0/0x118 [ 19.915052] kunit_try_run_case+0x170/0x3f0 [ 19.915143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.915250] kthread+0x328/0x630 [ 19.918084] ret_from_fork+0x10/0x20 [ 19.918231] [ 19.918298] Freed by task 231: [ 19.918380] kasan_save_stack+0x3c/0x68 [ 19.918455] kasan_save_track+0x20/0x40 [ 19.918668] kasan_save_free_info+0x4c/0x78 [ 19.919160] __kasan_mempool_poison_object+0xc0/0x150 [ 19.919272] mempool_free+0x28c/0x328 [ 19.919533] mempool_uaf_helper+0x104/0x340 [ 19.919629] mempool_slab_uaf+0xc0/0x118 [ 19.919751] kunit_try_run_case+0x170/0x3f0 [ 19.919893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.920068] kthread+0x328/0x630 [ 19.920167] ret_from_fork+0x10/0x20 [ 19.920289] [ 19.920802] The buggy address belongs to the object at fff00000c789d240 [ 19.920802] which belongs to the cache test_cache of size 123 [ 19.921183] The buggy address is located 0 bytes inside of [ 19.921183] freed 123-byte region [fff00000c789d240, fff00000c789d2bb) [ 19.921374] [ 19.921426] The buggy address belongs to the physical page: [ 19.922114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789d [ 19.922806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.923013] page_type: f5(slab) [ 19.923174] raw: 0bfffe0000000000 fff00000c794a640 dead000000000122 0000000000000000 [ 19.923467] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.923549] page dumped because: kasan: bad access detected [ 19.923617] [ 19.923655] Memory state around the buggy address: [ 19.923982] fff00000c789d100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.924134] fff00000c789d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.924278] >fff00000c789d200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.924378] ^ [ 19.924467] fff00000c789d280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.924626] fff00000c789d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.924762] ================================================================== [ 19.851572] ================================================================== [ 19.851811] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.852009] Read of size 1 at addr fff00000c78c2600 by task kunit_try_catch/227 [ 19.852145] [ 19.852283] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.852509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.852576] Hardware name: linux,dummy-virt (DT) [ 19.852660] Call trace: [ 19.852837] show_stack+0x20/0x38 (C) [ 19.853005] dump_stack_lvl+0x8c/0xd0 [ 19.853241] print_report+0x118/0x608 [ 19.853367] kasan_report+0xdc/0x128 [ 19.853464] __asan_report_load1_noabort+0x20/0x30 [ 19.853576] mempool_uaf_helper+0x314/0x340 [ 19.853959] mempool_kmalloc_uaf+0xc4/0x120 [ 19.854081] kunit_try_run_case+0x170/0x3f0 [ 19.854264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.854405] kthread+0x328/0x630 [ 19.854685] ret_from_fork+0x10/0x20 [ 19.855362] [ 19.855448] Allocated by task 227: [ 19.855690] kasan_save_stack+0x3c/0x68 [ 19.855799] kasan_save_track+0x20/0x40 [ 19.855899] kasan_save_alloc_info+0x40/0x58 [ 19.855988] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.856723] remove_element+0x130/0x1f8 [ 19.857628] mempool_alloc_preallocated+0x58/0xc0 [ 19.857863] mempool_uaf_helper+0xa4/0x340 [ 19.858479] mempool_kmalloc_uaf+0xc4/0x120 [ 19.858947] kunit_try_run_case+0x170/0x3f0 [ 19.859347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.860019] kthread+0x328/0x630 [ 19.860096] ret_from_fork+0x10/0x20 [ 19.860716] [ 19.860976] Freed by task 227: [ 19.861126] kasan_save_stack+0x3c/0x68 [ 19.861739] kasan_save_track+0x20/0x40 [ 19.862211] kasan_save_free_info+0x4c/0x78 [ 19.862827] __kasan_mempool_poison_object+0xc0/0x150 [ 19.862937] mempool_free+0x28c/0x328 [ 19.863155] mempool_uaf_helper+0x104/0x340 [ 19.863534] mempool_kmalloc_uaf+0xc4/0x120 [ 19.863816] kunit_try_run_case+0x170/0x3f0 [ 19.864342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.864467] kthread+0x328/0x630 [ 19.864583] ret_from_fork+0x10/0x20 [ 19.864717] [ 19.864790] The buggy address belongs to the object at fff00000c78c2600 [ 19.864790] which belongs to the cache kmalloc-128 of size 128 [ 19.864944] The buggy address is located 0 bytes inside of [ 19.864944] freed 128-byte region [fff00000c78c2600, fff00000c78c2680) [ 19.865137] [ 19.865209] The buggy address belongs to the physical page: [ 19.865329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 19.865486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.865638] page_type: f5(slab) [ 19.865735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.865870] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.865978] page dumped because: kasan: bad access detected [ 19.866071] [ 19.866134] Memory state around the buggy address: [ 19.866226] fff00000c78c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.867174] fff00000c78c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.867290] >fff00000c78c2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.867376] ^ [ 19.867494] fff00000c78c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.867611] fff00000c78c2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.867835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
Automatically assigned
[ 19.751103] ================================================================== [ 19.751220] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.751308] Read of size 1 at addr fff00000c4693d73 by task kunit_try_catch/221 [ 19.751389] [ 19.751439] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.751534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.751564] Hardware name: linux,dummy-virt (DT) [ 19.751601] Call trace: [ 19.751632] show_stack+0x20/0x38 (C) [ 19.751699] dump_stack_lvl+0x8c/0xd0 [ 19.751762] print_report+0x118/0x608 [ 19.751818] kasan_report+0xdc/0x128 [ 19.751871] __asan_report_load1_noabort+0x20/0x30 [ 19.751929] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.751986] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.752040] kunit_try_run_case+0x170/0x3f0 [ 19.752102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.752160] kthread+0x328/0x630 [ 19.752211] ret_from_fork+0x10/0x20 [ 19.752269] [ 19.752291] Allocated by task 221: [ 19.752333] kasan_save_stack+0x3c/0x68 [ 19.752381] kasan_save_track+0x20/0x40 [ 19.752419] kasan_save_alloc_info+0x40/0x58 [ 19.752475] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.752521] remove_element+0x130/0x1f8 [ 19.752562] mempool_alloc_preallocated+0x58/0xc0 [ 19.752602] mempool_oob_right_helper+0x98/0x2f0 [ 19.752642] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.752680] kunit_try_run_case+0x170/0x3f0 [ 19.752719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.752761] kthread+0x328/0x630 [ 19.752795] ret_from_fork+0x10/0x20 [ 19.752832] [ 19.752854] The buggy address belongs to the object at fff00000c4693d00 [ 19.752854] which belongs to the cache kmalloc-128 of size 128 [ 19.752912] The buggy address is located 0 bytes to the right of [ 19.752912] allocated 115-byte region [fff00000c4693d00, fff00000c4693d73) [ 19.752975] [ 19.753001] The buggy address belongs to the physical page: [ 19.753038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104693 [ 19.753099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.753157] page_type: f5(slab) [ 19.753204] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.753256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.753298] page dumped because: kasan: bad access detected [ 19.753342] [ 19.753364] Memory state around the buggy address: [ 19.753402] fff00000c4693c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.753448] fff00000c4693c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753491] >fff00000c4693d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.753531] ^ [ 19.753571] fff00000c4693d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753614] fff00000c4693e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.753655] ================================================================== [ 19.807504] ================================================================== [ 19.807720] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.807876] Read of size 1 at addr fff00000c789f2bb by task kunit_try_catch/225 [ 19.808029] [ 19.808151] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.808403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.808462] Hardware name: linux,dummy-virt (DT) [ 19.808538] Call trace: [ 19.808590] show_stack+0x20/0x38 (C) [ 19.808741] dump_stack_lvl+0x8c/0xd0 [ 19.809218] print_report+0x118/0x608 [ 19.809364] kasan_report+0xdc/0x128 [ 19.809501] __asan_report_load1_noabort+0x20/0x30 [ 19.809604] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.809695] mempool_slab_oob_right+0xc0/0x118 [ 19.809947] kunit_try_run_case+0x170/0x3f0 [ 19.810061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.810185] kthread+0x328/0x630 [ 19.810587] ret_from_fork+0x10/0x20 [ 19.810745] [ 19.810801] Allocated by task 225: [ 19.810901] kasan_save_stack+0x3c/0x68 [ 19.811031] kasan_save_track+0x20/0x40 [ 19.811145] kasan_save_alloc_info+0x40/0x58 [ 19.811263] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.811412] remove_element+0x16c/0x1f8 [ 19.811537] mempool_alloc_preallocated+0x58/0xc0 [ 19.811630] mempool_oob_right_helper+0x98/0x2f0 [ 19.811714] mempool_slab_oob_right+0xc0/0x118 [ 19.811805] kunit_try_run_case+0x170/0x3f0 [ 19.811893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.812003] kthread+0x328/0x630 [ 19.812107] ret_from_fork+0x10/0x20 [ 19.812231] [ 19.812283] The buggy address belongs to the object at fff00000c789f240 [ 19.812283] which belongs to the cache test_cache of size 123 [ 19.812414] The buggy address is located 0 bytes to the right of [ 19.812414] allocated 123-byte region [fff00000c789f240, fff00000c789f2bb) [ 19.812584] [ 19.812640] The buggy address belongs to the physical page: [ 19.812704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789f [ 19.812850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.812968] page_type: f5(slab) [ 19.813070] raw: 0bfffe0000000000 fff00000c794a500 dead000000000122 0000000000000000 [ 19.813196] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.813292] page dumped because: kasan: bad access detected [ 19.813385] [ 19.813432] Memory state around the buggy address: [ 19.813507] fff00000c789f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.814506] fff00000c789f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.814654] >fff00000c789f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.814806] ^ [ 19.814991] fff00000c789f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.815197] fff00000c789f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.815401] ================================================================== [ 19.774907] ================================================================== [ 19.775056] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.775210] Read of size 1 at addr fff00000c797a001 by task kunit_try_catch/223 [ 19.776020] [ 19.776107] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.776301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.776379] Hardware name: linux,dummy-virt (DT) [ 19.776462] Call trace: [ 19.776527] show_stack+0x20/0x38 (C) [ 19.776656] dump_stack_lvl+0x8c/0xd0 [ 19.776775] print_report+0x118/0x608 [ 19.776880] kasan_report+0xdc/0x128 [ 19.777018] __asan_report_load1_noabort+0x20/0x30 [ 19.777279] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.777482] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.777586] kunit_try_run_case+0x170/0x3f0 [ 19.777712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.777823] kthread+0x328/0x630 [ 19.777910] ret_from_fork+0x10/0x20 [ 19.778005] [ 19.778050] The buggy address belongs to the physical page: [ 19.778450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107978 [ 19.778579] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.778683] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.778836] page_type: f8(unknown) [ 19.778932] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.779384] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.779496] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.779590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.779718] head: 0bfffe0000000002 ffffc1ffc31e5e01 00000000ffffffff 00000000ffffffff [ 19.780017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.780126] page dumped because: kasan: bad access detected [ 19.780238] [ 19.780343] Memory state around the buggy address: [ 19.780479] fff00000c7979f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.780761] fff00000c7979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.781058] >fff00000c797a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.781161] ^ [ 19.781575] fff00000c797a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.782099] fff00000c797a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.782408] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
Automatically assigned
[ 19.181764] ================================================================== [ 19.181878] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.181971] Read of size 1 at addr fff00000c794a280 by task kunit_try_catch/215 [ 19.182030] [ 19.182079] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.182180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.182210] Hardware name: linux,dummy-virt (DT) [ 19.182248] Call trace: [ 19.182279] show_stack+0x20/0x38 (C) [ 19.182355] dump_stack_lvl+0x8c/0xd0 [ 19.182418] print_report+0x118/0x608 [ 19.182472] kasan_report+0xdc/0x128 [ 19.182522] __kasan_check_byte+0x54/0x70 [ 19.182574] kmem_cache_destroy+0x34/0x218 [ 19.182627] kmem_cache_double_destroy+0x174/0x300 [ 19.182680] kunit_try_run_case+0x170/0x3f0 [ 19.182736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.182798] kthread+0x328/0x630 [ 19.182847] ret_from_fork+0x10/0x20 [ 19.182898] [ 19.182920] Allocated by task 215: [ 19.182952] kasan_save_stack+0x3c/0x68 [ 19.182999] kasan_save_track+0x20/0x40 [ 19.183038] kasan_save_alloc_info+0x40/0x58 [ 19.183078] __kasan_slab_alloc+0xa8/0xb0 [ 19.183115] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.183158] __kmem_cache_create_args+0x178/0x280 [ 19.183196] kmem_cache_double_destroy+0xc0/0x300 [ 19.183236] kunit_try_run_case+0x170/0x3f0 [ 19.183275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.183327] kthread+0x328/0x630 [ 19.183365] ret_from_fork+0x10/0x20 [ 19.183404] [ 19.183425] Freed by task 215: [ 19.183452] kasan_save_stack+0x3c/0x68 [ 19.183492] kasan_save_track+0x20/0x40 [ 19.183528] kasan_save_free_info+0x4c/0x78 [ 19.183569] __kasan_slab_free+0x6c/0x98 [ 19.183608] kmem_cache_free+0x260/0x470 [ 19.183644] slab_kmem_cache_release+0x38/0x50 [ 19.183685] kmem_cache_release+0x1c/0x30 [ 19.183721] kobject_put+0x17c/0x430 [ 19.183758] sysfs_slab_release+0x1c/0x30 [ 19.183795] kmem_cache_destroy+0x118/0x218 [ 19.183834] kmem_cache_double_destroy+0x128/0x300 [ 19.183873] kunit_try_run_case+0x170/0x3f0 [ 19.183913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.183957] kthread+0x328/0x630 [ 19.183989] ret_from_fork+0x10/0x20 [ 19.184025] [ 19.184047] The buggy address belongs to the object at fff00000c794a280 [ 19.184047] which belongs to the cache kmem_cache of size 208 [ 19.184108] The buggy address is located 0 bytes inside of [ 19.184108] freed 208-byte region [fff00000c794a280, fff00000c794a350) [ 19.184170] [ 19.184193] The buggy address belongs to the physical page: [ 19.184228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794a [ 19.184285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.184350] page_type: f5(slab) [ 19.184400] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.184463] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.184512] page dumped because: kasan: bad access detected [ 19.184546] [ 19.184569] Memory state around the buggy address: [ 19.184604] fff00000c794a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.184649] fff00000c794a200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184693] >fff00000c794a280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.184730] ^ [ 19.184762] fff00000c794a300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.184807] fff00000c794a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184849] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
Automatically assigned
[ 19.028059] ================================================================== [ 19.028427] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 19.028604] Read of size 1 at addr fff00000c794e000 by task kunit_try_catch/213 [ 19.028659] [ 19.028705] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 19.028795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.028822] Hardware name: linux,dummy-virt (DT) [ 19.028860] Call trace: [ 19.028885] show_stack+0x20/0x38 (C) [ 19.028943] dump_stack_lvl+0x8c/0xd0 [ 19.028995] print_report+0x118/0x608 [ 19.029043] kasan_report+0xdc/0x128 [ 19.029086] __asan_report_load1_noabort+0x20/0x30 [ 19.029136] kmem_cache_rcu_uaf+0x388/0x468 [ 19.029182] kunit_try_run_case+0x170/0x3f0 [ 19.029233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.029285] kthread+0x328/0x630 [ 19.029339] ret_from_fork+0x10/0x20 [ 19.029396] [ 19.029415] Allocated by task 213: [ 19.029447] kasan_save_stack+0x3c/0x68 [ 19.029492] kasan_save_track+0x20/0x40 [ 19.029530] kasan_save_alloc_info+0x40/0x58 [ 19.029567] __kasan_slab_alloc+0xa8/0xb0 [ 19.029604] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.029643] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.029678] kunit_try_run_case+0x170/0x3f0 [ 19.029714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.029754] kthread+0x328/0x630 [ 19.029785] ret_from_fork+0x10/0x20 [ 19.029820] [ 19.029838] Freed by task 0: [ 19.029864] kasan_save_stack+0x3c/0x68 [ 19.029899] kasan_save_track+0x20/0x40 [ 19.029935] kasan_save_free_info+0x4c/0x78 [ 19.029973] __kasan_slab_free+0x6c/0x98 [ 19.030019] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.030091] rcu_core+0x9f4/0x1e20 [ 19.030173] rcu_core_si+0x18/0x30 [ 19.030205] handle_softirqs+0x374/0xb28 [ 19.030761] __do_softirq+0x1c/0x28 [ 19.030908] [ 19.030933] Last potentially related work creation: [ 19.030963] kasan_save_stack+0x3c/0x68 [ 19.031011] kasan_record_aux_stack+0xb4/0xc8 [ 19.031060] kmem_cache_free+0x120/0x470 [ 19.031097] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.031134] kunit_try_run_case+0x170/0x3f0 [ 19.031170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.031211] kthread+0x328/0x630 [ 19.031381] ret_from_fork+0x10/0x20 [ 19.031529] [ 19.031687] The buggy address belongs to the object at fff00000c794e000 [ 19.031687] which belongs to the cache test_cache of size 200 [ 19.032142] The buggy address is located 0 bytes inside of [ 19.032142] freed 200-byte region [fff00000c794e000, fff00000c794e0c8) [ 19.033113] [ 19.033266] The buggy address belongs to the physical page: [ 19.033329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794e [ 19.033399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.033853] page_type: f5(slab) [ 19.034152] raw: 0bfffe0000000000 fff00000c794a140 dead000000000122 0000000000000000 [ 19.034442] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.034590] page dumped because: kasan: bad access detected [ 19.034628] [ 19.034647] Memory state around the buggy address: [ 19.034744] fff00000c794df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.035104] fff00000c794df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.035206] >fff00000c794e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.035247] ^ [ 19.035334] fff00000c794e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.035381] fff00000c794e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.035422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
Automatically assigned
[ 18.445580] ================================================================== [ 18.445749] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 18.445892] Free of addr fff00000c794d001 by task kunit_try_catch/211 [ 18.445980] [ 18.446512] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 18.446837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.446926] Hardware name: linux,dummy-virt (DT) [ 18.447043] Call trace: [ 18.447102] show_stack+0x20/0x38 (C) [ 18.447209] dump_stack_lvl+0x8c/0xd0 [ 18.447304] print_report+0x118/0x608 [ 18.447438] kasan_report_invalid_free+0xc0/0xe8 [ 18.447532] check_slab_allocation+0xfc/0x108 [ 18.447732] __kasan_slab_pre_free+0x2c/0x48 [ 18.448060] kmem_cache_free+0xf0/0x470 [ 18.448225] kmem_cache_invalid_free+0x184/0x3c8 [ 18.448399] kunit_try_run_case+0x170/0x3f0 [ 18.448534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.448658] kthread+0x328/0x630 [ 18.448745] ret_from_fork+0x10/0x20 [ 18.448873] [ 18.448938] Allocated by task 211: [ 18.449036] kasan_save_stack+0x3c/0x68 [ 18.449170] kasan_save_track+0x20/0x40 [ 18.449279] kasan_save_alloc_info+0x40/0x58 [ 18.449386] __kasan_slab_alloc+0xa8/0xb0 [ 18.449474] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.449591] kmem_cache_invalid_free+0x12c/0x3c8 [ 18.449716] kunit_try_run_case+0x170/0x3f0 [ 18.449801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.449933] kthread+0x328/0x630 [ 18.450033] ret_from_fork+0x10/0x20 [ 18.450139] [ 18.450200] The buggy address belongs to the object at fff00000c794d000 [ 18.450200] which belongs to the cache test_cache of size 200 [ 18.450365] The buggy address is located 1 bytes inside of [ 18.450365] 200-byte region [fff00000c794d000, fff00000c794d0c8) [ 18.450483] [ 18.450528] The buggy address belongs to the physical page: [ 18.450604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794d [ 18.450823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.450935] page_type: f5(slab) [ 18.451025] raw: 0bfffe0000000000 fff00000c794a000 dead000000000122 0000000000000000 [ 18.451119] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.451200] page dumped because: kasan: bad access detected [ 18.451261] [ 18.451299] Memory state around the buggy address: [ 18.451390] fff00000c794cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451498] fff00000c794cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451582] >fff00000c794d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.451651] ^ [ 18.451696] fff00000c794d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.451759] fff00000c794d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
Automatically assigned
[ 18.394097] ================================================================== [ 18.394210] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 18.394298] Free of addr fff00000c794a000 by task kunit_try_catch/209 [ 18.394498] [ 18.394573] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 18.394802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.394858] Hardware name: linux,dummy-virt (DT) [ 18.394942] Call trace: [ 18.394994] show_stack+0x20/0x38 (C) [ 18.395115] dump_stack_lvl+0x8c/0xd0 [ 18.395232] print_report+0x118/0x608 [ 18.395346] kasan_report_invalid_free+0xc0/0xe8 [ 18.395462] check_slab_allocation+0xd4/0x108 [ 18.395574] __kasan_slab_pre_free+0x2c/0x48 [ 18.395662] kmem_cache_free+0xf0/0x470 [ 18.395756] kmem_cache_double_free+0x190/0x3c8 [ 18.395888] kunit_try_run_case+0x170/0x3f0 [ 18.396055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.396185] kthread+0x328/0x630 [ 18.396282] ret_from_fork+0x10/0x20 [ 18.396409] [ 18.396449] Allocated by task 209: [ 18.396530] kasan_save_stack+0x3c/0x68 [ 18.396635] kasan_save_track+0x20/0x40 [ 18.396725] kasan_save_alloc_info+0x40/0x58 [ 18.396813] __kasan_slab_alloc+0xa8/0xb0 [ 18.396904] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.397000] kmem_cache_double_free+0x12c/0x3c8 [ 18.397124] kunit_try_run_case+0x170/0x3f0 [ 18.397244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.397360] kthread+0x328/0x630 [ 18.397423] ret_from_fork+0x10/0x20 [ 18.397498] [ 18.397534] Freed by task 209: [ 18.397624] kasan_save_stack+0x3c/0x68 [ 18.397754] kasan_save_track+0x20/0x40 [ 18.397824] kasan_save_free_info+0x4c/0x78 [ 18.397903] __kasan_slab_free+0x6c/0x98 [ 18.397973] kmem_cache_free+0x260/0x470 [ 18.398054] kmem_cache_double_free+0x140/0x3c8 [ 18.398130] kunit_try_run_case+0x170/0x3f0 [ 18.398218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.398313] kthread+0x328/0x630 [ 18.398431] ret_from_fork+0x10/0x20 [ 18.398503] [ 18.398547] The buggy address belongs to the object at fff00000c794a000 [ 18.398547] which belongs to the cache test_cache of size 200 [ 18.398682] The buggy address is located 0 bytes inside of [ 18.398682] 200-byte region [fff00000c794a000, fff00000c794a0c8) [ 18.398830] [ 18.398874] The buggy address belongs to the physical page: [ 18.398939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794a [ 18.399053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.399198] page_type: f5(slab) [ 18.399353] raw: 0bfffe0000000000 fff00000c3e3cdc0 dead000000000122 0000000000000000 [ 18.399525] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.399627] page dumped because: kasan: bad access detected [ 18.399700] [ 18.399740] Memory state around the buggy address: [ 18.399815] fff00000c7949f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.399921] fff00000c7949f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.400023] >fff00000c794a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.400097] ^ [ 18.400314] fff00000c794a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.400512] fff00000c794a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.400604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
Automatically assigned
[ 18.161746] ================================================================== [ 18.162895] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 18.163466] Read of size 1 at addr fff00000c79490c8 by task kunit_try_catch/207 [ 18.163616] [ 18.163707] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 18.163904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.163959] Hardware name: linux,dummy-virt (DT) [ 18.164020] Call trace: [ 18.164101] show_stack+0x20/0x38 (C) [ 18.164231] dump_stack_lvl+0x8c/0xd0 [ 18.164395] print_report+0x118/0x608 [ 18.164529] kasan_report+0xdc/0x128 [ 18.164650] __asan_report_load1_noabort+0x20/0x30 [ 18.165650] kmem_cache_oob+0x344/0x430 [ 18.165808] kunit_try_run_case+0x170/0x3f0 [ 18.166214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.166532] kthread+0x328/0x630 [ 18.166673] ret_from_fork+0x10/0x20 [ 18.167092] [ 18.167400] Allocated by task 207: [ 18.167930] kasan_save_stack+0x3c/0x68 [ 18.168400] kasan_save_track+0x20/0x40 [ 18.169544] kasan_save_alloc_info+0x40/0x58 [ 18.169675] __kasan_slab_alloc+0xa8/0xb0 [ 18.171206] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 18.171570] kmem_cache_oob+0x12c/0x430 [ 18.171685] kunit_try_run_case+0x170/0x3f0 [ 18.172250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.172481] kthread+0x328/0x630 [ 18.172716] ret_from_fork+0x10/0x20 [ 18.173221] [ 18.173293] The buggy address belongs to the object at fff00000c7949000 [ 18.173293] which belongs to the cache test_cache of size 200 [ 18.173452] The buggy address is located 0 bytes to the right of [ 18.173452] allocated 200-byte region [fff00000c7949000, fff00000c79490c8) [ 18.174713] [ 18.175167] The buggy address belongs to the physical page: [ 18.175248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107949 [ 18.175643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.175815] page_type: f5(slab) [ 18.175912] raw: 0bfffe0000000000 fff00000c3e3cc80 dead000000000122 0000000000000000 [ 18.176028] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.176129] page dumped because: kasan: bad access detected [ 18.177547] [ 18.177740] Memory state around the buggy address: [ 18.178067] fff00000c7948f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178224] fff00000c7949000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.178351] >fff00000c7949080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.178442] ^ [ 18.178524] fff00000c7949100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178624] fff00000c7949180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
Automatically assigned
[ 18.081312] ================================================================== [ 18.081491] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 18.081631] Read of size 8 at addr fff00000c78b61c0 by task kunit_try_catch/200 [ 18.081773] [ 18.081859] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 18.082072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.082167] Hardware name: linux,dummy-virt (DT) [ 18.082263] Call trace: [ 18.082368] show_stack+0x20/0x38 (C) [ 18.082549] dump_stack_lvl+0x8c/0xd0 [ 18.082700] print_report+0x118/0x608 [ 18.082891] kasan_report+0xdc/0x128 [ 18.082998] __asan_report_load8_noabort+0x20/0x30 [ 18.083122] workqueue_uaf+0x480/0x4a8 [ 18.083255] kunit_try_run_case+0x170/0x3f0 [ 18.083385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.083523] kthread+0x328/0x630 [ 18.083622] ret_from_fork+0x10/0x20 [ 18.083747] [ 18.083772] Allocated by task 200: [ 18.083811] kasan_save_stack+0x3c/0x68 [ 18.083862] kasan_save_track+0x20/0x40 [ 18.083903] kasan_save_alloc_info+0x40/0x58 [ 18.083947] __kasan_kmalloc+0xd4/0xd8 [ 18.083987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.084032] workqueue_uaf+0x13c/0x4a8 [ 18.084072] kunit_try_run_case+0x170/0x3f0 [ 18.084113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.084160] kthread+0x328/0x630 [ 18.084196] ret_from_fork+0x10/0x20 [ 18.084235] [ 18.084257] Freed by task 10: [ 18.084285] kasan_save_stack+0x3c/0x68 [ 18.084353] kasan_save_track+0x20/0x40 [ 18.084433] kasan_save_free_info+0x4c/0x78 [ 18.084586] __kasan_slab_free+0x6c/0x98 [ 18.084758] kfree+0x214/0x3c8 [ 18.084862] workqueue_uaf_work+0x18/0x30 [ 18.084956] process_one_work+0x530/0xf98 [ 18.085277] worker_thread+0x8ac/0xf28 [ 18.085617] kthread+0x328/0x630 [ 18.085685] ret_from_fork+0x10/0x20 [ 18.085770] [ 18.085816] Last potentially related work creation: [ 18.085880] kasan_save_stack+0x3c/0x68 [ 18.085973] kasan_record_aux_stack+0xb4/0xc8 [ 18.086066] __queue_work+0x65c/0x1010 [ 18.086577] queue_work_on+0xbc/0xf8 [ 18.086742] workqueue_uaf+0x210/0x4a8 [ 18.087296] kunit_try_run_case+0x170/0x3f0 [ 18.087431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.087544] kthread+0x328/0x630 [ 18.088136] ret_from_fork+0x10/0x20 [ 18.088369] [ 18.088519] The buggy address belongs to the object at fff00000c78b61c0 [ 18.088519] which belongs to the cache kmalloc-32 of size 32 [ 18.088688] The buggy address is located 0 bytes inside of [ 18.088688] freed 32-byte region [fff00000c78b61c0, fff00000c78b61e0) [ 18.088899] [ 18.088963] The buggy address belongs to the physical page: [ 18.089333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b6 [ 18.089673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.089835] page_type: f5(slab) [ 18.089929] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.090045] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.090554] page dumped because: kasan: bad access detected [ 18.090651] [ 18.090695] Memory state around the buggy address: [ 18.090772] fff00000c78b6080: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 18.090869] fff00000c78b6100: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.090968] >fff00000c78b6180: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 18.091058] ^ [ 18.091219] fff00000c78b6200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.091568] fff00000c78b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.091722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
Automatically assigned
[ 18.043605] ================================================================== [ 18.043855] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 18.043987] Read of size 4 at addr fff00000c78c3f80 by task swapper/0/0 [ 18.044086] [ 18.044164] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 18.044367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.044423] Hardware name: linux,dummy-virt (DT) [ 18.044505] Call trace: [ 18.044560] show_stack+0x20/0x38 (C) [ 18.044673] dump_stack_lvl+0x8c/0xd0 [ 18.044778] print_report+0x118/0x608 [ 18.044885] kasan_report+0xdc/0x128 [ 18.044983] __asan_report_load4_noabort+0x20/0x30 [ 18.045100] rcu_uaf_reclaim+0x64/0x70 [ 18.045201] rcu_core+0x9f4/0x1e20 [ 18.045306] rcu_core_si+0x18/0x30 [ 18.046293] handle_softirqs+0x374/0xb28 [ 18.046506] __do_softirq+0x1c/0x28 [ 18.046639] ____do_softirq+0x18/0x30 [ 18.046802] call_on_irq_stack+0x24/0x30 [ 18.046887] do_softirq_own_stack+0x24/0x38 [ 18.046977] __irq_exit_rcu+0x1fc/0x318 [ 18.047395] irq_exit_rcu+0x1c/0x80 [ 18.047530] el1_interrupt+0x38/0x58 [ 18.047625] el1h_64_irq_handler+0x18/0x28 [ 18.047704] el1h_64_irq+0x6c/0x70 [ 18.047882] arch_local_irq_enable+0x4/0x8 (P) [ 18.047988] do_idle+0x384/0x4e8 [ 18.048123] cpu_startup_entry+0x68/0x80 [ 18.048211] rest_init+0x160/0x188 [ 18.048301] start_kernel+0x314/0x3d8 [ 18.048571] __primary_switched+0x8c/0xa0 [ 18.048900] [ 18.048959] Allocated by task 198: [ 18.049021] kasan_save_stack+0x3c/0x68 [ 18.049147] kasan_save_track+0x20/0x40 [ 18.049271] kasan_save_alloc_info+0x40/0x58 [ 18.049385] __kasan_kmalloc+0xd4/0xd8 [ 18.049457] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.049575] rcu_uaf+0xb0/0x2d8 [ 18.049677] kunit_try_run_case+0x170/0x3f0 [ 18.049799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.049902] kthread+0x328/0x630 [ 18.049996] ret_from_fork+0x10/0x20 [ 18.050103] [ 18.050144] Freed by task 0: [ 18.050199] kasan_save_stack+0x3c/0x68 [ 18.050274] kasan_save_track+0x20/0x40 [ 18.050356] kasan_save_free_info+0x4c/0x78 [ 18.050452] __kasan_slab_free+0x6c/0x98 [ 18.050560] kfree+0x214/0x3c8 [ 18.050660] rcu_uaf_reclaim+0x28/0x70 [ 18.050793] rcu_core+0x9f4/0x1e20 [ 18.050861] rcu_core_si+0x18/0x30 [ 18.050927] handle_softirqs+0x374/0xb28 [ 18.051005] __do_softirq+0x1c/0x28 [ 18.051158] [ 18.051482] Last potentially related work creation: [ 18.051649] kasan_save_stack+0x3c/0x68 [ 18.051930] kasan_record_aux_stack+0xb4/0xc8 [ 18.052036] __call_rcu_common.constprop.0+0x70/0x8b0 [ 18.052160] call_rcu+0x18/0x30 [ 18.052222] rcu_uaf+0x14c/0x2d8 [ 18.052330] kunit_try_run_case+0x170/0x3f0 [ 18.052418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.052564] kthread+0x328/0x630 [ 18.052632] ret_from_fork+0x10/0x20 [ 18.052767] [ 18.052848] The buggy address belongs to the object at fff00000c78c3f80 [ 18.052848] which belongs to the cache kmalloc-32 of size 32 [ 18.053006] The buggy address is located 0 bytes inside of [ 18.053006] freed 32-byte region [fff00000c78c3f80, fff00000c78c3fa0) [ 18.053134] [ 18.053193] The buggy address belongs to the physical page: [ 18.053298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c3 [ 18.053467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.053580] page_type: f5(slab) [ 18.053672] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.053781] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.053868] page dumped because: kasan: bad access detected [ 18.053929] [ 18.053967] Memory state around the buggy address: [ 18.054053] fff00000c78c3e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.054191] fff00000c78c3f00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.054328] >fff00000c78c3f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.054419] ^ [ 18.054481] fff00000c78c4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.054574] fff00000c78c4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.054655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
Automatically assigned
[ 17.918610] ================================================================== [ 17.918968] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.919083] Read of size 1 at addr fff00000c78c2378 by task kunit_try_catch/196 [ 17.919212] [ 17.919274] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.919442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.919490] Hardware name: linux,dummy-virt (DT) [ 17.919544] Call trace: [ 17.919590] show_stack+0x20/0x38 (C) [ 17.919695] dump_stack_lvl+0x8c/0xd0 [ 17.919824] print_report+0x118/0x608 [ 17.919923] kasan_report+0xdc/0x128 [ 17.920074] __asan_report_load1_noabort+0x20/0x30 [ 17.920228] ksize_uaf+0x544/0x5f8 [ 17.920382] kunit_try_run_case+0x170/0x3f0 [ 17.920561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.920688] kthread+0x328/0x630 [ 17.920787] ret_from_fork+0x10/0x20 [ 17.920889] [ 17.920928] Allocated by task 196: [ 17.920990] kasan_save_stack+0x3c/0x68 [ 17.921072] kasan_save_track+0x20/0x40 [ 17.921176] kasan_save_alloc_info+0x40/0x58 [ 17.921343] __kasan_kmalloc+0xd4/0xd8 [ 17.921571] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.921670] ksize_uaf+0xb8/0x5f8 [ 17.922012] kunit_try_run_case+0x170/0x3f0 [ 17.922137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.922882] kthread+0x328/0x630 [ 17.923122] ret_from_fork+0x10/0x20 [ 17.923864] [ 17.924147] Freed by task 196: [ 17.924212] kasan_save_stack+0x3c/0x68 [ 17.924675] kasan_save_track+0x20/0x40 [ 17.924764] kasan_save_free_info+0x4c/0x78 [ 17.924851] __kasan_slab_free+0x6c/0x98 [ 17.925993] kfree+0x214/0x3c8 [ 17.926578] ksize_uaf+0x11c/0x5f8 [ 17.926839] kunit_try_run_case+0x170/0x3f0 [ 17.926919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.926997] kthread+0x328/0x630 [ 17.927062] ret_from_fork+0x10/0x20 [ 17.927875] [ 17.928062] The buggy address belongs to the object at fff00000c78c2300 [ 17.928062] which belongs to the cache kmalloc-128 of size 128 [ 17.928824] The buggy address is located 120 bytes inside of [ 17.928824] freed 128-byte region [fff00000c78c2300, fff00000c78c2380) [ 17.929329] [ 17.929483] The buggy address belongs to the physical page: [ 17.929574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.929806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.930187] page_type: f5(slab) [ 17.930412] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.930623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.930712] page dumped because: kasan: bad access detected [ 17.931055] [ 17.931100] Memory state around the buggy address: [ 17.931173] fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.931276] fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.931378] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.931456] ^ [ 17.931550] fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.931645] fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.931740] ================================================================== [ 17.909113] ================================================================== [ 17.909818] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.910267] Read of size 1 at addr fff00000c78c2300 by task kunit_try_catch/196 [ 17.910658] [ 17.910752] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.911042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.911101] Hardware name: linux,dummy-virt (DT) [ 17.911170] Call trace: [ 17.911226] show_stack+0x20/0x38 (C) [ 17.911367] dump_stack_lvl+0x8c/0xd0 [ 17.911484] print_report+0x118/0x608 [ 17.911584] kasan_report+0xdc/0x128 [ 17.911671] __asan_report_load1_noabort+0x20/0x30 [ 17.911771] ksize_uaf+0x598/0x5f8 [ 17.911846] kunit_try_run_case+0x170/0x3f0 [ 17.911959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.912093] kthread+0x328/0x630 [ 17.912196] ret_from_fork+0x10/0x20 [ 17.912357] [ 17.912393] Allocated by task 196: [ 17.912457] kasan_save_stack+0x3c/0x68 [ 17.912538] kasan_save_track+0x20/0x40 [ 17.912850] kasan_save_alloc_info+0x40/0x58 [ 17.912937] __kasan_kmalloc+0xd4/0xd8 [ 17.913024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.913383] ksize_uaf+0xb8/0x5f8 [ 17.913533] kunit_try_run_case+0x170/0x3f0 [ 17.913612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.913698] kthread+0x328/0x630 [ 17.913762] ret_from_fork+0x10/0x20 [ 17.914022] [ 17.914098] Freed by task 196: [ 17.914168] kasan_save_stack+0x3c/0x68 [ 17.914246] kasan_save_track+0x20/0x40 [ 17.914333] kasan_save_free_info+0x4c/0x78 [ 17.914411] __kasan_slab_free+0x6c/0x98 [ 17.914477] kfree+0x214/0x3c8 [ 17.914548] ksize_uaf+0x11c/0x5f8 [ 17.914621] kunit_try_run_case+0x170/0x3f0 [ 17.914700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.914804] kthread+0x328/0x630 [ 17.914877] ret_from_fork+0x10/0x20 [ 17.914954] [ 17.914998] The buggy address belongs to the object at fff00000c78c2300 [ 17.914998] which belongs to the cache kmalloc-128 of size 128 [ 17.915129] The buggy address is located 0 bytes inside of [ 17.915129] freed 128-byte region [fff00000c78c2300, fff00000c78c2380) [ 17.915262] [ 17.915307] The buggy address belongs to the physical page: [ 17.915387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.915494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.915956] page_type: f5(slab) [ 17.916112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.916259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.916384] page dumped because: kasan: bad access detected [ 17.916456] [ 17.916496] Memory state around the buggy address: [ 17.916558] fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.916675] fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.916767] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.917004] ^ [ 17.917114] fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.917211] fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.917299] ================================================================== [ 17.897406] ================================================================== [ 17.897556] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.898039] Read of size 1 at addr fff00000c78c2300 by task kunit_try_catch/196 [ 17.898198] [ 17.898295] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.898558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.898628] Hardware name: linux,dummy-virt (DT) [ 17.898705] Call trace: [ 17.898791] show_stack+0x20/0x38 (C) [ 17.898970] dump_stack_lvl+0x8c/0xd0 [ 17.899110] print_report+0x118/0x608 [ 17.899206] kasan_report+0xdc/0x128 [ 17.899332] __kasan_check_byte+0x54/0x70 [ 17.899717] ksize+0x30/0x88 [ 17.900078] ksize_uaf+0x168/0x5f8 [ 17.900199] kunit_try_run_case+0x170/0x3f0 [ 17.900339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.900479] kthread+0x328/0x630 [ 17.900603] ret_from_fork+0x10/0x20 [ 17.900745] [ 17.900789] Allocated by task 196: [ 17.900862] kasan_save_stack+0x3c/0x68 [ 17.900999] kasan_save_track+0x20/0x40 [ 17.901114] kasan_save_alloc_info+0x40/0x58 [ 17.901233] __kasan_kmalloc+0xd4/0xd8 [ 17.901333] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.901409] ksize_uaf+0xb8/0x5f8 [ 17.901481] kunit_try_run_case+0x170/0x3f0 [ 17.901828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.901984] kthread+0x328/0x630 [ 17.902215] ret_from_fork+0x10/0x20 [ 17.902262] [ 17.902284] Freed by task 196: [ 17.902333] kasan_save_stack+0x3c/0x68 [ 17.902437] kasan_save_track+0x20/0x40 [ 17.902547] kasan_save_free_info+0x4c/0x78 [ 17.902633] __kasan_slab_free+0x6c/0x98 [ 17.902709] kfree+0x214/0x3c8 [ 17.902815] ksize_uaf+0x11c/0x5f8 [ 17.902904] kunit_try_run_case+0x170/0x3f0 [ 17.902975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.903057] kthread+0x328/0x630 [ 17.903119] ret_from_fork+0x10/0x20 [ 17.903223] [ 17.903262] The buggy address belongs to the object at fff00000c78c2300 [ 17.903262] which belongs to the cache kmalloc-128 of size 128 [ 17.903629] The buggy address is located 0 bytes inside of [ 17.903629] freed 128-byte region [fff00000c78c2300, fff00000c78c2380) [ 17.903778] [ 17.903843] The buggy address belongs to the physical page: [ 17.903954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.904093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.904327] page_type: f5(slab) [ 17.904571] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.904707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.905016] page dumped because: kasan: bad access detected [ 17.905235] [ 17.905387] Memory state around the buggy address: [ 17.905684] fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.906034] fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906164] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.906248] ^ [ 17.906642] fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906847] fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906938] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
Automatically assigned
[ 17.817926] ================================================================== [ 17.818376] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.818757] Read of size 1 at addr fff00000c78c2273 by task kunit_try_catch/194 [ 17.818961] [ 17.819063] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.819271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.819418] Hardware name: linux,dummy-virt (DT) [ 17.819487] Call trace: [ 17.819536] show_stack+0x20/0x38 (C) [ 17.819656] dump_stack_lvl+0x8c/0xd0 [ 17.819811] print_report+0x118/0x608 [ 17.819918] kasan_report+0xdc/0x128 [ 17.820230] __asan_report_load1_noabort+0x20/0x30 [ 17.820465] ksize_unpoisons_memory+0x628/0x740 [ 17.820604] kunit_try_run_case+0x170/0x3f0 [ 17.820785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.820959] kthread+0x328/0x630 [ 17.821090] ret_from_fork+0x10/0x20 [ 17.821250] [ 17.821313] Allocated by task 194: [ 17.821421] kasan_save_stack+0x3c/0x68 [ 17.821528] kasan_save_track+0x20/0x40 [ 17.821606] kasan_save_alloc_info+0x40/0x58 [ 17.821685] __kasan_kmalloc+0xd4/0xd8 [ 17.821760] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.821874] ksize_unpoisons_memory+0xc0/0x740 [ 17.821956] kunit_try_run_case+0x170/0x3f0 [ 17.822041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.822130] kthread+0x328/0x630 [ 17.822238] ret_from_fork+0x10/0x20 [ 17.822334] [ 17.822375] The buggy address belongs to the object at fff00000c78c2200 [ 17.822375] which belongs to the cache kmalloc-128 of size 128 [ 17.822502] The buggy address is located 0 bytes to the right of [ 17.822502] allocated 115-byte region [fff00000c78c2200, fff00000c78c2273) [ 17.822654] [ 17.822701] The buggy address belongs to the physical page: [ 17.822926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.823048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.823158] page_type: f5(slab) [ 17.823274] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.823453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.823547] page dumped because: kasan: bad access detected [ 17.823610] [ 17.823643] Memory state around the buggy address: [ 17.823704] fff00000c78c2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.823789] fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.823907] >fff00000c78c2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.823984] ^ [ 17.824069] fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824151] fff00000c78c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824229] ================================================================== [ 17.845519] ================================================================== [ 17.845648] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.845776] Read of size 1 at addr fff00000c78c227f by task kunit_try_catch/194 [ 17.845894] [ 17.845972] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.847419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.847591] Hardware name: linux,dummy-virt (DT) [ 17.848304] Call trace: [ 17.848404] show_stack+0x20/0x38 (C) [ 17.849129] dump_stack_lvl+0x8c/0xd0 [ 17.849415] print_report+0x118/0x608 [ 17.849545] kasan_report+0xdc/0x128 [ 17.850293] __asan_report_load1_noabort+0x20/0x30 [ 17.850511] ksize_unpoisons_memory+0x690/0x740 [ 17.851234] kunit_try_run_case+0x170/0x3f0 [ 17.851872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.852096] kthread+0x328/0x630 [ 17.852408] ret_from_fork+0x10/0x20 [ 17.852821] [ 17.852867] Allocated by task 194: [ 17.852938] kasan_save_stack+0x3c/0x68 [ 17.853782] kasan_save_track+0x20/0x40 [ 17.854111] kasan_save_alloc_info+0x40/0x58 [ 17.854652] __kasan_kmalloc+0xd4/0xd8 [ 17.854934] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.855179] ksize_unpoisons_memory+0xc0/0x740 [ 17.855504] kunit_try_run_case+0x170/0x3f0 [ 17.855605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.856090] kthread+0x328/0x630 [ 17.856284] ret_from_fork+0x10/0x20 [ 17.856520] [ 17.856571] The buggy address belongs to the object at fff00000c78c2200 [ 17.856571] which belongs to the cache kmalloc-128 of size 128 [ 17.856715] The buggy address is located 12 bytes to the right of [ 17.856715] allocated 115-byte region [fff00000c78c2200, fff00000c78c2273) [ 17.857424] [ 17.857692] The buggy address belongs to the physical page: [ 17.858060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.858593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.858712] page_type: f5(slab) [ 17.858810] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.859695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.859930] page dumped because: kasan: bad access detected [ 17.860359] [ 17.860588] Memory state around the buggy address: [ 17.861064] fff00000c78c2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.861533] fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.861640] >fff00000c78c2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.861733] ^ [ 17.861828] fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.861927] fff00000c78c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.863281] ================================================================== [ 17.825693] ================================================================== [ 17.825842] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.825994] Read of size 1 at addr fff00000c78c2278 by task kunit_try_catch/194 [ 17.826150] [ 17.826248] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.826449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.826507] Hardware name: linux,dummy-virt (DT) [ 17.826567] Call trace: [ 17.826617] show_stack+0x20/0x38 (C) [ 17.826736] dump_stack_lvl+0x8c/0xd0 [ 17.826920] print_report+0x118/0x608 [ 17.827072] kasan_report+0xdc/0x128 [ 17.827224] __asan_report_load1_noabort+0x20/0x30 [ 17.827372] ksize_unpoisons_memory+0x618/0x740 [ 17.827485] kunit_try_run_case+0x170/0x3f0 [ 17.827587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.827736] kthread+0x328/0x630 [ 17.827830] ret_from_fork+0x10/0x20 [ 17.827934] [ 17.827972] Allocated by task 194: [ 17.828033] kasan_save_stack+0x3c/0x68 [ 17.828115] kasan_save_track+0x20/0x40 [ 17.828188] kasan_save_alloc_info+0x40/0x58 [ 17.828283] __kasan_kmalloc+0xd4/0xd8 [ 17.828376] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.828474] ksize_unpoisons_memory+0xc0/0x740 [ 17.828568] kunit_try_run_case+0x170/0x3f0 [ 17.828651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.828742] kthread+0x328/0x630 [ 17.828810] ret_from_fork+0x10/0x20 [ 17.828897] [ 17.828957] The buggy address belongs to the object at fff00000c78c2200 [ 17.828957] which belongs to the cache kmalloc-128 of size 128 [ 17.829165] The buggy address is located 5 bytes to the right of [ 17.829165] allocated 115-byte region [fff00000c78c2200, fff00000c78c2273) [ 17.829753] [ 17.829817] The buggy address belongs to the physical page: [ 17.829890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.830011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.830579] page_type: f5(slab) [ 17.830697] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.830899] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.831005] page dumped because: kasan: bad access detected [ 17.831061] [ 17.831095] Memory state around the buggy address: [ 17.831156] fff00000c78c2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.831242] fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.831754] >fff00000c78c2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.831859] ^ [ 17.832127] fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832733] fff00000c78c2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832848] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
Automatically assigned
[ 17.787644] ================================================================== [ 17.787829] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 17.787945] Free of addr fff00000c3eeb5c0 by task kunit_try_catch/192 [ 17.788039] [ 17.788106] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.788269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.788371] Hardware name: linux,dummy-virt (DT) [ 17.788442] Call trace: [ 17.788513] show_stack+0x20/0x38 (C) [ 17.788775] dump_stack_lvl+0x8c/0xd0 [ 17.788943] print_report+0x118/0x608 [ 17.789103] kasan_report_invalid_free+0xc0/0xe8 [ 17.789231] check_slab_allocation+0xd4/0x108 [ 17.789457] __kasan_slab_pre_free+0x2c/0x48 [ 17.790331] kfree+0xe8/0x3c8 [ 17.790515] kfree_sensitive+0x3c/0xb0 [ 17.790643] kmalloc_double_kzfree+0x168/0x308 [ 17.790763] kunit_try_run_case+0x170/0x3f0 [ 17.790892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.791024] kthread+0x328/0x630 [ 17.791136] ret_from_fork+0x10/0x20 [ 17.791257] [ 17.791298] Allocated by task 192: [ 17.791376] kasan_save_stack+0x3c/0x68 [ 17.791469] kasan_save_track+0x20/0x40 [ 17.791550] kasan_save_alloc_info+0x40/0x58 [ 17.791643] __kasan_kmalloc+0xd4/0xd8 [ 17.791727] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.791818] kmalloc_double_kzfree+0xb8/0x308 [ 17.791906] kunit_try_run_case+0x170/0x3f0 [ 17.791989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.792087] kthread+0x328/0x630 [ 17.792159] ret_from_fork+0x10/0x20 [ 17.792242] [ 17.792285] Freed by task 192: [ 17.792781] kasan_save_stack+0x3c/0x68 [ 17.792931] kasan_save_track+0x20/0x40 [ 17.793027] kasan_save_free_info+0x4c/0x78 [ 17.793140] __kasan_slab_free+0x6c/0x98 [ 17.793277] kfree+0x214/0x3c8 [ 17.793383] kfree_sensitive+0x80/0xb0 [ 17.793495] kmalloc_double_kzfree+0x11c/0x308 [ 17.793568] kunit_try_run_case+0x170/0x3f0 [ 17.793840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.794227] kthread+0x328/0x630 [ 17.794388] ret_from_fork+0x10/0x20 [ 17.794567] [ 17.794624] The buggy address belongs to the object at fff00000c3eeb5c0 [ 17.794624] which belongs to the cache kmalloc-16 of size 16 [ 17.795124] The buggy address is located 0 bytes inside of [ 17.795124] 16-byte region [fff00000c3eeb5c0, fff00000c3eeb5d0) [ 17.795508] [ 17.795574] The buggy address belongs to the physical page: [ 17.795701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 17.795845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.795963] page_type: f5(slab) [ 17.796139] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.796697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.796824] page dumped because: kasan: bad access detected [ 17.796908] [ 17.796971] Memory state around the buggy address: [ 17.797094] fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.797226] fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.797331] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 17.797437] ^ [ 17.797519] fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.797632] fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.797751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
Automatically assigned
[ 17.776694] ================================================================== [ 17.777052] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 17.777218] Read of size 1 at addr fff00000c3eeb5c0 by task kunit_try_catch/192 [ 17.777336] [ 17.777791] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.778596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.778675] Hardware name: linux,dummy-virt (DT) [ 17.778749] Call trace: [ 17.778849] show_stack+0x20/0x38 (C) [ 17.778977] dump_stack_lvl+0x8c/0xd0 [ 17.779403] print_report+0x118/0x608 [ 17.779536] kasan_report+0xdc/0x128 [ 17.779643] __kasan_check_byte+0x54/0x70 [ 17.779751] kfree_sensitive+0x30/0xb0 [ 17.779976] kmalloc_double_kzfree+0x168/0x308 [ 17.780245] kunit_try_run_case+0x170/0x3f0 [ 17.780415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.780582] kthread+0x328/0x630 [ 17.780758] ret_from_fork+0x10/0x20 [ 17.780892] [ 17.780956] Allocated by task 192: [ 17.781018] kasan_save_stack+0x3c/0x68 [ 17.781136] kasan_save_track+0x20/0x40 [ 17.781239] kasan_save_alloc_info+0x40/0x58 [ 17.781345] __kasan_kmalloc+0xd4/0xd8 [ 17.781419] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.781505] kmalloc_double_kzfree+0xb8/0x308 [ 17.781738] kunit_try_run_case+0x170/0x3f0 [ 17.782018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.782141] kthread+0x328/0x630 [ 17.782240] ret_from_fork+0x10/0x20 [ 17.782348] [ 17.782395] Freed by task 192: [ 17.782492] kasan_save_stack+0x3c/0x68 [ 17.782568] kasan_save_track+0x20/0x40 [ 17.782646] kasan_save_free_info+0x4c/0x78 [ 17.782727] __kasan_slab_free+0x6c/0x98 [ 17.783135] kfree+0x214/0x3c8 [ 17.783247] kfree_sensitive+0x80/0xb0 [ 17.783355] kmalloc_double_kzfree+0x11c/0x308 [ 17.783480] kunit_try_run_case+0x170/0x3f0 [ 17.783570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.783648] kthread+0x328/0x630 [ 17.783727] ret_from_fork+0x10/0x20 [ 17.783802] [ 17.783848] The buggy address belongs to the object at fff00000c3eeb5c0 [ 17.783848] which belongs to the cache kmalloc-16 of size 16 [ 17.783969] The buggy address is located 0 bytes inside of [ 17.783969] freed 16-byte region [fff00000c3eeb5c0, fff00000c3eeb5d0) [ 17.784093] [ 17.784299] The buggy address belongs to the physical page: [ 17.784558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 17.784720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.784854] page_type: f5(slab) [ 17.784955] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.785073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.785170] page dumped because: kasan: bad access detected [ 17.785238] [ 17.785277] Memory state around the buggy address: [ 17.785386] fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.785528] fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.785670] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 17.785790] ^ [ 17.785899] fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.786034] fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.786123] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
Automatically assigned
[ 17.737228] ================================================================== [ 17.737392] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 17.737525] Read of size 1 at addr fff00000c78c47a8 by task kunit_try_catch/188 [ 17.737638] [ 17.737713] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.738236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.738303] Hardware name: linux,dummy-virt (DT) [ 17.738490] Call trace: [ 17.738554] show_stack+0x20/0x38 (C) [ 17.738908] dump_stack_lvl+0x8c/0xd0 [ 17.739033] print_report+0x118/0x608 [ 17.739406] kasan_report+0xdc/0x128 [ 17.739682] __asan_report_load1_noabort+0x20/0x30 [ 17.739835] kmalloc_uaf2+0x3f4/0x468 [ 17.740164] kunit_try_run_case+0x170/0x3f0 [ 17.740299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.740436] kthread+0x328/0x630 [ 17.740710] ret_from_fork+0x10/0x20 [ 17.741091] [ 17.741153] Allocated by task 188: [ 17.741362] kasan_save_stack+0x3c/0x68 [ 17.741642] kasan_save_track+0x20/0x40 [ 17.741797] kasan_save_alloc_info+0x40/0x58 [ 17.741887] __kasan_kmalloc+0xd4/0xd8 [ 17.741964] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.742049] kmalloc_uaf2+0xc4/0x468 [ 17.742125] kunit_try_run_case+0x170/0x3f0 [ 17.742209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.742301] kthread+0x328/0x630 [ 17.742385] ret_from_fork+0x10/0x20 [ 17.742464] [ 17.742713] Freed by task 188: [ 17.742797] kasan_save_stack+0x3c/0x68 [ 17.743109] kasan_save_track+0x20/0x40 [ 17.743284] kasan_save_free_info+0x4c/0x78 [ 17.743533] __kasan_slab_free+0x6c/0x98 [ 17.743615] kfree+0x214/0x3c8 [ 17.743687] kmalloc_uaf2+0x134/0x468 [ 17.744114] kunit_try_run_case+0x170/0x3f0 [ 17.744425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.744551] kthread+0x328/0x630 [ 17.744726] ret_from_fork+0x10/0x20 [ 17.744913] [ 17.744985] The buggy address belongs to the object at fff00000c78c4780 [ 17.744985] which belongs to the cache kmalloc-64 of size 64 [ 17.745298] The buggy address is located 40 bytes inside of [ 17.745298] freed 64-byte region [fff00000c78c4780, fff00000c78c47c0) [ 17.745644] [ 17.745781] The buggy address belongs to the physical page: [ 17.745877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4 [ 17.746537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.746692] page_type: f5(slab) [ 17.746782] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.746878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.746996] page dumped because: kasan: bad access detected [ 17.747070] [ 17.747105] Memory state around the buggy address: [ 17.747174] fff00000c78c4680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.747294] fff00000c78c4700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.747435] >fff00000c78c4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.747522] ^ [ 17.747594] fff00000c78c4800: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 17.747709] fff00000c78c4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.747794] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
Automatically assigned
[ 17.719403] ================================================================== [ 17.719586] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 17.719748] Write of size 33 at addr fff00000c78c4600 by task kunit_try_catch/186 [ 17.719904] [ 17.719987] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.720155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.720217] Hardware name: linux,dummy-virt (DT) [ 17.720283] Call trace: [ 17.720367] show_stack+0x20/0x38 (C) [ 17.720509] dump_stack_lvl+0x8c/0xd0 [ 17.720615] print_report+0x118/0x608 [ 17.720719] kasan_report+0xdc/0x128 [ 17.720860] kasan_check_range+0x100/0x1a8 [ 17.720976] __asan_memset+0x34/0x78 [ 17.721079] kmalloc_uaf_memset+0x170/0x310 [ 17.721182] kunit_try_run_case+0x170/0x3f0 [ 17.721292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.721421] kthread+0x328/0x630 [ 17.721516] ret_from_fork+0x10/0x20 [ 17.721638] [ 17.721677] Allocated by task 186: [ 17.721742] kasan_save_stack+0x3c/0x68 [ 17.721949] kasan_save_track+0x20/0x40 [ 17.722038] kasan_save_alloc_info+0x40/0x58 [ 17.722103] __kasan_kmalloc+0xd4/0xd8 [ 17.722156] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.722262] kmalloc_uaf_memset+0xb8/0x310 [ 17.722393] kunit_try_run_case+0x170/0x3f0 [ 17.722520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.722608] kthread+0x328/0x630 [ 17.722676] ret_from_fork+0x10/0x20 [ 17.722796] [ 17.722835] Freed by task 186: [ 17.722897] kasan_save_stack+0x3c/0x68 [ 17.723034] kasan_save_track+0x20/0x40 [ 17.723133] kasan_save_free_info+0x4c/0x78 [ 17.723207] __kasan_slab_free+0x6c/0x98 [ 17.723293] kfree+0x214/0x3c8 [ 17.723391] kmalloc_uaf_memset+0x11c/0x310 [ 17.723502] kunit_try_run_case+0x170/0x3f0 [ 17.723622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.723738] kthread+0x328/0x630 [ 17.723805] ret_from_fork+0x10/0x20 [ 17.723885] [ 17.723928] The buggy address belongs to the object at fff00000c78c4600 [ 17.723928] which belongs to the cache kmalloc-64 of size 64 [ 17.724043] The buggy address is located 0 bytes inside of [ 17.724043] freed 64-byte region [fff00000c78c4600, fff00000c78c4640) [ 17.724183] [ 17.724227] The buggy address belongs to the physical page: [ 17.724335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4 [ 17.724544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.724677] page_type: f5(slab) [ 17.724798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.724965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.725100] page dumped because: kasan: bad access detected [ 17.725186] [ 17.725225] Memory state around the buggy address: [ 17.725327] fff00000c78c4500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.725417] fff00000c78c4580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.725510] >fff00000c78c4600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.725598] ^ [ 17.725698] fff00000c78c4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.725806] fff00000c78c4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.725902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
Automatically assigned
[ 17.692539] ================================================================== [ 17.692676] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 17.692796] Read of size 1 at addr fff00000c3eeb5a8 by task kunit_try_catch/184 [ 17.692906] [ 17.692981] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.693170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.693223] Hardware name: linux,dummy-virt (DT) [ 17.693292] Call trace: [ 17.693356] show_stack+0x20/0x38 (C) [ 17.693479] dump_stack_lvl+0x8c/0xd0 [ 17.693626] print_report+0x118/0x608 [ 17.693880] kasan_report+0xdc/0x128 [ 17.694468] __asan_report_load1_noabort+0x20/0x30 [ 17.694844] kmalloc_uaf+0x300/0x338 [ 17.694952] kunit_try_run_case+0x170/0x3f0 [ 17.695063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.695180] kthread+0x328/0x630 [ 17.695270] ret_from_fork+0x10/0x20 [ 17.696138] [ 17.696213] Allocated by task 184: [ 17.696306] kasan_save_stack+0x3c/0x68 [ 17.696480] kasan_save_track+0x20/0x40 [ 17.696608] kasan_save_alloc_info+0x40/0x58 [ 17.696708] __kasan_kmalloc+0xd4/0xd8 [ 17.696788] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.696891] kmalloc_uaf+0xb8/0x338 [ 17.697006] kunit_try_run_case+0x170/0x3f0 [ 17.697131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.697266] kthread+0x328/0x630 [ 17.697398] ret_from_fork+0x10/0x20 [ 17.697523] [ 17.697568] Freed by task 184: [ 17.697634] kasan_save_stack+0x3c/0x68 [ 17.697720] kasan_save_track+0x20/0x40 [ 17.697804] kasan_save_free_info+0x4c/0x78 [ 17.697894] __kasan_slab_free+0x6c/0x98 [ 17.697974] kfree+0x214/0x3c8 [ 17.698049] kmalloc_uaf+0x11c/0x338 [ 17.698122] kunit_try_run_case+0x170/0x3f0 [ 17.698216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.698347] kthread+0x328/0x630 [ 17.698410] ret_from_fork+0x10/0x20 [ 17.698480] [ 17.698519] The buggy address belongs to the object at fff00000c3eeb5a0 [ 17.698519] which belongs to the cache kmalloc-16 of size 16 [ 17.698933] The buggy address is located 8 bytes inside of [ 17.698933] freed 16-byte region [fff00000c3eeb5a0, fff00000c3eeb5b0) [ 17.699068] [ 17.699115] The buggy address belongs to the physical page: [ 17.699380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 17.699498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.699626] page_type: f5(slab) [ 17.699718] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.699818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.699908] page dumped because: kasan: bad access detected [ 17.699981] [ 17.700022] Memory state around the buggy address: [ 17.700095] fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.700191] fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.700283] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 17.700379] ^ [ 17.700474] fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.700572] fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.700928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
Automatically assigned
[ 17.666182] ================================================================== [ 17.666335] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.666457] Read of size 64 at addr fff00000c78c4304 by task kunit_try_catch/182 [ 17.666564] [ 17.666641] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.668096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.668172] Hardware name: linux,dummy-virt (DT) [ 17.668244] Call trace: [ 17.668297] show_stack+0x20/0x38 (C) [ 17.668809] dump_stack_lvl+0x8c/0xd0 [ 17.668923] print_report+0x118/0x608 [ 17.669093] kasan_report+0xdc/0x128 [ 17.669184] kasan_check_range+0x100/0x1a8 [ 17.669292] __asan_memmove+0x3c/0x98 [ 17.669402] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.669578] kunit_try_run_case+0x170/0x3f0 [ 17.669703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.669863] kthread+0x328/0x630 [ 17.669998] ret_from_fork+0x10/0x20 [ 17.670106] [ 17.670149] Allocated by task 182: [ 17.670256] kasan_save_stack+0x3c/0x68 [ 17.670359] kasan_save_track+0x20/0x40 [ 17.670440] kasan_save_alloc_info+0x40/0x58 [ 17.670523] __kasan_kmalloc+0xd4/0xd8 [ 17.670609] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.670700] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 17.670819] kunit_try_run_case+0x170/0x3f0 [ 17.670912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.671009] kthread+0x328/0x630 [ 17.671084] ret_from_fork+0x10/0x20 [ 17.671162] [ 17.671203] The buggy address belongs to the object at fff00000c78c4300 [ 17.671203] which belongs to the cache kmalloc-64 of size 64 [ 17.671339] The buggy address is located 4 bytes inside of [ 17.671339] allocated 64-byte region [fff00000c78c4300, fff00000c78c4340) [ 17.671477] [ 17.671527] The buggy address belongs to the physical page: [ 17.671625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4 [ 17.671761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.671865] page_type: f5(slab) [ 17.671951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.672067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.672162] page dumped because: kasan: bad access detected [ 17.672249] [ 17.672292] Memory state around the buggy address: [ 17.672421] fff00000c78c4200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.672547] fff00000c78c4280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.672628] >fff00000c78c4300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.673247] ^ [ 17.673440] fff00000c78c4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674094] fff00000c78c4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674733] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
Automatically assigned
[ 17.640910] ================================================================== [ 17.641060] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.641186] Read of size 18446744073709551614 at addr fff00000c78c4084 by task kunit_try_catch/180 [ 17.641460] [ 17.641548] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.641749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.642219] Hardware name: linux,dummy-virt (DT) [ 17.642492] Call trace: [ 17.642645] show_stack+0x20/0x38 (C) [ 17.642948] dump_stack_lvl+0x8c/0xd0 [ 17.643071] print_report+0x118/0x608 [ 17.643262] kasan_report+0xdc/0x128 [ 17.643425] kasan_check_range+0x100/0x1a8 [ 17.643531] __asan_memmove+0x3c/0x98 [ 17.643613] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.643696] kunit_try_run_case+0x170/0x3f0 [ 17.643789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.643897] kthread+0x328/0x630 [ 17.643994] ret_from_fork+0x10/0x20 [ 17.644136] [ 17.644173] Allocated by task 180: [ 17.644229] kasan_save_stack+0x3c/0x68 [ 17.644348] kasan_save_track+0x20/0x40 [ 17.644421] kasan_save_alloc_info+0x40/0x58 [ 17.644518] __kasan_kmalloc+0xd4/0xd8 [ 17.644597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.644696] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 17.644827] kunit_try_run_case+0x170/0x3f0 [ 17.644915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.645080] kthread+0x328/0x630 [ 17.645175] ret_from_fork+0x10/0x20 [ 17.645255] [ 17.645301] The buggy address belongs to the object at fff00000c78c4080 [ 17.645301] which belongs to the cache kmalloc-64 of size 64 [ 17.645436] The buggy address is located 4 bytes inside of [ 17.645436] 64-byte region [fff00000c78c4080, fff00000c78c40c0) [ 17.645557] [ 17.645605] The buggy address belongs to the physical page: [ 17.645675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c4 [ 17.645789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.645899] page_type: f5(slab) [ 17.645987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.646101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.646194] page dumped because: kasan: bad access detected [ 17.646263] [ 17.646304] Memory state around the buggy address: [ 17.646408] fff00000c78c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.646544] fff00000c78c4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.646676] >fff00000c78c4080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.646818] ^ [ 17.646871] fff00000c78c4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.646960] fff00000c78c4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.647082] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
Automatically assigned
[ 17.621670] ================================================================== [ 17.621803] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 17.621925] Write of size 16 at addr fff00000c78c2169 by task kunit_try_catch/178 [ 17.622035] [ 17.622114] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.622302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.623080] Hardware name: linux,dummy-virt (DT) [ 17.623215] Call trace: [ 17.623266] show_stack+0x20/0x38 (C) [ 17.623402] dump_stack_lvl+0x8c/0xd0 [ 17.623513] print_report+0x118/0x608 [ 17.623599] kasan_report+0xdc/0x128 [ 17.623678] kasan_check_range+0x100/0x1a8 [ 17.623768] __asan_memset+0x34/0x78 [ 17.623939] kmalloc_oob_memset_16+0x150/0x2f8 [ 17.624178] kunit_try_run_case+0x170/0x3f0 [ 17.624374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.624967] kthread+0x328/0x630 [ 17.625371] ret_from_fork+0x10/0x20 [ 17.625597] [ 17.625666] Allocated by task 178: [ 17.625831] kasan_save_stack+0x3c/0x68 [ 17.625963] kasan_save_track+0x20/0x40 [ 17.626159] kasan_save_alloc_info+0x40/0x58 [ 17.626242] __kasan_kmalloc+0xd4/0xd8 [ 17.626484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.626716] kmalloc_oob_memset_16+0xb0/0x2f8 [ 17.626964] kunit_try_run_case+0x170/0x3f0 [ 17.627084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.627174] kthread+0x328/0x630 [ 17.627394] ret_from_fork+0x10/0x20 [ 17.627484] [ 17.627728] The buggy address belongs to the object at fff00000c78c2100 [ 17.627728] which belongs to the cache kmalloc-128 of size 128 [ 17.627861] The buggy address is located 105 bytes inside of [ 17.627861] allocated 120-byte region [fff00000c78c2100, fff00000c78c2178) [ 17.627981] [ 17.628022] The buggy address belongs to the physical page: [ 17.628081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.628233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.628376] page_type: f5(slab) [ 17.628630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.628977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.629070] page dumped because: kasan: bad access detected [ 17.629197] [ 17.629370] Memory state around the buggy address: [ 17.629436] fff00000c78c2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.629524] fff00000c78c2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.629781] >fff00000c78c2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.630003] ^ [ 17.630216] fff00000c78c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.630347] fff00000c78c2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.630421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
Automatically assigned
[ 17.536990] ================================================================== [ 17.537133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 17.537259] Write of size 4 at addr fff00000c78c2075 by task kunit_try_catch/174 [ 17.537380] [ 17.537463] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.537649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.537704] Hardware name: linux,dummy-virt (DT) [ 17.537767] Call trace: [ 17.537817] show_stack+0x20/0x38 (C) [ 17.537927] dump_stack_lvl+0x8c/0xd0 [ 17.538566] print_report+0x118/0x608 [ 17.538788] kasan_report+0xdc/0x128 [ 17.538899] kasan_check_range+0x100/0x1a8 [ 17.539658] __asan_memset+0x34/0x78 [ 17.539863] kmalloc_oob_memset_4+0x150/0x300 [ 17.540082] kunit_try_run_case+0x170/0x3f0 [ 17.540687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.540917] kthread+0x328/0x630 [ 17.541086] ret_from_fork+0x10/0x20 [ 17.541244] [ 17.541313] Allocated by task 174: [ 17.541389] kasan_save_stack+0x3c/0x68 [ 17.541940] kasan_save_track+0x20/0x40 [ 17.542141] kasan_save_alloc_info+0x40/0x58 [ 17.542232] __kasan_kmalloc+0xd4/0xd8 [ 17.542542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.543035] kmalloc_oob_memset_4+0xb0/0x300 [ 17.543410] kunit_try_run_case+0x170/0x3f0 [ 17.543488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.543574] kthread+0x328/0x630 [ 17.544218] ret_from_fork+0x10/0x20 [ 17.544316] [ 17.544373] The buggy address belongs to the object at fff00000c78c2000 [ 17.544373] which belongs to the cache kmalloc-128 of size 128 [ 17.544500] The buggy address is located 117 bytes inside of [ 17.544500] allocated 120-byte region [fff00000c78c2000, fff00000c78c2078) [ 17.544642] [ 17.544689] The buggy address belongs to the physical page: [ 17.544762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 17.544877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.544990] page_type: f5(slab) [ 17.545082] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.545188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.545277] page dumped because: kasan: bad access detected [ 17.545358] [ 17.546597] Memory state around the buggy address: [ 17.547086] fff00000c78c1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.547186] fff00000c78c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.547261] >fff00000c78c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.547347] ^ [ 17.548242] fff00000c78c2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.548624] fff00000c78c2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.549033] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
Automatically assigned
[ 17.508494] ================================================================== [ 17.508642] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 17.509032] Write of size 2 at addr fff00000c3ef0f77 by task kunit_try_catch/172 [ 17.509151] [ 17.509238] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.509457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.509516] Hardware name: linux,dummy-virt (DT) [ 17.509580] Call trace: [ 17.510812] show_stack+0x20/0x38 (C) [ 17.510965] dump_stack_lvl+0x8c/0xd0 [ 17.511065] print_report+0x118/0x608 [ 17.511126] kasan_report+0xdc/0x128 [ 17.511217] kasan_check_range+0x100/0x1a8 [ 17.511377] __asan_memset+0x34/0x78 [ 17.511493] kmalloc_oob_memset_2+0x150/0x2f8 [ 17.511597] kunit_try_run_case+0x170/0x3f0 [ 17.511693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.512326] kthread+0x328/0x630 [ 17.512481] ret_from_fork+0x10/0x20 [ 17.512605] [ 17.512650] Allocated by task 172: [ 17.512715] kasan_save_stack+0x3c/0x68 [ 17.512807] kasan_save_track+0x20/0x40 [ 17.512888] kasan_save_alloc_info+0x40/0x58 [ 17.512975] __kasan_kmalloc+0xd4/0xd8 [ 17.513434] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.513642] kmalloc_oob_memset_2+0xb0/0x2f8 [ 17.514205] kunit_try_run_case+0x170/0x3f0 [ 17.514419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.514618] kthread+0x328/0x630 [ 17.514686] ret_from_fork+0x10/0x20 [ 17.514841] [ 17.514886] The buggy address belongs to the object at fff00000c3ef0f00 [ 17.514886] which belongs to the cache kmalloc-128 of size 128 [ 17.515062] The buggy address is located 119 bytes inside of [ 17.515062] allocated 120-byte region [fff00000c3ef0f00, fff00000c3ef0f78) [ 17.515352] [ 17.515478] The buggy address belongs to the physical page: [ 17.515558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 17.515660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.515760] page_type: f5(slab) [ 17.516199] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.516313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.516569] page dumped because: kasan: bad access detected [ 17.516778] [ 17.516847] Memory state around the buggy address: [ 17.517081] fff00000c3ef0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.517296] fff00000c3ef0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.517415] >fff00000c3ef0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.517501] ^ [ 17.517594] fff00000c3ef0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.517911] fff00000c3ef1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.518062] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
Automatically assigned
[ 17.464995] ================================================================== [ 17.465828] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 17.466292] Write of size 128 at addr fff00000c3ef0e00 by task kunit_try_catch/170 [ 17.466711] [ 17.466892] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.467058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.467111] Hardware name: linux,dummy-virt (DT) [ 17.467176] Call trace: [ 17.467230] show_stack+0x20/0x38 (C) [ 17.468287] dump_stack_lvl+0x8c/0xd0 [ 17.469367] print_report+0x118/0x608 [ 17.469611] kasan_report+0xdc/0x128 [ 17.470085] kasan_check_range+0x100/0x1a8 [ 17.470307] __asan_memset+0x34/0x78 [ 17.470866] kmalloc_oob_in_memset+0x144/0x2d0 [ 17.471073] kunit_try_run_case+0x170/0x3f0 [ 17.471171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.471273] kthread+0x328/0x630 [ 17.471375] ret_from_fork+0x10/0x20 [ 17.471492] [ 17.471537] Allocated by task 170: [ 17.471603] kasan_save_stack+0x3c/0x68 [ 17.471697] kasan_save_track+0x20/0x40 [ 17.471780] kasan_save_alloc_info+0x40/0x58 [ 17.473161] __kasan_kmalloc+0xd4/0xd8 [ 17.473706] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.474161] kmalloc_oob_in_memset+0xb0/0x2d0 [ 17.474601] kunit_try_run_case+0x170/0x3f0 [ 17.474902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.475251] kthread+0x328/0x630 [ 17.475330] ret_from_fork+0x10/0x20 [ 17.475631] [ 17.476096] The buggy address belongs to the object at fff00000c3ef0e00 [ 17.476096] which belongs to the cache kmalloc-128 of size 128 [ 17.476426] The buggy address is located 0 bytes inside of [ 17.476426] allocated 120-byte region [fff00000c3ef0e00, fff00000c3ef0e78) [ 17.476632] [ 17.476681] The buggy address belongs to the physical page: [ 17.476755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 17.476872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.476984] page_type: f5(slab) [ 17.477071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.477183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.477276] page dumped because: kasan: bad access detected [ 17.477356] [ 17.478822] Memory state around the buggy address: [ 17.479023] fff00000c3ef0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.479218] fff00000c3ef0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.479335] >fff00000c3ef0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.479405] ^ [ 17.480054] fff00000c3ef0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.480246] fff00000c3ef0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.480478] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
Automatically assigned
[ 17.418514] ================================================================== [ 17.418736] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 17.418905] Read of size 16 at addr fff00000c3eeb580 by task kunit_try_catch/168 [ 17.419133] [ 17.419209] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.419451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.419519] Hardware name: linux,dummy-virt (DT) [ 17.419595] Call trace: [ 17.419643] show_stack+0x20/0x38 (C) [ 17.419746] dump_stack_lvl+0x8c/0xd0 [ 17.419868] print_report+0x118/0x608 [ 17.419972] kasan_report+0xdc/0x128 [ 17.420065] __asan_report_load16_noabort+0x20/0x30 [ 17.420213] kmalloc_uaf_16+0x3bc/0x438 [ 17.420312] kunit_try_run_case+0x170/0x3f0 [ 17.420502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.420648] kthread+0x328/0x630 [ 17.420762] ret_from_fork+0x10/0x20 [ 17.420877] [ 17.420918] Allocated by task 168: [ 17.420982] kasan_save_stack+0x3c/0x68 [ 17.421066] kasan_save_track+0x20/0x40 [ 17.421150] kasan_save_alloc_info+0x40/0x58 [ 17.421250] __kasan_kmalloc+0xd4/0xd8 [ 17.421371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.421461] kmalloc_uaf_16+0x140/0x438 [ 17.421537] kunit_try_run_case+0x170/0x3f0 [ 17.421616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.421711] kthread+0x328/0x630 [ 17.421783] ret_from_fork+0x10/0x20 [ 17.421858] [ 17.421898] Freed by task 168: [ 17.421955] kasan_save_stack+0x3c/0x68 [ 17.422036] kasan_save_track+0x20/0x40 [ 17.422113] kasan_save_free_info+0x4c/0x78 [ 17.422197] __kasan_slab_free+0x6c/0x98 [ 17.422278] kfree+0x214/0x3c8 [ 17.422356] kmalloc_uaf_16+0x190/0x438 [ 17.422429] kunit_try_run_case+0x170/0x3f0 [ 17.422666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.422774] kthread+0x328/0x630 [ 17.422848] ret_from_fork+0x10/0x20 [ 17.422928] [ 17.422971] The buggy address belongs to the object at fff00000c3eeb580 [ 17.422971] which belongs to the cache kmalloc-16 of size 16 [ 17.423164] The buggy address is located 0 bytes inside of [ 17.423164] freed 16-byte region [fff00000c3eeb580, fff00000c3eeb590) [ 17.423299] [ 17.423354] The buggy address belongs to the physical page: [ 17.423418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 17.423594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.423771] page_type: f5(slab) [ 17.424348] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.424576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.424789] page dumped because: kasan: bad access detected [ 17.424873] [ 17.425133] Memory state around the buggy address: [ 17.425215] fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.425439] fff00000c3eeb500: 00 04 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 17.425746] >fff00000c3eeb580: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.425919] ^ [ 17.426022] fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.426296] fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.426465] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
Automatically assigned
[ 17.398158] ================================================================== [ 17.398330] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 17.398463] Write of size 16 at addr fff00000c3eeb520 by task kunit_try_catch/166 [ 17.398574] [ 17.398652] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.399219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.399368] Hardware name: linux,dummy-virt (DT) [ 17.399684] Call trace: [ 17.399740] show_stack+0x20/0x38 (C) [ 17.399847] dump_stack_lvl+0x8c/0xd0 [ 17.399973] print_report+0x118/0x608 [ 17.400291] kasan_report+0xdc/0x128 [ 17.400430] __asan_report_store16_noabort+0x20/0x30 [ 17.400586] kmalloc_oob_16+0x3a0/0x3f8 [ 17.400712] kunit_try_run_case+0x170/0x3f0 [ 17.400820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.400926] kthread+0x328/0x630 [ 17.401287] ret_from_fork+0x10/0x20 [ 17.401455] [ 17.401507] Allocated by task 166: [ 17.401564] kasan_save_stack+0x3c/0x68 [ 17.401667] kasan_save_track+0x20/0x40 [ 17.401776] kasan_save_alloc_info+0x40/0x58 [ 17.401890] __kasan_kmalloc+0xd4/0xd8 [ 17.401987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.402104] kmalloc_oob_16+0xb4/0x3f8 [ 17.402182] kunit_try_run_case+0x170/0x3f0 [ 17.402266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.402361] kthread+0x328/0x630 [ 17.402420] ret_from_fork+0x10/0x20 [ 17.402490] [ 17.402951] The buggy address belongs to the object at fff00000c3eeb520 [ 17.402951] which belongs to the cache kmalloc-16 of size 16 [ 17.403127] The buggy address is located 0 bytes inside of [ 17.403127] allocated 13-byte region [fff00000c3eeb520, fff00000c3eeb52d) [ 17.403251] [ 17.403515] The buggy address belongs to the physical page: [ 17.403616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 17.403766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.403957] page_type: f5(slab) [ 17.404105] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.404221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.404654] page dumped because: kasan: bad access detected [ 17.404753] [ 17.404794] Memory state around the buggy address: [ 17.404906] fff00000c3eeb400: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 17.405073] fff00000c3eeb480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.405225] >fff00000c3eeb500: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 17.405309] ^ [ 17.405650] fff00000c3eeb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.405810] fff00000c3eeb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.406013] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
Automatically assigned
[ 17.352639] ================================================================== [ 17.352756] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 17.352871] Read of size 1 at addr fff00000c6323200 by task kunit_try_catch/164 [ 17.352979] [ 17.353055] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.353646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.353736] Hardware name: linux,dummy-virt (DT) [ 17.353895] Call trace: [ 17.353943] show_stack+0x20/0x38 (C) [ 17.354795] dump_stack_lvl+0x8c/0xd0 [ 17.355424] print_report+0x118/0x608 [ 17.355830] kasan_report+0xdc/0x128 [ 17.356212] __asan_report_load1_noabort+0x20/0x30 [ 17.356438] krealloc_uaf+0x4c8/0x520 [ 17.357186] kunit_try_run_case+0x170/0x3f0 [ 17.358025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.358181] kthread+0x328/0x630 [ 17.358585] ret_from_fork+0x10/0x20 [ 17.358907] [ 17.358950] Allocated by task 164: [ 17.359211] kasan_save_stack+0x3c/0x68 [ 17.359609] kasan_save_track+0x20/0x40 [ 17.359691] kasan_save_alloc_info+0x40/0x58 [ 17.360214] __kasan_kmalloc+0xd4/0xd8 [ 17.360763] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.361004] krealloc_uaf+0xc8/0x520 [ 17.361352] kunit_try_run_case+0x170/0x3f0 [ 17.361529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.361845] kthread+0x328/0x630 [ 17.361918] ret_from_fork+0x10/0x20 [ 17.362500] [ 17.362698] Freed by task 164: [ 17.363026] kasan_save_stack+0x3c/0x68 [ 17.363114] kasan_save_track+0x20/0x40 [ 17.363184] kasan_save_free_info+0x4c/0x78 [ 17.363260] __kasan_slab_free+0x6c/0x98 [ 17.363828] kfree+0x214/0x3c8 [ 17.364404] krealloc_uaf+0x12c/0x520 [ 17.364603] kunit_try_run_case+0x170/0x3f0 [ 17.364971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.365254] kthread+0x328/0x630 [ 17.365409] ret_from_fork+0x10/0x20 [ 17.365491] [ 17.365539] The buggy address belongs to the object at fff00000c6323200 [ 17.365539] which belongs to the cache kmalloc-256 of size 256 [ 17.365667] The buggy address is located 0 bytes inside of [ 17.365667] freed 256-byte region [fff00000c6323200, fff00000c6323300) [ 17.365801] [ 17.365846] The buggy address belongs to the physical page: [ 17.366451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.367073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.367673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.367957] page_type: f5(slab) [ 17.368584] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.368943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.369062] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.369174] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.369284] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.369406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.369499] page dumped because: kasan: bad access detected [ 17.369565] [ 17.369604] Memory state around the buggy address: [ 17.370272] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.371120] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.371624] >fff00000c6323200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.371708] ^ [ 17.371764] fff00000c6323280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.371836] fff00000c6323300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.371914] ================================================================== [ 17.325676] ================================================================== [ 17.325864] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 17.326678] Read of size 1 at addr fff00000c6323200 by task kunit_try_catch/164 [ 17.327945] [ 17.328036] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.328781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.328879] Hardware name: linux,dummy-virt (DT) [ 17.329081] Call trace: [ 17.329135] show_stack+0x20/0x38 (C) [ 17.329489] dump_stack_lvl+0x8c/0xd0 [ 17.329842] print_report+0x118/0x608 [ 17.329951] kasan_report+0xdc/0x128 [ 17.330261] __kasan_check_byte+0x54/0x70 [ 17.330480] krealloc_noprof+0x44/0x360 [ 17.330698] krealloc_uaf+0x180/0x520 [ 17.330849] kunit_try_run_case+0x170/0x3f0 [ 17.331106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.331237] kthread+0x328/0x630 [ 17.332073] ret_from_fork+0x10/0x20 [ 17.332194] [ 17.332235] Allocated by task 164: [ 17.332785] kasan_save_stack+0x3c/0x68 [ 17.332959] kasan_save_track+0x20/0x40 [ 17.333215] kasan_save_alloc_info+0x40/0x58 [ 17.333794] __kasan_kmalloc+0xd4/0xd8 [ 17.333985] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.334316] krealloc_uaf+0xc8/0x520 [ 17.334633] kunit_try_run_case+0x170/0x3f0 [ 17.334836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.335145] kthread+0x328/0x630 [ 17.335516] ret_from_fork+0x10/0x20 [ 17.335595] [ 17.335976] Freed by task 164: [ 17.336210] kasan_save_stack+0x3c/0x68 [ 17.336330] kasan_save_track+0x20/0x40 [ 17.336413] kasan_save_free_info+0x4c/0x78 [ 17.336504] __kasan_slab_free+0x6c/0x98 [ 17.336589] kfree+0x214/0x3c8 [ 17.337090] krealloc_uaf+0x12c/0x520 [ 17.337381] kunit_try_run_case+0x170/0x3f0 [ 17.337896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.338171] kthread+0x328/0x630 [ 17.338276] ret_from_fork+0x10/0x20 [ 17.338386] [ 17.338795] The buggy address belongs to the object at fff00000c6323200 [ 17.338795] which belongs to the cache kmalloc-256 of size 256 [ 17.339425] The buggy address is located 0 bytes inside of [ 17.339425] freed 256-byte region [fff00000c6323200, fff00000c6323300) [ 17.340046] [ 17.340333] The buggy address belongs to the physical page: [ 17.340589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.341017] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.341190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.341636] page_type: f5(slab) [ 17.342081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.342490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.342773] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.343466] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.343591] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.343699] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.343774] page dumped because: kasan: bad access detected [ 17.343830] [ 17.344567] Memory state around the buggy address: [ 17.344773] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345020] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345653] >fff00000c6323200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.346338] ^ [ 17.346422] fff00000c6323280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.346522] fff00000c6323300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.347185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
Automatically assigned
[ 17.208064] ================================================================== [ 17.208200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.208306] Write of size 1 at addr fff00000c63230eb by task kunit_try_catch/158 [ 17.208436] [ 17.208527] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.208729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.208790] Hardware name: linux,dummy-virt (DT) [ 17.208855] Call trace: [ 17.208899] show_stack+0x20/0x38 (C) [ 17.209014] dump_stack_lvl+0x8c/0xd0 [ 17.209126] print_report+0x118/0x608 [ 17.209231] kasan_report+0xdc/0x128 [ 17.209354] __asan_report_store1_noabort+0x20/0x30 [ 17.209465] krealloc_less_oob_helper+0xa58/0xc50 [ 17.210030] krealloc_less_oob+0x20/0x38 [ 17.210193] kunit_try_run_case+0x170/0x3f0 [ 17.210359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.210524] kthread+0x328/0x630 [ 17.210651] ret_from_fork+0x10/0x20 [ 17.210824] [ 17.210865] Allocated by task 158: [ 17.211218] kasan_save_stack+0x3c/0x68 [ 17.211635] kasan_save_track+0x20/0x40 [ 17.211714] kasan_save_alloc_info+0x40/0x58 [ 17.211794] __kasan_krealloc+0x118/0x178 [ 17.212108] krealloc_noprof+0x128/0x360 [ 17.212196] krealloc_less_oob_helper+0x168/0xc50 [ 17.212333] krealloc_less_oob+0x20/0x38 [ 17.212469] kunit_try_run_case+0x170/0x3f0 [ 17.212600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.212738] kthread+0x328/0x630 [ 17.212826] ret_from_fork+0x10/0x20 [ 17.212940] [ 17.213003] The buggy address belongs to the object at fff00000c6323000 [ 17.213003] which belongs to the cache kmalloc-256 of size 256 [ 17.213150] The buggy address is located 34 bytes to the right of [ 17.213150] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.213303] [ 17.213354] The buggy address belongs to the physical page: [ 17.213423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.213607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.213702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.214035] page_type: f5(slab) [ 17.214117] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.214221] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.214605] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.214798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.214880] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.214932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.215002] page dumped because: kasan: bad access detected [ 17.215037] [ 17.215057] Memory state around the buggy address: [ 17.215097] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.215159] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.215214] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.215253] ^ [ 17.215295] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.215362] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.215403] ================================================================== [ 17.256756] ================================================================== [ 17.256882] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.257001] Write of size 1 at addr fff00000c65b60c9 by task kunit_try_catch/162 [ 17.257096] [ 17.257172] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.257372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.257434] Hardware name: linux,dummy-virt (DT) [ 17.257503] Call trace: [ 17.257560] show_stack+0x20/0x38 (C) [ 17.257685] dump_stack_lvl+0x8c/0xd0 [ 17.257830] print_report+0x118/0x608 [ 17.257964] kasan_report+0xdc/0x128 [ 17.258125] __asan_report_store1_noabort+0x20/0x30 [ 17.258285] krealloc_less_oob_helper+0xa48/0xc50 [ 17.258448] krealloc_large_less_oob+0x20/0x38 [ 17.258578] kunit_try_run_case+0x170/0x3f0 [ 17.258674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.258812] kthread+0x328/0x630 [ 17.258899] ret_from_fork+0x10/0x20 [ 17.259001] [ 17.259044] The buggy address belongs to the physical page: [ 17.259130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.259307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.259427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.259550] page_type: f8(unknown) [ 17.259640] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.259755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.259889] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.259988] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.260077] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.260197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.260282] page dumped because: kasan: bad access detected [ 17.260360] [ 17.260397] Memory state around the buggy address: [ 17.260467] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.260569] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.260658] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.260738] ^ [ 17.260848] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.260982] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.261106] ================================================================== [ 17.183676] ================================================================== [ 17.183798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.183959] Write of size 1 at addr fff00000c63230da by task kunit_try_catch/158 [ 17.184084] [ 17.184159] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.184366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.184434] Hardware name: linux,dummy-virt (DT) [ 17.184522] Call trace: [ 17.184976] show_stack+0x20/0x38 (C) [ 17.185481] dump_stack_lvl+0x8c/0xd0 [ 17.185596] print_report+0x118/0x608 [ 17.185702] kasan_report+0xdc/0x128 [ 17.185803] __asan_report_store1_noabort+0x20/0x30 [ 17.185916] krealloc_less_oob_helper+0xa80/0xc50 [ 17.186022] krealloc_less_oob+0x20/0x38 [ 17.186125] kunit_try_run_case+0x170/0x3f0 [ 17.186230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.186354] kthread+0x328/0x630 [ 17.186449] ret_from_fork+0x10/0x20 [ 17.186555] [ 17.186597] Allocated by task 158: [ 17.186659] kasan_save_stack+0x3c/0x68 [ 17.186746] kasan_save_track+0x20/0x40 [ 17.186841] kasan_save_alloc_info+0x40/0x58 [ 17.186927] __kasan_krealloc+0x118/0x178 [ 17.187008] krealloc_noprof+0x128/0x360 [ 17.187090] krealloc_less_oob_helper+0x168/0xc50 [ 17.187175] krealloc_less_oob+0x20/0x38 [ 17.187252] kunit_try_run_case+0x170/0x3f0 [ 17.188016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.188794] kthread+0x328/0x630 [ 17.188894] ret_from_fork+0x10/0x20 [ 17.188969] [ 17.189016] The buggy address belongs to the object at fff00000c6323000 [ 17.189016] which belongs to the cache kmalloc-256 of size 256 [ 17.189145] The buggy address is located 17 bytes to the right of [ 17.189145] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.189295] [ 17.189356] The buggy address belongs to the physical page: [ 17.189393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.189450] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.189496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.189555] page_type: f5(slab) [ 17.189599] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.189650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.189699] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.189746] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.189793] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.189840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.189878] page dumped because: kasan: bad access detected [ 17.189909] [ 17.189927] Memory state around the buggy address: [ 17.189958] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189999] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.190039] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.190076] ^ [ 17.190112] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.190152] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.190188] ================================================================== [ 17.157766] ================================================================== [ 17.157914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.158041] Write of size 1 at addr fff00000c63230c9 by task kunit_try_catch/158 [ 17.158147] [ 17.158226] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.158566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.158820] Hardware name: linux,dummy-virt (DT) [ 17.158903] Call trace: [ 17.158960] show_stack+0x20/0x38 (C) [ 17.159172] dump_stack_lvl+0x8c/0xd0 [ 17.159506] print_report+0x118/0x608 [ 17.159661] kasan_report+0xdc/0x128 [ 17.159757] __asan_report_store1_noabort+0x20/0x30 [ 17.160057] krealloc_less_oob_helper+0xa48/0xc50 [ 17.160229] krealloc_less_oob+0x20/0x38 [ 17.160387] kunit_try_run_case+0x170/0x3f0 [ 17.160686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.160950] kthread+0x328/0x630 [ 17.161069] ret_from_fork+0x10/0x20 [ 17.161438] [ 17.161694] Allocated by task 158: [ 17.161979] kasan_save_stack+0x3c/0x68 [ 17.162397] kasan_save_track+0x20/0x40 [ 17.162626] kasan_save_alloc_info+0x40/0x58 [ 17.162926] __kasan_krealloc+0x118/0x178 [ 17.163299] krealloc_noprof+0x128/0x360 [ 17.163398] krealloc_less_oob_helper+0x168/0xc50 [ 17.163949] krealloc_less_oob+0x20/0x38 [ 17.164114] kunit_try_run_case+0x170/0x3f0 [ 17.164429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.164595] kthread+0x328/0x630 [ 17.164702] ret_from_fork+0x10/0x20 [ 17.164826] [ 17.164901] The buggy address belongs to the object at fff00000c6323000 [ 17.164901] which belongs to the cache kmalloc-256 of size 256 [ 17.165042] The buggy address is located 0 bytes to the right of [ 17.165042] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.165196] [ 17.165261] The buggy address belongs to the physical page: [ 17.165377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.165532] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.165639] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.165812] page_type: f5(slab) [ 17.165933] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.166082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.166219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.166359] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.166448] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.166719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.166812] page dumped because: kasan: bad access detected [ 17.167125] [ 17.167171] Memory state around the buggy address: [ 17.167279] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.167513] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.167618] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.167738] ^ [ 17.167906] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.168017] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.168128] ================================================================== [ 17.293239] ================================================================== [ 17.293376] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.293486] Write of size 1 at addr fff00000c65b60eb by task kunit_try_catch/162 [ 17.293598] [ 17.293667] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.293859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.294610] Hardware name: linux,dummy-virt (DT) [ 17.295346] Call trace: [ 17.295710] show_stack+0x20/0x38 (C) [ 17.296199] dump_stack_lvl+0x8c/0xd0 [ 17.296526] print_report+0x118/0x608 [ 17.297082] kasan_report+0xdc/0x128 [ 17.297339] __asan_report_store1_noabort+0x20/0x30 [ 17.297485] krealloc_less_oob_helper+0xa58/0xc50 [ 17.297604] krealloc_large_less_oob+0x20/0x38 [ 17.297745] kunit_try_run_case+0x170/0x3f0 [ 17.297899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.298040] kthread+0x328/0x630 [ 17.298567] ret_from_fork+0x10/0x20 [ 17.298761] [ 17.298809] The buggy address belongs to the physical page: [ 17.298936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.299209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.299496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.299623] page_type: f8(unknown) [ 17.299780] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.300248] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.300737] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.301156] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.301333] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.301790] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.301955] page dumped because: kasan: bad access detected [ 17.302031] [ 17.302069] Memory state around the buggy address: [ 17.302137] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.302235] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.302516] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.303131] ^ [ 17.303273] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.303383] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.303835] ================================================================== [ 17.262076] ================================================================== [ 17.262171] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.262274] Write of size 1 at addr fff00000c65b60d0 by task kunit_try_catch/162 [ 17.262380] [ 17.262445] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.262634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.262724] Hardware name: linux,dummy-virt (DT) [ 17.262824] Call trace: [ 17.262894] show_stack+0x20/0x38 (C) [ 17.262963] dump_stack_lvl+0x8c/0xd0 [ 17.263159] print_report+0x118/0x608 [ 17.263291] kasan_report+0xdc/0x128 [ 17.263492] __asan_report_store1_noabort+0x20/0x30 [ 17.264102] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.264257] krealloc_large_less_oob+0x20/0x38 [ 17.264371] kunit_try_run_case+0x170/0x3f0 [ 17.264487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.264759] kthread+0x328/0x630 [ 17.264969] ret_from_fork+0x10/0x20 [ 17.265207] [ 17.265348] The buggy address belongs to the physical page: [ 17.265427] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.265566] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.265675] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.265807] page_type: f8(unknown) [ 17.265900] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.266408] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.266807] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.266953] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.267148] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.267378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.267564] page dumped because: kasan: bad access detected [ 17.267709] [ 17.267754] Memory state around the buggy address: [ 17.267822] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.268382] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.268530] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.268729] ^ [ 17.268823] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.268928] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.269016] ================================================================== [ 17.282645] ================================================================== [ 17.282992] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.283458] Write of size 1 at addr fff00000c65b60ea by task kunit_try_catch/162 [ 17.283589] [ 17.283834] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.284105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.284288] Hardware name: linux,dummy-virt (DT) [ 17.284373] Call trace: [ 17.284663] show_stack+0x20/0x38 (C) [ 17.285197] dump_stack_lvl+0x8c/0xd0 [ 17.285522] print_report+0x118/0x608 [ 17.285635] kasan_report+0xdc/0x128 [ 17.286114] __asan_report_store1_noabort+0x20/0x30 [ 17.286496] krealloc_less_oob_helper+0xae4/0xc50 [ 17.286687] krealloc_large_less_oob+0x20/0x38 [ 17.286818] kunit_try_run_case+0x170/0x3f0 [ 17.286917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.287482] kthread+0x328/0x630 [ 17.287656] ret_from_fork+0x10/0x20 [ 17.287833] [ 17.287883] The buggy address belongs to the physical page: [ 17.287959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.288078] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.288185] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.288573] page_type: f8(unknown) [ 17.288743] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.289254] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.289555] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.289663] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.289774] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.289880] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.289979] page dumped because: kasan: bad access detected [ 17.290047] [ 17.290086] Memory state around the buggy address: [ 17.290154] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.290249] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.290357] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.290444] ^ [ 17.290530] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.290628] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.290730] ================================================================== [ 17.270038] ================================================================== [ 17.270198] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.270555] Write of size 1 at addr fff00000c65b60da by task kunit_try_catch/162 [ 17.270858] [ 17.270933] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.271134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.271199] Hardware name: linux,dummy-virt (DT) [ 17.271275] Call trace: [ 17.271607] show_stack+0x20/0x38 (C) [ 17.271906] dump_stack_lvl+0x8c/0xd0 [ 17.272030] print_report+0x118/0x608 [ 17.272927] kasan_report+0xdc/0x128 [ 17.273542] __asan_report_store1_noabort+0x20/0x30 [ 17.273998] krealloc_less_oob_helper+0xa80/0xc50 [ 17.274119] krealloc_large_less_oob+0x20/0x38 [ 17.275083] kunit_try_run_case+0x170/0x3f0 [ 17.275525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.275657] kthread+0x328/0x630 [ 17.276013] ret_from_fork+0x10/0x20 [ 17.276192] [ 17.276241] The buggy address belongs to the physical page: [ 17.276369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.276692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.277103] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.277278] page_type: f8(unknown) [ 17.277552] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.277666] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.277954] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.278374] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.278855] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.279157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.279313] page dumped because: kasan: bad access detected [ 17.279406] [ 17.279503] Memory state around the buggy address: [ 17.279584] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.279731] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.279846] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.279919] ^ [ 17.280181] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.280314] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.280744] ================================================================== [ 17.192726] ================================================================== [ 17.192843] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.192954] Write of size 1 at addr fff00000c63230ea by task kunit_try_catch/158 [ 17.193070] [ 17.193146] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.193347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.193415] Hardware name: linux,dummy-virt (DT) [ 17.193487] Call trace: [ 17.193536] show_stack+0x20/0x38 (C) [ 17.193651] dump_stack_lvl+0x8c/0xd0 [ 17.193762] print_report+0x118/0x608 [ 17.193870] kasan_report+0xdc/0x128 [ 17.193976] __asan_report_store1_noabort+0x20/0x30 [ 17.194096] krealloc_less_oob_helper+0xae4/0xc50 [ 17.195843] krealloc_less_oob+0x20/0x38 [ 17.196912] kunit_try_run_case+0x170/0x3f0 [ 17.197446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.198126] kthread+0x328/0x630 [ 17.198650] ret_from_fork+0x10/0x20 [ 17.199310] [ 17.199365] Allocated by task 158: [ 17.199427] kasan_save_stack+0x3c/0x68 [ 17.199512] kasan_save_track+0x20/0x40 [ 17.199578] kasan_save_alloc_info+0x40/0x58 [ 17.199642] __kasan_krealloc+0x118/0x178 [ 17.199730] krealloc_noprof+0x128/0x360 [ 17.199806] krealloc_less_oob_helper+0x168/0xc50 [ 17.199990] krealloc_less_oob+0x20/0x38 [ 17.200236] kunit_try_run_case+0x170/0x3f0 [ 17.200809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.200922] kthread+0x328/0x630 [ 17.201181] ret_from_fork+0x10/0x20 [ 17.201727] [ 17.201789] The buggy address belongs to the object at fff00000c6323000 [ 17.201789] which belongs to the cache kmalloc-256 of size 256 [ 17.201928] The buggy address is located 33 bytes to the right of [ 17.201928] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.202065] [ 17.202109] The buggy address belongs to the physical page: [ 17.202182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.202297] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.202406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.203789] page_type: f5(slab) [ 17.203949] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.204104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.204270] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.204395] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.204523] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.204638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.204723] page dumped because: kasan: bad access detected [ 17.204791] [ 17.204831] Memory state around the buggy address: [ 17.204901] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.204998] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.205132] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.205218] ^ [ 17.205325] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.205406] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.205485] ================================================================== [ 17.169669] ================================================================== [ 17.169784] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.169889] Write of size 1 at addr fff00000c63230d0 by task kunit_try_catch/158 [ 17.170000] [ 17.170072] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.170262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.170373] Hardware name: linux,dummy-virt (DT) [ 17.170443] Call trace: [ 17.170486] show_stack+0x20/0x38 (C) [ 17.170877] dump_stack_lvl+0x8c/0xd0 [ 17.171011] print_report+0x118/0x608 [ 17.171315] kasan_report+0xdc/0x128 [ 17.171752] __asan_report_store1_noabort+0x20/0x30 [ 17.171919] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.172083] krealloc_less_oob+0x20/0x38 [ 17.172195] kunit_try_run_case+0x170/0x3f0 [ 17.172361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.172518] kthread+0x328/0x630 [ 17.172630] ret_from_fork+0x10/0x20 [ 17.172841] [ 17.172882] Allocated by task 158: [ 17.172943] kasan_save_stack+0x3c/0x68 [ 17.173489] kasan_save_track+0x20/0x40 [ 17.173920] kasan_save_alloc_info+0x40/0x58 [ 17.174343] __kasan_krealloc+0x118/0x178 [ 17.174521] krealloc_noprof+0x128/0x360 [ 17.174608] krealloc_less_oob_helper+0x168/0xc50 [ 17.174696] krealloc_less_oob+0x20/0x38 [ 17.174782] kunit_try_run_case+0x170/0x3f0 [ 17.174861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.174956] kthread+0x328/0x630 [ 17.175661] ret_from_fork+0x10/0x20 [ 17.175746] [ 17.175783] The buggy address belongs to the object at fff00000c6323000 [ 17.175783] which belongs to the cache kmalloc-256 of size 256 [ 17.175890] The buggy address is located 7 bytes to the right of [ 17.175890] allocated 201-byte region [fff00000c6323000, fff00000c63230c9) [ 17.176030] [ 17.176097] The buggy address belongs to the physical page: [ 17.176162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.176273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.176389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.176527] page_type: f5(slab) [ 17.176630] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.176750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.176878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.177070] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.177246] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.177394] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.177532] page dumped because: kasan: bad access detected [ 17.177641] [ 17.177725] Memory state around the buggy address: [ 17.177798] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.178246] fff00000c6323000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.178355] >fff00000c6323080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.178604] ^ [ 17.178689] fff00000c6323100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.178900] fff00000c6323180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.179040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
Automatically assigned
[ 17.120105] ================================================================== [ 17.120239] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.120440] Write of size 1 at addr fff00000c6322ef0 by task kunit_try_catch/156 [ 17.120666] [ 17.120750] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.121207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.121528] Hardware name: linux,dummy-virt (DT) [ 17.121616] Call trace: [ 17.121776] show_stack+0x20/0x38 (C) [ 17.121911] dump_stack_lvl+0x8c/0xd0 [ 17.122020] print_report+0x118/0x608 [ 17.122527] kasan_report+0xdc/0x128 [ 17.122656] __asan_report_store1_noabort+0x20/0x30 [ 17.122840] krealloc_more_oob_helper+0x5c0/0x678 [ 17.122970] krealloc_more_oob+0x20/0x38 [ 17.123122] kunit_try_run_case+0x170/0x3f0 [ 17.123231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.123347] kthread+0x328/0x630 [ 17.123688] ret_from_fork+0x10/0x20 [ 17.124058] [ 17.124101] Allocated by task 156: [ 17.124406] kasan_save_stack+0x3c/0x68 [ 17.124554] kasan_save_track+0x20/0x40 [ 17.124666] kasan_save_alloc_info+0x40/0x58 [ 17.125240] __kasan_krealloc+0x118/0x178 [ 17.125352] krealloc_noprof+0x128/0x360 [ 17.125672] krealloc_more_oob_helper+0x168/0x678 [ 17.125813] krealloc_more_oob+0x20/0x38 [ 17.125911] kunit_try_run_case+0x170/0x3f0 [ 17.125996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.126315] kthread+0x328/0x630 [ 17.126398] ret_from_fork+0x10/0x20 [ 17.126477] [ 17.126980] The buggy address belongs to the object at fff00000c6322e00 [ 17.126980] which belongs to the cache kmalloc-256 of size 256 [ 17.127150] The buggy address is located 5 bytes to the right of [ 17.127150] allocated 235-byte region [fff00000c6322e00, fff00000c6322eeb) [ 17.127294] [ 17.127645] The buggy address belongs to the physical page: [ 17.127915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.128066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.128273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.128511] page_type: f5(slab) [ 17.128667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.128995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.129219] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.129340] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.129979] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.130198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.130280] page dumped because: kasan: bad access detected [ 17.130491] [ 17.130646] Memory state around the buggy address: [ 17.130938] fff00000c6322d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.131058] fff00000c6322e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.131165] >fff00000c6322e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.131251] ^ [ 17.131339] fff00000c6322f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.131418] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.131711] ================================================================== [ 17.100834] ================================================================== [ 17.101009] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.101146] Write of size 1 at addr fff00000c6322eeb by task kunit_try_catch/156 [ 17.101258] [ 17.102756] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.103786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.104109] Hardware name: linux,dummy-virt (DT) [ 17.104247] Call trace: [ 17.104296] show_stack+0x20/0x38 (C) [ 17.104860] dump_stack_lvl+0x8c/0xd0 [ 17.105467] print_report+0x118/0x608 [ 17.106353] kasan_report+0xdc/0x128 [ 17.106896] __asan_report_store1_noabort+0x20/0x30 [ 17.107202] krealloc_more_oob_helper+0x60c/0x678 [ 17.108111] krealloc_more_oob+0x20/0x38 [ 17.108434] kunit_try_run_case+0x170/0x3f0 [ 17.108702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.108963] kthread+0x328/0x630 [ 17.109531] ret_from_fork+0x10/0x20 [ 17.109798] [ 17.109838] Allocated by task 156: [ 17.109933] kasan_save_stack+0x3c/0x68 [ 17.110103] kasan_save_track+0x20/0x40 [ 17.110182] kasan_save_alloc_info+0x40/0x58 [ 17.110272] __kasan_krealloc+0x118/0x178 [ 17.110366] krealloc_noprof+0x128/0x360 [ 17.111332] krealloc_more_oob_helper+0x168/0x678 [ 17.111971] krealloc_more_oob+0x20/0x38 [ 17.112226] kunit_try_run_case+0x170/0x3f0 [ 17.112331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.112421] kthread+0x328/0x630 [ 17.112505] ret_from_fork+0x10/0x20 [ 17.112584] [ 17.112633] The buggy address belongs to the object at fff00000c6322e00 [ 17.112633] which belongs to the cache kmalloc-256 of size 256 [ 17.112931] The buggy address is located 0 bytes to the right of [ 17.112931] allocated 235-byte region [fff00000c6322e00, fff00000c6322eeb) [ 17.113251] [ 17.113349] The buggy address belongs to the physical page: [ 17.113502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106322 [ 17.113736] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.113880] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.114327] page_type: f5(slab) [ 17.114604] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.114743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.114933] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.115112] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.115206] head: 0bfffe0000000001 ffffc1ffc318c881 00000000ffffffff 00000000ffffffff [ 17.115749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.115879] page dumped because: kasan: bad access detected [ 17.115958] [ 17.115997] Memory state around the buggy address: [ 17.116074] fff00000c6322d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.116179] fff00000c6322e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.116281] >fff00000c6322e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.116643] ^ [ 17.117045] fff00000c6322f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.117149] fff00000c6322f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.117229] ================================================================== [ 17.236241] ================================================================== [ 17.236365] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.236497] Write of size 1 at addr fff00000c65b60f0 by task kunit_try_catch/160 [ 17.236630] [ 17.236712] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.236932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.237002] Hardware name: linux,dummy-virt (DT) [ 17.237074] Call trace: [ 17.237158] show_stack+0x20/0x38 (C) [ 17.237276] dump_stack_lvl+0x8c/0xd0 [ 17.237398] print_report+0x118/0x608 [ 17.237504] kasan_report+0xdc/0x128 [ 17.237605] __asan_report_store1_noabort+0x20/0x30 [ 17.237718] krealloc_more_oob_helper+0x5c0/0x678 [ 17.237827] krealloc_large_more_oob+0x20/0x38 [ 17.237934] kunit_try_run_case+0x170/0x3f0 [ 17.238046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.238166] kthread+0x328/0x630 [ 17.238264] ret_from_fork+0x10/0x20 [ 17.238382] [ 17.238960] The buggy address belongs to the physical page: [ 17.239102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.239311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.239427] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.239776] page_type: f8(unknown) [ 17.239980] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.240222] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.240492] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.240810] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.240972] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.241262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.241465] page dumped because: kasan: bad access detected [ 17.241534] [ 17.241572] Memory state around the buggy address: [ 17.241643] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.241848] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.242062] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.242261] ^ [ 17.242576] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.242672] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.242841] ================================================================== [ 17.228497] ================================================================== [ 17.229042] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.229199] Write of size 1 at addr fff00000c65b60eb by task kunit_try_catch/160 [ 17.229316] [ 17.229413] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.229612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.229678] Hardware name: linux,dummy-virt (DT) [ 17.229752] Call trace: [ 17.229805] show_stack+0x20/0x38 (C) [ 17.229923] dump_stack_lvl+0x8c/0xd0 [ 17.230036] print_report+0x118/0x608 [ 17.230144] kasan_report+0xdc/0x128 [ 17.230255] __asan_report_store1_noabort+0x20/0x30 [ 17.230389] krealloc_more_oob_helper+0x60c/0x678 [ 17.230507] krealloc_large_more_oob+0x20/0x38 [ 17.230619] kunit_try_run_case+0x170/0x3f0 [ 17.230732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.231651] kthread+0x328/0x630 [ 17.231869] ret_from_fork+0x10/0x20 [ 17.232063] [ 17.232116] The buggy address belongs to the physical page: [ 17.232256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4 [ 17.232434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.232761] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.232970] page_type: f8(unknown) [ 17.233069] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.233183] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.233501] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.233647] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.233770] head: 0bfffe0000000002 ffffc1ffc3196d01 00000000ffffffff 00000000ffffffff [ 17.233971] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.234077] page dumped because: kasan: bad access detected [ 17.234149] [ 17.234188] Memory state around the buggy address: [ 17.234259] fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.234359] fff00000c65b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.234457] >fff00000c65b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.234543] ^ [ 17.234808] fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.235199] fff00000c65b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.235307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
Automatically assigned
[ 17.060277] ================================================================== [ 17.060445] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 17.060596] Read of size 1 at addr fff00000c7910000 by task kunit_try_catch/154 [ 17.060717] [ 17.060803] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.061010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.061079] Hardware name: linux,dummy-virt (DT) [ 17.061168] Call trace: [ 17.061251] show_stack+0x20/0x38 (C) [ 17.061390] dump_stack_lvl+0x8c/0xd0 [ 17.061508] print_report+0x118/0x608 [ 17.061627] kasan_report+0xdc/0x128 [ 17.061720] __asan_report_load1_noabort+0x20/0x30 [ 17.061835] page_alloc_uaf+0x328/0x350 [ 17.061950] kunit_try_run_case+0x170/0x3f0 [ 17.062181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.062327] kthread+0x328/0x630 [ 17.062433] ret_from_fork+0x10/0x20 [ 17.062554] [ 17.062604] The buggy address belongs to the physical page: [ 17.062704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 17.062912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.063023] page_type: f0(buddy) [ 17.063109] raw: 0bfffe0000000000 fff00000ff6160a0 fff00000ff6160a0 0000000000000000 [ 17.063209] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 17.063281] page dumped because: kasan: bad access detected [ 17.063629] [ 17.063719] Memory state around the buggy address: [ 17.063807] fff00000c790ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.064037] fff00000c790ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.064507] >fff00000c7910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.064683] ^ [ 17.064749] fff00000c7910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.065089] fff00000c7910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.065387] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
Automatically assigned
[ 17.020173] ================================================================== [ 17.020422] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 17.020619] Free of addr fff00000c65b0001 by task kunit_try_catch/150 [ 17.020722] [ 17.021110] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.021480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.021549] Hardware name: linux,dummy-virt (DT) [ 17.021615] Call trace: [ 17.021956] show_stack+0x20/0x38 (C) [ 17.022099] dump_stack_lvl+0x8c/0xd0 [ 17.022394] print_report+0x118/0x608 [ 17.022676] kasan_report_invalid_free+0xc0/0xe8 [ 17.022969] __kasan_kfree_large+0x5c/0xa8 [ 17.023293] free_large_kmalloc+0x64/0x190 [ 17.023452] kfree+0x270/0x3c8 [ 17.023570] kmalloc_large_invalid_free+0x108/0x270 [ 17.023672] kunit_try_run_case+0x170/0x3f0 [ 17.023937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.024199] kthread+0x328/0x630 [ 17.024411] ret_from_fork+0x10/0x20 [ 17.024538] [ 17.024591] The buggy address belongs to the physical page: [ 17.024670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 17.024787] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.025149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.025302] page_type: f8(unknown) [ 17.025457] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.025607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.025754] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.025895] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.026314] head: 0bfffe0000000002 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff [ 17.026451] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.026722] page dumped because: kasan: bad access detected [ 17.026902] [ 17.026980] Memory state around the buggy address: [ 17.027062] fff00000c65aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.027308] fff00000c65aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.027535] >fff00000c65b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.027657] ^ [ 17.027823] fff00000c65b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.027902] fff00000c65b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.027999] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
Automatically assigned
[ 16.994035] ================================================================== [ 16.994209] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 16.995660] Read of size 1 at addr fff00000c65b0000 by task kunit_try_catch/148 [ 16.995793] [ 16.995873] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.996049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.996105] Hardware name: linux,dummy-virt (DT) [ 16.996170] Call trace: [ 16.996226] show_stack+0x20/0x38 (C) [ 16.996352] dump_stack_lvl+0x8c/0xd0 [ 16.996444] print_report+0x118/0x608 [ 16.996543] kasan_report+0xdc/0x128 [ 16.996634] __asan_report_load1_noabort+0x20/0x30 [ 16.996999] kmalloc_large_uaf+0x2cc/0x2f8 [ 16.997111] kunit_try_run_case+0x170/0x3f0 [ 16.997230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.997439] kthread+0x328/0x630 [ 16.997615] ret_from_fork+0x10/0x20 [ 16.997786] [ 16.997863] The buggy address belongs to the physical page: [ 16.997983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 16.998107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.998281] raw: 0bfffe0000000000 ffffc1ffc3196d08 fff00000da448c40 0000000000000000 [ 16.998418] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.998505] page dumped because: kasan: bad access detected [ 16.998912] [ 16.998982] Memory state around the buggy address: [ 16.999101] fff00000c65aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.999211] fff00000c65aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.999290] >fff00000c65b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.999365] ^ [ 16.999572] fff00000c65b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.999663] fff00000c65b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.999751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
Automatically assigned
[ 16.957774] ================================================================== [ 16.957926] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.958044] Write of size 1 at addr fff00000c65ae00a by task kunit_try_catch/146 [ 16.958148] [ 16.958225] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.959052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.959112] Hardware name: linux,dummy-virt (DT) [ 16.959177] Call trace: [ 16.959227] show_stack+0x20/0x38 (C) [ 16.959407] dump_stack_lvl+0x8c/0xd0 [ 16.959543] print_report+0x118/0x608 [ 16.959645] kasan_report+0xdc/0x128 [ 16.959745] __asan_report_store1_noabort+0x20/0x30 [ 16.959855] kmalloc_large_oob_right+0x278/0x2b8 [ 16.959965] kunit_try_run_case+0x170/0x3f0 [ 16.960090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.960228] kthread+0x328/0x630 [ 16.960333] ret_from_fork+0x10/0x20 [ 16.960436] [ 16.960530] The buggy address belongs to the physical page: [ 16.960598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ac [ 16.960698] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.960803] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.960929] page_type: f8(unknown) [ 16.961009] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.961101] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.961455] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.961625] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.962133] head: 0bfffe0000000002 ffffc1ffc3196b01 00000000ffffffff 00000000ffffffff [ 16.962262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.962425] page dumped because: kasan: bad access detected [ 16.962882] [ 16.962931] Memory state around the buggy address: [ 16.963059] fff00000c65adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.963157] fff00000c65adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.963517] >fff00000c65ae000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.963838] ^ [ 16.963911] fff00000c65ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.963997] fff00000c65ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.964424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
Automatically assigned
[ 16.928123] ================================================================== [ 16.928257] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.928798] Write of size 1 at addr fff00000c78e1f00 by task kunit_try_catch/144 [ 16.928905] [ 16.928977] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.929148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.929201] Hardware name: linux,dummy-virt (DT) [ 16.929462] Call trace: [ 16.929530] show_stack+0x20/0x38 (C) [ 16.929658] dump_stack_lvl+0x8c/0xd0 [ 16.929766] print_report+0x118/0x608 [ 16.929884] kasan_report+0xdc/0x128 [ 16.929987] __asan_report_store1_noabort+0x20/0x30 [ 16.930095] kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.930189] kunit_try_run_case+0x170/0x3f0 [ 16.930477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.930591] kthread+0x328/0x630 [ 16.930679] ret_from_fork+0x10/0x20 [ 16.930795] [ 16.930996] Allocated by task 144: [ 16.931077] kasan_save_stack+0x3c/0x68 [ 16.931231] kasan_save_track+0x20/0x40 [ 16.931302] kasan_save_alloc_info+0x40/0x58 [ 16.931488] __kasan_kmalloc+0xd4/0xd8 [ 16.932065] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.932225] kmalloc_big_oob_right+0xb8/0x2f0 [ 16.932375] kunit_try_run_case+0x170/0x3f0 [ 16.932732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.932830] kthread+0x328/0x630 [ 16.933164] ret_from_fork+0x10/0x20 [ 16.933877] [ 16.934080] The buggy address belongs to the object at fff00000c78e0000 [ 16.934080] which belongs to the cache kmalloc-8k of size 8192 [ 16.934484] The buggy address is located 0 bytes to the right of [ 16.934484] allocated 7936-byte region [fff00000c78e0000, fff00000c78e1f00) [ 16.935058] [ 16.935117] The buggy address belongs to the physical page: [ 16.935178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 16.935296] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.935393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.935706] page_type: f5(slab) [ 16.935807] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.935917] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.936024] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.936127] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.936355] head: 0bfffe0000000003 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 16.936546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.936679] page dumped because: kasan: bad access detected [ 16.936778] [ 16.936848] Memory state around the buggy address: [ 16.936930] fff00000c78e1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.937026] fff00000c78e1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.937123] >fff00000c78e1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.937209] ^ [ 16.937276] fff00000c78e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.937414] fff00000c78e2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.937499] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
Automatically assigned
[ 16.902785] ================================================================== [ 16.902890] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.903229] Write of size 1 at addr fff00000c3ef0d78 by task kunit_try_catch/142 [ 16.903397] [ 16.903487] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.904010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.904107] Hardware name: linux,dummy-virt (DT) [ 16.904183] Call trace: [ 16.904304] show_stack+0x20/0x38 (C) [ 16.904444] dump_stack_lvl+0x8c/0xd0 [ 16.904592] print_report+0x118/0x608 [ 16.904710] kasan_report+0xdc/0x128 [ 16.905086] __asan_report_store1_noabort+0x20/0x30 [ 16.905556] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.905696] kunit_try_run_case+0x170/0x3f0 [ 16.905829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.906024] kthread+0x328/0x630 [ 16.906141] ret_from_fork+0x10/0x20 [ 16.906571] [ 16.906614] Allocated by task 142: [ 16.906690] kasan_save_stack+0x3c/0x68 [ 16.906784] kasan_save_track+0x20/0x40 [ 16.906863] kasan_save_alloc_info+0x40/0x58 [ 16.907013] __kasan_kmalloc+0xd4/0xd8 [ 16.907191] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 16.907358] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.907466] kunit_try_run_case+0x170/0x3f0 [ 16.907665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.907749] kthread+0x328/0x630 [ 16.907804] ret_from_fork+0x10/0x20 [ 16.907866] [ 16.907903] The buggy address belongs to the object at fff00000c3ef0d00 [ 16.907903] which belongs to the cache kmalloc-128 of size 128 [ 16.908010] The buggy address is located 0 bytes to the right of [ 16.908010] allocated 120-byte region [fff00000c3ef0d00, fff00000c3ef0d78) [ 16.908542] [ 16.908716] The buggy address belongs to the physical page: [ 16.908908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.909016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.909126] page_type: f5(slab) [ 16.909210] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.909489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.909620] page dumped because: kasan: bad access detected [ 16.909703] [ 16.909738] Memory state around the buggy address: [ 16.909803] fff00000c3ef0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.910205] fff00000c3ef0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910391] >fff00000c3ef0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.910573] ^ [ 16.910755] fff00000c3ef0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910921] fff00000c3ef0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910991] ================================================================== [ 16.893902] ================================================================== [ 16.894226] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.894370] Write of size 1 at addr fff00000c3ef0c78 by task kunit_try_catch/142 [ 16.894469] [ 16.894549] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.894737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.894815] Hardware name: linux,dummy-virt (DT) [ 16.894876] Call trace: [ 16.894930] show_stack+0x20/0x38 (C) [ 16.895369] dump_stack_lvl+0x8c/0xd0 [ 16.895566] print_report+0x118/0x608 [ 16.895765] kasan_report+0xdc/0x128 [ 16.895896] __asan_report_store1_noabort+0x20/0x30 [ 16.896009] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.896108] kunit_try_run_case+0x170/0x3f0 [ 16.896215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.896342] kthread+0x328/0x630 [ 16.896457] ret_from_fork+0x10/0x20 [ 16.896608] [ 16.896649] Allocated by task 142: [ 16.896717] kasan_save_stack+0x3c/0x68 [ 16.896829] kasan_save_track+0x20/0x40 [ 16.896949] kasan_save_alloc_info+0x40/0x58 [ 16.897081] __kasan_kmalloc+0xd4/0xd8 [ 16.897196] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 16.897302] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.897403] kunit_try_run_case+0x170/0x3f0 [ 16.897483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.897568] kthread+0x328/0x630 [ 16.897645] ret_from_fork+0x10/0x20 [ 16.897773] [ 16.897838] The buggy address belongs to the object at fff00000c3ef0c00 [ 16.897838] which belongs to the cache kmalloc-128 of size 128 [ 16.898001] The buggy address is located 0 bytes to the right of [ 16.898001] allocated 120-byte region [fff00000c3ef0c00, fff00000c3ef0c78) [ 16.898146] [ 16.898201] The buggy address belongs to the physical page: [ 16.898285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.898597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.898757] page_type: f5(slab) [ 16.899021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.899288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.899673] page dumped because: kasan: bad access detected [ 16.899748] [ 16.899784] Memory state around the buggy address: [ 16.899850] fff00000c3ef0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.899936] fff00000c3ef0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.900075] >fff00000c3ef0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.900171] ^ [ 16.900288] fff00000c3ef0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.900408] fff00000c3ef0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.900531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
Automatically assigned
[ 16.868859] ================================================================== [ 16.869040] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 16.869172] Read of size 1 at addr fff00000c78d1000 by task kunit_try_catch/140 [ 16.869275] [ 16.869362] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.869636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.869695] Hardware name: linux,dummy-virt (DT) [ 16.869760] Call trace: [ 16.869825] show_stack+0x20/0x38 (C) [ 16.869957] dump_stack_lvl+0x8c/0xd0 [ 16.870067] print_report+0x118/0x608 [ 16.870626] kasan_report+0xdc/0x128 [ 16.870783] __asan_report_load1_noabort+0x20/0x30 [ 16.870984] kmalloc_node_oob_right+0x2f4/0x330 [ 16.871208] kunit_try_run_case+0x170/0x3f0 [ 16.871480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.871802] kthread+0x328/0x630 [ 16.871930] ret_from_fork+0x10/0x20 [ 16.872476] [ 16.872518] Allocated by task 140: [ 16.872585] kasan_save_stack+0x3c/0x68 [ 16.872677] kasan_save_track+0x20/0x40 [ 16.872755] kasan_save_alloc_info+0x40/0x58 [ 16.872839] __kasan_kmalloc+0xd4/0xd8 [ 16.873470] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 16.874201] kmalloc_node_oob_right+0xbc/0x330 [ 16.874495] kunit_try_run_case+0x170/0x3f0 [ 16.874679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.875272] kthread+0x328/0x630 [ 16.875369] ret_from_fork+0x10/0x20 [ 16.875432] [ 16.875955] The buggy address belongs to the object at fff00000c78d0000 [ 16.875955] which belongs to the cache kmalloc-4k of size 4096 [ 16.876100] The buggy address is located 0 bytes to the right of [ 16.876100] allocated 4096-byte region [fff00000c78d0000, fff00000c78d1000) [ 16.876240] [ 16.876285] The buggy address belongs to the physical page: [ 16.877415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d0 [ 16.878133] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.878443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.878708] page_type: f5(slab) [ 16.878803] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.878916] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.879276] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.879456] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.879554] head: 0bfffe0000000003 ffffc1ffc31e3401 00000000ffffffff 00000000ffffffff [ 16.879733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.879964] page dumped because: kasan: bad access detected [ 16.880207] [ 16.880275] Memory state around the buggy address: [ 16.880512] fff00000c78d0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.880652] fff00000c78d0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.881045] >fff00000c78d1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.881189] ^ [ 16.881299] fff00000c78d1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.881510] fff00000c78d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.881643] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libteststest_ratelimit-test_ratelimit_stress_child
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libteststest_ratelimit-test_ratelimit_stress_child: Failure
Automatically assigned
------------[ cut here ]------------ [ 142.261638] WARNING: CPU: 0 PID: 1600 at lib/tests/test_ratelimit.c:87 test_ratelimit_stress_child+0x160/0x1b8 [ 142.262057] Modules linked in: [ 142.262245] CPU: 0 UID: 0 PID: 1600 Comm: test_ratelimit_ Tainted: G B D W N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 142.263851] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 142.264506] Hardware name: linux,dummy-virt (DT) [ 142.264865] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 142.265380] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 142.265843] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 142.266256] sp : ffff800089657d90 [ 142.266570] x29: ffff800089657d90 x28: 0000000000000000 x27: 0000000000000000 [ 142.267202] x26: 1ffe000018c675a1 x25: 0000000000000000 x24: 0000000000000004 [ 142.267742] x23: fff00000c633ad0c x22: fff00000cbf3bda8 x21: ffffa1327c964038 [ 142.268261] x20: fff00000c633ad00 x19: fff00000cbf3bda8 x18: fff00000c1218b60 [ 142.268884] x17: 0000000000000001 x16: fff00000c097583c x15: fff00000ff616b08 [ 142.269146] x14: 0000000000018fff x13: 1ffe00001b48cdcd x12: fffd80001b488849 [ 142.269411] x11: 1ffe00001b488848 x10: fffd80001b488848 x9 : ffffa1327f00390c [ 142.269671] x8 : ffff800089657ae8 x7 : 0000000000000001 x6 : ffff800089657c00 [ 142.269922] x5 : 0000000000000001 x4 : ffffa132813643e0 x3 : 0000000000000000 [ 142.270159] x2 : 1ffe0000197e77b9 x1 : 0000000000000000 x0 : 0000000000000000 [ 142.270628] Call trace: [ 142.270989] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 142.271441] kthread+0x328/0x630 [ 142.271747] ret_from_fork+0x10/0x20 [ 142.272066] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
Automatically assigned
------------[ cut here ]------------ [ 94.690169] WARNING: CPU: 1 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 94.691247] Modules linked in: [ 94.691636] CPU: 1 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 94.692314] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 94.693581] Hardware name: linux,dummy-virt (DT) [ 94.693955] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.694523] pc : intlog10+0x38/0x48 [ 94.694996] lr : intlog10_test+0xe4/0x200 [ 94.695563] sp : ffff800082467c10 [ 94.695755] x29: ffff800082467c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.696591] x26: 1ffe000018f02bc1 x25: 0000000000000000 x24: ffff800082467ce0 [ 94.697274] x23: ffff800082467d00 x22: 0000000000000000 x21: 1ffff0001048cf82 [ 94.697960] x20: ffffa1327f2d2d00 x19: ffff800080087990 x18: 00000000c838bd38 [ 94.698639] x17: 00000000be7aef34 x16: 00000000076b199b x15: 00000000e2476e82 [ 94.699893] x14: 00000000887e71af x13: fff00000c14f7500 x12: ffff74265062f779 [ 94.700625] x11: 1ffff4265062f778 x10: ffff74265062f778 x9 : ffffa1327c8680ac [ 94.701391] x8 : ffffa1328317bbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.702063] x5 : ffff70001048cf82 x4 : 1ffff00010010f3a x3 : 1ffff4264fe5a5a0 [ 94.702762] x2 : 1ffff4264fe5a5a0 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.703719] Call trace: [ 94.703966] intlog10+0x38/0x48 (P) [ 94.704249] kunit_try_run_case+0x170/0x3f0 [ 94.704776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.705336] kthread+0x328/0x630 [ 94.705650] ret_from_fork+0x10/0x20 [ 94.706072] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
Automatically assigned
------------[ cut here ]------------ [ 94.615916] WARNING: CPU: 0 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 94.617110] Modules linked in: [ 94.617605] CPU: 0 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 94.618334] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 94.618793] Hardware name: linux,dummy-virt (DT) [ 94.619263] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.620130] pc : intlog2+0xd8/0xf8 [ 94.620823] lr : intlog2_test+0xe4/0x200 [ 94.621258] sp : ffff8000823c7c10 [ 94.621744] x29: ffff8000823c7c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.622376] x26: 1ffe000018f02a21 x25: 0000000000000000 x24: ffff8000823c7ce0 [ 94.623237] x23: ffff8000823c7d00 x22: 0000000000000000 x21: 1ffff00010478f82 [ 94.623947] x20: ffffa1327f2d2c00 x19: ffff800080087990 x18: fff00000c17653a8 [ 94.624428] x17: 00000000e4e09d41 x16: fff00000c097583c x15: fff00000ff616b08 [ 94.625227] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cdcd x12: ffff74265062f779 [ 94.626013] x11: 1ffff4265062f778 x10: ffff74265062f778 x9 : ffffa1327c8682ac [ 94.626671] x8 : ffffa1328317bbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.627288] x5 : ffff700010478f82 x4 : 1ffff00010010f3a x3 : 1ffff4264fe5a580 [ 94.628014] x2 : 1ffff4264fe5a580 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.628807] Call trace: [ 94.629035] intlog2+0xd8/0xf8 (P) [ 94.629453] kunit_try_run_case+0x170/0x3f0 [ 94.629860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.630441] kthread+0x328/0x630 [ 94.630740] ret_from_fork+0x10/0x20 [ 94.631432] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
Automatically assigned
<8>[ 312.428564] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
Automatically assigned
<8>[ 312.136200] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_8
[ 17.595904] ================================================================== [ 17.596962] BUG: KFENCE: memory corruption in kmalloc_oob_memset_8+0x170/0x2f8 [ 17.596962] [ 17.597146] Corrupted memory at 0x000000007b463737 [ ! . . . . . . . ] (in kfence-#66): [ 17.602679] kmalloc_oob_memset_8+0x170/0x2f8 [ 17.602829] kunit_try_run_case+0x170/0x3f0 [ 17.602949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.603069] kthread+0x328/0x630 [ 17.603165] ret_from_fork+0x10/0x20 [ 17.603264] [ 17.603330] kfence-#66: 0x00000000e20515be-0x00000000aec0dc85, size=120, cache=kmalloc-128 [ 17.603330] [ 17.603442] allocated by task 176 on cpu 0 at 17.588262s (0.015172s ago): [ 17.603564] kmalloc_oob_memset_8+0xb0/0x2f8 [ 17.603645] kunit_try_run_case+0x170/0x3f0 [ 17.604118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.604311] kthread+0x328/0x630 [ 17.604476] ret_from_fork+0x10/0x20 [ 17.604574] [ 17.605118] freed by task 176 on cpu 0 at 17.595267s (0.009408s ago): [ 17.605404] kmalloc_oob_memset_8+0x170/0x2f8 [ 17.605528] kunit_try_run_case+0x170/0x3f0 [ 17.605619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.605704] kthread+0x328/0x630 [ 17.605802] ret_from_fork+0x10/0x20 [ 17.605945] [ 17.606067] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 17.606315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.606372] Hardware name: linux,dummy-virt (DT) [ 17.606434] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_oob_left
[ 16.835312] ================================================================== [ 16.835636] BUG: KFENCE: out-of-bounds read in kmalloc_oob_left+0x160/0x320 [ 16.835636] [ 16.835913] Out-of-bounds read at 0x00000000b858bb47 (1B left of kfence-#59): [ 16.836608] kmalloc_oob_left+0x160/0x320 [ 16.836709] kunit_try_run_case+0x170/0x3f0 [ 16.836796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.836899] kthread+0x328/0x630 [ 16.836976] ret_from_fork+0x10/0x20 [ 16.837164] [ 16.837847] kfence-#59: 0x0000000039df9df3-0x0000000052896ee2, size=15, cache=kmalloc-16 [ 16.837847] [ 16.838313] allocated by task 138 on cpu 0 at 16.825961s (0.012206s ago): [ 16.839000] kmalloc_oob_left+0xb8/0x320 [ 16.839119] kunit_try_run_case+0x170/0x3f0 [ 16.839206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.839356] kthread+0x328/0x630 [ 16.839456] ret_from_fork+0x10/0x20 [ 16.839635] [ 16.839772] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.839960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.840015] Hardware name: linux,dummy-virt (DT) [ 16.840092] ==================================================================