Date
May 29, 2025, 7:10 a.m.
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
Automatically assigned
[ 28.423507] ================================================================== [ 28.423711] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 28.423711] [ 28.424099] Corrupted memory at 0x000000004de638d1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#128): [ 28.427979] test_corruption+0x278/0x378 [ 28.428128] kunit_try_run_case+0x170/0x3f0 [ 28.428305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.428479] kthread+0x328/0x630 [ 28.428617] ret_from_fork+0x10/0x20 [ 28.428723] [ 28.428789] kfence-#128: 0x00000000a5bae94a-0x00000000fd105cb6, size=32, cache=kmalloc-32 [ 28.428789] [ 28.428932] allocated by task 311 on cpu 1 at 28.421858s (0.007065s ago): [ 28.429080] test_alloc+0x29c/0x628 [ 28.429196] test_corruption+0xdc/0x378 [ 28.429348] kunit_try_run_case+0x170/0x3f0 [ 28.429466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.429566] kthread+0x328/0x630 [ 28.429654] ret_from_fork+0x10/0x20 [ 28.429759] [ 28.429814] freed by task 311 on cpu 1 at 28.422383s (0.007423s ago): [ 28.430237] test_corruption+0x278/0x378 [ 28.430563] kunit_try_run_case+0x170/0x3f0 [ 28.430854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.431007] kthread+0x328/0x630 [ 28.431116] ret_from_fork+0x10/0x20 [ 28.431207] [ 28.431322] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.431766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.431866] Hardware name: linux,dummy-virt (DT) [ 28.431988] ================================================================== [ 28.839177] ================================================================== [ 28.839342] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 28.839342] [ 28.839492] Corrupted memory at 0x000000004a181def [ ! ] (in kfence-#132): [ 28.839760] test_corruption+0x1d8/0x378 [ 28.839878] kunit_try_run_case+0x170/0x3f0 [ 28.840339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.840508] kthread+0x328/0x630 [ 28.840606] ret_from_fork+0x10/0x20 [ 28.840955] [ 28.841047] kfence-#132: 0x0000000093783987-0x00000000d2995e42, size=32, cache=test [ 28.841047] [ 28.841317] allocated by task 313 on cpu 1 at 28.838891s (0.002391s ago): [ 28.841492] test_alloc+0x230/0x628 [ 28.841588] test_corruption+0x198/0x378 [ 28.841694] kunit_try_run_case+0x170/0x3f0 [ 28.841795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.841907] kthread+0x328/0x630 [ 28.841995] ret_from_fork+0x10/0x20 [ 28.842089] [ 28.842147] freed by task 313 on cpu 1 at 28.838994s (0.003144s ago): [ 28.842306] test_corruption+0x1d8/0x378 [ 28.842420] kunit_try_run_case+0x170/0x3f0 [ 28.842521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.843029] kthread+0x328/0x630 [ 28.843232] ret_from_fork+0x10/0x20 [ 28.843321] [ 28.843421] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.843634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.843705] Hardware name: linux,dummy-virt (DT) [ 28.843786] ================================================================== [ 28.525752] ================================================================== [ 28.525916] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 28.525916] [ 28.526051] Corrupted memory at 0x000000005b75adb2 [ ! ] (in kfence-#129): [ 28.528575] test_corruption+0x284/0x378 [ 28.529646] kunit_try_run_case+0x170/0x3f0 [ 28.529971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.530544] kthread+0x328/0x630 [ 28.530650] ret_from_fork+0x10/0x20 [ 28.530711] [ 28.530745] kfence-#129: 0x0000000049d36293-0x0000000096f6aa09, size=32, cache=kmalloc-32 [ 28.530745] [ 28.530859] allocated by task 311 on cpu 1 at 28.525213s (0.005638s ago): [ 28.530954] test_alloc+0x29c/0x628 [ 28.531003] test_corruption+0x198/0x378 [ 28.531050] kunit_try_run_case+0x170/0x3f0 [ 28.531096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.531144] kthread+0x328/0x630 [ 28.531184] ret_from_fork+0x10/0x20 [ 28.531226] [ 28.531254] freed by task 311 on cpu 1 at 28.525407s (0.005843s ago): [ 28.531321] test_corruption+0x284/0x378 [ 28.531366] kunit_try_run_case+0x170/0x3f0 [ 28.531442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.531527] kthread+0x328/0x630 [ 28.531635] ret_from_fork+0x10/0x20 [ 28.531726] [ 28.531898] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.532123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.532286] Hardware name: linux,dummy-virt (DT) [ 28.532437] ================================================================== [ 28.733161] ================================================================== [ 28.733327] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 28.733327] [ 28.733474] Corrupted memory at 0x00000000818f1114 [ ! . . . . . . . . . . . . . . . ] (in kfence-#131): [ 28.735157] test_corruption+0x120/0x378 [ 28.735288] kunit_try_run_case+0x170/0x3f0 [ 28.735390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.735505] kthread+0x328/0x630 [ 28.735612] ret_from_fork+0x10/0x20 [ 28.735753] [ 28.735818] kfence-#131: 0x000000000f67576a-0x00000000f2179426, size=32, cache=test [ 28.735818] [ 28.736020] allocated by task 313 on cpu 1 at 28.732861s (0.003146s ago): [ 28.736243] test_alloc+0x230/0x628 [ 28.736375] test_corruption+0xdc/0x378 [ 28.736490] kunit_try_run_case+0x170/0x3f0 [ 28.736589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.736700] kthread+0x328/0x630 [ 28.736807] ret_from_fork+0x10/0x20 [ 28.736943] [ 28.737012] freed by task 313 on cpu 1 at 28.732973s (0.004031s ago): [ 28.737178] test_corruption+0x120/0x378 [ 28.737278] kunit_try_run_case+0x170/0x3f0 [ 28.737383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.737493] kthread+0x328/0x630 [ 28.737576] ret_from_fork+0x10/0x20 [ 28.737675] [ 28.737884] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.738121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.738188] Hardware name: linux,dummy-virt (DT) [ 28.738268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
Automatically assigned
[ 23.395530] ================================================================== [ 23.395732] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 23.395908] Read of size 1 at addr fff00000c725e000 by task kunit_try_catch/213 [ 23.396036] [ 23.396133] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 23.396351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.396457] Hardware name: linux,dummy-virt (DT) [ 23.396531] Call trace: [ 23.396587] show_stack+0x20/0x38 (C) [ 23.396762] dump_stack_lvl+0x8c/0xd0 [ 23.396915] print_report+0x118/0x608 [ 23.397015] kasan_report+0xdc/0x128 [ 23.397114] __asan_report_load1_noabort+0x20/0x30 [ 23.397239] kmem_cache_rcu_uaf+0x388/0x468 [ 23.397367] kunit_try_run_case+0x170/0x3f0 [ 23.397546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.397686] kthread+0x328/0x630 [ 23.397785] ret_from_fork+0x10/0x20 [ 23.397926] [ 23.397971] Allocated by task 213: [ 23.398042] kasan_save_stack+0x3c/0x68 [ 23.398142] kasan_save_track+0x20/0x40 [ 23.398229] kasan_save_alloc_info+0x40/0x58 [ 23.398316] __kasan_slab_alloc+0xa8/0xb0 [ 23.398469] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 23.398577] kmem_cache_rcu_uaf+0x12c/0x468 [ 23.398678] kunit_try_run_case+0x170/0x3f0 [ 23.398835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.398966] kthread+0x328/0x630 [ 23.399159] ret_from_fork+0x10/0x20 [ 23.399248] [ 23.399287] Freed by task 0: [ 23.399347] kasan_save_stack+0x3c/0x68 [ 23.399447] kasan_save_track+0x20/0x40 [ 23.399556] kasan_save_free_info+0x4c/0x78 [ 23.399640] __kasan_slab_free+0x6c/0x98 [ 23.399726] slab_free_after_rcu_debug+0xd4/0x2f8 [ 23.399809] rcu_core+0x9f4/0x1e20 [ 23.399879] rcu_core_si+0x18/0x30 [ 23.399996] handle_softirqs+0x374/0xb28 [ 23.400080] __do_softirq+0x1c/0x28 [ 23.400193] [ 23.400277] Last potentially related work creation: [ 23.400408] kasan_save_stack+0x3c/0x68 [ 23.400547] kasan_record_aux_stack+0xb4/0xc8 [ 23.400707] kmem_cache_free+0x120/0x470 [ 23.400797] kmem_cache_rcu_uaf+0x16c/0x468 [ 23.400887] kunit_try_run_case+0x170/0x3f0 [ 23.400999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.401174] kthread+0x328/0x630 [ 23.401249] ret_from_fork+0x10/0x20 [ 23.401330] [ 23.401469] The buggy address belongs to the object at fff00000c725e000 [ 23.401469] which belongs to the cache test_cache of size 200 [ 23.401663] The buggy address is located 0 bytes inside of [ 23.401663] freed 200-byte region [fff00000c725e000, fff00000c725e0c8) [ 23.401830] [ 23.401922] The buggy address belongs to the physical page: [ 23.402031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10725e [ 23.402193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.402310] page_type: f5(slab) [ 23.402478] raw: 0bfffe0000000000 fff00000c787b280 dead000000000122 0000000000000000 [ 23.402582] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 23.402699] page dumped because: kasan: bad access detected [ 23.402789] [ 23.402839] Memory state around the buggy address: [ 23.402920] fff00000c725df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.403014] fff00000c725df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.403092] >fff00000c725e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.403165] ^ [ 23.403231] fff00000c725e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 23.403409] fff00000c725e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.403574] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 25.381436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 25.125371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 25.222438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
Automatically assigned
[ 24.896209] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 24.942518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 24.916901] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 24.843817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
Automatically assigned
[ 103.577965] Internal error: Oops: 0000000096000005 [#1] SMP [ 103.583906] Modules linked in: [ 103.584844] CPU: 0 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 103.585996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 103.586633] Hardware name: linux,dummy-virt (DT) [ 103.587511] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 103.588294] pc : kunit_test_null_dereference+0x70/0x170 [ 103.588837] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 103.589258] sp : ffff8000822c7d30 [ 103.589619] x29: ffff8000822c7d90 x28: 0000000000000000 x27: 0000000000000000 [ 103.590509] x26: 1ffe000019717081 x25: 0000000000000000 x24: 0000000000000004 [ 103.591235] x23: fff00000cb8b840c x22: ffffa940cee58308 x21: fff00000c43c8d88 [ 103.591976] x20: 1ffff00010458fa6 x19: ffff800080087990 x18: 00000000d6413a2e [ 103.592730] x17: 00000000e931dd6e x16: 0000000000000100 x15: 0000000068e63496 [ 103.593451] x14: 00000000e9e175e0 x13: 1ffe00001b488989 x12: fffd800018f1762c [ 103.594175] x11: 1ffe000018f1762b x10: fffd800018f1762b x9 : ffffa940cee4f770 [ 103.595034] x8 : ffff8000822c7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 103.595754] x5 : ffff700010458fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 103.596463] x2 : dfff800000000000 x1 : fff00000c78ba880 x0 : ffff800080087990 [ 103.597195] Call trace: [ 103.597623] kunit_test_null_dereference+0x70/0x170 (P) [ 103.598153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 103.598647] kthread+0x328/0x630 [ 103.599088] ret_from_fork+0x10/0x20 [ 103.599959] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 103.600813] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
Automatically assigned
[ 55.056140] ================================================================== [ 55.056266] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 55.056266] [ 55.056395] Use-after-free read at 0x000000006cecd953 (in kfence-#175): [ 55.056479] test_krealloc+0x51c/0x830 [ 55.056534] kunit_try_run_case+0x170/0x3f0 [ 55.056586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.056637] kthread+0x328/0x630 [ 55.056681] ret_from_fork+0x10/0x20 [ 55.056729] [ 55.056758] kfence-#175: 0x000000006cecd953-0x0000000038064440, size=32, cache=kmalloc-32 [ 55.056758] [ 55.056822] allocated by task 337 on cpu 0 at 55.055311s (0.001506s ago): [ 55.056903] test_alloc+0x29c/0x628 [ 55.056953] test_krealloc+0xc0/0x830 [ 55.056998] kunit_try_run_case+0x170/0x3f0 [ 55.057044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.057092] kthread+0x328/0x630 [ 55.057134] ret_from_fork+0x10/0x20 [ 55.057176] [ 55.057206] freed by task 337 on cpu 0 at 55.055626s (0.001575s ago): [ 55.057275] krealloc_noprof+0x148/0x360 [ 55.057326] test_krealloc+0x1dc/0x830 [ 55.057370] kunit_try_run_case+0x170/0x3f0 [ 55.057426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.057480] kthread+0x328/0x630 [ 55.057522] ret_from_fork+0x10/0x20 [ 55.057569] [ 55.057630] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 55.057726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.057761] Hardware name: linux,dummy-virt (DT) [ 55.057805] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
Automatically assigned
[ 54.887368] ================================================================== [ 54.887525] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 54.887525] [ 54.887654] Use-after-free read at 0x00000000ebf57921 (in kfence-#173): [ 54.887720] test_memcache_typesafe_by_rcu+0x280/0x560 [ 54.887780] kunit_try_run_case+0x170/0x3f0 [ 54.887835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.887887] kthread+0x328/0x630 [ 54.887933] ret_from_fork+0x10/0x20 [ 54.887978] [ 54.888008] kfence-#173: 0x00000000ebf57921-0x000000000e7fd7a6, size=32, cache=test [ 54.888008] [ 54.888070] allocated by task 335 on cpu 0 at 54.851253s (0.036812s ago): [ 54.888154] test_alloc+0x230/0x628 [ 54.888203] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 54.888253] kunit_try_run_case+0x170/0x3f0 [ 54.888298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.888347] kthread+0x328/0x630 [ 54.888388] ret_from_fork+0x10/0x20 [ 54.888449] [ 54.888477] freed by task 335 on cpu 0 at 54.851418s (0.037054s ago): [ 54.888545] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 54.888597] kunit_try_run_case+0x170/0x3f0 [ 54.888641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.888688] kthread+0x328/0x630 [ 54.888728] ret_from_fork+0x10/0x20 [ 54.888771] [ 54.888829] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 54.888922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.888957] Hardware name: linux,dummy-virt (DT) [ 54.888998] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
Automatically assigned
[ 32.822212] ================================================================== [ 32.822487] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 32.822487] [ 32.822700] Invalid read at 0x00000000caefb15b: [ 32.822995] test_invalid_access+0xdc/0x1f0 [ 32.823156] kunit_try_run_case+0x170/0x3f0 [ 32.823283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.823407] kthread+0x328/0x630 [ 32.823519] ret_from_fork+0x10/0x20 [ 32.823649] [ 32.823768] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 32.823980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.824072] Hardware name: linux,dummy-virt (DT) [ 32.824169] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
Automatically assigned
[ 26.757117] ================================================================== [ 26.757477] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 26.757477] [ 26.757797] Out-of-bounds write at 0x000000002a37a40c (1B left of kfence-#112): [ 26.757927] test_out_of_bounds_write+0x100/0x240 [ 26.758046] kunit_try_run_case+0x170/0x3f0 [ 26.758157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.758262] kthread+0x328/0x630 [ 26.758356] ret_from_fork+0x10/0x20 [ 26.758785] [ 26.758989] kfence-#112: 0x000000000da62d09-0x00000000452f3d23, size=32, cache=kmalloc-32 [ 26.758989] [ 26.759371] allocated by task 291 on cpu 1 at 26.756478s (0.002881s ago): [ 26.759651] test_alloc+0x29c/0x628 [ 26.759819] test_out_of_bounds_write+0xc8/0x240 [ 26.760113] kunit_try_run_case+0x170/0x3f0 [ 26.760378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.760492] kthread+0x328/0x630 [ 26.760819] ret_from_fork+0x10/0x20 [ 26.761015] [ 26.761311] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.761620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.761936] Hardware name: linux,dummy-virt (DT) [ 26.762022] ================================================================== [ 27.277185] ================================================================== [ 27.277684] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 27.277684] [ 27.278225] Out-of-bounds write at 0x000000006fc9863b (1B left of kfence-#117): [ 27.279149] test_out_of_bounds_write+0x100/0x240 [ 27.279334] kunit_try_run_case+0x170/0x3f0 [ 27.279448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.279554] kthread+0x328/0x630 [ 27.280188] ret_from_fork+0x10/0x20 [ 27.280577] [ 27.281034] kfence-#117: 0x00000000d7526c94-0x00000000b721b68d, size=32, cache=test [ 27.281034] [ 27.281185] allocated by task 293 on cpu 1 at 27.276771s (0.004403s ago): [ 27.281361] test_alloc+0x230/0x628 [ 27.281482] test_out_of_bounds_write+0xc8/0x240 [ 27.281587] kunit_try_run_case+0x170/0x3f0 [ 27.281689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.281797] kthread+0x328/0x630 [ 27.281885] ret_from_fork+0x10/0x20 [ 27.281979] [ 27.282079] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 27.282282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.282353] Hardware name: linux,dummy-virt (DT) [ 27.282438] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
Automatically assigned
[ 32.587691] ================================================================== [ 32.587866] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.587866] [ 32.587948] Corrupted memory at 0x00000000bc5ba393 [ ! . . . . . . . . . . . . . . . ] (in kfence-#168): [ 32.588310] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.588371] kunit_try_run_case+0x170/0x3f0 [ 32.588452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.588505] kthread+0x328/0x630 [ 32.588547] ret_from_fork+0x10/0x20 [ 32.588593] [ 32.588622] kfence-#168: 0x00000000f1c003b6-0x00000000b07da2b5, size=73, cache=kmalloc-96 [ 32.588622] [ 32.588687] allocated by task 325 on cpu 0 at 32.587219s (0.001463s ago): [ 32.588764] test_alloc+0x29c/0x628 [ 32.588813] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 32.588863] kunit_try_run_case+0x170/0x3f0 [ 32.588908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.588957] kthread+0x328/0x630 [ 32.588997] ret_from_fork+0x10/0x20 [ 32.589042] [ 32.589070] freed by task 325 on cpu 0 at 32.587465s (0.001600s ago): [ 32.589141] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.589192] kunit_try_run_case+0x170/0x3f0 [ 32.589238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.589285] kthread+0x328/0x630 [ 32.589327] ret_from_fork+0x10/0x20 [ 32.589370] [ 32.589430] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 32.589531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.589565] Hardware name: linux,dummy-virt (DT) [ 32.589605] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
Automatically assigned
[ 32.379634] ================================================================== [ 32.379809] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.379809] [ 32.379934] Out-of-bounds read at 0x00000000ca9eb9e6 (105B right of kfence-#166): [ 32.380007] test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.380065] kunit_try_run_case+0x170/0x3f0 [ 32.380116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.380166] kthread+0x328/0x630 [ 32.380211] ret_from_fork+0x10/0x20 [ 32.380256] [ 32.380284] kfence-#166: 0x000000000f97f6c4-0x00000000206bd9e6, size=73, cache=kmalloc-96 [ 32.380284] [ 32.380345] allocated by task 323 on cpu 0 at 32.379200s (0.001140s ago): [ 32.380452] test_alloc+0x29c/0x628 [ 32.380503] test_kmalloc_aligned_oob_read+0x100/0x468 [ 32.380554] kunit_try_run_case+0x170/0x3f0 [ 32.380599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.380647] kthread+0x328/0x630 [ 32.380688] ret_from_fork+0x10/0x20 [ 32.380730] [ 32.380786] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 32.380879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.380911] Hardware name: linux,dummy-virt (DT) [ 32.380952] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
Automatically assigned
[ 28.212615] ================================================================== [ 28.212841] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 28.212841] [ 28.212992] Invalid free of 0x00000000caa90f78 (in kfence-#126): [ 28.213132] test_invalid_addr_free+0xec/0x238 [ 28.213339] kunit_try_run_case+0x170/0x3f0 [ 28.213455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.213551] kthread+0x328/0x630 [ 28.213645] ret_from_fork+0x10/0x20 [ 28.213739] [ 28.213795] kfence-#126: 0x00000000002681c5-0x000000007b3d20ee, size=32, cache=test [ 28.213795] [ 28.213924] allocated by task 309 on cpu 1 at 28.212144s (0.001772s ago): [ 28.214083] test_alloc+0x230/0x628 [ 28.214171] test_invalid_addr_free+0xd4/0x238 [ 28.214381] kunit_try_run_case+0x170/0x3f0 [ 28.214614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.214850] kthread+0x328/0x630 [ 28.214941] ret_from_fork+0x10/0x20 [ 28.215278] [ 28.215423] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.215673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.215773] Hardware name: linux,dummy-virt (DT) [ 28.215861] ================================================================== [ 28.112359] ================================================================== [ 28.112539] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 28.112539] [ 28.112681] Invalid free of 0x000000008fc115df (in kfence-#125): [ 28.113534] test_invalid_addr_free+0x1ac/0x238 [ 28.113694] kunit_try_run_case+0x170/0x3f0 [ 28.113809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.113925] kthread+0x328/0x630 [ 28.114025] ret_from_fork+0x10/0x20 [ 28.114128] [ 28.114197] kfence-#125: 0x000000007d750a3c-0x00000000557a2836, size=32, cache=kmalloc-32 [ 28.114197] [ 28.114332] allocated by task 307 on cpu 1 at 28.111771s (0.002541s ago): [ 28.114710] test_alloc+0x29c/0x628 [ 28.114930] test_invalid_addr_free+0xd4/0x238 [ 28.115026] kunit_try_run_case+0x170/0x3f0 [ 28.115130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.115630] kthread+0x328/0x630 [ 28.115813] ret_from_fork+0x10/0x20 [ 28.116094] [ 28.116372] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.116849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.116943] Hardware name: linux,dummy-virt (DT) [ 28.117237] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
Automatically assigned
[ 28.005044] ================================================================== [ 28.005205] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 28.005205] [ 28.005341] Invalid free of 0x00000000e27eb523 (in kfence-#124): [ 28.005722] test_double_free+0x100/0x238 [ 28.006015] kunit_try_run_case+0x170/0x3f0 [ 28.006344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.006491] kthread+0x328/0x630 [ 28.006611] ret_from_fork+0x10/0x20 [ 28.006702] [ 28.006764] kfence-#124: 0x00000000e27eb523-0x0000000012778aca, size=32, cache=test [ 28.006764] [ 28.006907] allocated by task 305 on cpu 1 at 28.004664s (0.002235s ago): [ 28.007070] test_alloc+0x230/0x628 [ 28.007182] test_double_free+0xd4/0x238 [ 28.007275] kunit_try_run_case+0x170/0x3f0 [ 28.007360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.007693] kthread+0x328/0x630 [ 28.007801] ret_from_fork+0x10/0x20 [ 28.007898] [ 28.007954] freed by task 305 on cpu 1 at 28.004743s (0.003202s ago): [ 28.008186] test_double_free+0xf0/0x238 [ 28.008371] kunit_try_run_case+0x170/0x3f0 [ 28.008522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.008642] kthread+0x328/0x630 [ 28.008732] ret_from_fork+0x10/0x20 [ 28.008828] [ 28.008933] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 28.009144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.009223] Hardware name: linux,dummy-virt (DT) [ 28.009310] ================================================================== [ 27.900687] ================================================================== [ 27.901215] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 27.901215] [ 27.901386] Invalid free of 0x0000000058d44c5c (in kfence-#123): [ 27.901588] test_double_free+0x1bc/0x238 [ 27.901710] kunit_try_run_case+0x170/0x3f0 [ 27.902193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.902329] kthread+0x328/0x630 [ 27.902463] ret_from_fork+0x10/0x20 [ 27.902776] [ 27.903035] kfence-#123: 0x0000000058d44c5c-0x00000000e4898a37, size=32, cache=kmalloc-32 [ 27.903035] [ 27.903289] allocated by task 303 on cpu 1 at 27.899855s (0.003424s ago): [ 27.903477] test_alloc+0x29c/0x628 [ 27.903578] test_double_free+0xd4/0x238 [ 27.903675] kunit_try_run_case+0x170/0x3f0 [ 27.904641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.904824] kthread+0x328/0x630 [ 27.905275] ret_from_fork+0x10/0x20 [ 27.905756] [ 27.905956] freed by task 303 on cpu 1 at 27.899998s (0.005948s ago): [ 27.906124] test_double_free+0x1ac/0x238 [ 27.906626] kunit_try_run_case+0x170/0x3f0 [ 27.906768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.906967] kthread+0x328/0x630 [ 27.907072] ret_from_fork+0x10/0x20 [ 27.907254] [ 27.907361] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 27.907792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.907889] Hardware name: linux,dummy-virt (DT) [ 27.908254] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
Automatically assigned
[ 27.484611] ================================================================== [ 27.484852] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 27.484852] [ 27.485088] Use-after-free read at 0x000000000d181f01 (in kfence-#119): [ 27.485476] test_use_after_free_read+0x114/0x248 [ 27.485634] kunit_try_run_case+0x170/0x3f0 [ 27.485742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.486674] kthread+0x328/0x630 [ 27.486803] ret_from_fork+0x10/0x20 [ 27.486926] [ 27.486989] kfence-#119: 0x000000000d181f01-0x00000000b6c70eb9, size=32, cache=kmalloc-32 [ 27.486989] [ 27.487825] allocated by task 295 on cpu 1 at 27.483662s (0.004064s ago): [ 27.488909] test_alloc+0x29c/0x628 [ 27.489037] test_use_after_free_read+0xd0/0x248 [ 27.489585] kunit_try_run_case+0x170/0x3f0 [ 27.490099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.490984] kthread+0x328/0x630 [ 27.491299] ret_from_fork+0x10/0x20 [ 27.491490] [ 27.492823] freed by task 295 on cpu 1 at 27.483803s (0.008717s ago): [ 27.493106] test_use_after_free_read+0x1c0/0x248 [ 27.493223] kunit_try_run_case+0x170/0x3f0 [ 27.493320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.493449] kthread+0x328/0x630 [ 27.493539] ret_from_fork+0x10/0x20 [ 27.494441] [ 27.495291] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 27.496079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.496413] Hardware name: linux,dummy-virt (DT) [ 27.496504] ================================================================== [ 27.589789] ================================================================== [ 27.590256] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 27.590256] [ 27.590485] Use-after-free read at 0x00000000d66fab2b (in kfence-#120): [ 27.590649] test_use_after_free_read+0x114/0x248 [ 27.590906] kunit_try_run_case+0x170/0x3f0 [ 27.591236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.591463] kthread+0x328/0x630 [ 27.591575] ret_from_fork+0x10/0x20 [ 27.591672] [ 27.591760] kfence-#120: 0x00000000d66fab2b-0x0000000001f9cdaa, size=32, cache=test [ 27.591760] [ 27.591878] allocated by task 297 on cpu 1 at 27.589020s (0.002850s ago): [ 27.592042] test_alloc+0x230/0x628 [ 27.592148] test_use_after_free_read+0xd0/0x248 [ 27.592254] kunit_try_run_case+0x170/0x3f0 [ 27.592337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.592690] kthread+0x328/0x630 [ 27.592836] ret_from_fork+0x10/0x20 [ 27.592986] [ 27.593045] freed by task 297 on cpu 1 at 27.589283s (0.003754s ago): [ 27.593366] test_use_after_free_read+0xf0/0x248 [ 27.593538] kunit_try_run_case+0x170/0x3f0 [ 27.593660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.593780] kthread+0x328/0x630 [ 27.593909] ret_from_fork+0x10/0x20 [ 27.594029] [ 27.594153] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 27.594947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.595018] Hardware name: linux,dummy-virt (DT) [ 27.595066] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
Automatically assigned
[ 26.342447] ================================================================== [ 26.342978] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 26.342978] [ 26.343350] Out-of-bounds read at 0x00000000ff0c7053 (32B right of kfence-#108): [ 26.343510] test_out_of_bounds_read+0x1c8/0x3e0 [ 26.343628] kunit_try_run_case+0x170/0x3f0 [ 26.343862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.344471] kthread+0x328/0x630 [ 26.344582] ret_from_fork+0x10/0x20 [ 26.344869] [ 26.345038] kfence-#108: 0x0000000012faa4ac-0x00000000fa0691e8, size=32, cache=kmalloc-32 [ 26.345038] [ 26.345210] allocated by task 287 on cpu 1 at 26.341175s (0.003987s ago): [ 26.345661] test_alloc+0x29c/0x628 [ 26.346014] test_out_of_bounds_read+0x198/0x3e0 [ 26.346202] kunit_try_run_case+0x170/0x3f0 [ 26.346321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.346427] kthread+0x328/0x630 [ 26.346518] ret_from_fork+0x10/0x20 [ 26.346613] [ 26.347279] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.347493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.347553] Hardware name: linux,dummy-virt (DT) [ 26.348101] ================================================================== [ 26.653262] ================================================================== [ 26.653447] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 26.653447] [ 26.654156] Out-of-bounds read at 0x000000007d51eaec (32B right of kfence-#111): [ 26.654806] test_out_of_bounds_read+0x1c8/0x3e0 [ 26.655613] kunit_try_run_case+0x170/0x3f0 [ 26.656416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.657085] kthread+0x328/0x630 [ 26.657339] ret_from_fork+0x10/0x20 [ 26.657534] [ 26.657593] kfence-#111: 0x00000000ecacf602-0x000000006442ddbf, size=32, cache=test [ 26.657593] [ 26.658453] allocated by task 289 on cpu 1 at 26.653094s (0.005324s ago): [ 26.659156] test_alloc+0x230/0x628 [ 26.659640] test_out_of_bounds_read+0x198/0x3e0 [ 26.660192] kunit_try_run_case+0x170/0x3f0 [ 26.660298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.660904] kthread+0x328/0x630 [ 26.661212] ret_from_fork+0x10/0x20 [ 26.661490] [ 26.661764] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.661987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.662685] Hardware name: linux,dummy-virt (DT) [ 26.662814] ================================================================== [ 26.240531] ================================================================== [ 26.241274] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 26.241274] [ 26.242005] Out-of-bounds read at 0x000000005a0cac36 (1B left of kfence-#107): [ 26.243133] test_out_of_bounds_read+0x114/0x3e0 [ 26.243216] kunit_try_run_case+0x170/0x3f0 [ 26.243273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.243325] kthread+0x328/0x630 [ 26.243370] ret_from_fork+0x10/0x20 [ 26.243613] [ 26.244367] kfence-#107: 0x000000008cf39261-0x00000000b5b1cb45, size=32, cache=kmalloc-32 [ 26.244367] [ 26.245370] allocated by task 287 on cpu 1 at 26.236532s (0.008720s ago): [ 26.246896] test_alloc+0x29c/0x628 [ 26.247065] test_out_of_bounds_read+0xdc/0x3e0 [ 26.247161] kunit_try_run_case+0x170/0x3f0 [ 26.247255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.247370] kthread+0x328/0x630 [ 26.247901] ret_from_fork+0x10/0x20 [ 26.248456] [ 26.248874] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.249468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.249696] Hardware name: linux,dummy-virt (DT) [ 26.249973] ================================================================== [ 26.547767] ================================================================== [ 26.547938] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 26.547938] [ 26.548199] Out-of-bounds read at 0x000000004d78b883 (1B left of kfence-#110): [ 26.548347] test_out_of_bounds_read+0x114/0x3e0 [ 26.548482] kunit_try_run_case+0x170/0x3f0 [ 26.548584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.548684] kthread+0x328/0x630 [ 26.548914] ret_from_fork+0x10/0x20 [ 26.549056] [ 26.549254] kfence-#110: 0x0000000009948346-0x0000000020b2acef, size=32, cache=test [ 26.549254] [ 26.549416] allocated by task 289 on cpu 1 at 26.547468s (0.001926s ago): [ 26.549693] test_alloc+0x230/0x628 [ 26.549793] test_out_of_bounds_read+0xdc/0x3e0 [ 26.549900] kunit_try_run_case+0x170/0x3f0 [ 26.550225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.550385] kthread+0x328/0x630 [ 26.550774] ret_from_fork+0x10/0x20 [ 26.550971] [ 26.551094] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.551322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.551468] Hardware name: linux,dummy-virt (DT) [ 26.551679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
Automatically assigned
[ 26.114161] ================================================================== [ 26.114302] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 26.114436] Write of size 1 at addr fff00000c7883378 by task kunit_try_catch/285 [ 26.114590] [ 26.114695] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.114928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.115001] Hardware name: linux,dummy-virt (DT) [ 26.115092] Call trace: [ 26.115189] show_stack+0x20/0x38 (C) [ 26.115348] dump_stack_lvl+0x8c/0xd0 [ 26.115524] print_report+0x118/0x608 [ 26.115669] kasan_report+0xdc/0x128 [ 26.115814] __asan_report_store1_noabort+0x20/0x30 [ 26.115937] strncpy_from_user+0x270/0x2a0 [ 26.116083] copy_user_test_oob+0x5c0/0xec8 [ 26.116195] kunit_try_run_case+0x170/0x3f0 [ 26.116312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.116434] kthread+0x328/0x630 [ 26.116530] ret_from_fork+0x10/0x20 [ 26.116649] [ 26.116706] Allocated by task 285: [ 26.116827] kasan_save_stack+0x3c/0x68 [ 26.116947] kasan_save_track+0x20/0x40 [ 26.117049] kasan_save_alloc_info+0x40/0x58 [ 26.117189] __kasan_kmalloc+0xd4/0xd8 [ 26.117313] __kmalloc_noprof+0x190/0x4d0 [ 26.117435] kunit_kmalloc_array+0x34/0x88 [ 26.117534] copy_user_test_oob+0xac/0xec8 [ 26.117652] kunit_try_run_case+0x170/0x3f0 [ 26.117751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.117863] kthread+0x328/0x630 [ 26.117988] ret_from_fork+0x10/0x20 [ 26.118097] [ 26.118183] The buggy address belongs to the object at fff00000c7883300 [ 26.118183] which belongs to the cache kmalloc-128 of size 128 [ 26.118425] The buggy address is located 0 bytes to the right of [ 26.118425] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.118601] [ 26.118659] The buggy address belongs to the physical page: [ 26.118747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.118902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.119014] page_type: f5(slab) [ 26.119097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.119227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.119336] page dumped because: kasan: bad access detected [ 26.119439] [ 26.119506] Memory state around the buggy address: [ 26.119592] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.119728] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.119846] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.119949] ^ [ 26.120063] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.120290] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.120441] ================================================================== [ 26.105188] ================================================================== [ 26.105378] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 26.105550] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 26.105722] [ 26.105839] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.106057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.106133] Hardware name: linux,dummy-virt (DT) [ 26.106216] Call trace: [ 26.106279] show_stack+0x20/0x38 (C) [ 26.106453] dump_stack_lvl+0x8c/0xd0 [ 26.106575] print_report+0x118/0x608 [ 26.106743] kasan_report+0xdc/0x128 [ 26.106902] kasan_check_range+0x100/0x1a8 [ 26.107385] __kasan_check_write+0x20/0x30 [ 26.107541] strncpy_from_user+0x3c/0x2a0 [ 26.107659] copy_user_test_oob+0x5c0/0xec8 [ 26.108046] kunit_try_run_case+0x170/0x3f0 [ 26.108245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.108489] kthread+0x328/0x630 [ 26.109657] ret_from_fork+0x10/0x20 [ 26.109771] [ 26.109799] Allocated by task 285: [ 26.109838] kasan_save_stack+0x3c/0x68 [ 26.109891] kasan_save_track+0x20/0x40 [ 26.109938] kasan_save_alloc_info+0x40/0x58 [ 26.109980] __kasan_kmalloc+0xd4/0xd8 [ 26.110025] __kmalloc_noprof+0x190/0x4d0 [ 26.110073] kunit_kmalloc_array+0x34/0x88 [ 26.110120] copy_user_test_oob+0xac/0xec8 [ 26.110163] kunit_try_run_case+0x170/0x3f0 [ 26.110209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.110260] kthread+0x328/0x630 [ 26.110300] ret_from_fork+0x10/0x20 [ 26.110354] [ 26.110412] The buggy address belongs to the object at fff00000c7883300 [ 26.110412] which belongs to the cache kmalloc-128 of size 128 [ 26.110563] The buggy address is located 0 bytes inside of [ 26.110563] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.110731] [ 26.110844] The buggy address belongs to the physical page: [ 26.110991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.111135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.111268] page_type: f5(slab) [ 26.111376] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.111527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.111697] page dumped because: kasan: bad access detected [ 26.111825] [ 26.111893] Memory state around the buggy address: [ 26.111987] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.112079] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.112177] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.112256] ^ [ 26.112339] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.112443] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.112541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
Automatically assigned
[ 26.080959] ================================================================== [ 26.081145] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 26.081304] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 26.081463] [ 26.081552] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.082059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.082135] Hardware name: linux,dummy-virt (DT) [ 26.082502] Call trace: [ 26.082678] show_stack+0x20/0x38 (C) [ 26.082854] dump_stack_lvl+0x8c/0xd0 [ 26.083160] print_report+0x118/0x608 [ 26.083483] kasan_report+0xdc/0x128 [ 26.083692] kasan_check_range+0x100/0x1a8 [ 26.083968] __kasan_check_write+0x20/0x30 [ 26.084192] copy_user_test_oob+0x434/0xec8 [ 26.084532] kunit_try_run_case+0x170/0x3f0 [ 26.084728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.084829] kthread+0x328/0x630 [ 26.084927] ret_from_fork+0x10/0x20 [ 26.085102] [ 26.085191] Allocated by task 285: [ 26.085283] kasan_save_stack+0x3c/0x68 [ 26.085387] kasan_save_track+0x20/0x40 [ 26.085500] kasan_save_alloc_info+0x40/0x58 [ 26.085634] __kasan_kmalloc+0xd4/0xd8 [ 26.085729] __kmalloc_noprof+0x190/0x4d0 [ 26.085844] kunit_kmalloc_array+0x34/0x88 [ 26.085941] copy_user_test_oob+0xac/0xec8 [ 26.086053] kunit_try_run_case+0x170/0x3f0 [ 26.086146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.086290] kthread+0x328/0x630 [ 26.086915] ret_from_fork+0x10/0x20 [ 26.087602] [ 26.087719] The buggy address belongs to the object at fff00000c7883300 [ 26.087719] which belongs to the cache kmalloc-128 of size 128 [ 26.087910] The buggy address is located 0 bytes inside of [ 26.087910] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.088054] [ 26.088101] The buggy address belongs to the physical page: [ 26.088326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.088490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.088617] page_type: f5(slab) [ 26.088721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.089946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.090108] page dumped because: kasan: bad access detected [ 26.090199] [ 26.090250] Memory state around the buggy address: [ 26.090374] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.090503] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.091022] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.091189] ^ [ 26.091309] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.091476] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.091770] ================================================================== [ 26.093652] ================================================================== [ 26.093856] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 26.094041] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 26.094235] [ 26.094326] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.094547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.095084] Hardware name: linux,dummy-virt (DT) [ 26.095189] Call trace: [ 26.095480] show_stack+0x20/0x38 (C) [ 26.095719] dump_stack_lvl+0x8c/0xd0 [ 26.096019] print_report+0x118/0x608 [ 26.096204] kasan_report+0xdc/0x128 [ 26.096338] kasan_check_range+0x100/0x1a8 [ 26.096530] __kasan_check_read+0x20/0x30 [ 26.096710] copy_user_test_oob+0x4a0/0xec8 [ 26.096844] kunit_try_run_case+0x170/0x3f0 [ 26.096980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.097165] kthread+0x328/0x630 [ 26.097321] ret_from_fork+0x10/0x20 [ 26.097455] [ 26.097506] Allocated by task 285: [ 26.097615] kasan_save_stack+0x3c/0x68 [ 26.097738] kasan_save_track+0x20/0x40 [ 26.097985] kasan_save_alloc_info+0x40/0x58 [ 26.098231] __kasan_kmalloc+0xd4/0xd8 [ 26.098492] __kmalloc_noprof+0x190/0x4d0 [ 26.098918] kunit_kmalloc_array+0x34/0x88 [ 26.099120] copy_user_test_oob+0xac/0xec8 [ 26.099282] kunit_try_run_case+0x170/0x3f0 [ 26.099376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.099493] kthread+0x328/0x630 [ 26.099607] ret_from_fork+0x10/0x20 [ 26.099699] [ 26.099755] The buggy address belongs to the object at fff00000c7883300 [ 26.099755] which belongs to the cache kmalloc-128 of size 128 [ 26.099902] The buggy address is located 0 bytes inside of [ 26.099902] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.100362] [ 26.100468] The buggy address belongs to the physical page: [ 26.100575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.100765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.101107] page_type: f5(slab) [ 26.101220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.101357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.101477] page dumped because: kasan: bad access detected [ 26.101587] [ 26.101638] Memory state around the buggy address: [ 26.101722] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.101839] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.102126] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.102290] ^ [ 26.102489] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.102613] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.102983] ================================================================== [ 26.013878] ================================================================== [ 26.014057] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 26.014220] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 26.014349] [ 26.015072] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.015375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.015475] Hardware name: linux,dummy-virt (DT) [ 26.015558] Call trace: [ 26.015669] show_stack+0x20/0x38 (C) [ 26.015951] dump_stack_lvl+0x8c/0xd0 [ 26.016183] print_report+0x118/0x608 [ 26.016701] kasan_report+0xdc/0x128 [ 26.016960] kasan_check_range+0x100/0x1a8 [ 26.017285] __kasan_check_read+0x20/0x30 [ 26.017725] copy_user_test_oob+0x728/0xec8 [ 26.017948] kunit_try_run_case+0x170/0x3f0 [ 26.018138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.018554] kthread+0x328/0x630 [ 26.018723] ret_from_fork+0x10/0x20 [ 26.019002] [ 26.019067] Allocated by task 285: [ 26.019152] kasan_save_stack+0x3c/0x68 [ 26.019250] kasan_save_track+0x20/0x40 [ 26.019340] kasan_save_alloc_info+0x40/0x58 [ 26.019769] __kasan_kmalloc+0xd4/0xd8 [ 26.019997] __kmalloc_noprof+0x190/0x4d0 [ 26.020120] kunit_kmalloc_array+0x34/0x88 [ 26.020491] copy_user_test_oob+0xac/0xec8 [ 26.020583] kunit_try_run_case+0x170/0x3f0 [ 26.020682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.021040] kthread+0x328/0x630 [ 26.021252] ret_from_fork+0x10/0x20 [ 26.021580] [ 26.021642] The buggy address belongs to the object at fff00000c7883300 [ 26.021642] which belongs to the cache kmalloc-128 of size 128 [ 26.021810] The buggy address is located 0 bytes inside of [ 26.021810] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.021973] [ 26.022034] The buggy address belongs to the physical page: [ 26.022295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.022468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.022667] page_type: f5(slab) [ 26.022932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.023065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.023419] page dumped because: kasan: bad access detected [ 26.023520] [ 26.023583] Memory state around the buggy address: [ 26.023804] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.023934] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.024271] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.024374] ^ [ 26.024569] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.024809] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.024944] ================================================================== [ 26.064869] ================================================================== [ 26.064998] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 26.065120] Read of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 26.065250] [ 26.065340] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.066389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.066545] Hardware name: linux,dummy-virt (DT) [ 26.066682] Call trace: [ 26.066775] show_stack+0x20/0x38 (C) [ 26.067024] dump_stack_lvl+0x8c/0xd0 [ 26.067505] print_report+0x118/0x608 [ 26.067977] kasan_report+0xdc/0x128 [ 26.068236] kasan_check_range+0x100/0x1a8 [ 26.068513] __kasan_check_read+0x20/0x30 [ 26.068879] copy_user_test_oob+0x3c8/0xec8 [ 26.069187] kunit_try_run_case+0x170/0x3f0 [ 26.069389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.069519] kthread+0x328/0x630 [ 26.069907] ret_from_fork+0x10/0x20 [ 26.070209] [ 26.070332] Allocated by task 285: [ 26.070690] kasan_save_stack+0x3c/0x68 [ 26.070851] kasan_save_track+0x20/0x40 [ 26.070946] kasan_save_alloc_info+0x40/0x58 [ 26.071036] __kasan_kmalloc+0xd4/0xd8 [ 26.071269] __kmalloc_noprof+0x190/0x4d0 [ 26.071507] kunit_kmalloc_array+0x34/0x88 [ 26.072078] copy_user_test_oob+0xac/0xec8 [ 26.072350] kunit_try_run_case+0x170/0x3f0 [ 26.072582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.072697] kthread+0x328/0x630 [ 26.072780] ret_from_fork+0x10/0x20 [ 26.072874] [ 26.073601] The buggy address belongs to the object at fff00000c7883300 [ 26.073601] which belongs to the cache kmalloc-128 of size 128 [ 26.073843] The buggy address is located 0 bytes inside of [ 26.073843] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.074554] [ 26.074637] The buggy address belongs to the physical page: [ 26.074958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.075436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.075553] page_type: f5(slab) [ 26.075638] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.075761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.075862] page dumped because: kasan: bad access detected [ 26.076656] [ 26.076789] Memory state around the buggy address: [ 26.076979] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.077264] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.077394] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.077668] ^ [ 26.078103] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.078365] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.078482] ================================================================== [ 25.977699] ================================================================== [ 25.977954] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 25.978138] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 25.978270] [ 25.978376] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.978635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.978722] Hardware name: linux,dummy-virt (DT) [ 25.979231] Call trace: [ 25.979424] show_stack+0x20/0x38 (C) [ 25.979593] dump_stack_lvl+0x8c/0xd0 [ 25.979874] print_report+0x118/0x608 [ 25.980102] kasan_report+0xdc/0x128 [ 25.980657] kasan_check_range+0x100/0x1a8 [ 25.980847] __kasan_check_write+0x20/0x30 [ 25.981063] copy_user_test_oob+0x234/0xec8 [ 25.981219] kunit_try_run_case+0x170/0x3f0 [ 25.981346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.981922] kthread+0x328/0x630 [ 25.982167] ret_from_fork+0x10/0x20 [ 25.982537] [ 25.982595] Allocated by task 285: [ 25.982667] kasan_save_stack+0x3c/0x68 [ 25.982760] kasan_save_track+0x20/0x40 [ 25.982872] kasan_save_alloc_info+0x40/0x58 [ 25.983266] __kasan_kmalloc+0xd4/0xd8 [ 25.983883] __kmalloc_noprof+0x190/0x4d0 [ 25.984112] kunit_kmalloc_array+0x34/0x88 [ 25.984432] copy_user_test_oob+0xac/0xec8 [ 25.984508] kunit_try_run_case+0x170/0x3f0 [ 25.984557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.984614] kthread+0x328/0x630 [ 25.984686] ret_from_fork+0x10/0x20 [ 25.984817] [ 25.984885] The buggy address belongs to the object at fff00000c7883300 [ 25.984885] which belongs to the cache kmalloc-128 of size 128 [ 25.985037] The buggy address is located 0 bytes inside of [ 25.985037] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 25.985205] [ 25.985292] The buggy address belongs to the physical page: [ 25.985436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 25.985644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.985778] page_type: f5(slab) [ 25.985885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.986013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.986124] page dumped because: kasan: bad access detected [ 25.986214] [ 25.986273] Memory state around the buggy address: [ 25.986425] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.986539] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.986701] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.986947] ^ [ 25.987273] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.987517] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.987610] ================================================================== [ 26.049309] ================================================================== [ 26.050657] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 26.050940] Write of size 121 at addr fff00000c7883300 by task kunit_try_catch/285 [ 26.051154] [ 26.051460] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 26.051861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.052448] Hardware name: linux,dummy-virt (DT) [ 26.052679] Call trace: [ 26.052780] show_stack+0x20/0x38 (C) [ 26.052995] dump_stack_lvl+0x8c/0xd0 [ 26.053223] print_report+0x118/0x608 [ 26.053461] kasan_report+0xdc/0x128 [ 26.053657] kasan_check_range+0x100/0x1a8 [ 26.054201] __kasan_check_write+0x20/0x30 [ 26.054456] copy_user_test_oob+0x35c/0xec8 [ 26.054802] kunit_try_run_case+0x170/0x3f0 [ 26.055002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.055220] kthread+0x328/0x630 [ 26.055448] ret_from_fork+0x10/0x20 [ 26.055648] [ 26.055708] Allocated by task 285: [ 26.055898] kasan_save_stack+0x3c/0x68 [ 26.056189] kasan_save_track+0x20/0x40 [ 26.056683] kasan_save_alloc_info+0x40/0x58 [ 26.056893] __kasan_kmalloc+0xd4/0xd8 [ 26.057071] __kmalloc_noprof+0x190/0x4d0 [ 26.057173] kunit_kmalloc_array+0x34/0x88 [ 26.057576] copy_user_test_oob+0xac/0xec8 [ 26.057779] kunit_try_run_case+0x170/0x3f0 [ 26.058291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.058491] kthread+0x328/0x630 [ 26.058578] ret_from_fork+0x10/0x20 [ 26.058662] [ 26.058707] The buggy address belongs to the object at fff00000c7883300 [ 26.058707] which belongs to the cache kmalloc-128 of size 128 [ 26.058872] The buggy address is located 0 bytes inside of [ 26.058872] allocated 120-byte region [fff00000c7883300, fff00000c7883378) [ 26.059040] [ 26.059097] The buggy address belongs to the physical page: [ 26.059192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 26.059327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.059477] page_type: f5(slab) [ 26.059582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.060335] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.060464] page dumped because: kasan: bad access detected [ 26.060636] [ 26.060793] Memory state around the buggy address: [ 26.061016] fff00000c7883200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.061503] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.062040] >fff00000c7883300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.062279] ^ [ 26.062506] fff00000c7883380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.062619] fff00000c7883400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.062705] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
Automatically assigned
[ 25.891904] ================================================================== [ 25.892325] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 25.892510] Read of size 8 at addr fff00000c7883278 by task kunit_try_catch/281 [ 25.892642] [ 25.892742] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.892969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.893039] Hardware name: linux,dummy-virt (DT) [ 25.893129] Call trace: [ 25.893192] show_stack+0x20/0x38 (C) [ 25.893327] dump_stack_lvl+0x8c/0xd0 [ 25.893473] print_report+0x118/0x608 [ 25.893602] kasan_report+0xdc/0x128 [ 25.893721] __asan_report_load8_noabort+0x20/0x30 [ 25.893848] copy_to_kernel_nofault+0x204/0x250 [ 25.893976] copy_to_kernel_nofault_oob+0x158/0x418 [ 25.894112] kunit_try_run_case+0x170/0x3f0 [ 25.894237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.894587] kthread+0x328/0x630 [ 25.894755] ret_from_fork+0x10/0x20 [ 25.894929] [ 25.894978] Allocated by task 281: [ 25.895160] kasan_save_stack+0x3c/0x68 [ 25.895280] kasan_save_track+0x20/0x40 [ 25.895371] kasan_save_alloc_info+0x40/0x58 [ 25.895474] __kasan_kmalloc+0xd4/0xd8 [ 25.895577] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.895766] copy_to_kernel_nofault_oob+0xc8/0x418 [ 25.895892] kunit_try_run_case+0x170/0x3f0 [ 25.895993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.896087] kthread+0x328/0x630 [ 25.896592] ret_from_fork+0x10/0x20 [ 25.896909] [ 25.896997] The buggy address belongs to the object at fff00000c7883200 [ 25.896997] which belongs to the cache kmalloc-128 of size 128 [ 25.897413] The buggy address is located 0 bytes to the right of [ 25.897413] allocated 120-byte region [fff00000c7883200, fff00000c7883278) [ 25.898022] [ 25.898382] The buggy address belongs to the physical page: [ 25.898484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 25.898610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.899099] page_type: f5(slab) [ 25.899235] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.899352] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.900167] page dumped because: kasan: bad access detected [ 25.900583] [ 25.901011] Memory state around the buggy address: [ 25.901558] fff00000c7883100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.902067] fff00000c7883180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.902436] >fff00000c7883200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.902557] ^ [ 25.902675] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.902788] fff00000c7883300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.902938] ================================================================== [ 25.903922] ================================================================== [ 25.904057] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 25.904203] Write of size 8 at addr fff00000c7883278 by task kunit_try_catch/281 [ 25.904336] [ 25.904435] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.904655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.904729] Hardware name: linux,dummy-virt (DT) [ 25.904818] Call trace: [ 25.904879] show_stack+0x20/0x38 (C) [ 25.905014] dump_stack_lvl+0x8c/0xd0 [ 25.905144] print_report+0x118/0x608 [ 25.905270] kasan_report+0xdc/0x128 [ 25.905388] kasan_check_range+0x100/0x1a8 [ 25.907283] __kasan_check_write+0x20/0x30 [ 25.907454] copy_to_kernel_nofault+0x8c/0x250 [ 25.907592] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 25.907712] kunit_try_run_case+0x170/0x3f0 [ 25.907933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.908141] kthread+0x328/0x630 [ 25.908267] ret_from_fork+0x10/0x20 [ 25.908414] [ 25.908491] Allocated by task 281: [ 25.908570] kasan_save_stack+0x3c/0x68 [ 25.908682] kasan_save_track+0x20/0x40 [ 25.908778] kasan_save_alloc_info+0x40/0x58 [ 25.908878] __kasan_kmalloc+0xd4/0xd8 [ 25.908980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.909081] copy_to_kernel_nofault_oob+0xc8/0x418 [ 25.909189] kunit_try_run_case+0x170/0x3f0 [ 25.909326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.909444] kthread+0x328/0x630 [ 25.909530] ret_from_fork+0x10/0x20 [ 25.909656] [ 25.909745] The buggy address belongs to the object at fff00000c7883200 [ 25.909745] which belongs to the cache kmalloc-128 of size 128 [ 25.909922] The buggy address is located 0 bytes to the right of [ 25.909922] allocated 120-byte region [fff00000c7883200, fff00000c7883278) [ 25.910102] [ 25.910170] The buggy address belongs to the physical page: [ 25.910258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 25.910442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.910665] page_type: f5(slab) [ 25.910846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.911082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.911179] page dumped because: kasan: bad access detected [ 25.911248] [ 25.911543] Memory state around the buggy address: [ 25.911654] fff00000c7883100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.911776] fff00000c7883180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.912798] >fff00000c7883200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.912946] ^ [ 25.913062] fff00000c7883280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.913182] fff00000c7883300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.913282] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
Automatically assigned
[ 25.818260] ================================================================== [ 25.818385] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 25.819055] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 25.819224] [ 25.819287] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.819412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.819453] Hardware name: linux,dummy-virt (DT) [ 25.819531] Call trace: [ 25.819587] show_stack+0x20/0x38 (C) [ 25.819674] dump_stack_lvl+0x8c/0xd0 [ 25.819900] print_report+0x310/0x608 [ 25.819990] kasan_report+0xdc/0x128 [ 25.820058] __asan_report_load1_noabort+0x20/0x30 [ 25.820265] vmalloc_oob+0x578/0x5d0 [ 25.820490] kunit_try_run_case+0x170/0x3f0 [ 25.820566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.820632] kthread+0x328/0x630 [ 25.820850] ret_from_fork+0x10/0x20 [ 25.821056] [ 25.821238] The buggy address belongs to the virtual mapping at [ 25.821238] [ffff8000800fe000, ffff800080100000) created by: [ 25.821238] vmalloc_oob+0x98/0x5d0 [ 25.821382] [ 25.821427] The buggy address belongs to the physical page: [ 25.821475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c9 [ 25.821658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.821772] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.821895] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.821953] page dumped because: kasan: bad access detected [ 25.822111] [ 25.822334] Memory state around the buggy address: [ 25.822479] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.822550] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.822606] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 25.822696] ^ [ 25.822784] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.823083] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.823186] ================================================================== [ 25.827263] ================================================================== [ 25.827356] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 25.827459] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 25.827524] [ 25.827575] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.827680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.827715] Hardware name: linux,dummy-virt (DT) [ 25.827759] Call trace: [ 25.827793] show_stack+0x20/0x38 (C) [ 25.827860] dump_stack_lvl+0x8c/0xd0 [ 25.827926] print_report+0x310/0x608 [ 25.827988] kasan_report+0xdc/0x128 [ 25.828045] __asan_report_load1_noabort+0x20/0x30 [ 25.828282] vmalloc_oob+0x51c/0x5d0 [ 25.828384] kunit_try_run_case+0x170/0x3f0 [ 25.828519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.828689] kthread+0x328/0x630 [ 25.828823] ret_from_fork+0x10/0x20 [ 25.828981] [ 25.829030] The buggy address belongs to the virtual mapping at [ 25.829030] [ffff8000800fe000, ffff800080100000) created by: [ 25.829030] vmalloc_oob+0x98/0x5d0 [ 25.829135] [ 25.829177] The buggy address belongs to the physical page: [ 25.829229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c9 [ 25.829299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.829381] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.829457] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.829511] page dumped because: kasan: bad access detected [ 25.829554] [ 25.829860] Memory state around the buggy address: [ 25.829938] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.830053] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.830121] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 25.830219] ^ [ 25.830286] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.830388] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.830508] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 25.535534] ================================================================== [ 25.535671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 25.535799] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.535917] [ 25.535996] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.536181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.536251] Hardware name: linux,dummy-virt (DT) [ 25.536335] Call trace: [ 25.536394] show_stack+0x20/0x38 (C) [ 25.536533] dump_stack_lvl+0x8c/0xd0 [ 25.536656] print_report+0x118/0x608 [ 25.536768] kasan_report+0xdc/0x128 [ 25.536883] kasan_check_range+0x100/0x1a8 [ 25.537006] __kasan_check_write+0x20/0x30 [ 25.537119] kasan_atomics_helper+0xeb8/0x4858 [ 25.537239] kasan_atomics+0x198/0x2e0 [ 25.537359] kunit_try_run_case+0x170/0x3f0 [ 25.537736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.537886] kthread+0x328/0x630 [ 25.538620] ret_from_fork+0x10/0x20 [ 25.538745] [ 25.538855] Allocated by task 265: [ 25.539115] kasan_save_stack+0x3c/0x68 [ 25.539246] kasan_save_track+0x20/0x40 [ 25.539358] kasan_save_alloc_info+0x40/0x58 [ 25.539473] __kasan_kmalloc+0xd4/0xd8 [ 25.539599] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.539704] kasan_atomics+0xb8/0x2e0 [ 25.539822] kunit_try_run_case+0x170/0x3f0 [ 25.539933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.540040] kthread+0x328/0x630 [ 25.540118] ret_from_fork+0x10/0x20 [ 25.540370] [ 25.540440] The buggy address belongs to the object at fff00000c7884f80 [ 25.540440] which belongs to the cache kmalloc-64 of size 64 [ 25.540609] The buggy address is located 0 bytes to the right of [ 25.540609] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.540778] [ 25.540840] The buggy address belongs to the physical page: [ 25.540926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.541051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.541172] page_type: f5(slab) [ 25.541271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.541414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.541526] page dumped because: kasan: bad access detected [ 25.541612] [ 25.541662] Memory state around the buggy address: [ 25.541744] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.541856] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.541970] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.542072] ^ [ 25.542162] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.542275] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.542448] ================================================================== [ 25.691027] ================================================================== [ 25.691135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 25.691229] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.691290] [ 25.691558] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.691681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.691913] Hardware name: linux,dummy-virt (DT) [ 25.691969] Call trace: [ 25.692001] show_stack+0x20/0x38 (C) [ 25.692226] dump_stack_lvl+0x8c/0xd0 [ 25.692438] print_report+0x118/0x608 [ 25.692513] kasan_report+0xdc/0x128 [ 25.692595] kasan_check_range+0x100/0x1a8 [ 25.692665] __kasan_check_write+0x20/0x30 [ 25.692724] kasan_atomics_helper+0x147c/0x4858 [ 25.692782] kasan_atomics+0x198/0x2e0 [ 25.692837] kunit_try_run_case+0x170/0x3f0 [ 25.692894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.692961] kthread+0x328/0x630 [ 25.693011] ret_from_fork+0x10/0x20 [ 25.693069] [ 25.693095] Allocated by task 265: [ 25.693133] kasan_save_stack+0x3c/0x68 [ 25.693188] kasan_save_track+0x20/0x40 [ 25.693236] kasan_save_alloc_info+0x40/0x58 [ 25.693283] __kasan_kmalloc+0xd4/0xd8 [ 25.693329] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.693378] kasan_atomics+0xb8/0x2e0 [ 25.693443] kunit_try_run_case+0x170/0x3f0 [ 25.693645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.693719] kthread+0x328/0x630 [ 25.694348] ret_from_fork+0x10/0x20 [ 25.694476] [ 25.694510] The buggy address belongs to the object at fff00000c7884f80 [ 25.694510] which belongs to the cache kmalloc-64 of size 64 [ 25.694586] The buggy address is located 0 bytes to the right of [ 25.694586] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.694663] [ 25.695732] The buggy address belongs to the physical page: [ 25.695838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.695914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.696544] page_type: f5(slab) [ 25.696615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.696775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.696921] page dumped because: kasan: bad access detected [ 25.697408] [ 25.697449] Memory state around the buggy address: [ 25.697746] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.697832] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.697938] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.697991] ^ [ 25.698233] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.698559] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.698721] ================================================================== [ 25.228443] ================================================================== [ 25.228562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 25.228674] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.229824] kasan_check_range+0x100/0x1a8 [ 25.231143] kasan_save_track+0x20/0x40 [ 25.232114] kthread+0x328/0x630 [ 25.234088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.235123] page dumped because: kasan: bad access detected [ 25.237011] ================================================================== [ 25.347790] ================================================================== [ 25.347927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 25.348064] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.348196] [ 25.348282] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.349190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.349388] Hardware name: linux,dummy-virt (DT) [ 25.349596] Call trace: [ 25.349680] show_stack+0x20/0x38 (C) [ 25.350255] dump_stack_lvl+0x8c/0xd0 [ 25.350703] print_report+0x118/0x608 [ 25.350858] kasan_report+0xdc/0x128 [ 25.351224] kasan_check_range+0x100/0x1a8 [ 25.351614] __kasan_check_write+0x20/0x30 [ 25.352037] kasan_atomics_helper+0xad4/0x4858 [ 25.352570] kasan_atomics+0x198/0x2e0 [ 25.352714] kunit_try_run_case+0x170/0x3f0 [ 25.352948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.353239] kthread+0x328/0x630 [ 25.353362] ret_from_fork+0x10/0x20 [ 25.353502] [ 25.354045] Allocated by task 265: [ 25.354484] kasan_save_stack+0x3c/0x68 [ 25.354646] kasan_save_track+0x20/0x40 [ 25.354768] kasan_save_alloc_info+0x40/0x58 [ 25.355282] __kasan_kmalloc+0xd4/0xd8 [ 25.356242] The buggy address is located 0 bytes to the right of [ 25.356242] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.356807] [ 25.356968] The buggy address belongs to the physical page: [ 25.357055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.357171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.357286] page_type: f5(slab) [ 25.357444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.357744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.357999] page dumped because: kasan: bad access detected [ 25.358449] [ 25.358522] Memory state around the buggy address: [ 25.358769] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.359038] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.359145] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.359238] ^ [ 25.359701] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.359954] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.360358] ================================================================== [ 25.444521] ================================================================== [ 25.444670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 25.444799] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.444921] [ 25.445020] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.445244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.445319] Hardware name: linux,dummy-virt (DT) [ 25.446933] Call trace: [ 25.447053] show_stack+0x20/0x38 (C) [ 25.447355] dump_stack_lvl+0x8c/0xd0 [ 25.447862] print_report+0x118/0x608 [ 25.448228] kasan_report+0xdc/0x128 [ 25.448358] kasan_check_range+0x100/0x1a8 [ 25.448877] __kasan_check_write+0x20/0x30 [ 25.449330] kasan_atomics_helper+0xd3c/0x4858 [ 25.449888] kasan_atomics+0x198/0x2e0 [ 25.450043] kunit_try_run_case+0x170/0x3f0 [ 25.450484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.450660] kthread+0x328/0x630 [ 25.451115] ret_from_fork+0x10/0x20 [ 25.451638] [ 25.451989] Allocated by task 265: [ 25.452244] kasan_save_stack+0x3c/0x68 [ 25.452908] kasan_save_track+0x20/0x40 [ 25.453407] kasan_save_alloc_info+0x40/0x58 [ 25.453549] __kasan_kmalloc+0xd4/0xd8 [ 25.453661] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.454178] kasan_atomics+0xb8/0x2e0 [ 25.454333] kunit_try_run_case+0x170/0x3f0 [ 25.454448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.454545] kthread+0x328/0x630 [ 25.454631] ret_from_fork+0x10/0x20 [ 25.454726] [ 25.455559] The buggy address belongs to the object at fff00000c7884f80 [ 25.455559] which belongs to the cache kmalloc-64 of size 64 [ 25.455748] The buggy address is located 0 bytes to the right of [ 25.455748] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.456660] [ 25.456741] The buggy address belongs to the physical page: [ 25.456988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.457193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.457701] page_type: f5(slab) [ 25.457838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.457978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.458955] page dumped because: kasan: bad access detected [ 25.459090] [ 25.459155] Memory state around the buggy address: [ 25.459395] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.459568] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.459660] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.459751] ^ [ 25.459842] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.460673] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.460955] ================================================================== [ 25.498390] ================================================================== [ 25.498617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 25.498811] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.498943] [ 25.499034] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.499608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.499955] Hardware name: linux,dummy-virt (DT) [ 25.500135] Call trace: [ 25.500223] show_stack+0x20/0x38 (C) [ 25.500467] dump_stack_lvl+0x8c/0xd0 [ 25.500683] print_report+0x118/0x608 [ 25.500878] kasan_report+0xdc/0x128 [ 25.501217] __asan_report_load8_noabort+0x20/0x30 [ 25.501688] kasan_atomics_helper+0x3f58/0x4858 [ 25.501864] kasan_atomics+0x198/0x2e0 [ 25.501988] kunit_try_run_case+0x170/0x3f0 [ 25.502106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.502251] kthread+0x328/0x630 [ 25.502798] ret_from_fork+0x10/0x20 [ 25.503302] [ 25.503355] Allocated by task 265: [ 25.503436] kasan_save_stack+0x3c/0x68 [ 25.503539] kasan_save_track+0x20/0x40 [ 25.503631] kasan_save_alloc_info+0x40/0x58 [ 25.503788] __kasan_kmalloc+0xd4/0xd8 [ 25.503933] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.504274] kasan_atomics+0xb8/0x2e0 [ 25.504762] kunit_try_run_case+0x170/0x3f0 [ 25.505206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.505824] kthread+0x328/0x630 [ 25.506444] ret_from_fork+0x10/0x20 [ 25.506860] [ 25.506943] The buggy address belongs to the object at fff00000c7884f80 [ 25.506943] which belongs to the cache kmalloc-64 of size 64 [ 25.507142] The buggy address is located 0 bytes to the right of [ 25.507142] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.507318] [ 25.507974] The buggy address belongs to the physical page: [ 25.508068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.508205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.508343] page_type: f5(slab) [ 25.508458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.509908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.510102] page dumped because: kasan: bad access detected [ 25.510225] [ 25.510286] Memory state around the buggy address: [ 25.510456] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.510562] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.510927] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.511043] ^ [ 25.511133] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.511838] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.511958] ================================================================== [ 25.661217] ================================================================== [ 25.661334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 25.661434] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.661496] [ 25.661797] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.661914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.661951] Hardware name: linux,dummy-virt (DT) [ 25.661993] Call trace: [ 25.662024] show_stack+0x20/0x38 (C) [ 25.662279] dump_stack_lvl+0x8c/0xd0 [ 25.662428] print_report+0x118/0x608 [ 25.662558] kasan_report+0xdc/0x128 [ 25.662829] kasan_check_range+0x100/0x1a8 [ 25.663018] __kasan_check_write+0x20/0x30 [ 25.663183] kasan_atomics_helper+0x12d8/0x4858 [ 25.663307] kasan_atomics+0x198/0x2e0 [ 25.663367] kunit_try_run_case+0x170/0x3f0 [ 25.663440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.663507] kthread+0x328/0x630 [ 25.663959] ret_from_fork+0x10/0x20 [ 25.664169] [ 25.664247] Allocated by task 265: [ 25.664336] kasan_save_stack+0x3c/0x68 [ 25.664475] kasan_save_track+0x20/0x40 [ 25.664525] kasan_save_alloc_info+0x40/0x58 [ 25.664584] __kasan_kmalloc+0xd4/0xd8 [ 25.664636] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.664822] kasan_atomics+0xb8/0x2e0 [ 25.664874] kunit_try_run_case+0x170/0x3f0 [ 25.664934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.664989] kthread+0x328/0x630 [ 25.665315] ret_from_fork+0x10/0x20 [ 25.665386] [ 25.665548] The buggy address belongs to the object at fff00000c7884f80 [ 25.665548] which belongs to the cache kmalloc-64 of size 64 [ 25.665931] The buggy address is located 0 bytes to the right of [ 25.665931] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.666027] [ 25.666070] The buggy address belongs to the physical page: [ 25.666115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.666376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.666518] page_type: f5(slab) [ 25.666747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.666813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.666972] page dumped because: kasan: bad access detected [ 25.667018] [ 25.667044] Memory state around the buggy address: [ 25.667097] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.667152] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.667447] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.667611] ^ [ 25.667664] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.667743] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.667801] ================================================================== [ 25.486081] ================================================================== [ 25.486426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 25.488274] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.488432] [ 25.488536] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.488765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.488852] Hardware name: linux,dummy-virt (DT) [ 25.488935] Call trace: [ 25.489000] show_stack+0x20/0x38 (C) [ 25.489140] dump_stack_lvl+0x8c/0xd0 [ 25.489271] print_report+0x118/0x608 [ 25.489392] kasan_report+0xdc/0x128 [ 25.489528] kasan_check_range+0x100/0x1a8 [ 25.489659] __kasan_check_read+0x20/0x30 [ 25.491111] kasan_atomics_helper+0xdd4/0x4858 [ 25.491744] kasan_atomics+0x198/0x2e0 [ 25.491958] kunit_try_run_case+0x170/0x3f0 [ 25.492150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.492564] kthread+0x328/0x630 [ 25.492810] ret_from_fork+0x10/0x20 [ 25.493169] [ 25.493264] Allocated by task 265: [ 25.494423] kasan_save_stack+0x3c/0x68 [ 25.494907] kasan_save_track+0x20/0x40 [ 25.495154] kasan_save_alloc_info+0x40/0x58 [ 25.495285] __kasan_kmalloc+0xd4/0xd8 [ 25.495416] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.495497] kasan_atomics+0xb8/0x2e0 [ 25.495546] kunit_try_run_case+0x170/0x3f0 [ 25.495594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.495651] kthread+0x328/0x630 [ 25.495693] ret_from_fork+0x10/0x20 [ 25.495738] [ 25.495770] The buggy address belongs to the object at fff00000c7884f80 [ 25.495770] which belongs to the cache kmalloc-64 of size 64 [ 25.495845] The buggy address is located 0 bytes to the right of [ 25.495845] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.495916] [ 25.495945] The buggy address belongs to the physical page: [ 25.495983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.496048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.496110] page_type: f5(slab) [ 25.496162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.496222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.496270] page dumped because: kasan: bad access detected [ 25.496310] [ 25.496333] Memory state around the buggy address: [ 25.496375] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.496469] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.496787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.497176] ^ [ 25.497234] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.497302] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.497393] ================================================================== [ 25.751604] ================================================================== [ 25.751916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 25.752271] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.752383] [ 25.752447] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.752545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.752580] Hardware name: linux,dummy-virt (DT) [ 25.752620] Call trace: [ 25.752650] show_stack+0x20/0x38 (C) [ 25.752713] dump_stack_lvl+0x8c/0xd0 [ 25.752774] print_report+0x118/0x608 [ 25.752829] kasan_report+0xdc/0x128 [ 25.752885] __asan_report_load8_noabort+0x20/0x30 [ 25.752942] kasan_atomics_helper+0x3df4/0x4858 [ 25.752998] kasan_atomics+0x198/0x2e0 [ 25.753053] kunit_try_run_case+0x170/0x3f0 [ 25.753109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.753172] kthread+0x328/0x630 [ 25.753221] ret_from_fork+0x10/0x20 [ 25.753282] [ 25.753306] Allocated by task 265: [ 25.755956] kasan_save_stack+0x3c/0x68 [ 25.756542] kasan_save_track+0x20/0x40 [ 25.757077] kasan_save_alloc_info+0x40/0x58 [ 25.757343] __kasan_kmalloc+0xd4/0xd8 [ 25.757745] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.757953] kasan_atomics+0xb8/0x2e0 [ 25.758492] kunit_try_run_case+0x170/0x3f0 [ 25.758562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.758619] kthread+0x328/0x630 [ 25.758920] ret_from_fork+0x10/0x20 [ 25.758972] [ 25.759469] The buggy address belongs to the object at fff00000c7884f80 [ 25.759469] which belongs to the cache kmalloc-64 of size 64 [ 25.759794] The buggy address is located 0 bytes to the right of [ 25.759794] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.760367] [ 25.760431] The buggy address belongs to the physical page: [ 25.760668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.760952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.761022] page_type: f5(slab) [ 25.761075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.761339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.761682] page dumped because: kasan: bad access detected [ 25.761746] [ 25.761774] Memory state around the buggy address: [ 25.761817] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.761871] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.761922] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.763073] ^ [ 25.763313] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.763583] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.763737] ================================================================== [ 25.593737] ================================================================== [ 25.593875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 25.594006] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.594128] [ 25.594221] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.595076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.595225] Hardware name: linux,dummy-virt (DT) [ 25.595323] Call trace: [ 25.595500] show_stack+0x20/0x38 (C) [ 25.595783] dump_stack_lvl+0x8c/0xd0 [ 25.596181] print_report+0x118/0x608 [ 25.596301] kasan_report+0xdc/0x128 [ 25.596483] kasan_check_range+0x100/0x1a8 [ 25.596681] __kasan_check_write+0x20/0x30 [ 25.596942] kasan_atomics_helper+0x10c0/0x4858 [ 25.597281] kasan_atomics+0x198/0x2e0 [ 25.597763] kunit_try_run_case+0x170/0x3f0 [ 25.598154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.598291] kthread+0x328/0x630 [ 25.598770] ret_from_fork+0x10/0x20 [ 25.599269] [ 25.599777] Allocated by task 265: [ 25.599951] kasan_save_stack+0x3c/0x68 [ 25.600067] kasan_save_track+0x20/0x40 [ 25.600621] kasan_save_alloc_info+0x40/0x58 [ 25.600885] __kasan_kmalloc+0xd4/0xd8 [ 25.601192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.601542] kasan_atomics+0xb8/0x2e0 [ 25.601655] kunit_try_run_case+0x170/0x3f0 [ 25.601728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.601784] kthread+0x328/0x630 [ 25.601846] ret_from_fork+0x10/0x20 [ 25.601939] [ 25.602001] The buggy address belongs to the object at fff00000c7884f80 [ 25.602001] which belongs to the cache kmalloc-64 of size 64 [ 25.602192] The buggy address is located 0 bytes to the right of [ 25.602192] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.602422] [ 25.602482] The buggy address belongs to the physical page: [ 25.602588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.602723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.602850] page_type: f5(slab) [ 25.602958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.603119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.603260] page dumped because: kasan: bad access detected [ 25.603375] [ 25.603459] Memory state around the buggy address: [ 25.603627] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.603736] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.603825] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.603905] ^ [ 25.603990] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.604096] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.604193] ================================================================== [ 25.316251] ================================================================== [ 25.316437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 25.316653] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.316871] [ 25.316973] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.317511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.317594] Hardware name: linux,dummy-virt (DT) [ 25.317679] Call trace: [ 25.317746] show_stack+0x20/0x38 (C) [ 25.318126] dump_stack_lvl+0x8c/0xd0 [ 25.318545] print_report+0x118/0x608 [ 25.318916] kasan_report+0xdc/0x128 [ 25.319231] kasan_check_range+0x100/0x1a8 [ 25.319505] __kasan_check_write+0x20/0x30 [ 25.319711] kasan_atomics_helper+0x99c/0x4858 [ 25.319850] kasan_atomics+0x198/0x2e0 [ 25.319978] kunit_try_run_case+0x170/0x3f0 [ 25.320105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.320247] kthread+0x328/0x630 [ 25.320356] ret_from_fork+0x10/0x20 [ 25.320499] [ 25.320758] Allocated by task 265: [ 25.320984] kasan_save_stack+0x3c/0x68 [ 25.321286] kasan_save_track+0x20/0x40 [ 25.321637] kasan_save_alloc_info+0x40/0x58 [ 25.321888] __kasan_kmalloc+0xd4/0xd8 [ 25.322035] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.322483] kasan_atomics+0xb8/0x2e0 [ 25.322588] kunit_try_run_case+0x170/0x3f0 [ 25.322792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.323112] kthread+0x328/0x630 [ 25.323466] ret_from_fork+0x10/0x20 [ 25.323632] [ 25.323796] The buggy address belongs to the object at fff00000c7884f80 [ 25.323796] which belongs to the cache kmalloc-64 of size 64 [ 25.324080] The buggy address is located 0 bytes to the right of [ 25.324080] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.324582] [ 25.324650] The buggy address belongs to the physical page: [ 25.324915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.325297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.325468] page_type: f5(slab) [ 25.325722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.326254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.326466] page dumped because: kasan: bad access detected [ 25.326780] [ 25.326852] Memory state around the buggy address: [ 25.326963] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.327070] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.327157] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.327648] ^ [ 25.328041] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.328326] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.328554] ================================================================== [ 25.561665] ================================================================== [ 25.561817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 25.562073] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.562205] [ 25.562393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.562796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.563009] Hardware name: linux,dummy-virt (DT) [ 25.563171] Call trace: [ 25.563227] show_stack+0x20/0x38 (C) [ 25.563346] dump_stack_lvl+0x8c/0xd0 [ 25.563474] print_report+0x118/0x608 [ 25.564844] kasan_report+0xdc/0x128 [ 25.565471] kasan_check_range+0x100/0x1a8 [ 25.565625] __kasan_check_write+0x20/0x30 [ 25.566489] kasan_atomics_helper+0xff0/0x4858 [ 25.567186] kasan_atomics+0x198/0x2e0 [ 25.567384] kunit_try_run_case+0x170/0x3f0 [ 25.567525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.567669] kthread+0x328/0x630 [ 25.567775] ret_from_fork+0x10/0x20 [ 25.567878] [ 25.567931] Allocated by task 265: [ 25.568007] kasan_save_stack+0x3c/0x68 [ 25.570277] kasan_save_track+0x20/0x40 [ 25.571080] kasan_save_alloc_info+0x40/0x58 [ 25.571180] __kasan_kmalloc+0xd4/0xd8 [ 25.571273] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.572446] kasan_atomics+0xb8/0x2e0 [ 25.572768] kunit_try_run_case+0x170/0x3f0 [ 25.573266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.573388] kthread+0x328/0x630 [ 25.573490] ret_from_fork+0x10/0x20 [ 25.573588] [ 25.573659] The buggy address belongs to the object at fff00000c7884f80 [ 25.573659] which belongs to the cache kmalloc-64 of size 64 [ 25.573821] The buggy address is located 0 bytes to the right of [ 25.573821] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.576276] [ 25.576367] The buggy address belongs to the physical page: [ 25.576466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.576644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.576844] page_type: f5(slab) [ 25.577007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.577195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.577315] page dumped because: kasan: bad access detected [ 25.577417] [ 25.577487] Memory state around the buggy address: [ 25.577578] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.577726] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.577881] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.577990] ^ [ 25.578086] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.578246] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.578481] ================================================================== [ 25.361482] ================================================================== [ 25.361777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 25.361925] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.362060] [ 25.362147] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.362758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.362983] Hardware name: linux,dummy-virt (DT) [ 25.363082] Call trace: [ 25.363149] show_stack+0x20/0x38 (C) [ 25.363280] dump_stack_lvl+0x8c/0xd0 [ 25.363420] print_report+0x118/0x608 [ 25.363544] kasan_report+0xdc/0x128 [ 25.363683] __asan_report_load4_noabort+0x20/0x30 [ 25.363808] kasan_atomics_helper+0x3dcc/0x4858 [ 25.367836] kasan_save_alloc_info+0x40/0x58 [ 25.369265] The buggy address is located 0 bytes to the right of [ 25.369265] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.369360] [ 25.369557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.369780] page dumped because: kasan: bad access detected [ 25.369883] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.370165] ================================================================== [ 25.668762] ================================================================== [ 25.668846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 25.668927] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.668987] [ 25.669032] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.669133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.669167] Hardware name: linux,dummy-virt (DT) [ 25.669207] Call trace: [ 25.669237] show_stack+0x20/0x38 (C) [ 25.669298] dump_stack_lvl+0x8c/0xd0 [ 25.669356] print_report+0x118/0x608 [ 25.669428] kasan_report+0xdc/0x128 [ 25.669487] kasan_check_range+0x100/0x1a8 [ 25.669544] __kasan_check_write+0x20/0x30 [ 25.669599] kasan_atomics_helper+0x1384/0x4858 [ 25.669657] kasan_atomics+0x198/0x2e0 [ 25.669715] kunit_try_run_case+0x170/0x3f0 [ 25.669774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.669836] kthread+0x328/0x630 [ 25.669905] ret_from_fork+0x10/0x20 [ 25.669964] [ 25.669990] Allocated by task 265: [ 25.670026] kasan_save_stack+0x3c/0x68 [ 25.670080] kasan_save_track+0x20/0x40 [ 25.670127] kasan_save_alloc_info+0x40/0x58 [ 25.670174] __kasan_kmalloc+0xd4/0xd8 [ 25.670219] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.670267] kasan_atomics+0xb8/0x2e0 [ 25.670312] kunit_try_run_case+0x170/0x3f0 [ 25.670680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.670751] kthread+0x328/0x630 [ 25.670805] ret_from_fork+0x10/0x20 [ 25.670885] [ 25.670917] The buggy address belongs to the object at fff00000c7884f80 [ 25.670917] which belongs to the cache kmalloc-64 of size 64 [ 25.670988] The buggy address is located 0 bytes to the right of [ 25.670988] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.671576] [ 25.671732] The buggy address belongs to the physical page: [ 25.671897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.672019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.672094] page_type: f5(slab) [ 25.672297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.672364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.672429] page dumped because: kasan: bad access detected [ 25.672728] [ 25.673013] Memory state around the buggy address: [ 25.673162] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.673220] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.673283] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.673352] ^ [ 25.673678] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.673859] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.673928] ================================================================== [ 25.522693] ================================================================== [ 25.522924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 25.523385] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.523623] [ 25.523721] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.524008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.524255] Hardware name: linux,dummy-virt (DT) [ 25.524688] Call trace: [ 25.524749] show_stack+0x20/0x38 (C) [ 25.525187] dump_stack_lvl+0x8c/0xd0 [ 25.525602] print_report+0x118/0x608 [ 25.525742] kasan_report+0xdc/0x128 [ 25.525872] __asan_report_store8_noabort+0x20/0x30 [ 25.526120] kasan_atomics_helper+0x3e5c/0x4858 [ 25.526276] kasan_atomics+0x198/0x2e0 [ 25.526410] kunit_try_run_case+0x170/0x3f0 [ 25.526986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.527135] kthread+0x328/0x630 [ 25.527235] ret_from_fork+0x10/0x20 [ 25.527349] [ 25.527414] Allocated by task 265: [ 25.527781] kasan_save_stack+0x3c/0x68 [ 25.528071] kasan_save_track+0x20/0x40 [ 25.528184] kasan_save_alloc_info+0x40/0x58 [ 25.528287] __kasan_kmalloc+0xd4/0xd8 [ 25.528383] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.528497] kasan_atomics+0xb8/0x2e0 [ 25.528594] kunit_try_run_case+0x170/0x3f0 [ 25.528701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.528821] kthread+0x328/0x630 [ 25.529648] ret_from_fork+0x10/0x20 [ 25.530339] [ 25.530583] The buggy address belongs to the object at fff00000c7884f80 [ 25.530583] which belongs to the cache kmalloc-64 of size 64 [ 25.530729] The buggy address is located 0 bytes to the right of [ 25.530729] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.530906] [ 25.531566] The buggy address belongs to the physical page: [ 25.531707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.531846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.531972] page_type: f5(slab) [ 25.532079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.532213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.532378] page dumped because: kasan: bad access detected [ 25.532505] [ 25.532576] Memory state around the buggy address: [ 25.532695] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.532856] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.533016] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.533165] ^ [ 25.533255] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.533373] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.533898] ================================================================== [ 25.545125] ================================================================== [ 25.545278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 25.545498] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.545858] [ 25.545961] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.546306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.546680] Hardware name: linux,dummy-virt (DT) [ 25.546761] Call trace: [ 25.546845] show_stack+0x20/0x38 (C) [ 25.546993] dump_stack_lvl+0x8c/0xd0 [ 25.547774] print_report+0x118/0x608 [ 25.548345] kasan_report+0xdc/0x128 [ 25.548521] kasan_check_range+0x100/0x1a8 [ 25.548773] __kasan_check_write+0x20/0x30 [ 25.548863] kasan_atomics_helper+0xf20/0x4858 [ 25.549008] kasan_atomics+0x198/0x2e0 [ 25.549127] kunit_try_run_case+0x170/0x3f0 [ 25.549242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.549388] kthread+0x328/0x630 [ 25.549575] ret_from_fork+0x10/0x20 [ 25.549713] [ 25.549788] Allocated by task 265: [ 25.549897] kasan_save_stack+0x3c/0x68 [ 25.550048] kasan_save_track+0x20/0x40 [ 25.550158] kasan_save_alloc_info+0x40/0x58 [ 25.550256] __kasan_kmalloc+0xd4/0xd8 [ 25.550408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.550510] kasan_atomics+0xb8/0x2e0 [ 25.550609] kunit_try_run_case+0x170/0x3f0 [ 25.550696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.550799] kthread+0x328/0x630 [ 25.550882] ret_from_fork+0x10/0x20 [ 25.550985] [ 25.551051] The buggy address belongs to the object at fff00000c7884f80 [ 25.551051] which belongs to the cache kmalloc-64 of size 64 [ 25.551208] The buggy address is located 0 bytes to the right of [ 25.551208] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.551429] [ 25.551527] The buggy address belongs to the physical page: [ 25.551616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.551757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.551895] page_type: f5(slab) [ 25.551990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.552099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.552216] page dumped because: kasan: bad access detected [ 25.552301] [ 25.552349] Memory state around the buggy address: [ 25.552459] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.552610] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.552717] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.552803] ^ [ 25.552889] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.552996] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.553081] ================================================================== [ 25.330332] ================================================================== [ 25.330505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 25.330650] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.330784] [ 25.330883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.331085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.331159] Hardware name: linux,dummy-virt (DT) [ 25.331251] Call trace: [ 25.331313] show_stack+0x20/0x38 (C) [ 25.331622] dump_stack_lvl+0x8c/0xd0 [ 25.331807] print_report+0x118/0x608 [ 25.331980] kasan_report+0xdc/0x128 [ 25.332157] kasan_check_range+0x100/0x1a8 [ 25.332600] kasan_atomics+0x198/0x2e0 [ 25.333416] [ 25.334628] kthread+0x328/0x630 [ 25.334755] ret_from_fork+0x10/0x20 [ 25.334877] [ 25.334972] The buggy address belongs to the object at fff00000c7884f80 [ 25.334972] which belongs to the cache kmalloc-64 of size 64 [ 25.335132] The buggy address is located 0 bytes to the right of [ 25.335132] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.335477] [ 25.335574] The buggy address belongs to the physical page: [ 25.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.335874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.336063] page_type: f5(slab) [ 25.336215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.336391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.336525] page dumped because: kasan: bad access detected [ 25.336651] [ 25.336736] Memory state around the buggy address: [ 25.336870] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.336991] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.337108] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.337211] ^ [ 25.337306] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.337430] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.337531] ================================================================== [ 25.432703] ================================================================== [ 25.432828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 25.432961] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.433142] [ 25.433238] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.433468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.433546] Hardware name: linux,dummy-virt (DT) [ 25.433627] Call trace: [ 25.433686] show_stack+0x20/0x38 (C) [ 25.433815] dump_stack_lvl+0x8c/0xd0 [ 25.433933] print_report+0x118/0x608 [ 25.434072] kasan_report+0xdc/0x128 [ 25.434181] __asan_report_load4_noabort+0x20/0x30 [ 25.434300] kasan_atomics_helper+0x3dd8/0x4858 [ 25.434444] kasan_atomics+0x198/0x2e0 [ 25.435016] kunit_try_run_case+0x170/0x3f0 [ 25.435192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.435333] kthread+0x328/0x630 [ 25.435658] ret_from_fork+0x10/0x20 [ 25.436008] [ 25.436206] Allocated by task 265: [ 25.436289] kasan_save_stack+0x3c/0x68 [ 25.436385] kasan_save_track+0x20/0x40 [ 25.436474] kasan_save_alloc_info+0x40/0x58 [ 25.436585] __kasan_kmalloc+0xd4/0xd8 [ 25.436668] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.436763] kasan_atomics+0xb8/0x2e0 [ 25.436850] kunit_try_run_case+0x170/0x3f0 [ 25.436949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.437350] kthread+0x328/0x630 [ 25.437556] ret_from_fork+0x10/0x20 [ 25.437677] [ 25.437769] The buggy address belongs to the object at fff00000c7884f80 [ 25.437769] which belongs to the cache kmalloc-64 of size 64 [ 25.438155] The buggy address is located 0 bytes to the right of [ 25.438155] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.438594] [ 25.438669] The buggy address belongs to the physical page: [ 25.438745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.438894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.439391] page_type: f5(slab) [ 25.439812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.440029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.440354] page dumped because: kasan: bad access detected [ 25.440473] [ 25.440527] Memory state around the buggy address: [ 25.440624] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.440741] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.441272] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.442043] ^ [ 25.442565] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.442831] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.443250] ================================================================== [ 25.463742] ================================================================== [ 25.463888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 25.464036] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.464160] [ 25.464254] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.464492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.464567] Hardware name: linux,dummy-virt (DT) [ 25.464657] Call trace: [ 25.464724] show_stack+0x20/0x38 (C) [ 25.464858] dump_stack_lvl+0x8c/0xd0 [ 25.467691] print_report+0x118/0x608 [ 25.467925] kasan_report+0xdc/0x128 [ 25.468054] __asan_report_load4_noabort+0x20/0x30 [ 25.468617] kasan_atomics_helper+0x3e04/0x4858 [ 25.468764] kasan_atomics+0x198/0x2e0 [ 25.469246] kunit_try_run_case+0x170/0x3f0 [ 25.469600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.470107] kthread+0x328/0x630 [ 25.470478] ret_from_fork+0x10/0x20 [ 25.470863] [ 25.471239] Allocated by task 265: [ 25.471321] kasan_save_stack+0x3c/0x68 [ 25.471680] kasan_save_track+0x20/0x40 [ 25.471910] kasan_save_alloc_info+0x40/0x58 [ 25.472268] __kasan_kmalloc+0xd4/0xd8 [ 25.472390] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.473180] kasan_atomics+0xb8/0x2e0 [ 25.473309] kunit_try_run_case+0x170/0x3f0 [ 25.473420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.474286] kthread+0x328/0x630 [ 25.474606] ret_from_fork+0x10/0x20 [ 25.474746] [ 25.474811] The buggy address belongs to the object at fff00000c7884f80 [ 25.474811] which belongs to the cache kmalloc-64 of size 64 [ 25.475564] The buggy address is located 0 bytes to the right of [ 25.475564] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.475762] [ 25.476020] The buggy address belongs to the physical page: [ 25.476317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.476863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.477494] page_type: f5(slab) [ 25.477786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.478023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.478388] page dumped because: kasan: bad access detected [ 25.478873] [ 25.478958] Memory state around the buggy address: [ 25.479081] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.479228] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.479441] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.479591] ^ [ 25.479884] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.480313] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.480514] ================================================================== [ 25.773880] ================================================================== [ 25.773958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 25.774033] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.774093] [ 25.774138] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.774238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.774284] Hardware name: linux,dummy-virt (DT) [ 25.774331] Call trace: [ 25.774389] show_stack+0x20/0x38 (C) [ 25.774822] dump_stack_lvl+0x8c/0xd0 [ 25.774973] print_report+0x118/0x608 [ 25.775061] kasan_report+0xdc/0x128 [ 25.775513] __asan_report_load8_noabort+0x20/0x30 [ 25.775583] kasan_atomics_helper+0x3e10/0x4858 [ 25.775644] kasan_atomics+0x198/0x2e0 [ 25.775698] kunit_try_run_case+0x170/0x3f0 [ 25.775755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.775901] kthread+0x328/0x630 [ 25.776067] ret_from_fork+0x10/0x20 [ 25.776190] [ 25.776338] Allocated by task 265: [ 25.776420] kasan_save_stack+0x3c/0x68 [ 25.776690] kasan_save_track+0x20/0x40 [ 25.776747] kasan_save_alloc_info+0x40/0x58 [ 25.776796] __kasan_kmalloc+0xd4/0xd8 [ 25.777100] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.777166] kasan_atomics+0xb8/0x2e0 [ 25.777393] kunit_try_run_case+0x170/0x3f0 [ 25.778023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.778375] kthread+0x328/0x630 [ 25.778527] ret_from_fork+0x10/0x20 [ 25.778898] [ 25.778943] The buggy address belongs to the object at fff00000c7884f80 [ 25.778943] which belongs to the cache kmalloc-64 of size 64 [ 25.779172] The buggy address is located 0 bytes to the right of [ 25.779172] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.779274] [ 25.779317] The buggy address belongs to the physical page: [ 25.779496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.779616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.779840] page_type: f5(slab) [ 25.779994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.780059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.780111] page dumped because: kasan: bad access detected [ 25.780151] [ 25.780178] Memory state around the buggy address: [ 25.780220] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.780273] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.780321] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.780670] ^ [ 25.780729] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.780785] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.780936] ================================================================== [ 25.580392] ================================================================== [ 25.580584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 25.580721] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.580922] [ 25.581023] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.581345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.581414] Hardware name: linux,dummy-virt (DT) [ 25.581484] Call trace: [ 25.581529] show_stack+0x20/0x38 (C) [ 25.581641] dump_stack_lvl+0x8c/0xd0 [ 25.581754] print_report+0x118/0x608 [ 25.581873] kasan_report+0xdc/0x128 [ 25.581988] kasan_check_range+0x100/0x1a8 [ 25.582463] __kasan_check_write+0x20/0x30 [ 25.582626] kasan_atomics_helper+0x1058/0x4858 [ 25.582759] kasan_atomics+0x198/0x2e0 [ 25.582974] kunit_try_run_case+0x170/0x3f0 [ 25.583196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.583446] kthread+0x328/0x630 [ 25.583631] ret_from_fork+0x10/0x20 [ 25.584001] [ 25.584333] Allocated by task 265: [ 25.584454] kasan_save_stack+0x3c/0x68 [ 25.585006] kasan_save_track+0x20/0x40 [ 25.585356] kasan_save_alloc_info+0x40/0x58 [ 25.585703] __kasan_kmalloc+0xd4/0xd8 [ 25.585834] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.585995] kasan_atomics+0xb8/0x2e0 [ 25.586264] kunit_try_run_case+0x170/0x3f0 [ 25.586577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.586726] kthread+0x328/0x630 [ 25.586828] ret_from_fork+0x10/0x20 [ 25.587316] [ 25.587449] The buggy address belongs to the object at fff00000c7884f80 [ 25.587449] which belongs to the cache kmalloc-64 of size 64 [ 25.587650] The buggy address is located 0 bytes to the right of [ 25.587650] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.587795] [ 25.588029] The buggy address belongs to the physical page: [ 25.588164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.588301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.588540] page_type: f5(slab) [ 25.588869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.589077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.589204] page dumped because: kasan: bad access detected [ 25.589333] [ 25.589381] Memory state around the buggy address: [ 25.589798] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.589929] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.590373] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.590491] ^ [ 25.590937] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.591080] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.591586] ================================================================== [ 25.291833] ================================================================== [ 25.292003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 25.292136] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.292276] [ 25.292359] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.292582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.292659] Hardware name: linux,dummy-virt (DT) [ 25.292740] Call trace: [ 25.292797] show_stack+0x20/0x38 (C) [ 25.292928] dump_stack_lvl+0x8c/0xd0 [ 25.293702] print_report+0x118/0x608 [ 25.294830] kasan_report+0xdc/0x128 [ 25.295613] __asan_report_load4_noabort+0x20/0x30 [ 25.295786] kasan_atomics_helper+0x42d8/0x4858 [ 25.296663] kasan_atomics+0x198/0x2e0 [ 25.297801] kunit_try_run_case+0x170/0x3f0 [ 25.297969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.298739] kthread+0x328/0x630 [ 25.298930] ret_from_fork+0x10/0x20 [ 25.299427] [ 25.299497] Allocated by task 265: [ 25.299581] kasan_save_stack+0x3c/0x68 [ 25.299793] kasan_save_track+0x20/0x40 [ 25.299972] kasan_save_alloc_info+0x40/0x58 [ 25.300123] __kasan_kmalloc+0xd4/0xd8 [ 25.300232] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.300681] kthread+0x328/0x630 [ 25.301091] The buggy address is located 0 bytes to the right of [ 25.301091] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.301266] [ 25.301326] The buggy address belongs to the physical page: [ 25.301424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.301574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.301702] page_type: f5(slab) [ 25.301810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.302151] [ 25.304938] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.306875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.307097] kthread+0x328/0x630 [ 25.307617] ret_from_fork+0x10/0x20 [ 25.307851] [ 25.307936] Allocated by task 265: [ 25.308133] kasan_save_stack+0x3c/0x68 [ 25.308352] kasan_save_track+0x20/0x40 [ 25.308480] kasan_save_alloc_info+0x40/0x58 [ 25.308581] __kasan_kmalloc+0xd4/0xd8 [ 25.308685] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.308788] kasan_atomics+0xb8/0x2e0 [ 25.309308] kunit_try_run_case+0x170/0x3f0 [ 25.309668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.310230] kthread+0x328/0x630 [ 25.310387] ret_from_fork+0x10/0x20 [ 25.310496] [ 25.310563] The buggy address belongs to the object at fff00000c7884f80 [ 25.310563] which belongs to the cache kmalloc-64 of size 64 [ 25.310724] The buggy address is located 0 bytes to the right of [ 25.310724] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.311030] [ 25.311355] The buggy address belongs to the physical page: [ 25.311628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.312040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.312350] page_type: f5(slab) [ 25.312561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.312703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.313445] page dumped because: kasan: bad access detected [ 25.313661] [ 25.313728] Memory state around the buggy address: [ 25.313818] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.313944] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.314538] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.314747] ^ [ 25.315001] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.315238] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.315350] ================================================================== [ 25.004991] ================================================================== [ 25.005197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 25.006609] [ 25.007111] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.007361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.007697] Hardware name: linux,dummy-virt (DT) [ 25.009432] __asan_report_load4_noabort+0x20/0x30 [ 25.009950] kasan_atomics+0x198/0x2e0 [ 25.010329] kunit_try_run_case+0x170/0x3f0 [ 25.011869] Allocated by task 265: [ 25.012186] kasan_save_stack+0x3c/0x68 [ 25.012703] __kasan_kmalloc+0xd4/0xd8 [ 25.013146] kasan_atomics+0xb8/0x2e0 [ 25.013933] kthread+0x328/0x630 [ 25.014870] The buggy address is located 0 bytes to the right of [ 25.014870] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.015437] page_type: f5(slab) [ 25.015682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.016923] page dumped because: kasan: bad access detected [ 25.017041] [ 25.017091] Memory state around the buggy address: [ 25.017275] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.017545] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.018331] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.018474] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.021204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 25.021339] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.022236] [ 25.022563] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.030383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.034646] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.039546] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.043809] kunit_try_run_case+0x170/0x3f0 [ 25.048193] The buggy address belongs to the object at fff00000c7884f80 [ 25.048193] which belongs to the cache kmalloc-64 of size 64 [ 25.050300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.051583] page dumped because: kasan: bad access detected [ 25.051869] [ 25.052297] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.062717] [ 25.062991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.065917] kasan_check_range+0x100/0x1a8 [ 25.066464] kunit_try_run_case+0x170/0x3f0 [ 25.067444] kasan_save_alloc_info+0x40/0x58 [ 25.071629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.072452] [ 25.073982] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.078133] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.080264] kasan_atomics_helper+0x2b0/0x4858 [ 25.081817] kasan_save_alloc_info+0x40/0x58 [ 25.084176] [ 25.087360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.087557] page dumped because: kasan: bad access detected [ 25.088453] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.094733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 25.095884] dump_stack_lvl+0x8c/0xd0 [ 25.101314] kasan_save_track+0x20/0x40 [ 25.104127] The buggy address is located 0 bytes to the right of [ 25.104127] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.105456] [ 25.107498] ================================================================== [ 25.789209] ================================================================== [ 25.789300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 25.789394] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.789645] [ 25.789850] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.790165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.790205] Hardware name: linux,dummy-virt (DT) [ 25.790246] Call trace: [ 25.790277] show_stack+0x20/0x38 (C) [ 25.790626] dump_stack_lvl+0x8c/0xd0 [ 25.790738] print_report+0x118/0x608 [ 25.790926] kasan_report+0xdc/0x128 [ 25.790995] __asan_report_load8_noabort+0x20/0x30 [ 25.791055] kasan_atomics_helper+0x3e20/0x4858 [ 25.791113] kasan_atomics+0x198/0x2e0 [ 25.791171] kunit_try_run_case+0x170/0x3f0 [ 25.791261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.791358] kthread+0x328/0x630 [ 25.791418] ret_from_fork+0x10/0x20 [ 25.791495] [ 25.791528] Allocated by task 265: [ 25.791765] kasan_save_stack+0x3c/0x68 [ 25.791854] kasan_save_track+0x20/0x40 [ 25.791901] kasan_save_alloc_info+0x40/0x58 [ 25.791947] __kasan_kmalloc+0xd4/0xd8 [ 25.791992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.792040] kasan_atomics+0xb8/0x2e0 [ 25.792084] kunit_try_run_case+0x170/0x3f0 [ 25.792144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.792199] kthread+0x328/0x630 [ 25.792253] ret_from_fork+0x10/0x20 [ 25.792337] [ 25.792381] The buggy address belongs to the object at fff00000c7884f80 [ 25.792381] which belongs to the cache kmalloc-64 of size 64 [ 25.792648] The buggy address is located 0 bytes to the right of [ 25.792648] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.792997] [ 25.793029] The buggy address belongs to the physical page: [ 25.793070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.793135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.793197] page_type: f5(slab) [ 25.793248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.793308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.793358] page dumped because: kasan: bad access detected [ 25.793395] [ 25.793434] Memory state around the buggy address: [ 25.793475] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.793545] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.793608] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.793673] ^ [ 25.793716] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.793766] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.794085] ================================================================== [ 25.700604] ================================================================== [ 25.700695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 25.700785] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.700846] [ 25.700947] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.701058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.701265] Hardware name: linux,dummy-virt (DT) [ 25.701621] Call trace: [ 25.701724] show_stack+0x20/0x38 (C) [ 25.701843] dump_stack_lvl+0x8c/0xd0 [ 25.701989] print_report+0x118/0x608 [ 25.702057] kasan_report+0xdc/0x128 [ 25.702175] kasan_check_range+0x100/0x1a8 [ 25.702236] __kasan_check_write+0x20/0x30 [ 25.702598] kasan_atomics_helper+0x14e4/0x4858 [ 25.702814] kasan_atomics+0x198/0x2e0 [ 25.703024] kunit_try_run_case+0x170/0x3f0 [ 25.703196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.703451] kthread+0x328/0x630 [ 25.703520] ret_from_fork+0x10/0x20 [ 25.703584] [ 25.703764] Allocated by task 265: [ 25.703824] kasan_save_stack+0x3c/0x68 [ 25.703886] kasan_save_track+0x20/0x40 [ 25.704008] kasan_save_alloc_info+0x40/0x58 [ 25.704144] __kasan_kmalloc+0xd4/0xd8 [ 25.704470] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.704664] kasan_atomics+0xb8/0x2e0 [ 25.704874] kunit_try_run_case+0x170/0x3f0 [ 25.705007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.705367] kthread+0x328/0x630 [ 25.705436] ret_from_fork+0x10/0x20 [ 25.705655] [ 25.705715] The buggy address belongs to the object at fff00000c7884f80 [ 25.705715] which belongs to the cache kmalloc-64 of size 64 [ 25.705878] The buggy address is located 0 bytes to the right of [ 25.705878] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.705961] [ 25.706009] The buggy address belongs to the physical page: [ 25.706396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.706476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.706662] page_type: f5(slab) [ 25.706736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.706927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.707223] page dumped because: kasan: bad access detected [ 25.707446] [ 25.707528] Memory state around the buggy address: [ 25.707581] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.707757] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.707817] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.707866] ^ [ 25.707966] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.708248] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.708303] ================================================================== [ 25.781760] ================================================================== [ 25.781836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 25.781910] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.781971] [ 25.782019] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.782120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.782154] Hardware name: linux,dummy-virt (DT) [ 25.782193] Call trace: [ 25.782234] show_stack+0x20/0x38 (C) [ 25.782296] dump_stack_lvl+0x8c/0xd0 [ 25.782534] print_report+0x118/0x608 [ 25.782957] kasan_report+0xdc/0x128 [ 25.783050] kasan_check_range+0x100/0x1a8 [ 25.783117] __kasan_check_write+0x20/0x30 [ 25.783174] kasan_atomics_helper+0x175c/0x4858 [ 25.783689] kasan_atomics+0x198/0x2e0 [ 25.783764] kunit_try_run_case+0x170/0x3f0 [ 25.783836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.784091] kthread+0x328/0x630 [ 25.784245] ret_from_fork+0x10/0x20 [ 25.784508] [ 25.784678] Allocated by task 265: [ 25.784725] kasan_save_stack+0x3c/0x68 [ 25.784901] kasan_save_track+0x20/0x40 [ 25.784953] kasan_save_alloc_info+0x40/0x58 [ 25.785327] __kasan_kmalloc+0xd4/0xd8 [ 25.785596] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.785655] kasan_atomics+0xb8/0x2e0 [ 25.785889] kunit_try_run_case+0x170/0x3f0 [ 25.785975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.786186] kthread+0x328/0x630 [ 25.786359] ret_from_fork+0x10/0x20 [ 25.786603] [ 25.786642] The buggy address belongs to the object at fff00000c7884f80 [ 25.786642] which belongs to the cache kmalloc-64 of size 64 [ 25.786750] The buggy address is located 0 bytes to the right of [ 25.786750] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.786854] [ 25.786887] The buggy address belongs to the physical page: [ 25.786929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.786996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.787056] page_type: f5(slab) [ 25.787109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.787172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.787222] page dumped because: kasan: bad access detected [ 25.787816] [ 25.787852] Memory state around the buggy address: [ 25.788151] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.788355] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.788450] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.788504] ^ [ 25.788551] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.788632] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.788728] ================================================================== [ 25.338211] ================================================================== [ 25.338424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 25.338652] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.338786] [ 25.338883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.339090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.339181] Hardware name: linux,dummy-virt (DT) [ 25.339263] Call trace: [ 25.339325] show_stack+0x20/0x38 (C) [ 25.339605] dump_stack_lvl+0x8c/0xd0 [ 25.339753] print_report+0x118/0x608 [ 25.339930] kasan_report+0xdc/0x128 [ 25.340061] kasan_check_range+0x100/0x1a8 [ 25.340186] __kasan_check_write+0x20/0x30 [ 25.340310] kasan_atomics_helper+0xa6c/0x4858 [ 25.340451] kasan_atomics+0x198/0x2e0 [ 25.340680] kunit_try_run_case+0x170/0x3f0 [ 25.340799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.340970] kthread+0x328/0x630 [ 25.341087] ret_from_fork+0x10/0x20 [ 25.341208] [ 25.341263] Allocated by task 265: [ 25.341517] kasan_save_stack+0x3c/0x68 [ 25.341688] kasan_save_track+0x20/0x40 [ 25.341814] kasan_save_alloc_info+0x40/0x58 [ 25.341926] __kasan_kmalloc+0xd4/0xd8 [ 25.342082] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.342190] kasan_atomics+0xb8/0x2e0 [ 25.342281] kunit_try_run_case+0x170/0x3f0 [ 25.342390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.342511] kthread+0x328/0x630 [ 25.342717] ret_from_fork+0x10/0x20 [ 25.342807] [ 25.342884] The buggy address belongs to the object at fff00000c7884f80 [ 25.342884] which belongs to the cache kmalloc-64 of size 64 [ 25.343168] The buggy address is located 0 bytes to the right of [ 25.343168] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.343409] [ 25.343468] The buggy address belongs to the physical page: [ 25.343552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.343757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.343867] page_type: f5(slab) [ 25.344026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.344184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.344384] page dumped because: kasan: bad access detected [ 25.344592] [ 25.344646] Memory state around the buggy address: [ 25.344750] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.344869] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.345566] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.345821] ^ [ 25.345921] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.346280] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.346604] ================================================================== [ 25.716948] ================================================================== [ 25.717016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 25.717284] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.717408] [ 25.717464] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.717567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.717600] Hardware name: linux,dummy-virt (DT) [ 25.717639] Call trace: [ 25.717669] show_stack+0x20/0x38 (C) [ 25.717738] dump_stack_lvl+0x8c/0xd0 [ 25.717796] print_report+0x118/0x608 [ 25.717854] kasan_report+0xdc/0x128 [ 25.717905] kasan_check_range+0x100/0x1a8 [ 25.717961] __kasan_check_write+0x20/0x30 [ 25.718013] kasan_atomics_helper+0x15b4/0x4858 [ 25.718068] kasan_atomics+0x198/0x2e0 [ 25.718120] kunit_try_run_case+0x170/0x3f0 [ 25.718174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.718235] kthread+0x328/0x630 [ 25.718283] ret_from_fork+0x10/0x20 [ 25.718339] [ 25.718363] Allocated by task 265: [ 25.718408] kasan_save_stack+0x3c/0x68 [ 25.718473] kasan_save_track+0x20/0x40 [ 25.718566] kasan_save_alloc_info+0x40/0x58 [ 25.718657] __kasan_kmalloc+0xd4/0xd8 [ 25.718739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.718862] kasan_atomics+0xb8/0x2e0 [ 25.719074] kunit_try_run_case+0x170/0x3f0 [ 25.719164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.719217] kthread+0x328/0x630 [ 25.720141] ret_from_fork+0x10/0x20 [ 25.720201] [ 25.720243] The buggy address belongs to the object at fff00000c7884f80 [ 25.720243] which belongs to the cache kmalloc-64 of size 64 [ 25.720418] The buggy address is located 0 bytes to the right of [ 25.720418] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.720571] [ 25.720651] The buggy address belongs to the physical page: [ 25.720728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.721000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.721262] page_type: f5(slab) [ 25.721433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.721788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.722373] page dumped because: kasan: bad access detected [ 25.722587] [ 25.722627] Memory state around the buggy address: [ 25.722680] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.722733] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.722787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.722846] ^ [ 25.724231] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.724308] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.724356] ================================================================== [ 25.643048] ================================================================== [ 25.643171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 25.643254] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.643316] [ 25.643368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.643541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.643595] Hardware name: linux,dummy-virt (DT) [ 25.643660] Call trace: [ 25.643720] show_stack+0x20/0x38 (C) [ 25.643837] dump_stack_lvl+0x8c/0xd0 [ 25.644363] print_report+0x118/0x608 [ 25.644552] kasan_report+0xdc/0x128 [ 25.644723] kasan_check_range+0x100/0x1a8 [ 25.644870] __kasan_check_write+0x20/0x30 [ 25.644991] kasan_atomics_helper+0x11f8/0x4858 [ 25.645116] kasan_atomics+0x198/0x2e0 [ 25.645228] kunit_try_run_case+0x170/0x3f0 [ 25.645356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.645493] kthread+0x328/0x630 [ 25.645600] ret_from_fork+0x10/0x20 [ 25.646210] [ 25.646480] Allocated by task 265: [ 25.646610] kasan_save_stack+0x3c/0x68 [ 25.646743] kasan_save_track+0x20/0x40 [ 25.646880] kasan_save_alloc_info+0x40/0x58 [ 25.647030] __kasan_kmalloc+0xd4/0xd8 [ 25.647137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.647246] kasan_atomics+0xb8/0x2e0 [ 25.647344] kunit_try_run_case+0x170/0x3f0 [ 25.647462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.647570] kthread+0x328/0x630 [ 25.647642] ret_from_fork+0x10/0x20 [ 25.649568] [ 25.649617] The buggy address belongs to the object at fff00000c7884f80 [ 25.649617] which belongs to the cache kmalloc-64 of size 64 [ 25.649727] The buggy address is located 0 bytes to the right of [ 25.649727] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.649804] [ 25.649842] The buggy address belongs to the physical page: [ 25.649924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.650051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.650167] page_type: f5(slab) [ 25.650220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.650277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.650326] page dumped because: kasan: bad access detected [ 25.650378] [ 25.650416] Memory state around the buggy address: [ 25.650459] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.650509] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.650710] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.651016] ^ [ 25.651708] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.652094] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.652806] ================================================================== [ 25.709260] ================================================================== [ 25.709415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 25.709500] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.709562] [ 25.709608] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.709946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.710246] Hardware name: linux,dummy-virt (DT) [ 25.710366] Call trace: [ 25.710433] show_stack+0x20/0x38 (C) [ 25.710542] dump_stack_lvl+0x8c/0xd0 [ 25.710609] print_report+0x118/0x608 [ 25.710667] kasan_report+0xdc/0x128 [ 25.710885] kasan_check_range+0x100/0x1a8 [ 25.711071] __kasan_check_write+0x20/0x30 [ 25.711136] kasan_atomics_helper+0x154c/0x4858 [ 25.711198] kasan_atomics+0x198/0x2e0 [ 25.711255] kunit_try_run_case+0x170/0x3f0 [ 25.711312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.711377] kthread+0x328/0x630 [ 25.711630] ret_from_fork+0x10/0x20 [ 25.711700] [ 25.711740] Allocated by task 265: [ 25.711794] kasan_save_stack+0x3c/0x68 [ 25.711869] kasan_save_track+0x20/0x40 [ 25.711922] kasan_save_alloc_info+0x40/0x58 [ 25.711969] __kasan_kmalloc+0xd4/0xd8 [ 25.712015] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.712078] kasan_atomics+0xb8/0x2e0 [ 25.712141] kunit_try_run_case+0x170/0x3f0 [ 25.712210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.712281] kthread+0x328/0x630 [ 25.712326] ret_from_fork+0x10/0x20 [ 25.712372] [ 25.712412] The buggy address belongs to the object at fff00000c7884f80 [ 25.712412] which belongs to the cache kmalloc-64 of size 64 [ 25.712487] The buggy address is located 0 bytes to the right of [ 25.712487] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.712581] [ 25.712617] The buggy address belongs to the physical page: [ 25.712658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.712724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.712786] page_type: f5(slab) [ 25.712841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.712902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.712951] page dumped because: kasan: bad access detected [ 25.713015] [ 25.713043] Memory state around the buggy address: [ 25.713086] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.713154] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.713209] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.713272] ^ [ 25.713331] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.716451] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.716577] ================================================================== [ 25.674299] ================================================================== [ 25.674377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 25.674696] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.674763] [ 25.674807] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.674952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.674991] Hardware name: linux,dummy-virt (DT) [ 25.675329] Call trace: [ 25.675379] show_stack+0x20/0x38 (C) [ 25.675725] dump_stack_lvl+0x8c/0xd0 [ 25.675797] print_report+0x118/0x608 [ 25.675925] kasan_report+0xdc/0x128 [ 25.676048] __asan_report_load8_noabort+0x20/0x30 [ 25.676110] kasan_atomics_helper+0x3f04/0x4858 [ 25.676412] kasan_atomics+0x198/0x2e0 [ 25.676571] kunit_try_run_case+0x170/0x3f0 [ 25.676728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.676970] kthread+0x328/0x630 [ 25.677122] ret_from_fork+0x10/0x20 [ 25.677216] [ 25.677248] Allocated by task 265: [ 25.677610] kasan_save_stack+0x3c/0x68 [ 25.678156] kasan_save_track+0x20/0x40 [ 25.678231] kasan_save_alloc_info+0x40/0x58 [ 25.678308] __kasan_kmalloc+0xd4/0xd8 [ 25.678454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.678557] kasan_atomics+0xb8/0x2e0 [ 25.678656] kunit_try_run_case+0x170/0x3f0 [ 25.678711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.678788] kthread+0x328/0x630 [ 25.678857] ret_from_fork+0x10/0x20 [ 25.679258] [ 25.679440] The buggy address belongs to the object at fff00000c7884f80 [ 25.679440] which belongs to the cache kmalloc-64 of size 64 [ 25.679790] The buggy address is located 0 bytes to the right of [ 25.679790] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.680079] [ 25.680431] The buggy address belongs to the physical page: [ 25.680699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.680816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.680935] page_type: f5(slab) [ 25.681224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.681442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.681703] page dumped because: kasan: bad access detected [ 25.681764] [ 25.682029] Memory state around the buggy address: [ 25.682093] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.682150] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.682429] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.682505] ^ [ 25.682556] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.682994] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.683088] ================================================================== [ 25.605035] ================================================================== [ 25.605168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 25.605325] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.605469] [ 25.605603] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.605876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.605979] Hardware name: linux,dummy-virt (DT) [ 25.606076] Call trace: [ 25.606163] show_stack+0x20/0x38 (C) [ 25.606324] dump_stack_lvl+0x8c/0xd0 [ 25.606580] print_report+0x118/0x608 [ 25.607108] kasan_report+0xdc/0x128 [ 25.607834] kasan_check_range+0x100/0x1a8 [ 25.608035] __kasan_check_write+0x20/0x30 [ 25.608917] kasan_atomics_helper+0x1128/0x4858 [ 25.609473] kasan_atomics+0x198/0x2e0 [ 25.610032] kunit_try_run_case+0x170/0x3f0 [ 25.610521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.610655] kthread+0x328/0x630 [ 25.610755] ret_from_fork+0x10/0x20 [ 25.611839] [ 25.611962] Allocated by task 265: [ 25.612085] kasan_save_stack+0x3c/0x68 [ 25.612512] kasan_save_track+0x20/0x40 [ 25.613309] kasan_save_alloc_info+0x40/0x58 [ 25.613684] __kasan_kmalloc+0xd4/0xd8 [ 25.614297] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.614551] kasan_atomics+0xb8/0x2e0 [ 25.614635] kunit_try_run_case+0x170/0x3f0 [ 25.614724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.614846] kthread+0x328/0x630 [ 25.614943] ret_from_fork+0x10/0x20 [ 25.616215] [ 25.616706] The buggy address belongs to the object at fff00000c7884f80 [ 25.616706] which belongs to the cache kmalloc-64 of size 64 [ 25.617571] The buggy address is located 0 bytes to the right of [ 25.617571] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.618612] [ 25.619315] The buggy address belongs to the physical page: [ 25.619458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.620487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.620650] page_type: f5(slab) [ 25.621095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.621712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.621945] page dumped because: kasan: bad access detected [ 25.622150] [ 25.622433] Memory state around the buggy address: [ 25.623127] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.623674] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.624117] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.624861] ^ [ 25.625164] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.625697] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.626493] ================================================================== [ 25.628755] ================================================================== [ 25.629605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 25.630575] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.631094] [ 25.631376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.631620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.631691] Hardware name: linux,dummy-virt (DT) [ 25.631775] Call trace: [ 25.633183] show_stack+0x20/0x38 (C) [ 25.633918] dump_stack_lvl+0x8c/0xd0 [ 25.634296] print_report+0x118/0x608 [ 25.634436] kasan_report+0xdc/0x128 [ 25.634557] kasan_check_range+0x100/0x1a8 [ 25.634666] __kasan_check_write+0x20/0x30 [ 25.634771] kasan_atomics_helper+0x1190/0x4858 [ 25.634905] kasan_atomics+0x198/0x2e0 [ 25.635031] kunit_try_run_case+0x170/0x3f0 [ 25.636964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.637421] kthread+0x328/0x630 [ 25.638066] ret_from_fork+0x10/0x20 [ 25.638220] [ 25.638298] Allocated by task 265: [ 25.638450] kasan_save_stack+0x3c/0x68 [ 25.638568] kasan_save_track+0x20/0x40 [ 25.638792] kasan_save_alloc_info+0x40/0x58 [ 25.638912] __kasan_kmalloc+0xd4/0xd8 [ 25.639031] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.639142] kasan_atomics+0xb8/0x2e0 [ 25.639243] kunit_try_run_case+0x170/0x3f0 [ 25.639345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.639493] kthread+0x328/0x630 [ 25.639581] ret_from_fork+0x10/0x20 [ 25.639663] [ 25.639712] The buggy address belongs to the object at fff00000c7884f80 [ 25.639712] which belongs to the cache kmalloc-64 of size 64 [ 25.639863] The buggy address is located 0 bytes to the right of [ 25.639863] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.640039] [ 25.640094] The buggy address belongs to the physical page: [ 25.640169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.640298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.640433] page_type: f5(slab) [ 25.640538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.640721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.640905] page dumped because: kasan: bad access detected [ 25.641003] [ 25.641050] Memory state around the buggy address: [ 25.641138] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.641239] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.641341] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.641465] ^ [ 25.641550] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.641655] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.641787] ================================================================== [ 25.765611] ================================================================== [ 25.765695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 25.765772] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.765833] [ 25.765880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.765982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.766014] Hardware name: linux,dummy-virt (DT) [ 25.766054] Call trace: [ 25.766084] show_stack+0x20/0x38 (C) [ 25.766147] dump_stack_lvl+0x8c/0xd0 [ 25.766205] print_report+0x118/0x608 [ 25.766262] kasan_report+0xdc/0x128 [ 25.766315] kasan_check_range+0x100/0x1a8 [ 25.768313] __kasan_check_write+0x20/0x30 [ 25.768811] kasan_atomics_helper+0x16d0/0x4858 [ 25.769114] kasan_atomics+0x198/0x2e0 [ 25.769578] kunit_try_run_case+0x170/0x3f0 [ 25.769788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.770020] kthread+0x328/0x630 [ 25.770094] ret_from_fork+0x10/0x20 [ 25.770266] [ 25.770296] Allocated by task 265: [ 25.770576] kasan_save_stack+0x3c/0x68 [ 25.770640] kasan_save_track+0x20/0x40 [ 25.770691] kasan_save_alloc_info+0x40/0x58 [ 25.770738] __kasan_kmalloc+0xd4/0xd8 [ 25.770785] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.770845] kasan_atomics+0xb8/0x2e0 [ 25.770897] kunit_try_run_case+0x170/0x3f0 [ 25.770947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.771211] kthread+0x328/0x630 [ 25.771461] ret_from_fork+0x10/0x20 [ 25.771520] [ 25.771556] The buggy address belongs to the object at fff00000c7884f80 [ 25.771556] which belongs to the cache kmalloc-64 of size 64 [ 25.771628] The buggy address is located 0 bytes to the right of [ 25.771628] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.771701] [ 25.771731] The buggy address belongs to the physical page: [ 25.771770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.772045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.772117] page_type: f5(slab) [ 25.772172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.772234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.772284] page dumped because: kasan: bad access detected [ 25.772327] [ 25.772350] Memory state around the buggy address: [ 25.772421] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.772489] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.772545] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.772592] ^ [ 25.772636] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.772686] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.772733] ================================================================== [ 25.513483] ================================================================== [ 25.513690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 25.513820] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.513989] [ 25.514129] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.514347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.514775] Hardware name: linux,dummy-virt (DT) [ 25.514865] Call trace: [ 25.514929] show_stack+0x20/0x38 (C) [ 25.515154] dump_stack_lvl+0x8c/0xd0 [ 25.515586] print_report+0x118/0x608 [ 25.515804] kasan_report+0xdc/0x128 [ 25.515954] kasan_check_range+0x100/0x1a8 [ 25.516045] __kasan_check_write+0x20/0x30 [ 25.516147] kasan_atomics_helper+0xe44/0x4858 [ 25.516312] kasan_atomics+0x198/0x2e0 [ 25.516620] kunit_try_run_case+0x170/0x3f0 [ 25.517045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.517210] kthread+0x328/0x630 [ 25.517324] ret_from_fork+0x10/0x20 [ 25.517530] [ 25.517954] Allocated by task 265: [ 25.518127] kasan_save_stack+0x3c/0x68 [ 25.518246] kasan_save_track+0x20/0x40 [ 25.518350] kasan_save_alloc_info+0x40/0x58 [ 25.518686] __kasan_kmalloc+0xd4/0xd8 [ 25.519055] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.519173] kasan_atomics+0xb8/0x2e0 [ 25.519380] kunit_try_run_case+0x170/0x3f0 [ 25.519537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.519751] kthread+0x328/0x630 [ 25.520045] ret_from_fork+0x10/0x20 [ 25.520373] [ 25.520445] The buggy address belongs to the object at fff00000c7884f80 [ 25.520445] which belongs to the cache kmalloc-64 of size 64 [ 25.520792] The buggy address is located 0 bytes to the right of [ 25.520792] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.520972] [ 25.521009] The buggy address belongs to the physical page: [ 25.521050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.521114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.521175] page_type: f5(slab) [ 25.521229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.521289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.521337] page dumped because: kasan: bad access detected [ 25.521376] [ 25.521424] Memory state around the buggy address: [ 25.521469] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.521521] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.521572] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.521618] ^ [ 25.521659] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.521707] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.521751] ================================================================== [ 25.553708] ================================================================== [ 25.553886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 25.554045] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.554162] [ 25.554241] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.554498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.554646] Hardware name: linux,dummy-virt (DT) [ 25.554761] Call trace: [ 25.554858] show_stack+0x20/0x38 (C) [ 25.555040] dump_stack_lvl+0x8c/0xd0 [ 25.555200] print_report+0x118/0x608 [ 25.555371] kasan_report+0xdc/0x128 [ 25.555547] kasan_check_range+0x100/0x1a8 [ 25.555668] __kasan_check_write+0x20/0x30 [ 25.555763] kasan_atomics_helper+0xf88/0x4858 [ 25.555897] kasan_atomics+0x198/0x2e0 [ 25.555998] kunit_try_run_case+0x170/0x3f0 [ 25.556102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.556232] kthread+0x328/0x630 [ 25.556329] ret_from_fork+0x10/0x20 [ 25.556465] [ 25.556524] Allocated by task 265: [ 25.556615] kasan_save_stack+0x3c/0x68 [ 25.556722] kasan_save_track+0x20/0x40 [ 25.556825] kasan_save_alloc_info+0x40/0x58 [ 25.556924] __kasan_kmalloc+0xd4/0xd8 [ 25.557020] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.557124] kasan_atomics+0xb8/0x2e0 [ 25.557223] kunit_try_run_case+0x170/0x3f0 [ 25.557321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.557434] kthread+0x328/0x630 [ 25.557526] ret_from_fork+0x10/0x20 [ 25.557622] [ 25.557679] The buggy address belongs to the object at fff00000c7884f80 [ 25.557679] which belongs to the cache kmalloc-64 of size 64 [ 25.557814] The buggy address is located 0 bytes to the right of [ 25.557814] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.557976] [ 25.558043] The buggy address belongs to the physical page: [ 25.558122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.558253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.558439] page_type: f5(slab) [ 25.558532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.558594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.558644] page dumped because: kasan: bad access detected [ 25.558708] [ 25.558792] Memory state around the buggy address: [ 25.559018] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.559243] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.559642] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.559961] ^ [ 25.560055] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.560169] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.560659] ================================================================== [ 25.653766] ================================================================== [ 25.653846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 25.653926] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.654443] [ 25.654532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.654645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.654681] Hardware name: linux,dummy-virt (DT) [ 25.654722] Call trace: [ 25.654754] show_stack+0x20/0x38 (C) [ 25.654836] dump_stack_lvl+0x8c/0xd0 [ 25.654902] print_report+0x118/0x608 [ 25.654958] kasan_report+0xdc/0x128 [ 25.655044] kasan_check_range+0x100/0x1a8 [ 25.655266] __kasan_check_write+0x20/0x30 [ 25.655650] kasan_atomics_helper+0x126c/0x4858 [ 25.655729] kasan_atomics+0x198/0x2e0 [ 25.655786] kunit_try_run_case+0x170/0x3f0 [ 25.655845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.656026] kthread+0x328/0x630 [ 25.656119] ret_from_fork+0x10/0x20 [ 25.656412] [ 25.656444] Allocated by task 265: [ 25.656483] kasan_save_stack+0x3c/0x68 [ 25.656726] kasan_save_track+0x20/0x40 [ 25.656801] kasan_save_alloc_info+0x40/0x58 [ 25.657004] __kasan_kmalloc+0xd4/0xd8 [ 25.657216] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.657305] kasan_atomics+0xb8/0x2e0 [ 25.657366] kunit_try_run_case+0x170/0x3f0 [ 25.657429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.657486] kthread+0x328/0x630 [ 25.657527] ret_from_fork+0x10/0x20 [ 25.658018] [ 25.658057] The buggy address belongs to the object at fff00000c7884f80 [ 25.658057] which belongs to the cache kmalloc-64 of size 64 [ 25.658445] The buggy address is located 0 bytes to the right of [ 25.658445] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.658746] [ 25.658781] The buggy address belongs to the physical page: [ 25.658832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.658903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.658965] page_type: f5(slab) [ 25.659019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.659484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.659549] page dumped because: kasan: bad access detected [ 25.659592] [ 25.659699] Memory state around the buggy address: [ 25.659748] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.659802] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.659857] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.659907] ^ [ 25.659998] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.660241] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.660514] ================================================================== [ 25.794948] ================================================================== [ 25.795022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 25.795096] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.795160] [ 25.795202] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.795304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.795339] Hardware name: linux,dummy-virt (DT) [ 25.795379] Call trace: [ 25.795422] show_stack+0x20/0x38 (C) [ 25.795489] dump_stack_lvl+0x8c/0xd0 [ 25.795547] print_report+0x118/0x608 [ 25.795604] kasan_report+0xdc/0x128 [ 25.795658] kasan_check_range+0x100/0x1a8 [ 25.795716] __kasan_check_write+0x20/0x30 [ 25.795770] kasan_atomics_helper+0x17ec/0x4858 [ 25.795827] kasan_atomics+0x198/0x2e0 [ 25.795882] kunit_try_run_case+0x170/0x3f0 [ 25.795937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.795998] kthread+0x328/0x630 [ 25.796046] ret_from_fork+0x10/0x20 [ 25.796103] [ 25.796128] Allocated by task 265: [ 25.796164] kasan_save_stack+0x3c/0x68 [ 25.796217] kasan_save_track+0x20/0x40 [ 25.796266] kasan_save_alloc_info+0x40/0x58 [ 25.796312] __kasan_kmalloc+0xd4/0xd8 [ 25.796356] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.796430] kasan_atomics+0xb8/0x2e0 [ 25.796483] kunit_try_run_case+0x170/0x3f0 [ 25.796530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.796583] kthread+0x328/0x630 [ 25.796623] ret_from_fork+0x10/0x20 [ 25.796667] [ 25.796694] The buggy address belongs to the object at fff00000c7884f80 [ 25.796694] which belongs to the cache kmalloc-64 of size 64 [ 25.796971] The buggy address is located 0 bytes to the right of [ 25.796971] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.797269] [ 25.797301] The buggy address belongs to the physical page: [ 25.797343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.797828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.797900] page_type: f5(slab) [ 25.798028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.798175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.798244] page dumped because: kasan: bad access detected [ 25.798328] [ 25.798379] Memory state around the buggy address: [ 25.798437] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.798542] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.798677] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.798787] ^ [ 25.798848] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.798903] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.798949] ================================================================== [ 25.684354] ================================================================== [ 25.684501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 25.684582] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.684641] [ 25.684684] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.684781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.684814] Hardware name: linux,dummy-virt (DT) [ 25.684853] Call trace: [ 25.684903] show_stack+0x20/0x38 (C) [ 25.684965] dump_stack_lvl+0x8c/0xd0 [ 25.685023] print_report+0x118/0x608 [ 25.685078] kasan_report+0xdc/0x128 [ 25.685131] kasan_check_range+0x100/0x1a8 [ 25.685184] __kasan_check_write+0x20/0x30 [ 25.685236] kasan_atomics_helper+0x1414/0x4858 [ 25.685292] kasan_atomics+0x198/0x2e0 [ 25.685344] kunit_try_run_case+0x170/0x3f0 [ 25.685782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.686153] kthread+0x328/0x630 [ 25.686230] ret_from_fork+0x10/0x20 [ 25.686293] [ 25.686319] Allocated by task 265: [ 25.686788] kasan_save_stack+0x3c/0x68 [ 25.686871] kasan_save_track+0x20/0x40 [ 25.686938] kasan_save_alloc_info+0x40/0x58 [ 25.686990] __kasan_kmalloc+0xd4/0xd8 [ 25.687036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.687085] kasan_atomics+0xb8/0x2e0 [ 25.687168] kunit_try_run_case+0x170/0x3f0 [ 25.687232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.687300] kthread+0x328/0x630 [ 25.687342] ret_from_fork+0x10/0x20 [ 25.687434] [ 25.687627] The buggy address belongs to the object at fff00000c7884f80 [ 25.687627] which belongs to the cache kmalloc-64 of size 64 [ 25.687795] The buggy address is located 0 bytes to the right of [ 25.687795] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.688061] [ 25.688240] The buggy address belongs to the physical page: [ 25.688468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.688556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.688619] page_type: f5(slab) [ 25.689000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.689069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.689121] page dumped because: kasan: bad access detected [ 25.689161] [ 25.689186] Memory state around the buggy address: [ 25.689228] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.689492] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.689556] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.689709] ^ [ 25.689761] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.689861] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.689912] ================================================================== [ 25.738942] ================================================================== [ 25.739025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 25.739102] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.739162] [ 25.739209] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.739310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.739344] Hardware name: linux,dummy-virt (DT) [ 25.739385] Call trace: [ 25.739430] show_stack+0x20/0x38 (C) [ 25.739492] dump_stack_lvl+0x8c/0xd0 [ 25.739552] print_report+0x118/0x608 [ 25.739605] kasan_report+0xdc/0x128 [ 25.739660] kasan_check_range+0x100/0x1a8 [ 25.739717] __kasan_check_write+0x20/0x30 [ 25.739771] kasan_atomics_helper+0x1644/0x4858 [ 25.739827] kasan_atomics+0x198/0x2e0 [ 25.739879] kunit_try_run_case+0x170/0x3f0 [ 25.739935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.739995] kthread+0x328/0x630 [ 25.740045] ret_from_fork+0x10/0x20 [ 25.740102] [ 25.740127] Allocated by task 265: [ 25.740161] kasan_save_stack+0x3c/0x68 [ 25.740215] kasan_save_track+0x20/0x40 [ 25.740262] kasan_save_alloc_info+0x40/0x58 [ 25.740306] __kasan_kmalloc+0xd4/0xd8 [ 25.740350] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.740395] kasan_atomics+0xb8/0x2e0 [ 25.743057] kunit_try_run_case+0x170/0x3f0 [ 25.743731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.743853] kthread+0x328/0x630 [ 25.744019] ret_from_fork+0x10/0x20 [ 25.744297] [ 25.744443] The buggy address belongs to the object at fff00000c7884f80 [ 25.744443] which belongs to the cache kmalloc-64 of size 64 [ 25.745075] The buggy address is located 0 bytes to the right of [ 25.745075] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.745207] [ 25.745240] The buggy address belongs to the physical page: [ 25.745280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.746424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.746829] page_type: f5(slab) [ 25.746898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.747319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.747726] page dumped because: kasan: bad access detected [ 25.747774] [ 25.747801] Memory state around the buggy address: [ 25.747849] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.747903] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.747958] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.748006] ^ [ 25.748048] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.748100] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.748147] ================================================================== [ 25.727827] ================================================================== [ 25.728268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 25.728432] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.728497] [ 25.728542] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.728643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.728676] Hardware name: linux,dummy-virt (DT) [ 25.728717] Call trace: [ 25.728745] show_stack+0x20/0x38 (C) [ 25.728809] dump_stack_lvl+0x8c/0xd0 [ 25.728866] print_report+0x118/0x608 [ 25.728923] kasan_report+0xdc/0x128 [ 25.728977] __asan_report_load8_noabort+0x20/0x30 [ 25.729034] kasan_atomics_helper+0x3db0/0x4858 [ 25.729092] kasan_atomics+0x198/0x2e0 [ 25.729145] kunit_try_run_case+0x170/0x3f0 [ 25.729202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.729264] kthread+0x328/0x630 [ 25.731179] ret_from_fork+0x10/0x20 [ 25.732236] [ 25.732271] Allocated by task 265: [ 25.732313] kasan_save_stack+0x3c/0x68 [ 25.732385] kasan_save_track+0x20/0x40 [ 25.732449] kasan_save_alloc_info+0x40/0x58 [ 25.733042] __kasan_kmalloc+0xd4/0xd8 [ 25.733345] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.733614] kasan_atomics+0xb8/0x2e0 [ 25.734188] kunit_try_run_case+0x170/0x3f0 [ 25.734496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.734574] kthread+0x328/0x630 [ 25.734621] ret_from_fork+0x10/0x20 [ 25.734926] [ 25.735149] The buggy address belongs to the object at fff00000c7884f80 [ 25.735149] which belongs to the cache kmalloc-64 of size 64 [ 25.735581] The buggy address is located 0 bytes to the right of [ 25.735581] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.736193] [ 25.736529] The buggy address belongs to the physical page: [ 25.736745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.736855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.736925] page_type: f5(slab) [ 25.736979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.737040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.737091] page dumped because: kasan: bad access detected [ 25.737131] [ 25.737155] Memory state around the buggy address: [ 25.737199] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.737342] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.737407] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.737479] ^ [ 25.737548] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.737629] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.737683] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
Automatically assigned
[ 24.752725] ================================================================== [ 24.752947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 24.753121] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.753601] [ 24.753726] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.754018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.754220] Hardware name: linux,dummy-virt (DT) [ 24.754544] Call trace: [ 24.754607] show_stack+0x20/0x38 (C) [ 24.754869] dump_stack_lvl+0x8c/0xd0 [ 24.755044] print_report+0x118/0x608 [ 24.755339] kasan_report+0xdc/0x128 [ 24.755576] kasan_check_range+0x100/0x1a8 [ 24.755833] __kasan_check_write+0x20/0x30 [ 24.756067] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 24.756529] kasan_bitops_generic+0x110/0x1c8 [ 24.756648] kunit_try_run_case+0x170/0x3f0 [ 24.756831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.757124] kthread+0x328/0x630 [ 24.757441] ret_from_fork+0x10/0x20 [ 24.757565] [ 24.757876] Allocated by task 261: [ 24.757948] kasan_save_stack+0x3c/0x68 [ 24.758061] kasan_save_track+0x20/0x40 [ 24.758243] kasan_save_alloc_info+0x40/0x58 [ 24.758469] __kasan_kmalloc+0xd4/0xd8 [ 24.758678] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.758739] kasan_bitops_generic+0xa0/0x1c8 [ 24.758885] kunit_try_run_case+0x170/0x3f0 [ 24.759082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.759180] kthread+0x328/0x630 [ 24.759249] ret_from_fork+0x10/0x20 [ 24.759333] [ 24.759392] The buggy address belongs to the object at fff00000c66b10e0 [ 24.759392] which belongs to the cache kmalloc-16 of size 16 [ 24.759940] The buggy address is located 8 bytes inside of [ 24.759940] allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9) [ 24.760274] [ 24.760374] The buggy address belongs to the physical page: [ 24.760597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 24.760934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.761213] page_type: f5(slab) [ 24.761416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.761680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.761800] page dumped because: kasan: bad access detected [ 24.761890] [ 24.762258] Memory state around the buggy address: [ 24.762439] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 24.762540] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.762652] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 24.762757] ^ [ 24.763031] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763281] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763609] ================================================================== [ 24.855332] ================================================================== [ 24.855470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 24.855605] Read of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.855783] [ 24.855931] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.856238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.856309] Hardware name: linux,dummy-virt (DT) [ 24.856600] dump_stack_lvl+0x8c/0xd0 [ 24.856909] kasan_report+0xdc/0x128 [ 24.857783] kunit_try_run_case+0x170/0x3f0 [ 24.858191] ret_from_fork+0x10/0x20 [ 24.858313] [ 24.861377] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.864449] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.865271] dump_stack_lvl+0x8c/0xd0 [ 24.865789] __kasan_check_write+0x20/0x30 [ 24.866492] kthread+0x328/0x630 [ 24.867045] kasan_save_track+0x20/0x40 [ 24.867263] __kasan_kmalloc+0xd4/0xd8 [ 24.867539] kunit_try_run_case+0x170/0x3f0 [ 24.868377] [ 24.868608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 24.869527] Memory state around the buggy address: [ 24.870357] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.872097] ================================================================== [ 24.767294] ================================================================== [ 24.767468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 24.767622] Read of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.767735] [ 24.767827] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.768137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.768233] Hardware name: linux,dummy-virt (DT) [ 24.768322] Call trace: [ 24.768382] show_stack+0x20/0x38 (C) [ 24.768530] dump_stack_lvl+0x8c/0xd0 [ 24.768657] print_report+0x118/0x608 [ 24.768782] kasan_report+0xdc/0x128 [ 24.768899] __asan_report_load8_noabort+0x20/0x30 [ 24.769032] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 24.769222] kasan_bitops_generic+0x110/0x1c8 [ 24.769389] kunit_try_run_case+0x170/0x3f0 [ 24.769542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.769731] kthread+0x328/0x630 [ 24.769847] ret_from_fork+0x10/0x20 [ 24.769971] [ 24.770026] Allocated by task 261: [ 24.770132] kasan_save_stack+0x3c/0x68 [ 24.770277] kasan_save_track+0x20/0x40 [ 24.770441] kasan_save_alloc_info+0x40/0x58 [ 24.770539] __kasan_kmalloc+0xd4/0xd8 [ 24.770636] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.770719] kasan_bitops_generic+0xa0/0x1c8 [ 24.770810] kunit_try_run_case+0x170/0x3f0 [ 24.770912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.771029] kthread+0x328/0x630 [ 24.771133] ret_from_fork+0x10/0x20 [ 24.771271] [ 24.771324] The buggy address belongs to the object at fff00000c66b10e0 [ 24.771324] which belongs to the cache kmalloc-16 of size 16 [ 24.771476] The buggy address is located 8 bytes inside of [ 24.771476] allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9) [ 24.771618] [ 24.771674] The buggy address belongs to the physical page: [ 24.771757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 24.771879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.771984] page_type: f5(slab) [ 24.772102] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.772242] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.772391] page dumped because: kasan: bad access detected [ 24.772529] [ 24.772582] Memory state around the buggy address: [ 24.772664] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 24.773081] ^ [ 24.775828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.777168] kunit_try_run_case+0x170/0x3f0 [ 24.777440] kthread+0x328/0x630 [ 24.777537] ret_from_fork+0x10/0x20 [ 24.777645] [ 24.777698] Allocated by task 261: [ 24.777767] kasan_save_stack+0x3c/0x68 [ 24.778243] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.780571] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 24.782466] [ 24.783008] Call trace: [ 24.783748] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 24.784609] [ 24.785147] __kasan_kmalloc+0xd4/0xd8 [ 24.786126] The buggy address is located 8 bytes inside of [ 24.786126] allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9) [ 24.789249] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.791381] [ 24.791487] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.793607] __kasan_check_write+0x20/0x30 [ 24.794109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.795261] kasan_save_track+0x20/0x40 [ 24.797631] [ 24.798747] page dumped because: kasan: bad access detected [ 24.799100] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.800930] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.801380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.802265] kasan_report+0xdc/0x128 [ 24.802770] kasan_check_range+0x100/0x1a8 [ 24.803233] kasan_bitops_generic+0x110/0x1c8 [ 24.804490] Allocated by task 261: [ 24.804789] kasan_save_alloc_info+0x40/0x58 [ 24.805802] kthread+0x328/0x630 [ 24.805892] ret_from_fork+0x10/0x20 [ 24.805986] [ 24.806061] The buggy address belongs to the object at fff00000c66b10e0 [ 24.806061] which belongs to the cache kmalloc-16 of size 16 [ 24.807026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.807424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.809000] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.814379] kunit_try_run_case+0x170/0x3f0 [ 24.816489] kthread+0x328/0x630 [ 24.819108] page_type: f5(slab) [ 24.819345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.821288] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.825413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 24.826173] [ 24.828028] Call trace: [ 24.828197] show_stack+0x20/0x38 (C) [ 24.828668] print_report+0x118/0x608 [ 24.829734] __kasan_check_write+0x20/0x30 [ 24.830572] kasan_bitops_generic+0x110/0x1c8 [ 24.832298] ret_from_fork+0x10/0x20 [ 24.833179] kasan_save_stack+0x3c/0x68 [ 24.833871] kasan_save_alloc_info+0x40/0x58 [ 24.835090] [ 24.835150] The buggy address belongs to the object at fff00000c66b10e0 [ 24.835150] which belongs to the cache kmalloc-16 of size 16 [ 24.836767] page_type: f5(slab) [ 24.837148] page dumped because: kasan: bad access detected [ 24.838652] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.843655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
Automatically assigned
[ 24.715853] ================================================================== [ 24.716181] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 24.716380] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259 [ 24.716513] [ 24.716608] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.716832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.716904] Hardware name: linux,dummy-virt (DT) [ 24.716988] Call trace: [ 24.717055] show_stack+0x20/0x38 (C) [ 24.718969] dump_stack_lvl+0x8c/0xd0 [ 24.719380] print_report+0x118/0x608 [ 24.719525] kasan_report+0xdc/0x128 [ 24.719862] __asan_report_load1_noabort+0x20/0x30 [ 24.720120] strnlen+0x80/0x88 [ 24.720248] kasan_strings+0x478/0xb00 [ 24.720367] kunit_try_run_case+0x170/0x3f0 [ 24.720648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.721268] kthread+0x328/0x630 [ 24.721880] ret_from_fork+0x10/0x20 [ 24.722576] [ 24.723012] Allocated by task 259: [ 24.723098] kasan_save_stack+0x3c/0x68 [ 24.723224] kasan_save_track+0x20/0x40 [ 24.723317] kasan_save_alloc_info+0x40/0x58 [ 24.723680] __kasan_kmalloc+0xd4/0xd8 [ 24.724570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.724736] kasan_strings+0xc8/0xb00 [ 24.724843] kunit_try_run_case+0x170/0x3f0 [ 24.724963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.725077] kthread+0x328/0x630 [ 24.725167] ret_from_fork+0x10/0x20 [ 24.725260] [ 24.725980] Freed by task 259: [ 24.726071] kasan_save_stack+0x3c/0x68 [ 24.726602] kasan_save_track+0x20/0x40 [ 24.726773] kasan_save_free_info+0x4c/0x78 [ 24.726896] __kasan_slab_free+0x6c/0x98 [ 24.727009] kfree+0x214/0x3c8 [ 24.727102] kasan_strings+0x24c/0xb00 [ 24.727226] kunit_try_run_case+0x170/0x3f0 [ 24.727336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.727534] kthread+0x328/0x630 [ 24.727695] ret_from_fork+0x10/0x20 [ 24.728012] [ 24.728135] The buggy address belongs to the object at fff00000c7876240 [ 24.728135] which belongs to the cache kmalloc-32 of size 32 [ 24.728489] The buggy address is located 16 bytes inside of [ 24.728489] freed 32-byte region [fff00000c7876240, fff00000c7876260) [ 24.728756] [ 24.728911] The buggy address belongs to the physical page: [ 24.728996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876 [ 24.729160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.729674] page_type: f5(slab) [ 24.729809] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.729998] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 24.730318] page dumped because: kasan: bad access detected [ 24.730469] [ 24.730523] Memory state around the buggy address: [ 24.730575] fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.730633] fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 24.730683] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.730728] ^ [ 24.730773] fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.730835] fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.730884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
Automatically assigned
[ 24.569752] ================================================================== [ 24.569956] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 24.570129] Read of size 1 at addr ffff800080ac7b4a by task kunit_try_catch/253 [ 24.570265] [ 24.570360] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.570605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.570680] Hardware name: linux,dummy-virt (DT) [ 24.570763] Call trace: [ 24.570834] show_stack+0x20/0x38 (C) [ 24.570971] dump_stack_lvl+0x8c/0xd0 [ 24.571102] print_report+0x310/0x608 [ 24.571223] kasan_report+0xdc/0x128 [ 24.571346] __asan_report_load1_noabort+0x20/0x30 [ 24.571473] kasan_alloca_oob_right+0x2dc/0x340 [ 24.571587] kunit_try_run_case+0x170/0x3f0 [ 24.571716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.571896] kthread+0x328/0x630 [ 24.572011] ret_from_fork+0x10/0x20 [ 24.572138] [ 24.572216] The buggy address belongs to stack of task kunit_try_catch/253 [ 24.572364] [ 24.572437] The buggy address belongs to the virtual mapping at [ 24.572437] [ffff800080ac0000, ffff800080ac9000) created by: [ 24.572437] kernel_clone+0x150/0x7a8 [ 24.572589] [ 24.572942] The buggy address belongs to the physical page: [ 24.573030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.573149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.573830] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.574011] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.574171] page dumped because: kasan: bad access detected [ 24.574302] [ 24.574470] Memory state around the buggy address: [ 24.574572] ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.574951] ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.575105] >ffff800080ac7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 24.575291] ^ [ 24.575575] ffff800080ac7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 24.575684] ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 24.576211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
Automatically assigned
[ 24.694265] ================================================================== [ 24.695464] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 24.695736] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259 [ 24.696152] [ 24.696705] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.697182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.697274] Hardware name: linux,dummy-virt (DT) [ 24.697362] Call trace: [ 24.697630] show_stack+0x20/0x38 (C) [ 24.697903] dump_stack_lvl+0x8c/0xd0 [ 24.698286] print_report+0x118/0x608 [ 24.698423] kasan_report+0xdc/0x128 [ 24.698552] __asan_report_load1_noabort+0x20/0x30 [ 24.698670] strlen+0xa8/0xb0 [ 24.698759] kasan_strings+0x418/0xb00 [ 24.698880] kunit_try_run_case+0x170/0x3f0 [ 24.699002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.699676] kthread+0x328/0x630 [ 24.700274] ret_from_fork+0x10/0x20 [ 24.700582] [ 24.700697] Allocated by task 259: [ 24.700894] kasan_save_stack+0x3c/0x68 [ 24.701007] kasan_save_track+0x20/0x40 [ 24.701354] kasan_save_alloc_info+0x40/0x58 [ 24.701472] __kasan_kmalloc+0xd4/0xd8 [ 24.701780] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.701887] kasan_strings+0xc8/0xb00 [ 24.702246] kunit_try_run_case+0x170/0x3f0 [ 24.702584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.702955] kthread+0x328/0x630 [ 24.703058] ret_from_fork+0x10/0x20 [ 24.703368] [ 24.703517] Freed by task 259: [ 24.703851] kasan_save_stack+0x3c/0x68 [ 24.704009] kasan_save_track+0x20/0x40 [ 24.704541] kasan_save_free_info+0x4c/0x78 [ 24.704707] __kasan_slab_free+0x6c/0x98 [ 24.704812] kfree+0x214/0x3c8 [ 24.704917] kasan_strings+0x24c/0xb00 [ 24.705011] kunit_try_run_case+0x170/0x3f0 [ 24.705112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.705804] kthread+0x328/0x630 [ 24.705936] ret_from_fork+0x10/0x20 [ 24.706109] [ 24.706303] The buggy address belongs to the object at fff00000c7876240 [ 24.706303] which belongs to the cache kmalloc-32 of size 32 [ 24.706653] The buggy address is located 16 bytes inside of [ 24.706653] freed 32-byte region [fff00000c7876240, fff00000c7876260) [ 24.706788] [ 24.706842] The buggy address belongs to the physical page: [ 24.706913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876 [ 24.707041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.707177] page_type: f5(slab) [ 24.707284] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.707844] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 24.708254] page dumped because: kasan: bad access detected [ 24.708594] [ 24.708681] Memory state around the buggy address: [ 24.708911] fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.709161] fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 24.709424] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.709608] ^ [ 24.710328] fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.710875] fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.710985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
Automatically assigned
[ 24.679852] ================================================================== [ 24.680075] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 24.680272] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259 [ 24.680444] [ 24.680532] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.680785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.680858] Hardware name: linux,dummy-virt (DT) [ 24.680947] Call trace: [ 24.681010] show_stack+0x20/0x38 (C) [ 24.681234] dump_stack_lvl+0x8c/0xd0 [ 24.681419] print_report+0x118/0x608 [ 24.681565] kasan_report+0xdc/0x128 [ 24.681673] __asan_report_load1_noabort+0x20/0x30 [ 24.681811] kasan_strings+0x95c/0xb00 [ 24.681964] kunit_try_run_case+0x170/0x3f0 [ 24.682088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.682263] kthread+0x328/0x630 [ 24.682515] ret_from_fork+0x10/0x20 [ 24.682653] [ 24.682684] Allocated by task 259: [ 24.682757] kasan_save_stack+0x3c/0x68 [ 24.682863] kasan_save_track+0x20/0x40 [ 24.682948] kasan_save_alloc_info+0x40/0x58 [ 24.683237] __kasan_kmalloc+0xd4/0xd8 [ 24.683347] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.683712] kasan_strings+0xc8/0xb00 [ 24.684013] kunit_try_run_case+0x170/0x3f0 [ 24.684132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.684254] kthread+0x328/0x630 [ 24.684341] ret_from_fork+0x10/0x20 [ 24.684637] [ 24.684722] Freed by task 259: [ 24.685032] kasan_save_stack+0x3c/0x68 [ 24.685163] kasan_save_track+0x20/0x40 [ 24.685264] kasan_save_free_info+0x4c/0x78 [ 24.685554] __kasan_slab_free+0x6c/0x98 [ 24.685688] kfree+0x214/0x3c8 [ 24.685782] kasan_strings+0x24c/0xb00 [ 24.685889] kunit_try_run_case+0x170/0x3f0 [ 24.685999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.686111] kthread+0x328/0x630 [ 24.686199] ret_from_fork+0x10/0x20 [ 24.686300] [ 24.686950] The buggy address belongs to the object at fff00000c7876240 [ 24.686950] which belongs to the cache kmalloc-32 of size 32 [ 24.687114] The buggy address is located 16 bytes inside of [ 24.687114] freed 32-byte region [fff00000c7876240, fff00000c7876260) [ 24.687254] [ 24.687314] The buggy address belongs to the physical page: [ 24.688052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876 [ 24.688466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.688794] page_type: f5(slab) [ 24.688902] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.689733] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 24.689911] page dumped because: kasan: bad access detected [ 24.690151] [ 24.690412] Memory state around the buggy address: [ 24.690559] fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.690963] fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 24.691081] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.691174] ^ [ 24.691479] fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.691818] fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.692047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
Automatically assigned
[ 24.669352] ================================================================== [ 24.669526] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 24.669679] Read of size 1 at addr fff00000c7876250 by task kunit_try_catch/259 [ 24.669887] [ 24.670006] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.670279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.670433] Hardware name: linux,dummy-virt (DT) [ 24.670525] Call trace: [ 24.670623] show_stack+0x20/0x38 (C) [ 24.670801] dump_stack_lvl+0x8c/0xd0 [ 24.670979] print_report+0x118/0x608 [ 24.671148] kasan_report+0xdc/0x128 [ 24.671310] __asan_report_load1_noabort+0x20/0x30 [ 24.671490] strcmp+0xc0/0xc8 [ 24.671654] kasan_strings+0x340/0xb00 [ 24.671788] kunit_try_run_case+0x170/0x3f0 [ 24.671975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.672123] kthread+0x328/0x630 [ 24.672336] ret_from_fork+0x10/0x20 [ 24.672505] [ 24.672562] Allocated by task 259: [ 24.672634] kasan_save_stack+0x3c/0x68 [ 24.672781] kasan_save_track+0x20/0x40 [ 24.672867] kasan_save_alloc_info+0x40/0x58 [ 24.672986] __kasan_kmalloc+0xd4/0xd8 [ 24.673077] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.673201] kasan_strings+0xc8/0xb00 [ 24.673414] kunit_try_run_case+0x170/0x3f0 [ 24.673591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.673742] kthread+0x328/0x630 [ 24.673864] ret_from_fork+0x10/0x20 [ 24.673955] [ 24.674013] Freed by task 259: [ 24.674101] kasan_save_stack+0x3c/0x68 [ 24.674197] kasan_save_track+0x20/0x40 [ 24.674410] kasan_save_free_info+0x4c/0x78 [ 24.674513] __kasan_slab_free+0x6c/0x98 [ 24.674622] kfree+0x214/0x3c8 [ 24.674756] kasan_strings+0x24c/0xb00 [ 24.674939] kunit_try_run_case+0x170/0x3f0 [ 24.675126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.675252] kthread+0x328/0x630 [ 24.675443] ret_from_fork+0x10/0x20 [ 24.675570] [ 24.675632] The buggy address belongs to the object at fff00000c7876240 [ 24.675632] which belongs to the cache kmalloc-32 of size 32 [ 24.675777] The buggy address is located 16 bytes inside of [ 24.675777] freed 32-byte region [fff00000c7876240, fff00000c7876260) [ 24.675974] [ 24.676038] The buggy address belongs to the physical page: [ 24.676137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876 [ 24.676295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.676436] page_type: f5(slab) [ 24.676601] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.676728] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 24.676868] page dumped because: kasan: bad access detected [ 24.677028] [ 24.677109] Memory state around the buggy address: [ 24.677206] fff00000c7876100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.677327] fff00000c7876180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 24.677453] >fff00000c7876200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.677563] ^ [ 24.677666] fff00000c7876280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 24.677801] fff00000c7876300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.677911] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
Automatically assigned
[ 24.629730] ================================================================== [ 24.629926] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 24.630110] Read of size 1 at addr fff00000c78760d8 by task kunit_try_catch/257 [ 24.630246] [ 24.630351] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.630578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.630761] Hardware name: linux,dummy-virt (DT) [ 24.630869] Call trace: [ 24.630930] show_stack+0x20/0x38 (C) [ 24.631086] dump_stack_lvl+0x8c/0xd0 [ 24.631214] print_report+0x118/0x608 [ 24.631359] kasan_report+0xdc/0x128 [ 24.631496] __asan_report_load1_noabort+0x20/0x30 [ 24.631640] memcmp+0x198/0x1d8 [ 24.631759] kasan_memcmp+0x16c/0x300 [ 24.631959] kunit_try_run_case+0x170/0x3f0 [ 24.632087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.632283] kthread+0x328/0x630 [ 24.632431] ret_from_fork+0x10/0x20 [ 24.632547] [ 24.632590] Allocated by task 257: [ 24.632662] kasan_save_stack+0x3c/0x68 [ 24.632768] kasan_save_track+0x20/0x40 [ 24.632952] kasan_save_alloc_info+0x40/0x58 [ 24.633052] __kasan_kmalloc+0xd4/0xd8 [ 24.633174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.633285] kasan_memcmp+0xbc/0x300 [ 24.633374] kunit_try_run_case+0x170/0x3f0 [ 24.633494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.633665] kthread+0x328/0x630 [ 24.633754] ret_from_fork+0x10/0x20 [ 24.633842] [ 24.633895] The buggy address belongs to the object at fff00000c78760c0 [ 24.633895] which belongs to the cache kmalloc-32 of size 32 [ 24.634120] The buggy address is located 0 bytes to the right of [ 24.634120] allocated 24-byte region [fff00000c78760c0, fff00000c78760d8) [ 24.634408] [ 24.634477] The buggy address belongs to the physical page: [ 24.634590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107876 [ 24.634747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.634971] page_type: f5(slab) [ 24.635122] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.635236] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 24.635591] page dumped because: kasan: bad access detected [ 24.635698] [ 24.635753] Memory state around the buggy address: [ 24.635811] fff00000c7875f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.635866] fff00000c7876000: 00 00 00 fc fc fc fc fc 00 00 00 03 fc fc fc fc [ 24.635918] >fff00000c7876080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.635964] ^ [ 24.636010] fff00000c7876100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.636059] fff00000c7876180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.636105] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
Automatically assigned
[ 24.542243] ================================================================== [ 24.543056] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 24.543545] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/251 [ 24.543671] [ 24.543765] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.543992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.544068] Hardware name: linux,dummy-virt (DT) [ 24.544152] Call trace: [ 24.544214] show_stack+0x20/0x38 (C) [ 24.544347] dump_stack_lvl+0x8c/0xd0 [ 24.544490] print_report+0x310/0x608 [ 24.544621] kasan_report+0xdc/0x128 [ 24.545275] __asan_report_load1_noabort+0x20/0x30 [ 24.545589] kasan_alloca_oob_left+0x2b8/0x310 [ 24.545725] kunit_try_run_case+0x170/0x3f0 [ 24.545848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.545985] kthread+0x328/0x630 [ 24.546202] ret_from_fork+0x10/0x20 [ 24.546350] [ 24.546427] The buggy address belongs to stack of task kunit_try_catch/251 [ 24.546796] [ 24.546912] The buggy address belongs to the virtual mapping at [ 24.546912] [ffff800080ac0000, ffff800080ac9000) created by: [ 24.546912] kernel_clone+0x150/0x7a8 [ 24.547127] [ 24.547229] The buggy address belongs to the physical page: [ 24.547428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.547602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.547818] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.547965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.548063] page dumped because: kasan: bad access detected [ 24.548140] [ 24.548182] Memory state around the buggy address: [ 24.548431] ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.548536] ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.548646] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 24.548800] ^ [ 24.548952] ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 24.549116] ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 24.549262] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
Automatically assigned
[ 24.511432] ================================================================== [ 24.511935] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 24.512113] Read of size 1 at addr ffff800080a67c2a by task kunit_try_catch/249 [ 24.512242] [ 24.512327] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.512557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.512689] Hardware name: linux,dummy-virt (DT) [ 24.512976] Call trace: [ 24.513046] show_stack+0x20/0x38 (C) [ 24.513177] dump_stack_lvl+0x8c/0xd0 [ 24.513447] print_report+0x310/0x608 [ 24.513579] kasan_report+0xdc/0x128 [ 24.513695] __asan_report_load1_noabort+0x20/0x30 [ 24.513823] kasan_stack_oob+0x238/0x270 [ 24.514414] kunit_try_run_case+0x170/0x3f0 [ 24.514564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.514704] kthread+0x328/0x630 [ 24.514865] ret_from_fork+0x10/0x20 [ 24.515016] [ 24.515160] The buggy address belongs to stack of task kunit_try_catch/249 [ 24.515370] and is located at offset 138 in frame: [ 24.515496] kasan_stack_oob+0x0/0x270 [ 24.515757] [ 24.515820] This frame has 4 objects: [ 24.516307] [48, 49) '__assertion' [ 24.516441] [64, 72) 'array' [ 24.516525] [96, 112) '__assertion' [ 24.516779] [128, 138) 'stack_array' [ 24.516885] [ 24.517001] The buggy address belongs to the virtual mapping at [ 24.517001] [ffff800080a60000, ffff800080a69000) created by: [ 24.517001] kernel_clone+0x150/0x7a8 [ 24.517541] [ 24.517639] The buggy address belongs to the physical page: [ 24.517766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107256 [ 24.517910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.518107] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.518293] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.518454] page dumped because: kasan: bad access detected [ 24.518540] [ 24.518586] Memory state around the buggy address: [ 24.518919] ffff800080a67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.519046] ffff800080a67b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 24.519146] >ffff800080a67c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 24.519230] ^ [ 24.519309] ffff800080a67c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 24.519454] ffff800080a67d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 24.519560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
Automatically assigned
[ 24.477477] ================================================================== [ 24.477670] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 24.477828] Read of size 1 at addr ffffa940d57b258d by task kunit_try_catch/245 [ 24.477934] [ 24.478029] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.478209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.478265] Hardware name: linux,dummy-virt (DT) [ 24.478336] Call trace: [ 24.478464] show_stack+0x20/0x38 (C) [ 24.478588] dump_stack_lvl+0x8c/0xd0 [ 24.478699] print_report+0x310/0x608 [ 24.478793] kasan_report+0xdc/0x128 [ 24.478905] __asan_report_load1_noabort+0x20/0x30 [ 24.479017] kasan_global_oob_right+0x230/0x270 [ 24.479120] kunit_try_run_case+0x170/0x3f0 [ 24.479248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.479372] kthread+0x328/0x630 [ 24.479479] ret_from_fork+0x10/0x20 [ 24.479770] [ 24.479885] The buggy address belongs to the variable: [ 24.479957] global_array+0xd/0x40 [ 24.480062] [ 24.480205] The buggy address belongs to the virtual mapping at [ 24.480205] [ffffa940d3950000, ffffa940d5871000) created by: [ 24.480205] paging_init+0x66c/0x7d0 [ 24.480419] [ 24.480552] The buggy address belongs to the physical page: [ 24.480641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db2 [ 24.480761] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 24.480920] raw: 03fffe0000002000 ffffc1ffc01f6c88 ffffc1ffc01f6c88 0000000000000000 [ 24.481041] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.481131] page dumped because: kasan: bad access detected [ 24.481191] [ 24.481230] Memory state around the buggy address: [ 24.481314] ffffa940d57b2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.481478] ffffa940d57b2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 24.481596] >ffffa940d57b2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 24.481675] ^ [ 24.481743] ffffa940d57b2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 24.481827] ffffa940d57b2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.481911] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
Automatically assigned
[ 24.440377] ================================================================== [ 24.440579] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 24.440778] Free of addr fff00000c7988001 by task kunit_try_catch/243 [ 24.440889] [ 24.440983] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.441201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.441271] Hardware name: linux,dummy-virt (DT) [ 24.441352] Call trace: [ 24.441432] show_stack+0x20/0x38 (C) [ 24.441553] dump_stack_lvl+0x8c/0xd0 [ 24.441990] print_report+0x118/0x608 [ 24.442110] kasan_report_invalid_free+0xc0/0xe8 [ 24.442294] __kasan_mempool_poison_object+0xfc/0x150 [ 24.442525] mempool_free+0x28c/0x328 [ 24.442649] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 24.442790] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 24.442996] kunit_try_run_case+0x170/0x3f0 [ 24.443166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.443351] kthread+0x328/0x630 [ 24.443480] ret_from_fork+0x10/0x20 [ 24.443612] [ 24.443869] The buggy address belongs to the physical page: [ 24.443951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107988 [ 24.444084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.444179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.444297] page_type: f8(unknown) [ 24.444676] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.444810] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.444920] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.445035] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.445196] head: 0bfffe0000000002 ffffc1ffc31e6201 00000000ffffffff 00000000ffffffff [ 24.445353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.445513] page dumped because: kasan: bad access detected [ 24.445687] [ 24.445760] Memory state around the buggy address: [ 24.445868] fff00000c7987f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.445976] fff00000c7987f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.446082] >fff00000c7988000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.446421] ^ [ 24.446539] fff00000c7988080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.446691] fff00000c7988100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.446864] ================================================================== [ 24.411546] ================================================================== [ 24.411734] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 24.411958] Free of addr fff00000c66adb01 by task kunit_try_catch/241 [ 24.412052] [ 24.412136] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.412309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.412371] Hardware name: linux,dummy-virt (DT) [ 24.412471] Call trace: [ 24.412529] show_stack+0x20/0x38 (C) [ 24.412669] dump_stack_lvl+0x8c/0xd0 [ 24.412847] print_report+0x118/0x608 [ 24.412968] kasan_report_invalid_free+0xc0/0xe8 [ 24.413095] check_slab_allocation+0xfc/0x108 [ 24.413219] __kasan_mempool_poison_object+0x78/0x150 [ 24.413345] mempool_free+0x28c/0x328 [ 24.413460] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 24.413580] mempool_kmalloc_invalid_free+0xc0/0x118 [ 24.414415] kunit_try_run_case+0x170/0x3f0 [ 24.414594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.414710] kthread+0x328/0x630 [ 24.414805] ret_from_fork+0x10/0x20 [ 24.414979] [ 24.415017] Allocated by task 241: [ 24.415082] kasan_save_stack+0x3c/0x68 [ 24.415237] kasan_save_track+0x20/0x40 [ 24.415351] kasan_save_alloc_info+0x40/0x58 [ 24.415447] __kasan_mempool_unpoison_object+0x11c/0x180 [ 24.415578] remove_element+0x130/0x1f8 [ 24.415677] mempool_alloc_preallocated+0x58/0xc0 [ 24.415838] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 24.415942] mempool_kmalloc_invalid_free+0xc0/0x118 [ 24.416084] kunit_try_run_case+0x170/0x3f0 [ 24.416167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.416270] kthread+0x328/0x630 [ 24.416361] ret_from_fork+0x10/0x20 [ 24.416504] [ 24.416579] The buggy address belongs to the object at fff00000c66adb00 [ 24.416579] which belongs to the cache kmalloc-128 of size 128 [ 24.416784] The buggy address is located 1 bytes inside of [ 24.416784] 128-byte region [fff00000c66adb00, fff00000c66adb80) [ 24.416948] [ 24.416996] The buggy address belongs to the physical page: [ 24.417074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad [ 24.417257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.417397] page_type: f5(slab) [ 24.417498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.417616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.417769] page dumped because: kasan: bad access detected [ 24.417861] [ 24.417904] Memory state around the buggy address: [ 24.418018] fff00000c66ada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.418154] fff00000c66ada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.418319] >fff00000c66adb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.418457] ^ [ 24.418560] fff00000c66adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.418736] fff00000c66adc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.418849] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
Automatically assigned
[ 24.311566] ================================================================== [ 24.311755] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 24.312385] Free of addr fff00000c66ad700 by task kunit_try_catch/235 [ 24.312695] [ 24.312802] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.313055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.313134] Hardware name: linux,dummy-virt (DT) [ 24.313230] Call trace: [ 24.313286] show_stack+0x20/0x38 (C) [ 24.313431] dump_stack_lvl+0x8c/0xd0 [ 24.313541] print_report+0x118/0x608 [ 24.313663] kasan_report_invalid_free+0xc0/0xe8 [ 24.313788] check_slab_allocation+0xd4/0x108 [ 24.313908] __kasan_mempool_poison_object+0x78/0x150 [ 24.314376] mempool_free+0x28c/0x328 [ 24.315063] mempool_double_free_helper+0x150/0x2e8 [ 24.315293] mempool_kmalloc_double_free+0xc0/0x118 [ 24.315735] kunit_try_run_case+0x170/0x3f0 [ 24.315918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.316318] kthread+0x328/0x630 [ 24.316442] ret_from_fork+0x10/0x20 [ 24.316557] [ 24.317091] Allocated by task 235: [ 24.317206] kasan_save_stack+0x3c/0x68 [ 24.317548] kasan_save_track+0x20/0x40 [ 24.317818] kasan_save_alloc_info+0x40/0x58 [ 24.317922] __kasan_mempool_unpoison_object+0x11c/0x180 [ 24.318025] remove_element+0x130/0x1f8 [ 24.318116] mempool_alloc_preallocated+0x58/0xc0 [ 24.318217] mempool_double_free_helper+0x94/0x2e8 [ 24.318313] mempool_kmalloc_double_free+0xc0/0x118 [ 24.318443] kunit_try_run_case+0x170/0x3f0 [ 24.318542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.318648] kthread+0x328/0x630 [ 24.318730] ret_from_fork+0x10/0x20 [ 24.318822] [ 24.318868] Freed by task 235: [ 24.318934] kasan_save_stack+0x3c/0x68 [ 24.319072] kasan_save_track+0x20/0x40 [ 24.319151] kasan_save_free_info+0x4c/0x78 [ 24.319229] __kasan_mempool_poison_object+0xc0/0x150 [ 24.319358] mempool_free+0x28c/0x328 [ 24.319459] mempool_double_free_helper+0x100/0x2e8 [ 24.319545] mempool_kmalloc_double_free+0xc0/0x118 [ 24.319628] kunit_try_run_case+0x170/0x3f0 [ 24.319710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.319834] kthread+0x328/0x630 [ 24.319922] ret_from_fork+0x10/0x20 [ 24.319998] [ 24.320053] The buggy address belongs to the object at fff00000c66ad700 [ 24.320053] which belongs to the cache kmalloc-128 of size 128 [ 24.320201] The buggy address is located 0 bytes inside of [ 24.320201] 128-byte region [fff00000c66ad700, fff00000c66ad780) [ 24.320333] [ 24.320390] The buggy address belongs to the physical page: [ 24.320496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad [ 24.320637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.320764] page_type: f5(slab) [ 24.320863] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.320996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.321096] page dumped because: kasan: bad access detected [ 24.321160] [ 24.321193] Memory state around the buggy address: [ 24.321250] fff00000c66ad600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.321326] fff00000c66ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.321454] >fff00000c66ad700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.321545] ^ [ 24.321642] fff00000c66ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.321730] fff00000c66ad800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.321804] ================================================================== [ 24.349140] ================================================================== [ 24.349331] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 24.352089] Free of addr fff00000c78a4000 by task kunit_try_catch/237 [ 24.352459] [ 24.353071] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.354147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.354515] Hardware name: linux,dummy-virt (DT) [ 24.354603] Call trace: [ 24.354656] show_stack+0x20/0x38 (C) [ 24.354782] dump_stack_lvl+0x8c/0xd0 [ 24.354897] print_report+0x118/0x608 [ 24.355009] kasan_report_invalid_free+0xc0/0xe8 [ 24.355124] __kasan_mempool_poison_object+0x14c/0x150 [ 24.355239] mempool_free+0x28c/0x328 [ 24.355346] mempool_double_free_helper+0x150/0x2e8 [ 24.357001] mempool_kmalloc_large_double_free+0xc0/0x118 [ 24.357854] kunit_try_run_case+0x170/0x3f0 [ 24.358441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.358581] kthread+0x328/0x630 [ 24.358669] ret_from_fork+0x10/0x20 [ 24.358772] [ 24.358837] The buggy address belongs to the physical page: [ 24.358914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4 [ 24.359053] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.359185] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.359328] page_type: f8(unknown) [ 24.359441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.359572] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.359704] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.359830] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.359957] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff [ 24.360085] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.360569] page dumped because: kasan: bad access detected [ 24.360651] [ 24.360694] Memory state around the buggy address: [ 24.360770] fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.360879] fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.361480] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.361580] ^ [ 24.361626] fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.361712] fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.361793] ================================================================== [ 24.385008] ================================================================== [ 24.385189] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 24.385346] Free of addr fff00000c78a4000 by task kunit_try_catch/239 [ 24.385467] [ 24.385559] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.385775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.385844] Hardware name: linux,dummy-virt (DT) [ 24.385924] Call trace: [ 24.385977] show_stack+0x20/0x38 (C) [ 24.386101] dump_stack_lvl+0x8c/0xd0 [ 24.386224] print_report+0x118/0x608 [ 24.386339] kasan_report_invalid_free+0xc0/0xe8 [ 24.387231] __kasan_mempool_poison_pages+0xe0/0xe8 [ 24.387517] mempool_free+0x24c/0x328 [ 24.387796] mempool_double_free_helper+0x150/0x2e8 [ 24.387922] mempool_page_alloc_double_free+0xbc/0x118 [ 24.388104] kunit_try_run_case+0x170/0x3f0 [ 24.388334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.388622] kthread+0x328/0x630 [ 24.389227] ret_from_fork+0x10/0x20 [ 24.389580] [ 24.389694] The buggy address belongs to the physical page: [ 24.389774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4 [ 24.390297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.390526] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.391008] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.391272] page dumped because: kasan: bad access detected [ 24.391575] [ 24.391642] Memory state around the buggy address: [ 24.391828] fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.391935] fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.392128] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.392472] ^ [ 24.392553] fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.393251] fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.393497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 24.206603] ================================================================== [ 24.207618] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 24.208113] Read of size 1 at addr fff00000c78a4000 by task kunit_try_catch/229 [ 24.208253] [ 24.208347] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.209497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.209845] Hardware name: linux,dummy-virt (DT) [ 24.210088] Call trace: [ 24.210198] show_stack+0x20/0x38 (C) [ 24.210789] dump_stack_lvl+0x8c/0xd0 [ 24.211112] print_report+0x118/0x608 [ 24.211436] kasan_report+0xdc/0x128 [ 24.211966] __asan_report_load1_noabort+0x20/0x30 [ 24.212113] mempool_uaf_helper+0x314/0x340 [ 24.212482] mempool_kmalloc_large_uaf+0xc4/0x120 [ 24.212887] kunit_try_run_case+0x170/0x3f0 [ 24.213016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.213428] kthread+0x328/0x630 [ 24.213986] ret_from_fork+0x10/0x20 [ 24.214501] [ 24.214636] The buggy address belongs to the physical page: [ 24.214984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4 [ 24.215147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.215237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.215351] page_type: f8(unknown) [ 24.215453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.215569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.216681] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.217005] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.217252] head: 0bfffe0000000002 ffffc1ffc31e2901 00000000ffffffff 00000000ffffffff [ 24.217614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.217729] page dumped because: kasan: bad access detected [ 24.218097] [ 24.218278] Memory state around the buggy address: [ 24.218369] fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.218740] fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.219014] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.219090] ^ [ 24.219149] fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.219242] fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.219336] ================================================================== [ 24.290697] ================================================================== [ 24.290995] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 24.291165] Read of size 1 at addr fff00000c78a4000 by task kunit_try_catch/233 [ 24.291292] [ 24.291390] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.291600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.292384] Hardware name: linux,dummy-virt (DT) [ 24.292626] Call trace: [ 24.292838] show_stack+0x20/0x38 (C) [ 24.292980] dump_stack_lvl+0x8c/0xd0 [ 24.293256] print_report+0x118/0x608 [ 24.293380] kasan_report+0xdc/0x128 [ 24.293585] __asan_report_load1_noabort+0x20/0x30 [ 24.293694] mempool_uaf_helper+0x314/0x340 [ 24.293753] mempool_page_alloc_uaf+0xc0/0x118 [ 24.293809] kunit_try_run_case+0x170/0x3f0 [ 24.293868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.293928] kthread+0x328/0x630 [ 24.293978] ret_from_fork+0x10/0x20 [ 24.294037] [ 24.294065] The buggy address belongs to the physical page: [ 24.294104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a4 [ 24.294170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.294253] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.294311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.294373] page dumped because: kasan: bad access detected [ 24.294457] [ 24.294494] Memory state around the buggy address: [ 24.294564] fff00000c78a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.294663] fff00000c78a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.294763] >fff00000c78a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.294907] ^ [ 24.294997] fff00000c78a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.295106] fff00000c78a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.295204] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 24.169725] ================================================================== [ 24.170018] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 24.170649] Read of size 1 at addr fff00000c66ad300 by task kunit_try_catch/227 [ 24.170759] [ 24.170858] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.171072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.171147] Hardware name: linux,dummy-virt (DT) [ 24.171233] Call trace: [ 24.171346] show_stack+0x20/0x38 (C) [ 24.172017] dump_stack_lvl+0x8c/0xd0 [ 24.172535] print_report+0x118/0x608 [ 24.172741] kasan_report+0xdc/0x128 [ 24.172987] __asan_report_load1_noabort+0x20/0x30 [ 24.173610] mempool_uaf_helper+0x314/0x340 [ 24.173781] mempool_kmalloc_uaf+0xc4/0x120 [ 24.174004] kunit_try_run_case+0x170/0x3f0 [ 24.174206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.174348] kthread+0x328/0x630 [ 24.174928] ret_from_fork+0x10/0x20 [ 24.175175] [ 24.175255] Allocated by task 227: [ 24.175435] kasan_save_stack+0x3c/0x68 [ 24.175735] kasan_save_track+0x20/0x40 [ 24.175823] kasan_save_alloc_info+0x40/0x58 [ 24.175908] __kasan_mempool_unpoison_object+0x11c/0x180 [ 24.176014] remove_element+0x130/0x1f8 [ 24.176474] mempool_alloc_preallocated+0x58/0xc0 [ 24.176675] mempool_uaf_helper+0xa4/0x340 [ 24.176913] mempool_kmalloc_uaf+0xc4/0x120 [ 24.177026] kunit_try_run_case+0x170/0x3f0 [ 24.177126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.177727] kthread+0x328/0x630 [ 24.177854] ret_from_fork+0x10/0x20 [ 24.178039] [ 24.178114] Freed by task 227: [ 24.178371] kasan_save_stack+0x3c/0x68 [ 24.178762] kasan_save_track+0x20/0x40 [ 24.178910] kasan_save_free_info+0x4c/0x78 [ 24.179009] __kasan_mempool_poison_object+0xc0/0x150 [ 24.179104] mempool_free+0x28c/0x328 [ 24.179170] mempool_uaf_helper+0x104/0x340 [ 24.179240] mempool_kmalloc_uaf+0xc4/0x120 [ 24.180944] kunit_try_run_case+0x170/0x3f0 [ 24.183435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.183690] kthread+0x328/0x630 [ 24.183753] ret_from_fork+0x10/0x20 [ 24.183834] [ 24.183867] The buggy address belongs to the object at fff00000c66ad300 [ 24.183867] which belongs to the cache kmalloc-128 of size 128 [ 24.183943] The buggy address is located 0 bytes inside of [ 24.183943] freed 128-byte region [fff00000c66ad300, fff00000c66ad380) [ 24.184059] [ 24.184087] The buggy address belongs to the physical page: [ 24.184126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad [ 24.184191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.184252] page_type: f5(slab) [ 24.184302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.184360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.184426] page dumped because: kasan: bad access detected [ 24.184465] [ 24.184486] Memory state around the buggy address: [ 24.184524] fff00000c66ad200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.184573] fff00000c66ad280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.184620] >fff00000c66ad300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.184662] ^ [ 24.184695] fff00000c66ad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.184741] fff00000c66ad400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.184784] ================================================================== [ 24.244827] ================================================================== [ 24.245031] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 24.245182] Read of size 1 at addr fff00000c63de240 by task kunit_try_catch/231 [ 24.245293] [ 24.245382] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.245822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.246005] Hardware name: linux,dummy-virt (DT) [ 24.246094] Call trace: [ 24.246194] show_stack+0x20/0x38 (C) [ 24.246382] dump_stack_lvl+0x8c/0xd0 [ 24.246477] print_report+0x118/0x608 [ 24.246538] kasan_report+0xdc/0x128 [ 24.246619] __asan_report_load1_noabort+0x20/0x30 [ 24.246678] mempool_uaf_helper+0x314/0x340 [ 24.246729] mempool_slab_uaf+0xc0/0x118 [ 24.246781] kunit_try_run_case+0x170/0x3f0 [ 24.246863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.246925] kthread+0x328/0x630 [ 24.246975] ret_from_fork+0x10/0x20 [ 24.247034] [ 24.247059] Allocated by task 231: [ 24.247095] kasan_save_stack+0x3c/0x68 [ 24.247148] kasan_save_track+0x20/0x40 [ 24.247191] kasan_save_alloc_info+0x40/0x58 [ 24.247233] __kasan_mempool_unpoison_object+0xbc/0x180 [ 24.247281] remove_element+0x16c/0x1f8 [ 24.247324] mempool_alloc_preallocated+0x58/0xc0 [ 24.247368] mempool_uaf_helper+0xa4/0x340 [ 24.247446] mempool_slab_uaf+0xc0/0x118 [ 24.247550] kunit_try_run_case+0x170/0x3f0 [ 24.247630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.247714] kthread+0x328/0x630 [ 24.247788] ret_from_fork+0x10/0x20 [ 24.247871] [ 24.247932] Freed by task 231: [ 24.248024] kasan_save_stack+0x3c/0x68 [ 24.248174] kasan_save_track+0x20/0x40 [ 24.248311] kasan_save_free_info+0x4c/0x78 [ 24.248427] __kasan_mempool_poison_object+0xc0/0x150 [ 24.248538] mempool_free+0x28c/0x328 [ 24.248637] mempool_uaf_helper+0x104/0x340 [ 24.248771] mempool_slab_uaf+0xc0/0x118 [ 24.248883] kunit_try_run_case+0x170/0x3f0 [ 24.249002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.249153] kthread+0x328/0x630 [ 24.249247] ret_from_fork+0x10/0x20 [ 24.249351] [ 24.249423] The buggy address belongs to the object at fff00000c63de240 [ 24.249423] which belongs to the cache test_cache of size 123 [ 24.249561] The buggy address is located 0 bytes inside of [ 24.249561] freed 123-byte region [fff00000c63de240, fff00000c63de2bb) [ 24.249720] [ 24.249773] The buggy address belongs to the physical page: [ 24.250437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 24.251124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.251303] page_type: f5(slab) [ 24.251416] raw: 0bfffe0000000000 fff00000c63dc000 dead000000000122 0000000000000000 [ 24.251760] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 24.251845] page dumped because: kasan: bad access detected [ 24.251918] [ 24.251960] Memory state around the buggy address: [ 24.252040] fff00000c63de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.252176] fff00000c63de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.252277] >fff00000c63de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 24.252752] ^ [ 24.252885] fff00000c63de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.253006] fff00000c63de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.253115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
Automatically assigned
[ 24.100568] ================================================================== [ 24.100970] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 24.101146] Read of size 1 at addr fff00000c78a2001 by task kunit_try_catch/223 [ 24.101262] [ 24.101344] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.101557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.101615] Hardware name: linux,dummy-virt (DT) [ 24.101716] Call trace: [ 24.101802] show_stack+0x20/0x38 (C) [ 24.101983] dump_stack_lvl+0x8c/0xd0 [ 24.102146] print_report+0x118/0x608 [ 24.102259] kasan_report+0xdc/0x128 [ 24.102438] __asan_report_load1_noabort+0x20/0x30 [ 24.102546] mempool_oob_right_helper+0x2ac/0x2f0 [ 24.102651] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 24.102765] kunit_try_run_case+0x170/0x3f0 [ 24.102933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.103096] kthread+0x328/0x630 [ 24.103221] ret_from_fork+0x10/0x20 [ 24.103384] [ 24.103463] The buggy address belongs to the physical page: [ 24.103568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a0 [ 24.103690] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.103795] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.103923] page_type: f8(unknown) [ 24.104013] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.104118] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.104213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.104308] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.104459] head: 0bfffe0000000002 ffffc1ffc31e2801 00000000ffffffff 00000000ffffffff [ 24.104568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.104690] page dumped because: kasan: bad access detected [ 24.104809] [ 24.104877] Memory state around the buggy address: [ 24.104997] fff00000c78a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.105108] fff00000c78a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.105211] >fff00000c78a2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.105308] ^ [ 24.105383] fff00000c78a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.105499] fff00000c78a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.105618] ================================================================== [ 24.076949] ================================================================== [ 24.077083] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 24.077200] Read of size 1 at addr fff00000c6394f73 by task kunit_try_catch/221 [ 24.077261] [ 24.077324] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.077448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.077480] Hardware name: linux,dummy-virt (DT) [ 24.077524] Call trace: [ 24.077555] show_stack+0x20/0x38 (C) [ 24.077615] dump_stack_lvl+0x8c/0xd0 [ 24.077672] print_report+0x118/0x608 [ 24.077727] kasan_report+0xdc/0x128 [ 24.077780] __asan_report_load1_noabort+0x20/0x30 [ 24.077832] mempool_oob_right_helper+0x2ac/0x2f0 [ 24.077887] mempool_kmalloc_oob_right+0xc4/0x120 [ 24.077940] kunit_try_run_case+0x170/0x3f0 [ 24.077997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.078057] kthread+0x328/0x630 [ 24.078105] ret_from_fork+0x10/0x20 [ 24.078163] [ 24.078185] Allocated by task 221: [ 24.078219] kasan_save_stack+0x3c/0x68 [ 24.078271] kasan_save_track+0x20/0x40 [ 24.078317] kasan_save_alloc_info+0x40/0x58 [ 24.078437] __kasan_mempool_unpoison_object+0x11c/0x180 [ 24.078538] remove_element+0x130/0x1f8 [ 24.078631] mempool_alloc_preallocated+0x58/0xc0 [ 24.078723] mempool_oob_right_helper+0x98/0x2f0 [ 24.078810] mempool_kmalloc_oob_right+0xc4/0x120 [ 24.078923] kunit_try_run_case+0x170/0x3f0 [ 24.078982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.079030] kthread+0x328/0x630 [ 24.079069] ret_from_fork+0x10/0x20 [ 24.079110] [ 24.079141] The buggy address belongs to the object at fff00000c6394f00 [ 24.079141] which belongs to the cache kmalloc-128 of size 128 [ 24.079211] The buggy address is located 0 bytes to the right of [ 24.079211] allocated 115-byte region [fff00000c6394f00, fff00000c6394f73) [ 24.079279] [ 24.079307] The buggy address belongs to the physical page: [ 24.079347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106394 [ 24.079442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.079505] page_type: f5(slab) [ 24.079557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.079616] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 24.079666] page dumped because: kasan: bad access detected [ 24.079704] [ 24.079727] Memory state around the buggy address: [ 24.079767] fff00000c6394e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.079817] fff00000c6394e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.079866] >fff00000c6394f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.079910] ^ [ 24.079956] fff00000c6394f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.080003] fff00000c6395000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.080048] ================================================================== [ 24.120636] ================================================================== [ 24.120900] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 24.121050] Read of size 1 at addr fff00000c63d22bb by task kunit_try_catch/225 [ 24.121164] [ 24.121247] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.121457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.121512] Hardware name: linux,dummy-virt (DT) [ 24.121577] Call trace: [ 24.121623] show_stack+0x20/0x38 (C) [ 24.121740] dump_stack_lvl+0x8c/0xd0 [ 24.121843] print_report+0x118/0x608 [ 24.121980] kasan_report+0xdc/0x128 [ 24.122162] __asan_report_load1_noabort+0x20/0x30 [ 24.122307] mempool_oob_right_helper+0x2ac/0x2f0 [ 24.122760] mempool_slab_oob_right+0xc0/0x118 [ 24.123303] kunit_try_run_case+0x170/0x3f0 [ 24.123431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.124236] kthread+0x328/0x630 [ 24.124493] ret_from_fork+0x10/0x20 [ 24.125074] [ 24.125169] Allocated by task 225: [ 24.125304] kasan_save_stack+0x3c/0x68 [ 24.125517] kasan_save_track+0x20/0x40 [ 24.125616] kasan_save_alloc_info+0x40/0x58 [ 24.125712] __kasan_mempool_unpoison_object+0xbc/0x180 [ 24.125828] remove_element+0x16c/0x1f8 [ 24.125922] mempool_alloc_preallocated+0x58/0xc0 [ 24.126024] mempool_oob_right_helper+0x98/0x2f0 [ 24.126122] mempool_slab_oob_right+0xc0/0x118 [ 24.126229] kunit_try_run_case+0x170/0x3f0 [ 24.127052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.127358] kthread+0x328/0x630 [ 24.128060] ret_from_fork+0x10/0x20 [ 24.128184] [ 24.128342] The buggy address belongs to the object at fff00000c63d2240 [ 24.128342] which belongs to the cache test_cache of size 123 [ 24.128589] The buggy address is located 0 bytes to the right of [ 24.128589] allocated 123-byte region [fff00000c63d2240, fff00000c63d22bb) [ 24.129189] [ 24.129291] The buggy address belongs to the physical page: [ 24.129420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d2 [ 24.129860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.130009] page_type: f5(slab) [ 24.130112] raw: 0bfffe0000000000 fff00000c1764dc0 dead000000000122 0000000000000000 [ 24.131088] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 24.131444] page dumped because: kasan: bad access detected [ 24.131563] [ 24.131765] Memory state around the buggy address: [ 24.131967] fff00000c63d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.132184] fff00000c63d2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 24.132297] >fff00000c63d2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 24.132707] ^ [ 24.132970] fff00000c63d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133141] fff00000c63d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133444] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
Automatically assigned
[ 23.477808] ================================================================== [ 23.478071] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 23.478294] Read of size 1 at addr fff00000c1764b40 by task kunit_try_catch/215 [ 23.478508] [ 23.478593] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 23.478808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.478909] Hardware name: linux,dummy-virt (DT) [ 23.479005] Call trace: [ 23.479077] show_stack+0x20/0x38 (C) [ 23.479205] dump_stack_lvl+0x8c/0xd0 [ 23.479341] print_report+0x118/0x608 [ 23.479531] kasan_report+0xdc/0x128 [ 23.479655] __kasan_check_byte+0x54/0x70 [ 23.479811] kmem_cache_destroy+0x34/0x218 [ 23.479964] kmem_cache_double_destroy+0x174/0x300 [ 23.480093] kunit_try_run_case+0x170/0x3f0 [ 23.480223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.480353] kthread+0x328/0x630 [ 23.480479] ret_from_fork+0x10/0x20 [ 23.480604] [ 23.480651] Allocated by task 215: [ 23.480728] kasan_save_stack+0x3c/0x68 [ 23.480832] kasan_save_track+0x20/0x40 [ 23.480930] kasan_save_alloc_info+0x40/0x58 [ 23.481025] __kasan_slab_alloc+0xa8/0xb0 [ 23.481124] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 23.481222] __kmem_cache_create_args+0x178/0x280 [ 23.481323] kmem_cache_double_destroy+0xc0/0x300 [ 23.481428] kunit_try_run_case+0x170/0x3f0 [ 23.481519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.481625] kthread+0x328/0x630 [ 23.481713] ret_from_fork+0x10/0x20 [ 23.481810] [ 23.481864] Freed by task 215: [ 23.481931] kasan_save_stack+0x3c/0x68 [ 23.482120] kasan_save_track+0x20/0x40 [ 23.482220] kasan_save_free_info+0x4c/0x78 [ 23.482307] __kasan_slab_free+0x6c/0x98 [ 23.482480] kmem_cache_free+0x260/0x470 [ 23.482584] slab_kmem_cache_release+0x38/0x50 [ 23.482685] kmem_cache_release+0x1c/0x30 [ 23.482765] kobject_put+0x17c/0x430 [ 23.482913] sysfs_slab_release+0x1c/0x30 [ 23.482999] kmem_cache_destroy+0x118/0x218 [ 23.483090] kmem_cache_double_destroy+0x128/0x300 [ 23.483214] kunit_try_run_case+0x170/0x3f0 [ 23.483334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.483442] kthread+0x328/0x630 [ 23.483509] ret_from_fork+0x10/0x20 [ 23.483575] [ 23.483654] The buggy address belongs to the object at fff00000c1764b40 [ 23.483654] which belongs to the cache kmem_cache of size 208 [ 23.483814] The buggy address is located 0 bytes inside of [ 23.483814] freed 208-byte region [fff00000c1764b40, fff00000c1764c10) [ 23.483965] [ 23.484021] The buggy address belongs to the physical page: [ 23.484133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101764 [ 23.484298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.484507] page_type: f5(slab) [ 23.484635] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 23.484798] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 23.484892] page dumped because: kasan: bad access detected [ 23.484970] [ 23.485058] Memory state around the buggy address: [ 23.485190] fff00000c1764a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.485350] fff00000c1764a80: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 23.485480] >fff00000c1764b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 23.485607] ^ [ 23.485698] fff00000c1764b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.485848] fff00000c1764c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.486016] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
Automatically assigned
[ 22.894426] ================================================================== [ 22.895554] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 22.895740] Free of addr fff00000c725d001 by task kunit_try_catch/211 [ 22.895843] [ 22.895954] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.896487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.896663] Hardware name: linux,dummy-virt (DT) [ 22.896849] Call trace: [ 22.896945] show_stack+0x20/0x38 (C) [ 22.897440] dump_stack_lvl+0x8c/0xd0 [ 22.897842] print_report+0x118/0x608 [ 22.898333] kasan_report_invalid_free+0xc0/0xe8 [ 22.898729] check_slab_allocation+0xfc/0x108 [ 22.898844] __kasan_slab_pre_free+0x2c/0x48 [ 22.898950] kmem_cache_free+0xf0/0x470 [ 22.899966] kmem_cache_invalid_free+0x184/0x3c8 [ 22.900368] kunit_try_run_case+0x170/0x3f0 [ 22.900975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.901169] kthread+0x328/0x630 [ 22.901728] ret_from_fork+0x10/0x20 [ 22.902623] [ 22.902711] Allocated by task 211: [ 22.902784] kasan_save_stack+0x3c/0x68 [ 22.903582] kasan_save_track+0x20/0x40 [ 22.904220] kasan_save_alloc_info+0x40/0x58 [ 22.904541] __kasan_slab_alloc+0xa8/0xb0 [ 22.905004] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.905125] kmem_cache_invalid_free+0x12c/0x3c8 [ 22.905228] kunit_try_run_case+0x170/0x3f0 [ 22.905325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.905447] kthread+0x328/0x630 [ 22.905534] ret_from_fork+0x10/0x20 [ 22.905629] [ 22.905682] The buggy address belongs to the object at fff00000c725d000 [ 22.905682] which belongs to the cache test_cache of size 200 [ 22.905830] The buggy address is located 1 bytes inside of [ 22.905830] 200-byte region [fff00000c725d000, fff00000c725d0c8) [ 22.907480] [ 22.907923] The buggy address belongs to the physical page: [ 22.908153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10725d [ 22.908692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.909342] page_type: f5(slab) [ 22.910027] raw: 0bfffe0000000000 fff00000c787b140 dead000000000122 0000000000000000 [ 22.910253] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 22.910572] page dumped because: kasan: bad access detected [ 22.910965] [ 22.911005] Memory state around the buggy address: [ 22.911085] fff00000c725cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.911180] fff00000c725cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.911259] >fff00000c725d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.911329] ^ [ 22.911392] fff00000c725d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 22.911862] fff00000c725d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.912081] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
Automatically assigned
[ 22.817620] ================================================================== [ 22.818482] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 22.818923] Free of addr fff00000c725b000 by task kunit_try_catch/209 [ 22.819259] [ 22.819366] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.819760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.819842] Hardware name: linux,dummy-virt (DT) [ 22.819946] Call trace: [ 22.820101] show_stack+0x20/0x38 (C) [ 22.820258] dump_stack_lvl+0x8c/0xd0 [ 22.820392] print_report+0x118/0x608 [ 22.820970] kasan_report_invalid_free+0xc0/0xe8 [ 22.821272] check_slab_allocation+0xd4/0x108 [ 22.821578] __kasan_slab_pre_free+0x2c/0x48 [ 22.821872] kmem_cache_free+0xf0/0x470 [ 22.822661] kmem_cache_double_free+0x190/0x3c8 [ 22.822958] kunit_try_run_case+0x170/0x3f0 [ 22.823451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.823611] kthread+0x328/0x630 [ 22.823721] ret_from_fork+0x10/0x20 [ 22.823901] [ 22.823950] Allocated by task 209: [ 22.824037] kasan_save_stack+0x3c/0x68 [ 22.824148] kasan_save_track+0x20/0x40 [ 22.824238] kasan_save_alloc_info+0x40/0x58 [ 22.824332] __kasan_slab_alloc+0xa8/0xb0 [ 22.824432] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.824534] kmem_cache_double_free+0x12c/0x3c8 [ 22.824634] kunit_try_run_case+0x170/0x3f0 [ 22.824725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.824832] kthread+0x328/0x630 [ 22.824911] ret_from_fork+0x10/0x20 [ 22.824996] [ 22.825040] Freed by task 209: [ 22.825107] kasan_save_stack+0x3c/0x68 [ 22.825201] kasan_save_track+0x20/0x40 [ 22.825288] kasan_save_free_info+0x4c/0x78 [ 22.825382] __kasan_slab_free+0x6c/0x98 [ 22.826245] kmem_cache_free+0x260/0x470 [ 22.826800] kmem_cache_double_free+0x140/0x3c8 [ 22.827059] kunit_try_run_case+0x170/0x3f0 [ 22.827322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.827614] kthread+0x328/0x630 [ 22.827847] ret_from_fork+0x10/0x20 [ 22.828237] [ 22.828294] The buggy address belongs to the object at fff00000c725b000 [ 22.828294] which belongs to the cache test_cache of size 200 [ 22.829159] The buggy address is located 0 bytes inside of [ 22.829159] 200-byte region [fff00000c725b000, fff00000c725b0c8) [ 22.829437] [ 22.829913] The buggy address belongs to the physical page: [ 22.830005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10725b [ 22.830157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.830438] page_type: f5(slab) [ 22.830606] raw: 0bfffe0000000000 fff00000c787b000 dead000000000122 0000000000000000 [ 22.830878] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 22.831088] page dumped because: kasan: bad access detected [ 22.831159] [ 22.831207] Memory state around the buggy address: [ 22.831275] fff00000c725af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.831394] fff00000c725af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.831515] >fff00000c725b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.831650] ^ [ 22.831726] fff00000c725b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 22.831831] fff00000c725b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.831922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
Automatically assigned
[ 22.531664] ================================================================== [ 22.531915] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 22.532561] Read of size 1 at addr fff00000c787b0c8 by task kunit_try_catch/207 [ 22.532744] [ 22.532879] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.533093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.533156] Hardware name: linux,dummy-virt (DT) [ 22.533239] Call trace: [ 22.533297] show_stack+0x20/0x38 (C) [ 22.533441] dump_stack_lvl+0x8c/0xd0 [ 22.533567] print_report+0x118/0x608 [ 22.533686] kasan_report+0xdc/0x128 [ 22.533800] __asan_report_load1_noabort+0x20/0x30 [ 22.533922] kmem_cache_oob+0x344/0x430 [ 22.534034] kunit_try_run_case+0x170/0x3f0 [ 22.534160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.534297] kthread+0x328/0x630 [ 22.534458] ret_from_fork+0x10/0x20 [ 22.534623] [ 22.534903] Allocated by task 207: [ 22.534973] kasan_save_stack+0x3c/0x68 [ 22.535062] kasan_save_track+0x20/0x40 [ 22.535147] kasan_save_alloc_info+0x40/0x58 [ 22.535522] __kasan_slab_alloc+0xa8/0xb0 [ 22.535636] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.535772] kmem_cache_oob+0x12c/0x430 [ 22.535876] kunit_try_run_case+0x170/0x3f0 [ 22.536330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.536458] kthread+0x328/0x630 [ 22.536793] ret_from_fork+0x10/0x20 [ 22.536931] [ 22.536999] The buggy address belongs to the object at fff00000c787b000 [ 22.536999] which belongs to the cache test_cache of size 200 [ 22.537184] The buggy address is located 0 bytes to the right of [ 22.537184] allocated 200-byte region [fff00000c787b000, fff00000c787b0c8) [ 22.537334] [ 22.537386] The buggy address belongs to the physical page: [ 22.537484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787b [ 22.537893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.538090] page_type: f5(slab) [ 22.538184] raw: 0bfffe0000000000 fff00000c5696dc0 dead000000000122 0000000000000000 [ 22.538414] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 22.538551] page dumped because: kasan: bad access detected [ 22.538666] [ 22.538731] Memory state around the buggy address: [ 22.538826] fff00000c787af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.538918] fff00000c787b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.539019] >fff00000c787b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 22.539100] ^ [ 22.539214] fff00000c787b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.539757] fff00000c787b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.539932] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
Automatically assigned
[ 22.431681] ================================================================== [ 22.432087] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 22.432620] Read of size 8 at addr fff00000c669e640 by task kunit_try_catch/200 [ 22.432787] [ 22.433072] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.433556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.433630] Hardware name: linux,dummy-virt (DT) [ 22.433716] Call trace: [ 22.433778] show_stack+0x20/0x38 (C) [ 22.433911] dump_stack_lvl+0x8c/0xd0 [ 22.434383] print_report+0x118/0x608 [ 22.434532] kasan_report+0xdc/0x128 [ 22.434664] __asan_report_load8_noabort+0x20/0x30 [ 22.434793] workqueue_uaf+0x480/0x4a8 [ 22.434907] kunit_try_run_case+0x170/0x3f0 [ 22.435012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.435612] kthread+0x328/0x630 [ 22.436111] ret_from_fork+0x10/0x20 [ 22.436347] [ 22.436791] Allocated by task 200: [ 22.436927] kasan_save_stack+0x3c/0x68 [ 22.437049] kasan_save_track+0x20/0x40 [ 22.437513] kasan_save_alloc_info+0x40/0x58 [ 22.437694] __kasan_kmalloc+0xd4/0xd8 [ 22.437811] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.438448] workqueue_uaf+0x13c/0x4a8 [ 22.438669] kunit_try_run_case+0x170/0x3f0 [ 22.439422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.439646] kthread+0x328/0x630 [ 22.439829] ret_from_fork+0x10/0x20 [ 22.439922] [ 22.440456] Freed by task 44: [ 22.440540] kasan_save_stack+0x3c/0x68 [ 22.441032] kasan_save_track+0x20/0x40 [ 22.441146] kasan_save_free_info+0x4c/0x78 [ 22.441789] __kasan_slab_free+0x6c/0x98 [ 22.442086] kfree+0x214/0x3c8 [ 22.442188] workqueue_uaf_work+0x18/0x30 [ 22.442284] process_one_work+0x530/0xf98 [ 22.443032] worker_thread+0x8ac/0xf28 [ 22.443156] kthread+0x328/0x630 [ 22.443320] ret_from_fork+0x10/0x20 [ 22.443518] [ 22.443830] Last potentially related work creation: [ 22.443957] kasan_save_stack+0x3c/0x68 [ 22.444319] kasan_record_aux_stack+0xb4/0xc8 [ 22.444439] __queue_work+0x65c/0x1010 [ 22.444535] queue_work_on+0xbc/0xf8 [ 22.444914] workqueue_uaf+0x210/0x4a8 [ 22.445365] kunit_try_run_case+0x170/0x3f0 [ 22.445683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.445804] kthread+0x328/0x630 [ 22.446165] ret_from_fork+0x10/0x20 [ 22.446274] [ 22.446731] The buggy address belongs to the object at fff00000c669e640 [ 22.446731] which belongs to the cache kmalloc-32 of size 32 [ 22.446922] The buggy address is located 0 bytes inside of [ 22.446922] freed 32-byte region [fff00000c669e640, fff00000c669e660) [ 22.447084] [ 22.447454] The buggy address belongs to the physical page: [ 22.447831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669e [ 22.448083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.448300] page_type: f5(slab) [ 22.448642] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.448993] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.449318] page dumped because: kasan: bad access detected [ 22.449451] [ 22.449512] Memory state around the buggy address: [ 22.449944] fff00000c669e500: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 22.450082] fff00000c669e580: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.450643] >fff00000c669e600: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 22.450931] ^ [ 22.451247] fff00000c669e680: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451384] fff00000c669e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451503] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
Automatically assigned
[ 22.372677] ================================================================== [ 22.372955] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 22.373117] Read of size 4 at addr fff00000c669e440 by task swapper/1/0 [ 22.373237] [ 22.373332] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.376695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.376852] Hardware name: linux,dummy-virt (DT) [ 22.376955] Call trace: [ 22.377016] show_stack+0x20/0x38 (C) [ 22.377172] dump_stack_lvl+0x8c/0xd0 [ 22.377349] print_report+0x118/0x608 [ 22.377481] kasan_report+0xdc/0x128 [ 22.377946] __asan_report_load4_noabort+0x20/0x30 [ 22.378172] rcu_uaf_reclaim+0x64/0x70 [ 22.378333] rcu_core+0x9f4/0x1e20 [ 22.378547] rcu_core_si+0x18/0x30 [ 22.378655] handle_softirqs+0x374/0xb28 [ 22.379014] __do_softirq+0x1c/0x28 [ 22.379171] ____do_softirq+0x18/0x30 [ 22.379340] call_on_irq_stack+0x24/0x30 [ 22.379479] do_softirq_own_stack+0x24/0x38 [ 22.379652] __irq_exit_rcu+0x1fc/0x318 [ 22.379814] irq_exit_rcu+0x1c/0x80 [ 22.379959] el1_interrupt+0x38/0x58 [ 22.380073] el1h_64_irq_handler+0x18/0x28 [ 22.380195] el1h_64_irq+0x6c/0x70 [ 22.380453] arch_local_irq_enable+0x4/0x8 (P) [ 22.380955] do_idle+0x384/0x4e8 [ 22.381091] cpu_startup_entry+0x64/0x80 [ 22.381491] secondary_start_kernel+0x288/0x340 [ 22.381642] __secondary_switched+0xc0/0xc8 [ 22.381779] [ 22.381832] Allocated by task 198: [ 22.381906] kasan_save_stack+0x3c/0x68 [ 22.382016] kasan_save_track+0x20/0x40 [ 22.382117] kasan_save_alloc_info+0x40/0x58 [ 22.382211] __kasan_kmalloc+0xd4/0xd8 [ 22.382314] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.382459] rcu_uaf+0xb0/0x2d8 [ 22.382952] kunit_try_run_case+0x170/0x3f0 [ 22.383095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.383204] kthread+0x328/0x630 [ 22.383322] ret_from_fork+0x10/0x20 [ 22.383450] [ 22.383532] Freed by task 0: [ 22.383617] kasan_save_stack+0x3c/0x68 [ 22.383720] kasan_save_track+0x20/0x40 [ 22.383817] kasan_save_free_info+0x4c/0x78 [ 22.383910] __kasan_slab_free+0x6c/0x98 [ 22.384011] kfree+0x214/0x3c8 [ 22.384099] rcu_uaf_reclaim+0x28/0x70 [ 22.384199] rcu_core+0x9f4/0x1e20 [ 22.384284] rcu_core_si+0x18/0x30 [ 22.384516] handle_softirqs+0x374/0xb28 [ 22.384837] __do_softirq+0x1c/0x28 [ 22.384963] [ 22.385099] Last potentially related work creation: [ 22.385189] kasan_save_stack+0x3c/0x68 [ 22.385285] kasan_record_aux_stack+0xb4/0xc8 [ 22.385387] __call_rcu_common.constprop.0+0x70/0x8b0 [ 22.385747] call_rcu+0x18/0x30 [ 22.385851] rcu_uaf+0x14c/0x2d8 [ 22.385936] kunit_try_run_case+0x170/0x3f0 [ 22.386033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.386144] kthread+0x328/0x630 [ 22.386220] ret_from_fork+0x10/0x20 [ 22.386872] [ 22.387061] The buggy address belongs to the object at fff00000c669e440 [ 22.387061] which belongs to the cache kmalloc-32 of size 32 [ 22.387261] The buggy address is located 0 bytes inside of [ 22.387261] freed 32-byte region [fff00000c669e440, fff00000c669e460) [ 22.387385] [ 22.387444] The buggy address belongs to the physical page: [ 22.387539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669e [ 22.387665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.388050] page_type: f5(slab) [ 22.388185] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.388347] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.388470] page dumped because: kasan: bad access detected [ 22.388550] [ 22.388596] Memory state around the buggy address: [ 22.388685] fff00000c669e300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.388799] fff00000c669e380: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.388909] >fff00000c669e400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.389006] ^ [ 22.389097] fff00000c669e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.389210] fff00000c669e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.389310] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
Automatically assigned
[ 22.117451] ================================================================== [ 22.117587] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 22.117713] Read of size 1 at addr fff00000c7883078 by task kunit_try_catch/196 [ 22.117839] [ 22.117925] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.118139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.118211] Hardware name: linux,dummy-virt (DT) [ 22.118291] Call trace: [ 22.118346] show_stack+0x20/0x38 (C) [ 22.119382] dump_stack_lvl+0x8c/0xd0 [ 22.119598] print_report+0x118/0x608 [ 22.119727] kasan_report+0xdc/0x128 [ 22.119843] __asan_report_load1_noabort+0x20/0x30 [ 22.120162] ksize_uaf+0x544/0x5f8 [ 22.120603] kunit_try_run_case+0x170/0x3f0 [ 22.120893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.121161] kthread+0x328/0x630 [ 22.121486] ret_from_fork+0x10/0x20 [ 22.121917] [ 22.121987] Allocated by task 196: [ 22.122194] kasan_save_stack+0x3c/0x68 [ 22.122441] kasan_save_track+0x20/0x40 [ 22.122665] kasan_save_alloc_info+0x40/0x58 [ 22.122867] __kasan_kmalloc+0xd4/0xd8 [ 22.123355] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.123488] ksize_uaf+0xb8/0x5f8 [ 22.123608] kunit_try_run_case+0x170/0x3f0 [ 22.123718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.123881] kthread+0x328/0x630 [ 22.123998] ret_from_fork+0x10/0x20 [ 22.124131] [ 22.124227] Freed by task 196: [ 22.124302] kasan_save_stack+0x3c/0x68 [ 22.124412] kasan_save_track+0x20/0x40 [ 22.124509] kasan_save_free_info+0x4c/0x78 [ 22.124627] __kasan_slab_free+0x6c/0x98 [ 22.124774] kfree+0x214/0x3c8 [ 22.124863] ksize_uaf+0x11c/0x5f8 [ 22.124951] kunit_try_run_case+0x170/0x3f0 [ 22.125052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.125166] kthread+0x328/0x630 [ 22.125250] ret_from_fork+0x10/0x20 [ 22.125350] [ 22.125426] The buggy address belongs to the object at fff00000c7883000 [ 22.125426] which belongs to the cache kmalloc-128 of size 128 [ 22.125573] The buggy address is located 120 bytes inside of [ 22.125573] freed 128-byte region [fff00000c7883000, fff00000c7883080) [ 22.126171] [ 22.126252] The buggy address belongs to the physical page: [ 22.126336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 22.126486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.126617] page_type: f5(slab) [ 22.126721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.126867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.126971] page dumped because: kasan: bad access detected [ 22.127308] [ 22.127453] Memory state around the buggy address: [ 22.127561] fff00000c7882f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.127719] fff00000c7882f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.127845] >fff00000c7883000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.128040] ^ [ 22.128164] fff00000c7883080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128268] fff00000c7883100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128537] ================================================================== [ 22.089802] ================================================================== [ 22.090422] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 22.090755] Read of size 1 at addr fff00000c7883000 by task kunit_try_catch/196 [ 22.090918] [ 22.091028] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.091253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.091321] Hardware name: linux,dummy-virt (DT) [ 22.091407] Call trace: [ 22.091459] show_stack+0x20/0x38 (C) [ 22.091560] dump_stack_lvl+0x8c/0xd0 [ 22.091662] print_report+0x118/0x608 [ 22.091788] kasan_report+0xdc/0x128 [ 22.091955] __kasan_check_byte+0x54/0x70 [ 22.092120] ksize+0x30/0x88 [ 22.092271] ksize_uaf+0x168/0x5f8 [ 22.092447] kunit_try_run_case+0x170/0x3f0 [ 22.092564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.092753] kthread+0x328/0x630 [ 22.092979] ret_from_fork+0x10/0x20 [ 22.093290] [ 22.093335] Allocated by task 196: [ 22.093416] kasan_save_stack+0x3c/0x68 [ 22.093512] kasan_save_track+0x20/0x40 [ 22.093639] kasan_save_alloc_info+0x40/0x58 [ 22.093909] __kasan_kmalloc+0xd4/0xd8 [ 22.094168] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.094318] ksize_uaf+0xb8/0x5f8 [ 22.094450] kunit_try_run_case+0x170/0x3f0 [ 22.094592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.094741] kthread+0x328/0x630 [ 22.094844] ret_from_fork+0x10/0x20 [ 22.094933] [ 22.095001] Freed by task 196: [ 22.095103] kasan_save_stack+0x3c/0x68 [ 22.095239] kasan_save_track+0x20/0x40 [ 22.095367] kasan_save_free_info+0x4c/0x78 [ 22.095463] __kasan_slab_free+0x6c/0x98 [ 22.095546] kfree+0x214/0x3c8 [ 22.095786] ksize_uaf+0x11c/0x5f8 [ 22.096009] kunit_try_run_case+0x170/0x3f0 [ 22.096161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.096268] kthread+0x328/0x630 [ 22.096351] ret_from_fork+0x10/0x20 [ 22.096451] [ 22.096751] The buggy address belongs to the object at fff00000c7883000 [ 22.096751] which belongs to the cache kmalloc-128 of size 128 [ 22.096900] The buggy address is located 0 bytes inside of [ 22.096900] freed 128-byte region [fff00000c7883000, fff00000c7883080) [ 22.097064] [ 22.097130] The buggy address belongs to the physical page: [ 22.097326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 22.097488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.097620] page_type: f5(slab) [ 22.097720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.097847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.097955] page dumped because: kasan: bad access detected [ 22.098102] [ 22.098153] Memory state around the buggy address: [ 22.098238] fff00000c7882f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.098379] fff00000c7882f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.098493] >fff00000c7883000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.098696] ^ [ 22.098952] fff00000c7883080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.099048] fff00000c7883100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.099134] ================================================================== [ 22.101072] ================================================================== [ 22.101212] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 22.101356] Read of size 1 at addr fff00000c7883000 by task kunit_try_catch/196 [ 22.101477] [ 22.102388] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.102844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.102955] Hardware name: linux,dummy-virt (DT) [ 22.103301] Call trace: [ 22.103596] show_stack+0x20/0x38 (C) [ 22.104314] dump_stack_lvl+0x8c/0xd0 [ 22.104913] print_report+0x118/0x608 [ 22.105307] kasan_report+0xdc/0x128 [ 22.106151] __asan_report_load1_noabort+0x20/0x30 [ 22.106339] ksize_uaf+0x598/0x5f8 [ 22.107710] kunit_try_run_case+0x170/0x3f0 [ 22.108076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.108208] kthread+0x328/0x630 [ 22.108309] ret_from_fork+0x10/0x20 [ 22.108446] [ 22.108494] Allocated by task 196: [ 22.108566] kasan_save_stack+0x3c/0x68 [ 22.108673] kasan_save_track+0x20/0x40 [ 22.110442] kasan_save_alloc_info+0x40/0x58 [ 22.110738] __kasan_kmalloc+0xd4/0xd8 [ 22.110825] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.111179] ksize_uaf+0xb8/0x5f8 [ 22.111356] kunit_try_run_case+0x170/0x3f0 [ 22.111521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.111647] kthread+0x328/0x630 [ 22.111757] ret_from_fork+0x10/0x20 [ 22.111852] [ 22.111907] Freed by task 196: [ 22.111972] kasan_save_stack+0x3c/0x68 [ 22.112082] kasan_save_track+0x20/0x40 [ 22.112211] kasan_save_free_info+0x4c/0x78 [ 22.112339] __kasan_slab_free+0x6c/0x98 [ 22.112486] kfree+0x214/0x3c8 [ 22.112568] ksize_uaf+0x11c/0x5f8 [ 22.112657] kunit_try_run_case+0x170/0x3f0 [ 22.112751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.112861] kthread+0x328/0x630 [ 22.112938] ret_from_fork+0x10/0x20 [ 22.113037] [ 22.113113] The buggy address belongs to the object at fff00000c7883000 [ 22.113113] which belongs to the cache kmalloc-128 of size 128 [ 22.113300] The buggy address is located 0 bytes inside of [ 22.113300] freed 128-byte region [fff00000c7883000, fff00000c7883080) [ 22.113463] [ 22.113515] The buggy address belongs to the physical page: [ 22.113617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107883 [ 22.113778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.113922] page_type: f5(slab) [ 22.114012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.114143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.114252] page dumped because: kasan: bad access detected [ 22.114358] [ 22.114449] Memory state around the buggy address: [ 22.114555] fff00000c7882f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.114688] fff00000c7882f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.114828] >fff00000c7883000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.114969] ^ [ 22.115114] fff00000c7883080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.115223] fff00000c7883100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.115303] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
Automatically assigned
[ 22.036669] ================================================================== [ 22.036865] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 22.037031] Read of size 1 at addr fff00000c5d6ef73 by task kunit_try_catch/194 [ 22.037156] [ 22.037248] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.038534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.038807] Hardware name: linux,dummy-virt (DT) [ 22.038975] Call trace: [ 22.039037] show_stack+0x20/0x38 (C) [ 22.039198] dump_stack_lvl+0x8c/0xd0 [ 22.039304] print_report+0x118/0x608 [ 22.039674] kasan_report+0xdc/0x128 [ 22.039913] __asan_report_load1_noabort+0x20/0x30 [ 22.040121] ksize_unpoisons_memory+0x628/0x740 [ 22.040458] kunit_try_run_case+0x170/0x3f0 [ 22.040716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.041093] kthread+0x328/0x630 [ 22.041297] ret_from_fork+0x10/0x20 [ 22.041433] [ 22.041869] Allocated by task 194: [ 22.042452] kasan_save_stack+0x3c/0x68 [ 22.042673] kasan_save_track+0x20/0x40 [ 22.042762] kasan_save_alloc_info+0x40/0x58 [ 22.042923] __kasan_kmalloc+0xd4/0xd8 [ 22.043173] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.043408] ksize_unpoisons_memory+0xc0/0x740 [ 22.043615] kunit_try_run_case+0x170/0x3f0 [ 22.043776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043873] kthread+0x328/0x630 [ 22.043938] ret_from_fork+0x10/0x20 [ 22.044320] [ 22.044462] The buggy address belongs to the object at fff00000c5d6ef00 [ 22.044462] which belongs to the cache kmalloc-128 of size 128 [ 22.044756] The buggy address is located 0 bytes to the right of [ 22.044756] allocated 115-byte region [fff00000c5d6ef00, fff00000c5d6ef73) [ 22.044939] [ 22.045068] The buggy address belongs to the physical page: [ 22.045159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 22.045312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.045445] page_type: f5(slab) [ 22.045967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.046149] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.046388] page dumped because: kasan: bad access detected [ 22.046573] [ 22.046875] Memory state around the buggy address: [ 22.046969] fff00000c5d6ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.047080] fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047266] >fff00000c5d6ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.047551] ^ [ 22.047789] fff00000c5d6ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047955] fff00000c5d6f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.048057] ================================================================== [ 22.051619] ================================================================== [ 22.051743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 22.051886] Read of size 1 at addr fff00000c5d6ef78 by task kunit_try_catch/194 [ 22.052009] [ 22.052093] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.052302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.052369] Hardware name: linux,dummy-virt (DT) [ 22.052926] Call trace: [ 22.054474] show_stack+0x20/0x38 (C) [ 22.054691] dump_stack_lvl+0x8c/0xd0 [ 22.054892] print_report+0x118/0x608 [ 22.055022] kasan_report+0xdc/0x128 [ 22.055150] __asan_report_load1_noabort+0x20/0x30 [ 22.055426] ksize_unpoisons_memory+0x618/0x740 [ 22.055685] kunit_try_run_case+0x170/0x3f0 [ 22.055925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.056049] kthread+0x328/0x630 [ 22.056134] ret_from_fork+0x10/0x20 [ 22.056242] [ 22.056285] Allocated by task 194: [ 22.056888] kasan_save_stack+0x3c/0x68 [ 22.057111] kasan_save_track+0x20/0x40 [ 22.057217] kasan_save_alloc_info+0x40/0x58 [ 22.057324] __kasan_kmalloc+0xd4/0xd8 [ 22.057429] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.057530] ksize_unpoisons_memory+0xc0/0x740 [ 22.057629] kunit_try_run_case+0x170/0x3f0 [ 22.057793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.058024] kthread+0x328/0x630 [ 22.058122] ret_from_fork+0x10/0x20 [ 22.058275] [ 22.058660] The buggy address belongs to the object at fff00000c5d6ef00 [ 22.058660] which belongs to the cache kmalloc-128 of size 128 [ 22.058921] The buggy address is located 5 bytes to the right of [ 22.058921] allocated 115-byte region [fff00000c5d6ef00, fff00000c5d6ef73) [ 22.059141] [ 22.059314] The buggy address belongs to the physical page: [ 22.059393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 22.059678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.059949] page_type: f5(slab) [ 22.060062] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.060193] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.060290] page dumped because: kasan: bad access detected [ 22.060372] [ 22.061169] Memory state around the buggy address: [ 22.061493] fff00000c5d6ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.061621] fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.061744] >fff00000c5d6ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.061843] ^ [ 22.062423] fff00000c5d6ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.062599] fff00000c5d6f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.062707] ================================================================== [ 22.066086] ================================================================== [ 22.066225] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 22.066715] Read of size 1 at addr fff00000c5d6ef7f by task kunit_try_catch/194 [ 22.066874] [ 22.066958] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 22.067138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.067201] Hardware name: linux,dummy-virt (DT) [ 22.067278] Call trace: [ 22.067855] show_stack+0x20/0x38 (C) [ 22.068019] dump_stack_lvl+0x8c/0xd0 [ 22.068200] print_report+0x118/0x608 [ 22.068320] kasan_report+0xdc/0x128 [ 22.068773] __asan_report_load1_noabort+0x20/0x30 [ 22.068949] ksize_unpoisons_memory+0x690/0x740 [ 22.069455] kunit_try_run_case+0x170/0x3f0 [ 22.069778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.070024] kthread+0x328/0x630 [ 22.071582] ret_from_fork+0x10/0x20 [ 22.071723] [ 22.071749] Allocated by task 194: [ 22.071784] kasan_save_stack+0x3c/0x68 [ 22.071841] kasan_save_track+0x20/0x40 [ 22.071884] kasan_save_alloc_info+0x40/0x58 [ 22.071925] __kasan_kmalloc+0xd4/0xd8 [ 22.071969] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.072015] ksize_unpoisons_memory+0xc0/0x740 [ 22.072058] kunit_try_run_case+0x170/0x3f0 [ 22.072103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.072150] kthread+0x328/0x630 [ 22.072188] ret_from_fork+0x10/0x20 [ 22.072229] [ 22.072255] The buggy address belongs to the object at fff00000c5d6ef00 [ 22.072255] which belongs to the cache kmalloc-128 of size 128 [ 22.072321] The buggy address is located 12 bytes to the right of [ 22.072321] allocated 115-byte region [fff00000c5d6ef00, fff00000c5d6ef73) [ 22.072393] [ 22.072442] The buggy address belongs to the physical page: [ 22.072480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 22.072542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.072601] page_type: f5(slab) [ 22.072651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.072708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.072754] page dumped because: kasan: bad access detected [ 22.072790] [ 22.072810] Memory state around the buggy address: [ 22.072849] fff00000c5d6ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.072898] fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.072946] >fff00000c5d6ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.072989] ^ [ 22.073035] fff00000c5d6ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.073080] fff00000c5d6f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.073123] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
Automatically assigned
[ 21.989842] ================================================================== [ 21.990436] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 21.990650] Free of addr fff00000c66b10c0 by task kunit_try_catch/192 [ 21.990802] [ 21.990918] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.991138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.991202] Hardware name: linux,dummy-virt (DT) [ 21.991278] Call trace: [ 21.991369] show_stack+0x20/0x38 (C) [ 21.991735] dump_stack_lvl+0x8c/0xd0 [ 21.991890] print_report+0x118/0x608 [ 21.992018] kasan_report_invalid_free+0xc0/0xe8 [ 21.992197] check_slab_allocation+0xd4/0x108 [ 21.992361] __kasan_slab_pre_free+0x2c/0x48 [ 21.992532] kfree+0xe8/0x3c8 [ 21.992643] kfree_sensitive+0x3c/0xb0 [ 21.992772] kmalloc_double_kzfree+0x168/0x308 [ 21.992881] kunit_try_run_case+0x170/0x3f0 [ 21.992989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.993326] kthread+0x328/0x630 [ 21.993561] ret_from_fork+0x10/0x20 [ 21.993683] [ 21.993735] Allocated by task 192: [ 21.993944] kasan_save_stack+0x3c/0x68 [ 21.994230] kasan_save_track+0x20/0x40 [ 21.994359] kasan_save_alloc_info+0x40/0x58 [ 21.994464] __kasan_kmalloc+0xd4/0xd8 [ 21.994539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.994616] kmalloc_double_kzfree+0xb8/0x308 [ 21.994690] kunit_try_run_case+0x170/0x3f0 [ 21.994776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.994891] kthread+0x328/0x630 [ 21.994979] ret_from_fork+0x10/0x20 [ 21.995084] [ 21.995130] Freed by task 192: [ 21.995197] kasan_save_stack+0x3c/0x68 [ 21.995390] kasan_save_track+0x20/0x40 [ 21.995633] kasan_save_free_info+0x4c/0x78 [ 21.995859] __kasan_slab_free+0x6c/0x98 [ 21.995984] kfree+0x214/0x3c8 [ 21.996082] kfree_sensitive+0x80/0xb0 [ 21.996186] kmalloc_double_kzfree+0x11c/0x308 [ 21.996309] kunit_try_run_case+0x170/0x3f0 [ 21.996395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.996509] kthread+0x328/0x630 [ 21.996837] ret_from_fork+0x10/0x20 [ 21.997050] [ 21.997106] The buggy address belongs to the object at fff00000c66b10c0 [ 21.997106] which belongs to the cache kmalloc-16 of size 16 [ 21.997259] The buggy address is located 0 bytes inside of [ 21.997259] 16-byte region [fff00000c66b10c0, fff00000c66b10d0) [ 21.997417] [ 21.997471] The buggy address belongs to the physical page: [ 21.997545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 21.997687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.997808] page_type: f5(slab) [ 21.998171] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.998376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.998501] page dumped because: kasan: bad access detected [ 21.998619] [ 21.998662] Memory state around the buggy address: [ 21.998780] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 21.998911] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.999051] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 21.999167] ^ [ 21.999341] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.999448] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.999531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
Automatically assigned
[ 21.976311] ================================================================== [ 21.976636] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 21.976879] Read of size 1 at addr fff00000c66b10c0 by task kunit_try_catch/192 [ 21.977051] [ 21.977141] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.977436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.977494] Hardware name: linux,dummy-virt (DT) [ 21.977570] Call trace: [ 21.977622] show_stack+0x20/0x38 (C) [ 21.978146] dump_stack_lvl+0x8c/0xd0 [ 21.978307] print_report+0x118/0x608 [ 21.978507] kasan_report+0xdc/0x128 [ 21.978617] __kasan_check_byte+0x54/0x70 [ 21.978734] kfree_sensitive+0x30/0xb0 [ 21.978842] kmalloc_double_kzfree+0x168/0x308 [ 21.978933] kunit_try_run_case+0x170/0x3f0 [ 21.979034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.979140] kthread+0x328/0x630 [ 21.979222] ret_from_fork+0x10/0x20 [ 21.979334] [ 21.979378] Allocated by task 192: [ 21.979465] kasan_save_stack+0x3c/0x68 [ 21.979573] kasan_save_track+0x20/0x40 [ 21.979667] kasan_save_alloc_info+0x40/0x58 [ 21.979758] __kasan_kmalloc+0xd4/0xd8 [ 21.979846] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.979980] kmalloc_double_kzfree+0xb8/0x308 [ 21.980068] kunit_try_run_case+0x170/0x3f0 [ 21.980154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.980492] kthread+0x328/0x630 [ 21.980575] ret_from_fork+0x10/0x20 [ 21.980660] [ 21.980710] Freed by task 192: [ 21.980772] kasan_save_stack+0x3c/0x68 [ 21.981258] kasan_save_track+0x20/0x40 [ 21.981447] kasan_save_free_info+0x4c/0x78 [ 21.981562] __kasan_slab_free+0x6c/0x98 [ 21.981652] kfree+0x214/0x3c8 [ 21.981762] kfree_sensitive+0x80/0xb0 [ 21.981896] kmalloc_double_kzfree+0x11c/0x308 [ 21.982023] kunit_try_run_case+0x170/0x3f0 [ 21.982119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.982236] kthread+0x328/0x630 [ 21.982384] ret_from_fork+0x10/0x20 [ 21.982480] [ 21.982531] The buggy address belongs to the object at fff00000c66b10c0 [ 21.982531] which belongs to the cache kmalloc-16 of size 16 [ 21.983033] The buggy address is located 0 bytes inside of [ 21.983033] freed 16-byte region [fff00000c66b10c0, fff00000c66b10d0) [ 21.983160] [ 21.983205] The buggy address belongs to the physical page: [ 21.983295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 21.983434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.983662] page_type: f5(slab) [ 21.983916] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.984073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.984182] page dumped because: kasan: bad access detected [ 21.984298] [ 21.984363] Memory state around the buggy address: [ 21.984496] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 21.984654] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.984803] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 21.984931] ^ [ 21.985013] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985143] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985250] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
Automatically assigned
[ 21.921270] ================================================================== [ 21.921472] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 21.921634] Read of size 1 at addr fff00000c5e38b28 by task kunit_try_catch/188 [ 21.921761] [ 21.921856] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.922075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.922148] Hardware name: linux,dummy-virt (DT) [ 21.922888] Call trace: [ 21.923066] show_stack+0x20/0x38 (C) [ 21.923232] dump_stack_lvl+0x8c/0xd0 [ 21.923366] print_report+0x118/0x608 [ 21.923503] kasan_report+0xdc/0x128 [ 21.923604] __asan_report_load1_noabort+0x20/0x30 [ 21.923701] kmalloc_uaf2+0x3f4/0x468 [ 21.923801] kunit_try_run_case+0x170/0x3f0 [ 21.923975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.924647] kthread+0x328/0x630 [ 21.925029] ret_from_fork+0x10/0x20 [ 21.925284] [ 21.925331] Allocated by task 188: [ 21.925795] kasan_save_stack+0x3c/0x68 [ 21.926079] kasan_save_track+0x20/0x40 [ 21.926195] kasan_save_alloc_info+0x40/0x58 [ 21.926389] __kasan_kmalloc+0xd4/0xd8 [ 21.926606] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.926716] kmalloc_uaf2+0xc4/0x468 [ 21.927067] kunit_try_run_case+0x170/0x3f0 [ 21.927210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927349] kthread+0x328/0x630 [ 21.927445] ret_from_fork+0x10/0x20 [ 21.927535] [ 21.927586] Freed by task 188: [ 21.927662] kasan_save_stack+0x3c/0x68 [ 21.927995] kasan_save_track+0x20/0x40 [ 21.928215] kasan_save_free_info+0x4c/0x78 [ 21.928329] __kasan_slab_free+0x6c/0x98 [ 21.928949] kfree+0x214/0x3c8 [ 21.929140] kmalloc_uaf2+0x134/0x468 [ 21.929328] kunit_try_run_case+0x170/0x3f0 [ 21.929454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.929561] kthread+0x328/0x630 [ 21.929985] ret_from_fork+0x10/0x20 [ 21.930215] [ 21.930670] The buggy address belongs to the object at fff00000c5e38b00 [ 21.930670] which belongs to the cache kmalloc-64 of size 64 [ 21.930907] The buggy address is located 40 bytes inside of [ 21.930907] freed 64-byte region [fff00000c5e38b00, fff00000c5e38b40) [ 21.931162] [ 21.931365] The buggy address belongs to the physical page: [ 21.931534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38 [ 21.931686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.931791] page_type: f5(slab) [ 21.931871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.931979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.932079] page dumped because: kasan: bad access detected [ 21.932428] [ 21.932766] Memory state around the buggy address: [ 21.932872] fff00000c5e38a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.933083] fff00000c5e38a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.933291] >fff00000c5e38b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.933408] ^ [ 21.933728] fff00000c5e38b80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 21.934066] fff00000c5e38c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.934270] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
Automatically assigned
[ 21.899930] ================================================================== [ 21.900136] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 21.900308] Write of size 33 at addr fff00000c5e38980 by task kunit_try_catch/186 [ 21.900495] [ 21.900634] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.900935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.901001] Hardware name: linux,dummy-virt (DT) [ 21.901089] Call trace: [ 21.901174] show_stack+0x20/0x38 (C) [ 21.901360] dump_stack_lvl+0x8c/0xd0 [ 21.901491] print_report+0x118/0x608 [ 21.901606] kasan_report+0xdc/0x128 [ 21.901821] kasan_check_range+0x100/0x1a8 [ 21.902005] __asan_memset+0x34/0x78 [ 21.902170] kmalloc_uaf_memset+0x170/0x310 [ 21.902288] kunit_try_run_case+0x170/0x3f0 [ 21.902426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.902583] kthread+0x328/0x630 [ 21.902712] ret_from_fork+0x10/0x20 [ 21.902851] [ 21.902900] Allocated by task 186: [ 21.902961] kasan_save_stack+0x3c/0x68 [ 21.903139] kasan_save_track+0x20/0x40 [ 21.903227] kasan_save_alloc_info+0x40/0x58 [ 21.903305] __kasan_kmalloc+0xd4/0xd8 [ 21.903385] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.903485] kmalloc_uaf_memset+0xb8/0x310 [ 21.903573] kunit_try_run_case+0x170/0x3f0 [ 21.903672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.903782] kthread+0x328/0x630 [ 21.903861] ret_from_fork+0x10/0x20 [ 21.903963] [ 21.904027] Freed by task 186: [ 21.904124] kasan_save_stack+0x3c/0x68 [ 21.904206] kasan_save_track+0x20/0x40 [ 21.904295] kasan_save_free_info+0x4c/0x78 [ 21.904510] __kasan_slab_free+0x6c/0x98 [ 21.904648] kfree+0x214/0x3c8 [ 21.904730] kmalloc_uaf_memset+0x11c/0x310 [ 21.904838] kunit_try_run_case+0x170/0x3f0 [ 21.904988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.905104] kthread+0x328/0x630 [ 21.905184] ret_from_fork+0x10/0x20 [ 21.905276] [ 21.905341] The buggy address belongs to the object at fff00000c5e38980 [ 21.905341] which belongs to the cache kmalloc-64 of size 64 [ 21.905580] The buggy address is located 0 bytes inside of [ 21.905580] freed 64-byte region [fff00000c5e38980, fff00000c5e389c0) [ 21.905772] [ 21.905845] The buggy address belongs to the physical page: [ 21.905926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38 [ 21.906152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.906344] page_type: f5(slab) [ 21.906443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.906562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.906671] page dumped because: kasan: bad access detected [ 21.906759] [ 21.906806] Memory state around the buggy address: [ 21.906951] fff00000c5e38880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.907065] fff00000c5e38900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.907167] >fff00000c5e38980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.907269] ^ [ 21.907346] fff00000c5e38a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.907475] fff00000c5e38a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.907578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
Automatically assigned
[ 21.873007] ================================================================== [ 21.873202] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 21.873381] Read of size 1 at addr fff00000c66b10a8 by task kunit_try_catch/184 [ 21.873506] [ 21.873602] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.873814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.873884] Hardware name: linux,dummy-virt (DT) [ 21.873965] Call trace: [ 21.874023] show_stack+0x20/0x38 (C) [ 21.874149] dump_stack_lvl+0x8c/0xd0 [ 21.874277] print_report+0x118/0x608 [ 21.874467] kasan_report+0xdc/0x128 [ 21.874728] __asan_report_load1_noabort+0x20/0x30 [ 21.874863] kmalloc_uaf+0x300/0x338 [ 21.874965] kunit_try_run_case+0x170/0x3f0 [ 21.875095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.875330] kthread+0x328/0x630 [ 21.875501] ret_from_fork+0x10/0x20 [ 21.875686] [ 21.875754] Allocated by task 184: [ 21.875854] kasan_save_stack+0x3c/0x68 [ 21.876008] kasan_save_track+0x20/0x40 [ 21.876085] kasan_save_alloc_info+0x40/0x58 [ 21.876154] __kasan_kmalloc+0xd4/0xd8 [ 21.876218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.876326] kmalloc_uaf+0xb8/0x338 [ 21.876407] kunit_try_run_case+0x170/0x3f0 [ 21.876540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.876640] kthread+0x328/0x630 [ 21.876722] ret_from_fork+0x10/0x20 [ 21.876799] [ 21.876849] Freed by task 184: [ 21.876925] kasan_save_stack+0x3c/0x68 [ 21.877022] kasan_save_track+0x20/0x40 [ 21.877105] kasan_save_free_info+0x4c/0x78 [ 21.877179] __kasan_slab_free+0x6c/0x98 [ 21.877258] kfree+0x214/0x3c8 [ 21.877334] kmalloc_uaf+0x11c/0x338 [ 21.877479] kunit_try_run_case+0x170/0x3f0 [ 21.877600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.877714] kthread+0x328/0x630 [ 21.877800] ret_from_fork+0x10/0x20 [ 21.877888] [ 21.878066] The buggy address belongs to the object at fff00000c66b10a0 [ 21.878066] which belongs to the cache kmalloc-16 of size 16 [ 21.878863] The buggy address is located 8 bytes inside of [ 21.878863] freed 16-byte region [fff00000c66b10a0, fff00000c66b10b0) [ 21.879134] [ 21.879320] The buggy address belongs to the physical page: [ 21.879484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 21.880366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.880785] page_type: f5(slab) [ 21.880982] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.881369] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.881813] page dumped because: kasan: bad access detected [ 21.881936] [ 21.882021] Memory state around the buggy address: [ 21.882250] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 21.882878] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.883143] >fff00000c66b1080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 21.883259] ^ [ 21.883346] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.883462] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.883540] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
Automatically assigned
[ 21.843607] ================================================================== [ 21.843914] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 21.844154] Read of size 64 at addr fff00000c5e38704 by task kunit_try_catch/182 [ 21.844272] [ 21.844413] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.844728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.844817] Hardware name: linux,dummy-virt (DT) [ 21.844929] Call trace: [ 21.844997] show_stack+0x20/0x38 (C) [ 21.845140] dump_stack_lvl+0x8c/0xd0 [ 21.845316] print_report+0x118/0x608 [ 21.845484] kasan_report+0xdc/0x128 [ 21.845594] kasan_check_range+0x100/0x1a8 [ 21.845922] __asan_memmove+0x3c/0x98 [ 21.846122] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 21.846481] kunit_try_run_case+0x170/0x3f0 [ 21.846658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.846860] kthread+0x328/0x630 [ 21.847077] ret_from_fork+0x10/0x20 [ 21.847445] [ 21.847516] Allocated by task 182: [ 21.847602] kasan_save_stack+0x3c/0x68 [ 21.847729] kasan_save_track+0x20/0x40 [ 21.847834] kasan_save_alloc_info+0x40/0x58 [ 21.847929] __kasan_kmalloc+0xd4/0xd8 [ 21.848021] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.848194] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 21.848423] kunit_try_run_case+0x170/0x3f0 [ 21.848787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.848989] kthread+0x328/0x630 [ 21.849091] ret_from_fork+0x10/0x20 [ 21.849532] [ 21.849672] The buggy address belongs to the object at fff00000c5e38700 [ 21.849672] which belongs to the cache kmalloc-64 of size 64 [ 21.849886] The buggy address is located 4 bytes inside of [ 21.849886] allocated 64-byte region [fff00000c5e38700, fff00000c5e38740) [ 21.850056] [ 21.850305] The buggy address belongs to the physical page: [ 21.850443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38 [ 21.850570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.850677] page_type: f5(slab) [ 21.850763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.850876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.850954] page dumped because: kasan: bad access detected [ 21.851026] [ 21.851068] Memory state around the buggy address: [ 21.851445] fff00000c5e38600: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.851644] fff00000c5e38680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.851776] >fff00000c5e38700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.852178] ^ [ 21.852335] fff00000c5e38780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.852449] fff00000c5e38800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.852658] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
Automatically assigned
[ 21.776861] ================================================================== [ 21.777067] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.777231] Read of size 18446744073709551614 at addr fff00000c5e38504 by task kunit_try_catch/180 [ 21.780664] [ 21.781355] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.782288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.782408] Hardware name: linux,dummy-virt (DT) [ 21.782481] Call trace: [ 21.782528] show_stack+0x20/0x38 (C) [ 21.782669] dump_stack_lvl+0x8c/0xd0 [ 21.784263] print_report+0x118/0x608 [ 21.784976] kasan_report+0xdc/0x128 [ 21.785100] kasan_check_range+0x100/0x1a8 [ 21.785851] __asan_memmove+0x3c/0x98 [ 21.786230] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.786355] kunit_try_run_case+0x170/0x3f0 [ 21.786976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.787075] kthread+0x328/0x630 [ 21.787164] ret_from_fork+0x10/0x20 [ 21.787278] [ 21.787330] Allocated by task 180: [ 21.788929] kasan_save_stack+0x3c/0x68 [ 21.789065] kasan_save_track+0x20/0x40 [ 21.789825] kasan_save_alloc_info+0x40/0x58 [ 21.790200] __kasan_kmalloc+0xd4/0xd8 [ 21.790491] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.791100] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 21.791537] kunit_try_run_case+0x170/0x3f0 [ 21.791918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.792134] kthread+0x328/0x630 [ 21.792214] ret_from_fork+0x10/0x20 [ 21.795067] [ 21.795134] The buggy address belongs to the object at fff00000c5e38500 [ 21.795134] which belongs to the cache kmalloc-64 of size 64 [ 21.795286] The buggy address is located 4 bytes inside of [ 21.795286] 64-byte region [fff00000c5e38500, fff00000c5e38540) [ 21.795418] [ 21.795466] The buggy address belongs to the physical page: [ 21.795530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38 [ 21.795627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.795738] page_type: f5(slab) [ 21.795837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.795965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.796069] page dumped because: kasan: bad access detected [ 21.796151] [ 21.796196] Memory state around the buggy address: [ 21.796284] fff00000c5e38400: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 21.796395] fff00000c5e38480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.796523] >fff00000c5e38500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.796637] ^ [ 21.796711] fff00000c5e38580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.796823] fff00000c5e38600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.796921] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
Automatically assigned
[ 21.703672] ================================================================== [ 21.704137] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 21.704344] Write of size 16 at addr fff00000c5d6ee69 by task kunit_try_catch/178 [ 21.704472] [ 21.704559] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.704775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.704839] Hardware name: linux,dummy-virt (DT) [ 21.704915] Call trace: [ 21.704969] show_stack+0x20/0x38 (C) [ 21.705091] dump_stack_lvl+0x8c/0xd0 [ 21.705211] print_report+0x118/0x608 [ 21.705323] kasan_report+0xdc/0x128 [ 21.705440] kasan_check_range+0x100/0x1a8 [ 21.705550] __asan_memset+0x34/0x78 [ 21.705656] kmalloc_oob_memset_16+0x150/0x2f8 [ 21.705769] kunit_try_run_case+0x170/0x3f0 [ 21.705886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.706011] kthread+0x328/0x630 [ 21.706112] ret_from_fork+0x10/0x20 [ 21.706226] [ 21.706272] Allocated by task 178: [ 21.706341] kasan_save_stack+0x3c/0x68 [ 21.706457] kasan_save_track+0x20/0x40 [ 21.706542] kasan_save_alloc_info+0x40/0x58 [ 21.707135] __kasan_kmalloc+0xd4/0xd8 [ 21.707435] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.707725] kmalloc_oob_memset_16+0xb0/0x2f8 [ 21.707842] kunit_try_run_case+0x170/0x3f0 [ 21.707932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.708067] kthread+0x328/0x630 [ 21.708170] ret_from_fork+0x10/0x20 [ 21.708273] [ 21.708360] The buggy address belongs to the object at fff00000c5d6ee00 [ 21.708360] which belongs to the cache kmalloc-128 of size 128 [ 21.708546] The buggy address is located 105 bytes inside of [ 21.708546] allocated 120-byte region [fff00000c5d6ee00, fff00000c5d6ee78) [ 21.708740] [ 21.708813] The buggy address belongs to the physical page: [ 21.708888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 21.709016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.709138] page_type: f5(slab) [ 21.709230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.709348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.709461] page dumped because: kasan: bad access detected [ 21.709541] [ 21.709585] Memory state around the buggy address: [ 21.709798] fff00000c5d6ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.710032] fff00000c5d6ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.710349] >fff00000c5d6ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.710454] ^ [ 21.710593] fff00000c5d6ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.710699] fff00000c5d6ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.710844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
Automatically assigned
[ 21.633227] ================================================================== [ 21.633723] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 21.633909] Write of size 8 at addr fff00000c5d6ed71 by task kunit_try_catch/176 [ 21.634031] [ 21.634115] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.634220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.634250] Hardware name: linux,dummy-virt (DT) [ 21.634288] Call trace: [ 21.634316] show_stack+0x20/0x38 (C) [ 21.634474] dump_stack_lvl+0x8c/0xd0 [ 21.634587] print_report+0x118/0x608 [ 21.634681] kasan_report+0xdc/0x128 [ 21.634786] kasan_check_range+0x100/0x1a8 [ 21.634924] __asan_memset+0x34/0x78 [ 21.635034] kmalloc_oob_memset_8+0x150/0x2f8 [ 21.635152] kunit_try_run_case+0x170/0x3f0 [ 21.635275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.635644] kthread+0x328/0x630 [ 21.635784] ret_from_fork+0x10/0x20 [ 21.636417] [ 21.636492] Allocated by task 176: [ 21.636675] kasan_save_stack+0x3c/0x68 [ 21.636860] kasan_save_track+0x20/0x40 [ 21.636965] kasan_save_alloc_info+0x40/0x58 [ 21.637063] __kasan_kmalloc+0xd4/0xd8 [ 21.637657] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.637827] kmalloc_oob_memset_8+0xb0/0x2f8 [ 21.637914] kunit_try_run_case+0x170/0x3f0 [ 21.638024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.638146] kthread+0x328/0x630 [ 21.638235] ret_from_fork+0x10/0x20 [ 21.638326] [ 21.638392] The buggy address belongs to the object at fff00000c5d6ed00 [ 21.638392] which belongs to the cache kmalloc-128 of size 128 [ 21.638532] The buggy address is located 113 bytes inside of [ 21.638532] allocated 120-byte region [fff00000c5d6ed00, fff00000c5d6ed78) [ 21.638804] [ 21.638870] The buggy address belongs to the physical page: [ 21.638939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 21.639038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.639579] page_type: f5(slab) [ 21.639701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.639822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.639933] page dumped because: kasan: bad access detected [ 21.640003] [ 21.640047] Memory state around the buggy address: [ 21.640390] fff00000c5d6ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.640535] fff00000c5d6ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.640654] >fff00000c5d6ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.640787] ^ [ 21.640892] fff00000c5d6ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.640995] fff00000c5d6ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.641088] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
Automatically assigned
[ 21.594219] ================================================================== [ 21.594572] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 21.594732] Write of size 4 at addr fff00000c5d6ec75 by task kunit_try_catch/174 [ 21.594854] [ 21.594931] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.595112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.595174] Hardware name: linux,dummy-virt (DT) [ 21.595251] Call trace: [ 21.595308] show_stack+0x20/0x38 (C) [ 21.595446] dump_stack_lvl+0x8c/0xd0 [ 21.595569] print_report+0x118/0x608 [ 21.596087] kasan_report+0xdc/0x128 [ 21.596308] kasan_check_range+0x100/0x1a8 [ 21.596786] __asan_memset+0x34/0x78 [ 21.597096] kmalloc_oob_memset_4+0x150/0x300 [ 21.597364] kunit_try_run_case+0x170/0x3f0 [ 21.597663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.597813] kthread+0x328/0x630 [ 21.598221] ret_from_fork+0x10/0x20 [ 21.598475] [ 21.598589] Allocated by task 174: [ 21.598762] kasan_save_stack+0x3c/0x68 [ 21.599004] kasan_save_track+0x20/0x40 [ 21.599088] kasan_save_alloc_info+0x40/0x58 [ 21.599160] __kasan_kmalloc+0xd4/0xd8 [ 21.599239] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.599328] kmalloc_oob_memset_4+0xb0/0x300 [ 21.599818] kunit_try_run_case+0x170/0x3f0 [ 21.600049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.600287] kthread+0x328/0x630 [ 21.600537] ret_from_fork+0x10/0x20 [ 21.600658] [ 21.600712] The buggy address belongs to the object at fff00000c5d6ec00 [ 21.600712] which belongs to the cache kmalloc-128 of size 128 [ 21.601243] The buggy address is located 117 bytes inside of [ 21.601243] allocated 120-byte region [fff00000c5d6ec00, fff00000c5d6ec78) [ 21.601406] [ 21.601503] The buggy address belongs to the physical page: [ 21.601615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 21.601800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.602015] page_type: f5(slab) [ 21.602118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.602554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.602902] page dumped because: kasan: bad access detected [ 21.602989] [ 21.603039] Memory state around the buggy address: [ 21.603121] fff00000c5d6eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.603227] fff00000c5d6eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.603315] >fff00000c5d6ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.603384] ^ [ 21.604012] fff00000c5d6ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.604161] fff00000c5d6ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.604314] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
Automatically assigned
[ 21.548871] ================================================================== [ 21.549063] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 21.549221] Write of size 2 at addr fff00000c5d6eb77 by task kunit_try_catch/172 [ 21.549345] [ 21.549451] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.549666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.549729] Hardware name: linux,dummy-virt (DT) [ 21.549804] Call trace: [ 21.549860] show_stack+0x20/0x38 (C) [ 21.549980] dump_stack_lvl+0x8c/0xd0 [ 21.550106] print_report+0x118/0x608 [ 21.550222] kasan_report+0xdc/0x128 [ 21.550330] kasan_check_range+0x100/0x1a8 [ 21.554646] __asan_memset+0x34/0x78 [ 21.555384] kmalloc_oob_memset_2+0x150/0x2f8 [ 21.555930] kunit_try_run_case+0x170/0x3f0 [ 21.556116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.556221] kthread+0x328/0x630 [ 21.556316] ret_from_fork+0x10/0x20 [ 21.557055] [ 21.557111] Allocated by task 172: [ 21.557698] kasan_save_stack+0x3c/0x68 [ 21.557929] kasan_save_track+0x20/0x40 [ 21.558020] kasan_save_alloc_info+0x40/0x58 [ 21.558875] __kasan_kmalloc+0xd4/0xd8 [ 21.559044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.559185] kmalloc_oob_memset_2+0xb0/0x2f8 [ 21.559316] kunit_try_run_case+0x170/0x3f0 [ 21.559455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.559559] kthread+0x328/0x630 [ 21.559792] ret_from_fork+0x10/0x20 [ 21.560105] [ 21.560163] The buggy address belongs to the object at fff00000c5d6eb00 [ 21.560163] which belongs to the cache kmalloc-128 of size 128 [ 21.561163] The buggy address is located 119 bytes inside of [ 21.561163] allocated 120-byte region [fff00000c5d6eb00, fff00000c5d6eb78) [ 21.561747] [ 21.561982] The buggy address belongs to the physical page: [ 21.562338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 21.562656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.562978] page_type: f5(slab) [ 21.563323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.563716] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.563811] page dumped because: kasan: bad access detected [ 21.564463] [ 21.564511] Memory state around the buggy address: [ 21.564592] fff00000c5d6ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.565005] fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.565202] >fff00000c5d6eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.565302] ^ [ 21.565414] fff00000c5d6eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.565529] fff00000c5d6ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.565623] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
Automatically assigned
[ 21.509548] ================================================================== [ 21.509743] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 21.510636] Write of size 128 at addr fff00000c5d6ea00 by task kunit_try_catch/170 [ 21.510937] [ 21.511409] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.511714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.511783] Hardware name: linux,dummy-virt (DT) [ 21.511948] Call trace: [ 21.512413] show_stack+0x20/0x38 (C) [ 21.512811] dump_stack_lvl+0x8c/0xd0 [ 21.512961] print_report+0x118/0x608 [ 21.513076] kasan_report+0xdc/0x128 [ 21.513190] kasan_check_range+0x100/0x1a8 [ 21.513524] __asan_memset+0x34/0x78 [ 21.513645] kmalloc_oob_in_memset+0x144/0x2d0 [ 21.513783] kunit_try_run_case+0x170/0x3f0 [ 21.513908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.514034] kthread+0x328/0x630 [ 21.514143] ret_from_fork+0x10/0x20 [ 21.514265] [ 21.514327] Allocated by task 170: [ 21.514792] kasan_save_stack+0x3c/0x68 [ 21.515493] kasan_save_track+0x20/0x40 [ 21.515849] kasan_save_alloc_info+0x40/0x58 [ 21.515972] __kasan_kmalloc+0xd4/0xd8 [ 21.516067] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.516164] kmalloc_oob_in_memset+0xb0/0x2d0 [ 21.516493] kunit_try_run_case+0x170/0x3f0 [ 21.516608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.516980] kthread+0x328/0x630 [ 21.517091] ret_from_fork+0x10/0x20 [ 21.517179] [ 21.517760] The buggy address belongs to the object at fff00000c5d6ea00 [ 21.517760] which belongs to the cache kmalloc-128 of size 128 [ 21.518123] The buggy address is located 0 bytes inside of [ 21.518123] allocated 120-byte region [fff00000c5d6ea00, fff00000c5d6ea78) [ 21.518453] [ 21.518528] The buggy address belongs to the physical page: [ 21.518674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 21.518785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.519414] page_type: f5(slab) [ 21.519543] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.520039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.520223] page dumped because: kasan: bad access detected [ 21.520316] [ 21.520363] Memory state around the buggy address: [ 21.520529] fff00000c5d6e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.520646] fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.520934] >fff00000c5d6ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.521061] ^ [ 21.521577] fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521856] fff00000c5d6eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521951] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
Automatically assigned
[ 21.470309] ================================================================== [ 21.470586] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 21.470775] Read of size 16 at addr fff00000c66b1080 by task kunit_try_catch/168 [ 21.470970] [ 21.471109] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.471363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.471443] Hardware name: linux,dummy-virt (DT) [ 21.471515] Call trace: [ 21.471571] show_stack+0x20/0x38 (C) [ 21.471751] dump_stack_lvl+0x8c/0xd0 [ 21.471932] print_report+0x118/0x608 [ 21.472096] kasan_report+0xdc/0x128 [ 21.472435] __asan_report_load16_noabort+0x20/0x30 [ 21.472946] kmalloc_uaf_16+0x3bc/0x438 [ 21.473057] kunit_try_run_case+0x170/0x3f0 [ 21.473167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.473279] kthread+0x328/0x630 [ 21.473365] ret_from_fork+0x10/0x20 [ 21.473485] [ 21.473528] Allocated by task 168: [ 21.473593] kasan_save_stack+0x3c/0x68 [ 21.473975] kasan_save_track+0x20/0x40 [ 21.474069] kasan_save_alloc_info+0x40/0x58 [ 21.474163] __kasan_kmalloc+0xd4/0xd8 [ 21.474253] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.474481] kmalloc_uaf_16+0x140/0x438 [ 21.474570] kunit_try_run_case+0x170/0x3f0 [ 21.474653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.474752] kthread+0x328/0x630 [ 21.474837] ret_from_fork+0x10/0x20 [ 21.474949] [ 21.475161] Freed by task 168: [ 21.475254] kasan_save_stack+0x3c/0x68 [ 21.475437] kasan_save_track+0x20/0x40 [ 21.475571] kasan_save_free_info+0x4c/0x78 [ 21.475698] __kasan_slab_free+0x6c/0x98 [ 21.475786] kfree+0x214/0x3c8 [ 21.475882] kmalloc_uaf_16+0x190/0x438 [ 21.476005] kunit_try_run_case+0x170/0x3f0 [ 21.476099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.476206] kthread+0x328/0x630 [ 21.476285] ret_from_fork+0x10/0x20 [ 21.476376] [ 21.476440] The buggy address belongs to the object at fff00000c66b1080 [ 21.476440] which belongs to the cache kmalloc-16 of size 16 [ 21.476587] The buggy address is located 0 bytes inside of [ 21.476587] freed 16-byte region [fff00000c66b1080, fff00000c66b1090) [ 21.476747] [ 21.476867] The buggy address belongs to the physical page: [ 21.476969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 21.477165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.477312] page_type: f5(slab) [ 21.477422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.477542] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.477690] page dumped because: kasan: bad access detected [ 21.477783] [ 21.477833] Memory state around the buggy address: [ 21.477925] fff00000c66b0f80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 21.478252] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 21.478529] >fff00000c66b1080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.478743] ^ [ 21.479029] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.479222] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.479442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
Automatically assigned
[ 21.443593] ================================================================== [ 21.443791] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 21.443949] Write of size 16 at addr fff00000c66b1020 by task kunit_try_catch/166 [ 21.444074] [ 21.444163] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.444375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.444519] Hardware name: linux,dummy-virt (DT) [ 21.444594] Call trace: [ 21.444649] show_stack+0x20/0x38 (C) [ 21.444829] dump_stack_lvl+0x8c/0xd0 [ 21.444971] print_report+0x118/0x608 [ 21.445083] kasan_report+0xdc/0x128 [ 21.445387] __asan_report_store16_noabort+0x20/0x30 [ 21.445763] kmalloc_oob_16+0x3a0/0x3f8 [ 21.445897] kunit_try_run_case+0x170/0x3f0 [ 21.446191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.446341] kthread+0x328/0x630 [ 21.446480] ret_from_fork+0x10/0x20 [ 21.446590] [ 21.446633] Allocated by task 166: [ 21.446704] kasan_save_stack+0x3c/0x68 [ 21.446840] kasan_save_track+0x20/0x40 [ 21.446924] kasan_save_alloc_info+0x40/0x58 [ 21.447276] __kasan_kmalloc+0xd4/0xd8 [ 21.447379] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.447518] kmalloc_oob_16+0xb4/0x3f8 [ 21.447596] kunit_try_run_case+0x170/0x3f0 [ 21.447744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.447864] kthread+0x328/0x630 [ 21.447944] ret_from_fork+0x10/0x20 [ 21.448026] [ 21.448072] The buggy address belongs to the object at fff00000c66b1020 [ 21.448072] which belongs to the cache kmalloc-16 of size 16 [ 21.448304] The buggy address is located 0 bytes inside of [ 21.448304] allocated 13-byte region [fff00000c66b1020, fff00000c66b102d) [ 21.448684] [ 21.448837] The buggy address belongs to the physical page: [ 21.448924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 21.449054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.449184] page_type: f5(slab) [ 21.449284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.449418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.449519] page dumped because: kasan: bad access detected [ 21.449600] [ 21.449654] Memory state around the buggy address: [ 21.449731] fff00000c66b0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.449907] fff00000c66b0f80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 21.450202] >fff00000c66b1000: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 21.450367] ^ [ 21.450452] fff00000c66b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.450600] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.450695] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
Automatically assigned
[ 21.417944] ================================================================== [ 21.418102] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 21.418342] Read of size 1 at addr fff00000c4729800 by task kunit_try_catch/164 [ 21.418797] [ 21.418905] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.419078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.419136] Hardware name: linux,dummy-virt (DT) [ 21.419197] Call trace: [ 21.419247] show_stack+0x20/0x38 (C) [ 21.419390] dump_stack_lvl+0x8c/0xd0 [ 21.419535] print_report+0x118/0x608 [ 21.419654] kasan_report+0xdc/0x128 [ 21.419767] __asan_report_load1_noabort+0x20/0x30 [ 21.419896] krealloc_uaf+0x4c8/0x520 [ 21.420013] kunit_try_run_case+0x170/0x3f0 [ 21.420133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.420264] kthread+0x328/0x630 [ 21.420376] ret_from_fork+0x10/0x20 [ 21.420498] [ 21.420541] Allocated by task 164: [ 21.420606] kasan_save_stack+0x3c/0x68 [ 21.420749] kasan_save_track+0x20/0x40 [ 21.420857] kasan_save_alloc_info+0x40/0x58 [ 21.420963] __kasan_kmalloc+0xd4/0xd8 [ 21.421054] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.421516] krealloc_uaf+0xc8/0x520 [ 21.421607] kunit_try_run_case+0x170/0x3f0 [ 21.421730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.422063] kthread+0x328/0x630 [ 21.422239] ret_from_fork+0x10/0x20 [ 21.422496] [ 21.422673] Freed by task 164: [ 21.422766] kasan_save_stack+0x3c/0x68 [ 21.422864] kasan_save_track+0x20/0x40 [ 21.422945] kasan_save_free_info+0x4c/0x78 [ 21.423542] __kasan_slab_free+0x6c/0x98 [ 21.423640] kfree+0x214/0x3c8 [ 21.423682] krealloc_uaf+0x12c/0x520 [ 21.423723] kunit_try_run_case+0x170/0x3f0 [ 21.423802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.423908] kthread+0x328/0x630 [ 21.424048] ret_from_fork+0x10/0x20 [ 21.424151] [ 21.424202] The buggy address belongs to the object at fff00000c4729800 [ 21.424202] which belongs to the cache kmalloc-256 of size 256 [ 21.424346] The buggy address is located 0 bytes inside of [ 21.424346] freed 256-byte region [fff00000c4729800, fff00000c4729900) [ 21.424513] [ 21.424566] The buggy address belongs to the physical page: [ 21.424646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.424780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.424897] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.425037] page_type: f5(slab) [ 21.425163] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.425333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.425463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.425580] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.425748] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.426056] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.426301] page dumped because: kasan: bad access detected [ 21.426611] [ 21.426672] Memory state around the buggy address: [ 21.426749] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.426867] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.426958] >fff00000c4729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.427033] ^ [ 21.427093] fff00000c4729880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.427188] fff00000c4729900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.427581] ================================================================== [ 21.402545] ================================================================== [ 21.402757] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 21.402923] Read of size 1 at addr fff00000c4729800 by task kunit_try_catch/164 [ 21.403047] [ 21.403143] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.403357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.403429] Hardware name: linux,dummy-virt (DT) [ 21.403501] Call trace: [ 21.403554] show_stack+0x20/0x38 (C) [ 21.403675] dump_stack_lvl+0x8c/0xd0 [ 21.403801] print_report+0x118/0x608 [ 21.403991] kasan_report+0xdc/0x128 [ 21.405093] __kasan_check_byte+0x54/0x70 [ 21.405234] krealloc_noprof+0x44/0x360 [ 21.405351] krealloc_uaf+0x180/0x520 [ 21.405680] kunit_try_run_case+0x170/0x3f0 [ 21.405801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.405959] kthread+0x328/0x630 [ 21.406088] ret_from_fork+0x10/0x20 [ 21.406216] [ 21.406263] Allocated by task 164: [ 21.406331] kasan_save_stack+0x3c/0x68 [ 21.406490] kasan_save_track+0x20/0x40 [ 21.406601] kasan_save_alloc_info+0x40/0x58 [ 21.406936] __kasan_kmalloc+0xd4/0xd8 [ 21.407050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.407140] krealloc_uaf+0xc8/0x520 [ 21.407219] kunit_try_run_case+0x170/0x3f0 [ 21.407450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.407567] kthread+0x328/0x630 [ 21.407649] ret_from_fork+0x10/0x20 [ 21.407781] [ 21.407874] Freed by task 164: [ 21.408518] kasan_save_stack+0x3c/0x68 [ 21.408648] kasan_save_track+0x20/0x40 [ 21.408905] kasan_save_free_info+0x4c/0x78 [ 21.409769] __kasan_slab_free+0x6c/0x98 [ 21.409921] kfree+0x214/0x3c8 [ 21.410274] krealloc_uaf+0x12c/0x520 [ 21.410396] kunit_try_run_case+0x170/0x3f0 [ 21.410635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.410756] kthread+0x328/0x630 [ 21.410851] ret_from_fork+0x10/0x20 [ 21.410984] [ 21.411053] The buggy address belongs to the object at fff00000c4729800 [ 21.411053] which belongs to the cache kmalloc-256 of size 256 [ 21.411383] The buggy address is located 0 bytes inside of [ 21.411383] freed 256-byte region [fff00000c4729800, fff00000c4729900) [ 21.411706] [ 21.411763] The buggy address belongs to the physical page: [ 21.411936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.412224] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.412385] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.412762] page_type: f5(slab) [ 21.413003] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.413247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.413369] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.413501] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.413619] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.413731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.413833] page dumped because: kasan: bad access detected [ 21.413910] [ 21.414278] Memory state around the buggy address: [ 21.414511] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.414613] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.414714] >fff00000c4729800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.415054] ^ [ 21.415135] fff00000c4729880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.415247] fff00000c4729900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.415407] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
Automatically assigned
[ 21.249300] ================================================================== [ 21.249506] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 21.249942] Write of size 1 at addr fff00000c47296d0 by task kunit_try_catch/158 [ 21.250160] [ 21.250302] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.250546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.250609] Hardware name: linux,dummy-virt (DT) [ 21.250679] Call trace: [ 21.250733] show_stack+0x20/0x38 (C) [ 21.251048] dump_stack_lvl+0x8c/0xd0 [ 21.251175] print_report+0x118/0x608 [ 21.251301] kasan_report+0xdc/0x128 [ 21.251433] __asan_report_store1_noabort+0x20/0x30 [ 21.251565] krealloc_less_oob_helper+0xb9c/0xc50 [ 21.251839] krealloc_less_oob+0x20/0x38 [ 21.252041] kunit_try_run_case+0x170/0x3f0 [ 21.252253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.253600] kthread+0x328/0x630 [ 21.253679] ret_from_fork+0x10/0x20 [ 21.253745] [ 21.253768] Allocated by task 158: [ 21.253802] kasan_save_stack+0x3c/0x68 [ 21.253853] kasan_save_track+0x20/0x40 [ 21.253896] kasan_save_alloc_info+0x40/0x58 [ 21.253936] __kasan_krealloc+0x118/0x178 [ 21.253977] krealloc_noprof+0x128/0x360 [ 21.254019] krealloc_less_oob_helper+0x168/0xc50 [ 21.254061] krealloc_less_oob+0x20/0x38 [ 21.254101] kunit_try_run_case+0x170/0x3f0 [ 21.254143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.254190] kthread+0x328/0x630 [ 21.254226] ret_from_fork+0x10/0x20 [ 21.254265] [ 21.254289] The buggy address belongs to the object at fff00000c4729600 [ 21.254289] which belongs to the cache kmalloc-256 of size 256 [ 21.254386] The buggy address is located 7 bytes to the right of [ 21.254386] allocated 201-byte region [fff00000c4729600, fff00000c47296c9) [ 21.254624] [ 21.254674] The buggy address belongs to the physical page: [ 21.254743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.254857] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.254967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.255105] page_type: f5(slab) [ 21.255208] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.255410] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.255599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.255725] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.255849] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.255975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.256078] page dumped because: kasan: bad access detected [ 21.256154] [ 21.256197] Memory state around the buggy address: [ 21.256291] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.256436] fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.256537] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.256628] ^ [ 21.257262] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.257910] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.258029] ================================================================== [ 21.380150] ================================================================== [ 21.380265] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.380383] Write of size 1 at addr fff00000c65ea0eb by task kunit_try_catch/162 [ 21.380520] [ 21.380615] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.380828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.380884] Hardware name: linux,dummy-virt (DT) [ 21.380955] Call trace: [ 21.381009] show_stack+0x20/0x38 (C) [ 21.381155] dump_stack_lvl+0x8c/0xd0 [ 21.381279] print_report+0x118/0x608 [ 21.381392] kasan_report+0xdc/0x128 [ 21.381521] __asan_report_store1_noabort+0x20/0x30 [ 21.381658] krealloc_less_oob_helper+0xa58/0xc50 [ 21.381789] krealloc_large_less_oob+0x20/0x38 [ 21.381923] kunit_try_run_case+0x170/0x3f0 [ 21.382037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.382160] kthread+0x328/0x630 [ 21.382271] ret_from_fork+0x10/0x20 [ 21.382447] [ 21.382541] The buggy address belongs to the physical page: [ 21.382621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.382751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.382860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.382966] page_type: f8(unknown) [ 21.383055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.383178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.383303] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.383458] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.383586] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.383745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.383863] page dumped because: kasan: bad access detected [ 21.383970] [ 21.384033] Memory state around the buggy address: [ 21.384143] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.384288] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.384392] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.384481] ^ [ 21.384572] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.384717] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.384812] ================================================================== [ 21.352816] ================================================================== [ 21.353548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 21.353739] Write of size 1 at addr fff00000c65ea0d0 by task kunit_try_catch/162 [ 21.353869] [ 21.353961] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.354172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.354235] Hardware name: linux,dummy-virt (DT) [ 21.354313] Call trace: [ 21.354968] show_stack+0x20/0x38 (C) [ 21.355210] dump_stack_lvl+0x8c/0xd0 [ 21.356027] print_report+0x118/0x608 [ 21.356429] kasan_report+0xdc/0x128 [ 21.356650] __asan_report_store1_noabort+0x20/0x30 [ 21.356863] krealloc_less_oob_helper+0xb9c/0xc50 [ 21.357217] krealloc_large_less_oob+0x20/0x38 [ 21.357562] kunit_try_run_case+0x170/0x3f0 [ 21.357699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.358125] kthread+0x328/0x630 [ 21.358799] ret_from_fork+0x10/0x20 [ 21.358972] [ 21.359019] The buggy address belongs to the physical page: [ 21.359083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.359205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.360007] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.360607] page_type: f8(unknown) [ 21.360725] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.360922] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.361134] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.361269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.361609] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.362048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.362179] page dumped because: kasan: bad access detected [ 21.362495] [ 21.362561] Memory state around the buggy address: [ 21.362638] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.362721] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.362797] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.362885] ^ [ 21.363217] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.363496] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.363593] ================================================================== [ 21.239289] ================================================================== [ 21.239483] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 21.239639] Write of size 1 at addr fff00000c47296c9 by task kunit_try_catch/158 [ 21.240077] [ 21.240347] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.240656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.240742] Hardware name: linux,dummy-virt (DT) [ 21.240830] Call trace: [ 21.240889] show_stack+0x20/0x38 (C) [ 21.241023] dump_stack_lvl+0x8c/0xd0 [ 21.241149] print_report+0x118/0x608 [ 21.241246] kasan_report+0xdc/0x128 [ 21.241331] __asan_report_store1_noabort+0x20/0x30 [ 21.241452] krealloc_less_oob_helper+0xa48/0xc50 [ 21.241586] krealloc_less_oob+0x20/0x38 [ 21.241696] kunit_try_run_case+0x170/0x3f0 [ 21.241978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.242309] kthread+0x328/0x630 [ 21.242528] ret_from_fork+0x10/0x20 [ 21.242663] [ 21.242709] Allocated by task 158: [ 21.242772] kasan_save_stack+0x3c/0x68 [ 21.242866] kasan_save_track+0x20/0x40 [ 21.242951] kasan_save_alloc_info+0x40/0x58 [ 21.243062] __kasan_krealloc+0x118/0x178 [ 21.243164] krealloc_noprof+0x128/0x360 [ 21.243258] krealloc_less_oob_helper+0x168/0xc50 [ 21.243358] krealloc_less_oob+0x20/0x38 [ 21.243465] kunit_try_run_case+0x170/0x3f0 [ 21.243561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.243665] kthread+0x328/0x630 [ 21.243744] ret_from_fork+0x10/0x20 [ 21.243831] [ 21.243883] The buggy address belongs to the object at fff00000c4729600 [ 21.243883] which belongs to the cache kmalloc-256 of size 256 [ 21.244029] The buggy address is located 0 bytes to the right of [ 21.244029] allocated 201-byte region [fff00000c4729600, fff00000c47296c9) [ 21.244197] [ 21.244274] The buggy address belongs to the physical page: [ 21.244378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.244508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.244618] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.244760] page_type: f5(slab) [ 21.245081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.245498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.245653] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.245772] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.246106] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.246259] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.246381] page dumped because: kasan: bad access detected [ 21.246484] [ 21.246534] Memory state around the buggy address: [ 21.246616] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.246721] fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.246836] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.246934] ^ [ 21.247020] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.247112] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.247180] ================================================================== [ 21.365566] ================================================================== [ 21.365684] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.365821] Write of size 1 at addr fff00000c65ea0da by task kunit_try_catch/162 [ 21.366134] [ 21.366238] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.366867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.366975] Hardware name: linux,dummy-virt (DT) [ 21.367187] Call trace: [ 21.367272] show_stack+0x20/0x38 (C) [ 21.367623] dump_stack_lvl+0x8c/0xd0 [ 21.367703] print_report+0x118/0x608 [ 21.367760] kasan_report+0xdc/0x128 [ 21.367835] __asan_report_store1_noabort+0x20/0x30 [ 21.367919] krealloc_less_oob_helper+0xa80/0xc50 [ 21.367974] krealloc_large_less_oob+0x20/0x38 [ 21.368027] kunit_try_run_case+0x170/0x3f0 [ 21.368081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.368139] kthread+0x328/0x630 [ 21.368188] ret_from_fork+0x10/0x20 [ 21.368247] [ 21.368274] The buggy address belongs to the physical page: [ 21.368312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.368373] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.368444] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.368509] page_type: f8(unknown) [ 21.368557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.368612] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.368666] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.368718] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.368770] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.368821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.368864] page dumped because: kasan: bad access detected [ 21.368898] [ 21.368918] Memory state around the buggy address: [ 21.368955] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.369001] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.369047] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.369088] ^ [ 21.369130] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.369175] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.369216] ================================================================== [ 21.260054] ================================================================== [ 21.260639] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.260805] Write of size 1 at addr fff00000c47296da by task kunit_try_catch/158 [ 21.260926] [ 21.261376] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.261619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.261688] Hardware name: linux,dummy-virt (DT) [ 21.261767] Call trace: [ 21.261836] show_stack+0x20/0x38 (C) [ 21.261973] dump_stack_lvl+0x8c/0xd0 [ 21.262088] print_report+0x118/0x608 [ 21.262205] kasan_report+0xdc/0x128 [ 21.262321] __asan_report_store1_noabort+0x20/0x30 [ 21.262706] krealloc_less_oob_helper+0xa80/0xc50 [ 21.262862] krealloc_less_oob+0x20/0x38 [ 21.263634] kunit_try_run_case+0x170/0x3f0 [ 21.263829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.264030] kthread+0x328/0x630 [ 21.264136] ret_from_fork+0x10/0x20 [ 21.264250] [ 21.264301] Allocated by task 158: [ 21.264370] kasan_save_stack+0x3c/0x68 [ 21.264482] kasan_save_track+0x20/0x40 [ 21.264574] kasan_save_alloc_info+0x40/0x58 [ 21.264661] __kasan_krealloc+0x118/0x178 [ 21.264749] krealloc_noprof+0x128/0x360 [ 21.264841] krealloc_less_oob_helper+0x168/0xc50 [ 21.264937] krealloc_less_oob+0x20/0x38 [ 21.265023] kunit_try_run_case+0x170/0x3f0 [ 21.265126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.265269] kthread+0x328/0x630 [ 21.265353] ret_from_fork+0x10/0x20 [ 21.265448] [ 21.265513] The buggy address belongs to the object at fff00000c4729600 [ 21.265513] which belongs to the cache kmalloc-256 of size 256 [ 21.265704] The buggy address is located 17 bytes to the right of [ 21.265704] allocated 201-byte region [fff00000c4729600, fff00000c47296c9) [ 21.265861] [ 21.265911] The buggy address belongs to the physical page: [ 21.265992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.266138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.266297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.266470] page_type: f5(slab) [ 21.266561] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.266687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.266825] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.266927] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.267033] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.267146] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.267251] page dumped because: kasan: bad access detected [ 21.267332] [ 21.267380] Memory state around the buggy address: [ 21.267472] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.267588] fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.267670] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.267764] ^ [ 21.267849] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.267928] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.267999] ================================================================== [ 21.277507] ================================================================== [ 21.277625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.277753] Write of size 1 at addr fff00000c47296eb by task kunit_try_catch/158 [ 21.277878] [ 21.277999] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.278189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.278246] Hardware name: linux,dummy-virt (DT) [ 21.278311] Call trace: [ 21.278372] show_stack+0x20/0x38 (C) [ 21.278500] dump_stack_lvl+0x8c/0xd0 [ 21.278609] print_report+0x118/0x608 [ 21.278711] kasan_report+0xdc/0x128 [ 21.278913] __asan_report_store1_noabort+0x20/0x30 [ 21.279068] krealloc_less_oob_helper+0xa58/0xc50 [ 21.279213] krealloc_less_oob+0x20/0x38 [ 21.279350] kunit_try_run_case+0x170/0x3f0 [ 21.279503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.279621] kthread+0x328/0x630 [ 21.279709] ret_from_fork+0x10/0x20 [ 21.279818] [ 21.279866] Allocated by task 158: [ 21.279926] kasan_save_stack+0x3c/0x68 [ 21.280008] kasan_save_track+0x20/0x40 [ 21.280082] kasan_save_alloc_info+0x40/0x58 [ 21.280185] __kasan_krealloc+0x118/0x178 [ 21.280271] krealloc_noprof+0x128/0x360 [ 21.280437] krealloc_less_oob_helper+0x168/0xc50 [ 21.280537] krealloc_less_oob+0x20/0x38 [ 21.280630] kunit_try_run_case+0x170/0x3f0 [ 21.280778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.280883] kthread+0x328/0x630 [ 21.280965] ret_from_fork+0x10/0x20 [ 21.281051] [ 21.281100] The buggy address belongs to the object at fff00000c4729600 [ 21.281100] which belongs to the cache kmalloc-256 of size 256 [ 21.281240] The buggy address is located 34 bytes to the right of [ 21.281240] allocated 201-byte region [fff00000c4729600, fff00000c47296c9) [ 21.281407] [ 21.281462] The buggy address belongs to the physical page: [ 21.281539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.281672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.281787] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.281913] page_type: f5(slab) [ 21.282008] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.282131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.282253] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.282406] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.282518] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.282640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.282745] page dumped because: kasan: bad access detected [ 21.282811] [ 21.282857] Memory state around the buggy address: [ 21.282926] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283019] fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.283128] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.283227] ^ [ 21.283330] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283439] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283631] ================================================================== [ 21.372862] ================================================================== [ 21.373673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.373856] Write of size 1 at addr fff00000c65ea0ea by task kunit_try_catch/162 [ 21.374270] [ 21.374540] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.374735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.374792] Hardware name: linux,dummy-virt (DT) [ 21.374872] Call trace: [ 21.374931] show_stack+0x20/0x38 (C) [ 21.375054] dump_stack_lvl+0x8c/0xd0 [ 21.375176] print_report+0x118/0x608 [ 21.375287] kasan_report+0xdc/0x128 [ 21.375378] __asan_report_store1_noabort+0x20/0x30 [ 21.375485] krealloc_less_oob_helper+0xae4/0xc50 [ 21.375590] krealloc_large_less_oob+0x20/0x38 [ 21.375707] kunit_try_run_case+0x170/0x3f0 [ 21.375824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.375958] kthread+0x328/0x630 [ 21.376066] ret_from_fork+0x10/0x20 [ 21.376184] [ 21.376233] The buggy address belongs to the physical page: [ 21.376310] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.376481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.376600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.376730] page_type: f8(unknown) [ 21.376825] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.376947] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.377071] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.377192] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.377313] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.377436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.377518] page dumped because: kasan: bad access detected [ 21.377587] [ 21.377647] Memory state around the buggy address: [ 21.377738] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.377845] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.377939] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.378031] ^ [ 21.378131] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.378243] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.378342] ================================================================== [ 21.269478] ================================================================== [ 21.269597] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.269715] Write of size 1 at addr fff00000c47296ea by task kunit_try_catch/158 [ 21.269835] [ 21.269917] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.270122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.270200] Hardware name: linux,dummy-virt (DT) [ 21.270269] Call trace: [ 21.270321] show_stack+0x20/0x38 (C) [ 21.270449] dump_stack_lvl+0x8c/0xd0 [ 21.270568] print_report+0x118/0x608 [ 21.270676] kasan_report+0xdc/0x128 [ 21.270777] __asan_report_store1_noabort+0x20/0x30 [ 21.270912] krealloc_less_oob_helper+0xae4/0xc50 [ 21.271071] krealloc_less_oob+0x20/0x38 [ 21.271177] kunit_try_run_case+0x170/0x3f0 [ 21.271302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.271418] kthread+0x328/0x630 [ 21.271535] ret_from_fork+0x10/0x20 [ 21.271644] [ 21.271686] Allocated by task 158: [ 21.271753] kasan_save_stack+0x3c/0x68 [ 21.271839] kasan_save_track+0x20/0x40 [ 21.271921] kasan_save_alloc_info+0x40/0x58 [ 21.272006] __kasan_krealloc+0x118/0x178 [ 21.272084] krealloc_noprof+0x128/0x360 [ 21.272171] krealloc_less_oob_helper+0x168/0xc50 [ 21.272298] krealloc_less_oob+0x20/0x38 [ 21.272392] kunit_try_run_case+0x170/0x3f0 [ 21.272499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.272605] kthread+0x328/0x630 [ 21.272683] ret_from_fork+0x10/0x20 [ 21.272763] [ 21.272813] The buggy address belongs to the object at fff00000c4729600 [ 21.272813] which belongs to the cache kmalloc-256 of size 256 [ 21.272961] The buggy address is located 33 bytes to the right of [ 21.272961] allocated 201-byte region [fff00000c4729600, fff00000c47296c9) [ 21.273197] [ 21.273253] The buggy address belongs to the physical page: [ 21.273348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.273510] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.273674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.273859] page_type: f5(slab) [ 21.273973] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.274147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.274283] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.274466] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.274582] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.274707] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.274800] page dumped because: kasan: bad access detected [ 21.274886] [ 21.274927] Memory state around the buggy address: [ 21.275002] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.275111] fff00000c4729600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.275222] >fff00000c4729680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.275337] ^ [ 21.275469] fff00000c4729700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.275599] fff00000c4729780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.275695] ================================================================== [ 21.334944] ================================================================== [ 21.335547] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 21.335745] Write of size 1 at addr fff00000c65ea0c9 by task kunit_try_catch/162 [ 21.335855] [ 21.335942] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.336121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.336180] Hardware name: linux,dummy-virt (DT) [ 21.336254] Call trace: [ 21.336304] show_stack+0x20/0x38 (C) [ 21.336428] dump_stack_lvl+0x8c/0xd0 [ 21.336535] print_report+0x118/0x608 [ 21.336690] kasan_report+0xdc/0x128 [ 21.336942] __asan_report_store1_noabort+0x20/0x30 [ 21.337071] krealloc_less_oob_helper+0xa48/0xc50 [ 21.337193] krealloc_large_less_oob+0x20/0x38 [ 21.337319] kunit_try_run_case+0x170/0x3f0 [ 21.337458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.337609] kthread+0x328/0x630 [ 21.337949] ret_from_fork+0x10/0x20 [ 21.338972] [ 21.339235] The buggy address belongs to the physical page: [ 21.339626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.340550] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.340724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.341963] page_type: f8(unknown) [ 21.342076] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.342205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.342334] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.343423] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.344391] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.344693] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.345196] page dumped because: kasan: bad access detected [ 21.345342] [ 21.345392] Memory state around the buggy address: [ 21.345550] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.345754] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.345918] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.346011] ^ [ 21.346352] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.346796] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.346966] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
Automatically assigned
[ 21.311346] ================================================================== [ 21.311664] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 21.312160] Write of size 1 at addr fff00000c65ea0f0 by task kunit_try_catch/160 [ 21.312344] [ 21.312498] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.312712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.312778] Hardware name: linux,dummy-virt (DT) [ 21.312856] Call trace: [ 21.312912] show_stack+0x20/0x38 (C) [ 21.313034] dump_stack_lvl+0x8c/0xd0 [ 21.313157] print_report+0x118/0x608 [ 21.313275] kasan_report+0xdc/0x128 [ 21.313389] __asan_report_store1_noabort+0x20/0x30 [ 21.313972] krealloc_more_oob_helper+0x5c0/0x678 [ 21.315001] krealloc_large_more_oob+0x20/0x38 [ 21.315340] kunit_try_run_case+0x170/0x3f0 [ 21.315500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.315809] kthread+0x328/0x630 [ 21.316221] ret_from_fork+0x10/0x20 [ 21.316575] [ 21.316725] The buggy address belongs to the physical page: [ 21.316821] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.317231] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.319411] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.319499] page_type: f8(unknown) [ 21.319551] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.319607] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.319661] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.319713] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.319765] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.319817] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.319860] page dumped because: kasan: bad access detected [ 21.319894] [ 21.319915] Memory state around the buggy address: [ 21.319953] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.320000] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.320046] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.320087] ^ [ 21.320133] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.320177] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.320220] ================================================================== [ 21.297021] ================================================================== [ 21.297208] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 21.297741] Write of size 1 at addr fff00000c65ea0eb by task kunit_try_catch/160 [ 21.298121] [ 21.298325] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.298994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.299067] Hardware name: linux,dummy-virt (DT) [ 21.299304] Call trace: [ 21.299485] show_stack+0x20/0x38 (C) [ 21.299761] dump_stack_lvl+0x8c/0xd0 [ 21.299889] print_report+0x118/0x608 [ 21.300011] kasan_report+0xdc/0x128 [ 21.300123] __asan_report_store1_noabort+0x20/0x30 [ 21.300248] krealloc_more_oob_helper+0x60c/0x678 [ 21.300373] krealloc_large_more_oob+0x20/0x38 [ 21.300507] kunit_try_run_case+0x170/0x3f0 [ 21.300629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.300761] kthread+0x328/0x630 [ 21.300868] ret_from_fork+0x10/0x20 [ 21.301379] [ 21.301535] The buggy address belongs to the physical page: [ 21.301628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e8 [ 21.302009] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.302280] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.302865] page_type: f8(unknown) [ 21.303099] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.303259] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.303561] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.303838] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.304216] head: 0bfffe0000000002 ffffc1ffc3197a01 00000000ffffffff 00000000ffffffff [ 21.304726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.304924] page dumped because: kasan: bad access detected [ 21.305292] [ 21.305355] Memory state around the buggy address: [ 21.305528] fff00000c65e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.305777] fff00000c65ea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.306017] >fff00000c65ea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.306140] ^ [ 21.306236] fff00000c65ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.306343] fff00000c65ea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.306462] ================================================================== [ 21.196693] ================================================================== [ 21.196866] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 21.197021] Write of size 1 at addr fff00000c47294eb by task kunit_try_catch/156 [ 21.197149] [ 21.197243] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.197457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.197514] Hardware name: linux,dummy-virt (DT) [ 21.197583] Call trace: [ 21.197638] show_stack+0x20/0x38 (C) [ 21.197797] dump_stack_lvl+0x8c/0xd0 [ 21.197921] print_report+0x118/0x608 [ 21.198030] kasan_report+0xdc/0x128 [ 21.198130] __asan_report_store1_noabort+0x20/0x30 [ 21.198248] krealloc_more_oob_helper+0x60c/0x678 [ 21.198382] krealloc_more_oob+0x20/0x38 [ 21.198513] kunit_try_run_case+0x170/0x3f0 [ 21.198644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.198776] kthread+0x328/0x630 [ 21.198899] ret_from_fork+0x10/0x20 [ 21.199034] [ 21.199086] Allocated by task 156: [ 21.199164] kasan_save_stack+0x3c/0x68 [ 21.199303] kasan_save_track+0x20/0x40 [ 21.199413] kasan_save_alloc_info+0x40/0x58 [ 21.199510] __kasan_krealloc+0x118/0x178 [ 21.199599] krealloc_noprof+0x128/0x360 [ 21.199680] krealloc_more_oob_helper+0x168/0x678 [ 21.199755] krealloc_more_oob+0x20/0x38 [ 21.199873] kunit_try_run_case+0x170/0x3f0 [ 21.200203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.200386] kthread+0x328/0x630 [ 21.200485] ret_from_fork+0x10/0x20 [ 21.200575] [ 21.200628] The buggy address belongs to the object at fff00000c4729400 [ 21.200628] which belongs to the cache kmalloc-256 of size 256 [ 21.200966] The buggy address is located 0 bytes to the right of [ 21.200966] allocated 235-byte region [fff00000c4729400, fff00000c47294eb) [ 21.201117] [ 21.201173] The buggy address belongs to the physical page: [ 21.201253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.201385] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.201930] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.202706] page_type: f5(slab) [ 21.203049] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.203705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.203894] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.204128] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.204310] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.204797] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.204979] page dumped because: kasan: bad access detected [ 21.205061] [ 21.205502] Memory state around the buggy address: [ 21.205669] fff00000c4729380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.205893] fff00000c4729400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.206352] >fff00000c4729480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 21.206472] ^ [ 21.206563] fff00000c4729500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.206646] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.206729] ================================================================== [ 21.209049] ================================================================== [ 21.209166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 21.209601] Write of size 1 at addr fff00000c47294f0 by task kunit_try_catch/156 [ 21.209858] [ 21.210247] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.210628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.210701] Hardware name: linux,dummy-virt (DT) [ 21.210850] Call trace: [ 21.210905] show_stack+0x20/0x38 (C) [ 21.211289] dump_stack_lvl+0x8c/0xd0 [ 21.211483] print_report+0x118/0x608 [ 21.211685] kasan_report+0xdc/0x128 [ 21.211889] __asan_report_store1_noabort+0x20/0x30 [ 21.212138] krealloc_more_oob_helper+0x5c0/0x678 [ 21.212420] krealloc_more_oob+0x20/0x38 [ 21.212992] kunit_try_run_case+0x170/0x3f0 [ 21.213149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.213279] kthread+0x328/0x630 [ 21.213385] ret_from_fork+0x10/0x20 [ 21.213523] [ 21.213569] Allocated by task 156: [ 21.213638] kasan_save_stack+0x3c/0x68 [ 21.214414] kasan_save_track+0x20/0x40 [ 21.214512] kasan_save_alloc_info+0x40/0x58 [ 21.214556] __kasan_krealloc+0x118/0x178 [ 21.214599] krealloc_noprof+0x128/0x360 [ 21.214641] krealloc_more_oob_helper+0x168/0x678 [ 21.214685] krealloc_more_oob+0x20/0x38 [ 21.214724] kunit_try_run_case+0x170/0x3f0 [ 21.214766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.214813] kthread+0x328/0x630 [ 21.214865] ret_from_fork+0x10/0x20 [ 21.214906] [ 21.214935] The buggy address belongs to the object at fff00000c4729400 [ 21.214935] which belongs to the cache kmalloc-256 of size 256 [ 21.215001] The buggy address is located 5 bytes to the right of [ 21.215001] allocated 235-byte region [fff00000c4729400, fff00000c47294eb) [ 21.215069] [ 21.215094] The buggy address belongs to the physical page: [ 21.215132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104728 [ 21.215192] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.215243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.215305] page_type: f5(slab) [ 21.215353] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.215446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.215576] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.215688] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.215783] head: 0bfffe0000000001 ffffc1ffc311ca01 00000000ffffffff 00000000ffffffff [ 21.215889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.215986] page dumped because: kasan: bad access detected [ 21.216065] [ 21.216112] Memory state around the buggy address: [ 21.216191] fff00000c4729380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216298] fff00000c4729400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.216418] >fff00000c4729480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 21.216520] ^ [ 21.216627] fff00000c4729500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216753] fff00000c4729580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
Automatically assigned
[ 21.173448] ================================================================== [ 21.173614] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 21.173829] Read of size 1 at addr fff00000c78e0000 by task kunit_try_catch/154 [ 21.173948] [ 21.174040] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.174246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.174315] Hardware name: linux,dummy-virt (DT) [ 21.174421] Call trace: [ 21.174509] show_stack+0x20/0x38 (C) [ 21.174701] dump_stack_lvl+0x8c/0xd0 [ 21.174893] print_report+0x118/0x608 [ 21.175068] kasan_report+0xdc/0x128 [ 21.175425] __asan_report_load1_noabort+0x20/0x30 [ 21.175577] page_alloc_uaf+0x328/0x350 [ 21.175851] kunit_try_run_case+0x170/0x3f0 [ 21.176124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.176422] kthread+0x328/0x630 [ 21.176529] ret_from_fork+0x10/0x20 [ 21.176656] [ 21.176711] The buggy address belongs to the physical page: [ 21.176788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 21.176913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.177039] page_type: f0(buddy) [ 21.177511] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 21.177763] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 21.177973] page dumped because: kasan: bad access detected [ 21.178049] [ 21.178334] Memory state around the buggy address: [ 21.178501] fff00000c78dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.178639] fff00000c78dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.178763] >fff00000c78e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.179141] ^ [ 21.179225] fff00000c78e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.179327] fff00000c78e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.179552] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
Automatically assigned
[ 21.115981] ================================================================== [ 21.116209] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 21.116374] Free of addr fff00000c7894001 by task kunit_try_catch/150 [ 21.117230] [ 21.117510] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.118197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.118319] Hardware name: linux,dummy-virt (DT) [ 21.118489] Call trace: [ 21.118609] show_stack+0x20/0x38 (C) [ 21.118944] dump_stack_lvl+0x8c/0xd0 [ 21.119074] print_report+0x118/0x608 [ 21.119174] kasan_report_invalid_free+0xc0/0xe8 [ 21.119266] __kasan_kfree_large+0x5c/0xa8 [ 21.119361] free_large_kmalloc+0x64/0x190 [ 21.119475] kfree+0x270/0x3c8 [ 21.119573] kmalloc_large_invalid_free+0x108/0x270 [ 21.119693] kunit_try_run_case+0x170/0x3f0 [ 21.119811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.120373] kthread+0x328/0x630 [ 21.120629] ret_from_fork+0x10/0x20 [ 21.120832] [ 21.121192] The buggy address belongs to the physical page: [ 21.121275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 21.121715] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.121986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.122384] page_type: f8(unknown) [ 21.122586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.122716] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.122904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.123075] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.123250] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff [ 21.123422] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.123509] page dumped because: kasan: bad access detected [ 21.123571] [ 21.123606] Memory state around the buggy address: [ 21.123696] fff00000c7893f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123794] fff00000c7893f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.124191] >fff00000c7894000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.124355] ^ [ 21.124600] fff00000c7894080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.124718] fff00000c7894100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.124864] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
Automatically assigned
[ 21.079826] ================================================================== [ 21.080015] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 21.080164] Read of size 1 at addr fff00000c7894000 by task kunit_try_catch/148 [ 21.080281] [ 21.081471] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.082321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.082523] Hardware name: linux,dummy-virt (DT) [ 21.082781] Call trace: [ 21.083004] show_stack+0x20/0x38 (C) [ 21.083409] dump_stack_lvl+0x8c/0xd0 [ 21.083645] print_report+0x118/0x608 [ 21.084262] kasan_report+0xdc/0x128 [ 21.084914] __asan_report_load1_noabort+0x20/0x30 [ 21.085362] kmalloc_large_uaf+0x2cc/0x2f8 [ 21.085703] kunit_try_run_case+0x170/0x3f0 [ 21.085958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.086521] kthread+0x328/0x630 [ 21.086620] ret_from_fork+0x10/0x20 [ 21.086713] [ 21.086756] The buggy address belongs to the physical page: [ 21.086833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 21.087976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.088307] raw: 0bfffe0000000000 ffffc1ffc31e2608 fff00000da448c40 0000000000000000 [ 21.088497] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.088605] page dumped because: kasan: bad access detected [ 21.089153] [ 21.089341] Memory state around the buggy address: [ 21.089728] fff00000c7893f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089868] fff00000c7893f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.091206] >fff00000c7894000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.091314] ^ [ 21.091431] fff00000c7894080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.091541] fff00000c7894100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.091758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
Automatically assigned
[ 21.056468] ================================================================== [ 21.056663] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 21.056812] Write of size 1 at addr fff00000c789600a by task kunit_try_catch/146 [ 21.056934] [ 21.057021] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.057246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.057313] Hardware name: linux,dummy-virt (DT) [ 21.057381] Call trace: [ 21.057442] show_stack+0x20/0x38 (C) [ 21.057587] dump_stack_lvl+0x8c/0xd0 [ 21.057687] print_report+0x118/0x608 [ 21.057790] kasan_report+0xdc/0x128 [ 21.057917] __asan_report_store1_noabort+0x20/0x30 [ 21.058029] kmalloc_large_oob_right+0x278/0x2b8 [ 21.058138] kunit_try_run_case+0x170/0x3f0 [ 21.058259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.058384] kthread+0x328/0x630 [ 21.058546] ret_from_fork+0x10/0x20 [ 21.058661] [ 21.058760] The buggy address belongs to the physical page: [ 21.058877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 21.059000] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.059110] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.059245] page_type: f8(unknown) [ 21.059351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.059481] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.059649] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.059814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.060017] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff [ 21.060153] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.060327] page dumped because: kasan: bad access detected [ 21.060463] [ 21.060543] Memory state around the buggy address: [ 21.060636] fff00000c7895f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.060741] fff00000c7895f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.060846] >fff00000c7896000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.060952] ^ [ 21.061070] fff00000c7896080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.061179] fff00000c7896100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.061274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
Automatically assigned
[ 21.034036] ================================================================== [ 21.034227] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 21.034435] Write of size 1 at addr fff00000c45adf00 by task kunit_try_catch/144 [ 21.034549] [ 21.034639] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 21.035392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.035467] Hardware name: linux,dummy-virt (DT) [ 21.035726] Call trace: [ 21.035789] show_stack+0x20/0x38 (C) [ 21.035951] dump_stack_lvl+0x8c/0xd0 [ 21.036114] print_report+0x118/0x608 [ 21.036293] kasan_report+0xdc/0x128 [ 21.036516] __asan_report_store1_noabort+0x20/0x30 [ 21.036702] kmalloc_big_oob_right+0x2a4/0x2f0 [ 21.037057] kunit_try_run_case+0x170/0x3f0 [ 21.037311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.037513] kthread+0x328/0x630 [ 21.037635] ret_from_fork+0x10/0x20 [ 21.037952] [ 21.038004] Allocated by task 144: [ 21.038126] kasan_save_stack+0x3c/0x68 [ 21.038250] kasan_save_track+0x20/0x40 [ 21.038532] kasan_save_alloc_info+0x40/0x58 [ 21.038623] __kasan_kmalloc+0xd4/0xd8 [ 21.038714] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.038829] kmalloc_big_oob_right+0xb8/0x2f0 [ 21.038988] kunit_try_run_case+0x170/0x3f0 [ 21.039092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.039248] kthread+0x328/0x630 [ 21.039537] ret_from_fork+0x10/0x20 [ 21.039684] [ 21.039902] The buggy address belongs to the object at fff00000c45ac000 [ 21.039902] which belongs to the cache kmalloc-8k of size 8192 [ 21.040116] The buggy address is located 0 bytes to the right of [ 21.040116] allocated 7936-byte region [fff00000c45ac000, fff00000c45adf00) [ 21.040323] [ 21.040378] The buggy address belongs to the physical page: [ 21.040671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 21.040807] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.040926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.041063] page_type: f5(slab) [ 21.041155] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 21.041275] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.041412] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 21.041537] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.041660] head: 0bfffe0000000003 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 21.041785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.041925] page dumped because: kasan: bad access detected [ 21.042007] [ 21.042054] Memory state around the buggy address: [ 21.042134] fff00000c45ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.042245] fff00000c45ade80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.042353] >fff00000c45adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.043083] ^ [ 21.043180] fff00000c45adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.043275] fff00000c45ae000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.043346] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
Automatically assigned
[ 20.999129] ================================================================== [ 20.999263] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 20.999383] Write of size 1 at addr fff00000c6394c78 by task kunit_try_catch/142 [ 20.999504] [ 20.999586] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.999793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.999857] Hardware name: linux,dummy-virt (DT) [ 20.999931] Call trace: [ 20.999985] show_stack+0x20/0x38 (C) [ 21.000107] dump_stack_lvl+0x8c/0xd0 [ 21.000222] print_report+0x118/0x608 [ 21.000335] kasan_report+0xdc/0x128 [ 21.000494] __asan_report_store1_noabort+0x20/0x30 [ 21.000626] kmalloc_track_caller_oob_right+0x418/0x488 [ 21.000797] kunit_try_run_case+0x170/0x3f0 [ 21.000916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.001046] kthread+0x328/0x630 [ 21.001147] ret_from_fork+0x10/0x20 [ 21.001265] [ 21.001315] Allocated by task 142: [ 21.001445] kasan_save_stack+0x3c/0x68 [ 21.001538] kasan_save_track+0x20/0x40 [ 21.001623] kasan_save_alloc_info+0x40/0x58 [ 21.001713] __kasan_kmalloc+0xd4/0xd8 [ 21.001806] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 21.002502] kmalloc_track_caller_oob_right+0x184/0x488 [ 21.002681] kunit_try_run_case+0x170/0x3f0 [ 21.002914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.003075] kthread+0x328/0x630 [ 21.003183] ret_from_fork+0x10/0x20 [ 21.003304] [ 21.003349] The buggy address belongs to the object at fff00000c6394c00 [ 21.003349] which belongs to the cache kmalloc-128 of size 128 [ 21.003669] The buggy address is located 0 bytes to the right of [ 21.003669] allocated 120-byte region [fff00000c6394c00, fff00000c6394c78) [ 21.003998] [ 21.004043] The buggy address belongs to the physical page: [ 21.004103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106394 [ 21.004214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.005702] page_type: f5(slab) [ 21.005886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.006073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.006320] page dumped because: kasan: bad access detected [ 21.006529] [ 21.006643] Memory state around the buggy address: [ 21.006770] fff00000c6394b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.006888] fff00000c6394b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.006997] >fff00000c6394c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.007090] ^ [ 21.007182] fff00000c6394c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007263] fff00000c6394d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007725] ================================================================== [ 20.991538] ================================================================== [ 20.991707] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.991849] Write of size 1 at addr fff00000c6394b78 by task kunit_try_catch/142 [ 20.991972] [ 20.992055] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.992250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.992310] Hardware name: linux,dummy-virt (DT) [ 20.992383] Call trace: [ 20.992452] show_stack+0x20/0x38 (C) [ 20.992579] dump_stack_lvl+0x8c/0xd0 [ 20.992696] print_report+0x118/0x608 [ 20.992808] kasan_report+0xdc/0x128 [ 20.992918] __asan_report_store1_noabort+0x20/0x30 [ 20.993036] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.993168] kunit_try_run_case+0x170/0x3f0 [ 20.993290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.993442] kthread+0x328/0x630 [ 20.993542] ret_from_fork+0x10/0x20 [ 20.993659] [ 20.993704] Allocated by task 142: [ 20.993774] kasan_save_stack+0x3c/0x68 [ 20.993911] kasan_save_track+0x20/0x40 [ 20.994047] kasan_save_alloc_info+0x40/0x58 [ 20.994175] __kasan_kmalloc+0xd4/0xd8 [ 20.994319] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 20.994500] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.994606] kunit_try_run_case+0x170/0x3f0 [ 20.994713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.994829] kthread+0x328/0x630 [ 20.994918] ret_from_fork+0x10/0x20 [ 20.995014] [ 20.995064] The buggy address belongs to the object at fff00000c6394b00 [ 20.995064] which belongs to the cache kmalloc-128 of size 128 [ 20.995185] The buggy address is located 0 bytes to the right of [ 20.995185] allocated 120-byte region [fff00000c6394b00, fff00000c6394b78) [ 20.995336] [ 20.995368] The buggy address belongs to the physical page: [ 20.995427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106394 [ 20.995493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.995554] page_type: f5(slab) [ 20.995603] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.995659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.995703] page dumped because: kasan: bad access detected [ 20.995737] [ 20.995757] Memory state around the buggy address: [ 20.995793] fff00000c6394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.995840] fff00000c6394a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.995886] >fff00000c6394b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.995927] ^ [ 20.995970] fff00000c6394b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.996015] fff00000c6394c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.996055] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
Automatically assigned
[ 20.969861] ================================================================== [ 20.970045] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 20.970199] Read of size 1 at addr fff00000c78b1000 by task kunit_try_catch/140 [ 20.970307] [ 20.970471] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.970668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.970729] Hardware name: linux,dummy-virt (DT) [ 20.971121] Call trace: [ 20.972499] show_stack+0x20/0x38 (C) [ 20.972587] dump_stack_lvl+0x8c/0xd0 [ 20.972650] print_report+0x118/0x608 [ 20.972706] kasan_report+0xdc/0x128 [ 20.972757] __asan_report_load1_noabort+0x20/0x30 [ 20.972811] kmalloc_node_oob_right+0x2f4/0x330 [ 20.972865] kunit_try_run_case+0x170/0x3f0 [ 20.972922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.972981] kthread+0x328/0x630 [ 20.973030] ret_from_fork+0x10/0x20 [ 20.973089] [ 20.973111] Allocated by task 140: [ 20.973147] kasan_save_stack+0x3c/0x68 [ 20.973198] kasan_save_track+0x20/0x40 [ 20.973240] kasan_save_alloc_info+0x40/0x58 [ 20.973280] __kasan_kmalloc+0xd4/0xd8 [ 20.973319] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 20.973366] kmalloc_node_oob_right+0xbc/0x330 [ 20.973428] kunit_try_run_case+0x170/0x3f0 [ 20.973473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.973520] kthread+0x328/0x630 [ 20.973556] ret_from_fork+0x10/0x20 [ 20.973594] [ 20.973617] The buggy address belongs to the object at fff00000c78b0000 [ 20.973617] which belongs to the cache kmalloc-4k of size 4096 [ 20.973683] The buggy address is located 0 bytes to the right of [ 20.973683] allocated 4096-byte region [fff00000c78b0000, fff00000c78b1000) [ 20.973751] [ 20.973777] The buggy address belongs to the physical page: [ 20.973888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 20.974088] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.974146] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.974227] page_type: f5(slab) [ 20.974282] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 20.974339] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.974996] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 20.975119] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.975229] head: 0bfffe0000000003 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff [ 20.975343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.975457] page dumped because: kasan: bad access detected [ 20.975526] [ 20.975567] Memory state around the buggy address: [ 20.975639] fff00000c78b0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.975832] fff00000c78b0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.975964] >fff00000c78b1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.976059] ^ [ 20.976126] fff00000c78b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.976230] fff00000c78b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.976327] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
Automatically assigned
[ 20.930285] ================================================================== [ 20.930532] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 20.930723] Read of size 1 at addr fff00000c66b0fff by task kunit_try_catch/138 [ 20.930923] [ 20.931040] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.931249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.931305] Hardware name: linux,dummy-virt (DT) [ 20.931368] Call trace: [ 20.931501] show_stack+0x20/0x38 (C) [ 20.932424] dump_stack_lvl+0x8c/0xd0 [ 20.932571] print_report+0x118/0x608 [ 20.932678] kasan_report+0xdc/0x128 [ 20.933272] __asan_report_load1_noabort+0x20/0x30 [ 20.933793] kmalloc_oob_left+0x2ec/0x320 [ 20.934265] kunit_try_run_case+0x170/0x3f0 [ 20.934493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.934682] kthread+0x328/0x630 [ 20.934970] ret_from_fork+0x10/0x20 [ 20.935372] [ 20.935451] The buggy address belongs to the object at fff00000c66b0f00 [ 20.935451] which belongs to the cache cred of size 184 [ 20.935588] The buggy address is located 71 bytes to the right of [ 20.935588] allocated 184-byte region [fff00000c66b0f00, fff00000c66b0fb8) [ 20.935741] [ 20.935800] The buggy address belongs to the physical page: [ 20.935876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b0 [ 20.936006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.936127] page_type: f5(slab) [ 20.936228] raw: 0bfffe0000000000 fff00000c002db40 dead000000000122 0000000000000000 [ 20.936354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.936462] page dumped because: kasan: bad access detected [ 20.936539] [ 20.936581] Memory state around the buggy address: [ 20.937144] fff00000c66b0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.937571] fff00000c66b0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.937984] >fff00000c66b0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.938091] ^ [ 20.938197] fff00000c66b1000: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.938784] fff00000c66b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.939078] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
Automatically assigned
[ 20.860844] ================================================================== [ 20.861283] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 20.862369] Write of size 1 at addr fff00000c5d6e973 by task kunit_try_catch/136 [ 20.862659] [ 20.864070] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250529 #1 PREEMPT [ 20.864266] Tainted: [N]=TEST [ 20.864308] Hardware name: linux,dummy-virt (DT) [ 20.864621] Call trace: [ 20.864841] show_stack+0x20/0x38 (C) [ 20.865022] dump_stack_lvl+0x8c/0xd0 [ 20.865102] print_report+0x118/0x608 [ 20.865160] kasan_report+0xdc/0x128 [ 20.865212] __asan_report_store1_noabort+0x20/0x30 [ 20.865265] kmalloc_oob_right+0x5a4/0x660 [ 20.865316] kunit_try_run_case+0x170/0x3f0 [ 20.865372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865447] kthread+0x328/0x630 [ 20.865498] ret_from_fork+0x10/0x20 [ 20.865685] [ 20.865732] Allocated by task 136: [ 20.865870] kasan_save_stack+0x3c/0x68 [ 20.865950] kasan_save_track+0x20/0x40 [ 20.865995] kasan_save_alloc_info+0x40/0x58 [ 20.866036] __kasan_kmalloc+0xd4/0xd8 [ 20.866077] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.866120] kmalloc_oob_right+0xb0/0x660 [ 20.866159] kunit_try_run_case+0x170/0x3f0 [ 20.866200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866246] kthread+0x328/0x630 [ 20.866280] ret_from_fork+0x10/0x20 [ 20.866341] [ 20.866522] The buggy address belongs to the object at fff00000c5d6e900 [ 20.866522] which belongs to the cache kmalloc-128 of size 128 [ 20.866733] The buggy address is located 0 bytes to the right of [ 20.866733] allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973) [ 20.866823] [ 20.866932] The buggy address belongs to the physical page: [ 20.867167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 20.867539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.867902] page_type: f5(slab) [ 20.868321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.868408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.868547] page dumped because: kasan: bad access detected [ 20.868598] [ 20.868630] Memory state around the buggy address: [ 20.868905] fff00000c5d6e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.868988] fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869053] >fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.869116] ^ [ 20.869214] fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869262] fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869334] ================================================================== [ 20.885504] ================================================================== [ 20.885618] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 20.886822] Read of size 1 at addr fff00000c5d6e980 by task kunit_try_catch/136 [ 20.887004] [ 20.887308] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.888675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888868] Hardware name: linux,dummy-virt (DT) [ 20.889032] Call trace: [ 20.889086] show_stack+0x20/0x38 (C) [ 20.889833] dump_stack_lvl+0x8c/0xd0 [ 20.889965] print_report+0x118/0x608 [ 20.890084] kasan_report+0xdc/0x128 [ 20.890234] __asan_report_load1_noabort+0x20/0x30 [ 20.891270] kmalloc_oob_right+0x5d0/0x660 [ 20.891766] kunit_try_run_case+0x170/0x3f0 [ 20.892124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.893027] kthread+0x328/0x630 [ 20.893180] ret_from_fork+0x10/0x20 [ 20.894258] [ 20.894310] Allocated by task 136: [ 20.894788] kasan_save_stack+0x3c/0x68 [ 20.895082] kasan_save_track+0x20/0x40 [ 20.895178] kasan_save_alloc_info+0x40/0x58 [ 20.895605] __kasan_kmalloc+0xd4/0xd8 [ 20.895947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.896504] kmalloc_oob_right+0xb0/0x660 [ 20.896690] kunit_try_run_case+0x170/0x3f0 [ 20.896816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.897119] kthread+0x328/0x630 [ 20.897206] ret_from_fork+0x10/0x20 [ 20.897295] [ 20.897349] The buggy address belongs to the object at fff00000c5d6e900 [ 20.897349] which belongs to the cache kmalloc-128 of size 128 [ 20.897505] The buggy address is located 13 bytes to the right of [ 20.897505] allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973) [ 20.897668] [ 20.897713] The buggy address belongs to the physical page: [ 20.898146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 20.898451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.899000] page_type: f5(slab) [ 20.899425] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.899630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.899926] page dumped because: kasan: bad access detected [ 20.900080] [ 20.900306] Memory state around the buggy address: [ 20.900513] fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901073] fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.901181] >fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901777] ^ [ 20.902463] fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902730] fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.903098] ================================================================== [ 20.875836] ================================================================== [ 20.875944] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 20.876069] Write of size 1 at addr fff00000c5d6e978 by task kunit_try_catch/136 [ 20.876181] [ 20.876263] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.876463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.876524] Hardware name: linux,dummy-virt (DT) [ 20.876594] Call trace: [ 20.876649] show_stack+0x20/0x38 (C) [ 20.876773] dump_stack_lvl+0x8c/0xd0 [ 20.876891] print_report+0x118/0x608 [ 20.877007] kasan_report+0xdc/0x128 [ 20.877121] __asan_report_store1_noabort+0x20/0x30 [ 20.877240] kmalloc_oob_right+0x538/0x660 [ 20.877356] kunit_try_run_case+0x170/0x3f0 [ 20.877683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877840] kthread+0x328/0x630 [ 20.878426] ret_from_fork+0x10/0x20 [ 20.878552] [ 20.878598] Allocated by task 136: [ 20.878705] kasan_save_stack+0x3c/0x68 [ 20.878832] kasan_save_track+0x20/0x40 [ 20.878923] kasan_save_alloc_info+0x40/0x58 [ 20.878997] __kasan_kmalloc+0xd4/0xd8 [ 20.879067] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.879150] kmalloc_oob_right+0xb0/0x660 [ 20.879225] kunit_try_run_case+0x170/0x3f0 [ 20.879312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.879424] kthread+0x328/0x630 [ 20.879494] ret_from_fork+0x10/0x20 [ 20.879573] [ 20.879711] The buggy address belongs to the object at fff00000c5d6e900 [ 20.879711] which belongs to the cache kmalloc-128 of size 128 [ 20.879877] The buggy address is located 5 bytes to the right of [ 20.879877] allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973) [ 20.880038] [ 20.880088] The buggy address belongs to the physical page: [ 20.880167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 20.881272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.881784] page_type: f5(slab) [ 20.882300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.882735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.882896] page dumped because: kasan: bad access detected [ 20.883148] [ 20.883221] Memory state around the buggy address: [ 20.883311] fff00000c5d6e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.883669] fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.883790] >fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.883898] ^ [ 20.883999] fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884144] fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884239] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
Automatically assigned
------------[ cut here ]------------ [ 104.902639] WARNING: CPU: 0 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 104.903958] Modules linked in: [ 104.904330] CPU: 0 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250529 #1 PREEMPT [ 104.905381] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 104.905941] Hardware name: linux,dummy-virt (DT) [ 104.906848] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 104.907533] pc : intlog10+0x38/0x48 [ 104.907917] lr : intlog10_test+0xe4/0x200 [ 104.908240] sp : ffff800082567c10 [ 104.908636] x29: ffff800082567c90 x28: 0000000000000000 x27: 0000000000000000 [ 104.909530] x26: 1ffe000019574181 x25: 0000000000000000 x24: ffff800082567ce0 [ 104.910882] x23: ffff800082567d00 x22: 0000000000000000 x21: 1ffff000104acf82 [ 104.911529] x20: ffffa940d18d2fc0 x19: ffff800080087990 x18: 00000000f857ef74 [ 104.912010] x17: 000000005aece4c8 x16: fff00000c097583c x15: 00000000ea71d59e [ 104.912309] x14: 00000000e7471688 x13: 1ffe00001b48cdcd x12: ffff75281aaef979 [ 104.913085] x11: 1ffff5281aaef978 x10: ffff75281aaef978 x9 : ffffa940cee6ad2c [ 104.913953] x8 : ffffa940d577cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 104.915231] x5 : ffff7000104acf82 x4 : 1ffff00010010f3a x3 : 1ffff5281a31a5f8 [ 104.915996] x2 : 1ffff5281a31a5f8 x1 : 0000000000000003 x0 : 0000000000000000 [ 104.916753] Call trace: [ 104.917017] intlog10+0x38/0x48 (P) [ 104.917444] kunit_try_run_case+0x170/0x3f0 [ 104.917959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 104.918745] kthread+0x328/0x630 [ 104.919075] ret_from_fork+0x10/0x20 [ 104.919569] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
Automatically assigned
------------[ cut here ]------------ [ 104.817249] WARNING: CPU: 1 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 104.818318] Modules linked in: [ 104.819300] CPU: 1 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G B D N 6.15.0-next-20250529 #1 PREEMPT [ 104.820210] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 104.820810] Hardware name: linux,dummy-virt (DT) [ 104.821320] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 104.821999] pc : intlog2+0xd8/0xf8 [ 104.822508] lr : intlog2_test+0xe4/0x200 [ 104.822901] sp : ffff8000825f7c10 [ 104.823411] x29: ffff8000825f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 104.824224] x26: 1ffe0000195740c1 x25: 0000000000000000 x24: ffff8000825f7ce0 [ 104.825029] x23: ffff8000825f7d00 x22: 0000000000000000 x21: 1ffff000104bef82 [ 104.825804] x20: ffffa940d18d2ec0 x19: ffff800080087990 x18: 00000000957a9672 [ 104.826608] x17: 00000000a39999d2 x16: 00000000447fa649 x15: 00000000d33b8e31 [ 104.827120] x14: 00000000f1f1f1f1 x13: fff00000c0caa700 x12: ffff75281aaef979 [ 104.828076] x11: 1ffff5281aaef978 x10: ffff75281aaef978 x9 : ffffa940cee6af2c [ 104.828891] x8 : ffffa940d577cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 104.829648] x5 : ffff7000104bef82 x4 : 1ffff00010010f3a x3 : 1ffff5281a31a5d8 [ 104.830585] x2 : 1ffff5281a31a5d8 x1 : 0000000000000003 x0 : 0000000000000000 [ 104.831389] Call trace: [ 104.831653] intlog2+0xd8/0xf8 (P) [ 104.832064] kunit_try_run_case+0x170/0x3f0 [ 104.832643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 104.833169] kthread+0x328/0x630 [ 104.833506] ret_from_fork+0x10/0x20 [ 104.833939] ---[ end trace 0000000000000000 ]---