Date
May 30, 2025, 4:14 a.m.
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 66.713897] ================================================================== [ 66.725372] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x314/0x34c [ 66.733001] Read of size 1 at addr f2493c8a by task kunit_try_catch/305 [ 66.739654] [ 66.741180] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 66.741210] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.741210] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.741210] Call trace: [ 66.741241] unwind_backtrace from show_stack+0x18/0x1c [ 66.741241] show_stack from dump_stack_lvl+0x70/0x90 [ 66.741271] dump_stack_lvl from print_report+0x158/0x528 [ 66.741302] print_report from kasan_report+0xdc/0x118 [ 66.741333] kasan_report from kasan_alloca_oob_right+0x314/0x34c [ 66.741363] kasan_alloca_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 66.741363] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.741394] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.741424] kthread from ret_from_fork+0x14/0x20 [ 66.741455] Exception stack(0xf2493fb0 to 0xf2493ff8) [ 66.741455] 3fa0: 00000000 00000000 00000000 00000000 [ 66.741485] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.741516] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.741516] [ 66.848114] The buggy address belongs to stack of task kunit_try_catch/305 [ 66.855041] [ 66.856567] The buggy address belongs to the virtual mapping at [ 66.856567] [f2490000, f2495000) created by: [ 66.856567] kernel_clone+0x174/0x794 [ 66.870544] [ 66.872070] The buggy address belongs to the physical page: [ 66.877655] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0823 [ 66.884948] flags: 0x80000000(zone=2) [ 66.888641] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 66.896789] raw: 00000000 [ 66.899414] page dumped because: kasan: bad access detected [ 66.905029] [ 66.906524] Memory state around the buggy address: [ 66.911346] f2493b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.917938] f2493c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca [ 66.924499] >f2493c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00 [ 66.931060] ^ [ 66.933898] f2493d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3 [ 66.940460] f2493d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.947021] ==================================================================
Failure - log-parser-boot - fault-unhandled-fault-asynchronous-external-abort-at
[ 231.408050] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-attempted-to-kill-init-exitcode
[ 231.420684] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 231.428466] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 ]---
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-test_cache_read
[ 196.980895] ================================================================== [ 196.988189] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc [ 196.995117] Read of size 4 at addr f32c3d10 by task kunit_try_catch/3953 [ 197.001861] [ 197.003387] CPU: 0 UID: 0 PID: 3953 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 197.003417] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 197.003417] Hardware name: Generic DRA74X (Flattened Device Tree) [ 197.003417] Call trace: [ 197.003417] unwind_backtrace from show_stack+0x18/0x1c [ 197.003448] show_stack from dump_stack_lvl+0x70/0x90 [ 197.003479] dump_stack_lvl from print_report+0x158/0x528 [ 197.003509] print_report from kasan_report+0xdc/0x118 [ 197.003540] kasan_report from test_cache_read+0x3c8/0x3fc [ 197.003540] test_cache_read from vcap_addr_keysets+0x1d8/0x3b4 [ 197.003570] vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc [ 197.003601] vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8 [ 197.003631] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 197.003662] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 197.003662] kthread from ret_from_fork+0x14/0x20 [ 197.003692] Exception stack(0xf32c3fb0 to 0xf32c3ff8) [ 197.003692] 3fa0: 00000000 00000000 00000000 00000000 [ 197.003723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 197.003723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 197.003753] [ 197.123657] The buggy address belongs to stack of task kunit_try_catch/3953 [ 197.130645] and is located at offset 496 in frame: [ 197.135559] vcap_api_addr_keyset_test+0x0/0x6cc [ 197.140228] [ 197.141723] This frame has 7 objects: [ 197.145416] [48, 60) 'matches' [ 197.145446] [80, 104) '__assertion' [ 197.148590] [144, 252) 'admin' [ 197.152191] [288, 328) 'keysets' [ 197.155364] [368, 416) 'keydata' [ 197.158691] [448, 496) 'mskdata' [ 197.162048] [528, 576) 'actdata' [ 197.165374] [ 197.170196] The buggy address belongs to the virtual mapping at [ 197.170196] [f32c0000, f32c5000) created by: [ 197.170196] kernel_clone+0x174/0x794 [ 197.184204] [ 197.185699] The buggy address belongs to the physical page: [ 197.191314] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0b2d [ 197.198577] flags: 0x80000000(zone=2) [ 197.202301] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 197.210418] raw: 00000000 [ 197.213073] page dumped because: kasan: bad access detected [ 197.218658] [ 197.220184] Memory state around the buggy address: [ 197.225006] f32c3c00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2 [ 197.231567] f32c3c80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 [ 197.238128] >f32c3d00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3 [ 197.244720] ^ [ 197.247772] f32c3d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 197.254364] f32c3e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 197.260925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 92.975952] ================================================================== [ 92.983245] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x248/0x260 [ 92.990234] Write of size 1 at addr cc90cd78 by task kunit_try_catch/337 [ 92.996978] [ 92.998504] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 92.998535] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.998535] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.998535] Call trace: [ 92.998565] unwind_backtrace from show_stack+0x18/0x1c [ 92.998565] show_stack from dump_stack_lvl+0x70/0x90 [ 92.998596] dump_stack_lvl from print_report+0x158/0x528 [ 92.998626] print_report from kasan_report+0xdc/0x118 [ 92.998657] kasan_report from strncpy_from_user+0x248/0x260 [ 92.998687] strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0 [ 92.998687] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.998718] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.998748] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.998779] kthread from ret_from_fork+0x14/0x20 [ 92.998809] Exception stack(0xf256bfb0 to 0xf256bff8) [ 92.998809] bfa0: 00000000 00000000 00000000 00000000 [ 92.998840] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.998840] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.998870] [ 93.110992] Allocated by task 337: [ 93.114410] kasan_save_track+0x30/0x5c [ 93.118286] __kasan_kmalloc+0x8c/0x94 [ 93.122039] __kmalloc_noprof+0x20c/0x488 [ 93.126098] kunit_kmalloc_array+0x28/0x60 [ 93.130218] copy_user_test_oob+0xac/0x12b0 [ 93.134429] kunit_try_run_case+0x22c/0x5a8 [ 93.138671] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 93.144195] kthread+0x464/0x810 [ 93.147460] ret_from_fork+0x14/0x20 [ 93.151062] [ 93.152557] The buggy address belongs to the object at cc90cd00 [ 93.152557] which belongs to the cache kmalloc-128 of size 128 [ 93.164459] The buggy address is located 0 bytes to the right of [ 93.164459] allocated 120-byte region [cc90cd00, cc90cd78) [ 93.176086] [ 93.177581] The buggy address belongs to the physical page: [ 93.183197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 93.190460] flags: 0x0(zone=0) [ 93.193542] page_type: f5(slab) [ 93.196716] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 93.204864] raw: 00000000 [ 93.207489] page dumped because: kasan: bad access detected [ 93.213104] [ 93.214599] Memory state around the buggy address: [ 93.219421] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 93.226013] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.232574] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 93.239135] ^ [ 93.245635] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.252197] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.258758] ================================================================== [ 92.680206] ================================================================== [ 92.687469] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x20/0x260 [ 92.694427] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 92.701324] [ 92.702850] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 92.702880] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.702880] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.702880] Call trace: [ 92.702911] unwind_backtrace from show_stack+0x18/0x1c [ 92.702911] show_stack from dump_stack_lvl+0x70/0x90 [ 92.702941] dump_stack_lvl from print_report+0x158/0x528 [ 92.702972] print_report from kasan_report+0xdc/0x118 [ 92.703002] kasan_report from kasan_check_range+0x14c/0x198 [ 92.703033] kasan_check_range from strncpy_from_user+0x20/0x260 [ 92.703033] strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0 [ 92.703063] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.703094] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.703124] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.703155] kthread from ret_from_fork+0x14/0x20 [ 92.703186] Exception stack(0xf256bfb0 to 0xf256bff8) [ 92.703186] bfa0: 00000000 00000000 00000000 00000000 [ 92.703216] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.703216] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.703247] [ 92.821380] Allocated by task 337: [ 92.824829] kasan_save_track+0x30/0x5c [ 92.828674] __kasan_kmalloc+0x8c/0x94 [ 92.832458] __kmalloc_noprof+0x20c/0x488 [ 92.836486] kunit_kmalloc_array+0x28/0x60 [ 92.840637] copy_user_test_oob+0xac/0x12b0 [ 92.844848] kunit_try_run_case+0x22c/0x5a8 [ 92.849060] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.854583] kthread+0x464/0x810 [ 92.857849] ret_from_fork+0x14/0x20 [ 92.861450] [ 92.862945] The buggy address belongs to the object at cc90cd00 [ 92.862945] which belongs to the cache kmalloc-128 of size 128 [ 92.874847] The buggy address is located 0 bytes inside of [ 92.874847] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.885955] [ 92.887481] The buggy address belongs to the physical page: [ 92.893066] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.900360] flags: 0x0(zone=0) [ 92.903411] page_type: f5(slab) [ 92.906585] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.914733] raw: 00000000 [ 92.917358] page dumped because: kasan: bad access detected [ 92.922973] [ 92.924468] Memory state around the buggy address: [ 92.929290] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.935882] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.942443] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.949005] ^ [ 92.955505] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.962066] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.968658] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 91.230102] ================================================================== [ 91.237365] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x800/0x12b0 [ 91.244567] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 91.251403] [ 91.252899] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 91.252929] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.252960] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.252960] Call trace: [ 91.252960] unwind_backtrace from show_stack+0x18/0x1c [ 91.252990] show_stack from dump_stack_lvl+0x70/0x90 [ 91.253021] dump_stack_lvl from print_report+0x158/0x528 [ 91.253051] print_report from kasan_report+0xdc/0x118 [ 91.253082] kasan_report from kasan_check_range+0x14c/0x198 [ 91.253082] kasan_check_range from copy_user_test_oob+0x800/0x12b0 [ 91.253112] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.253143] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.253173] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.253204] kthread from ret_from_fork+0x14/0x20 [ 91.253204] Exception stack(0xf256bfb0 to 0xf256bff8) [ 91.253234] bfa0: 00000000 00000000 00000000 00000000 [ 91.253234] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.253265] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.253265] [ 91.365386] Allocated by task 337: [ 91.368835] kasan_save_track+0x30/0x5c [ 91.372680] __kasan_kmalloc+0x8c/0x94 [ 91.376464] __kmalloc_noprof+0x20c/0x488 [ 91.380523] kunit_kmalloc_array+0x28/0x60 [ 91.384643] copy_user_test_oob+0xac/0x12b0 [ 91.388854] kunit_try_run_case+0x22c/0x5a8 [ 91.393096] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.398620] kthread+0x464/0x810 [ 91.401885] ret_from_fork+0x14/0x20 [ 91.405487] [ 91.406982] The buggy address belongs to the object at cc90cd00 [ 91.406982] which belongs to the cache kmalloc-128 of size 128 [ 91.418884] The buggy address is located 0 bytes inside of [ 91.418884] allocated 120-byte region [cc90cd00, cc90cd78) [ 91.429992] [ 91.431488] The buggy address belongs to the physical page: [ 91.437103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 91.444366] flags: 0x0(zone=0) [ 91.447448] page_type: f5(slab) [ 91.450622] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.458770] raw: 00000000 [ 91.461395] page dumped because: kasan: bad access detected [ 91.467010] [ 91.468505] Memory state around the buggy address: [ 91.473327] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.479919] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.486480] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.493041] ^ [ 91.499542] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.506103] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.512664] ================================================================== [ 92.390350] ================================================================== [ 92.397644] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x12b0 [ 92.404815] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 92.411651] [ 92.413146] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 92.413177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.413208] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.413208] Call trace: [ 92.413208] unwind_backtrace from show_stack+0x18/0x1c [ 92.413238] show_stack from dump_stack_lvl+0x70/0x90 [ 92.413269] dump_stack_lvl from print_report+0x158/0x528 [ 92.413299] print_report from kasan_report+0xdc/0x118 [ 92.413299] kasan_report from kasan_check_range+0x14c/0x198 [ 92.413330] kasan_check_range from copy_user_test_oob+0x604/0x12b0 [ 92.413360] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.413391] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.413421] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.413452] kthread from ret_from_fork+0x14/0x20 [ 92.413452] Exception stack(0xf256bfb0 to 0xf256bff8) [ 92.413482] bfa0: 00000000 00000000 00000000 00000000 [ 92.413482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.413513] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.413513] [ 92.525634] Allocated by task 337: [ 92.529052] kasan_save_track+0x30/0x5c [ 92.532928] __kasan_kmalloc+0x8c/0x94 [ 92.536712] __kmalloc_noprof+0x20c/0x488 [ 92.540740] kunit_kmalloc_array+0x28/0x60 [ 92.544891] copy_user_test_oob+0xac/0x12b0 [ 92.549102] kunit_try_run_case+0x22c/0x5a8 [ 92.553314] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.558837] kthread+0x464/0x810 [ 92.562103] ret_from_fork+0x14/0x20 [ 92.565704] [ 92.567199] The buggy address belongs to the object at cc90cd00 [ 92.567199] which belongs to the cache kmalloc-128 of size 128 [ 92.579101] The buggy address is located 0 bytes inside of [ 92.579101] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.590240] [ 92.591735] The buggy address belongs to the physical page: [ 92.597351] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.604614] flags: 0x0(zone=0) [ 92.607696] page_type: f5(slab) [ 92.610870] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.618988] raw: 00000000 [ 92.621643] page dumped because: kasan: bad access detected [ 92.627227] [ 92.628753] Memory state around the buggy address: [ 92.633575] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.640136] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.646697] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.653289] ^ [ 92.659759] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.666320] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.672912] ================================================================== [ 92.100402] ================================================================== [ 92.107696] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x544/0x12b0 [ 92.114868] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 92.121795] [ 92.123291] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 92.123321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.123352] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.123352] Call trace: [ 92.123352] unwind_backtrace from show_stack+0x18/0x1c [ 92.123382] show_stack from dump_stack_lvl+0x70/0x90 [ 92.123413] dump_stack_lvl from print_report+0x158/0x528 [ 92.123443] print_report from kasan_report+0xdc/0x118 [ 92.123443] kasan_report from kasan_check_range+0x14c/0x198 [ 92.123474] kasan_check_range from copy_user_test_oob+0x544/0x12b0 [ 92.123504] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.123535] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.123565] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.123596] kthread from ret_from_fork+0x14/0x20 [ 92.123596] Exception stack(0xf256bfb0 to 0xf256bff8) [ 92.123626] bfa0: 00000000 00000000 00000000 00000000 [ 92.123626] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.123657] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.123657] [ 92.235778] Allocated by task 337: [ 92.239196] kasan_save_track+0x30/0x5c [ 92.243072] __kasan_kmalloc+0x8c/0x94 [ 92.246856] __kmalloc_noprof+0x20c/0x488 [ 92.250885] kunit_kmalloc_array+0x28/0x60 [ 92.255035] copy_user_test_oob+0xac/0x12b0 [ 92.259246] kunit_try_run_case+0x22c/0x5a8 [ 92.263458] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.268981] kthread+0x464/0x810 [ 92.272247] ret_from_fork+0x14/0x20 [ 92.275848] [ 92.277343] The buggy address belongs to the object at cc90cd00 [ 92.277343] which belongs to the cache kmalloc-128 of size 128 [ 92.289245] The buggy address is located 0 bytes inside of [ 92.289245] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.300354] [ 92.301849] The buggy address belongs to the physical page: [ 92.307464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.314758] flags: 0x0(zone=0) [ 92.317810] page_type: f5(slab) [ 92.320983] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.329132] raw: 00000000 [ 92.331756] page dumped because: kasan: bad access detected [ 92.337371] [ 92.338867] Memory state around the buggy address: [ 92.343688] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.350280] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.356842] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.363403] ^ [ 92.369903] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.376464] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.383026] ================================================================== [ 91.520233] ================================================================== [ 91.527526] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c4/0x12b0 [ 91.534698] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 91.541625] [ 91.543121] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 91.543151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.543182] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.543182] Call trace: [ 91.543182] unwind_backtrace from show_stack+0x18/0x1c [ 91.543212] show_stack from dump_stack_lvl+0x70/0x90 [ 91.543243] dump_stack_lvl from print_report+0x158/0x528 [ 91.543273] print_report from kasan_report+0xdc/0x118 [ 91.543304] kasan_report from kasan_check_range+0x14c/0x198 [ 91.543304] kasan_check_range from copy_user_test_oob+0x3c4/0x12b0 [ 91.543334] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.543365] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.543395] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.543426] kthread from ret_from_fork+0x14/0x20 [ 91.543426] Exception stack(0xf256bfb0 to 0xf256bff8) [ 91.543457] bfa0: 00000000 00000000 00000000 00000000 [ 91.543457] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.543487] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.543487] [ 91.655609] Allocated by task 337: [ 91.659057] kasan_save_track+0x30/0x5c [ 91.662902] __kasan_kmalloc+0x8c/0x94 [ 91.666687] __kmalloc_noprof+0x20c/0x488 [ 91.670745] kunit_kmalloc_array+0x28/0x60 [ 91.674865] copy_user_test_oob+0xac/0x12b0 [ 91.679077] kunit_try_run_case+0x22c/0x5a8 [ 91.683319] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.688842] kthread+0x464/0x810 [ 91.692077] ret_from_fork+0x14/0x20 [ 91.695678] [ 91.697204] The buggy address belongs to the object at cc90cd00 [ 91.697204] which belongs to the cache kmalloc-128 of size 128 [ 91.709075] The buggy address is located 0 bytes inside of [ 91.709075] allocated 120-byte region [cc90cd00, cc90cd78) [ 91.720214] [ 91.721710] The buggy address belongs to the physical page: [ 91.727325] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 91.734588] flags: 0x0(zone=0) [ 91.737670] page_type: f5(slab) [ 91.740844] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.748962] raw: 00000000 [ 91.751617] page dumped because: kasan: bad access detected [ 91.757232] [ 91.758728] Memory state around the buggy address: [ 91.763549] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.770111] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.776702] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.783264] ^ [ 91.789733] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.796325] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.802886] ================================================================== [ 91.810455] ================================================================== [ 91.817718] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x484/0x12b0 [ 91.824890] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 91.831726] [ 91.833251] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 91.833282] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.833282] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.833282] Call trace: [ 91.833312] unwind_backtrace from show_stack+0x18/0x1c [ 91.833312] show_stack from dump_stack_lvl+0x70/0x90 [ 91.833343] dump_stack_lvl from print_report+0x158/0x528 [ 91.833374] print_report from kasan_report+0xdc/0x118 [ 91.833404] kasan_report from kasan_check_range+0x14c/0x198 [ 91.833435] kasan_check_range from copy_user_test_oob+0x484/0x12b0 [ 91.833435] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.833465] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.833496] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.833526] kthread from ret_from_fork+0x14/0x20 [ 91.833557] Exception stack(0xf256bfb0 to 0xf256bff8) [ 91.833557] bfa0: 00000000 00000000 00000000 00000000 [ 91.833587] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.833587] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.833618] [ 91.945739] Allocated by task 337: [ 91.949157] kasan_save_track+0x30/0x5c [ 91.953033] __kasan_kmalloc+0x8c/0x94 [ 91.956817] __kmalloc_noprof+0x20c/0x488 [ 91.960845] kunit_kmalloc_array+0x28/0x60 [ 91.964965] copy_user_test_oob+0xac/0x12b0 [ 91.969177] kunit_try_run_case+0x22c/0x5a8 [ 91.973419] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.978942] kthread+0x464/0x810 [ 91.982208] ret_from_fork+0x14/0x20 [ 91.985809] [ 91.987304] The buggy address belongs to the object at cc90cd00 [ 91.987304] which belongs to the cache kmalloc-128 of size 128 [ 91.999206] The buggy address is located 0 bytes inside of [ 91.999206] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.010314] [ 92.011810] The buggy address belongs to the physical page: [ 92.017425] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.024688] flags: 0x0(zone=0) [ 92.027770] page_type: f5(slab) [ 92.030944] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.039093] raw: 00000000 [ 92.041717] page dumped because: kasan: bad access detected [ 92.047332] [ 92.048828] Memory state around the buggy address: [ 92.053649] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.060211] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.066802] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.073364] ^ [ 92.079864] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.086425] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.092987] ================================================================== [ 90.933654] ================================================================== [ 90.947052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x24c/0x12b0 [ 90.954254] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 90.961181] [ 90.962677] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 90.962707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.962738] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.962738] Call trace: [ 90.962738] unwind_backtrace from show_stack+0x18/0x1c [ 90.962768] show_stack from dump_stack_lvl+0x70/0x90 [ 90.962799] dump_stack_lvl from print_report+0x158/0x528 [ 90.962829] print_report from kasan_report+0xdc/0x118 [ 90.962860] kasan_report from kasan_check_range+0x14c/0x198 [ 90.962860] kasan_check_range from copy_user_test_oob+0x24c/0x12b0 [ 90.962890] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.962921] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.962951] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.962982] kthread from ret_from_fork+0x14/0x20 [ 90.963012] Exception stack(0xf256bfb0 to 0xf256bff8) [ 90.963012] bfa0: 00000000 00000000 00000000 00000000 [ 90.963043] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.963043] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.963073] [ 91.075164] Allocated by task 337: [ 91.078613] kasan_save_track+0x30/0x5c [ 91.082489] __kasan_kmalloc+0x8c/0x94 [ 91.086242] __kmalloc_noprof+0x20c/0x488 [ 91.090301] kunit_kmalloc_array+0x28/0x60 [ 91.094421] copy_user_test_oob+0xac/0x12b0 [ 91.098663] kunit_try_run_case+0x22c/0x5a8 [ 91.102874] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.108398] kthread+0x464/0x810 [ 91.111663] ret_from_fork+0x14/0x20 [ 91.115264] [ 91.116760] The buggy address belongs to the object at cc90cd00 [ 91.116760] which belongs to the cache kmalloc-128 of size 128 [ 91.128662] The buggy address is located 0 bytes inside of [ 91.128662] allocated 120-byte region [cc90cd00, cc90cd78) [ 91.139770] [ 91.141265] The buggy address belongs to the physical page: [ 91.146881] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 91.154144] flags: 0x0(zone=0) [ 91.157226] page_type: f5(slab) [ 91.160400] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.168548] raw: 00000000 [ 91.171173] page dumped because: kasan: bad access detected [ 91.176788] [ 91.178283] Memory state around the buggy address: [ 91.183105] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.189697] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.196258] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.202819] ^ [ 91.209320] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.215881] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.222442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 90.636047] ================================================================== [ 90.643310] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x144/0x3fc [ 90.650756] Write of size 8 at addr cc963178 by task kunit_try_catch/333 [ 90.657501] [ 90.659027] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 90.659057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.659057] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.659057] Call trace: [ 90.659088] unwind_backtrace from show_stack+0x18/0x1c [ 90.659118] show_stack from dump_stack_lvl+0x70/0x90 [ 90.659118] dump_stack_lvl from print_report+0x158/0x528 [ 90.659149] print_report from kasan_report+0xdc/0x118 [ 90.659179] kasan_report from kasan_check_range+0x14c/0x198 [ 90.659210] kasan_check_range from copy_to_kernel_nofault+0x144/0x3fc [ 90.659240] copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x258/0x4fc [ 90.659240] copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.659271] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.659301] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.659332] kthread from ret_from_fork+0x14/0x20 [ 90.659362] Exception stack(0xf2553fb0 to 0xf2553ff8) [ 90.659362] 3fa0: 00000000 00000000 00000000 00000000 [ 90.659393] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.659393] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.659423] [ 90.779846] Allocated by task 333: [ 90.783264] kasan_save_track+0x30/0x5c [ 90.787139] __kasan_kmalloc+0x8c/0x94 [ 90.790893] copy_to_kernel_nofault_oob+0xf0/0x4fc [ 90.795745] kunit_try_run_case+0x22c/0x5a8 [ 90.799957] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.805480] kthread+0x464/0x810 [ 90.808746] ret_from_fork+0x14/0x20 [ 90.812347] [ 90.813842] The buggy address belongs to the object at cc963100 [ 90.813842] which belongs to the cache kmalloc-128 of size 128 [ 90.825744] The buggy address is located 0 bytes to the right of [ 90.825744] allocated 120-byte region [cc963100, cc963178) [ 90.837371] [ 90.838897] The buggy address belongs to the physical page: [ 90.844482] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c963 [ 90.851745] flags: 0x0(zone=0) [ 90.854827] page_type: f5(slab) [ 90.858001] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 90.866149] raw: 00000000 [ 90.868804] page dumped because: kasan: bad access detected [ 90.874389] [ 90.875915] Memory state around the buggy address: [ 90.880737] cc963000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc [ 90.887298] cc963080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.893859] >cc963100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 90.900451] ^ [ 90.906921] cc963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.913482] cc963200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.920074] ================================================================== [ 90.343170] ================================================================== [ 90.358154] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x37c/0x3fc [ 90.365600] Read of size 8 at addr cc963178 by task kunit_try_catch/333 [ 90.372253] [ 90.373779] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 90.373809] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.373809] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.373840] Call trace: [ 90.373840] unwind_backtrace from show_stack+0x18/0x1c [ 90.373870] show_stack from dump_stack_lvl+0x70/0x90 [ 90.373901] dump_stack_lvl from print_report+0x158/0x528 [ 90.373901] print_report from kasan_report+0xdc/0x118 [ 90.373931] kasan_report from copy_to_kernel_nofault+0x37c/0x3fc [ 90.373962] copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x1c0/0x4fc [ 90.373992] copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.374023] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.374053] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.374084] kthread from ret_from_fork+0x14/0x20 [ 90.374084] Exception stack(0xf2553fb0 to 0xf2553ff8) [ 90.374114] 3fa0: 00000000 00000000 00000000 00000000 [ 90.374114] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.374145] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.374145] [ 90.488464] Allocated by task 333: [ 90.491882] kasan_save_track+0x30/0x5c [ 90.495758] __kasan_kmalloc+0x8c/0x94 [ 90.499542] copy_to_kernel_nofault_oob+0xf0/0x4fc [ 90.504364] kunit_try_run_case+0x22c/0x5a8 [ 90.508605] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.514129] kthread+0x464/0x810 [ 90.517395] ret_from_fork+0x14/0x20 [ 90.520996] [ 90.522491] The buggy address belongs to the object at cc963100 [ 90.522491] which belongs to the cache kmalloc-128 of size 128 [ 90.534393] The buggy address is located 0 bytes to the right of [ 90.534393] allocated 120-byte region [cc963100, cc963178) [ 90.546020] [ 90.547515] The buggy address belongs to the physical page: [ 90.553131] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c963 [ 90.560424] flags: 0x0(zone=0) [ 90.563507] page_type: f5(slab) [ 90.566650] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 90.574798] raw: 00000000 [ 90.577453] page dumped because: kasan: bad access detected [ 90.583038] [ 90.584564] Memory state around the buggy address: [ 90.589385] cc963000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc [ 90.595947] cc963080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.602508] >cc963100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 90.609100] ^ [ 90.615570] cc963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.622131] cc963200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.628723] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 89.826995] ================================================================== [ 89.842224] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a0/0x6fc [ 89.848999] Read of size 1 at addr f02b57f3 by task kunit_try_catch/321 [ 89.855651] [ 89.857147] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 89.857177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.857208] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.857208] Call trace: [ 89.857208] unwind_backtrace from show_stack+0x18/0x1c [ 89.857238] show_stack from dump_stack_lvl+0x70/0x90 [ 89.857269] dump_stack_lvl from print_report+0x158/0x528 [ 89.857299] print_report from kasan_report+0xdc/0x118 [ 89.857330] kasan_report from vmalloc_oob+0x6a0/0x6fc [ 89.857330] vmalloc_oob from kunit_try_run_case+0x22c/0x5a8 [ 89.857360] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.857391] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.857421] kthread from ret_from_fork+0x14/0x20 [ 89.857452] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 89.857452] bfa0: 00000000 00000000 00000000 00000000 [ 89.857482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.857482] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.857513] [ 89.962219] The buggy address belongs to the virtual mapping at [ 89.962219] [f02b5000, f02b7000) created by: [ 89.962219] vmalloc_oob+0x88/0x6fc [ 89.976043] [ 89.977539] The buggy address belongs to the physical page: [ 89.983154] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f [ 89.990417] flags: 0x80000000(zone=2) [ 89.994140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 90.002258] raw: 00000000 [ 90.004913] page dumped because: kasan: bad access detected [ 90.010528] [ 90.012023] Memory state around the buggy address: [ 90.016845] f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.023406] f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.029998] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 90.036560] ^ [ 90.042785] f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.049346] f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.055908] ================================================================== [ 90.063507] ================================================================== [ 90.070800] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a8/0x6fc [ 90.077545] Read of size 1 at addr f02b57f8 by task kunit_try_catch/321 [ 90.084197] [ 90.085693] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 90.085723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.085754] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.085754] Call trace: [ 90.085754] unwind_backtrace from show_stack+0x18/0x1c [ 90.085784] show_stack from dump_stack_lvl+0x70/0x90 [ 90.085815] dump_stack_lvl from print_report+0x158/0x528 [ 90.085845] print_report from kasan_report+0xdc/0x118 [ 90.085876] kasan_report from vmalloc_oob+0x6a8/0x6fc [ 90.085876] vmalloc_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.085906] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.085937] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.085968] kthread from ret_from_fork+0x14/0x20 [ 90.085998] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 90.085998] bfa0: 00000000 00000000 00000000 00000000 [ 90.086029] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.086029] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.086059] [ 90.190734] The buggy address belongs to the virtual mapping at [ 90.190734] [f02b5000, f02b7000) created by: [ 90.190734] vmalloc_oob+0x88/0x6fc [ 90.204559] [ 90.206085] The buggy address belongs to the physical page: [ 90.211669] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f [ 90.218963] flags: 0x80000000(zone=2) [ 90.222656] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 90.230804] raw: 00000000 [ 90.233428] page dumped because: kasan: bad access detected [ 90.239044] [ 90.240539] Memory state around the buggy address: [ 90.245361] f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.251953] f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.258514] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 90.265075] ^ [ 90.271575] f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.278137] f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.284698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 72.234069] ================================================================== [ 72.249053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0 [ 72.256500] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 72.263153] [ 72.264678] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 72.264678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.264709] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.264709] Call trace: [ 72.264709] unwind_backtrace from show_stack+0x18/0x1c [ 72.264739] show_stack from dump_stack_lvl+0x70/0x90 [ 72.264770] dump_stack_lvl from print_report+0x158/0x528 [ 72.264801] print_report from kasan_report+0xdc/0x118 [ 72.264831] kasan_report from kasan_atomics_helper+0x5044/0x5ab0 [ 72.264831] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.264862] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.264892] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.264923] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.264953] kthread from ret_from_fork+0x14/0x20 [ 72.264984] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 72.264984] 3fa0: 00000000 00000000 00000000 00000000 [ 72.265014] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.265014] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.265045] [ 72.376892] Allocated by task 317: [ 72.380310] kasan_save_track+0x30/0x5c [ 72.384185] __kasan_kmalloc+0x8c/0x94 [ 72.387969] kasan_atomics+0xc0/0x33c [ 72.391662] kunit_try_run_case+0x22c/0x5a8 [ 72.395874] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.401428] kthread+0x464/0x810 [ 72.404663] ret_from_fork+0x14/0x20 [ 72.408264] [ 72.409790] The buggy address belongs to the object at cc90f300 [ 72.409790] which belongs to the cache kmalloc-64 of size 64 [ 72.421508] The buggy address is located 0 bytes to the right of [ 72.421508] allocated 48-byte region [cc90f300, cc90f330) [ 72.433044] [ 72.434539] The buggy address belongs to the physical page: [ 72.440155] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 72.447448] flags: 0x0(zone=0) [ 72.450531] page_type: f5(slab) [ 72.453674] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 72.461822] raw: 00000000 [ 72.464477] page dumped because: kasan: bad access detected [ 72.470092] [ 72.471588] Memory state around the buggy address: [ 72.476409] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.482971] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.489562] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.496124] ^ [ 72.500244] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.506805] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.513397] ================================================================== [ 87.840515] ================================================================== [ 87.847808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0 [ 87.855255] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.861999] [ 87.863494] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.863525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.863525] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.863555] Call trace: [ 87.863555] unwind_backtrace from show_stack+0x18/0x1c [ 87.863586] show_stack from dump_stack_lvl+0x70/0x90 [ 87.863616] dump_stack_lvl from print_report+0x158/0x528 [ 87.863616] print_report from kasan_report+0xdc/0x118 [ 87.863647] kasan_report from kasan_check_range+0x14c/0x198 [ 87.863677] kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0 [ 87.863708] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.863739] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.863769] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.863769] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.863800] kthread from ret_from_fork+0x14/0x20 [ 87.863830] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.863830] 3fa0: 00000000 00000000 00000000 00000000 [ 87.863861] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.863891] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.863891] [ 87.981872] Allocated by task 317: [ 87.985290] kasan_save_track+0x30/0x5c [ 87.989166] __kasan_kmalloc+0x8c/0x94 [ 87.992950] kasan_atomics+0xc0/0x33c [ 87.996643] kunit_try_run_case+0x22c/0x5a8 [ 88.000854] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.006378] kthread+0x464/0x810 [ 88.009643] ret_from_fork+0x14/0x20 [ 88.013244] [ 88.014739] The buggy address belongs to the object at cc90f300 [ 88.014739] which belongs to the cache kmalloc-64 of size 64 [ 88.026458] The buggy address is located 0 bytes to the right of [ 88.026458] allocated 48-byte region [cc90f300, cc90f330) [ 88.038024] [ 88.039520] The buggy address belongs to the physical page: [ 88.045135] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.052398] flags: 0x0(zone=0) [ 88.055480] page_type: f5(slab) [ 88.058654] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.066772] raw: 00000000 [ 88.069427] page dumped because: kasan: bad access detected [ 88.075042] [ 88.076538] Memory state around the buggy address: [ 88.081359] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.087921] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.094512] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.101074] ^ [ 88.105194] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.111755] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.118316] ================================================================== [ 88.410766] ================================================================== [ 88.418029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.425476] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.432159] [ 88.433654] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.433685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.433685] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.433715] Call trace: [ 88.433715] unwind_backtrace from show_stack+0x18/0x1c [ 88.433746] show_stack from dump_stack_lvl+0x70/0x90 [ 88.433776] dump_stack_lvl from print_report+0x158/0x528 [ 88.433776] print_report from kasan_report+0xdc/0x118 [ 88.433807] kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.433837] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.433868] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.433898] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.433929] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.433929] kthread from ret_from_fork+0x14/0x20 [ 88.433959] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.433990] 3fa0: 00000000 00000000 00000000 00000000 [ 88.433990] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.434020] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.434020] [ 88.545867] Allocated by task 317: [ 88.549316] kasan_save_track+0x30/0x5c [ 88.553161] __kasan_kmalloc+0x8c/0x94 [ 88.556945] kasan_atomics+0xc0/0x33c [ 88.560638] kunit_try_run_case+0x22c/0x5a8 [ 88.564880] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.570404] kthread+0x464/0x810 [ 88.573638] ret_from_fork+0x14/0x20 [ 88.577239] [ 88.578765] The buggy address belongs to the object at cc90f300 [ 88.578765] which belongs to the cache kmalloc-64 of size 64 [ 88.590484] The buggy address is located 0 bytes to the right of [ 88.590484] allocated 48-byte region [cc90f300, cc90f330) [ 88.602020] [ 88.603546] The buggy address belongs to the physical page: [ 88.609130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.616424] flags: 0x0(zone=0) [ 88.619476] page_type: f5(slab) [ 88.622650] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.630798] raw: 00000000 [ 88.633453] page dumped because: kasan: bad access detected [ 88.639038] [ 88.640533] Memory state around the buggy address: [ 88.645385] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.651947] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.658508] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.665069] ^ [ 88.669219] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.675781] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.682342] ================================================================== [ 73.078826] ================================================================== [ 73.086090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0 [ 73.093566] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.100311] [ 73.101806] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.101837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.101837] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.101867] Call trace: [ 73.101867] unwind_backtrace from show_stack+0x18/0x1c [ 73.101898] show_stack from dump_stack_lvl+0x70/0x90 [ 73.101898] dump_stack_lvl from print_report+0x158/0x528 [ 73.101928] print_report from kasan_report+0xdc/0x118 [ 73.101959] kasan_report from kasan_atomics_helper+0x550c/0x5ab0 [ 73.101989] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.102020] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.102050] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.102081] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.102081] kthread from ret_from_fork+0x14/0x20 [ 73.102111] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.102142] 3fa0: 00000000 00000000 00000000 00000000 [ 73.102142] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.102172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.102172] [ 73.214019] Allocated by task 317: [ 73.217468] kasan_save_track+0x30/0x5c [ 73.221313] __kasan_kmalloc+0x8c/0x94 [ 73.225097] kasan_atomics+0xc0/0x33c [ 73.228790] kunit_try_run_case+0x22c/0x5a8 [ 73.233032] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.238555] kthread+0x464/0x810 [ 73.241790] ret_from_fork+0x14/0x20 [ 73.245422] [ 73.246917] The buggy address belongs to the object at cc90f300 [ 73.246917] which belongs to the cache kmalloc-64 of size 64 [ 73.258636] The buggy address is located 0 bytes to the right of [ 73.258636] allocated 48-byte region [cc90f300, cc90f330) [ 73.270202] [ 73.271697] The buggy address belongs to the physical page: [ 73.277313] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.284576] flags: 0x0(zone=0) [ 73.287658] page_type: f5(slab) [ 73.290832] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.298980] raw: 00000000 [ 73.301605] page dumped because: kasan: bad access detected [ 73.307220] [ 73.308715] Memory state around the buggy address: [ 73.313537] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.320098] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.326690] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.333251] ^ [ 73.337371] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.343933] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.350524] ================================================================== [ 72.799926] ================================================================== [ 72.807189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0 [ 72.814636] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 72.821289] [ 72.822814] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 72.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.822845] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.822845] Call trace: [ 72.822845] unwind_backtrace from show_stack+0x18/0x1c [ 72.822875] show_stack from dump_stack_lvl+0x70/0x90 [ 72.822906] dump_stack_lvl from print_report+0x158/0x528 [ 72.822937] print_report from kasan_report+0xdc/0x118 [ 72.822967] kasan_report from kasan_atomics_helper+0x5170/0x5ab0 [ 72.822967] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.822998] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.823028] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.823059] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.823089] kthread from ret_from_fork+0x14/0x20 [ 72.823120] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 72.823120] 3fa0: 00000000 00000000 00000000 00000000 [ 72.823150] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.823150] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.823181] [ 72.935028] Allocated by task 317: [ 72.938446] kasan_save_track+0x30/0x5c [ 72.942321] __kasan_kmalloc+0x8c/0x94 [ 72.946105] kasan_atomics+0xc0/0x33c [ 72.949798] kunit_try_run_case+0x22c/0x5a8 [ 72.954010] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.959533] kthread+0x464/0x810 [ 72.962799] ret_from_fork+0x14/0x20 [ 72.966400] [ 72.967895] The buggy address belongs to the object at cc90f300 [ 72.967895] which belongs to the cache kmalloc-64 of size 64 [ 72.979644] The buggy address is located 0 bytes to the right of [ 72.979644] allocated 48-byte region [cc90f300, cc90f330) [ 72.991180] [ 72.992675] The buggy address belongs to the physical page: [ 72.998291] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.005554] flags: 0x0(zone=0) [ 73.008636] page_type: f5(slab) [ 73.011810] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.019958] raw: 00000000 [ 73.022613] page dumped because: kasan: bad access detected [ 73.028198] [ 73.029724] Memory state around the buggy address: [ 73.034545] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.041107] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.047668] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.054260] ^ [ 73.058380] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.064941] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.071502] ================================================================== [ 79.038940] ================================================================== [ 79.046203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0 [ 79.053649] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.060394] [ 79.061920] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.061950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.061950] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.061950] Call trace: [ 79.061981] unwind_backtrace from show_stack+0x18/0x1c [ 79.061981] show_stack from dump_stack_lvl+0x70/0x90 [ 79.062011] dump_stack_lvl from print_report+0x158/0x528 [ 79.062042] print_report from kasan_report+0xdc/0x118 [ 79.062072] kasan_report from kasan_check_range+0x14c/0x198 [ 79.062072] kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0 [ 79.062103] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.062133] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.062164] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.062194] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.062225] kthread from ret_from_fork+0x14/0x20 [ 79.062225] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.062255] 3fa0: 00000000 00000000 00000000 00000000 [ 79.062286] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.062286] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.062286] [ 79.180267] Allocated by task 317: [ 79.183685] kasan_save_track+0x30/0x5c [ 79.187561] __kasan_kmalloc+0x8c/0x94 [ 79.191345] kasan_atomics+0xc0/0x33c [ 79.195037] kunit_try_run_case+0x22c/0x5a8 [ 79.199249] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.204803] kthread+0x464/0x810 [ 79.208038] ret_from_fork+0x14/0x20 [ 79.211639] [ 79.213165] The buggy address belongs to the object at cc90f300 [ 79.213165] which belongs to the cache kmalloc-64 of size 64 [ 79.224884] The buggy address is located 0 bytes to the right of [ 79.224884] allocated 48-byte region [cc90f300, cc90f330) [ 79.236419] [ 79.237915] The buggy address belongs to the physical page: [ 79.243530] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 79.250793] flags: 0x0(zone=0) [ 79.253875] page_type: f5(slab) [ 79.257049] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.265197] raw: 00000000 [ 79.267822] page dumped because: kasan: bad access detected [ 79.273437] [ 79.274932] Memory state around the buggy address: [ 79.279754] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.286346] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.292907] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.299468] ^ [ 79.303588] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.310180] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.316741] ================================================================== [ 73.921630] ================================================================== [ 73.928894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0 [ 73.936279] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.943023] [ 73.944519] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.944549] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.944549] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.944580] Call trace: [ 73.944580] unwind_backtrace from show_stack+0x18/0x1c [ 73.944610] show_stack from dump_stack_lvl+0x70/0x90 [ 73.944641] dump_stack_lvl from print_report+0x158/0x528 [ 73.944671] print_report from kasan_report+0xdc/0x118 [ 73.944671] kasan_report from kasan_check_range+0x14c/0x198 [ 73.944702] kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0 [ 73.944732] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.944763] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.944793] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.944824] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.944824] kthread from ret_from_fork+0x14/0x20 [ 73.944854] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.944885] 3fa0: 00000000 00000000 00000000 00000000 [ 73.944885] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.944915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.944915] [ 74.062805] Allocated by task 317: [ 74.066223] kasan_save_track+0x30/0x5c [ 74.070098] __kasan_kmalloc+0x8c/0x94 [ 74.073883] kasan_atomics+0xc0/0x33c [ 74.077575] kunit_try_run_case+0x22c/0x5a8 [ 74.081787] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.087310] kthread+0x464/0x810 [ 74.090576] ret_from_fork+0x14/0x20 [ 74.094177] [ 74.095672] The buggy address belongs to the object at cc90f300 [ 74.095672] which belongs to the cache kmalloc-64 of size 64 [ 74.107421] The buggy address is located 0 bytes to the right of [ 74.107421] allocated 48-byte region [cc90f300, cc90f330) [ 74.118957] [ 74.120452] The buggy address belongs to the physical page: [ 74.126068] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.133331] flags: 0x0(zone=0) [ 74.136413] page_type: f5(slab) [ 74.139587] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.147735] raw: 00000000 [ 74.150360] page dumped because: kasan: bad access detected [ 74.155975] [ 74.157501] Memory state around the buggy address: [ 74.162322] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.168884] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.175445] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.182037] ^ [ 74.186157] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.192718] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.199279] ================================================================== [ 85.850891] ================================================================== [ 85.858154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0 [ 85.865631] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.872375] [ 85.873870] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.873901] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.873901] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.873931] Call trace: [ 85.873931] unwind_backtrace from show_stack+0x18/0x1c [ 85.873962] show_stack from dump_stack_lvl+0x70/0x90 [ 85.873992] dump_stack_lvl from print_report+0x158/0x528 [ 85.873992] print_report from kasan_report+0xdc/0x118 [ 85.874023] kasan_report from kasan_check_range+0x14c/0x198 [ 85.874053] kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0 [ 85.874084] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.874114] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.874114] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.874145] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.874176] kthread from ret_from_fork+0x14/0x20 [ 85.874206] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.874206] 3fa0: 00000000 00000000 00000000 00000000 [ 85.874237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.874237] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.874267] [ 85.992248] Allocated by task 317: [ 85.995666] kasan_save_track+0x30/0x5c [ 85.999542] __kasan_kmalloc+0x8c/0x94 [ 86.003326] kasan_atomics+0xc0/0x33c [ 86.007019] kunit_try_run_case+0x22c/0x5a8 [ 86.011230] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.016754] kthread+0x464/0x810 [ 86.020019] ret_from_fork+0x14/0x20 [ 86.023620] [ 86.025115] The buggy address belongs to the object at cc90f300 [ 86.025115] which belongs to the cache kmalloc-64 of size 64 [ 86.036834] The buggy address is located 0 bytes to the right of [ 86.036834] allocated 48-byte region [cc90f300, cc90f330) [ 86.048400] [ 86.049896] The buggy address belongs to the physical page: [ 86.055511] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.062774] flags: 0x0(zone=0) [ 86.065856] page_type: f5(slab) [ 86.069030] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.077178] raw: 00000000 [ 86.079803] page dumped because: kasan: bad access detected [ 86.085418] [ 86.086914] Memory state around the buggy address: [ 86.091735] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.098297] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.104888] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.111450] ^ [ 86.115570] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.122131] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.128723] ================================================================== [ 87.270294] ================================================================== [ 87.277557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0 [ 87.285034] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.291778] [ 87.293273] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.293304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.293304] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.293334] Call trace: [ 87.293334] unwind_backtrace from show_stack+0x18/0x1c [ 87.293365] show_stack from dump_stack_lvl+0x70/0x90 [ 87.293365] dump_stack_lvl from print_report+0x158/0x528 [ 87.293395] print_report from kasan_report+0xdc/0x118 [ 87.293426] kasan_report from kasan_check_range+0x14c/0x198 [ 87.293457] kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0 [ 87.293487] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.293487] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.293518] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.293548] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.293579] kthread from ret_from_fork+0x14/0x20 [ 87.293609] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.293609] 3fa0: 00000000 00000000 00000000 00000000 [ 87.293640] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.293640] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.293670] [ 87.411651] Allocated by task 317: [ 87.415069] kasan_save_track+0x30/0x5c [ 87.418914] __kasan_kmalloc+0x8c/0x94 [ 87.422698] kasan_atomics+0xc0/0x33c [ 87.426391] kunit_try_run_case+0x22c/0x5a8 [ 87.430633] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.436157] kthread+0x464/0x810 [ 87.439392] ret_from_fork+0x14/0x20 [ 87.442993] [ 87.444519] The buggy address belongs to the object at cc90f300 [ 87.444519] which belongs to the cache kmalloc-64 of size 64 [ 87.456237] The buggy address is located 0 bytes to the right of [ 87.456237] allocated 48-byte region [cc90f300, cc90f330) [ 87.467773] [ 87.469299] The buggy address belongs to the physical page: [ 87.474884] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 87.482177] flags: 0x0(zone=0) [ 87.485229] page_type: f5(slab) [ 87.488403] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.496551] raw: 00000000 [ 87.499206] page dumped because: kasan: bad access detected [ 87.504791] [ 87.506317] Memory state around the buggy address: [ 87.511108] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.517700] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.524261] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.530822] ^ [ 87.534973] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.541534] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.548095] ================================================================== [ 79.609191] ================================================================== [ 79.616455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0 [ 79.623901] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.630645] [ 79.632171] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.632202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.632202] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.632202] Call trace: [ 79.632232] unwind_backtrace from show_stack+0x18/0x1c [ 79.632263] show_stack from dump_stack_lvl+0x70/0x90 [ 79.632263] dump_stack_lvl from print_report+0x158/0x528 [ 79.632293] print_report from kasan_report+0xdc/0x118 [ 79.632324] kasan_report from kasan_check_range+0x14c/0x198 [ 79.632354] kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0 [ 79.632354] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.632385] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.632415] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.632446] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.632476] kthread from ret_from_fork+0x14/0x20 [ 79.632507] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.632507] 3fa0: 00000000 00000000 00000000 00000000 [ 79.632537] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.632537] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.632568] [ 79.750518] Allocated by task 317: [ 79.753967] kasan_save_track+0x30/0x5c [ 79.757843] __kasan_kmalloc+0x8c/0x94 [ 79.761596] kasan_atomics+0xc0/0x33c [ 79.765289] kunit_try_run_case+0x22c/0x5a8 [ 79.769531] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.775054] kthread+0x464/0x810 [ 79.778320] ret_from_fork+0x14/0x20 [ 79.781921] [ 79.783416] The buggy address belongs to the object at cc90f300 [ 79.783416] which belongs to the cache kmalloc-64 of size 64 [ 79.795135] The buggy address is located 0 bytes to the right of [ 79.795135] allocated 48-byte region [cc90f300, cc90f330) [ 79.806701] [ 79.808197] The buggy address belongs to the physical page: [ 79.813812] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 79.821075] flags: 0x0(zone=0) [ 79.824157] page_type: f5(slab) [ 79.827331] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.835449] raw: 00000000 [ 79.838104] page dumped because: kasan: bad access detected [ 79.843719] [ 79.845214] Memory state around the buggy address: [ 79.850036] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.856597] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.863189] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.869750] ^ [ 79.873870] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.880432] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.886993] ================================================================== [ 75.340515] ================================================================== [ 75.347778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0 [ 75.355133] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.361877] [ 75.363403] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.363403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.363433] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.363433] Call trace: [ 75.363433] unwind_backtrace from show_stack+0x18/0x1c [ 75.363464] show_stack from dump_stack_lvl+0x70/0x90 [ 75.363494] dump_stack_lvl from print_report+0x158/0x528 [ 75.363525] print_report from kasan_report+0xdc/0x118 [ 75.363555] kasan_report from kasan_check_range+0x14c/0x198 [ 75.363555] kasan_check_range from kasan_atomics_helper+0x790/0x5ab0 [ 75.363586] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.363616] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.363647] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.363677] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.363708] kthread from ret_from_fork+0x14/0x20 [ 75.363708] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.363739] 3fa0: 00000000 00000000 00000000 00000000 [ 75.363739] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.363769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.363769] [ 75.481658] Allocated by task 317: [ 75.485107] kasan_save_track+0x30/0x5c [ 75.488952] __kasan_kmalloc+0x8c/0x94 [ 75.492736] kasan_atomics+0xc0/0x33c [ 75.496429] kunit_try_run_case+0x22c/0x5a8 [ 75.500640] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.506195] kthread+0x464/0x810 [ 75.509429] ret_from_fork+0x14/0x20 [ 75.513061] [ 75.514556] The buggy address belongs to the object at cc90f300 [ 75.514556] which belongs to the cache kmalloc-64 of size 64 [ 75.526275] The buggy address is located 0 bytes to the right of [ 75.526275] allocated 48-byte region [cc90f300, cc90f330) [ 75.537811] [ 75.539337] The buggy address belongs to the physical page: [ 75.544921] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 75.552215] flags: 0x0(zone=0) [ 75.555297] page_type: f5(slab) [ 75.558471] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.566589] raw: 00000000 [ 75.569244] page dumped because: kasan: bad access detected [ 75.574859] [ 75.576354] Memory state around the buggy address: [ 75.581176] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.587738] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.594329] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.600891] ^ [ 75.605010] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.611602] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.618164] ================================================================== [ 75.625488] ================================================================== [ 75.632751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0 [ 75.640106] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.646850] [ 75.648376] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.648406] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.648406] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.648406] Call trace: [ 75.648437] unwind_backtrace from show_stack+0x18/0x1c [ 75.648437] show_stack from dump_stack_lvl+0x70/0x90 [ 75.648468] dump_stack_lvl from print_report+0x158/0x528 [ 75.648498] print_report from kasan_report+0xdc/0x118 [ 75.648529] kasan_report from kasan_check_range+0x14c/0x198 [ 75.648529] kasan_check_range from kasan_atomics_helper+0x834/0x5ab0 [ 75.648559] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.648590] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.648620] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.648651] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.648681] kthread from ret_from_fork+0x14/0x20 [ 75.648681] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.648712] 3fa0: 00000000 00000000 00000000 00000000 [ 75.648742] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.648742] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.648742] [ 75.766632] Allocated by task 317: [ 75.770080] kasan_save_track+0x30/0x5c [ 75.773925] __kasan_kmalloc+0x8c/0x94 [ 75.777709] kasan_atomics+0xc0/0x33c [ 75.781402] kunit_try_run_case+0x22c/0x5a8 [ 75.785644] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.791168] kthread+0x464/0x810 [ 75.794403] ret_from_fork+0x14/0x20 [ 75.798034] [ 75.799530] The buggy address belongs to the object at cc90f300 [ 75.799530] which belongs to the cache kmalloc-64 of size 64 [ 75.811248] The buggy address is located 0 bytes to the right of [ 75.811248] allocated 48-byte region [cc90f300, cc90f330) [ 75.822784] [ 75.824310] The buggy address belongs to the physical page: [ 75.829895] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 75.837188] flags: 0x0(zone=0) [ 75.840270] page_type: f5(slab) [ 75.843414] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.851562] raw: 00000000 [ 75.854217] page dumped because: kasan: bad access detected [ 75.859832] [ 75.861328] Memory state around the buggy address: [ 75.866149] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.872711] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.879302] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.885864] ^ [ 75.889984] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.896545] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.903137] ================================================================== [ 83.569885] ================================================================== [ 83.577148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0 [ 83.584594] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.591339] [ 83.592864] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.592895] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.592895] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.592895] Call trace: [ 83.592926] unwind_backtrace from show_stack+0x18/0x1c [ 83.592926] show_stack from dump_stack_lvl+0x70/0x90 [ 83.592956] dump_stack_lvl from print_report+0x158/0x528 [ 83.592987] print_report from kasan_report+0xdc/0x118 [ 83.593017] kasan_report from kasan_check_range+0x14c/0x198 [ 83.593048] kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0 [ 83.593048] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.593078] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.593109] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.593139] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.593170] kthread from ret_from_fork+0x14/0x20 [ 83.593200] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.593200] 3fa0: 00000000 00000000 00000000 00000000 [ 83.593231] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.593231] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.593261] [ 83.711212] Allocated by task 317: [ 83.714660] kasan_save_track+0x30/0x5c [ 83.718505] __kasan_kmalloc+0x8c/0x94 [ 83.722290] kasan_atomics+0xc0/0x33c [ 83.725982] kunit_try_run_case+0x22c/0x5a8 [ 83.730224] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.735748] kthread+0x464/0x810 [ 83.739013] ret_from_fork+0x14/0x20 [ 83.742614] [ 83.744110] The buggy address belongs to the object at cc90f300 [ 83.744110] which belongs to the cache kmalloc-64 of size 64 [ 83.755828] The buggy address is located 0 bytes to the right of [ 83.755828] allocated 48-byte region [cc90f300, cc90f330) [ 83.767395] [ 83.768890] The buggy address belongs to the physical page: [ 83.774505] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 83.781768] flags: 0x0(zone=0) [ 83.784851] page_type: f5(slab) [ 83.787994] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.796142] raw: 00000000 [ 83.798797] page dumped because: kasan: bad access detected [ 83.804382] [ 83.805908] Memory state around the buggy address: [ 83.810729] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.817291] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.823852] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.830444] ^ [ 83.834564] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.841125] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.847686] ================================================================== [ 80.179443] ================================================================== [ 80.186737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0 [ 80.194183] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 80.200836] [ 80.202331] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 80.202362] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.202362] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.202392] Call trace: [ 80.202392] unwind_backtrace from show_stack+0x18/0x1c [ 80.202423] show_stack from dump_stack_lvl+0x70/0x90 [ 80.202453] dump_stack_lvl from print_report+0x158/0x528 [ 80.202484] print_report from kasan_report+0xdc/0x118 [ 80.202484] kasan_report from kasan_atomics_helper+0x5218/0x5ab0 [ 80.202514] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.202545] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.202575] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.202606] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.202636] kthread from ret_from_fork+0x14/0x20 [ 80.202636] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 80.202667] 3fa0: 00000000 00000000 00000000 00000000 [ 80.202667] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.202697] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.202697] [ 80.314575] Allocated by task 317: [ 80.317993] kasan_save_track+0x30/0x5c [ 80.321868] __kasan_kmalloc+0x8c/0x94 [ 80.325653] kasan_atomics+0xc0/0x33c [ 80.329345] kunit_try_run_case+0x22c/0x5a8 [ 80.333557] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.339080] kthread+0x464/0x810 [ 80.342346] ret_from_fork+0x14/0x20 [ 80.345947] [ 80.347442] The buggy address belongs to the object at cc90f300 [ 80.347442] which belongs to the cache kmalloc-64 of size 64 [ 80.359161] The buggy address is located 0 bytes to the right of [ 80.359161] allocated 48-byte region [cc90f300, cc90f330) [ 80.370727] [ 80.372222] The buggy address belongs to the physical page: [ 80.377838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.385101] flags: 0x0(zone=0) [ 80.388183] page_type: f5(slab) [ 80.391357] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.399505] raw: 00000000 [ 80.402130] page dumped because: kasan: bad access detected [ 80.407745] [ 80.409240] Memory state around the buggy address: [ 80.414062] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.420623] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.427215] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.433776] ^ [ 80.437896] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.444488] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.451049] ================================================================== [ 88.689666] ================================================================== [ 88.696929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0 [ 88.704376] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.711120] [ 88.712646] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.712677] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.712677] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.712677] Call trace: [ 88.712677] unwind_backtrace from show_stack+0x18/0x1c [ 88.712707] show_stack from dump_stack_lvl+0x70/0x90 [ 88.712738] dump_stack_lvl from print_report+0x158/0x528 [ 88.712768] print_report from kasan_report+0xdc/0x118 [ 88.712799] kasan_report from kasan_check_range+0x14c/0x198 [ 88.712799] kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0 [ 88.712829] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.712860] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.712890] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.712921] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.712951] kthread from ret_from_fork+0x14/0x20 [ 88.712951] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.712982] 3fa0: 00000000 00000000 00000000 00000000 [ 88.712982] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.713012] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.713012] [ 88.830993] Allocated by task 317: [ 88.834411] kasan_save_track+0x30/0x5c [ 88.838287] __kasan_kmalloc+0x8c/0x94 [ 88.842071] kasan_atomics+0xc0/0x33c [ 88.845764] kunit_try_run_case+0x22c/0x5a8 [ 88.849975] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.855499] kthread+0x464/0x810 [ 88.858764] ret_from_fork+0x14/0x20 [ 88.862365] [ 88.863861] The buggy address belongs to the object at cc90f300 [ 88.863861] which belongs to the cache kmalloc-64 of size 64 [ 88.875610] The buggy address is located 0 bytes to the right of [ 88.875610] allocated 48-byte region [cc90f300, cc90f330) [ 88.887145] [ 88.888641] The buggy address belongs to the physical page: [ 88.894256] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.901519] flags: 0x0(zone=0) [ 88.904602] page_type: f5(slab) [ 88.907775] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.915924] raw: 00000000 [ 88.918548] page dumped because: kasan: bad access detected [ 88.924163] [ 88.925659] Memory state around the buggy address: [ 88.930480] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.937042] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.943634] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.950195] ^ [ 88.954315] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.960906] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.967468] ================================================================== [ 72.520874] ================================================================== [ 72.528167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0 [ 72.535614] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 72.542358] [ 72.543853] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 72.543884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.543914] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.543914] Call trace: [ 72.543914] unwind_backtrace from show_stack+0x18/0x1c [ 72.543945] show_stack from dump_stack_lvl+0x70/0x90 [ 72.543975] dump_stack_lvl from print_report+0x158/0x528 [ 72.544006] print_report from kasan_report+0xdc/0x118 [ 72.544006] kasan_report from kasan_atomics_helper+0x514c/0x5ab0 [ 72.544036] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.544067] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.544097] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.544128] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.544158] kthread from ret_from_fork+0x14/0x20 [ 72.544158] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 72.544189] 3fa0: 00000000 00000000 00000000 00000000 [ 72.544189] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.544219] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.544219] [ 72.656097] Allocated by task 317: [ 72.659515] kasan_save_track+0x30/0x5c [ 72.663391] __kasan_kmalloc+0x8c/0x94 [ 72.667175] kasan_atomics+0xc0/0x33c [ 72.670867] kunit_try_run_case+0x22c/0x5a8 [ 72.675079] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.680603] kthread+0x464/0x810 [ 72.683868] ret_from_fork+0x14/0x20 [ 72.687469] [ 72.688964] The buggy address belongs to the object at cc90f300 [ 72.688964] which belongs to the cache kmalloc-64 of size 64 [ 72.700714] The buggy address is located 0 bytes to the right of [ 72.700714] allocated 48-byte region [cc90f300, cc90f330) [ 72.712249] [ 72.713775] The buggy address belongs to the physical page: [ 72.719360] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 72.726654] flags: 0x0(zone=0) [ 72.729705] page_type: f5(slab) [ 72.732879] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 72.741027] raw: 00000000 [ 72.743682] page dumped because: kasan: bad access detected [ 72.749267] [ 72.750793] Memory state around the buggy address: [ 72.755615] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.762176] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.768737] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.775329] ^ [ 72.779449] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.786010] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.792602] ================================================================== [ 83.855010] ================================================================== [ 83.862274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0 [ 83.869720] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.876464] [ 83.877990] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.878021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.878021] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.878021] Call trace: [ 83.878051] unwind_backtrace from show_stack+0x18/0x1c [ 83.878051] show_stack from dump_stack_lvl+0x70/0x90 [ 83.878082] dump_stack_lvl from print_report+0x158/0x528 [ 83.878112] print_report from kasan_report+0xdc/0x118 [ 83.878143] kasan_report from kasan_check_range+0x14c/0x198 [ 83.878173] kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0 [ 83.878173] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.878204] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.878234] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.878265] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.878295] kthread from ret_from_fork+0x14/0x20 [ 83.878326] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.878326] 3fa0: 00000000 00000000 00000000 00000000 [ 83.878356] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.878356] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.878387] [ 83.996368] Allocated by task 317: [ 83.999786] kasan_save_track+0x30/0x5c [ 84.003662] __kasan_kmalloc+0x8c/0x94 [ 84.007415] kasan_atomics+0xc0/0x33c [ 84.011138] kunit_try_run_case+0x22c/0x5a8 [ 84.015350] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.020874] kthread+0x464/0x810 [ 84.024139] ret_from_fork+0x14/0x20 [ 84.027740] [ 84.029235] The buggy address belongs to the object at cc90f300 [ 84.029235] which belongs to the cache kmalloc-64 of size 64 [ 84.040954] The buggy address is located 0 bytes to the right of [ 84.040954] allocated 48-byte region [cc90f300, cc90f330) [ 84.052520] [ 84.054016] The buggy address belongs to the physical page: [ 84.059631] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.066894] flags: 0x0(zone=0) [ 84.069976] page_type: f5(slab) [ 84.073150] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.081298] raw: 00000000 [ 84.083923] page dumped because: kasan: bad access detected [ 84.089538] [ 84.091033] Memory state around the buggy address: [ 84.095855] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.102416] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.109008] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.115570] ^ [ 84.119689] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.126251] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.132843] ================================================================== [ 85.280670] ================================================================== [ 85.287933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.295379] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.302124] [ 85.303619] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.303649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.303649] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.303680] Call trace: [ 85.303680] unwind_backtrace from show_stack+0x18/0x1c [ 85.303710] show_stack from dump_stack_lvl+0x70/0x90 [ 85.303741] dump_stack_lvl from print_report+0x158/0x528 [ 85.303771] print_report from kasan_report+0xdc/0x118 [ 85.303771] kasan_report from kasan_check_range+0x14c/0x198 [ 85.303802] kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.303833] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.303863] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.303894] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.303924] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.303924] kthread from ret_from_fork+0x14/0x20 [ 85.303955] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.303955] 3fa0: 00000000 00000000 00000000 00000000 [ 85.303985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.304016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.304016] [ 85.421997] Allocated by task 317: [ 85.425415] kasan_save_track+0x30/0x5c [ 85.429290] __kasan_kmalloc+0x8c/0x94 [ 85.433074] kasan_atomics+0xc0/0x33c [ 85.436767] kunit_try_run_case+0x22c/0x5a8 [ 85.440979] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.446502] kthread+0x464/0x810 [ 85.449768] ret_from_fork+0x14/0x20 [ 85.453369] [ 85.454864] The buggy address belongs to the object at cc90f300 [ 85.454864] which belongs to the cache kmalloc-64 of size 64 [ 85.466583] The buggy address is located 0 bytes to the right of [ 85.466583] allocated 48-byte region [cc90f300, cc90f330) [ 85.478149] [ 85.479644] The buggy address belongs to the physical page: [ 85.485260] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 85.492523] flags: 0x0(zone=0) [ 85.495605] page_type: f5(slab) [ 85.498779] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.506896] raw: 00000000 [ 85.509552] page dumped because: kasan: bad access detected [ 85.515167] [ 85.516662] Memory state around the buggy address: [ 85.521484] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.528045] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.534637] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.541198] ^ [ 85.545318] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.551879] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.558471] ================================================================== [ 81.022399] ================================================================== [ 81.029663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0 [ 81.037109] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.043853] [ 81.045349] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.045379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.045379] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.045410] Call trace: [ 81.045410] unwind_backtrace from show_stack+0x18/0x1c [ 81.045440] show_stack from dump_stack_lvl+0x70/0x90 [ 81.045471] dump_stack_lvl from print_report+0x158/0x528 [ 81.045501] print_report from kasan_report+0xdc/0x118 [ 81.045501] kasan_report from kasan_check_range+0x14c/0x198 [ 81.045532] kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0 [ 81.045562] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.045593] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.045623] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.045654] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.045654] kthread from ret_from_fork+0x14/0x20 [ 81.045684] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.045715] 3fa0: 00000000 00000000 00000000 00000000 [ 81.045715] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.045745] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.045745] [ 81.163726] Allocated by task 317: [ 81.167144] kasan_save_track+0x30/0x5c [ 81.171020] __kasan_kmalloc+0x8c/0x94 [ 81.174804] kasan_atomics+0xc0/0x33c [ 81.178497] kunit_try_run_case+0x22c/0x5a8 [ 81.182708] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.188232] kthread+0x464/0x810 [ 81.191497] ret_from_fork+0x14/0x20 [ 81.195098] [ 81.196594] The buggy address belongs to the object at cc90f300 [ 81.196594] which belongs to the cache kmalloc-64 of size 64 [ 81.208312] The buggy address is located 0 bytes to the right of [ 81.208312] allocated 48-byte region [cc90f300, cc90f330) [ 81.219879] [ 81.221374] The buggy address belongs to the physical page: [ 81.226989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 81.234252] flags: 0x0(zone=0) [ 81.237335] page_type: f5(slab) [ 81.240509] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.248626] raw: 00000000 [ 81.251281] page dumped because: kasan: bad access detected [ 81.256896] [ 81.258392] Memory state around the buggy address: [ 81.263214] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.269775] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.276367] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.282928] ^ [ 81.287048] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.293609] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.300201] ================================================================== [ 74.770568] ================================================================== [ 74.777832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0 [ 74.785186] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 74.791961] [ 74.793457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 74.793487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.793487] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.793487] Call trace: [ 74.793518] unwind_backtrace from show_stack+0x18/0x1c [ 74.793548] show_stack from dump_stack_lvl+0x70/0x90 [ 74.793548] dump_stack_lvl from print_report+0x158/0x528 [ 74.793579] print_report from kasan_report+0xdc/0x118 [ 74.793609] kasan_report from kasan_check_range+0x14c/0x198 [ 74.793640] kasan_check_range from kasan_atomics_helper+0x648/0x5ab0 [ 74.793640] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.793670] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.793701] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.793731] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.793762] kthread from ret_from_fork+0x14/0x20 [ 74.793792] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 74.793792] 3fa0: 00000000 00000000 00000000 00000000 [ 74.793823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.793823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.793853] [ 74.911743] Allocated by task 317: [ 74.915161] kasan_save_track+0x30/0x5c [ 74.919036] __kasan_kmalloc+0x8c/0x94 [ 74.922790] kasan_atomics+0xc0/0x33c [ 74.926513] kunit_try_run_case+0x22c/0x5a8 [ 74.930725] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.936248] kthread+0x464/0x810 [ 74.939514] ret_from_fork+0x14/0x20 [ 74.943115] [ 74.944610] The buggy address belongs to the object at cc90f300 [ 74.944610] which belongs to the cache kmalloc-64 of size 64 [ 74.956329] The buggy address is located 0 bytes to the right of [ 74.956329] allocated 48-byte region [cc90f300, cc90f330) [ 74.967895] [ 74.969390] The buggy address belongs to the physical page: [ 74.975006] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.982269] flags: 0x0(zone=0) [ 74.985351] page_type: f5(slab) [ 74.988525] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.996673] raw: 00000000 [ 74.999298] page dumped because: kasan: bad access detected [ 75.004913] [ 75.006408] Memory state around the buggy address: [ 75.011230] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.017822] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.024383] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.030944] ^ [ 75.035064] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.041656] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.048217] ================================================================== [ 76.195404] ================================================================== [ 76.202667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0 [ 76.210021] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 76.216796] [ 76.218292] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 76.218322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.218322] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.218353] Call trace: [ 76.218353] unwind_backtrace from show_stack+0x18/0x1c [ 76.218383] show_stack from dump_stack_lvl+0x70/0x90 [ 76.218383] dump_stack_lvl from print_report+0x158/0x528 [ 76.218414] print_report from kasan_report+0xdc/0x118 [ 76.218444] kasan_report from kasan_check_range+0x14c/0x198 [ 76.218475] kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0 [ 76.218505] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.218505] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.218536] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.218566] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.218597] kthread from ret_from_fork+0x14/0x20 [ 76.218627] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 76.218627] 3fa0: 00000000 00000000 00000000 00000000 [ 76.218658] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.218658] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.218688] [ 76.336578] Allocated by task 317: [ 76.339996] kasan_save_track+0x30/0x5c [ 76.343872] __kasan_kmalloc+0x8c/0x94 [ 76.347656] kasan_atomics+0xc0/0x33c [ 76.351348] kunit_try_run_case+0x22c/0x5a8 [ 76.355560] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.361083] kthread+0x464/0x810 [ 76.364349] ret_from_fork+0x14/0x20 [ 76.367950] [ 76.369445] The buggy address belongs to the object at cc90f300 [ 76.369445] which belongs to the cache kmalloc-64 of size 64 [ 76.381164] The buggy address is located 0 bytes to the right of [ 76.381164] allocated 48-byte region [cc90f300, cc90f330) [ 76.392730] [ 76.394226] The buggy address belongs to the physical page: [ 76.399841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.407104] flags: 0x0(zone=0) [ 76.410186] page_type: f5(slab) [ 76.413360] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.421508] raw: 00000000 [ 76.424133] page dumped because: kasan: bad access detected [ 76.429748] [ 76.431243] Memory state around the buggy address: [ 76.436065] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.442657] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.449218] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.455780] ^ [ 76.459899] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.466491] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.473052] ================================================================== [ 83.284759] ================================================================== [ 83.292022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0 [ 83.299468] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.306213] [ 83.307739] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.307769] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.307769] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.307769] Call trace: [ 83.307769] unwind_backtrace from show_stack+0x18/0x1c [ 83.307800] show_stack from dump_stack_lvl+0x70/0x90 [ 83.307830] dump_stack_lvl from print_report+0x158/0x528 [ 83.307861] print_report from kasan_report+0xdc/0x118 [ 83.307891] kasan_report from kasan_check_range+0x14c/0x198 [ 83.307891] kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0 [ 83.307922] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.307952] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.307983] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.308013] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.308044] kthread from ret_from_fork+0x14/0x20 [ 83.308044] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.308074] 3fa0: 00000000 00000000 00000000 00000000 [ 83.308105] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.308105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.308105] [ 83.426086] Allocated by task 317: [ 83.429504] kasan_save_track+0x30/0x5c [ 83.433380] __kasan_kmalloc+0x8c/0x94 [ 83.437164] kasan_atomics+0xc0/0x33c [ 83.440856] kunit_try_run_case+0x22c/0x5a8 [ 83.445068] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.450622] kthread+0x464/0x810 [ 83.453857] ret_from_fork+0x14/0x20 [ 83.457458] [ 83.458984] The buggy address belongs to the object at cc90f300 [ 83.458984] which belongs to the cache kmalloc-64 of size 64 [ 83.470703] The buggy address is located 0 bytes to the right of [ 83.470703] allocated 48-byte region [cc90f300, cc90f330) [ 83.482238] [ 83.483764] The buggy address belongs to the physical page: [ 83.489349] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 83.496643] flags: 0x0(zone=0) [ 83.499694] page_type: f5(slab) [ 83.502868] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.511016] raw: 00000000 [ 83.513671] page dumped because: kasan: bad access detected [ 83.519256] [ 83.520782] Memory state around the buggy address: [ 83.525604] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.532165] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.538726] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.545318] ^ [ 83.549438] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.555999] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.562561] ================================================================== [ 82.150360] ================================================================== [ 82.157623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0 [ 82.165069] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 82.171813] [ 82.173339] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 82.173370] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.173370] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.173370] Call trace: [ 82.173400] unwind_backtrace from show_stack+0x18/0x1c [ 82.173400] show_stack from dump_stack_lvl+0x70/0x90 [ 82.173431] dump_stack_lvl from print_report+0x158/0x528 [ 82.173461] print_report from kasan_report+0xdc/0x118 [ 82.173492] kasan_report from kasan_check_range+0x14c/0x198 [ 82.173492] kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0 [ 82.173522] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.173553] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.173583] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.173614] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.173645] kthread from ret_from_fork+0x14/0x20 [ 82.173645] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 82.173675] 3fa0: 00000000 00000000 00000000 00000000 [ 82.173706] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.173706] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.173706] [ 82.291687] Allocated by task 317: [ 82.295135] kasan_save_track+0x30/0x5c [ 82.298980] __kasan_kmalloc+0x8c/0x94 [ 82.302764] kasan_atomics+0xc0/0x33c [ 82.306457] kunit_try_run_case+0x22c/0x5a8 [ 82.310668] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.316223] kthread+0x464/0x810 [ 82.319458] ret_from_fork+0x14/0x20 [ 82.323059] [ 82.324584] The buggy address belongs to the object at cc90f300 [ 82.324584] which belongs to the cache kmalloc-64 of size 64 [ 82.336303] The buggy address is located 0 bytes to the right of [ 82.336303] allocated 48-byte region [cc90f300, cc90f330) [ 82.347839] [ 82.349365] The buggy address belongs to the physical page: [ 82.354949] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.362243] flags: 0x0(zone=0) [ 82.365295] page_type: f5(slab) [ 82.368469] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.376617] raw: 00000000 [ 82.379272] page dumped because: kasan: bad access detected [ 82.384857] [ 82.386383] Memory state around the buggy address: [ 82.391204] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.397766] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.404327] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.410888] ^ [ 82.415039] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.421600] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.428161] ================================================================== [ 88.125640] ================================================================== [ 88.132904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0 [ 88.140350] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.147125] [ 88.148620] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.148651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.148651] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.148681] Call trace: [ 88.148681] unwind_backtrace from show_stack+0x18/0x1c [ 88.148712] show_stack from dump_stack_lvl+0x70/0x90 [ 88.148712] dump_stack_lvl from print_report+0x158/0x528 [ 88.148742] print_report from kasan_report+0xdc/0x118 [ 88.148773] kasan_report from kasan_check_range+0x14c/0x198 [ 88.148803] kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0 [ 88.148834] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.148834] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.148864] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.148895] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.148925] kthread from ret_from_fork+0x14/0x20 [ 88.148956] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.148956] 3fa0: 00000000 00000000 00000000 00000000 [ 88.148986] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.148986] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.149017] [ 88.266967] Allocated by task 317: [ 88.270416] kasan_save_track+0x30/0x5c [ 88.274261] __kasan_kmalloc+0x8c/0x94 [ 88.278045] kasan_atomics+0xc0/0x33c [ 88.281738] kunit_try_run_case+0x22c/0x5a8 [ 88.285980] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.291503] kthread+0x464/0x810 [ 88.294738] ret_from_fork+0x14/0x20 [ 88.298370] [ 88.299865] The buggy address belongs to the object at cc90f300 [ 88.299865] which belongs to the cache kmalloc-64 of size 64 [ 88.311584] The buggy address is located 0 bytes to the right of [ 88.311584] allocated 48-byte region [cc90f300, cc90f330) [ 88.323150] [ 88.324645] The buggy address belongs to the physical page: [ 88.330230] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.337524] flags: 0x0(zone=0) [ 88.340606] page_type: f5(slab) [ 88.343780] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.351898] raw: 00000000 [ 88.354553] page dumped because: kasan: bad access detected [ 88.360168] [ 88.361663] Memory state around the buggy address: [ 88.366485] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.373046] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.379608] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.386199] ^ [ 88.390319] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.396881] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.403442] ================================================================== [ 75.055541] ================================================================== [ 75.062805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0 [ 75.070159] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.076904] [ 75.078430] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.078460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.078460] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.078460] Call trace: [ 75.078491] unwind_backtrace from show_stack+0x18/0x1c [ 75.078491] show_stack from dump_stack_lvl+0x70/0x90 [ 75.078521] dump_stack_lvl from print_report+0x158/0x528 [ 75.078552] print_report from kasan_report+0xdc/0x118 [ 75.078582] kasan_report from kasan_check_range+0x14c/0x198 [ 75.078582] kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0 [ 75.078613] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.078643] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.078674] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.078704] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.078735] kthread from ret_from_fork+0x14/0x20 [ 75.078765] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.078765] 3fa0: 00000000 00000000 00000000 00000000 [ 75.078796] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.078796] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.078826] [ 75.196685] Allocated by task 317: [ 75.200134] kasan_save_track+0x30/0x5c [ 75.203979] __kasan_kmalloc+0x8c/0x94 [ 75.207763] kasan_atomics+0xc0/0x33c [ 75.211456] kunit_try_run_case+0x22c/0x5a8 [ 75.215698] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.221221] kthread+0x464/0x810 [ 75.224487] ret_from_fork+0x14/0x20 [ 75.228088] [ 75.229583] The buggy address belongs to the object at cc90f300 [ 75.229583] which belongs to the cache kmalloc-64 of size 64 [ 75.241302] The buggy address is located 0 bytes to the right of [ 75.241302] allocated 48-byte region [cc90f300, cc90f330) [ 75.252868] [ 75.254364] The buggy address belongs to the physical page: [ 75.259979] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 75.267242] flags: 0x0(zone=0) [ 75.270324] page_type: f5(slab) [ 75.273498] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.281616] raw: 00000000 [ 75.284271] page dumped because: kasan: bad access detected [ 75.289886] [ 75.291381] Memory state around the buggy address: [ 75.296203] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.302764] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.309356] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.315917] ^ [ 75.320037] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.326629] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.333190] ================================================================== [ 84.710418] ================================================================== [ 84.717681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.725128] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 84.731872] [ 84.733367] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 84.733398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.733428] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.733428] Call trace: [ 84.733428] unwind_backtrace from show_stack+0x18/0x1c [ 84.733459] show_stack from dump_stack_lvl+0x70/0x90 [ 84.733489] dump_stack_lvl from print_report+0x158/0x528 [ 84.733520] print_report from kasan_report+0xdc/0x118 [ 84.733520] kasan_report from kasan_check_range+0x14c/0x198 [ 84.733551] kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.733581] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.733612] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.733642] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.733673] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.733703] kthread from ret_from_fork+0x14/0x20 [ 84.733703] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 84.733734] 3fa0: 00000000 00000000 00000000 00000000 [ 84.733734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.733764] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.733764] [ 84.851745] Allocated by task 317: [ 84.855163] kasan_save_track+0x30/0x5c [ 84.859039] __kasan_kmalloc+0x8c/0x94 [ 84.862823] kasan_atomics+0xc0/0x33c [ 84.866516] kunit_try_run_case+0x22c/0x5a8 [ 84.870727] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.876251] kthread+0x464/0x810 [ 84.879516] ret_from_fork+0x14/0x20 [ 84.883117] [ 84.884613] The buggy address belongs to the object at cc90f300 [ 84.884613] which belongs to the cache kmalloc-64 of size 64 [ 84.896362] The buggy address is located 0 bytes to the right of [ 84.896362] allocated 48-byte region [cc90f300, cc90f330) [ 84.907897] [ 84.909393] The buggy address belongs to the physical page: [ 84.915008] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.922271] flags: 0x0(zone=0) [ 84.925354] page_type: f5(slab) [ 84.928527] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.936676] raw: 00000000 [ 84.939300] page dumped because: kasan: bad access detected [ 84.944915] [ 84.946411] Memory state around the buggy address: [ 84.951232] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.957824] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.964385] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.970947] ^ [ 84.975067] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.981658] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.988220] ================================================================== [ 86.414916] ================================================================== [ 86.422210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0 [ 86.429656] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 86.436401] [ 86.437896] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 86.437927] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.437927] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.437957] Call trace: [ 86.437957] unwind_backtrace from show_stack+0x18/0x1c [ 86.437988] show_stack from dump_stack_lvl+0x70/0x90 [ 86.438018] dump_stack_lvl from print_report+0x158/0x528 [ 86.438049] print_report from kasan_report+0xdc/0x118 [ 86.438049] kasan_report from kasan_check_range+0x14c/0x198 [ 86.438079] kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0 [ 86.438110] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.438140] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.438171] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.438171] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.438201] kthread from ret_from_fork+0x14/0x20 [ 86.438232] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 86.438232] 3fa0: 00000000 00000000 00000000 00000000 [ 86.438262] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.438293] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.438293] [ 86.556274] Allocated by task 317: [ 86.559692] kasan_save_track+0x30/0x5c [ 86.563568] __kasan_kmalloc+0x8c/0x94 [ 86.567352] kasan_atomics+0xc0/0x33c [ 86.571044] kunit_try_run_case+0x22c/0x5a8 [ 86.575256] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.580780] kthread+0x464/0x810 [ 86.584045] ret_from_fork+0x14/0x20 [ 86.587646] [ 86.589141] The buggy address belongs to the object at cc90f300 [ 86.589141] which belongs to the cache kmalloc-64 of size 64 [ 86.600860] The buggy address is located 0 bytes to the right of [ 86.600860] allocated 48-byte region [cc90f300, cc90f330) [ 86.612426] [ 86.613922] The buggy address belongs to the physical page: [ 86.619537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.626800] flags: 0x0(zone=0) [ 86.629882] page_type: f5(slab) [ 86.633056] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.641204] raw: 00000000 [ 86.643829] page dumped because: kasan: bad access detected [ 86.649444] [ 86.650939] Memory state around the buggy address: [ 86.655761] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.662322] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.668914] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.675476] ^ [ 86.679595] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.686157] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.692749] ================================================================== [ 89.253662] ================================================================== [ 89.260925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0 [ 89.268371] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 89.275115] [ 89.276611] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 89.276641] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.276672] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.276672] Call trace: [ 89.276672] unwind_backtrace from show_stack+0x18/0x1c [ 89.276702] show_stack from dump_stack_lvl+0x70/0x90 [ 89.276733] dump_stack_lvl from print_report+0x158/0x528 [ 89.276763] print_report from kasan_report+0xdc/0x118 [ 89.276763] kasan_report from kasan_check_range+0x14c/0x198 [ 89.276794] kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0 [ 89.276824] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.276855] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.276885] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.276916] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.276947] kthread from ret_from_fork+0x14/0x20 [ 89.276947] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 89.276977] 3fa0: 00000000 00000000 00000000 00000000 [ 89.276977] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.277008] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.277008] [ 89.394989] Allocated by task 317: [ 89.398406] kasan_save_track+0x30/0x5c [ 89.402282] __kasan_kmalloc+0x8c/0x94 [ 89.406066] kasan_atomics+0xc0/0x33c [ 89.409759] kunit_try_run_case+0x22c/0x5a8 [ 89.413970] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.419494] kthread+0x464/0x810 [ 89.422760] ret_from_fork+0x14/0x20 [ 89.426361] [ 89.427856] The buggy address belongs to the object at cc90f300 [ 89.427856] which belongs to the cache kmalloc-64 of size 64 [ 89.439575] The buggy address is located 0 bytes to the right of [ 89.439575] allocated 48-byte region [cc90f300, cc90f330) [ 89.451141] [ 89.452636] The buggy address belongs to the physical page: [ 89.458251] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 89.465515] flags: 0x0(zone=0) [ 89.468597] page_type: f5(slab) [ 89.471771] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.479888] raw: 00000000 [ 89.482543] page dumped because: kasan: bad access detected [ 89.488159] [ 89.489654] Memory state around the buggy address: [ 89.494476] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.501037] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.507629] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.514190] ^ [ 89.518310] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.524871] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.531433] ================================================================== [ 82.714477] ================================================================== [ 82.721740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0 [ 82.729187] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 82.735931] [ 82.737457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 82.737487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.737487] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.737487] Call trace: [ 82.737518] unwind_backtrace from show_stack+0x18/0x1c [ 82.737518] show_stack from dump_stack_lvl+0x70/0x90 [ 82.737548] dump_stack_lvl from print_report+0x158/0x528 [ 82.737579] print_report from kasan_report+0xdc/0x118 [ 82.737609] kasan_report from kasan_check_range+0x14c/0x198 [ 82.737640] kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0 [ 82.737640] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.737670] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.737701] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.737731] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.737762] kthread from ret_from_fork+0x14/0x20 [ 82.737792] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 82.737792] 3fa0: 00000000 00000000 00000000 00000000 [ 82.737823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.737823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.737854] [ 82.855804] Allocated by task 317: [ 82.859252] kasan_save_track+0x30/0x5c [ 82.863098] __kasan_kmalloc+0x8c/0x94 [ 82.866882] kasan_atomics+0xc0/0x33c [ 82.870574] kunit_try_run_case+0x22c/0x5a8 [ 82.874816] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.880340] kthread+0x464/0x810 [ 82.883605] ret_from_fork+0x14/0x20 [ 82.887207] [ 82.888702] The buggy address belongs to the object at cc90f300 [ 82.888702] which belongs to the cache kmalloc-64 of size 64 [ 82.900421] The buggy address is located 0 bytes to the right of [ 82.900421] allocated 48-byte region [cc90f300, cc90f330) [ 82.911987] [ 82.913482] The buggy address belongs to the physical page: [ 82.919097] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.926361] flags: 0x0(zone=0) [ 82.929443] page_type: f5(slab) [ 82.932617] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.940734] raw: 00000000 [ 82.943389] page dumped because: kasan: bad access detected [ 82.949005] [ 82.950500] Memory state around the buggy address: [ 82.955322] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.961883] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.968475] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.975036] ^ [ 82.979156] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.985717] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.992309] ================================================================== [ 73.357849] ================================================================== [ 73.365112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0 [ 73.372467] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.379119] [ 73.380645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.380676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.380676] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.380676] Call trace: [ 73.380706] unwind_backtrace from show_stack+0x18/0x1c [ 73.380737] show_stack from dump_stack_lvl+0x70/0x90 [ 73.380737] dump_stack_lvl from print_report+0x158/0x528 [ 73.380767] print_report from kasan_report+0xdc/0x118 [ 73.380798] kasan_report from kasan_check_range+0x14c/0x198 [ 73.380828] kasan_check_range from kasan_atomics_helper+0x420/0x5ab0 [ 73.380828] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.380859] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.380889] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.380920] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.380950] kthread from ret_from_fork+0x14/0x20 [ 73.380981] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.380981] 3fa0: 00000000 00000000 00000000 00000000 [ 73.381011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.381011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.381042] [ 73.498931] Allocated by task 317: [ 73.502349] kasan_save_track+0x30/0x5c [ 73.506225] __kasan_kmalloc+0x8c/0x94 [ 73.509979] kasan_atomics+0xc0/0x33c [ 73.513702] kunit_try_run_case+0x22c/0x5a8 [ 73.517913] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.523437] kthread+0x464/0x810 [ 73.526702] ret_from_fork+0x14/0x20 [ 73.530303] [ 73.531799] The buggy address belongs to the object at cc90f300 [ 73.531799] which belongs to the cache kmalloc-64 of size 64 [ 73.543518] The buggy address is located 0 bytes to the right of [ 73.543518] allocated 48-byte region [cc90f300, cc90f330) [ 73.555084] [ 73.556579] The buggy address belongs to the physical page: [ 73.562194] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.569458] flags: 0x0(zone=0) [ 73.572540] page_type: f5(slab) [ 73.575714] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.583862] raw: 00000000 [ 73.586486] page dumped because: kasan: bad access detected [ 73.592102] [ 73.593597] Memory state around the buggy address: [ 73.598419] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.605010] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.611572] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.618133] ^ [ 73.622253] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.628845] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.635406] ================================================================== [ 81.871459] ================================================================== [ 81.878723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0 [ 81.886169] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.892822] [ 81.894348] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.894378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.894378] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.894378] Call trace: [ 81.894378] unwind_backtrace from show_stack+0x18/0x1c [ 81.894409] show_stack from dump_stack_lvl+0x70/0x90 [ 81.894439] dump_stack_lvl from print_report+0x158/0x528 [ 81.894470] print_report from kasan_report+0xdc/0x118 [ 81.894500] kasan_report from kasan_atomics_helper+0x52e4/0x5ab0 [ 81.894500] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.894531] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.894561] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.894592] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.894622] kthread from ret_from_fork+0x14/0x20 [ 81.894653] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.894653] 3fa0: 00000000 00000000 00000000 00000000 [ 81.894683] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.894683] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.894714] [ 82.006561] Allocated by task 317: [ 82.009979] kasan_save_track+0x30/0x5c [ 82.013854] __kasan_kmalloc+0x8c/0x94 [ 82.017639] kasan_atomics+0xc0/0x33c [ 82.021331] kunit_try_run_case+0x22c/0x5a8 [ 82.025543] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.031066] kthread+0x464/0x810 [ 82.034332] ret_from_fork+0x14/0x20 [ 82.037933] [ 82.039428] The buggy address belongs to the object at cc90f300 [ 82.039428] which belongs to the cache kmalloc-64 of size 64 [ 82.051177] The buggy address is located 0 bytes to the right of [ 82.051177] allocated 48-byte region [cc90f300, cc90f330) [ 82.062713] [ 82.064208] The buggy address belongs to the physical page: [ 82.069824] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.077087] flags: 0x0(zone=0) [ 82.080169] page_type: f5(slab) [ 82.083343] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.091491] raw: 00000000 [ 82.094116] page dumped because: kasan: bad access detected [ 82.099731] [ 82.101226] Memory state around the buggy address: [ 82.106048] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.112640] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.119201] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.125762] ^ [ 82.129882] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.136474] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.143035] ================================================================== [ 81.307525] ================================================================== [ 81.314788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0 [ 81.322235] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.328887] [ 81.330413] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.330444] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.330444] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.330444] Call trace: [ 81.330444] unwind_backtrace from show_stack+0x18/0x1c [ 81.330474] show_stack from dump_stack_lvl+0x70/0x90 [ 81.330505] dump_stack_lvl from print_report+0x158/0x528 [ 81.330535] print_report from kasan_report+0xdc/0x118 [ 81.330566] kasan_report from kasan_atomics_helper+0x52d8/0x5ab0 [ 81.330596] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.330596] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.330627] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.330657] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.330688] kthread from ret_from_fork+0x14/0x20 [ 81.330718] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.330718] 3fa0: 00000000 00000000 00000000 00000000 [ 81.330749] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.330749] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.330780] [ 81.442626] Allocated by task 317: [ 81.446044] kasan_save_track+0x30/0x5c [ 81.449920] __kasan_kmalloc+0x8c/0x94 [ 81.453704] kasan_atomics+0xc0/0x33c [ 81.457397] kunit_try_run_case+0x22c/0x5a8 [ 81.461608] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.467132] kthread+0x464/0x810 [ 81.470397] ret_from_fork+0x14/0x20 [ 81.473999] [ 81.475494] The buggy address belongs to the object at cc90f300 [ 81.475494] which belongs to the cache kmalloc-64 of size 64 [ 81.487243] The buggy address is located 0 bytes to the right of [ 81.487243] allocated 48-byte region [cc90f300, cc90f330) [ 81.498779] [ 81.500274] The buggy address belongs to the physical page: [ 81.505889] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 81.513153] flags: 0x0(zone=0) [ 81.516235] page_type: f5(slab) [ 81.519409] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.527557] raw: 00000000 [ 81.530181] page dumped because: kasan: bad access detected [ 81.535797] [ 81.537292] Memory state around the buggy address: [ 81.542114] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.548706] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.555267] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.561828] ^ [ 81.565948] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.572540] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.579101] ================================================================== [ 86.700042] ================================================================== [ 86.707305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.714782] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 86.721527] [ 86.723022] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 86.723052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.723052] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.723083] Call trace: [ 86.723083] unwind_backtrace from show_stack+0x18/0x1c [ 86.723114] show_stack from dump_stack_lvl+0x70/0x90 [ 86.723114] dump_stack_lvl from print_report+0x158/0x528 [ 86.723144] print_report from kasan_report+0xdc/0x118 [ 86.723175] kasan_report from kasan_check_range+0x14c/0x198 [ 86.723205] kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.723236] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.723236] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.723266] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.723297] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.723327] kthread from ret_from_fork+0x14/0x20 [ 86.723358] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 86.723358] 3fa0: 00000000 00000000 00000000 00000000 [ 86.723388] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.723388] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.723419] [ 86.841400] Allocated by task 317: [ 86.844818] kasan_save_track+0x30/0x5c [ 86.848693] __kasan_kmalloc+0x8c/0x94 [ 86.852447] kasan_atomics+0xc0/0x33c [ 86.856140] kunit_try_run_case+0x22c/0x5a8 [ 86.860382] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.865905] kthread+0x464/0x810 [ 86.869171] ret_from_fork+0x14/0x20 [ 86.872772] [ 86.874267] The buggy address belongs to the object at cc90f300 [ 86.874267] which belongs to the cache kmalloc-64 of size 64 [ 86.885986] The buggy address is located 0 bytes to the right of [ 86.885986] allocated 48-byte region [cc90f300, cc90f330) [ 86.897552] [ 86.899047] The buggy address belongs to the physical page: [ 86.904663] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.911926] flags: 0x0(zone=0) [ 86.915008] page_type: f5(slab) [ 86.918182] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.926300] raw: 00000000 [ 86.928955] page dumped because: kasan: bad access detected [ 86.934570] [ 86.936065] Memory state around the buggy address: [ 86.940887] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.947448] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.954010] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.960601] ^ [ 86.964721] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.971282] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.977844] ================================================================== [ 78.469024] ================================================================== [ 78.476287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0 [ 78.483673] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 78.490417] [ 78.491912] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 78.491943] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.491943] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.491973] Call trace: [ 78.491973] unwind_backtrace from show_stack+0x18/0x1c [ 78.492004] show_stack from dump_stack_lvl+0x70/0x90 [ 78.492004] dump_stack_lvl from print_report+0x158/0x528 [ 78.492034] print_report from kasan_report+0xdc/0x118 [ 78.492065] kasan_report from kasan_check_range+0x14c/0x198 [ 78.492095] kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0 [ 78.492126] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.492126] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.492156] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.492187] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.492218] kthread from ret_from_fork+0x14/0x20 [ 78.492248] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 78.492248] 3fa0: 00000000 00000000 00000000 00000000 [ 78.492279] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.492279] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.492309] [ 78.610198] Allocated by task 317: [ 78.613616] kasan_save_track+0x30/0x5c [ 78.617492] __kasan_kmalloc+0x8c/0x94 [ 78.621246] kasan_atomics+0xc0/0x33c [ 78.624938] kunit_try_run_case+0x22c/0x5a8 [ 78.629180] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.634704] kthread+0x464/0x810 [ 78.637969] ret_from_fork+0x14/0x20 [ 78.641571] [ 78.643066] The buggy address belongs to the object at cc90f300 [ 78.643066] which belongs to the cache kmalloc-64 of size 64 [ 78.654785] The buggy address is located 0 bytes to the right of [ 78.654785] allocated 48-byte region [cc90f300, cc90f330) [ 78.666351] [ 78.667846] The buggy address belongs to the physical page: [ 78.673461] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.680725] flags: 0x0(zone=0) [ 78.683807] page_type: f5(slab) [ 78.686981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.695098] raw: 00000000 [ 78.697753] page dumped because: kasan: bad access detected [ 78.703369] [ 78.704864] Memory state around the buggy address: [ 78.709686] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.716247] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.722839] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.729400] ^ [ 78.733520] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.740081] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.746673] ================================================================== [ 78.753967] ================================================================== [ 78.761260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0 [ 78.768615] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 78.775360] [ 78.776855] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 78.776885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.776916] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.776916] Call trace: [ 78.776916] unwind_backtrace from show_stack+0x18/0x1c [ 78.776947] show_stack from dump_stack_lvl+0x70/0x90 [ 78.776977] dump_stack_lvl from print_report+0x158/0x528 [ 78.777008] print_report from kasan_report+0xdc/0x118 [ 78.777008] kasan_report from kasan_check_range+0x14c/0x198 [ 78.777038] kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0 [ 78.777069] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.777099] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.777130] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.777160] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.777160] kthread from ret_from_fork+0x14/0x20 [ 78.777191] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 78.777221] 3fa0: 00000000 00000000 00000000 00000000 [ 78.777221] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.777252] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.777252] [ 78.895141] Allocated by task 317: [ 78.898559] kasan_save_track+0x30/0x5c [ 78.902435] __kasan_kmalloc+0x8c/0x94 [ 78.906219] kasan_atomics+0xc0/0x33c [ 78.909912] kunit_try_run_case+0x22c/0x5a8 [ 78.914123] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.919647] kthread+0x464/0x810 [ 78.922912] ret_from_fork+0x14/0x20 [ 78.926513] [ 78.928009] The buggy address belongs to the object at cc90f300 [ 78.928009] which belongs to the cache kmalloc-64 of size 64 [ 78.939758] The buggy address is located 0 bytes to the right of [ 78.939758] allocated 48-byte region [cc90f300, cc90f330) [ 78.951293] [ 78.952789] The buggy address belongs to the physical page: [ 78.958404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.965667] flags: 0x0(zone=0) [ 78.968749] page_type: f5(slab) [ 78.971923] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.980072] raw: 00000000 [ 78.982696] page dumped because: kasan: bad access detected [ 78.988311] [ 78.989807] Memory state around the buggy address: [ 78.994628] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.001220] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.007781] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.014343] ^ [ 79.018493] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.025054] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.031616] ================================================================== [ 79.894317] ================================================================== [ 79.901580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0 [ 79.909027] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.915802] [ 79.917297] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.917327] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.917327] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.917358] Call trace: [ 79.917358] unwind_backtrace from show_stack+0x18/0x1c [ 79.917388] show_stack from dump_stack_lvl+0x70/0x90 [ 79.917388] dump_stack_lvl from print_report+0x158/0x528 [ 79.917419] print_report from kasan_report+0xdc/0x118 [ 79.917449] kasan_report from kasan_check_range+0x14c/0x198 [ 79.917480] kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0 [ 79.917480] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.917510] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.917541] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.917572] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.917602] kthread from ret_from_fork+0x14/0x20 [ 79.917633] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.917633] 3fa0: 00000000 00000000 00000000 00000000 [ 79.917663] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.917663] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.917694] [ 80.035675] Allocated by task 317: [ 80.039093] kasan_save_track+0x30/0x5c [ 80.042968] __kasan_kmalloc+0x8c/0x94 [ 80.046722] kasan_atomics+0xc0/0x33c [ 80.050445] kunit_try_run_case+0x22c/0x5a8 [ 80.054656] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.060180] kthread+0x464/0x810 [ 80.063446] ret_from_fork+0x14/0x20 [ 80.067047] [ 80.068542] The buggy address belongs to the object at cc90f300 [ 80.068542] which belongs to the cache kmalloc-64 of size 64 [ 80.080261] The buggy address is located 0 bytes to the right of [ 80.080261] allocated 48-byte region [cc90f300, cc90f330) [ 80.091827] [ 80.093322] The buggy address belongs to the physical page: [ 80.098937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.106201] flags: 0x0(zone=0) [ 80.109283] page_type: f5(slab) [ 80.112457] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.120605] raw: 00000000 [ 80.123229] page dumped because: kasan: bad access detected [ 80.128845] [ 80.130340] Memory state around the buggy address: [ 80.135162] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.141723] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.148315] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.154876] ^ [ 80.158996] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.165557] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.172149] ================================================================== [ 85.565765] ================================================================== [ 85.573028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0 [ 85.580474] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.587249] [ 85.588745] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.588775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.588775] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.588775] Call trace: [ 85.588806] unwind_backtrace from show_stack+0x18/0x1c [ 85.588836] show_stack from dump_stack_lvl+0x70/0x90 [ 85.588836] dump_stack_lvl from print_report+0x158/0x528 [ 85.588867] print_report from kasan_report+0xdc/0x118 [ 85.588897] kasan_report from kasan_check_range+0x14c/0x198 [ 85.588928] kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0 [ 85.588928] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.588958] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.588989] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.589019] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.589050] kthread from ret_from_fork+0x14/0x20 [ 85.589080] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.589080] 3fa0: 00000000 00000000 00000000 00000000 [ 85.589111] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.589111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.589141] [ 85.707122] Allocated by task 317: [ 85.710540] kasan_save_track+0x30/0x5c [ 85.714416] __kasan_kmalloc+0x8c/0x94 [ 85.718170] kasan_atomics+0xc0/0x33c [ 85.721862] kunit_try_run_case+0x22c/0x5a8 [ 85.726104] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.731628] kthread+0x464/0x810 [ 85.734893] ret_from_fork+0x14/0x20 [ 85.738494] [ 85.739990] The buggy address belongs to the object at cc90f300 [ 85.739990] which belongs to the cache kmalloc-64 of size 64 [ 85.751708] The buggy address is located 0 bytes to the right of [ 85.751708] allocated 48-byte region [cc90f300, cc90f330) [ 85.763275] [ 85.764770] The buggy address belongs to the physical page: [ 85.770385] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 85.777648] flags: 0x0(zone=0) [ 85.780731] page_type: f5(slab) [ 85.783905] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.792022] raw: 00000000 [ 85.794677] page dumped because: kasan: bad access detected [ 85.800292] [ 85.801788] Memory state around the buggy address: [ 85.806610] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.813171] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.819763] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.826324] ^ [ 85.830444] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.837005] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.843597] ================================================================== [ 87.555419] ================================================================== [ 87.562683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0 [ 87.570129] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.576873] [ 87.578369] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.578399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.578430] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.578430] Call trace: [ 87.578430] unwind_backtrace from show_stack+0x18/0x1c [ 87.578460] show_stack from dump_stack_lvl+0x70/0x90 [ 87.578491] dump_stack_lvl from print_report+0x158/0x528 [ 87.578521] print_report from kasan_report+0xdc/0x118 [ 87.578552] kasan_report from kasan_check_range+0x14c/0x198 [ 87.578552] kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0 [ 87.578582] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.578613] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.578643] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.578674] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.578704] kthread from ret_from_fork+0x14/0x20 [ 87.578704] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.578735] 3fa0: 00000000 00000000 00000000 00000000 [ 87.578735] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.578765] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.578765] [ 87.696746] Allocated by task 317: [ 87.700164] kasan_save_track+0x30/0x5c [ 87.704040] __kasan_kmalloc+0x8c/0x94 [ 87.707824] kasan_atomics+0xc0/0x33c [ 87.711517] kunit_try_run_case+0x22c/0x5a8 [ 87.715728] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.721252] kthread+0x464/0x810 [ 87.724517] ret_from_fork+0x14/0x20 [ 87.728118] [ 87.729614] The buggy address belongs to the object at cc90f300 [ 87.729614] which belongs to the cache kmalloc-64 of size 64 [ 87.741333] The buggy address is located 0 bytes to the right of [ 87.741333] allocated 48-byte region [cc90f300, cc90f330) [ 87.752899] [ 87.754394] The buggy address belongs to the physical page: [ 87.760009] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 87.767272] flags: 0x0(zone=0) [ 87.770355] page_type: f5(slab) [ 87.773529] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.781677] raw: 00000000 [ 87.784301] page dumped because: kasan: bad access detected [ 87.789916] [ 87.791412] Memory state around the buggy address: [ 87.796234] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.802795] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.809387] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.815948] ^ [ 87.820068] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.826629] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.833221] ================================================================== [ 86.985168] ================================================================== [ 86.992431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0 [ 86.999908] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.006652] [ 87.008148] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.008178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.008178] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.008209] Call trace: [ 87.008209] unwind_backtrace from show_stack+0x18/0x1c [ 87.008239] show_stack from dump_stack_lvl+0x70/0x90 [ 87.008239] dump_stack_lvl from print_report+0x158/0x528 [ 87.008270] print_report from kasan_report+0xdc/0x118 [ 87.008300] kasan_report from kasan_check_range+0x14c/0x198 [ 87.008331] kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0 [ 87.008361] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.008361] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.008392] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.008422] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.008453] kthread from ret_from_fork+0x14/0x20 [ 87.008483] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.008483] 3fa0: 00000000 00000000 00000000 00000000 [ 87.008514] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.008514] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.008544] [ 87.126495] Allocated by task 317: [ 87.129943] kasan_save_track+0x30/0x5c [ 87.133789] __kasan_kmalloc+0x8c/0x94 [ 87.137573] kasan_atomics+0xc0/0x33c [ 87.141265] kunit_try_run_case+0x22c/0x5a8 [ 87.145507] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.151031] kthread+0x464/0x810 [ 87.154266] ret_from_fork+0x14/0x20 [ 87.157897] [ 87.159393] The buggy address belongs to the object at cc90f300 [ 87.159393] which belongs to the cache kmalloc-64 of size 64 [ 87.171112] The buggy address is located 0 bytes to the right of [ 87.171112] allocated 48-byte region [cc90f300, cc90f330) [ 87.182647] [ 87.184173] The buggy address belongs to the physical page: [ 87.189758] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 87.197052] flags: 0x0(zone=0) [ 87.200103] page_type: f5(slab) [ 87.203277] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.211425] raw: 00000000 [ 87.214080] page dumped because: kasan: bad access detected [ 87.219665] [ 87.221191] Memory state around the buggy address: [ 87.226013] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.232574] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.239135] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.245727] ^ [ 87.249847] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.256408] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.262969] ================================================================== [ 84.140136] ================================================================== [ 84.147430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0 [ 84.154876] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 84.161621] [ 84.163116] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 84.163146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.163146] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.163177] Call trace: [ 84.163177] unwind_backtrace from show_stack+0x18/0x1c [ 84.163208] show_stack from dump_stack_lvl+0x70/0x90 [ 84.163238] dump_stack_lvl from print_report+0x158/0x528 [ 84.163269] print_report from kasan_report+0xdc/0x118 [ 84.163269] kasan_report from kasan_check_range+0x14c/0x198 [ 84.163299] kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0 [ 84.163330] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.163360] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.163391] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.163391] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.163421] kthread from ret_from_fork+0x14/0x20 [ 84.163452] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 84.163452] 3fa0: 00000000 00000000 00000000 00000000 [ 84.163482] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.163513] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.163513] [ 84.281494] Allocated by task 317: [ 84.284912] kasan_save_track+0x30/0x5c [ 84.288787] __kasan_kmalloc+0x8c/0x94 [ 84.292572] kasan_atomics+0xc0/0x33c [ 84.296264] kunit_try_run_case+0x22c/0x5a8 [ 84.300476] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.305999] kthread+0x464/0x810 [ 84.309265] ret_from_fork+0x14/0x20 [ 84.312866] [ 84.314361] The buggy address belongs to the object at cc90f300 [ 84.314361] which belongs to the cache kmalloc-64 of size 64 [ 84.326080] The buggy address is located 0 bytes to the right of [ 84.326080] allocated 48-byte region [cc90f300, cc90f330) [ 84.337646] [ 84.339141] The buggy address belongs to the physical page: [ 84.344757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.352020] flags: 0x0(zone=0) [ 84.355102] page_type: f5(slab) [ 84.358276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.366424] raw: 00000000 [ 84.369049] page dumped because: kasan: bad access detected [ 84.374664] [ 84.376159] Memory state around the buggy address: [ 84.380981] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.387542] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.394134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.400695] ^ [ 84.404815] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.411407] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.417968] ================================================================== [ 86.136016] ================================================================== [ 86.143310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0 [ 86.150756] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 86.157409] [ 86.158905] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 86.158935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.158966] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.158966] Call trace: [ 86.158966] unwind_backtrace from show_stack+0x18/0x1c [ 86.158996] show_stack from dump_stack_lvl+0x70/0x90 [ 86.159027] dump_stack_lvl from print_report+0x158/0x528 [ 86.159057] print_report from kasan_report+0xdc/0x118 [ 86.159057] kasan_report from kasan_atomics_helper+0x544c/0x5ab0 [ 86.159088] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.159118] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.159149] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.159179] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.159210] kthread from ret_from_fork+0x14/0x20 [ 86.159210] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 86.159240] 3fa0: 00000000 00000000 00000000 00000000 [ 86.159240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.159271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.159271] [ 86.271148] Allocated by task 317: [ 86.274566] kasan_save_track+0x30/0x5c [ 86.278442] __kasan_kmalloc+0x8c/0x94 [ 86.282226] kasan_atomics+0xc0/0x33c [ 86.285919] kunit_try_run_case+0x22c/0x5a8 [ 86.290130] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.295654] kthread+0x464/0x810 [ 86.298919] ret_from_fork+0x14/0x20 [ 86.302520] [ 86.304016] The buggy address belongs to the object at cc90f300 [ 86.304016] which belongs to the cache kmalloc-64 of size 64 [ 86.315734] The buggy address is located 0 bytes to the right of [ 86.315734] allocated 48-byte region [cc90f300, cc90f330) [ 86.327301] [ 86.328796] The buggy address belongs to the physical page: [ 86.334411] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.341674] flags: 0x0(zone=0) [ 86.344757] page_type: f5(slab) [ 86.347930] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.356079] raw: 00000000 [ 86.358703] page dumped because: kasan: bad access detected [ 86.364318] [ 86.365814] Memory state around the buggy address: [ 86.370635] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.377197] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.383789] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.390350] ^ [ 86.394470] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.401062] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.407623] ================================================================== [ 80.458343] ================================================================== [ 80.465637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0 [ 80.473083] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 80.479827] [ 80.481323] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 80.481353] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.481353] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.481384] Call trace: [ 80.481384] unwind_backtrace from show_stack+0x18/0x1c [ 80.481414] show_stack from dump_stack_lvl+0x70/0x90 [ 80.481445] dump_stack_lvl from print_report+0x158/0x528 [ 80.481475] print_report from kasan_report+0xdc/0x118 [ 80.481475] kasan_report from kasan_check_range+0x14c/0x198 [ 80.481506] kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0 [ 80.481536] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.481567] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.481597] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.481597] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.481628] kthread from ret_from_fork+0x14/0x20 [ 80.481658] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 80.481658] 3fa0: 00000000 00000000 00000000 00000000 [ 80.481689] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.481719] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.481719] [ 80.599700] Allocated by task 317: [ 80.603118] kasan_save_track+0x30/0x5c [ 80.606994] __kasan_kmalloc+0x8c/0x94 [ 80.610778] kasan_atomics+0xc0/0x33c [ 80.614471] kunit_try_run_case+0x22c/0x5a8 [ 80.618682] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.624206] kthread+0x464/0x810 [ 80.627471] ret_from_fork+0x14/0x20 [ 80.631072] [ 80.632568] The buggy address belongs to the object at cc90f300 [ 80.632568] which belongs to the cache kmalloc-64 of size 64 [ 80.644287] The buggy address is located 0 bytes to the right of [ 80.644287] allocated 48-byte region [cc90f300, cc90f330) [ 80.655853] [ 80.657348] The buggy address belongs to the physical page: [ 80.662963] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.670227] flags: 0x0(zone=0) [ 80.673309] page_type: f5(slab) [ 80.676483] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.684631] raw: 00000000 [ 80.687255] page dumped because: kasan: bad access detected [ 80.692871] [ 80.694366] Memory state around the buggy address: [ 80.699188] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.705749] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.712341] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.718902] ^ [ 80.723022] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.729583] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.736175] ================================================================== [ 81.586425] ================================================================== [ 81.593688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0 [ 81.601135] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.607788] [ 81.609283] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.609313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.609344] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.609344] Call trace: [ 81.609344] unwind_backtrace from show_stack+0x18/0x1c [ 81.609374] show_stack from dump_stack_lvl+0x70/0x90 [ 81.609405] dump_stack_lvl from print_report+0x158/0x528 [ 81.609436] print_report from kasan_report+0xdc/0x118 [ 81.609466] kasan_report from kasan_check_range+0x14c/0x198 [ 81.609466] kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0 [ 81.609497] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.609527] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.609558] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.609588] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.609619] kthread from ret_from_fork+0x14/0x20 [ 81.609619] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.609649] 3fa0: 00000000 00000000 00000000 00000000 [ 81.609649] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.609680] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.609680] [ 81.727661] Allocated by task 317: [ 81.731079] kasan_save_track+0x30/0x5c [ 81.734954] __kasan_kmalloc+0x8c/0x94 [ 81.738739] kasan_atomics+0xc0/0x33c [ 81.742431] kunit_try_run_case+0x22c/0x5a8 [ 81.746643] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.752166] kthread+0x464/0x810 [ 81.755432] ret_from_fork+0x14/0x20 [ 81.759033] [ 81.760528] The buggy address belongs to the object at cc90f300 [ 81.760528] which belongs to the cache kmalloc-64 of size 64 [ 81.772247] The buggy address is located 0 bytes to the right of [ 81.772247] allocated 48-byte region [cc90f300, cc90f330) [ 81.783813] [ 81.785308] The buggy address belongs to the physical page: [ 81.790924] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 81.798187] flags: 0x0(zone=0) [ 81.801269] page_type: f5(slab) [ 81.804443] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.812591] raw: 00000000 [ 81.815216] page dumped because: kasan: bad access detected [ 81.820831] [ 81.822326] Memory state around the buggy address: [ 81.827148] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.833740] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.840301] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.846862] ^ [ 81.850982] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.857574] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.864135] ================================================================== [ 88.974761] ================================================================== [ 88.982025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0 [ 88.989501] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.996154] [ 88.997650] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.997680] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.997680] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.997711] Call trace: [ 88.997711] unwind_backtrace from show_stack+0x18/0x1c [ 88.997741] show_stack from dump_stack_lvl+0x70/0x90 [ 88.997772] dump_stack_lvl from print_report+0x158/0x528 [ 88.997802] print_report from kasan_report+0xdc/0x118 [ 88.997802] kasan_report from kasan_atomics_helper+0x54f4/0x5ab0 [ 88.997833] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.997863] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.997894] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.997924] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.997955] kthread from ret_from_fork+0x14/0x20 [ 88.997955] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.997985] 3fa0: 00000000 00000000 00000000 00000000 [ 88.997985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.998016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.998016] [ 89.109893] Allocated by task 317: [ 89.113311] kasan_save_track+0x30/0x5c [ 89.117187] __kasan_kmalloc+0x8c/0x94 [ 89.120941] kasan_atomics+0xc0/0x33c [ 89.124664] kunit_try_run_case+0x22c/0x5a8 [ 89.128875] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.134399] kthread+0x464/0x810 [ 89.137664] ret_from_fork+0x14/0x20 [ 89.141265] [ 89.142761] The buggy address belongs to the object at cc90f300 [ 89.142761] which belongs to the cache kmalloc-64 of size 64 [ 89.154479] The buggy address is located 0 bytes to the right of [ 89.154479] allocated 48-byte region [cc90f300, cc90f330) [ 89.166046] [ 89.167541] The buggy address belongs to the physical page: [ 89.173126] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 89.180419] flags: 0x0(zone=0) [ 89.183471] page_type: f5(slab) [ 89.186645] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.194793] raw: 00000000 [ 89.197448] page dumped because: kasan: bad access detected [ 89.203033] [ 89.204528] Memory state around the buggy address: [ 89.209350] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.215942] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.222503] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.229064] ^ [ 89.233184] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.239776] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.246337] ================================================================== [ 77.050292] ================================================================== [ 77.057556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0 [ 77.064941] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.071685] [ 77.073181] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.073211] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.073211] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.073242] Call trace: [ 77.073242] unwind_backtrace from show_stack+0x18/0x1c [ 77.073272] show_stack from dump_stack_lvl+0x70/0x90 [ 77.073303] dump_stack_lvl from print_report+0x158/0x528 [ 77.073303] print_report from kasan_report+0xdc/0x118 [ 77.073333] kasan_report from kasan_check_range+0x14c/0x198 [ 77.073364] kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0 [ 77.073394] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.073425] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.073425] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.073455] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.073486] kthread from ret_from_fork+0x14/0x20 [ 77.073516] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.073516] 3fa0: 00000000 00000000 00000000 00000000 [ 77.073547] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.073547] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.073577] [ 77.191467] Allocated by task 317: [ 77.194885] kasan_save_track+0x30/0x5c [ 77.198760] __kasan_kmalloc+0x8c/0x94 [ 77.202545] kasan_atomics+0xc0/0x33c [ 77.206237] kunit_try_run_case+0x22c/0x5a8 [ 77.210449] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.215972] kthread+0x464/0x810 [ 77.219238] ret_from_fork+0x14/0x20 [ 77.222839] [ 77.224334] The buggy address belongs to the object at cc90f300 [ 77.224334] which belongs to the cache kmalloc-64 of size 64 [ 77.236053] The buggy address is located 0 bytes to the right of [ 77.236053] allocated 48-byte region [cc90f300, cc90f330) [ 77.247619] [ 77.249114] The buggy address belongs to the physical page: [ 77.254730] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 77.261993] flags: 0x0(zone=0) [ 77.265075] page_type: f5(slab) [ 77.268249] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.276397] raw: 00000000 [ 77.279022] page dumped because: kasan: bad access detected [ 77.284637] [ 77.286132] Memory state around the buggy address: [ 77.290954] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.297515] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.304107] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.310668] ^ [ 77.314788] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.321380] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.327941] ================================================================== [ 77.905181] ================================================================== [ 77.912445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0 [ 77.919891] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.926544] [ 77.928070] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.928100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.928100] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.928100] Call trace: [ 77.928100] unwind_backtrace from show_stack+0x18/0x1c [ 77.928131] show_stack from dump_stack_lvl+0x70/0x90 [ 77.928161] dump_stack_lvl from print_report+0x158/0x528 [ 77.928192] print_report from kasan_report+0xdc/0x118 [ 77.928222] kasan_report from kasan_atomics_helper+0x5404/0x5ab0 [ 77.928253] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.928253] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.928283] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.928314] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.928344] kthread from ret_from_fork+0x14/0x20 [ 77.928375] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.928375] 3fa0: 00000000 00000000 00000000 00000000 [ 77.928405] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.928405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.928436] [ 78.040283] Allocated by task 317: [ 78.043701] kasan_save_track+0x30/0x5c [ 78.047576] __kasan_kmalloc+0x8c/0x94 [ 78.051361] kasan_atomics+0xc0/0x33c [ 78.055053] kunit_try_run_case+0x22c/0x5a8 [ 78.059265] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.064788] kthread+0x464/0x810 [ 78.068054] ret_from_fork+0x14/0x20 [ 78.071655] [ 78.073150] The buggy address belongs to the object at cc90f300 [ 78.073150] which belongs to the cache kmalloc-64 of size 64 [ 78.084899] The buggy address is located 0 bytes to the right of [ 78.084899] allocated 48-byte region [cc90f300, cc90f330) [ 78.096435] [ 78.097930] The buggy address belongs to the physical page: [ 78.103546] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.110809] flags: 0x0(zone=0) [ 78.113891] page_type: f5(slab) [ 78.117065] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.125213] raw: 00000000 [ 78.127838] page dumped because: kasan: bad access detected [ 78.133453] [ 78.134948] Memory state around the buggy address: [ 78.139770] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.146362] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.152923] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.159484] ^ [ 78.163635] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.170196] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.176757] ================================================================== [ 84.425262] ================================================================== [ 84.432556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.440002] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 84.446746] [ 84.448242] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 84.448272] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.448303] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.448303] Call trace: [ 84.448303] unwind_backtrace from show_stack+0x18/0x1c [ 84.448333] show_stack from dump_stack_lvl+0x70/0x90 [ 84.448364] dump_stack_lvl from print_report+0x158/0x528 [ 84.448394] print_report from kasan_report+0xdc/0x118 [ 84.448394] kasan_report from kasan_check_range+0x14c/0x198 [ 84.448425] kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.448455] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.448486] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.448516] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.448547] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.448577] kthread from ret_from_fork+0x14/0x20 [ 84.448577] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 84.448608] 3fa0: 00000000 00000000 00000000 00000000 [ 84.448608] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.448638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.448638] [ 84.566619] Allocated by task 317: [ 84.570037] kasan_save_track+0x30/0x5c [ 84.573913] __kasan_kmalloc+0x8c/0x94 [ 84.577697] kasan_atomics+0xc0/0x33c [ 84.581390] kunit_try_run_case+0x22c/0x5a8 [ 84.585601] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.591125] kthread+0x464/0x810 [ 84.594390] ret_from_fork+0x14/0x20 [ 84.597991] [ 84.599487] The buggy address belongs to the object at cc90f300 [ 84.599487] which belongs to the cache kmalloc-64 of size 64 [ 84.611236] The buggy address is located 0 bytes to the right of [ 84.611236] allocated 48-byte region [cc90f300, cc90f330) [ 84.622772] [ 84.624267] The buggy address belongs to the physical page: [ 84.629882] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.637145] flags: 0x0(zone=0) [ 84.640228] page_type: f5(slab) [ 84.643402] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.651550] raw: 00000000 [ 84.654174] page dumped because: kasan: bad access detected [ 84.659790] [ 84.661285] Memory state around the buggy address: [ 84.666107] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.672698] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.679260] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.685821] ^ [ 84.689941] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.696533] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.703094] ================================================================== [ 78.184082] ================================================================== [ 78.191345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0 [ 78.198699] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 78.205444] [ 78.206970] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 78.207000] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.207000] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.207000] Call trace: [ 78.207031] unwind_backtrace from show_stack+0x18/0x1c [ 78.207031] show_stack from dump_stack_lvl+0x70/0x90 [ 78.207061] dump_stack_lvl from print_report+0x158/0x528 [ 78.207092] print_report from kasan_report+0xdc/0x118 [ 78.207122] kasan_report from kasan_check_range+0x14c/0x198 [ 78.207122] kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0 [ 78.207153] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.207183] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.207214] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.207244] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.207275] kthread from ret_from_fork+0x14/0x20 [ 78.207305] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 78.207305] 3fa0: 00000000 00000000 00000000 00000000 [ 78.207336] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.207336] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.207366] [ 78.325225] Allocated by task 317: [ 78.328674] kasan_save_track+0x30/0x5c [ 78.332519] __kasan_kmalloc+0x8c/0x94 [ 78.336303] kasan_atomics+0xc0/0x33c [ 78.339996] kunit_try_run_case+0x22c/0x5a8 [ 78.344207] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.349761] kthread+0x464/0x810 [ 78.352996] ret_from_fork+0x14/0x20 [ 78.356628] [ 78.358123] The buggy address belongs to the object at cc90f300 [ 78.358123] which belongs to the cache kmalloc-64 of size 64 [ 78.369842] The buggy address is located 0 bytes to the right of [ 78.369842] allocated 48-byte region [cc90f300, cc90f330) [ 78.381378] [ 78.382904] The buggy address belongs to the physical page: [ 78.388488] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.395782] flags: 0x0(zone=0) [ 78.398834] page_type: f5(slab) [ 78.402008] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.410156] raw: 00000000 [ 78.412780] page dumped because: kasan: bad access detected [ 78.418395] [ 78.419891] Memory state around the buggy address: [ 78.424713] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.431304] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.437866] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.444427] ^ [ 78.448577] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.455139] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.461700] ================================================================== [ 84.995544] ================================================================== [ 85.002807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.010253] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.016998] [ 85.018493] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.018524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.018554] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.018554] Call trace: [ 85.018554] unwind_backtrace from show_stack+0x18/0x1c [ 85.018585] show_stack from dump_stack_lvl+0x70/0x90 [ 85.018615] dump_stack_lvl from print_report+0x158/0x528 [ 85.018646] print_report from kasan_report+0xdc/0x118 [ 85.018646] kasan_report from kasan_check_range+0x14c/0x198 [ 85.018676] kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.018707] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.018737] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.018768] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.018798] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.018829] kthread from ret_from_fork+0x14/0x20 [ 85.018829] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.018859] 3fa0: 00000000 00000000 00000000 00000000 [ 85.018859] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.018890] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.018890] [ 85.136871] Allocated by task 317: [ 85.140289] kasan_save_track+0x30/0x5c [ 85.144165] __kasan_kmalloc+0x8c/0x94 [ 85.147949] kasan_atomics+0xc0/0x33c [ 85.151641] kunit_try_run_case+0x22c/0x5a8 [ 85.155853] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.161376] kthread+0x464/0x810 [ 85.164642] ret_from_fork+0x14/0x20 [ 85.168243] [ 85.169738] The buggy address belongs to the object at cc90f300 [ 85.169738] which belongs to the cache kmalloc-64 of size 64 [ 85.181457] The buggy address is located 0 bytes to the right of [ 85.181457] allocated 48-byte region [cc90f300, cc90f330) [ 85.193023] [ 85.194519] The buggy address belongs to the physical page: [ 85.200134] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 85.207397] flags: 0x0(zone=0) [ 85.210479] page_type: f5(slab) [ 85.213653] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.221801] raw: 00000000 [ 85.224426] page dumped because: kasan: bad access detected [ 85.230041] [ 85.231536] Memory state around the buggy address: [ 85.236358] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.242919] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.249511] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.256072] ^ [ 85.260192] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.266784] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.273345] ================================================================== [ 82.999603] ================================================================== [ 83.006866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0 [ 83.014343] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.021087] [ 83.022583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.022613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.022613] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.022644] Call trace: [ 83.022644] unwind_backtrace from show_stack+0x18/0x1c [ 83.022674] show_stack from dump_stack_lvl+0x70/0x90 [ 83.022705] dump_stack_lvl from print_report+0x158/0x528 [ 83.022705] print_report from kasan_report+0xdc/0x118 [ 83.022735] kasan_report from kasan_check_range+0x14c/0x198 [ 83.022766] kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0 [ 83.022796] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.022827] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.022857] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.022857] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.022888] kthread from ret_from_fork+0x14/0x20 [ 83.022918] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.022918] 3fa0: 00000000 00000000 00000000 00000000 [ 83.022949] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.022979] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.022979] [ 83.140960] Allocated by task 317: [ 83.144378] kasan_save_track+0x30/0x5c [ 83.148254] __kasan_kmalloc+0x8c/0x94 [ 83.152038] kasan_atomics+0xc0/0x33c [ 83.155731] kunit_try_run_case+0x22c/0x5a8 [ 83.159942] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.165466] kthread+0x464/0x810 [ 83.168731] ret_from_fork+0x14/0x20 [ 83.172332] [ 83.173828] The buggy address belongs to the object at cc90f300 [ 83.173828] which belongs to the cache kmalloc-64 of size 64 [ 83.185577] The buggy address is located 0 bytes to the right of [ 83.185577] allocated 48-byte region [cc90f300, cc90f330) [ 83.197113] [ 83.198608] The buggy address belongs to the physical page: [ 83.204223] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 83.211486] flags: 0x0(zone=0) [ 83.214569] page_type: f5(slab) [ 83.217742] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.225891] raw: 00000000 [ 83.228515] page dumped because: kasan: bad access detected [ 83.234130] [ 83.235626] Memory state around the buggy address: [ 83.240447] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.247039] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.253601] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.260162] ^ [ 83.264282] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.270874] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.277435] ================================================================== [ 89.538757] ================================================================== [ 89.546020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0 [ 89.553497] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 89.560150] [ 89.561645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 89.561676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.561676] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.561706] Call trace: [ 89.561706] unwind_backtrace from show_stack+0x18/0x1c [ 89.561737] show_stack from dump_stack_lvl+0x70/0x90 [ 89.561767] dump_stack_lvl from print_report+0x158/0x528 [ 89.561767] print_report from kasan_report+0xdc/0x118 [ 89.561798] kasan_report from kasan_atomics_helper+0x5500/0x5ab0 [ 89.561828] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.561859] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.561889] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.561920] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.561950] kthread from ret_from_fork+0x14/0x20 [ 89.561950] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 89.561981] 3fa0: 00000000 00000000 00000000 00000000 [ 89.561981] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.562011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.562011] [ 89.673858] Allocated by task 317: [ 89.677307] kasan_save_track+0x30/0x5c [ 89.681152] __kasan_kmalloc+0x8c/0x94 [ 89.684936] kasan_atomics+0xc0/0x33c [ 89.688629] kunit_try_run_case+0x22c/0x5a8 [ 89.692840] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.698394] kthread+0x464/0x810 [ 89.701629] ret_from_fork+0x14/0x20 [ 89.705230] [ 89.706756] The buggy address belongs to the object at cc90f300 [ 89.706756] which belongs to the cache kmalloc-64 of size 64 [ 89.718475] The buggy address is located 0 bytes to the right of [ 89.718475] allocated 48-byte region [cc90f300, cc90f330) [ 89.730010] [ 89.731506] The buggy address belongs to the physical page: [ 89.737121] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 89.744384] flags: 0x0(zone=0) [ 89.747467] page_type: f5(slab) [ 89.750640] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.758789] raw: 00000000 [ 89.761413] page dumped because: kasan: bad access detected [ 89.767028] [ 89.768524] Memory state around the buggy address: [ 89.773345] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.779937] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.786499] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.793060] ^ [ 89.797180] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.803771] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.810333] ================================================================== [ 74.485595] ================================================================== [ 74.492889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0 [ 74.500244] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 74.506988] [ 74.508483] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 74.508514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.508514] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.508544] Call trace: [ 74.508544] unwind_backtrace from show_stack+0x18/0x1c [ 74.508575] show_stack from dump_stack_lvl+0x70/0x90 [ 74.508605] dump_stack_lvl from print_report+0x158/0x528 [ 74.508636] print_report from kasan_report+0xdc/0x118 [ 74.508636] kasan_report from kasan_check_range+0x14c/0x198 [ 74.508666] kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0 [ 74.508697] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.508728] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.508758] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.508789] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.508789] kthread from ret_from_fork+0x14/0x20 [ 74.508819] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 74.508850] 3fa0: 00000000 00000000 00000000 00000000 [ 74.508850] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.508880] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.508880] [ 74.626770] Allocated by task 317: [ 74.630187] kasan_save_track+0x30/0x5c [ 74.634063] __kasan_kmalloc+0x8c/0x94 [ 74.637847] kasan_atomics+0xc0/0x33c [ 74.641540] kunit_try_run_case+0x22c/0x5a8 [ 74.645751] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.651306] kthread+0x464/0x810 [ 74.654541] ret_from_fork+0x14/0x20 [ 74.658142] [ 74.659667] The buggy address belongs to the object at cc90f300 [ 74.659667] which belongs to the cache kmalloc-64 of size 64 [ 74.671386] The buggy address is located 0 bytes to the right of [ 74.671386] allocated 48-byte region [cc90f300, cc90f330) [ 74.682922] [ 74.684417] The buggy address belongs to the physical page: [ 74.690032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.697296] flags: 0x0(zone=0) [ 74.700378] page_type: f5(slab) [ 74.703552] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.711700] raw: 00000000 [ 74.714355] page dumped because: kasan: bad access detected [ 74.719940] [ 74.721466] Memory state around the buggy address: [ 74.726287] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.732849] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.739410] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.745971] ^ [ 74.750122] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.756683] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.763244] ================================================================== [ 74.206604] ================================================================== [ 74.213867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0 [ 74.221313] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 74.228088] [ 74.229583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 74.229614] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.229614] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.229614] Call trace: [ 74.229644] unwind_backtrace from show_stack+0x18/0x1c [ 74.229675] show_stack from dump_stack_lvl+0x70/0x90 [ 74.229675] dump_stack_lvl from print_report+0x158/0x528 [ 74.229705] print_report from kasan_report+0xdc/0x118 [ 74.229736] kasan_report from kasan_atomics_helper+0x50bc/0x5ab0 [ 74.229766] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.229797] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.229827] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.229858] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.229858] kthread from ret_from_fork+0x14/0x20 [ 74.229888] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 74.229919] 3fa0: 00000000 00000000 00000000 00000000 [ 74.229919] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.229949] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.229949] [ 74.341796] Allocated by task 317: [ 74.345245] kasan_save_track+0x30/0x5c [ 74.349090] __kasan_kmalloc+0x8c/0x94 [ 74.352874] kasan_atomics+0xc0/0x33c [ 74.356567] kunit_try_run_case+0x22c/0x5a8 [ 74.360809] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.366333] kthread+0x464/0x810 [ 74.369567] ret_from_fork+0x14/0x20 [ 74.373199] [ 74.374694] The buggy address belongs to the object at cc90f300 [ 74.374694] which belongs to the cache kmalloc-64 of size 64 [ 74.386413] The buggy address is located 0 bytes to the right of [ 74.386413] allocated 48-byte region [cc90f300, cc90f330) [ 74.397949] [ 74.399475] The buggy address belongs to the physical page: [ 74.405059] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.412353] flags: 0x0(zone=0) [ 74.415435] page_type: f5(slab) [ 74.418609] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.426727] raw: 00000000 [ 74.429382] page dumped because: kasan: bad access detected [ 74.434997] [ 74.436492] Memory state around the buggy address: [ 74.441314] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.447875] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.454437] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.461029] ^ [ 74.465148] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.471710] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.478302] ================================================================== [ 76.765319] ================================================================== [ 76.772583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0 [ 76.779968] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 76.786712] [ 76.788208] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 76.788238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.788238] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.788269] Call trace: [ 76.788269] unwind_backtrace from show_stack+0x18/0x1c [ 76.788299] show_stack from dump_stack_lvl+0x70/0x90 [ 76.788330] dump_stack_lvl from print_report+0x158/0x528 [ 76.788360] print_report from kasan_report+0xdc/0x118 [ 76.788360] kasan_report from kasan_check_range+0x14c/0x198 [ 76.788391] kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0 [ 76.788421] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.788452] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.788482] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.788513] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.788513] kthread from ret_from_fork+0x14/0x20 [ 76.788543] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 76.788574] 3fa0: 00000000 00000000 00000000 00000000 [ 76.788574] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.788604] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.788604] [ 76.906494] Allocated by task 317: [ 76.909912] kasan_save_track+0x30/0x5c [ 76.913787] __kasan_kmalloc+0x8c/0x94 [ 76.917572] kasan_atomics+0xc0/0x33c [ 76.921264] kunit_try_run_case+0x22c/0x5a8 [ 76.925476] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.930999] kthread+0x464/0x810 [ 76.934265] ret_from_fork+0x14/0x20 [ 76.937866] [ 76.939361] The buggy address belongs to the object at cc90f300 [ 76.939361] which belongs to the cache kmalloc-64 of size 64 [ 76.951110] The buggy address is located 0 bytes to the right of [ 76.951110] allocated 48-byte region [cc90f300, cc90f330) [ 76.962646] [ 76.964141] The buggy address belongs to the physical page: [ 76.969757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.977020] flags: 0x0(zone=0) [ 76.980102] page_type: f5(slab) [ 76.983276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.991424] raw: 00000000 [ 76.994049] page dumped because: kasan: bad access detected [ 76.999664] [ 77.001159] Memory state around the buggy address: [ 77.005981] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.012573] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.019134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.025695] ^ [ 77.029846] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.036407] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.042968] ================================================================== [ 77.335266] ================================================================== [ 77.342529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0 [ 77.349884] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.356628] [ 77.358154] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.358184] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.358184] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.358184] Call trace: [ 77.358184] unwind_backtrace from show_stack+0x18/0x1c [ 77.358215] show_stack from dump_stack_lvl+0x70/0x90 [ 77.358245] dump_stack_lvl from print_report+0x158/0x528 [ 77.358276] print_report from kasan_report+0xdc/0x118 [ 77.358306] kasan_report from kasan_check_range+0x14c/0x198 [ 77.358306] kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0 [ 77.358337] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.358367] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.358398] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.358428] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.358459] kthread from ret_from_fork+0x14/0x20 [ 77.358459] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.358489] 3fa0: 00000000 00000000 00000000 00000000 [ 77.358520] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.358520] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.358520] [ 77.476409] Allocated by task 317: [ 77.479858] kasan_save_track+0x30/0x5c [ 77.483703] __kasan_kmalloc+0x8c/0x94 [ 77.487487] kasan_atomics+0xc0/0x33c [ 77.491180] kunit_try_run_case+0x22c/0x5a8 [ 77.495422] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.500946] kthread+0x464/0x810 [ 77.504180] ret_from_fork+0x14/0x20 [ 77.507812] [ 77.509307] The buggy address belongs to the object at cc90f300 [ 77.509307] which belongs to the cache kmalloc-64 of size 64 [ 77.521026] The buggy address is located 0 bytes to the right of [ 77.521026] allocated 48-byte region [cc90f300, cc90f330) [ 77.532592] [ 77.534088] The buggy address belongs to the physical page: [ 77.539672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 77.546966] flags: 0x0(zone=0) [ 77.550048] page_type: f5(slab) [ 77.553222] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.561340] raw: 00000000 [ 77.563995] page dumped because: kasan: bad access detected [ 77.569610] [ 77.571105] Memory state around the buggy address: [ 77.575927] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.582489] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.589080] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.595642] ^ [ 77.599761] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.606323] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.612884] ================================================================== [ 77.620208] ================================================================== [ 77.627471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0 [ 77.634857] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.641601] [ 77.643096] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.643127] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.643127] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.643157] Call trace: [ 77.643157] unwind_backtrace from show_stack+0x18/0x1c [ 77.643188] show_stack from dump_stack_lvl+0x70/0x90 [ 77.643218] dump_stack_lvl from print_report+0x158/0x528 [ 77.643218] print_report from kasan_report+0xdc/0x118 [ 77.643249] kasan_report from kasan_check_range+0x14c/0x198 [ 77.643280] kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0 [ 77.643310] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.643341] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.643371] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.643371] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.643402] kthread from ret_from_fork+0x14/0x20 [ 77.643432] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.643432] 3fa0: 00000000 00000000 00000000 00000000 [ 77.643463] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.643493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.643493] [ 77.761383] Allocated by task 317: [ 77.764801] kasan_save_track+0x30/0x5c [ 77.768676] __kasan_kmalloc+0x8c/0x94 [ 77.772460] kasan_atomics+0xc0/0x33c [ 77.776153] kunit_try_run_case+0x22c/0x5a8 [ 77.780364] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.785888] kthread+0x464/0x810 [ 77.789154] ret_from_fork+0x14/0x20 [ 77.792755] [ 77.794250] The buggy address belongs to the object at cc90f300 [ 77.794250] which belongs to the cache kmalloc-64 of size 64 [ 77.805969] The buggy address is located 0 bytes to the right of [ 77.805969] allocated 48-byte region [cc90f300, cc90f330) [ 77.817535] [ 77.819030] The buggy address belongs to the physical page: [ 77.824645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 77.831909] flags: 0x0(zone=0) [ 77.834991] page_type: f5(slab) [ 77.838165] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.846313] raw: 00000000 [ 77.848937] page dumped because: kasan: bad access detected [ 77.854553] [ 77.856048] Memory state around the buggy address: [ 77.860870] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.867462] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.874023] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.880584] ^ [ 77.884704] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.891296] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.897857] ================================================================== [ 79.324066] ================================================================== [ 79.331329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0 [ 79.338775] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.345520] [ 79.347045] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.347076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.347076] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.347076] Call trace: [ 79.347106] unwind_backtrace from show_stack+0x18/0x1c [ 79.347106] show_stack from dump_stack_lvl+0x70/0x90 [ 79.347137] dump_stack_lvl from print_report+0x158/0x528 [ 79.347167] print_report from kasan_report+0xdc/0x118 [ 79.347198] kasan_report from kasan_check_range+0x14c/0x198 [ 79.347198] kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0 [ 79.347229] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.347259] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.347290] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.347320] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.347351] kthread from ret_from_fork+0x14/0x20 [ 79.347381] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.347381] 3fa0: 00000000 00000000 00000000 00000000 [ 79.347412] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.347412] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.347442] [ 79.465393] Allocated by task 317: [ 79.468841] kasan_save_track+0x30/0x5c [ 79.472686] __kasan_kmalloc+0x8c/0x94 [ 79.476470] kasan_atomics+0xc0/0x33c [ 79.480163] kunit_try_run_case+0x22c/0x5a8 [ 79.484374] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.489929] kthread+0x464/0x810 [ 79.493164] ret_from_fork+0x14/0x20 [ 79.496765] [ 79.498291] The buggy address belongs to the object at cc90f300 [ 79.498291] which belongs to the cache kmalloc-64 of size 64 [ 79.510009] The buggy address is located 0 bytes to the right of [ 79.510009] allocated 48-byte region [cc90f300, cc90f330) [ 79.521545] [ 79.523071] The buggy address belongs to the physical page: [ 79.528656] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 79.535949] flags: 0x0(zone=0) [ 79.539001] page_type: f5(slab) [ 79.542175] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.550323] raw: 00000000 [ 79.552978] page dumped because: kasan: bad access detected [ 79.558563] [ 79.560089] Memory state around the buggy address: [ 79.564910] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.571472] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.578033] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.584625] ^ [ 79.588745] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.595306] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.601867] ================================================================== [ 76.480377] ================================================================== [ 76.487640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0 [ 76.494995] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 76.501739] [ 76.503265] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 76.503265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.503295] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.503295] Call trace: [ 76.503295] unwind_backtrace from show_stack+0x18/0x1c [ 76.503326] show_stack from dump_stack_lvl+0x70/0x90 [ 76.503356] dump_stack_lvl from print_report+0x158/0x528 [ 76.503387] print_report from kasan_report+0xdc/0x118 [ 76.503417] kasan_report from kasan_check_range+0x14c/0x198 [ 76.503417] kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0 [ 76.503448] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.503479] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.503509] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.503540] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.503570] kthread from ret_from_fork+0x14/0x20 [ 76.503570] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 76.503601] 3fa0: 00000000 00000000 00000000 00000000 [ 76.503601] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.503631] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.503631] [ 76.621520] Allocated by task 317: [ 76.624969] kasan_save_track+0x30/0x5c [ 76.628814] __kasan_kmalloc+0x8c/0x94 [ 76.632598] kasan_atomics+0xc0/0x33c [ 76.636291] kunit_try_run_case+0x22c/0x5a8 [ 76.640502] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.646057] kthread+0x464/0x810 [ 76.649291] ret_from_fork+0x14/0x20 [ 76.652923] [ 76.654418] The buggy address belongs to the object at cc90f300 [ 76.654418] which belongs to the cache kmalloc-64 of size 64 [ 76.666137] The buggy address is located 0 bytes to the right of [ 76.666137] allocated 48-byte region [cc90f300, cc90f330) [ 76.677673] [ 76.679199] The buggy address belongs to the physical page: [ 76.684783] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.692077] flags: 0x0(zone=0) [ 76.695159] page_type: f5(slab) [ 76.698303] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.706451] raw: 00000000 [ 76.709106] page dumped because: kasan: bad access detected [ 76.714721] [ 76.716217] Memory state around the buggy address: [ 76.721038] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.727600] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.734161] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.740753] ^ [ 76.744873] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.751434] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.758026] ================================================================== [ 73.642730] ================================================================== [ 73.649993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0 [ 73.657440] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.664123] [ 73.665618] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.665649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.665649] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.665679] Call trace: [ 73.665679] unwind_backtrace from show_stack+0x18/0x1c [ 73.665710] show_stack from dump_stack_lvl+0x70/0x90 [ 73.665710] dump_stack_lvl from print_report+0x158/0x528 [ 73.665740] print_report from kasan_report+0xdc/0x118 [ 73.665771] kasan_report from kasan_atomics_helper+0x5200/0x5ab0 [ 73.665802] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.665832] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.665863] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.665893] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.665893] kthread from ret_from_fork+0x14/0x20 [ 73.665924] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.665954] 3fa0: 00000000 00000000 00000000 00000000 [ 73.665954] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.665985] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.665985] [ 73.777832] Allocated by task 317: [ 73.781280] kasan_save_track+0x30/0x5c [ 73.785125] __kasan_kmalloc+0x8c/0x94 [ 73.788909] kasan_atomics+0xc0/0x33c [ 73.792602] kunit_try_run_case+0x22c/0x5a8 [ 73.796813] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.802368] kthread+0x464/0x810 [ 73.805603] ret_from_fork+0x14/0x20 [ 73.809234] [ 73.810729] The buggy address belongs to the object at cc90f300 [ 73.810729] which belongs to the cache kmalloc-64 of size 64 [ 73.822448] The buggy address is located 0 bytes to the right of [ 73.822448] allocated 48-byte region [cc90f300, cc90f330) [ 73.833984] [ 73.835510] The buggy address belongs to the physical page: [ 73.841094] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.848388] flags: 0x0(zone=0) [ 73.851470] page_type: f5(slab) [ 73.854614] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.862762] raw: 00000000 [ 73.865417] page dumped because: kasan: bad access detected [ 73.871002] [ 73.872528] Memory state around the buggy address: [ 73.877349] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.883911] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.890472] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.897064] ^ [ 73.901184] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.907745] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.914306] ================================================================== [ 82.435485] ================================================================== [ 82.442749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0 [ 82.450195] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 82.456939] [ 82.458465] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 82.458496] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.458496] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.458496] Call trace: [ 82.458526] unwind_backtrace from show_stack+0x18/0x1c [ 82.458526] show_stack from dump_stack_lvl+0x70/0x90 [ 82.458557] dump_stack_lvl from print_report+0x158/0x528 [ 82.458587] print_report from kasan_report+0xdc/0x118 [ 82.458618] kasan_report from kasan_atomics_helper+0x52cc/0x5ab0 [ 82.458648] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.458679] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.458679] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.458709] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.458740] kthread from ret_from_fork+0x14/0x20 [ 82.458770] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 82.458770] 3fa0: 00000000 00000000 00000000 00000000 [ 82.458801] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.458801] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.458831] [ 82.570678] Allocated by task 317: [ 82.574096] kasan_save_track+0x30/0x5c [ 82.577972] __kasan_kmalloc+0x8c/0x94 [ 82.581756] kasan_atomics+0xc0/0x33c [ 82.585449] kunit_try_run_case+0x22c/0x5a8 [ 82.589660] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.595214] kthread+0x464/0x810 [ 82.598449] ret_from_fork+0x14/0x20 [ 82.602050] [ 82.603576] The buggy address belongs to the object at cc90f300 [ 82.603576] which belongs to the cache kmalloc-64 of size 64 [ 82.615295] The buggy address is located 0 bytes to the right of [ 82.615295] allocated 48-byte region [cc90f300, cc90f330) [ 82.626831] [ 82.628326] The buggy address belongs to the physical page: [ 82.633941] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.641204] flags: 0x0(zone=0) [ 82.644287] page_type: f5(slab) [ 82.647460] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.655609] raw: 00000000 [ 82.658233] page dumped because: kasan: bad access detected [ 82.663848] [ 82.665344] Memory state around the buggy address: [ 82.670166] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.676757] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.683319] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.689880] ^ [ 82.694030] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.700592] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.707153] ================================================================== [ 80.743469] ================================================================== [ 80.750762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0 [ 80.758209] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 80.764862] [ 80.766357] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 80.766387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.766418] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.766418] Call trace: [ 80.766418] unwind_backtrace from show_stack+0x18/0x1c [ 80.766448] show_stack from dump_stack_lvl+0x70/0x90 [ 80.766479] dump_stack_lvl from print_report+0x158/0x528 [ 80.766510] print_report from kasan_report+0xdc/0x118 [ 80.766540] kasan_report from kasan_atomics_helper+0x520c/0x5ab0 [ 80.766540] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.766571] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.766601] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.766632] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.766662] kthread from ret_from_fork+0x14/0x20 [ 80.766693] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 80.766693] 3fa0: 00000000 00000000 00000000 00000000 [ 80.766723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.766723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.766754] [ 80.878601] Allocated by task 317: [ 80.882019] kasan_save_track+0x30/0x5c [ 80.885894] __kasan_kmalloc+0x8c/0x94 [ 80.889678] kasan_atomics+0xc0/0x33c [ 80.893371] kunit_try_run_case+0x22c/0x5a8 [ 80.897583] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.903106] kthread+0x464/0x810 [ 80.906372] ret_from_fork+0x14/0x20 [ 80.909973] [ 80.911468] The buggy address belongs to the object at cc90f300 [ 80.911468] which belongs to the cache kmalloc-64 of size 64 [ 80.923187] The buggy address is located 0 bytes to the right of [ 80.923187] allocated 48-byte region [cc90f300, cc90f330) [ 80.934753] [ 80.936248] The buggy address belongs to the physical page: [ 80.941864] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.949127] flags: 0x0(zone=0) [ 80.952209] page_type: f5(slab) [ 80.955383] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.963531] raw: 00000000 [ 80.966156] page dumped because: kasan: bad access detected [ 80.971771] [ 80.973266] Memory state around the buggy address: [ 80.978088] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.984680] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.991241] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.997802] ^ [ 81.001922] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.008514] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.015075] ================================================================== [ 75.910430] ================================================================== [ 75.917694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0 [ 75.925079] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.931823] [ 75.933319] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.933349] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.933349] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.933380] Call trace: [ 75.933380] unwind_backtrace from show_stack+0x18/0x1c [ 75.933410] show_stack from dump_stack_lvl+0x70/0x90 [ 75.933441] dump_stack_lvl from print_report+0x158/0x528 [ 75.933471] print_report from kasan_report+0xdc/0x118 [ 75.933471] kasan_report from kasan_check_range+0x14c/0x198 [ 75.933502] kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0 [ 75.933532] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.933563] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.933593] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.933624] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.933624] kthread from ret_from_fork+0x14/0x20 [ 75.933654] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.933685] 3fa0: 00000000 00000000 00000000 00000000 [ 75.933685] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.933715] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.933715] [ 76.051605] Allocated by task 317: [ 76.055023] kasan_save_track+0x30/0x5c [ 76.058898] __kasan_kmalloc+0x8c/0x94 [ 76.062683] kasan_atomics+0xc0/0x33c [ 76.066375] kunit_try_run_case+0x22c/0x5a8 [ 76.070587] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.076110] kthread+0x464/0x810 [ 76.079376] ret_from_fork+0x14/0x20 [ 76.082977] [ 76.084472] The buggy address belongs to the object at cc90f300 [ 76.084472] which belongs to the cache kmalloc-64 of size 64 [ 76.096221] The buggy address is located 0 bytes to the right of [ 76.096221] allocated 48-byte region [cc90f300, cc90f330) [ 76.107757] [ 76.109252] The buggy address belongs to the physical page: [ 76.114868] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.122131] flags: 0x0(zone=0) [ 76.125213] page_type: f5(slab) [ 76.128387] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.136535] raw: 00000000 [ 76.139160] page dumped because: kasan: bad access detected [ 76.144775] [ 76.146270] Memory state around the buggy address: [ 76.151092] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.157684] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.164245] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.170806] ^ [ 76.174957] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.181518] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.188079] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[ 69.420867] ================================================================== [ 69.428131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70 [ 69.435485] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.442260] [ 69.443756] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.443786] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.443786] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.443786] Call trace: [ 69.443817] unwind_backtrace from show_stack+0x18/0x1c [ 69.443847] show_stack from dump_stack_lvl+0x70/0x90 [ 69.443847] dump_stack_lvl from print_report+0x158/0x528 [ 69.443878] print_report from kasan_report+0xdc/0x118 [ 69.443908] kasan_report from kasan_check_range+0x14c/0x198 [ 69.443939] kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70 [ 69.443939] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.443969] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.444000] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.444030] kthread from ret_from_fork+0x14/0x20 [ 69.444061] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.444061] bfa0: 00000000 00000000 00000000 00000000 [ 69.444091] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.444091] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.444122] [ 69.556579] Allocated by task 313: [ 69.560028] kasan_save_track+0x30/0x5c [ 69.563873] __kasan_kmalloc+0x8c/0x94 [ 69.567657] kasan_bitops_generic+0xd4/0x1d70 [ 69.572052] kunit_try_run_case+0x22c/0x5a8 [ 69.576263] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.581817] kthread+0x464/0x810 [ 69.585052] ret_from_fork+0x14/0x20 [ 69.588653] [ 69.590179] The buggy address belongs to the object at cc90ae80 [ 69.590179] which belongs to the cache kmalloc-64 of size 64 [ 69.601898] The buggy address is located 4 bytes inside of [ 69.601898] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.612823] [ 69.614318] The buggy address belongs to the physical page: [ 69.619934] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.627197] flags: 0x0(zone=0) [ 69.630279] page_type: f5(slab) [ 69.633453] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.641601] raw: 00000000 [ 69.644226] page dumped because: kasan: bad access detected [ 69.649841] [ 69.651336] Memory state around the buggy address: [ 69.656188] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.662750] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.669311] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.675903] ^ [ 69.678436] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.685028] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.691589] ================================================================== [ 70.243133] ================================================================== [ 70.266387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70 [ 70.273834] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 70.280487] [ 70.282012] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 70.282012] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.282043] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.282043] Call trace: [ 70.282043] unwind_backtrace from show_stack+0x18/0x1c [ 70.282073] show_stack from dump_stack_lvl+0x70/0x90 [ 70.282104] dump_stack_lvl from print_report+0x158/0x528 [ 70.282135] print_report from kasan_report+0xdc/0x118 [ 70.282165] kasan_report from kasan_bitops_generic+0x1bb8/0x1d70 [ 70.282165] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.282196] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.282226] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.282257] kthread from ret_from_fork+0x14/0x20 [ 70.282287] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 70.282287] bfa0: 00000000 00000000 00000000 00000000 [ 70.282318] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.282318] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.282348] [ 70.388793] Allocated by task 313: [ 70.392211] kasan_save_track+0x30/0x5c [ 70.396087] __kasan_kmalloc+0x8c/0x94 [ 70.399841] kasan_bitops_generic+0xd4/0x1d70 [ 70.404266] kunit_try_run_case+0x22c/0x5a8 [ 70.408477] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.414001] kthread+0x464/0x810 [ 70.417266] ret_from_fork+0x14/0x20 [ 70.420867] [ 70.422363] The buggy address belongs to the object at cc90ae80 [ 70.422363] which belongs to the cache kmalloc-64 of size 64 [ 70.434082] The buggy address is located 4 bytes inside of [ 70.434082] allocated 5-byte region [cc90ae80, cc90ae85) [ 70.445037] [ 70.446533] The buggy address belongs to the physical page: [ 70.452148] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 70.459411] flags: 0x0(zone=0) [ 70.462493] page_type: f5(slab) [ 70.465667] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 70.473815] raw: 00000000 [ 70.476440] page dumped because: kasan: bad access detected [ 70.482055] [ 70.483551] Memory state around the buggy address: [ 70.488372] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.494934] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.501525] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.508087] ^ [ 70.510650] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.517211] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.523773] ================================================================== [ 71.369964] ================================================================== [ 71.393920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70 [ 71.401367] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.408020] [ 71.409545] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.409576] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.409576] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.409576] Call trace: [ 71.409606] unwind_backtrace from show_stack+0x18/0x1c [ 71.409606] show_stack from dump_stack_lvl+0x70/0x90 [ 71.409637] dump_stack_lvl from print_report+0x158/0x528 [ 71.409667] print_report from kasan_report+0xdc/0x118 [ 71.409698] kasan_report from kasan_bitops_generic+0x1a80/0x1d70 [ 71.409729] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.409759] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.409759] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.409790] kthread from ret_from_fork+0x14/0x20 [ 71.409820] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.409820] bfa0: 00000000 00000000 00000000 00000000 [ 71.409851] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.409881] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.409881] [ 71.516326] Allocated by task 313: [ 71.519744] kasan_save_track+0x30/0x5c [ 71.523620] __kasan_kmalloc+0x8c/0x94 [ 71.527404] kasan_bitops_generic+0xd4/0x1d70 [ 71.531799] kunit_try_run_case+0x22c/0x5a8 [ 71.536010] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.541534] kthread+0x464/0x810 [ 71.544799] ret_from_fork+0x14/0x20 [ 71.548400] [ 71.549896] The buggy address belongs to the object at cc90ae80 [ 71.549896] which belongs to the cache kmalloc-64 of size 64 [ 71.561614] The buggy address is located 4 bytes inside of [ 71.561614] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.572570] [ 71.574066] The buggy address belongs to the physical page: [ 71.579681] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.586944] flags: 0x0(zone=0) [ 71.590026] page_type: f5(slab) [ 71.593200] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.601348] raw: 00000000 [ 71.603973] page dumped because: kasan: bad access detected [ 71.609588] [ 71.611083] Memory state around the buggy address: [ 71.615905] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.622497] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.629058] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.635620] ^ [ 71.638183] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.644744] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.651336] ================================================================== [ 68.854827] ================================================================== [ 68.877990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70 [ 68.885437] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 68.892089] [ 68.893615] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 68.893646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.893646] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.893646] Call trace: [ 68.893676] unwind_backtrace from show_stack+0x18/0x1c [ 68.893676] show_stack from dump_stack_lvl+0x70/0x90 [ 68.893707] dump_stack_lvl from print_report+0x158/0x528 [ 68.893737] print_report from kasan_report+0xdc/0x118 [ 68.893768] kasan_report from kasan_bitops_generic+0x1bd0/0x1d70 [ 68.893798] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 68.893829] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.893859] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.893859] kthread from ret_from_fork+0x14/0x20 [ 68.893890] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 68.893920] bfa0: 00000000 00000000 00000000 00000000 [ 68.893920] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.893951] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.893951] [ 69.000396] Allocated by task 313: [ 69.003814] kasan_save_track+0x30/0x5c [ 69.007690] __kasan_kmalloc+0x8c/0x94 [ 69.011474] kasan_bitops_generic+0xd4/0x1d70 [ 69.015869] kunit_try_run_case+0x22c/0x5a8 [ 69.020080] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.025604] kthread+0x464/0x810 [ 69.028869] ret_from_fork+0x14/0x20 [ 69.032470] [ 69.033966] The buggy address belongs to the object at cc90ae80 [ 69.033966] which belongs to the cache kmalloc-64 of size 64 [ 69.045715] The buggy address is located 4 bytes inside of [ 69.045715] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.056640] [ 69.058135] The buggy address belongs to the physical page: [ 69.063751] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.071014] flags: 0x0(zone=0) [ 69.074096] page_type: f5(slab) [ 69.077270] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.085418] raw: 00000000 [ 69.088043] page dumped because: kasan: bad access detected [ 69.093658] [ 69.095153] Memory state around the buggy address: [ 69.099975] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.106567] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.113128] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.119720] ^ [ 69.122253] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.128845] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.135406] ================================================================== [ 70.531280] ================================================================== [ 70.555053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70 [ 70.562499] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 70.569152] [ 70.570678] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 70.570709] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.570709] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.570709] Call trace: [ 70.570739] unwind_backtrace from show_stack+0x18/0x1c [ 70.570770] show_stack from dump_stack_lvl+0x70/0x90 [ 70.570770] dump_stack_lvl from print_report+0x158/0x528 [ 70.570800] print_report from kasan_report+0xdc/0x118 [ 70.570831] kasan_report from kasan_bitops_generic+0x1b88/0x1d70 [ 70.570861] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.570892] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.570922] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.570922] kthread from ret_from_fork+0x14/0x20 [ 70.570953] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 70.570983] bfa0: 00000000 00000000 00000000 00000000 [ 70.570983] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.571014] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.571014] [ 70.677459] Allocated by task 313: [ 70.680877] kasan_save_track+0x30/0x5c [ 70.684753] __kasan_kmalloc+0x8c/0x94 [ 70.688537] kasan_bitops_generic+0xd4/0x1d70 [ 70.692932] kunit_try_run_case+0x22c/0x5a8 [ 70.697143] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.702667] kthread+0x464/0x810 [ 70.705932] ret_from_fork+0x14/0x20 [ 70.709533] [ 70.711029] The buggy address belongs to the object at cc90ae80 [ 70.711029] which belongs to the cache kmalloc-64 of size 64 [ 70.722747] The buggy address is located 4 bytes inside of [ 70.722747] allocated 5-byte region [cc90ae80, cc90ae85) [ 70.733703] [ 70.735198] The buggy address belongs to the physical page: [ 70.740814] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 70.748077] flags: 0x0(zone=0) [ 70.751159] page_type: f5(slab) [ 70.754333] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 70.762481] raw: 00000000 [ 70.765106] page dumped because: kasan: bad access detected [ 70.770721] [ 70.772216] Memory state around the buggy address: [ 70.777038] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.783630] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.790191] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.796752] ^ [ 70.799316] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.805877] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.812469] ================================================================== [ 69.142822] ================================================================== [ 69.150085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70 [ 69.157440] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.164215] [ 69.165710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.165740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.165740] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.165771] Call trace: [ 69.165771] unwind_backtrace from show_stack+0x18/0x1c [ 69.165802] show_stack from dump_stack_lvl+0x70/0x90 [ 69.165802] dump_stack_lvl from print_report+0x158/0x528 [ 69.165832] print_report from kasan_report+0xdc/0x118 [ 69.165863] kasan_report from kasan_check_range+0x14c/0x198 [ 69.165893] kasan_check_range from kasan_bitops_generic+0x438/0x1d70 [ 69.165924] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.165924] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.165954] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.165985] kthread from ret_from_fork+0x14/0x20 [ 69.166015] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.166015] bfa0: 00000000 00000000 00000000 00000000 [ 69.166046] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.166046] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.166076] [ 69.278533] Allocated by task 313: [ 69.281982] kasan_save_track+0x30/0x5c [ 69.285827] __kasan_kmalloc+0x8c/0x94 [ 69.289611] kasan_bitops_generic+0xd4/0x1d70 [ 69.294006] kunit_try_run_case+0x22c/0x5a8 [ 69.298217] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.303741] kthread+0x464/0x810 [ 69.307006] ret_from_fork+0x14/0x20 [ 69.310607] [ 69.312133] The buggy address belongs to the object at cc90ae80 [ 69.312133] which belongs to the cache kmalloc-64 of size 64 [ 69.323852] The buggy address is located 4 bytes inside of [ 69.323852] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.334777] [ 69.336273] The buggy address belongs to the physical page: [ 69.341888] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.349182] flags: 0x0(zone=0) [ 69.352233] page_type: f5(slab) [ 69.355407] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.363555] raw: 00000000 [ 69.366210] page dumped because: kasan: bad access detected [ 69.371826] [ 69.373321] Memory state around the buggy address: [ 69.378143] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.384704] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.391296] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.397857] ^ [ 69.400390] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.406982] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.413543] ================================================================== [ 71.658813] ================================================================== [ 71.682861] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70 [ 71.690307] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.696960] [ 71.698486] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.698516] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.698516] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.698516] Call trace: [ 71.698547] unwind_backtrace from show_stack+0x18/0x1c [ 71.698577] show_stack from dump_stack_lvl+0x70/0x90 [ 71.698577] dump_stack_lvl from print_report+0x158/0x528 [ 71.698608] print_report from kasan_report+0xdc/0x118 [ 71.698638] kasan_report from kasan_bitops_generic+0x1abc/0x1d70 [ 71.698669] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.698699] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.698730] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.698760] kthread from ret_from_fork+0x14/0x20 [ 71.698760] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.698791] bfa0: 00000000 00000000 00000000 00000000 [ 71.698791] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.698822] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.698822] [ 71.805267] Allocated by task 313: [ 71.808685] kasan_save_track+0x30/0x5c [ 71.812561] __kasan_kmalloc+0x8c/0x94 [ 71.816345] kasan_bitops_generic+0xd4/0x1d70 [ 71.820739] kunit_try_run_case+0x22c/0x5a8 [ 71.824951] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.830474] kthread+0x464/0x810 [ 71.833740] ret_from_fork+0x14/0x20 [ 71.837341] [ 71.838836] The buggy address belongs to the object at cc90ae80 [ 71.838836] which belongs to the cache kmalloc-64 of size 64 [ 71.850585] The buggy address is located 4 bytes inside of [ 71.850585] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.861511] [ 71.863006] The buggy address belongs to the physical page: [ 71.868621] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.875885] flags: 0x0(zone=0) [ 71.878967] page_type: f5(slab) [ 71.882141] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.890289] raw: 00000000 [ 71.892913] page dumped because: kasan: bad access detected [ 71.898529] [ 71.900024] Memory state around the buggy address: [ 71.904846] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.911437] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.917999] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.924560] ^ [ 71.927124] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.933685] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.940277] ================================================================== [ 69.698913] ================================================================== [ 69.706176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70 [ 69.713623] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.720275] [ 69.721801] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.721832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.721832] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.721832] Call trace: [ 69.721862] unwind_backtrace from show_stack+0x18/0x1c [ 69.721862] show_stack from dump_stack_lvl+0x70/0x90 [ 69.721893] dump_stack_lvl from print_report+0x158/0x528 [ 69.721923] print_report from kasan_report+0xdc/0x118 [ 69.721954] kasan_report from kasan_bitops_generic+0x1b10/0x1d70 [ 69.721984] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.721984] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.722015] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.722045] kthread from ret_from_fork+0x14/0x20 [ 69.722076] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.722076] bfa0: 00000000 00000000 00000000 00000000 [ 69.722106] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.722106] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.722137] [ 69.828582] Allocated by task 313: [ 69.832000] kasan_save_track+0x30/0x5c [ 69.835876] __kasan_kmalloc+0x8c/0x94 [ 69.839630] kasan_bitops_generic+0xd4/0x1d70 [ 69.844024] kunit_try_run_case+0x22c/0x5a8 [ 69.848266] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.853790] kthread+0x464/0x810 [ 69.857055] ret_from_fork+0x14/0x20 [ 69.860656] [ 69.862152] The buggy address belongs to the object at cc90ae80 [ 69.862152] which belongs to the cache kmalloc-64 of size 64 [ 69.873870] The buggy address is located 4 bytes inside of [ 69.873870] allocated 5-byte region [cc90ae80, cc90ae85) [ 69.884826] [ 69.886322] The buggy address belongs to the physical page: [ 69.891906] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 69.899200] flags: 0x0(zone=0) [ 69.902282] page_type: f5(slab) [ 69.905456] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 69.913574] raw: 00000000 [ 69.916229] page dumped because: kasan: bad access detected [ 69.921844] [ 69.923339] Memory state around the buggy address: [ 69.928161] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.934722] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.941314] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.947875] ^ [ 69.950408] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.957000] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.963562] ================================================================== [ 71.947570] ================================================================== [ 71.954864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70 [ 71.962310] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.968963] [ 71.970458] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.970489] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.970520] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.970520] Call trace: [ 71.970520] unwind_backtrace from show_stack+0x18/0x1c [ 71.970550] show_stack from dump_stack_lvl+0x70/0x90 [ 71.970581] dump_stack_lvl from print_report+0x158/0x528 [ 71.970611] print_report from kasan_report+0xdc/0x118 [ 71.970611] kasan_report from kasan_bitops_generic+0x1b34/0x1d70 [ 71.970642] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.970672] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.970703] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.970733] kthread from ret_from_fork+0x14/0x20 [ 71.970764] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.970764] bfa0: 00000000 00000000 00000000 00000000 [ 71.970794] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.970794] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.970825] [ 72.077239] Allocated by task 313: [ 72.080688] kasan_save_track+0x30/0x5c [ 72.084533] __kasan_kmalloc+0x8c/0x94 [ 72.088317] kasan_bitops_generic+0xd4/0x1d70 [ 72.092712] kunit_try_run_case+0x22c/0x5a8 [ 72.096954] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.102478] kthread+0x464/0x810 [ 72.105712] ret_from_fork+0x14/0x20 [ 72.109313] [ 72.110839] The buggy address belongs to the object at cc90ae80 [ 72.110839] which belongs to the cache kmalloc-64 of size 64 [ 72.122558] The buggy address is located 4 bytes inside of [ 72.122558] allocated 5-byte region [cc90ae80, cc90ae85) [ 72.133483] [ 72.135009] The buggy address belongs to the physical page: [ 72.140594] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 72.147888] flags: 0x0(zone=0) [ 72.150970] page_type: f5(slab) [ 72.154113] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 72.162261] raw: 00000000 [ 72.164916] page dumped because: kasan: bad access detected [ 72.170501] [ 72.172027] Memory state around the buggy address: [ 72.176849] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.183410] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.190002] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.196563] ^ [ 72.199127] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.205688] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.212249] ================================================================== [ 71.097808] ================================================================== [ 71.105072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70 [ 71.112518] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 71.119201] [ 71.120697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 71.120727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.120727] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.120758] Call trace: [ 71.120758] unwind_backtrace from show_stack+0x18/0x1c [ 71.120788] show_stack from dump_stack_lvl+0x70/0x90 [ 71.120788] dump_stack_lvl from print_report+0x158/0x528 [ 71.120819] print_report from kasan_report+0xdc/0x118 [ 71.120849] kasan_report from kasan_bitops_generic+0x1bac/0x1d70 [ 71.120880] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.120910] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.120941] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.120971] kthread from ret_from_fork+0x14/0x20 [ 71.120971] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 71.121002] bfa0: 00000000 00000000 00000000 00000000 [ 71.121002] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.121032] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.121032] [ 71.227478] Allocated by task 313: [ 71.230895] kasan_save_track+0x30/0x5c [ 71.234771] __kasan_kmalloc+0x8c/0x94 [ 71.238555] kasan_bitops_generic+0xd4/0x1d70 [ 71.242950] kunit_try_run_case+0x22c/0x5a8 [ 71.247161] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.252685] kthread+0x464/0x810 [ 71.255950] ret_from_fork+0x14/0x20 [ 71.259552] [ 71.261047] The buggy address belongs to the object at cc90ae80 [ 71.261047] which belongs to the cache kmalloc-64 of size 64 [ 71.272766] The buggy address is located 4 bytes inside of [ 71.272766] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.283721] [ 71.285217] The buggy address belongs to the physical page: [ 71.290832] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.298095] flags: 0x0(zone=0) [ 71.301177] page_type: f5(slab) [ 71.304351] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.312499] raw: 00000000 [ 71.315124] page dumped because: kasan: bad access detected [ 71.320739] [ 71.322235] Memory state around the buggy address: [ 71.327056] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.333648] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.340209] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.346771] ^ [ 71.349334] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.355895] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.362457] ================================================================== [ 70.819763] ================================================================== [ 70.827026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70 [ 70.834411] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 70.841156] [ 70.842651] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 70.842681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.842712] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.842712] Call trace: [ 70.842712] unwind_backtrace from show_stack+0x18/0x1c [ 70.842742] show_stack from dump_stack_lvl+0x70/0x90 [ 70.842773] dump_stack_lvl from print_report+0x158/0x528 [ 70.842803] print_report from kasan_report+0xdc/0x118 [ 70.842803] kasan_report from kasan_check_range+0x14c/0x198 [ 70.842834] kasan_check_range from kasan_bitops_generic+0x874/0x1d70 [ 70.842864] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.842895] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.842926] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.842956] kthread from ret_from_fork+0x14/0x20 [ 70.842956] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 70.842987] bfa0: 00000000 00000000 00000000 00000000 [ 70.842987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.843017] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.843017] [ 70.955505] Allocated by task 313: [ 70.958923] kasan_save_track+0x30/0x5c [ 70.962799] __kasan_kmalloc+0x8c/0x94 [ 70.966552] kasan_bitops_generic+0xd4/0x1d70 [ 70.970947] kunit_try_run_case+0x22c/0x5a8 [ 70.975189] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.980712] kthread+0x464/0x810 [ 70.983978] ret_from_fork+0x14/0x20 [ 70.987579] [ 70.989074] The buggy address belongs to the object at cc90ae80 [ 70.989074] which belongs to the cache kmalloc-64 of size 64 [ 71.000793] The buggy address is located 4 bytes inside of [ 71.000793] allocated 5-byte region [cc90ae80, cc90ae85) [ 71.011749] [ 71.013244] The buggy address belongs to the physical page: [ 71.018859] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 71.026123] flags: 0x0(zone=0) [ 71.029205] page_type: f5(slab) [ 71.032379] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.040496] raw: 00000000 [ 71.043151] page dumped because: kasan: bad access detected [ 71.048767] [ 71.050262] Memory state around the buggy address: [ 71.055084] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.061645] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.068237] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.074798] ^ [ 71.077362] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.083923] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.090484] ================================================================== [ 68.566680] ================================================================== [ 68.589691] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70 [ 68.597137] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 68.603790] [ 68.605285] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 68.605316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.605346] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.605346] Call trace: [ 68.605346] unwind_backtrace from show_stack+0x18/0x1c [ 68.605377] show_stack from dump_stack_lvl+0x70/0x90 [ 68.605407] dump_stack_lvl from print_report+0x158/0x528 [ 68.605438] print_report from kasan_report+0xdc/0x118 [ 68.605438] kasan_report from kasan_bitops_generic+0x1a50/0x1d70 [ 68.605468] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 68.605499] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.605529] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.605560] kthread from ret_from_fork+0x14/0x20 [ 68.605590] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 68.605590] bfa0: 00000000 00000000 00000000 00000000 [ 68.605621] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.605621] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.605651] [ 68.712066] Allocated by task 313: [ 68.715515] kasan_save_track+0x30/0x5c [ 68.719360] __kasan_kmalloc+0x8c/0x94 [ 68.723144] kasan_bitops_generic+0xd4/0x1d70 [ 68.727539] kunit_try_run_case+0x22c/0x5a8 [ 68.731750] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.737304] kthread+0x464/0x810 [ 68.740539] ret_from_fork+0x14/0x20 [ 68.744140] [ 68.745666] The buggy address belongs to the object at cc90ae80 [ 68.745666] which belongs to the cache kmalloc-64 of size 64 [ 68.757385] The buggy address is located 4 bytes inside of [ 68.757385] allocated 5-byte region [cc90ae80, cc90ae85) [ 68.768310] [ 68.769836] The buggy address belongs to the physical page: [ 68.775451] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 68.782714] flags: 0x0(zone=0) [ 68.785797] page_type: f5(slab) [ 68.788970] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 68.797088] raw: 00000000 [ 68.799743] page dumped because: kasan: bad access detected [ 68.805358] [ 68.806854] Memory state around the buggy address: [ 68.811676] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.818237] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.824798] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.831390] ^ [ 68.833923] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.840515] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.847076] ================================================================== [ 69.970886] ================================================================== [ 69.978149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70 [ 69.985595] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313 [ 69.992340] [ 69.993865] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 69.993896] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.993896] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.993896] Call trace: [ 69.993927] unwind_backtrace from show_stack+0x18/0x1c [ 69.993927] show_stack from dump_stack_lvl+0x70/0x90 [ 69.993957] dump_stack_lvl from print_report+0x158/0x528 [ 69.993988] print_report from kasan_report+0xdc/0x118 [ 69.994018] kasan_report from kasan_bitops_generic+0x19f8/0x1d70 [ 69.994049] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.994049] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.994079] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.994110] kthread from ret_from_fork+0x14/0x20 [ 69.994140] Exception stack(0xf24cbfb0 to 0xf24cbff8) [ 69.994140] bfa0: 00000000 00000000 00000000 00000000 [ 69.994171] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.994171] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.994201] [ 70.100646] Allocated by task 313: [ 70.104064] kasan_save_track+0x30/0x5c [ 70.107940] __kasan_kmalloc+0x8c/0x94 [ 70.111694] kasan_bitops_generic+0xd4/0x1d70 [ 70.116088] kunit_try_run_case+0x22c/0x5a8 [ 70.120330] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.125854] kthread+0x464/0x810 [ 70.129119] ret_from_fork+0x14/0x20 [ 70.132720] [ 70.134216] The buggy address belongs to the object at cc90ae80 [ 70.134216] which belongs to the cache kmalloc-64 of size 64 [ 70.145935] The buggy address is located 4 bytes inside of [ 70.145935] allocated 5-byte region [cc90ae80, cc90ae85) [ 70.156890] [ 70.158386] The buggy address belongs to the physical page: [ 70.163970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 70.171264] flags: 0x0(zone=0) [ 70.174346] page_type: f5(slab) [ 70.177490] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 70.185638] raw: 00000000 [ 70.188293] page dumped because: kasan: bad access detected [ 70.193908] [ 70.195404] Memory state around the buggy address: [ 70.200225] cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.206787] cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.213378] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.219940] ^ [ 70.222473] cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.229064] cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.235626] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 68.248748] ================================================================== [ 68.256011] BUG: KASAN: slab-use-after-free in strnlen+0x94/0x9c [ 68.262054] Read of size 1 at addr cc90a410 by task kunit_try_catch/311 [ 68.268737] [ 68.270233] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 68.270263] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.270263] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.270294] Call trace: [ 68.270294] unwind_backtrace from show_stack+0x18/0x1c [ 68.270324] show_stack from dump_stack_lvl+0x70/0x90 [ 68.270355] dump_stack_lvl from print_report+0x158/0x528 [ 68.270355] print_report from kasan_report+0xdc/0x118 [ 68.270385] kasan_report from strnlen+0x94/0x9c [ 68.270416] strnlen from kasan_strings+0x670/0xf00 [ 68.270446] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 68.270477] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.270507] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.270507] kthread from ret_from_fork+0x14/0x20 [ 68.270538] Exception stack(0xf24c3fb0 to 0xf24c3ff8) [ 68.270568] 3fa0: 00000000 00000000 00000000 00000000 [ 68.270568] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.270599] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.270599] [ 68.379852] Allocated by task 311: [ 68.383270] kasan_save_track+0x30/0x5c [ 68.387145] __kasan_kmalloc+0x8c/0x94 [ 68.390899] kasan_strings+0xe8/0xf00 [ 68.394622] kunit_try_run_case+0x22c/0x5a8 [ 68.398834] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.404357] kthread+0x464/0x810 [ 68.407623] ret_from_fork+0x14/0x20 [ 68.411224] [ 68.412719] Freed by task 311: [ 68.415802] kasan_save_track+0x30/0x5c [ 68.419677] kasan_save_free_info+0x3c/0x48 [ 68.423889] __kasan_slab_free+0x40/0x50 [ 68.427825] kfree+0xe8/0x384 [ 68.430847] kasan_strings+0x310/0xf00 [ 68.434600] kunit_try_run_case+0x22c/0x5a8 [ 68.438842] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.444366] kthread+0x464/0x810 [ 68.447631] ret_from_fork+0x14/0x20 [ 68.451232] [ 68.452728] The buggy address belongs to the object at cc90a400 [ 68.452728] which belongs to the cache kmalloc-64 of size 64 [ 68.464447] The buggy address is located 16 bytes inside of [ 68.464447] freed 64-byte region [cc90a400, cc90a440) [ 68.475219] [ 68.476715] The buggy address belongs to the physical page: [ 68.482330] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 68.489593] flags: 0x0(zone=0) [ 68.492675] page_type: f5(slab) [ 68.495849] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 68.503997] raw: 00000000 [ 68.506622] page dumped because: kasan: bad access detected [ 68.512237] [ 68.513732] Memory state around the buggy address: [ 68.518585] cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.525146] cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.531707] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.538299] ^ [ 68.541351] cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.547943] cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.554504] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 48.378814] ================================================================== [ 48.393951] BUG: KASAN: use-after-free in page_alloc_uaf+0x368/0x39c [ 48.400360] Read of size 1 at addr cc830000 by task kunit_try_catch/206 [ 48.407012] [ 48.408508] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 48.408538] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.408569] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.408569] Call trace: [ 48.408569] unwind_backtrace from show_stack+0x18/0x1c [ 48.408599] show_stack from dump_stack_lvl+0x70/0x90 [ 48.408630] dump_stack_lvl from print_report+0x158/0x528 [ 48.408660] print_report from kasan_report+0xdc/0x118 [ 48.408660] kasan_report from page_alloc_uaf+0x368/0x39c [ 48.408691] page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 48.408721] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.408752] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.408782] kthread from ret_from_fork+0x14/0x20 [ 48.408782] Exception stack(0xf220bfb0 to 0xf220bff8) [ 48.408813] bfa0: 00000000 00000000 00000000 00000000 [ 48.408813] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.408843] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.408843] [ 48.514068] The buggy address belongs to the physical page: [ 48.519683] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c830 [ 48.526947] flags: 0x0(zone=0) [ 48.530029] page_type: f0(buddy) [ 48.533294] raw: 00000000 c69c5750 c69c5750 00000000 00000000 00000004 f0000000 00000000 [ 48.541412] raw: 00000000 [ 48.544067] page dumped because: kasan: bad access detected [ 48.549652] [ 48.551177] Memory state around the buggy address: [ 48.555999] cc82ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.562561] cc82ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.569122] >cc830000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.575714] ^ [ 48.578247] cc830080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.584838] cc830100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.591400] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 67.935913] ================================================================== [ 67.943176] BUG: KASAN: slab-use-after-free in strlen+0xb0/0xb4 [ 67.949157] Read of size 1 at addr cc90a410 by task kunit_try_catch/311 [ 67.955810] [ 67.957305] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 67.957336] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.957366] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.957366] Call trace: [ 67.957366] unwind_backtrace from show_stack+0x18/0x1c [ 67.957397] show_stack from dump_stack_lvl+0x70/0x90 [ 67.957427] dump_stack_lvl from print_report+0x158/0x528 [ 67.957458] print_report from kasan_report+0xdc/0x118 [ 67.957458] kasan_report from strlen+0xb0/0xb4 [ 67.957489] strlen from kasan_strings+0x5dc/0xf00 [ 67.957519] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 67.957550] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.957580] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.957611] kthread from ret_from_fork+0x14/0x20 [ 67.957611] Exception stack(0xf24c3fb0 to 0xf24c3ff8) [ 67.957641] 3fa0: 00000000 00000000 00000000 00000000 [ 67.957641] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.957672] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.957672] [ 68.066741] Allocated by task 311: [ 68.070159] kasan_save_track+0x30/0x5c [ 68.074035] __kasan_kmalloc+0x8c/0x94 [ 68.077819] kasan_strings+0xe8/0xf00 [ 68.081512] kunit_try_run_case+0x22c/0x5a8 [ 68.085723] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.091278] kthread+0x464/0x810 [ 68.094512] ret_from_fork+0x14/0x20 [ 68.098114] [ 68.099639] Freed by task 311: [ 68.102691] kasan_save_track+0x30/0x5c [ 68.106567] kasan_save_free_info+0x3c/0x48 [ 68.110778] __kasan_slab_free+0x40/0x50 [ 68.114746] kfree+0xe8/0x384 [ 68.117736] kasan_strings+0x310/0xf00 [ 68.121520] kunit_try_run_case+0x22c/0x5a8 [ 68.125732] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.131286] kthread+0x464/0x810 [ 68.134521] ret_from_fork+0x14/0x20 [ 68.138122] [ 68.139648] The buggy address belongs to the object at cc90a400 [ 68.139648] which belongs to the cache kmalloc-64 of size 64 [ 68.151367] The buggy address is located 16 bytes inside of [ 68.151367] freed 64-byte region [cc90a400, cc90a440) [ 68.162139] [ 68.163635] The buggy address belongs to the physical page: [ 68.169219] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 68.176513] flags: 0x0(zone=0) [ 68.179595] page_type: f5(slab) [ 68.182769] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 68.190887] raw: 00000000 [ 68.193542] page dumped because: kasan: bad access detected [ 68.199157] [ 68.200653] Memory state around the buggy address: [ 68.205474] cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.212036] cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.218627] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.225189] ^ [ 68.228271] cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.234832] cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.241394] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 67.626342] ================================================================== [ 67.633605] BUG: KASAN: slab-use-after-free in kasan_strings+0xd0c/0xf00 [ 67.640380] Read of size 1 at addr cc90a410 by task kunit_try_catch/311 [ 67.647033] [ 67.648529] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 67.648559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.648590] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.648590] Call trace: [ 67.648590] unwind_backtrace from show_stack+0x18/0x1c [ 67.648620] show_stack from dump_stack_lvl+0x70/0x90 [ 67.648651] dump_stack_lvl from print_report+0x158/0x528 [ 67.648681] print_report from kasan_report+0xdc/0x118 [ 67.648681] kasan_report from kasan_strings+0xd0c/0xf00 [ 67.648712] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 67.648742] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.648773] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.648803] kthread from ret_from_fork+0x14/0x20 [ 67.648834] Exception stack(0xf24c3fb0 to 0xf24c3ff8) [ 67.648834] 3fa0: 00000000 00000000 00000000 00000000 [ 67.648864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.648864] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.648895] [ 67.753936] Allocated by task 311: [ 67.757354] kasan_save_track+0x30/0x5c [ 67.761230] __kasan_kmalloc+0x8c/0x94 [ 67.764984] kasan_strings+0xe8/0xf00 [ 67.768707] kunit_try_run_case+0x22c/0x5a8 [ 67.772918] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.778442] kthread+0x464/0x810 [ 67.781707] ret_from_fork+0x14/0x20 [ 67.785308] [ 67.786804] Freed by task 311: [ 67.789886] kasan_save_track+0x30/0x5c [ 67.793762] kasan_save_free_info+0x3c/0x48 [ 67.797973] __kasan_slab_free+0x40/0x50 [ 67.801910] kfree+0xe8/0x384 [ 67.804931] kasan_strings+0x310/0xf00 [ 67.808685] kunit_try_run_case+0x22c/0x5a8 [ 67.812927] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.818450] kthread+0x464/0x810 [ 67.821716] ret_from_fork+0x14/0x20 [ 67.825317] [ 67.826812] The buggy address belongs to the object at cc90a400 [ 67.826812] which belongs to the cache kmalloc-64 of size 64 [ 67.838531] The buggy address is located 16 bytes inside of [ 67.838531] freed 64-byte region [cc90a400, cc90a440) [ 67.849304] [ 67.850799] The buggy address belongs to the physical page: [ 67.856414] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 67.863677] flags: 0x0(zone=0) [ 67.866760] page_type: f5(slab) [ 67.869934] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 67.878082] raw: 00000000 [ 67.880706] page dumped because: kasan: bad access detected [ 67.886322] [ 67.887817] Memory state around the buggy address: [ 67.892639] cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.899230] cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.905792] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.912353] ^ [ 67.915435] cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.921997] cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.928588] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 67.296722] ================================================================== [ 67.320770] BUG: KASAN: slab-use-after-free in strcmp+0xcc/0xd4 [ 67.326721] Read of size 1 at addr cc90a410 by task kunit_try_catch/311 [ 67.333404] [ 67.334899] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 67.334930] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.334930] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.334960] Call trace: [ 67.334960] unwind_backtrace from show_stack+0x18/0x1c [ 67.334991] show_stack from dump_stack_lvl+0x70/0x90 [ 67.335021] dump_stack_lvl from print_report+0x158/0x528 [ 67.335052] print_report from kasan_report+0xdc/0x118 [ 67.335052] kasan_report from strcmp+0xcc/0xd4 [ 67.335083] strcmp from kasan_strings+0x490/0xf00 [ 67.335113] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 67.335144] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.335174] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.335205] kthread from ret_from_fork+0x14/0x20 [ 67.335205] Exception stack(0xf24c3fb0 to 0xf24c3ff8) [ 67.335235] 3fa0: 00000000 00000000 00000000 00000000 [ 67.335235] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.335266] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.335266] [ 67.444335] Allocated by task 311: [ 67.447753] kasan_save_track+0x30/0x5c [ 67.451629] __kasan_kmalloc+0x8c/0x94 [ 67.455413] kasan_strings+0xe8/0xf00 [ 67.459106] kunit_try_run_case+0x22c/0x5a8 [ 67.463317] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.468872] kthread+0x464/0x810 [ 67.472106] ret_from_fork+0x14/0x20 [ 67.475708] [ 67.477233] Freed by task 311: [ 67.480285] kasan_save_track+0x30/0x5c [ 67.484161] kasan_save_free_info+0x3c/0x48 [ 67.488372] __kasan_slab_free+0x40/0x50 [ 67.492340] kfree+0xe8/0x384 [ 67.495330] kasan_strings+0x310/0xf00 [ 67.499114] kunit_try_run_case+0x22c/0x5a8 [ 67.503326] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.508880] kthread+0x464/0x810 [ 67.512115] ret_from_fork+0x14/0x20 [ 67.515716] [ 67.517242] The buggy address belongs to the object at cc90a400 [ 67.517242] which belongs to the cache kmalloc-64 of size 64 [ 67.528961] The buggy address is located 16 bytes inside of [ 67.528961] freed 64-byte region [cc90a400, cc90a440) [ 67.539733] [ 67.541229] The buggy address belongs to the physical page: [ 67.546844] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 67.554107] flags: 0x0(zone=0) [ 67.557189] page_type: f5(slab) [ 67.560363] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 67.568511] raw: 00000000 [ 67.571136] page dumped because: kasan: bad access detected [ 67.576751] [ 67.578247] Memory state around the buggy address: [ 67.583068] cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.589630] cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.596221] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.602783] ^ [ 67.605865] cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.612426] cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.619018] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 66.977935] ================================================================== [ 66.988983] BUG: KASAN: slab-out-of-bounds in memcmp+0x19c/0x1b0 [ 66.995056] Read of size 1 at addr cc90a298 by task kunit_try_catch/309 [ 67.001708] [ 67.003204] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 67.003234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.003234] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.003265] Call trace: [ 67.003265] unwind_backtrace from show_stack+0x18/0x1c [ 67.003295] show_stack from dump_stack_lvl+0x70/0x90 [ 67.003326] dump_stack_lvl from print_report+0x158/0x528 [ 67.003356] print_report from kasan_report+0xdc/0x118 [ 67.003356] kasan_report from memcmp+0x19c/0x1b0 [ 67.003387] memcmp from kasan_memcmp+0x1d0/0x388 [ 67.003417] kasan_memcmp from kunit_try_run_case+0x22c/0x5a8 [ 67.003448] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.003479] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.003509] kthread from ret_from_fork+0x14/0x20 [ 67.003509] Exception stack(0xf24b3fb0 to 0xf24b3ff8) [ 67.003540] 3fa0: 00000000 00000000 00000000 00000000 [ 67.003540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.003570] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.003570] [ 67.112640] Allocated by task 309: [ 67.116058] kasan_save_track+0x30/0x5c [ 67.119934] __kasan_kmalloc+0x8c/0x94 [ 67.123718] kasan_memcmp+0xe0/0x388 [ 67.127319] kunit_try_run_case+0x22c/0x5a8 [ 67.131561] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.137084] kthread+0x464/0x810 [ 67.140319] ret_from_fork+0x14/0x20 [ 67.143951] [ 67.145446] The buggy address belongs to the object at cc90a280 [ 67.145446] which belongs to the cache kmalloc-64 of size 64 [ 67.157165] The buggy address is located 0 bytes to the right of [ 67.157165] allocated 24-byte region [cc90a280, cc90a298) [ 67.168731] [ 67.170227] The buggy address belongs to the physical page: [ 67.175842] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a [ 67.183105] flags: 0x0(zone=0) [ 67.186187] page_type: f5(slab) [ 67.189361] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 67.197479] raw: 00000000 [ 67.200134] page dumped because: kasan: bad access detected [ 67.205749] [ 67.207244] Memory state around the buggy address: [ 67.212066] cc90a180: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.218627] cc90a200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.225219] >cc90a280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.231781] ^ [ 67.235107] cc90a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.241699] cc90a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.248260] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 66.469665] ================================================================== [ 66.480621] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x304/0x33c [ 66.488159] Read of size 1 at addr f2483c7f by task kunit_try_catch/303 [ 66.494812] [ 66.496307] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 66.496337] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.496368] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.496368] Call trace: [ 66.496368] unwind_backtrace from show_stack+0x18/0x1c [ 66.496398] show_stack from dump_stack_lvl+0x70/0x90 [ 66.496429] dump_stack_lvl from print_report+0x158/0x528 [ 66.496459] print_report from kasan_report+0xdc/0x118 [ 66.496459] kasan_report from kasan_alloca_oob_left+0x304/0x33c [ 66.496490] kasan_alloca_oob_left from kunit_try_run_case+0x22c/0x5a8 [ 66.496520] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.496551] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.496582] kthread from ret_from_fork+0x14/0x20 [ 66.496582] Exception stack(0xf2483fb0 to 0xf2483ff8) [ 66.496612] 3fa0: 00000000 00000000 00000000 00000000 [ 66.496643] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.496643] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.496643] [ 66.603088] The buggy address belongs to stack of task kunit_try_catch/303 [ 66.610015] [ 66.611541] The buggy address belongs to the virtual mapping at [ 66.611541] [f2480000, f2485000) created by: [ 66.611541] kernel_clone+0x174/0x794 [ 66.625518] [ 66.627014] The buggy address belongs to the physical page: [ 66.632629] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb081b [ 66.639923] flags: 0x80000000(zone=2) [ 66.643615] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 66.651763] raw: 00000000 [ 66.654388] page dumped because: kasan: bad access detected [ 66.660003] [ 66.661499] Memory state around the buggy address: [ 66.666320] f2483b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.672882] f2483b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.679473] >f2483c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca [ 66.686035] ^ [ 66.692535] f2483c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00 [ 66.699096] f2483d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3 [ 66.705657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 66.195953] ================================================================== [ 66.211090] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2a8/0x2dc [ 66.218017] Read of size 1 at addr f2473d6a by task kunit_try_catch/301 [ 66.224670] [ 66.226196] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 66.226226] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.226226] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.226226] Call trace: [ 66.226257] unwind_backtrace from show_stack+0x18/0x1c [ 66.226257] show_stack from dump_stack_lvl+0x70/0x90 [ 66.226287] dump_stack_lvl from print_report+0x158/0x528 [ 66.226318] print_report from kasan_report+0xdc/0x118 [ 66.226348] kasan_report from kasan_stack_oob+0x2a8/0x2dc [ 66.226379] kasan_stack_oob from kunit_try_run_case+0x22c/0x5a8 [ 66.226379] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.226409] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.226440] kthread from ret_from_fork+0x14/0x20 [ 66.226470] Exception stack(0xf2473fb0 to 0xf2473ff8) [ 66.226470] 3fa0: 00000000 00000000 00000000 00000000 [ 66.226501] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.226501] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.226531] [ 66.331939] The buggy address belongs to stack of task kunit_try_catch/301 [ 66.338836] and is located at offset 106 in frame: [ 66.343749] kasan_stack_oob+0x0/0x2dc [ 66.347534] [ 66.349029] This frame has 4 objects: [ 66.352722] [32, 33) '__assertion' [ 66.352752] [48, 52) 'array' [ 66.356262] [64, 72) '__assertion' [ 66.359252] [96, 106) 'stack_array' [ 66.362762] [ 66.367858] The buggy address belongs to the virtual mapping at [ 66.367858] [f2470000, f2475000) created by: [ 66.367858] kernel_clone+0x174/0x794 [ 66.381866] [ 66.383361] The buggy address belongs to the physical page: [ 66.388977] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb081f [ 66.396240] flags: 0x80000000(zone=2) [ 66.399932] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 66.408081] raw: 00000000 [ 66.410736] page dumped because: kasan: bad access detected [ 66.416320] [ 66.417846] Memory state around the buggy address: [ 66.422668] f2473c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.429229] f2473c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.435791] >f2473d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 02 f3 f3 [ 66.442382] ^ [ 66.448333] f2473d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.454895] f2473e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 66.461486] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 65.961669] ================================================================== [ 65.974273] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc [ 65.981903] Read of size 1 at addr c6a56c8d by task kunit_try_catch/297 [ 65.988555] [ 65.990081] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.990112] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.990112] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.990112] Call trace: [ 65.990142] unwind_backtrace from show_stack+0x18/0x1c [ 65.990142] show_stack from dump_stack_lvl+0x70/0x90 [ 65.990173] dump_stack_lvl from print_report+0x158/0x528 [ 65.990203] print_report from kasan_report+0xdc/0x118 [ 65.990234] kasan_report from kasan_global_oob_right+0x284/0x2bc [ 65.990264] kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 65.990264] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.990295] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.990325] kthread from ret_from_fork+0x14/0x20 [ 65.990356] Exception stack(0xf245bfb0 to 0xf245bff8) [ 65.990356] bfa0: 00000000 00000000 00000000 00000000 [ 65.990386] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.990417] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.990417] [ 66.097045] The buggy address belongs to the variable: [ 66.102203] global_array+0xd/0x40 [ 66.105651] [ 66.107147] The buggy address belongs to the physical page: [ 66.112762] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a56 [ 66.120025] flags: 0x2000(reserved|zone=0) [ 66.124145] raw: 00002000 eeaee41c eeaee41c 00000000 00000000 00000000 ffffffff 00000001 [ 66.132293] raw: 00000000 [ 66.134948] page dumped because: kasan: bad access detected [ 66.140533] [ 66.142059] Memory state around the buggy address: [ 66.146881] c6a56b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.153442] c6a56c00: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 66.160034] >c6a56c80: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.166595] ^ [ 66.169403] c6a56d00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 66.175964] c6a56d80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.182556] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 65.686401] ================================================================== [ 65.698486] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.706573] Free of addr cc8fc001 by task kunit_try_catch/295 [ 65.712341] [ 65.713867] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.713867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.713897] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.713897] Call trace: [ 65.713897] unwind_backtrace from show_stack+0x18/0x1c [ 65.713928] show_stack from dump_stack_lvl+0x70/0x90 [ 65.713958] dump_stack_lvl from print_report+0x158/0x528 [ 65.713989] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.714019] kasan_report_invalid_free from __kasan_mempool_poison_object+0xd0/0x128 [ 65.714050] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.714050] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.714080] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_large_invalid_free+0xb8/0x104 [ 65.714111] mempool_kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 65.714141] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.714172] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.714202] kthread from ret_from_fork+0x14/0x20 [ 65.714233] Exception stack(0xf2453fb0 to 0xf2453ff8) [ 65.714233] 3fa0: 00000000 00000000 00000000 00000000 [ 65.714263] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.714263] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.714294] [ 65.847717] The buggy address belongs to the physical page: [ 65.853332] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc [ 65.860595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.868316] flags: 0x40(head|zone=0) [ 65.871917] page_type: f8(unknown) [ 65.875335] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.883483] raw: 00000000 [ 65.886138] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.894378] head: 00000000 00000002 eebc3371 ffffffff 00000000 ffffffff 00000000 ffffffff [ 65.902587] head: 00000000 00000004 [ 65.906097] page dumped because: kasan: bad access detected [ 65.911712] [ 65.913238] Memory state around the buggy address: [ 65.918060] cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.924621] cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.931182] >cc8fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.937774] ^ [ 65.940307] cc8fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.946899] cc8fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.953460] ================================================================== [ 65.365447] ================================================================== [ 65.377716] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.385772] Free of addr cc893b01 by task kunit_try_catch/293 [ 65.391571] [ 65.393066] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.393096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.393096] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.393127] Call trace: [ 65.393127] unwind_backtrace from show_stack+0x18/0x1c [ 65.393157] show_stack from dump_stack_lvl+0x70/0x90 [ 65.393188] dump_stack_lvl from print_report+0x158/0x528 [ 65.393188] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.393218] kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8 [ 65.393249] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 65.393280] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.393280] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.393310] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.393341] mempool_kmalloc_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 65.393371] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.393402] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.393432] kthread from ret_from_fork+0x14/0x20 [ 65.393463] Exception stack(0xf2423fb0 to 0xf2423ff8) [ 65.393463] 3fa0: 00000000 00000000 00000000 00000000 [ 65.393493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.393493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.393493] [ 65.532531] Allocated by task 293: [ 65.535949] kasan_save_track+0x30/0x5c [ 65.539825] remove_element+0x180/0x264 [ 65.543701] mempool_alloc_preallocated+0x60/0x9c [ 65.548431] mempool_kmalloc_invalid_free_helper+0x90/0x2f8 [ 65.554046] mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.559051] kunit_try_run_case+0x22c/0x5a8 [ 65.563293] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.568817] kthread+0x464/0x810 [ 65.572082] ret_from_fork+0x14/0x20 [ 65.575683] [ 65.577178] The buggy address belongs to the object at cc893b00 [ 65.577178] which belongs to the cache kmalloc-128 of size 128 [ 65.589080] The buggy address is located 1 bytes inside of [ 65.589080] 128-byte region [cc893b00, cc893b80) [ 65.599334] [ 65.600830] The buggy address belongs to the physical page: [ 65.606445] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c893 [ 65.613708] flags: 0x0(zone=0) [ 65.616790] page_type: f5(slab) [ 65.619964] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 65.628082] raw: 00000000 [ 65.630737] page dumped because: kasan: bad access detected [ 65.636352] [ 65.637847] Memory state around the buggy address: [ 65.642669] cc893a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.649230] cc893a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.655822] >cc893b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.662384] ^ [ 65.664947] cc893b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.671508] cc893c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.678070] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 64.487854] ================================================================== [ 64.499420] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 64.506591] Free of addr cc893700 by task kunit_try_catch/287 [ 64.512390] [ 64.513885] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 64.513916] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.513946] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.513946] Call trace: [ 64.513946] unwind_backtrace from show_stack+0x18/0x1c [ 64.513977] show_stack from dump_stack_lvl+0x70/0x90 [ 64.514007] dump_stack_lvl from print_report+0x158/0x528 [ 64.514038] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 64.514068] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 64.514068] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 64.514099] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 64.514129] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 64.514160] mempool_double_free_helper from mempool_kmalloc_double_free+0xb8/0x104 [ 64.514190] mempool_kmalloc_double_free from kunit_try_run_case+0x22c/0x5a8 [ 64.514221] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.514251] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.514251] kthread from ret_from_fork+0x14/0x20 [ 64.514282] Exception stack(0xf243bfb0 to 0xf243bff8) [ 64.514282] bfa0: 00000000 00000000 00000000 00000000 [ 64.514312] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.514343] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.514343] [ 64.651611] Allocated by task 287: [ 64.655059] kasan_save_track+0x30/0x5c [ 64.658905] remove_element+0x180/0x264 [ 64.662780] mempool_alloc_preallocated+0x60/0x9c [ 64.667510] mempool_double_free_helper+0x8c/0x368 [ 64.672363] mempool_kmalloc_double_free+0xb8/0x104 [ 64.677276] kunit_try_run_case+0x22c/0x5a8 [ 64.681488] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.687011] kthread+0x464/0x810 [ 64.690277] ret_from_fork+0x14/0x20 [ 64.693878] [ 64.695373] Freed by task 287: [ 64.698455] kasan_save_track+0x30/0x5c [ 64.702331] kasan_save_free_info+0x3c/0x48 [ 64.706542] __kasan_mempool_poison_object+0x94/0x128 [ 64.711639] mempool_free+0x360/0x440 [ 64.715332] mempool_double_free_helper+0x13c/0x368 [ 64.720245] mempool_kmalloc_double_free+0xb8/0x104 [ 64.725158] kunit_try_run_case+0x22c/0x5a8 [ 64.729370] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.734893] kthread+0x464/0x810 [ 64.738159] ret_from_fork+0x14/0x20 [ 64.741760] [ 64.743255] The buggy address belongs to the object at cc893700 [ 64.743255] which belongs to the cache kmalloc-128 of size 128 [ 64.755157] The buggy address is located 0 bytes inside of [ 64.755157] 128-byte region [cc893700, cc893780) [ 64.765411] [ 64.766906] The buggy address belongs to the physical page: [ 64.772521] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c893 [ 64.779785] flags: 0x0(zone=0) [ 64.782867] page_type: f5(slab) [ 64.786041] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 64.794189] raw: 00000000 [ 64.796813] page dumped because: kasan: bad access detected [ 64.802429] [ 64.803924] Memory state around the buggy address: [ 64.808746] cc893600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.815307] cc893680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.821899] >cc893700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.828460] ^ [ 64.831024] cc893780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.837585] cc893800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.844146] ================================================================== [ 64.852233] ================================================================== [ 64.864227] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 64.871398] Free of addr cc8fc000 by task kunit_try_catch/289 [ 64.877197] [ 64.878692] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 64.878723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.878753] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.878753] Call trace: [ 64.878753] unwind_backtrace from show_stack+0x18/0x1c [ 64.878784] show_stack from dump_stack_lvl+0x70/0x90 [ 64.878814] dump_stack_lvl from print_report+0x158/0x528 [ 64.878845] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 64.878875] kasan_report_invalid_free from __kasan_mempool_poison_object+0x124/0x128 [ 64.878875] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 64.878906] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 64.878936] mempool_double_free_helper from mempool_kmalloc_large_double_free+0xb8/0x104 [ 64.878967] mempool_kmalloc_large_double_free from kunit_try_run_case+0x22c/0x5a8 [ 64.878997] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.879028] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.879058] kthread from ret_from_fork+0x14/0x20 [ 64.879058] Exception stack(0xf1833fb0 to 0xf1833ff8) [ 64.879089] 3fa0: 00000000 00000000 00000000 00000000 [ 64.879089] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.879119] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.879119] [ 65.010894] The buggy address belongs to the physical page: [ 65.016510] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc [ 65.023773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.031494] flags: 0x40(head|zone=0) [ 65.035095] page_type: f8(unknown) [ 65.038513] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.046661] raw: 00000000 [ 65.049316] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.057556] head: 00000000 00000002 eebc3371 ffffffff 00000000 ffffffff 00000000 ffffffff [ 65.065795] head: 00000000 00000004 [ 65.069305] page dumped because: kasan: bad access detected [ 65.074890] [ 65.076416] Memory state around the buggy address: [ 65.081237] cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.087799] cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.094360] >cc8fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.100952] ^ [ 65.103485] cc8fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.110076] cc8fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.116638] ================================================================== [ 65.124847] ================================================================== [ 65.137359] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 65.144561] Free of addr cc8fc000 by task kunit_try_catch/291 [ 65.150329] [ 65.151855] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.151885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.151885] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.151885] Call trace: [ 65.151916] unwind_backtrace from show_stack+0x18/0x1c [ 65.151916] show_stack from dump_stack_lvl+0x70/0x90 [ 65.151947] dump_stack_lvl from print_report+0x158/0x528 [ 65.151977] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.152008] kasan_report_invalid_free from __kasan_mempool_poison_pages+0xdc/0xe0 [ 65.152038] __kasan_mempool_poison_pages from mempool_free+0x314/0x440 [ 65.152038] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 65.152069] mempool_double_free_helper from mempool_page_alloc_double_free+0xb4/0x100 [ 65.152099] mempool_page_alloc_double_free from kunit_try_run_case+0x22c/0x5a8 [ 65.152130] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.152160] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.152191] kthread from ret_from_fork+0x14/0x20 [ 65.152221] Exception stack(0xf244bfb0 to 0xf244bff8) [ 65.152221] bfa0: 00000000 00000000 00000000 00000000 [ 65.152252] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.152252] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.152252] [ 65.283172] The buggy address belongs to the physical page: [ 65.288757] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc [ 65.296051] flags: 0x0(zone=0) [ 65.299133] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 65.307281] raw: 00000000 [ 65.309906] page dumped because: kasan: bad access detected [ 65.315521] [ 65.317016] Memory state around the buggy address: [ 65.321838] cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.328399] cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.334991] >cc8fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.341552] ^ [ 65.344085] cc8fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.350677] cc8fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.357238] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 64.265655] ================================================================== [ 64.276702] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 64.283477] Read of size 1 at addr cc8a4000 by task kunit_try_catch/285 [ 64.290130] [ 64.291656] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 64.291687] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.291687] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.291717] Call trace: [ 64.291717] unwind_backtrace from show_stack+0x18/0x1c [ 64.291748] show_stack from dump_stack_lvl+0x70/0x90 [ 64.291809] dump_stack_lvl from print_report+0x158/0x528 [ 64.291839] print_report from kasan_report+0xdc/0x118 [ 64.291870] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 64.291870] mempool_uaf_helper from mempool_page_alloc_uaf+0xb8/0x104 [ 64.291931] mempool_page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 64.291961] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.291992] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.292022] kthread from ret_from_fork+0x14/0x20 [ 64.292053] Exception stack(0xf242bfb0 to 0xf242bff8) [ 64.292083] bfa0: 00000000 00000000 00000000 00000000 [ 64.292083] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.292114] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.292114] [ 64.404998] The buggy address belongs to the physical page: [ 64.410614] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4 [ 64.417877] flags: 0x0(zone=0) [ 64.420989] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 64.429138] raw: 00000000 [ 64.431762] page dumped because: kasan: bad access detected [ 64.437377] [ 64.438903] Memory state around the buggy address: [ 64.443725] cc8a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.450286] cc8a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.456878] >cc8a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.463439] ^ [ 64.466003] cc8a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.472595] cc8a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.479156] ================================================================== [ 63.659790] ================================================================== [ 63.671081] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 63.677825] Read of size 1 at addr cc8a4000 by task kunit_try_catch/281 [ 63.684478] [ 63.686004] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 63.686035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.686035] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.686035] Call trace: [ 63.686065] unwind_backtrace from show_stack+0x18/0x1c [ 63.686065] show_stack from dump_stack_lvl+0x70/0x90 [ 63.686096] dump_stack_lvl from print_report+0x158/0x528 [ 63.686126] print_report from kasan_report+0xdc/0x118 [ 63.686157] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 63.686187] mempool_uaf_helper from mempool_kmalloc_large_uaf+0xbc/0x108 [ 63.686187] mempool_kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8 [ 63.686218] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.686248] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.686279] kthread from ret_from_fork+0x14/0x20 [ 63.686309] Exception stack(0xf241bfb0 to 0xf241bff8) [ 63.686309] bfa0: 00000000 00000000 00000000 00000000 [ 63.686340] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.686340] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.686370] [ 63.799713] The buggy address belongs to the physical page: [ 63.805328] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4 [ 63.812591] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.820312] flags: 0x40(head|zone=0) [ 63.823913] page_type: f8(unknown) [ 63.827331] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 63.835479] raw: 00000000 [ 63.838134] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 63.846343] head: 00000000 00000002 eebc2711 ffffffff 00000000 ffffffff 00000000 ffffffff [ 63.854583] head: 00000000 00000004 [ 63.858093] page dumped because: kasan: bad access detected [ 63.863708] [ 63.865203] Memory state around the buggy address: [ 63.870025] cc8a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.876617] cc8a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.883178] >cc8a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.889739] ^ [ 63.892303] cc8a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.898864] cc8a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.905426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 63.914215] ================================================================== [ 63.926055] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 63.933258] Read of size 1 at addr cc8d2240 by task kunit_try_catch/283 [ 63.939910] [ 63.941436] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 63.941467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.941467] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.941497] Call trace: [ 63.941497] unwind_backtrace from show_stack+0x18/0x1c [ 63.941528] show_stack from dump_stack_lvl+0x70/0x90 [ 63.941558] dump_stack_lvl from print_report+0x158/0x528 [ 63.941589] print_report from kasan_report+0xdc/0x118 [ 63.941619] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 63.941650] mempool_uaf_helper from mempool_slab_uaf+0xb8/0x100 [ 63.941680] mempool_slab_uaf from kunit_try_run_case+0x22c/0x5a8 [ 63.941711] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.941772] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.941802] kthread from ret_from_fork+0x14/0x20 [ 63.941833] Exception stack(0xf2423fb0 to 0xf2423ff8) [ 63.941833] 3fa0: 00000000 00000000 00000000 00000000 [ 63.941864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.941894] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.941894] [ 64.053710] Allocated by task 283: [ 64.057128] kasan_save_track+0x30/0x5c [ 64.061004] __kasan_mempool_unpoison_object+0xec/0x14c [ 64.066284] remove_element+0x1d4/0x264 [ 64.070159] mempool_alloc_preallocated+0x60/0x9c [ 64.074920] mempool_uaf_helper+0x90/0x3b8 [ 64.079040] mempool_slab_uaf+0xb8/0x100 [ 64.083007] kunit_try_run_case+0x22c/0x5a8 [ 64.087249] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.092773] kthread+0x464/0x810 [ 64.096038] ret_from_fork+0x14/0x20 [ 64.099639] [ 64.101165] Freed by task 283: [ 64.104248] kasan_save_track+0x30/0x5c [ 64.108093] kasan_save_free_info+0x3c/0x48 [ 64.112335] __kasan_mempool_poison_object+0x94/0x128 [ 64.117431] mempool_free+0x360/0x440 [ 64.121124] mempool_uaf_helper+0x13c/0x3b8 [ 64.125335] mempool_slab_uaf+0xb8/0x100 [ 64.129302] kunit_try_run_case+0x22c/0x5a8 [ 64.133544] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.139068] kthread+0x464/0x810 [ 64.142333] ret_from_fork+0x14/0x20 [ 64.145935] [ 64.147460] The buggy address belongs to the object at cc8d2240 [ 64.147460] which belongs to the cache test_cache of size 123 [ 64.159271] The buggy address is located 0 bytes inside of [ 64.159271] freed 123-byte region [cc8d2240, cc8d22bb) [ 64.170043] [ 64.171539] The buggy address belongs to the physical page: [ 64.177154] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8d2 [ 64.184448] flags: 0x0(zone=0) [ 64.187530] page_type: f5(slab) [ 64.190704] raw: 00000000 c8f6d600 00000122 00000000 00000000 80150015 f5000000 00000000 [ 64.198852] raw: 00000000 [ 64.201477] page dumped because: kasan: bad access detected [ 64.207092] [ 64.208618] Memory state around the buggy address: [ 64.213439] cc8d2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.220001] cc8d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.226593] >cc8d2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 64.233154] ^ [ 64.237823] cc8d2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.244384] cc8d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.250976] ================================================================== [ 63.321411] ================================================================== [ 63.332977] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 63.340148] Read of size 1 at addr cc854900 by task kunit_try_catch/279 [ 63.346832] [ 63.348327] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 63.348358] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.348358] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.348388] Call trace: [ 63.348388] unwind_backtrace from show_stack+0x18/0x1c [ 63.348419] show_stack from dump_stack_lvl+0x70/0x90 [ 63.348449] dump_stack_lvl from print_report+0x158/0x528 [ 63.348480] print_report from kasan_report+0xdc/0x118 [ 63.348510] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 63.348510] mempool_uaf_helper from mempool_kmalloc_uaf+0xbc/0x108 [ 63.348541] mempool_kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 63.348571] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.348602] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.348632] kthread from ret_from_fork+0x14/0x20 [ 63.348663] Exception stack(0xf2413fb0 to 0xf2413ff8) [ 63.348663] 3fa0: 00000000 00000000 00000000 00000000 [ 63.348693] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.348693] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.348724] [ 63.461029] Allocated by task 279: [ 63.464447] kasan_save_track+0x30/0x5c [ 63.468322] remove_element+0x180/0x264 [ 63.472167] mempool_alloc_preallocated+0x60/0x9c [ 63.476928] mempool_uaf_helper+0x90/0x3b8 [ 63.481048] mempool_kmalloc_uaf+0xbc/0x108 [ 63.485260] kunit_try_run_case+0x22c/0x5a8 [ 63.489501] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.495025] kthread+0x464/0x810 [ 63.498260] ret_from_fork+0x14/0x20 [ 63.501892] [ 63.503387] Freed by task 279: [ 63.506469] kasan_save_track+0x30/0x5c [ 63.510314] kasan_save_free_info+0x3c/0x48 [ 63.514526] __kasan_mempool_poison_object+0x94/0x128 [ 63.519622] mempool_free+0x360/0x440 [ 63.523315] mempool_uaf_helper+0x13c/0x3b8 [ 63.527526] mempool_kmalloc_uaf+0xbc/0x108 [ 63.531768] kunit_try_run_case+0x22c/0x5a8 [ 63.535980] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.541503] kthread+0x464/0x810 [ 63.544769] ret_from_fork+0x14/0x20 [ 63.548370] [ 63.549865] The buggy address belongs to the object at cc854900 [ 63.549865] which belongs to the cache kmalloc-128 of size 128 [ 63.561767] The buggy address is located 0 bytes inside of [ 63.561767] freed 128-byte region [cc854900, cc854980) [ 63.572540] [ 63.574035] The buggy address belongs to the physical page: [ 63.579650] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854 [ 63.586914] flags: 0x0(zone=0) [ 63.589996] page_type: f5(slab) [ 63.593170] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 63.601318] raw: 00000000 [ 63.603942] page dumped because: kasan: bad access detected [ 63.609558] [ 63.611053] Memory state around the buggy address: [ 63.615875] cc854800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.622436] cc854880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.629028] >cc854900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.635589] ^ [ 63.638153] cc854980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.644714] cc854a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.651275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 62.754791] ================================================================== [ 62.766632] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 62.774261] Read of size 1 at addr cc8a6001 by task kunit_try_catch/275 [ 62.780914] [ 62.782409] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 62.782440] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 62.782440] Hardware name: Generic DRA74X (Flattened Device Tree) [ 62.782470] Call trace: [ 62.782470] unwind_backtrace from show_stack+0x18/0x1c [ 62.782501] show_stack from dump_stack_lvl+0x70/0x90 [ 62.782531] dump_stack_lvl from print_report+0x158/0x528 [ 62.782562] print_report from kasan_report+0xdc/0x118 [ 62.782562] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 62.782592] mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108 [ 62.782623] mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 62.782653] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.782684] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 62.782714] kthread from ret_from_fork+0x14/0x20 [ 62.782714] Exception stack(0xf23f3fb0 to 0xf23f3ff8) [ 62.782745] 3fa0: 00000000 00000000 00000000 00000000 [ 62.782745] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 62.782775] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 62.782775] [ 62.898223] The buggy address belongs to the physical page: [ 62.903839] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4 [ 62.911102] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.918823] flags: 0x40(head|zone=0) [ 62.922424] page_type: f8(unknown) [ 62.925842] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 62.933990] raw: 00000000 [ 62.936645] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 62.944854] head: 00000000 00000002 eebc2711 ffffffff 00000000 ffffffff 00000000 ffffffff [ 62.953094] head: 00000000 00000004 [ 62.956604] page dumped because: kasan: bad access detected [ 62.962219] [ 62.963714] Memory state around the buggy address: [ 62.968536] cc8a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.975097] cc8a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.981689] >cc8a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 62.988250] ^ [ 62.990814] cc8a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 62.997375] cc8a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.003936] ================================================================== [ 62.455444] ================================================================== [ 62.466430] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 62.474060] Read of size 1 at addr cc854573 by task kunit_try_catch/273 [ 62.480743] [ 62.482269] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 62.482299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 62.482299] Hardware name: Generic DRA74X (Flattened Device Tree) [ 62.482330] Call trace: [ 62.482330] unwind_backtrace from show_stack+0x18/0x1c [ 62.482360] show_stack from dump_stack_lvl+0x70/0x90 [ 62.482391] dump_stack_lvl from print_report+0x158/0x528 [ 62.482421] print_report from kasan_report+0xdc/0x118 [ 62.482452] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 62.482482] mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108 [ 62.482543] mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 62.482574] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.482604] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 62.482635] kthread from ret_from_fork+0x14/0x20 [ 62.482666] Exception stack(0xf23e3fb0 to 0xf23e3ff8) [ 62.482696] 3fa0: 00000000 00000000 00000000 00000000 [ 62.482696] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 62.482727] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 62.482727] [ 62.597167] Allocated by task 273: [ 62.600585] kasan_save_track+0x30/0x5c [ 62.604461] remove_element+0x180/0x264 [ 62.608337] mempool_alloc_preallocated+0x60/0x9c [ 62.613067] mempool_oob_right_helper+0x94/0x334 [ 62.617736] mempool_kmalloc_oob_right+0xbc/0x108 [ 62.622467] kunit_try_run_case+0x22c/0x5a8 [ 62.626678] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.632202] kthread+0x464/0x810 [ 62.635467] ret_from_fork+0x14/0x20 [ 62.639068] [ 62.640563] The buggy address belongs to the object at cc854500 [ 62.640563] which belongs to the cache kmalloc-128 of size 128 [ 62.652465] The buggy address is located 0 bytes to the right of [ 62.652465] allocated 115-byte region [cc854500, cc854573) [ 62.664123] [ 62.665618] The buggy address belongs to the physical page: [ 62.671234] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854 [ 62.678497] flags: 0x0(zone=0) [ 62.681579] page_type: f5(slab) [ 62.684753] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 62.692901] raw: 00000000 [ 62.695526] page dumped because: kasan: bad access detected [ 62.701141] [ 62.702636] Memory state around the buggy address: [ 62.707458] cc854400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.714050] cc854480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.720611] >cc854500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 62.727172] ^ [ 62.733398] cc854580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.739959] cc854600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 62.746551] ================================================================== [ 63.013275] ================================================================== [ 63.025604] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 63.033233] Read of size 1 at addr cc8b62bb by task kunit_try_catch/277 [ 63.039886] [ 63.041412] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 63.041442] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.041442] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.041442] Call trace: [ 63.041473] unwind_backtrace from show_stack+0x18/0x1c [ 63.041473] show_stack from dump_stack_lvl+0x70/0x90 [ 63.041503] dump_stack_lvl from print_report+0x158/0x528 [ 63.041534] print_report from kasan_report+0xdc/0x118 [ 63.041564] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 63.041595] mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100 [ 63.041625] mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 63.041625] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.041656] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.041687] kthread from ret_from_fork+0x14/0x20 [ 63.041717] Exception stack(0xf2403fb0 to 0xf2403ff8) [ 63.041717] 3fa0: 00000000 00000000 00000000 00000000 [ 63.041748] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.041748] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.041778] [ 63.155639] Allocated by task 277: [ 63.159057] kasan_save_track+0x30/0x5c [ 63.162933] __kasan_mempool_unpoison_object+0xec/0x14c [ 63.168182] remove_element+0x1d4/0x264 [ 63.172058] mempool_alloc_preallocated+0x60/0x9c [ 63.176788] mempool_oob_right_helper+0x94/0x334 [ 63.181457] mempool_slab_oob_right+0xb8/0x100 [ 63.185943] kunit_try_run_case+0x22c/0x5a8 [ 63.190155] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.195678] kthread+0x464/0x810 [ 63.198944] ret_from_fork+0x14/0x20 [ 63.202545] [ 63.204040] The buggy address belongs to the object at cc8b6240 [ 63.204040] which belongs to the cache test_cache of size 123 [ 63.215850] The buggy address is located 0 bytes to the right of [ 63.215850] allocated 123-byte region [cc8b6240, cc8b62bb) [ 63.227508] [ 63.229003] The buggy address belongs to the physical page: [ 63.234619] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8b6 [ 63.241882] flags: 0x0(zone=0) [ 63.244964] page_type: f5(slab) [ 63.248138] raw: 00000000 cc85a700 00000122 00000000 00000000 80150015 f5000000 00000000 [ 63.256256] raw: 00000000 [ 63.258911] page dumped because: kasan: bad access detected [ 63.264526] [ 63.266021] Memory state around the buggy address: [ 63.270843] cc8b6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.277404] cc8b6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 63.283996] >cc8b6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 63.290557] ^ [ 63.294921] cc8b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.301513] cc8b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.308074] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 61.545806] ================================================================== [ 61.557067] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1e8/0x398 [ 61.564880] Read of size 1 at addr cc85a400 by task kunit_try_catch/267 [ 61.571563] [ 61.573059] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 61.573120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 61.573120] Hardware name: Generic DRA74X (Flattened Device Tree) [ 61.573150] Call trace: [ 61.573150] unwind_backtrace from show_stack+0x18/0x1c [ 61.573211] show_stack from dump_stack_lvl+0x70/0x90 [ 61.573242] dump_stack_lvl from print_report+0x158/0x528 [ 61.573272] print_report from kasan_report+0xdc/0x118 [ 61.573303] kasan_report from __kasan_check_byte+0x34/0x3c [ 61.573333] __kasan_check_byte from kmem_cache_destroy+0x24/0x1ec [ 61.573394] kmem_cache_destroy from kmem_cache_double_destroy+0x1e8/0x398 [ 61.573425] kmem_cache_double_destroy from kunit_try_run_case+0x22c/0x5a8 [ 61.573455] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.573516] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 61.573547] kthread from ret_from_fork+0x14/0x20 [ 61.573577] Exception stack(0xf23b3fb0 to 0xf23b3ff8) [ 61.573608] 3fa0: 00000000 00000000 00000000 00000000 [ 61.573638] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 61.573638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 61.573669] [ 61.693176] Allocated by task 267: [ 61.696624] kasan_save_track+0x30/0x5c [ 61.700469] __kasan_slab_alloc+0x60/0x68 [ 61.704528] kmem_cache_alloc_noprof+0x17c/0x36c [ 61.709167] __kmem_cache_create_args+0x1c0/0x2c0 [ 61.713928] kmem_cache_double_destroy+0xc0/0x398 [ 61.718658] kunit_try_run_case+0x22c/0x5a8 [ 61.722869] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.728393] kthread+0x464/0x810 [ 61.731658] ret_from_fork+0x14/0x20 [ 61.735260] [ 61.736755] Freed by task 267: [ 61.739837] kasan_save_track+0x30/0x5c [ 61.743713] kasan_save_free_info+0x3c/0x48 [ 61.747924] __kasan_slab_free+0x40/0x50 [ 61.751892] kmem_cache_free+0x100/0x470 [ 61.755828] kobject_put+0x21c/0x678 [ 61.759460] kmem_cache_double_destroy+0x168/0x398 [ 61.764282] kunit_try_run_case+0x22c/0x5a8 [ 61.768493] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.774017] kthread+0x464/0x810 [ 61.777282] ret_from_fork+0x14/0x20 [ 61.780883] [ 61.782379] The buggy address belongs to the object at cc85a400 [ 61.782379] which belongs to the cache kmem_cache of size 132 [ 61.794189] The buggy address is located 0 bytes inside of [ 61.794189] freed 132-byte region [cc85a400, cc85a484) [ 61.804962] [ 61.806457] The buggy address belongs to the physical page: [ 61.812072] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85a [ 61.819366] flags: 0x0(zone=0) [ 61.822448] page_type: f5(slab) [ 61.825592] raw: 00000000 c7001000 00000122 00000000 00000000 80100010 f5000000 00000000 [ 61.833740] raw: 00000000 [ 61.836395] page dumped because: kasan: bad access detected [ 61.841979] [ 61.843505] Memory state around the buggy address: [ 61.848327] cc85a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.854888] cc85a380: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.861450] >cc85a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.868041] ^ [ 61.870574] cc85a480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.877166] cc85a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.883728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 61.103240] ================================================================== [ 61.114898] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x430/0x550 [ 61.122131] Read of size 1 at addr cc896000 by task kunit_try_catch/265 [ 61.128814] [ 61.130310] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 61.130371] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 61.130371] Hardware name: Generic DRA74X (Flattened Device Tree) [ 61.130401] Call trace: [ 61.130401] unwind_backtrace from show_stack+0x18/0x1c [ 61.130462] show_stack from dump_stack_lvl+0x70/0x90 [ 61.130493] dump_stack_lvl from print_report+0x158/0x528 [ 61.130523] print_report from kasan_report+0xdc/0x118 [ 61.130554] kasan_report from kmem_cache_rcu_uaf+0x430/0x550 [ 61.130584] kmem_cache_rcu_uaf from kunit_try_run_case+0x22c/0x5a8 [ 61.130645] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.130676] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 61.130737] kthread from ret_from_fork+0x14/0x20 [ 61.130767] Exception stack(0xf23a3fb0 to 0xf23a3ff8) [ 61.130767] 3fa0: 00000000 00000000 00000000 00000000 [ 61.130798] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 61.130828] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 61.130828] [ 61.236816] Allocated by task 265: [ 61.240264] kasan_save_track+0x30/0x5c [ 61.244140] __kasan_slab_alloc+0x60/0x68 [ 61.248168] kmem_cache_alloc_noprof+0x17c/0x36c [ 61.252838] kmem_cache_rcu_uaf+0x174/0x550 [ 61.257080] kunit_try_run_case+0x22c/0x5a8 [ 61.261322] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.266845] kthread+0x464/0x810 [ 61.270111] ret_from_fork+0x14/0x20 [ 61.273742] [ 61.275238] Freed by task 22: [ 61.278228] kasan_save_track+0x30/0x5c [ 61.282104] kasan_save_free_info+0x3c/0x48 [ 61.286346] __kasan_slab_free+0x40/0x50 [ 61.290313] slab_free_after_rcu_debug+0xb0/0x290 [ 61.295043] rcu_core+0x84c/0x1aa4 [ 61.298492] handle_softirqs+0x3d8/0xc7c [ 61.302459] run_ksoftirqd+0x7c/0x9c [ 61.306091] smpboot_thread_fn+0x46c/0xa68 [ 61.310241] kthread+0x464/0x810 [ 61.313507] ret_from_fork+0x14/0x20 [ 61.317108] [ 61.318603] Last potentially related work creation: [ 61.323516] kasan_save_stack+0x30/0x4c [ 61.327392] kasan_record_aux_stack+0x80/0x88 [ 61.331817] kmem_cache_free+0x1f0/0x470 [ 61.335784] kmem_cache_rcu_uaf+0x1b8/0x550 [ 61.339996] kunit_try_run_case+0x22c/0x5a8 [ 61.344238] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.349792] kthread+0x464/0x810 [ 61.353057] ret_from_fork+0x14/0x20 [ 61.356658] [ 61.358154] The buggy address belongs to the object at cc896000 [ 61.358154] which belongs to the cache test_cache of size 200 [ 61.369995] The buggy address is located 0 bytes inside of [ 61.369995] freed 200-byte region [cc896000, cc8960c8) [ 61.380767] [ 61.382293] The buggy address belongs to the physical page: [ 61.387908] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c896 [ 61.395172] flags: 0x0(zone=0) [ 61.398284] page_type: f5(slab) [ 61.401458] raw: 00000000 cc85a300 00000122 00000000 00000000 800f000f f5000000 00000000 [ 61.409606] raw: 00000000 [ 61.412261] page dumped because: kasan: bad access detected [ 61.417877] [ 61.419372] Memory state around the buggy address: [ 61.424224] cc895f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 61.430786] cc895f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 61.437377] >cc896000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.443969] ^ [ 61.446502] cc896080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 61.453094] cc896100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.459686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 60.631805] ================================================================== [ 60.643371] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x200/0x4c0 [ 60.650421] Free of addr cc85e001 by task kunit_try_catch/263 [ 60.656188] [ 60.657714] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 60.657745] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.657745] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.657745] Call trace: [ 60.657775] unwind_backtrace from show_stack+0x18/0x1c [ 60.657806] show_stack from dump_stack_lvl+0x70/0x90 [ 60.657806] dump_stack_lvl from print_report+0x158/0x528 [ 60.657836] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 60.657867] kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8 [ 60.657897] check_slab_allocation from kmem_cache_free+0x1c0/0x470 [ 60.657928] kmem_cache_free from kmem_cache_invalid_free+0x200/0x4c0 [ 60.657928] kmem_cache_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 60.657958] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.657989] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.658020] kthread from ret_from_fork+0x14/0x20 [ 60.658050] Exception stack(0xf2393fb0 to 0xf2393ff8) [ 60.658050] 3fa0: 00000000 00000000 00000000 00000000 [ 60.658081] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.658081] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.658111] [ 60.779479] Allocated by task 263: [ 60.782928] kasan_save_track+0x30/0x5c [ 60.786804] __kasan_slab_alloc+0x60/0x68 [ 60.790832] kmem_cache_alloc_noprof+0x17c/0x36c [ 60.795471] kmem_cache_invalid_free+0x16c/0x4c0 [ 60.800140] kunit_try_run_case+0x22c/0x5a8 [ 60.804351] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.809875] kthread+0x464/0x810 [ 60.813140] ret_from_fork+0x14/0x20 [ 60.816741] [ 60.818237] The buggy address belongs to the object at cc85e000 [ 60.818237] which belongs to the cache test_cache of size 200 [ 60.830078] The buggy address is located 1 bytes inside of [ 60.830078] 200-byte region [cc85e000, cc85e0c8) [ 60.840301] [ 60.841796] The buggy address belongs to the physical page: [ 60.847412] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85e [ 60.854705] flags: 0x0(zone=0) [ 60.857757] page_type: f5(slab) [ 60.860931] raw: 00000000 cc85a200 00000122 00000000 00000000 800f000f f5000000 00000000 [ 60.869079] raw: 00000000 [ 60.871734] page dumped because: kasan: bad access detected [ 60.877319] [ 60.878845] Memory state around the buggy address: [ 60.883666] cc85df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.890228] cc85df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.896789] >cc85e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.903381] ^ [ 60.905914] cc85e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 60.912506] cc85e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.919067] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 60.289825] ================================================================== [ 60.300720] BUG: KASAN: double-free in kmem_cache_double_free+0x208/0x4bc [ 60.307586] Free of addr cc85d000 by task kunit_try_catch/261 [ 60.313354] [ 60.314880] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 60.314910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.314941] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.314941] Call trace: [ 60.314941] unwind_backtrace from show_stack+0x18/0x1c [ 60.315002] show_stack from dump_stack_lvl+0x70/0x90 [ 60.315032] dump_stack_lvl from print_report+0x158/0x528 [ 60.315063] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 60.315093] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 60.315124] check_slab_allocation from kmem_cache_free+0xe0/0x470 [ 60.315155] kmem_cache_free from kmem_cache_double_free+0x208/0x4bc [ 60.315185] kmem_cache_double_free from kunit_try_run_case+0x22c/0x5a8 [ 60.315216] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.315246] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.315277] kthread from ret_from_fork+0x14/0x20 [ 60.315307] Exception stack(0xf2383fb0 to 0xf2383ff8) [ 60.315307] 3fa0: 00000000 00000000 00000000 00000000 [ 60.315338] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.315368] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.315368] [ 60.436523] Allocated by task 261: [ 60.439971] kasan_save_track+0x30/0x5c [ 60.443847] __kasan_slab_alloc+0x60/0x68 [ 60.447875] kmem_cache_alloc_noprof+0x17c/0x36c [ 60.452545] kmem_cache_double_free+0x16c/0x4bc [ 60.457122] kunit_try_run_case+0x22c/0x5a8 [ 60.461334] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.466888] kthread+0x464/0x810 [ 60.470153] ret_from_fork+0x14/0x20 [ 60.473754] [ 60.475250] Freed by task 261: [ 60.478332] kasan_save_track+0x30/0x5c [ 60.482208] kasan_save_free_info+0x3c/0x48 [ 60.486419] __kasan_slab_free+0x40/0x50 [ 60.490386] kmem_cache_free+0x100/0x470 [ 60.494354] kmem_cache_double_free+0x184/0x4bc [ 60.498931] kunit_try_run_case+0x22c/0x5a8 [ 60.503143] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.508697] kthread+0x464/0x810 [ 60.511962] ret_from_fork+0x14/0x20 [ 60.515563] [ 60.517059] The buggy address belongs to the object at cc85d000 [ 60.517059] which belongs to the cache test_cache of size 200 [ 60.528900] The buggy address is located 0 bytes inside of [ 60.528900] 200-byte region [cc85d000, cc85d0c8) [ 60.539123] [ 60.540649] The buggy address belongs to the physical page: [ 60.546264] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85d [ 60.553527] flags: 0x0(zone=0) [ 60.556610] page_type: f5(slab) [ 60.559814] raw: 00000000 cc85a100 00000122 00000000 00000000 800f000f f5000000 00000000 [ 60.567962] raw: 00000000 [ 60.570587] page dumped because: kasan: bad access detected [ 60.576202] [ 60.577697] Memory state around the buggy address: [ 60.582550] cc85cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.589111] cc85cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.595703] >cc85d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.602264] ^ [ 60.604827] cc85d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 60.611389] cc85d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.617980] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 59.987060] ================================================================== [ 59.997924] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3e0/0x524 [ 60.004699] Read of size 1 at addr cc85c0c8 by task kunit_try_catch/259 [ 60.011352] [ 60.012878] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 60.012908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.012939] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.012939] Call trace: [ 60.012939] unwind_backtrace from show_stack+0x18/0x1c [ 60.013000] show_stack from dump_stack_lvl+0x70/0x90 [ 60.013031] dump_stack_lvl from print_report+0x158/0x528 [ 60.013061] print_report from kasan_report+0xdc/0x118 [ 60.013092] kasan_report from kmem_cache_oob+0x3e0/0x524 [ 60.013092] kmem_cache_oob from kunit_try_run_case+0x22c/0x5a8 [ 60.013153] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.013183] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.013214] kthread from ret_from_fork+0x14/0x20 [ 60.013244] Exception stack(0xf2373fb0 to 0xf2373ff8) [ 60.013244] 3fa0: 00000000 00000000 00000000 00000000 [ 60.013275] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.013305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.013305] [ 60.118560] Allocated by task 259: [ 60.121978] kasan_save_track+0x30/0x5c [ 60.125854] __kasan_slab_alloc+0x60/0x68 [ 60.129913] kmem_cache_alloc_noprof+0x17c/0x36c [ 60.134582] kmem_cache_oob+0x170/0x524 [ 60.138458] kunit_try_run_case+0x22c/0x5a8 [ 60.142669] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.148193] kthread+0x464/0x810 [ 60.151458] ret_from_fork+0x14/0x20 [ 60.155090] [ 60.156585] The buggy address belongs to the object at cc85c000 [ 60.156585] which belongs to the cache test_cache of size 200 [ 60.168395] The buggy address is located 0 bytes to the right of [ 60.168395] allocated 200-byte region [cc85c000, cc85c0c8) [ 60.180053] [ 60.181549] The buggy address belongs to the physical page: [ 60.187164] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85c [ 60.194458] flags: 0x0(zone=0) [ 60.197540] page_type: f5(slab) [ 60.200714] raw: 00000000 cc85a000 00000122 00000000 00000000 800f000f f5000000 00000000 [ 60.208862] raw: 00000000 [ 60.211486] page dumped because: kasan: bad access detected [ 60.217102] [ 60.218627] Memory state around the buggy address: [ 60.223449] cc85bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.230010] cc85c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.236602] >cc85c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 60.243164] ^ [ 60.248077] cc85c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.254669] cc85c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.261230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 59.628509] ================================================================== [ 59.638763] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x580/0x5b8 [ 59.645538] Read of size 4 at addr cc859080 by task kunit_try_catch/252 [ 59.652191] [ 59.653686] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 59.653717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.653747] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.653747] Call trace: [ 59.653747] unwind_backtrace from show_stack+0x18/0x1c [ 59.653778] show_stack from dump_stack_lvl+0x70/0x90 [ 59.653808] dump_stack_lvl from print_report+0x158/0x528 [ 59.653839] print_report from kasan_report+0xdc/0x118 [ 59.653869] kasan_report from workqueue_uaf+0x580/0x5b8 [ 59.653869] workqueue_uaf from kunit_try_run_case+0x22c/0x5a8 [ 59.653900] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.653930] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 59.653961] kthread from ret_from_fork+0x14/0x20 [ 59.653991] Exception stack(0xf181bfb0 to 0xf181bff8) [ 59.653991] bfa0: 00000000 00000000 00000000 00000000 [ 59.654022] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.654022] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.654052] [ 59.759094] Allocated by task 252: [ 59.762512] kasan_save_track+0x30/0x5c [ 59.766387] __kasan_kmalloc+0x8c/0x94 [ 59.770172] workqueue_uaf+0x184/0x5b8 [ 59.773925] kunit_try_run_case+0x22c/0x5a8 [ 59.778167] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.783691] kthread+0x464/0x810 [ 59.786926] ret_from_fork+0x14/0x20 [ 59.790557] [ 59.792053] Freed by task 81: [ 59.795043] kasan_save_track+0x30/0x5c [ 59.798889] kasan_save_free_info+0x3c/0x48 [ 59.803131] __kasan_slab_free+0x40/0x50 [ 59.807067] kfree+0xe8/0x384 [ 59.810058] process_one_work+0x7dc/0x1304 [ 59.814208] worker_thread+0xb98/0x1658 [ 59.818084] kthread+0x464/0x810 [ 59.821319] ret_from_fork+0x14/0x20 [ 59.824920] [ 59.826446] Last potentially related work creation: [ 59.831329] kasan_save_stack+0x30/0x4c [ 59.835205] kasan_record_aux_stack+0x80/0x88 [ 59.839599] __queue_work+0x878/0x1780 [ 59.843383] queue_work_on+0xbc/0xc0 [ 59.846984] workqueue_uaf+0x2e4/0x5b8 [ 59.850769] kunit_try_run_case+0x22c/0x5a8 [ 59.854980] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.860504] kthread+0x464/0x810 [ 59.863769] ret_from_fork+0x14/0x20 [ 59.867370] [ 59.868865] The buggy address belongs to the object at cc859080 [ 59.868865] which belongs to the cache kmalloc-64 of size 64 [ 59.880615] The buggy address is located 0 bytes inside of [ 59.880615] freed 64-byte region [cc859080, cc8590c0) [ 59.891265] [ 59.892791] The buggy address belongs to the physical page: [ 59.898376] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c859 [ 59.905670] flags: 0x0(zone=0) [ 59.908752] page_type: f5(slab) [ 59.911926] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 59.920043] raw: 00000000 [ 59.922698] page dumped because: kasan: bad access detected [ 59.928314] [ 59.929809] Memory state around the buggy address: [ 59.934631] cc858f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.941192] cc859000: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc [ 59.947784] >cc859080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.954345] ^ [ 59.956878] cc859100: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.963470] cc859180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.970031] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 59.263244] ================================================================== [ 59.273681] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x5c/0x60 [ 59.280456] Read of size 4 at addr cc797a80 by task ksoftirqd/0/14 [ 59.286682] [ 59.288208] CPU: 0 UID: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 59.288238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.288269] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.288269] Call trace: [ 59.288299] unwind_backtrace from show_stack+0x18/0x1c [ 59.288330] show_stack from dump_stack_lvl+0x70/0x90 [ 59.288360] dump_stack_lvl from print_report+0x158/0x528 [ 59.288391] print_report from kasan_report+0xdc/0x118 [ 59.288421] kasan_report from rcu_uaf_reclaim+0x5c/0x60 [ 59.288482] rcu_uaf_reclaim from rcu_core+0x84c/0x1aa4 [ 59.288513] rcu_core from handle_softirqs+0x3d8/0xc7c [ 59.288543] handle_softirqs from run_ksoftirqd+0x7c/0x9c [ 59.288574] run_ksoftirqd from smpboot_thread_fn+0x46c/0xa68 [ 59.288604] smpboot_thread_fn from kthread+0x464/0x810 [ 59.288635] kthread from ret_from_fork+0x14/0x20 [ 59.288665] Exception stack(0xf007bfb0 to 0xf007bff8) [ 59.288696] bfa0: 00000000 00000000 00000000 00000000 [ 59.288696] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.288726] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.288757] [ 59.400054] Allocated by task 250: [ 59.403503] kasan_save_track+0x30/0x5c [ 59.407379] __kasan_kmalloc+0x8c/0x94 [ 59.411163] rcu_uaf+0xd0/0x354 [ 59.414337] kunit_try_run_case+0x22c/0x5a8 [ 59.418579] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.424133] kthread+0x464/0x810 [ 59.427398] ret_from_fork+0x14/0x20 [ 59.430999] [ 59.432525] Freed by task 14: [ 59.435516] kasan_save_track+0x30/0x5c [ 59.439392] kasan_save_free_info+0x3c/0x48 [ 59.443603] __kasan_slab_free+0x40/0x50 [ 59.447570] kfree+0xe8/0x384 [ 59.450592] rcu_uaf_reclaim+0x1c/0x60 [ 59.454376] rcu_core+0x84c/0x1aa4 [ 59.457824] handle_softirqs+0x3d8/0xc7c [ 59.461791] run_ksoftirqd+0x7c/0x9c [ 59.465393] smpboot_thread_fn+0x46c/0xa68 [ 59.469543] kthread+0x464/0x810 [ 59.472808] ret_from_fork+0x14/0x20 [ 59.476409] [ 59.477935] Last potentially related work creation: [ 59.482849] kasan_save_stack+0x30/0x4c [ 59.486724] kasan_record_aux_stack+0x80/0x88 [ 59.491119] __call_rcu_common.constprop.0+0x98/0xb80 [ 59.496215] rcu_uaf+0x1a4/0x354 [ 59.499481] kunit_try_run_case+0x22c/0x5a8 [ 59.503723] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.509277] kthread+0x464/0x810 [ 59.512542] ret_from_fork+0x14/0x20 [ 59.516143] [ 59.517669] The buggy address belongs to the object at cc797a80 [ 59.517669] which belongs to the cache kmalloc-64 of size 64 [ 59.529388] The buggy address is located 0 bytes inside of [ 59.529388] freed 64-byte region [cc797a80, cc797ac0) [ 59.540100] [ 59.541595] The buggy address belongs to the physical page: [ 59.547210] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 59.554504] flags: 0x0(zone=0) [ 59.557586] page_type: f5(slab) [ 59.560760] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 59.568908] raw: 00000000 [ 59.571563] page dumped because: kasan: bad access detected [ 59.577178] [ 59.578704] Memory state around the buggy address: [ 59.583526] cc797980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.590118] cc797a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.596679] >cc797a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.603271] ^ [ 59.605834] cc797b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.612426] cc797b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.618988] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 58.919952] ================================================================== [ 58.927246] BUG: KASAN: slab-use-after-free in ksize_uaf+0x68c/0x740 [ 58.933624] Read of size 1 at addr cc78ef78 by task kunit_try_catch/248 [ 58.940307] [ 58.941802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 58.941833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.941833] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.941833] Call trace: [ 58.941864] unwind_backtrace from show_stack+0x18/0x1c [ 58.941894] show_stack from dump_stack_lvl+0x70/0x90 [ 58.941894] dump_stack_lvl from print_report+0x158/0x528 [ 58.941925] print_report from kasan_report+0xdc/0x118 [ 58.941955] kasan_report from ksize_uaf+0x68c/0x740 [ 58.941986] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.941986] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.942016] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.942047] kthread from ret_from_fork+0x14/0x20 [ 58.942077] Exception stack(0xf2333fb0 to 0xf2333ff8) [ 58.942077] 3fa0: 00000000 00000000 00000000 00000000 [ 58.942108] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.942108] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.942138] [ 59.046478] Allocated by task 248: [ 59.049896] kasan_save_track+0x30/0x5c [ 59.053771] __kasan_kmalloc+0x8c/0x94 [ 59.057556] ksize_uaf+0xd0/0x740 [ 59.060882] kunit_try_run_case+0x22c/0x5a8 [ 59.065093] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.070648] kthread+0x464/0x810 [ 59.073883] ret_from_fork+0x14/0x20 [ 59.077484] [ 59.079010] Freed by task 248: [ 59.082061] kasan_save_track+0x30/0x5c [ 59.085937] kasan_save_free_info+0x3c/0x48 [ 59.090148] __kasan_slab_free+0x40/0x50 [ 59.094116] kfree+0xe8/0x384 [ 59.097106] ksize_uaf+0x174/0x740 [ 59.100524] kunit_try_run_case+0x22c/0x5a8 [ 59.104736] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.110290] kthread+0x464/0x810 [ 59.113525] ret_from_fork+0x14/0x20 [ 59.117126] [ 59.118621] The buggy address belongs to the object at cc78ef00 [ 59.118621] which belongs to the cache kmalloc-128 of size 128 [ 59.130523] The buggy address is located 120 bytes inside of [ 59.130523] freed 128-byte region [cc78ef00, cc78ef80) [ 59.141479] [ 59.142974] The buggy address belongs to the physical page: [ 59.148590] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 59.155853] flags: 0x0(zone=0) [ 59.158935] page_type: f5(slab) [ 59.162109] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 59.170227] raw: 00000000 [ 59.172882] page dumped because: kasan: bad access detected [ 59.178497] [ 59.179992] Memory state around the buggy address: [ 59.184814] cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.191375] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.197967] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.204528] ^ [ 59.210998] cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.217559] cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.224151] ================================================================== [ 58.612335] ================================================================== [ 58.619598] BUG: KASAN: slab-use-after-free in ksize_uaf+0x6c8/0x740 [ 58.626007] Read of size 1 at addr cc78ef00 by task kunit_try_catch/248 [ 58.632659] [ 58.634155] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 58.634185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.634216] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.634216] Call trace: [ 58.634216] unwind_backtrace from show_stack+0x18/0x1c [ 58.634246] show_stack from dump_stack_lvl+0x70/0x90 [ 58.634277] dump_stack_lvl from print_report+0x158/0x528 [ 58.634307] print_report from kasan_report+0xdc/0x118 [ 58.634307] kasan_report from ksize_uaf+0x6c8/0x740 [ 58.634338] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.634368] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.634399] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.634429] kthread from ret_from_fork+0x14/0x20 [ 58.634429] Exception stack(0xf2333fb0 to 0xf2333ff8) [ 58.634460] 3fa0: 00000000 00000000 00000000 00000000 [ 58.634460] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.634490] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.634490] [ 58.738830] Allocated by task 248: [ 58.742279] kasan_save_track+0x30/0x5c [ 58.746124] __kasan_kmalloc+0x8c/0x94 [ 58.749908] ksize_uaf+0xd0/0x740 [ 58.753265] kunit_try_run_case+0x22c/0x5a8 [ 58.757476] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.763000] kthread+0x464/0x810 [ 58.766265] ret_from_fork+0x14/0x20 [ 58.769866] [ 58.771362] Freed by task 248: [ 58.774444] kasan_save_track+0x30/0x5c [ 58.778320] kasan_save_free_info+0x3c/0x48 [ 58.782531] __kasan_slab_free+0x40/0x50 [ 58.786468] kfree+0xe8/0x384 [ 58.789459] ksize_uaf+0x174/0x740 [ 58.792907] kunit_try_run_case+0x22c/0x5a8 [ 58.797119] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.802642] kthread+0x464/0x810 [ 58.805908] ret_from_fork+0x14/0x20 [ 58.809509] [ 58.811004] The buggy address belongs to the object at cc78ef00 [ 58.811004] which belongs to the cache kmalloc-128 of size 128 [ 58.822906] The buggy address is located 0 bytes inside of [ 58.822906] freed 128-byte region [cc78ef00, cc78ef80) [ 58.833679] [ 58.835174] The buggy address belongs to the physical page: [ 58.840789] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 58.848052] flags: 0x0(zone=0) [ 58.851135] page_type: f5(slab) [ 58.854309] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.862426] raw: 00000000 [ 58.865081] page dumped because: kasan: bad access detected [ 58.870697] [ 58.872192] Memory state around the buggy address: [ 58.877014] cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.883575] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.890167] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.896728] ^ [ 58.899261] cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.905853] cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.912414] ================================================================== [ 58.290374] ================================================================== [ 58.301940] BUG: KASAN: slab-use-after-free in ksize_uaf+0x1f0/0x740 [ 58.308349] Read of size 1 at addr cc78ef00 by task kunit_try_catch/248 [ 58.315002] [ 58.316497] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 58.316528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.316558] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.316558] Call trace: [ 58.316558] unwind_backtrace from show_stack+0x18/0x1c [ 58.316589] show_stack from dump_stack_lvl+0x70/0x90 [ 58.316619] dump_stack_lvl from print_report+0x158/0x528 [ 58.316650] print_report from kasan_report+0xdc/0x118 [ 58.316650] kasan_report from __kasan_check_byte+0x34/0x3c [ 58.316680] __kasan_check_byte from ksize+0x20/0x3c [ 58.316711] ksize from ksize_uaf+0x1f0/0x740 [ 58.316711] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.316741] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.316772] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.316802] kthread from ret_from_fork+0x14/0x20 [ 58.316833] Exception stack(0xf2333fb0 to 0xf2333ff8) [ 58.316833] 3fa0: 00000000 00000000 00000000 00000000 [ 58.316864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.316864] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.316894] [ 58.431213] Allocated by task 248: [ 58.434631] kasan_save_track+0x30/0x5c [ 58.438507] __kasan_kmalloc+0x8c/0x94 [ 58.442260] ksize_uaf+0xd0/0x740 [ 58.445617] kunit_try_run_case+0x22c/0x5a8 [ 58.449829] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.455352] kthread+0x464/0x810 [ 58.458618] ret_from_fork+0x14/0x20 [ 58.462219] [ 58.463714] Freed by task 248: [ 58.466796] kasan_save_track+0x30/0x5c [ 58.470672] kasan_save_free_info+0x3c/0x48 [ 58.474884] __kasan_slab_free+0x40/0x50 [ 58.478820] kfree+0xe8/0x384 [ 58.481842] ksize_uaf+0x174/0x740 [ 58.485260] kunit_try_run_case+0x22c/0x5a8 [ 58.489471] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.495025] kthread+0x464/0x810 [ 58.498260] ret_from_fork+0x14/0x20 [ 58.501861] [ 58.503387] The buggy address belongs to the object at cc78ef00 [ 58.503387] which belongs to the cache kmalloc-128 of size 128 [ 58.515258] The buggy address is located 0 bytes inside of [ 58.515258] freed 128-byte region [cc78ef00, cc78ef80) [ 58.526031] [ 58.527526] The buggy address belongs to the physical page: [ 58.533142] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 58.540405] flags: 0x0(zone=0) [ 58.543487] page_type: f5(slab) [ 58.546661] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.554809] raw: 00000000 [ 58.557434] page dumped because: kasan: bad access detected [ 58.563049] [ 58.564544] Memory state around the buggy address: [ 58.569366] cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.575958] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.582519] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.589080] ^ [ 58.591644] cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.598205] cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.604766] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 57.735504] ================================================================== [ 57.742767] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908 [ 57.750213] Read of size 1 at addr cc78ee78 by task kunit_try_catch/246 [ 57.756896] [ 57.758392] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 57.758422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.758422] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.758422] Call trace: [ 57.758453] unwind_backtrace from show_stack+0x18/0x1c [ 57.758453] show_stack from dump_stack_lvl+0x70/0x90 [ 57.758483] dump_stack_lvl from print_report+0x158/0x528 [ 57.758514] print_report from kasan_report+0xdc/0x118 [ 57.758544] kasan_report from ksize_unpoisons_memory+0x7f0/0x908 [ 57.758575] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 57.758575] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.758605] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.758636] kthread from ret_from_fork+0x14/0x20 [ 57.758666] Exception stack(0xf232bfb0 to 0xf232bff8) [ 57.758666] bfa0: 00000000 00000000 00000000 00000000 [ 57.758697] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.758697] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.758728] [ 57.865325] Allocated by task 246: [ 57.868743] kasan_save_track+0x30/0x5c [ 57.872619] __kasan_kmalloc+0x8c/0x94 [ 57.876403] ksize_unpoisons_memory+0xe8/0x908 [ 57.880889] kunit_try_run_case+0x22c/0x5a8 [ 57.885101] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.890624] kthread+0x464/0x810 [ 57.893890] ret_from_fork+0x14/0x20 [ 57.897491] [ 57.898986] The buggy address belongs to the object at cc78ee00 [ 57.898986] which belongs to the cache kmalloc-128 of size 128 [ 57.910888] The buggy address is located 5 bytes to the right of [ 57.910888] allocated 115-byte region [cc78ee00, cc78ee73) [ 57.922546] [ 57.924041] The buggy address belongs to the physical page: [ 57.929626] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 57.936920] flags: 0x0(zone=0) [ 57.939971] page_type: f5(slab) [ 57.943145] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 57.951293] raw: 00000000 [ 57.953948] page dumped because: kasan: bad access detected [ 57.959533] [ 57.961059] Memory state around the buggy address: [ 57.965881] cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.972442] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.979003] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 57.985565] ^ [ 57.992065] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.998626] cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.005187] ================================================================== [ 57.454284] ================================================================== [ 57.465759] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908 [ 57.473205] Read of size 1 at addr cc78ee73 by task kunit_try_catch/246 [ 57.479858] [ 57.481384] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 57.481414] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.481414] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.481414] Call trace: [ 57.481445] unwind_backtrace from show_stack+0x18/0x1c [ 57.481445] show_stack from dump_stack_lvl+0x70/0x90 [ 57.481475] dump_stack_lvl from print_report+0x158/0x528 [ 57.481506] print_report from kasan_report+0xdc/0x118 [ 57.481536] kasan_report from ksize_unpoisons_memory+0x7f8/0x908 [ 57.481567] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 57.481567] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.481597] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.481628] kthread from ret_from_fork+0x14/0x20 [ 57.481658] Exception stack(0xf232bfb0 to 0xf232bff8) [ 57.481658] bfa0: 00000000 00000000 00000000 00000000 [ 57.481689] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.481689] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.481719] [ 57.588317] Allocated by task 246: [ 57.591766] kasan_save_track+0x30/0x5c [ 57.595611] __kasan_kmalloc+0x8c/0x94 [ 57.599395] ksize_unpoisons_memory+0xe8/0x908 [ 57.603881] kunit_try_run_case+0x22c/0x5a8 [ 57.608093] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.613616] kthread+0x464/0x810 [ 57.616882] ret_from_fork+0x14/0x20 [ 57.620483] [ 57.621978] The buggy address belongs to the object at cc78ee00 [ 57.621978] which belongs to the cache kmalloc-128 of size 128 [ 57.633880] The buggy address is located 0 bytes to the right of [ 57.633880] allocated 115-byte region [cc78ee00, cc78ee73) [ 57.645538] [ 57.647033] The buggy address belongs to the physical page: [ 57.652618] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 57.659912] flags: 0x0(zone=0) [ 57.662994] page_type: f5(slab) [ 57.666137] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 57.674285] raw: 00000000 [ 57.676940] page dumped because: kasan: bad access detected [ 57.682556] [ 57.684051] Memory state around the buggy address: [ 57.688873] cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.695434] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.702026] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 57.708587] ^ [ 57.714813] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.721374] cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.727935] ================================================================== [ 58.012603] ================================================================== [ 58.019866] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908 [ 58.027313] Read of size 1 at addr cc78ee7f by task kunit_try_catch/246 [ 58.033966] [ 58.035461] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 58.035491] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.035522] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.035522] Call trace: [ 58.035522] unwind_backtrace from show_stack+0x18/0x1c [ 58.035552] show_stack from dump_stack_lvl+0x70/0x90 [ 58.035583] dump_stack_lvl from print_report+0x158/0x528 [ 58.035614] print_report from kasan_report+0xdc/0x118 [ 58.035614] kasan_report from ksize_unpoisons_memory+0x858/0x908 [ 58.035644] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 58.035675] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.035705] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.035736] kthread from ret_from_fork+0x14/0x20 [ 58.035736] Exception stack(0xf232bfb0 to 0xf232bff8) [ 58.035766] bfa0: 00000000 00000000 00000000 00000000 [ 58.035766] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.035797] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.035797] [ 58.142425] Allocated by task 246: [ 58.145843] kasan_save_track+0x30/0x5c [ 58.149719] __kasan_kmalloc+0x8c/0x94 [ 58.153503] ksize_unpoisons_memory+0xe8/0x908 [ 58.157958] kunit_try_run_case+0x22c/0x5a8 [ 58.162200] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.167724] kthread+0x464/0x810 [ 58.170959] ret_from_fork+0x14/0x20 [ 58.174591] [ 58.176086] The buggy address belongs to the object at cc78ee00 [ 58.176086] which belongs to the cache kmalloc-128 of size 128 [ 58.187988] The buggy address is located 12 bytes to the right of [ 58.187988] allocated 115-byte region [cc78ee00, cc78ee73) [ 58.199707] [ 58.201202] The buggy address belongs to the physical page: [ 58.206817] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 58.214080] flags: 0x0(zone=0) [ 58.217163] page_type: f5(slab) [ 58.220336] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.228454] raw: 00000000 [ 58.231109] page dumped because: kasan: bad access detected [ 58.236724] [ 58.238220] Memory state around the buggy address: [ 58.243041] cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.249603] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.256164] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 58.262756] ^ [ 58.269226] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.275787] cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.282379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmalloc_double_kzfree
[ 57.130401] ================================================================== [ 57.137664] BUG: KASAN: double-free in kmalloc_double_kzfree+0x1f4/0x3a8 [ 57.144439] Free of addr cc797880 by task kunit_try_catch/244 [ 57.150207] [ 57.151733] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 57.151733] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.151763] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.151763] Call trace: [ 57.151763] unwind_backtrace from show_stack+0x18/0x1c [ 57.151794] show_stack from dump_stack_lvl+0x70/0x90 [ 57.151824] dump_stack_lvl from print_report+0x158/0x528 [ 57.151855] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 57.151885] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 57.151885] check_slab_allocation from kfree+0xc8/0x384 [ 57.151916] kfree from kmalloc_double_kzfree+0x1f4/0x3a8 [ 57.151947] kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8 [ 57.151977] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.152008] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.152038] kthread from ret_from_fork+0x14/0x20 [ 57.152038] Exception stack(0xf2323fb0 to 0xf2323ff8) [ 57.152069] 3fa0: 00000000 00000000 00000000 00000000 [ 57.152069] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.152099] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.152099] [ 57.271301] Allocated by task 244: [ 57.274719] kasan_save_track+0x30/0x5c [ 57.278594] __kasan_kmalloc+0x8c/0x94 [ 57.282379] kmalloc_double_kzfree+0xcc/0x3a8 [ 57.286743] kunit_try_run_case+0x22c/0x5a8 [ 57.290985] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.296508] kthread+0x464/0x810 [ 57.299774] ret_from_fork+0x14/0x20 [ 57.303375] [ 57.304870] Freed by task 244: [ 57.307952] kasan_save_track+0x30/0x5c [ 57.311798] kasan_save_free_info+0x3c/0x48 [ 57.316040] __kasan_slab_free+0x40/0x50 [ 57.319976] kfree+0xe8/0x384 [ 57.322967] kmalloc_double_kzfree+0x174/0x3a8 [ 57.327453] kunit_try_run_case+0x22c/0x5a8 [ 57.331665] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.337188] kthread+0x464/0x810 [ 57.340454] ret_from_fork+0x14/0x20 [ 57.344055] [ 57.345550] The buggy address belongs to the object at cc797880 [ 57.345550] which belongs to the cache kmalloc-64 of size 64 [ 57.357299] The buggy address is located 0 bytes inside of [ 57.357299] 64-byte region [cc797880, cc7978c0) [ 57.367431] [ 57.368927] The buggy address belongs to the physical page: [ 57.374542] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 57.381805] flags: 0x0(zone=0) [ 57.384887] page_type: f5(slab) [ 57.388061] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 57.396209] raw: 00000000 [ 57.398834] page dumped because: kasan: bad access detected [ 57.404449] [ 57.405944] Memory state around the buggy address: [ 57.410766] cc797780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.417358] cc797800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.423919] >cc797880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.430480] ^ [ 57.433044] cc797900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.439605] cc797980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.446166] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 53.201721] ================================================================== [ 53.212402] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x4b0/0x520 [ 53.219177] Write of size 16 at addr cc796680 by task kunit_try_catch/218 [ 53.226013] [ 53.227508] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 53.227539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.227539] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.227539] Call trace: [ 53.227569] unwind_backtrace from show_stack+0x18/0x1c [ 53.227569] show_stack from dump_stack_lvl+0x70/0x90 [ 53.227600] dump_stack_lvl from print_report+0x158/0x528 [ 53.227630] print_report from kasan_report+0xdc/0x118 [ 53.227661] kasan_report from kmalloc_oob_16+0x4b0/0x520 [ 53.227661] kmalloc_oob_16 from kunit_try_run_case+0x22c/0x5a8 [ 53.227691] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.227722] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.227752] kthread from ret_from_fork+0x14/0x20 [ 53.227783] Exception stack(0xf2253fb0 to 0xf2253ff8) [ 53.227783] 3fa0: 00000000 00000000 00000000 00000000 [ 53.227813] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.227813] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.227813] [ 53.333038] Allocated by task 218: [ 53.336486] kasan_save_track+0x30/0x5c [ 53.340332] __kasan_kmalloc+0x8c/0x94 [ 53.344116] kmalloc_oob_16+0xcc/0x520 [ 53.347900] kunit_try_run_case+0x22c/0x5a8 [ 53.352111] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.357635] kthread+0x464/0x810 [ 53.360900] ret_from_fork+0x14/0x20 [ 53.364501] [ 53.365997] The buggy address belongs to the object at cc796680 [ 53.365997] which belongs to the cache kmalloc-64 of size 64 [ 53.377716] The buggy address is located 0 bytes inside of [ 53.377716] allocated 13-byte region [cc796680, cc79668d) [ 53.388732] [ 53.390258] The buggy address belongs to the physical page: [ 53.395843] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c796 [ 53.403137] flags: 0x0(zone=0) [ 53.406188] page_type: f5(slab) [ 53.409362] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 53.417510] raw: 00000000 [ 53.420166] page dumped because: kasan: bad access detected [ 53.425750] [ 53.427246] Memory state around the buggy address: [ 53.432098] cc796580: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.438659] cc796600: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.445220] >cc796680: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.451782] ^ [ 53.454620] cc796700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.461181] cc796780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.467742] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 56.798736] ================================================================== [ 56.813262] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x1f4/0x3a8 [ 56.820709] Read of size 1 at addr cc797880 by task kunit_try_catch/244 [ 56.827392] [ 56.828887] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 56.828918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 56.828918] Hardware name: Generic DRA74X (Flattened Device Tree) [ 56.828918] Call trace: [ 56.828948] unwind_backtrace from show_stack+0x18/0x1c [ 56.828979] show_stack from dump_stack_lvl+0x70/0x90 [ 56.828979] dump_stack_lvl from print_report+0x158/0x528 [ 56.829010] print_report from kasan_report+0xdc/0x118 [ 56.829040] kasan_report from __kasan_check_byte+0x34/0x3c [ 56.829071] __kasan_check_byte from kfree_sensitive+0x20/0x6c [ 56.829071] kfree_sensitive from kmalloc_double_kzfree+0x1f4/0x3a8 [ 56.829101] kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8 [ 56.829132] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.829162] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 56.829193] kthread from ret_from_fork+0x14/0x20 [ 56.829223] Exception stack(0xf2323fb0 to 0xf2323ff8) [ 56.829223] 3fa0: 00000000 00000000 00000000 00000000 [ 56.829254] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 56.829254] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 56.829254] [ 56.947418] Allocated by task 244: [ 56.950836] kasan_save_track+0x30/0x5c [ 56.954711] __kasan_kmalloc+0x8c/0x94 [ 56.958496] kmalloc_double_kzfree+0xcc/0x3a8 [ 56.962890] kunit_try_run_case+0x22c/0x5a8 [ 56.967102] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.972625] kthread+0x464/0x810 [ 56.975891] ret_from_fork+0x14/0x20 [ 56.979492] [ 56.980987] Freed by task 244: [ 56.984069] kasan_save_track+0x30/0x5c [ 56.987915] kasan_save_free_info+0x3c/0x48 [ 56.992156] __kasan_slab_free+0x40/0x50 [ 56.996093] kfree+0xe8/0x384 [ 56.999084] kmalloc_double_kzfree+0x174/0x3a8 [ 57.003570] kunit_try_run_case+0x22c/0x5a8 [ 57.007781] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.013305] kthread+0x464/0x810 [ 57.016571] ret_from_fork+0x14/0x20 [ 57.020172] [ 57.021667] The buggy address belongs to the object at cc797880 [ 57.021667] which belongs to the cache kmalloc-64 of size 64 [ 57.033416] The buggy address is located 0 bytes inside of [ 57.033416] freed 64-byte region [cc797880, cc7978c0) [ 57.044097] [ 57.045593] The buggy address belongs to the physical page: [ 57.051177] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 57.058471] flags: 0x0(zone=0) [ 57.061553] page_type: f5(slab) [ 57.064697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 57.072845] raw: 00000000 [ 57.075500] page dumped because: kasan: bad access detected [ 57.081085] [ 57.082611] Memory state around the buggy address: [ 57.087432] cc797780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.093994] cc797800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.100555] >cc797880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.107147] ^ [ 57.109680] cc797900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.116271] cc797980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.122833] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 56.479766] ================================================================== [ 56.490966] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4d0/0x550 [ 56.497650] Read of size 1 at addr cc7975a8 by task kunit_try_catch/240 [ 56.504302] [ 56.505798] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 56.505828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 56.505828] Hardware name: Generic DRA74X (Flattened Device Tree) [ 56.505859] Call trace: [ 56.505859] unwind_backtrace from show_stack+0x18/0x1c [ 56.505889] show_stack from dump_stack_lvl+0x70/0x90 [ 56.505920] dump_stack_lvl from print_report+0x158/0x528 [ 56.505920] print_report from kasan_report+0xdc/0x118 [ 56.505950] kasan_report from kmalloc_uaf2+0x4d0/0x550 [ 56.505981] kmalloc_uaf2 from kunit_try_run_case+0x22c/0x5a8 [ 56.506011] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.506042] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 56.506042] kthread from ret_from_fork+0x14/0x20 [ 56.506072] Exception stack(0xf2303fb0 to 0xf2303ff8) [ 56.506072] 3fa0: 00000000 00000000 00000000 00000000 [ 56.506103] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 56.506134] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 56.506134] [ 56.610992] Allocated by task 240: [ 56.614440] kasan_save_track+0x30/0x5c [ 56.618286] __kasan_kmalloc+0x8c/0x94 [ 56.622070] kmalloc_uaf2+0xd8/0x550 [ 56.625671] kunit_try_run_case+0x22c/0x5a8 [ 56.629913] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.635437] kthread+0x464/0x810 [ 56.638671] ret_from_fork+0x14/0x20 [ 56.642272] [ 56.643798] Freed by task 240: [ 56.646881] kasan_save_track+0x30/0x5c [ 56.650726] kasan_save_free_info+0x3c/0x48 [ 56.654937] __kasan_slab_free+0x40/0x50 [ 56.658905] kfree+0xe8/0x384 [ 56.661895] kmalloc_uaf2+0x184/0x550 [ 56.665588] kunit_try_run_case+0x22c/0x5a8 [ 56.669799] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.675354] kthread+0x464/0x810 [ 56.678588] ret_from_fork+0x14/0x20 [ 56.682189] [ 56.683685] The buggy address belongs to the object at cc797580 [ 56.683685] which belongs to the cache kmalloc-64 of size 64 [ 56.695434] The buggy address is located 40 bytes inside of [ 56.695434] freed 64-byte region [cc797580, cc7975c0) [ 56.706176] [ 56.707702] The buggy address belongs to the physical page: [ 56.713287] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 56.720581] flags: 0x0(zone=0) [ 56.723663] page_type: f5(slab) [ 56.726806] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.734954] raw: 00000000 [ 56.737609] page dumped because: kasan: bad access detected [ 56.743194] [ 56.744720] Memory state around the buggy address: [ 56.749542] cc797480: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.756103] cc797500: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.762664] >cc797580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.769256] ^ [ 56.773101] cc797600: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 56.779693] cc797680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.786254] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 56.152709] ================================================================== [ 56.163299] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1fc/0x3b0 [ 56.170501] Write of size 33 at addr cc797400 by task kunit_try_catch/238 [ 56.177337] [ 56.178833] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 56.178863] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 56.178863] Hardware name: Generic DRA74X (Flattened Device Tree) [ 56.178894] Call trace: [ 56.178894] unwind_backtrace from show_stack+0x18/0x1c [ 56.178924] show_stack from dump_stack_lvl+0x70/0x90 [ 56.178955] dump_stack_lvl from print_report+0x158/0x528 [ 56.178955] print_report from kasan_report+0xdc/0x118 [ 56.178985] kasan_report from kasan_check_range+0x14c/0x198 [ 56.179016] kasan_check_range from __asan_memset+0x20/0x3c [ 56.179016] __asan_memset from kmalloc_uaf_memset+0x1fc/0x3b0 [ 56.179046] kmalloc_uaf_memset from kunit_try_run_case+0x22c/0x5a8 [ 56.179077] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.179107] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 56.179138] kthread from ret_from_fork+0x14/0x20 [ 56.179138] Exception stack(0xf22f3fb0 to 0xf22f3ff8) [ 56.179168] 3fa0: 00000000 00000000 00000000 00000000 [ 56.179168] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 56.179199] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 56.179199] [ 56.296478] Allocated by task 238: [ 56.299896] kasan_save_track+0x30/0x5c [ 56.303771] __kasan_kmalloc+0x8c/0x94 [ 56.307556] kmalloc_uaf_memset+0xcc/0x3b0 [ 56.311676] kunit_try_run_case+0x22c/0x5a8 [ 56.315917] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.321441] kthread+0x464/0x810 [ 56.324676] ret_from_fork+0x14/0x20 [ 56.328308] [ 56.329803] Freed by task 238: [ 56.332855] kasan_save_track+0x30/0x5c [ 56.336730] kasan_save_free_info+0x3c/0x48 [ 56.340942] __kasan_slab_free+0x40/0x50 [ 56.344909] kfree+0xe8/0x384 [ 56.347900] kmalloc_uaf_memset+0x174/0x3b0 [ 56.352111] kunit_try_run_case+0x22c/0x5a8 [ 56.356323] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.361877] kthread+0x464/0x810 [ 56.365112] ret_from_fork+0x14/0x20 [ 56.368713] [ 56.370239] The buggy address belongs to the object at cc797400 [ 56.370239] which belongs to the cache kmalloc-64 of size 64 [ 56.381958] The buggy address is located 0 bytes inside of [ 56.381958] freed 64-byte region [cc797400, cc797440) [ 56.392639] [ 56.394134] The buggy address belongs to the physical page: [ 56.399749] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 56.407012] flags: 0x0(zone=0) [ 56.410095] page_type: f5(slab) [ 56.413269] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.421417] raw: 00000000 [ 56.424041] page dumped because: kasan: bad access detected [ 56.429656] [ 56.431152] Memory state around the buggy address: [ 56.435974] cc797300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.442535] cc797380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.449127] >cc797400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.455688] ^ [ 56.458221] cc797480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.464813] cc797500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.471374] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 55.838623] ================================================================== [ 55.850708] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x398/0x3d8 [ 55.857269] Read of size 1 at addr cc797288 by task kunit_try_catch/236 [ 55.863952] [ 55.865447] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 55.865478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.865478] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.865509] Call trace: [ 55.865509] unwind_backtrace from show_stack+0x18/0x1c [ 55.865539] show_stack from dump_stack_lvl+0x70/0x90 [ 55.865539] dump_stack_lvl from print_report+0x158/0x528 [ 55.865570] print_report from kasan_report+0xdc/0x118 [ 55.865600] kasan_report from kmalloc_uaf+0x398/0x3d8 [ 55.865631] kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 55.865631] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.865661] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.865692] kthread from ret_from_fork+0x14/0x20 [ 55.865722] Exception stack(0xf22e3fb0 to 0xf22e3ff8) [ 55.865722] 3fa0: 00000000 00000000 00000000 00000000 [ 55.865753] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.865753] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.865783] [ 55.970458] Allocated by task 236: [ 55.973907] kasan_save_track+0x30/0x5c [ 55.977752] __kasan_kmalloc+0x8c/0x94 [ 55.981536] kmalloc_uaf+0xcc/0x3d8 [ 55.985046] kunit_try_run_case+0x22c/0x5a8 [ 55.989288] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.994812] kthread+0x464/0x810 [ 55.998046] ret_from_fork+0x14/0x20 [ 56.001647] [ 56.003173] Freed by task 236: [ 56.006225] kasan_save_track+0x30/0x5c [ 56.010101] kasan_save_free_info+0x3c/0x48 [ 56.014312] __kasan_slab_free+0x40/0x50 [ 56.018280] kfree+0xe8/0x384 [ 56.021270] kmalloc_uaf+0x174/0x3d8 [ 56.024871] kunit_try_run_case+0x22c/0x5a8 [ 56.029083] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.034606] kthread+0x464/0x810 [ 56.037872] ret_from_fork+0x14/0x20 [ 56.041473] [ 56.042968] The buggy address belongs to the object at cc797280 [ 56.042968] which belongs to the cache kmalloc-64 of size 64 [ 56.054718] The buggy address is located 8 bytes inside of [ 56.054718] freed 64-byte region [cc797280, cc7972c0) [ 56.065368] [ 56.066894] The buggy address belongs to the physical page: [ 56.072479] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 56.079772] flags: 0x0(zone=0) [ 56.082855] page_type: f5(slab) [ 56.085998] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.094146] raw: 00000000 [ 56.096801] page dumped because: kasan: bad access detected [ 56.102386] [ 56.103912] Memory state around the buggy address: [ 56.108734] cc797180: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.115295] cc797200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.121856] >cc797280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.128417] ^ [ 56.131256] cc797300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.137817] cc797380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.144378] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 52.864105] ================================================================== [ 52.871368] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x580/0x5d4 [ 52.878051] Read of size 1 at addr cb2c8000 by task kunit_try_catch/216 [ 52.884704] [ 52.886199] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.886230] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.886230] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.886260] Call trace: [ 52.886260] unwind_backtrace from show_stack+0x18/0x1c [ 52.886291] show_stack from dump_stack_lvl+0x70/0x90 [ 52.886322] dump_stack_lvl from print_report+0x158/0x528 [ 52.886322] print_report from kasan_report+0xdc/0x118 [ 52.886352] kasan_report from krealloc_uaf+0x580/0x5d4 [ 52.886383] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 52.886413] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.886444] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.886444] kthread from ret_from_fork+0x14/0x20 [ 52.886474] Exception stack(0xf2243fb0 to 0xf2243ff8) [ 52.886474] 3fa0: 00000000 00000000 00000000 00000000 [ 52.886505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.886505] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.886535] [ 52.991394] Allocated by task 216: [ 52.994812] kasan_save_track+0x30/0x5c [ 52.998687] __kasan_kmalloc+0x8c/0x94 [ 53.002471] krealloc_uaf+0xd8/0x5d4 [ 53.006072] kunit_try_run_case+0x22c/0x5a8 [ 53.010284] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.015808] kthread+0x464/0x810 [ 53.019073] ret_from_fork+0x14/0x20 [ 53.022674] [ 53.024169] Freed by task 216: [ 53.027252] kasan_save_track+0x30/0x5c [ 53.031127] kasan_save_free_info+0x3c/0x48 [ 53.035339] __kasan_slab_free+0x40/0x50 [ 53.039276] kfree+0xe8/0x384 [ 53.042297] krealloc_uaf+0x180/0x5d4 [ 53.045989] kunit_try_run_case+0x22c/0x5a8 [ 53.050201] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.055725] kthread+0x464/0x810 [ 53.058990] ret_from_fork+0x14/0x20 [ 53.062591] [ 53.064086] The buggy address belongs to the object at cb2c8000 [ 53.064086] which belongs to the cache kmalloc-256 of size 256 [ 53.075988] The buggy address is located 0 bytes inside of [ 53.075988] freed 256-byte region [cb2c8000, cb2c8100) [ 53.086730] [ 53.088256] The buggy address belongs to the physical page: [ 53.093841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c8 [ 53.101135] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.108825] flags: 0x40(head|zone=0) [ 53.112426] page_type: f5(slab) [ 53.115600] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.123748] raw: 00000000 [ 53.126373] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.134613] head: 00000000 00000001 eeb91421 ffffffff 00000000 ffffffff 00000000 ffffffff [ 53.142852] head: 00000000 00000002 [ 53.146362] page dumped because: kasan: bad access detected [ 53.151977] [ 53.153472] Memory state around the buggy address: [ 53.158294] cb2c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.164855] cb2c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.171417] >cb2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.178009] ^ [ 53.180541] cb2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.187133] cb2c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.193695] ================================================================== [ 52.510711] ================================================================== [ 52.522369] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x208/0x5d4 [ 52.529022] Read of size 1 at addr cb2c8000 by task kunit_try_catch/216 [ 52.535675] [ 52.537200] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.537200] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.537231] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.537231] Call trace: [ 52.537231] unwind_backtrace from show_stack+0x18/0x1c [ 52.537261] show_stack from dump_stack_lvl+0x70/0x90 [ 52.537292] dump_stack_lvl from print_report+0x158/0x528 [ 52.537322] print_report from kasan_report+0xdc/0x118 [ 52.537322] kasan_report from __kasan_check_byte+0x34/0x3c [ 52.537353] __kasan_check_byte from krealloc_noprof+0x30/0x2e4 [ 52.537384] krealloc_noprof from krealloc_uaf+0x208/0x5d4 [ 52.537384] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 52.537414] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.537445] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.537475] kthread from ret_from_fork+0x14/0x20 [ 52.537506] Exception stack(0xf2243fb0 to 0xf2243ff8) [ 52.537506] 3fa0: 00000000 00000000 00000000 00000000 [ 52.537536] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.537536] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.537536] [ 52.654205] Allocated by task 216: [ 52.657653] kasan_save_track+0x30/0x5c [ 52.661499] __kasan_kmalloc+0x8c/0x94 [ 52.665283] krealloc_uaf+0xd8/0x5d4 [ 52.668884] kunit_try_run_case+0x22c/0x5a8 [ 52.673126] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.678649] kthread+0x464/0x810 [ 52.681884] ret_from_fork+0x14/0x20 [ 52.685485] [ 52.687011] Freed by task 216: [ 52.690063] kasan_save_track+0x30/0x5c [ 52.693939] kasan_save_free_info+0x3c/0x48 [ 52.698150] __kasan_slab_free+0x40/0x50 [ 52.702117] kfree+0xe8/0x384 [ 52.705108] krealloc_uaf+0x180/0x5d4 [ 52.708801] kunit_try_run_case+0x22c/0x5a8 [ 52.713012] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.718536] kthread+0x464/0x810 [ 52.721801] ret_from_fork+0x14/0x20 [ 52.725402] [ 52.726898] The buggy address belongs to the object at cb2c8000 [ 52.726898] which belongs to the cache kmalloc-256 of size 256 [ 52.738800] The buggy address is located 0 bytes inside of [ 52.738800] freed 256-byte region [cb2c8000, cb2c8100) [ 52.749572] [ 52.751068] The buggy address belongs to the physical page: [ 52.756683] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c8 [ 52.763946] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.771667] flags: 0x40(head|zone=0) [ 52.775268] page_type: f5(slab) [ 52.778442] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 52.786560] raw: 00000000 [ 52.789215] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 52.797454] head: 00000000 00000001 eeb91421 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.805694] head: 00000000 00000002 [ 52.809204] page dumped because: kasan: bad access detected [ 52.814788] [ 52.816314] Memory state around the buggy address: [ 52.821136] cb2c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.827697] cb2c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.834259] >cb2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.840850] ^ [ 52.843383] cb2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.849945] cb2c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.856536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 49.845367] ================================================================== [ 49.852630] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4 [ 49.860260] Write of size 1 at addr cb2c3eda by task kunit_try_catch/210 [ 49.867004] [ 49.868499] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 49.868530] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.868560] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.868560] Call trace: [ 49.868560] unwind_backtrace from show_stack+0x18/0x1c [ 49.868591] show_stack from dump_stack_lvl+0x70/0x90 [ 49.868621] dump_stack_lvl from print_report+0x158/0x528 [ 49.868652] print_report from kasan_report+0xdc/0x118 [ 49.868652] kasan_report from krealloc_less_oob_helper+0xd18/0xea4 [ 49.868682] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.868713] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.868743] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.868774] kthread from ret_from_fork+0x14/0x20 [ 49.868774] Exception stack(0xf221bfb0 to 0xf221bff8) [ 49.868804] bfa0: 00000000 00000000 00000000 00000000 [ 49.868804] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.868835] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.868835] [ 49.975799] Allocated by task 210: [ 49.979217] kasan_save_track+0x30/0x5c [ 49.983093] __kasan_krealloc+0xf4/0x140 [ 49.987030] krealloc_noprof+0x104/0x2e4 [ 49.990997] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.995727] kunit_try_run_case+0x22c/0x5a8 [ 49.999969] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.005493] kthread+0x464/0x810 [ 50.008728] ret_from_fork+0x14/0x20 [ 50.012329] [ 50.013854] The buggy address belongs to the object at cb2c3e00 [ 50.013854] which belongs to the cache kmalloc-256 of size 256 [ 50.025726] The buggy address is located 17 bytes to the right of [ 50.025726] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 50.037475] [ 50.038970] The buggy address belongs to the physical page: [ 50.044586] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 50.051849] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.059539] flags: 0x40(head|zone=0) [ 50.063140] page_type: f5(slab) [ 50.066314] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.074462] raw: 00000000 [ 50.077117] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.085327] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.093566] head: 00000000 00000002 [ 50.097076] page dumped because: kasan: bad access detected [ 50.102691] [ 50.104187] Memory state around the buggy address: [ 50.109008] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.115570] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.122161] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.128723] ^ [ 50.134155] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.140716] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.147277] ================================================================== [ 49.536499] ================================================================== [ 49.543762] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4 [ 49.551391] Write of size 1 at addr cb2c3ed0 by task kunit_try_catch/210 [ 49.558135] [ 49.559631] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 49.559661] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.559661] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.559661] Call trace: [ 49.559692] unwind_backtrace from show_stack+0x18/0x1c [ 49.559692] show_stack from dump_stack_lvl+0x70/0x90 [ 49.559722] dump_stack_lvl from print_report+0x158/0x528 [ 49.559753] print_report from kasan_report+0xdc/0x118 [ 49.559783] kasan_report from krealloc_less_oob_helper+0xdd0/0xea4 [ 49.559783] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.559814] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.559844] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.559875] kthread from ret_from_fork+0x14/0x20 [ 49.559906] Exception stack(0xf221bfb0 to 0xf221bff8) [ 49.559906] bfa0: 00000000 00000000 00000000 00000000 [ 49.559936] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.559936] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.559936] [ 49.666900] Allocated by task 210: [ 49.670349] kasan_save_track+0x30/0x5c [ 49.674194] __kasan_krealloc+0xf4/0x140 [ 49.678161] krealloc_noprof+0x104/0x2e4 [ 49.682098] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.686859] kunit_try_run_case+0x22c/0x5a8 [ 49.691070] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.696594] kthread+0x464/0x810 [ 49.699859] ret_from_fork+0x14/0x20 [ 49.703460] [ 49.704956] The buggy address belongs to the object at cb2c3e00 [ 49.704956] which belongs to the cache kmalloc-256 of size 256 [ 49.716857] The buggy address is located 7 bytes to the right of [ 49.716857] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 49.728485] [ 49.729980] The buggy address belongs to the physical page: [ 49.735595] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 49.742858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.750579] flags: 0x40(head|zone=0) [ 49.754180] page_type: f5(slab) [ 49.757354] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.765502] raw: 00000000 [ 49.768127] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.776367] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.784606] head: 00000000 00000002 [ 49.788116] page dumped because: kasan: bad access detected [ 49.793701] [ 49.795227] Memory state around the buggy address: [ 49.800048] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.806610] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.813171] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 49.819732] ^ [ 49.824920] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.831481] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.838073] ================================================================== [ 50.154602] ================================================================== [ 50.161895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4 [ 50.169494] Write of size 1 at addr cb2c3eea by task kunit_try_catch/210 [ 50.176269] [ 50.177764] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 50.177795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.177795] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.177795] Call trace: [ 50.177825] unwind_backtrace from show_stack+0x18/0x1c [ 50.177825] show_stack from dump_stack_lvl+0x70/0x90 [ 50.177856] dump_stack_lvl from print_report+0x158/0x528 [ 50.177886] print_report from kasan_report+0xdc/0x118 [ 50.177917] kasan_report from krealloc_less_oob_helper+0xd58/0xea4 [ 50.177917] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.177947] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.177978] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.178009] kthread from ret_from_fork+0x14/0x20 [ 50.178039] Exception stack(0xf221bfb0 to 0xf221bff8) [ 50.178039] bfa0: 00000000 00000000 00000000 00000000 [ 50.178070] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.178070] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.178070] [ 50.285034] Allocated by task 210: [ 50.288482] kasan_save_track+0x30/0x5c [ 50.292327] __kasan_krealloc+0xf4/0x140 [ 50.296295] krealloc_noprof+0x104/0x2e4 [ 50.300231] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.304992] kunit_try_run_case+0x22c/0x5a8 [ 50.309204] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.314727] kthread+0x464/0x810 [ 50.317993] ret_from_fork+0x14/0x20 [ 50.321594] [ 50.323089] The buggy address belongs to the object at cb2c3e00 [ 50.323089] which belongs to the cache kmalloc-256 of size 256 [ 50.334991] The buggy address is located 33 bytes to the right of [ 50.334991] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 50.346710] [ 50.348205] The buggy address belongs to the physical page: [ 50.353820] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 50.361083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.368804] flags: 0x40(head|zone=0) [ 50.372406] page_type: f5(slab) [ 50.375579] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.383697] raw: 00000000 [ 50.386352] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.394592] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.402832] head: 00000000 00000002 [ 50.406341] page dumped because: kasan: bad access detected [ 50.411926] [ 50.413421] Memory state around the buggy address: [ 50.418273] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.424835] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.431396] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.437957] ^ [ 50.443939] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.450500] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.457061] ================================================================== [ 51.523834] ================================================================== [ 51.531097] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4 [ 51.538726] Write of size 1 at addr cc74e0d0 by task kunit_try_catch/214 [ 51.545471] [ 51.546966] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.546997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.547027] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.547027] Call trace: [ 51.547027] unwind_backtrace from show_stack+0x18/0x1c [ 51.547058] show_stack from dump_stack_lvl+0x70/0x90 [ 51.547088] dump_stack_lvl from print_report+0x158/0x528 [ 51.547119] print_report from kasan_report+0xdc/0x118 [ 51.547119] kasan_report from krealloc_less_oob_helper+0xdd0/0xea4 [ 51.547149] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.547180] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.547210] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.547241] kthread from ret_from_fork+0x14/0x20 [ 51.547241] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 51.547271] 3fa0: 00000000 00000000 00000000 00000000 [ 51.547271] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.547302] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.547302] [ 51.654266] The buggy address belongs to the physical page: [ 51.659881] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.667144] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.674835] flags: 0x40(head|zone=0) [ 51.678466] page_type: f8(unknown) [ 51.681884] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.690032] raw: 00000000 [ 51.692657] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.700897] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.709136] head: 00000000 00000004 [ 51.712646] page dumped because: kasan: bad access detected [ 51.718231] [ 51.719757] Memory state around the buggy address: [ 51.724578] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.731140] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.737701] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.744293] ^ [ 51.749450] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.756011] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.762573] ================================================================== [ 51.273590] ================================================================== [ 51.285217] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4 [ 51.292846] Write of size 1 at addr cc74e0c9 by task kunit_try_catch/214 [ 51.299591] [ 51.301116] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.301116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.301147] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.301147] Call trace: [ 51.301147] unwind_backtrace from show_stack+0x18/0x1c [ 51.301177] show_stack from dump_stack_lvl+0x70/0x90 [ 51.301208] dump_stack_lvl from print_report+0x158/0x528 [ 51.301239] print_report from kasan_report+0xdc/0x118 [ 51.301239] kasan_report from krealloc_less_oob_helper+0xcf4/0xea4 [ 51.301269] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.301300] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.301330] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.301361] kthread from ret_from_fork+0x14/0x20 [ 51.301361] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 51.301391] 3fa0: 00000000 00000000 00000000 00000000 [ 51.301391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.301422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.301422] [ 51.408386] The buggy address belongs to the physical page: [ 51.414001] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.421264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.428985] flags: 0x40(head|zone=0) [ 51.432586] page_type: f8(unknown) [ 51.436004] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.444152] raw: 00000000 [ 51.446807] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.455017] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.463256] head: 00000000 00000004 [ 51.466766] page dumped because: kasan: bad access detected [ 51.472381] [ 51.473876] Memory state around the buggy address: [ 51.478698] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.485260] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.491851] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.498413] ^ [ 51.503326] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.509887] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.516448] ================================================================== [ 51.769927] ================================================================== [ 51.777191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4 [ 51.784820] Write of size 1 at addr cc74e0da by task kunit_try_catch/214 [ 51.791564] [ 51.793060] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.793090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.793121] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.793121] Call trace: [ 51.793121] unwind_backtrace from show_stack+0x18/0x1c [ 51.793151] show_stack from dump_stack_lvl+0x70/0x90 [ 51.793182] dump_stack_lvl from print_report+0x158/0x528 [ 51.793212] print_report from kasan_report+0xdc/0x118 [ 51.793212] kasan_report from krealloc_less_oob_helper+0xd18/0xea4 [ 51.793243] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.793273] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.793304] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.793334] kthread from ret_from_fork+0x14/0x20 [ 51.793334] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 51.793365] 3fa0: 00000000 00000000 00000000 00000000 [ 51.793365] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.793395] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.793395] [ 51.900360] The buggy address belongs to the physical page: [ 51.905975] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.913238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.920959] flags: 0x40(head|zone=0) [ 51.924560] page_type: f8(unknown) [ 51.927978] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.936126] raw: 00000000 [ 51.938751] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.946990] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.955230] head: 00000000 00000004 [ 51.958740] page dumped because: kasan: bad access detected [ 51.964355] [ 51.965850] Memory state around the buggy address: [ 51.970672] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.977233] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.983825] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.990386] ^ [ 51.995819] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.002380] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.008941] ================================================================== [ 52.263153] ================================================================== [ 52.270416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4 [ 52.278045] Write of size 1 at addr cc74e0eb by task kunit_try_catch/214 [ 52.284790] [ 52.286285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.286315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.286315] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.286315] Call trace: [ 52.286346] unwind_backtrace from show_stack+0x18/0x1c [ 52.286346] show_stack from dump_stack_lvl+0x70/0x90 [ 52.286376] dump_stack_lvl from print_report+0x158/0x528 [ 52.286407] print_report from kasan_report+0xdc/0x118 [ 52.286437] kasan_report from krealloc_less_oob_helper+0xd00/0xea4 [ 52.286437] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.286468] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.286499] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.286529] kthread from ret_from_fork+0x14/0x20 [ 52.286560] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 52.286560] 3fa0: 00000000 00000000 00000000 00000000 [ 52.286590] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.286590] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.286590] [ 52.393554] The buggy address belongs to the physical page: [ 52.399169] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 52.406433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.414154] flags: 0x40(head|zone=0) [ 52.417755] page_type: f8(unknown) [ 52.421173] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.429321] raw: 00000000 [ 52.431976] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.440216] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.448425] head: 00000000 00000004 [ 52.451934] page dumped because: kasan: bad access detected [ 52.457550] [ 52.459045] Memory state around the buggy address: [ 52.463867] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.470458] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.477020] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.483581] ^ [ 52.489532] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.496124] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.502685] ================================================================== [ 49.223968] ================================================================== [ 49.235107] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4 [ 49.242736] Write of size 1 at addr cb2c3ec9 by task kunit_try_catch/210 [ 49.249481] [ 49.250976] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 49.251007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.251007] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.251037] Call trace: [ 49.251037] unwind_backtrace from show_stack+0x18/0x1c [ 49.251068] show_stack from dump_stack_lvl+0x70/0x90 [ 49.251068] dump_stack_lvl from print_report+0x158/0x528 [ 49.251098] print_report from kasan_report+0xdc/0x118 [ 49.251129] kasan_report from krealloc_less_oob_helper+0xcf4/0xea4 [ 49.251159] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.251190] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.251190] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.251220] kthread from ret_from_fork+0x14/0x20 [ 49.251251] Exception stack(0xf221bfb0 to 0xf221bff8) [ 49.251251] bfa0: 00000000 00000000 00000000 00000000 [ 49.251281] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.251281] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.251312] [ 49.358276] Allocated by task 210: [ 49.361694] kasan_save_track+0x30/0x5c [ 49.365570] __kasan_krealloc+0xf4/0x140 [ 49.369506] krealloc_noprof+0x104/0x2e4 [ 49.373474] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.378204] kunit_try_run_case+0x22c/0x5a8 [ 49.382415] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.387969] kthread+0x464/0x810 [ 49.391204] ret_from_fork+0x14/0x20 [ 49.394805] [ 49.396331] The buggy address belongs to the object at cb2c3e00 [ 49.396331] which belongs to the cache kmalloc-256 of size 256 [ 49.408203] The buggy address is located 0 bytes to the right of [ 49.408203] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 49.419860] [ 49.421356] The buggy address belongs to the physical page: [ 49.426971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 49.434234] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.441955] flags: 0x40(head|zone=0) [ 49.445556] page_type: f5(slab) [ 49.448730] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.456848] raw: 00000000 [ 49.459503] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.467742] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.475982] head: 00000000 00000002 [ 49.479492] page dumped because: kasan: bad access detected [ 49.485076] [ 49.486602] Memory state around the buggy address: [ 49.491424] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.497985] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.504547] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 49.511108] ^ [ 49.516021] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.522613] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.529174] ================================================================== [ 52.016265] ================================================================== [ 52.023529] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4 [ 52.031158] Write of size 1 at addr cc74e0ea by task kunit_try_catch/214 [ 52.037902] [ 52.039428] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.039428] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.039459] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.039459] Call trace: [ 52.039459] unwind_backtrace from show_stack+0x18/0x1c [ 52.039489] show_stack from dump_stack_lvl+0x70/0x90 [ 52.039520] dump_stack_lvl from print_report+0x158/0x528 [ 52.039550] print_report from kasan_report+0xdc/0x118 [ 52.039550] kasan_report from krealloc_less_oob_helper+0xd58/0xea4 [ 52.039581] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.039611] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.039642] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.039672] kthread from ret_from_fork+0x14/0x20 [ 52.039672] Exception stack(0xf2233fb0 to 0xf2233ff8) [ 52.039703] 3fa0: 00000000 00000000 00000000 00000000 [ 52.039703] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.039733] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.039733] [ 52.146697] The buggy address belongs to the physical page: [ 52.152313] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 52.159576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.167297] flags: 0x40(head|zone=0) [ 52.170898] page_type: f8(unknown) [ 52.174316] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.182464] raw: 00000000 [ 52.185119] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.193328] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.201568] head: 00000000 00000004 [ 52.205078] page dumped because: kasan: bad access detected [ 52.210693] [ 52.212188] Memory state around the buggy address: [ 52.217010] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.223571] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.230163] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.236724] ^ [ 52.242675] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.249237] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.255828] ================================================================== [ 50.464385] ================================================================== [ 50.471649] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4 [ 50.479278] Write of size 1 at addr cb2c3eeb by task kunit_try_catch/210 [ 50.486022] [ 50.487518] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 50.487548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.487579] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.487579] Call trace: [ 50.487579] unwind_backtrace from show_stack+0x18/0x1c [ 50.487609] show_stack from dump_stack_lvl+0x70/0x90 [ 50.487640] dump_stack_lvl from print_report+0x158/0x528 [ 50.487640] print_report from kasan_report+0xdc/0x118 [ 50.487670] kasan_report from krealloc_less_oob_helper+0xd00/0xea4 [ 50.487701] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.487731] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.487762] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.487792] kthread from ret_from_fork+0x14/0x20 [ 50.487792] Exception stack(0xf221bfb0 to 0xf221bff8) [ 50.487823] bfa0: 00000000 00000000 00000000 00000000 [ 50.487823] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.487854] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.487854] [ 50.594818] Allocated by task 210: [ 50.598236] kasan_save_track+0x30/0x5c [ 50.602111] __kasan_krealloc+0xf4/0x140 [ 50.606048] krealloc_noprof+0x104/0x2e4 [ 50.610015] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.614746] kunit_try_run_case+0x22c/0x5a8 [ 50.618988] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.624511] kthread+0x464/0x810 [ 50.627746] ret_from_fork+0x14/0x20 [ 50.631347] [ 50.632873] The buggy address belongs to the object at cb2c3e00 [ 50.632873] which belongs to the cache kmalloc-256 of size 256 [ 50.644775] The buggy address is located 34 bytes to the right of [ 50.644775] allocated 201-byte region [cb2c3e00, cb2c3ec9) [ 50.656494] [ 50.657989] The buggy address belongs to the physical page: [ 50.663604] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 50.670867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.678558] flags: 0x40(head|zone=0) [ 50.682159] page_type: f5(slab) [ 50.685333] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.693481] raw: 00000000 [ 50.696136] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.704345] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.712585] head: 00000000 00000002 [ 50.716094] page dumped because: kasan: bad access detected [ 50.721710] [ 50.723205] Memory state around the buggy address: [ 50.728027] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.734588] cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.741180] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.747741] ^ [ 50.753692] cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.760253] cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.766845] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 55.544464] ================================================================== [ 55.556640] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1b4/0x360 [ 55.564605] Read of size 64 at addr cc797104 by task kunit_try_catch/234 [ 55.571380] [ 55.572875] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 55.572906] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.572906] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.572937] Call trace: [ 55.572937] unwind_backtrace from show_stack+0x18/0x1c [ 55.572967] show_stack from dump_stack_lvl+0x70/0x90 [ 55.572967] dump_stack_lvl from print_report+0x158/0x528 [ 55.572998] print_report from kasan_report+0xdc/0x118 [ 55.573028] kasan_report from kasan_check_range+0x14c/0x198 [ 55.573059] kasan_check_range from __asan_memmove+0x28/0x68 [ 55.573059] __asan_memmove from kmalloc_memmove_invalid_size+0x1b4/0x360 [ 55.573089] kmalloc_memmove_invalid_size from kunit_try_run_case+0x22c/0x5a8 [ 55.573120] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.573150] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.573181] kthread from ret_from_fork+0x14/0x20 [ 55.573211] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 55.573211] 3fa0: 00000000 00000000 00000000 00000000 [ 55.573242] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.573242] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.573272] [ 55.692443] Allocated by task 234: [ 55.695892] kasan_save_track+0x30/0x5c [ 55.699737] __kasan_kmalloc+0x8c/0x94 [ 55.703521] kmalloc_memmove_invalid_size+0xd0/0x360 [ 55.708526] kunit_try_run_case+0x22c/0x5a8 [ 55.712738] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.718292] kthread+0x464/0x810 [ 55.721527] ret_from_fork+0x14/0x20 [ 55.725128] [ 55.726654] The buggy address belongs to the object at cc797100 [ 55.726654] which belongs to the cache kmalloc-64 of size 64 [ 55.738372] The buggy address is located 4 bytes inside of [ 55.738372] allocated 64-byte region [cc797100, cc797140) [ 55.749389] [ 55.750885] The buggy address belongs to the physical page: [ 55.756500] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 55.763763] flags: 0x0(zone=0) [ 55.766845] page_type: f5(slab) [ 55.770019] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 55.778167] raw: 00000000 [ 55.780792] page dumped because: kasan: bad access detected [ 55.786407] [ 55.787902] Memory state around the buggy address: [ 55.792724] cc797000: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.799316] cc797080: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.805877] >cc797100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.812438] ^ [ 55.817108] cc797180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.823669] cc797200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.830230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 55.253387] ================================================================== [ 55.264862] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1b4/0x360 [ 55.272491] Read of size 4294967294 at addr cc796f84 by task kunit_try_catch/232 [ 55.279937] [ 55.281433] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 55.281463] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.281494] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.281494] Call trace: [ 55.281494] unwind_backtrace from show_stack+0x18/0x1c [ 55.281524] show_stack from dump_stack_lvl+0x70/0x90 [ 55.281555] dump_stack_lvl from print_report+0x158/0x528 [ 55.281585] print_report from kasan_report+0xdc/0x118 [ 55.281585] kasan_report from kasan_check_range+0x14c/0x198 [ 55.281616] kasan_check_range from __asan_memmove+0x28/0x68 [ 55.281646] __asan_memmove from kmalloc_memmove_negative_size+0x1b4/0x360 [ 55.281677] kmalloc_memmove_negative_size from kunit_try_run_case+0x22c/0x5a8 [ 55.281707] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.281738] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.281738] kthread from ret_from_fork+0x14/0x20 [ 55.281768] Exception stack(0xf22c3fb0 to 0xf22c3ff8) [ 55.281768] 3fa0: 00000000 00000000 00000000 00000000 [ 55.281799] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.281829] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.281829] [ 55.401184] Allocated by task 232: [ 55.404632] kasan_save_track+0x30/0x5c [ 55.408477] __kasan_kmalloc+0x8c/0x94 [ 55.412261] kmalloc_memmove_negative_size+0xd0/0x360 [ 55.417358] kunit_try_run_case+0x22c/0x5a8 [ 55.421569] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.427093] kthread+0x464/0x810 [ 55.430358] ret_from_fork+0x14/0x20 [ 55.433959] [ 55.435455] The buggy address belongs to the object at cc796f80 [ 55.435455] which belongs to the cache kmalloc-64 of size 64 [ 55.447174] The buggy address is located 4 bytes inside of [ 55.447174] 64-byte region [cc796f80, cc796fc0) [ 55.457336] [ 55.458831] The buggy address belongs to the physical page: [ 55.464447] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c796 [ 55.471710] flags: 0x0(zone=0) [ 55.474792] page_type: f5(slab) [ 55.477966] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 55.486114] raw: 00000000 [ 55.488739] page dumped because: kasan: bad access detected [ 55.494354] [ 55.495849] Memory state around the buggy address: [ 55.500671] cc796e80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.507232] cc796f00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.513824] >cc796f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.520385] ^ [ 55.522949] cc797000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.529510] cc797080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.536071] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 54.960357] ================================================================== [ 54.971740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b0/0x35c [ 54.979095] Write of size 16 at addr cc78ed69 by task kunit_try_catch/230 [ 54.985931] [ 54.987457] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 54.987487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.987487] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.987487] Call trace: [ 54.987487] unwind_backtrace from show_stack+0x18/0x1c [ 54.987518] show_stack from dump_stack_lvl+0x70/0x90 [ 54.987548] dump_stack_lvl from print_report+0x158/0x528 [ 54.987579] print_report from kasan_report+0xdc/0x118 [ 54.987609] kasan_report from kasan_check_range+0x14c/0x198 [ 54.987609] kasan_check_range from __asan_memset+0x20/0x3c [ 54.987640] __asan_memset from kmalloc_oob_memset_16+0x1b0/0x35c [ 54.987670] kmalloc_oob_memset_16 from kunit_try_run_case+0x22c/0x5a8 [ 54.987670] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.987701] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.987731] kthread from ret_from_fork+0x14/0x20 [ 54.987762] Exception stack(0xf22b3fb0 to 0xf22b3ff8) [ 54.987762] 3fa0: 00000000 00000000 00000000 00000000 [ 54.987792] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.987792] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.987823] [ 55.105621] Allocated by task 230: [ 55.109039] kasan_save_track+0x30/0x5c [ 55.112915] __kasan_kmalloc+0x8c/0x94 [ 55.116668] kmalloc_oob_memset_16+0xcc/0x35c [ 55.121063] kunit_try_run_case+0x22c/0x5a8 [ 55.125305] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.130828] kthread+0x464/0x810 [ 55.134063] ret_from_fork+0x14/0x20 [ 55.137664] [ 55.139190] The buggy address belongs to the object at cc78ed00 [ 55.139190] which belongs to the cache kmalloc-128 of size 128 [ 55.151062] The buggy address is located 105 bytes inside of [ 55.151062] allocated 120-byte region [cc78ed00, cc78ed78) [ 55.162353] [ 55.163879] The buggy address belongs to the physical page: [ 55.169464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 55.176757] flags: 0x0(zone=0) [ 55.179809] page_type: f5(slab) [ 55.182983] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 55.191131] raw: 00000000 [ 55.193756] page dumped because: kasan: bad access detected [ 55.199371] [ 55.200866] Memory state around the buggy address: [ 55.205688] cc78ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.212280] cc78ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.218841] >cc78ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 55.225402] ^ [ 55.231903] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.238464] cc78ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.245025] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 54.667785] ================================================================== [ 54.679168] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b0/0x35c [ 54.686462] Write of size 8 at addr cc78ec71 by task kunit_try_catch/228 [ 54.693206] [ 54.694702] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 54.694732] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.694732] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.694763] Call trace: [ 54.694763] unwind_backtrace from show_stack+0x18/0x1c [ 54.694793] show_stack from dump_stack_lvl+0x70/0x90 [ 54.694793] dump_stack_lvl from print_report+0x158/0x528 [ 54.694824] print_report from kasan_report+0xdc/0x118 [ 54.694854] kasan_report from kasan_check_range+0x14c/0x198 [ 54.694885] kasan_check_range from __asan_memset+0x20/0x3c [ 54.694885] __asan_memset from kmalloc_oob_memset_8+0x1b0/0x35c [ 54.694915] kmalloc_oob_memset_8 from kunit_try_run_case+0x22c/0x5a8 [ 54.694946] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.694976] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.695007] kthread from ret_from_fork+0x14/0x20 [ 54.695007] Exception stack(0xf22a3fb0 to 0xf22a3ff8) [ 54.695037] 3fa0: 00000000 00000000 00000000 00000000 [ 54.695037] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.695068] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.695068] [ 54.812683] Allocated by task 228: [ 54.816131] kasan_save_track+0x30/0x5c [ 54.819976] __kasan_kmalloc+0x8c/0x94 [ 54.823760] kmalloc_oob_memset_8+0xcc/0x35c [ 54.828063] kunit_try_run_case+0x22c/0x5a8 [ 54.832275] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.837829] kthread+0x464/0x810 [ 54.841064] ret_from_fork+0x14/0x20 [ 54.844696] [ 54.846191] The buggy address belongs to the object at cc78ec00 [ 54.846191] which belongs to the cache kmalloc-128 of size 128 [ 54.858093] The buggy address is located 113 bytes inside of [ 54.858093] allocated 120-byte region [cc78ec00, cc78ec78) [ 54.869354] [ 54.870880] The buggy address belongs to the physical page: [ 54.876464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 54.883758] flags: 0x0(zone=0) [ 54.886810] page_type: f5(slab) [ 54.889984] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.898132] raw: 00000000 [ 54.900787] page dumped because: kasan: bad access detected [ 54.906372] [ 54.907897] Memory state around the buggy address: [ 54.912719] cc78eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.919281] cc78eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.925842] >cc78ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.932403] ^ [ 54.938903] cc78ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.945465] cc78ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.952026] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 51.025756] ================================================================== [ 51.033020] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808 [ 51.040649] Write of size 1 at addr cc74e0f0 by task kunit_try_catch/212 [ 51.047393] [ 51.048919] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 51.048919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.048950] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.048950] Call trace: [ 51.048950] unwind_backtrace from show_stack+0x18/0x1c [ 51.048980] show_stack from dump_stack_lvl+0x70/0x90 [ 51.049011] dump_stack_lvl from print_report+0x158/0x528 [ 51.049041] print_report from kasan_report+0xdc/0x118 [ 51.049041] kasan_report from krealloc_more_oob_helper+0x72c/0x808 [ 51.049072] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.049102] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.049133] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.049163] kthread from ret_from_fork+0x14/0x20 [ 51.049163] Exception stack(0xf222bfb0 to 0xf222bff8) [ 51.049194] bfa0: 00000000 00000000 00000000 00000000 [ 51.049194] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.049224] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.049224] [ 51.156188] The buggy address belongs to the physical page: [ 51.161804] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 51.169067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.176788] flags: 0x40(head|zone=0) [ 51.180389] page_type: f8(unknown) [ 51.183807] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.191955] raw: 00000000 [ 51.194610] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.202819] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.211059] head: 00000000 00000004 [ 51.214569] page dumped because: kasan: bad access detected [ 51.220184] [ 51.221679] Memory state around the buggy address: [ 51.226501] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.233062] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.239654] >cc74e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 51.246215] ^ [ 51.252441] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.259002] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.265563] ================================================================== [ 48.599609] ================================================================== [ 48.610473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808 [ 48.618103] Write of size 1 at addr cb2c3ceb by task kunit_try_catch/208 [ 48.624847] [ 48.626373] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 48.626403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.626403] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.626403] Call trace: [ 48.626403] unwind_backtrace from show_stack+0x18/0x1c [ 48.626434] show_stack from dump_stack_lvl+0x70/0x90 [ 48.626464] dump_stack_lvl from print_report+0x158/0x528 [ 48.626495] print_report from kasan_report+0xdc/0x118 [ 48.626525] kasan_report from krealloc_more_oob_helper+0x77c/0x808 [ 48.626525] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 48.626556] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.626586] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.626617] kthread from ret_from_fork+0x14/0x20 [ 48.626647] Exception stack(0xf2213fb0 to 0xf2213ff8) [ 48.626647] 3fa0: 00000000 00000000 00000000 00000000 [ 48.626678] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.626678] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.626678] [ 48.733673] Allocated by task 208: [ 48.737091] kasan_save_track+0x30/0x5c [ 48.740936] __kasan_krealloc+0xf4/0x140 [ 48.744903] krealloc_noprof+0x104/0x2e4 [ 48.748870] krealloc_more_oob_helper+0x1e0/0x808 [ 48.753601] kunit_try_run_case+0x22c/0x5a8 [ 48.757812] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.763336] kthread+0x464/0x810 [ 48.766601] ret_from_fork+0x14/0x20 [ 48.770202] [ 48.771697] The buggy address belongs to the object at cb2c3c00 [ 48.771697] which belongs to the cache kmalloc-256 of size 256 [ 48.783599] The buggy address is located 0 bytes to the right of [ 48.783599] allocated 235-byte region [cb2c3c00, cb2c3ceb) [ 48.795227] [ 48.796752] The buggy address belongs to the physical page: [ 48.802337] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 48.809631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.817321] flags: 0x40(head|zone=0) [ 48.820922] page_type: f5(slab) [ 48.824096] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 48.832244] raw: 00000000 [ 48.834869] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 48.843109] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 48.851348] head: 00000000 00000002 [ 48.854858] page dumped because: kasan: bad access detected [ 48.860473] [ 48.861968] Memory state around the buggy address: [ 48.866790] cb2c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.873352] cb2c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.879943] >cb2c3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 48.886505] ^ [ 48.892456] cb2c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.899017] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.905609] ================================================================== [ 50.774871] ================================================================== [ 50.785980] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808 [ 50.793609] Write of size 1 at addr cc74e0eb by task kunit_try_catch/212 [ 50.800354] [ 50.801879] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 50.801910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.801910] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.801910] Call trace: [ 50.801910] unwind_backtrace from show_stack+0x18/0x1c [ 50.801940] show_stack from dump_stack_lvl+0x70/0x90 [ 50.801971] dump_stack_lvl from print_report+0x158/0x528 [ 50.802001] print_report from kasan_report+0xdc/0x118 [ 50.802032] kasan_report from krealloc_more_oob_helper+0x77c/0x808 [ 50.802032] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.802062] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.802093] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.802124] kthread from ret_from_fork+0x14/0x20 [ 50.802154] Exception stack(0xf222bfb0 to 0xf222bff8) [ 50.802154] bfa0: 00000000 00000000 00000000 00000000 [ 50.802185] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.802185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.802185] [ 50.909149] The buggy address belongs to the physical page: [ 50.914764] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 50.922027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.929748] flags: 0x40(head|zone=0) [ 50.933349] page_type: f8(unknown) [ 50.936767] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 50.944915] raw: 00000000 [ 50.947570] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 50.955810] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.964019] head: 00000000 00000004 [ 50.967529] page dumped because: kasan: bad access detected [ 50.973144] [ 50.974639] Memory state around the buggy address: [ 50.979461] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.986022] cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.992614] >cc74e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 50.999176] ^ [ 51.005126] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.011688] cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.018280] ================================================================== [ 48.913116] ================================================================== [ 48.920379] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808 [ 48.928009] Write of size 1 at addr cb2c3cf0 by task kunit_try_catch/208 [ 48.934753] [ 48.936248] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 48.936279] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.936279] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.936309] Call trace: [ 48.936309] unwind_backtrace from show_stack+0x18/0x1c [ 48.936340] show_stack from dump_stack_lvl+0x70/0x90 [ 48.936340] dump_stack_lvl from print_report+0x158/0x528 [ 48.936370] print_report from kasan_report+0xdc/0x118 [ 48.936401] kasan_report from krealloc_more_oob_helper+0x72c/0x808 [ 48.936431] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 48.936462] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.936462] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.936492] kthread from ret_from_fork+0x14/0x20 [ 48.936523] Exception stack(0xf2213fb0 to 0xf2213ff8) [ 48.936523] 3fa0: 00000000 00000000 00000000 00000000 [ 48.936553] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.936553] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.936584] [ 49.043548] Allocated by task 208: [ 49.046966] kasan_save_track+0x30/0x5c [ 49.050842] __kasan_krealloc+0xf4/0x140 [ 49.054779] krealloc_noprof+0x104/0x2e4 [ 49.058746] krealloc_more_oob_helper+0x1e0/0x808 [ 49.063476] kunit_try_run_case+0x22c/0x5a8 [ 49.067687] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.073242] kthread+0x464/0x810 [ 49.076477] ret_from_fork+0x14/0x20 [ 49.080078] [ 49.081573] The buggy address belongs to the object at cb2c3c00 [ 49.081573] which belongs to the cache kmalloc-256 of size 256 [ 49.093475] The buggy address is located 5 bytes to the right of [ 49.093475] allocated 235-byte region [cb2c3c00, cb2c3ceb) [ 49.105133] [ 49.106628] The buggy address belongs to the physical page: [ 49.112243] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2 [ 49.119506] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.127197] flags: 0x40(head|zone=0) [ 49.130798] page_type: f5(slab) [ 49.133972] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.142120] raw: 00000000 [ 49.144775] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.152984] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.161224] head: 00000000 00000002 [ 49.164733] page dumped because: kasan: bad access detected [ 49.170349] [ 49.171844] Memory state around the buggy address: [ 49.176666] cb2c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.183227] cb2c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.189819] >cb2c3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 49.196380] ^ [ 49.202606] cb2c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.209167] cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.215728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 54.375183] ================================================================== [ 54.386566] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b0/0x35c [ 54.393829] Write of size 4 at addr cc78eb75 by task kunit_try_catch/226 [ 54.400573] [ 54.402099] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 54.402130] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.402130] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.402130] Call trace: [ 54.402130] unwind_backtrace from show_stack+0x18/0x1c [ 54.402160] show_stack from dump_stack_lvl+0x70/0x90 [ 54.402191] dump_stack_lvl from print_report+0x158/0x528 [ 54.402221] print_report from kasan_report+0xdc/0x118 [ 54.402221] kasan_report from kasan_check_range+0x14c/0x198 [ 54.402252] kasan_check_range from __asan_memset+0x20/0x3c [ 54.402282] __asan_memset from kmalloc_oob_memset_4+0x1b0/0x35c [ 54.402313] kmalloc_oob_memset_4 from kunit_try_run_case+0x22c/0x5a8 [ 54.402313] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.402343] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.402374] kthread from ret_from_fork+0x14/0x20 [ 54.402404] Exception stack(0xf2293fb0 to 0xf2293ff8) [ 54.402404] 3fa0: 00000000 00000000 00000000 00000000 [ 54.402435] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.402435] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.402465] [ 54.520080] Allocated by task 226: [ 54.523498] kasan_save_track+0x30/0x5c [ 54.527374] __kasan_kmalloc+0x8c/0x94 [ 54.531158] kmalloc_oob_memset_4+0xcc/0x35c [ 54.535461] kunit_try_run_case+0x22c/0x5a8 [ 54.539672] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.545196] kthread+0x464/0x810 [ 54.548461] ret_from_fork+0x14/0x20 [ 54.552062] [ 54.553558] The buggy address belongs to the object at cc78eb00 [ 54.553558] which belongs to the cache kmalloc-128 of size 128 [ 54.565460] The buggy address is located 117 bytes inside of [ 54.565460] allocated 120-byte region [cc78eb00, cc78eb78) [ 54.576751] [ 54.578247] The buggy address belongs to the physical page: [ 54.583862] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 54.591125] flags: 0x0(zone=0) [ 54.594207] page_type: f5(slab) [ 54.597381] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.605499] raw: 00000000 [ 54.608154] page dumped because: kasan: bad access detected [ 54.613769] [ 54.615264] Memory state around the buggy address: [ 54.620086] cc78ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.626647] cc78ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.633209] >cc78eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.639801] ^ [ 54.646270] cc78eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.652832] cc78ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.659393] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 54.082397] ================================================================== [ 54.093872] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b0/0x35c [ 54.101135] Write of size 2 at addr cc78ea77 by task kunit_try_catch/224 [ 54.107879] [ 54.109405] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 54.109436] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.109436] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.109436] Call trace: [ 54.109436] unwind_backtrace from show_stack+0x18/0x1c [ 54.109466] show_stack from dump_stack_lvl+0x70/0x90 [ 54.109497] dump_stack_lvl from print_report+0x158/0x528 [ 54.109527] print_report from kasan_report+0xdc/0x118 [ 54.109558] kasan_report from kasan_check_range+0x14c/0x198 [ 54.109558] kasan_check_range from __asan_memset+0x20/0x3c [ 54.109588] __asan_memset from kmalloc_oob_memset_2+0x1b0/0x35c [ 54.109619] kmalloc_oob_memset_2 from kunit_try_run_case+0x22c/0x5a8 [ 54.109649] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.109680] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.109680] kthread from ret_from_fork+0x14/0x20 [ 54.109710] Exception stack(0xf2283fb0 to 0xf2283ff8) [ 54.109710] 3fa0: 00000000 00000000 00000000 00000000 [ 54.109741] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.109741] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.109771] [ 54.227386] Allocated by task 224: [ 54.230834] kasan_save_track+0x30/0x5c [ 54.234680] __kasan_kmalloc+0x8c/0x94 [ 54.238464] kmalloc_oob_memset_2+0xcc/0x35c [ 54.242767] kunit_try_run_case+0x22c/0x5a8 [ 54.246978] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.252502] kthread+0x464/0x810 [ 54.255767] ret_from_fork+0x14/0x20 [ 54.259368] [ 54.260864] The buggy address belongs to the object at cc78ea00 [ 54.260864] which belongs to the cache kmalloc-128 of size 128 [ 54.272766] The buggy address is located 119 bytes inside of [ 54.272766] allocated 120-byte region [cc78ea00, cc78ea78) [ 54.284057] [ 54.285552] The buggy address belongs to the physical page: [ 54.291168] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 54.298431] flags: 0x0(zone=0) [ 54.301513] page_type: f5(slab) [ 54.304687] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.312835] raw: 00000000 [ 54.315460] page dumped because: kasan: bad access detected [ 54.321075] [ 54.322570] Memory state around the buggy address: [ 54.327392] cc78e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.333984] cc78e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.340545] >cc78ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.347106] ^ [ 54.353576] cc78ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.360168] cc78eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.366729] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 53.789947] ================================================================== [ 53.800811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1a4/0x350 [ 53.808197] Write of size 128 at addr cc78e900 by task kunit_try_catch/222 [ 53.815093] [ 53.816619] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 53.816650] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.816650] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.816650] Call trace: [ 53.816650] unwind_backtrace from show_stack+0x18/0x1c [ 53.816680] show_stack from dump_stack_lvl+0x70/0x90 [ 53.816711] dump_stack_lvl from print_report+0x158/0x528 [ 53.816741] print_report from kasan_report+0xdc/0x118 [ 53.816772] kasan_report from kasan_check_range+0x14c/0x198 [ 53.816772] kasan_check_range from __asan_memset+0x20/0x3c [ 53.816802] __asan_memset from kmalloc_oob_in_memset+0x1a4/0x350 [ 53.816833] kmalloc_oob_in_memset from kunit_try_run_case+0x22c/0x5a8 [ 53.816833] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.816864] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.816894] kthread from ret_from_fork+0x14/0x20 [ 53.816925] Exception stack(0xf2273fb0 to 0xf2273ff8) [ 53.816925] 3fa0: 00000000 00000000 00000000 00000000 [ 53.816955] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.816955] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.816986] [ 53.934783] Allocated by task 222: [ 53.938201] kasan_save_track+0x30/0x5c [ 53.942077] __kasan_kmalloc+0x8c/0x94 [ 53.945831] kmalloc_oob_in_memset+0xd0/0x350 [ 53.950225] kunit_try_run_case+0x22c/0x5a8 [ 53.954467] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.959991] kthread+0x464/0x810 [ 53.963226] ret_from_fork+0x14/0x20 [ 53.966827] [ 53.968353] The buggy address belongs to the object at cc78e900 [ 53.968353] which belongs to the cache kmalloc-128 of size 128 [ 53.980224] The buggy address is located 0 bytes inside of [ 53.980224] allocated 120-byte region [cc78e900, cc78e978) [ 53.991363] [ 53.992858] The buggy address belongs to the physical page: [ 53.998474] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 54.005737] flags: 0x0(zone=0) [ 54.008819] page_type: f5(slab) [ 54.011962] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.020111] raw: 00000000 [ 54.022766] page dumped because: kasan: bad access detected [ 54.028350] [ 54.029876] Memory state around the buggy address: [ 54.034698] cc78e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.041259] cc78e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.047821] >cc78e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.054412] ^ [ 54.060882] cc78e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.067443] cc78ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.074005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 53.475921] ================================================================== [ 53.486785] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x484/0x518 [ 53.493621] Read of size 16 at addr cc796900 by task kunit_try_catch/220 [ 53.500366] [ 53.501892] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 53.501922] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.501922] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.501922] Call trace: [ 53.501922] unwind_backtrace from show_stack+0x18/0x1c [ 53.501953] show_stack from dump_stack_lvl+0x70/0x90 [ 53.501983] dump_stack_lvl from print_report+0x158/0x528 [ 53.502014] print_report from kasan_report+0xdc/0x118 [ 53.502044] kasan_report from kmalloc_uaf_16+0x484/0x518 [ 53.502044] kmalloc_uaf_16 from kunit_try_run_case+0x22c/0x5a8 [ 53.502075] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.502105] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.502136] kthread from ret_from_fork+0x14/0x20 [ 53.502136] Exception stack(0xf2263fb0 to 0xf2263ff8) [ 53.502166] 3fa0: 00000000 00000000 00000000 00000000 [ 53.502166] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.502197] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.502197] [ 53.607421] Allocated by task 220: [ 53.610839] kasan_save_track+0x30/0x5c [ 53.614715] __kasan_kmalloc+0x8c/0x94 [ 53.618499] kmalloc_uaf_16+0x1b0/0x518 [ 53.622344] kunit_try_run_case+0x22c/0x5a8 [ 53.626586] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.632110] kthread+0x464/0x810 [ 53.635345] ret_from_fork+0x14/0x20 [ 53.638977] [ 53.640472] Freed by task 220: [ 53.643524] kasan_save_track+0x30/0x5c [ 53.647399] kasan_save_free_info+0x3c/0x48 [ 53.651611] __kasan_slab_free+0x40/0x50 [ 53.655578] kfree+0xe8/0x384 [ 53.658569] kmalloc_uaf_16+0x234/0x518 [ 53.662445] kunit_try_run_case+0x22c/0x5a8 [ 53.666656] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.672180] kthread+0x464/0x810 [ 53.675445] ret_from_fork+0x14/0x20 [ 53.679046] [ 53.680541] The buggy address belongs to the object at cc796900 [ 53.680541] which belongs to the cache kmalloc-64 of size 64 [ 53.692260] The buggy address is located 0 bytes inside of [ 53.692260] freed 64-byte region [cc796900, cc796940) [ 53.702941] [ 53.704437] The buggy address belongs to the physical page: [ 53.710052] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c796 [ 53.717315] flags: 0x0(zone=0) [ 53.720397] page_type: f5(slab) [ 53.723571] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 53.731689] raw: 00000000 [ 53.734344] page dumped because: kasan: bad access detected [ 53.739959] [ 53.741455] Memory state around the buggy address: [ 53.746276] cc796800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.752838] cc796880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.759429] >cc796900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.765991] ^ [ 53.768524] cc796980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.775115] cc796a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.781677] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmalloc_large_invalid_free
[ 48.117706] ================================================================== [ 48.128723] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x14c/0x2dc [ 48.135986] Free of addr cc74c001 by task kunit_try_catch/202 [ 48.141784] [ 48.143280] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 48.143310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.143341] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.143341] Call trace: [ 48.143341] unwind_backtrace from show_stack+0x18/0x1c [ 48.143371] show_stack from dump_stack_lvl+0x70/0x90 [ 48.143402] dump_stack_lvl from print_report+0x158/0x528 [ 48.143432] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 48.143432] kasan_report_invalid_free from free_large_kmalloc+0x54/0x194 [ 48.143463] free_large_kmalloc from kmalloc_large_invalid_free+0x14c/0x2dc [ 48.143493] kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 48.143524] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.143554] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.143585] kthread from ret_from_fork+0x14/0x20 [ 48.143585] Exception stack(0xf21f3fb0 to 0xf21f3ff8) [ 48.143615] 3fa0: 00000000 00000000 00000000 00000000 [ 48.143615] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.143646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.143646] [ 48.259338] The buggy address belongs to the physical page: [ 48.264953] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 48.272216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.279937] flags: 0x40(head|zone=0) [ 48.283538] page_type: f8(unknown) [ 48.286956] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 48.295104] raw: 00000000 [ 48.297760] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 48.305999] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 48.314208] head: 00000000 00000004 [ 48.317718] page dumped because: kasan: bad access detected [ 48.323333] [ 48.324829] Memory state around the buggy address: [ 48.329650] cc74bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.336242] cc74bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.342803] >cc74c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.349365] ^ [ 48.351928] cc74c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.358489] cc74c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.365051] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 47.903015] ================================================================== [ 47.914581] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x358/0x388 [ 47.921234] Read of size 1 at addr cc74c000 by task kunit_try_catch/200 [ 47.927886] [ 47.929412] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 47.929412] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.929443] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.929443] Call trace: [ 47.929443] unwind_backtrace from show_stack+0x18/0x1c [ 47.929473] show_stack from dump_stack_lvl+0x70/0x90 [ 47.929504] dump_stack_lvl from print_report+0x158/0x528 [ 47.929534] print_report from kasan_report+0xdc/0x118 [ 47.929534] kasan_report from kmalloc_large_uaf+0x358/0x388 [ 47.929565] kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8 [ 47.929595] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.929626] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.929656] kthread from ret_from_fork+0x14/0x20 [ 47.929656] Exception stack(0xf21e3fb0 to 0xf21e3ff8) [ 47.929687] 3fa0: 00000000 00000000 00000000 00000000 [ 47.929687] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.929718] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.929718] [ 48.035461] The buggy address belongs to the physical page: [ 48.041076] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 48.048339] flags: 0x0(zone=0) [ 48.051422] raw: 00000000 eebbf744 e8a3ac4c 00000000 00000000 00000000 ffffffff 00000000 [ 48.059570] raw: 00000000 [ 48.062194] page dumped because: kasan: bad access detected [ 48.067810] [ 48.069305] Memory state around the buggy address: [ 48.074127] cc74bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.080718] cc74bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.087280] >cc74c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.093841] ^ [ 48.096405] cc74c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.102966] cc74c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.109527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 47.654663] ================================================================== [ 47.666046] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e8/0x330 [ 47.673583] Write of size 1 at addr cc74e00a by task kunit_try_catch/198 [ 47.680328] [ 47.681823] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 47.681854] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.681884] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.681884] Call trace: [ 47.681884] unwind_backtrace from show_stack+0x18/0x1c [ 47.681915] show_stack from dump_stack_lvl+0x70/0x90 [ 47.681945] dump_stack_lvl from print_report+0x158/0x528 [ 47.681976] print_report from kasan_report+0xdc/0x118 [ 47.681976] kasan_report from kmalloc_large_oob_right+0x2e8/0x330 [ 47.682006] kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.682037] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.682067] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.682098] kthread from ret_from_fork+0x14/0x20 [ 47.682098] Exception stack(0xf21d3fb0 to 0xf21d3ff8) [ 47.682128] 3fa0: 00000000 00000000 00000000 00000000 [ 47.682128] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.682159] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.682159] [ 47.788940] The buggy address belongs to the physical page: [ 47.794555] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c [ 47.801818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.809539] flags: 0x40(head|zone=0) [ 47.813140] page_type: f8(unknown) [ 47.816558] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 47.824707] raw: 00000000 [ 47.827362] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 47.835601] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 47.843811] head: 00000000 00000004 [ 47.847320] page dumped because: kasan: bad access detected [ 47.852935] [ 47.854431] Memory state around the buggy address: [ 47.859252] cc74df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.865844] cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.872406] >cc74e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.878967] ^ [ 47.881774] cc74e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.888366] cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.894927] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 47.347839] ================================================================== [ 47.359985] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x324/0x37c [ 47.367370] Write of size 1 at addr ca82df00 by task kunit_try_catch/196 [ 47.374114] [ 47.375610] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 47.375640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.375640] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.375671] Call trace: [ 47.375671] unwind_backtrace from show_stack+0x18/0x1c [ 47.375701] show_stack from dump_stack_lvl+0x70/0x90 [ 47.375701] dump_stack_lvl from print_report+0x158/0x528 [ 47.375732] print_report from kasan_report+0xdc/0x118 [ 47.375762] kasan_report from kmalloc_big_oob_right+0x324/0x37c [ 47.375793] kmalloc_big_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.375793] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.375823] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.375854] kthread from ret_from_fork+0x14/0x20 [ 47.375885] Exception stack(0xf21c3fb0 to 0xf21c3ff8) [ 47.375885] 3fa0: 00000000 00000000 00000000 00000000 [ 47.375915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.375915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.375946] [ 47.482360] Allocated by task 196: [ 47.485809] kasan_save_track+0x30/0x5c [ 47.489654] __kasan_kmalloc+0x8c/0x94 [ 47.493438] kmalloc_big_oob_right+0xd0/0x37c [ 47.497833] kunit_try_run_case+0x22c/0x5a8 [ 47.502044] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.507568] kthread+0x464/0x810 [ 47.510833] ret_from_fork+0x14/0x20 [ 47.514434] [ 47.515930] The buggy address belongs to the object at ca82c000 [ 47.515930] which belongs to the cache kmalloc-8k of size 8192 [ 47.527832] The buggy address is located 0 bytes to the right of [ 47.527832] allocated 7936-byte region [ca82c000, ca82df00) [ 47.539550] [ 47.541046] The buggy address belongs to the physical page: [ 47.546661] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8a828 [ 47.553924] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.561645] flags: 0x40(head|zone=0) [ 47.565246] page_type: f5(slab) [ 47.568420] raw: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000 [ 47.576568] raw: 00000000 [ 47.579193] head: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000 [ 47.587432] head: 00000000 00000003 eeb795a1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 47.595672] head: 00000000 00000008 [ 47.599182] page dumped because: kasan: bad access detected [ 47.604797] [ 47.606292] Memory state around the buggy address: [ 47.611114] ca82de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.617675] ca82de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.624237] >ca82df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.630828] ^ [ 47.633361] ca82df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.639923] ca82e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.646514] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 47.061279] ================================================================== [ 47.068572] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x548 [ 47.076721] Write of size 1 at addr cc78e878 by task kunit_try_catch/194 [ 47.083465] [ 47.084960] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 47.084991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.084991] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.085021] Call trace: [ 47.085021] unwind_backtrace from show_stack+0x18/0x1c [ 47.085052] show_stack from dump_stack_lvl+0x70/0x90 [ 47.085052] dump_stack_lvl from print_report+0x158/0x528 [ 47.085083] print_report from kasan_report+0xdc/0x118 [ 47.085113] kasan_report from kmalloc_track_caller_oob_right+0x4c8/0x548 [ 47.085144] kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.085174] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.085205] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.085205] kthread from ret_from_fork+0x14/0x20 [ 47.085235] Exception stack(0xf21bbfb0 to 0xf21bbff8) [ 47.085235] bfa0: 00000000 00000000 00000000 00000000 [ 47.085266] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.085266] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.085296] [ 47.193298] Allocated by task 194: [ 47.196716] kasan_save_track+0x30/0x5c [ 47.200592] __kasan_kmalloc+0x8c/0x94 [ 47.204376] __kmalloc_node_track_caller_noprof+0x210/0x470 [ 47.209991] kmalloc_track_caller_oob_right+0x1c4/0x548 [ 47.215240] kunit_try_run_case+0x22c/0x5a8 [ 47.219482] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.225006] kthread+0x464/0x810 [ 47.228271] ret_from_fork+0x14/0x20 [ 47.231872] [ 47.233367] The buggy address belongs to the object at cc78e800 [ 47.233367] which belongs to the cache kmalloc-128 of size 128 [ 47.245269] The buggy address is located 0 bytes to the right of [ 47.245269] allocated 120-byte region [cc78e800, cc78e878) [ 47.256896] [ 47.258392] The buggy address belongs to the physical page: [ 47.264007] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 47.271270] flags: 0x0(zone=0) [ 47.274353] page_type: f5(slab) [ 47.277526] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 47.285675] raw: 00000000 [ 47.288299] page dumped because: kasan: bad access detected [ 47.293914] [ 47.295410] Memory state around the buggy address: [ 47.300231] cc78e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.306793] cc78e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.313385] >cc78e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.319946] ^ [ 47.326416] cc78e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.332977] cc78e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.339569] ================================================================== [ 46.771270] ================================================================== [ 46.782745] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c0/0x548 [ 46.790924] Write of size 1 at addr cc78e778 by task kunit_try_catch/194 [ 46.797668] [ 46.799163] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 46.799194] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.799194] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.799224] Call trace: [ 46.799224] unwind_backtrace from show_stack+0x18/0x1c [ 46.799255] show_stack from dump_stack_lvl+0x70/0x90 [ 46.799255] dump_stack_lvl from print_report+0x158/0x528 [ 46.799285] print_report from kasan_report+0xdc/0x118 [ 46.799316] kasan_report from kmalloc_track_caller_oob_right+0x4c0/0x548 [ 46.799346] kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 46.799377] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.799407] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.799407] kthread from ret_from_fork+0x14/0x20 [ 46.799438] Exception stack(0xf21bbfb0 to 0xf21bbff8) [ 46.799438] bfa0: 00000000 00000000 00000000 00000000 [ 46.799468] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.799468] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.799499] [ 46.907501] Allocated by task 194: [ 46.910949] kasan_save_track+0x30/0x5c [ 46.914794] __kasan_kmalloc+0x8c/0x94 [ 46.918579] __kmalloc_node_track_caller_noprof+0x210/0x470 [ 46.924194] kmalloc_track_caller_oob_right+0x98/0x548 [ 46.929382] kunit_try_run_case+0x22c/0x5a8 [ 46.933593] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.939117] kthread+0x464/0x810 [ 46.942382] ret_from_fork+0x14/0x20 [ 46.945983] [ 46.947479] The buggy address belongs to the object at cc78e700 [ 46.947479] which belongs to the cache kmalloc-128 of size 128 [ 46.959381] The buggy address is located 0 bytes to the right of [ 46.959381] allocated 120-byte region [cc78e700, cc78e778) [ 46.971008] [ 46.972503] The buggy address belongs to the physical page: [ 46.978118] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 46.985382] flags: 0x0(zone=0) [ 46.988464] page_type: f5(slab) [ 46.991638] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.999786] raw: 00000000 [ 47.002410] page dumped because: kasan: bad access detected [ 47.008026] [ 47.009521] Memory state around the buggy address: [ 47.014343] cc78e600: 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc fc [ 47.020904] cc78e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.027496] >cc78e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.034057] ^ [ 47.040527] cc78e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.047119] cc78e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.053680] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 103.254486] WARNING: CPU: 1 PID: 700 at lib/math/int_log.c:120 intlog10+0x10c/0x140 [ 103.262237] Modules linked in: [ 103.265747] CPU: 1 UID: 0 PID: 700 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 103.265777] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 103.265777] Hardware name: Generic DRA74X (Flattened Device Tree) [ 103.265777] Call trace: [ 103.265808] unwind_backtrace from show_stack+0x18/0x1c [ 103.265838] show_stack from dump_stack_lvl+0x70/0x90 [ 103.265869] dump_stack_lvl from __warn+0x154/0x2e0 [ 103.265899] __warn from warn_slowpath_fmt+0x24c/0x258 [ 103.265930] warn_slowpath_fmt from intlog10+0x10c/0x140 [ 103.265930] intlog10 from intlog10_test+0x124/0x258 [ 103.265960] intlog10_test from kunit_try_run_case+0x22c/0x5a8 [ 103.265991] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 103.266021] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 103.266052] kthread from ret_from_fork+0x14/0x20 [ 103.266082] Exception stack(0xf3003fb0 to 0xf3003ff8) [ 103.266113] 3fa0: 00000000 00000000 00000000 00000000 [ 103.266113] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 103.266143] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 103.266143] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 46.465454] ================================================================== [ 46.476409] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x380/0x3c4 [ 46.483886] Read of size 1 at addr cc7ab000 by task kunit_try_catch/192 [ 46.490539] [ 46.492034] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 46.492065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.492065] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.492095] Call trace: [ 46.492095] unwind_backtrace from show_stack+0x18/0x1c [ 46.492126] show_stack from dump_stack_lvl+0x70/0x90 [ 46.492156] dump_stack_lvl from print_report+0x158/0x528 [ 46.492156] print_report from kasan_report+0xdc/0x118 [ 46.492187] kasan_report from kmalloc_node_oob_right+0x380/0x3c4 [ 46.492218] kmalloc_node_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 46.492248] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.492279] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.492309] kthread from ret_from_fork+0x14/0x20 [ 46.492309] Exception stack(0xf21abfb0 to 0xf21abff8) [ 46.492340] bfa0: 00000000 00000000 00000000 00000000 [ 46.492340] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.492370] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.492370] [ 46.598968] Allocated by task 192: [ 46.602416] kasan_save_track+0x30/0x5c [ 46.606262] __kasan_kmalloc+0x8c/0x94 [ 46.610046] kmalloc_node_oob_right+0xd4/0x3c4 [ 46.614532] kunit_try_run_case+0x22c/0x5a8 [ 46.618743] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.624267] kthread+0x464/0x810 [ 46.627532] ret_from_fork+0x14/0x20 [ 46.631134] [ 46.632629] The buggy address belongs to the object at cc7aa000 [ 46.632629] which belongs to the cache kmalloc-4k of size 4096 [ 46.644531] The buggy address is located 0 bytes to the right of [ 46.644531] allocated 4096-byte region [cc7aa000, cc7ab000) [ 46.656249] [ 46.657775] The buggy address belongs to the physical page: [ 46.663391] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7a8 [ 46.670654] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.678344] flags: 0x40(head|zone=0) [ 46.681945] page_type: f5(slab) [ 46.685119] raw: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000 [ 46.693267] raw: 00000000 [ 46.695922] head: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000 [ 46.704162] head: 00000000 00000003 eebc03a1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 46.712371] head: 00000000 00000008 [ 46.715881] page dumped because: kasan: bad access detected [ 46.721496] [ 46.722991] Memory state around the buggy address: [ 46.727813] cc7aaf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.734405] cc7aaf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.740966] >cc7ab000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.747528] ^ [ 46.750091] cc7ab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.756652] cc7ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.763214] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 46.143371] ================================================================== [ 46.154418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x378/0x3b8 [ 46.161346] Read of size 1 at addr cc795a7f by task kunit_try_catch/190 [ 46.167999] [ 46.169494] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 46.169525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.169525] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.169555] Call trace: [ 46.169555] unwind_backtrace from show_stack+0x18/0x1c [ 46.169586] show_stack from dump_stack_lvl+0x70/0x90 [ 46.169616] dump_stack_lvl from print_report+0x158/0x528 [ 46.169647] print_report from kasan_report+0xdc/0x118 [ 46.169647] kasan_report from kmalloc_oob_left+0x378/0x3b8 [ 46.169677] kmalloc_oob_left from kunit_try_run_case+0x22c/0x5a8 [ 46.169708] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.169738] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.169769] kthread from ret_from_fork+0x14/0x20 [ 46.169769] Exception stack(0xf219bfb0 to 0xf219bff8) [ 46.169799] bfa0: 00000000 00000000 00000000 00000000 [ 46.169799] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.169830] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.169830] [ 46.275390] Allocated by task 189: [ 46.278839] kasan_save_track+0x30/0x5c [ 46.282684] __kasan_kmalloc+0x8c/0x94 [ 46.286468] kmem_cache_free+0x1e0/0x470 [ 46.290435] release_task+0xcb8/0x175c [ 46.294219] do_exit+0x14b8/0x2584 [ 46.297637] kthread_exit+0x208/0x25c [ 46.301330] kthread+0x420/0x810 [ 46.304595] ret_from_fork+0x14/0x20 [ 46.308197] [ 46.309692] Last potentially related work creation: [ 46.314605] kasan_save_stack+0x30/0x4c [ 46.318481] kasan_record_aux_stack+0x80/0x88 [ 46.322875] __call_rcu_common.constprop.0+0x98/0xb80 [ 46.327972] kmem_cache_free+0x204/0x470 [ 46.331909] release_task+0xcb8/0x175c [ 46.335693] do_exit+0x14b8/0x2584 [ 46.339141] kthread_exit+0x208/0x25c [ 46.342834] kthread+0x420/0x810 [ 46.346069] ret_from_fork+0x14/0x20 [ 46.349670] [ 46.351196] The buggy address belongs to the object at cc795a00 [ 46.351196] which belongs to the cache kmalloc-64 of size 64 [ 46.362915] The buggy address is located 115 bytes to the right of [ 46.362915] allocated 12-byte region [cc795a00, cc795a0c) [ 46.374633] [ 46.376129] The buggy address belongs to the physical page: [ 46.381744] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c795 [ 46.389007] flags: 0x0(zone=0) [ 46.392089] page_type: f5(slab) [ 46.395263] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 46.403411] raw: 00000000 [ 46.406036] page dumped because: kasan: bad access detected [ 46.411651] [ 46.413146] Memory state around the buggy address: [ 46.417968] cc795900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.424530] cc795980: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc [ 46.431121] >cc795a00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.437683] ^ [ 46.444152] cc795a80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.450744] cc795b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.457305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 45.316314] ================================================================== [ 45.323577] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744 [ 45.330596] Write of size 1 at addr cc7d8173 by task kunit_try_catch/188 [ 45.337371] [ 45.338867] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G W N 6.15.0-next-20250530 #1 NONE [ 45.338928] Tainted: [W]=WARN, [N]=TEST [ 45.338928] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.338928] Call trace: [ 45.338958] unwind_backtrace from show_stack+0x18/0x1c [ 45.338989] show_stack from dump_stack_lvl+0x70/0x90 [ 45.339019] dump_stack_lvl from print_report+0x158/0x528 [ 45.339050] print_report from kasan_report+0xdc/0x118 [ 45.339080] kasan_report from kmalloc_oob_right+0x6a4/0x744 [ 45.339111] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.339141] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.339172] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.339202] kthread from ret_from_fork+0x14/0x20 [ 45.339233] Exception stack(0xf2193fb0 to 0xf2193ff8) [ 45.339263] 3fa0: 00000000 00000000 00000000 00000000 [ 45.339294] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.339294] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.339324] [ 45.443847] Allocated by task 188: [ 45.447265] kasan_save_track+0x30/0x5c [ 45.451141] __kasan_kmalloc+0x8c/0x94 [ 45.454925] kmalloc_oob_right+0xcc/0x744 [ 45.458953] kunit_try_run_case+0x22c/0x5a8 [ 45.463195] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.468719] kthread+0x464/0x810 [ 45.471984] ret_from_fork+0x14/0x20 [ 45.475585] [ 45.477081] The buggy address belongs to the object at cc7d8100 [ 45.477081] which belongs to the cache kmalloc-128 of size 128 [ 45.488983] The buggy address is located 0 bytes to the right of [ 45.488983] allocated 115-byte region [cc7d8100, cc7d8173) [ 45.500610] [ 45.502105] The buggy address belongs to the physical page: [ 45.507720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8 [ 45.514984] flags: 0x0(zone=0) [ 45.518066] page_type: f5(slab) [ 45.521240] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 45.529388] raw: 00000000 [ 45.532043] page dumped because: kasan: bad access detected [ 45.537628] [ 45.539154] Memory state around the buggy address: [ 45.543975] cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc [ 45.550537] cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.557098] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 45.563659] ^ [ 45.569885] cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.576477] cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.583038] ================================================================== [ 45.595733] ================================================================== [ 45.602996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744 [ 45.610015] Write of size 1 at addr cc7d8178 by task kunit_try_catch/188 [ 45.616760] [ 45.618286] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 45.618316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 45.618316] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.618316] Call trace: [ 45.618316] unwind_backtrace from show_stack+0x18/0x1c [ 45.618347] show_stack from dump_stack_lvl+0x70/0x90 [ 45.618377] dump_stack_lvl from print_report+0x158/0x528 [ 45.618408] print_report from kasan_report+0xdc/0x118 [ 45.618438] kasan_report from kmalloc_oob_right+0x660/0x744 [ 45.618438] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.618469] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.618499] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.618530] kthread from ret_from_fork+0x14/0x20 [ 45.618530] Exception stack(0xf2193fb0 to 0xf2193ff8) [ 45.618560] 3fa0: 00000000 00000000 00000000 00000000 [ 45.618560] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.618591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.618591] [ 45.724334] Allocated by task 188: [ 45.727783] kasan_save_track+0x30/0x5c [ 45.731628] __kasan_kmalloc+0x8c/0x94 [ 45.735412] kmalloc_oob_right+0xcc/0x744 [ 45.739440] kunit_try_run_case+0x22c/0x5a8 [ 45.743682] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.749206] kthread+0x464/0x810 [ 45.752471] ret_from_fork+0x14/0x20 [ 45.756072] [ 45.757568] The buggy address belongs to the object at cc7d8100 [ 45.757568] which belongs to the cache kmalloc-128 of size 128 [ 45.769470] The buggy address is located 5 bytes to the right of [ 45.769470] allocated 115-byte region [cc7d8100, cc7d8173) [ 45.781097] [ 45.782592] The buggy address belongs to the physical page: [ 45.788208] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8 [ 45.795471] flags: 0x0(zone=0) [ 45.798553] page_type: f5(slab) [ 45.801727] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 45.809875] raw: 00000000 [ 45.812499] page dumped because: kasan: bad access detected [ 45.818115] [ 45.819610] Memory state around the buggy address: [ 45.824432] cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc [ 45.830993] cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.837585] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 45.844146] ^ [ 45.850616] cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.857177] cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.863769] ================================================================== [ 45.871093] ================================================================== [ 45.878356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744 [ 45.885375] Read of size 1 at addr cc7d8180 by task kunit_try_catch/188 [ 45.892028] [ 45.893524] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 45.893554] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 45.893554] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.893585] Call trace: [ 45.893585] unwind_backtrace from show_stack+0x18/0x1c [ 45.893615] show_stack from dump_stack_lvl+0x70/0x90 [ 45.893615] dump_stack_lvl from print_report+0x158/0x528 [ 45.893646] print_report from kasan_report+0xdc/0x118 [ 45.893676] kasan_report from kmalloc_oob_right+0x6c0/0x744 [ 45.893707] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.893707] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.893737] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.893768] kthread from ret_from_fork+0x14/0x20 [ 45.893798] Exception stack(0xf2193fb0 to 0xf2193ff8) [ 45.893798] 3fa0: 00000000 00000000 00000000 00000000 [ 45.893829] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.893829] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.893859] [ 45.999603] Allocated by task 188: [ 46.003021] kasan_save_track+0x30/0x5c [ 46.006896] __kasan_kmalloc+0x8c/0x94 [ 46.010650] kmalloc_oob_right+0xcc/0x744 [ 46.014709] kunit_try_run_case+0x22c/0x5a8 [ 46.018920] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.024444] kthread+0x464/0x810 [ 46.027709] ret_from_fork+0x14/0x20 [ 46.031311] [ 46.032806] The buggy address belongs to the object at cc7d8100 [ 46.032806] which belongs to the cache kmalloc-128 of size 128 [ 46.044708] The buggy address is located 13 bytes to the right of [ 46.044708] allocated 115-byte region [cc7d8100, cc7d8173) [ 46.056427] [ 46.057922] The buggy address belongs to the physical page: [ 46.063537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8 [ 46.070800] flags: 0x0(zone=0) [ 46.073883] page_type: f5(slab) [ 46.077056] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.085205] raw: 00000000 [ 46.087829] page dumped because: kasan: bad access detected [ 46.093444] [ 46.094940] Memory state around the buggy address: [ 46.099761] cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.106323] cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.112915] >cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.119476] ^ [ 46.122039] cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.128601] cc7d8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.135162] ==================================================================
Failure - log-parser-boot - exception-rtc_time64_to_tm_test_date_range_160000speed-slow
------------[ cut here ]------------ [ 228.757141] # rtc_time64_to_tm_test_date_range_160000.speed: slow [ 228.761413] WARNING: CPU: 0 PID: 77 at drivers/bus/omap_l3_noc.c:133 l3_interrupt_handler+0x6e0/0xb2c [ 228.761444] ok 2 rtc_time64_to_tm_test_date_range_160000 [ 228.767913] 44000000.l3-noc:L3 Custom Error: MASTER MPU TARGET L4_PER1_P3 (Read): Data Access in User mode during Functional access [ 228.767944] Modules linked in: [ 228.767944] CPU: 0 UID: 0 PID: 77 Comm: irq/115-4807000 Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 228.767974] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 228.768005] Hardware name: Generic DRA74X (Flattened Device Tree) [ 228.768005] Call trace: [ 228.768005] unwind_backtrace from show_stack+0x18/0x1c [ 228.768035] show_stack from dump_stack_lvl+0x70/0x90 [ 228.768066] dump_stack_lvl from __warn+0x154/0x2e0 [ 228.768096] __warn from warn_slowpath_fmt+0x200/0x258 [ 228.768127] warn_slowpath_fmt from l3_interrupt_handler+0x6e0/0xb2c [ 228.768157] l3_interrupt_handler from __handle_irq_event_percpu+0x25c/0x5ec [ 228.768188] __handle_irq_event_percpu from handle_irq_event+0x10c/0x268 [ 228.768218] handle_irq_event from handle_fasteoi_irq+0x27c/0x9e4 [ 228.768249] handle_fasteoi_irq from handle_irq_desc+0x128/0x17c [ 228.768280] handle_irq_desc from gic_handle_irq+0xc8/0x138 [ 228.768310] gic_handle_irq from generic_handle_arch_irq+0x30/0x40 [ 228.768341] generic_handle_arch_irq from call_with_stack+0x18/0x20 [ 228.768371] call_with_stack from __irq_svc+0x90/0xac [ 228.768371] Exception stack(0xf14a3d40 to 0xf14a3d88) [ 228.768402] 3d40: c50e40e2 00000028 00000000 00000000 ca7fa840 194ff509 194ff50f 194ff508 [ 228.768432] 3d60: 00000000 00000007 00000007 c50e40e0 00000000 f14a3d90 c33c1260 c33c0498 [ 228.768432] 3d80: 60000113 ffffffff [ 228.768432] __irq_svc from omap_i2c_xfer_data+0xbd4/0x136c [ 228.768493] omap_i2c_xfer_data from omap_i2c_isr_thread+0x18/0x88 [ 228.768524] omap_i2c_isr_thread from irq_thread_fn+0xb8/0x19c [ 228.768554] irq_thread_fn from irq_thread+0x40c/0x76c [ 228.768554] irq_thread from kthread+0x464/0x810 [ 228.768585] kthread from ret_from_fork+0x14/0x20 [ 228.768615] Exception stack(0xf14a3fb0 to 0xf14a3ff8) [ 228.768615] 3fa0: 00000000 00000000 00000000 00000000 [ 228.768646] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 228.768646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 228.768676] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
------------[ cut here ]------------ [ 186.530181] WARNING: CPU: 1 PID: 3030 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0 [ 186.540130] Modules linked in: [ 186.543701] CPU: 1 UID: 0 PID: 3030 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 186.543731] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 186.543731] Hardware name: Generic DRA74X (Flattened Device Tree) [ 186.543731] Call trace: [ 186.543731] unwind_backtrace from show_stack+0x18/0x1c [ 186.543792] show_stack from dump_stack_lvl+0x70/0x90 [ 186.543792] dump_stack_lvl from __warn+0x154/0x2e0 [ 186.543823] __warn from warn_slowpath_fmt+0x24c/0x258 [ 186.543853] warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0 [ 186.543884] drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4 [ 186.543914] drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8 [ 186.543945] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 186.543975] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 186.544006] kthread from ret_from_fork+0x14/0x20 [ 186.544036] Exception stack(0xf260bfb0 to 0xf260bff8) [ 186.544036] bfa0: 00000000 00000000 00000000 00000000 [ 186.544067] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 186.544067] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 186.544067] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 186.388671] WARNING: CPU: 1 PID: 3028 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0 [ 186.398498] Modules linked in: [ 186.401611] CPU: 1 UID: 0 PID: 3028 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 186.401641] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 186.401641] Hardware name: Generic DRA74X (Flattened Device Tree) [ 186.401641] Call trace: [ 186.401641] unwind_backtrace from show_stack+0x18/0x1c [ 186.401672] show_stack from dump_stack_lvl+0x70/0x90 [ 186.401702] dump_stack_lvl from __warn+0x154/0x2e0 [ 186.401733] __warn from warn_slowpath_fmt+0x24c/0x258 [ 186.401733] warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0 [ 186.401763] drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4 [ 186.401794] drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8 [ 186.401794] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 186.401824] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 186.401855] kthread from ret_from_fork+0x14/0x20 [ 186.401855] Exception stack(0xf25fbfb0 to 0xf25fbff8) [ 186.401885] bfa0: 00000000 00000000 00000000 00000000 [ 186.401885] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 186.401916] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 186.401916] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
------------[ cut here ]------------ [ 186.207672] WARNING: CPU: 1 PID: 3018 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0 [ 186.217529] Modules linked in: [ 186.220611] CPU: 1 UID: 0 PID: 3018 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 186.220642] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 186.220642] Hardware name: Generic DRA74X (Flattened Device Tree) [ 186.220642] Call trace: [ 186.220672] unwind_backtrace from show_stack+0x18/0x1c [ 186.220672] show_stack from dump_stack_lvl+0x70/0x90 [ 186.220703] dump_stack_lvl from __warn+0x154/0x2e0 [ 186.220733] __warn from warn_slowpath_fmt+0x24c/0x258 [ 186.220764] warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0 [ 186.220764] drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4 [ 186.220794] drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8 [ 186.220825] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 186.220825] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 186.220855] kthread from ret_from_fork+0x14/0x20 [ 186.220886] Exception stack(0xf25abfb0 to 0xf25abff8) [ 186.220886] bfa0: 00000000 00000000 00000000 00000000 [ 186.220916] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 186.220916] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 186.220916] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 186.066955] WARNING: CPU: 1 PID: 3016 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0 [ 186.076660] Modules linked in: [ 186.079772] CPU: 1 UID: 0 PID: 3016 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 186.079803] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 186.079803] Hardware name: Generic DRA74X (Flattened Device Tree) [ 186.079803] Call trace: [ 186.079803] unwind_backtrace from show_stack+0x18/0x1c [ 186.079833] show_stack from dump_stack_lvl+0x70/0x90 [ 186.079864] dump_stack_lvl from __warn+0x154/0x2e0 [ 186.079895] __warn from warn_slowpath_fmt+0x24c/0x258 [ 186.079925] warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0 [ 186.079925] drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4 [ 186.079956] drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8 [ 186.079986] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 186.080017] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 186.080047] kthread from ret_from_fork+0x14/0x20 [ 186.080047] Exception stack(0xf259bfb0 to 0xf259bff8) [ 186.080078] bfa0: 00000000 00000000 00000000 00000000 [ 186.080078] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 186.080078] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 186.080108] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 103.065460] WARNING: CPU: 1 PID: 682 at lib/math/int_log.c:63 intlog2+0xf8/0x12c [ 103.072967] Modules linked in: [ 103.076049] CPU: 1 UID: 0 PID: 682 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 103.076080] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 103.076080] Hardware name: Generic DRA74X (Flattened Device Tree) [ 103.076080] Call trace: [ 103.076110] unwind_backtrace from show_stack+0x18/0x1c [ 103.076141] show_stack from dump_stack_lvl+0x70/0x90 [ 103.076171] dump_stack_lvl from __warn+0x154/0x2e0 [ 103.076171] __warn from warn_slowpath_fmt+0x24c/0x258 [ 103.076202] warn_slowpath_fmt from intlog2+0xf8/0x12c [ 103.076232] intlog2 from intlog2_test+0x124/0x258 [ 103.076232] intlog2_test from kunit_try_run_case+0x22c/0x5a8 [ 103.076263] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 103.076293] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 103.076324] kthread from ret_from_fork+0x14/0x20 [ 103.076324] Exception stack(0xf2f7bfb0 to 0xf2f7bff8) [ 103.076354] bfa0: 00000000 00000000 00000000 00000000 [ 103.076354] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 103.076385] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 103.076385] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-unable-to-handle-kernel-paging-request-at-virtual-address-when-read
--- cut here --- [ 101.439697] Unable to handle kernel paging request at virtual address 9f000000 when read [ 101.448059] [9f000000] *pgd=80000080206003, *pmd=00000000 [ 101.453735] Internal error: Oops: 206 [#1] SMP ARM [ 101.458557] Modules linked in: [ 101.461639] CPU: 0 UID: 0 PID: 576 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 101.472259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 101.477325] Hardware name: Generic DRA74X (Flattened Device Tree) [ 101.483459] PC is at kunit_test_null_dereference+0x74/0x1a0 [ 101.489074] LR is at kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 101.495330] pc : [<c169c598>] lr : [<c1691e50>] psr: 60000013 [ 101.501617] sp : f2c73e48 ip : 41b58ab3 fp : ccd33cd0 [ 101.506866] r10: b89a679a r9 : ccd11c00 r8 : c169c524 [ 101.512145] r7 : b895b4f0 r6 : ccada784 r5 : bd58e7cc r4 : f0013b40 [ 101.518707] r3 : f2c73ec0 r2 : ccd33ac0 r1 : 9f000000 r0 : 00000000 [ 101.525268] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 101.532470] Control: 30c5387d Table: 8c910200 DAC: fffffffd [ 101.538238] Register r0 information: NULL pointer [ 101.542999] Register r1 information: non-paged memory [ 101.548065] Register r2 information: slab task_struct start ccd33ac0 pointer offset 0 size 2880 [ 101.556854] Register r3 information: 4-page vmalloc region starting at 0xf2c70000 allocated at kernel_clone+0x174/0x794 [ 101.567718] Register r4 information: 4-page vmalloc region starting at 0xf0010000 allocated at kernel_clone+0x174/0x794 [ 101.578582] Register r5 information: non-paged memory [ 101.583679] Register r6 information: slab kmalloc-64 start ccada780 pointer offset 4 size 64 [ 101.592193] Register r7 information: non-paged memory [ 101.597290] Register r8 information: non-slab/vmalloc memory [ 101.602996] Register r9 information: slab kmalloc-128 start ccd11c00 pointer offset 0 size 128 [ 101.611694] Register r10 information: non-paged memory [ 101.616882] Register r11 information: slab task_struct start ccd33ac0 pointer offset 528 size 2880 [ 101.625915] Register r12 information: non-paged memory [ 101.631103] Process kunit_try_catch (pid: 576, stack limit = 0x2d1e9673) [ 101.637847] Stack: (0xf2c73e48 to 0xf2c74000) [ 101.642242] 3e40: c05d5740 00000000 00000000 00000000 00000000 00000000 [ 101.650482] 3e60: 41b58ab3 c577f404 c169c524 c5cc6574 c69ce280 c42f9064 22d6e000 ccd342d4 [ 101.658691] 3e80: ccd33ac0 ccd11c00 199a6798 c0892e20 ccd342d4 60000013 00000003 c69cd480 [ 101.666931] 3ea0: ccd342d4 ccd33ac0 ccd11c00 c42f9064 c69cd484 00000007 00000003 c058dfc0 [ 101.675170] 3ec0: 00000003 ccd33cc0 00000003 199a2380 00000000 62e9436f f2c73ef4 ccada780 [ 101.683410] 3ee0: 00000004 c1691e50 ccd11c00 ccd33ac0 f2c73f80 c1691d8c ccada780 c058ee00 [ 101.691619] 3f00: 22d6e000 00000000 22d6e000 00000000 f2c73f8c c0892e20 e8a37500 c5cc9500 [ 101.699859] 3f20: 41b58ab3 c57224b8 c058e99c 22d6e000 00000000 c05bb77c 00000000 00000000 [ 101.708099] 3f40: fefefefe 00000000 00000000 00000000 c05c8f34 c5cc6574 c69ce280 c053fd38 [ 101.716308] 3f60: 22d6e000 00000000 00000000 00000000 00000000 c0892e20 ccd39cc0 ccd34274 [ 101.724548] 3f80: ccd33ac0 62e9436f 00000000 ccada880 c058e99c 00000000 00000000 00000000 [ 101.732788] 3fa0: 00000000 00000000 00000000 c0400254 00000000 00000000 00000000 00000000 [ 101.740997] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 101.749237] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000 [ 101.757476] Call trace: [ 101.757476] kunit_test_null_dereference from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 101.768432] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 101.775207] kthread from ret_from_fork+0x14/0x20 [ 101.779937] Exception stack(0xf2c73fb0 to 0xf2c73ff8) [ 101.785034] 3fa0: 00000000 00000000 00000000 00000000 [ 101.793273] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 101.801483] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 101.808166] Code: e1a04000 e5920678 e58d008c e3a00000 (e1d110d0) [ 101.814544] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_gem_shmem_helper-drm_gem_shmem_free
------------[ cut here ]------------ [ 184.686126] WARNING: CPU: 1 PID: 2833 at drivers/gpu/drm/drm_gem_shmem_helper.c:180 drm_gem_shmem_free+0x74c/0x95c [ 184.697082] drm-kunit-mock-device drm_gem_shmem_test_get_pages_sgt.drm-kunit-mock-device: [drm] drm_WARN_ON(refcount_read(&shmem->pages_pin_count)) [ 184.697082] Modules linked in: [ 184.713500] CPU: 1 UID: 0 PID: 2833 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 184.713531] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 184.713531] Hardware name: Generic DRA74X (Flattened Device Tree) [ 184.713562] Call trace: [ 184.713562] unwind_backtrace from show_stack+0x18/0x1c [ 184.713592] show_stack from dump_stack_lvl+0x70/0x90 [ 184.713623] dump_stack_lvl from __warn+0x154/0x2e0 [ 184.713653] __warn from warn_slowpath_fmt+0x200/0x258 [ 184.713653] warn_slowpath_fmt from drm_gem_shmem_free+0x74c/0x95c [ 184.713684] drm_gem_shmem_free from kunit_remove_resource+0x1ac/0x264 [ 184.713714] kunit_remove_resource from kunit_cleanup+0x78/0x13c [ 184.713745] kunit_cleanup from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 184.713775] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 184.713775] kthread from ret_from_fork+0x14/0x20 [ 184.713806] Exception stack(0xf20cbfb0 to 0xf20cbff8) [ 184.713806] bfa0: 00000000 00000000 00000000 00000000 [ 184.713836] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 184.713836] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 184.713836] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
------------[ cut here ]------------ [ 184.389801] WARNING: CPU: 1 PID: 2814 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x2f4/0x384 [ 184.399993] Modules linked in: [ 184.403106] CPU: 1 UID: 0 PID: 2814 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 184.403137] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 184.403167] Hardware name: Generic DRA74X (Flattened Device Tree) [ 184.403167] Call trace: [ 184.403167] unwind_backtrace from show_stack+0x18/0x1c [ 184.403198] show_stack from dump_stack_lvl+0x70/0x90 [ 184.403228] dump_stack_lvl from __warn+0x154/0x2e0 [ 184.403259] __warn from warn_slowpath_fmt+0x24c/0x258 [ 184.403259] warn_slowpath_fmt from drm_framebuffer_init+0x2f4/0x384 [ 184.403289] drm_framebuffer_init from drm_test_framebuffer_init_bad_format+0x110/0x24c [ 184.403320] drm_test_framebuffer_init_bad_format from kunit_try_run_case+0x22c/0x5a8 [ 184.403350] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 184.403381] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 184.403381] kthread from ret_from_fork+0x14/0x20 [ 184.403411] Exception stack(0xf208bfb0 to 0xf208bff8) [ 184.403411] bfa0: 00000000 00000000 00000000 00000000 [ 184.403442] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 184.403442] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 184.403472] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_free
------------[ cut here ]------------ [ 184.224517] WARNING: CPU: 1 PID: 2810 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x1e0/0x28c [ 184.234771] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 184.234802] Modules linked in: [ 184.249603] CPU: 1 UID: 0 PID: 2810 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 184.249633] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 184.249664] Hardware name: Generic DRA74X (Flattened Device Tree) [ 184.249664] Call trace: [ 184.249664] unwind_backtrace from show_stack+0x18/0x1c [ 184.249694] show_stack from dump_stack_lvl+0x70/0x90 [ 184.249725] dump_stack_lvl from __warn+0x154/0x2e0 [ 184.249755] __warn from warn_slowpath_fmt+0x200/0x258 [ 184.249786] warn_slowpath_fmt from drm_framebuffer_free+0x1e0/0x28c [ 184.249786] drm_framebuffer_free from drm_test_framebuffer_free+0x1fc/0x5b8 [ 184.249816] drm_test_framebuffer_free from kunit_try_run_case+0x22c/0x5a8 [ 184.249847] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 184.249877] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 184.249908] kthread from ret_from_fork+0x14/0x20 [ 184.249908] Exception stack(0xf182bfb0 to 0xf182bff8) [ 184.249938] bfa0: 00000000 00000000 00000000 00000000 [ 184.249938] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 184.249938] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 184.249969] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
------------[ cut here ]------------ [ 180.823913] WARNING: CPU: 1 PID: 2248 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c [ 180.834991] Modules linked in: [ 180.838104] CPU: 1 UID: 0 PID: 2248 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 180.838104] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 180.838134] Hardware name: Generic DRA74X (Flattened Device Tree) [ 180.838134] Call trace: [ 180.838134] unwind_backtrace from show_stack+0x18/0x1c [ 180.838165] show_stack from dump_stack_lvl+0x70/0x90 [ 180.838195] dump_stack_lvl from __warn+0x154/0x2e0 [ 180.838226] __warn from warn_slowpath_fmt+0x24c/0x258 [ 180.838226] warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c [ 180.838256] drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_no_init+0x12c/0x2c4 [ 180.838287] drm_test_drm_connector_dynamic_register_no_init from kunit_try_run_case+0x22c/0x5a8 [ 180.838317] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 180.838348] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 180.838348] kthread from ret_from_fork+0x14/0x20 [ 180.838378] Exception stack(0xf6d0bfb0 to 0xf6d0bff8) [ 180.838378] bfa0: 00000000 00000000 00000000 00000000 [ 180.838409] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 180.838409] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 180.838439] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 180.539215] WARNING: CPU: 1 PID: 2240 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c [ 180.550201] Modules linked in: [ 180.553344] CPU: 1 UID: 0 PID: 2240 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 180.553375] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 180.553375] Hardware name: Generic DRA74X (Flattened Device Tree) [ 180.553375] Call trace: [ 180.553405] unwind_backtrace from show_stack+0x18/0x1c [ 180.553436] show_stack from dump_stack_lvl+0x70/0x90 [ 180.553466] dump_stack_lvl from __warn+0x154/0x2e0 [ 180.553497] __warn from warn_slowpath_fmt+0x24c/0x258 [ 180.553527] warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c [ 180.553558] drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_early_no_init+0x12c/0x2c4 [ 180.553588] drm_test_drm_connector_dynamic_register_early_no_init from kunit_try_run_case+0x22c/0x5a8 [ 180.553619] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 180.553649] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 180.553680] kthread from ret_from_fork+0x14/0x20 [ 180.553710] Exception stack(0xf6cf3fb0 to 0xf6cf3ff8) [ 180.553710] 3fa0: 00000000 00000000 00000000 00000000 [ 180.553741] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 180.553741] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 180.553771] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_init_only
------------[ cut here ]------------ [ 177.606109] WARNING: CPU: 0 PID: 1838 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 177.616821] Modules linked in: [ 177.619934] CPU: 0 UID: 0 PID: 1838 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 177.619964] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 177.619964] Hardware name: Generic DRA74X (Flattened Device Tree) [ 177.619964] Call trace: [ 177.619995] unwind_backtrace from show_stack+0x18/0x1c [ 177.620025] show_stack from dump_stack_lvl+0x70/0x90 [ 177.620056] dump_stack_lvl from __warn+0x154/0x2e0 [ 177.620086] __warn from warn_slowpath_fmt+0x24c/0x258 [ 177.620117] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 177.620147] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 177.620147] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 177.620178] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 177.620208] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 177.620239] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 177.620269] kthread from ret_from_fork+0x14/0x20 [ 177.620300] Exception stack(0xf655bfb0 to 0xf655bff8) [ 177.620300] bfa0: 00000000 00000000 00000000 00000000 [ 177.620330] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 177.620361] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 177.620361] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 176.974151] WARNING: CPU: 0 PID: 1830 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 176.984893] Modules linked in: [ 176.988006] CPU: 0 UID: 0 PID: 1830 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 176.988037] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 176.988037] Hardware name: Generic DRA74X (Flattened Device Tree) [ 176.988037] Call trace: [ 176.988067] unwind_backtrace from show_stack+0x18/0x1c [ 176.988098] show_stack from dump_stack_lvl+0x70/0x90 [ 176.988098] dump_stack_lvl from __warn+0x154/0x2e0 [ 176.988128] __warn from warn_slowpath_fmt+0x24c/0x258 [ 176.988159] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 176.988189] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 176.988189] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 176.988220] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 176.988250] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 176.988281] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 176.988281] kthread from ret_from_fork+0x14/0x20 [ 176.988311] Exception stack(0xf6523fb0 to 0xf6523ff8) [ 176.988311] 3fa0: 00000000 00000000 00000000 00000000 [ 176.988342] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 176.988342] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 176.988342] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 177.139343] WARNING: CPU: 0 PID: 1832 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 177.149749] Modules linked in: [ 177.152923] CPU: 0 UID: 0 PID: 1832 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 177.152954] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 177.152954] Hardware name: Generic DRA74X (Flattened Device Tree) [ 177.152954] Call trace: [ 177.152984] unwind_backtrace from show_stack+0x18/0x1c [ 177.153015] show_stack from dump_stack_lvl+0x70/0x90 [ 177.153045] dump_stack_lvl from __warn+0x154/0x2e0 [ 177.153076] __warn from warn_slowpath_fmt+0x24c/0x258 [ 177.153106] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 177.153137] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 177.153137] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 177.153167] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 177.153198] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 177.153228] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 177.153259] kthread from ret_from_fork+0x14/0x20 [ 177.153289] Exception stack(0xf6533fb0 to 0xf6533ff8) [ 177.153320] 3fa0: 00000000 00000000 00000000 00000000 [ 177.153320] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 177.153350] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 177.153350] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 177.450653] WARNING: CPU: 0 PID: 1836 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 177.461364] Modules linked in: [ 177.464752] CPU: 0 UID: 0 PID: 1836 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 177.464782] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 177.464782] Hardware name: Generic DRA74X (Flattened Device Tree) [ 177.464813] Call trace: [ 177.464813] unwind_backtrace from show_stack+0x18/0x1c [ 177.464843] show_stack from dump_stack_lvl+0x70/0x90 [ 177.464874] dump_stack_lvl from __warn+0x154/0x2e0 [ 177.464904] __warn from warn_slowpath_fmt+0x24c/0x258 [ 177.464935] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 177.464935] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 177.464965] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 177.464996] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 177.465026] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 177.465057] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 177.465087] kthread from ret_from_fork+0x14/0x20 [ 177.465118] Exception stack(0xf654bfb0 to 0xf654bff8) [ 177.465118] bfa0: 00000000 00000000 00000000 00000000 [ 177.465148] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 177.465148] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 177.465179] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 177.294464] WARNING: CPU: 0 PID: 1834 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 177.305206] Modules linked in: [ 177.308319] CPU: 0 UID: 0 PID: 1834 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 177.308349] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 177.308349] Hardware name: Generic DRA74X (Flattened Device Tree) [ 177.308380] Call trace: [ 177.308380] unwind_backtrace from show_stack+0x18/0x1c [ 177.308410] show_stack from dump_stack_lvl+0x70/0x90 [ 177.308441] dump_stack_lvl from __warn+0x154/0x2e0 [ 177.308471] __warn from warn_slowpath_fmt+0x24c/0x258 [ 177.308502] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 177.308532] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 177.308563] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 177.308593] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 177.308624] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 177.308654] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 177.308685] kthread from ret_from_fork+0x14/0x20 [ 177.308715] Exception stack(0xf6543fb0 to 0xf6543ff8) [ 177.308715] 3fa0: 00000000 00000000 00000000 00000000 [ 177.308746] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 177.308746] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 177.308776] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-kerneltraceftrace-ftrace_bug
------------[ cut here ]------------ [ 0.000000] WARNING: CPU: 0 PID: 0 at kernel/trace/ftrace.c:2213 ftrace_bug+0x548/0x5b8 [ 0.000000] Modules linked in: [ 0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.15.0-next-20250530 #1 NONE [ 0.000000] Tainted: [W]=WARN [ 0.000000] Hardware name: Generic DRA74X (Flattened Device Tree) [ 0.000000] Call trace: [ 0.000000] unwind_backtrace from show_stack+0x18/0x1c [ 0.000000] show_stack from dump_stack_lvl+0x70/0x90 [ 0.000000] dump_stack_lvl from __warn+0x154/0x2e0 [ 0.000000] __warn from warn_slowpath_fmt+0x24c/0x258 [ 0.000000] warn_slowpath_fmt from ftrace_bug+0x548/0x5b8 [ 0.000000] ftrace_bug from ftrace_process_locs+0xe88/0xeb0 [ 0.000000] ftrace_process_locs from ftrace_init+0x6c/0x140 [ 0.000000] ftrace_init from start_kernel+0x1a8/0x3bc [ 0.000000] start_kernel from 0x0 [ 0.000000] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-archarmkernelinsn-__arm_gen_branch
------------[ cut here ]------------ [ 0.000000] WARNING: CPU: 0 PID: 0 at arch/arm/kernel/insn.c:48 __arm_gen_branch+0x74/0x7c [ 0.000000] Modules linked in: [ 0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.15.0-next-20250530 #1 NONE [ 0.000000] Hardware name: Generic DRA74X (Flattened Device Tree) [ 0.000000] Call trace: [ 0.000000] unwind_backtrace from show_stack+0x18/0x1c [ 0.000000] show_stack from dump_stack_lvl+0x70/0x90 [ 0.000000] dump_stack_lvl from __warn+0x154/0x2e0 [ 0.000000] __warn from warn_slowpath_fmt+0x24c/0x258 [ 0.000000] warn_slowpath_fmt from __arm_gen_branch+0x74/0x7c [ 0.000000] __arm_gen_branch from ftrace_make_nop+0x10c/0x24c [ 0.000000] ftrace_make_nop from ftrace_process_locs+0x490/0xeb0 [ 0.000000] ftrace_process_locs from ftrace_init+0x6c/0x140 [ 0.000000] ftrace_init from start_kernel+0x1a8/0x3bc [ 0.000000] start_kernel from 0x0 [ 0.000000] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - uboot-action
(no logs available)
Failure - lava - uboot-commands
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)