Date
May 30, 2025, 4:14 a.m.
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 38.293340] ================================================================== [ 38.303900] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.311012] Free of addr ffff000806014000 by task kunit_try_catch/283 [ 38.317435] [ 38.318920] CPU: 4 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.318980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.318997] Hardware name: WinLink E850-96 board (DT) [ 38.319017] Call trace: [ 38.319033] show_stack+0x20/0x38 (C) [ 38.319068] dump_stack_lvl+0x8c/0xd0 [ 38.319105] print_report+0x118/0x608 [ 38.319141] kasan_report_invalid_free+0xc0/0xe8 [ 38.319176] __kasan_mempool_poison_pages+0xe0/0xe8 [ 38.319211] mempool_free+0x24c/0x328 [ 38.319242] mempool_double_free_helper+0x150/0x2e8 [ 38.319275] mempool_page_alloc_double_free+0xbc/0x118 [ 38.319311] kunit_try_run_case+0x170/0x3f0 [ 38.319347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.319386] kthread+0x328/0x630 [ 38.319416] ret_from_fork+0x10/0x20 [ 38.319450] [ 38.393218] The buggy address belongs to the physical page: [ 38.398775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014 [ 38.406759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.413281] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.420999] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.428720] page dumped because: kasan: bad access detected [ 38.434275] [ 38.435749] Memory state around the buggy address: [ 38.440530] ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.447732] ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.454938] >ffff000806014000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.462138] ^ [ 38.465353] ffff000806014080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.472558] ffff000806014100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.479761] ================================================================== [ 37.680536] ================================================================== [ 37.690278] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.697393] Free of addr ffff000801e2a400 by task kunit_try_catch/279 [ 37.703816] [ 37.705301] CPU: 5 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.705362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.705380] Hardware name: WinLink E850-96 board (DT) [ 37.705398] Call trace: [ 37.705416] show_stack+0x20/0x38 (C) [ 37.705449] dump_stack_lvl+0x8c/0xd0 [ 37.705491] print_report+0x118/0x608 [ 37.705528] kasan_report_invalid_free+0xc0/0xe8 [ 37.705561] check_slab_allocation+0xd4/0x108 [ 37.705599] __kasan_mempool_poison_object+0x78/0x150 [ 37.705635] mempool_free+0x28c/0x328 [ 37.705667] mempool_double_free_helper+0x150/0x2e8 [ 37.705701] mempool_kmalloc_double_free+0xc0/0x118 [ 37.705733] kunit_try_run_case+0x170/0x3f0 [ 37.705768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.705807] kthread+0x328/0x630 [ 37.705837] ret_from_fork+0x10/0x20 [ 37.705873] [ 37.783851] Allocated by task 279: [ 37.787239] kasan_save_stack+0x3c/0x68 [ 37.791054] kasan_save_track+0x20/0x40 [ 37.794873] kasan_save_alloc_info+0x40/0x58 [ 37.799127] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.804422] remove_element+0x130/0x1f8 [ 37.808241] mempool_alloc_preallocated+0x58/0xc0 [ 37.812930] mempool_double_free_helper+0x94/0x2e8 [ 37.817703] mempool_kmalloc_double_free+0xc0/0x118 [ 37.822564] kunit_try_run_case+0x170/0x3f0 [ 37.826730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.832199] kthread+0x328/0x630 [ 37.835411] ret_from_fork+0x10/0x20 [ 37.838970] [ 37.840447] Freed by task 279: [ 37.843484] kasan_save_stack+0x3c/0x68 [ 37.847303] kasan_save_track+0x20/0x40 [ 37.851123] kasan_save_free_info+0x4c/0x78 [ 37.855290] __kasan_mempool_poison_object+0xc0/0x150 [ 37.860324] mempool_free+0x28c/0x328 [ 37.863969] mempool_double_free_helper+0x100/0x2e8 [ 37.868832] mempool_kmalloc_double_free+0xc0/0x118 [ 37.873692] kunit_try_run_case+0x170/0x3f0 [ 37.877858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.883327] kthread+0x328/0x630 [ 37.886539] ret_from_fork+0x10/0x20 [ 37.890098] [ 37.891575] The buggy address belongs to the object at ffff000801e2a400 [ 37.891575] which belongs to the cache kmalloc-128 of size 128 [ 37.904075] The buggy address is located 0 bytes inside of [ 37.904075] 128-byte region [ffff000801e2a400, ffff000801e2a480) [ 37.915618] [ 37.917098] The buggy address belongs to the physical page: [ 37.922654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a [ 37.930639] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.938277] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.945220] page_type: f5(slab) [ 37.948355] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.956076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.963804] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.971613] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.979427] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff [ 37.987238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.995044] page dumped because: kasan: bad access detected [ 38.000601] [ 38.002075] Memory state around the buggy address: [ 38.006857] ffff000801e2a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.014058] ffff000801e2a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.021264] >ffff000801e2a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.028464] ^ [ 38.031679] ffff000801e2a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.038884] ffff000801e2a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.046085] ================================================================== [ 38.055224] ================================================================== [ 38.065185] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.072303] Free of addr ffff000804b14000 by task kunit_try_catch/281 [ 38.078723] [ 38.080210] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.080269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.080285] Hardware name: WinLink E850-96 board (DT) [ 38.080305] Call trace: [ 38.080321] show_stack+0x20/0x38 (C) [ 38.080357] dump_stack_lvl+0x8c/0xd0 [ 38.080397] print_report+0x118/0x608 [ 38.080434] kasan_report_invalid_free+0xc0/0xe8 [ 38.080470] __kasan_mempool_poison_object+0x14c/0x150 [ 38.080508] mempool_free+0x28c/0x328 [ 38.080543] mempool_double_free_helper+0x150/0x2e8 [ 38.080576] mempool_kmalloc_large_double_free+0xc0/0x118 [ 38.080612] kunit_try_run_case+0x170/0x3f0 [ 38.080646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.080685] kthread+0x328/0x630 [ 38.080715] ret_from_fork+0x10/0x20 [ 38.080751] [ 38.155026] The buggy address belongs to the physical page: [ 38.160584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14 [ 38.168569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.176208] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.183150] page_type: f8(unknown) [ 38.186546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.194266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.201994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.209804] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.217617] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff [ 38.225429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.233235] page dumped because: kasan: bad access detected [ 38.238792] [ 38.240266] Memory state around the buggy address: [ 38.245047] ffff000804b13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.252248] ffff000804b13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.259456] >ffff000804b14000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.266655] ^ [ 38.269870] ffff000804b14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.277075] ffff000804b14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.284276] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 162.754352] Internal error: Oops: 0000000096000005 [#1] SMP [ 162.759958] Modules linked in: [ 162.763003] CPU: 4 UID: 0 PID: 624 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 162.773764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 162.777923] Hardware name: WinLink E850-96 board (DT) [ 162.782960] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 162.789901] pc : kunit_test_null_dereference+0x70/0x170 [ 162.795110] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.800925] sp : ffff80008a987d30 [ 162.804223] x29: ffff80008a987d90 x28: 0000000000000000 x27: 0000000000000000 [ 162.811341] x26: 1fffe001001b88a1 x25: 0000000000000000 x24: 0000000000000004 [ 162.818459] x23: ffff000800dc450c x22: ffff800081258c48 x21: ffff000801374808 [ 162.825577] x20: 1ffff00011530fa6 x19: ffff800087d77990 x18: ffff800087d77b00 [ 162.832695] x17: ffff800081e04094 x16: 0000000000000100 x15: ffff80008124b9f0 [ 162.839813] x14: ffff800081256b08 x13: 1fffe0010b5f3589 x12: ffff600101304dc4 [ 162.846931] x11: 1fffe00101304dc3 x10: ffff600101304dc3 x9 : ffff8000812500b0 [ 162.854049] x8 : ffff80008a987c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 162.861167] x5 : ffff700011530fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 162.868285] x2 : dfff800000000000 x1 : ffff000809826540 x0 : ffff800087d77990 [ 162.875405] Call trace: [ 162.877836] kunit_test_null_dereference+0x70/0x170 (P) [ 162.883045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 162.888511] kthread+0x328/0x630 [ 162.891722] ret_from_fork+0x10/0x20 [ 162.895295] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 162.901363] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 99.480988] ================================================================== [ 99.481119] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 99.481119] [ 99.481264] Use-after-free read at 0x(____ptrval____) (in kfence-#189): [ 99.481373] test_krealloc+0x51c/0x830 [ 99.484519] kunit_try_run_case+0x170/0x3f0 [ 99.488685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.494155] kthread+0x328/0x630 [ 99.497366] ret_from_fork+0x10/0x20 [ 99.500925] [ 99.502404] kfence-#189: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 99.502404] [ 99.512039] allocated by task 381 on cpu 6 at 99.480901s (0.031136s ago): [ 99.518826] test_alloc+0x29c/0x628 [ 99.522279] test_krealloc+0xc0/0x830 [ 99.525924] kunit_try_run_case+0x170/0x3f0 [ 99.530091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.535559] kthread+0x328/0x630 [ 99.538773] ret_from_fork+0x10/0x20 [ 99.542332] [ 99.543808] freed by task 381 on cpu 6 at 99.480929s (0.062877s ago): [ 99.550250] krealloc_noprof+0x148/0x360 [ 99.554136] test_krealloc+0x1dc/0x830 [ 99.557868] kunit_try_run_case+0x170/0x3f0 [ 99.562035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.567504] kthread+0x328/0x630 [ 99.570715] ret_from_fork+0x10/0x20 [ 99.574276] [ 99.575761] CPU: 6 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 99.586525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 99.590682] Hardware name: WinLink E850-96 board (DT) [ 99.595719] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 99.254524] ================================================================== [ 99.254670] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 99.254670] [ 99.254839] Use-after-free read at 0x(____ptrval____) (in kfence-#187): [ 99.255726] test_memcache_typesafe_by_rcu+0x280/0x560 [ 99.260847] kunit_try_run_case+0x170/0x3f0 [ 99.265013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.270482] kthread+0x328/0x630 [ 99.273694] ret_from_fork+0x10/0x20 [ 99.277253] [ 99.278732] kfence-#187: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 99.278732] [ 99.287847] allocated by task 379 on cpu 5 at 99.200928s (0.086916s ago): [ 99.294633] test_alloc+0x230/0x628 [ 99.298086] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 99.303207] kunit_try_run_case+0x170/0x3f0 [ 99.307374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.312843] kthread+0x328/0x630 [ 99.316054] ret_from_fork+0x10/0x20 [ 99.319616] [ 99.321091] freed by task 379 on cpu 5 at 99.200945s (0.120144s ago): [ 99.327526] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 99.332634] kunit_try_run_case+0x170/0x3f0 [ 99.336801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 99.342269] kthread+0x328/0x630 [ 99.345483] ret_from_fork+0x10/0x20 [ 99.349042] [ 99.350529] CPU: 5 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 99.361288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 99.365447] Hardware name: WinLink E850-96 board (DT) [ 99.370485] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 75.922661] ================================================================== [ 75.922851] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 75.922851] [ 75.923009] Invalid read at 0x(____ptrval____): [ 75.924120] test_invalid_access+0xdc/0x1f0 [ 75.928336] kunit_try_run_case+0x170/0x3f0 [ 75.932489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.937964] kthread+0x328/0x630 [ 75.941162] ret_from_fork+0x10/0x20 [ 75.944694] [ 75.946208] CPU: 3 UID: 0 PID: 375 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 75.956973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.961128] Hardware name: WinLink E850-96 board (DT) [ 75.966163] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 75.568999] ================================================================== [ 75.569127] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.569127] [ 75.569275] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#181): [ 75.572965] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.578171] kunit_try_run_case+0x170/0x3f0 [ 75.582337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.587806] kthread+0x328/0x630 [ 75.591018] ret_from_fork+0x10/0x20 [ 75.594577] [ 75.596056] kfence-#181: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 75.596056] [ 75.605692] allocated by task 369 on cpu 3 at 75.568927s (0.036762s ago): [ 75.612475] test_alloc+0x29c/0x628 [ 75.615931] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 75.621052] kunit_try_run_case+0x170/0x3f0 [ 75.625219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.630687] kthread+0x328/0x630 [ 75.633901] ret_from_fork+0x10/0x20 [ 75.637458] [ 75.638936] freed by task 369 on cpu 3 at 75.568943s (0.069990s ago): [ 75.645375] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 75.650567] kunit_try_run_case+0x170/0x3f0 [ 75.654733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.660201] kthread+0x328/0x630 [ 75.663413] ret_from_fork+0x10/0x20 [ 75.666973] [ 75.668459] CPU: 3 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 75.679223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.683379] Hardware name: WinLink E850-96 board (DT) [ 75.688416] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 75.149022] ================================================================== [ 75.149155] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 75.149155] [ 75.149314] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#177): [ 75.150997] test_kmalloc_aligned_oob_read+0x238/0x468 [ 75.156116] kunit_try_run_case+0x170/0x3f0 [ 75.160283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.165751] kthread+0x328/0x630 [ 75.168963] ret_from_fork+0x10/0x20 [ 75.172522] [ 75.174001] kfence-#177: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 75.174001] [ 75.183637] allocated by task 367 on cpu 3 at 75.148985s (0.034649s ago): [ 75.190423] test_alloc+0x29c/0x628 [ 75.193876] test_kmalloc_aligned_oob_read+0x100/0x468 [ 75.198997] kunit_try_run_case+0x170/0x3f0 [ 75.203164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.208633] kthread+0x328/0x630 [ 75.211845] ret_from_fork+0x10/0x20 [ 75.215405] [ 75.216890] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 75.227650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.231811] Hardware name: WinLink E850-96 board (DT) [ 75.236848] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 70.960982] ================================================================== [ 70.961116] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 70.961116] [ 70.961248] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#137): [ 70.963651] test_corruption+0x120/0x378 [ 70.967555] kunit_try_run_case+0x170/0x3f0 [ 70.971722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.977190] kthread+0x328/0x630 [ 70.980402] ret_from_fork+0x10/0x20 [ 70.983961] [ 70.985440] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.985440] [ 70.994554] allocated by task 357 on cpu 1 at 70.960912s (0.033639s ago): [ 71.001337] test_alloc+0x230/0x628 [ 71.004794] test_corruption+0xdc/0x378 [ 71.008613] kunit_try_run_case+0x170/0x3f0 [ 71.012780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.018249] kthread+0x328/0x630 [ 71.021460] ret_from_fork+0x10/0x20 [ 71.025019] [ 71.026497] freed by task 357 on cpu 1 at 70.960927s (0.065568s ago): [ 71.032934] test_corruption+0x120/0x378 [ 71.036825] kunit_try_run_case+0x170/0x3f0 [ 71.040991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.046460] kthread+0x328/0x630 [ 71.049671] ret_from_fork+0x10/0x20 [ 71.053232] [ 71.054717] CPU: 1 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 71.065482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.069638] Hardware name: WinLink E850-96 board (DT) [ 71.074675] ================================================================== [ 71.288998] ================================================================== [ 71.289131] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 71.289131] [ 71.289262] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#140): [ 71.289433] test_corruption+0x1d8/0x378 [ 71.292966] kunit_try_run_case+0x170/0x3f0 [ 71.297132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.302601] kthread+0x328/0x630 [ 71.305813] ret_from_fork+0x10/0x20 [ 71.309371] [ 71.310851] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.310851] [ 71.319965] allocated by task 357 on cpu 1 at 71.288923s (0.031040s ago): [ 71.326748] test_alloc+0x230/0x628 [ 71.330205] test_corruption+0x198/0x378 [ 71.334110] kunit_try_run_case+0x170/0x3f0 [ 71.338277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.343746] kthread+0x328/0x630 [ 71.346958] ret_from_fork+0x10/0x20 [ 71.350518] [ 71.351995] freed by task 357 on cpu 1 at 71.288939s (0.063053s ago): [ 71.358432] test_corruption+0x1d8/0x378 [ 71.362322] kunit_try_run_case+0x170/0x3f0 [ 71.366489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.371958] kthread+0x328/0x630 [ 71.375169] ret_from_fork+0x10/0x20 [ 71.378730] [ 71.380216] CPU: 1 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 71.390979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.395136] Hardware name: WinLink E850-96 board (DT) [ 71.400173] ================================================================== [ 70.204994] ================================================================== [ 70.205127] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 70.205127] [ 70.205260] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#130): [ 70.207662] test_corruption+0x278/0x378 [ 70.211565] kunit_try_run_case+0x170/0x3f0 [ 70.215732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.221200] kthread+0x328/0x630 [ 70.224412] ret_from_fork+0x10/0x20 [ 70.227971] [ 70.229450] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.229450] [ 70.239085] allocated by task 355 on cpu 1 at 70.204924s (0.034159s ago): [ 70.245868] test_alloc+0x29c/0x628 [ 70.249325] test_corruption+0xdc/0x378 [ 70.253144] kunit_try_run_case+0x170/0x3f0 [ 70.257311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.262780] kthread+0x328/0x630 [ 70.265992] ret_from_fork+0x10/0x20 [ 70.269552] [ 70.271028] freed by task 355 on cpu 1 at 70.204939s (0.066087s ago): [ 70.277465] test_corruption+0x278/0x378 [ 70.281356] kunit_try_run_case+0x170/0x3f0 [ 70.285522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.290991] kthread+0x328/0x630 [ 70.294203] ret_from_fork+0x10/0x20 [ 70.297763] [ 70.299249] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 70.310012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.314169] Hardware name: WinLink E850-96 board (DT) [ 70.319207] ================================================================== [ 70.532986] ================================================================== [ 70.533122] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 70.533122] [ 70.533249] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#133): [ 70.533418] test_corruption+0x284/0x378 [ 70.536957] kunit_try_run_case+0x170/0x3f0 [ 70.541123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.546592] kthread+0x328/0x630 [ 70.549804] ret_from_fork+0x10/0x20 [ 70.553362] [ 70.554842] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.554842] [ 70.564477] allocated by task 355 on cpu 1 at 70.532916s (0.031558s ago): [ 70.571258] test_alloc+0x29c/0x628 [ 70.574716] test_corruption+0x198/0x378 [ 70.578622] kunit_try_run_case+0x170/0x3f0 [ 70.582789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.588258] kthread+0x328/0x630 [ 70.591469] ret_from_fork+0x10/0x20 [ 70.595030] [ 70.596506] freed by task 355 on cpu 1 at 70.532930s (0.063574s ago): [ 70.602943] test_corruption+0x284/0x378 [ 70.606834] kunit_try_run_case+0x170/0x3f0 [ 70.611000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.616469] kthread+0x328/0x630 [ 70.619681] ret_from_fork+0x10/0x20 [ 70.623242] [ 70.624727] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 70.635488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.639647] Hardware name: WinLink E850-96 board (DT) [ 70.644684] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 69.996980] ================================================================== [ 69.997106] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 69.997106] [ 69.997240] Invalid free of 0x(____ptrval____) (in kfence-#128): [ 69.997342] test_invalid_addr_free+0xec/0x238 [ 70.000680] kunit_try_run_case+0x170/0x3f0 [ 70.004846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.010315] kthread+0x328/0x630 [ 70.013527] ret_from_fork+0x10/0x20 [ 70.017085] [ 70.018565] kfence-#128: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.018565] [ 70.027679] allocated by task 353 on cpu 2 at 69.996926s (0.030751s ago): [ 70.034466] test_alloc+0x230/0x628 [ 70.037919] test_invalid_addr_free+0xd4/0x238 [ 70.042347] kunit_try_run_case+0x170/0x3f0 [ 70.046512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.051981] kthread+0x328/0x630 [ 70.055193] ret_from_fork+0x10/0x20 [ 70.058755] [ 70.060238] CPU: 2 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 70.071003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.075159] Hardware name: WinLink E850-96 board (DT) [ 70.080196] ================================================================== [ 69.788977] ================================================================== [ 69.789104] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 69.789104] [ 69.789237] Invalid free of 0x(____ptrval____) (in kfence-#126): [ 69.789337] test_invalid_addr_free+0x1ac/0x238 [ 69.792852] kunit_try_run_case+0x170/0x3f0 [ 69.797019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.802487] kthread+0x328/0x630 [ 69.805699] ret_from_fork+0x10/0x20 [ 69.809258] [ 69.810736] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.810736] [ 69.820373] allocated by task 351 on cpu 1 at 69.788922s (0.031448s ago): [ 69.827156] test_alloc+0x29c/0x628 [ 69.830612] test_invalid_addr_free+0xd4/0x238 [ 69.835039] kunit_try_run_case+0x170/0x3f0 [ 69.839206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.844675] kthread+0x328/0x630 [ 69.847886] ret_from_fork+0x10/0x20 [ 69.851447] [ 69.852933] CPU: 1 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 69.863693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.867853] Hardware name: WinLink E850-96 board (DT) [ 69.872890] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 69.349010] ================================================================== [ 69.349137] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 69.349137] [ 69.349262] Invalid free of 0x(____ptrval____) (in kfence-#122): [ 69.349363] test_double_free+0x1bc/0x238 [ 69.351845] kunit_try_run_case+0x170/0x3f0 [ 69.356011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.361480] kthread+0x328/0x630 [ 69.364692] ret_from_fork+0x10/0x20 [ 69.368250] [ 69.369728] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.369728] [ 69.379365] allocated by task 347 on cpu 1 at 69.348927s (0.030436s ago): [ 69.386147] test_alloc+0x29c/0x628 [ 69.389604] test_double_free+0xd4/0x238 [ 69.393510] kunit_try_run_case+0x170/0x3f0 [ 69.397677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.403146] kthread+0x328/0x630 [ 69.406358] ret_from_fork+0x10/0x20 [ 69.409918] [ 69.411393] freed by task 347 on cpu 1 at 69.348943s (0.062447s ago): [ 69.417831] test_double_free+0x1ac/0x238 [ 69.421809] kunit_try_run_case+0x170/0x3f0 [ 69.425976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.431444] kthread+0x328/0x630 [ 69.434657] ret_from_fork+0x10/0x20 [ 69.438216] [ 69.439701] CPU: 1 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 69.450466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.454622] Hardware name: WinLink E850-96 board (DT) [ 69.459659] ================================================================== [ 69.568977] ================================================================== [ 69.569100] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 69.569100] [ 69.569228] Invalid free of 0x(____ptrval____) (in kfence-#124): [ 69.569335] test_double_free+0x100/0x238 [ 69.571806] kunit_try_run_case+0x170/0x3f0 [ 69.575972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.581441] kthread+0x328/0x630 [ 69.584654] ret_from_fork+0x10/0x20 [ 69.588212] [ 69.589691] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.589691] [ 69.598806] allocated by task 349 on cpu 3 at 69.568902s (0.029902s ago): [ 69.605590] test_alloc+0x230/0x628 [ 69.609045] test_double_free+0xd4/0x238 [ 69.612951] kunit_try_run_case+0x170/0x3f0 [ 69.617118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.622587] kthread+0x328/0x630 [ 69.625799] ret_from_fork+0x10/0x20 [ 69.629359] [ 69.630835] freed by task 349 on cpu 3 at 69.568916s (0.061917s ago): [ 69.637273] test_double_free+0xf0/0x238 [ 69.641163] kunit_try_run_case+0x170/0x3f0 [ 69.645330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.650798] kthread+0x328/0x630 [ 69.654010] ret_from_fork+0x10/0x20 [ 69.657570] [ 69.659056] CPU: 3 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 69.669820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.673976] Hardware name: WinLink E850-96 board (DT) [ 69.679014] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 68.920977] ================================================================== [ 68.921103] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 68.921103] [ 68.921259] Use-after-free read at 0x(____ptrval____) (in kfence-#118): [ 68.921727] test_use_after_free_read+0x114/0x248 [ 68.926414] kunit_try_run_case+0x170/0x3f0 [ 68.930581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.936049] kthread+0x328/0x630 [ 68.939261] ret_from_fork+0x10/0x20 [ 68.942820] [ 68.944298] kfence-#118: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.944298] [ 68.953414] allocated by task 341 on cpu 5 at 68.920913s (0.032499s ago): [ 68.960201] test_alloc+0x230/0x628 [ 68.963653] test_use_after_free_read+0xd0/0x248 [ 68.968254] kunit_try_run_case+0x170/0x3f0 [ 68.972420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.977889] kthread+0x328/0x630 [ 68.981101] ret_from_fork+0x10/0x20 [ 68.984661] [ 68.986138] freed by task 341 on cpu 5 at 68.920928s (0.065207s ago): [ 68.992578] test_use_after_free_read+0xf0/0x248 [ 68.997159] kunit_try_run_case+0x170/0x3f0 [ 69.001326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.006795] kthread+0x328/0x630 [ 69.010007] ret_from_fork+0x10/0x20 [ 69.013567] [ 69.015053] CPU: 5 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 69.025817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.029973] Hardware name: WinLink E850-96 board (DT) [ 69.035010] ================================================================== [ 68.696977] ================================================================== [ 68.697107] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 68.697107] [ 68.697261] Use-after-free read at 0x(____ptrval____) (in kfence-#116): [ 68.697732] test_use_after_free_read+0x114/0x248 [ 68.702418] kunit_try_run_case+0x170/0x3f0 [ 68.706585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.712053] kthread+0x328/0x630 [ 68.715265] ret_from_fork+0x10/0x20 [ 68.718824] [ 68.720303] kfence-#116: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.720303] [ 68.729937] allocated by task 339 on cpu 3 at 68.696917s (0.033018s ago): [ 68.736724] test_alloc+0x29c/0x628 [ 68.740178] test_use_after_free_read+0xd0/0x248 [ 68.744778] kunit_try_run_case+0x170/0x3f0 [ 68.748945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.754414] kthread+0x328/0x630 [ 68.757626] ret_from_fork+0x10/0x20 [ 68.761186] [ 68.762662] freed by task 339 on cpu 3 at 68.696932s (0.065728s ago): [ 68.769101] test_use_after_free_read+0x1c0/0x248 [ 68.773771] kunit_try_run_case+0x170/0x3f0 [ 68.777937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.783406] kthread+0x328/0x630 [ 68.786618] ret_from_fork+0x10/0x20 [ 68.790179] [ 68.791665] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 68.802429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.806584] Hardware name: WinLink E850-96 board (DT) [ 68.811622] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 68.280946] ================================================================== [ 68.281076] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.281076] [ 68.281230] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#112): [ 68.282395] test_out_of_bounds_write+0x100/0x240 [ 68.287081] kunit_try_run_case+0x170/0x3f0 [ 68.291247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.296716] kthread+0x328/0x630 [ 68.299928] ret_from_fork+0x10/0x20 [ 68.303487] [ 68.304966] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.304966] [ 68.314599] allocated by task 335 on cpu 1 at 68.280912s (0.033685s ago): [ 68.321388] test_alloc+0x29c/0x628 [ 68.324841] test_out_of_bounds_write+0xc8/0x240 [ 68.329443] kunit_try_run_case+0x170/0x3f0 [ 68.333608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.339076] kthread+0x328/0x630 [ 68.342288] ret_from_fork+0x10/0x20 [ 68.345849] [ 68.347335] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 68.358095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.362255] Hardware name: WinLink E850-96 board (DT) [ 68.367290] ================================================================== [ 68.488948] ================================================================== [ 68.489077] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.489077] [ 68.489230] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#114): [ 68.490397] test_out_of_bounds_write+0x100/0x240 [ 68.495082] kunit_try_run_case+0x170/0x3f0 [ 68.499249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.504718] kthread+0x328/0x630 [ 68.507929] ret_from_fork+0x10/0x20 [ 68.511488] [ 68.512966] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.512966] [ 68.522082] allocated by task 337 on cpu 3 at 68.488914s (0.033165s ago): [ 68.528869] test_alloc+0x230/0x628 [ 68.532321] test_out_of_bounds_write+0xc8/0x240 [ 68.536922] kunit_try_run_case+0x170/0x3f0 [ 68.541088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.546557] kthread+0x328/0x630 [ 68.549769] ret_from_fork+0x10/0x20 [ 68.553330] [ 68.554815] CPU: 3 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 68.565578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.569735] Hardware name: WinLink E850-96 board (DT) [ 68.574773] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 67.640954] ================================================================== [ 67.641098] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.641098] [ 67.641256] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#106): [ 67.642156] test_out_of_bounds_read+0x114/0x3e0 [ 67.646755] kunit_try_run_case+0x170/0x3f0 [ 67.650921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.656390] kthread+0x328/0x630 [ 67.659602] ret_from_fork+0x10/0x20 [ 67.663161] [ 67.664640] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.664640] [ 67.674276] allocated by task 331 on cpu 2 at 67.640920s (0.033353s ago): [ 67.681062] test_alloc+0x29c/0x628 [ 67.684515] test_out_of_bounds_read+0xdc/0x3e0 [ 67.689029] kunit_try_run_case+0x170/0x3f0 [ 67.693195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.698664] kthread+0x328/0x630 [ 67.701876] ret_from_fork+0x10/0x20 [ 67.705436] [ 67.706922] CPU: 2 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 67.717686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.721842] Hardware name: WinLink E850-96 board (DT) [ 67.726878] ================================================================== [ 68.064920] ================================================================== [ 68.070129] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 68.070129] [ 68.079156] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#110): [ 68.086534] test_out_of_bounds_read+0x1c8/0x3e0 [ 68.091135] kunit_try_run_case+0x170/0x3f0 [ 68.095302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.100770] kthread+0x328/0x630 [ 68.103982] ret_from_fork+0x10/0x20 [ 68.107541] [ 68.109017] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.109017] [ 68.118131] allocated by task 333 on cpu 3 at 68.064894s (0.053235s ago): [ 68.124918] test_alloc+0x230/0x628 [ 68.128374] test_out_of_bounds_read+0x198/0x3e0 [ 68.132974] kunit_try_run_case+0x170/0x3f0 [ 68.137141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.142609] kthread+0x328/0x630 [ 68.145822] ret_from_fork+0x10/0x20 [ 68.149380] [ 68.150863] CPU: 3 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 68.161627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.165788] Hardware name: WinLink E850-96 board (DT) [ 68.170824] ================================================================== [ 67.744939] ================================================================== [ 67.749879] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 67.749879] [ 67.758906] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#107): [ 67.766285] test_out_of_bounds_read+0x1c8/0x3e0 [ 67.770885] kunit_try_run_case+0x170/0x3f0 [ 67.775052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.780520] kthread+0x328/0x630 [ 67.783732] ret_from_fork+0x10/0x20 [ 67.787291] [ 67.788767] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.788767] [ 67.798403] allocated by task 331 on cpu 2 at 67.744913s (0.053487s ago): [ 67.805190] test_alloc+0x29c/0x628 [ 67.808645] test_out_of_bounds_read+0x198/0x3e0 [ 67.813246] kunit_try_run_case+0x170/0x3f0 [ 67.817412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.822881] kthread+0x328/0x630 [ 67.826092] ret_from_fork+0x10/0x20 [ 67.829651] [ 67.831134] CPU: 2 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 67.841898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.846059] Hardware name: WinLink E850-96 board (DT) [ 67.851095] ================================================================== [ 67.960945] ================================================================== [ 67.961087] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.961087] [ 67.961239] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#109): [ 67.962145] test_out_of_bounds_read+0x114/0x3e0 [ 67.966745] kunit_try_run_case+0x170/0x3f0 [ 67.970911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.976380] kthread+0x328/0x630 [ 67.979591] ret_from_fork+0x10/0x20 [ 67.983150] [ 67.984630] kfence-#109: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.984630] [ 67.993744] allocated by task 333 on cpu 3 at 67.960910s (0.032832s ago): [ 68.000531] test_alloc+0x230/0x628 [ 68.003984] test_out_of_bounds_read+0xdc/0x3e0 [ 68.008497] kunit_try_run_case+0x170/0x3f0 [ 68.012664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.018133] kthread+0x328/0x630 [ 68.021344] ret_from_fork+0x10/0x20 [ 68.024905] [ 68.026390] CPU: 3 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 68.037150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.041310] Hardware name: WinLink E850-96 board (DT) [ 68.046348] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 20.824897] ================================================================== [ 20.847561] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 20.847561] [ 20.857108] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#39): [ 20.866486] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.871691] kunit_try_run_case+0x170/0x3f0 [ 20.875858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.881327] kthread+0x328/0x630 [ 20.884538] ret_from_fork+0x10/0x20 [ 20.888097] [ 20.889576] kfence-#39: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 20.889576] [ 20.899299] allocated by task 186 on cpu 3 at 20.824501s (0.074795s ago): [ 20.906084] kmalloc_track_caller_oob_right+0x184/0x488 [ 20.911274] kunit_try_run_case+0x170/0x3f0 [ 20.915441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.920910] kthread+0x328/0x630 [ 20.924121] ret_from_fork+0x10/0x20 [ 20.927680] [ 20.929157] freed by task 186 on cpu 3 at 20.824857s (0.104298s ago): [ 20.935596] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.940787] kunit_try_run_case+0x170/0x3f0 [ 20.944954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.950423] kthread+0x328/0x630 [ 20.953635] ret_from_fork+0x10/0x20 [ 20.957195] [ 20.958679] CPU: 3 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 20.969440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.973601] Hardware name: WinLink E850-96 board (DT) [ 20.978637] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 66.610536] ================================================================== [ 66.617623] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 66.624476] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 66.632027] [ 66.633510] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 66.633558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.633577] Hardware name: WinLink E850-96 board (DT) [ 66.633596] Call trace: [ 66.633607] show_stack+0x20/0x38 (C) [ 66.633640] dump_stack_lvl+0x8c/0xd0 [ 66.633677] print_report+0x118/0x608 [ 66.633711] kasan_report+0xdc/0x128 [ 66.633743] kasan_check_range+0x100/0x1a8 [ 66.633777] __kasan_check_write+0x20/0x30 [ 66.633806] strncpy_from_user+0x3c/0x2a0 [ 66.633839] copy_user_test_oob+0x5c0/0xec8 [ 66.633874] kunit_try_run_case+0x170/0x3f0 [ 66.633909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.633950] kthread+0x328/0x630 [ 66.633976] ret_from_fork+0x10/0x20 [ 66.634008] [ 66.704595] Allocated by task 329: [ 66.707981] kasan_save_stack+0x3c/0x68 [ 66.711801] kasan_save_track+0x20/0x40 [ 66.715620] kasan_save_alloc_info+0x40/0x58 [ 66.719874] __kasan_kmalloc+0xd4/0xd8 [ 66.723606] __kmalloc_noprof+0x190/0x4d0 [ 66.727599] kunit_kmalloc_array+0x34/0x88 [ 66.731679] copy_user_test_oob+0xac/0xec8 [ 66.735759] kunit_try_run_case+0x170/0x3f0 [ 66.739925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.745394] kthread+0x328/0x630 [ 66.748606] ret_from_fork+0x10/0x20 [ 66.752165] [ 66.753640] The buggy address belongs to the object at ffff000800da9800 [ 66.753640] which belongs to the cache kmalloc-128 of size 128 [ 66.766140] The buggy address is located 0 bytes inside of [ 66.766140] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 66.778553] [ 66.780031] The buggy address belongs to the physical page: [ 66.785585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 66.793570] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.801211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.808153] page_type: f5(slab) [ 66.811286] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.819010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.826737] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.834548] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.842361] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 66.850173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.857979] page dumped because: kasan: bad access detected [ 66.863536] [ 66.865010] Memory state around the buggy address: [ 66.869790] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.876993] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.884197] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.891398] ^ [ 66.898520] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.905725] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.912926] ================================================================== [ 66.920336] ================================================================== [ 66.927341] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 66.934280] Write of size 1 at addr ffff000800da9878 by task kunit_try_catch/329 [ 66.941658] [ 66.943142] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 66.943190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.943209] Hardware name: WinLink E850-96 board (DT) [ 66.943229] Call trace: [ 66.943241] show_stack+0x20/0x38 (C) [ 66.943277] dump_stack_lvl+0x8c/0xd0 [ 66.943315] print_report+0x118/0x608 [ 66.943350] kasan_report+0xdc/0x128 [ 66.943384] __asan_report_store1_noabort+0x20/0x30 [ 66.943415] strncpy_from_user+0x270/0x2a0 [ 66.943444] copy_user_test_oob+0x5c0/0xec8 [ 66.943478] kunit_try_run_case+0x170/0x3f0 [ 66.943514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.943554] kthread+0x328/0x630 [ 66.943580] ret_from_fork+0x10/0x20 [ 66.943614] [ 67.011015] Allocated by task 329: [ 67.014400] kasan_save_stack+0x3c/0x68 [ 67.018220] kasan_save_track+0x20/0x40 [ 67.022039] kasan_save_alloc_info+0x40/0x58 [ 67.026293] __kasan_kmalloc+0xd4/0xd8 [ 67.030025] __kmalloc_noprof+0x190/0x4d0 [ 67.034018] kunit_kmalloc_array+0x34/0x88 [ 67.038097] copy_user_test_oob+0xac/0xec8 [ 67.042177] kunit_try_run_case+0x170/0x3f0 [ 67.046345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.051813] kthread+0x328/0x630 [ 67.055025] ret_from_fork+0x10/0x20 [ 67.058584] [ 67.060061] The buggy address belongs to the object at ffff000800da9800 [ 67.060061] which belongs to the cache kmalloc-128 of size 128 [ 67.072559] The buggy address is located 0 bytes to the right of [ 67.072559] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 67.085493] [ 67.086970] The buggy address belongs to the physical page: [ 67.092527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 67.100511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 67.108149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 67.115093] page_type: f5(slab) [ 67.118229] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 67.125950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.133677] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 67.141488] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.149301] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 67.157113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 67.164919] page dumped because: kasan: bad access detected [ 67.170474] [ 67.171950] Memory state around the buggy address: [ 67.176730] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.183932] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.191137] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 67.198338] ^ [ 67.205460] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.212665] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.219866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 64.770442] ================================================================== [ 64.782756] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.789783] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 64.797333] [ 64.798820] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 64.798875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.798896] Hardware name: WinLink E850-96 board (DT) [ 64.798918] Call trace: [ 64.798932] show_stack+0x20/0x38 (C) [ 64.798970] dump_stack_lvl+0x8c/0xd0 [ 64.799009] print_report+0x118/0x608 [ 64.799048] kasan_report+0xdc/0x128 [ 64.799082] kasan_check_range+0x100/0x1a8 [ 64.799121] __kasan_check_write+0x20/0x30 [ 64.799152] copy_user_test_oob+0x234/0xec8 [ 64.799187] kunit_try_run_case+0x170/0x3f0 [ 64.799230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.799273] kthread+0x328/0x630 [ 64.799303] ret_from_fork+0x10/0x20 [ 64.799341] [ 64.865909] Allocated by task 329: [ 64.869296] kasan_save_stack+0x3c/0x68 [ 64.873113] kasan_save_track+0x20/0x40 [ 64.876932] kasan_save_alloc_info+0x40/0x58 [ 64.881186] __kasan_kmalloc+0xd4/0xd8 [ 64.884918] __kmalloc_noprof+0x190/0x4d0 [ 64.888911] kunit_kmalloc_array+0x34/0x88 [ 64.892992] copy_user_test_oob+0xac/0xec8 [ 64.897071] kunit_try_run_case+0x170/0x3f0 [ 64.901237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.906706] kthread+0x328/0x630 [ 64.909918] ret_from_fork+0x10/0x20 [ 64.913477] [ 64.914955] The buggy address belongs to the object at ffff000800da9800 [ 64.914955] which belongs to the cache kmalloc-128 of size 128 [ 64.927456] The buggy address is located 0 bytes inside of [ 64.927456] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 64.939865] [ 64.941344] The buggy address belongs to the physical page: [ 64.946901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 64.954886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.962525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.969467] page_type: f5(slab) [ 64.972604] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.980323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.988050] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.995860] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.003673] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.011485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.019291] page dumped because: kasan: bad access detected [ 65.024848] [ 65.026322] Memory state around the buggy address: [ 65.031104] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.038305] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.045512] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.052711] ^ [ 65.059832] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.067037] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.074239] ================================================================== [ 66.304907] ================================================================== [ 66.311896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.318926] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 66.326389] [ 66.327872] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 66.327924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.327941] Hardware name: WinLink E850-96 board (DT) [ 66.327963] Call trace: [ 66.327978] show_stack+0x20/0x38 (C) [ 66.328014] dump_stack_lvl+0x8c/0xd0 [ 66.328052] print_report+0x118/0x608 [ 66.328088] kasan_report+0xdc/0x128 [ 66.328120] kasan_check_range+0x100/0x1a8 [ 66.328154] __kasan_check_read+0x20/0x30 [ 66.328184] copy_user_test_oob+0x4a0/0xec8 [ 66.328219] kunit_try_run_case+0x170/0x3f0 [ 66.328255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.328297] kthread+0x328/0x630 [ 66.328324] ret_from_fork+0x10/0x20 [ 66.328359] [ 66.394878] Allocated by task 329: [ 66.398264] kasan_save_stack+0x3c/0x68 [ 66.402083] kasan_save_track+0x20/0x40 [ 66.405902] kasan_save_alloc_info+0x40/0x58 [ 66.410156] __kasan_kmalloc+0xd4/0xd8 [ 66.413888] __kmalloc_noprof+0x190/0x4d0 [ 66.417881] kunit_kmalloc_array+0x34/0x88 [ 66.421961] copy_user_test_oob+0xac/0xec8 [ 66.426041] kunit_try_run_case+0x170/0x3f0 [ 66.430208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.435676] kthread+0x328/0x630 [ 66.438888] ret_from_fork+0x10/0x20 [ 66.442447] [ 66.443923] The buggy address belongs to the object at ffff000800da9800 [ 66.443923] which belongs to the cache kmalloc-128 of size 128 [ 66.456424] The buggy address is located 0 bytes inside of [ 66.456424] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 66.468835] [ 66.470313] The buggy address belongs to the physical page: [ 66.475869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 66.483853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.491492] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.498437] page_type: f5(slab) [ 66.501570] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.509293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.517019] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.524831] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.532643] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 66.540455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.548261] page dumped because: kasan: bad access detected [ 66.553818] [ 66.555292] Memory state around the buggy address: [ 66.560074] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.567275] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.574480] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.581681] ^ [ 66.588803] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.596007] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.603209] ================================================================== [ 65.999186] ================================================================== [ 66.006001] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 66.013027] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 66.020578] [ 66.022064] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 66.022115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.022133] Hardware name: WinLink E850-96 board (DT) [ 66.022153] Call trace: [ 66.022168] show_stack+0x20/0x38 (C) [ 66.022206] dump_stack_lvl+0x8c/0xd0 [ 66.022244] print_report+0x118/0x608 [ 66.022280] kasan_report+0xdc/0x128 [ 66.022312] kasan_check_range+0x100/0x1a8 [ 66.022347] __kasan_check_write+0x20/0x30 [ 66.022376] copy_user_test_oob+0x434/0xec8 [ 66.022409] kunit_try_run_case+0x170/0x3f0 [ 66.022444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.022485] kthread+0x328/0x630 [ 66.022513] ret_from_fork+0x10/0x20 [ 66.022547] [ 66.089154] Allocated by task 329: [ 66.092539] kasan_save_stack+0x3c/0x68 [ 66.096358] kasan_save_track+0x20/0x40 [ 66.100178] kasan_save_alloc_info+0x40/0x58 [ 66.104431] __kasan_kmalloc+0xd4/0xd8 [ 66.108164] __kmalloc_noprof+0x190/0x4d0 [ 66.112157] kunit_kmalloc_array+0x34/0x88 [ 66.116237] copy_user_test_oob+0xac/0xec8 [ 66.120316] kunit_try_run_case+0x170/0x3f0 [ 66.124483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.129952] kthread+0x328/0x630 [ 66.133163] ret_from_fork+0x10/0x20 [ 66.136723] [ 66.138200] The buggy address belongs to the object at ffff000800da9800 [ 66.138200] which belongs to the cache kmalloc-128 of size 128 [ 66.150700] The buggy address is located 0 bytes inside of [ 66.150700] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 66.163111] [ 66.164590] The buggy address belongs to the physical page: [ 66.170146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 66.178131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.185770] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.192713] page_type: f5(slab) [ 66.195846] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.203568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.211294] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.219106] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.226919] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 66.234731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.242537] page dumped because: kasan: bad access detected [ 66.248094] [ 66.249568] Memory state around the buggy address: [ 66.254348] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.261551] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.268755] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.275957] ^ [ 66.283078] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.290283] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.297484] ================================================================== [ 65.081656] ================================================================== [ 65.088652] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 65.095679] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 65.103144] [ 65.104629] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 65.104688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.104708] Hardware name: WinLink E850-96 board (DT) [ 65.104729] Call trace: [ 65.104743] show_stack+0x20/0x38 (C) [ 65.104776] dump_stack_lvl+0x8c/0xd0 [ 65.104814] print_report+0x118/0x608 [ 65.104852] kasan_report+0xdc/0x128 [ 65.104885] kasan_check_range+0x100/0x1a8 [ 65.104922] __kasan_check_read+0x20/0x30 [ 65.104952] copy_user_test_oob+0x728/0xec8 [ 65.104987] kunit_try_run_case+0x170/0x3f0 [ 65.105025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.105064] kthread+0x328/0x630 [ 65.105094] ret_from_fork+0x10/0x20 [ 65.105131] [ 65.171632] Allocated by task 329: [ 65.175020] kasan_save_stack+0x3c/0x68 [ 65.178838] kasan_save_track+0x20/0x40 [ 65.182657] kasan_save_alloc_info+0x40/0x58 [ 65.186910] __kasan_kmalloc+0xd4/0xd8 [ 65.190643] __kmalloc_noprof+0x190/0x4d0 [ 65.194636] kunit_kmalloc_array+0x34/0x88 [ 65.198715] copy_user_test_oob+0xac/0xec8 [ 65.202795] kunit_try_run_case+0x170/0x3f0 [ 65.206962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.212431] kthread+0x328/0x630 [ 65.215643] ret_from_fork+0x10/0x20 [ 65.219201] [ 65.220679] The buggy address belongs to the object at ffff000800da9800 [ 65.220679] which belongs to the cache kmalloc-128 of size 128 [ 65.233179] The buggy address is located 0 bytes inside of [ 65.233179] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 65.245590] [ 65.247069] The buggy address belongs to the physical page: [ 65.252624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 65.260607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.268246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.275190] page_type: f5(slab) [ 65.278328] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.286047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.293774] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.301585] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.309398] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.317210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.325016] page dumped because: kasan: bad access detected [ 65.330572] [ 65.332047] Memory state around the buggy address: [ 65.336827] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.344030] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.351237] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.358436] ^ [ 65.365557] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.372762] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.379963] ================================================================== [ 65.693259] ================================================================== [ 65.700276] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.707304] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 65.714767] [ 65.716252] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 65.716310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.716328] Hardware name: WinLink E850-96 board (DT) [ 65.716348] Call trace: [ 65.716363] show_stack+0x20/0x38 (C) [ 65.716400] dump_stack_lvl+0x8c/0xd0 [ 65.716437] print_report+0x118/0x608 [ 65.716474] kasan_report+0xdc/0x128 [ 65.716506] kasan_check_range+0x100/0x1a8 [ 65.716542] __kasan_check_read+0x20/0x30 [ 65.716571] copy_user_test_oob+0x3c8/0xec8 [ 65.716604] kunit_try_run_case+0x170/0x3f0 [ 65.716639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.716681] kthread+0x328/0x630 [ 65.716712] ret_from_fork+0x10/0x20 [ 65.716749] [ 65.783255] Allocated by task 329: [ 65.786644] kasan_save_stack+0x3c/0x68 [ 65.790461] kasan_save_track+0x20/0x40 [ 65.794279] kasan_save_alloc_info+0x40/0x58 [ 65.798533] __kasan_kmalloc+0xd4/0xd8 [ 65.802266] __kmalloc_noprof+0x190/0x4d0 [ 65.806259] kunit_kmalloc_array+0x34/0x88 [ 65.810339] copy_user_test_oob+0xac/0xec8 [ 65.814418] kunit_try_run_case+0x170/0x3f0 [ 65.818585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.824054] kthread+0x328/0x630 [ 65.827265] ret_from_fork+0x10/0x20 [ 65.830824] [ 65.832302] The buggy address belongs to the object at ffff000800da9800 [ 65.832302] which belongs to the cache kmalloc-128 of size 128 [ 65.844800] The buggy address is located 0 bytes inside of [ 65.844800] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 65.857213] [ 65.858692] The buggy address belongs to the physical page: [ 65.864249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 65.872232] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.879870] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.886814] page_type: f5(slab) [ 65.889950] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.897670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.905397] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.913208] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.921021] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.928833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.936638] page dumped because: kasan: bad access detected [ 65.942196] [ 65.943669] Memory state around the buggy address: [ 65.948449] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.955652] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.962857] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.970058] ^ [ 65.977180] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.984384] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.991586] ================================================================== [ 65.387656] ================================================================== [ 65.394378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.401404] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 65.408956] [ 65.410441] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 65.410497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.410514] Hardware name: WinLink E850-96 board (DT) [ 65.410538] Call trace: [ 65.410554] show_stack+0x20/0x38 (C) [ 65.410590] dump_stack_lvl+0x8c/0xd0 [ 65.410626] print_report+0x118/0x608 [ 65.410664] kasan_report+0xdc/0x128 [ 65.410696] kasan_check_range+0x100/0x1a8 [ 65.410736] __kasan_check_write+0x20/0x30 [ 65.410766] copy_user_test_oob+0x35c/0xec8 [ 65.410797] kunit_try_run_case+0x170/0x3f0 [ 65.410831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.410872] kthread+0x328/0x630 [ 65.410899] ret_from_fork+0x10/0x20 [ 65.410937] [ 65.477531] Allocated by task 329: [ 65.480917] kasan_save_stack+0x3c/0x68 [ 65.484735] kasan_save_track+0x20/0x40 [ 65.488555] kasan_save_alloc_info+0x40/0x58 [ 65.492808] __kasan_kmalloc+0xd4/0xd8 [ 65.496541] __kmalloc_noprof+0x190/0x4d0 [ 65.500534] kunit_kmalloc_array+0x34/0x88 [ 65.504614] copy_user_test_oob+0xac/0xec8 [ 65.508693] kunit_try_run_case+0x170/0x3f0 [ 65.512860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.518329] kthread+0x328/0x630 [ 65.521541] ret_from_fork+0x10/0x20 [ 65.525100] [ 65.526577] The buggy address belongs to the object at ffff000800da9800 [ 65.526577] which belongs to the cache kmalloc-128 of size 128 [ 65.539077] The buggy address is located 0 bytes inside of [ 65.539077] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 65.551488] [ 65.552966] The buggy address belongs to the physical page: [ 65.558522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 65.566508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.574144] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.581088] page_type: f5(slab) [ 65.584225] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.591946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.599673] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.607483] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.615296] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.623108] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.630914] page dumped because: kasan: bad access detected [ 65.636471] [ 65.637945] Memory state around the buggy address: [ 65.642727] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.649928] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.657135] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.664333] ^ [ 65.671455] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.678660] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.685861] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 64.456351] ================================================================== [ 64.463317] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 64.470602] Write of size 8 at addr ffff000805826578 by task kunit_try_catch/325 [ 64.477980] [ 64.479465] CPU: 2 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 64.479519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.479537] Hardware name: WinLink E850-96 board (DT) [ 64.479558] Call trace: [ 64.479572] show_stack+0x20/0x38 (C) [ 64.479608] dump_stack_lvl+0x8c/0xd0 [ 64.479647] print_report+0x118/0x608 [ 64.479685] kasan_report+0xdc/0x128 [ 64.479716] kasan_check_range+0x100/0x1a8 [ 64.479753] __kasan_check_write+0x20/0x30 [ 64.479783] copy_to_kernel_nofault+0x8c/0x250 [ 64.479822] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 64.479854] kunit_try_run_case+0x170/0x3f0 [ 64.479891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.479930] kthread+0x328/0x630 [ 64.479959] ret_from_fork+0x10/0x20 [ 64.479994] [ 64.551677] Allocated by task 325: [ 64.555066] kasan_save_stack+0x3c/0x68 [ 64.558882] kasan_save_track+0x20/0x40 [ 64.562701] kasan_save_alloc_info+0x40/0x58 [ 64.566955] __kasan_kmalloc+0xd4/0xd8 [ 64.570687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 64.575201] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.579975] kunit_try_run_case+0x170/0x3f0 [ 64.584142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.589612] kthread+0x328/0x630 [ 64.592822] ret_from_fork+0x10/0x20 [ 64.596381] [ 64.597858] The buggy address belongs to the object at ffff000805826500 [ 64.597858] which belongs to the cache kmalloc-128 of size 128 [ 64.610358] The buggy address is located 0 bytes to the right of [ 64.610358] allocated 120-byte region [ffff000805826500, ffff000805826578) [ 64.623290] [ 64.624769] The buggy address belongs to the physical page: [ 64.630324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826 [ 64.638309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.645947] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.652890] page_type: f5(slab) [ 64.656025] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.663748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.671474] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.679285] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.687098] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff [ 64.694910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.702716] page dumped because: kasan: bad access detected [ 64.708273] [ 64.709747] Memory state around the buggy address: [ 64.714530] ffff000805826400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.721730] ffff000805826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.728935] >ffff000805826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.736136] ^ [ 64.743257] ffff000805826580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.750462] ffff000805826600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.757663] ================================================================== [ 64.143682] ================================================================== [ 64.157853] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 64.165225] Read of size 8 at addr ffff000805826578 by task kunit_try_catch/325 [ 64.172516] [ 64.174002] CPU: 2 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 64.174060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.174079] Hardware name: WinLink E850-96 board (DT) [ 64.174102] Call trace: [ 64.174117] show_stack+0x20/0x38 (C) [ 64.174157] dump_stack_lvl+0x8c/0xd0 [ 64.174200] print_report+0x118/0x608 [ 64.174238] kasan_report+0xdc/0x128 [ 64.174272] __asan_report_load8_noabort+0x20/0x30 [ 64.174308] copy_to_kernel_nofault+0x204/0x250 [ 64.174346] copy_to_kernel_nofault_oob+0x158/0x418 [ 64.174380] kunit_try_run_case+0x170/0x3f0 [ 64.174420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.174461] kthread+0x328/0x630 [ 64.174493] ret_from_fork+0x10/0x20 [ 64.174531] [ 64.242914] Allocated by task 325: [ 64.246302] kasan_save_stack+0x3c/0x68 [ 64.250119] kasan_save_track+0x20/0x40 [ 64.253938] kasan_save_alloc_info+0x40/0x58 [ 64.258192] __kasan_kmalloc+0xd4/0xd8 [ 64.261924] __kmalloc_cache_noprof+0x15c/0x3c0 [ 64.266438] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.271212] kunit_try_run_case+0x170/0x3f0 [ 64.275379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.280849] kthread+0x328/0x630 [ 64.284059] ret_from_fork+0x10/0x20 [ 64.287618] [ 64.289097] The buggy address belongs to the object at ffff000805826500 [ 64.289097] which belongs to the cache kmalloc-128 of size 128 [ 64.301597] The buggy address is located 0 bytes to the right of [ 64.301597] allocated 120-byte region [ffff000805826500, ffff000805826578) [ 64.314527] [ 64.316006] The buggy address belongs to the physical page: [ 64.321564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826 [ 64.329548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.337186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.344129] page_type: f5(slab) [ 64.347267] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.354985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.362713] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.370523] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.378336] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff [ 64.386148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.393954] page dumped because: kasan: bad access detected [ 64.399510] [ 64.400984] Memory state around the buggy address: [ 64.405769] ffff000805826400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.412967] ffff000805826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.420173] >ffff000805826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.427373] ^ [ 64.434494] ffff000805826580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.441700] ffff000805826600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.448902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 63.909761] ================================================================== [ 63.916793] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 63.923475] Read of size 1 at addr ffff800087ced7f8 by task kunit_try_catch/313 [ 63.930766] [ 63.932250] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.932302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.932319] Hardware name: WinLink E850-96 board (DT) [ 63.932340] Call trace: [ 63.932352] show_stack+0x20/0x38 (C) [ 63.932387] dump_stack_lvl+0x8c/0xd0 [ 63.932427] print_report+0x310/0x608 [ 63.932463] kasan_report+0xdc/0x128 [ 63.932495] __asan_report_load1_noabort+0x20/0x30 [ 63.932527] vmalloc_oob+0x51c/0x5d0 [ 63.932557] kunit_try_run_case+0x170/0x3f0 [ 63.932592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.932634] kthread+0x328/0x630 [ 63.932663] ret_from_fork+0x10/0x20 [ 63.932697] [ 63.995354] The buggy address belongs to the virtual mapping at [ 63.995354] [ffff800087ced000, ffff800087cef000) created by: [ 63.995354] vmalloc_oob+0x98/0x5d0 [ 64.010452] [ 64.011932] The buggy address belongs to the physical page: [ 64.017488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3 [ 64.025472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.031990] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 64.039712] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 64.047431] page dumped because: kasan: bad access detected [ 64.052988] [ 64.054462] Memory state around the buggy address: [ 64.059243] ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.066445] ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.073651] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 64.080850] ^ [ 64.087973] ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 64.095178] ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 64.102378] ================================================================== [ 63.702769] ================================================================== [ 63.717059] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 63.723741] Read of size 1 at addr ffff800087ced7f3 by task kunit_try_catch/313 [ 63.731029] [ 63.732515] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.732573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.732593] Hardware name: WinLink E850-96 board (DT) [ 63.732614] Call trace: [ 63.732631] show_stack+0x20/0x38 (C) [ 63.732673] dump_stack_lvl+0x8c/0xd0 [ 63.732711] print_report+0x310/0x608 [ 63.732750] kasan_report+0xdc/0x128 [ 63.732782] __asan_report_load1_noabort+0x20/0x30 [ 63.732816] vmalloc_oob+0x578/0x5d0 [ 63.732846] kunit_try_run_case+0x170/0x3f0 [ 63.732881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.732925] kthread+0x328/0x630 [ 63.732955] ret_from_fork+0x10/0x20 [ 63.732990] [ 63.795619] The buggy address belongs to the virtual mapping at [ 63.795619] [ffff800087ced000, ffff800087cef000) created by: [ 63.795619] vmalloc_oob+0x98/0x5d0 [ 63.810716] [ 63.812196] The buggy address belongs to the physical page: [ 63.817751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3 [ 63.825737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.832257] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.839975] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.847696] page dumped because: kasan: bad access detected [ 63.853251] [ 63.854727] Memory state around the buggy address: [ 63.859507] ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.866708] ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.873913] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.881114] ^ [ 63.887977] ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.895180] ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.902381] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 49.182520] ================================================================== [ 49.189583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.196873] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.204251] [ 49.205730] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.205779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.205796] Hardware name: WinLink E850-96 board (DT) [ 49.205815] Call trace: [ 49.205828] show_stack+0x20/0x38 (C) [ 49.205862] dump_stack_lvl+0x8c/0xd0 [ 49.205899] print_report+0x118/0x608 [ 49.205933] kasan_report+0xdc/0x128 [ 49.205966] kasan_check_range+0x100/0x1a8 [ 49.206002] __kasan_check_write+0x20/0x30 [ 49.206032] kasan_atomics_helper+0x47c/0x4858 [ 49.206065] kasan_atomics+0x198/0x2e0 [ 49.206098] kunit_try_run_case+0x170/0x3f0 [ 49.206130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.206168] kthread+0x328/0x630 [ 49.206197] ret_from_fork+0x10/0x20 [ 49.206228] [ 49.276819] Allocated by task 309: [ 49.280205] kasan_save_stack+0x3c/0x68 [ 49.284024] kasan_save_track+0x20/0x40 [ 49.287844] kasan_save_alloc_info+0x40/0x58 [ 49.292097] __kasan_kmalloc+0xd4/0xd8 [ 49.295830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.300343] kasan_atomics+0xb8/0x2e0 [ 49.303989] kunit_try_run_case+0x170/0x3f0 [ 49.308156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.313624] kthread+0x328/0x630 [ 49.316836] ret_from_fork+0x10/0x20 [ 49.320395] [ 49.321871] The buggy address belongs to the object at ffff000800c2e200 [ 49.321871] which belongs to the cache kmalloc-64 of size 64 [ 49.334197] The buggy address is located 0 bytes to the right of [ 49.334197] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.347044] [ 49.348520] The buggy address belongs to the physical page: [ 49.354076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.362061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.368571] page_type: f5(slab) [ 49.371704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.379429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.387148] page dumped because: kasan: bad access detected [ 49.392703] [ 49.394179] Memory state around the buggy address: [ 49.398957] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.406161] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.413366] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.420567] ^ [ 49.425345] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.432550] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.439751] ================================================================== [ 52.618740] ================================================================== [ 52.625817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.633106] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.640484] [ 52.641963] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.642012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.642029] Hardware name: WinLink E850-96 board (DT) [ 52.642049] Call trace: [ 52.642062] show_stack+0x20/0x38 (C) [ 52.642094] dump_stack_lvl+0x8c/0xd0 [ 52.642130] print_report+0x118/0x608 [ 52.642163] kasan_report+0xdc/0x128 [ 52.642195] kasan_check_range+0x100/0x1a8 [ 52.642230] __kasan_check_write+0x20/0x30 [ 52.642259] kasan_atomics_helper+0xa04/0x4858 [ 52.642294] kasan_atomics+0x198/0x2e0 [ 52.642326] kunit_try_run_case+0x170/0x3f0 [ 52.642358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.642396] kthread+0x328/0x630 [ 52.642423] ret_from_fork+0x10/0x20 [ 52.642456] [ 52.713052] Allocated by task 309: [ 52.716438] kasan_save_stack+0x3c/0x68 [ 52.720257] kasan_save_track+0x20/0x40 [ 52.724076] kasan_save_alloc_info+0x40/0x58 [ 52.728330] __kasan_kmalloc+0xd4/0xd8 [ 52.732062] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.736576] kasan_atomics+0xb8/0x2e0 [ 52.740222] kunit_try_run_case+0x170/0x3f0 [ 52.744389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.749857] kthread+0x328/0x630 [ 52.753069] ret_from_fork+0x10/0x20 [ 52.756628] [ 52.758104] The buggy address belongs to the object at ffff000800c2e200 [ 52.758104] which belongs to the cache kmalloc-64 of size 64 [ 52.770430] The buggy address is located 0 bytes to the right of [ 52.770430] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 52.783277] [ 52.784753] The buggy address belongs to the physical page: [ 52.790309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.798294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.804805] page_type: f5(slab) [ 52.807937] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.815662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.823381] page dumped because: kasan: bad access detected [ 52.828936] [ 52.830411] Memory state around the buggy address: [ 52.835189] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.842394] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.849599] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.856800] ^ [ 52.861578] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.868783] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.875984] ================================================================== [ 51.563725] ================================================================== [ 51.570797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.578087] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.585465] [ 51.586945] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.586993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.587007] Hardware name: WinLink E850-96 board (DT) [ 51.587024] Call trace: [ 51.587037] show_stack+0x20/0x38 (C) [ 51.587069] dump_stack_lvl+0x8c/0xd0 [ 51.587104] print_report+0x118/0x608 [ 51.587136] kasan_report+0xdc/0x128 [ 51.587169] kasan_check_range+0x100/0x1a8 [ 51.587203] __kasan_check_write+0x20/0x30 [ 51.587235] kasan_atomics_helper+0x894/0x4858 [ 51.587268] kasan_atomics+0x198/0x2e0 [ 51.587297] kunit_try_run_case+0x170/0x3f0 [ 51.587333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.587371] kthread+0x328/0x630 [ 51.587397] ret_from_fork+0x10/0x20 [ 51.587430] [ 51.658033] Allocated by task 309: [ 51.661419] kasan_save_stack+0x3c/0x68 [ 51.665238] kasan_save_track+0x20/0x40 [ 51.669058] kasan_save_alloc_info+0x40/0x58 [ 51.673311] __kasan_kmalloc+0xd4/0xd8 [ 51.677044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.681557] kasan_atomics+0xb8/0x2e0 [ 51.685203] kunit_try_run_case+0x170/0x3f0 [ 51.689370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.694838] kthread+0x328/0x630 [ 51.698050] ret_from_fork+0x10/0x20 [ 51.701610] [ 51.703085] The buggy address belongs to the object at ffff000800c2e200 [ 51.703085] which belongs to the cache kmalloc-64 of size 64 [ 51.715412] The buggy address is located 0 bytes to the right of [ 51.715412] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.728258] [ 51.729734] The buggy address belongs to the physical page: [ 51.735290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 51.743275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.749786] page_type: f5(slab) [ 51.752919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.760643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.768362] page dumped because: kasan: bad access detected [ 51.773917] [ 51.775393] Memory state around the buggy address: [ 51.780171] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.787375] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.794580] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.801781] ^ [ 51.806559] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.813764] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.820965] ================================================================== [ 56.567459] ================================================================== [ 56.574543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.581918] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.589296] [ 56.590776] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.590822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.590838] Hardware name: WinLink E850-96 board (DT) [ 56.590856] Call trace: [ 56.590868] show_stack+0x20/0x38 (C) [ 56.590901] dump_stack_lvl+0x8c/0xd0 [ 56.590937] print_report+0x118/0x608 [ 56.590969] kasan_report+0xdc/0x128 [ 56.591001] __asan_report_store8_noabort+0x20/0x30 [ 56.591033] kasan_atomics_helper+0x3e5c/0x4858 [ 56.591066] kasan_atomics+0x198/0x2e0 [ 56.591097] kunit_try_run_case+0x170/0x3f0 [ 56.591131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.591170] kthread+0x328/0x630 [ 56.591196] ret_from_fork+0x10/0x20 [ 56.591227] [ 56.658653] Allocated by task 309: [ 56.662038] kasan_save_stack+0x3c/0x68 [ 56.665858] kasan_save_track+0x20/0x40 [ 56.669677] kasan_save_alloc_info+0x40/0x58 [ 56.673931] __kasan_kmalloc+0xd4/0xd8 [ 56.677663] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.682177] kasan_atomics+0xb8/0x2e0 [ 56.685823] kunit_try_run_case+0x170/0x3f0 [ 56.689989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.695458] kthread+0x328/0x630 [ 56.698670] ret_from_fork+0x10/0x20 [ 56.702229] [ 56.703704] The buggy address belongs to the object at ffff000800c2e200 [ 56.703704] which belongs to the cache kmalloc-64 of size 64 [ 56.716031] The buggy address is located 0 bytes to the right of [ 56.716031] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.728877] [ 56.730354] The buggy address belongs to the physical page: [ 56.735909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 56.743895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.750405] page_type: f5(slab) [ 56.753538] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.761262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.768981] page dumped because: kasan: bad access detected [ 56.774537] [ 56.776012] Memory state around the buggy address: [ 56.780790] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.787995] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.795200] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.802401] ^ [ 56.807179] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.814383] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.821585] ================================================================== [ 62.116371] ================================================================== [ 62.123421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 62.130793] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.138084] [ 62.139564] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.139608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.139626] Hardware name: WinLink E850-96 board (DT) [ 62.139645] Call trace: [ 62.139655] show_stack+0x20/0x38 (C) [ 62.139690] dump_stack_lvl+0x8c/0xd0 [ 62.139724] print_report+0x118/0x608 [ 62.139761] kasan_report+0xdc/0x128 [ 62.139794] __asan_report_load8_noabort+0x20/0x30 [ 62.139824] kasan_atomics_helper+0x3df4/0x4858 [ 62.139858] kasan_atomics+0x198/0x2e0 [ 62.139890] kunit_try_run_case+0x170/0x3f0 [ 62.139924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.139964] kthread+0x328/0x630 [ 62.139989] ret_from_fork+0x10/0x20 [ 62.140022] [ 62.207354] Allocated by task 309: [ 62.210741] kasan_save_stack+0x3c/0x68 [ 62.214559] kasan_save_track+0x20/0x40 [ 62.218379] kasan_save_alloc_info+0x40/0x58 [ 62.222632] __kasan_kmalloc+0xd4/0xd8 [ 62.226364] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.230878] kasan_atomics+0xb8/0x2e0 [ 62.234524] kunit_try_run_case+0x170/0x3f0 [ 62.238691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.244159] kthread+0x328/0x630 [ 62.247371] ret_from_fork+0x10/0x20 [ 62.250930] [ 62.252406] The buggy address belongs to the object at ffff000800c2e200 [ 62.252406] which belongs to the cache kmalloc-64 of size 64 [ 62.264732] The buggy address is located 0 bytes to the right of [ 62.264732] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.277579] [ 62.279055] The buggy address belongs to the physical page: [ 62.284611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.292596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.299106] page_type: f5(slab) [ 62.302239] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.309963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.317683] page dumped because: kasan: bad access detected [ 62.323238] [ 62.324713] Memory state around the buggy address: [ 62.329492] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.336696] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.343901] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.351102] ^ [ 62.355880] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.363085] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.370286] ================================================================== [ 57.358098] ================================================================== [ 57.365156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.372445] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.379822] [ 57.381302] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.381350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.381366] Hardware name: WinLink E850-96 board (DT) [ 57.381384] Call trace: [ 57.381395] show_stack+0x20/0x38 (C) [ 57.381426] dump_stack_lvl+0x8c/0xd0 [ 57.381463] print_report+0x118/0x608 [ 57.381496] kasan_report+0xdc/0x128 [ 57.381530] kasan_check_range+0x100/0x1a8 [ 57.381565] __kasan_check_write+0x20/0x30 [ 57.381595] kasan_atomics_helper+0xf88/0x4858 [ 57.381628] kasan_atomics+0x198/0x2e0 [ 57.381659] kunit_try_run_case+0x170/0x3f0 [ 57.381691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.381729] kthread+0x328/0x630 [ 57.381755] ret_from_fork+0x10/0x20 [ 57.381787] [ 57.452391] Allocated by task 309: [ 57.455777] kasan_save_stack+0x3c/0x68 [ 57.459596] kasan_save_track+0x20/0x40 [ 57.463415] kasan_save_alloc_info+0x40/0x58 [ 57.467669] __kasan_kmalloc+0xd4/0xd8 [ 57.471401] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.475915] kasan_atomics+0xb8/0x2e0 [ 57.479561] kunit_try_run_case+0x170/0x3f0 [ 57.483727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.489196] kthread+0x328/0x630 [ 57.492408] ret_from_fork+0x10/0x20 [ 57.495967] [ 57.497442] The buggy address belongs to the object at ffff000800c2e200 [ 57.497442] which belongs to the cache kmalloc-64 of size 64 [ 57.509769] The buggy address is located 0 bytes to the right of [ 57.509769] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 57.522616] [ 57.524092] The buggy address belongs to the physical page: [ 57.529647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.537633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.544143] page_type: f5(slab) [ 57.547276] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.555000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.562719] page dumped because: kasan: bad access detected [ 57.568275] [ 57.569750] Memory state around the buggy address: [ 57.574528] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.581733] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.588937] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.596139] ^ [ 57.600917] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.608121] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.615323] ================================================================== [ 57.622652] ================================================================== [ 57.629733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.637024] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.644402] [ 57.645882] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.645928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.645943] Hardware name: WinLink E850-96 board (DT) [ 57.645962] Call trace: [ 57.645973] show_stack+0x20/0x38 (C) [ 57.646004] dump_stack_lvl+0x8c/0xd0 [ 57.646039] print_report+0x118/0x608 [ 57.646074] kasan_report+0xdc/0x128 [ 57.646105] kasan_check_range+0x100/0x1a8 [ 57.646141] __kasan_check_write+0x20/0x30 [ 57.646171] kasan_atomics_helper+0xff0/0x4858 [ 57.646204] kasan_atomics+0x198/0x2e0 [ 57.646235] kunit_try_run_case+0x170/0x3f0 [ 57.646269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.646307] kthread+0x328/0x630 [ 57.646334] ret_from_fork+0x10/0x20 [ 57.646364] [ 57.716970] Allocated by task 309: [ 57.720356] kasan_save_stack+0x3c/0x68 [ 57.724175] kasan_save_track+0x20/0x40 [ 57.727995] kasan_save_alloc_info+0x40/0x58 [ 57.732248] __kasan_kmalloc+0xd4/0xd8 [ 57.735981] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.740494] kasan_atomics+0xb8/0x2e0 [ 57.744140] kunit_try_run_case+0x170/0x3f0 [ 57.748307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.753775] kthread+0x328/0x630 [ 57.756987] ret_from_fork+0x10/0x20 [ 57.760546] [ 57.762022] The buggy address belongs to the object at ffff000800c2e200 [ 57.762022] which belongs to the cache kmalloc-64 of size 64 [ 57.774348] The buggy address is located 0 bytes to the right of [ 57.774348] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 57.787195] [ 57.788671] The buggy address belongs to the physical page: [ 57.794227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.802212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.808723] page_type: f5(slab) [ 57.811855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.819579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.827299] page dumped because: kasan: bad access detected [ 57.832854] [ 57.834330] Memory state around the buggy address: [ 57.839108] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.846312] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.853517] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.860718] ^ [ 57.865496] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.872701] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.879902] ================================================================== [ 54.199614] ================================================================== [ 54.206696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.213985] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 54.221363] [ 54.222842] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 54.222890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.222906] Hardware name: WinLink E850-96 board (DT) [ 54.222924] Call trace: [ 54.222936] show_stack+0x20/0x38 (C) [ 54.222969] dump_stack_lvl+0x8c/0xd0 [ 54.223006] print_report+0x118/0x608 [ 54.223039] kasan_report+0xdc/0x128 [ 54.223071] kasan_check_range+0x100/0x1a8 [ 54.223107] __kasan_check_write+0x20/0x30 [ 54.223138] kasan_atomics_helper+0xc08/0x4858 [ 54.223172] kasan_atomics+0x198/0x2e0 [ 54.223204] kunit_try_run_case+0x170/0x3f0 [ 54.223239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.223279] kthread+0x328/0x630 [ 54.223304] ret_from_fork+0x10/0x20 [ 54.223336] [ 54.293931] Allocated by task 309: [ 54.297317] kasan_save_stack+0x3c/0x68 [ 54.301137] kasan_save_track+0x20/0x40 [ 54.304956] kasan_save_alloc_info+0x40/0x58 [ 54.309209] __kasan_kmalloc+0xd4/0xd8 [ 54.312942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.317456] kasan_atomics+0xb8/0x2e0 [ 54.321101] kunit_try_run_case+0x170/0x3f0 [ 54.325268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.330736] kthread+0x328/0x630 [ 54.333948] ret_from_fork+0x10/0x20 [ 54.337507] [ 54.338983] The buggy address belongs to the object at ffff000800c2e200 [ 54.338983] which belongs to the cache kmalloc-64 of size 64 [ 54.351310] The buggy address is located 0 bytes to the right of [ 54.351310] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.364156] [ 54.365632] The buggy address belongs to the physical page: [ 54.371188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.379174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.385684] page_type: f5(slab) [ 54.388816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.396541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.404260] page dumped because: kasan: bad access detected [ 54.409815] [ 54.411291] Memory state around the buggy address: [ 54.416068] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.423274] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.430478] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.437679] ^ [ 54.442457] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.449662] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.456863] ================================================================== [ 51.034563] ================================================================== [ 51.041640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 51.048928] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.056306] [ 51.057785] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.057832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.057846] Hardware name: WinLink E850-96 board (DT) [ 51.057864] Call trace: [ 51.057876] show_stack+0x20/0x38 (C) [ 51.057908] dump_stack_lvl+0x8c/0xd0 [ 51.057942] print_report+0x118/0x608 [ 51.057975] kasan_report+0xdc/0x128 [ 51.058008] kasan_check_range+0x100/0x1a8 [ 51.058042] __kasan_check_write+0x20/0x30 [ 51.058072] kasan_atomics_helper+0x760/0x4858 [ 51.058104] kasan_atomics+0x198/0x2e0 [ 51.058134] kunit_try_run_case+0x170/0x3f0 [ 51.058166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.058207] kthread+0x328/0x630 [ 51.058234] ret_from_fork+0x10/0x20 [ 51.058266] [ 51.128875] Allocated by task 309: [ 51.132260] kasan_save_stack+0x3c/0x68 [ 51.136080] kasan_save_track+0x20/0x40 [ 51.139899] kasan_save_alloc_info+0x40/0x58 [ 51.144153] __kasan_kmalloc+0xd4/0xd8 [ 51.147885] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.152399] kasan_atomics+0xb8/0x2e0 [ 51.156044] kunit_try_run_case+0x170/0x3f0 [ 51.160211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.165680] kthread+0x328/0x630 [ 51.168892] ret_from_fork+0x10/0x20 [ 51.172451] [ 51.173926] The buggy address belongs to the object at ffff000800c2e200 [ 51.173926] which belongs to the cache kmalloc-64 of size 64 [ 51.186253] The buggy address is located 0 bytes to the right of [ 51.186253] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.199099] [ 51.200575] The buggy address belongs to the physical page: [ 51.206131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 51.214117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.220627] page_type: f5(slab) [ 51.223760] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.231484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.239203] page dumped because: kasan: bad access detected [ 51.244758] [ 51.246234] Memory state around the buggy address: [ 51.251012] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.258217] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.265421] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.272622] ^ [ 51.277401] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.284605] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.291806] ================================================================== [ 59.475791] ================================================================== [ 59.482832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.490208] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 59.497586] [ 59.499066] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 59.499113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.499130] Hardware name: WinLink E850-96 board (DT) [ 59.499148] Call trace: [ 59.499159] show_stack+0x20/0x38 (C) [ 59.499193] dump_stack_lvl+0x8c/0xd0 [ 59.499229] print_report+0x118/0x608 [ 59.499266] kasan_report+0xdc/0x128 [ 59.499298] kasan_check_range+0x100/0x1a8 [ 59.499332] __kasan_check_write+0x20/0x30 [ 59.499362] kasan_atomics_helper+0x12d8/0x4858 [ 59.499395] kasan_atomics+0x198/0x2e0 [ 59.499425] kunit_try_run_case+0x170/0x3f0 [ 59.499458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.499497] kthread+0x328/0x630 [ 59.499523] ret_from_fork+0x10/0x20 [ 59.499554] [ 59.570241] Allocated by task 309: [ 59.573627] kasan_save_stack+0x3c/0x68 [ 59.577446] kasan_save_track+0x20/0x40 [ 59.581265] kasan_save_alloc_info+0x40/0x58 [ 59.585519] __kasan_kmalloc+0xd4/0xd8 [ 59.589251] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.593765] kasan_atomics+0xb8/0x2e0 [ 59.597411] kunit_try_run_case+0x170/0x3f0 [ 59.601577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.607046] kthread+0x328/0x630 [ 59.610258] ret_from_fork+0x10/0x20 [ 59.613817] [ 59.615294] The buggy address belongs to the object at ffff000800c2e200 [ 59.615294] which belongs to the cache kmalloc-64 of size 64 [ 59.627619] The buggy address is located 0 bytes to the right of [ 59.627619] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.640466] [ 59.641941] The buggy address belongs to the physical page: [ 59.647498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.655483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.661993] page_type: f5(slab) [ 59.665126] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.672851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.680570] page dumped because: kasan: bad access detected [ 59.686126] [ 59.687600] Memory state around the buggy address: [ 59.692379] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.699583] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.706788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.713989] ^ [ 59.718766] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.725971] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.733173] ================================================================== [ 63.168413] ================================================================== [ 63.175487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.182861] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 63.190152] [ 63.191632] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.191678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.191694] Hardware name: WinLink E850-96 board (DT) [ 63.191715] Call trace: [ 63.191726] show_stack+0x20/0x38 (C) [ 63.191761] dump_stack_lvl+0x8c/0xd0 [ 63.191796] print_report+0x118/0x608 [ 63.191833] kasan_report+0xdc/0x128 [ 63.191866] __asan_report_load8_noabort+0x20/0x30 [ 63.191899] kasan_atomics_helper+0x3e20/0x4858 [ 63.191931] kasan_atomics+0x198/0x2e0 [ 63.191961] kunit_try_run_case+0x170/0x3f0 [ 63.191994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.192032] kthread+0x328/0x630 [ 63.192059] ret_from_fork+0x10/0x20 [ 63.192091] [ 63.259422] Allocated by task 309: [ 63.262807] kasan_save_stack+0x3c/0x68 [ 63.266627] kasan_save_track+0x20/0x40 [ 63.270446] kasan_save_alloc_info+0x40/0x58 [ 63.274699] __kasan_kmalloc+0xd4/0xd8 [ 63.278432] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.282946] kasan_atomics+0xb8/0x2e0 [ 63.286592] kunit_try_run_case+0x170/0x3f0 [ 63.290758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.296227] kthread+0x328/0x630 [ 63.299439] ret_from_fork+0x10/0x20 [ 63.302998] [ 63.304473] The buggy address belongs to the object at ffff000800c2e200 [ 63.304473] which belongs to the cache kmalloc-64 of size 64 [ 63.316800] The buggy address is located 0 bytes to the right of [ 63.316800] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 63.329646] [ 63.331122] The buggy address belongs to the physical page: [ 63.336678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 63.344663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.351174] page_type: f5(slab) [ 63.354307] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.362031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.369750] page dumped because: kasan: bad access detected [ 63.375307] [ 63.376781] Memory state around the buggy address: [ 63.381559] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.388764] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.395969] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.403170] ^ [ 63.407947] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.415152] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.422353] ================================================================== [ 54.725478] ================================================================== [ 54.732557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.739845] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 54.747223] [ 54.748703] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 54.748752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.748768] Hardware name: WinLink E850-96 board (DT) [ 54.748786] Call trace: [ 54.748798] show_stack+0x20/0x38 (C) [ 54.748832] dump_stack_lvl+0x8c/0xd0 [ 54.748868] print_report+0x118/0x608 [ 54.748902] kasan_report+0xdc/0x128 [ 54.748933] kasan_check_range+0x100/0x1a8 [ 54.748968] __kasan_check_write+0x20/0x30 [ 54.748998] kasan_atomics_helper+0xca0/0x4858 [ 54.749031] kasan_atomics+0x198/0x2e0 [ 54.749065] kunit_try_run_case+0x170/0x3f0 [ 54.749098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.749138] kthread+0x328/0x630 [ 54.749164] ret_from_fork+0x10/0x20 [ 54.749194] [ 54.819791] Allocated by task 309: [ 54.823177] kasan_save_stack+0x3c/0x68 [ 54.826996] kasan_save_track+0x20/0x40 [ 54.830816] kasan_save_alloc_info+0x40/0x58 [ 54.835069] __kasan_kmalloc+0xd4/0xd8 [ 54.838802] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.843316] kasan_atomics+0xb8/0x2e0 [ 54.846961] kunit_try_run_case+0x170/0x3f0 [ 54.851128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.856597] kthread+0x328/0x630 [ 54.859808] ret_from_fork+0x10/0x20 [ 54.863367] [ 54.864843] The buggy address belongs to the object at ffff000800c2e200 [ 54.864843] which belongs to the cache kmalloc-64 of size 64 [ 54.877169] The buggy address is located 0 bytes to the right of [ 54.877169] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.890016] [ 54.891494] The buggy address belongs to the physical page: [ 54.897048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.905033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.911544] page_type: f5(slab) [ 54.914676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.922401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.930120] page dumped because: kasan: bad access detected [ 54.935675] [ 54.937151] Memory state around the buggy address: [ 54.941929] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.949134] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.956338] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.963540] ^ [ 54.968317] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.975522] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.982723] ================================================================== [ 49.447087] ================================================================== [ 49.454163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.461452] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.468830] [ 49.470310] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.470358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.470372] Hardware name: WinLink E850-96 board (DT) [ 49.470390] Call trace: [ 49.470403] show_stack+0x20/0x38 (C) [ 49.470434] dump_stack_lvl+0x8c/0xd0 [ 49.470470] print_report+0x118/0x608 [ 49.470506] kasan_report+0xdc/0x128 [ 49.470538] kasan_check_range+0x100/0x1a8 [ 49.470573] __kasan_check_write+0x20/0x30 [ 49.470603] kasan_atomics_helper+0x4e4/0x4858 [ 49.470637] kasan_atomics+0x198/0x2e0 [ 49.470668] kunit_try_run_case+0x170/0x3f0 [ 49.470700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.470738] kthread+0x328/0x630 [ 49.470764] ret_from_fork+0x10/0x20 [ 49.470796] [ 49.541398] Allocated by task 309: [ 49.544784] kasan_save_stack+0x3c/0x68 [ 49.548604] kasan_save_track+0x20/0x40 [ 49.552423] kasan_save_alloc_info+0x40/0x58 [ 49.556676] __kasan_kmalloc+0xd4/0xd8 [ 49.560409] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.564923] kasan_atomics+0xb8/0x2e0 [ 49.568568] kunit_try_run_case+0x170/0x3f0 [ 49.572735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.578204] kthread+0x328/0x630 [ 49.581416] ret_from_fork+0x10/0x20 [ 49.584974] [ 49.586450] The buggy address belongs to the object at ffff000800c2e200 [ 49.586450] which belongs to the cache kmalloc-64 of size 64 [ 49.598777] The buggy address is located 0 bytes to the right of [ 49.598777] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.611623] [ 49.613099] The buggy address belongs to the physical page: [ 49.618655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.626641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.633151] page_type: f5(slab) [ 49.636284] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.644008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.651727] page dumped because: kasan: bad access detected [ 49.657282] [ 49.658758] Memory state around the buggy address: [ 49.663536] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.670741] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.677945] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.685147] ^ [ 49.689924] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.697129] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.704330] ================================================================== [ 47.865999] ================================================================== [ 47.873112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.880486] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.887778] [ 47.889258] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.889312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.889327] Hardware name: WinLink E850-96 board (DT) [ 47.889348] Call trace: [ 47.889360] show_stack+0x20/0x38 (C) [ 47.889391] dump_stack_lvl+0x8c/0xd0 [ 47.889429] print_report+0x118/0x608 [ 47.889464] kasan_report+0xdc/0x128 [ 47.889496] __asan_report_load4_noabort+0x20/0x30 [ 47.889528] kasan_atomics_helper+0x40fc/0x4858 [ 47.889560] kasan_atomics+0x198/0x2e0 [ 47.889590] kunit_try_run_case+0x170/0x3f0 [ 47.889626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.889665] kthread+0x328/0x630 [ 47.889693] ret_from_fork+0x10/0x20 [ 47.889727] [ 47.957047] Allocated by task 309: [ 47.960433] kasan_save_stack+0x3c/0x68 [ 47.964252] kasan_save_track+0x20/0x40 [ 47.968072] kasan_save_alloc_info+0x40/0x58 [ 47.972325] __kasan_kmalloc+0xd4/0xd8 [ 47.976058] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.980571] kasan_atomics+0xb8/0x2e0 [ 47.984217] kunit_try_run_case+0x170/0x3f0 [ 47.988384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.993853] kthread+0x328/0x630 [ 47.997064] ret_from_fork+0x10/0x20 [ 48.000623] [ 48.002100] The buggy address belongs to the object at ffff000800c2e200 [ 48.002100] which belongs to the cache kmalloc-64 of size 64 [ 48.014426] The buggy address is located 0 bytes to the right of [ 48.014426] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.027272] [ 48.028750] The buggy address belongs to the physical page: [ 48.034304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.042291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.048800] page_type: f5(slab) [ 48.051934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.059657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.067376] page dumped because: kasan: bad access detected [ 48.072931] [ 48.074407] Memory state around the buggy address: [ 48.079187] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.086389] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.093596] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.100794] ^ [ 48.105573] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.112778] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.119979] ================================================================== [ 51.828322] ================================================================== [ 51.835377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.842753] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.850045] [ 51.851524] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.851570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.851586] Hardware name: WinLink E850-96 board (DT) [ 51.851602] Call trace: [ 51.851614] show_stack+0x20/0x38 (C) [ 51.851649] dump_stack_lvl+0x8c/0xd0 [ 51.851684] print_report+0x118/0x608 [ 51.851718] kasan_report+0xdc/0x128 [ 51.851749] __asan_report_load4_noabort+0x20/0x30 [ 51.851780] kasan_atomics_helper+0x42d8/0x4858 [ 51.851814] kasan_atomics+0x198/0x2e0 [ 51.851844] kunit_try_run_case+0x170/0x3f0 [ 51.851877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.851915] kthread+0x328/0x630 [ 51.851942] ret_from_fork+0x10/0x20 [ 51.851974] [ 51.919314] Allocated by task 309: [ 51.922700] kasan_save_stack+0x3c/0x68 [ 51.926519] kasan_save_track+0x20/0x40 [ 51.930338] kasan_save_alloc_info+0x40/0x58 [ 51.934592] __kasan_kmalloc+0xd4/0xd8 [ 51.938325] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.942838] kasan_atomics+0xb8/0x2e0 [ 51.946484] kunit_try_run_case+0x170/0x3f0 [ 51.950651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.956119] kthread+0x328/0x630 [ 51.959331] ret_from_fork+0x10/0x20 [ 51.962890] [ 51.964365] The buggy address belongs to the object at ffff000800c2e200 [ 51.964365] which belongs to the cache kmalloc-64 of size 64 [ 51.976693] The buggy address is located 0 bytes to the right of [ 51.976693] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.989539] [ 51.991015] The buggy address belongs to the physical page: [ 51.996571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.004557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.011066] page_type: f5(slab) [ 52.014199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.021924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.029642] page dumped because: kasan: bad access detected [ 52.035198] [ 52.036674] Memory state around the buggy address: [ 52.041452] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.048656] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.055861] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.063062] ^ [ 52.067840] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.075045] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.082246] ================================================================== [ 56.302907] ================================================================== [ 56.309963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.317252] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.324630] [ 56.326109] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.326156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.326172] Hardware name: WinLink E850-96 board (DT) [ 56.326190] Call trace: [ 56.326200] show_stack+0x20/0x38 (C) [ 56.326233] dump_stack_lvl+0x8c/0xd0 [ 56.326268] print_report+0x118/0x608 [ 56.326302] kasan_report+0xdc/0x128 [ 56.326335] kasan_check_range+0x100/0x1a8 [ 56.326370] __kasan_check_write+0x20/0x30 [ 56.326400] kasan_atomics_helper+0xe44/0x4858 [ 56.326432] kasan_atomics+0x198/0x2e0 [ 56.326464] kunit_try_run_case+0x170/0x3f0 [ 56.326497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.326536] kthread+0x328/0x630 [ 56.326563] ret_from_fork+0x10/0x20 [ 56.326593] [ 56.397198] Allocated by task 309: [ 56.400584] kasan_save_stack+0x3c/0x68 [ 56.404403] kasan_save_track+0x20/0x40 [ 56.408223] kasan_save_alloc_info+0x40/0x58 [ 56.412476] __kasan_kmalloc+0xd4/0xd8 [ 56.416209] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.420723] kasan_atomics+0xb8/0x2e0 [ 56.424368] kunit_try_run_case+0x170/0x3f0 [ 56.428535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.434004] kthread+0x328/0x630 [ 56.437215] ret_from_fork+0x10/0x20 [ 56.440774] [ 56.442250] The buggy address belongs to the object at ffff000800c2e200 [ 56.442250] which belongs to the cache kmalloc-64 of size 64 [ 56.454577] The buggy address is located 0 bytes to the right of [ 56.454577] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.467423] [ 56.468899] The buggy address belongs to the physical page: [ 56.474455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 56.482441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.488951] page_type: f5(slab) [ 56.492083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.499808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.507527] page dumped because: kasan: bad access detected [ 56.513082] [ 56.514558] Memory state around the buggy address: [ 56.519336] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.526541] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.533745] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.540946] ^ [ 56.545724] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.552929] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.560130] ================================================================== [ 61.851567] ================================================================== [ 61.858668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.866040] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.873418] [ 61.874900] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.874947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.874962] Hardware name: WinLink E850-96 board (DT) [ 61.874980] Call trace: [ 61.874993] show_stack+0x20/0x38 (C) [ 61.875028] dump_stack_lvl+0x8c/0xd0 [ 61.875062] print_report+0x118/0x608 [ 61.875098] kasan_report+0xdc/0x128 [ 61.875131] kasan_check_range+0x100/0x1a8 [ 61.875167] __kasan_check_write+0x20/0x30 [ 61.875195] kasan_atomics_helper+0x1644/0x4858 [ 61.875230] kasan_atomics+0x198/0x2e0 [ 61.875260] kunit_try_run_case+0x170/0x3f0 [ 61.875295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.875334] kthread+0x328/0x630 [ 61.875360] ret_from_fork+0x10/0x20 [ 61.875392] [ 61.946073] Allocated by task 309: [ 61.949462] kasan_save_stack+0x3c/0x68 [ 61.953279] kasan_save_track+0x20/0x40 [ 61.957098] kasan_save_alloc_info+0x40/0x58 [ 61.961351] __kasan_kmalloc+0xd4/0xd8 [ 61.965084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.969598] kasan_atomics+0xb8/0x2e0 [ 61.973243] kunit_try_run_case+0x170/0x3f0 [ 61.977410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.982879] kthread+0x328/0x630 [ 61.986090] ret_from_fork+0x10/0x20 [ 61.989649] [ 61.991125] The buggy address belongs to the object at ffff000800c2e200 [ 61.991125] which belongs to the cache kmalloc-64 of size 64 [ 62.003452] The buggy address is located 0 bytes to the right of [ 62.003452] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.016298] [ 62.017774] The buggy address belongs to the physical page: [ 62.023330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.031317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.037826] page_type: f5(slab) [ 62.040958] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.048682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.056402] page dumped because: kasan: bad access detected [ 62.061957] [ 62.063432] Memory state around the buggy address: [ 62.068211] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.075416] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.082620] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.089821] ^ [ 62.094599] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.101804] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.109005] ================================================================== [ 60.005265] ================================================================== [ 60.012340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 60.019714] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.027005] [ 60.028485] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.028530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.028545] Hardware name: WinLink E850-96 board (DT) [ 60.028562] Call trace: [ 60.028575] show_stack+0x20/0x38 (C) [ 60.028609] dump_stack_lvl+0x8c/0xd0 [ 60.028644] print_report+0x118/0x608 [ 60.028680] kasan_report+0xdc/0x128 [ 60.028713] __asan_report_load8_noabort+0x20/0x30 [ 60.028746] kasan_atomics_helper+0x3f04/0x4858 [ 60.028781] kasan_atomics+0x198/0x2e0 [ 60.028811] kunit_try_run_case+0x170/0x3f0 [ 60.028846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.028885] kthread+0x328/0x630 [ 60.028913] ret_from_fork+0x10/0x20 [ 60.028943] [ 60.096275] Allocated by task 309: [ 60.099660] kasan_save_stack+0x3c/0x68 [ 60.103480] kasan_save_track+0x20/0x40 [ 60.107299] kasan_save_alloc_info+0x40/0x58 [ 60.111552] __kasan_kmalloc+0xd4/0xd8 [ 60.115285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.119799] kasan_atomics+0xb8/0x2e0 [ 60.123445] kunit_try_run_case+0x170/0x3f0 [ 60.127611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.133080] kthread+0x328/0x630 [ 60.136292] ret_from_fork+0x10/0x20 [ 60.139851] [ 60.141328] The buggy address belongs to the object at ffff000800c2e200 [ 60.141328] which belongs to the cache kmalloc-64 of size 64 [ 60.153654] The buggy address is located 0 bytes to the right of [ 60.153654] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.166499] [ 60.167976] The buggy address belongs to the physical page: [ 60.173531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.181517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.188027] page_type: f5(slab) [ 60.191160] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.198884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.206603] page dumped because: kasan: bad access detected [ 60.212160] [ 60.213634] Memory state around the buggy address: [ 60.218412] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.225617] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.232821] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.240023] ^ [ 60.244801] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.252005] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.259206] ================================================================== [ 48.391917] ================================================================== [ 48.398969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.406347] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.413725] [ 48.415207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.415256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.415272] Hardware name: WinLink E850-96 board (DT) [ 48.415292] Call trace: [ 48.415305] show_stack+0x20/0x38 (C) [ 48.415339] dump_stack_lvl+0x8c/0xd0 [ 48.415374] print_report+0x118/0x608 [ 48.415410] kasan_report+0xdc/0x128 [ 48.415443] __asan_report_store4_noabort+0x20/0x30 [ 48.415475] kasan_atomics_helper+0x3f94/0x4858 [ 48.415509] kasan_atomics+0x198/0x2e0 [ 48.415539] kunit_try_run_case+0x170/0x3f0 [ 48.415574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.415614] kthread+0x328/0x630 [ 48.415641] ret_from_fork+0x10/0x20 [ 48.415674] [ 48.483081] Allocated by task 309: [ 48.486468] kasan_save_stack+0x3c/0x68 [ 48.490286] kasan_save_track+0x20/0x40 [ 48.494106] kasan_save_alloc_info+0x40/0x58 [ 48.498359] __kasan_kmalloc+0xd4/0xd8 [ 48.502091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.506605] kasan_atomics+0xb8/0x2e0 [ 48.510251] kunit_try_run_case+0x170/0x3f0 [ 48.514418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.519886] kthread+0x328/0x630 [ 48.523098] ret_from_fork+0x10/0x20 [ 48.526657] [ 48.528133] The buggy address belongs to the object at ffff000800c2e200 [ 48.528133] which belongs to the cache kmalloc-64 of size 64 [ 48.540461] The buggy address is located 0 bytes to the right of [ 48.540461] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.553306] [ 48.554782] The buggy address belongs to the physical page: [ 48.560339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.568325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.574833] page_type: f5(slab) [ 48.577966] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.585690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.593410] page dumped because: kasan: bad access detected [ 48.598965] [ 48.600440] Memory state around the buggy address: [ 48.605218] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.612423] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.619630] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.626829] ^ [ 48.631607] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.638812] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.646013] ================================================================== [ 62.642405] ================================================================== [ 62.649453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.656827] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.664118] [ 62.665597] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.665647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.665664] Hardware name: WinLink E850-96 board (DT) [ 62.665681] Call trace: [ 62.665693] show_stack+0x20/0x38 (C) [ 62.665726] dump_stack_lvl+0x8c/0xd0 [ 62.665760] print_report+0x118/0x608 [ 62.665795] kasan_report+0xdc/0x128 [ 62.665827] __asan_report_load8_noabort+0x20/0x30 [ 62.665859] kasan_atomics_helper+0x3e10/0x4858 [ 62.665891] kasan_atomics+0x198/0x2e0 [ 62.665924] kunit_try_run_case+0x170/0x3f0 [ 62.665957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.665997] kthread+0x328/0x630 [ 62.666024] ret_from_fork+0x10/0x20 [ 62.666055] [ 62.733388] Allocated by task 309: [ 62.736777] kasan_save_stack+0x3c/0x68 [ 62.740593] kasan_save_track+0x20/0x40 [ 62.744412] kasan_save_alloc_info+0x40/0x58 [ 62.748666] __kasan_kmalloc+0xd4/0xd8 [ 62.752398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.756912] kasan_atomics+0xb8/0x2e0 [ 62.760558] kunit_try_run_case+0x170/0x3f0 [ 62.764724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.770193] kthread+0x328/0x630 [ 62.773405] ret_from_fork+0x10/0x20 [ 62.776964] [ 62.778440] The buggy address belongs to the object at ffff000800c2e200 [ 62.778440] which belongs to the cache kmalloc-64 of size 64 [ 62.790766] The buggy address is located 0 bytes to the right of [ 62.790766] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.803613] [ 62.805089] The buggy address belongs to the physical page: [ 62.810645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.818630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.825140] page_type: f5(slab) [ 62.828273] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.835997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.843716] page dumped because: kasan: bad access detected [ 62.849273] [ 62.850747] Memory state around the buggy address: [ 62.855525] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.862730] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.869935] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.877136] ^ [ 62.881914] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.889118] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.896320] ================================================================== [ 53.938347] ================================================================== [ 53.945415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.952791] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.960082] [ 53.961562] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.961610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.961625] Hardware name: WinLink E850-96 board (DT) [ 53.961643] Call trace: [ 53.961655] show_stack+0x20/0x38 (C) [ 53.961685] dump_stack_lvl+0x8c/0xd0 [ 53.961720] print_report+0x118/0x608 [ 53.961756] kasan_report+0xdc/0x128 [ 53.961789] __asan_report_load4_noabort+0x20/0x30 [ 53.961821] kasan_atomics_helper+0x3dbc/0x4858 [ 53.961854] kasan_atomics+0x198/0x2e0 [ 53.961886] kunit_try_run_case+0x170/0x3f0 [ 53.961919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.961957] kthread+0x328/0x630 [ 53.961984] ret_from_fork+0x10/0x20 [ 53.962015] [ 54.029352] Allocated by task 309: [ 54.032738] kasan_save_stack+0x3c/0x68 [ 54.036557] kasan_save_track+0x20/0x40 [ 54.040376] kasan_save_alloc_info+0x40/0x58 [ 54.044630] __kasan_kmalloc+0xd4/0xd8 [ 54.048362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.052876] kasan_atomics+0xb8/0x2e0 [ 54.056522] kunit_try_run_case+0x170/0x3f0 [ 54.060688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.066157] kthread+0x328/0x630 [ 54.069369] ret_from_fork+0x10/0x20 [ 54.072928] [ 54.074403] The buggy address belongs to the object at ffff000800c2e200 [ 54.074403] which belongs to the cache kmalloc-64 of size 64 [ 54.086730] The buggy address is located 0 bytes to the right of [ 54.086730] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.099577] [ 54.101052] The buggy address belongs to the physical page: [ 54.106609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.114594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.121104] page_type: f5(slab) [ 54.124237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.131961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.139680] page dumped because: kasan: bad access detected [ 54.145236] [ 54.146711] Memory state around the buggy address: [ 54.151489] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.158694] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.165899] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.173100] ^ [ 54.177878] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.185082] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.192284] ================================================================== [ 47.601600] ================================================================== [ 47.608707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.615996] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.623285] [ 47.624765] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.624814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.624831] Hardware name: WinLink E850-96 board (DT) [ 47.624853] Call trace: [ 47.624865] show_stack+0x20/0x38 (C) [ 47.624900] dump_stack_lvl+0x8c/0xd0 [ 47.624939] print_report+0x118/0x608 [ 47.624974] kasan_report+0xdc/0x128 [ 47.625007] kasan_check_range+0x100/0x1a8 [ 47.625044] __kasan_check_read+0x20/0x30 [ 47.625072] kasan_atomics_helper+0x2b0/0x4858 [ 47.625105] kasan_atomics+0x198/0x2e0 [ 47.625137] kunit_try_run_case+0x170/0x3f0 [ 47.625173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.625214] kthread+0x328/0x630 [ 47.625240] ret_from_fork+0x10/0x20 [ 47.625274] [ 47.695768] Allocated by task 309: [ 47.699152] kasan_save_stack+0x3c/0x68 [ 47.702972] kasan_save_track+0x20/0x40 [ 47.706791] kasan_save_alloc_info+0x40/0x58 [ 47.711044] __kasan_kmalloc+0xd4/0xd8 [ 47.714777] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.719291] kasan_atomics+0xb8/0x2e0 [ 47.722936] kunit_try_run_case+0x170/0x3f0 [ 47.727103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.732572] kthread+0x328/0x630 [ 47.735783] ret_from_fork+0x10/0x20 [ 47.739343] [ 47.740821] The buggy address belongs to the object at ffff000800c2e200 [ 47.740821] which belongs to the cache kmalloc-64 of size 64 [ 47.753145] The buggy address is located 0 bytes to the right of [ 47.753145] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 47.765991] [ 47.767469] The buggy address belongs to the physical page: [ 47.773023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 47.781010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.787520] page_type: f5(slab) [ 47.790653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.798375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.806095] page dumped because: kasan: bad access detected [ 47.811652] [ 47.813126] Memory state around the buggy address: [ 47.817907] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.825108] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.832317] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.839515] ^ [ 47.844292] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.851497] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.858698] ================================================================== [ 53.147897] ================================================================== [ 53.154975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.162265] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.169643] [ 53.171122] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.171170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.171187] Hardware name: WinLink E850-96 board (DT) [ 53.171205] Call trace: [ 53.171217] show_stack+0x20/0x38 (C) [ 53.171248] dump_stack_lvl+0x8c/0xd0 [ 53.171282] print_report+0x118/0x608 [ 53.171320] kasan_report+0xdc/0x128 [ 53.171352] kasan_check_range+0x100/0x1a8 [ 53.171386] __kasan_check_write+0x20/0x30 [ 53.171415] kasan_atomics_helper+0xad4/0x4858 [ 53.171450] kasan_atomics+0x198/0x2e0 [ 53.171481] kunit_try_run_case+0x170/0x3f0 [ 53.171513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.171553] kthread+0x328/0x630 [ 53.171579] ret_from_fork+0x10/0x20 [ 53.171611] [ 53.242211] Allocated by task 309: [ 53.245596] kasan_save_stack+0x3c/0x68 [ 53.249416] kasan_save_track+0x20/0x40 [ 53.253235] kasan_save_alloc_info+0x40/0x58 [ 53.257489] __kasan_kmalloc+0xd4/0xd8 [ 53.261221] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.265735] kasan_atomics+0xb8/0x2e0 [ 53.269381] kunit_try_run_case+0x170/0x3f0 [ 53.273548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.279016] kthread+0x328/0x630 [ 53.282228] ret_from_fork+0x10/0x20 [ 53.285787] [ 53.287263] The buggy address belongs to the object at ffff000800c2e200 [ 53.287263] which belongs to the cache kmalloc-64 of size 64 [ 53.299589] The buggy address is located 0 bytes to the right of [ 53.299589] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.312436] [ 53.313911] The buggy address belongs to the physical page: [ 53.319468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.327453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.333963] page_type: f5(slab) [ 53.337096] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.344821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.352539] page dumped because: kasan: bad access detected [ 53.358095] [ 53.359570] Memory state around the buggy address: [ 53.364348] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.371553] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.378758] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.385959] ^ [ 53.390737] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.397941] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.405143] ================================================================== [ 58.681481] ================================================================== [ 58.688575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.695949] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.703327] [ 58.704806] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.704855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.704872] Hardware name: WinLink E850-96 board (DT) [ 58.704889] Call trace: [ 58.704902] show_stack+0x20/0x38 (C) [ 58.704936] dump_stack_lvl+0x8c/0xd0 [ 58.704971] print_report+0x118/0x608 [ 58.705004] kasan_report+0xdc/0x128 [ 58.705036] kasan_check_range+0x100/0x1a8 [ 58.705071] __kasan_check_write+0x20/0x30 [ 58.705101] kasan_atomics_helper+0x1190/0x4858 [ 58.705134] kasan_atomics+0x198/0x2e0 [ 58.705165] kunit_try_run_case+0x170/0x3f0 [ 58.705197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.705237] kthread+0x328/0x630 [ 58.705264] ret_from_fork+0x10/0x20 [ 58.705295] [ 58.775982] Allocated by task 309: [ 58.779368] kasan_save_stack+0x3c/0x68 [ 58.783187] kasan_save_track+0x20/0x40 [ 58.787006] kasan_save_alloc_info+0x40/0x58 [ 58.791260] __kasan_kmalloc+0xd4/0xd8 [ 58.794992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.799506] kasan_atomics+0xb8/0x2e0 [ 58.803152] kunit_try_run_case+0x170/0x3f0 [ 58.807318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.812787] kthread+0x328/0x630 [ 58.815999] ret_from_fork+0x10/0x20 [ 58.819558] [ 58.821035] The buggy address belongs to the object at ffff000800c2e200 [ 58.821035] which belongs to the cache kmalloc-64 of size 64 [ 58.833360] The buggy address is located 0 bytes to the right of [ 58.833360] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.846207] [ 58.847683] The buggy address belongs to the physical page: [ 58.853239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.861224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.867734] page_type: f5(slab) [ 58.870867] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.878591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.886311] page dumped because: kasan: bad access detected [ 58.891867] [ 58.893341] Memory state around the buggy address: [ 58.898120] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.905324] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.912529] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.919730] ^ [ 58.924508] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.931713] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.938914] ================================================================== [ 46.542852] ================================================================== [ 46.556985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.564363] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 46.571651] [ 46.573141] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.573202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.573219] Hardware name: WinLink E850-96 board (DT) [ 46.573242] Call trace: [ 46.573257] show_stack+0x20/0x38 (C) [ 46.573296] dump_stack_lvl+0x8c/0xd0 [ 46.573333] print_report+0x118/0x608 [ 46.573370] kasan_report+0xdc/0x128 [ 46.573402] __asan_report_load4_noabort+0x20/0x30 [ 46.573436] kasan_atomics_helper+0x40a8/0x4858 [ 46.573472] kasan_atomics+0x198/0x2e0 [ 46.573504] kunit_try_run_case+0x170/0x3f0 [ 46.573541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.573582] kthread+0x328/0x630 [ 46.573611] ret_from_fork+0x10/0x20 [ 46.573650] [ 46.640923] Allocated by task 309: [ 46.644311] kasan_save_stack+0x3c/0x68 [ 46.648126] kasan_save_track+0x20/0x40 [ 46.651946] kasan_save_alloc_info+0x40/0x58 [ 46.656199] __kasan_kmalloc+0xd4/0xd8 [ 46.659932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.664445] kasan_atomics+0xb8/0x2e0 [ 46.668091] kunit_try_run_case+0x170/0x3f0 [ 46.672258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.677728] kthread+0x328/0x630 [ 46.680938] ret_from_fork+0x10/0x20 [ 46.684497] [ 46.685975] The buggy address belongs to the object at ffff000800c2e200 [ 46.685975] which belongs to the cache kmalloc-64 of size 64 [ 46.698301] The buggy address is located 0 bytes to the right of [ 46.698301] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 46.711146] [ 46.712624] The buggy address belongs to the physical page: [ 46.718181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 46.726168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.732675] page_type: f5(slab) [ 46.735812] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.743531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.751251] page dumped because: kasan: bad access detected [ 46.756807] [ 46.758281] Memory state around the buggy address: [ 46.763062] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.770263] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.777470] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.784669] ^ [ 46.789447] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.796652] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.803854] ================================================================== [ 50.769991] ================================================================== [ 50.777059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.784349] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 50.791727] [ 50.793207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 50.793254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.793271] Hardware name: WinLink E850-96 board (DT) [ 50.793290] Call trace: [ 50.793302] show_stack+0x20/0x38 (C) [ 50.793336] dump_stack_lvl+0x8c/0xd0 [ 50.793371] print_report+0x118/0x608 [ 50.793405] kasan_report+0xdc/0x128 [ 50.793438] kasan_check_range+0x100/0x1a8 [ 50.793473] __kasan_check_write+0x20/0x30 [ 50.793502] kasan_atomics_helper+0x6ec/0x4858 [ 50.793535] kasan_atomics+0x198/0x2e0 [ 50.793566] kunit_try_run_case+0x170/0x3f0 [ 50.793599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.793637] kthread+0x328/0x630 [ 50.793663] ret_from_fork+0x10/0x20 [ 50.793692] [ 50.864295] Allocated by task 309: [ 50.867681] kasan_save_stack+0x3c/0x68 [ 50.871500] kasan_save_track+0x20/0x40 [ 50.875320] kasan_save_alloc_info+0x40/0x58 [ 50.879573] __kasan_kmalloc+0xd4/0xd8 [ 50.883305] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.887819] kasan_atomics+0xb8/0x2e0 [ 50.891465] kunit_try_run_case+0x170/0x3f0 [ 50.895632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.901101] kthread+0x328/0x630 [ 50.904312] ret_from_fork+0x10/0x20 [ 50.907871] [ 50.909347] The buggy address belongs to the object at ffff000800c2e200 [ 50.909347] which belongs to the cache kmalloc-64 of size 64 [ 50.921673] The buggy address is located 0 bytes to the right of [ 50.921673] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.934520] [ 50.935996] The buggy address belongs to the physical page: [ 50.941552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.949538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.956047] page_type: f5(slab) [ 50.959180] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.966905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.974624] page dumped because: kasan: bad access detected [ 50.980179] [ 50.981655] Memory state around the buggy address: [ 50.986433] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.993638] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.000842] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.008043] ^ [ 51.012821] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.020026] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.027227] ================================================================== [ 56.041603] ================================================================== [ 56.048683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 56.056058] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.063349] [ 56.064829] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.064875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.064890] Hardware name: WinLink E850-96 board (DT) [ 56.064908] Call trace: [ 56.064920] show_stack+0x20/0x38 (C) [ 56.064952] dump_stack_lvl+0x8c/0xd0 [ 56.064987] print_report+0x118/0x608 [ 56.065021] kasan_report+0xdc/0x128 [ 56.065054] __asan_report_load8_noabort+0x20/0x30 [ 56.065086] kasan_atomics_helper+0x3f58/0x4858 [ 56.065120] kasan_atomics+0x198/0x2e0 [ 56.065151] kunit_try_run_case+0x170/0x3f0 [ 56.065185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.065223] kthread+0x328/0x630 [ 56.065248] ret_from_fork+0x10/0x20 [ 56.065279] [ 56.132619] Allocated by task 309: [ 56.136004] kasan_save_stack+0x3c/0x68 [ 56.139824] kasan_save_track+0x20/0x40 [ 56.143643] kasan_save_alloc_info+0x40/0x58 [ 56.147897] __kasan_kmalloc+0xd4/0xd8 [ 56.151629] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.156143] kasan_atomics+0xb8/0x2e0 [ 56.159789] kunit_try_run_case+0x170/0x3f0 [ 56.163956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.169424] kthread+0x328/0x630 [ 56.172636] ret_from_fork+0x10/0x20 [ 56.176195] [ 56.177671] The buggy address belongs to the object at ffff000800c2e200 [ 56.177671] which belongs to the cache kmalloc-64 of size 64 [ 56.189997] The buggy address is located 0 bytes to the right of [ 56.189997] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.202844] [ 56.204320] The buggy address belongs to the physical page: [ 56.209875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 56.217861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.224371] page_type: f5(slab) [ 56.227504] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.235229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.242948] page dumped because: kasan: bad access detected [ 56.248503] [ 56.249978] Memory state around the buggy address: [ 56.254756] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.261961] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.269166] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.276367] ^ [ 56.281145] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.288349] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.295551] ================================================================== [ 50.240898] ================================================================== [ 50.247900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.255190] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 50.262568] [ 50.264048] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 50.264095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.264113] Hardware name: WinLink E850-96 board (DT) [ 50.264129] Call trace: [ 50.264141] show_stack+0x20/0x38 (C) [ 50.264175] dump_stack_lvl+0x8c/0xd0 [ 50.264214] print_report+0x118/0x608 [ 50.264251] kasan_report+0xdc/0x128 [ 50.264284] kasan_check_range+0x100/0x1a8 [ 50.264318] __kasan_check_write+0x20/0x30 [ 50.264348] kasan_atomics_helper+0x61c/0x4858 [ 50.264380] kasan_atomics+0x198/0x2e0 [ 50.264410] kunit_try_run_case+0x170/0x3f0 [ 50.264443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.264483] kthread+0x328/0x630 [ 50.264511] ret_from_fork+0x10/0x20 [ 50.264541] [ 50.335137] Allocated by task 309: [ 50.338522] kasan_save_stack+0x3c/0x68 [ 50.342342] kasan_save_track+0x20/0x40 [ 50.346161] kasan_save_alloc_info+0x40/0x58 [ 50.350414] __kasan_kmalloc+0xd4/0xd8 [ 50.354147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.358661] kasan_atomics+0xb8/0x2e0 [ 50.362306] kunit_try_run_case+0x170/0x3f0 [ 50.366473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.371942] kthread+0x328/0x630 [ 50.375154] ret_from_fork+0x10/0x20 [ 50.378713] [ 50.380188] The buggy address belongs to the object at ffff000800c2e200 [ 50.380188] which belongs to the cache kmalloc-64 of size 64 [ 50.392515] The buggy address is located 0 bytes to the right of [ 50.392515] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.405361] [ 50.406838] The buggy address belongs to the physical page: [ 50.412393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.420378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.426889] page_type: f5(slab) [ 50.430023] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.437746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.445465] page dumped because: kasan: bad access detected [ 50.451021] [ 50.452496] Memory state around the buggy address: [ 50.457274] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.464479] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.471684] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.478884] ^ [ 50.483662] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.490867] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.498068] ================================================================== [ 59.211010] ================================================================== [ 59.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.225455] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 59.232833] [ 59.234314] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 59.234359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.234376] Hardware name: WinLink E850-96 board (DT) [ 59.234393] Call trace: [ 59.234404] show_stack+0x20/0x38 (C) [ 59.234438] dump_stack_lvl+0x8c/0xd0 [ 59.234473] print_report+0x118/0x608 [ 59.234510] kasan_report+0xdc/0x128 [ 59.234543] kasan_check_range+0x100/0x1a8 [ 59.234577] __kasan_check_write+0x20/0x30 [ 59.234609] kasan_atomics_helper+0x126c/0x4858 [ 59.234644] kasan_atomics+0x198/0x2e0 [ 59.234675] kunit_try_run_case+0x170/0x3f0 [ 59.234711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.234749] kthread+0x328/0x630 [ 59.234775] ret_from_fork+0x10/0x20 [ 59.234805] [ 59.305488] Allocated by task 309: [ 59.308875] kasan_save_stack+0x3c/0x68 [ 59.312693] kasan_save_track+0x20/0x40 [ 59.316513] kasan_save_alloc_info+0x40/0x58 [ 59.320766] __kasan_kmalloc+0xd4/0xd8 [ 59.324498] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.329012] kasan_atomics+0xb8/0x2e0 [ 59.332658] kunit_try_run_case+0x170/0x3f0 [ 59.336825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.342293] kthread+0x328/0x630 [ 59.345505] ret_from_fork+0x10/0x20 [ 59.349064] [ 59.350540] The buggy address belongs to the object at ffff000800c2e200 [ 59.350540] which belongs to the cache kmalloc-64 of size 64 [ 59.362866] The buggy address is located 0 bytes to the right of [ 59.362866] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.375713] [ 59.377188] The buggy address belongs to the physical page: [ 59.382745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.390730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.397240] page_type: f5(slab) [ 59.400373] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.408097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.415816] page dumped because: kasan: bad access detected [ 59.421373] [ 59.422847] Memory state around the buggy address: [ 59.427625] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.434830] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.442035] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.449236] ^ [ 59.454014] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.461218] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.468420] ================================================================== [ 62.377633] ================================================================== [ 62.384699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.392074] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.399452] [ 62.400934] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.400983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.401000] Hardware name: WinLink E850-96 board (DT) [ 62.401016] Call trace: [ 62.401027] show_stack+0x20/0x38 (C) [ 62.401062] dump_stack_lvl+0x8c/0xd0 [ 62.401097] print_report+0x118/0x608 [ 62.401133] kasan_report+0xdc/0x128 [ 62.401166] kasan_check_range+0x100/0x1a8 [ 62.401201] __kasan_check_write+0x20/0x30 [ 62.401229] kasan_atomics_helper+0x16d0/0x4858 [ 62.401262] kasan_atomics+0x198/0x2e0 [ 62.401294] kunit_try_run_case+0x170/0x3f0 [ 62.401326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.401365] kthread+0x328/0x630 [ 62.401392] ret_from_fork+0x10/0x20 [ 62.401425] [ 62.472107] Allocated by task 309: [ 62.475494] kasan_save_stack+0x3c/0x68 [ 62.479312] kasan_save_track+0x20/0x40 [ 62.483132] kasan_save_alloc_info+0x40/0x58 [ 62.487385] __kasan_kmalloc+0xd4/0xd8 [ 62.491118] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.495632] kasan_atomics+0xb8/0x2e0 [ 62.499277] kunit_try_run_case+0x170/0x3f0 [ 62.503444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.508912] kthread+0x328/0x630 [ 62.512124] ret_from_fork+0x10/0x20 [ 62.515683] [ 62.517160] The buggy address belongs to the object at ffff000800c2e200 [ 62.517160] which belongs to the cache kmalloc-64 of size 64 [ 62.529486] The buggy address is located 0 bytes to the right of [ 62.529486] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.542332] [ 62.543809] The buggy address belongs to the physical page: [ 62.549364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.557349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.563860] page_type: f5(slab) [ 62.566992] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.574717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.582435] page dumped because: kasan: bad access detected [ 62.587992] [ 62.589466] Memory state around the buggy address: [ 62.594245] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.601449] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.608654] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.615855] ^ [ 62.620633] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.627838] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.635039] ================================================================== [ 54.990081] ================================================================== [ 54.997135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 55.004511] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.011803] [ 55.013282] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.013330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.013346] Hardware name: WinLink E850-96 board (DT) [ 55.013367] Call trace: [ 55.013379] show_stack+0x20/0x38 (C) [ 55.013412] dump_stack_lvl+0x8c/0xd0 [ 55.013448] print_report+0x118/0x608 [ 55.013482] kasan_report+0xdc/0x128 [ 55.013515] __asan_report_load4_noabort+0x20/0x30 [ 55.013546] kasan_atomics_helper+0x3dd8/0x4858 [ 55.013580] kasan_atomics+0x198/0x2e0 [ 55.013611] kunit_try_run_case+0x170/0x3f0 [ 55.013646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.013684] kthread+0x328/0x630 [ 55.013711] ret_from_fork+0x10/0x20 [ 55.013743] [ 55.081072] Allocated by task 309: [ 55.084458] kasan_save_stack+0x3c/0x68 [ 55.088277] kasan_save_track+0x20/0x40 [ 55.092097] kasan_save_alloc_info+0x40/0x58 [ 55.096350] __kasan_kmalloc+0xd4/0xd8 [ 55.100083] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.104596] kasan_atomics+0xb8/0x2e0 [ 55.108242] kunit_try_run_case+0x170/0x3f0 [ 55.112409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.117877] kthread+0x328/0x630 [ 55.121089] ret_from_fork+0x10/0x20 [ 55.124648] [ 55.126124] The buggy address belongs to the object at ffff000800c2e200 [ 55.126124] which belongs to the cache kmalloc-64 of size 64 [ 55.138450] The buggy address is located 0 bytes to the right of [ 55.138450] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.151297] [ 55.152773] The buggy address belongs to the physical page: [ 55.158329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.166314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.172825] page_type: f5(slab) [ 55.175957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.183682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.191400] page dumped because: kasan: bad access detected [ 55.196956] [ 55.198432] Memory state around the buggy address: [ 55.203209] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.210414] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.217619] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.224820] ^ [ 55.229598] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.236803] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.244004] ================================================================== [ 59.740516] ================================================================== [ 59.747587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.754961] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 59.762339] [ 59.763819] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 59.763863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.763881] Hardware name: WinLink E850-96 board (DT) [ 59.763898] Call trace: [ 59.763910] show_stack+0x20/0x38 (C) [ 59.763945] dump_stack_lvl+0x8c/0xd0 [ 59.763980] print_report+0x118/0x608 [ 59.764018] kasan_report+0xdc/0x128 [ 59.764049] kasan_check_range+0x100/0x1a8 [ 59.764083] __kasan_check_write+0x20/0x30 [ 59.764114] kasan_atomics_helper+0x1384/0x4858 [ 59.764148] kasan_atomics+0x198/0x2e0 [ 59.764180] kunit_try_run_case+0x170/0x3f0 [ 59.764214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.764253] kthread+0x328/0x630 [ 59.764281] ret_from_fork+0x10/0x20 [ 59.764312] [ 59.834994] Allocated by task 309: [ 59.838380] kasan_save_stack+0x3c/0x68 [ 59.842199] kasan_save_track+0x20/0x40 [ 59.846018] kasan_save_alloc_info+0x40/0x58 [ 59.850272] __kasan_kmalloc+0xd4/0xd8 [ 59.854004] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.858518] kasan_atomics+0xb8/0x2e0 [ 59.862164] kunit_try_run_case+0x170/0x3f0 [ 59.866331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.871799] kthread+0x328/0x630 [ 59.875011] ret_from_fork+0x10/0x20 [ 59.878570] [ 59.880047] The buggy address belongs to the object at ffff000800c2e200 [ 59.880047] which belongs to the cache kmalloc-64 of size 64 [ 59.892372] The buggy address is located 0 bytes to the right of [ 59.892372] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.905219] [ 59.906696] The buggy address belongs to the physical page: [ 59.912251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.920236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.926746] page_type: f5(slab) [ 59.929879] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.937604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.945322] page dumped because: kasan: bad access detected [ 59.950879] [ 59.952353] Memory state around the buggy address: [ 59.957131] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.964336] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.971541] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.978742] ^ [ 59.983520] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.990724] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.997925] ================================================================== [ 49.711690] ================================================================== [ 49.718742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.726032] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.733410] [ 49.734889] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.734938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.734956] Hardware name: WinLink E850-96 board (DT) [ 49.734973] Call trace: [ 49.734985] show_stack+0x20/0x38 (C) [ 49.735020] dump_stack_lvl+0x8c/0xd0 [ 49.735056] print_report+0x118/0x608 [ 49.735093] kasan_report+0xdc/0x128 [ 49.735126] kasan_check_range+0x100/0x1a8 [ 49.735161] __kasan_check_write+0x20/0x30 [ 49.735190] kasan_atomics_helper+0x54c/0x4858 [ 49.735225] kasan_atomics+0x198/0x2e0 [ 49.735257] kunit_try_run_case+0x170/0x3f0 [ 49.735289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.735327] kthread+0x328/0x630 [ 49.735354] ret_from_fork+0x10/0x20 [ 49.735384] [ 49.805978] Allocated by task 309: [ 49.809364] kasan_save_stack+0x3c/0x68 [ 49.813183] kasan_save_track+0x20/0x40 [ 49.817002] kasan_save_alloc_info+0x40/0x58 [ 49.821255] __kasan_kmalloc+0xd4/0xd8 [ 49.824988] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.829502] kasan_atomics+0xb8/0x2e0 [ 49.833148] kunit_try_run_case+0x170/0x3f0 [ 49.837314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.842783] kthread+0x328/0x630 [ 49.845995] ret_from_fork+0x10/0x20 [ 49.849554] [ 49.851029] The buggy address belongs to the object at ffff000800c2e200 [ 49.851029] which belongs to the cache kmalloc-64 of size 64 [ 49.863356] The buggy address is located 0 bytes to the right of [ 49.863356] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.876203] [ 49.877679] The buggy address belongs to the physical page: [ 49.883234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.891220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.897730] page_type: f5(slab) [ 49.900863] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.908587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.916306] page dumped because: kasan: bad access detected [ 49.921861] [ 49.923337] Memory state around the buggy address: [ 49.928115] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.935320] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.942525] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.949726] ^ [ 49.954503] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.961709] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.968910] ================================================================== [ 60.531331] ================================================================== [ 60.538375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.545748] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.553126] [ 60.554605] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.554652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.554668] Hardware name: WinLink E850-96 board (DT) [ 60.554686] Call trace: [ 60.554699] show_stack+0x20/0x38 (C) [ 60.554733] dump_stack_lvl+0x8c/0xd0 [ 60.554767] print_report+0x118/0x608 [ 60.554803] kasan_report+0xdc/0x128 [ 60.554835] kasan_check_range+0x100/0x1a8 [ 60.554871] __kasan_check_write+0x20/0x30 [ 60.554899] kasan_atomics_helper+0x147c/0x4858 [ 60.554934] kasan_atomics+0x198/0x2e0 [ 60.554966] kunit_try_run_case+0x170/0x3f0 [ 60.554999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.555038] kthread+0x328/0x630 [ 60.555066] ret_from_fork+0x10/0x20 [ 60.555098] [ 60.625781] Allocated by task 309: [ 60.629168] kasan_save_stack+0x3c/0x68 [ 60.632986] kasan_save_track+0x20/0x40 [ 60.636805] kasan_save_alloc_info+0x40/0x58 [ 60.641058] __kasan_kmalloc+0xd4/0xd8 [ 60.644791] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.649305] kasan_atomics+0xb8/0x2e0 [ 60.652951] kunit_try_run_case+0x170/0x3f0 [ 60.657117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.662586] kthread+0x328/0x630 [ 60.665798] ret_from_fork+0x10/0x20 [ 60.669357] [ 60.670832] The buggy address belongs to the object at ffff000800c2e200 [ 60.670832] which belongs to the cache kmalloc-64 of size 64 [ 60.683159] The buggy address is located 0 bytes to the right of [ 60.683159] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.696006] [ 60.697482] The buggy address belongs to the physical page: [ 60.703037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.711023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.717533] page_type: f5(slab) [ 60.720666] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.728390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.736109] page dumped because: kasan: bad access detected [ 60.741666] [ 60.743140] Memory state around the buggy address: [ 60.747920] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.755123] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.762328] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.769528] ^ [ 60.774307] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.781511] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.788713] ================================================================== [ 48.653380] ================================================================== [ 48.660426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.667714] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.675092] [ 48.676573] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.676620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.676636] Hardware name: WinLink E850-96 board (DT) [ 48.676656] Call trace: [ 48.676670] show_stack+0x20/0x38 (C) [ 48.676701] dump_stack_lvl+0x8c/0xd0 [ 48.676737] print_report+0x118/0x608 [ 48.676772] kasan_report+0xdc/0x128 [ 48.676805] kasan_check_range+0x100/0x1a8 [ 48.676843] __kasan_check_write+0x20/0x30 [ 48.676872] kasan_atomics_helper+0x3ac/0x4858 [ 48.676904] kasan_atomics+0x198/0x2e0 [ 48.676935] kunit_try_run_case+0x170/0x3f0 [ 48.676968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.677007] kthread+0x328/0x630 [ 48.677035] ret_from_fork+0x10/0x20 [ 48.677066] [ 48.747661] Allocated by task 309: [ 48.751046] kasan_save_stack+0x3c/0x68 [ 48.754866] kasan_save_track+0x20/0x40 [ 48.758685] kasan_save_alloc_info+0x40/0x58 [ 48.762938] __kasan_kmalloc+0xd4/0xd8 [ 48.766671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.771185] kasan_atomics+0xb8/0x2e0 [ 48.774830] kunit_try_run_case+0x170/0x3f0 [ 48.778997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.784466] kthread+0x328/0x630 [ 48.787677] ret_from_fork+0x10/0x20 [ 48.791236] [ 48.792712] The buggy address belongs to the object at ffff000800c2e200 [ 48.792712] which belongs to the cache kmalloc-64 of size 64 [ 48.805039] The buggy address is located 0 bytes to the right of [ 48.805039] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.817885] [ 48.819361] The buggy address belongs to the physical page: [ 48.824917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.832903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.839413] page_type: f5(slab) [ 48.842546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.850270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.857989] page dumped because: kasan: bad access detected [ 48.863544] [ 48.865020] Memory state around the buggy address: [ 48.869798] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.877002] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.884209] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.891408] ^ [ 48.896186] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.903391] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.910592] ================================================================== [ 50.505432] ================================================================== [ 50.512480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.519770] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 50.527147] [ 50.528629] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 50.528674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.528690] Hardware name: WinLink E850-96 board (DT) [ 50.528708] Call trace: [ 50.528720] show_stack+0x20/0x38 (C) [ 50.528753] dump_stack_lvl+0x8c/0xd0 [ 50.528788] print_report+0x118/0x608 [ 50.528821] kasan_report+0xdc/0x128 [ 50.528854] kasan_check_range+0x100/0x1a8 [ 50.528891] __kasan_check_write+0x20/0x30 [ 50.528922] kasan_atomics_helper+0x684/0x4858 [ 50.528957] kasan_atomics+0x198/0x2e0 [ 50.528987] kunit_try_run_case+0x170/0x3f0 [ 50.529020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.529058] kthread+0x328/0x630 [ 50.529084] ret_from_fork+0x10/0x20 [ 50.529114] [ 50.599716] Allocated by task 309: [ 50.603101] kasan_save_stack+0x3c/0x68 [ 50.606921] kasan_save_track+0x20/0x40 [ 50.610740] kasan_save_alloc_info+0x40/0x58 [ 50.614994] __kasan_kmalloc+0xd4/0xd8 [ 50.618726] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.623240] kasan_atomics+0xb8/0x2e0 [ 50.626886] kunit_try_run_case+0x170/0x3f0 [ 50.631053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.636521] kthread+0x328/0x630 [ 50.639733] ret_from_fork+0x10/0x20 [ 50.643292] [ 50.644767] The buggy address belongs to the object at ffff000800c2e200 [ 50.644767] which belongs to the cache kmalloc-64 of size 64 [ 50.657094] The buggy address is located 0 bytes to the right of [ 50.657094] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.669941] [ 50.671416] The buggy address belongs to the physical page: [ 50.676973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.684958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.691468] page_type: f5(slab) [ 50.694601] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.702325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.710044] page dumped because: kasan: bad access detected [ 50.715599] [ 50.717075] Memory state around the buggy address: [ 50.721853] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.729058] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.736263] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.743464] ^ [ 50.748242] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.755447] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.762648] ================================================================== [ 52.354168] ================================================================== [ 52.361237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.368527] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.375905] [ 52.377384] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.377430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.377445] Hardware name: WinLink E850-96 board (DT) [ 52.377463] Call trace: [ 52.377475] show_stack+0x20/0x38 (C) [ 52.377507] dump_stack_lvl+0x8c/0xd0 [ 52.377542] print_report+0x118/0x608 [ 52.377576] kasan_report+0xdc/0x128 [ 52.377609] kasan_check_range+0x100/0x1a8 [ 52.377642] __kasan_check_write+0x20/0x30 [ 52.377671] kasan_atomics_helper+0x99c/0x4858 [ 52.377704] kasan_atomics+0x198/0x2e0 [ 52.377735] kunit_try_run_case+0x170/0x3f0 [ 52.377769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.377806] kthread+0x328/0x630 [ 52.377833] ret_from_fork+0x10/0x20 [ 52.377864] [ 52.448473] Allocated by task 309: [ 52.451859] kasan_save_stack+0x3c/0x68 [ 52.455678] kasan_save_track+0x20/0x40 [ 52.459497] kasan_save_alloc_info+0x40/0x58 [ 52.463751] __kasan_kmalloc+0xd4/0xd8 [ 52.467483] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.471997] kasan_atomics+0xb8/0x2e0 [ 52.475643] kunit_try_run_case+0x170/0x3f0 [ 52.479809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.485278] kthread+0x328/0x630 [ 52.488490] ret_from_fork+0x10/0x20 [ 52.492049] [ 52.493524] The buggy address belongs to the object at ffff000800c2e200 [ 52.493524] which belongs to the cache kmalloc-64 of size 64 [ 52.505851] The buggy address is located 0 bytes to the right of [ 52.505851] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 52.518698] [ 52.520174] The buggy address belongs to the physical page: [ 52.525729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.533715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.540225] page_type: f5(slab) [ 52.543358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.551082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.558801] page dumped because: kasan: bad access detected [ 52.564357] [ 52.565832] Memory state around the buggy address: [ 52.570610] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.577815] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.585020] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.592221] ^ [ 52.596999] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.604204] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.611405] ================================================================== [ 53.412507] ================================================================== [ 53.419556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.426931] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.434222] [ 53.435702] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.435749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.435766] Hardware name: WinLink E850-96 board (DT) [ 53.435784] Call trace: [ 53.435796] show_stack+0x20/0x38 (C) [ 53.435830] dump_stack_lvl+0x8c/0xd0 [ 53.435865] print_report+0x118/0x608 [ 53.435896] kasan_report+0xdc/0x128 [ 53.435930] __asan_report_load4_noabort+0x20/0x30 [ 53.435961] kasan_atomics_helper+0x3dcc/0x4858 [ 53.435996] kasan_atomics+0x198/0x2e0 [ 53.436027] kunit_try_run_case+0x170/0x3f0 [ 53.436062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.436100] kthread+0x328/0x630 [ 53.436129] ret_from_fork+0x10/0x20 [ 53.436161] [ 53.503492] Allocated by task 309: [ 53.506878] kasan_save_stack+0x3c/0x68 [ 53.510697] kasan_save_track+0x20/0x40 [ 53.514516] kasan_save_alloc_info+0x40/0x58 [ 53.518770] __kasan_kmalloc+0xd4/0xd8 [ 53.522502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.527016] kasan_atomics+0xb8/0x2e0 [ 53.530662] kunit_try_run_case+0x170/0x3f0 [ 53.534828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.540297] kthread+0x328/0x630 [ 53.543509] ret_from_fork+0x10/0x20 [ 53.547068] [ 53.548543] The buggy address belongs to the object at ffff000800c2e200 [ 53.548543] which belongs to the cache kmalloc-64 of size 64 [ 53.560870] The buggy address is located 0 bytes to the right of [ 53.560870] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.573717] [ 53.575192] The buggy address belongs to the physical page: [ 53.580748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.588734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.595244] page_type: f5(slab) [ 53.598377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.606101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.613820] page dumped because: kasan: bad access detected [ 53.619376] [ 53.620851] Memory state around the buggy address: [ 53.625629] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.632834] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.640039] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.647240] ^ [ 53.652018] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.659222] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.666423] ================================================================== [ 55.251322] ================================================================== [ 55.258416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.265706] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.273083] [ 55.274563] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.274611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.274628] Hardware name: WinLink E850-96 board (DT) [ 55.274648] Call trace: [ 55.274661] show_stack+0x20/0x38 (C) [ 55.274693] dump_stack_lvl+0x8c/0xd0 [ 55.274728] print_report+0x118/0x608 [ 55.274762] kasan_report+0xdc/0x128 [ 55.274796] kasan_check_range+0x100/0x1a8 [ 55.274832] __kasan_check_write+0x20/0x30 [ 55.274861] kasan_atomics_helper+0xd3c/0x4858 [ 55.274895] kasan_atomics+0x198/0x2e0 [ 55.274927] kunit_try_run_case+0x170/0x3f0 [ 55.274960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.274998] kthread+0x328/0x630 [ 55.275024] ret_from_fork+0x10/0x20 [ 55.275058] [ 55.345652] Allocated by task 309: [ 55.349038] kasan_save_stack+0x3c/0x68 [ 55.352857] kasan_save_track+0x20/0x40 [ 55.356676] kasan_save_alloc_info+0x40/0x58 [ 55.360929] __kasan_kmalloc+0xd4/0xd8 [ 55.364662] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.369176] kasan_atomics+0xb8/0x2e0 [ 55.372822] kunit_try_run_case+0x170/0x3f0 [ 55.376988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.382457] kthread+0x328/0x630 [ 55.385669] ret_from_fork+0x10/0x20 [ 55.389227] [ 55.390703] The buggy address belongs to the object at ffff000800c2e200 [ 55.390703] which belongs to the cache kmalloc-64 of size 64 [ 55.403030] The buggy address is located 0 bytes to the right of [ 55.403030] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.415877] [ 55.417353] The buggy address belongs to the physical page: [ 55.422908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.430894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.437404] page_type: f5(slab) [ 55.440536] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.448261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.455980] page dumped because: kasan: bad access detected [ 55.461535] [ 55.463011] Memory state around the buggy address: [ 55.467789] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.474994] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.482199] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.489399] ^ [ 55.494177] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.501382] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.508583] ================================================================== [ 52.883344] ================================================================== [ 52.890397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.897685] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.905064] [ 52.906543] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.906590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.906604] Hardware name: WinLink E850-96 board (DT) [ 52.906624] Call trace: [ 52.906634] show_stack+0x20/0x38 (C) [ 52.906668] dump_stack_lvl+0x8c/0xd0 [ 52.906701] print_report+0x118/0x608 [ 52.906738] kasan_report+0xdc/0x128 [ 52.906771] kasan_check_range+0x100/0x1a8 [ 52.906805] __kasan_check_write+0x20/0x30 [ 52.906834] kasan_atomics_helper+0xa6c/0x4858 [ 52.906867] kasan_atomics+0x198/0x2e0 [ 52.906900] kunit_try_run_case+0x170/0x3f0 [ 52.906932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.906971] kthread+0x328/0x630 [ 52.906998] ret_from_fork+0x10/0x20 [ 52.907029] [ 52.977632] Allocated by task 309: [ 52.981017] kasan_save_stack+0x3c/0x68 [ 52.984837] kasan_save_track+0x20/0x40 [ 52.988656] kasan_save_alloc_info+0x40/0x58 [ 52.992910] __kasan_kmalloc+0xd4/0xd8 [ 52.996642] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.001156] kasan_atomics+0xb8/0x2e0 [ 53.004802] kunit_try_run_case+0x170/0x3f0 [ 53.008968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.014437] kthread+0x328/0x630 [ 53.017648] ret_from_fork+0x10/0x20 [ 53.021208] [ 53.022683] The buggy address belongs to the object at ffff000800c2e200 [ 53.022683] which belongs to the cache kmalloc-64 of size 64 [ 53.035010] The buggy address is located 0 bytes to the right of [ 53.035010] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.047856] [ 53.049332] The buggy address belongs to the physical page: [ 53.054888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.062874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.069384] page_type: f5(slab) [ 53.072517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.080241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.087960] page dumped because: kasan: bad access detected [ 53.093515] [ 53.094991] Memory state around the buggy address: [ 53.099769] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.106974] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.114178] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.121380] ^ [ 53.126157] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.133363] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.140564] ================================================================== [ 47.337022] ================================================================== [ 47.344127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.351414] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.358793] [ 47.360274] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.360327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.360345] Hardware name: WinLink E850-96 board (DT) [ 47.360365] Call trace: [ 47.360377] show_stack+0x20/0x38 (C) [ 47.360412] dump_stack_lvl+0x8c/0xd0 [ 47.360450] print_report+0x118/0x608 [ 47.360487] kasan_report+0xdc/0x128 [ 47.360522] kasan_check_range+0x100/0x1a8 [ 47.360559] __kasan_check_write+0x20/0x30 [ 47.360587] kasan_atomics_helper+0x24c/0x4858 [ 47.360624] kasan_atomics+0x198/0x2e0 [ 47.360654] kunit_try_run_case+0x170/0x3f0 [ 47.360691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.360731] kthread+0x328/0x630 [ 47.360759] ret_from_fork+0x10/0x20 [ 47.360792] [ 47.431361] Allocated by task 309: [ 47.434748] kasan_save_stack+0x3c/0x68 [ 47.438567] kasan_save_track+0x20/0x40 [ 47.442385] kasan_save_alloc_info+0x40/0x58 [ 47.446638] __kasan_kmalloc+0xd4/0xd8 [ 47.450371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.454885] kasan_atomics+0xb8/0x2e0 [ 47.458531] kunit_try_run_case+0x170/0x3f0 [ 47.462697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.468166] kthread+0x328/0x630 [ 47.471378] ret_from_fork+0x10/0x20 [ 47.474937] [ 47.476415] The buggy address belongs to the object at ffff000800c2e200 [ 47.476415] which belongs to the cache kmalloc-64 of size 64 [ 47.488740] The buggy address is located 0 bytes to the right of [ 47.488740] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 47.501585] [ 47.503063] The buggy address belongs to the physical page: [ 47.508617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 47.516604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.523114] page_type: f5(slab) [ 47.526248] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.533970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.541689] page dumped because: kasan: bad access detected [ 47.547246] [ 47.548720] Memory state around the buggy address: [ 47.553500] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.560703] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.567909] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.575109] ^ [ 47.579887] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.587091] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.594292] ================================================================== [ 46.811247] ================================================================== [ 46.818268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.825641] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 46.833019] [ 46.834505] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.834561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.834576] Hardware name: WinLink E850-96 board (DT) [ 46.834598] Call trace: [ 46.834612] show_stack+0x20/0x38 (C) [ 46.834646] dump_stack_lvl+0x8c/0xd0 [ 46.834685] print_report+0x118/0x608 [ 46.834720] kasan_report+0xdc/0x128 [ 46.834752] __asan_report_store4_noabort+0x20/0x30 [ 46.834785] kasan_atomics_helper+0x3f7c/0x4858 [ 46.834818] kasan_atomics+0x198/0x2e0 [ 46.834849] kunit_try_run_case+0x170/0x3f0 [ 46.834886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.834926] kthread+0x328/0x630 [ 46.834959] ret_from_fork+0x10/0x20 [ 46.834992] [ 46.902376] Allocated by task 309: [ 46.905763] kasan_save_stack+0x3c/0x68 [ 46.909580] kasan_save_track+0x20/0x40 [ 46.913400] kasan_save_alloc_info+0x40/0x58 [ 46.917653] __kasan_kmalloc+0xd4/0xd8 [ 46.921386] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.925900] kasan_atomics+0xb8/0x2e0 [ 46.929545] kunit_try_run_case+0x170/0x3f0 [ 46.933712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.939181] kthread+0x328/0x630 [ 46.942393] ret_from_fork+0x10/0x20 [ 46.945951] [ 46.947430] The buggy address belongs to the object at ffff000800c2e200 [ 46.947430] which belongs to the cache kmalloc-64 of size 64 [ 46.959755] The buggy address is located 0 bytes to the right of [ 46.959755] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 46.972600] [ 46.974078] The buggy address belongs to the physical page: [ 46.979634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 46.987621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.994129] page_type: f5(slab) [ 46.997263] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.004985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.012704] page dumped because: kasan: bad access detected [ 47.018260] [ 47.019735] Memory state around the buggy address: [ 47.024515] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.031718] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.038924] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.046124] ^ [ 47.050901] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.058106] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.065307] ================================================================== [ 48.127288] ================================================================== [ 48.134393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.141680] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.149058] [ 48.150541] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.150593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.150610] Hardware name: WinLink E850-96 board (DT) [ 48.150631] Call trace: [ 48.150644] show_stack+0x20/0x38 (C) [ 48.150680] dump_stack_lvl+0x8c/0xd0 [ 48.150717] print_report+0x118/0x608 [ 48.150753] kasan_report+0xdc/0x128 [ 48.150785] kasan_check_range+0x100/0x1a8 [ 48.150822] __kasan_check_write+0x20/0x30 [ 48.150851] kasan_atomics_helper+0x32c/0x4858 [ 48.150886] kasan_atomics+0x198/0x2e0 [ 48.150917] kunit_try_run_case+0x170/0x3f0 [ 48.150952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.150990] kthread+0x328/0x630 [ 48.151018] ret_from_fork+0x10/0x20 [ 48.151050] [ 48.221627] Allocated by task 309: [ 48.225012] kasan_save_stack+0x3c/0x68 [ 48.228832] kasan_save_track+0x20/0x40 [ 48.232651] kasan_save_alloc_info+0x40/0x58 [ 48.236904] __kasan_kmalloc+0xd4/0xd8 [ 48.240637] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.245151] kasan_atomics+0xb8/0x2e0 [ 48.248797] kunit_try_run_case+0x170/0x3f0 [ 48.252963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.258432] kthread+0x328/0x630 [ 48.261643] ret_from_fork+0x10/0x20 [ 48.265202] [ 48.266679] The buggy address belongs to the object at ffff000800c2e200 [ 48.266679] which belongs to the cache kmalloc-64 of size 64 [ 48.279005] The buggy address is located 0 bytes to the right of [ 48.279005] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.291851] [ 48.293329] The buggy address belongs to the physical page: [ 48.298884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.306870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.313379] page_type: f5(slab) [ 48.316513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.324236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.331955] page dumped because: kasan: bad access detected [ 48.337512] [ 48.338986] Memory state around the buggy address: [ 48.343767] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.350969] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.358175] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.365375] ^ [ 48.370152] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.377357] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.384559] ================================================================== [ 55.515923] ================================================================== [ 55.522995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.530371] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.537663] [ 55.539142] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.539191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.539207] Hardware name: WinLink E850-96 board (DT) [ 55.539228] Call trace: [ 55.539240] show_stack+0x20/0x38 (C) [ 55.539271] dump_stack_lvl+0x8c/0xd0 [ 55.539304] print_report+0x118/0x608 [ 55.539338] kasan_report+0xdc/0x128 [ 55.539369] __asan_report_load4_noabort+0x20/0x30 [ 55.539400] kasan_atomics_helper+0x3e04/0x4858 [ 55.539435] kasan_atomics+0x198/0x2e0 [ 55.539467] kunit_try_run_case+0x170/0x3f0 [ 55.539501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.539538] kthread+0x328/0x630 [ 55.539565] ret_from_fork+0x10/0x20 [ 55.539596] [ 55.606933] Allocated by task 309: [ 55.610319] kasan_save_stack+0x3c/0x68 [ 55.614138] kasan_save_track+0x20/0x40 [ 55.617957] kasan_save_alloc_info+0x40/0x58 [ 55.622210] __kasan_kmalloc+0xd4/0xd8 [ 55.625943] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.630457] kasan_atomics+0xb8/0x2e0 [ 55.634102] kunit_try_run_case+0x170/0x3f0 [ 55.638269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.643738] kthread+0x328/0x630 [ 55.646949] ret_from_fork+0x10/0x20 [ 55.650509] [ 55.651984] The buggy address belongs to the object at ffff000800c2e200 [ 55.651984] which belongs to the cache kmalloc-64 of size 64 [ 55.664311] The buggy address is located 0 bytes to the right of [ 55.664311] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.677157] [ 55.678633] The buggy address belongs to the physical page: [ 55.684189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.692174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.698684] page_type: f5(slab) [ 55.701817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.709542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.717261] page dumped because: kasan: bad access detected [ 55.722816] [ 55.724292] Memory state around the buggy address: [ 55.729070] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.736275] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.743479] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.750680] ^ [ 55.755458] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.762663] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.769864] ================================================================== [ 63.429675] ================================================================== [ 63.436768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.444141] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 63.451520] [ 63.452999] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.453047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.453064] Hardware name: WinLink E850-96 board (DT) [ 63.453082] Call trace: [ 63.453096] show_stack+0x20/0x38 (C) [ 63.453127] dump_stack_lvl+0x8c/0xd0 [ 63.453166] print_report+0x118/0x608 [ 63.453200] kasan_report+0xdc/0x128 [ 63.453234] kasan_check_range+0x100/0x1a8 [ 63.453268] __kasan_check_write+0x20/0x30 [ 63.453299] kasan_atomics_helper+0x17ec/0x4858 [ 63.453333] kasan_atomics+0x198/0x2e0 [ 63.453365] kunit_try_run_case+0x170/0x3f0 [ 63.453396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.453437] kthread+0x328/0x630 [ 63.453464] ret_from_fork+0x10/0x20 [ 63.453497] [ 63.524175] Allocated by task 309: [ 63.527560] kasan_save_stack+0x3c/0x68 [ 63.531380] kasan_save_track+0x20/0x40 [ 63.535199] kasan_save_alloc_info+0x40/0x58 [ 63.539452] __kasan_kmalloc+0xd4/0xd8 [ 63.543185] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.547699] kasan_atomics+0xb8/0x2e0 [ 63.551345] kunit_try_run_case+0x170/0x3f0 [ 63.555511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.560980] kthread+0x328/0x630 [ 63.564192] ret_from_fork+0x10/0x20 [ 63.567751] [ 63.569226] The buggy address belongs to the object at ffff000800c2e200 [ 63.569226] which belongs to the cache kmalloc-64 of size 64 [ 63.581553] The buggy address is located 0 bytes to the right of [ 63.581553] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 63.594399] [ 63.595875] The buggy address belongs to the physical page: [ 63.601431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 63.609416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.615927] page_type: f5(slab) [ 63.619060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.626784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.634503] page dumped because: kasan: bad access detected [ 63.640060] [ 63.641534] Memory state around the buggy address: [ 63.646314] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.653517] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.660722] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.667923] ^ [ 63.672701] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.679905] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.687107] ================================================================== [ 60.266528] ================================================================== [ 60.273621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.280995] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.288373] [ 60.289852] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.289899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.289915] Hardware name: WinLink E850-96 board (DT) [ 60.289934] Call trace: [ 60.289946] show_stack+0x20/0x38 (C) [ 60.289979] dump_stack_lvl+0x8c/0xd0 [ 60.290012] print_report+0x118/0x608 [ 60.290048] kasan_report+0xdc/0x128 [ 60.290080] kasan_check_range+0x100/0x1a8 [ 60.290114] __kasan_check_write+0x20/0x30 [ 60.290143] kasan_atomics_helper+0x1414/0x4858 [ 60.290177] kasan_atomics+0x198/0x2e0 [ 60.290207] kunit_try_run_case+0x170/0x3f0 [ 60.290240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.290279] kthread+0x328/0x630 [ 60.290306] ret_from_fork+0x10/0x20 [ 60.290336] [ 60.361028] Allocated by task 309: [ 60.364414] kasan_save_stack+0x3c/0x68 [ 60.368233] kasan_save_track+0x20/0x40 [ 60.372052] kasan_save_alloc_info+0x40/0x58 [ 60.376306] __kasan_kmalloc+0xd4/0xd8 [ 60.380038] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.384552] kasan_atomics+0xb8/0x2e0 [ 60.388198] kunit_try_run_case+0x170/0x3f0 [ 60.392364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.397833] kthread+0x328/0x630 [ 60.401044] ret_from_fork+0x10/0x20 [ 60.404604] [ 60.406080] The buggy address belongs to the object at ffff000800c2e200 [ 60.406080] which belongs to the cache kmalloc-64 of size 64 [ 60.418406] The buggy address is located 0 bytes to the right of [ 60.418406] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.431252] [ 60.432729] The buggy address belongs to the physical page: [ 60.438284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.446270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.452780] page_type: f5(slab) [ 60.455913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.463637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.471356] page dumped because: kasan: bad access detected [ 60.476913] [ 60.478387] Memory state around the buggy address: [ 60.483165] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.490370] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.497574] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.504776] ^ [ 60.509554] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.516759] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.523959] ================================================================== [ 56.828929] ================================================================== [ 56.835998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.843286] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.850664] [ 56.852143] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.852190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.852206] Hardware name: WinLink E850-96 board (DT) [ 56.852223] Call trace: [ 56.852235] show_stack+0x20/0x38 (C) [ 56.852265] dump_stack_lvl+0x8c/0xd0 [ 56.852301] print_report+0x118/0x608 [ 56.852334] kasan_report+0xdc/0x128 [ 56.852369] kasan_check_range+0x100/0x1a8 [ 56.852405] __kasan_check_write+0x20/0x30 [ 56.852435] kasan_atomics_helper+0xeb8/0x4858 [ 56.852468] kasan_atomics+0x198/0x2e0 [ 56.852499] kunit_try_run_case+0x170/0x3f0 [ 56.852532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.852570] kthread+0x328/0x630 [ 56.852596] ret_from_fork+0x10/0x20 [ 56.852627] [ 56.923232] Allocated by task 309: [ 56.926618] kasan_save_stack+0x3c/0x68 [ 56.930437] kasan_save_track+0x20/0x40 [ 56.934257] kasan_save_alloc_info+0x40/0x58 [ 56.938510] __kasan_kmalloc+0xd4/0xd8 [ 56.942242] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.946756] kasan_atomics+0xb8/0x2e0 [ 56.950402] kunit_try_run_case+0x170/0x3f0 [ 56.954568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.960037] kthread+0x328/0x630 [ 56.963249] ret_from_fork+0x10/0x20 [ 56.966808] [ 56.968284] The buggy address belongs to the object at ffff000800c2e200 [ 56.968284] which belongs to the cache kmalloc-64 of size 64 [ 56.980610] The buggy address is located 0 bytes to the right of [ 56.980610] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.993457] [ 56.994933] The buggy address belongs to the physical page: [ 57.000488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.008474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.014984] page_type: f5(slab) [ 57.018117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.025842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.033561] page dumped because: kasan: bad access detected [ 57.039116] [ 57.040591] Memory state around the buggy address: [ 57.045369] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.052574] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.059779] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.066980] ^ [ 57.071758] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.078963] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.086164] ================================================================== [ 53.673738] ================================================================== [ 53.680836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.688125] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.695503] [ 53.696982] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.697030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.697047] Hardware name: WinLink E850-96 board (DT) [ 53.697065] Call trace: [ 53.697079] show_stack+0x20/0x38 (C) [ 53.697109] dump_stack_lvl+0x8c/0xd0 [ 53.697143] print_report+0x118/0x608 [ 53.697177] kasan_report+0xdc/0x128 [ 53.697212] kasan_check_range+0x100/0x1a8 [ 53.697247] __kasan_check_write+0x20/0x30 [ 53.697277] kasan_atomics_helper+0xb70/0x4858 [ 53.697311] kasan_atomics+0x198/0x2e0 [ 53.697344] kunit_try_run_case+0x170/0x3f0 [ 53.697377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.697414] kthread+0x328/0x630 [ 53.697440] ret_from_fork+0x10/0x20 [ 53.697471] [ 53.768071] Allocated by task 309: [ 53.771457] kasan_save_stack+0x3c/0x68 [ 53.775276] kasan_save_track+0x20/0x40 [ 53.779096] kasan_save_alloc_info+0x40/0x58 [ 53.783349] __kasan_kmalloc+0xd4/0xd8 [ 53.787082] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.791595] kasan_atomics+0xb8/0x2e0 [ 53.795241] kunit_try_run_case+0x170/0x3f0 [ 53.799408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.804876] kthread+0x328/0x630 [ 53.808088] ret_from_fork+0x10/0x20 [ 53.811647] [ 53.813123] The buggy address belongs to the object at ffff000800c2e200 [ 53.813123] which belongs to the cache kmalloc-64 of size 64 [ 53.825449] The buggy address is located 0 bytes to the right of [ 53.825449] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.838296] [ 53.839772] The buggy address belongs to the physical page: [ 53.845328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.853313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.859823] page_type: f5(slab) [ 53.862956] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.870681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.878400] page dumped because: kasan: bad access detected [ 53.883955] [ 53.885430] Memory state around the buggy address: [ 53.890208] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.897413] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.904618] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.911819] ^ [ 53.916597] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.923802] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.931003] ================================================================== [ 61.325569] ================================================================== [ 61.332632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.340007] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.347385] [ 61.348864] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.348918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.348933] Hardware name: WinLink E850-96 board (DT) [ 61.348951] Call trace: [ 61.348964] show_stack+0x20/0x38 (C) [ 61.348998] dump_stack_lvl+0x8c/0xd0 [ 61.349033] print_report+0x118/0x608 [ 61.349069] kasan_report+0xdc/0x128 [ 61.349101] kasan_check_range+0x100/0x1a8 [ 61.349135] __kasan_check_write+0x20/0x30 [ 61.349164] kasan_atomics_helper+0x15b4/0x4858 [ 61.349197] kasan_atomics+0x198/0x2e0 [ 61.349229] kunit_try_run_case+0x170/0x3f0 [ 61.349263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.349304] kthread+0x328/0x630 [ 61.349332] ret_from_fork+0x10/0x20 [ 61.349363] [ 61.420040] Allocated by task 309: [ 61.423427] kasan_save_stack+0x3c/0x68 [ 61.427245] kasan_save_track+0x20/0x40 [ 61.431064] kasan_save_alloc_info+0x40/0x58 [ 61.435317] __kasan_kmalloc+0xd4/0xd8 [ 61.439050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.443564] kasan_atomics+0xb8/0x2e0 [ 61.447209] kunit_try_run_case+0x170/0x3f0 [ 61.451376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.456845] kthread+0x328/0x630 [ 61.460056] ret_from_fork+0x10/0x20 [ 61.463615] [ 61.465091] The buggy address belongs to the object at ffff000800c2e200 [ 61.465091] which belongs to the cache kmalloc-64 of size 64 [ 61.477418] The buggy address is located 0 bytes to the right of [ 61.477418] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 61.490264] [ 61.491740] The buggy address belongs to the physical page: [ 61.497296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 61.505282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.511792] page_type: f5(slab) [ 61.514925] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.522649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.530368] page dumped because: kasan: bad access detected [ 61.535923] [ 61.537399] Memory state around the buggy address: [ 61.542177] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.549381] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.556586] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.563788] ^ [ 61.568566] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.575770] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.582972] ================================================================== [ 51.299168] ================================================================== [ 51.306217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.313507] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.320886] [ 51.322365] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.322412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.322427] Hardware name: WinLink E850-96 board (DT) [ 51.322443] Call trace: [ 51.322456] show_stack+0x20/0x38 (C) [ 51.322492] dump_stack_lvl+0x8c/0xd0 [ 51.322527] print_report+0x118/0x608 [ 51.322562] kasan_report+0xdc/0x128 [ 51.322593] kasan_check_range+0x100/0x1a8 [ 51.322632] __kasan_check_write+0x20/0x30 [ 51.322661] kasan_atomics_helper+0x7cc/0x4858 [ 51.322694] kasan_atomics+0x198/0x2e0 [ 51.322725] kunit_try_run_case+0x170/0x3f0 [ 51.322757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.322795] kthread+0x328/0x630 [ 51.322823] ret_from_fork+0x10/0x20 [ 51.322852] [ 51.393454] Allocated by task 309: [ 51.396840] kasan_save_stack+0x3c/0x68 [ 51.400659] kasan_save_track+0x20/0x40 [ 51.404478] kasan_save_alloc_info+0x40/0x58 [ 51.408732] __kasan_kmalloc+0xd4/0xd8 [ 51.412464] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.416978] kasan_atomics+0xb8/0x2e0 [ 51.420624] kunit_try_run_case+0x170/0x3f0 [ 51.424791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.430259] kthread+0x328/0x630 [ 51.433471] ret_from_fork+0x10/0x20 [ 51.437030] [ 51.438505] The buggy address belongs to the object at ffff000800c2e200 [ 51.438505] which belongs to the cache kmalloc-64 of size 64 [ 51.450832] The buggy address is located 0 bytes to the right of [ 51.450832] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.463679] [ 51.465155] The buggy address belongs to the physical page: [ 51.470711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 51.478696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.485206] page_type: f5(slab) [ 51.488339] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.496063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.503783] page dumped because: kasan: bad access detected [ 51.509338] [ 51.510813] Memory state around the buggy address: [ 51.515591] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.522796] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.530001] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.537202] ^ [ 51.541980] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.549185] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.556386] ================================================================== [ 61.590316] ================================================================== [ 61.597384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.604760] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.612051] [ 61.613532] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.613579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.613596] Hardware name: WinLink E850-96 board (DT) [ 61.613615] Call trace: [ 61.613627] show_stack+0x20/0x38 (C) [ 61.613660] dump_stack_lvl+0x8c/0xd0 [ 61.613695] print_report+0x118/0x608 [ 61.613729] kasan_report+0xdc/0x128 [ 61.613761] __asan_report_load8_noabort+0x20/0x30 [ 61.613792] kasan_atomics_helper+0x3db0/0x4858 [ 61.613828] kasan_atomics+0x198/0x2e0 [ 61.613859] kunit_try_run_case+0x170/0x3f0 [ 61.613896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.613932] kthread+0x328/0x630 [ 61.613958] ret_from_fork+0x10/0x20 [ 61.613991] [ 61.681320] Allocated by task 309: [ 61.684706] kasan_save_stack+0x3c/0x68 [ 61.688525] kasan_save_track+0x20/0x40 [ 61.692345] kasan_save_alloc_info+0x40/0x58 [ 61.696598] __kasan_kmalloc+0xd4/0xd8 [ 61.700331] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.704845] kasan_atomics+0xb8/0x2e0 [ 61.708490] kunit_try_run_case+0x170/0x3f0 [ 61.712657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.718126] kthread+0x328/0x630 [ 61.721337] ret_from_fork+0x10/0x20 [ 61.724896] [ 61.726372] The buggy address belongs to the object at ffff000800c2e200 [ 61.726372] which belongs to the cache kmalloc-64 of size 64 [ 61.738698] The buggy address is located 0 bytes to the right of [ 61.738698] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 61.751545] [ 61.753021] The buggy address belongs to the physical page: [ 61.758577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 61.766563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.773072] page_type: f5(slab) [ 61.776205] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.783930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.791649] page dumped because: kasan: bad access detected [ 61.797204] [ 61.798680] Memory state around the buggy address: [ 61.803458] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.810663] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.817867] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.825068] ^ [ 61.829846] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.837051] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.844252] ================================================================== [ 55.777199] ================================================================== [ 55.784277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.791565] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.798857] [ 55.800336] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.800382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.800396] Hardware name: WinLink E850-96 board (DT) [ 55.800416] Call trace: [ 55.800430] show_stack+0x20/0x38 (C) [ 55.800462] dump_stack_lvl+0x8c/0xd0 [ 55.800497] print_report+0x118/0x608 [ 55.800532] kasan_report+0xdc/0x128 [ 55.800565] kasan_check_range+0x100/0x1a8 [ 55.800601] __kasan_check_read+0x20/0x30 [ 55.800630] kasan_atomics_helper+0xdd4/0x4858 [ 55.800664] kasan_atomics+0x198/0x2e0 [ 55.800695] kunit_try_run_case+0x170/0x3f0 [ 55.800730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.800767] kthread+0x328/0x630 [ 55.800795] ret_from_fork+0x10/0x20 [ 55.800827] [ 55.871338] Allocated by task 309: [ 55.874724] kasan_save_stack+0x3c/0x68 [ 55.878543] kasan_save_track+0x20/0x40 [ 55.882363] kasan_save_alloc_info+0x40/0x58 [ 55.886616] __kasan_kmalloc+0xd4/0xd8 [ 55.890348] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.894862] kasan_atomics+0xb8/0x2e0 [ 55.898508] kunit_try_run_case+0x170/0x3f0 [ 55.902675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.908143] kthread+0x328/0x630 [ 55.911355] ret_from_fork+0x10/0x20 [ 55.914914] [ 55.916389] The buggy address belongs to the object at ffff000800c2e200 [ 55.916389] which belongs to the cache kmalloc-64 of size 64 [ 55.928717] The buggy address is located 0 bytes to the right of [ 55.928717] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.941563] [ 55.943039] The buggy address belongs to the physical page: [ 55.948595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.956580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.963091] page_type: f5(slab) [ 55.966223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.973947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.981667] page dumped because: kasan: bad access detected [ 55.987222] [ 55.988697] Memory state around the buggy address: [ 55.993475] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.000681] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.007885] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.015086] ^ [ 56.019864] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.027069] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.034270] ================================================================== [ 47.072642] ================================================================== [ 47.079724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 47.087009] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.094300] [ 47.095784] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.095837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.095859] Hardware name: WinLink E850-96 board (DT) [ 47.095880] Call trace: [ 47.095893] show_stack+0x20/0x38 (C) [ 47.095929] dump_stack_lvl+0x8c/0xd0 [ 47.095964] print_report+0x118/0x608 [ 47.096002] kasan_report+0xdc/0x128 [ 47.096034] kasan_check_range+0x100/0x1a8 [ 47.096071] __kasan_check_read+0x20/0x30 [ 47.096101] kasan_atomics_helper+0x1ec/0x4858 [ 47.096134] kasan_atomics+0x198/0x2e0 [ 47.096166] kunit_try_run_case+0x170/0x3f0 [ 47.096205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.096242] kthread+0x328/0x630 [ 47.096273] ret_from_fork+0x10/0x20 [ 47.096306] [ 47.166781] Allocated by task 309: [ 47.170168] kasan_save_stack+0x3c/0x68 [ 47.173986] kasan_save_track+0x20/0x40 [ 47.177806] kasan_save_alloc_info+0x40/0x58 [ 47.182059] __kasan_kmalloc+0xd4/0xd8 [ 47.185792] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.190306] kasan_atomics+0xb8/0x2e0 [ 47.193951] kunit_try_run_case+0x170/0x3f0 [ 47.198118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.203586] kthread+0x328/0x630 [ 47.206799] ret_from_fork+0x10/0x20 [ 47.210357] [ 47.211836] The buggy address belongs to the object at ffff000800c2e200 [ 47.211836] which belongs to the cache kmalloc-64 of size 64 [ 47.224162] The buggy address is located 0 bytes to the right of [ 47.224162] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 47.237006] [ 47.238483] The buggy address belongs to the physical page: [ 47.244041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 47.252027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.258535] page_type: f5(slab) [ 47.261670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.269391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.277111] page dumped because: kasan: bad access detected [ 47.282666] [ 47.284141] Memory state around the buggy address: [ 47.288922] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.296123] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.303330] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.310530] ^ [ 47.315307] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.322512] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.329713] ================================================================== [ 57.093478] ================================================================== [ 57.100576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 57.107865] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.115243] [ 57.116723] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.116769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.116786] Hardware name: WinLink E850-96 board (DT) [ 57.116803] Call trace: [ 57.116815] show_stack+0x20/0x38 (C) [ 57.116846] dump_stack_lvl+0x8c/0xd0 [ 57.116882] print_report+0x118/0x608 [ 57.116916] kasan_report+0xdc/0x128 [ 57.116947] kasan_check_range+0x100/0x1a8 [ 57.116981] __kasan_check_write+0x20/0x30 [ 57.117011] kasan_atomics_helper+0xf20/0x4858 [ 57.117044] kasan_atomics+0x198/0x2e0 [ 57.117075] kunit_try_run_case+0x170/0x3f0 [ 57.117109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.117150] kthread+0x328/0x630 [ 57.117176] ret_from_fork+0x10/0x20 [ 57.117206] [ 57.187812] Allocated by task 309: [ 57.191199] kasan_save_stack+0x3c/0x68 [ 57.195017] kasan_save_track+0x20/0x40 [ 57.198836] kasan_save_alloc_info+0x40/0x58 [ 57.203089] __kasan_kmalloc+0xd4/0xd8 [ 57.206822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.211336] kasan_atomics+0xb8/0x2e0 [ 57.214981] kunit_try_run_case+0x170/0x3f0 [ 57.219148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.224617] kthread+0x328/0x630 [ 57.227828] ret_from_fork+0x10/0x20 [ 57.231388] [ 57.232863] The buggy address belongs to the object at ffff000800c2e200 [ 57.232863] which belongs to the cache kmalloc-64 of size 64 [ 57.245190] The buggy address is located 0 bytes to the right of [ 57.245190] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 57.258036] [ 57.259512] The buggy address belongs to the physical page: [ 57.265068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.273054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.279564] page_type: f5(slab) [ 57.282697] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.290421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.298140] page dumped because: kasan: bad access detected [ 57.303695] [ 57.305170] Memory state around the buggy address: [ 57.309949] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.317153] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.324359] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.331560] ^ [ 57.336338] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.343542] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.350743] ================================================================== [ 58.416751] ================================================================== [ 58.423821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.431197] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.438574] [ 58.440057] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.440104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.440121] Hardware name: WinLink E850-96 board (DT) [ 58.440138] Call trace: [ 58.440151] show_stack+0x20/0x38 (C) [ 58.440181] dump_stack_lvl+0x8c/0xd0 [ 58.440216] print_report+0x118/0x608 [ 58.440251] kasan_report+0xdc/0x128 [ 58.440283] kasan_check_range+0x100/0x1a8 [ 58.440319] __kasan_check_write+0x20/0x30 [ 58.440350] kasan_atomics_helper+0x1128/0x4858 [ 58.440383] kasan_atomics+0x198/0x2e0 [ 58.440413] kunit_try_run_case+0x170/0x3f0 [ 58.440447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.440485] kthread+0x328/0x630 [ 58.440511] ret_from_fork+0x10/0x20 [ 58.440544] [ 58.511229] Allocated by task 309: [ 58.514615] kasan_save_stack+0x3c/0x68 [ 58.518434] kasan_save_track+0x20/0x40 [ 58.522254] kasan_save_alloc_info+0x40/0x58 [ 58.526507] __kasan_kmalloc+0xd4/0xd8 [ 58.530239] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.534753] kasan_atomics+0xb8/0x2e0 [ 58.538399] kunit_try_run_case+0x170/0x3f0 [ 58.542566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.548034] kthread+0x328/0x630 [ 58.551246] ret_from_fork+0x10/0x20 [ 58.554805] [ 58.556282] The buggy address belongs to the object at ffff000800c2e200 [ 58.556282] which belongs to the cache kmalloc-64 of size 64 [ 58.568608] The buggy address is located 0 bytes to the right of [ 58.568608] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.581454] [ 58.582930] The buggy address belongs to the physical page: [ 58.588486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.596471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.602982] page_type: f5(slab) [ 58.606115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.613838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.621558] page dumped because: kasan: bad access detected [ 58.627114] [ 58.628588] Memory state around the buggy address: [ 58.633367] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.640571] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.647776] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.654977] ^ [ 58.659755] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.666959] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.674161] ================================================================== [ 58.151989] ================================================================== [ 58.159067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.166443] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.173821] [ 58.175301] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.175347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.175363] Hardware name: WinLink E850-96 board (DT) [ 58.175378] Call trace: [ 58.175392] show_stack+0x20/0x38 (C) [ 58.175424] dump_stack_lvl+0x8c/0xd0 [ 58.175458] print_report+0x118/0x608 [ 58.175496] kasan_report+0xdc/0x128 [ 58.175527] kasan_check_range+0x100/0x1a8 [ 58.175562] __kasan_check_write+0x20/0x30 [ 58.175593] kasan_atomics_helper+0x10c0/0x4858 [ 58.175626] kasan_atomics+0x198/0x2e0 [ 58.175657] kunit_try_run_case+0x170/0x3f0 [ 58.175691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.175729] kthread+0x328/0x630 [ 58.175759] ret_from_fork+0x10/0x20 [ 58.175789] [ 58.246476] Allocated by task 309: [ 58.249862] kasan_save_stack+0x3c/0x68 [ 58.253681] kasan_save_track+0x20/0x40 [ 58.257501] kasan_save_alloc_info+0x40/0x58 [ 58.261754] __kasan_kmalloc+0xd4/0xd8 [ 58.265486] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.270000] kasan_atomics+0xb8/0x2e0 [ 58.273646] kunit_try_run_case+0x170/0x3f0 [ 58.277813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.283281] kthread+0x328/0x630 [ 58.286493] ret_from_fork+0x10/0x20 [ 58.290052] [ 58.291527] The buggy address belongs to the object at ffff000800c2e200 [ 58.291527] which belongs to the cache kmalloc-64 of size 64 [ 58.303854] The buggy address is located 0 bytes to the right of [ 58.303854] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.316701] [ 58.318177] The buggy address belongs to the physical page: [ 58.323733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.331718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.338229] page_type: f5(slab) [ 58.341361] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.349085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.356805] page dumped because: kasan: bad access detected [ 58.362360] [ 58.363836] Memory state around the buggy address: [ 58.368613] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.375818] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.383023] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.390224] ^ [ 58.395002] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.402207] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.409408] ================================================================== [ 62.903663] ================================================================== [ 62.910734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.918108] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.925486] [ 62.926965] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.927012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.927028] Hardware name: WinLink E850-96 board (DT) [ 62.927046] Call trace: [ 62.927060] show_stack+0x20/0x38 (C) [ 62.927092] dump_stack_lvl+0x8c/0xd0 [ 62.927128] print_report+0x118/0x608 [ 62.927162] kasan_report+0xdc/0x128 [ 62.927195] kasan_check_range+0x100/0x1a8 [ 62.927231] __kasan_check_write+0x20/0x30 [ 62.927262] kasan_atomics_helper+0x175c/0x4858 [ 62.927296] kasan_atomics+0x198/0x2e0 [ 62.927327] kunit_try_run_case+0x170/0x3f0 [ 62.927360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.927401] kthread+0x328/0x630 [ 62.927427] ret_from_fork+0x10/0x20 [ 62.927459] [ 62.998141] Allocated by task 309: [ 63.001528] kasan_save_stack+0x3c/0x68 [ 63.005346] kasan_save_track+0x20/0x40 [ 63.009166] kasan_save_alloc_info+0x40/0x58 [ 63.013418] __kasan_kmalloc+0xd4/0xd8 [ 63.017151] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.021665] kasan_atomics+0xb8/0x2e0 [ 63.025311] kunit_try_run_case+0x170/0x3f0 [ 63.029477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.034946] kthread+0x328/0x630 [ 63.038158] ret_from_fork+0x10/0x20 [ 63.041717] [ 63.043192] The buggy address belongs to the object at ffff000800c2e200 [ 63.043192] which belongs to the cache kmalloc-64 of size 64 [ 63.055519] The buggy address is located 0 bytes to the right of [ 63.055519] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 63.068366] [ 63.069842] The buggy address belongs to the physical page: [ 63.075397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 63.083383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.089893] page_type: f5(slab) [ 63.093026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.100750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.108469] page dumped because: kasan: bad access detected [ 63.114026] [ 63.115500] Memory state around the buggy address: [ 63.120278] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.127483] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.134688] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.141889] ^ [ 63.146667] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.153872] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.161072] ================================================================== [ 52.089568] ================================================================== [ 52.096659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 52.103947] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.111325] [ 52.112805] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.112853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.112868] Hardware name: WinLink E850-96 board (DT) [ 52.112886] Call trace: [ 52.112898] show_stack+0x20/0x38 (C) [ 52.112930] dump_stack_lvl+0x8c/0xd0 [ 52.112966] print_report+0x118/0x608 [ 52.113000] kasan_report+0xdc/0x128 [ 52.113032] kasan_check_range+0x100/0x1a8 [ 52.113066] __kasan_check_write+0x20/0x30 [ 52.113098] kasan_atomics_helper+0x934/0x4858 [ 52.113130] kasan_atomics+0x198/0x2e0 [ 52.113161] kunit_try_run_case+0x170/0x3f0 [ 52.113193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.113230] kthread+0x328/0x630 [ 52.113257] ret_from_fork+0x10/0x20 [ 52.113287] [ 52.183894] Allocated by task 309: [ 52.187279] kasan_save_stack+0x3c/0x68 [ 52.191099] kasan_save_track+0x20/0x40 [ 52.194918] kasan_save_alloc_info+0x40/0x58 [ 52.199171] __kasan_kmalloc+0xd4/0xd8 [ 52.202904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.207418] kasan_atomics+0xb8/0x2e0 [ 52.211064] kunit_try_run_case+0x170/0x3f0 [ 52.215230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.220699] kthread+0x328/0x630 [ 52.223910] ret_from_fork+0x10/0x20 [ 52.227470] [ 52.228945] The buggy address belongs to the object at ffff000800c2e200 [ 52.228945] which belongs to the cache kmalloc-64 of size 64 [ 52.241272] The buggy address is located 0 bytes to the right of [ 52.241272] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 52.254118] [ 52.255594] The buggy address belongs to the physical page: [ 52.261150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.269136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.275646] page_type: f5(slab) [ 52.278779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.286503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.294222] page dumped because: kasan: bad access detected [ 52.299777] [ 52.301253] Memory state around the buggy address: [ 52.306031] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.313236] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.320440] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.327641] ^ [ 52.332419] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.339624] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.346825] ================================================================== [ 57.887256] ================================================================== [ 57.894314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.901690] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.909070] [ 57.910548] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.910595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.910611] Hardware name: WinLink E850-96 board (DT) [ 57.910630] Call trace: [ 57.910643] show_stack+0x20/0x38 (C) [ 57.910674] dump_stack_lvl+0x8c/0xd0 [ 57.910709] print_report+0x118/0x608 [ 57.910742] kasan_report+0xdc/0x128 [ 57.910774] kasan_check_range+0x100/0x1a8 [ 57.910810] __kasan_check_write+0x20/0x30 [ 57.910840] kasan_atomics_helper+0x1058/0x4858 [ 57.910874] kasan_atomics+0x198/0x2e0 [ 57.910904] kunit_try_run_case+0x170/0x3f0 [ 57.910940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.910981] kthread+0x328/0x630 [ 57.911008] ret_from_fork+0x10/0x20 [ 57.911040] [ 57.981723] Allocated by task 309: [ 57.985109] kasan_save_stack+0x3c/0x68 [ 57.988928] kasan_save_track+0x20/0x40 [ 57.992748] kasan_save_alloc_info+0x40/0x58 [ 57.997001] __kasan_kmalloc+0xd4/0xd8 [ 58.000734] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.005247] kasan_atomics+0xb8/0x2e0 [ 58.008893] kunit_try_run_case+0x170/0x3f0 [ 58.013060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.018529] kthread+0x328/0x630 [ 58.021740] ret_from_fork+0x10/0x20 [ 58.025299] [ 58.026775] The buggy address belongs to the object at ffff000800c2e200 [ 58.026775] which belongs to the cache kmalloc-64 of size 64 [ 58.039101] The buggy address is located 0 bytes to the right of [ 58.039101] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.051948] [ 58.053424] The buggy address belongs to the physical page: [ 58.058980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.066965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.073475] page_type: f5(slab) [ 58.076608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.084333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.092051] page dumped because: kasan: bad access detected [ 58.097607] [ 58.099083] Memory state around the buggy address: [ 58.103860] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.111065] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.118270] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.125471] ^ [ 58.130249] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.137454] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.144655] ================================================================== [ 48.917915] ================================================================== [ 48.925003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.932293] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.939672] [ 48.941152] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.941200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.941217] Hardware name: WinLink E850-96 board (DT) [ 48.941237] Call trace: [ 48.941249] show_stack+0x20/0x38 (C) [ 48.941281] dump_stack_lvl+0x8c/0xd0 [ 48.941317] print_report+0x118/0x608 [ 48.941355] kasan_report+0xdc/0x128 [ 48.941387] kasan_check_range+0x100/0x1a8 [ 48.941423] __kasan_check_write+0x20/0x30 [ 48.941453] kasan_atomics_helper+0x414/0x4858 [ 48.941488] kasan_atomics+0x198/0x2e0 [ 48.941520] kunit_try_run_case+0x170/0x3f0 [ 48.941554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.941592] kthread+0x328/0x630 [ 48.941617] ret_from_fork+0x10/0x20 [ 48.941651] [ 49.012240] Allocated by task 309: [ 49.015625] kasan_save_stack+0x3c/0x68 [ 49.019445] kasan_save_track+0x20/0x40 [ 49.023264] kasan_save_alloc_info+0x40/0x58 [ 49.027518] __kasan_kmalloc+0xd4/0xd8 [ 49.031250] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.035764] kasan_atomics+0xb8/0x2e0 [ 49.039411] kunit_try_run_case+0x170/0x3f0 [ 49.043576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.049045] kthread+0x328/0x630 [ 49.052257] ret_from_fork+0x10/0x20 [ 49.055816] [ 49.057291] The buggy address belongs to the object at ffff000800c2e200 [ 49.057291] which belongs to the cache kmalloc-64 of size 64 [ 49.069618] The buggy address is located 0 bytes to the right of [ 49.069618] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.082465] [ 49.083941] The buggy address belongs to the physical page: [ 49.089496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.097482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.103992] page_type: f5(slab) [ 49.107125] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.114849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.122568] page dumped because: kasan: bad access detected [ 49.128124] [ 49.129599] Memory state around the buggy address: [ 49.134377] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.141582] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.148788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.155988] ^ [ 49.160765] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.167970] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.175171] ================================================================== [ 58.946286] ================================================================== [ 58.953327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.960702] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.968080] [ 58.969560] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.969604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.969619] Hardware name: WinLink E850-96 board (DT) [ 58.969637] Call trace: [ 58.969649] show_stack+0x20/0x38 (C) [ 58.969687] dump_stack_lvl+0x8c/0xd0 [ 58.969721] print_report+0x118/0x608 [ 58.969758] kasan_report+0xdc/0x128 [ 58.969792] kasan_check_range+0x100/0x1a8 [ 58.969826] __kasan_check_write+0x20/0x30 [ 58.969856] kasan_atomics_helper+0x11f8/0x4858 [ 58.969890] kasan_atomics+0x198/0x2e0 [ 58.969920] kunit_try_run_case+0x170/0x3f0 [ 58.969952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.969992] kthread+0x328/0x630 [ 58.970018] ret_from_fork+0x10/0x20 [ 58.970050] [ 59.040735] Allocated by task 309: [ 59.044121] kasan_save_stack+0x3c/0x68 [ 59.047940] kasan_save_track+0x20/0x40 [ 59.051759] kasan_save_alloc_info+0x40/0x58 [ 59.056013] __kasan_kmalloc+0xd4/0xd8 [ 59.059745] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.064259] kasan_atomics+0xb8/0x2e0 [ 59.067905] kunit_try_run_case+0x170/0x3f0 [ 59.072071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.077540] kthread+0x328/0x630 [ 59.080752] ret_from_fork+0x10/0x20 [ 59.084311] [ 59.085787] The buggy address belongs to the object at ffff000800c2e200 [ 59.085787] which belongs to the cache kmalloc-64 of size 64 [ 59.098113] The buggy address is located 0 bytes to the right of [ 59.098113] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.110959] [ 59.112436] The buggy address belongs to the physical page: [ 59.117992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.125977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.132487] page_type: f5(slab) [ 59.135620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.143345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.151064] page dumped because: kasan: bad access detected [ 59.156620] [ 59.158095] Memory state around the buggy address: [ 59.162872] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.170077] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.177284] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.184483] ^ [ 59.189261] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.196466] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.203667] ================================================================== [ 60.796057] ================================================================== [ 60.803126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.810501] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.817879] [ 60.819358] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.819404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.819422] Hardware name: WinLink E850-96 board (DT) [ 60.819438] Call trace: [ 60.819452] show_stack+0x20/0x38 (C) [ 60.819482] dump_stack_lvl+0x8c/0xd0 [ 60.819517] print_report+0x118/0x608 [ 60.819553] kasan_report+0xdc/0x128 [ 60.819586] kasan_check_range+0x100/0x1a8 [ 60.819619] __kasan_check_write+0x20/0x30 [ 60.819648] kasan_atomics_helper+0x14e4/0x4858 [ 60.819681] kasan_atomics+0x198/0x2e0 [ 60.819713] kunit_try_run_case+0x170/0x3f0 [ 60.819747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.819787] kthread+0x328/0x630 [ 60.819813] ret_from_fork+0x10/0x20 [ 60.819846] [ 60.890534] Allocated by task 309: [ 60.893921] kasan_save_stack+0x3c/0x68 [ 60.897739] kasan_save_track+0x20/0x40 [ 60.901558] kasan_save_alloc_info+0x40/0x58 [ 60.905812] __kasan_kmalloc+0xd4/0xd8 [ 60.909544] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.914058] kasan_atomics+0xb8/0x2e0 [ 60.917704] kunit_try_run_case+0x170/0x3f0 [ 60.921870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.927339] kthread+0x328/0x630 [ 60.930551] ret_from_fork+0x10/0x20 [ 60.934109] [ 60.935585] The buggy address belongs to the object at ffff000800c2e200 [ 60.935585] which belongs to the cache kmalloc-64 of size 64 [ 60.947911] The buggy address is located 0 bytes to the right of [ 60.947911] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.960758] [ 60.962236] The buggy address belongs to the physical page: [ 60.967790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.975776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.982286] page_type: f5(slab) [ 60.985419] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.993143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.000862] page dumped because: kasan: bad access detected [ 61.006419] [ 61.007893] Memory state around the buggy address: [ 61.012671] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.019875] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.027080] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.034282] ^ [ 61.039059] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.046264] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.053465] ================================================================== [ 61.060946] ================================================================== [ 61.067878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 61.075253] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.082632] [ 61.084113] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.084162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.084179] Hardware name: WinLink E850-96 board (DT) [ 61.084198] Call trace: [ 61.084210] show_stack+0x20/0x38 (C) [ 61.084240] dump_stack_lvl+0x8c/0xd0 [ 61.084275] print_report+0x118/0x608 [ 61.084307] kasan_report+0xdc/0x128 [ 61.084339] kasan_check_range+0x100/0x1a8 [ 61.084374] __kasan_check_write+0x20/0x30 [ 61.084403] kasan_atomics_helper+0x154c/0x4858 [ 61.084438] kasan_atomics+0x198/0x2e0 [ 61.084470] kunit_try_run_case+0x170/0x3f0 [ 61.084502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.084544] kthread+0x328/0x630 [ 61.084571] ret_from_fork+0x10/0x20 [ 61.084602] [ 61.155287] Allocated by task 309: [ 61.158675] kasan_save_stack+0x3c/0x68 [ 61.162492] kasan_save_track+0x20/0x40 [ 61.166311] kasan_save_alloc_info+0x40/0x58 [ 61.170564] __kasan_kmalloc+0xd4/0xd8 [ 61.174297] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.178811] kasan_atomics+0xb8/0x2e0 [ 61.182457] kunit_try_run_case+0x170/0x3f0 [ 61.186623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.192092] kthread+0x328/0x630 [ 61.195304] ret_from_fork+0x10/0x20 [ 61.198863] [ 61.200340] The buggy address belongs to the object at ffff000800c2e200 [ 61.200340] which belongs to the cache kmalloc-64 of size 64 [ 61.212665] The buggy address is located 0 bytes to the right of [ 61.212665] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 61.225511] [ 61.226989] The buggy address belongs to the physical page: [ 61.232544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 61.240529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.247039] page_type: f5(slab) [ 61.250172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.257896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.265615] page dumped because: kasan: bad access detected [ 61.271172] [ 61.272646] Memory state around the buggy address: [ 61.277424] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.284629] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.291834] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.299034] ^ [ 61.303813] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.311017] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.318219] ================================================================== [ 54.464222] ================================================================== [ 54.471276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.478651] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 54.485943] [ 54.487422] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 54.487470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.487488] Hardware name: WinLink E850-96 board (DT) [ 54.487506] Call trace: [ 54.487516] show_stack+0x20/0x38 (C) [ 54.487549] dump_stack_lvl+0x8c/0xd0 [ 54.487583] print_report+0x118/0x608 [ 54.487617] kasan_report+0xdc/0x128 [ 54.487650] __asan_report_load4_noabort+0x20/0x30 [ 54.487681] kasan_atomics_helper+0x3de4/0x4858 [ 54.487714] kasan_atomics+0x198/0x2e0 [ 54.487747] kunit_try_run_case+0x170/0x3f0 [ 54.487779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.487819] kthread+0x328/0x630 [ 54.487845] ret_from_fork+0x10/0x20 [ 54.487877] [ 54.555212] Allocated by task 309: [ 54.558598] kasan_save_stack+0x3c/0x68 [ 54.562417] kasan_save_track+0x20/0x40 [ 54.566237] kasan_save_alloc_info+0x40/0x58 [ 54.570490] __kasan_kmalloc+0xd4/0xd8 [ 54.574223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.578736] kasan_atomics+0xb8/0x2e0 [ 54.582382] kunit_try_run_case+0x170/0x3f0 [ 54.586549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.592017] kthread+0x328/0x630 [ 54.595229] ret_from_fork+0x10/0x20 [ 54.598788] [ 54.600263] The buggy address belongs to the object at ffff000800c2e200 [ 54.600263] which belongs to the cache kmalloc-64 of size 64 [ 54.612590] The buggy address is located 0 bytes to the right of [ 54.612590] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.625437] [ 54.626913] The buggy address belongs to the physical page: [ 54.632469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.640454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.646964] page_type: f5(slab) [ 54.650097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.657822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.665540] page dumped because: kasan: bad access detected [ 54.671096] [ 54.672571] Memory state around the buggy address: [ 54.677349] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.684554] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.691759] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.698960] ^ [ 54.703738] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.710943] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.718144] ================================================================== [ 49.976240] ================================================================== [ 49.983321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.990611] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.997989] [ 49.999469] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.999517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.999535] Hardware name: WinLink E850-96 board (DT) [ 49.999551] Call trace: [ 49.999563] show_stack+0x20/0x38 (C) [ 49.999596] dump_stack_lvl+0x8c/0xd0 [ 49.999632] print_report+0x118/0x608 [ 49.999666] kasan_report+0xdc/0x128 [ 49.999701] kasan_check_range+0x100/0x1a8 [ 49.999736] __kasan_check_write+0x20/0x30 [ 49.999766] kasan_atomics_helper+0x5b4/0x4858 [ 49.999800] kasan_atomics+0x198/0x2e0 [ 49.999831] kunit_try_run_case+0x170/0x3f0 [ 49.999865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.999904] kthread+0x328/0x630 [ 49.999930] ret_from_fork+0x10/0x20 [ 49.999963] [ 50.070557] Allocated by task 309: [ 50.073943] kasan_save_stack+0x3c/0x68 [ 50.077762] kasan_save_track+0x20/0x40 [ 50.081581] kasan_save_alloc_info+0x40/0x58 [ 50.085835] __kasan_kmalloc+0xd4/0xd8 [ 50.089567] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.094081] kasan_atomics+0xb8/0x2e0 [ 50.097727] kunit_try_run_case+0x170/0x3f0 [ 50.101894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.107362] kthread+0x328/0x630 [ 50.110574] ret_from_fork+0x10/0x20 [ 50.114133] [ 50.115609] The buggy address belongs to the object at ffff000800c2e200 [ 50.115609] which belongs to the cache kmalloc-64 of size 64 [ 50.127936] The buggy address is located 0 bytes to the right of [ 50.127936] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.140782] [ 50.142258] The buggy address belongs to the physical page: [ 50.147814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.155800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.162310] page_type: f5(slab) [ 50.165442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.173167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.180886] page dumped because: kasan: bad access detected [ 50.186441] [ 50.187917] Memory state around the buggy address: [ 50.192695] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.199899] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.207104] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.214305] ^ [ 50.219083] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.226288] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.233489] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 46.265200] ================================================================== [ 46.272267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.281205] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 46.288496] [ 46.289977] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.290025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.290040] Hardware name: WinLink E850-96 board (DT) [ 46.290058] Call trace: [ 46.290072] show_stack+0x20/0x38 (C) [ 46.290105] dump_stack_lvl+0x8c/0xd0 [ 46.290141] print_report+0x118/0x608 [ 46.290177] kasan_report+0xdc/0x128 [ 46.290210] __asan_report_load8_noabort+0x20/0x30 [ 46.290244] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.290281] kasan_bitops_generic+0x11c/0x1c8 [ 46.290315] kunit_try_run_case+0x170/0x3f0 [ 46.290350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.290390] kthread+0x328/0x630 [ 46.290417] ret_from_fork+0x10/0x20 [ 46.290447] [ 46.359936] Allocated by task 305: [ 46.363322] kasan_save_stack+0x3c/0x68 [ 46.367141] kasan_save_track+0x20/0x40 [ 46.370960] kasan_save_alloc_info+0x40/0x58 [ 46.375214] __kasan_kmalloc+0xd4/0xd8 [ 46.378946] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.383460] kasan_bitops_generic+0xa0/0x1c8 [ 46.387713] kunit_try_run_case+0x170/0x3f0 [ 46.391880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.397349] kthread+0x328/0x630 [ 46.400561] ret_from_fork+0x10/0x20 [ 46.404120] [ 46.405595] The buggy address belongs to the object at ffff00080444cc20 [ 46.405595] which belongs to the cache kmalloc-16 of size 16 [ 46.417922] The buggy address is located 8 bytes inside of [ 46.417922] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 46.430161] [ 46.431636] The buggy address belongs to the physical page: [ 46.437192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 46.445178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.451688] page_type: f5(slab) [ 46.454821] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.462546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.470264] page dumped because: kasan: bad access detected [ 46.475819] [ 46.477295] Memory state around the buggy address: [ 46.482073] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.489278] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 46.496483] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.503684] ^ [ 46.508201] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.515406] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.522607] ================================================================== [ 44.934513] ================================================================== [ 44.941557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.950496] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.957787] [ 44.959269] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.959317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.959334] Hardware name: WinLink E850-96 board (DT) [ 44.959352] Call trace: [ 44.959364] show_stack+0x20/0x38 (C) [ 44.959399] dump_stack_lvl+0x8c/0xd0 [ 44.959435] print_report+0x118/0x608 [ 44.959469] kasan_report+0xdc/0x128 [ 44.959502] __asan_report_load8_noabort+0x20/0x30 [ 44.959533] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.959572] kasan_bitops_generic+0x11c/0x1c8 [ 44.959604] kunit_try_run_case+0x170/0x3f0 [ 44.959638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.959680] kthread+0x328/0x630 [ 44.959706] ret_from_fork+0x10/0x20 [ 44.959738] [ 45.029227] Allocated by task 305: [ 45.032613] kasan_save_stack+0x3c/0x68 [ 45.036432] kasan_save_track+0x20/0x40 [ 45.040251] kasan_save_alloc_info+0x40/0x58 [ 45.044505] __kasan_kmalloc+0xd4/0xd8 [ 45.048237] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.052751] kasan_bitops_generic+0xa0/0x1c8 [ 45.057004] kunit_try_run_case+0x170/0x3f0 [ 45.061171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.066639] kthread+0x328/0x630 [ 45.069851] ret_from_fork+0x10/0x20 [ 45.073410] [ 45.074886] The buggy address belongs to the object at ffff00080444cc20 [ 45.074886] which belongs to the cache kmalloc-16 of size 16 [ 45.087213] The buggy address is located 8 bytes inside of [ 45.087213] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.099451] [ 45.100927] The buggy address belongs to the physical page: [ 45.106483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.114469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.120979] page_type: f5(slab) [ 45.124112] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.131836] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.139555] page dumped because: kasan: bad access detected [ 45.145112] [ 45.146586] Memory state around the buggy address: [ 45.151364] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.158569] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.165774] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.172975] ^ [ 45.177492] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.184697] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.191898] ================================================================== [ 44.666269] ================================================================== [ 44.673332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.682270] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.689648] [ 44.691129] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.691177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.691193] Hardware name: WinLink E850-96 board (DT) [ 44.691212] Call trace: [ 44.691224] show_stack+0x20/0x38 (C) [ 44.691259] dump_stack_lvl+0x8c/0xd0 [ 44.691293] print_report+0x118/0x608 [ 44.691326] kasan_report+0xdc/0x128 [ 44.691356] kasan_check_range+0x100/0x1a8 [ 44.691391] __kasan_check_write+0x20/0x30 [ 44.691418] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.691456] kasan_bitops_generic+0x11c/0x1c8 [ 44.691487] kunit_try_run_case+0x170/0x3f0 [ 44.691523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.691563] kthread+0x328/0x630 [ 44.691588] ret_from_fork+0x10/0x20 [ 44.691618] [ 44.764474] Allocated by task 305: [ 44.767859] kasan_save_stack+0x3c/0x68 [ 44.771678] kasan_save_track+0x20/0x40 [ 44.775498] kasan_save_alloc_info+0x40/0x58 [ 44.779751] __kasan_kmalloc+0xd4/0xd8 [ 44.783484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.787998] kasan_bitops_generic+0xa0/0x1c8 [ 44.792251] kunit_try_run_case+0x170/0x3f0 [ 44.796419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.801886] kthread+0x328/0x630 [ 44.805098] ret_from_fork+0x10/0x20 [ 44.808657] [ 44.810132] The buggy address belongs to the object at ffff00080444cc20 [ 44.810132] which belongs to the cache kmalloc-16 of size 16 [ 44.822459] The buggy address is located 8 bytes inside of [ 44.822459] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.834698] [ 44.836174] The buggy address belongs to the physical page: [ 44.841730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.849716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.856226] page_type: f5(slab) [ 44.859359] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.867083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.874802] page dumped because: kasan: bad access detected [ 44.880359] [ 44.881833] Memory state around the buggy address: [ 44.886611] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.893816] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.901021] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.908222] ^ [ 44.912739] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.919944] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.927145] ================================================================== [ 45.199214] ================================================================== [ 45.206311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.215249] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 45.222627] [ 45.224108] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 45.224155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.224171] Hardware name: WinLink E850-96 board (DT) [ 45.224190] Call trace: [ 45.224203] show_stack+0x20/0x38 (C) [ 45.224237] dump_stack_lvl+0x8c/0xd0 [ 45.224272] print_report+0x118/0x608 [ 45.224307] kasan_report+0xdc/0x128 [ 45.224339] kasan_check_range+0x100/0x1a8 [ 45.224374] __kasan_check_write+0x20/0x30 [ 45.224404] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.224443] kasan_bitops_generic+0x11c/0x1c8 [ 45.224476] kunit_try_run_case+0x170/0x3f0 [ 45.224512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.224551] kthread+0x328/0x630 [ 45.224578] ret_from_fork+0x10/0x20 [ 45.224609] [ 45.297452] Allocated by task 305: [ 45.300838] kasan_save_stack+0x3c/0x68 [ 45.304657] kasan_save_track+0x20/0x40 [ 45.308476] kasan_save_alloc_info+0x40/0x58 [ 45.312729] __kasan_kmalloc+0xd4/0xd8 [ 45.316462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.320977] kasan_bitops_generic+0xa0/0x1c8 [ 45.325229] kunit_try_run_case+0x170/0x3f0 [ 45.329396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.334865] kthread+0x328/0x630 [ 45.338077] ret_from_fork+0x10/0x20 [ 45.341636] [ 45.343111] The buggy address belongs to the object at ffff00080444cc20 [ 45.343111] which belongs to the cache kmalloc-16 of size 16 [ 45.355438] The buggy address is located 8 bytes inside of [ 45.355438] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.367677] [ 45.369153] The buggy address belongs to the physical page: [ 45.374708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.382694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.389204] page_type: f5(slab) [ 45.392337] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.400061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.407780] page dumped because: kasan: bad access detected [ 45.413337] [ 45.414811] Memory state around the buggy address: [ 45.419589] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.426794] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.433999] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.441200] ^ [ 45.445717] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.452922] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.460123] ================================================================== [ 44.133479] ================================================================== [ 44.140528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.149379] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.156757] [ 44.158239] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.158287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.158304] Hardware name: WinLink E850-96 board (DT) [ 44.158324] Call trace: [ 44.158336] show_stack+0x20/0x38 (C) [ 44.158371] dump_stack_lvl+0x8c/0xd0 [ 44.158404] print_report+0x118/0x608 [ 44.158438] kasan_report+0xdc/0x128 [ 44.158470] kasan_check_range+0x100/0x1a8 [ 44.158506] __kasan_check_write+0x20/0x30 [ 44.158536] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.158572] kasan_bitops_generic+0x11c/0x1c8 [ 44.158605] kunit_try_run_case+0x170/0x3f0 [ 44.158640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.158678] kthread+0x328/0x630 [ 44.158707] ret_from_fork+0x10/0x20 [ 44.158738] [ 44.231496] Allocated by task 305: [ 44.234881] kasan_save_stack+0x3c/0x68 [ 44.238701] kasan_save_track+0x20/0x40 [ 44.242520] kasan_save_alloc_info+0x40/0x58 [ 44.246773] __kasan_kmalloc+0xd4/0xd8 [ 44.250506] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.255020] kasan_bitops_generic+0xa0/0x1c8 [ 44.259273] kunit_try_run_case+0x170/0x3f0 [ 44.263440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.268908] kthread+0x328/0x630 [ 44.272120] ret_from_fork+0x10/0x20 [ 44.275679] [ 44.277155] The buggy address belongs to the object at ffff00080444cc20 [ 44.277155] which belongs to the cache kmalloc-16 of size 16 [ 44.289481] The buggy address is located 8 bytes inside of [ 44.289481] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.301721] [ 44.303198] The buggy address belongs to the physical page: [ 44.308752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.316738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.323248] page_type: f5(slab) [ 44.326380] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.334105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.341824] page dumped because: kasan: bad access detected [ 44.347381] [ 44.348855] Memory state around the buggy address: [ 44.353633] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.360838] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.368043] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.375244] ^ [ 44.379761] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.386966] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.394167] ================================================================== [ 45.732222] ================================================================== [ 45.739289] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.748227] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 45.755604] [ 45.757086] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 45.757134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.757149] Hardware name: WinLink E850-96 board (DT) [ 45.757168] Call trace: [ 45.757180] show_stack+0x20/0x38 (C) [ 45.757217] dump_stack_lvl+0x8c/0xd0 [ 45.757250] print_report+0x118/0x608 [ 45.757285] kasan_report+0xdc/0x128 [ 45.757317] kasan_check_range+0x100/0x1a8 [ 45.757351] __kasan_check_write+0x20/0x30 [ 45.757381] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.757418] kasan_bitops_generic+0x11c/0x1c8 [ 45.757450] kunit_try_run_case+0x170/0x3f0 [ 45.757485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.757523] kthread+0x328/0x630 [ 45.757551] ret_from_fork+0x10/0x20 [ 45.757583] [ 45.830430] Allocated by task 305: [ 45.833816] kasan_save_stack+0x3c/0x68 [ 45.837635] kasan_save_track+0x20/0x40 [ 45.841454] kasan_save_alloc_info+0x40/0x58 [ 45.845707] __kasan_kmalloc+0xd4/0xd8 [ 45.849440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.853954] kasan_bitops_generic+0xa0/0x1c8 [ 45.858208] kunit_try_run_case+0x170/0x3f0 [ 45.862374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.867843] kthread+0x328/0x630 [ 45.871055] ret_from_fork+0x10/0x20 [ 45.874613] [ 45.876089] The buggy address belongs to the object at ffff00080444cc20 [ 45.876089] which belongs to the cache kmalloc-16 of size 16 [ 45.888416] The buggy address is located 8 bytes inside of [ 45.888416] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.900655] [ 45.902131] The buggy address belongs to the physical page: [ 45.907687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.915672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.922182] page_type: f5(slab) [ 45.925315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.933040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.940758] page dumped because: kasan: bad access detected [ 45.946314] [ 45.947789] Memory state around the buggy address: [ 45.952567] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.959772] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.966977] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.974178] ^ [ 45.978695] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.985900] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.993101] ================================================================== [ 45.467467] ================================================================== [ 45.474534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.483474] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 45.490765] [ 45.492246] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 45.492293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.492310] Hardware name: WinLink E850-96 board (DT) [ 45.492329] Call trace: [ 45.492340] show_stack+0x20/0x38 (C) [ 45.492374] dump_stack_lvl+0x8c/0xd0 [ 45.492409] print_report+0x118/0x608 [ 45.492442] kasan_report+0xdc/0x128 [ 45.492476] __asan_report_load8_noabort+0x20/0x30 [ 45.492506] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.492543] kasan_bitops_generic+0x11c/0x1c8 [ 45.492577] kunit_try_run_case+0x170/0x3f0 [ 45.492609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.492647] kthread+0x328/0x630 [ 45.492674] ret_from_fork+0x10/0x20 [ 45.492705] [ 45.562205] Allocated by task 305: [ 45.565591] kasan_save_stack+0x3c/0x68 [ 45.569410] kasan_save_track+0x20/0x40 [ 45.573229] kasan_save_alloc_info+0x40/0x58 [ 45.577482] __kasan_kmalloc+0xd4/0xd8 [ 45.581215] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.585729] kasan_bitops_generic+0xa0/0x1c8 [ 45.589983] kunit_try_run_case+0x170/0x3f0 [ 45.594149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.599618] kthread+0x328/0x630 [ 45.602829] ret_from_fork+0x10/0x20 [ 45.606388] [ 45.607865] The buggy address belongs to the object at ffff00080444cc20 [ 45.607865] which belongs to the cache kmalloc-16 of size 16 [ 45.620190] The buggy address is located 8 bytes inside of [ 45.620190] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.632430] [ 45.633906] The buggy address belongs to the physical page: [ 45.639461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.647447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.653957] page_type: f5(slab) [ 45.657091] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.664814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.672533] page dumped because: kasan: bad access detected [ 45.678090] [ 45.679564] Memory state around the buggy address: [ 45.684342] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.691547] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.698752] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.705953] ^ [ 45.710470] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.717675] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.724876] ================================================================== [ 44.401545] ================================================================== [ 44.408579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.417518] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.424809] [ 44.426291] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.426339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.426354] Hardware name: WinLink E850-96 board (DT) [ 44.426375] Call trace: [ 44.426387] show_stack+0x20/0x38 (C) [ 44.426417] dump_stack_lvl+0x8c/0xd0 [ 44.426454] print_report+0x118/0x608 [ 44.426486] kasan_report+0xdc/0x128 [ 44.426519] __asan_report_load8_noabort+0x20/0x30 [ 44.426550] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.426590] kasan_bitops_generic+0x11c/0x1c8 [ 44.426622] kunit_try_run_case+0x170/0x3f0 [ 44.426658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.426696] kthread+0x328/0x630 [ 44.426724] ret_from_fork+0x10/0x20 [ 44.426754] [ 44.496249] Allocated by task 305: [ 44.499634] kasan_save_stack+0x3c/0x68 [ 44.503454] kasan_save_track+0x20/0x40 [ 44.507273] kasan_save_alloc_info+0x40/0x58 [ 44.511526] __kasan_kmalloc+0xd4/0xd8 [ 44.515259] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.519773] kasan_bitops_generic+0xa0/0x1c8 [ 44.524026] kunit_try_run_case+0x170/0x3f0 [ 44.528193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.533661] kthread+0x328/0x630 [ 44.536873] ret_from_fork+0x10/0x20 [ 44.540432] [ 44.541909] The buggy address belongs to the object at ffff00080444cc20 [ 44.541909] which belongs to the cache kmalloc-16 of size 16 [ 44.554235] The buggy address is located 8 bytes inside of [ 44.554235] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.566473] [ 44.567949] The buggy address belongs to the physical page: [ 44.573505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.581491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.588001] page_type: f5(slab) [ 44.591134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.598858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.606577] page dumped because: kasan: bad access detected [ 44.612134] [ 44.613608] Memory state around the buggy address: [ 44.618388] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.625590] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.632795] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.639997] ^ [ 44.644514] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.651719] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.658920] ================================================================== [ 46.000472] ================================================================== [ 46.007514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 46.016452] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 46.023743] [ 46.025224] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.025272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.025288] Hardware name: WinLink E850-96 board (DT) [ 46.025308] Call trace: [ 46.025321] show_stack+0x20/0x38 (C) [ 46.025355] dump_stack_lvl+0x8c/0xd0 [ 46.025387] print_report+0x118/0x608 [ 46.025422] kasan_report+0xdc/0x128 [ 46.025455] __asan_report_load8_noabort+0x20/0x30 [ 46.025486] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 46.025523] kasan_bitops_generic+0x11c/0x1c8 [ 46.025558] kunit_try_run_case+0x170/0x3f0 [ 46.025592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.025630] kthread+0x328/0x630 [ 46.025656] ret_from_fork+0x10/0x20 [ 46.025687] [ 46.095183] Allocated by task 305: [ 46.098569] kasan_save_stack+0x3c/0x68 [ 46.102388] kasan_save_track+0x20/0x40 [ 46.106207] kasan_save_alloc_info+0x40/0x58 [ 46.110461] __kasan_kmalloc+0xd4/0xd8 [ 46.114193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.118707] kasan_bitops_generic+0xa0/0x1c8 [ 46.122960] kunit_try_run_case+0x170/0x3f0 [ 46.127127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.132596] kthread+0x328/0x630 [ 46.135807] ret_from_fork+0x10/0x20 [ 46.139366] [ 46.140844] The buggy address belongs to the object at ffff00080444cc20 [ 46.140844] which belongs to the cache kmalloc-16 of size 16 [ 46.153169] The buggy address is located 8 bytes inside of [ 46.153169] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 46.165407] [ 46.166884] The buggy address belongs to the physical page: [ 46.172439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 46.180425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.186935] page_type: f5(slab) [ 46.190068] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.197792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.205511] page dumped because: kasan: bad access detected [ 46.211067] [ 46.212542] Memory state around the buggy address: [ 46.217321] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.224525] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 46.231730] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.238931] ^ [ 46.243448] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.250653] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.257854] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 42.277191] ================================================================== [ 42.284306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.292463] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.299754] [ 42.301236] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.301289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.301308] Hardware name: WinLink E850-96 board (DT) [ 42.301328] Call trace: [ 42.301340] show_stack+0x20/0x38 (C) [ 42.301376] dump_stack_lvl+0x8c/0xd0 [ 42.301413] print_report+0x118/0x608 [ 42.301448] kasan_report+0xdc/0x128 [ 42.301479] __asan_report_load8_noabort+0x20/0x30 [ 42.301512] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.301547] kasan_bitops_generic+0x110/0x1c8 [ 42.301581] kunit_try_run_case+0x170/0x3f0 [ 42.301614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.301653] kthread+0x328/0x630 [ 42.301683] ret_from_fork+0x10/0x20 [ 42.301715] [ 42.370412] Allocated by task 305: [ 42.373798] kasan_save_stack+0x3c/0x68 [ 42.377617] kasan_save_track+0x20/0x40 [ 42.381437] kasan_save_alloc_info+0x40/0x58 [ 42.385690] __kasan_kmalloc+0xd4/0xd8 [ 42.389423] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.393937] kasan_bitops_generic+0xa0/0x1c8 [ 42.398190] kunit_try_run_case+0x170/0x3f0 [ 42.402356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.407825] kthread+0x328/0x630 [ 42.411037] ret_from_fork+0x10/0x20 [ 42.414596] [ 42.416071] The buggy address belongs to the object at ffff00080444cc20 [ 42.416071] which belongs to the cache kmalloc-16 of size 16 [ 42.428398] The buggy address is located 8 bytes inside of [ 42.428398] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.440638] [ 42.442113] The buggy address belongs to the physical page: [ 42.447669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.455657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.462165] page_type: f5(slab) [ 42.465299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.473022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.480741] page dumped because: kasan: bad access detected [ 42.486296] [ 42.487772] Memory state around the buggy address: [ 42.492550] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.499754] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 42.506959] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.514160] ^ [ 42.518678] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.525883] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.533084] ================================================================== [ 42.807042] ================================================================== [ 42.814158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.822316] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.829694] [ 42.831177] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.831228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.831246] Hardware name: WinLink E850-96 board (DT) [ 42.831264] Call trace: [ 42.831276] show_stack+0x20/0x38 (C) [ 42.831313] dump_stack_lvl+0x8c/0xd0 [ 42.831349] print_report+0x118/0x608 [ 42.831384] kasan_report+0xdc/0x128 [ 42.831415] kasan_check_range+0x100/0x1a8 [ 42.831452] __kasan_check_write+0x20/0x30 [ 42.831483] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.831518] kasan_bitops_generic+0x110/0x1c8 [ 42.831550] kunit_try_run_case+0x170/0x3f0 [ 42.831583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.831622] kthread+0x328/0x630 [ 42.831647] ret_from_fork+0x10/0x20 [ 42.831677] [ 42.903738] Allocated by task 305: [ 42.907124] kasan_save_stack+0x3c/0x68 [ 42.910943] kasan_save_track+0x20/0x40 [ 42.914762] kasan_save_alloc_info+0x40/0x58 [ 42.919015] __kasan_kmalloc+0xd4/0xd8 [ 42.922748] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.927262] kasan_bitops_generic+0xa0/0x1c8 [ 42.931515] kunit_try_run_case+0x170/0x3f0 [ 42.935682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.941150] kthread+0x328/0x630 [ 42.944362] ret_from_fork+0x10/0x20 [ 42.947921] [ 42.949397] The buggy address belongs to the object at ffff00080444cc20 [ 42.949397] which belongs to the cache kmalloc-16 of size 16 [ 42.961725] The buggy address is located 8 bytes inside of [ 42.961725] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.973963] [ 42.975439] The buggy address belongs to the physical page: [ 42.980994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.988981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.995490] page_type: f5(slab) [ 42.998624] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.006347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.014066] page dumped because: kasan: bad access detected [ 43.019623] [ 43.021097] Memory state around the buggy address: [ 43.025875] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.033080] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.040285] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.047486] ^ [ 43.052003] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.059208] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.066409] ================================================================== [ 41.478615] ================================================================== [ 41.487792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.495948] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 41.503325] [ 41.504811] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 41.504865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.504884] Hardware name: WinLink E850-96 board (DT) [ 41.504903] Call trace: [ 41.504918] show_stack+0x20/0x38 (C) [ 41.504956] dump_stack_lvl+0x8c/0xd0 [ 41.504996] print_report+0x118/0x608 [ 41.505036] kasan_report+0xdc/0x128 [ 41.505068] kasan_check_range+0x100/0x1a8 [ 41.505109] __kasan_check_write+0x20/0x30 [ 41.505138] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.505174] kasan_bitops_generic+0x110/0x1c8 [ 41.505208] kunit_try_run_case+0x170/0x3f0 [ 41.505247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.505287] kthread+0x328/0x630 [ 41.505315] ret_from_fork+0x10/0x20 [ 41.505354] [ 41.577369] Allocated by task 305: [ 41.580758] kasan_save_stack+0x3c/0x68 [ 41.584574] kasan_save_track+0x20/0x40 [ 41.588393] kasan_save_alloc_info+0x40/0x58 [ 41.592647] __kasan_kmalloc+0xd4/0xd8 [ 41.596379] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.600893] kasan_bitops_generic+0xa0/0x1c8 [ 41.605146] kunit_try_run_case+0x170/0x3f0 [ 41.609313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.614782] kthread+0x328/0x630 [ 41.617993] ret_from_fork+0x10/0x20 [ 41.621552] [ 41.623030] The buggy address belongs to the object at ffff00080444cc20 [ 41.623030] which belongs to the cache kmalloc-16 of size 16 [ 41.635357] The buggy address is located 8 bytes inside of [ 41.635357] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 41.647593] [ 41.649074] The buggy address belongs to the physical page: [ 41.654629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 41.662615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.669123] page_type: f5(slab) [ 41.672260] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.679978] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.687699] page dumped because: kasan: bad access detected [ 41.693254] [ 41.694728] Memory state around the buggy address: [ 41.699511] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.706711] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 41.713917] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.721117] ^ [ 41.725634] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.732839] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.740040] ================================================================== [ 42.540388] ================================================================== [ 42.547496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.555653] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.563031] [ 42.564513] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.564565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.564582] Hardware name: WinLink E850-96 board (DT) [ 42.564602] Call trace: [ 42.564614] show_stack+0x20/0x38 (C) [ 42.564648] dump_stack_lvl+0x8c/0xd0 [ 42.564685] print_report+0x118/0x608 [ 42.564720] kasan_report+0xdc/0x128 [ 42.564752] kasan_check_range+0x100/0x1a8 [ 42.564786] __kasan_check_write+0x20/0x30 [ 42.564817] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.564853] kasan_bitops_generic+0x110/0x1c8 [ 42.564884] kunit_try_run_case+0x170/0x3f0 [ 42.564919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.564957] kthread+0x328/0x630 [ 42.564982] ret_from_fork+0x10/0x20 [ 42.565015] [ 42.637075] Allocated by task 305: [ 42.640460] kasan_save_stack+0x3c/0x68 [ 42.644280] kasan_save_track+0x20/0x40 [ 42.648100] kasan_save_alloc_info+0x40/0x58 [ 42.652353] __kasan_kmalloc+0xd4/0xd8 [ 42.656086] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.660599] kasan_bitops_generic+0xa0/0x1c8 [ 42.664853] kunit_try_run_case+0x170/0x3f0 [ 42.669019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.674488] kthread+0x328/0x630 [ 42.677700] ret_from_fork+0x10/0x20 [ 42.681259] [ 42.682734] The buggy address belongs to the object at ffff00080444cc20 [ 42.682734] which belongs to the cache kmalloc-16 of size 16 [ 42.695061] The buggy address is located 8 bytes inside of [ 42.695061] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.707300] [ 42.708775] The buggy address belongs to the physical page: [ 42.714332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.722319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.728827] page_type: f5(slab) [ 42.731962] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.739685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.747403] page dumped because: kasan: bad access detected [ 42.752960] [ 42.754434] Memory state around the buggy address: [ 42.759213] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.766417] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 42.773622] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.780823] ^ [ 42.785341] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.792546] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.799746] ================================================================== [ 41.747347] ================================================================== [ 41.754454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.762609] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 41.769901] [ 41.771387] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 41.771444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.771463] Hardware name: WinLink E850-96 board (DT) [ 41.771483] Call trace: [ 41.771497] show_stack+0x20/0x38 (C) [ 41.771530] dump_stack_lvl+0x8c/0xd0 [ 41.771568] print_report+0x118/0x608 [ 41.771605] kasan_report+0xdc/0x128 [ 41.771638] __asan_report_load8_noabort+0x20/0x30 [ 41.771671] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.771710] kasan_bitops_generic+0x110/0x1c8 [ 41.771744] kunit_try_run_case+0x170/0x3f0 [ 41.771780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.771822] kthread+0x328/0x630 [ 41.771848] ret_from_fork+0x10/0x20 [ 41.771883] [ 41.840559] Allocated by task 305: [ 41.843947] kasan_save_stack+0x3c/0x68 [ 41.847764] kasan_save_track+0x20/0x40 [ 41.851584] kasan_save_alloc_info+0x40/0x58 [ 41.855837] __kasan_kmalloc+0xd4/0xd8 [ 41.859570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.864083] kasan_bitops_generic+0xa0/0x1c8 [ 41.868337] kunit_try_run_case+0x170/0x3f0 [ 41.872503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.877972] kthread+0x328/0x630 [ 41.881184] ret_from_fork+0x10/0x20 [ 41.884743] [ 41.886218] The buggy address belongs to the object at ffff00080444cc20 [ 41.886218] which belongs to the cache kmalloc-16 of size 16 [ 41.898548] The buggy address is located 8 bytes inside of [ 41.898548] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 41.910784] [ 41.912260] The buggy address belongs to the physical page: [ 41.917816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 41.925803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.932313] page_type: f5(slab) [ 41.935446] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.943169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.950887] page dumped because: kasan: bad access detected [ 41.956444] [ 41.957918] Memory state around the buggy address: [ 41.962696] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.969902] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 41.977108] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.984307] ^ [ 41.988825] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.996030] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.003231] ================================================================== [ 42.010615] ================================================================== [ 42.017645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 42.025800] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.033178] [ 42.034660] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.034715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.034734] Hardware name: WinLink E850-96 board (DT) [ 42.034753] Call trace: [ 42.034763] show_stack+0x20/0x38 (C) [ 42.034800] dump_stack_lvl+0x8c/0xd0 [ 42.034840] print_report+0x118/0x608 [ 42.034876] kasan_report+0xdc/0x128 [ 42.034908] kasan_check_range+0x100/0x1a8 [ 42.034946] __kasan_check_write+0x20/0x30 [ 42.034976] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 42.035015] kasan_bitops_generic+0x110/0x1c8 [ 42.035046] kunit_try_run_case+0x170/0x3f0 [ 42.035079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.035120] kthread+0x328/0x630 [ 42.035146] ret_from_fork+0x10/0x20 [ 42.035181] [ 42.107222] Allocated by task 305: [ 42.110609] kasan_save_stack+0x3c/0x68 [ 42.114427] kasan_save_track+0x20/0x40 [ 42.118246] kasan_save_alloc_info+0x40/0x58 [ 42.122500] __kasan_kmalloc+0xd4/0xd8 [ 42.126232] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.130746] kasan_bitops_generic+0xa0/0x1c8 [ 42.134999] kunit_try_run_case+0x170/0x3f0 [ 42.139166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.144635] kthread+0x328/0x630 [ 42.147846] ret_from_fork+0x10/0x20 [ 42.151406] [ 42.152882] The buggy address belongs to the object at ffff00080444cc20 [ 42.152882] which belongs to the cache kmalloc-16 of size 16 [ 42.165208] The buggy address is located 8 bytes inside of [ 42.165208] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.177447] [ 42.178923] The buggy address belongs to the physical page: [ 42.184479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.192466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.198974] page_type: f5(slab) [ 42.202108] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.209831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.217550] page dumped because: kasan: bad access detected [ 42.223107] [ 42.224581] Memory state around the buggy address: [ 42.229362] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.236564] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 42.243768] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.250970] ^ [ 42.255487] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.262692] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.269893] ================================================================== [ 43.073711] ================================================================== [ 43.080821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.088978] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.096270] [ 43.097753] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.097804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.097821] Hardware name: WinLink E850-96 board (DT) [ 43.097844] Call trace: [ 43.097856] show_stack+0x20/0x38 (C) [ 43.097890] dump_stack_lvl+0x8c/0xd0 [ 43.097926] print_report+0x118/0x608 [ 43.097961] kasan_report+0xdc/0x128 [ 43.097997] __asan_report_load8_noabort+0x20/0x30 [ 43.098029] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.098065] kasan_bitops_generic+0x110/0x1c8 [ 43.098097] kunit_try_run_case+0x170/0x3f0 [ 43.098129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.098167] kthread+0x328/0x630 [ 43.098193] ret_from_fork+0x10/0x20 [ 43.098225] [ 43.166928] Allocated by task 305: [ 43.170314] kasan_save_stack+0x3c/0x68 [ 43.174133] kasan_save_track+0x20/0x40 [ 43.177952] kasan_save_alloc_info+0x40/0x58 [ 43.182206] __kasan_kmalloc+0xd4/0xd8 [ 43.185939] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.190452] kasan_bitops_generic+0xa0/0x1c8 [ 43.194706] kunit_try_run_case+0x170/0x3f0 [ 43.198872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.204341] kthread+0x328/0x630 [ 43.207553] ret_from_fork+0x10/0x20 [ 43.211111] [ 43.212589] The buggy address belongs to the object at ffff00080444cc20 [ 43.212589] which belongs to the cache kmalloc-16 of size 16 [ 43.224914] The buggy address is located 8 bytes inside of [ 43.224914] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 43.237153] [ 43.238629] The buggy address belongs to the physical page: [ 43.244185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 43.252170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.258680] page_type: f5(slab) [ 43.261813] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.269538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.277256] page dumped because: kasan: bad access detected [ 43.282813] [ 43.284288] Memory state around the buggy address: [ 43.289067] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.296270] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.303475] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.310676] ^ [ 43.315194] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.322398] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.329600] ================================================================== [ 43.603562] ================================================================== [ 43.610675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.618831] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.626210] [ 43.627691] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.627740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.627758] Hardware name: WinLink E850-96 board (DT) [ 43.627775] Call trace: [ 43.627788] show_stack+0x20/0x38 (C) [ 43.627824] dump_stack_lvl+0x8c/0xd0 [ 43.627857] print_report+0x118/0x608 [ 43.627890] kasan_report+0xdc/0x128 [ 43.627922] kasan_check_range+0x100/0x1a8 [ 43.627958] __kasan_check_write+0x20/0x30 [ 43.627987] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.628023] kasan_bitops_generic+0x110/0x1c8 [ 43.628057] kunit_try_run_case+0x170/0x3f0 [ 43.628089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.628128] kthread+0x328/0x630 [ 43.628156] ret_from_fork+0x10/0x20 [ 43.628189] [ 43.700254] Allocated by task 305: [ 43.703640] kasan_save_stack+0x3c/0x68 [ 43.707459] kasan_save_track+0x20/0x40 [ 43.711278] kasan_save_alloc_info+0x40/0x58 [ 43.715531] __kasan_kmalloc+0xd4/0xd8 [ 43.719264] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.723778] kasan_bitops_generic+0xa0/0x1c8 [ 43.728031] kunit_try_run_case+0x170/0x3f0 [ 43.732199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.737667] kthread+0x328/0x630 [ 43.740878] ret_from_fork+0x10/0x20 [ 43.744437] [ 43.745912] The buggy address belongs to the object at ffff00080444cc20 [ 43.745912] which belongs to the cache kmalloc-16 of size 16 [ 43.758240] The buggy address is located 8 bytes inside of [ 43.758240] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 43.770478] [ 43.771954] The buggy address belongs to the physical page: [ 43.777510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 43.785495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.792006] page_type: f5(slab) [ 43.795139] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.802863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.810582] page dumped because: kasan: bad access detected [ 43.816139] [ 43.817613] Memory state around the buggy address: [ 43.822391] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.829596] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.836800] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.844002] ^ [ 43.848519] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.855724] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.862925] ================================================================== [ 43.336895] ================================================================== [ 43.344012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.352169] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.359547] [ 43.361030] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.361079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.361098] Hardware name: WinLink E850-96 board (DT) [ 43.361118] Call trace: [ 43.361130] show_stack+0x20/0x38 (C) [ 43.361166] dump_stack_lvl+0x8c/0xd0 [ 43.361200] print_report+0x118/0x608 [ 43.361236] kasan_report+0xdc/0x128 [ 43.361269] kasan_check_range+0x100/0x1a8 [ 43.361307] __kasan_check_write+0x20/0x30 [ 43.361337] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.361372] kasan_bitops_generic+0x110/0x1c8 [ 43.361405] kunit_try_run_case+0x170/0x3f0 [ 43.361438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.361475] kthread+0x328/0x630 [ 43.361504] ret_from_fork+0x10/0x20 [ 43.361538] [ 43.433591] Allocated by task 305: [ 43.436977] kasan_save_stack+0x3c/0x68 [ 43.440795] kasan_save_track+0x20/0x40 [ 43.444615] kasan_save_alloc_info+0x40/0x58 [ 43.448869] __kasan_kmalloc+0xd4/0xd8 [ 43.452601] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.457115] kasan_bitops_generic+0xa0/0x1c8 [ 43.461369] kunit_try_run_case+0x170/0x3f0 [ 43.465535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.471004] kthread+0x328/0x630 [ 43.474216] ret_from_fork+0x10/0x20 [ 43.477774] [ 43.479250] The buggy address belongs to the object at ffff00080444cc20 [ 43.479250] which belongs to the cache kmalloc-16 of size 16 [ 43.491577] The buggy address is located 8 bytes inside of [ 43.491577] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 43.503816] [ 43.505291] The buggy address belongs to the physical page: [ 43.510847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 43.518835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.525343] page_type: f5(slab) [ 43.528479] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.536200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.543919] page dumped because: kasan: bad access detected [ 43.549474] [ 43.550950] Memory state around the buggy address: [ 43.555728] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.562933] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.570138] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.577339] ^ [ 43.581856] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.589061] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.596262] ================================================================== [ 43.870278] ================================================================== [ 43.877340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.885494] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.892785] [ 43.894268] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.894316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.894334] Hardware name: WinLink E850-96 board (DT) [ 43.894354] Call trace: [ 43.894368] show_stack+0x20/0x38 (C) [ 43.894402] dump_stack_lvl+0x8c/0xd0 [ 43.894437] print_report+0x118/0x608 [ 43.894472] kasan_report+0xdc/0x128 [ 43.894506] __asan_report_load8_noabort+0x20/0x30 [ 43.894535] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.894571] kasan_bitops_generic+0x110/0x1c8 [ 43.894604] kunit_try_run_case+0x170/0x3f0 [ 43.894637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.894677] kthread+0x328/0x630 [ 43.894706] ret_from_fork+0x10/0x20 [ 43.894737] [ 43.963444] Allocated by task 305: [ 43.966830] kasan_save_stack+0x3c/0x68 [ 43.970649] kasan_save_track+0x20/0x40 [ 43.974468] kasan_save_alloc_info+0x40/0x58 [ 43.978722] __kasan_kmalloc+0xd4/0xd8 [ 43.982454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.986968] kasan_bitops_generic+0xa0/0x1c8 [ 43.991222] kunit_try_run_case+0x170/0x3f0 [ 43.995388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.000857] kthread+0x328/0x630 [ 44.004069] ret_from_fork+0x10/0x20 [ 44.007628] [ 44.009103] The buggy address belongs to the object at ffff00080444cc20 [ 44.009103] which belongs to the cache kmalloc-16 of size 16 [ 44.021430] The buggy address is located 8 bytes inside of [ 44.021430] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.033669] [ 44.035145] The buggy address belongs to the physical page: [ 44.040701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.048687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.055196] page_type: f5(slab) [ 44.058329] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.066054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.073773] page dumped because: kasan: bad access detected [ 44.079329] [ 44.080803] Memory state around the buggy address: [ 44.085583] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.092786] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.099991] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.107192] ^ [ 44.111709] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.118914] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.126116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 41.176918] ================================================================== [ 41.183980] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 41.189963] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303 [ 41.197254] [ 41.198737] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 41.198796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.198813] Hardware name: WinLink E850-96 board (DT) [ 41.198835] Call trace: [ 41.198849] show_stack+0x20/0x38 (C) [ 41.198886] dump_stack_lvl+0x8c/0xd0 [ 41.198923] print_report+0x118/0x608 [ 41.198960] kasan_report+0xdc/0x128 [ 41.198992] __asan_report_load1_noabort+0x20/0x30 [ 41.199025] strnlen+0x80/0x88 [ 41.199055] kasan_strings+0x478/0xb00 [ 41.199085] kunit_try_run_case+0x170/0x3f0 [ 41.199122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.199163] kthread+0x328/0x630 [ 41.199192] ret_from_fork+0x10/0x20 [ 41.199227] [ 41.265047] Allocated by task 303: [ 41.268434] kasan_save_stack+0x3c/0x68 [ 41.272252] kasan_save_track+0x20/0x40 [ 41.276073] kasan_save_alloc_info+0x40/0x58 [ 41.280325] __kasan_kmalloc+0xd4/0xd8 [ 41.284057] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.288571] kasan_strings+0xc8/0xb00 [ 41.292217] kunit_try_run_case+0x170/0x3f0 [ 41.296383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.301852] kthread+0x328/0x630 [ 41.305064] ret_from_fork+0x10/0x20 [ 41.308623] [ 41.310099] Freed by task 303: [ 41.313138] kasan_save_stack+0x3c/0x68 [ 41.316956] kasan_save_track+0x20/0x40 [ 41.320776] kasan_save_free_info+0x4c/0x78 [ 41.324942] __kasan_slab_free+0x6c/0x98 [ 41.328848] kfree+0x214/0x3c8 [ 41.331886] kasan_strings+0x24c/0xb00 [ 41.335619] kunit_try_run_case+0x170/0x3f0 [ 41.339786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.345254] kthread+0x328/0x630 [ 41.348466] ret_from_fork+0x10/0x20 [ 41.352025] [ 41.353502] The buggy address belongs to the object at ffff000806931180 [ 41.353502] which belongs to the cache kmalloc-32 of size 32 [ 41.365829] The buggy address is located 16 bytes inside of [ 41.365829] freed 32-byte region [ffff000806931180, ffff0008069311a0) [ 41.377893] [ 41.379372] The buggy address belongs to the physical page: [ 41.384927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931 [ 41.392913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.399422] page_type: f5(slab) [ 41.402557] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.410278] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.417996] page dumped because: kasan: bad access detected [ 41.423553] [ 41.425027] Memory state around the buggy address: [ 41.429808] ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.437010] ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 41.444215] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.451416] ^ [ 41.455153] ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.462357] ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.469558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 40.877159] ================================================================== [ 40.884154] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 40.890053] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303 [ 40.897344] [ 40.898828] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 40.898885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.898904] Hardware name: WinLink E850-96 board (DT) [ 40.898926] Call trace: [ 40.898940] show_stack+0x20/0x38 (C) [ 40.898975] dump_stack_lvl+0x8c/0xd0 [ 40.899012] print_report+0x118/0x608 [ 40.899047] kasan_report+0xdc/0x128 [ 40.899081] __asan_report_load1_noabort+0x20/0x30 [ 40.899114] strlen+0xa8/0xb0 [ 40.899146] kasan_strings+0x418/0xb00 [ 40.899177] kunit_try_run_case+0x170/0x3f0 [ 40.899212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.899254] kthread+0x328/0x630 [ 40.899283] ret_from_fork+0x10/0x20 [ 40.899316] [ 40.965052] Allocated by task 303: [ 40.968440] kasan_save_stack+0x3c/0x68 [ 40.972257] kasan_save_track+0x20/0x40 [ 40.976077] kasan_save_alloc_info+0x40/0x58 [ 40.980329] __kasan_kmalloc+0xd4/0xd8 [ 40.984062] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.988576] kasan_strings+0xc8/0xb00 [ 40.992222] kunit_try_run_case+0x170/0x3f0 [ 40.996388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.001857] kthread+0x328/0x630 [ 41.005069] ret_from_fork+0x10/0x20 [ 41.008628] [ 41.010103] Freed by task 303: [ 41.013141] kasan_save_stack+0x3c/0x68 [ 41.016961] kasan_save_track+0x20/0x40 [ 41.020780] kasan_save_free_info+0x4c/0x78 [ 41.024947] __kasan_slab_free+0x6c/0x98 [ 41.028853] kfree+0x214/0x3c8 [ 41.031891] kasan_strings+0x24c/0xb00 [ 41.035623] kunit_try_run_case+0x170/0x3f0 [ 41.039790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.045259] kthread+0x328/0x630 [ 41.048471] ret_from_fork+0x10/0x20 [ 41.052030] [ 41.053507] The buggy address belongs to the object at ffff000806931180 [ 41.053507] which belongs to the cache kmalloc-32 of size 32 [ 41.065833] The buggy address is located 16 bytes inside of [ 41.065833] freed 32-byte region [ffff000806931180, ffff0008069311a0) [ 41.077897] [ 41.079376] The buggy address belongs to the physical page: [ 41.084931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931 [ 41.092918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.099426] page_type: f5(slab) [ 41.102561] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.110282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.118001] page dumped because: kasan: bad access detected [ 41.123557] [ 41.125032] Memory state around the buggy address: [ 41.129810] ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.137015] ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 41.144219] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.151420] ^ [ 41.155158] ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.162361] ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.169562] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 40.579419] ================================================================== [ 40.586506] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 40.593182] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303 [ 40.600474] [ 40.601959] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 40.602011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.602029] Hardware name: WinLink E850-96 board (DT) [ 40.602053] Call trace: [ 40.602067] show_stack+0x20/0x38 (C) [ 40.602108] dump_stack_lvl+0x8c/0xd0 [ 40.602146] print_report+0x118/0x608 [ 40.602180] kasan_report+0xdc/0x128 [ 40.602212] __asan_report_load1_noabort+0x20/0x30 [ 40.602245] kasan_strings+0x95c/0xb00 [ 40.602275] kunit_try_run_case+0x170/0x3f0 [ 40.602313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.602354] kthread+0x328/0x630 [ 40.602383] ret_from_fork+0x10/0x20 [ 40.602416] [ 40.665230] Allocated by task 303: [ 40.668617] kasan_save_stack+0x3c/0x68 [ 40.672435] kasan_save_track+0x20/0x40 [ 40.676255] kasan_save_alloc_info+0x40/0x58 [ 40.680507] __kasan_kmalloc+0xd4/0xd8 [ 40.684240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.688754] kasan_strings+0xc8/0xb00 [ 40.692400] kunit_try_run_case+0x170/0x3f0 [ 40.696566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.702035] kthread+0x328/0x630 [ 40.705247] ret_from_fork+0x10/0x20 [ 40.708806] [ 40.710281] Freed by task 303: [ 40.713321] kasan_save_stack+0x3c/0x68 [ 40.717139] kasan_save_track+0x20/0x40 [ 40.720958] kasan_save_free_info+0x4c/0x78 [ 40.725125] __kasan_slab_free+0x6c/0x98 [ 40.729031] kfree+0x214/0x3c8 [ 40.732069] kasan_strings+0x24c/0xb00 [ 40.735802] kunit_try_run_case+0x170/0x3f0 [ 40.739968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.745439] kthread+0x328/0x630 [ 40.748649] ret_from_fork+0x10/0x20 [ 40.752208] [ 40.753685] The buggy address belongs to the object at ffff000806931180 [ 40.753685] which belongs to the cache kmalloc-32 of size 32 [ 40.766010] The buggy address is located 16 bytes inside of [ 40.766010] freed 32-byte region [ffff000806931180, ffff0008069311a0) [ 40.778075] [ 40.779555] The buggy address belongs to the physical page: [ 40.785110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931 [ 40.793094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.799605] page_type: f5(slab) [ 40.802738] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.810460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.818179] page dumped because: kasan: bad access detected [ 40.823735] [ 40.825210] Memory state around the buggy address: [ 40.829990] ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.837193] ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 40.844399] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.851599] ^ [ 40.855336] ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.862539] ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.869740] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 40.263083] ================================================================== [ 40.286682] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 40.292580] Read of size 1 at addr ffff000806931190 by task kunit_try_catch/303 [ 40.299871] [ 40.301357] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 40.301414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.301432] Hardware name: WinLink E850-96 board (DT) [ 40.301455] Call trace: [ 40.301470] show_stack+0x20/0x38 (C) [ 40.301509] dump_stack_lvl+0x8c/0xd0 [ 40.301544] print_report+0x118/0x608 [ 40.301582] kasan_report+0xdc/0x128 [ 40.301619] __asan_report_load1_noabort+0x20/0x30 [ 40.301652] strcmp+0xc0/0xc8 [ 40.301682] kasan_strings+0x340/0xb00 [ 40.301712] kunit_try_run_case+0x170/0x3f0 [ 40.301751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.301793] kthread+0x328/0x630 [ 40.301823] ret_from_fork+0x10/0x20 [ 40.301858] [ 40.367578] Allocated by task 303: [ 40.370966] kasan_save_stack+0x3c/0x68 [ 40.374783] kasan_save_track+0x20/0x40 [ 40.378604] kasan_save_alloc_info+0x40/0x58 [ 40.382856] __kasan_kmalloc+0xd4/0xd8 [ 40.386588] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.391102] kasan_strings+0xc8/0xb00 [ 40.394748] kunit_try_run_case+0x170/0x3f0 [ 40.398914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.404383] kthread+0x328/0x630 [ 40.407595] ret_from_fork+0x10/0x20 [ 40.411153] [ 40.412631] Freed by task 303: [ 40.415669] kasan_save_stack+0x3c/0x68 [ 40.419487] kasan_save_track+0x20/0x40 [ 40.423306] kasan_save_free_info+0x4c/0x78 [ 40.427473] __kasan_slab_free+0x6c/0x98 [ 40.431379] kfree+0x214/0x3c8 [ 40.434417] kasan_strings+0x24c/0xb00 [ 40.438150] kunit_try_run_case+0x170/0x3f0 [ 40.442317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.447787] kthread+0x328/0x630 [ 40.450997] ret_from_fork+0x10/0x20 [ 40.454556] [ 40.456035] The buggy address belongs to the object at ffff000806931180 [ 40.456035] which belongs to the cache kmalloc-32 of size 32 [ 40.468360] The buggy address is located 16 bytes inside of [ 40.468360] freed 32-byte region [ffff000806931180, ffff0008069311a0) [ 40.480423] [ 40.481901] The buggy address belongs to the physical page: [ 40.487459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886931 [ 40.495444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.501952] page_type: f5(slab) [ 40.505087] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.512808] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.520528] page dumped because: kasan: bad access detected [ 40.526084] [ 40.527558] Memory state around the buggy address: [ 40.532339] ffff000806931080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.539541] ffff000806931100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 40.546746] >ffff000806931180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.553947] ^ [ 40.557683] ffff000806931200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.564887] ffff000806931280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.572089] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 39.961634] ================================================================== [ 39.971845] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 39.977832] Read of size 1 at addr ffff0008050026d8 by task kunit_try_catch/301 [ 39.985120] [ 39.986605] CPU: 5 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 39.986670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.986690] Hardware name: WinLink E850-96 board (DT) [ 39.986714] Call trace: [ 39.986728] show_stack+0x20/0x38 (C) [ 39.986766] dump_stack_lvl+0x8c/0xd0 [ 39.986804] print_report+0x118/0x608 [ 39.986844] kasan_report+0xdc/0x128 [ 39.986878] __asan_report_load1_noabort+0x20/0x30 [ 39.986913] memcmp+0x198/0x1d8 [ 39.986944] kasan_memcmp+0x16c/0x300 [ 39.986977] kunit_try_run_case+0x170/0x3f0 [ 39.987017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.987056] kthread+0x328/0x630 [ 39.987088] ret_from_fork+0x10/0x20 [ 39.987125] [ 40.052914] Allocated by task 301: [ 40.056301] kasan_save_stack+0x3c/0x68 [ 40.060118] kasan_save_track+0x20/0x40 [ 40.063936] kasan_save_alloc_info+0x40/0x58 [ 40.068190] __kasan_kmalloc+0xd4/0xd8 [ 40.071923] __kmalloc_cache_noprof+0x15c/0x3c0 [ 40.076436] kasan_memcmp+0xbc/0x300 [ 40.079997] kunit_try_run_case+0x170/0x3f0 [ 40.084162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.089631] kthread+0x328/0x630 [ 40.092842] ret_from_fork+0x10/0x20 [ 40.096403] [ 40.097879] The buggy address belongs to the object at ffff0008050026c0 [ 40.097879] which belongs to the cache kmalloc-32 of size 32 [ 40.110208] The buggy address is located 0 bytes to the right of [ 40.110208] allocated 24-byte region [ffff0008050026c0, ffff0008050026d8) [ 40.123050] [ 40.124530] The buggy address belongs to the physical page: [ 40.130086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885002 [ 40.138071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.144579] page_type: f5(slab) [ 40.147716] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.155435] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.163155] page dumped because: kasan: bad access detected [ 40.168711] [ 40.170185] Memory state around the buggy address: [ 40.174968] ffff000805002580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.182168] ffff000805002600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.189374] >ffff000805002680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.196573] ^ [ 40.202653] ffff000805002700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.209858] ffff000805002780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.217061] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 39.728171] ================================================================== [ 39.737733] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 39.745280] Read of size 1 at addr ffff800089517b4a by task kunit_try_catch/297 [ 39.752570] [ 39.754054] CPU: 4 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 39.754117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.754138] Hardware name: WinLink E850-96 board (DT) [ 39.754159] Call trace: [ 39.754171] show_stack+0x20/0x38 (C) [ 39.754212] dump_stack_lvl+0x8c/0xd0 [ 39.754249] print_report+0x310/0x608 [ 39.754287] kasan_report+0xdc/0x128 [ 39.754321] __asan_report_load1_noabort+0x20/0x30 [ 39.754353] kasan_alloca_oob_right+0x2dc/0x340 [ 39.754384] kunit_try_run_case+0x170/0x3f0 [ 39.754423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.754462] kthread+0x328/0x630 [ 39.754495] ret_from_fork+0x10/0x20 [ 39.754530] [ 39.818109] The buggy address belongs to stack of task kunit_try_catch/297 [ 39.824986] [ 39.826447] The buggy address belongs to the virtual mapping at [ 39.826447] [ffff800089510000, ffff800089519000) created by: [ 39.826447] kernel_clone+0x150/0x7a8 [ 39.841719] [ 39.843196] The buggy address belongs to the physical page: [ 39.848753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886982 [ 39.856737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.863258] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.870978] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.878696] page dumped because: kasan: bad access detected [ 39.884253] [ 39.885727] Memory state around the buggy address: [ 39.890508] ffff800089517a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.897710] ffff800089517a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.904917] >ffff800089517b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 39.912116] ^ [ 39.917675] ffff800089517b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.924881] ffff800089517c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.932081] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 39.515122] ================================================================== [ 39.524454] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 39.531916] Read of size 1 at addr ffff8000894f7b5f by task kunit_try_catch/295 [ 39.539205] [ 39.540689] CPU: 2 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 39.540748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.540765] Hardware name: WinLink E850-96 board (DT) [ 39.540786] Call trace: [ 39.540798] show_stack+0x20/0x38 (C) [ 39.540834] dump_stack_lvl+0x8c/0xd0 [ 39.540871] print_report+0x310/0x608 [ 39.540907] kasan_report+0xdc/0x128 [ 39.540939] __asan_report_load1_noabort+0x20/0x30 [ 39.540971] kasan_alloca_oob_left+0x2b8/0x310 [ 39.541003] kunit_try_run_case+0x170/0x3f0 [ 39.541041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.541083] kthread+0x328/0x630 [ 39.541111] ret_from_fork+0x10/0x20 [ 39.541149] [ 39.604658] The buggy address belongs to stack of task kunit_try_catch/295 [ 39.611537] [ 39.612994] The buggy address belongs to the virtual mapping at [ 39.612994] [ffff8000894f0000, ffff8000894f9000) created by: [ 39.612994] kernel_clone+0x150/0x7a8 [ 39.628266] [ 39.629746] The buggy address belongs to the physical page: [ 39.635302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88696d [ 39.643286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.649803] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.657526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.665245] page dumped because: kasan: bad access detected [ 39.670802] [ 39.672276] Memory state around the buggy address: [ 39.677056] ffff8000894f7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.684258] ffff8000894f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.691465] >ffff8000894f7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.698665] ^ [ 39.704745] ffff8000894f7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.711949] ffff8000894f7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.719150] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 39.272633] ================================================================== [ 39.287049] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 39.293898] Read of size 1 at addr ffff8000894d7c2a by task kunit_try_catch/293 [ 39.301189] [ 39.302673] CPU: 5 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 39.302732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.302752] Hardware name: WinLink E850-96 board (DT) [ 39.302776] Call trace: [ 39.302792] show_stack+0x20/0x38 (C) [ 39.302829] dump_stack_lvl+0x8c/0xd0 [ 39.302867] print_report+0x310/0x608 [ 39.302907] kasan_report+0xdc/0x128 [ 39.302940] __asan_report_load1_noabort+0x20/0x30 [ 39.302974] kasan_stack_oob+0x238/0x270 [ 39.303004] kunit_try_run_case+0x170/0x3f0 [ 39.303042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.303084] kthread+0x328/0x630 [ 39.303113] ret_from_fork+0x10/0x20 [ 39.303152] [ 39.366120] The buggy address belongs to stack of task kunit_try_catch/293 [ 39.372978] and is located at offset 138 in frame: [ 39.377836] kasan_stack_oob+0x0/0x270 [ 39.381575] [ 39.383044] This frame has 4 objects: [ 39.386695] [48, 49) '__assertion' [ 39.386720] [64, 72) 'array' [ 39.390165] [96, 112) '__assertion' [ 39.393115] [128, 138) 'stack_array' [ 39.396674] [ 39.401799] The buggy address belongs to the virtual mapping at [ 39.401799] [ffff8000894d0000, ffff8000894d9000) created by: [ 39.401799] kernel_clone+0x150/0x7a8 [ 39.417071] [ 39.418551] The buggy address belongs to the physical page: [ 39.424107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886959 [ 39.432091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.438612] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.446331] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.454052] page dumped because: kasan: bad access detected [ 39.459607] [ 39.461081] Memory state around the buggy address: [ 39.465862] ffff8000894d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.473064] ffff8000894d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 39.480270] >ffff8000894d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 39.487470] ^ [ 39.491987] ffff8000894d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 39.499192] ffff8000894d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.506394] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 39.055428] ================================================================== [ 39.066038] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 39.073588] Read of size 1 at addr ffff800087bb258d by task kunit_try_catch/289 [ 39.080879] [ 39.082364] CPU: 2 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 39.082421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.082439] Hardware name: WinLink E850-96 board (DT) [ 39.082460] Call trace: [ 39.082473] show_stack+0x20/0x38 (C) [ 39.082512] dump_stack_lvl+0x8c/0xd0 [ 39.082550] print_report+0x310/0x608 [ 39.082588] kasan_report+0xdc/0x128 [ 39.082620] __asan_report_load1_noabort+0x20/0x30 [ 39.082654] kasan_global_oob_right+0x230/0x270 [ 39.082686] kunit_try_run_case+0x170/0x3f0 [ 39.082724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.082764] kthread+0x328/0x630 [ 39.082796] ret_from_fork+0x10/0x20 [ 39.082834] [ 39.146418] The buggy address belongs to the variable: [ 39.151537] global_array+0xd/0x40 [ 39.154923] [ 39.156415] The buggy address belongs to the virtual mapping at [ 39.156415] [ffff800085d50000, ffff800087c71000) created by: [ 39.156415] paging_init+0x66c/0x7d0 [ 39.171589] [ 39.173069] The buggy address belongs to the physical page: [ 39.178626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87bb2 [ 39.186524] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.193822] raw: 03fffe0000002000 fffffdffc01eec88 fffffdffc01eec88 0000000000000000 [ 39.201543] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.209263] page dumped because: kasan: bad access detected [ 39.214819] [ 39.216293] Memory state around the buggy address: [ 39.221074] ffff800087bb2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.228275] ffff800087bb2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 39.235481] >ffff800087bb2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 39.242682] ^ [ 39.246159] ffff800087bb2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 39.253362] ffff800087bb2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.260564] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 38.488906] ================================================================== [ 38.499120] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.507103] Free of addr ffff000805826101 by task kunit_try_catch/285 [ 38.513527] [ 38.515013] CPU: 2 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.515077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.515092] Hardware name: WinLink E850-96 board (DT) [ 38.515113] Call trace: [ 38.515130] show_stack+0x20/0x38 (C) [ 38.515166] dump_stack_lvl+0x8c/0xd0 [ 38.515207] print_report+0x118/0x608 [ 38.515243] kasan_report_invalid_free+0xc0/0xe8 [ 38.515277] check_slab_allocation+0xfc/0x108 [ 38.515311] __kasan_mempool_poison_object+0x78/0x150 [ 38.515349] mempool_free+0x28c/0x328 [ 38.515383] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.515419] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.515452] kunit_try_run_case+0x170/0x3f0 [ 38.515487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.515529] kthread+0x328/0x630 [ 38.515559] ret_from_fork+0x10/0x20 [ 38.515594] [ 38.594429] Allocated by task 285: [ 38.597816] kasan_save_stack+0x3c/0x68 [ 38.601632] kasan_save_track+0x20/0x40 [ 38.605452] kasan_save_alloc_info+0x40/0x58 [ 38.609705] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.615000] remove_element+0x130/0x1f8 [ 38.618820] mempool_alloc_preallocated+0x58/0xc0 [ 38.623507] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.629062] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.634013] kunit_try_run_case+0x170/0x3f0 [ 38.638177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.643645] kthread+0x328/0x630 [ 38.646857] ret_from_fork+0x10/0x20 [ 38.650416] [ 38.651894] The buggy address belongs to the object at ffff000805826100 [ 38.651894] which belongs to the cache kmalloc-128 of size 128 [ 38.664395] The buggy address is located 1 bytes inside of [ 38.664395] 128-byte region [ffff000805826100, ffff000805826180) [ 38.675937] [ 38.677415] The buggy address belongs to the physical page: [ 38.682972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826 [ 38.690957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.698593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.705538] page_type: f5(slab) [ 38.708673] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.716394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.724121] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.731932] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.739745] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff [ 38.747557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.755363] page dumped because: kasan: bad access detected [ 38.760919] [ 38.762394] Memory state around the buggy address: [ 38.767175] ffff000805826000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.774376] ffff000805826080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.781584] >ffff000805826100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.788782] ^ [ 38.791998] ffff000805826180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.799202] ffff000805826200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.806404] ================================================================== [ 38.815651] ================================================================== [ 38.825593] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.833575] Free of addr ffff000806014001 by task kunit_try_catch/287 [ 38.839997] [ 38.841483] CPU: 4 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.841539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.841557] Hardware name: WinLink E850-96 board (DT) [ 38.841577] Call trace: [ 38.841590] show_stack+0x20/0x38 (C) [ 38.841628] dump_stack_lvl+0x8c/0xd0 [ 38.841664] print_report+0x118/0x608 [ 38.841701] kasan_report_invalid_free+0xc0/0xe8 [ 38.841736] __kasan_mempool_poison_object+0xfc/0x150 [ 38.841774] mempool_free+0x28c/0x328 [ 38.841807] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.841843] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.841878] kunit_try_run_case+0x170/0x3f0 [ 38.841917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.841956] kthread+0x328/0x630 [ 38.841985] ret_from_fork+0x10/0x20 [ 38.842021] [ 38.917083] The buggy address belongs to the physical page: [ 38.922639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014 [ 38.930622] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.938264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.945205] page_type: f8(unknown) [ 38.948600] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.956321] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.964047] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.971858] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.979672] head: 0bfffe0000000002 fffffdffe0180501 00000000ffffffff 00000000ffffffff [ 38.987484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.995290] page dumped because: kasan: bad access detected [ 39.000846] [ 39.002321] Memory state around the buggy address: [ 39.007102] ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.014303] ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.021511] >ffff000806014000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.028709] ^ [ 39.031924] ffff000806014080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.039129] ffff000806014100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.046330] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 36.936453] ================================================================== [ 36.945760] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.952442] Read of size 1 at addr ffff000806070000 by task kunit_try_catch/273 [ 36.959730] [ 36.961218] CPU: 4 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 36.961273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.961293] Hardware name: WinLink E850-96 board (DT) [ 36.961314] Call trace: [ 36.961329] show_stack+0x20/0x38 (C) [ 36.961370] dump_stack_lvl+0x8c/0xd0 [ 36.961407] print_report+0x118/0x608 [ 36.961446] kasan_report+0xdc/0x128 [ 36.961479] __asan_report_load1_noabort+0x20/0x30 [ 36.961513] mempool_uaf_helper+0x314/0x340 [ 36.961549] mempool_kmalloc_large_uaf+0xc4/0x120 [ 36.961583] kunit_try_run_case+0x170/0x3f0 [ 36.961621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.961659] kthread+0x328/0x630 [ 36.961689] ret_from_fork+0x10/0x20 [ 36.961725] [ 37.029610] The buggy address belongs to the physical page: [ 37.035168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886070 [ 37.043152] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.050792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.057733] page_type: f8(unknown) [ 37.061130] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.068849] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.076577] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.084387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.092200] head: 0bfffe0000000002 fffffdffe0181c01 00000000ffffffff 00000000ffffffff [ 37.100012] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.107818] page dumped because: kasan: bad access detected [ 37.113374] [ 37.114849] Memory state around the buggy address: [ 37.119633] ffff00080606ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.126832] ffff00080606ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.134038] >ffff000806070000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.141237] ^ [ 37.144453] ffff000806070080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.151657] ffff000806070100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.158859] ================================================================== [ 37.499457] ================================================================== [ 37.501481] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.508161] Read of size 1 at addr ffff000806014000 by task kunit_try_catch/277 [ 37.515452] [ 37.516937] CPU: 4 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.516997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.517016] Hardware name: WinLink E850-96 board (DT) [ 37.517035] Call trace: [ 37.517052] show_stack+0x20/0x38 (C) [ 37.517094] dump_stack_lvl+0x8c/0xd0 [ 37.517131] print_report+0x118/0x608 [ 37.517170] kasan_report+0xdc/0x128 [ 37.517204] __asan_report_load1_noabort+0x20/0x30 [ 37.517238] mempool_uaf_helper+0x314/0x340 [ 37.517270] mempool_page_alloc_uaf+0xc0/0x118 [ 37.517304] kunit_try_run_case+0x170/0x3f0 [ 37.517344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.517383] kthread+0x328/0x630 [ 37.517412] ret_from_fork+0x10/0x20 [ 37.517447] [ 37.585071] The buggy address belongs to the physical page: [ 37.590628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014 [ 37.598611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.605134] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.612851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.620572] page dumped because: kasan: bad access detected [ 37.626127] [ 37.627601] Memory state around the buggy address: [ 37.632382] ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.639584] ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.646792] >ffff000806014000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653990] ^ [ 37.657205] ffff000806014080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.664410] ffff000806014100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.671613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 37.168414] ================================================================== [ 37.177789] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.184901] Read of size 1 at addr ffff000805857240 by task kunit_try_catch/275 [ 37.192192] [ 37.193679] CPU: 2 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.193733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.193752] Hardware name: WinLink E850-96 board (DT) [ 37.193774] Call trace: [ 37.193788] show_stack+0x20/0x38 (C) [ 37.193828] dump_stack_lvl+0x8c/0xd0 [ 37.193866] print_report+0x118/0x608 [ 37.193904] kasan_report+0xdc/0x128 [ 37.193937] __asan_report_load1_noabort+0x20/0x30 [ 37.193971] mempool_uaf_helper+0x314/0x340 [ 37.194002] mempool_slab_uaf+0xc0/0x118 [ 37.194036] kunit_try_run_case+0x170/0x3f0 [ 37.194072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.194113] kthread+0x328/0x630 [ 37.194142] ret_from_fork+0x10/0x20 [ 37.194176] [ 37.261287] Allocated by task 275: [ 37.264677] kasan_save_stack+0x3c/0x68 [ 37.268492] kasan_save_track+0x20/0x40 [ 37.272312] kasan_save_alloc_info+0x40/0x58 [ 37.276565] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.281775] remove_element+0x16c/0x1f8 [ 37.285593] mempool_alloc_preallocated+0x58/0xc0 [ 37.290280] mempool_uaf_helper+0xa4/0x340 [ 37.294360] mempool_slab_uaf+0xc0/0x118 [ 37.298267] kunit_try_run_case+0x170/0x3f0 [ 37.302433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.307902] kthread+0x328/0x630 [ 37.311114] ret_from_fork+0x10/0x20 [ 37.314672] [ 37.316149] Freed by task 275: [ 37.319188] kasan_save_stack+0x3c/0x68 [ 37.323006] kasan_save_track+0x20/0x40 [ 37.326825] kasan_save_free_info+0x4c/0x78 [ 37.330992] __kasan_mempool_poison_object+0xc0/0x150 [ 37.336027] mempool_free+0x28c/0x328 [ 37.339672] mempool_uaf_helper+0x104/0x340 [ 37.343839] mempool_slab_uaf+0xc0/0x118 [ 37.347745] kunit_try_run_case+0x170/0x3f0 [ 37.351911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.357380] kthread+0x328/0x630 [ 37.360592] ret_from_fork+0x10/0x20 [ 37.364151] [ 37.365628] The buggy address belongs to the object at ffff000805857240 [ 37.365628] which belongs to the cache test_cache of size 123 [ 37.378041] The buggy address is located 0 bytes inside of [ 37.378041] freed 123-byte region [ffff000805857240, ffff0008058572bb) [ 37.390105] [ 37.391583] The buggy address belongs to the physical page: [ 37.397141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885857 [ 37.405125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.411635] page_type: f5(slab) [ 37.414770] raw: 0bfffe0000000000 ffff000801dbb400 dead000000000122 0000000000000000 [ 37.422490] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.430209] page dumped because: kasan: bad access detected [ 37.435766] [ 37.437240] Memory state around the buggy address: [ 37.442021] ffff000805857100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.449223] ffff000805857180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.456429] >ffff000805857200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 37.463628] ^ [ 37.468927] ffff000805857280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.476132] ffff000805857300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.483333] ================================================================== [ 36.579403] ================================================================== [ 36.583617] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.590729] Read of size 1 at addr ffff000801dbdd00 by task kunit_try_catch/271 [ 36.598016] [ 36.599502] CPU: 2 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 36.599561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.599577] Hardware name: WinLink E850-96 board (DT) [ 36.599599] Call trace: [ 36.599613] show_stack+0x20/0x38 (C) [ 36.599651] dump_stack_lvl+0x8c/0xd0 [ 36.599689] print_report+0x118/0x608 [ 36.599725] kasan_report+0xdc/0x128 [ 36.599758] __asan_report_load1_noabort+0x20/0x30 [ 36.599789] mempool_uaf_helper+0x314/0x340 [ 36.599820] mempool_kmalloc_uaf+0xc4/0x120 [ 36.599852] kunit_try_run_case+0x170/0x3f0 [ 36.599887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.599926] kthread+0x328/0x630 [ 36.599954] ret_from_fork+0x10/0x20 [ 36.599992] [ 36.667373] Allocated by task 271: [ 36.670763] kasan_save_stack+0x3c/0x68 [ 36.674578] kasan_save_track+0x20/0x40 [ 36.678399] kasan_save_alloc_info+0x40/0x58 [ 36.682650] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.687946] remove_element+0x130/0x1f8 [ 36.691765] mempool_alloc_preallocated+0x58/0xc0 [ 36.696453] mempool_uaf_helper+0xa4/0x340 [ 36.700532] mempool_kmalloc_uaf+0xc4/0x120 [ 36.704699] kunit_try_run_case+0x170/0x3f0 [ 36.708865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.714336] kthread+0x328/0x630 [ 36.717546] ret_from_fork+0x10/0x20 [ 36.721105] [ 36.722582] Freed by task 271: [ 36.725618] kasan_save_stack+0x3c/0x68 [ 36.729438] kasan_save_track+0x20/0x40 [ 36.733258] kasan_save_free_info+0x4c/0x78 [ 36.737424] __kasan_mempool_poison_object+0xc0/0x150 [ 36.742459] mempool_free+0x28c/0x328 [ 36.746104] mempool_uaf_helper+0x104/0x340 [ 36.750271] mempool_kmalloc_uaf+0xc4/0x120 [ 36.754438] kunit_try_run_case+0x170/0x3f0 [ 36.758604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.764073] kthread+0x328/0x630 [ 36.767285] ret_from_fork+0x10/0x20 [ 36.770843] [ 36.772322] The buggy address belongs to the object at ffff000801dbdd00 [ 36.772322] which belongs to the cache kmalloc-128 of size 128 [ 36.784821] The buggy address is located 0 bytes inside of [ 36.784821] freed 128-byte region [ffff000801dbdd00, ffff000801dbdd80) [ 36.796885] [ 36.798363] The buggy address belongs to the physical page: [ 36.803921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dbc [ 36.811904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.819544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.826487] page_type: f5(slab) [ 36.829624] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.837343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.845070] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.852880] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.860693] head: 0bfffe0000000001 fffffdffe0076f01 00000000ffffffff 00000000ffffffff [ 36.868505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.876311] page dumped because: kasan: bad access detected [ 36.881868] [ 36.883342] Memory state around the buggy address: [ 36.888124] ffff000801dbdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.895326] ffff000801dbdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.902531] >ffff000801dbdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.909730] ^ [ 36.912946] ffff000801dbdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.920152] ffff000801dbde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.927353] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 35.759456] ================================================================== [ 35.759638] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.759771] Read of size 1 at addr ffff000801aa0573 by task kunit_try_catch/265 [ 35.766172] [ 35.767659] CPU: 7 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 35.767718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.767734] Hardware name: WinLink E850-96 board (DT) [ 35.767755] Call trace: [ 35.767768] show_stack+0x20/0x38 (C) [ 35.767808] dump_stack_lvl+0x8c/0xd0 [ 35.767849] print_report+0x118/0x608 [ 35.767884] kasan_report+0xdc/0x128 [ 35.767917] __asan_report_load1_noabort+0x20/0x30 [ 35.767947] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.767979] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.768010] kunit_try_run_case+0x170/0x3f0 [ 35.768048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.768086] kthread+0x328/0x630 [ 35.768117] ret_from_fork+0x10/0x20 [ 35.768151] [ 35.836571] Allocated by task 265: [ 35.839959] kasan_save_stack+0x3c/0x68 [ 35.843774] kasan_save_track+0x20/0x40 [ 35.847594] kasan_save_alloc_info+0x40/0x58 [ 35.851847] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.857142] remove_element+0x130/0x1f8 [ 35.860961] mempool_alloc_preallocated+0x58/0xc0 [ 35.865651] mempool_oob_right_helper+0x98/0x2f0 [ 35.870249] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.874937] kunit_try_run_case+0x170/0x3f0 [ 35.879104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.884572] kthread+0x328/0x630 [ 35.887784] ret_from_fork+0x10/0x20 [ 35.891343] [ 35.892820] The buggy address belongs to the object at ffff000801aa0500 [ 35.892820] which belongs to the cache kmalloc-128 of size 128 [ 35.905322] The buggy address is located 0 bytes to the right of [ 35.905322] allocated 115-byte region [ffff000801aa0500, ffff000801aa0573) [ 35.918252] [ 35.919730] The buggy address belongs to the physical page: [ 35.925289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881aa0 [ 35.933271] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.940911] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.947854] page_type: f5(slab) [ 35.950991] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.958710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.966439] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.974248] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.982060] head: 0bfffe0000000001 fffffdffe006a801 00000000ffffffff 00000000ffffffff [ 35.989872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.997678] page dumped because: kasan: bad access detected [ 36.003235] [ 36.004709] Memory state around the buggy address: [ 36.009492] ffff000801aa0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.016692] ffff000801aa0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.023898] >ffff000801aa0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.031098] ^ [ 36.037959] ffff000801aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.045165] ffff000801aa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.052365] ================================================================== [ 36.296020] ================================================================== [ 36.305752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.313300] Read of size 1 at addr ffff0008061512bb by task kunit_try_catch/269 [ 36.320592] [ 36.322078] CPU: 4 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 36.322139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.322158] Hardware name: WinLink E850-96 board (DT) [ 36.322180] Call trace: [ 36.322193] show_stack+0x20/0x38 (C) [ 36.322230] dump_stack_lvl+0x8c/0xd0 [ 36.322267] print_report+0x118/0x608 [ 36.322305] kasan_report+0xdc/0x128 [ 36.322338] __asan_report_load1_noabort+0x20/0x30 [ 36.322371] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.322402] mempool_slab_oob_right+0xc0/0x118 [ 36.322435] kunit_try_run_case+0x170/0x3f0 [ 36.322473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.322511] kthread+0x328/0x630 [ 36.322538] ret_from_fork+0x10/0x20 [ 36.322575] [ 36.390728] Allocated by task 269: [ 36.394117] kasan_save_stack+0x3c/0x68 [ 36.397933] kasan_save_track+0x20/0x40 [ 36.401752] kasan_save_alloc_info+0x40/0x58 [ 36.406005] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.411215] remove_element+0x16c/0x1f8 [ 36.415033] mempool_alloc_preallocated+0x58/0xc0 [ 36.419721] mempool_oob_right_helper+0x98/0x2f0 [ 36.424321] mempool_slab_oob_right+0xc0/0x118 [ 36.428748] kunit_try_run_case+0x170/0x3f0 [ 36.432915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.438384] kthread+0x328/0x630 [ 36.441595] ret_from_fork+0x10/0x20 [ 36.445154] [ 36.446633] The buggy address belongs to the object at ffff000806151240 [ 36.446633] which belongs to the cache test_cache of size 123 [ 36.459046] The buggy address is located 0 bytes to the right of [ 36.459046] allocated 123-byte region [ffff000806151240, ffff0008061512bb) [ 36.471977] [ 36.473455] The buggy address belongs to the physical page: [ 36.479012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886151 [ 36.486998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.493506] page_type: f5(slab) [ 36.496643] raw: 0bfffe0000000000 ffff000801de7900 dead000000000122 0000000000000000 [ 36.504362] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.512082] page dumped because: kasan: bad access detected [ 36.517637] [ 36.519111] Memory state around the buggy address: [ 36.523895] ffff000806151180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.531094] ffff000806151200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.538300] >ffff000806151280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.545500] ^ [ 36.550538] ffff000806151300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.557743] ffff000806151380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.564944] ================================================================== [ 36.061524] ================================================================== [ 36.071294] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.078842] Read of size 1 at addr ffff000804b16001 by task kunit_try_catch/267 [ 36.086132] [ 36.087619] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 36.087679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.087695] Hardware name: WinLink E850-96 board (DT) [ 36.087716] Call trace: [ 36.087728] show_stack+0x20/0x38 (C) [ 36.087764] dump_stack_lvl+0x8c/0xd0 [ 36.087801] print_report+0x118/0x608 [ 36.087839] kasan_report+0xdc/0x128 [ 36.087870] __asan_report_load1_noabort+0x20/0x30 [ 36.087902] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.087936] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 36.087969] kunit_try_run_case+0x170/0x3f0 [ 36.088006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.088045] kthread+0x328/0x630 [ 36.088075] ret_from_fork+0x10/0x20 [ 36.088112] [ 36.157055] The buggy address belongs to the physical page: [ 36.162611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14 [ 36.170593] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.178235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.185176] page_type: f8(unknown) [ 36.188571] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.196293] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.204020] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.211831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.219643] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff [ 36.227455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.235261] page dumped because: kasan: bad access detected [ 36.240818] [ 36.242292] Memory state around the buggy address: [ 36.247074] ffff000804b15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.254275] ffff000804b15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.261482] >ffff000804b16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.268681] ^ [ 36.271896] ffff000804b16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.279101] ffff000804b16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.286303] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 34.871989] ================================================================== [ 34.872176] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.872310] Read of size 1 at addr ffff000801e2c140 by task kunit_try_catch/259 [ 34.875874] [ 34.877361] CPU: 5 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 34.877419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.877436] Hardware name: WinLink E850-96 board (DT) [ 34.877458] Call trace: [ 34.877477] show_stack+0x20/0x38 (C) [ 34.877515] dump_stack_lvl+0x8c/0xd0 [ 34.877552] print_report+0x118/0x608 [ 34.877587] kasan_report+0xdc/0x128 [ 34.877620] __kasan_check_byte+0x54/0x70 [ 34.877653] kmem_cache_destroy+0x34/0x218 [ 34.877689] kmem_cache_double_destroy+0x174/0x300 [ 34.877722] kunit_try_run_case+0x170/0x3f0 [ 34.877756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.877796] kthread+0x328/0x630 [ 34.877826] ret_from_fork+0x10/0x20 [ 34.877862] [ 34.944970] Allocated by task 259: [ 34.948358] kasan_save_stack+0x3c/0x68 [ 34.952175] kasan_save_track+0x20/0x40 [ 34.955996] kasan_save_alloc_info+0x40/0x58 [ 34.960248] __kasan_slab_alloc+0xa8/0xb0 [ 34.964241] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.968841] __kmem_cache_create_args+0x178/0x280 [ 34.973528] kmem_cache_double_destroy+0xc0/0x300 [ 34.978216] kunit_try_run_case+0x170/0x3f0 [ 34.982383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.987851] kthread+0x328/0x630 [ 34.991064] ret_from_fork+0x10/0x20 [ 34.994622] [ 34.996099] Freed by task 259: [ 34.999137] kasan_save_stack+0x3c/0x68 [ 35.002955] kasan_save_track+0x20/0x40 [ 35.006775] kasan_save_free_info+0x4c/0x78 [ 35.010941] __kasan_slab_free+0x6c/0x98 [ 35.014847] kmem_cache_free+0x260/0x470 [ 35.018754] slab_kmem_cache_release+0x38/0x50 [ 35.023181] kmem_cache_release+0x1c/0x30 [ 35.027174] kobject_put+0x17c/0x430 [ 35.030734] sysfs_slab_release+0x1c/0x30 [ 35.034726] kmem_cache_destroy+0x118/0x218 [ 35.038892] kmem_cache_double_destroy+0x128/0x300 [ 35.043666] kunit_try_run_case+0x170/0x3f0 [ 35.047833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.053302] kthread+0x328/0x630 [ 35.056513] ret_from_fork+0x10/0x20 [ 35.060072] [ 35.061550] The buggy address belongs to the object at ffff000801e2c140 [ 35.061550] which belongs to the cache kmem_cache of size 208 [ 35.073963] The buggy address is located 0 bytes inside of [ 35.073963] freed 208-byte region [ffff000801e2c140, ffff000801e2c210) [ 35.086027] [ 35.087505] The buggy address belongs to the physical page: [ 35.093063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2c [ 35.101047] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.108686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.115629] page_type: f5(slab) [ 35.118766] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.126484] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.134212] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.142022] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.149835] head: 0bfffe0000000001 fffffdffe0078b01 00000000ffffffff 00000000ffffffff [ 35.157647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.165453] page dumped because: kasan: bad access detected [ 35.171010] [ 35.172483] Memory state around the buggy address: [ 35.177265] ffff000801e2c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.184467] ffff000801e2c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 35.191673] >ffff000801e2c100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.198872] ^ [ 35.204171] ffff000801e2c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.211377] ffff000801e2c200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.218577] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 34.480983] ================================================================== [ 34.481178] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 34.481305] Read of size 1 at addr ffff000801e2e000 by task kunit_try_catch/257 [ 34.484694] [ 34.486181] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 34.486238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.486256] Hardware name: WinLink E850-96 board (DT) [ 34.486275] Call trace: [ 34.486287] show_stack+0x20/0x38 (C) [ 34.486326] dump_stack_lvl+0x8c/0xd0 [ 34.486364] print_report+0x118/0x608 [ 34.486401] kasan_report+0xdc/0x128 [ 34.486434] __asan_report_load1_noabort+0x20/0x30 [ 34.486468] kmem_cache_rcu_uaf+0x388/0x468 [ 34.486501] kunit_try_run_case+0x170/0x3f0 [ 34.486538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.486579] kthread+0x328/0x630 [ 34.486608] ret_from_fork+0x10/0x20 [ 34.486644] [ 34.549884] Allocated by task 257: [ 34.553274] kasan_save_stack+0x3c/0x68 [ 34.557089] kasan_save_track+0x20/0x40 [ 34.560908] kasan_save_alloc_info+0x40/0x58 [ 34.565161] __kasan_slab_alloc+0xa8/0xb0 [ 34.569156] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.573755] kmem_cache_rcu_uaf+0x12c/0x468 [ 34.577922] kunit_try_run_case+0x170/0x3f0 [ 34.582090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.587557] kthread+0x328/0x630 [ 34.590769] ret_from_fork+0x10/0x20 [ 34.594328] [ 34.595805] Freed by task 0: [ 34.598672] kasan_save_stack+0x3c/0x68 [ 34.602487] kasan_save_track+0x20/0x40 [ 34.606307] kasan_save_free_info+0x4c/0x78 [ 34.610473] __kasan_slab_free+0x6c/0x98 [ 34.614381] slab_free_after_rcu_debug+0xd4/0x2f8 [ 34.619067] rcu_core+0x9f4/0x1e20 [ 34.622452] rcu_core_si+0x18/0x30 [ 34.625838] handle_softirqs+0x374/0xb28 [ 34.629744] __do_softirq+0x1c/0x28 [ 34.633216] [ 34.634693] Last potentially related work creation: [ 34.639554] kasan_save_stack+0x3c/0x68 [ 34.643372] kasan_record_aux_stack+0xb4/0xc8 [ 34.647713] kmem_cache_free+0x120/0x470 [ 34.651619] kmem_cache_rcu_uaf+0x16c/0x468 [ 34.655785] kunit_try_run_case+0x170/0x3f0 [ 34.659952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.665422] kthread+0x328/0x630 [ 34.668632] ret_from_fork+0x10/0x20 [ 34.672191] [ 34.673668] The buggy address belongs to the object at ffff000801e2e000 [ 34.673668] which belongs to the cache test_cache of size 200 [ 34.686083] The buggy address is located 0 bytes inside of [ 34.686083] freed 200-byte region [ffff000801e2e000, ffff000801e2e0c8) [ 34.698146] [ 34.699624] The buggy address belongs to the physical page: [ 34.705182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2e [ 34.713166] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.720804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.727748] page_type: f5(slab) [ 34.730885] raw: 0bfffe0000000040 ffff00080193e140 dead000000000122 0000000000000000 [ 34.738603] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.746332] head: 0bfffe0000000040 ffff00080193e140 dead000000000122 0000000000000000 [ 34.754141] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.761954] head: 0bfffe0000000001 fffffdffe0078b81 00000000ffffffff 00000000ffffffff [ 34.769766] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.777571] page dumped because: kasan: bad access detected [ 34.783127] [ 34.784603] Memory state around the buggy address: [ 34.789385] ffff000801e2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.796585] ffff000801e2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.803793] >ffff000801e2e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.810991] ^ [ 34.814207] ffff000801e2e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.821411] ffff000801e2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.828614] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 34.095877] ================================================================== [ 34.100244] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 34.107184] Free of addr ffff000801e2e001 by task kunit_try_catch/255 [ 34.113605] [ 34.115093] CPU: 5 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 34.115152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.115170] Hardware name: WinLink E850-96 board (DT) [ 34.115192] Call trace: [ 34.115208] show_stack+0x20/0x38 (C) [ 34.115247] dump_stack_lvl+0x8c/0xd0 [ 34.115287] print_report+0x118/0x608 [ 34.115322] kasan_report_invalid_free+0xc0/0xe8 [ 34.115358] check_slab_allocation+0xfc/0x108 [ 34.115394] __kasan_slab_pre_free+0x2c/0x48 [ 34.115425] kmem_cache_free+0xf0/0x470 [ 34.115460] kmem_cache_invalid_free+0x184/0x3c8 [ 34.115493] kunit_try_run_case+0x170/0x3f0 [ 34.115528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.115568] kthread+0x328/0x630 [ 34.115600] ret_from_fork+0x10/0x20 [ 34.115638] [ 34.187910] Allocated by task 255: [ 34.191298] kasan_save_stack+0x3c/0x68 [ 34.195115] kasan_save_track+0x20/0x40 [ 34.198934] kasan_save_alloc_info+0x40/0x58 [ 34.203187] __kasan_slab_alloc+0xa8/0xb0 [ 34.207180] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.211781] kmem_cache_invalid_free+0x12c/0x3c8 [ 34.216382] kunit_try_run_case+0x170/0x3f0 [ 34.220548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.226018] kthread+0x328/0x630 [ 34.229229] ret_from_fork+0x10/0x20 [ 34.232788] [ 34.234265] The buggy address belongs to the object at ffff000801e2e000 [ 34.234265] which belongs to the cache test_cache of size 200 [ 34.246678] The buggy address is located 1 bytes inside of [ 34.246678] 200-byte region [ffff000801e2e000, ffff000801e2e0c8) [ 34.258221] [ 34.259700] The buggy address belongs to the physical page: [ 34.265257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2e [ 34.273242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.280880] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.287823] page_type: f5(slab) [ 34.290961] raw: 0bfffe0000000040 ffff000801e2c000 dead000000000122 0000000000000000 [ 34.298679] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.306407] head: 0bfffe0000000040 ffff000801e2c000 dead000000000122 0000000000000000 [ 34.314217] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.322030] head: 0bfffe0000000001 fffffdffe0078b81 00000000ffffffff 00000000ffffffff [ 34.329841] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.337647] page dumped because: kasan: bad access detected [ 34.343204] [ 34.344678] Memory state around the buggy address: [ 34.349460] ffff000801e2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.356661] ffff000801e2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.363868] >ffff000801e2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.371067] ^ [ 34.374282] ffff000801e2e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.381487] ffff000801e2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.388689] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.759908] ================================================================== [ 33.760083] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.760207] Free of addr ffff000803ec2000 by task kunit_try_catch/253 [ 33.761614] [ 33.763102] CPU: 4 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 33.763156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.763172] Hardware name: WinLink E850-96 board (DT) [ 33.763192] Call trace: [ 33.763205] show_stack+0x20/0x38 (C) [ 33.763240] dump_stack_lvl+0x8c/0xd0 [ 33.763280] print_report+0x118/0x608 [ 33.763319] kasan_report_invalid_free+0xc0/0xe8 [ 33.763355] check_slab_allocation+0xd4/0x108 [ 33.763391] __kasan_slab_pre_free+0x2c/0x48 [ 33.763422] kmem_cache_free+0xf0/0x470 [ 33.763454] kmem_cache_double_free+0x190/0x3c8 [ 33.763486] kunit_try_run_case+0x170/0x3f0 [ 33.763520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.763558] kthread+0x328/0x630 [ 33.763587] ret_from_fork+0x10/0x20 [ 33.763622] [ 33.835832] Allocated by task 253: [ 33.839220] kasan_save_stack+0x3c/0x68 [ 33.843037] kasan_save_track+0x20/0x40 [ 33.846858] kasan_save_alloc_info+0x40/0x58 [ 33.851110] __kasan_slab_alloc+0xa8/0xb0 [ 33.855103] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 33.859703] kmem_cache_double_free+0x12c/0x3c8 [ 33.864217] kunit_try_run_case+0x170/0x3f0 [ 33.868383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.873852] kthread+0x328/0x630 [ 33.877064] ret_from_fork+0x10/0x20 [ 33.880623] [ 33.882100] Freed by task 253: [ 33.885138] kasan_save_stack+0x3c/0x68 [ 33.888956] kasan_save_track+0x20/0x40 [ 33.892775] kasan_save_free_info+0x4c/0x78 [ 33.896942] __kasan_slab_free+0x6c/0x98 [ 33.900850] kmem_cache_free+0x260/0x470 [ 33.904754] kmem_cache_double_free+0x140/0x3c8 [ 33.909269] kunit_try_run_case+0x170/0x3f0 [ 33.913435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.918904] kthread+0x328/0x630 [ 33.922115] ret_from_fork+0x10/0x20 [ 33.925674] [ 33.927153] The buggy address belongs to the object at ffff000803ec2000 [ 33.927153] which belongs to the cache test_cache of size 200 [ 33.939565] The buggy address is located 0 bytes inside of [ 33.939565] 200-byte region [ffff000803ec2000, ffff000803ec20c8) [ 33.951108] [ 33.952586] The buggy address belongs to the physical page: [ 33.958144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883ec2 [ 33.966128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.973768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.980709] page_type: f5(slab) [ 33.983847] raw: 0bfffe0000000040 ffff000801de7680 dead000000000122 0000000000000000 [ 33.991565] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.999293] head: 0bfffe0000000040 ffff000801de7680 dead000000000122 0000000000000000 [ 34.007103] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.014916] head: 0bfffe0000000001 fffffdffe00fb081 00000000ffffffff 00000000ffffffff [ 34.022728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.030534] page dumped because: kasan: bad access detected [ 34.036091] [ 34.037566] Memory state around the buggy address: [ 34.042347] ffff000803ec1f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.049549] ffff000803ec1f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 34.056755] >ffff000803ec2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.063953] ^ [ 34.067169] ffff000803ec2080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.074374] ffff000803ec2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.081576] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 33.427432] ================================================================== [ 33.436897] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 33.443580] Read of size 1 at addr ffff0008058260c8 by task kunit_try_catch/251 [ 33.450869] [ 33.452355] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 33.452411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.452427] Hardware name: WinLink E850-96 board (DT) [ 33.452450] Call trace: [ 33.452465] show_stack+0x20/0x38 (C) [ 33.452503] dump_stack_lvl+0x8c/0xd0 [ 33.452541] print_report+0x118/0x608 [ 33.452580] kasan_report+0xdc/0x128 [ 33.452614] __asan_report_load1_noabort+0x20/0x30 [ 33.452648] kmem_cache_oob+0x344/0x430 [ 33.452677] kunit_try_run_case+0x170/0x3f0 [ 33.452714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.452754] kthread+0x328/0x630 [ 33.452782] ret_from_fork+0x10/0x20 [ 33.452819] [ 33.515712] Allocated by task 251: [ 33.519101] kasan_save_stack+0x3c/0x68 [ 33.522916] kasan_save_track+0x20/0x40 [ 33.526735] kasan_save_alloc_info+0x40/0x58 [ 33.530989] __kasan_slab_alloc+0xa8/0xb0 [ 33.534983] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 33.539582] kmem_cache_oob+0x12c/0x430 [ 33.543402] kunit_try_run_case+0x170/0x3f0 [ 33.547569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.553037] kthread+0x328/0x630 [ 33.556249] ret_from_fork+0x10/0x20 [ 33.559808] [ 33.561285] The buggy address belongs to the object at ffff000805826000 [ 33.561285] which belongs to the cache test_cache of size 200 [ 33.573698] The buggy address is located 0 bytes to the right of [ 33.573698] allocated 200-byte region [ffff000805826000, ffff0008058260c8) [ 33.586630] [ 33.588108] The buggy address belongs to the physical page: [ 33.593666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826 [ 33.601650] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.609290] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.616232] page_type: f5(slab) [ 33.619369] raw: 0bfffe0000000040 ffff00080177be00 dead000000000122 0000000000000000 [ 33.627088] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.634814] head: 0bfffe0000000040 ffff00080177be00 dead000000000122 0000000000000000 [ 33.642627] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.650438] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff [ 33.658250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.666056] page dumped because: kasan: bad access detected [ 33.671613] [ 33.673087] Memory state around the buggy address: [ 33.677868] ffff000805825f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.685072] ffff000805826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.692276] >ffff000805826080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.699476] ^ [ 33.705035] ffff000805826100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.712240] ffff000805826180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.719441] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 33.091473] ================================================================== [ 33.091629] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 33.095580] Read of size 8 at addr ffff000804990f80 by task kunit_try_catch/244 [ 33.102870] [ 33.104357] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 33.104411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.104428] Hardware name: WinLink E850-96 board (DT) [ 33.104448] Call trace: [ 33.104465] show_stack+0x20/0x38 (C) [ 33.104502] dump_stack_lvl+0x8c/0xd0 [ 33.104538] print_report+0x118/0x608 [ 33.104575] kasan_report+0xdc/0x128 [ 33.104607] __asan_report_load8_noabort+0x20/0x30 [ 33.104640] workqueue_uaf+0x480/0x4a8 [ 33.104671] kunit_try_run_case+0x170/0x3f0 [ 33.104711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.104748] kthread+0x328/0x630 [ 33.104773] ret_from_fork+0x10/0x20 [ 33.104809] [ 33.167626] Allocated by task 244: [ 33.171015] kasan_save_stack+0x3c/0x68 [ 33.174831] kasan_save_track+0x20/0x40 [ 33.178652] kasan_save_alloc_info+0x40/0x58 [ 33.182904] __kasan_kmalloc+0xd4/0xd8 [ 33.186636] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.191150] workqueue_uaf+0x13c/0x4a8 [ 33.194883] kunit_try_run_case+0x170/0x3f0 [ 33.199049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.204518] kthread+0x328/0x630 [ 33.207730] ret_from_fork+0x10/0x20 [ 33.211289] [ 33.212763] Freed by task 118: [ 33.215804] kasan_save_stack+0x3c/0x68 [ 33.219622] kasan_save_track+0x20/0x40 [ 33.223441] kasan_save_free_info+0x4c/0x78 [ 33.227608] __kasan_slab_free+0x6c/0x98 [ 33.231514] kfree+0x214/0x3c8 [ 33.234552] workqueue_uaf_work+0x18/0x30 [ 33.238545] process_one_work+0x530/0xf98 [ 33.242539] worker_thread+0x8ac/0xf28 [ 33.246271] kthread+0x328/0x630 [ 33.249483] ret_from_fork+0x10/0x20 [ 33.253042] [ 33.254519] Last potentially related work creation: [ 33.259380] kasan_save_stack+0x3c/0x68 [ 33.263198] kasan_record_aux_stack+0xb4/0xc8 [ 33.267538] __queue_work+0x65c/0x1010 [ 33.271271] queue_work_on+0xbc/0xf8 [ 33.274830] workqueue_uaf+0x210/0x4a8 [ 33.278562] kunit_try_run_case+0x170/0x3f0 [ 33.282728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.288197] kthread+0x328/0x630 [ 33.291409] ret_from_fork+0x10/0x20 [ 33.294968] [ 33.296445] The buggy address belongs to the object at ffff000804990f80 [ 33.296445] which belongs to the cache kmalloc-32 of size 32 [ 33.308770] The buggy address is located 0 bytes inside of [ 33.308770] freed 32-byte region [ffff000804990f80, ffff000804990fa0) [ 33.320749] [ 33.322227] The buggy address belongs to the physical page: [ 33.327785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884990 [ 33.335771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.342278] page_type: f5(slab) [ 33.345415] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 33.353133] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.360854] page dumped because: kasan: bad access detected [ 33.366409] [ 33.367883] Memory state around the buggy address: [ 33.372665] ffff000804990e80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 33.379866] ffff000804990f00: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 33.387071] >ffff000804990f80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.394272] ^ [ 33.397489] ffff000804991000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.404692] ffff000804991080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.411893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.712801] ================================================================== [ 32.712971] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.713086] Read of size 4 at addr ffff000805002440 by task swapper/5/0 [ 32.714161] [ 32.715647] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.715700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.715717] Hardware name: WinLink E850-96 board (DT) [ 32.715737] Call trace: [ 32.715750] show_stack+0x20/0x38 (C) [ 32.715784] dump_stack_lvl+0x8c/0xd0 [ 32.715824] print_report+0x118/0x608 [ 32.715859] kasan_report+0xdc/0x128 [ 32.715889] __asan_report_load4_noabort+0x20/0x30 [ 32.715923] rcu_uaf_reclaim+0x64/0x70 [ 32.715952] rcu_core+0x9f4/0x1e20 [ 32.715986] rcu_core_si+0x18/0x30 [ 32.716014] handle_softirqs+0x374/0xb28 [ 32.716049] __do_softirq+0x1c/0x28 [ 32.716077] ____do_softirq+0x18/0x30 [ 32.716112] call_on_irq_stack+0x24/0x30 [ 32.716143] do_softirq_own_stack+0x24/0x38 [ 32.716172] __irq_exit_rcu+0x1fc/0x318 [ 32.716203] irq_exit_rcu+0x1c/0x80 [ 32.716232] el1_interrupt+0x38/0x58 [ 32.716261] el1h_64_irq_handler+0x18/0x28 [ 32.716291] el1h_64_irq+0x6c/0x70 [ 32.716320] arch_local_irq_enable+0x4/0x8 (P) [ 32.716353] do_idle+0x384/0x4e8 [ 32.716384] cpu_startup_entry+0x68/0x80 [ 32.716416] secondary_start_kernel+0x288/0x340 [ 32.716449] __secondary_switched+0xc0/0xc8 [ 32.716492] [ 32.826226] Allocated by task 242: [ 32.829613] kasan_save_stack+0x3c/0x68 [ 32.833430] kasan_save_track+0x20/0x40 [ 32.837249] kasan_save_alloc_info+0x40/0x58 [ 32.841503] __kasan_kmalloc+0xd4/0xd8 [ 32.845237] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.849749] rcu_uaf+0xb0/0x2d8 [ 32.852874] kunit_try_run_case+0x170/0x3f0 [ 32.857041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862509] kthread+0x328/0x630 [ 32.865721] ret_from_fork+0x10/0x20 [ 32.869280] [ 32.870756] Freed by task 0: [ 32.873623] kasan_save_stack+0x3c/0x68 [ 32.877440] kasan_save_track+0x20/0x40 [ 32.881259] kasan_save_free_info+0x4c/0x78 [ 32.885426] __kasan_slab_free+0x6c/0x98 [ 32.889332] kfree+0x214/0x3c8 [ 32.892370] rcu_uaf_reclaim+0x28/0x70 [ 32.896103] rcu_core+0x9f4/0x1e20 [ 32.899488] rcu_core_si+0x18/0x30 [ 32.902875] handle_softirqs+0x374/0xb28 [ 32.906780] __do_softirq+0x1c/0x28 [ 32.910252] [ 32.911729] Last potentially related work creation: [ 32.916590] kasan_save_stack+0x3c/0x68 [ 32.920408] kasan_record_aux_stack+0xb4/0xc8 [ 32.924748] __call_rcu_common.constprop.0+0x70/0x8b0 [ 32.929783] call_rcu+0x18/0x30 [ 32.932908] rcu_uaf+0x14c/0x2d8 [ 32.936119] kunit_try_run_case+0x170/0x3f0 [ 32.940286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.945755] kthread+0x328/0x630 [ 32.948966] ret_from_fork+0x10/0x20 [ 32.952526] [ 32.954002] The buggy address belongs to the object at ffff000805002440 [ 32.954002] which belongs to the cache kmalloc-32 of size 32 [ 32.966329] The buggy address is located 0 bytes inside of [ 32.966329] freed 32-byte region [ffff000805002440, ffff000805002460) [ 32.978306] [ 32.979784] The buggy address belongs to the physical page: [ 32.985342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885002 [ 32.993327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.999835] page_type: f5(slab) [ 33.002972] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 33.010691] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.018410] page dumped because: kasan: bad access detected [ 33.023966] [ 33.025441] Memory state around the buggy address: [ 33.030222] ffff000805002300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.037423] ffff000805002380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.044630] >ffff000805002400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.051829] ^ [ 33.057128] ffff000805002480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.064333] ffff000805002500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.071535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.351317] ================================================================== [ 32.358415] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.364748] Read of size 1 at addr ffff000803eb5978 by task kunit_try_catch/240 [ 32.372039] [ 32.373521] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.373575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.373589] Hardware name: WinLink E850-96 board (DT) [ 32.373609] Call trace: [ 32.373619] show_stack+0x20/0x38 (C) [ 32.373652] dump_stack_lvl+0x8c/0xd0 [ 32.373689] print_report+0x118/0x608 [ 32.373723] kasan_report+0xdc/0x128 [ 32.373756] __asan_report_load1_noabort+0x20/0x30 [ 32.373785] ksize_uaf+0x544/0x5f8 [ 32.373813] kunit_try_run_case+0x170/0x3f0 [ 32.373847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.373885] kthread+0x328/0x630 [ 32.373912] ret_from_fork+0x10/0x20 [ 32.373944] [ 32.436448] Allocated by task 240: [ 32.439834] kasan_save_stack+0x3c/0x68 [ 32.443653] kasan_save_track+0x20/0x40 [ 32.447472] kasan_save_alloc_info+0x40/0x58 [ 32.451726] __kasan_kmalloc+0xd4/0xd8 [ 32.455458] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.459972] ksize_uaf+0xb8/0x5f8 [ 32.463270] kunit_try_run_case+0x170/0x3f0 [ 32.467437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.472906] kthread+0x328/0x630 [ 32.476118] ret_from_fork+0x10/0x20 [ 32.479677] [ 32.481152] Freed by task 240: [ 32.484190] kasan_save_stack+0x3c/0x68 [ 32.488010] kasan_save_track+0x20/0x40 [ 32.491829] kasan_save_free_info+0x4c/0x78 [ 32.495996] __kasan_slab_free+0x6c/0x98 [ 32.499902] kfree+0x214/0x3c8 [ 32.502940] ksize_uaf+0x11c/0x5f8 [ 32.506326] kunit_try_run_case+0x170/0x3f0 [ 32.510492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.515961] kthread+0x328/0x630 [ 32.519172] ret_from_fork+0x10/0x20 [ 32.522732] [ 32.524208] The buggy address belongs to the object at ffff000803eb5900 [ 32.524208] which belongs to the cache kmalloc-128 of size 128 [ 32.536707] The buggy address is located 120 bytes inside of [ 32.536707] freed 128-byte region [ffff000803eb5900, ffff000803eb5980) [ 32.548946] [ 32.550424] The buggy address belongs to the physical page: [ 32.555980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 32.563964] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.571602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.578548] page_type: f5(slab) [ 32.581681] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.589404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.597130] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.604941] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.612754] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 32.620566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.628372] page dumped because: kasan: bad access detected [ 32.633927] [ 32.635403] Memory state around the buggy address: [ 32.640181] ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.647386] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.654591] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.661792] ^ [ 32.668913] ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676118] ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.683319] ================================================================== [ 31.676050] ================================================================== [ 31.685856] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.692190] Read of size 1 at addr ffff000803eb5900 by task kunit_try_catch/240 [ 31.699480] [ 31.700964] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.701016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.701031] Hardware name: WinLink E850-96 board (DT) [ 31.701051] Call trace: [ 31.701066] show_stack+0x20/0x38 (C) [ 31.701104] dump_stack_lvl+0x8c/0xd0 [ 31.701142] print_report+0x118/0x608 [ 31.701178] kasan_report+0xdc/0x128 [ 31.701208] __kasan_check_byte+0x54/0x70 [ 31.701243] ksize+0x30/0x88 [ 31.701277] ksize_uaf+0x168/0x5f8 [ 31.701305] kunit_try_run_case+0x170/0x3f0 [ 31.701342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.701380] kthread+0x328/0x630 [ 31.701408] ret_from_fork+0x10/0x20 [ 31.701444] [ 31.765973] Allocated by task 240: [ 31.769360] kasan_save_stack+0x3c/0x68 [ 31.773176] kasan_save_track+0x20/0x40 [ 31.776996] kasan_save_alloc_info+0x40/0x58 [ 31.781250] __kasan_kmalloc+0xd4/0xd8 [ 31.784982] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.789496] ksize_uaf+0xb8/0x5f8 [ 31.792794] kunit_try_run_case+0x170/0x3f0 [ 31.796961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.802429] kthread+0x328/0x630 [ 31.805642] ret_from_fork+0x10/0x20 [ 31.809200] [ 31.810676] Freed by task 240: [ 31.813716] kasan_save_stack+0x3c/0x68 [ 31.817534] kasan_save_track+0x20/0x40 [ 31.821353] kasan_save_free_info+0x4c/0x78 [ 31.825520] __kasan_slab_free+0x6c/0x98 [ 31.829426] kfree+0x214/0x3c8 [ 31.832464] ksize_uaf+0x11c/0x5f8 [ 31.835850] kunit_try_run_case+0x170/0x3f0 [ 31.840016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.845485] kthread+0x328/0x630 [ 31.848696] ret_from_fork+0x10/0x20 [ 31.852256] [ 31.853734] The buggy address belongs to the object at ffff000803eb5900 [ 31.853734] which belongs to the cache kmalloc-128 of size 128 [ 31.866233] The buggy address is located 0 bytes inside of [ 31.866233] freed 128-byte region [ffff000803eb5900, ffff000803eb5980) [ 31.878296] [ 31.879776] The buggy address belongs to the physical page: [ 31.885332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 31.893317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.900956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.907899] page_type: f5(slab) [ 31.911036] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.918754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.926481] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.934292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.942105] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.949917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.957723] page dumped because: kasan: bad access detected [ 31.963279] [ 31.964754] Memory state around the buggy address: [ 31.969533] ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.976736] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.983941] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.991142] ^ [ 31.994358] ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.001563] ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.008763] ================================================================== [ 32.016297] ================================================================== [ 32.023178] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.029510] Read of size 1 at addr ffff000803eb5900 by task kunit_try_catch/240 [ 32.036801] [ 32.038284] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.038340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.038356] Hardware name: WinLink E850-96 board (DT) [ 32.038375] Call trace: [ 32.038386] show_stack+0x20/0x38 (C) [ 32.038421] dump_stack_lvl+0x8c/0xd0 [ 32.038457] print_report+0x118/0x608 [ 32.038490] kasan_report+0xdc/0x128 [ 32.038522] __asan_report_load1_noabort+0x20/0x30 [ 32.038554] ksize_uaf+0x598/0x5f8 [ 32.038582] kunit_try_run_case+0x170/0x3f0 [ 32.038615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.038653] kthread+0x328/0x630 [ 32.038679] ret_from_fork+0x10/0x20 [ 32.038710] [ 32.101211] Allocated by task 240: [ 32.104596] kasan_save_stack+0x3c/0x68 [ 32.108415] kasan_save_track+0x20/0x40 [ 32.112234] kasan_save_alloc_info+0x40/0x58 [ 32.116487] __kasan_kmalloc+0xd4/0xd8 [ 32.120220] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.124734] ksize_uaf+0xb8/0x5f8 [ 32.128032] kunit_try_run_case+0x170/0x3f0 [ 32.132199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.137667] kthread+0x328/0x630 [ 32.140879] ret_from_fork+0x10/0x20 [ 32.144438] [ 32.145914] Freed by task 240: [ 32.148952] kasan_save_stack+0x3c/0x68 [ 32.152771] kasan_save_track+0x20/0x40 [ 32.156591] kasan_save_free_info+0x4c/0x78 [ 32.160757] __kasan_slab_free+0x6c/0x98 [ 32.164664] kfree+0x214/0x3c8 [ 32.167702] ksize_uaf+0x11c/0x5f8 [ 32.171087] kunit_try_run_case+0x170/0x3f0 [ 32.175254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.180723] kthread+0x328/0x630 [ 32.183935] ret_from_fork+0x10/0x20 [ 32.187493] [ 32.188971] The buggy address belongs to the object at ffff000803eb5900 [ 32.188971] which belongs to the cache kmalloc-128 of size 128 [ 32.201469] The buggy address is located 0 bytes inside of [ 32.201469] freed 128-byte region [ffff000803eb5900, ffff000803eb5980) [ 32.213535] [ 32.215012] The buggy address belongs to the physical page: [ 32.220571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 32.228552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.236191] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.243136] page_type: f5(slab) [ 32.246271] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.253992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.261718] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.269530] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.277343] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 32.285154] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.292960] page dumped because: kasan: bad access detected [ 32.298517] [ 32.299991] Memory state around the buggy address: [ 32.304770] ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.311975] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.319179] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.326380] ^ [ 32.329596] ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.336802] ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.344003] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.073984] ================================================================== [ 31.081004] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.088378] Read of size 1 at addr ffff000803eb5878 by task kunit_try_catch/238 [ 31.095670] [ 31.097155] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.097210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.097225] Hardware name: WinLink E850-96 board (DT) [ 31.097246] Call trace: [ 31.097260] show_stack+0x20/0x38 (C) [ 31.097295] dump_stack_lvl+0x8c/0xd0 [ 31.097331] print_report+0x118/0x608 [ 31.097366] kasan_report+0xdc/0x128 [ 31.097398] __asan_report_load1_noabort+0x20/0x30 [ 31.097429] ksize_unpoisons_memory+0x618/0x740 [ 31.097460] kunit_try_run_case+0x170/0x3f0 [ 31.097494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.097532] kthread+0x328/0x630 [ 31.097560] ret_from_fork+0x10/0x20 [ 31.097596] [ 31.161207] Allocated by task 238: [ 31.164595] kasan_save_stack+0x3c/0x68 [ 31.168412] kasan_save_track+0x20/0x40 [ 31.172231] kasan_save_alloc_info+0x40/0x58 [ 31.176484] __kasan_kmalloc+0xd4/0xd8 [ 31.180217] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.184731] ksize_unpoisons_memory+0xc0/0x740 [ 31.189157] kunit_try_run_case+0x170/0x3f0 [ 31.193325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.198793] kthread+0x328/0x630 [ 31.202005] ret_from_fork+0x10/0x20 [ 31.205564] [ 31.207039] The buggy address belongs to the object at ffff000803eb5800 [ 31.207039] which belongs to the cache kmalloc-128 of size 128 [ 31.219539] The buggy address is located 5 bytes to the right of [ 31.219539] allocated 115-byte region [ffff000803eb5800, ffff000803eb5873) [ 31.232473] [ 31.233951] The buggy address belongs to the physical page: [ 31.239507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 31.247492] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.255129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.262075] page_type: f5(slab) [ 31.265210] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.272930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.280657] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.288468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.296281] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.304093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.311899] page dumped because: kasan: bad access detected [ 31.317456] [ 31.318930] Memory state around the buggy address: [ 31.323709] ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.330913] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.338117] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.345319] ^ [ 31.352440] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359645] ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.366846] ================================================================== [ 30.771339] ================================================================== [ 30.781008] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.788384] Read of size 1 at addr ffff000803eb5873 by task kunit_try_catch/238 [ 30.795675] [ 30.797163] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.797221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.797236] Hardware name: WinLink E850-96 board (DT) [ 30.797256] Call trace: [ 30.797273] show_stack+0x20/0x38 (C) [ 30.797310] dump_stack_lvl+0x8c/0xd0 [ 30.797351] print_report+0x118/0x608 [ 30.797387] kasan_report+0xdc/0x128 [ 30.797418] __asan_report_load1_noabort+0x20/0x30 [ 30.797448] ksize_unpoisons_memory+0x628/0x740 [ 30.797481] kunit_try_run_case+0x170/0x3f0 [ 30.797519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.797559] kthread+0x328/0x630 [ 30.797590] ret_from_fork+0x10/0x20 [ 30.797627] [ 30.861211] Allocated by task 238: [ 30.864599] kasan_save_stack+0x3c/0x68 [ 30.868416] kasan_save_track+0x20/0x40 [ 30.872235] kasan_save_alloc_info+0x40/0x58 [ 30.876489] __kasan_kmalloc+0xd4/0xd8 [ 30.880223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.884735] ksize_unpoisons_memory+0xc0/0x740 [ 30.889162] kunit_try_run_case+0x170/0x3f0 [ 30.893329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.898798] kthread+0x328/0x630 [ 30.902009] ret_from_fork+0x10/0x20 [ 30.905568] [ 30.907046] The buggy address belongs to the object at ffff000803eb5800 [ 30.907046] which belongs to the cache kmalloc-128 of size 128 [ 30.919547] The buggy address is located 0 bytes to the right of [ 30.919547] allocated 115-byte region [ffff000803eb5800, ffff000803eb5873) [ 30.932477] [ 30.933956] The buggy address belongs to the physical page: [ 30.939514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 30.947497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.955137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.962079] page_type: f5(slab) [ 30.965217] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.972935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.980663] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.988473] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.996286] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.004097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.011903] page dumped because: kasan: bad access detected [ 31.017460] [ 31.018934] Memory state around the buggy address: [ 31.023715] ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.030917] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.038122] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.045323] ^ [ 31.052184] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.059389] ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.066590] ================================================================== [ 31.374165] ================================================================== [ 31.381260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.388637] Read of size 1 at addr ffff000803eb587f by task kunit_try_catch/238 [ 31.395925] [ 31.397410] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.397462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.397479] Hardware name: WinLink E850-96 board (DT) [ 31.397499] Call trace: [ 31.397511] show_stack+0x20/0x38 (C) [ 31.397546] dump_stack_lvl+0x8c/0xd0 [ 31.397582] print_report+0x118/0x608 [ 31.397619] kasan_report+0xdc/0x128 [ 31.397651] __asan_report_load1_noabort+0x20/0x30 [ 31.397679] ksize_unpoisons_memory+0x690/0x740 [ 31.397710] kunit_try_run_case+0x170/0x3f0 [ 31.397743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.397783] kthread+0x328/0x630 [ 31.397811] ret_from_fork+0x10/0x20 [ 31.397846] [ 31.461463] Allocated by task 238: [ 31.464848] kasan_save_stack+0x3c/0x68 [ 31.468668] kasan_save_track+0x20/0x40 [ 31.472487] kasan_save_alloc_info+0x40/0x58 [ 31.476740] __kasan_kmalloc+0xd4/0xd8 [ 31.480473] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.484987] ksize_unpoisons_memory+0xc0/0x740 [ 31.489414] kunit_try_run_case+0x170/0x3f0 [ 31.493580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.499049] kthread+0x328/0x630 [ 31.502261] ret_from_fork+0x10/0x20 [ 31.505820] [ 31.507297] The buggy address belongs to the object at ffff000803eb5800 [ 31.507297] which belongs to the cache kmalloc-128 of size 128 [ 31.519796] The buggy address is located 12 bytes to the right of [ 31.519796] allocated 115-byte region [ffff000803eb5800, ffff000803eb5873) [ 31.532816] [ 31.534295] The buggy address belongs to the physical page: [ 31.539850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 31.547836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.555473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.562416] page_type: f5(slab) [ 31.565552] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.573273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.581001] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.588811] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.596624] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.604436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.612242] page dumped because: kasan: bad access detected [ 31.617798] [ 31.619273] Memory state around the buggy address: [ 31.624053] ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.631256] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.638460] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.645661] ^ [ 31.652782] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.659987] ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.667189] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.457547] ================================================================== [ 30.464520] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.470506] Free of addr ffff00080147da00 by task kunit_try_catch/236 [ 30.476929] [ 30.478412] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.478462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.478476] Hardware name: WinLink E850-96 board (DT) [ 30.478498] Call trace: [ 30.478510] show_stack+0x20/0x38 (C) [ 30.478546] dump_stack_lvl+0x8c/0xd0 [ 30.478584] print_report+0x118/0x608 [ 30.478617] kasan_report_invalid_free+0xc0/0xe8 [ 30.478650] check_slab_allocation+0xd4/0x108 [ 30.478684] __kasan_slab_pre_free+0x2c/0x48 [ 30.478715] kfree+0xe8/0x3c8 [ 30.478746] kfree_sensitive+0x3c/0xb0 [ 30.478776] kmalloc_double_kzfree+0x168/0x308 [ 30.478807] kunit_try_run_case+0x170/0x3f0 [ 30.478843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.478884] kthread+0x328/0x630 [ 30.478911] ret_from_fork+0x10/0x20 [ 30.478946] [ 30.553924] Allocated by task 236: [ 30.557313] kasan_save_stack+0x3c/0x68 [ 30.561129] kasan_save_track+0x20/0x40 [ 30.564948] kasan_save_alloc_info+0x40/0x58 [ 30.569202] __kasan_kmalloc+0xd4/0xd8 [ 30.572935] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.577448] kmalloc_double_kzfree+0xb8/0x308 [ 30.581788] kunit_try_run_case+0x170/0x3f0 [ 30.585955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.591424] kthread+0x328/0x630 [ 30.594636] ret_from_fork+0x10/0x20 [ 30.598195] [ 30.599670] Freed by task 236: [ 30.602708] kasan_save_stack+0x3c/0x68 [ 30.606528] kasan_save_track+0x20/0x40 [ 30.610347] kasan_save_free_info+0x4c/0x78 [ 30.614514] __kasan_slab_free+0x6c/0x98 [ 30.618421] kfree+0x214/0x3c8 [ 30.621458] kfree_sensitive+0x80/0xb0 [ 30.625191] kmalloc_double_kzfree+0x11c/0x308 [ 30.629617] kunit_try_run_case+0x170/0x3f0 [ 30.633784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.639253] kthread+0x328/0x630 [ 30.642465] ret_from_fork+0x10/0x20 [ 30.646024] [ 30.647501] The buggy address belongs to the object at ffff00080147da00 [ 30.647501] which belongs to the cache kmalloc-16 of size 16 [ 30.659829] The buggy address is located 0 bytes inside of [ 30.659829] 16-byte region [ffff00080147da00, ffff00080147da10) [ 30.671283] [ 30.672761] The buggy address belongs to the physical page: [ 30.678319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88147d [ 30.686304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.692811] page_type: f5(slab) [ 30.695947] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.703668] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.711387] page dumped because: kasan: bad access detected [ 30.716944] [ 30.718418] Memory state around the buggy address: [ 30.723200] ffff00080147d900: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.730401] ffff00080147d980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.737607] >ffff00080147da00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.744807] ^ [ 30.748022] ffff00080147da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.755227] ffff00080147db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.762428] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.144184] ================================================================== [ 30.158017] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.165392] Read of size 1 at addr ffff00080147da00 by task kunit_try_catch/236 [ 30.172681] [ 30.174169] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.174225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.174242] Hardware name: WinLink E850-96 board (DT) [ 30.174263] Call trace: [ 30.174277] show_stack+0x20/0x38 (C) [ 30.174318] dump_stack_lvl+0x8c/0xd0 [ 30.174356] print_report+0x118/0x608 [ 30.174395] kasan_report+0xdc/0x128 [ 30.174427] __kasan_check_byte+0x54/0x70 [ 30.174459] kfree_sensitive+0x30/0xb0 [ 30.174494] kmalloc_double_kzfree+0x168/0x308 [ 30.174524] kunit_try_run_case+0x170/0x3f0 [ 30.174559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.174597] kthread+0x328/0x630 [ 30.174628] ret_from_fork+0x10/0x20 [ 30.174663] [ 30.241082] Allocated by task 236: [ 30.244471] kasan_save_stack+0x3c/0x68 [ 30.248286] kasan_save_track+0x20/0x40 [ 30.252107] kasan_save_alloc_info+0x40/0x58 [ 30.256359] __kasan_kmalloc+0xd4/0xd8 [ 30.260092] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.264606] kmalloc_double_kzfree+0xb8/0x308 [ 30.268946] kunit_try_run_case+0x170/0x3f0 [ 30.273112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.278581] kthread+0x328/0x630 [ 30.281793] ret_from_fork+0x10/0x20 [ 30.285352] [ 30.286827] Freed by task 236: [ 30.289866] kasan_save_stack+0x3c/0x68 [ 30.293685] kasan_save_track+0x20/0x40 [ 30.297504] kasan_save_free_info+0x4c/0x78 [ 30.301671] __kasan_slab_free+0x6c/0x98 [ 30.305579] kfree+0x214/0x3c8 [ 30.308615] kfree_sensitive+0x80/0xb0 [ 30.312348] kmalloc_double_kzfree+0x11c/0x308 [ 30.316774] kunit_try_run_case+0x170/0x3f0 [ 30.320942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.326410] kthread+0x328/0x630 [ 30.329622] ret_from_fork+0x10/0x20 [ 30.333181] [ 30.334658] The buggy address belongs to the object at ffff00080147da00 [ 30.334658] which belongs to the cache kmalloc-16 of size 16 [ 30.346985] The buggy address is located 0 bytes inside of [ 30.346985] freed 16-byte region [ffff00080147da00, ffff00080147da10) [ 30.358962] [ 30.360441] The buggy address belongs to the physical page: [ 30.365998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88147d [ 30.373982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.380491] page_type: f5(slab) [ 30.383627] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.391347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.399067] page dumped because: kasan: bad access detected [ 30.404622] [ 30.406096] Memory state around the buggy address: [ 30.410879] ffff00080147d900: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.418080] ffff00080147d980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.425285] >ffff00080147da00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.432485] ^ [ 30.435701] ffff00080147da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.442905] ffff00080147db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.450107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 29.840002] ================================================================== [ 29.849338] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.855932] Read of size 1 at addr ffff000800c2e128 by task kunit_try_catch/232 [ 29.863223] [ 29.864708] CPU: 5 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.864764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.864779] Hardware name: WinLink E850-96 board (DT) [ 29.864800] Call trace: [ 29.864812] show_stack+0x20/0x38 (C) [ 29.864848] dump_stack_lvl+0x8c/0xd0 [ 29.864885] print_report+0x118/0x608 [ 29.864921] kasan_report+0xdc/0x128 [ 29.864951] __asan_report_load1_noabort+0x20/0x30 [ 29.864985] kmalloc_uaf2+0x3f4/0x468 [ 29.865012] kunit_try_run_case+0x170/0x3f0 [ 29.865046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.865086] kthread+0x328/0x630 [ 29.865115] ret_from_fork+0x10/0x20 [ 29.865150] [ 29.927892] Allocated by task 232: [ 29.931280] kasan_save_stack+0x3c/0x68 [ 29.935096] kasan_save_track+0x20/0x40 [ 29.938918] kasan_save_alloc_info+0x40/0x58 [ 29.943170] __kasan_kmalloc+0xd4/0xd8 [ 29.946902] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.951416] kmalloc_uaf2+0xc4/0x468 [ 29.954975] kunit_try_run_case+0x170/0x3f0 [ 29.959142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.964610] kthread+0x328/0x630 [ 29.967822] ret_from_fork+0x10/0x20 [ 29.971381] [ 29.972856] Freed by task 232: [ 29.975895] kasan_save_stack+0x3c/0x68 [ 29.979714] kasan_save_track+0x20/0x40 [ 29.983533] kasan_save_free_info+0x4c/0x78 [ 29.987700] __kasan_slab_free+0x6c/0x98 [ 29.991608] kfree+0x214/0x3c8 [ 29.994644] kmalloc_uaf2+0x134/0x468 [ 29.998290] kunit_try_run_case+0x170/0x3f0 [ 30.002457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.007926] kthread+0x328/0x630 [ 30.011137] ret_from_fork+0x10/0x20 [ 30.014696] [ 30.016173] The buggy address belongs to the object at ffff000800c2e100 [ 30.016173] which belongs to the cache kmalloc-64 of size 64 [ 30.028500] The buggy address is located 40 bytes inside of [ 30.028500] freed 64-byte region [ffff000800c2e100, ffff000800c2e140) [ 30.040564] [ 30.042043] The buggy address belongs to the physical page: [ 30.047599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 30.055585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.062091] page_type: f5(slab) [ 30.065229] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 30.072948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.080667] page dumped because: kasan: bad access detected [ 30.086224] [ 30.087698] Memory state around the buggy address: [ 30.092480] ffff000800c2e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.099681] ffff000800c2e080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.106886] >ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.114087] ^ [ 30.118605] ffff000800c2e180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.125810] ffff000800c2e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.133012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 29.534679] ================================================================== [ 29.543615] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.550728] Write of size 33 at addr ffff000804991680 by task kunit_try_catch/230 [ 29.558193] [ 29.559677] CPU: 4 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.559736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.559754] Hardware name: WinLink E850-96 board (DT) [ 29.559777] Call trace: [ 29.559794] show_stack+0x20/0x38 (C) [ 29.559828] dump_stack_lvl+0x8c/0xd0 [ 29.559864] print_report+0x118/0x608 [ 29.559900] kasan_report+0xdc/0x128 [ 29.559932] kasan_check_range+0x100/0x1a8 [ 29.559968] __asan_memset+0x34/0x78 [ 29.559997] kmalloc_uaf_memset+0x170/0x310 [ 29.560028] kunit_try_run_case+0x170/0x3f0 [ 29.560064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.560103] kthread+0x328/0x630 [ 29.560136] ret_from_fork+0x10/0x20 [ 29.560171] [ 29.626247] Allocated by task 230: [ 29.629634] kasan_save_stack+0x3c/0x68 [ 29.633452] kasan_save_track+0x20/0x40 [ 29.637271] kasan_save_alloc_info+0x40/0x58 [ 29.641525] __kasan_kmalloc+0xd4/0xd8 [ 29.645257] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.649771] kmalloc_uaf_memset+0xb8/0x310 [ 29.653852] kunit_try_run_case+0x170/0x3f0 [ 29.658018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.663486] kthread+0x328/0x630 [ 29.666698] ret_from_fork+0x10/0x20 [ 29.670257] [ 29.671733] Freed by task 230: [ 29.674773] kasan_save_stack+0x3c/0x68 [ 29.678590] kasan_save_track+0x20/0x40 [ 29.682410] kasan_save_free_info+0x4c/0x78 [ 29.686576] __kasan_slab_free+0x6c/0x98 [ 29.690482] kfree+0x214/0x3c8 [ 29.693520] kmalloc_uaf_memset+0x11c/0x310 [ 29.697687] kunit_try_run_case+0x170/0x3f0 [ 29.701854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.707324] kthread+0x328/0x630 [ 29.710534] ret_from_fork+0x10/0x20 [ 29.714093] [ 29.715571] The buggy address belongs to the object at ffff000804991680 [ 29.715571] which belongs to the cache kmalloc-64 of size 64 [ 29.727897] The buggy address is located 0 bytes inside of [ 29.727897] freed 64-byte region [ffff000804991680, ffff0008049916c0) [ 29.739874] [ 29.741352] The buggy address belongs to the physical page: [ 29.746910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884991 [ 29.754893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.761403] page_type: f5(slab) [ 29.764540] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.772258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.779979] page dumped because: kasan: bad access detected [ 29.785534] [ 29.787008] Memory state around the buggy address: [ 29.791788] ffff000804991580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.798991] ffff000804991600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.806196] >ffff000804991680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.813397] ^ [ 29.816613] ffff000804991700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.823817] ffff000804991780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.831018] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 29.233275] ================================================================== [ 29.243704] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.250215] Read of size 1 at addr ffff00080444cc08 by task kunit_try_catch/228 [ 29.257504] [ 29.258988] CPU: 4 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.259045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.259063] Hardware name: WinLink E850-96 board (DT) [ 29.259084] Call trace: [ 29.259100] show_stack+0x20/0x38 (C) [ 29.259136] dump_stack_lvl+0x8c/0xd0 [ 29.259174] print_report+0x118/0x608 [ 29.259211] kasan_report+0xdc/0x128 [ 29.259244] __asan_report_load1_noabort+0x20/0x30 [ 29.259274] kmalloc_uaf+0x300/0x338 [ 29.259301] kunit_try_run_case+0x170/0x3f0 [ 29.259337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259375] kthread+0x328/0x630 [ 29.259405] ret_from_fork+0x10/0x20 [ 29.259438] [ 29.322085] Allocated by task 228: [ 29.325474] kasan_save_stack+0x3c/0x68 [ 29.329290] kasan_save_track+0x20/0x40 [ 29.333109] kasan_save_alloc_info+0x40/0x58 [ 29.337363] __kasan_kmalloc+0xd4/0xd8 [ 29.341095] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.345609] kmalloc_uaf+0xb8/0x338 [ 29.349081] kunit_try_run_case+0x170/0x3f0 [ 29.353248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.358717] kthread+0x328/0x630 [ 29.361928] ret_from_fork+0x10/0x20 [ 29.365487] [ 29.366964] Freed by task 228: [ 29.370003] kasan_save_stack+0x3c/0x68 [ 29.373821] kasan_save_track+0x20/0x40 [ 29.377640] kasan_save_free_info+0x4c/0x78 [ 29.381806] __kasan_slab_free+0x6c/0x98 [ 29.385714] kfree+0x214/0x3c8 [ 29.388751] kmalloc_uaf+0x11c/0x338 [ 29.392310] kunit_try_run_case+0x170/0x3f0 [ 29.396476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.401945] kthread+0x328/0x630 [ 29.405157] ret_from_fork+0x10/0x20 [ 29.408716] [ 29.410193] The buggy address belongs to the object at ffff00080444cc00 [ 29.410193] which belongs to the cache kmalloc-16 of size 16 [ 29.422520] The buggy address is located 8 bytes inside of [ 29.422520] freed 16-byte region [ffff00080444cc00, ffff00080444cc10) [ 29.434496] [ 29.435976] The buggy address belongs to the physical page: [ 29.441532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 29.449517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.456026] page_type: f5(slab) [ 29.459161] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 29.466881] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.474602] page dumped because: kasan: bad access detected [ 29.480157] [ 29.481631] Memory state around the buggy address: [ 29.486413] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.493614] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 29.500819] >ffff00080444cc00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.508020] ^ [ 29.511496] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.518701] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.525902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 28.965756] ================================================================== [ 28.976002] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.983897] Read of size 64 at addr ffff000800cac284 by task kunit_try_catch/226 [ 28.991274] [ 28.992760] CPU: 6 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.992815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.992833] Hardware name: WinLink E850-96 board (DT) [ 28.992852] Call trace: [ 28.992867] show_stack+0x20/0x38 (C) [ 28.992903] dump_stack_lvl+0x8c/0xd0 [ 28.992939] print_report+0x118/0x608 [ 28.992975] kasan_report+0xdc/0x128 [ 28.993008] kasan_check_range+0x100/0x1a8 [ 28.993044] __asan_memmove+0x3c/0x98 [ 28.993069] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.993102] kunit_try_run_case+0x170/0x3f0 [ 28.993137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.993176] kthread+0x328/0x630 [ 28.993205] ret_from_fork+0x10/0x20 [ 28.993240] [ 29.060285] Allocated by task 226: [ 29.063671] kasan_save_stack+0x3c/0x68 [ 29.067488] kasan_save_track+0x20/0x40 [ 29.071308] kasan_save_alloc_info+0x40/0x58 [ 29.075561] __kasan_kmalloc+0xd4/0xd8 [ 29.079294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.083807] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 29.088756] kunit_try_run_case+0x170/0x3f0 [ 29.092922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.098391] kthread+0x328/0x630 [ 29.101602] ret_from_fork+0x10/0x20 [ 29.105161] [ 29.106640] The buggy address belongs to the object at ffff000800cac280 [ 29.106640] which belongs to the cache kmalloc-64 of size 64 [ 29.118966] The buggy address is located 4 bytes inside of [ 29.118966] allocated 64-byte region [ffff000800cac280, ffff000800cac2c0) [ 29.131289] [ 29.132766] The buggy address belongs to the physical page: [ 29.138324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cac [ 29.146309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.152817] page_type: f5(slab) [ 29.155955] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.163674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.171395] page dumped because: kasan: bad access detected [ 29.176950] [ 29.178424] Memory state around the buggy address: [ 29.183204] ffff000800cac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.190407] ffff000800cac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.197613] >ffff000800cac280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.204812] ^ [ 29.210111] ffff000800cac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.217316] ffff000800cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.224517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 28.700136] ================================================================== [ 28.709771] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.717322] Read of size 18446744073709551614 at addr ffff000800c2e084 by task kunit_try_catch/224 [ 28.726261] [ 28.727746] CPU: 5 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.727799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.727816] Hardware name: WinLink E850-96 board (DT) [ 28.727835] Call trace: [ 28.727848] show_stack+0x20/0x38 (C) [ 28.727884] dump_stack_lvl+0x8c/0xd0 [ 28.727921] print_report+0x118/0x608 [ 28.727959] kasan_report+0xdc/0x128 [ 28.727991] kasan_check_range+0x100/0x1a8 [ 28.728026] __asan_memmove+0x3c/0x98 [ 28.728056] kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.728092] kunit_try_run_case+0x170/0x3f0 [ 28.728127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.728168] kthread+0x328/0x630 [ 28.728197] ret_from_fork+0x10/0x20 [ 28.728231] [ 28.795357] Allocated by task 224: [ 28.798744] kasan_save_stack+0x3c/0x68 [ 28.802562] kasan_save_track+0x20/0x40 [ 28.806383] kasan_save_alloc_info+0x40/0x58 [ 28.810634] __kasan_kmalloc+0xd4/0xd8 [ 28.814367] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.818881] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 28.823915] kunit_try_run_case+0x170/0x3f0 [ 28.828082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.833551] kthread+0x328/0x630 [ 28.836762] ret_from_fork+0x10/0x20 [ 28.840321] [ 28.841800] The buggy address belongs to the object at ffff000800c2e080 [ 28.841800] which belongs to the cache kmalloc-64 of size 64 [ 28.854125] The buggy address is located 4 bytes inside of [ 28.854125] 64-byte region [ffff000800c2e080, ffff000800c2e0c0) [ 28.865581] [ 28.867059] The buggy address belongs to the physical page: [ 28.872616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 28.880603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.887109] page_type: f5(slab) [ 28.890247] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 28.897966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.905686] page dumped because: kasan: bad access detected [ 28.911242] [ 28.912716] Memory state around the buggy address: [ 28.917496] ffff000800c2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.924699] ffff000800c2e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.931904] >ffff000800c2e080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 28.939105] ^ [ 28.942320] ffff000800c2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.949525] ffff000800c2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.956726] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 28.393395] ================================================================== [ 28.402921] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 28.410206] Write of size 16 at addr ffff000803eb5769 by task kunit_try_catch/222 [ 28.417672] [ 28.419156] CPU: 4 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.419210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.419228] Hardware name: WinLink E850-96 board (DT) [ 28.419248] Call trace: [ 28.419260] show_stack+0x20/0x38 (C) [ 28.419293] dump_stack_lvl+0x8c/0xd0 [ 28.419329] print_report+0x118/0x608 [ 28.419365] kasan_report+0xdc/0x128 [ 28.419395] kasan_check_range+0x100/0x1a8 [ 28.419428] __asan_memset+0x34/0x78 [ 28.419455] kmalloc_oob_memset_16+0x150/0x2f8 [ 28.419486] kunit_try_run_case+0x170/0x3f0 [ 28.419519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.419556] kthread+0x328/0x630 [ 28.419584] ret_from_fork+0x10/0x20 [ 28.419617] [ 28.485988] Allocated by task 222: [ 28.489375] kasan_save_stack+0x3c/0x68 [ 28.493191] kasan_save_track+0x20/0x40 [ 28.497011] kasan_save_alloc_info+0x40/0x58 [ 28.501264] __kasan_kmalloc+0xd4/0xd8 [ 28.504997] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.509511] kmalloc_oob_memset_16+0xb0/0x2f8 [ 28.513852] kunit_try_run_case+0x170/0x3f0 [ 28.518017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.523486] kthread+0x328/0x630 [ 28.526698] ret_from_fork+0x10/0x20 [ 28.530257] [ 28.531732] The buggy address belongs to the object at ffff000803eb5700 [ 28.531732] which belongs to the cache kmalloc-128 of size 128 [ 28.544236] The buggy address is located 105 bytes inside of [ 28.544236] allocated 120-byte region [ffff000803eb5700, ffff000803eb5778) [ 28.556819] [ 28.558297] The buggy address belongs to the physical page: [ 28.563855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 28.571838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.579477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.586420] page_type: f5(slab) [ 28.589555] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.597276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.605004] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.612814] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.620627] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 28.628439] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.636245] page dumped because: kasan: bad access detected [ 28.641801] [ 28.643275] Memory state around the buggy address: [ 28.648057] ffff000803eb5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.655259] ffff000803eb5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.662463] >ffff000803eb5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.669664] ^ [ 28.676786] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.683992] ffff000803eb5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.691192] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 28.086982] ================================================================== [ 28.096503] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 28.103701] Write of size 8 at addr ffff000801e2a171 by task kunit_try_catch/220 [ 28.111079] [ 28.112562] CPU: 5 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.112614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.112630] Hardware name: WinLink E850-96 board (DT) [ 28.112648] Call trace: [ 28.112662] show_stack+0x20/0x38 (C) [ 28.112696] dump_stack_lvl+0x8c/0xd0 [ 28.112736] print_report+0x118/0x608 [ 28.112770] kasan_report+0xdc/0x128 [ 28.112800] kasan_check_range+0x100/0x1a8 [ 28.112832] __asan_memset+0x34/0x78 [ 28.112859] kmalloc_oob_memset_8+0x150/0x2f8 [ 28.112890] kunit_try_run_case+0x170/0x3f0 [ 28.112925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.112964] kthread+0x328/0x630 [ 28.112990] ret_from_fork+0x10/0x20 [ 28.113024] [ 28.179307] Allocated by task 220: [ 28.182696] kasan_save_stack+0x3c/0x68 [ 28.186511] kasan_save_track+0x20/0x40 [ 28.190331] kasan_save_alloc_info+0x40/0x58 [ 28.194585] __kasan_kmalloc+0xd4/0xd8 [ 28.198317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.202831] kmalloc_oob_memset_8+0xb0/0x2f8 [ 28.207084] kunit_try_run_case+0x170/0x3f0 [ 28.211251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.216720] kthread+0x328/0x630 [ 28.219931] ret_from_fork+0x10/0x20 [ 28.223490] [ 28.224968] The buggy address belongs to the object at ffff000801e2a100 [ 28.224968] which belongs to the cache kmalloc-128 of size 128 [ 28.237469] The buggy address is located 113 bytes inside of [ 28.237469] allocated 120-byte region [ffff000801e2a100, ffff000801e2a178) [ 28.250052] [ 28.251531] The buggy address belongs to the physical page: [ 28.257088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a [ 28.265073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.272711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.279654] page_type: f5(slab) [ 28.282791] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.290510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.298238] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.306048] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.313861] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff [ 28.321673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.329479] page dumped because: kasan: bad access detected [ 28.335035] [ 28.336509] Memory state around the buggy address: [ 28.341292] ffff000801e2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.348492] ffff000801e2a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.355698] >ffff000801e2a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.362898] ^ [ 28.370019] ffff000801e2a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.377226] ffff000801e2a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.384426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 27.780406] ================================================================== [ 27.790082] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 27.797282] Write of size 4 at addr ffff000803eb5675 by task kunit_try_catch/218 [ 27.804660] [ 27.806144] CPU: 4 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.806199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.806216] Hardware name: WinLink E850-96 board (DT) [ 27.806234] Call trace: [ 27.806246] show_stack+0x20/0x38 (C) [ 27.806279] dump_stack_lvl+0x8c/0xd0 [ 27.806316] print_report+0x118/0x608 [ 27.806351] kasan_report+0xdc/0x128 [ 27.806383] kasan_check_range+0x100/0x1a8 [ 27.806418] __asan_memset+0x34/0x78 [ 27.806446] kmalloc_oob_memset_4+0x150/0x300 [ 27.806477] kunit_try_run_case+0x170/0x3f0 [ 27.806511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.806547] kthread+0x328/0x630 [ 27.806572] ret_from_fork+0x10/0x20 [ 27.806607] [ 27.872888] Allocated by task 218: [ 27.876275] kasan_save_stack+0x3c/0x68 [ 27.880093] kasan_save_track+0x20/0x40 [ 27.883912] kasan_save_alloc_info+0x40/0x58 [ 27.888166] __kasan_kmalloc+0xd4/0xd8 [ 27.891898] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.896412] kmalloc_oob_memset_4+0xb0/0x300 [ 27.900666] kunit_try_run_case+0x170/0x3f0 [ 27.904832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.910300] kthread+0x328/0x630 [ 27.913513] ret_from_fork+0x10/0x20 [ 27.917071] [ 27.918549] The buggy address belongs to the object at ffff000803eb5600 [ 27.918549] which belongs to the cache kmalloc-128 of size 128 [ 27.931050] The buggy address is located 117 bytes inside of [ 27.931050] allocated 120-byte region [ffff000803eb5600, ffff000803eb5678) [ 27.943634] [ 27.945112] The buggy address belongs to the physical page: [ 27.950670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 27.958652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.966293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.973235] page_type: f5(slab) [ 27.976370] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.984091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.991817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.999629] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.007441] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 28.015253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.023059] page dumped because: kasan: bad access detected [ 28.028616] [ 28.030090] Memory state around the buggy address: [ 28.034873] ffff000803eb5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.042073] ffff000803eb5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.049278] >ffff000803eb5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.056479] ^ [ 28.063601] ffff000803eb5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.070805] ffff000803eb5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.078007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 27.474229] ================================================================== [ 27.483663] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 27.490864] Write of size 2 at addr ffff000801e2a077 by task kunit_try_catch/216 [ 27.498241] [ 27.499727] CPU: 5 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.499786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.499804] Hardware name: WinLink E850-96 board (DT) [ 27.499827] Call trace: [ 27.499842] show_stack+0x20/0x38 (C) [ 27.499881] dump_stack_lvl+0x8c/0xd0 [ 27.499918] print_report+0x118/0x608 [ 27.499954] kasan_report+0xdc/0x128 [ 27.499986] kasan_check_range+0x100/0x1a8 [ 27.500023] __asan_memset+0x34/0x78 [ 27.500051] kmalloc_oob_memset_2+0x150/0x2f8 [ 27.500080] kunit_try_run_case+0x170/0x3f0 [ 27.500115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.500153] kthread+0x328/0x630 [ 27.500183] ret_from_fork+0x10/0x20 [ 27.500217] [ 27.566470] Allocated by task 216: [ 27.569858] kasan_save_stack+0x3c/0x68 [ 27.573674] kasan_save_track+0x20/0x40 [ 27.577493] kasan_save_alloc_info+0x40/0x58 [ 27.581747] __kasan_kmalloc+0xd4/0xd8 [ 27.585481] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.589993] kmalloc_oob_memset_2+0xb0/0x2f8 [ 27.594246] kunit_try_run_case+0x170/0x3f0 [ 27.598413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.603882] kthread+0x328/0x630 [ 27.607093] ret_from_fork+0x10/0x20 [ 27.610652] [ 27.612130] The buggy address belongs to the object at ffff000801e2a000 [ 27.612130] which belongs to the cache kmalloc-128 of size 128 [ 27.624631] The buggy address is located 119 bytes inside of [ 27.624631] allocated 120-byte region [ffff000801e2a000, ffff000801e2a078) [ 27.637215] [ 27.638693] The buggy address belongs to the physical page: [ 27.644251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a [ 27.652235] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.659872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.666816] page_type: f5(slab) [ 27.669951] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.677672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.685400] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.693209] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.701023] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff [ 27.708835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.716640] page dumped because: kasan: bad access detected [ 27.722197] [ 27.723673] Memory state around the buggy address: [ 27.728451] ffff000801e29f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.735654] ffff000801e29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.742860] >ffff000801e2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.750060] ^ [ 27.757182] ffff000801e2a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.764386] ffff000801e2a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.771587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 27.167895] ================================================================== [ 27.176897] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 27.184186] Write of size 128 at addr ffff000801939200 by task kunit_try_catch/214 [ 27.191735] [ 27.193220] CPU: 3 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.193276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.193293] Hardware name: WinLink E850-96 board (DT) [ 27.193312] Call trace: [ 27.193325] show_stack+0x20/0x38 (C) [ 27.193359] dump_stack_lvl+0x8c/0xd0 [ 27.193395] print_report+0x118/0x608 [ 27.193434] kasan_report+0xdc/0x128 [ 27.193464] kasan_check_range+0x100/0x1a8 [ 27.193499] __asan_memset+0x34/0x78 [ 27.193528] kmalloc_oob_in_memset+0x144/0x2d0 [ 27.193558] kunit_try_run_case+0x170/0x3f0 [ 27.193592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.193631] kthread+0x328/0x630 [ 27.193659] ret_from_fork+0x10/0x20 [ 27.193695] [ 27.260051] Allocated by task 214: [ 27.263439] kasan_save_stack+0x3c/0x68 [ 27.267255] kasan_save_track+0x20/0x40 [ 27.271074] kasan_save_alloc_info+0x40/0x58 [ 27.275328] __kasan_kmalloc+0xd4/0xd8 [ 27.279060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.283574] kmalloc_oob_in_memset+0xb0/0x2d0 [ 27.287914] kunit_try_run_case+0x170/0x3f0 [ 27.292082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.297549] kthread+0x328/0x630 [ 27.300761] ret_from_fork+0x10/0x20 [ 27.304320] [ 27.305798] The buggy address belongs to the object at ffff000801939200 [ 27.305798] which belongs to the cache kmalloc-128 of size 128 [ 27.318299] The buggy address is located 0 bytes inside of [ 27.318299] allocated 120-byte region [ffff000801939200, ffff000801939278) [ 27.330709] [ 27.332187] The buggy address belongs to the physical page: [ 27.337745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881938 [ 27.345729] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.353368] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.360309] page_type: f5(slab) [ 27.363447] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.371166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.378894] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.386704] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.394517] head: 0bfffe0000000001 fffffdffe0064e01 00000000ffffffff 00000000ffffffff [ 27.402329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.410135] page dumped because: kasan: bad access detected [ 27.415691] [ 27.417166] Memory state around the buggy address: [ 27.421948] ffff000801939100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.429149] ffff000801939180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.436355] >ffff000801939200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.443554] ^ [ 27.450676] ffff000801939280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.457880] ffff000801939300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.465082] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 26.863447] ================================================================== [ 26.872561] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.879327] Read of size 16 at addr ffff00080444cbe0 by task kunit_try_catch/212 [ 26.886705] [ 26.888191] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.888245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.888261] Hardware name: WinLink E850-96 board (DT) [ 26.888281] Call trace: [ 26.888293] show_stack+0x20/0x38 (C) [ 26.888328] dump_stack_lvl+0x8c/0xd0 [ 26.888363] print_report+0x118/0x608 [ 26.888400] kasan_report+0xdc/0x128 [ 26.888429] __asan_report_load16_noabort+0x20/0x30 [ 26.888460] kmalloc_uaf_16+0x3bc/0x438 [ 26.888486] kunit_try_run_case+0x170/0x3f0 [ 26.888520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.888561] kthread+0x328/0x630 [ 26.888589] ret_from_fork+0x10/0x20 [ 26.888624] [ 26.951634] Allocated by task 212: [ 26.955024] kasan_save_stack+0x3c/0x68 [ 26.958839] kasan_save_track+0x20/0x40 [ 26.962659] kasan_save_alloc_info+0x40/0x58 [ 26.966912] __kasan_kmalloc+0xd4/0xd8 [ 26.970645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.975159] kmalloc_uaf_16+0x140/0x438 [ 26.978978] kunit_try_run_case+0x170/0x3f0 [ 26.983145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.988613] kthread+0x328/0x630 [ 26.991825] ret_from_fork+0x10/0x20 [ 26.995384] [ 26.996859] Freed by task 212: [ 26.999899] kasan_save_stack+0x3c/0x68 [ 27.003717] kasan_save_track+0x20/0x40 [ 27.007537] kasan_save_free_info+0x4c/0x78 [ 27.011704] __kasan_slab_free+0x6c/0x98 [ 27.015609] kfree+0x214/0x3c8 [ 27.018648] kmalloc_uaf_16+0x190/0x438 [ 27.022467] kunit_try_run_case+0x170/0x3f0 [ 27.026633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.032102] kthread+0x328/0x630 [ 27.035314] ret_from_fork+0x10/0x20 [ 27.038873] [ 27.040352] The buggy address belongs to the object at ffff00080444cbe0 [ 27.040352] which belongs to the cache kmalloc-16 of size 16 [ 27.052677] The buggy address is located 0 bytes inside of [ 27.052677] freed 16-byte region [ffff00080444cbe0, ffff00080444cbf0) [ 27.064653] [ 27.066132] The buggy address belongs to the physical page: [ 27.071690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 27.079674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.086181] page_type: f5(slab) [ 27.089319] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 27.097038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.104758] page dumped because: kasan: bad access detected [ 27.110314] [ 27.111788] Memory state around the buggy address: [ 27.116571] ffff00080444ca80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.123771] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.130976] >ffff00080444cb80: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc [ 27.138177] ^ [ 27.144519] ffff00080444cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.151722] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.158925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 26.602229] ================================================================== [ 26.611106] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.617786] Write of size 16 at addr ffff000801b07760 by task kunit_try_catch/210 [ 26.625251] [ 26.626734] CPU: 3 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.626786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.626800] Hardware name: WinLink E850-96 board (DT) [ 26.626819] Call trace: [ 26.626836] show_stack+0x20/0x38 (C) [ 26.626868] dump_stack_lvl+0x8c/0xd0 [ 26.626903] print_report+0x118/0x608 [ 26.626940] kasan_report+0xdc/0x128 [ 26.626971] __asan_report_store16_noabort+0x20/0x30 [ 26.627004] kmalloc_oob_16+0x3a0/0x3f8 [ 26.627032] kunit_try_run_case+0x170/0x3f0 [ 26.627068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.627106] kthread+0x328/0x630 [ 26.627131] ret_from_fork+0x10/0x20 [ 26.627163] [ 26.690268] Allocated by task 210: [ 26.693655] kasan_save_stack+0x3c/0x68 [ 26.697473] kasan_save_track+0x20/0x40 [ 26.701292] kasan_save_alloc_info+0x40/0x58 [ 26.705545] __kasan_kmalloc+0xd4/0xd8 [ 26.709277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.713791] kmalloc_oob_16+0xb4/0x3f8 [ 26.717523] kunit_try_run_case+0x170/0x3f0 [ 26.721690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.727159] kthread+0x328/0x630 [ 26.730370] ret_from_fork+0x10/0x20 [ 26.733929] [ 26.735406] The buggy address belongs to the object at ffff000801b07760 [ 26.735406] which belongs to the cache kmalloc-16 of size 16 [ 26.747733] The buggy address is located 0 bytes inside of [ 26.747733] allocated 13-byte region [ffff000801b07760, ffff000801b0776d) [ 26.760058] [ 26.761536] The buggy address belongs to the physical page: [ 26.767092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b07 [ 26.775076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.781586] page_type: f5(slab) [ 26.784721] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.792442] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.800161] page dumped because: kasan: bad access detected [ 26.805718] [ 26.807192] Memory state around the buggy address: [ 26.811974] ffff000801b07600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.819175] ffff000801b07680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.826380] >ffff000801b07700: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 26.833581] ^ [ 26.840181] ffff000801b07780: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.847388] ffff000801b07800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.854588] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 25.922366] ================================================================== [ 25.932122] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.938717] Read of size 1 at addr ffff000803394a00 by task kunit_try_catch/208 [ 25.946007] [ 25.947491] CPU: 5 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.947539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.947553] Hardware name: WinLink E850-96 board (DT) [ 25.947573] Call trace: [ 25.947589] show_stack+0x20/0x38 (C) [ 25.947623] dump_stack_lvl+0x8c/0xd0 [ 25.947658] print_report+0x118/0x608 [ 25.947693] kasan_report+0xdc/0x128 [ 25.947725] __kasan_check_byte+0x54/0x70 [ 25.947757] krealloc_noprof+0x44/0x360 [ 25.947793] krealloc_uaf+0x180/0x520 [ 25.947821] kunit_try_run_case+0x170/0x3f0 [ 25.947857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.947898] kthread+0x328/0x630 [ 25.947924] ret_from_fork+0x10/0x20 [ 25.947959] [ 26.013715] Allocated by task 208: [ 26.017102] kasan_save_stack+0x3c/0x68 [ 26.020921] kasan_save_track+0x20/0x40 [ 26.024739] kasan_save_alloc_info+0x40/0x58 [ 26.028992] __kasan_kmalloc+0xd4/0xd8 [ 26.032725] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.037239] krealloc_uaf+0xc8/0x520 [ 26.040797] kunit_try_run_case+0x170/0x3f0 [ 26.044964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.050433] kthread+0x328/0x630 [ 26.053645] ret_from_fork+0x10/0x20 [ 26.057204] [ 26.058681] Freed by task 208: [ 26.061717] kasan_save_stack+0x3c/0x68 [ 26.065537] kasan_save_track+0x20/0x40 [ 26.069356] kasan_save_free_info+0x4c/0x78 [ 26.073523] __kasan_slab_free+0x6c/0x98 [ 26.077429] kfree+0x214/0x3c8 [ 26.080467] krealloc_uaf+0x12c/0x520 [ 26.084114] kunit_try_run_case+0x170/0x3f0 [ 26.088280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.093748] kthread+0x328/0x630 [ 26.096960] ret_from_fork+0x10/0x20 [ 26.100519] [ 26.101996] The buggy address belongs to the object at ffff000803394a00 [ 26.101996] which belongs to the cache kmalloc-256 of size 256 [ 26.114496] The buggy address is located 0 bytes inside of [ 26.114496] freed 256-byte region [ffff000803394a00, ffff000803394b00) [ 26.126560] [ 26.128040] The buggy address belongs to the physical page: [ 26.133596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 26.141580] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.149218] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.156162] page_type: f5(slab) [ 26.159298] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.167017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.174746] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.182555] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.190368] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 26.198180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.205986] page dumped because: kasan: bad access detected [ 26.211543] [ 26.213017] Memory state around the buggy address: [ 26.217796] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.225000] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.232205] >ffff000803394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.239406] ^ [ 26.242621] ffff000803394a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.249826] ffff000803394b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257027] ================================================================== [ 26.264413] ================================================================== [ 26.271441] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.278034] Read of size 1 at addr ffff000803394a00 by task kunit_try_catch/208 [ 26.285325] [ 26.286808] CPU: 5 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.286853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.286867] Hardware name: WinLink E850-96 board (DT) [ 26.286886] Call trace: [ 26.286896] show_stack+0x20/0x38 (C) [ 26.286927] dump_stack_lvl+0x8c/0xd0 [ 26.286962] print_report+0x118/0x608 [ 26.286996] kasan_report+0xdc/0x128 [ 26.287028] __asan_report_load1_noabort+0x20/0x30 [ 26.287058] krealloc_uaf+0x4c8/0x520 [ 26.287087] kunit_try_run_case+0x170/0x3f0 [ 26.287120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.287158] kthread+0x328/0x630 [ 26.287183] ret_from_fork+0x10/0x20 [ 26.287213] [ 26.349994] Allocated by task 208: [ 26.353381] kasan_save_stack+0x3c/0x68 [ 26.357199] kasan_save_track+0x20/0x40 [ 26.361019] kasan_save_alloc_info+0x40/0x58 [ 26.365272] __kasan_kmalloc+0xd4/0xd8 [ 26.369006] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.373518] krealloc_uaf+0xc8/0x520 [ 26.377077] kunit_try_run_case+0x170/0x3f0 [ 26.381244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.386713] kthread+0x328/0x630 [ 26.389925] ret_from_fork+0x10/0x20 [ 26.393483] [ 26.394959] Freed by task 208: [ 26.397997] kasan_save_stack+0x3c/0x68 [ 26.401816] kasan_save_track+0x20/0x40 [ 26.405636] kasan_save_free_info+0x4c/0x78 [ 26.409802] __kasan_slab_free+0x6c/0x98 [ 26.413709] kfree+0x214/0x3c8 [ 26.416747] krealloc_uaf+0x12c/0x520 [ 26.420394] kunit_try_run_case+0x170/0x3f0 [ 26.424559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.430028] kthread+0x328/0x630 [ 26.433240] ret_from_fork+0x10/0x20 [ 26.436798] [ 26.438275] The buggy address belongs to the object at ffff000803394a00 [ 26.438275] which belongs to the cache kmalloc-256 of size 256 [ 26.450776] The buggy address is located 0 bytes inside of [ 26.450776] freed 256-byte region [ffff000803394a00, ffff000803394b00) [ 26.462840] [ 26.464317] The buggy address belongs to the physical page: [ 26.469873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 26.477857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.485497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.492440] page_type: f5(slab) [ 26.495574] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.503297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.511024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.518835] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.526648] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 26.534460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.542266] page dumped because: kasan: bad access detected [ 26.547822] [ 26.549297] Memory state around the buggy address: [ 26.554075] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.561279] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.568484] >ffff000803394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.575685] ^ [ 26.578901] ffff000803394a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.586105] ffff000803394b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.593307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 23.058412] ================================================================== [ 23.065411] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.072960] Write of size 1 at addr ffff0008033948d0 by task kunit_try_catch/202 [ 23.080339] [ 23.081824] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.081873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.081889] Hardware name: WinLink E850-96 board (DT) [ 23.081908] Call trace: [ 23.081918] show_stack+0x20/0x38 (C) [ 23.081952] dump_stack_lvl+0x8c/0xd0 [ 23.081988] print_report+0x118/0x608 [ 23.082025] kasan_report+0xdc/0x128 [ 23.082055] __asan_report_store1_noabort+0x20/0x30 [ 23.082086] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.082118] krealloc_less_oob+0x20/0x38 [ 23.082149] kunit_try_run_case+0x170/0x3f0 [ 23.082183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.082222] kthread+0x328/0x630 [ 23.082249] ret_from_fork+0x10/0x20 [ 23.082284] [ 23.150042] Allocated by task 202: [ 23.153428] kasan_save_stack+0x3c/0x68 [ 23.157247] kasan_save_track+0x20/0x40 [ 23.161066] kasan_save_alloc_info+0x40/0x58 [ 23.165320] __kasan_krealloc+0x118/0x178 [ 23.169314] krealloc_noprof+0x128/0x360 [ 23.173219] krealloc_less_oob_helper+0x168/0xc50 [ 23.177906] krealloc_less_oob+0x20/0x38 [ 23.181813] kunit_try_run_case+0x170/0x3f0 [ 23.185979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.191448] kthread+0x328/0x630 [ 23.194660] ret_from_fork+0x10/0x20 [ 23.198219] [ 23.199696] The buggy address belongs to the object at ffff000803394800 [ 23.199696] which belongs to the cache kmalloc-256 of size 256 [ 23.212196] The buggy address is located 7 bytes to the right of [ 23.212196] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 23.225128] [ 23.226604] The buggy address belongs to the physical page: [ 23.232163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 23.240145] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.247785] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.254730] page_type: f5(slab) [ 23.257864] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.265586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.273312] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.281123] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.288936] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 23.296748] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.304554] page dumped because: kasan: bad access detected [ 23.310110] [ 23.311585] Memory state around the buggy address: [ 23.316364] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.323568] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.330774] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.337974] ^ [ 23.343793] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.350998] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.358199] ================================================================== [ 24.759205] ================================================================== [ 24.769119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.776670] Write of size 1 at addr ffff0008048ce0c9 by task kunit_try_catch/206 [ 24.784046] [ 24.785531] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.785585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.785602] Hardware name: WinLink E850-96 board (DT) [ 24.785623] Call trace: [ 24.785636] show_stack+0x20/0x38 (C) [ 24.785671] dump_stack_lvl+0x8c/0xd0 [ 24.785709] print_report+0x118/0x608 [ 24.785744] kasan_report+0xdc/0x128 [ 24.785775] __asan_report_store1_noabort+0x20/0x30 [ 24.785807] krealloc_less_oob_helper+0xa48/0xc50 [ 24.785840] krealloc_large_less_oob+0x20/0x38 [ 24.785871] kunit_try_run_case+0x170/0x3f0 [ 24.785905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.785942] kthread+0x328/0x630 [ 24.785971] ret_from_fork+0x10/0x20 [ 24.786008] [ 24.854272] The buggy address belongs to the physical page: [ 24.859829] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 24.867814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.875455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.882397] page_type: f8(unknown) [ 24.885794] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.893513] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.901239] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.909050] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.916863] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 24.924675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.932480] page dumped because: kasan: bad access detected [ 24.938038] [ 24.939512] Memory state around the buggy address: [ 24.944292] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.951496] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.958701] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.965900] ^ [ 24.971459] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.978664] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.985865] ================================================================== [ 25.224594] ================================================================== [ 25.231698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 25.239247] Write of size 1 at addr ffff0008048ce0da by task kunit_try_catch/206 [ 25.246625] [ 25.248108] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.248152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.248166] Hardware name: WinLink E850-96 board (DT) [ 25.248184] Call trace: [ 25.248194] show_stack+0x20/0x38 (C) [ 25.248229] dump_stack_lvl+0x8c/0xd0 [ 25.248263] print_report+0x118/0x608 [ 25.248295] kasan_report+0xdc/0x128 [ 25.248327] __asan_report_store1_noabort+0x20/0x30 [ 25.248358] krealloc_less_oob_helper+0xa80/0xc50 [ 25.248390] krealloc_large_less_oob+0x20/0x38 [ 25.248421] kunit_try_run_case+0x170/0x3f0 [ 25.248451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.248489] kthread+0x328/0x630 [ 25.248514] ret_from_fork+0x10/0x20 [ 25.248544] [ 25.316850] The buggy address belongs to the physical page: [ 25.322407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.330392] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.338031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.344975] page_type: f8(unknown) [ 25.348368] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.356092] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.363818] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.371630] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.379443] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.387255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.395061] page dumped because: kasan: bad access detected [ 25.400616] [ 25.402092] Memory state around the buggy address: [ 25.406870] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.414074] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.421279] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.428480] ^ [ 25.434560] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.441765] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.448966] ================================================================== [ 23.673066] ================================================================== [ 23.680159] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.687708] Write of size 1 at addr ffff0008033948ea by task kunit_try_catch/202 [ 23.695086] [ 23.696568] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.696616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.696630] Hardware name: WinLink E850-96 board (DT) [ 23.696644] Call trace: [ 23.696655] show_stack+0x20/0x38 (C) [ 23.696687] dump_stack_lvl+0x8c/0xd0 [ 23.696722] print_report+0x118/0x608 [ 23.696755] kasan_report+0xdc/0x128 [ 23.696786] __asan_report_store1_noabort+0x20/0x30 [ 23.696815] krealloc_less_oob_helper+0xae4/0xc50 [ 23.696847] krealloc_less_oob+0x20/0x38 [ 23.696879] kunit_try_run_case+0x170/0x3f0 [ 23.696911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.696947] kthread+0x328/0x630 [ 23.696971] ret_from_fork+0x10/0x20 [ 23.697002] [ 23.764791] Allocated by task 202: [ 23.768175] kasan_save_stack+0x3c/0x68 [ 23.771995] kasan_save_track+0x20/0x40 [ 23.775814] kasan_save_alloc_info+0x40/0x58 [ 23.780068] __kasan_krealloc+0x118/0x178 [ 23.784061] krealloc_noprof+0x128/0x360 [ 23.787967] krealloc_less_oob_helper+0x168/0xc50 [ 23.792654] krealloc_less_oob+0x20/0x38 [ 23.796560] kunit_try_run_case+0x170/0x3f0 [ 23.800727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.806196] kthread+0x328/0x630 [ 23.809408] ret_from_fork+0x10/0x20 [ 23.812967] [ 23.814442] The buggy address belongs to the object at ffff000803394800 [ 23.814442] which belongs to the cache kmalloc-256 of size 256 [ 23.826942] The buggy address is located 33 bytes to the right of [ 23.826942] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 23.839962] [ 23.841439] The buggy address belongs to the physical page: [ 23.846996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 23.854980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.862619] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.869563] page_type: f5(slab) [ 23.872699] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.880420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.888146] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.895958] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.903771] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 23.911583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.919388] page dumped because: kasan: bad access detected [ 23.924944] [ 23.926419] Memory state around the buggy address: [ 23.931200] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938402] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.945607] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.952808] ^ [ 23.959408] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.966613] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.973815] ================================================================== [ 25.456237] ================================================================== [ 25.463377] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.470928] Write of size 1 at addr ffff0008048ce0ea by task kunit_try_catch/206 [ 25.478306] [ 25.479785] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.479830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.479844] Hardware name: WinLink E850-96 board (DT) [ 25.479862] Call trace: [ 25.479872] show_stack+0x20/0x38 (C) [ 25.479903] dump_stack_lvl+0x8c/0xd0 [ 25.479935] print_report+0x118/0x608 [ 25.479969] kasan_report+0xdc/0x128 [ 25.480000] __asan_report_store1_noabort+0x20/0x30 [ 25.480029] krealloc_less_oob_helper+0xae4/0xc50 [ 25.480062] krealloc_large_less_oob+0x20/0x38 [ 25.480092] kunit_try_run_case+0x170/0x3f0 [ 25.480125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.480160] kthread+0x328/0x630 [ 25.480186] ret_from_fork+0x10/0x20 [ 25.480216] [ 25.548531] The buggy address belongs to the physical page: [ 25.554087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.562072] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.569711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.576655] page_type: f8(unknown) [ 25.580048] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.587773] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.595499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.603310] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.611123] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.618936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.626741] page dumped because: kasan: bad access detected [ 25.632297] [ 25.633772] Memory state around the buggy address: [ 25.638550] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.645755] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.652960] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.660161] ^ [ 25.666761] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.673966] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.681168] ================================================================== [ 23.981120] ================================================================== [ 23.988227] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.995776] Write of size 1 at addr ffff0008033948eb by task kunit_try_catch/202 [ 24.003155] [ 24.004635] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.004679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.004693] Hardware name: WinLink E850-96 board (DT) [ 24.004711] Call trace: [ 24.004722] show_stack+0x20/0x38 (C) [ 24.004754] dump_stack_lvl+0x8c/0xd0 [ 24.004789] print_report+0x118/0x608 [ 24.004823] kasan_report+0xdc/0x128 [ 24.004853] __asan_report_store1_noabort+0x20/0x30 [ 24.004882] krealloc_less_oob_helper+0xa58/0xc50 [ 24.004916] krealloc_less_oob+0x20/0x38 [ 24.004946] kunit_try_run_case+0x170/0x3f0 [ 24.004977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.005013] kthread+0x328/0x630 [ 24.005037] ret_from_fork+0x10/0x20 [ 24.005070] [ 24.072858] Allocated by task 202: [ 24.076244] kasan_save_stack+0x3c/0x68 [ 24.080063] kasan_save_track+0x20/0x40 [ 24.083883] kasan_save_alloc_info+0x40/0x58 [ 24.088136] __kasan_krealloc+0x118/0x178 [ 24.092129] krealloc_noprof+0x128/0x360 [ 24.096035] krealloc_less_oob_helper+0x168/0xc50 [ 24.100723] krealloc_less_oob+0x20/0x38 [ 24.104629] kunit_try_run_case+0x170/0x3f0 [ 24.108795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.114264] kthread+0x328/0x630 [ 24.117476] ret_from_fork+0x10/0x20 [ 24.121035] [ 24.122510] The buggy address belongs to the object at ffff000803394800 [ 24.122510] which belongs to the cache kmalloc-256 of size 256 [ 24.135011] The buggy address is located 34 bytes to the right of [ 24.135011] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 24.148030] [ 24.149507] The buggy address belongs to the physical page: [ 24.155063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 24.163048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.170687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.177631] page_type: f5(slab) [ 24.180763] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.188488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.196214] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.204026] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.211839] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 24.219651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.227456] page dumped because: kasan: bad access detected [ 24.233012] [ 24.234487] Memory state around the buggy address: [ 24.239267] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.246470] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.253675] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.260876] ^ [ 24.267477] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.274682] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.281883] ================================================================== [ 22.749239] ================================================================== [ 22.758473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.766022] Write of size 1 at addr ffff0008033948c9 by task kunit_try_catch/202 [ 22.773399] [ 22.774886] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 22.774945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.774962] Hardware name: WinLink E850-96 board (DT) [ 22.774983] Call trace: [ 22.774996] show_stack+0x20/0x38 (C) [ 22.775033] dump_stack_lvl+0x8c/0xd0 [ 22.775070] print_report+0x118/0x608 [ 22.775107] kasan_report+0xdc/0x128 [ 22.775139] __asan_report_store1_noabort+0x20/0x30 [ 22.775170] krealloc_less_oob_helper+0xa48/0xc50 [ 22.775202] krealloc_less_oob+0x20/0x38 [ 22.775233] kunit_try_run_case+0x170/0x3f0 [ 22.775269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.775306] kthread+0x328/0x630 [ 22.775336] ret_from_fork+0x10/0x20 [ 22.775369] [ 22.843104] Allocated by task 202: [ 22.846492] kasan_save_stack+0x3c/0x68 [ 22.850307] kasan_save_track+0x20/0x40 [ 22.854127] kasan_save_alloc_info+0x40/0x58 [ 22.858380] __kasan_krealloc+0x118/0x178 [ 22.862374] krealloc_noprof+0x128/0x360 [ 22.866279] krealloc_less_oob_helper+0x168/0xc50 [ 22.870966] krealloc_less_oob+0x20/0x38 [ 22.874873] kunit_try_run_case+0x170/0x3f0 [ 22.879039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.884508] kthread+0x328/0x630 [ 22.887720] ret_from_fork+0x10/0x20 [ 22.891279] [ 22.892757] The buggy address belongs to the object at ffff000803394800 [ 22.892757] which belongs to the cache kmalloc-256 of size 256 [ 22.905258] The buggy address is located 0 bytes to the right of [ 22.905258] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 22.918188] [ 22.919667] The buggy address belongs to the physical page: [ 22.925224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 22.933208] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.940847] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.947790] page_type: f5(slab) [ 22.950928] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.958646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.966373] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.974183] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.981996] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 22.989808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.997614] page dumped because: kasan: bad access detected [ 23.003171] [ 23.004644] Memory state around the buggy address: [ 23.009427] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.016628] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.023834] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.031034] ^ [ 23.036593] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.043798] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.050999] ================================================================== [ 23.365514] ================================================================== [ 23.372611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.380160] Write of size 1 at addr ffff0008033948da by task kunit_try_catch/202 [ 23.387539] [ 23.389021] CPU: 5 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.389071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.389087] Hardware name: WinLink E850-96 board (DT) [ 23.389104] Call trace: [ 23.389116] show_stack+0x20/0x38 (C) [ 23.389150] dump_stack_lvl+0x8c/0xd0 [ 23.389186] print_report+0x118/0x608 [ 23.389221] kasan_report+0xdc/0x128 [ 23.389253] __asan_report_store1_noabort+0x20/0x30 [ 23.389283] krealloc_less_oob_helper+0xa80/0xc50 [ 23.389316] krealloc_less_oob+0x20/0x38 [ 23.389347] kunit_try_run_case+0x170/0x3f0 [ 23.389380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.389416] kthread+0x328/0x630 [ 23.389444] ret_from_fork+0x10/0x20 [ 23.389476] [ 23.457242] Allocated by task 202: [ 23.460628] kasan_save_stack+0x3c/0x68 [ 23.464448] kasan_save_track+0x20/0x40 [ 23.468267] kasan_save_alloc_info+0x40/0x58 [ 23.472520] __kasan_krealloc+0x118/0x178 [ 23.476515] krealloc_noprof+0x128/0x360 [ 23.480419] krealloc_less_oob_helper+0x168/0xc50 [ 23.485107] krealloc_less_oob+0x20/0x38 [ 23.489013] kunit_try_run_case+0x170/0x3f0 [ 23.493180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.498648] kthread+0x328/0x630 [ 23.501860] ret_from_fork+0x10/0x20 [ 23.505419] [ 23.506894] The buggy address belongs to the object at ffff000803394800 [ 23.506894] which belongs to the cache kmalloc-256 of size 256 [ 23.519395] The buggy address is located 17 bytes to the right of [ 23.519395] allocated 201-byte region [ffff000803394800, ffff0008033948c9) [ 23.532415] [ 23.533892] The buggy address belongs to the physical page: [ 23.539448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 23.547433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.555071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.562015] page_type: f5(slab) [ 23.565151] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.572872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.580599] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.588410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.596223] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 23.604035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.611841] page dumped because: kasan: bad access detected [ 23.617398] [ 23.618872] Memory state around the buggy address: [ 23.623653] ffff000803394780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.630855] ffff000803394800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.638060] >ffff000803394880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.645261] ^ [ 23.651340] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.658545] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.665747] ================================================================== [ 25.688467] ================================================================== [ 25.695578] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.703129] Write of size 1 at addr ffff0008048ce0eb by task kunit_try_catch/206 [ 25.710507] [ 25.711987] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.712033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.712047] Hardware name: WinLink E850-96 board (DT) [ 25.712063] Call trace: [ 25.712073] show_stack+0x20/0x38 (C) [ 25.712104] dump_stack_lvl+0x8c/0xd0 [ 25.712137] print_report+0x118/0x608 [ 25.712169] kasan_report+0xdc/0x128 [ 25.712201] __asan_report_store1_noabort+0x20/0x30 [ 25.712230] krealloc_less_oob_helper+0xa58/0xc50 [ 25.712261] krealloc_large_less_oob+0x20/0x38 [ 25.712295] kunit_try_run_case+0x170/0x3f0 [ 25.712326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.712362] kthread+0x328/0x630 [ 25.712389] ret_from_fork+0x10/0x20 [ 25.712418] [ 25.780732] The buggy address belongs to the physical page: [ 25.786288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.794274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.801912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.808856] page_type: f8(unknown) [ 25.812250] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.819974] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.827700] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.835512] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.843325] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.851137] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.858943] page dumped because: kasan: bad access detected [ 25.864498] [ 25.865974] Memory state around the buggy address: [ 25.870752] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.877957] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.885161] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.892362] ^ [ 25.898963] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.906168] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.913369] ================================================================== [ 24.993244] ================================================================== [ 25.000279] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 25.007827] Write of size 1 at addr ffff0008048ce0d0 by task kunit_try_catch/206 [ 25.015205] [ 25.016689] CPU: 4 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.016736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.016752] Hardware name: WinLink E850-96 board (DT) [ 25.016770] Call trace: [ 25.016779] show_stack+0x20/0x38 (C) [ 25.016812] dump_stack_lvl+0x8c/0xd0 [ 25.016849] print_report+0x118/0x608 [ 25.016885] kasan_report+0xdc/0x128 [ 25.016916] __asan_report_store1_noabort+0x20/0x30 [ 25.016947] krealloc_less_oob_helper+0xb9c/0xc50 [ 25.016978] krealloc_large_less_oob+0x20/0x38 [ 25.017009] kunit_try_run_case+0x170/0x3f0 [ 25.017043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.017081] kthread+0x328/0x630 [ 25.017107] ret_from_fork+0x10/0x20 [ 25.017141] [ 25.085432] The buggy address belongs to the physical page: [ 25.090988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cc [ 25.098972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.106610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.113555] page_type: f8(unknown) [ 25.116948] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.124672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.132398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.140210] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.148023] head: 0bfffe0000000002 fffffdffe0123301 00000000ffffffff 00000000ffffffff [ 25.155835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.163641] page dumped because: kasan: bad access detected [ 25.169197] [ 25.170672] Memory state around the buggy address: [ 25.175450] ffff0008048cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.182654] ffff0008048ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.189859] >ffff0008048ce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.197060] ^ [ 25.202880] ffff0008048ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.210085] ffff0008048ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.217285] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 24.290698] ================================================================== [ 24.300116] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.307666] Write of size 1 at addr ffff000801bba0eb by task kunit_try_catch/204 [ 24.315043] [ 24.316527] CPU: 3 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.316578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.316595] Hardware name: WinLink E850-96 board (DT) [ 24.316617] Call trace: [ 24.316629] show_stack+0x20/0x38 (C) [ 24.316665] dump_stack_lvl+0x8c/0xd0 [ 24.316701] print_report+0x118/0x608 [ 24.316737] kasan_report+0xdc/0x128 [ 24.316767] __asan_report_store1_noabort+0x20/0x30 [ 24.316796] krealloc_more_oob_helper+0x60c/0x678 [ 24.316829] krealloc_large_more_oob+0x20/0x38 [ 24.316859] kunit_try_run_case+0x170/0x3f0 [ 24.316895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.316935] kthread+0x328/0x630 [ 24.316962] ret_from_fork+0x10/0x20 [ 24.316995] [ 24.385269] The buggy address belongs to the physical page: [ 24.390827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8 [ 24.398810] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.406451] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.413393] page_type: f8(unknown) [ 24.416789] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.424509] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.432235] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.440047] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.447860] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff [ 24.455672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.463477] page dumped because: kasan: bad access detected [ 24.469034] [ 24.470508] Memory state around the buggy address: [ 24.475291] ffff000801bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.482491] ffff000801bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.489696] >ffff000801bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.496897] ^ [ 24.503498] ffff000801bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.510703] ffff000801bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.517904] ================================================================== [ 22.129293] ================================================================== [ 22.138430] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.145980] Write of size 1 at addr ffff0008030ff2eb by task kunit_try_catch/200 [ 22.153356] [ 22.154843] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 22.154898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.154914] Hardware name: WinLink E850-96 board (DT) [ 22.154935] Call trace: [ 22.154949] show_stack+0x20/0x38 (C) [ 22.154989] dump_stack_lvl+0x8c/0xd0 [ 22.155030] print_report+0x118/0x608 [ 22.155067] kasan_report+0xdc/0x128 [ 22.155097] __asan_report_store1_noabort+0x20/0x30 [ 22.155129] krealloc_more_oob_helper+0x60c/0x678 [ 22.155161] krealloc_more_oob+0x20/0x38 [ 22.155190] kunit_try_run_case+0x170/0x3f0 [ 22.155226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.155265] kthread+0x328/0x630 [ 22.155293] ret_from_fork+0x10/0x20 [ 22.155328] [ 22.223061] Allocated by task 200: [ 22.226448] kasan_save_stack+0x3c/0x68 [ 22.230264] kasan_save_track+0x20/0x40 [ 22.234084] kasan_save_alloc_info+0x40/0x58 [ 22.238337] __kasan_krealloc+0x118/0x178 [ 22.242330] krealloc_noprof+0x128/0x360 [ 22.246236] krealloc_more_oob_helper+0x168/0x678 [ 22.250924] krealloc_more_oob+0x20/0x38 [ 22.254830] kunit_try_run_case+0x170/0x3f0 [ 22.258997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.264465] kthread+0x328/0x630 [ 22.267677] ret_from_fork+0x10/0x20 [ 22.271236] [ 22.272714] The buggy address belongs to the object at ffff0008030ff200 [ 22.272714] which belongs to the cache kmalloc-256 of size 256 [ 22.285215] The buggy address is located 0 bytes to the right of [ 22.285215] allocated 235-byte region [ffff0008030ff200, ffff0008030ff2eb) [ 22.298145] [ 22.299623] The buggy address belongs to the physical page: [ 22.305182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 22.313166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.320805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.327747] page_type: f5(slab) [ 22.330884] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.338603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.346330] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.354140] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.361953] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 22.369765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.377571] page dumped because: kasan: bad access detected [ 22.383128] [ 22.384602] Memory state around the buggy address: [ 22.389384] ffff0008030ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.396585] ffff0008030ff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.403791] >ffff0008030ff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.410991] ^ [ 22.417592] ffff0008030ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.424795] ffff0008030ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.431998] ================================================================== [ 22.439400] ================================================================== [ 22.446415] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.453961] Write of size 1 at addr ffff0008030ff2f0 by task kunit_try_catch/200 [ 22.461337] [ 22.462822] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 22.462876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.462892] Hardware name: WinLink E850-96 board (DT) [ 22.462911] Call trace: [ 22.462922] show_stack+0x20/0x38 (C) [ 22.462958] dump_stack_lvl+0x8c/0xd0 [ 22.462998] print_report+0x118/0x608 [ 22.463034] kasan_report+0xdc/0x128 [ 22.463064] __asan_report_store1_noabort+0x20/0x30 [ 22.463094] krealloc_more_oob_helper+0x5c0/0x678 [ 22.463128] krealloc_more_oob+0x20/0x38 [ 22.463156] kunit_try_run_case+0x170/0x3f0 [ 22.463194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.463233] kthread+0x328/0x630 [ 22.463262] ret_from_fork+0x10/0x20 [ 22.463298] [ 22.531041] Allocated by task 200: [ 22.534428] kasan_save_stack+0x3c/0x68 [ 22.538246] kasan_save_track+0x20/0x40 [ 22.542065] kasan_save_alloc_info+0x40/0x58 [ 22.546319] __kasan_krealloc+0x118/0x178 [ 22.550313] krealloc_noprof+0x128/0x360 [ 22.554218] krealloc_more_oob_helper+0x168/0x678 [ 22.558905] krealloc_more_oob+0x20/0x38 [ 22.562812] kunit_try_run_case+0x170/0x3f0 [ 22.566978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.572447] kthread+0x328/0x630 [ 22.575659] ret_from_fork+0x10/0x20 [ 22.579218] [ 22.580696] The buggy address belongs to the object at ffff0008030ff200 [ 22.580696] which belongs to the cache kmalloc-256 of size 256 [ 22.593196] The buggy address is located 5 bytes to the right of [ 22.593196] allocated 235-byte region [ffff0008030ff200, ffff0008030ff2eb) [ 22.606127] [ 22.607606] The buggy address belongs to the physical page: [ 22.613162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 22.621148] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.628786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.635729] page_type: f5(slab) [ 22.638863] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.646584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.654312] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.662122] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.669935] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 22.677747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.685553] page dumped because: kasan: bad access detected [ 22.691109] [ 22.692584] Memory state around the buggy address: [ 22.697365] ffff0008030ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.704568] ffff0008030ff200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.711773] >ffff0008030ff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.718972] ^ [ 22.725833] ffff0008030ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.733038] ffff0008030ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740240] ================================================================== [ 24.525204] ================================================================== [ 24.532318] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.539865] Write of size 1 at addr ffff000801bba0f0 by task kunit_try_catch/204 [ 24.547244] [ 24.548726] CPU: 3 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.548777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.548791] Hardware name: WinLink E850-96 board (DT) [ 24.548810] Call trace: [ 24.548823] show_stack+0x20/0x38 (C) [ 24.548858] dump_stack_lvl+0x8c/0xd0 [ 24.548895] print_report+0x118/0x608 [ 24.548930] kasan_report+0xdc/0x128 [ 24.548960] __asan_report_store1_noabort+0x20/0x30 [ 24.548990] krealloc_more_oob_helper+0x5c0/0x678 [ 24.549021] krealloc_large_more_oob+0x20/0x38 [ 24.549052] kunit_try_run_case+0x170/0x3f0 [ 24.549089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.549128] kthread+0x328/0x630 [ 24.549155] ret_from_fork+0x10/0x20 [ 24.549188] [ 24.617471] The buggy address belongs to the physical page: [ 24.623025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8 [ 24.631010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.638652] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.645593] page_type: f8(unknown) [ 24.648986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.656710] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.664436] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.672248] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.680061] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff [ 24.687873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.695679] page dumped because: kasan: bad access detected [ 24.701236] [ 24.702710] Memory state around the buggy address: [ 24.707491] ffff000801bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.714692] ffff000801bba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.721899] >ffff000801bba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.729099] ^ [ 24.735960] ffff000801bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.743165] ffff000801bba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.750366] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 21.937956] ================================================================== [ 21.952235] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 21.958567] Read of size 1 at addr ffff000806250000 by task kunit_try_catch/198 [ 21.965858] [ 21.967345] CPU: 3 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 21.967400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.967417] Hardware name: WinLink E850-96 board (DT) [ 21.967440] Call trace: [ 21.967455] show_stack+0x20/0x38 (C) [ 21.967491] dump_stack_lvl+0x8c/0xd0 [ 21.967527] print_report+0x118/0x608 [ 21.967561] kasan_report+0xdc/0x128 [ 21.967593] __asan_report_load1_noabort+0x20/0x30 [ 21.967624] page_alloc_uaf+0x328/0x350 [ 21.967654] kunit_try_run_case+0x170/0x3f0 [ 21.967692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.967729] kthread+0x328/0x630 [ 21.967757] ret_from_fork+0x10/0x20 [ 21.967793] [ 22.030705] The buggy address belongs to the physical page: [ 22.036261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886250 [ 22.044245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.050755] page_type: f0(buddy) [ 22.053977] raw: 0bfffe0000000000 ffff00087f61bc60 ffff00087f61bc60 0000000000000000 [ 22.061697] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 22.069417] page dumped because: kasan: bad access detected [ 22.074973] [ 22.076447] Memory state around the buggy address: [ 22.081231] ffff00080624ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.088430] ffff00080624ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.095636] >ffff000806250000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.102836] ^ [ 22.106051] ffff000806250080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.113256] ffff000806250100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.120457] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 21.701946] ================================================================== [ 21.711094] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 21.716471] Free of addr ffff000801bb8001 by task kunit_try_catch/194 [ 21.722894] [ 21.724380] CPU: 3 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 21.724438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.724453] Hardware name: WinLink E850-96 board (DT) [ 21.724474] Call trace: [ 21.724487] show_stack+0x20/0x38 (C) [ 21.724525] dump_stack_lvl+0x8c/0xd0 [ 21.724564] print_report+0x118/0x608 [ 21.724600] kasan_report_invalid_free+0xc0/0xe8 [ 21.724635] __kasan_kfree_large+0x5c/0xa8 [ 21.724672] free_large_kmalloc+0x64/0x190 [ 21.724704] kfree+0x270/0x3c8 [ 21.724732] kmalloc_large_invalid_free+0x108/0x270 [ 21.724764] kunit_try_run_case+0x170/0x3f0 [ 21.724800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.724838] kthread+0x328/0x630 [ 21.724867] ret_from_fork+0x10/0x20 [ 21.724901] [ 21.796246] The buggy address belongs to the physical page: [ 21.801803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bb8 [ 21.809788] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.817425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.824370] page_type: f8(unknown) [ 21.827764] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.835485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.843213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.851022] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.858836] head: 0bfffe0000000002 fffffdffe006ee01 00000000ffffffff 00000000ffffffff [ 21.866648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.874454] page dumped because: kasan: bad access detected [ 21.880010] [ 21.881485] Memory state around the buggy address: [ 21.886269] ffff000801bb7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.893468] ffff000801bb7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.900675] >ffff000801bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.907873] ^ [ 21.911089] ffff000801bb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.918293] ffff000801bb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.925497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 21.517682] ================================================================== [ 21.527415] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 21.534008] Read of size 1 at addr ffff0008033bc000 by task kunit_try_catch/192 [ 21.541299] [ 21.542787] CPU: 5 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 21.542846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.542861] Hardware name: WinLink E850-96 board (DT) [ 21.542880] Call trace: [ 21.542893] show_stack+0x20/0x38 (C) [ 21.542927] dump_stack_lvl+0x8c/0xd0 [ 21.542964] print_report+0x118/0x608 [ 21.543001] kasan_report+0xdc/0x128 [ 21.543030] __asan_report_load1_noabort+0x20/0x30 [ 21.543063] kmalloc_large_uaf+0x2cc/0x2f8 [ 21.543090] kunit_try_run_case+0x170/0x3f0 [ 21.543124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.543162] kthread+0x328/0x630 [ 21.543188] ret_from_fork+0x10/0x20 [ 21.543223] [ 21.606405] The buggy address belongs to the physical page: [ 21.611962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8833bc [ 21.619947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.626466] raw: 0bfffe0000000000 fffffdffe00cf008 ffff00085afc0f40 0000000000000000 [ 21.634186] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.641905] page dumped because: kasan: bad access detected [ 21.647462] [ 21.648936] Memory state around the buggy address: [ 21.653717] ffff0008033bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.660919] ffff0008033bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.668125] >ffff0008033bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.675325] ^ [ 21.678540] ffff0008033bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.685745] ffff0008033bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.692946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 21.289224] ================================================================== [ 21.298685] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 21.306147] Write of size 1 at addr ffff000804b0e00a by task kunit_try_catch/190 [ 21.313525] [ 21.315011] CPU: 2 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 21.315065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.315082] Hardware name: WinLink E850-96 board (DT) [ 21.315103] Call trace: [ 21.315121] show_stack+0x20/0x38 (C) [ 21.315156] dump_stack_lvl+0x8c/0xd0 [ 21.315196] print_report+0x118/0x608 [ 21.315232] kasan_report+0xdc/0x128 [ 21.315263] __asan_report_store1_noabort+0x20/0x30 [ 21.315295] kmalloc_large_oob_right+0x278/0x2b8 [ 21.315326] kunit_try_run_case+0x170/0x3f0 [ 21.315362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.315400] kthread+0x328/0x630 [ 21.315427] ret_from_fork+0x10/0x20 [ 21.315461] [ 21.379237] The buggy address belongs to the physical page: [ 21.384796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b0c [ 21.392780] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.400419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.407362] page_type: f8(unknown) [ 21.410757] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.418477] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.426204] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.434015] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.441828] head: 0bfffe0000000002 fffffdffe012c301 00000000ffffffff 00000000ffffffff [ 21.449640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.457446] page dumped because: kasan: bad access detected [ 21.463003] [ 21.464477] Memory state around the buggy address: [ 21.469259] ffff000804b0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.476460] ffff000804b0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.483666] >ffff000804b0e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.490866] ^ [ 21.494341] ffff000804b0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.501546] ffff000804b0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.508748] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 20.987427] ================================================================== [ 20.998263] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 21.005547] Write of size 1 at addr ffff000805f79f00 by task kunit_try_catch/188 [ 21.012922] [ 21.014410] CPU: 5 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 21.014466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.014482] Hardware name: WinLink E850-96 board (DT) [ 21.014505] Call trace: [ 21.014521] show_stack+0x20/0x38 (C) [ 21.014558] dump_stack_lvl+0x8c/0xd0 [ 21.014594] print_report+0x118/0x608 [ 21.014631] kasan_report+0xdc/0x128 [ 21.014662] __asan_report_store1_noabort+0x20/0x30 [ 21.014693] kmalloc_big_oob_right+0x2a4/0x2f0 [ 21.014724] kunit_try_run_case+0x170/0x3f0 [ 21.014761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.014799] kthread+0x328/0x630 [ 21.014826] ret_from_fork+0x10/0x20 [ 21.014861] [ 21.078459] Allocated by task 188: [ 21.081848] kasan_save_stack+0x3c/0x68 [ 21.085664] kasan_save_track+0x20/0x40 [ 21.089483] kasan_save_alloc_info+0x40/0x58 [ 21.093736] __kasan_kmalloc+0xd4/0xd8 [ 21.097469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.101983] kmalloc_big_oob_right+0xb8/0x2f0 [ 21.106323] kunit_try_run_case+0x170/0x3f0 [ 21.110490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.115958] kthread+0x328/0x630 [ 21.119170] ret_from_fork+0x10/0x20 [ 21.122729] [ 21.124206] The buggy address belongs to the object at ffff000805f78000 [ 21.124206] which belongs to the cache kmalloc-8k of size 8192 [ 21.136708] The buggy address is located 0 bytes to the right of [ 21.136708] allocated 7936-byte region [ffff000805f78000, ffff000805f79f00) [ 21.149725] [ 21.151203] The buggy address belongs to the physical page: [ 21.156761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f78 [ 21.164744] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.172383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.179327] page_type: f5(slab) [ 21.182464] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.190183] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.197911] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.205720] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.213533] head: 0bfffe0000000003 fffffdffe017de01 00000000ffffffff 00000000ffffffff [ 21.221345] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.229151] page dumped because: kasan: bad access detected [ 21.234708] [ 21.236182] Memory state around the buggy address: [ 21.240962] ffff000805f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.248165] ffff000805f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.255371] >ffff000805f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.262571] ^ [ 21.265786] ffff000805f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.272991] ffff000805f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.280193] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 20.518108] ================================================================== [ 20.527779] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.535846] Write of size 1 at addr ffff000801939078 by task kunit_try_catch/186 [ 20.543224] [ 20.544711] CPU: 3 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 20.544769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.544784] Hardware name: WinLink E850-96 board (DT) [ 20.544802] Call trace: [ 20.544816] show_stack+0x20/0x38 (C) [ 20.544850] dump_stack_lvl+0x8c/0xd0 [ 20.544888] print_report+0x118/0x608 [ 20.544925] kasan_report+0xdc/0x128 [ 20.544956] __asan_report_store1_noabort+0x20/0x30 [ 20.544987] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.545020] kunit_try_run_case+0x170/0x3f0 [ 20.545057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.545096] kthread+0x328/0x630 [ 20.545124] ret_from_fork+0x10/0x20 [ 20.545159] [ 20.609542] Allocated by task 186: [ 20.612931] kasan_save_stack+0x3c/0x68 [ 20.616748] kasan_save_track+0x20/0x40 [ 20.620567] kasan_save_alloc_info+0x40/0x58 [ 20.624820] __kasan_kmalloc+0xd4/0xd8 [ 20.628553] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 20.634108] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.639229] kunit_try_run_case+0x170/0x3f0 [ 20.643396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.648866] kthread+0x328/0x630 [ 20.652076] ret_from_fork+0x10/0x20 [ 20.655635] [ 20.657113] The buggy address belongs to the object at ffff000801939000 [ 20.657113] which belongs to the cache kmalloc-128 of size 128 [ 20.669614] The buggy address is located 0 bytes to the right of [ 20.669614] allocated 120-byte region [ffff000801939000, ffff000801939078) [ 20.682545] [ 20.684023] The buggy address belongs to the physical page: [ 20.689581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881938 [ 20.697565] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.705204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.712146] page_type: f5(slab) [ 20.715282] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.723002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.730729] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.738539] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.746353] head: 0bfffe0000000001 fffffdffe0064e01 00000000ffffffff 00000000ffffffff [ 20.754165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.761970] page dumped because: kasan: bad access detected [ 20.767527] [ 20.769001] Memory state around the buggy address: [ 20.773783] ffff000801938f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.780984] ffff000801938f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.788191] >ffff000801939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.795390] ^ [ 20.802511] ffff000801939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.809716] ffff000801939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.816918] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 20.217741] ================================================================== [ 20.226743] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 20.234115] Read of size 1 at addr ffff000802f01000 by task kunit_try_catch/184 [ 20.241405] [ 20.242893] CPU: 6 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 20.242948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.242964] Hardware name: WinLink E850-96 board (DT) [ 20.242984] Call trace: [ 20.243000] show_stack+0x20/0x38 (C) [ 20.243037] dump_stack_lvl+0x8c/0xd0 [ 20.243074] print_report+0x118/0x608 [ 20.243109] kasan_report+0xdc/0x128 [ 20.243141] __asan_report_load1_noabort+0x20/0x30 [ 20.243173] kmalloc_node_oob_right+0x2f4/0x330 [ 20.243206] kunit_try_run_case+0x170/0x3f0 [ 20.243241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.243278] kthread+0x328/0x630 [ 20.243306] ret_from_fork+0x10/0x20 [ 20.243342] [ 20.306944] Allocated by task 184: [ 20.310332] kasan_save_stack+0x3c/0x68 [ 20.314147] kasan_save_track+0x20/0x40 [ 20.317967] kasan_save_alloc_info+0x40/0x58 [ 20.322220] __kasan_kmalloc+0xd4/0xd8 [ 20.325953] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 20.330901] kmalloc_node_oob_right+0xbc/0x330 [ 20.335328] kunit_try_run_case+0x170/0x3f0 [ 20.339494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.344963] kthread+0x328/0x630 [ 20.348174] ret_from_fork+0x10/0x20 [ 20.351734] [ 20.353212] The buggy address belongs to the object at ffff000802f00000 [ 20.353212] which belongs to the cache kmalloc-4k of size 4096 [ 20.365713] The buggy address is located 0 bytes to the right of [ 20.365713] allocated 4096-byte region [ffff000802f00000, ffff000802f01000) [ 20.378730] [ 20.380208] The buggy address belongs to the physical page: [ 20.385766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882f00 [ 20.393749] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.401389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.408332] page_type: f5(slab) [ 20.411469] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.419187] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.426916] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.434725] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.442538] head: 0bfffe0000000003 fffffdffe00bc001 00000000ffffffff 00000000ffffffff [ 20.450350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.458156] page dumped because: kasan: bad access detected [ 20.463712] [ 20.465186] Memory state around the buggy address: [ 20.469968] ffff000802f00f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.477170] ffff000802f00f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.484374] >ffff000802f01000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491575] ^ [ 20.494790] ffff000802f01080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.501995] ffff000802f01100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.509197] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 19.848811] ================================================================== [ 19.858083] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 19.864937] Read of size 1 at addr ffff000801b0773f by task kunit_try_catch/182 [ 19.872227] [ 19.873714] CPU: 3 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 19.873771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.873788] Hardware name: WinLink E850-96 board (DT) [ 19.873809] Call trace: [ 19.873821] show_stack+0x20/0x38 (C) [ 19.873858] dump_stack_lvl+0x8c/0xd0 [ 19.873895] print_report+0x118/0x608 [ 19.873931] kasan_report+0xdc/0x128 [ 19.873962] __asan_report_load1_noabort+0x20/0x30 [ 19.873993] kmalloc_oob_left+0x2ec/0x320 [ 19.874021] kunit_try_run_case+0x170/0x3f0 [ 19.874056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.874095] kthread+0x328/0x630 [ 19.874124] ret_from_fork+0x10/0x20 [ 19.874157] [ 19.937245] Allocated by task 12: [ 19.940546] kasan_save_stack+0x3c/0x68 [ 19.944361] kasan_save_track+0x20/0x40 [ 19.948182] kasan_save_alloc_info+0x40/0x58 [ 19.952434] __kasan_kmalloc+0xd4/0xd8 [ 19.956166] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 19.961722] kstrdup+0x54/0xc8 [ 19.964760] kstrdup_const+0x48/0x60 [ 19.968319] __kernfs_new_node+0xb0/0x578 [ 19.972312] kernfs_new_node+0x128/0x1a8 [ 19.976218] kernfs_create_link+0xac/0x228 [ 19.980300] sysfs_do_create_link_sd+0x8c/0x128 [ 19.984812] sysfs_create_link+0x48/0xb8 [ 19.988718] driver_sysfs_add+0x88/0x258 [ 19.992624] really_probe+0xf0/0x7f0 [ 19.996183] __driver_probe_device+0x164/0x378 [ 20.000610] driver_probe_device+0x64/0x180 [ 20.004776] __device_attach_driver+0x174/0x280 [ 20.009291] bus_for_each_drv+0x118/0x1b0 [ 20.013285] __device_attach+0x174/0x378 [ 20.017190] device_initial_probe+0x1c/0x30 [ 20.021357] bus_probe_device+0x12c/0x170 [ 20.025350] deferred_probe_work_func+0x140/0x208 [ 20.030037] process_one_work+0x530/0xf98 [ 20.034030] worker_thread+0x8ac/0xf28 [ 20.037763] kthread+0x328/0x630 [ 20.040974] ret_from_fork+0x10/0x20 [ 20.044533] [ 20.046010] Freed by task 0: [ 20.048877] kasan_save_stack+0x3c/0x68 [ 20.052693] kasan_save_track+0x20/0x40 [ 20.056514] kasan_save_free_info+0x4c/0x78 [ 20.060679] __kasan_slab_free+0x6c/0x98 [ 20.064585] kfree+0x214/0x3c8 [ 20.067623] kfree_const+0x3c/0x50 [ 20.071008] kernfs_free_rcu+0x4c/0x120 [ 20.074828] rcu_core+0x9f4/0x1e20 [ 20.078213] rcu_core_si+0x18/0x30 [ 20.081599] handle_softirqs+0x374/0xb28 [ 20.085506] __do_softirq+0x1c/0x28 [ 20.088977] [ 20.090455] The buggy address belongs to the object at ffff000801b07720 [ 20.090455] which belongs to the cache kmalloc-16 of size 16 [ 20.102783] The buggy address is located 15 bytes to the right of [ 20.102783] allocated 16-byte region [ffff000801b07720, ffff000801b07730) [ 20.115713] [ 20.117191] The buggy address belongs to the physical page: [ 20.122749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b07 [ 20.130735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.137242] page_type: f5(slab) [ 20.140379] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 20.148097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.155818] page dumped because: kasan: bad access detected [ 20.161373] [ 20.162847] Memory state around the buggy address: [ 20.167631] ffff000801b07600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.174832] ffff000801b07680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 20.182036] >ffff000801b07700: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 20.189236] ^ [ 20.194274] ffff000801b07780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.201481] ffff000801b07800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.208680] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 19.252953] ================================================================== [ 19.260090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.267028] Write of size 1 at addr ffff000801781a78 by task kunit_try_catch/180 [ 19.274406] [ 19.275891] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 19.275944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.275960] Hardware name: WinLink E850-96 board (DT) [ 19.275981] Call trace: [ 19.275992] show_stack+0x20/0x38 (C) [ 19.276024] dump_stack_lvl+0x8c/0xd0 [ 19.276062] print_report+0x118/0x608 [ 19.276098] kasan_report+0xdc/0x128 [ 19.276129] __asan_report_store1_noabort+0x20/0x30 [ 19.276160] kmalloc_oob_right+0x538/0x660 [ 19.276188] kunit_try_run_case+0x170/0x3f0 [ 19.276223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.276260] kthread+0x328/0x630 [ 19.276289] ret_from_fork+0x10/0x20 [ 19.276323] [ 19.339596] Allocated by task 180: [ 19.342985] kasan_save_stack+0x3c/0x68 [ 19.346801] kasan_save_track+0x20/0x40 [ 19.350620] kasan_save_alloc_info+0x40/0x58 [ 19.354874] __kasan_kmalloc+0xd4/0xd8 [ 19.358606] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.363120] kmalloc_oob_right+0xb0/0x660 [ 19.367113] kunit_try_run_case+0x170/0x3f0 [ 19.371280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.376748] kthread+0x328/0x630 [ 19.379960] ret_from_fork+0x10/0x20 [ 19.383519] [ 19.384996] The buggy address belongs to the object at ffff000801781a00 [ 19.384996] which belongs to the cache kmalloc-128 of size 128 [ 19.397496] The buggy address is located 5 bytes to the right of [ 19.397496] allocated 115-byte region [ffff000801781a00, ffff000801781a73) [ 19.410428] [ 19.411907] The buggy address belongs to the physical page: [ 19.417464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780 [ 19.425449] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.433086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.440030] page_type: f5(slab) [ 19.443163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.450886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.458612] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.466423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.474236] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff [ 19.482048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.489854] page dumped because: kasan: bad access detected [ 19.495411] [ 19.496885] Memory state around the buggy address: [ 19.501666] ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.508869] ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.516075] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.523274] ^ [ 19.530395] ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.537600] ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544801] ================================================================== [ 18.950581] ================================================================== [ 18.957142] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.964081] Write of size 1 at addr ffff000801781a73 by task kunit_try_catch/180 [ 18.971459] [ 18.972945] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250530 #1 PREEMPT [ 18.972999] Tainted: [N]=TEST [ 18.973014] Hardware name: WinLink E850-96 board (DT) [ 18.973033] Call trace: [ 18.973047] show_stack+0x20/0x38 (C) [ 18.973082] dump_stack_lvl+0x8c/0xd0 [ 18.973120] print_report+0x118/0x608 [ 18.973156] kasan_report+0xdc/0x128 [ 18.973188] __asan_report_store1_noabort+0x20/0x30 [ 18.973217] kmalloc_oob_right+0x5a4/0x660 [ 18.973248] kunit_try_run_case+0x170/0x3f0 [ 18.973287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.973323] kthread+0x328/0x630 [ 18.973352] ret_from_fork+0x10/0x20 [ 18.973386] [ 19.035435] Allocated by task 180: [ 19.038823] kasan_save_stack+0x3c/0x68 [ 19.042639] kasan_save_track+0x20/0x40 [ 19.046458] kasan_save_alloc_info+0x40/0x58 [ 19.050711] __kasan_kmalloc+0xd4/0xd8 [ 19.054445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.058958] kmalloc_oob_right+0xb0/0x660 [ 19.062951] kunit_try_run_case+0x170/0x3f0 [ 19.067118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.072586] kthread+0x328/0x630 [ 19.075798] ret_from_fork+0x10/0x20 [ 19.079357] [ 19.080835] The buggy address belongs to the object at ffff000801781a00 [ 19.080835] which belongs to the cache kmalloc-128 of size 128 [ 19.093335] The buggy address is located 0 bytes to the right of [ 19.093335] allocated 115-byte region [ffff000801781a00, ffff000801781a73) [ 19.106266] [ 19.107745] The buggy address belongs to the physical page: [ 19.113303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780 [ 19.121287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.128926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.135868] page_type: f5(slab) [ 19.139006] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.146724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.154451] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.162261] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.170074] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff [ 19.177886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.185692] page dumped because: kasan: bad access detected [ 19.191249] [ 19.192723] Memory state around the buggy address: [ 19.197504] ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.204706] ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211912] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.219111] ^ [ 19.225973] ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.233178] ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.240380] ================================================================== [ 19.552183] ================================================================== [ 19.559215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.566155] Read of size 1 at addr ffff000801781a80 by task kunit_try_catch/180 [ 19.573447] [ 19.574930] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 19.574980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.574995] Hardware name: WinLink E850-96 board (DT) [ 19.575012] Call trace: [ 19.575023] show_stack+0x20/0x38 (C) [ 19.575054] dump_stack_lvl+0x8c/0xd0 [ 19.575088] print_report+0x118/0x608 [ 19.575124] kasan_report+0xdc/0x128 [ 19.575155] __asan_report_load1_noabort+0x20/0x30 [ 19.575183] kmalloc_oob_right+0x5d0/0x660 [ 19.575212] kunit_try_run_case+0x170/0x3f0 [ 19.575245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.575282] kthread+0x328/0x630 [ 19.575308] ret_from_fork+0x10/0x20 [ 19.575342] [ 19.638550] Allocated by task 180: [ 19.641937] kasan_save_stack+0x3c/0x68 [ 19.645755] kasan_save_track+0x20/0x40 [ 19.649574] kasan_save_alloc_info+0x40/0x58 [ 19.653828] __kasan_kmalloc+0xd4/0xd8 [ 19.657560] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.662074] kmalloc_oob_right+0xb0/0x660 [ 19.666067] kunit_try_run_case+0x170/0x3f0 [ 19.670234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675702] kthread+0x328/0x630 [ 19.678914] ret_from_fork+0x10/0x20 [ 19.682473] [ 19.683950] The buggy address belongs to the object at ffff000801781a00 [ 19.683950] which belongs to the cache kmalloc-128 of size 128 [ 19.696449] The buggy address is located 13 bytes to the right of [ 19.696449] allocated 115-byte region [ffff000801781a00, ffff000801781a73) [ 19.709469] [ 19.710946] The buggy address belongs to the physical page: [ 19.716503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780 [ 19.724488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.732127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.739071] page_type: f5(slab) [ 19.742204] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.749926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.757653] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.765464] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.773277] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff [ 19.781089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.788895] page dumped because: kasan: bad access detected [ 19.794452] [ 19.795926] Memory state around the buggy address: [ 19.800706] ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.807909] ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.815113] >ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.822314] ^ [ 19.825530] ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832735] ffff000801781b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.839936] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 164.070161] WARNING: CPU: 2 PID: 749 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 164.077628] Modules linked in: [ 164.080672] CPU: 2 UID: 0 PID: 749 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 PREEMPT [ 164.091437] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 164.097242] Hardware name: WinLink E850-96 board (DT) [ 164.102279] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 164.109219] pc : intlog10+0x38/0x48 [ 164.112691] lr : intlog10_test+0xe4/0x200 [ 164.116684] sp : ffff80008b137c10 [ 164.119983] x29: ffff80008b137c90 x28: 0000000000000000 x27: 0000000000000000 [ 164.127101] x26: 1fffe001003b9861 x25: 0000000000000000 x24: ffff80008b137ce0 [ 164.134220] x23: ffff80008b137d00 x22: 0000000000000000 x21: 1ffff00011626f82 [ 164.141337] x20: ffff800083cd30c0 x19: ffff800087d77990 x18: 0000000079738866 [ 164.148455] x17: 0000000000000001 x16: ffff00085af56d28 x15: 0000000000000000 [ 164.155573] x14: 00000000f1f1f1f1 x13: 1fffe0010b5ead89 x12: ffff700010f6f979 [ 164.162691] x11: 1ffff00010f6f978 x10: ffff700010f6f978 x9 : ffff80008126b66c [ 164.169809] x8 : ffff800087b7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 164.176927] x5 : ffff700011626f82 x4 : 1ffff00010faef3a x3 : 1ffff0001079a618 [ 164.184045] x2 : 1ffff0001079a618 x1 : 0000000000000003 x0 : 0000000000000000 [ 164.191164] Call trace: [ 164.193596] intlog10+0x38/0x48 (P) [ 164.197068] kunit_try_run_case+0x170/0x3f0 [ 164.201234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 164.206702] kthread+0x328/0x630 [ 164.209914] ret_from_fork+0x10/0x20 [ 164.213474] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 163.866865] WARNING: CPU: 3 PID: 731 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 163.874157] Modules linked in: [ 163.877202] CPU: 3 UID: 0 PID: 731 Comm: kunit_try_catch Tainted: G B D N 6.15.0-next-20250530 #1 PREEMPT [ 163.887971] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 163.892903] Hardware name: WinLink E850-96 board (DT) [ 163.897942] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 163.904882] pc : intlog2+0xd8/0xf8 [ 163.908268] lr : intlog2_test+0xe4/0x200 [ 163.912174] sp : ffff80008b017c10 [ 163.915472] x29: ffff80008b017c90 x28: 0000000000000000 x27: 0000000000000000 [ 163.922590] x26: 1fffe001002e6da1 x25: 0000000000000000 x24: ffff80008b017ce0 [ 163.929708] x23: ffff80008b017d00 x22: 0000000000000000 x21: 1ffff00011602f82 [ 163.936826] x20: ffff800083cd2fc0 x19: ffff800087d77990 x18: 00000000c4b5243a [ 163.943944] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 163.951062] x14: 00000000f1f1f1f1 x13: 1fffe0010b5ef189 x12: ffff700010f6f979 [ 163.958180] x11: 1ffff00010f6f978 x10: ffff700010f6f978 x9 : ffff80008126b86c [ 163.965298] x8 : ffff800087b7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 163.972416] x5 : ffff700011602f82 x4 : 1ffff00010faef3a x3 : 1ffff0001079a5f8 [ 163.979534] x2 : 1ffff0001079a5f8 x1 : 0000000000000003 x0 : 0000000000000000 [ 163.986655] Call trace: [ 163.989086] intlog2+0xd8/0xf8 (P) [ 163.992470] kunit_try_run_case+0x170/0x3f0 [ 163.996636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 164.002103] kthread+0x328/0x630 [ 164.005316] ret_from_fork+0x10/0x20 [ 164.008878] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
KNOWN ISSUE - e850-96: board rootfs mount failed intermittently - /dev/root: Can't open blockdev
[ 251.367400] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 251.375643] SMP: stopping secondary CPUs [ 251.379568] Kernel Offset: disabled [ 251.383016] CPU features: 0x1000,00000000,02004ca0,0400721b [ 251.388571] Memory Limit: none [ 251.391643] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---