Date
May 30, 2025, 4:14 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 28.991108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 28.979763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 28.845777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 28.955838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 29.076610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 28.875850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 28.719295] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 112.844132] Internal error: Oops: 0000000096000005 [#1] SMP [ 112.854467] Modules linked in: [ 112.856586] CPU: 0 UID: 0 PID: 581 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 112.857856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 112.858322] Hardware name: linux,dummy-virt (DT) [ 112.859776] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.860814] pc : kunit_test_null_dereference+0x70/0x170 [ 112.861459] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.862247] sp : ffff800081fd7d30 [ 112.862595] x29: ffff800081fd7d90 x28: 0000000000000000 x27: 0000000000000000 [ 112.864455] x26: 1ffe00001937f5c1 x25: 0000000000000000 x24: 0000000000000004 [ 112.865067] x23: fff00000c9bfae0c x22: ffffa1cc18658c48 x21: fff00000c47dcb08 [ 112.865488] x20: 1ffff000103fafa6 x19: ffff800080087990 x18: fff00000c111e888 [ 112.866094] x17: 0000000000000000 x16: fff00000da444d28 x15: fff00000ff616b08 [ 112.867667] x14: 0000000000018fff x13: 1ffe00001b488989 x12: fffd8000188343a4 [ 112.868717] x11: 1ffe0000188343a3 x10: fffd8000188343a3 x9 : ffffa1cc186500b0 [ 112.869602] x8 : ffff800081fd7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 112.870555] x5 : ffff7000103fafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 112.871475] x2 : dfff800000000000 x1 : fff00000c41a1440 x0 : ffff800080087990 [ 112.872455] Call trace: [ 112.872859] kunit_test_null_dereference+0x70/0x170 (P) [ 112.873499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.874998] kthread+0x328/0x630 [ 112.875633] ret_from_fork+0x10/0x20 [ 112.876607] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 112.877726] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 58.088200] ================================================================== [ 58.088291] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 58.088291] [ 58.088385] Use-after-free read at 0x00000000a0d4fc1b (in kfence-#203): [ 58.088451] test_krealloc+0x51c/0x830 [ 58.088513] kunit_try_run_case+0x170/0x3f0 [ 58.088572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.088630] kthread+0x328/0x630 [ 58.088697] ret_from_fork+0x10/0x20 [ 58.088755] [ 58.088783] kfence-#203: 0x00000000a0d4fc1b-0x000000009622f8a3, size=32, cache=kmalloc-32 [ 58.088783] [ 58.088852] allocated by task 338 on cpu 0 at 58.087260s (0.001586s ago): [ 58.088935] test_alloc+0x29c/0x628 [ 58.088990] test_krealloc+0xc0/0x830 [ 58.089041] kunit_try_run_case+0x170/0x3f0 [ 58.089094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.089149] kthread+0x328/0x630 [ 58.089193] ret_from_fork+0x10/0x20 [ 58.089241] [ 58.089277] freed by task 338 on cpu 0 at 58.087709s (0.001563s ago): [ 58.089355] krealloc_noprof+0x148/0x360 [ 58.089406] test_krealloc+0x1dc/0x830 [ 58.089455] kunit_try_run_case+0x170/0x3f0 [ 58.089506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.089561] kthread+0x328/0x630 [ 58.089605] ret_from_fork+0x10/0x20 [ 58.089653] [ 58.089718] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.089813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.089848] Hardware name: linux,dummy-virt (DT) [ 58.089889] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 57.914403] ================================================================== [ 57.914506] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 57.914506] [ 57.914618] Use-after-free read at 0x000000003b712d0f (in kfence-#201): [ 57.914743] test_memcache_typesafe_by_rcu+0x280/0x560 [ 57.914810] kunit_try_run_case+0x170/0x3f0 [ 57.914871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.914930] kthread+0x328/0x630 [ 57.914979] ret_from_fork+0x10/0x20 [ 57.915029] [ 57.915058] kfence-#201: 0x000000003b712d0f-0x00000000db1a369e, size=32, cache=test [ 57.915058] [ 57.915122] allocated by task 336 on cpu 1 at 57.882025s (0.033092s ago): [ 57.915206] test_alloc+0x230/0x628 [ 57.915262] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 57.915317] kunit_try_run_case+0x170/0x3f0 [ 57.915367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.915422] kthread+0x328/0x630 [ 57.915465] ret_from_fork+0x10/0x20 [ 57.915513] [ 57.915540] freed by task 336 on cpu 1 at 57.882138s (0.033398s ago): [ 57.915610] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 57.915664] kunit_try_run_case+0x170/0x3f0 [ 57.915733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.915791] kthread+0x328/0x630 [ 57.915833] ret_from_fork+0x10/0x20 [ 57.915883] [ 57.915935] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.916031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.916067] Hardware name: linux,dummy-virt (DT) [ 57.916110] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 37.833142] ================================================================== [ 37.833368] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 37.833368] [ 37.833576] Invalid read at 0x0000000016bed776: [ 37.833744] test_invalid_access+0xdc/0x1f0 [ 37.833876] kunit_try_run_case+0x170/0x3f0 [ 37.833999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.834124] kthread+0x328/0x630 [ 37.834235] ret_from_fork+0x10/0x20 [ 37.834363] [ 37.834478] CPU: 0 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.839882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.839986] Hardware name: linux,dummy-virt (DT) [ 37.842000] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 31.197931] ================================================================== [ 31.198481] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.198481] [ 31.198703] Out-of-bounds write at 0x0000000050041dbf (1B left of kfence-#136): [ 31.199067] test_out_of_bounds_write+0x100/0x240 [ 31.199322] kunit_try_run_case+0x170/0x3f0 [ 31.200178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.200460] kthread+0x328/0x630 [ 31.200676] ret_from_fork+0x10/0x20 [ 31.200814] [ 31.200954] kfence-#136: 0x00000000e9f557db-0x00000000d8040c5a, size=32, cache=kmalloc-32 [ 31.200954] [ 31.201367] allocated by task 292 on cpu 1 at 31.196844s (0.004495s ago): [ 31.201579] test_alloc+0x29c/0x628 [ 31.201702] test_out_of_bounds_write+0xc8/0x240 [ 31.201813] kunit_try_run_case+0x170/0x3f0 [ 31.201915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.202107] kthread+0x328/0x630 [ 31.202234] ret_from_fork+0x10/0x20 [ 31.202479] [ 31.202580] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.203321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.203404] Hardware name: linux,dummy-virt (DT) [ 31.203500] ================================================================== [ 31.302998] ================================================================== [ 31.303148] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.303148] [ 31.303331] Out-of-bounds write at 0x00000000cb5347bf (1B left of kfence-#137): [ 31.303459] test_out_of_bounds_write+0x100/0x240 [ 31.303574] kunit_try_run_case+0x170/0x3f0 [ 31.303701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.303829] kthread+0x328/0x630 [ 31.304132] ret_from_fork+0x10/0x20 [ 31.304439] [ 31.304507] kfence-#137: 0x00000000d2a77333-0x00000000d7abab4d, size=32, cache=test [ 31.304507] [ 31.304642] allocated by task 294 on cpu 1 at 31.302553s (0.002072s ago): [ 31.305043] test_alloc+0x230/0x628 [ 31.305189] test_out_of_bounds_write+0xc8/0x240 [ 31.305330] kunit_try_run_case+0x170/0x3f0 [ 31.305454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.305794] kthread+0x328/0x630 [ 31.305894] ret_from_fork+0x10/0x20 [ 31.305994] [ 31.306088] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.306276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.306342] Hardware name: linux,dummy-virt (DT) [ 31.306430] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 37.602314] ================================================================== [ 37.602480] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 37.602480] [ 37.602616] Corrupted memory at 0x00000000acb64a5c [ ! . . . . . . . . . . . . . . . ] (in kfence-#197): [ 37.603448] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 37.603568] kunit_try_run_case+0x170/0x3f0 [ 37.603675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.603805] kthread+0x328/0x630 [ 37.603895] ret_from_fork+0x10/0x20 [ 37.603989] [ 37.604045] kfence-#197: 0x0000000065019b87-0x0000000009836750, size=73, cache=kmalloc-96 [ 37.604045] [ 37.604179] allocated by task 326 on cpu 1 at 37.601893s (0.002276s ago): [ 37.604335] test_alloc+0x29c/0x628 [ 37.604448] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 37.604570] kunit_try_run_case+0x170/0x3f0 [ 37.604711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.604824] kthread+0x328/0x630 [ 37.604922] ret_from_fork+0x10/0x20 [ 37.605034] [ 37.605097] freed by task 326 on cpu 1 at 37.602107s (0.002982s ago): [ 37.605267] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 37.605389] kunit_try_run_case+0x170/0x3f0 [ 37.605506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.605631] kthread+0x328/0x630 [ 37.605769] ret_from_fork+0x10/0x20 [ 37.605885] [ 37.605984] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.606175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.606249] Hardware name: linux,dummy-virt (DT) [ 37.606329] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 37.391979] ================================================================== [ 37.392165] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 37.392165] [ 37.392375] Out-of-bounds read at 0x0000000047d7907b (105B right of kfence-#195): [ 37.392467] test_kmalloc_aligned_oob_read+0x238/0x468 [ 37.392538] kunit_try_run_case+0x170/0x3f0 [ 37.392600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.392662] kthread+0x328/0x630 [ 37.392749] ret_from_fork+0x10/0x20 [ 37.392806] [ 37.392838] kfence-#195: 0x000000003d684eeb-0x00000000ade149b2, size=73, cache=kmalloc-96 [ 37.392838] [ 37.392908] allocated by task 324 on cpu 1 at 37.391568s (0.001335s ago): [ 37.392995] test_alloc+0x29c/0x628 [ 37.393052] test_kmalloc_aligned_oob_read+0x100/0x468 [ 37.393111] kunit_try_run_case+0x170/0x3f0 [ 37.393162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.393218] kthread+0x328/0x630 [ 37.393279] ret_from_fork+0x10/0x20 [ 37.393328] [ 37.393381] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.393480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.393516] Hardware name: linux,dummy-virt (DT) [ 37.393558] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 32.680444] ================================================================== [ 32.680596] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 32.680596] [ 32.681089] Corrupted memory at 0x0000000097372a95 [ ! . . . . . . . . . . . . . . . ] (in kfence-#150): [ 32.682417] test_corruption+0x120/0x378 [ 32.682539] kunit_try_run_case+0x170/0x3f0 [ 32.682663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.682794] kthread+0x328/0x630 [ 32.682941] ret_from_fork+0x10/0x20 [ 32.683071] [ 32.683142] kfence-#150: 0x00000000641b6be0-0x000000004b887354, size=32, cache=test [ 32.683142] [ 32.683297] allocated by task 314 on cpu 1 at 32.680105s (0.003182s ago): [ 32.683514] test_alloc+0x230/0x628 [ 32.683633] test_corruption+0xdc/0x378 [ 32.683768] kunit_try_run_case+0x170/0x3f0 [ 32.683883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.684038] kthread+0x328/0x630 [ 32.684260] ret_from_fork+0x10/0x20 [ 32.684429] [ 32.684531] freed by task 314 on cpu 1 at 32.680245s (0.004275s ago): [ 32.684813] test_corruption+0x120/0x378 [ 32.685067] kunit_try_run_case+0x170/0x3f0 [ 32.685222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.685349] kthread+0x328/0x630 [ 32.685462] ret_from_fork+0x10/0x20 [ 32.685598] [ 32.685749] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.686063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.686208] Hardware name: linux,dummy-virt (DT) [ 32.686349] ================================================================== [ 32.897317] ================================================================== [ 32.897587] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 32.897587] [ 32.897755] Corrupted memory at 0x00000000c0dca648 [ ! ] (in kfence-#152): [ 32.898014] test_corruption+0x1d8/0x378 [ 32.898131] kunit_try_run_case+0x170/0x3f0 [ 32.898245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.898374] kthread+0x328/0x630 [ 32.898491] ret_from_fork+0x10/0x20 [ 32.898768] [ 32.898839] kfence-#152: 0x00000000afefb277-0x0000000035ccd762, size=32, cache=test [ 32.898839] [ 32.899042] allocated by task 314 on cpu 1 at 32.896500s (0.002531s ago): [ 32.899356] test_alloc+0x230/0x628 [ 32.899800] test_corruption+0x198/0x378 [ 32.899956] kunit_try_run_case+0x170/0x3f0 [ 32.900122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.900251] kthread+0x328/0x630 [ 32.900349] ret_from_fork+0x10/0x20 [ 32.900576] [ 32.900706] freed by task 314 on cpu 1 at 32.896593s (0.004103s ago): [ 32.900873] test_corruption+0x1d8/0x378 [ 32.900980] kunit_try_run_case+0x170/0x3f0 [ 32.901083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.901215] kthread+0x328/0x630 [ 32.901345] ret_from_fork+0x10/0x20 [ 32.901642] [ 32.901783] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.901971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.902047] Hardware name: linux,dummy-virt (DT) [ 32.902139] ================================================================== [ 32.248994] ================================================================== [ 32.249215] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 32.249215] [ 32.249398] Corrupted memory at 0x0000000067c6269d [ ! . . . . . . . . . . . . . . . ] (in kfence-#146): [ 32.253616] test_corruption+0x278/0x378 [ 32.253806] kunit_try_run_case+0x170/0x3f0 [ 32.254121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.254322] kthread+0x328/0x630 [ 32.254512] ret_from_fork+0x10/0x20 [ 32.254621] [ 32.254703] kfence-#146: 0x0000000090933676-0x00000000a19ed4c8, size=32, cache=kmalloc-32 [ 32.254703] [ 32.254912] allocated by task 312 on cpu 1 at 32.248032s (0.006822s ago): [ 32.255097] test_alloc+0x29c/0x628 [ 32.255236] test_corruption+0xdc/0x378 [ 32.255532] kunit_try_run_case+0x170/0x3f0 [ 32.255672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.255828] kthread+0x328/0x630 [ 32.255946] ret_from_fork+0x10/0x20 [ 32.256066] [ 32.256130] freed by task 312 on cpu 1 at 32.248414s (0.007706s ago): [ 32.256281] test_corruption+0x278/0x378 [ 32.256383] kunit_try_run_case+0x170/0x3f0 [ 32.256539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.256749] kthread+0x328/0x630 [ 32.256865] ret_from_fork+0x10/0x20 [ 32.256981] [ 32.257094] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.257393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.257516] Hardware name: linux,dummy-virt (DT) [ 32.257662] ================================================================== [ 32.358514] ================================================================== [ 32.358669] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 32.358669] [ 32.358836] Corrupted memory at 0x000000001f10adea [ ! ] (in kfence-#147): [ 32.359638] test_corruption+0x284/0x378 [ 32.359786] kunit_try_run_case+0x170/0x3f0 [ 32.359912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.360410] kthread+0x328/0x630 [ 32.360534] ret_from_fork+0x10/0x20 [ 32.360659] [ 32.360774] kfence-#147: 0x00000000d2721b8f-0x000000002be53a7b, size=32, cache=kmalloc-32 [ 32.360774] [ 32.360995] allocated by task 312 on cpu 1 at 32.358067s (0.002919s ago): [ 32.361264] test_alloc+0x29c/0x628 [ 32.361447] test_corruption+0x198/0x378 [ 32.361572] kunit_try_run_case+0x170/0x3f0 [ 32.361758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.362172] kthread+0x328/0x630 [ 32.362277] ret_from_fork+0x10/0x20 [ 32.362448] [ 32.362614] freed by task 312 on cpu 1 at 32.358220s (0.004375s ago): [ 32.362812] test_corruption+0x284/0x378 [ 32.363025] kunit_try_run_case+0x170/0x3f0 [ 32.363260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.363513] kthread+0x328/0x630 [ 32.363841] ret_from_fork+0x10/0x20 [ 32.364253] [ 32.364353] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.364628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.364749] Hardware name: linux,dummy-virt (DT) [ 32.365009] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 32.144664] ================================================================== [ 32.145033] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 32.145033] [ 32.145180] Invalid free of 0x00000000104ee6cd (in kfence-#145): [ 32.145326] test_invalid_addr_free+0xec/0x238 [ 32.145606] kunit_try_run_case+0x170/0x3f0 [ 32.145745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.145861] kthread+0x328/0x630 [ 32.145960] ret_from_fork+0x10/0x20 [ 32.146744] [ 32.146846] kfence-#145: 0x0000000078cbb499-0x0000000080a26f17, size=32, cache=test [ 32.146846] [ 32.147030] allocated by task 310 on cpu 1 at 32.144448s (0.002571s ago): [ 32.147402] test_alloc+0x230/0x628 [ 32.148345] test_invalid_addr_free+0xd4/0x238 [ 32.148647] kunit_try_run_case+0x170/0x3f0 [ 32.149423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.149568] kthread+0x328/0x630 [ 32.150223] ret_from_fork+0x10/0x20 [ 32.150561] [ 32.150662] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.150878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.150957] Hardware name: linux,dummy-virt (DT) [ 32.152337] ================================================================== [ 32.040546] ================================================================== [ 32.040709] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 32.040709] [ 32.042193] Invalid free of 0x000000005c3b1913 (in kfence-#144): [ 32.042813] test_invalid_addr_free+0x1ac/0x238 [ 32.042957] kunit_try_run_case+0x170/0x3f0 [ 32.043080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.043202] kthread+0x328/0x630 [ 32.043316] ret_from_fork+0x10/0x20 [ 32.043421] [ 32.046568] kfence-#144: 0x000000008bee79c4-0x0000000026dae1e6, size=32, cache=kmalloc-32 [ 32.046568] [ 32.046794] allocated by task 308 on cpu 1 at 32.040312s (0.006472s ago): [ 32.046959] test_alloc+0x29c/0x628 [ 32.047071] test_invalid_addr_free+0xd4/0x238 [ 32.047182] kunit_try_run_case+0x170/0x3f0 [ 32.047285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.048820] kthread+0x328/0x630 [ 32.048923] ret_from_fork+0x10/0x20 [ 32.049023] [ 32.049121] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.049338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.049425] Hardware name: linux,dummy-virt (DT) [ 32.049523] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 31.937769] ================================================================== [ 31.938186] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 31.938186] [ 31.938345] Invalid free of 0x000000006929e8fb (in kfence-#143): [ 31.938614] test_double_free+0x100/0x238 [ 31.938776] kunit_try_run_case+0x170/0x3f0 [ 31.938885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.939001] kthread+0x328/0x630 [ 31.939361] ret_from_fork+0x10/0x20 [ 31.939787] [ 31.939926] kfence-#143: 0x000000006929e8fb-0x0000000054e45aee, size=32, cache=test [ 31.939926] [ 31.940359] allocated by task 306 on cpu 1 at 31.935742s (0.004605s ago): [ 31.940733] test_alloc+0x230/0x628 [ 31.941044] test_double_free+0xd4/0x238 [ 31.941281] kunit_try_run_case+0x170/0x3f0 [ 31.941388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.941494] kthread+0x328/0x630 [ 31.941638] ret_from_fork+0x10/0x20 [ 31.941800] [ 31.941935] freed by task 306 on cpu 1 at 31.935862s (0.006034s ago): [ 31.942094] test_double_free+0xf0/0x238 [ 31.942195] kunit_try_run_case+0x170/0x3f0 [ 31.942341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.942452] kthread+0x328/0x630 [ 31.942549] ret_from_fork+0x10/0x20 [ 31.942648] [ 31.942808] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.943024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.943111] Hardware name: linux,dummy-virt (DT) [ 31.943392] ================================================================== [ 31.829044] ================================================================== [ 31.829241] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 31.829241] [ 31.829398] Invalid free of 0x00000000cac9a336 (in kfence-#142): [ 31.829541] test_double_free+0x1bc/0x238 [ 31.829658] kunit_try_run_case+0x170/0x3f0 [ 31.829799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.829904] kthread+0x328/0x630 [ 31.830001] ret_from_fork+0x10/0x20 [ 31.830099] [ 31.830162] kfence-#142: 0x00000000cac9a336-0x0000000098261a3d, size=32, cache=kmalloc-32 [ 31.830162] [ 31.830289] allocated by task 304 on cpu 1 at 31.828147s (0.002135s ago): [ 31.830438] test_alloc+0x29c/0x628 [ 31.830539] test_double_free+0xd4/0x238 [ 31.830722] kunit_try_run_case+0x170/0x3f0 [ 31.830844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.830980] kthread+0x328/0x630 [ 31.831443] ret_from_fork+0x10/0x20 [ 31.831863] [ 31.832102] freed by task 304 on cpu 1 at 31.828261s (0.003831s ago): [ 31.832268] test_double_free+0x1ac/0x238 [ 31.832375] kunit_try_run_case+0x170/0x3f0 [ 31.832479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.832590] kthread+0x328/0x630 [ 31.832758] ret_from_fork+0x10/0x20 [ 31.832935] [ 31.833782] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.834034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.834121] Hardware name: linux,dummy-virt (DT) [ 31.834400] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 31.407283] ================================================================== [ 31.407471] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 31.407471] [ 31.407705] Use-after-free read at 0x00000000816ec846 (in kfence-#138): [ 31.407828] test_use_after_free_read+0x114/0x248 [ 31.407948] kunit_try_run_case+0x170/0x3f0 [ 31.408061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.408168] kthread+0x328/0x630 [ 31.408266] ret_from_fork+0x10/0x20 [ 31.408365] [ 31.408424] kfence-#138: 0x00000000816ec846-0x00000000dc4bc93f, size=32, cache=kmalloc-32 [ 31.408424] [ 31.408548] allocated by task 296 on cpu 1 at 31.406270s (0.002270s ago): [ 31.408748] test_alloc+0x29c/0x628 [ 31.409137] test_use_after_free_read+0xd0/0x248 [ 31.409540] kunit_try_run_case+0x170/0x3f0 [ 31.409918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.410233] kthread+0x328/0x630 [ 31.410335] ret_from_fork+0x10/0x20 [ 31.410455] [ 31.410726] freed by task 296 on cpu 1 at 31.406397s (0.004163s ago): [ 31.411046] test_use_after_free_read+0x1c0/0x248 [ 31.411348] kunit_try_run_case+0x170/0x3f0 [ 31.411546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.411808] kthread+0x328/0x630 [ 31.412166] ret_from_fork+0x10/0x20 [ 31.412547] [ 31.413306] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.413504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.413578] Hardware name: linux,dummy-virt (DT) [ 31.413661] ================================================================== [ 31.510008] ================================================================== [ 31.510157] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 31.510157] [ 31.510898] Use-after-free read at 0x000000004c9dde6f (in kfence-#139): [ 31.511041] test_use_after_free_read+0x114/0x248 [ 31.511843] kunit_try_run_case+0x170/0x3f0 [ 31.511982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.512113] kthread+0x328/0x630 [ 31.512221] ret_from_fork+0x10/0x20 [ 31.513484] [ 31.513555] kfence-#139: 0x000000004c9dde6f-0x00000000d5fdb9d7, size=32, cache=test [ 31.513555] [ 31.513702] allocated by task 298 on cpu 1 at 31.509094s (0.004577s ago): [ 31.513873] test_alloc+0x230/0x628 [ 31.513974] test_use_after_free_read+0xd0/0x248 [ 31.514076] kunit_try_run_case+0x170/0x3f0 [ 31.514176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.514278] kthread+0x328/0x630 [ 31.514367] ret_from_fork+0x10/0x20 [ 31.514461] [ 31.514513] freed by task 298 on cpu 1 at 31.509188s (0.005318s ago): [ 31.515330] test_use_after_free_read+0xf0/0x248 [ 31.515477] kunit_try_run_case+0x170/0x3f0 [ 31.515589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.515731] kthread+0x328/0x630 [ 31.515828] ret_from_fork+0x10/0x20 [ 31.515957] [ 31.516063] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.516583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.516678] Hardware name: linux,dummy-virt (DT) [ 31.516924] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 25.593282] ================================================================== [ 25.593510] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 25.593652] Read of size 4 at addr fff00000c77ed180 by task swapper/0/0 [ 25.593780] [ 25.596502] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.597861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.597932] Hardware name: linux,dummy-virt (DT) [ 25.598010] Call trace: [ 25.598066] show_stack+0x20/0x38 (C) [ 25.599562] dump_stack_lvl+0x8c/0xd0 [ 25.599726] print_report+0x118/0x608 [ 25.599939] kasan_report+0xdc/0x128 [ 25.600404] __asan_report_load4_noabort+0x20/0x30 [ 25.600613] rcu_uaf_reclaim+0x64/0x70 [ 25.600778] rcu_core+0x9f4/0x1e20 [ 25.601117] rcu_core_si+0x18/0x30 [ 25.601238] handle_softirqs+0x374/0xb28 [ 25.601596] __do_softirq+0x1c/0x28 [ 25.601725] ____do_softirq+0x18/0x30 [ 25.601858] call_on_irq_stack+0x24/0x30 [ 25.602395] do_softirq_own_stack+0x24/0x38 [ 25.602925] __irq_exit_rcu+0x1fc/0x318 [ 25.603148] irq_exit_rcu+0x1c/0x80 [ 25.603422] el1_interrupt+0x38/0x58 [ 25.603618] el1h_64_irq_handler+0x18/0x28 [ 25.603757] el1h_64_irq+0x6c/0x70 [ 25.603957] arch_local_irq_enable+0x4/0x8 (P) [ 25.604109] do_idle+0x384/0x4e8 [ 25.604274] cpu_startup_entry+0x64/0x80 [ 25.604409] rest_init+0x160/0x188 [ 25.604915] start_kernel+0x314/0x3d8 [ 25.605131] __primary_switched+0x8c/0xa0 [ 25.605371] [ 25.605482] Allocated by task 199: [ 25.605559] kasan_save_stack+0x3c/0x68 [ 25.605671] kasan_save_track+0x20/0x40 [ 25.605790] kasan_save_alloc_info+0x40/0x58 [ 25.605897] __kasan_kmalloc+0xd4/0xd8 [ 25.606091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.606301] rcu_uaf+0xb0/0x2d8 [ 25.606414] kunit_try_run_case+0x170/0x3f0 [ 25.606527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.606652] kthread+0x328/0x630 [ 25.606914] ret_from_fork+0x10/0x20 [ 25.607102] [ 25.607147] Freed by task 0: [ 25.607630] kasan_save_stack+0x3c/0x68 [ 25.607840] kasan_save_track+0x20/0x40 [ 25.608062] kasan_save_free_info+0x4c/0x78 [ 25.608237] __kasan_slab_free+0x6c/0x98 [ 25.608350] kfree+0x214/0x3c8 [ 25.608449] rcu_uaf_reclaim+0x28/0x70 [ 25.608559] rcu_core+0x9f4/0x1e20 [ 25.608663] rcu_core_si+0x18/0x30 [ 25.608778] handle_softirqs+0x374/0xb28 [ 25.609407] __do_softirq+0x1c/0x28 [ 25.609520] [ 25.609617] Last potentially related work creation: [ 25.609785] kasan_save_stack+0x3c/0x68 [ 25.610012] kasan_record_aux_stack+0xb4/0xc8 [ 25.610146] __call_rcu_common.constprop.0+0x70/0x8b0 [ 25.610436] call_rcu+0x18/0x30 [ 25.610546] rcu_uaf+0x14c/0x2d8 [ 25.610783] kunit_try_run_case+0x170/0x3f0 [ 25.611342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.611425] kthread+0x328/0x630 [ 25.611470] ret_from_fork+0x10/0x20 [ 25.611562] [ 25.611734] The buggy address belongs to the object at fff00000c77ed180 [ 25.611734] which belongs to the cache kmalloc-32 of size 32 [ 25.611914] The buggy address is located 0 bytes inside of [ 25.611914] freed 32-byte region [fff00000c77ed180, fff00000c77ed1a0) [ 25.612314] [ 25.612371] The buggy address belongs to the physical page: [ 25.612447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ed [ 25.612574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.612770] page_type: f5(slab) [ 25.612890] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.613025] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.613134] page dumped because: kasan: bad access detected [ 25.613215] [ 25.613393] Memory state around the buggy address: [ 25.613591] fff00000c77ed080: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 25.613864] fff00000c77ed100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 25.614124] >fff00000c77ed180: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 25.614218] ^ [ 25.614339] fff00000c77ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.614479] fff00000c77ed280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.614727] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 25.325060] ================================================================== [ 25.325409] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 25.325566] Read of size 1 at addr fff00000c77e8378 by task kunit_try_catch/197 [ 25.325720] [ 25.325794] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.325990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.326156] Hardware name: linux,dummy-virt (DT) [ 25.326242] Call trace: [ 25.326291] show_stack+0x20/0x38 (C) [ 25.326408] dump_stack_lvl+0x8c/0xd0 [ 25.326551] print_report+0x118/0x608 [ 25.326938] kasan_report+0xdc/0x128 [ 25.327193] __asan_report_load1_noabort+0x20/0x30 [ 25.327430] ksize_uaf+0x544/0x5f8 [ 25.327584] kunit_try_run_case+0x170/0x3f0 [ 25.327842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.328096] kthread+0x328/0x630 [ 25.328258] ret_from_fork+0x10/0x20 [ 25.328473] [ 25.328523] Allocated by task 197: [ 25.328659] kasan_save_stack+0x3c/0x68 [ 25.329021] kasan_save_track+0x20/0x40 [ 25.329142] kasan_save_alloc_info+0x40/0x58 [ 25.329325] __kasan_kmalloc+0xd4/0xd8 [ 25.329450] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.330574] ksize_uaf+0xb8/0x5f8 [ 25.330708] kunit_try_run_case+0x170/0x3f0 [ 25.330816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.330926] kthread+0x328/0x630 [ 25.331035] ret_from_fork+0x10/0x20 [ 25.331253] [ 25.331307] Freed by task 197: [ 25.331391] kasan_save_stack+0x3c/0x68 [ 25.331491] kasan_save_track+0x20/0x40 [ 25.331581] kasan_save_free_info+0x4c/0x78 [ 25.331742] __kasan_slab_free+0x6c/0x98 [ 25.331845] kfree+0x214/0x3c8 [ 25.331925] ksize_uaf+0x11c/0x5f8 [ 25.332016] kunit_try_run_case+0x170/0x3f0 [ 25.332285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.332414] kthread+0x328/0x630 [ 25.332509] ret_from_fork+0x10/0x20 [ 25.332779] [ 25.332837] The buggy address belongs to the object at fff00000c77e8300 [ 25.332837] which belongs to the cache kmalloc-128 of size 128 [ 25.333431] The buggy address is located 120 bytes inside of [ 25.333431] freed 128-byte region [fff00000c77e8300, fff00000c77e8380) [ 25.334085] [ 25.334491] The buggy address belongs to the physical page: [ 25.334578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.334778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.334905] page_type: f5(slab) [ 25.335151] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.335283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.335640] page dumped because: kasan: bad access detected [ 25.335739] [ 25.335787] Memory state around the buggy address: [ 25.335859] fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.335960] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.336099] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.336784] ^ [ 25.337065] fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.337297] fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.337441] ================================================================== [ 25.284579] ================================================================== [ 25.286327] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 25.287323] Read of size 1 at addr fff00000c77e8300 by task kunit_try_catch/197 [ 25.287527] [ 25.287637] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.288069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.288195] Hardware name: linux,dummy-virt (DT) [ 25.288321] Call trace: [ 25.288409] show_stack+0x20/0x38 (C) [ 25.288589] dump_stack_lvl+0x8c/0xd0 [ 25.288735] print_report+0x118/0x608 [ 25.288858] kasan_report+0xdc/0x128 [ 25.288968] __kasan_check_byte+0x54/0x70 [ 25.289084] ksize+0x30/0x88 [ 25.289208] ksize_uaf+0x168/0x5f8 [ 25.289356] kunit_try_run_case+0x170/0x3f0 [ 25.289776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.290391] kthread+0x328/0x630 [ 25.290539] ret_from_fork+0x10/0x20 [ 25.290819] [ 25.290909] Allocated by task 197: [ 25.290999] kasan_save_stack+0x3c/0x68 [ 25.291106] kasan_save_track+0x20/0x40 [ 25.291209] kasan_save_alloc_info+0x40/0x58 [ 25.291308] __kasan_kmalloc+0xd4/0xd8 [ 25.292630] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.292837] ksize_uaf+0xb8/0x5f8 [ 25.293024] kunit_try_run_case+0x170/0x3f0 [ 25.293192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.293340] kthread+0x328/0x630 [ 25.293921] ret_from_fork+0x10/0x20 [ 25.294088] [ 25.294175] Freed by task 197: [ 25.294381] kasan_save_stack+0x3c/0x68 [ 25.294482] kasan_save_track+0x20/0x40 [ 25.294577] kasan_save_free_info+0x4c/0x78 [ 25.295511] __kasan_slab_free+0x6c/0x98 [ 25.295654] kfree+0x214/0x3c8 [ 25.295848] ksize_uaf+0x11c/0x5f8 [ 25.296115] kunit_try_run_case+0x170/0x3f0 [ 25.296390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.296505] kthread+0x328/0x630 [ 25.297292] ret_from_fork+0x10/0x20 [ 25.297650] [ 25.297951] The buggy address belongs to the object at fff00000c77e8300 [ 25.297951] which belongs to the cache kmalloc-128 of size 128 [ 25.298535] The buggy address is located 0 bytes inside of [ 25.298535] freed 128-byte region [fff00000c77e8300, fff00000c77e8380) [ 25.298898] [ 25.299000] The buggy address belongs to the physical page: [ 25.299075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.299950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.300175] page_type: f5(slab) [ 25.300420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.300557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.301174] page dumped because: kasan: bad access detected [ 25.301621] [ 25.301674] Memory state around the buggy address: [ 25.301938] fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.302409] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.302516] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.302608] ^ [ 25.303294] fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.303414] fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.303983] ================================================================== [ 25.306985] ================================================================== [ 25.307728] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 25.308536] Read of size 1 at addr fff00000c77e8300 by task kunit_try_catch/197 [ 25.308694] [ 25.308768] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.309587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.310178] Hardware name: linux,dummy-virt (DT) [ 25.310363] Call trace: [ 25.310449] show_stack+0x20/0x38 (C) [ 25.311015] dump_stack_lvl+0x8c/0xd0 [ 25.311481] print_report+0x118/0x608 [ 25.311611] kasan_report+0xdc/0x128 [ 25.312172] __asan_report_load1_noabort+0x20/0x30 [ 25.312539] ksize_uaf+0x598/0x5f8 [ 25.312924] kunit_try_run_case+0x170/0x3f0 [ 25.313046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.313175] kthread+0x328/0x630 [ 25.313301] ret_from_fork+0x10/0x20 [ 25.313868] [ 25.314443] Allocated by task 197: [ 25.314528] kasan_save_stack+0x3c/0x68 [ 25.314884] kasan_save_track+0x20/0x40 [ 25.315113] kasan_save_alloc_info+0x40/0x58 [ 25.315223] __kasan_kmalloc+0xd4/0xd8 [ 25.315727] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.315846] ksize_uaf+0xb8/0x5f8 [ 25.316351] kunit_try_run_case+0x170/0x3f0 [ 25.316720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.316934] kthread+0x328/0x630 [ 25.317034] ret_from_fork+0x10/0x20 [ 25.317144] [ 25.317195] Freed by task 197: [ 25.317355] kasan_save_stack+0x3c/0x68 [ 25.317488] kasan_save_track+0x20/0x40 [ 25.317614] kasan_save_free_info+0x4c/0x78 [ 25.317891] __kasan_slab_free+0x6c/0x98 [ 25.318063] kfree+0x214/0x3c8 [ 25.318207] ksize_uaf+0x11c/0x5f8 [ 25.318469] kunit_try_run_case+0x170/0x3f0 [ 25.318582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.318809] kthread+0x328/0x630 [ 25.318940] ret_from_fork+0x10/0x20 [ 25.319050] [ 25.319105] The buggy address belongs to the object at fff00000c77e8300 [ 25.319105] which belongs to the cache kmalloc-128 of size 128 [ 25.319295] The buggy address is located 0 bytes inside of [ 25.319295] freed 128-byte region [fff00000c77e8300, fff00000c77e8380) [ 25.319542] [ 25.319599] The buggy address belongs to the physical page: [ 25.319788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.319929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.320044] page_type: f5(slab) [ 25.321132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.321489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.321592] page dumped because: kasan: bad access detected [ 25.322583] [ 25.322729] Memory state around the buggy address: [ 25.322836] fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.322951] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.323060] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.323214] ^ [ 25.323298] fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.323452] fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.323557] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 25.225453] ================================================================== [ 25.225621] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 25.225784] Read of size 1 at addr fff00000c77e8273 by task kunit_try_catch/195 [ 25.225899] [ 25.225983] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.226183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.226249] Hardware name: linux,dummy-virt (DT) [ 25.226324] Call trace: [ 25.226375] show_stack+0x20/0x38 (C) [ 25.226502] dump_stack_lvl+0x8c/0xd0 [ 25.226622] print_report+0x118/0x608 [ 25.226777] kasan_report+0xdc/0x128 [ 25.226895] __asan_report_load1_noabort+0x20/0x30 [ 25.227010] ksize_unpoisons_memory+0x628/0x740 [ 25.227133] kunit_try_run_case+0x170/0x3f0 [ 25.227258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.227389] kthread+0x328/0x630 [ 25.228810] ret_from_fork+0x10/0x20 [ 25.229083] [ 25.229134] Allocated by task 195: [ 25.229207] kasan_save_stack+0x3c/0x68 [ 25.229391] kasan_save_track+0x20/0x40 [ 25.229750] kasan_save_alloc_info+0x40/0x58 [ 25.230422] __kasan_kmalloc+0xd4/0xd8 [ 25.230539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.230668] ksize_unpoisons_memory+0xc0/0x740 [ 25.231832] kunit_try_run_case+0x170/0x3f0 [ 25.232046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.232572] kthread+0x328/0x630 [ 25.233053] ret_from_fork+0x10/0x20 [ 25.233191] [ 25.233474] The buggy address belongs to the object at fff00000c77e8200 [ 25.233474] which belongs to the cache kmalloc-128 of size 128 [ 25.233746] The buggy address is located 0 bytes to the right of [ 25.233746] allocated 115-byte region [fff00000c77e8200, fff00000c77e8273) [ 25.234040] [ 25.234093] The buggy address belongs to the physical page: [ 25.234569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.234882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.235016] page_type: f5(slab) [ 25.235324] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.235466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.236048] page dumped because: kasan: bad access detected [ 25.236146] [ 25.236199] Memory state around the buggy address: [ 25.236788] fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.237496] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.237631] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.237988] ^ [ 25.238278] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238386] fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238481] ================================================================== [ 25.241366] ================================================================== [ 25.241472] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 25.241587] Read of size 1 at addr fff00000c77e8278 by task kunit_try_catch/195 [ 25.241722] [ 25.241799] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.241993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.242056] Hardware name: linux,dummy-virt (DT) [ 25.242135] Call trace: [ 25.242187] show_stack+0x20/0x38 (C) [ 25.243640] dump_stack_lvl+0x8c/0xd0 [ 25.243905] print_report+0x118/0x608 [ 25.244040] kasan_report+0xdc/0x128 [ 25.244202] __asan_report_load1_noabort+0x20/0x30 [ 25.244454] ksize_unpoisons_memory+0x618/0x740 [ 25.245286] kunit_try_run_case+0x170/0x3f0 [ 25.245700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.246323] kthread+0x328/0x630 [ 25.246795] ret_from_fork+0x10/0x20 [ 25.247174] [ 25.247223] Allocated by task 195: [ 25.247299] kasan_save_stack+0x3c/0x68 [ 25.247405] kasan_save_track+0x20/0x40 [ 25.247497] kasan_save_alloc_info+0x40/0x58 [ 25.248202] __kasan_kmalloc+0xd4/0xd8 [ 25.248492] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.249401] ksize_unpoisons_memory+0xc0/0x740 [ 25.249722] kunit_try_run_case+0x170/0x3f0 [ 25.250261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.250489] kthread+0x328/0x630 [ 25.250699] ret_from_fork+0x10/0x20 [ 25.251171] [ 25.251222] The buggy address belongs to the object at fff00000c77e8200 [ 25.251222] which belongs to the cache kmalloc-128 of size 128 [ 25.251643] The buggy address is located 5 bytes to the right of [ 25.251643] allocated 115-byte region [fff00000c77e8200, fff00000c77e8273) [ 25.252241] [ 25.252503] The buggy address belongs to the physical page: [ 25.252572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.252715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.252830] page_type: f5(slab) [ 25.252925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.253044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.254352] page dumped because: kasan: bad access detected [ 25.254458] [ 25.254509] Memory state around the buggy address: [ 25.254595] fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.254777] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.254838] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.254894] ^ [ 25.254999] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.255138] fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.255258] ================================================================== [ 25.256853] ================================================================== [ 25.256967] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 25.257283] Read of size 1 at addr fff00000c77e827f by task kunit_try_catch/195 [ 25.257405] [ 25.257474] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.257667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.257751] Hardware name: linux,dummy-virt (DT) [ 25.257826] Call trace: [ 25.257890] show_stack+0x20/0x38 (C) [ 25.258145] dump_stack_lvl+0x8c/0xd0 [ 25.258290] print_report+0x118/0x608 [ 25.258430] kasan_report+0xdc/0x128 [ 25.258577] __asan_report_load1_noabort+0x20/0x30 [ 25.258822] ksize_unpoisons_memory+0x690/0x740 [ 25.259079] kunit_try_run_case+0x170/0x3f0 [ 25.259250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.259381] kthread+0x328/0x630 [ 25.259486] ret_from_fork+0x10/0x20 [ 25.259613] [ 25.259735] Allocated by task 195: [ 25.259820] kasan_save_stack+0x3c/0x68 [ 25.260135] kasan_save_track+0x20/0x40 [ 25.260337] kasan_save_alloc_info+0x40/0x58 [ 25.260984] __kasan_kmalloc+0xd4/0xd8 [ 25.261168] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.261279] ksize_unpoisons_memory+0xc0/0x740 [ 25.261394] kunit_try_run_case+0x170/0x3f0 [ 25.261670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.262072] kthread+0x328/0x630 [ 25.262813] ret_from_fork+0x10/0x20 [ 25.263362] [ 25.263431] The buggy address belongs to the object at fff00000c77e8200 [ 25.263431] which belongs to the cache kmalloc-128 of size 128 [ 25.263584] The buggy address is located 12 bytes to the right of [ 25.263584] allocated 115-byte region [fff00000c77e8200, fff00000c77e8273) [ 25.263994] [ 25.264063] The buggy address belongs to the physical page: [ 25.264137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.264260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.264379] page_type: f5(slab) [ 25.264477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.264612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.264891] page dumped because: kasan: bad access detected [ 25.264979] [ 25.265107] Memory state around the buggy address: [ 25.265181] fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.265369] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.265607] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.265720] ^ [ 25.265822] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.266008] fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.266164] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 30.660264] ================================================================== [ 30.660577] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.660577] [ 30.660878] Out-of-bounds read at 0x00000000b25dd63f (1B left of kfence-#131): [ 30.661018] test_out_of_bounds_read+0x114/0x3e0 [ 30.661156] kunit_try_run_case+0x170/0x3f0 [ 30.661482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.661612] kthread+0x328/0x630 [ 30.661929] ret_from_fork+0x10/0x20 [ 30.662045] [ 30.662106] kfence-#131: 0x0000000065e59076-0x00000000069e2a41, size=32, cache=test [ 30.662106] [ 30.662225] allocated by task 290 on cpu 1 at 30.660099s (0.002118s ago): [ 30.662468] test_alloc+0x230/0x628 [ 30.662575] test_out_of_bounds_read+0xdc/0x3e0 [ 30.662704] kunit_try_run_case+0x170/0x3f0 [ 30.662830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.663266] kthread+0x328/0x630 [ 30.663391] ret_from_fork+0x10/0x20 [ 30.663503] [ 30.663607] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.663826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.664079] Hardware name: linux,dummy-virt (DT) [ 30.664179] ================================================================== [ 30.872177] ================================================================== [ 30.872332] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 30.872332] [ 30.872530] Out-of-bounds read at 0x00000000e7ad4ce4 (32B right of kfence-#133): [ 30.872717] test_out_of_bounds_read+0x1c8/0x3e0 [ 30.872948] kunit_try_run_case+0x170/0x3f0 [ 30.873062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.873181] kthread+0x328/0x630 [ 30.873298] ret_from_fork+0x10/0x20 [ 30.873397] [ 30.873459] kfence-#133: 0x0000000060b919ef-0x000000007ef3bc70, size=32, cache=test [ 30.873459] [ 30.873578] allocated by task 290 on cpu 1 at 30.871976s (0.001594s ago): [ 30.873752] test_alloc+0x230/0x628 [ 30.873855] test_out_of_bounds_read+0x198/0x3e0 [ 30.873957] kunit_try_run_case+0x170/0x3f0 [ 30.874055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.874160] kthread+0x328/0x630 [ 30.874266] ret_from_fork+0x10/0x20 [ 30.874393] [ 30.874561] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.874898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.874988] Hardware name: linux,dummy-virt (DT) [ 30.875202] ================================================================== [ 30.237279] ================================================================== [ 30.237564] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.237564] [ 30.237844] Out-of-bounds read at 0x00000000daa260de (1B left of kfence-#127): [ 30.238095] test_out_of_bounds_read+0x114/0x3e0 [ 30.238342] kunit_try_run_case+0x170/0x3f0 [ 30.238470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.238583] kthread+0x328/0x630 [ 30.238866] ret_from_fork+0x10/0x20 [ 30.239036] [ 30.239191] kfence-#127: 0x00000000e97adcf7-0x00000000bbfbe399, size=32, cache=kmalloc-32 [ 30.239191] [ 30.239382] allocated by task 288 on cpu 1 at 30.236308s (0.003065s ago): [ 30.239547] test_alloc+0x29c/0x628 [ 30.239651] test_out_of_bounds_read+0xdc/0x3e0 [ 30.239773] kunit_try_run_case+0x170/0x3f0 [ 30.239926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.240107] kthread+0x328/0x630 [ 30.240256] ret_from_fork+0x10/0x20 [ 30.240365] [ 30.240552] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.240961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.241040] Hardware name: linux,dummy-virt (DT) [ 30.241177] ================================================================== [ 30.449537] ================================================================== [ 30.449713] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 30.449713] [ 30.450116] Out-of-bounds read at 0x00000000f02c4d09 (32B right of kfence-#129): [ 30.450707] test_out_of_bounds_read+0x1c8/0x3e0 [ 30.450854] kunit_try_run_case+0x170/0x3f0 [ 30.451404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.451541] kthread+0x328/0x630 [ 30.452267] ret_from_fork+0x10/0x20 [ 30.452398] [ 30.452474] kfence-#129: 0x000000005c90d312-0x00000000e663bc63, size=32, cache=kmalloc-32 [ 30.452474] [ 30.452703] allocated by task 288 on cpu 1 at 30.448766s (0.003928s ago): [ 30.453478] test_alloc+0x29c/0x628 [ 30.454051] test_out_of_bounds_read+0x198/0x3e0 [ 30.454393] kunit_try_run_case+0x170/0x3f0 [ 30.454759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.454899] kthread+0x328/0x630 [ 30.455015] ret_from_fork+0x10/0x20 [ 30.455853] [ 30.455970] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.456202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.456240] Hardware name: linux,dummy-virt (DT) [ 30.456280] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_node_oob_right
[ 24.082511] ================================================================== [ 24.082815] BUG: KFENCE: out-of-bounds read in kmalloc_node_oob_right+0x160/0x330 [ 24.082815] [ 24.082978] Out-of-bounds read at 0x000000007748945b (4096B right of kfence-#86): [ 24.083562] kmalloc_node_oob_right+0x160/0x330 [ 24.083674] kunit_try_run_case+0x170/0x3f0 [ 24.083805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.083931] kthread+0x328/0x630 [ 24.084196] ret_from_fork+0x10/0x20 [ 24.084436] [ 24.085146] kfence-#86: 0x00000000028b77d8-0x00000000363bdff7, size=4096, cache=kmalloc-4k [ 24.085146] [ 24.085910] allocated by task 141 on cpu 0 at 24.079275s (0.006234s ago): [ 24.088428] kmalloc_node_oob_right+0xbc/0x330 [ 24.089011] kunit_try_run_case+0x170/0x3f0 [ 24.089194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.089559] kthread+0x328/0x630 [ 24.089719] ret_from_fork+0x10/0x20 [ 24.090471] [ 24.090828] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.091377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.091444] Hardware name: linux,dummy-virt (DT) [ 24.091915] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 30.088773] ================================================================== [ 30.089033] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 30.090696] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.090840] [ 30.090973] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.091186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091550] Hardware name: linux,dummy-virt (DT) [ 30.091663] Call trace: [ 30.091739] show_stack+0x20/0x38 (C) [ 30.091869] dump_stack_lvl+0x8c/0xd0 [ 30.091992] print_report+0x118/0x608 [ 30.092117] kasan_report+0xdc/0x128 [ 30.092239] kasan_check_range+0x100/0x1a8 [ 30.093739] __kasan_check_write+0x20/0x30 [ 30.093942] strncpy_from_user+0x3c/0x2a0 [ 30.094077] copy_user_test_oob+0x5c0/0xec8 [ 30.094566] kunit_try_run_case+0x170/0x3f0 [ 30.094876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.095016] kthread+0x328/0x630 [ 30.095131] ret_from_fork+0x10/0x20 [ 30.095241] [ 30.095286] Allocated by task 286: [ 30.095355] kasan_save_stack+0x3c/0x68 [ 30.095463] kasan_save_track+0x20/0x40 [ 30.095560] kasan_save_alloc_info+0x40/0x58 [ 30.095652] __kasan_kmalloc+0xd4/0xd8 [ 30.095764] __kmalloc_noprof+0x190/0x4d0 [ 30.095865] kunit_kmalloc_array+0x34/0x88 [ 30.095964] copy_user_test_oob+0xac/0xec8 [ 30.096062] kunit_try_run_case+0x170/0x3f0 [ 30.096162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.096359] kthread+0x328/0x630 [ 30.096668] ret_from_fork+0x10/0x20 [ 30.096788] [ 30.096842] The buggy address belongs to the object at fff00000c56e8f00 [ 30.096842] which belongs to the cache kmalloc-128 of size 128 [ 30.096981] The buggy address is located 0 bytes inside of [ 30.096981] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.097137] [ 30.097188] The buggy address belongs to the physical page: [ 30.097278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.098464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.098778] page_type: f5(slab) [ 30.099117] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.099967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.100121] page dumped because: kasan: bad access detected [ 30.100208] [ 30.100258] Memory state around the buggy address: [ 30.100344] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.100462] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.100573] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.101182] ^ [ 30.101664] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.101920] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.102461] ================================================================== [ 30.104744] ================================================================== [ 30.104853] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 30.104962] Write of size 1 at addr fff00000c56e8f78 by task kunit_try_catch/286 [ 30.105083] [ 30.105152] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.105379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.105449] Hardware name: linux,dummy-virt (DT) [ 30.105522] Call trace: [ 30.105582] show_stack+0x20/0x38 (C) [ 30.105716] dump_stack_lvl+0x8c/0xd0 [ 30.105849] print_report+0x118/0x608 [ 30.107002] kasan_report+0xdc/0x128 [ 30.107432] __asan_report_store1_noabort+0x20/0x30 [ 30.107762] strncpy_from_user+0x270/0x2a0 [ 30.107894] copy_user_test_oob+0x5c0/0xec8 [ 30.108112] kunit_try_run_case+0x170/0x3f0 [ 30.108265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.108402] kthread+0x328/0x630 [ 30.108533] ret_from_fork+0x10/0x20 [ 30.108760] [ 30.108817] Allocated by task 286: [ 30.108905] kasan_save_stack+0x3c/0x68 [ 30.109022] kasan_save_track+0x20/0x40 [ 30.109131] kasan_save_alloc_info+0x40/0x58 [ 30.109236] __kasan_kmalloc+0xd4/0xd8 [ 30.109395] __kmalloc_noprof+0x190/0x4d0 [ 30.109507] kunit_kmalloc_array+0x34/0x88 [ 30.109611] copy_user_test_oob+0xac/0xec8 [ 30.109767] kunit_try_run_case+0x170/0x3f0 [ 30.109936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.110116] kthread+0x328/0x630 [ 30.110373] ret_from_fork+0x10/0x20 [ 30.110478] [ 30.110570] The buggy address belongs to the object at fff00000c56e8f00 [ 30.110570] which belongs to the cache kmalloc-128 of size 128 [ 30.110747] The buggy address is located 0 bytes to the right of [ 30.110747] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.110974] [ 30.111085] The buggy address belongs to the physical page: [ 30.111212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.111361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.111496] page_type: f5(slab) [ 30.111672] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.111967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.112359] page dumped because: kasan: bad access detected [ 30.112506] [ 30.112557] Memory state around the buggy address: [ 30.112659] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.112818] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.113130] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.113286] ^ [ 30.113390] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.113500] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.113632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 30.012532] ================================================================== [ 30.012728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 30.013997] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.014142] [ 30.014234] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.014466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.014537] Hardware name: linux,dummy-virt (DT) [ 30.014617] Call trace: [ 30.014677] show_stack+0x20/0x38 (C) [ 30.014824] dump_stack_lvl+0x8c/0xd0 [ 30.014986] print_report+0x118/0x608 [ 30.015749] kasan_report+0xdc/0x128 [ 30.015908] kasan_check_range+0x100/0x1a8 [ 30.016055] __kasan_check_write+0x20/0x30 [ 30.016201] copy_user_test_oob+0x35c/0xec8 [ 30.016352] kunit_try_run_case+0x170/0x3f0 [ 30.016491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.016645] kthread+0x328/0x630 [ 30.016966] ret_from_fork+0x10/0x20 [ 30.017119] [ 30.017181] Allocated by task 286: [ 30.017285] kasan_save_stack+0x3c/0x68 [ 30.017407] kasan_save_track+0x20/0x40 [ 30.017525] kasan_save_alloc_info+0x40/0x58 [ 30.017806] __kasan_kmalloc+0xd4/0xd8 [ 30.018107] __kmalloc_noprof+0x190/0x4d0 [ 30.018245] kunit_kmalloc_array+0x34/0x88 [ 30.018506] copy_user_test_oob+0xac/0xec8 [ 30.018693] kunit_try_run_case+0x170/0x3f0 [ 30.018797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.018920] kthread+0x328/0x630 [ 30.019103] ret_from_fork+0x10/0x20 [ 30.019277] [ 30.019434] The buggy address belongs to the object at fff00000c56e8f00 [ 30.019434] which belongs to the cache kmalloc-128 of size 128 [ 30.019911] The buggy address is located 0 bytes inside of [ 30.019911] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.020255] [ 30.020330] The buggy address belongs to the physical page: [ 30.020420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.020573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.020736] page_type: f5(slab) [ 30.020840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.021657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.022059] page dumped because: kasan: bad access detected [ 30.022234] [ 30.022438] Memory state around the buggy address: [ 30.022561] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.022694] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.022815] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.022920] ^ [ 30.023021] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.025647] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.025783] ================================================================== [ 29.966133] ================================================================== [ 29.966428] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 29.966736] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 29.966873] [ 29.967077] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.967301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.967393] Hardware name: linux,dummy-virt (DT) [ 29.967641] Call trace: [ 29.967733] show_stack+0x20/0x38 (C) [ 29.967874] dump_stack_lvl+0x8c/0xd0 [ 29.968135] print_report+0x118/0x608 [ 29.968288] kasan_report+0xdc/0x128 [ 29.968417] kasan_check_range+0x100/0x1a8 [ 29.969042] __kasan_check_write+0x20/0x30 [ 29.969113] copy_user_test_oob+0x234/0xec8 [ 29.969192] kunit_try_run_case+0x170/0x3f0 [ 29.970274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.970430] kthread+0x328/0x630 [ 29.970553] ret_from_fork+0x10/0x20 [ 29.970776] [ 29.970839] Allocated by task 286: [ 29.970967] kasan_save_stack+0x3c/0x68 [ 29.971095] kasan_save_track+0x20/0x40 [ 29.971231] kasan_save_alloc_info+0x40/0x58 [ 29.971554] __kasan_kmalloc+0xd4/0xd8 [ 29.971673] __kmalloc_noprof+0x190/0x4d0 [ 29.971842] kunit_kmalloc_array+0x34/0x88 [ 29.971941] copy_user_test_oob+0xac/0xec8 [ 29.972038] kunit_try_run_case+0x170/0x3f0 [ 29.972200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.972488] kthread+0x328/0x630 [ 29.972714] ret_from_fork+0x10/0x20 [ 29.972887] [ 29.972967] The buggy address belongs to the object at fff00000c56e8f00 [ 29.972967] which belongs to the cache kmalloc-128 of size 128 [ 29.973188] The buggy address is located 0 bytes inside of [ 29.973188] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 29.973638] [ 29.973718] The buggy address belongs to the physical page: [ 29.973813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 29.973975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.974178] page_type: f5(slab) [ 29.974300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.974497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.974611] page dumped because: kasan: bad access detected [ 29.974770] [ 29.974867] Memory state around the buggy address: [ 29.974966] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.975091] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.975301] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.975440] ^ [ 29.975576] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.975789] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.975936] ================================================================== [ 29.986174] ================================================================== [ 29.986329] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 29.986463] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 29.986596] [ 29.986773] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.987596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.987726] Hardware name: linux,dummy-virt (DT) [ 29.988069] Call trace: [ 29.988264] show_stack+0x20/0x38 (C) [ 29.988403] dump_stack_lvl+0x8c/0xd0 [ 29.988537] print_report+0x118/0x608 [ 29.988926] kasan_report+0xdc/0x128 [ 29.989131] kasan_check_range+0x100/0x1a8 [ 29.989402] __kasan_check_read+0x20/0x30 [ 29.989783] copy_user_test_oob+0x728/0xec8 [ 29.989971] kunit_try_run_case+0x170/0x3f0 [ 29.990111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.990247] kthread+0x328/0x630 [ 29.990370] ret_from_fork+0x10/0x20 [ 29.990541] [ 29.990627] Allocated by task 286: [ 29.990728] kasan_save_stack+0x3c/0x68 [ 29.990852] kasan_save_track+0x20/0x40 [ 29.990975] kasan_save_alloc_info+0x40/0x58 [ 29.991177] __kasan_kmalloc+0xd4/0xd8 [ 29.991543] __kmalloc_noprof+0x190/0x4d0 [ 29.991676] kunit_kmalloc_array+0x34/0x88 [ 29.991802] copy_user_test_oob+0xac/0xec8 [ 29.991899] kunit_try_run_case+0x170/0x3f0 [ 29.992295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.992589] kthread+0x328/0x630 [ 29.992706] ret_from_fork+0x10/0x20 [ 29.993183] [ 29.993275] The buggy address belongs to the object at fff00000c56e8f00 [ 29.993275] which belongs to the cache kmalloc-128 of size 128 [ 29.993579] The buggy address is located 0 bytes inside of [ 29.993579] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 29.993809] [ 29.993866] The buggy address belongs to the physical page: [ 29.993946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 29.994075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.994201] page_type: f5(slab) [ 29.994350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.994573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.994767] page dumped because: kasan: bad access detected [ 29.994855] [ 29.994916] Memory state around the buggy address: [ 29.995135] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.995351] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995560] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.995661] ^ [ 29.995796] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995925] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.996032] ================================================================== [ 30.028944] ================================================================== [ 30.029118] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 30.029354] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.029548] [ 30.029635] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.030080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.030159] Hardware name: linux,dummy-virt (DT) [ 30.030282] Call trace: [ 30.030357] show_stack+0x20/0x38 (C) [ 30.030563] dump_stack_lvl+0x8c/0xd0 [ 30.030949] print_report+0x118/0x608 [ 30.031095] kasan_report+0xdc/0x128 [ 30.031305] kasan_check_range+0x100/0x1a8 [ 30.031658] __kasan_check_read+0x20/0x30 [ 30.031802] copy_user_test_oob+0x3c8/0xec8 [ 30.031924] kunit_try_run_case+0x170/0x3f0 [ 30.032044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.032177] kthread+0x328/0x630 [ 30.032339] ret_from_fork+0x10/0x20 [ 30.032460] [ 30.032511] Allocated by task 286: [ 30.032583] kasan_save_stack+0x3c/0x68 [ 30.032734] kasan_save_track+0x20/0x40 [ 30.032858] kasan_save_alloc_info+0x40/0x58 [ 30.032980] __kasan_kmalloc+0xd4/0xd8 [ 30.033097] __kmalloc_noprof+0x190/0x4d0 [ 30.033217] kunit_kmalloc_array+0x34/0x88 [ 30.033373] copy_user_test_oob+0xac/0xec8 [ 30.033484] kunit_try_run_case+0x170/0x3f0 [ 30.033605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.033934] kthread+0x328/0x630 [ 30.034195] ret_from_fork+0x10/0x20 [ 30.034318] [ 30.034378] The buggy address belongs to the object at fff00000c56e8f00 [ 30.034378] which belongs to the cache kmalloc-128 of size 128 [ 30.034537] The buggy address is located 0 bytes inside of [ 30.034537] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.034797] [ 30.035010] The buggy address belongs to the physical page: [ 30.035533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.035880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.036006] page_type: f5(slab) [ 30.036573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.037298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.037460] page dumped because: kasan: bad access detected [ 30.037836] [ 30.038130] Memory state around the buggy address: [ 30.038221] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.038330] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.038484] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.038605] ^ [ 30.039002] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.039115] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.039755] ================================================================== [ 30.068074] ================================================================== [ 30.068193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 30.068334] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.068456] [ 30.068539] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.073127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.073206] Hardware name: linux,dummy-virt (DT) [ 30.073916] Call trace: [ 30.073984] show_stack+0x20/0x38 (C) [ 30.074111] dump_stack_lvl+0x8c/0xd0 [ 30.075353] print_report+0x118/0x608 [ 30.075745] kasan_report+0xdc/0x128 [ 30.075860] kasan_check_range+0x100/0x1a8 [ 30.075992] __kasan_check_read+0x20/0x30 [ 30.077768] copy_user_test_oob+0x4a0/0xec8 [ 30.078290] kunit_try_run_case+0x170/0x3f0 [ 30.078565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.079064] kthread+0x328/0x630 [ 30.079389] ret_from_fork+0x10/0x20 [ 30.079619] [ 30.079737] Allocated by task 286: [ 30.079827] kasan_save_stack+0x3c/0x68 [ 30.080003] kasan_save_track+0x20/0x40 [ 30.080109] kasan_save_alloc_info+0x40/0x58 [ 30.080232] __kasan_kmalloc+0xd4/0xd8 [ 30.080379] __kmalloc_noprof+0x190/0x4d0 [ 30.080487] kunit_kmalloc_array+0x34/0x88 [ 30.080672] copy_user_test_oob+0xac/0xec8 [ 30.080832] kunit_try_run_case+0x170/0x3f0 [ 30.081375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.081550] kthread+0x328/0x630 [ 30.081658] ret_from_fork+0x10/0x20 [ 30.082075] [ 30.082129] The buggy address belongs to the object at fff00000c56e8f00 [ 30.082129] which belongs to the cache kmalloc-128 of size 128 [ 30.082556] The buggy address is located 0 bytes inside of [ 30.082556] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.082759] [ 30.082919] The buggy address belongs to the physical page: [ 30.083005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.083143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.083284] page_type: f5(slab) [ 30.083384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.083511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.083613] page dumped because: kasan: bad access detected [ 30.083714] [ 30.083769] Memory state around the buggy address: [ 30.083849] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.083956] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084062] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.084158] ^ [ 30.084260] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084367] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.084460] ================================================================== [ 30.042209] ================================================================== [ 30.042476] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 30.042893] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.043247] [ 30.043347] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.043924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.044111] Hardware name: linux,dummy-virt (DT) [ 30.044199] Call trace: [ 30.044473] show_stack+0x20/0x38 (C) [ 30.044697] dump_stack_lvl+0x8c/0xd0 [ 30.045049] print_report+0x118/0x608 [ 30.045176] kasan_report+0xdc/0x128 [ 30.045322] kasan_check_range+0x100/0x1a8 [ 30.045450] __kasan_check_write+0x20/0x30 [ 30.045615] copy_user_test_oob+0x434/0xec8 [ 30.046047] kunit_try_run_case+0x170/0x3f0 [ 30.046479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047161] kthread+0x328/0x630 [ 30.047533] ret_from_fork+0x10/0x20 [ 30.047997] [ 30.048068] Allocated by task 286: [ 30.048162] kasan_save_stack+0x3c/0x68 [ 30.048348] kasan_save_track+0x20/0x40 [ 30.048458] kasan_save_alloc_info+0x40/0x58 [ 30.048846] __kasan_kmalloc+0xd4/0xd8 [ 30.049138] __kmalloc_noprof+0x190/0x4d0 [ 30.049412] kunit_kmalloc_array+0x34/0x88 [ 30.049862] copy_user_test_oob+0xac/0xec8 [ 30.050116] kunit_try_run_case+0x170/0x3f0 [ 30.050446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.050581] kthread+0x328/0x630 [ 30.050841] ret_from_fork+0x10/0x20 [ 30.051198] [ 30.051306] The buggy address belongs to the object at fff00000c56e8f00 [ 30.051306] which belongs to the cache kmalloc-128 of size 128 [ 30.051472] The buggy address is located 0 bytes inside of [ 30.051472] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.051876] [ 30.052007] The buggy address belongs to the physical page: [ 30.053283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.053475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.054573] page_type: f5(slab) [ 30.054903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.055513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.056479] page dumped because: kasan: bad access detected [ 30.056574] [ 30.057420] Memory state around the buggy address: [ 30.057907] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.058424] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.058542] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.058641] ^ [ 30.058769] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.060229] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.061526] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 29.861880] ================================================================== [ 29.862033] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 29.862188] Read of size 8 at addr fff00000c56e8e78 by task kunit_try_catch/282 [ 29.862312] [ 29.865878] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.866835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.866905] Hardware name: linux,dummy-virt (DT) [ 29.868173] Call trace: [ 29.868273] show_stack+0x20/0x38 (C) [ 29.868540] dump_stack_lvl+0x8c/0xd0 [ 29.868671] print_report+0x118/0x608 [ 29.870586] kasan_report+0xdc/0x128 [ 29.870867] __asan_report_load8_noabort+0x20/0x30 [ 29.871215] copy_to_kernel_nofault+0x204/0x250 [ 29.871380] copy_to_kernel_nofault_oob+0x158/0x418 [ 29.871662] kunit_try_run_case+0x170/0x3f0 [ 29.871826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.871957] kthread+0x328/0x630 [ 29.872120] ret_from_fork+0x10/0x20 [ 29.872286] [ 29.872452] Allocated by task 282: [ 29.872667] kasan_save_stack+0x3c/0x68 [ 29.872798] kasan_save_track+0x20/0x40 [ 29.872900] kasan_save_alloc_info+0x40/0x58 [ 29.872997] __kasan_kmalloc+0xd4/0xd8 [ 29.873142] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.873271] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.873382] kunit_try_run_case+0x170/0x3f0 [ 29.873514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.873758] kthread+0x328/0x630 [ 29.873870] ret_from_fork+0x10/0x20 [ 29.873981] [ 29.874045] The buggy address belongs to the object at fff00000c56e8e00 [ 29.874045] which belongs to the cache kmalloc-128 of size 128 [ 29.874205] The buggy address is located 0 bytes to the right of [ 29.874205] allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78) [ 29.874380] [ 29.874598] The buggy address belongs to the physical page: [ 29.874806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 29.874969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.875115] page_type: f5(slab) [ 29.875300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.875444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.875822] page dumped because: kasan: bad access detected [ 29.876039] [ 29.876136] Memory state around the buggy address: [ 29.876368] fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.876482] fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.876591] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.876701] ^ [ 29.876810] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.876918] fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.877077] ================================================================== [ 29.879375] ================================================================== [ 29.879529] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 29.879660] Write of size 8 at addr fff00000c56e8e78 by task kunit_try_catch/282 [ 29.879826] [ 29.880058] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.880182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.880228] Hardware name: linux,dummy-virt (DT) [ 29.880363] Call trace: [ 29.880497] show_stack+0x20/0x38 (C) [ 29.880731] dump_stack_lvl+0x8c/0xd0 [ 29.881111] print_report+0x118/0x608 [ 29.881401] kasan_report+0xdc/0x128 [ 29.881587] kasan_check_range+0x100/0x1a8 [ 29.881728] __kasan_check_write+0x20/0x30 [ 29.881849] copy_to_kernel_nofault+0x8c/0x250 [ 29.881973] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 29.882105] kunit_try_run_case+0x170/0x3f0 [ 29.882228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.882361] kthread+0x328/0x630 [ 29.882474] ret_from_fork+0x10/0x20 [ 29.882599] [ 29.882731] Allocated by task 282: [ 29.882828] kasan_save_stack+0x3c/0x68 [ 29.882949] kasan_save_track+0x20/0x40 [ 29.883072] kasan_save_alloc_info+0x40/0x58 [ 29.883400] __kasan_kmalloc+0xd4/0xd8 [ 29.883525] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.883653] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.883791] kunit_try_run_case+0x170/0x3f0 [ 29.883912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.884086] kthread+0x328/0x630 [ 29.884192] ret_from_fork+0x10/0x20 [ 29.884360] [ 29.884429] The buggy address belongs to the object at fff00000c56e8e00 [ 29.884429] which belongs to the cache kmalloc-128 of size 128 [ 29.884605] The buggy address is located 0 bytes to the right of [ 29.884605] allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78) [ 29.884896] [ 29.884958] The buggy address belongs to the physical page: [ 29.885053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 29.885189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.885398] page_type: f5(slab) [ 29.885700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.886037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.886179] page dumped because: kasan: bad access detected [ 29.886302] [ 29.886358] Memory state around the buggy address: [ 29.886452] fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.886583] fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.886931] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.887025] ^ [ 29.887256] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.887754] fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.887876] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 29.691625] ================================================================== [ 29.691761] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 29.692100] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 29.692459] [ 29.692546] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.692781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.692908] Hardware name: linux,dummy-virt (DT) [ 29.693046] Call trace: [ 29.693144] show_stack+0x20/0x38 (C) [ 29.693404] dump_stack_lvl+0x8c/0xd0 [ 29.693550] print_report+0x310/0x608 [ 29.693717] kasan_report+0xdc/0x128 [ 29.694050] __asan_report_load1_noabort+0x20/0x30 [ 29.694273] vmalloc_oob+0x51c/0x5d0 [ 29.694405] kunit_try_run_case+0x170/0x3f0 [ 29.694695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.694841] kthread+0x328/0x630 [ 29.694989] ret_from_fork+0x10/0x20 [ 29.695202] [ 29.695317] The buggy address belongs to the virtual mapping at [ 29.695317] [ffff8000800fe000, ffff800080100000) created by: [ 29.695317] vmalloc_oob+0x98/0x5d0 [ 29.695497] [ 29.695553] The buggy address belongs to the physical page: [ 29.696241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5 [ 29.696435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.696646] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.696845] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.696994] page dumped because: kasan: bad access detected [ 29.697170] [ 29.697267] Memory state around the buggy address: [ 29.697409] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.697514] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.697704] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.697811] ^ [ 29.697924] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.698176] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.698277] ================================================================== [ 29.681863] ================================================================== [ 29.682034] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 29.682184] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 29.682306] [ 29.682397] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.682605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.682714] Hardware name: linux,dummy-virt (DT) [ 29.682815] Call trace: [ 29.682891] show_stack+0x20/0x38 (C) [ 29.683045] dump_stack_lvl+0x8c/0xd0 [ 29.683828] print_report+0x310/0x608 [ 29.683985] kasan_report+0xdc/0x128 [ 29.684185] __asan_report_load1_noabort+0x20/0x30 [ 29.684357] vmalloc_oob+0x578/0x5d0 [ 29.684653] kunit_try_run_case+0x170/0x3f0 [ 29.684821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.684996] kthread+0x328/0x630 [ 29.685587] ret_from_fork+0x10/0x20 [ 29.685966] [ 29.686042] The buggy address belongs to the virtual mapping at [ 29.686042] [ffff8000800fe000, ffff800080100000) created by: [ 29.686042] vmalloc_oob+0x98/0x5d0 [ 29.686480] [ 29.686561] The buggy address belongs to the physical page: [ 29.687113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5 [ 29.687487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.687758] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.687967] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.688168] page dumped because: kasan: bad access detected [ 29.688309] [ 29.688412] Memory state around the buggy address: [ 29.688498] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.688972] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.689098] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.689210] ^ [ 29.689504] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.689667] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.689869] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 29.330678] ================================================================== [ 29.331107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.331324] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.331513] [ 29.331613] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.331839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.331946] Hardware name: linux,dummy-virt (DT) [ 29.332029] Call trace: [ 29.332086] show_stack+0x20/0x38 (C) [ 29.332204] dump_stack_lvl+0x8c/0xd0 [ 29.332327] print_report+0x118/0x608 [ 29.332472] kasan_report+0xdc/0x128 [ 29.332596] kasan_check_range+0x100/0x1a8 [ 29.332741] __kasan_check_write+0x20/0x30 [ 29.332948] kasan_atomics_helper+0xf20/0x4858 [ 29.333453] kasan_atomics+0x198/0x2e0 [ 29.333777] kunit_try_run_case+0x170/0x3f0 [ 29.334032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.334221] kthread+0x328/0x630 [ 29.334342] ret_from_fork+0x10/0x20 [ 29.335031] [ 29.335274] Allocated by task 266: [ 29.335593] kasan_save_stack+0x3c/0x68 [ 29.335789] kasan_save_track+0x20/0x40 [ 29.335995] kasan_save_alloc_info+0x40/0x58 [ 29.336358] __kasan_kmalloc+0xd4/0xd8 [ 29.336776] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.336937] kasan_atomics+0xb8/0x2e0 [ 29.337264] kunit_try_run_case+0x170/0x3f0 [ 29.337614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.337908] kthread+0x328/0x630 [ 29.338402] ret_from_fork+0x10/0x20 [ 29.338736] [ 29.338808] The buggy address belongs to the object at fff00000c7772d80 [ 29.338808] which belongs to the cache kmalloc-64 of size 64 [ 29.338971] The buggy address is located 0 bytes to the right of [ 29.338971] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.340840] [ 29.340874] The buggy address belongs to the physical page: [ 29.340915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.341005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.341221] page_type: f5(slab) [ 29.341353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.341483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.341600] page dumped because: kasan: bad access detected [ 29.341743] [ 29.341796] Memory state around the buggy address: [ 29.341907] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.342010] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.342148] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.342246] ^ [ 29.342330] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.342440] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.342560] ================================================================== [ 29.343106] ================================================================== [ 29.343223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.343361] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.343499] [ 29.343580] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.343812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.343898] Hardware name: linux,dummy-virt (DT) [ 29.343986] Call trace: [ 29.344056] show_stack+0x20/0x38 (C) [ 29.344201] dump_stack_lvl+0x8c/0xd0 [ 29.344354] print_report+0x118/0x608 [ 29.344511] kasan_report+0xdc/0x128 [ 29.344665] kasan_check_range+0x100/0x1a8 [ 29.344825] __kasan_check_write+0x20/0x30 [ 29.344995] kasan_atomics_helper+0xf88/0x4858 [ 29.345133] kasan_atomics+0x198/0x2e0 [ 29.345275] kunit_try_run_case+0x170/0x3f0 [ 29.345571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.345777] kthread+0x328/0x630 [ 29.345901] ret_from_fork+0x10/0x20 [ 29.346016] [ 29.346074] Allocated by task 266: [ 29.346159] kasan_save_stack+0x3c/0x68 [ 29.346274] kasan_save_track+0x20/0x40 [ 29.346397] kasan_save_alloc_info+0x40/0x58 [ 29.346593] __kasan_kmalloc+0xd4/0xd8 [ 29.346747] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.346912] kasan_atomics+0xb8/0x2e0 [ 29.347065] kunit_try_run_case+0x170/0x3f0 [ 29.347366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.347531] kthread+0x328/0x630 [ 29.347727] ret_from_fork+0x10/0x20 [ 29.348068] [ 29.348127] The buggy address belongs to the object at fff00000c7772d80 [ 29.348127] which belongs to the cache kmalloc-64 of size 64 [ 29.348268] The buggy address is located 0 bytes to the right of [ 29.348268] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.349477] [ 29.349633] The buggy address belongs to the physical page: [ 29.350414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.350553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.351395] page_type: f5(slab) [ 29.351534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.351728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.351871] page dumped because: kasan: bad access detected [ 29.351946] [ 29.351994] Memory state around the buggy address: [ 29.352072] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.352172] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.352288] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.352471] ^ [ 29.352559] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.352851] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.353128] ================================================================== [ 29.309353] ================================================================== [ 29.309469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.309602] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.309761] [ 29.309860] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.310114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.310237] Hardware name: linux,dummy-virt (DT) [ 29.310365] Call trace: [ 29.310433] show_stack+0x20/0x38 (C) [ 29.310562] dump_stack_lvl+0x8c/0xd0 [ 29.310776] print_report+0x118/0x608 [ 29.310929] kasan_report+0xdc/0x128 [ 29.311085] __asan_report_store8_noabort+0x20/0x30 [ 29.311248] kasan_atomics_helper+0x3e5c/0x4858 [ 29.311445] kasan_atomics+0x198/0x2e0 [ 29.311577] kunit_try_run_case+0x170/0x3f0 [ 29.311766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.311965] kthread+0x328/0x630 [ 29.312112] ret_from_fork+0x10/0x20 [ 29.312239] [ 29.312290] Allocated by task 266: [ 29.312473] kasan_save_stack+0x3c/0x68 [ 29.312626] kasan_save_track+0x20/0x40 [ 29.312770] kasan_save_alloc_info+0x40/0x58 [ 29.312953] __kasan_kmalloc+0xd4/0xd8 [ 29.313127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.313299] kasan_atomics+0xb8/0x2e0 [ 29.313475] kunit_try_run_case+0x170/0x3f0 [ 29.313591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.313722] kthread+0x328/0x630 [ 29.313811] ret_from_fork+0x10/0x20 [ 29.313926] [ 29.313984] The buggy address belongs to the object at fff00000c7772d80 [ 29.313984] which belongs to the cache kmalloc-64 of size 64 [ 29.314125] The buggy address is located 0 bytes to the right of [ 29.314125] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.314283] [ 29.314349] The buggy address belongs to the physical page: [ 29.314424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.314567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.314706] page_type: f5(slab) [ 29.314825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.315077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.315225] page dumped because: kasan: bad access detected [ 29.315317] [ 29.315379] Memory state around the buggy address: [ 29.315466] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.315586] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.315769] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.315900] ^ [ 29.316114] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.316289] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.316746] ================================================================== [ 29.552928] ================================================================== [ 29.554291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.554505] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.554643] [ 29.555482] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.555973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.556069] Hardware name: linux,dummy-virt (DT) [ 29.556161] Call trace: [ 29.556414] show_stack+0x20/0x38 (C) [ 29.556599] dump_stack_lvl+0x8c/0xd0 [ 29.556982] print_report+0x118/0x608 [ 29.557231] kasan_report+0xdc/0x128 [ 29.557376] __asan_report_load8_noabort+0x20/0x30 [ 29.557539] kasan_atomics_helper+0x3db0/0x4858 [ 29.557755] kasan_atomics+0x198/0x2e0 [ 29.557948] kunit_try_run_case+0x170/0x3f0 [ 29.558107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.558264] kthread+0x328/0x630 [ 29.558445] ret_from_fork+0x10/0x20 [ 29.558577] [ 29.558703] Allocated by task 266: [ 29.558789] kasan_save_stack+0x3c/0x68 [ 29.559104] kasan_save_track+0x20/0x40 [ 29.559233] kasan_save_alloc_info+0x40/0x58 [ 29.559344] __kasan_kmalloc+0xd4/0xd8 [ 29.559617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.559868] kasan_atomics+0xb8/0x2e0 [ 29.559973] kunit_try_run_case+0x170/0x3f0 [ 29.560074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.560357] kthread+0x328/0x630 [ 29.560461] ret_from_fork+0x10/0x20 [ 29.560596] [ 29.560648] The buggy address belongs to the object at fff00000c7772d80 [ 29.560648] which belongs to the cache kmalloc-64 of size 64 [ 29.561033] The buggy address is located 0 bytes to the right of [ 29.561033] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.561466] [ 29.561577] The buggy address belongs to the physical page: [ 29.561655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.561804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.562053] page_type: f5(slab) [ 29.562224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.562371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.562487] page dumped because: kasan: bad access detected [ 29.562575] [ 29.562666] Memory state around the buggy address: [ 29.562772] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.563007] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.563131] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.563239] ^ [ 29.563343] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563468] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563572] ================================================================== [ 29.633073] ================================================================== [ 29.633171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 29.633303] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.633431] [ 29.633505] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.634041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.634116] Hardware name: linux,dummy-virt (DT) [ 29.634185] Call trace: [ 29.634236] show_stack+0x20/0x38 (C) [ 29.635393] dump_stack_lvl+0x8c/0xd0 [ 29.635550] print_report+0x118/0x608 [ 29.636514] kasan_report+0xdc/0x128 [ 29.636669] kasan_check_range+0x100/0x1a8 [ 29.636835] __kasan_check_write+0x20/0x30 [ 29.636968] kasan_atomics_helper+0x17ec/0x4858 [ 29.637109] kasan_atomics+0x198/0x2e0 [ 29.637261] kunit_try_run_case+0x170/0x3f0 [ 29.637669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.637853] kthread+0x328/0x630 [ 29.637980] ret_from_fork+0x10/0x20 [ 29.638109] [ 29.638170] Allocated by task 266: [ 29.638255] kasan_save_stack+0x3c/0x68 [ 29.638375] kasan_save_track+0x20/0x40 [ 29.638490] kasan_save_alloc_info+0x40/0x58 [ 29.638600] __kasan_kmalloc+0xd4/0xd8 [ 29.638781] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.638895] kasan_atomics+0xb8/0x2e0 [ 29.638996] kunit_try_run_case+0x170/0x3f0 [ 29.639101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.639214] kthread+0x328/0x630 [ 29.639311] ret_from_fork+0x10/0x20 [ 29.639418] [ 29.639476] The buggy address belongs to the object at fff00000c7772d80 [ 29.639476] which belongs to the cache kmalloc-64 of size 64 [ 29.639624] The buggy address is located 0 bytes to the right of [ 29.639624] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.639808] [ 29.639895] The buggy address belongs to the physical page: [ 29.639977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.640129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.640351] page_type: f5(slab) [ 29.642125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.642323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.642443] page dumped because: kasan: bad access detected [ 29.642537] [ 29.642594] Memory state around the buggy address: [ 29.644778] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.644913] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.645033] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.646392] ^ [ 29.646499] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.646725] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.646875] ================================================================== [ 29.606735] ================================================================== [ 29.607004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 29.607124] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.607260] [ 29.607336] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.610012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.610091] Hardware name: linux,dummy-virt (DT) [ 29.610188] Call trace: [ 29.610252] show_stack+0x20/0x38 (C) [ 29.610399] dump_stack_lvl+0x8c/0xd0 [ 29.610532] print_report+0x118/0x608 [ 29.610942] kasan_report+0xdc/0x128 [ 29.611071] kasan_check_range+0x100/0x1a8 [ 29.611197] __kasan_check_write+0x20/0x30 [ 29.611379] kasan_atomics_helper+0x175c/0x4858 [ 29.611519] kasan_atomics+0x198/0x2e0 [ 29.612143] kunit_try_run_case+0x170/0x3f0 [ 29.612307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.612443] kthread+0x328/0x630 [ 29.613646] ret_from_fork+0x10/0x20 [ 29.614129] [ 29.614239] Allocated by task 266: [ 29.614441] kasan_save_stack+0x3c/0x68 [ 29.614560] kasan_save_track+0x20/0x40 [ 29.615184] kasan_save_alloc_info+0x40/0x58 [ 29.615400] __kasan_kmalloc+0xd4/0xd8 [ 29.615510] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.615620] kasan_atomics+0xb8/0x2e0 [ 29.615741] kunit_try_run_case+0x170/0x3f0 [ 29.615847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.616305] kthread+0x328/0x630 [ 29.616446] ret_from_fork+0x10/0x20 [ 29.616906] [ 29.616980] The buggy address belongs to the object at fff00000c7772d80 [ 29.616980] which belongs to the cache kmalloc-64 of size 64 [ 29.617583] The buggy address is located 0 bytes to the right of [ 29.617583] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.617764] [ 29.617823] The buggy address belongs to the physical page: [ 29.617907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.618317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.619063] page_type: f5(slab) [ 29.619286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.619425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.619553] page dumped because: kasan: bad access detected [ 29.619638] [ 29.620316] Memory state around the buggy address: [ 29.620704] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.620846] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.621076] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.621193] ^ [ 29.621605] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.621878] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.622125] ================================================================== [ 29.252918] ================================================================== [ 29.253207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.253342] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.253463] [ 29.253532] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.253762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.253846] Hardware name: linux,dummy-virt (DT) [ 29.254027] Call trace: [ 29.254098] show_stack+0x20/0x38 (C) [ 29.254272] dump_stack_lvl+0x8c/0xd0 [ 29.254422] print_report+0x118/0x608 [ 29.254566] kasan_report+0xdc/0x128 [ 29.254961] kasan_check_range+0x100/0x1a8 [ 29.255122] __kasan_check_write+0x20/0x30 [ 29.255317] kasan_atomics_helper+0xd3c/0x4858 [ 29.255460] kasan_atomics+0x198/0x2e0 [ 29.256199] kunit_try_run_case+0x170/0x3f0 [ 29.256433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.256988] kthread+0x328/0x630 [ 29.257148] ret_from_fork+0x10/0x20 [ 29.257417] [ 29.257511] Allocated by task 266: [ 29.257606] kasan_save_stack+0x3c/0x68 [ 29.257739] kasan_save_track+0x20/0x40 [ 29.257855] kasan_save_alloc_info+0x40/0x58 [ 29.257961] __kasan_kmalloc+0xd4/0xd8 [ 29.258397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.258525] kasan_atomics+0xb8/0x2e0 [ 29.258636] kunit_try_run_case+0x170/0x3f0 [ 29.258813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259153] kthread+0x328/0x630 [ 29.259591] ret_from_fork+0x10/0x20 [ 29.259786] [ 29.259847] The buggy address belongs to the object at fff00000c7772d80 [ 29.259847] which belongs to the cache kmalloc-64 of size 64 [ 29.259931] The buggy address is located 0 bytes to the right of [ 29.259931] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.260056] [ 29.260167] The buggy address belongs to the physical page: [ 29.260253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.260664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.261027] page_type: f5(slab) [ 29.261674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.262095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.262456] page dumped because: kasan: bad access detected [ 29.262705] [ 29.262776] Memory state around the buggy address: [ 29.262873] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.263201] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.263329] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.263739] ^ [ 29.263893] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.264082] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.264198] ================================================================== [ 29.526238] ================================================================== [ 29.526346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.526465] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.526584] [ 29.527098] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.527402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.527996] Hardware name: linux,dummy-virt (DT) [ 29.528157] Call trace: [ 29.528225] show_stack+0x20/0x38 (C) [ 29.528352] dump_stack_lvl+0x8c/0xd0 [ 29.528494] print_report+0x118/0x608 [ 29.528673] kasan_report+0xdc/0x128 [ 29.529464] kasan_check_range+0x100/0x1a8 [ 29.529605] __kasan_check_write+0x20/0x30 [ 29.529762] kasan_atomics_helper+0x154c/0x4858 [ 29.530148] kasan_atomics+0x198/0x2e0 [ 29.530468] kunit_try_run_case+0x170/0x3f0 [ 29.530830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.531451] kthread+0x328/0x630 [ 29.532140] ret_from_fork+0x10/0x20 [ 29.532526] [ 29.533106] Allocated by task 266: [ 29.533345] kasan_save_stack+0x3c/0x68 [ 29.533516] kasan_save_track+0x20/0x40 [ 29.533621] kasan_save_alloc_info+0x40/0x58 [ 29.533745] __kasan_kmalloc+0xd4/0xd8 [ 29.534723] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.534862] kasan_atomics+0xb8/0x2e0 [ 29.535243] kunit_try_run_case+0x170/0x3f0 [ 29.535586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.535731] kthread+0x328/0x630 [ 29.536523] ret_from_fork+0x10/0x20 [ 29.536969] [ 29.537276] The buggy address belongs to the object at fff00000c7772d80 [ 29.537276] which belongs to the cache kmalloc-64 of size 64 [ 29.537436] The buggy address is located 0 bytes to the right of [ 29.537436] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.537594] [ 29.537650] The buggy address belongs to the physical page: [ 29.537745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.538206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.538744] page_type: f5(slab) [ 29.539043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.539176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.539280] page dumped because: kasan: bad access detected [ 29.539361] [ 29.539411] Memory state around the buggy address: [ 29.539531] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.539647] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.539917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.540018] ^ [ 29.540228] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540339] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540435] ================================================================== [ 29.441460] ================================================================== [ 29.441604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.442804] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.443416] [ 29.443500] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.443969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.444149] Hardware name: linux,dummy-virt (DT) [ 29.444257] Call trace: [ 29.444405] show_stack+0x20/0x38 (C) [ 29.444636] dump_stack_lvl+0x8c/0xd0 [ 29.444781] print_report+0x118/0x608 [ 29.444904] kasan_report+0xdc/0x128 [ 29.445051] kasan_check_range+0x100/0x1a8 [ 29.445422] __kasan_check_write+0x20/0x30 [ 29.445615] kasan_atomics_helper+0x12d8/0x4858 [ 29.446258] kasan_atomics+0x198/0x2e0 [ 29.446804] kunit_try_run_case+0x170/0x3f0 [ 29.447362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.447756] kthread+0x328/0x630 [ 29.447952] ret_from_fork+0x10/0x20 [ 29.448078] [ 29.448129] Allocated by task 266: [ 29.448215] kasan_save_stack+0x3c/0x68 [ 29.448321] kasan_save_track+0x20/0x40 [ 29.448501] kasan_save_alloc_info+0x40/0x58 [ 29.448622] __kasan_kmalloc+0xd4/0xd8 [ 29.448748] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.449453] kasan_atomics+0xb8/0x2e0 [ 29.449579] kunit_try_run_case+0x170/0x3f0 [ 29.449756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.449937] kthread+0x328/0x630 [ 29.451738] ret_from_fork+0x10/0x20 [ 29.451919] [ 29.452006] The buggy address belongs to the object at fff00000c7772d80 [ 29.452006] which belongs to the cache kmalloc-64 of size 64 [ 29.452172] The buggy address is located 0 bytes to the right of [ 29.452172] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.452367] [ 29.452592] The buggy address belongs to the physical page: [ 29.452786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.452930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.453111] page_type: f5(slab) [ 29.453256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.453391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.453522] page dumped because: kasan: bad access detected [ 29.453640] [ 29.453708] Memory state around the buggy address: [ 29.453800] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.454115] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.454251] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.454424] ^ [ 29.454560] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.454775] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.454955] ================================================================== [ 29.179693] ================================================================== [ 29.179800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 29.179916] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.180575] [ 29.180708] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.180928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.181972] kasan_atomics_helper+0x3dcc/0x4858 [ 29.184093] kunit_try_run_case+0x170/0x3f0 [ 29.184539] kthread+0x328/0x630 [ 29.184642] ret_from_fork+0x10/0x20 [ 29.185717] The buggy address is located 0 bytes to the right of [ 29.185717] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.186365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.188915] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.192416] __kasan_check_write+0x20/0x30 [ 29.193965] ret_from_fork+0x10/0x20 [ 29.197920] kthread+0x328/0x630 [ 29.198829] The buggy address is located 0 bytes to the right of [ 29.198829] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.200034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.200934] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.201363] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.202381] [ 29.203293] show_stack+0x20/0x38 (C) [ 29.204208] __asan_report_load4_noabort+0x20/0x30 [ 29.205489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.206549] Allocated by task 266: [ 29.206957] kasan_save_track+0x20/0x40 [ 29.213009] The buggy address belongs to the object at fff00000c7772d80 [ 29.213009] which belongs to the cache kmalloc-64 of size 64 [ 29.213453] The buggy address is located 0 bytes to the right of [ 29.213453] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.214259] [ 29.214368] The buggy address belongs to the physical page: [ 29.214470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.214605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.214905] page_type: f5(slab) [ 29.215130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.215265] page dumped because: kasan: bad access detected [ 29.215351] [ 29.215400] Memory state around the buggy address: [ 29.215490] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.215624] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.215765] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.215863] ^ [ 29.215969] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.217831] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.220608] kunit_try_run_case+0x170/0x3f0 [ 29.223846] The buggy address is located 0 bytes to the right of [ 29.223846] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.224602] The buggy address belongs to the physical page: [ 29.225174] page_type: f5(slab) [ 29.225854] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.227756] [ 29.228761] dump_stack_lvl+0x8c/0xd0 [ 29.230229] kthread+0x328/0x630 [ 29.232229] kthread+0x328/0x630 [ 29.233424] [ 29.233573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.234813] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.236560] [ 29.236996] Call trace: [ 29.241909] [ 29.242053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.242189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.242420] page_type: f5(slab) [ 29.242733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.242894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.242999] page dumped because: kasan: bad access detected [ 29.243085] [ 29.243139] Memory state around the buggy address: [ 29.243267] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.243446] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.243593] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.243711] ^ [ 29.243795] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244086] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244328] ================================================================== [ 29.277398] ================================================================== [ 29.277506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.277622] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.277765] [ 29.277842] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.278043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.278117] Hardware name: linux,dummy-virt (DT) [ 29.278192] Call trace: [ 29.278250] show_stack+0x20/0x38 (C) [ 29.278368] dump_stack_lvl+0x8c/0xd0 [ 29.278489] print_report+0x118/0x608 [ 29.278616] kasan_report+0xdc/0x128 [ 29.278825] kasan_check_range+0x100/0x1a8 [ 29.278978] __kasan_check_read+0x20/0x30 [ 29.279125] kasan_atomics_helper+0xdd4/0x4858 [ 29.279276] kasan_atomics+0x198/0x2e0 [ 29.279411] kunit_try_run_case+0x170/0x3f0 [ 29.279971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.280136] kthread+0x328/0x630 [ 29.280253] ret_from_fork+0x10/0x20 [ 29.280373] [ 29.280425] Allocated by task 266: [ 29.280553] kasan_save_stack+0x3c/0x68 [ 29.280697] kasan_save_track+0x20/0x40 [ 29.282052] kasan_save_alloc_info+0x40/0x58 [ 29.282179] __kasan_kmalloc+0xd4/0xd8 [ 29.282289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.282469] kasan_atomics+0xb8/0x2e0 [ 29.282651] kunit_try_run_case+0x170/0x3f0 [ 29.282786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.282919] kthread+0x328/0x630 [ 29.283025] ret_from_fork+0x10/0x20 [ 29.283187] [ 29.283488] The buggy address belongs to the object at fff00000c7772d80 [ 29.283488] which belongs to the cache kmalloc-64 of size 64 [ 29.283646] The buggy address is located 0 bytes to the right of [ 29.283646] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.283976] [ 29.284141] The buggy address belongs to the physical page: [ 29.284364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.284700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.284827] page_type: f5(slab) [ 29.284918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.285039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.285211] page dumped because: kasan: bad access detected [ 29.285359] [ 29.285424] Memory state around the buggy address: [ 29.285548] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.285671] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.285813] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.285976] ^ [ 29.286458] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286721] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286831] ================================================================== [ 29.104432] ================================================================== [ 29.104534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.104652] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.104816] [ 29.104904] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.105101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.105175] Hardware name: linux,dummy-virt (DT) [ 29.105265] Call trace: [ 29.105329] show_stack+0x20/0x38 (C) [ 29.105463] dump_stack_lvl+0x8c/0xd0 [ 29.105600] print_report+0x118/0x608 [ 29.107810] kasan_report+0xdc/0x128 [ 29.107966] __asan_report_load4_noabort+0x20/0x30 [ 29.108094] kasan_atomics_helper+0x42d8/0x4858 [ 29.108215] kasan_atomics+0x198/0x2e0 [ 29.108332] kunit_try_run_case+0x170/0x3f0 [ 29.108468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.109478] kthread+0x328/0x630 [ 29.109607] ret_from_fork+0x10/0x20 [ 29.113045] The buggy address is located 0 bytes to the right of [ 29.113045] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.116237] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.118895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 29.122732] kunit_try_run_case+0x170/0x3f0 [ 29.122886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.123255] kthread+0x328/0x630 [ 29.123385] ret_from_fork+0x10/0x20 [ 29.123734] [ 29.123799] Allocated by task 266: [ 29.123895] kasan_save_stack+0x3c/0x68 [ 29.124002] kasan_save_track+0x20/0x40 [ 29.124115] kasan_save_alloc_info+0x40/0x58 [ 29.124233] __kasan_kmalloc+0xd4/0xd8 [ 29.124347] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.124472] kasan_atomics+0xb8/0x2e0 [ 29.124576] kunit_try_run_case+0x170/0x3f0 [ 29.124784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.125098] kthread+0x328/0x630 [ 29.125233] ret_from_fork+0x10/0x20 [ 29.125526] [ 29.125702] The buggy address belongs to the object at fff00000c7772d80 [ 29.125702] which belongs to the cache kmalloc-64 of size 64 [ 29.125862] The buggy address is located 0 bytes to the right of [ 29.125862] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.126038] [ 29.126102] The buggy address belongs to the physical page: [ 29.126205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.126442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.126589] page_type: f5(slab) [ 29.126765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.126905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.127104] page dumped because: kasan: bad access detected [ 29.127222] [ 29.127377] Memory state around the buggy address: [ 29.127463] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.128108] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.128227] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.128327] ^ [ 29.128410] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.128516] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.129363] ================================================================== [ 29.165172] ================================================================== [ 29.165352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.165515] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.165641] [ 29.165734] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.165943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.166014] Hardware name: linux,dummy-virt (DT) [ 29.166090] Call trace: [ 29.166147] show_stack+0x20/0x38 (C) [ 29.166265] dump_stack_lvl+0x8c/0xd0 [ 29.166409] print_report+0x118/0x608 [ 29.167000] kasan_report+0xdc/0x128 [ 29.167340] kasan_check_range+0x100/0x1a8 [ 29.167837] __kasan_check_write+0x20/0x30 [ 29.168453] kasan_atomics_helper+0xad4/0x4858 [ 29.168627] kasan_atomics+0x198/0x2e0 [ 29.169019] kunit_try_run_case+0x170/0x3f0 [ 29.169303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.169599] kthread+0x328/0x630 [ 29.169732] ret_from_fork+0x10/0x20 [ 29.169880] [ 29.169946] Allocated by task 266: [ 29.170036] kasan_save_stack+0x3c/0x68 [ 29.170147] kasan_save_track+0x20/0x40 [ 29.170244] kasan_save_alloc_info+0x40/0x58 [ 29.170348] __kasan_kmalloc+0xd4/0xd8 [ 29.170449] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.170556] kasan_atomics+0xb8/0x2e0 [ 29.170657] kunit_try_run_case+0x170/0x3f0 [ 29.170788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.170901] kthread+0x328/0x630 [ 29.171661] ret_from_fork+0x10/0x20 [ 29.171950] [ 29.172867] The buggy address belongs to the object at fff00000c7772d80 [ 29.172867] which belongs to the cache kmalloc-64 of size 64 [ 29.173205] The buggy address is located 0 bytes to the right of [ 29.173205] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.174627] [ 29.174756] The buggy address belongs to the physical page: [ 29.174834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.174909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.174990] page_type: f5(slab) [ 29.175094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.175285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.176188] page dumped because: kasan: bad access detected [ 29.176334] [ 29.176390] Memory state around the buggy address: [ 29.176868] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.177066] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.177238] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.177447] ^ [ 29.177582] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.178307] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.178450] ================================================================== [ 29.622646] ================================================================== [ 29.622906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 29.623204] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.623342] [ 29.623535] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.623756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.624163] Hardware name: linux,dummy-virt (DT) [ 29.624261] Call trace: [ 29.624329] show_stack+0x20/0x38 (C) [ 29.624447] dump_stack_lvl+0x8c/0xd0 [ 29.624579] print_report+0x118/0x608 [ 29.624952] kasan_report+0xdc/0x128 [ 29.625125] __asan_report_load8_noabort+0x20/0x30 [ 29.625740] kasan_atomics_helper+0x3e20/0x4858 [ 29.626171] kasan_atomics+0x198/0x2e0 [ 29.626374] kunit_try_run_case+0x170/0x3f0 [ 29.626529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.626743] kthread+0x328/0x630 [ 29.626873] ret_from_fork+0x10/0x20 [ 29.627166] [ 29.627255] Allocated by task 266: [ 29.627455] kasan_save_stack+0x3c/0x68 [ 29.627576] kasan_save_track+0x20/0x40 [ 29.627905] kasan_save_alloc_info+0x40/0x58 [ 29.628066] __kasan_kmalloc+0xd4/0xd8 [ 29.628337] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.628451] kasan_atomics+0xb8/0x2e0 [ 29.628594] kunit_try_run_case+0x170/0x3f0 [ 29.629240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.629380] kthread+0x328/0x630 [ 29.629537] ret_from_fork+0x10/0x20 [ 29.629750] [ 29.629818] The buggy address belongs to the object at fff00000c7772d80 [ 29.629818] which belongs to the cache kmalloc-64 of size 64 [ 29.629981] The buggy address is located 0 bytes to the right of [ 29.629981] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.630225] [ 29.630302] The buggy address belongs to the physical page: [ 29.630381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.630513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.631295] page_type: f5(slab) [ 29.631402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.631527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.631631] page dumped because: kasan: bad access detected [ 29.631856] [ 29.631913] Memory state around the buggy address: [ 29.632002] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.632119] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.632229] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.632331] ^ [ 29.632424] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.632538] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.632625] ================================================================== [ 29.574438] ================================================================== [ 29.574722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 29.574943] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.575207] [ 29.575291] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.575639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.575743] Hardware name: linux,dummy-virt (DT) [ 29.575838] Call trace: [ 29.575893] show_stack+0x20/0x38 (C) [ 29.576027] dump_stack_lvl+0x8c/0xd0 [ 29.576159] print_report+0x118/0x608 [ 29.576287] kasan_report+0xdc/0x128 [ 29.578179] __asan_report_load8_noabort+0x20/0x30 [ 29.578326] kasan_atomics_helper+0x3df4/0x4858 [ 29.578622] kasan_atomics+0x198/0x2e0 [ 29.578925] kunit_try_run_case+0x170/0x3f0 [ 29.579329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.579478] kthread+0x328/0x630 [ 29.579598] ret_from_fork+0x10/0x20 [ 29.579788] [ 29.579855] Allocated by task 266: [ 29.579991] kasan_save_stack+0x3c/0x68 [ 29.580096] kasan_save_track+0x20/0x40 [ 29.580196] kasan_save_alloc_info+0x40/0x58 [ 29.580297] __kasan_kmalloc+0xd4/0xd8 [ 29.580468] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.580725] kasan_atomics+0xb8/0x2e0 [ 29.580992] kunit_try_run_case+0x170/0x3f0 [ 29.581102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.581217] kthread+0x328/0x630 [ 29.581324] ret_from_fork+0x10/0x20 [ 29.581452] [ 29.581605] The buggy address belongs to the object at fff00000c7772d80 [ 29.581605] which belongs to the cache kmalloc-64 of size 64 [ 29.581773] The buggy address is located 0 bytes to the right of [ 29.581773] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.581952] [ 29.582016] The buggy address belongs to the physical page: [ 29.582107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.582240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.582561] page_type: f5(slab) [ 29.582902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.583096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.583292] page dumped because: kasan: bad access detected [ 29.583439] [ 29.583529] Memory state around the buggy address: [ 29.583772] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.583880] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.583987] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.584087] ^ [ 29.584213] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584310] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584402] ================================================================== [ 29.244748] ================================================================== [ 29.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.245110] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.245232] [ 29.245326] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.245552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.245718] Hardware name: linux,dummy-virt (DT) [ 29.245793] Call trace: [ 29.245898] show_stack+0x20/0x38 (C) [ 29.246037] dump_stack_lvl+0x8c/0xd0 [ 29.246383] print_report+0x118/0x608 [ 29.246738] kasan_report+0xdc/0x128 [ 29.246872] __asan_report_load4_noabort+0x20/0x30 [ 29.247104] kasan_atomics_helper+0x3dd8/0x4858 [ 29.247240] kasan_atomics+0x198/0x2e0 [ 29.247478] kunit_try_run_case+0x170/0x3f0 [ 29.247618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.248055] kthread+0x328/0x630 [ 29.248204] ret_from_fork+0x10/0x20 [ 29.248362] [ 29.248415] Allocated by task 266: [ 29.248492] kasan_save_stack+0x3c/0x68 [ 29.248616] kasan_save_track+0x20/0x40 [ 29.248734] kasan_save_alloc_info+0x40/0x58 [ 29.248895] __kasan_kmalloc+0xd4/0xd8 [ 29.249001] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.249108] kasan_atomics+0xb8/0x2e0 [ 29.249235] kunit_try_run_case+0x170/0x3f0 [ 29.249358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.249591] kthread+0x328/0x630 [ 29.249703] ret_from_fork+0x10/0x20 [ 29.249827] [ 29.249931] The buggy address belongs to the object at fff00000c7772d80 [ 29.249931] which belongs to the cache kmalloc-64 of size 64 [ 29.250185] The buggy address is located 0 bytes to the right of [ 29.250185] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.250352] [ 29.250411] The buggy address belongs to the physical page: [ 29.250497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.250663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.250817] page_type: f5(slab) [ 29.250927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.251070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.251388] page dumped because: kasan: bad access detected [ 29.251495] [ 29.251557] Memory state around the buggy address: [ 29.251646] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.251793] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.251990] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.252149] ^ [ 29.252239] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.252348] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.252446] ================================================================== [ 29.430990] ================================================================== [ 29.431092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.431213] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.431358] [ 29.431449] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.431989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.432203] Hardware name: linux,dummy-virt (DT) [ 29.432288] Call trace: [ 29.432343] show_stack+0x20/0x38 (C) [ 29.432467] dump_stack_lvl+0x8c/0xd0 [ 29.432585] print_report+0x118/0x608 [ 29.432724] kasan_report+0xdc/0x128 [ 29.432851] kasan_check_range+0x100/0x1a8 [ 29.432975] __kasan_check_write+0x20/0x30 [ 29.433088] kasan_atomics_helper+0x126c/0x4858 [ 29.433212] kasan_atomics+0x198/0x2e0 [ 29.433346] kunit_try_run_case+0x170/0x3f0 [ 29.433467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.433601] kthread+0x328/0x630 [ 29.433729] ret_from_fork+0x10/0x20 [ 29.433854] [ 29.433902] Allocated by task 266: [ 29.433973] kasan_save_stack+0x3c/0x68 [ 29.434074] kasan_save_track+0x20/0x40 [ 29.434176] kasan_save_alloc_info+0x40/0x58 [ 29.434274] __kasan_kmalloc+0xd4/0xd8 [ 29.434373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.434483] kasan_atomics+0xb8/0x2e0 [ 29.434582] kunit_try_run_case+0x170/0x3f0 [ 29.434725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.434903] kthread+0x328/0x630 [ 29.435076] ret_from_fork+0x10/0x20 [ 29.435868] [ 29.436063] The buggy address belongs to the object at fff00000c7772d80 [ 29.436063] which belongs to the cache kmalloc-64 of size 64 [ 29.436495] The buggy address is located 0 bytes to the right of [ 29.436495] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.436661] [ 29.436737] The buggy address belongs to the physical page: [ 29.437618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.437901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.438553] page_type: f5(slab) [ 29.438670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.438835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.439649] page dumped because: kasan: bad access detected [ 29.439824] [ 29.439886] Memory state around the buggy address: [ 29.440320] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.440438] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.440614] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.440737] ^ [ 29.440826] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440932] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.441031] ================================================================== [ 29.455874] ================================================================== [ 29.456360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.456529] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.456656] [ 29.456757] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.457097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.457435] Hardware name: linux,dummy-virt (DT) [ 29.457751] Call trace: [ 29.457817] show_stack+0x20/0x38 (C) [ 29.457946] dump_stack_lvl+0x8c/0xd0 [ 29.458073] print_report+0x118/0x608 [ 29.458199] kasan_report+0xdc/0x128 [ 29.458667] kasan_check_range+0x100/0x1a8 [ 29.460701] __kasan_check_write+0x20/0x30 [ 29.460853] kasan_atomics_helper+0x1384/0x4858 [ 29.461004] kasan_atomics+0x198/0x2e0 [ 29.461116] kunit_try_run_case+0x170/0x3f0 [ 29.461184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.461272] kthread+0x328/0x630 [ 29.461330] ret_from_fork+0x10/0x20 [ 29.461394] [ 29.461419] Allocated by task 266: [ 29.461459] kasan_save_stack+0x3c/0x68 [ 29.461513] kasan_save_track+0x20/0x40 [ 29.461565] kasan_save_alloc_info+0x40/0x58 [ 29.461614] __kasan_kmalloc+0xd4/0xd8 [ 29.461663] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.461748] kasan_atomics+0xb8/0x2e0 [ 29.461800] kunit_try_run_case+0x170/0x3f0 [ 29.461851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.461909] kthread+0x328/0x630 [ 29.461953] ret_from_fork+0x10/0x20 [ 29.461999] [ 29.462028] The buggy address belongs to the object at fff00000c7772d80 [ 29.462028] which belongs to the cache kmalloc-64 of size 64 [ 29.462105] The buggy address is located 0 bytes to the right of [ 29.462105] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.462189] [ 29.462217] The buggy address belongs to the physical page: [ 29.462257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.462320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.462383] page_type: f5(slab) [ 29.462431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.462493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.462545] page dumped because: kasan: bad access detected [ 29.462587] [ 29.462610] Memory state around the buggy address: [ 29.462670] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.462843] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.462957] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.463048] ^ [ 29.463211] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.463356] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.463729] ================================================================== [ 29.486060] ================================================================== [ 29.486263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.486564] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.486713] [ 29.486810] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.487414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.487499] Hardware name: linux,dummy-virt (DT) [ 29.487607] Call trace: [ 29.487672] show_stack+0x20/0x38 (C) [ 29.487830] dump_stack_lvl+0x8c/0xd0 [ 29.487963] print_report+0x118/0x608 [ 29.489585] kasan_report+0xdc/0x128 [ 29.489937] kasan_check_range+0x100/0x1a8 [ 29.490448] __kasan_check_write+0x20/0x30 [ 29.490710] kasan_atomics_helper+0x1414/0x4858 [ 29.490864] kasan_atomics+0x198/0x2e0 [ 29.491021] kunit_try_run_case+0x170/0x3f0 [ 29.491377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.491519] kthread+0x328/0x630 [ 29.491650] ret_from_fork+0x10/0x20 [ 29.492610] [ 29.492677] Allocated by task 266: [ 29.492850] kasan_save_stack+0x3c/0x68 [ 29.492958] kasan_save_track+0x20/0x40 [ 29.493298] kasan_save_alloc_info+0x40/0x58 [ 29.493611] __kasan_kmalloc+0xd4/0xd8 [ 29.493794] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.493925] kasan_atomics+0xb8/0x2e0 [ 29.494394] kunit_try_run_case+0x170/0x3f0 [ 29.494543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.494936] kthread+0x328/0x630 [ 29.495070] ret_from_fork+0x10/0x20 [ 29.495414] [ 29.495535] The buggy address belongs to the object at fff00000c7772d80 [ 29.495535] which belongs to the cache kmalloc-64 of size 64 [ 29.495876] The buggy address is located 0 bytes to the right of [ 29.495876] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.496064] [ 29.496177] The buggy address belongs to the physical page: [ 29.496322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.496582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.496840] page_type: f5(slab) [ 29.496943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.497758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.497870] page dumped because: kasan: bad access detected [ 29.498008] [ 29.498169] Memory state around the buggy address: [ 29.498288] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.498398] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.498584] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.498818] ^ [ 29.498920] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499468] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499841] ================================================================== [ 29.564072] ================================================================== [ 29.564171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.564478] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.564849] [ 29.565052] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.565588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.565662] Hardware name: linux,dummy-virt (DT) [ 29.565768] Call trace: [ 29.565894] show_stack+0x20/0x38 (C) [ 29.566092] dump_stack_lvl+0x8c/0xd0 [ 29.566241] print_report+0x118/0x608 [ 29.566446] kasan_report+0xdc/0x128 [ 29.566581] kasan_check_range+0x100/0x1a8 [ 29.566936] __kasan_check_write+0x20/0x30 [ 29.567072] kasan_atomics_helper+0x1644/0x4858 [ 29.567294] kasan_atomics+0x198/0x2e0 [ 29.567445] kunit_try_run_case+0x170/0x3f0 [ 29.567695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.567954] kthread+0x328/0x630 [ 29.568220] ret_from_fork+0x10/0x20 [ 29.568417] [ 29.568473] Allocated by task 266: [ 29.568594] kasan_save_stack+0x3c/0x68 [ 29.568720] kasan_save_track+0x20/0x40 [ 29.569012] kasan_save_alloc_info+0x40/0x58 [ 29.569301] __kasan_kmalloc+0xd4/0xd8 [ 29.569543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.570007] kasan_atomics+0xb8/0x2e0 [ 29.570143] kunit_try_run_case+0x170/0x3f0 [ 29.570260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.570325] kthread+0x328/0x630 [ 29.570369] ret_from_fork+0x10/0x20 [ 29.570515] [ 29.570583] The buggy address belongs to the object at fff00000c7772d80 [ 29.570583] which belongs to the cache kmalloc-64 of size 64 [ 29.570804] The buggy address is located 0 bytes to the right of [ 29.570804] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.571015] [ 29.571177] The buggy address belongs to the physical page: [ 29.571362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.571490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.571761] page_type: f5(slab) [ 29.571993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.572161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.572287] page dumped because: kasan: bad access detected [ 29.572378] [ 29.572425] Memory state around the buggy address: [ 29.572631] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.573161] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.573293] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.573407] ^ [ 29.573506] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.573632] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.573824] ================================================================== [ 29.130641] ================================================================== [ 29.130793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.130935] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.131540] [ 29.131652] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.132527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.132604] Hardware name: linux,dummy-virt (DT) [ 29.132701] Call trace: [ 29.133184] show_stack+0x20/0x38 (C) [ 29.133426] dump_stack_lvl+0x8c/0xd0 [ 29.134135] print_report+0x118/0x608 [ 29.134481] kasan_report+0xdc/0x128 [ 29.134631] kasan_check_range+0x100/0x1a8 [ 29.134795] __kasan_check_write+0x20/0x30 [ 29.135595] kasan_atomics_helper+0x99c/0x4858 [ 29.135891] kasan_atomics+0x198/0x2e0 [ 29.136077] kunit_try_run_case+0x170/0x3f0 [ 29.136596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.137002] kthread+0x328/0x630 [ 29.137130] ret_from_fork+0x10/0x20 [ 29.137259] [ 29.137316] Allocated by task 266: [ 29.137409] kasan_save_stack+0x3c/0x68 [ 29.137534] kasan_save_track+0x20/0x40 [ 29.137828] kasan_save_alloc_info+0x40/0x58 [ 29.137932] __kasan_kmalloc+0xd4/0xd8 [ 29.138035] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.138136] kasan_atomics+0xb8/0x2e0 [ 29.138234] kunit_try_run_case+0x170/0x3f0 [ 29.138345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.139480] kthread+0x328/0x630 [ 29.139711] ret_from_fork+0x10/0x20 [ 29.139824] [ 29.139938] The buggy address belongs to the object at fff00000c7772d80 [ 29.139938] which belongs to the cache kmalloc-64 of size 64 [ 29.140196] The buggy address is located 0 bytes to the right of [ 29.140196] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.140990] [ 29.141169] The buggy address belongs to the physical page: [ 29.141304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.141443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.141572] page_type: f5(slab) [ 29.141781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.142090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.142209] page dumped because: kasan: bad access detected [ 29.142302] [ 29.142429] Memory state around the buggy address: [ 29.142523] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142770] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142901] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.143016] ^ [ 29.143319] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.143440] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.143553] ================================================================== [ 29.365196] ================================================================== [ 29.365425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.365556] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.365695] [ 29.365768] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.365970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.366041] Hardware name: linux,dummy-virt (DT) [ 29.366118] Call trace: [ 29.366175] show_stack+0x20/0x38 (C) [ 29.366291] dump_stack_lvl+0x8c/0xd0 [ 29.366413] print_report+0x118/0x608 [ 29.366526] kasan_report+0xdc/0x128 [ 29.367215] kasan_check_range+0x100/0x1a8 [ 29.368559] __kasan_check_write+0x20/0x30 [ 29.368721] kasan_atomics_helper+0x1058/0x4858 [ 29.368866] kasan_atomics+0x198/0x2e0 [ 29.368994] kunit_try_run_case+0x170/0x3f0 [ 29.369136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.369279] kthread+0x328/0x630 [ 29.369401] ret_from_fork+0x10/0x20 [ 29.369520] [ 29.369568] Allocated by task 266: [ 29.369639] kasan_save_stack+0x3c/0x68 [ 29.369770] kasan_save_track+0x20/0x40 [ 29.369874] kasan_save_alloc_info+0x40/0x58 [ 29.369983] __kasan_kmalloc+0xd4/0xd8 [ 29.370092] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.370208] kasan_atomics+0xb8/0x2e0 [ 29.370306] kunit_try_run_case+0x170/0x3f0 [ 29.370416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.370526] kthread+0x328/0x630 [ 29.370613] ret_from_fork+0x10/0x20 [ 29.373340] [ 29.373403] The buggy address belongs to the object at fff00000c7772d80 [ 29.373403] which belongs to the cache kmalloc-64 of size 64 [ 29.374073] The buggy address is located 0 bytes to the right of [ 29.374073] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.374770] [ 29.374836] The buggy address belongs to the physical page: [ 29.374921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.375057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.375187] page_type: f5(slab) [ 29.375286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.375412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.375517] page dumped because: kasan: bad access detected [ 29.375603] [ 29.375655] Memory state around the buggy address: [ 29.375760] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.375877] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.375995] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.376094] ^ [ 29.376185] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376297] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376395] ================================================================== [ 29.390223] ================================================================== [ 29.390391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.390519] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.390662] [ 29.390752] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.390987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.391080] Hardware name: linux,dummy-virt (DT) [ 29.391434] Call trace: [ 29.391652] show_stack+0x20/0x38 (C) [ 29.391903] dump_stack_lvl+0x8c/0xd0 [ 29.392137] print_report+0x118/0x608 [ 29.392312] kasan_report+0xdc/0x128 [ 29.392453] kasan_check_range+0x100/0x1a8 [ 29.392842] __kasan_check_write+0x20/0x30 [ 29.392919] kasan_atomics_helper+0x1128/0x4858 [ 29.392985] kasan_atomics+0x198/0x2e0 [ 29.393049] kunit_try_run_case+0x170/0x3f0 [ 29.393114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.393185] kthread+0x328/0x630 [ 29.393239] ret_from_fork+0x10/0x20 [ 29.393312] [ 29.393337] Allocated by task 266: [ 29.393378] kasan_save_stack+0x3c/0x68 [ 29.393437] kasan_save_track+0x20/0x40 [ 29.393488] kasan_save_alloc_info+0x40/0x58 [ 29.393536] __kasan_kmalloc+0xd4/0xd8 [ 29.393586] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.393643] kasan_atomics+0xb8/0x2e0 [ 29.393729] kunit_try_run_case+0x170/0x3f0 [ 29.393836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.394012] kthread+0x328/0x630 [ 29.394322] ret_from_fork+0x10/0x20 [ 29.394803] [ 29.394985] The buggy address belongs to the object at fff00000c7772d80 [ 29.394985] which belongs to the cache kmalloc-64 of size 64 [ 29.395387] The buggy address is located 0 bytes to the right of [ 29.395387] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.395558] [ 29.395651] The buggy address belongs to the physical page: [ 29.395761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.395906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.396291] page_type: f5(slab) [ 29.396434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.396697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.396804] page dumped because: kasan: bad access detected [ 29.396954] [ 29.397070] Memory state around the buggy address: [ 29.397162] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.397289] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.397557] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.397817] ^ [ 29.398586] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.398803] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.398916] ================================================================== [ 29.145019] ================================================================== [ 29.145294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.145468] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.145621] [ 29.145755] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.145973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.146066] Hardware name: linux,dummy-virt (DT) [ 29.146164] Call trace: [ 29.146230] show_stack+0x20/0x38 (C) [ 29.146363] dump_stack_lvl+0x8c/0xd0 [ 29.146500] print_report+0x118/0x608 [ 29.146655] kasan_report+0xdc/0x128 [ 29.146835] kasan_check_range+0x100/0x1a8 [ 29.146974] __kasan_check_write+0x20/0x30 [ 29.147121] kasan_atomics_helper+0xa04/0x4858 [ 29.147324] kasan_atomics+0x198/0x2e0 [ 29.147487] kunit_try_run_case+0x170/0x3f0 [ 29.147702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.147928] kthread+0x328/0x630 [ 29.148119] ret_from_fork+0x10/0x20 [ 29.148341] [ 29.148425] Allocated by task 266: [ 29.148531] kasan_save_stack+0x3c/0x68 [ 29.148644] kasan_save_track+0x20/0x40 [ 29.148769] kasan_save_alloc_info+0x40/0x58 [ 29.148865] __kasan_kmalloc+0xd4/0xd8 [ 29.148965] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.149088] kasan_atomics+0xb8/0x2e0 [ 29.149189] kunit_try_run_case+0x170/0x3f0 [ 29.149302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.149418] kthread+0x328/0x630 [ 29.149518] ret_from_fork+0x10/0x20 [ 29.149634] [ 29.149726] The buggy address belongs to the object at fff00000c7772d80 [ 29.149726] which belongs to the cache kmalloc-64 of size 64 [ 29.149884] The buggy address is located 0 bytes to the right of [ 29.149884] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.150067] [ 29.150152] The buggy address belongs to the physical page: [ 29.150268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.150417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.150594] page_type: f5(slab) [ 29.150764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.150839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.150890] page dumped because: kasan: bad access detected [ 29.150965] [ 29.151083] Memory state around the buggy address: [ 29.151178] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.151290] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.151404] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.151507] ^ [ 29.151671] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.152013] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.152117] ================================================================== [ 28.933773] ================================================================== [ 28.935641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 28.937892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.938112] show_stack+0x20/0x38 (C) [ 28.939601] kasan_atomics_helper+0x32c/0x4858 [ 28.940972] kasan_save_stack+0x3c/0x68 [ 28.941655] kasan_atomics+0xb8/0x2e0 [ 28.942394] [ 28.942525] The buggy address is located 0 bytes to the right of [ 28.942525] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 28.943596] page dumped because: kasan: bad access detected [ 28.943708] [ 28.943824] Memory state around the buggy address: [ 28.943971] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.944603] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.944723] ================================================================== [ 29.300325] ================================================================== [ 29.300437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.300555] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.300675] [ 29.300766] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.300967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.301037] Hardware name: linux,dummy-virt (DT) [ 29.301113] Call trace: [ 29.301166] show_stack+0x20/0x38 (C) [ 29.301295] dump_stack_lvl+0x8c/0xd0 [ 29.301420] print_report+0x118/0x608 [ 29.301536] kasan_report+0xdc/0x128 [ 29.303038] kasan_check_range+0x100/0x1a8 [ 29.303957] __kasan_check_write+0x20/0x30 [ 29.304246] kasan_atomics_helper+0xe44/0x4858 [ 29.304529] kasan_atomics+0x198/0x2e0 [ 29.304664] kunit_try_run_case+0x170/0x3f0 [ 29.305660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.305850] kthread+0x328/0x630 [ 29.305986] ret_from_fork+0x10/0x20 [ 29.306071] [ 29.306099] Allocated by task 266: [ 29.306143] kasan_save_stack+0x3c/0x68 [ 29.306202] kasan_save_track+0x20/0x40 [ 29.306253] kasan_save_alloc_info+0x40/0x58 [ 29.306302] __kasan_kmalloc+0xd4/0xd8 [ 29.306351] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.306408] kasan_atomics+0xb8/0x2e0 [ 29.306458] kunit_try_run_case+0x170/0x3f0 [ 29.306510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.306567] kthread+0x328/0x630 [ 29.306611] ret_from_fork+0x10/0x20 [ 29.306820] [ 29.306882] The buggy address belongs to the object at fff00000c7772d80 [ 29.306882] which belongs to the cache kmalloc-64 of size 64 [ 29.307033] The buggy address is located 0 bytes to the right of [ 29.307033] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.307192] [ 29.307243] The buggy address belongs to the physical page: [ 29.307323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.307445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.307564] page_type: f5(slab) [ 29.307660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.307810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.307909] page dumped because: kasan: bad access detected [ 29.307986] [ 29.308046] Memory state around the buggy address: [ 29.308128] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.308235] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.308343] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.308494] ^ [ 29.308591] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.308736] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.308848] ================================================================== [ 29.353748] ================================================================== [ 29.353867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.354006] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.354146] [ 29.354423] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.354756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.355293] Hardware name: linux,dummy-virt (DT) [ 29.355749] Call trace: [ 29.356024] show_stack+0x20/0x38 (C) [ 29.356284] dump_stack_lvl+0x8c/0xd0 [ 29.356420] print_report+0x118/0x608 [ 29.356844] kasan_report+0xdc/0x128 [ 29.357066] kasan_check_range+0x100/0x1a8 [ 29.357206] __kasan_check_write+0x20/0x30 [ 29.357350] kasan_atomics_helper+0xff0/0x4858 [ 29.357487] kasan_atomics+0x198/0x2e0 [ 29.357694] kunit_try_run_case+0x170/0x3f0 [ 29.358536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.358784] kthread+0x328/0x630 [ 29.358913] ret_from_fork+0x10/0x20 [ 29.359051] [ 29.359271] Allocated by task 266: [ 29.359360] kasan_save_stack+0x3c/0x68 [ 29.359486] kasan_save_track+0x20/0x40 [ 29.359645] kasan_save_alloc_info+0x40/0x58 [ 29.359814] __kasan_kmalloc+0xd4/0xd8 [ 29.359935] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.360061] kasan_atomics+0xb8/0x2e0 [ 29.360173] kunit_try_run_case+0x170/0x3f0 [ 29.360274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.360620] kthread+0x328/0x630 [ 29.360735] ret_from_fork+0x10/0x20 [ 29.360845] [ 29.360957] The buggy address belongs to the object at fff00000c7772d80 [ 29.360957] which belongs to the cache kmalloc-64 of size 64 [ 29.361128] The buggy address is located 0 bytes to the right of [ 29.361128] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.361393] [ 29.361472] The buggy address belongs to the physical page: [ 29.361579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.361725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.361866] page_type: f5(slab) [ 29.361974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.362119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.362580] page dumped because: kasan: bad access detected [ 29.362727] [ 29.362789] Memory state around the buggy address: [ 29.362868] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.362977] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.363086] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.363180] ^ [ 29.363268] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.363383] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.363478] ================================================================== [ 29.595615] ================================================================== [ 29.595854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 29.595973] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.596099] [ 29.596167] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.596363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.596433] Hardware name: linux,dummy-virt (DT) [ 29.596509] Call trace: [ 29.596568] show_stack+0x20/0x38 (C) [ 29.596763] dump_stack_lvl+0x8c/0xd0 [ 29.597113] print_report+0x118/0x608 [ 29.597270] kasan_report+0xdc/0x128 [ 29.597408] __asan_report_load8_noabort+0x20/0x30 [ 29.597585] kasan_atomics_helper+0x3e10/0x4858 [ 29.597841] kasan_atomics+0x198/0x2e0 [ 29.598046] kunit_try_run_case+0x170/0x3f0 [ 29.598279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.598424] kthread+0x328/0x630 [ 29.598558] ret_from_fork+0x10/0x20 [ 29.599367] [ 29.599452] Allocated by task 266: [ 29.599555] kasan_save_stack+0x3c/0x68 [ 29.599712] kasan_save_track+0x20/0x40 [ 29.599881] kasan_save_alloc_info+0x40/0x58 [ 29.599987] __kasan_kmalloc+0xd4/0xd8 [ 29.600127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.600236] kasan_atomics+0xb8/0x2e0 [ 29.600340] kunit_try_run_case+0x170/0x3f0 [ 29.600441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.600563] kthread+0x328/0x630 [ 29.600847] ret_from_fork+0x10/0x20 [ 29.600951] [ 29.601004] The buggy address belongs to the object at fff00000c7772d80 [ 29.601004] which belongs to the cache kmalloc-64 of size 64 [ 29.601333] The buggy address is located 0 bytes to the right of [ 29.601333] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.602008] [ 29.602079] The buggy address belongs to the physical page: [ 29.602169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.602426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.602569] page_type: f5(slab) [ 29.602786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.603312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.603429] page dumped because: kasan: bad access detected [ 29.603527] [ 29.603588] Memory state around the buggy address: [ 29.603677] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.603809] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.603917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.604801] ^ [ 29.605071] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605375] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605507] ================================================================== [ 29.381004] ================================================================== [ 29.381314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.381460] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.381589] [ 29.381666] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.381898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.381971] Hardware name: linux,dummy-virt (DT) [ 29.382049] Call trace: [ 29.382104] show_stack+0x20/0x38 (C) [ 29.382223] dump_stack_lvl+0x8c/0xd0 [ 29.383856] print_report+0x118/0x608 [ 29.384135] kasan_report+0xdc/0x128 [ 29.384277] kasan_check_range+0x100/0x1a8 [ 29.384432] __kasan_check_write+0x20/0x30 [ 29.384722] kasan_atomics_helper+0x10c0/0x4858 [ 29.384866] kasan_atomics+0x198/0x2e0 [ 29.384988] kunit_try_run_case+0x170/0x3f0 [ 29.385165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.385556] kthread+0x328/0x630 [ 29.385718] ret_from_fork+0x10/0x20 [ 29.385867] [ 29.385963] Allocated by task 266: [ 29.386098] kasan_save_stack+0x3c/0x68 [ 29.386208] kasan_save_track+0x20/0x40 [ 29.386308] kasan_save_alloc_info+0x40/0x58 [ 29.386409] __kasan_kmalloc+0xd4/0xd8 [ 29.386546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.386798] kasan_atomics+0xb8/0x2e0 [ 29.386961] kunit_try_run_case+0x170/0x3f0 [ 29.387575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.387970] kthread+0x328/0x630 [ 29.388095] ret_from_fork+0x10/0x20 [ 29.388301] [ 29.388362] The buggy address belongs to the object at fff00000c7772d80 [ 29.388362] which belongs to the cache kmalloc-64 of size 64 [ 29.388554] The buggy address is located 0 bytes to the right of [ 29.388554] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.388937] [ 29.389038] The buggy address belongs to the physical page: [ 29.389087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.389157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.389221] page_type: f5(slab) [ 29.389288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.389353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.389403] page dumped because: kasan: bad access detected [ 29.389447] [ 29.389471] Memory state around the buggy address: [ 29.389510] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.389567] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.389621] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.389668] ^ [ 29.389744] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.389801] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.389851] ================================================================== [ 29.399397] ================================================================== [ 29.399503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.399637] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.400175] [ 29.400493] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.400721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.400795] Hardware name: linux,dummy-virt (DT) [ 29.400869] Call trace: [ 29.400926] show_stack+0x20/0x38 (C) [ 29.401048] dump_stack_lvl+0x8c/0xd0 [ 29.401169] print_report+0x118/0x608 [ 29.402631] kasan_report+0xdc/0x128 [ 29.402992] kasan_check_range+0x100/0x1a8 [ 29.403117] __kasan_check_write+0x20/0x30 [ 29.403234] kasan_atomics_helper+0x1190/0x4858 [ 29.403359] kasan_atomics+0x198/0x2e0 [ 29.403474] kunit_try_run_case+0x170/0x3f0 [ 29.403603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.408939] kthread+0x328/0x630 [ 29.410739] ret_from_fork+0x10/0x20 [ 29.410937] [ 29.410995] Allocated by task 266: [ 29.411153] kasan_save_stack+0x3c/0x68 [ 29.411274] kasan_save_track+0x20/0x40 [ 29.411429] kasan_save_alloc_info+0x40/0x58 [ 29.411555] __kasan_kmalloc+0xd4/0xd8 [ 29.411671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.411816] kasan_atomics+0xb8/0x2e0 [ 29.411958] kunit_try_run_case+0x170/0x3f0 [ 29.412207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.412408] kthread+0x328/0x630 [ 29.412746] ret_from_fork+0x10/0x20 [ 29.412969] [ 29.413023] The buggy address belongs to the object at fff00000c7772d80 [ 29.413023] which belongs to the cache kmalloc-64 of size 64 [ 29.413164] The buggy address is located 0 bytes to the right of [ 29.413164] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.413476] [ 29.413540] The buggy address belongs to the physical page: [ 29.413654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.413806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.413929] page_type: f5(slab) [ 29.414025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.414176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.414284] page dumped because: kasan: bad access detected [ 29.414365] [ 29.414413] Memory state around the buggy address: [ 29.414487] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.414592] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.415457] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.415998] ^ [ 29.416916] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.417124] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.417444] ================================================================== [ 29.287729] ================================================================== [ 29.287848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.288051] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.288351] [ 29.288465] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.288669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.288851] Hardware name: linux,dummy-virt (DT) [ 29.288951] Call trace: [ 29.289175] show_stack+0x20/0x38 (C) [ 29.289565] dump_stack_lvl+0x8c/0xd0 [ 29.289733] print_report+0x118/0x608 [ 29.289932] kasan_report+0xdc/0x128 [ 29.290239] __asan_report_load8_noabort+0x20/0x30 [ 29.290929] kasan_atomics_helper+0x3f58/0x4858 [ 29.291116] kasan_atomics+0x198/0x2e0 [ 29.291388] kunit_try_run_case+0x170/0x3f0 [ 29.291533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.291716] kthread+0x328/0x630 [ 29.291841] ret_from_fork+0x10/0x20 [ 29.292010] [ 29.292067] Allocated by task 266: [ 29.292170] kasan_save_stack+0x3c/0x68 [ 29.292321] kasan_save_track+0x20/0x40 [ 29.292453] kasan_save_alloc_info+0x40/0x58 [ 29.292765] __kasan_kmalloc+0xd4/0xd8 [ 29.292904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.293120] kasan_atomics+0xb8/0x2e0 [ 29.293217] kunit_try_run_case+0x170/0x3f0 [ 29.293441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.293557] kthread+0x328/0x630 [ 29.293654] ret_from_fork+0x10/0x20 [ 29.294483] [ 29.294566] The buggy address belongs to the object at fff00000c7772d80 [ 29.294566] which belongs to the cache kmalloc-64 of size 64 [ 29.294978] The buggy address is located 0 bytes to the right of [ 29.294978] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.295274] [ 29.295445] The buggy address belongs to the physical page: [ 29.295576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.295766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.295899] page_type: f5(slab) [ 29.296207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.296403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.296605] page dumped because: kasan: bad access detected [ 29.296739] [ 29.296795] Memory state around the buggy address: [ 29.296899] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.297099] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.297221] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.297609] ^ [ 29.298074] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.298339] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.299083] ================================================================== [ 29.540920] ================================================================== [ 29.541064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.541203] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.541359] [ 29.541677] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.542126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.542325] Hardware name: linux,dummy-virt (DT) [ 29.542549] Call trace: [ 29.542743] show_stack+0x20/0x38 (C) [ 29.543030] dump_stack_lvl+0x8c/0xd0 [ 29.543181] print_report+0x118/0x608 [ 29.543394] kasan_report+0xdc/0x128 [ 29.543663] kasan_check_range+0x100/0x1a8 [ 29.544145] __kasan_check_write+0x20/0x30 [ 29.544279] kasan_atomics_helper+0x15b4/0x4858 [ 29.544602] kasan_atomics+0x198/0x2e0 [ 29.544751] kunit_try_run_case+0x170/0x3f0 [ 29.545121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.545272] kthread+0x328/0x630 [ 29.545393] ret_from_fork+0x10/0x20 [ 29.545570] [ 29.545623] Allocated by task 266: [ 29.545717] kasan_save_stack+0x3c/0x68 [ 29.545845] kasan_save_track+0x20/0x40 [ 29.545971] kasan_save_alloc_info+0x40/0x58 [ 29.546126] __kasan_kmalloc+0xd4/0xd8 [ 29.546277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.546430] kasan_atomics+0xb8/0x2e0 [ 29.546578] kunit_try_run_case+0x170/0x3f0 [ 29.546704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.546822] kthread+0x328/0x630 [ 29.547185] ret_from_fork+0x10/0x20 [ 29.548142] [ 29.548231] The buggy address belongs to the object at fff00000c7772d80 [ 29.548231] which belongs to the cache kmalloc-64 of size 64 [ 29.548395] The buggy address is located 0 bytes to the right of [ 29.548395] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.548563] [ 29.548630] The buggy address belongs to the physical page: [ 29.548771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.549054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.549186] page_type: f5(slab) [ 29.549514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.549645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.549791] page dumped because: kasan: bad access detected [ 29.549875] [ 29.549924] Memory state around the buggy address: [ 29.550000] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.550118] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.550744] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.551034] ^ [ 29.551312] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.551997] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.552139] ================================================================== [ 29.500496] ================================================================== [ 29.500740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.501013] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.501942] [ 29.502059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.502266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.502340] Hardware name: linux,dummy-virt (DT) [ 29.502418] Call trace: [ 29.502477] show_stack+0x20/0x38 (C) [ 29.503022] dump_stack_lvl+0x8c/0xd0 [ 29.503262] print_report+0x118/0x608 [ 29.503443] kasan_report+0xdc/0x128 [ 29.503677] kasan_check_range+0x100/0x1a8 [ 29.503981] __kasan_check_write+0x20/0x30 [ 29.504116] kasan_atomics_helper+0x147c/0x4858 [ 29.505180] kasan_atomics+0x198/0x2e0 [ 29.505384] kunit_try_run_case+0x170/0x3f0 [ 29.505717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.506401] kthread+0x328/0x630 [ 29.506555] ret_from_fork+0x10/0x20 [ 29.507143] [ 29.507202] Allocated by task 266: [ 29.507288] kasan_save_stack+0x3c/0x68 [ 29.507869] kasan_save_track+0x20/0x40 [ 29.507984] kasan_save_alloc_info+0x40/0x58 [ 29.508095] __kasan_kmalloc+0xd4/0xd8 [ 29.508539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.508660] kasan_atomics+0xb8/0x2e0 [ 29.508798] kunit_try_run_case+0x170/0x3f0 [ 29.508917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.509035] kthread+0x328/0x630 [ 29.509126] ret_from_fork+0x10/0x20 [ 29.509219] [ 29.509355] The buggy address belongs to the object at fff00000c7772d80 [ 29.509355] which belongs to the cache kmalloc-64 of size 64 [ 29.509519] The buggy address is located 0 bytes to the right of [ 29.509519] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.509677] [ 29.509762] The buggy address belongs to the physical page: [ 29.509962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.510091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.510213] page_type: f5(slab) [ 29.510312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.510434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.510589] page dumped because: kasan: bad access detected [ 29.510725] [ 29.510789] Memory state around the buggy address: [ 29.510881] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.511007] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.511134] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.512005] ^ [ 29.512108] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.512430] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.512531] ================================================================== [ 29.465097] ================================================================== [ 29.465223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.465355] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.465475] [ 29.465543] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.465758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.465830] Hardware name: linux,dummy-virt (DT) [ 29.465903] Call trace: [ 29.465961] show_stack+0x20/0x38 (C) [ 29.466081] dump_stack_lvl+0x8c/0xd0 [ 29.466207] print_report+0x118/0x608 [ 29.466328] kasan_report+0xdc/0x128 [ 29.466448] __asan_report_load8_noabort+0x20/0x30 [ 29.466569] kasan_atomics_helper+0x3f04/0x4858 [ 29.468059] kasan_atomics+0x198/0x2e0 [ 29.468301] kunit_try_run_case+0x170/0x3f0 [ 29.469537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470522] kthread+0x328/0x630 [ 29.470693] ret_from_fork+0x10/0x20 [ 29.470837] [ 29.470892] Allocated by task 266: [ 29.470970] kasan_save_stack+0x3c/0x68 [ 29.472016] kasan_save_track+0x20/0x40 [ 29.472185] kasan_save_alloc_info+0x40/0x58 [ 29.472396] __kasan_kmalloc+0xd4/0xd8 [ 29.472500] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.473371] kasan_atomics+0xb8/0x2e0 [ 29.473526] kunit_try_run_case+0x170/0x3f0 [ 29.473780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.474011] kthread+0x328/0x630 [ 29.474107] ret_from_fork+0x10/0x20 [ 29.475108] [ 29.475175] The buggy address belongs to the object at fff00000c7772d80 [ 29.475175] which belongs to the cache kmalloc-64 of size 64 [ 29.475484] The buggy address is located 0 bytes to the right of [ 29.475484] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.475855] [ 29.476488] The buggy address belongs to the physical page: [ 29.476717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.477347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.477761] page_type: f5(slab) [ 29.478326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.478552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.479225] page dumped because: kasan: bad access detected [ 29.479348] [ 29.479402] Memory state around the buggy address: [ 29.480187] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.480709] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.481143] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.481268] ^ [ 29.481578] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.482066] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.482921] ================================================================== [ 29.153873] ================================================================== [ 29.154001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.154367] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.154642] [ 29.155277] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.155497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.155574] Hardware name: linux,dummy-virt (DT) [ 29.155668] Call trace: [ 29.155755] show_stack+0x20/0x38 (C) [ 29.155888] dump_stack_lvl+0x8c/0xd0 [ 29.156028] print_report+0x118/0x608 [ 29.156179] kasan_report+0xdc/0x128 [ 29.156740] kasan_check_range+0x100/0x1a8 [ 29.157223] __kasan_check_write+0x20/0x30 [ 29.157534] kasan_atomics_helper+0xa6c/0x4858 [ 29.157858] kasan_atomics+0x198/0x2e0 [ 29.158062] kunit_try_run_case+0x170/0x3f0 [ 29.158196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.158367] kthread+0x328/0x630 [ 29.158670] ret_from_fork+0x10/0x20 [ 29.158838] [ 29.159131] Allocated by task 266: [ 29.159289] kasan_save_stack+0x3c/0x68 [ 29.159416] kasan_save_track+0x20/0x40 [ 29.159534] kasan_save_alloc_info+0x40/0x58 [ 29.159899] __kasan_kmalloc+0xd4/0xd8 [ 29.160099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.160224] kasan_atomics+0xb8/0x2e0 [ 29.160413] kunit_try_run_case+0x170/0x3f0 [ 29.160944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.161087] kthread+0x328/0x630 [ 29.161203] ret_from_fork+0x10/0x20 [ 29.161350] [ 29.161489] The buggy address belongs to the object at fff00000c7772d80 [ 29.161489] which belongs to the cache kmalloc-64 of size 64 [ 29.161639] The buggy address is located 0 bytes to the right of [ 29.161639] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.161810] [ 29.161887] The buggy address belongs to the physical page: [ 29.162001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.162135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.162271] page_type: f5(slab) [ 29.162378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.162513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.162618] page dumped because: kasan: bad access detected [ 29.162728] [ 29.162790] Memory state around the buggy address: [ 29.162881] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.163005] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.163595] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.163713] ^ [ 29.163856] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.164049] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.164192] ================================================================== [ 29.267135] ================================================================== [ 29.267244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.267362] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.267485] [ 29.267559] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.267781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.267850] Hardware name: linux,dummy-virt (DT) [ 29.267928] Call trace: [ 29.267983] show_stack+0x20/0x38 (C) [ 29.268109] dump_stack_lvl+0x8c/0xd0 [ 29.268228] print_report+0x118/0x608 [ 29.269025] kasan_report+0xdc/0x128 [ 29.269252] __asan_report_load4_noabort+0x20/0x30 [ 29.269417] kasan_atomics_helper+0x3e04/0x4858 [ 29.269570] kasan_atomics+0x198/0x2e0 [ 29.269715] kunit_try_run_case+0x170/0x3f0 [ 29.270039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.270197] kthread+0x328/0x630 [ 29.271181] ret_from_fork+0x10/0x20 [ 29.271468] [ 29.271528] Allocated by task 266: [ 29.271612] kasan_save_stack+0x3c/0x68 [ 29.271748] kasan_save_track+0x20/0x40 [ 29.271893] kasan_save_alloc_info+0x40/0x58 [ 29.272159] __kasan_kmalloc+0xd4/0xd8 [ 29.272274] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.272438] kasan_atomics+0xb8/0x2e0 [ 29.272541] kunit_try_run_case+0x170/0x3f0 [ 29.272651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.272917] kthread+0x328/0x630 [ 29.273011] ret_from_fork+0x10/0x20 [ 29.273252] [ 29.273335] The buggy address belongs to the object at fff00000c7772d80 [ 29.273335] which belongs to the cache kmalloc-64 of size 64 [ 29.273653] The buggy address is located 0 bytes to the right of [ 29.273653] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.274251] [ 29.274334] The buggy address belongs to the physical page: [ 29.274457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.274608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.274817] page_type: f5(slab) [ 29.274937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.275068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.275172] page dumped because: kasan: bad access detected [ 29.275463] [ 29.275653] Memory state around the buggy address: [ 29.275791] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.275907] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.276019] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.276120] ^ [ 29.276249] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.276374] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.276491] ================================================================== [ 29.317499] ================================================================== [ 29.317654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.317912] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.318089] [ 29.318164] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.318376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.318449] Hardware name: linux,dummy-virt (DT) [ 29.318528] Call trace: [ 29.318583] show_stack+0x20/0x38 (C) [ 29.318817] dump_stack_lvl+0x8c/0xd0 [ 29.318926] print_report+0x118/0x608 [ 29.318988] kasan_report+0xdc/0x128 [ 29.319884] kasan_check_range+0x100/0x1a8 [ 29.320253] __kasan_check_write+0x20/0x30 [ 29.320608] kasan_atomics_helper+0xeb8/0x4858 [ 29.320818] kasan_atomics+0x198/0x2e0 [ 29.321273] kunit_try_run_case+0x170/0x3f0 [ 29.321408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.321871] kthread+0x328/0x630 [ 29.322019] ret_from_fork+0x10/0x20 [ 29.322600] [ 29.322703] Allocated by task 266: [ 29.322937] kasan_save_stack+0x3c/0x68 [ 29.323099] kasan_save_track+0x20/0x40 [ 29.323272] kasan_save_alloc_info+0x40/0x58 [ 29.323578] __kasan_kmalloc+0xd4/0xd8 [ 29.323766] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.324042] kasan_atomics+0xb8/0x2e0 [ 29.324605] kunit_try_run_case+0x170/0x3f0 [ 29.324886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.325383] kthread+0x328/0x630 [ 29.325626] ret_from_fork+0x10/0x20 [ 29.325798] [ 29.325904] The buggy address belongs to the object at fff00000c7772d80 [ 29.325904] which belongs to the cache kmalloc-64 of size 64 [ 29.326076] The buggy address is located 0 bytes to the right of [ 29.326076] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.326778] [ 29.326847] The buggy address belongs to the physical page: [ 29.326931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.327751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.327892] page_type: f5(slab) [ 29.328294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.328545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.328661] page dumped because: kasan: bad access detected [ 29.328771] [ 29.329027] Memory state around the buggy address: [ 29.329110] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.329272] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.329530] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.329643] ^ [ 29.329787] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.329910] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330242] ================================================================== [ 29.418465] ================================================================== [ 29.418566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.418703] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.418830] [ 29.418900] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.419100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.419169] Hardware name: linux,dummy-virt (DT) [ 29.419246] Call trace: [ 29.419301] show_stack+0x20/0x38 (C) [ 29.419433] dump_stack_lvl+0x8c/0xd0 [ 29.419731] print_report+0x118/0x608 [ 29.419916] kasan_report+0xdc/0x128 [ 29.420720] kasan_check_range+0x100/0x1a8 [ 29.420878] __kasan_check_write+0x20/0x30 [ 29.421272] kasan_atomics_helper+0x11f8/0x4858 [ 29.421466] kasan_atomics+0x198/0x2e0 [ 29.421600] kunit_try_run_case+0x170/0x3f0 [ 29.421752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.421913] kthread+0x328/0x630 [ 29.422528] ret_from_fork+0x10/0x20 [ 29.422718] [ 29.422803] Allocated by task 266: [ 29.423018] kasan_save_stack+0x3c/0x68 [ 29.423126] kasan_save_track+0x20/0x40 [ 29.423235] kasan_save_alloc_info+0x40/0x58 [ 29.423392] __kasan_kmalloc+0xd4/0xd8 [ 29.423757] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.423895] kasan_atomics+0xb8/0x2e0 [ 29.424015] kunit_try_run_case+0x170/0x3f0 [ 29.424141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.424269] kthread+0x328/0x630 [ 29.425172] ret_from_fork+0x10/0x20 [ 29.425333] [ 29.425388] The buggy address belongs to the object at fff00000c7772d80 [ 29.425388] which belongs to the cache kmalloc-64 of size 64 [ 29.425741] The buggy address is located 0 bytes to the right of [ 29.425741] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.426548] [ 29.426962] The buggy address belongs to the physical page: [ 29.427133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.427427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.427792] page_type: f5(slab) [ 29.427898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.428027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.428131] page dumped because: kasan: bad access detected [ 29.428213] [ 29.428260] Memory state around the buggy address: [ 29.428336] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.428464] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.428888] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.429011] ^ [ 29.429508] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.429778] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.429938] ================================================================== [ 29.585005] ================================================================== [ 29.586198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 29.586554] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.586873] [ 29.586971] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.587200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.587283] Hardware name: linux,dummy-virt (DT) [ 29.587370] Call trace: [ 29.587430] show_stack+0x20/0x38 (C) [ 29.587579] dump_stack_lvl+0x8c/0xd0 [ 29.587742] print_report+0x118/0x608 [ 29.587887] kasan_report+0xdc/0x128 [ 29.588012] kasan_check_range+0x100/0x1a8 [ 29.588131] __kasan_check_write+0x20/0x30 [ 29.588283] kasan_atomics_helper+0x16d0/0x4858 [ 29.588634] kasan_atomics+0x198/0x2e0 [ 29.588777] kunit_try_run_case+0x170/0x3f0 [ 29.588942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.589206] kthread+0x328/0x630 [ 29.589343] ret_from_fork+0x10/0x20 [ 29.589463] [ 29.589515] Allocated by task 266: [ 29.589590] kasan_save_stack+0x3c/0x68 [ 29.589713] kasan_save_track+0x20/0x40 [ 29.589827] kasan_save_alloc_info+0x40/0x58 [ 29.589948] __kasan_kmalloc+0xd4/0xd8 [ 29.590152] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.590409] kasan_atomics+0xb8/0x2e0 [ 29.590529] kunit_try_run_case+0x170/0x3f0 [ 29.590707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.590923] kthread+0x328/0x630 [ 29.591025] ret_from_fork+0x10/0x20 [ 29.591150] [ 29.591249] The buggy address belongs to the object at fff00000c7772d80 [ 29.591249] which belongs to the cache kmalloc-64 of size 64 [ 29.591397] The buggy address is located 0 bytes to the right of [ 29.591397] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.591559] [ 29.591619] The buggy address belongs to the physical page: [ 29.591771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.592032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.592168] page_type: f5(slab) [ 29.592265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.592432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.592638] page dumped because: kasan: bad access detected [ 29.592784] [ 29.592841] Memory state around the buggy address: [ 29.592929] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.593034] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.593155] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.593288] ^ [ 29.593727] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.593897] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.594006] ================================================================== [ 29.513186] ================================================================== [ 29.513429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.514097] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.514223] [ 29.514306] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.514794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.514885] Hardware name: linux,dummy-virt (DT) [ 29.514968] Call trace: [ 29.515250] show_stack+0x20/0x38 (C) [ 29.515605] dump_stack_lvl+0x8c/0xd0 [ 29.515767] print_report+0x118/0x608 [ 29.516114] kasan_report+0xdc/0x128 [ 29.516297] kasan_check_range+0x100/0x1a8 [ 29.516612] __kasan_check_write+0x20/0x30 [ 29.517096] kasan_atomics_helper+0x14e4/0x4858 [ 29.517261] kasan_atomics+0x198/0x2e0 [ 29.517404] kunit_try_run_case+0x170/0x3f0 [ 29.518725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.518981] kthread+0x328/0x630 [ 29.519117] ret_from_fork+0x10/0x20 [ 29.519344] [ 29.519402] Allocated by task 266: [ 29.519577] kasan_save_stack+0x3c/0x68 [ 29.519776] kasan_save_track+0x20/0x40 [ 29.519891] kasan_save_alloc_info+0x40/0x58 [ 29.520050] __kasan_kmalloc+0xd4/0xd8 [ 29.520283] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.520418] kasan_atomics+0xb8/0x2e0 [ 29.520615] kunit_try_run_case+0x170/0x3f0 [ 29.520813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.520941] kthread+0x328/0x630 [ 29.521295] ret_from_fork+0x10/0x20 [ 29.521451] [ 29.521509] The buggy address belongs to the object at fff00000c7772d80 [ 29.521509] which belongs to the cache kmalloc-64 of size 64 [ 29.521651] The buggy address is located 0 bytes to the right of [ 29.521651] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.521846] [ 29.522175] The buggy address belongs to the physical page: [ 29.522294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.522435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.522563] page_type: f5(slab) [ 29.522664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.522812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.522941] page dumped because: kasan: bad access detected [ 29.523037] [ 29.523095] Memory state around the buggy address: [ 29.523388] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523667] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523805] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.523900] ^ [ 29.524356] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.524924] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.525038] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 28.535443] ================================================================== [ 28.535546] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 28.535664] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260 [ 28.535805] [ 28.535877] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.536074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.536142] Hardware name: linux,dummy-virt (DT) [ 28.536217] Call trace: [ 28.536279] show_stack+0x20/0x38 (C) [ 28.536397] dump_stack_lvl+0x8c/0xd0 [ 28.536515] print_report+0x118/0x608 [ 28.536630] kasan_report+0xdc/0x128 [ 28.537876] __asan_report_load1_noabort+0x20/0x30 [ 28.538033] strnlen+0x80/0x88 [ 28.538165] kasan_strings+0x478/0xb00 [ 28.538345] kunit_try_run_case+0x170/0x3f0 [ 28.538746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.538939] kthread+0x328/0x630 [ 28.539060] ret_from_fork+0x10/0x20 [ 28.539207] [ 28.539336] Allocated by task 260: [ 28.539416] kasan_save_stack+0x3c/0x68 [ 28.539544] kasan_save_track+0x20/0x40 [ 28.539888] kasan_save_alloc_info+0x40/0x58 [ 28.540095] __kasan_kmalloc+0xd4/0xd8 [ 28.540197] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.540366] kasan_strings+0xc8/0xb00 [ 28.540488] kunit_try_run_case+0x170/0x3f0 [ 28.540596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.540725] kthread+0x328/0x630 [ 28.542438] ret_from_fork+0x10/0x20 [ 28.542583] [ 28.542733] Freed by task 260: [ 28.542839] kasan_save_stack+0x3c/0x68 [ 28.542949] kasan_save_track+0x20/0x40 [ 28.543058] kasan_save_free_info+0x4c/0x78 [ 28.544611] __kasan_slab_free+0x6c/0x98 [ 28.544794] kfree+0x214/0x3c8 [ 28.544950] kasan_strings+0x24c/0xb00 [ 28.545199] kunit_try_run_case+0x170/0x3f0 [ 28.545329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.545448] kthread+0x328/0x630 [ 28.545540] ret_from_fork+0x10/0x20 [ 28.545636] [ 28.546015] The buggy address belongs to the object at fff00000c7895c40 [ 28.546015] which belongs to the cache kmalloc-32 of size 32 [ 28.547704] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.549079] fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.574366] dump_stack_lvl+0x8c/0xd0 [ 28.575544] kthread+0x328/0x630 [ 28.580123] kunit_try_run_case+0x170/0x3f0 [ 28.581628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.585841] fff00000c61bf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.590218] kasan_report+0xdc/0x128 [ 28.591740] kasan_bitops_generic+0x110/0x1c8 [ 28.592830] [ 28.593384] __kasan_kmalloc+0xd4/0xd8 [ 28.594822] [ 28.596908] fff00000c61bf880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.603850] Call trace: [ 28.605474] kasan_check_range+0x100/0x1a8 [ 28.606493] kasan_bitops_generic+0x110/0x1c8 [ 28.606714] kunit_try_run_case+0x170/0x3f0 [ 28.607301] kthread+0x328/0x630 [ 28.608271] [ 28.608588] kasan_save_stack+0x3c/0x68 [ 28.610864] [ 28.611699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bf [ 28.613960] ^ [ 28.617751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.619419] __asan_report_load8_noabort+0x20/0x30 [ 28.625720] __kasan_kmalloc+0xd4/0xd8 [ 28.627646] [ 28.629075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.639342] kasan_report+0xdc/0x128 [ 28.642895] kthread+0x328/0x630 [ 28.645812] The buggy address is located 8 bytes inside of [ 28.645812] allocated 9-byte region [fff00000c61bf780, fff00000c61bf789) [ 28.651588] [ 28.655183] kasan_check_range+0x100/0x1a8 [ 28.655622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.657469] [ 28.659938] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 28.523631] ================================================================== [ 28.523760] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 28.523876] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260 [ 28.523999] [ 28.524070] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.524279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.524364] Hardware name: linux,dummy-virt (DT) [ 28.524490] Call trace: [ 28.524658] show_stack+0x20/0x38 (C) [ 28.525052] dump_stack_lvl+0x8c/0xd0 [ 28.525182] print_report+0x118/0x608 [ 28.525315] kasan_report+0xdc/0x128 [ 28.525439] __asan_report_load1_noabort+0x20/0x30 [ 28.525568] strlen+0xa8/0xb0 [ 28.525712] kasan_strings+0x418/0xb00 [ 28.526062] kunit_try_run_case+0x170/0x3f0 [ 28.526193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.526329] kthread+0x328/0x630 [ 28.526442] ret_from_fork+0x10/0x20 [ 28.526571] [ 28.526618] Allocated by task 260: [ 28.526747] kasan_save_stack+0x3c/0x68 [ 28.526932] kasan_save_track+0x20/0x40 [ 28.527074] kasan_save_alloc_info+0x40/0x58 [ 28.527246] __kasan_kmalloc+0xd4/0xd8 [ 28.527359] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.527498] kasan_strings+0xc8/0xb00 [ 28.527639] kunit_try_run_case+0x170/0x3f0 [ 28.527876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.528036] kthread+0x328/0x630 [ 28.528155] ret_from_fork+0x10/0x20 [ 28.528281] [ 28.528342] Freed by task 260: [ 28.528419] kasan_save_stack+0x3c/0x68 [ 28.528538] kasan_save_track+0x20/0x40 [ 28.528754] kasan_save_free_info+0x4c/0x78 [ 28.528871] __kasan_slab_free+0x6c/0x98 [ 28.529016] kfree+0x214/0x3c8 [ 28.529116] kasan_strings+0x24c/0xb00 [ 28.529212] kunit_try_run_case+0x170/0x3f0 [ 28.529348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.529561] kthread+0x328/0x630 [ 28.529863] ret_from_fork+0x10/0x20 [ 28.530039] [ 28.530127] The buggy address belongs to the object at fff00000c7895c40 [ 28.530127] which belongs to the cache kmalloc-32 of size 32 [ 28.530270] The buggy address is located 16 bytes inside of [ 28.530270] freed 32-byte region [fff00000c7895c40, fff00000c7895c60) [ 28.530425] [ 28.530489] The buggy address belongs to the physical page: [ 28.530740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 28.531469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.531762] page_type: f5(slab) [ 28.532055] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.532188] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.532292] page dumped because: kasan: bad access detected [ 28.532381] [ 28.532442] Memory state around the buggy address: [ 28.532522] fff00000c7895b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.532636] fff00000c7895b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 28.532817] >fff00000c7895c00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.533015] ^ [ 28.533258] fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.533418] fff00000c7895d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.533973] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 28.512621] ================================================================== [ 28.512803] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 28.513013] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260 [ 28.513226] [ 28.513331] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.513554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.513627] Hardware name: linux,dummy-virt (DT) [ 28.514148] Call trace: [ 28.514235] show_stack+0x20/0x38 (C) [ 28.514387] dump_stack_lvl+0x8c/0xd0 [ 28.514576] print_report+0x118/0x608 [ 28.514775] kasan_report+0xdc/0x128 [ 28.514842] __asan_report_load1_noabort+0x20/0x30 [ 28.514917] kasan_strings+0x95c/0xb00 [ 28.515173] kunit_try_run_case+0x170/0x3f0 [ 28.515307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.515444] kthread+0x328/0x630 [ 28.515550] ret_from_fork+0x10/0x20 [ 28.515677] [ 28.515748] Allocated by task 260: [ 28.515893] kasan_save_stack+0x3c/0x68 [ 28.516173] kasan_save_track+0x20/0x40 [ 28.516326] kasan_save_alloc_info+0x40/0x58 [ 28.516456] __kasan_kmalloc+0xd4/0xd8 [ 28.516560] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.516668] kasan_strings+0xc8/0xb00 [ 28.516798] kunit_try_run_case+0x170/0x3f0 [ 28.516923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.517053] kthread+0x328/0x630 [ 28.517147] ret_from_fork+0x10/0x20 [ 28.517255] [ 28.517371] Freed by task 260: [ 28.517478] kasan_save_stack+0x3c/0x68 [ 28.517601] kasan_save_track+0x20/0x40 [ 28.517734] kasan_save_free_info+0x4c/0x78 [ 28.518027] __kasan_slab_free+0x6c/0x98 [ 28.518139] kfree+0x214/0x3c8 [ 28.518237] kasan_strings+0x24c/0xb00 [ 28.518353] kunit_try_run_case+0x170/0x3f0 [ 28.518532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.518711] kthread+0x328/0x630 [ 28.518840] ret_from_fork+0x10/0x20 [ 28.519211] [ 28.519317] The buggy address belongs to the object at fff00000c7895c40 [ 28.519317] which belongs to the cache kmalloc-32 of size 32 [ 28.519462] The buggy address is located 16 bytes inside of [ 28.519462] freed 32-byte region [fff00000c7895c40, fff00000c7895c60) [ 28.519616] [ 28.519677] The buggy address belongs to the physical page: [ 28.519794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 28.519995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.520218] page_type: f5(slab) [ 28.520409] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.520671] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.520820] page dumped because: kasan: bad access detected [ 28.520962] [ 28.521012] Memory state around the buggy address: [ 28.521090] fff00000c7895b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.521284] fff00000c7895b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 28.521591] >fff00000c7895c00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.521951] ^ [ 28.522366] fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.522533] fff00000c7895d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.522696] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 28.490495] ================================================================== [ 28.490735] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 28.490972] Read of size 1 at addr fff00000c7895c50 by task kunit_try_catch/260 [ 28.491283] [ 28.491374] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.491774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.491865] Hardware name: linux,dummy-virt (DT) [ 28.492450] Call trace: [ 28.492567] show_stack+0x20/0x38 (C) [ 28.493051] dump_stack_lvl+0x8c/0xd0 [ 28.494069] print_report+0x118/0x608 [ 28.494745] kasan_report+0xdc/0x128 [ 28.495632] __asan_report_load1_noabort+0x20/0x30 [ 28.495813] strcmp+0xc0/0xc8 [ 28.496237] kasan_strings+0x340/0xb00 [ 28.496546] kunit_try_run_case+0x170/0x3f0 [ 28.497218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.497411] kthread+0x328/0x630 [ 28.498130] ret_from_fork+0x10/0x20 [ 28.498503] [ 28.498608] Allocated by task 260: [ 28.499004] kasan_save_stack+0x3c/0x68 [ 28.499236] kasan_save_track+0x20/0x40 [ 28.499424] kasan_save_alloc_info+0x40/0x58 [ 28.500149] __kasan_kmalloc+0xd4/0xd8 [ 28.500256] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.500365] kasan_strings+0xc8/0xb00 [ 28.500460] kunit_try_run_case+0x170/0x3f0 [ 28.500809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.501770] kthread+0x328/0x630 [ 28.502732] ret_from_fork+0x10/0x20 [ 28.503841] [ 28.503874] Freed by task 260: [ 28.503955] kasan_save_stack+0x3c/0x68 [ 28.504066] kasan_save_track+0x20/0x40 [ 28.504171] kasan_save_free_info+0x4c/0x78 [ 28.504270] __kasan_slab_free+0x6c/0x98 [ 28.504366] kfree+0x214/0x3c8 [ 28.504460] kasan_strings+0x24c/0xb00 [ 28.504766] kunit_try_run_case+0x170/0x3f0 [ 28.505266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.505470] kthread+0x328/0x630 [ 28.505604] ret_from_fork+0x10/0x20 [ 28.506109] [ 28.506218] The buggy address belongs to the object at fff00000c7895c40 [ 28.506218] which belongs to the cache kmalloc-32 of size 32 [ 28.506485] The buggy address is located 16 bytes inside of [ 28.506485] freed 32-byte region [fff00000c7895c40, fff00000c7895c60) [ 28.507115] [ 28.507185] The buggy address belongs to the physical page: [ 28.507356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 28.507563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.507758] page_type: f5(slab) [ 28.507876] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.508375] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.508559] page dumped because: kasan: bad access detected [ 28.508765] [ 28.508931] Memory state around the buggy address: [ 28.509133] fff00000c7895b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.509339] fff00000c7895b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 28.509857] >fff00000c7895c00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.510025] ^ [ 28.510249] fff00000c7895c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.510493] fff00000c7895d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.510793] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 28.452138] ================================================================== [ 28.452310] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 28.452879] Read of size 1 at addr fff00000c7895a98 by task kunit_try_catch/258 [ 28.453072] [ 28.453281] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.453492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.453565] Hardware name: linux,dummy-virt (DT) [ 28.453650] Call trace: [ 28.453748] show_stack+0x20/0x38 (C) [ 28.454512] dump_stack_lvl+0x8c/0xd0 [ 28.454779] print_report+0x118/0x608 [ 28.455060] kasan_report+0xdc/0x128 [ 28.455539] __asan_report_load1_noabort+0x20/0x30 [ 28.455766] memcmp+0x198/0x1d8 [ 28.455946] kasan_memcmp+0x16c/0x300 [ 28.456104] kunit_try_run_case+0x170/0x3f0 [ 28.456265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.456407] kthread+0x328/0x630 [ 28.456570] ret_from_fork+0x10/0x20 [ 28.456746] [ 28.457074] Allocated by task 258: [ 28.457414] kasan_save_stack+0x3c/0x68 [ 28.457552] kasan_save_track+0x20/0x40 [ 28.457754] kasan_save_alloc_info+0x40/0x58 [ 28.457870] __kasan_kmalloc+0xd4/0xd8 [ 28.457976] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.458469] kasan_memcmp+0xbc/0x300 [ 28.458566] kunit_try_run_case+0x170/0x3f0 [ 28.458930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.459071] kthread+0x328/0x630 [ 28.459376] ret_from_fork+0x10/0x20 [ 28.459491] [ 28.459551] The buggy address belongs to the object at fff00000c7895a80 [ 28.459551] which belongs to the cache kmalloc-32 of size 32 [ 28.460261] The buggy address is located 0 bytes to the right of [ 28.460261] allocated 24-byte region [fff00000c7895a80, fff00000c7895a98) [ 28.460528] [ 28.460595] The buggy address belongs to the physical page: [ 28.460774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 28.460996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.461161] page_type: f5(slab) [ 28.461369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.461645] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.461772] page dumped because: kasan: bad access detected [ 28.461869] [ 28.462317] Memory state around the buggy address: [ 28.462409] fff00000c7895980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 28.462535] fff00000c7895a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.462782] >fff00000c7895a80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.462887] ^ [ 28.462977] fff00000c7895b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.463136] fff00000c7895b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.463458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 28.388459] ================================================================== [ 28.388538] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 28.388618] Read of size 1 at addr ffff800080a57b4a by task kunit_try_catch/254 [ 28.388706] [ 28.388802] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.389064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.389458] Hardware name: linux,dummy-virt (DT) [ 28.389542] Call trace: [ 28.389609] show_stack+0x20/0x38 (C) [ 28.390196] dump_stack_lvl+0x8c/0xd0 [ 28.390346] print_report+0x310/0x608 [ 28.390603] kasan_report+0xdc/0x128 [ 28.391246] __asan_report_load1_noabort+0x20/0x30 [ 28.391457] kasan_alloca_oob_right+0x2dc/0x340 [ 28.392032] kunit_try_run_case+0x170/0x3f0 [ 28.392721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.393489] kthread+0x328/0x630 [ 28.393640] ret_from_fork+0x10/0x20 [ 28.393836] [ 28.393896] The buggy address belongs to stack of task kunit_try_catch/254 [ 28.394105] [ 28.394264] The buggy address belongs to the virtual mapping at [ 28.394264] [ffff800080a50000, ffff800080a59000) created by: [ 28.394264] kernel_clone+0x150/0x7a8 [ 28.394669] [ 28.394886] The buggy address belongs to the physical page: [ 28.395041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760 [ 28.395304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.395874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.397621] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.398750] page dumped because: kasan: bad access detected [ 28.398842] [ 28.398908] Memory state around the buggy address: [ 28.398999] ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.399113] ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.399225] >ffff800080a57b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 28.399329] ^ [ 28.399533] ffff800080a57b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.399640] ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.399815] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 28.358500] ================================================================== [ 28.358673] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 28.359647] Read of size 1 at addr ffff800080a57b5f by task kunit_try_catch/252 [ 28.359973] [ 28.360073] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.360283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.360354] Hardware name: linux,dummy-virt (DT) [ 28.360439] Call trace: [ 28.360552] show_stack+0x20/0x38 (C) [ 28.360948] dump_stack_lvl+0x8c/0xd0 [ 28.361133] print_report+0x310/0x608 [ 28.361283] kasan_report+0xdc/0x128 [ 28.361407] __asan_report_load1_noabort+0x20/0x30 [ 28.361535] kasan_alloca_oob_left+0x2b8/0x310 [ 28.361661] kunit_try_run_case+0x170/0x3f0 [ 28.361808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.361944] kthread+0x328/0x630 [ 28.362065] ret_from_fork+0x10/0x20 [ 28.362190] [ 28.362266] The buggy address belongs to stack of task kunit_try_catch/252 [ 28.362776] [ 28.362856] The buggy address belongs to the virtual mapping at [ 28.362856] [ffff800080a50000, ffff800080a59000) created by: [ 28.362856] kernel_clone+0x150/0x7a8 [ 28.363212] [ 28.363303] The buggy address belongs to the physical page: [ 28.363470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760 [ 28.363661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.363849] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.363982] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.364137] page dumped because: kasan: bad access detected [ 28.364446] [ 28.364510] Memory state around the buggy address: [ 28.364840] ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.364966] ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.365556] >ffff800080a57b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 28.365662] ^ [ 28.365840] ffff800080a57b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.365984] ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.366090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 28.328618] ================================================================== [ 28.328824] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 28.328983] Read of size 1 at addr ffff800080a57c2a by task kunit_try_catch/250 [ 28.329102] [ 28.329190] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.329408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.329473] Hardware name: linux,dummy-virt (DT) [ 28.329547] Call trace: [ 28.329600] show_stack+0x20/0x38 (C) [ 28.330752] dump_stack_lvl+0x8c/0xd0 [ 28.330999] print_report+0x310/0x608 [ 28.331081] kasan_report+0xdc/0x128 [ 28.331245] __asan_report_load1_noabort+0x20/0x30 [ 28.331400] kasan_stack_oob+0x238/0x270 [ 28.331522] kunit_try_run_case+0x170/0x3f0 [ 28.331656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.332509] kthread+0x328/0x630 [ 28.332696] ret_from_fork+0x10/0x20 [ 28.333753] [ 28.334408] The buggy address belongs to stack of task kunit_try_catch/250 [ 28.334827] and is located at offset 138 in frame: [ 28.335245] kasan_stack_oob+0x0/0x270 [ 28.336145] [ 28.336252] This frame has 4 objects: [ 28.336456] [48, 49) '__assertion' [ 28.337413] [64, 72) 'array' [ 28.337722] [96, 112) '__assertion' [ 28.338220] [128, 138) 'stack_array' [ 28.338466] [ 28.338862] The buggy address belongs to the virtual mapping at [ 28.338862] [ffff800080a50000, ffff800080a59000) created by: [ 28.338862] kernel_clone+0x150/0x7a8 [ 28.339213] [ 28.339284] The buggy address belongs to the physical page: [ 28.339368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760 [ 28.339575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.339786] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.339951] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.340143] page dumped because: kasan: bad access detected [ 28.340299] [ 28.340353] Memory state around the buggy address: [ 28.340429] ffff800080a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.340583] ffff800080a57b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 28.340707] >ffff800080a57c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 28.340971] ^ [ 28.341200] ffff800080a57c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 28.341511] ffff800080a57d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.342127] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 28.257127] ================================================================== [ 28.257303] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 28.257449] Read of size 1 at addr ffffa1cc1efb258d by task kunit_try_catch/246 [ 28.257569] [ 28.257674] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.258218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.258306] Hardware name: linux,dummy-virt (DT) [ 28.258397] Call trace: [ 28.258466] show_stack+0x20/0x38 (C) [ 28.258618] dump_stack_lvl+0x8c/0xd0 [ 28.258838] print_report+0x310/0x608 [ 28.258975] kasan_report+0xdc/0x128 [ 28.259174] __asan_report_load1_noabort+0x20/0x30 [ 28.259345] kasan_global_oob_right+0x230/0x270 [ 28.259596] kunit_try_run_case+0x170/0x3f0 [ 28.259787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.260020] kthread+0x328/0x630 [ 28.260212] ret_from_fork+0x10/0x20 [ 28.260363] [ 28.260530] The buggy address belongs to the variable: [ 28.260650] global_array+0xd/0x40 [ 28.260810] [ 28.261009] The buggy address belongs to the virtual mapping at [ 28.261009] [ffffa1cc1d150000, ffffa1cc1f071000) created by: [ 28.261009] paging_init+0x66c/0x7d0 [ 28.261345] [ 28.261474] The buggy address belongs to the physical page: [ 28.261564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db2 [ 28.261721] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 28.261924] raw: 03fffe0000002000 ffffc1ffc01f6c88 ffffc1ffc01f6c88 0000000000000000 [ 28.262131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.262245] page dumped because: kasan: bad access detected [ 28.262415] [ 28.262495] Memory state around the buggy address: [ 28.262655] ffffa1cc1efb2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.262848] ffffa1cc1efb2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 28.262966] >ffffa1cc1efb2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 28.263124] ^ [ 28.263252] ffffa1cc1efb2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 28.263389] ffffa1cc1efb2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.263520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 28.192382] ================================================================== [ 28.192535] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.193825] Free of addr fff00000c56e8a01 by task kunit_try_catch/242 [ 28.194087] [ 28.194211] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.195401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.195479] Hardware name: linux,dummy-virt (DT) [ 28.195554] Call trace: [ 28.196700] show_stack+0x20/0x38 (C) [ 28.197175] dump_stack_lvl+0x8c/0xd0 [ 28.197658] print_report+0x118/0x608 [ 28.198369] kasan_report_invalid_free+0xc0/0xe8 [ 28.198767] check_slab_allocation+0xfc/0x108 [ 28.199218] __kasan_mempool_poison_object+0x78/0x150 [ 28.199362] mempool_free+0x28c/0x328 [ 28.199477] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.199921] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.200217] kunit_try_run_case+0x170/0x3f0 [ 28.200453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.200949] kthread+0x328/0x630 [ 28.201064] ret_from_fork+0x10/0x20 [ 28.201196] [ 28.201252] Allocated by task 242: [ 28.201330] kasan_save_stack+0x3c/0x68 [ 28.201898] kasan_save_track+0x20/0x40 [ 28.202418] kasan_save_alloc_info+0x40/0x58 [ 28.202827] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.203333] remove_element+0x130/0x1f8 [ 28.203967] mempool_alloc_preallocated+0x58/0xc0 [ 28.204323] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.204431] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.204533] kunit_try_run_case+0x170/0x3f0 [ 28.205216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.205770] kthread+0x328/0x630 [ 28.205942] ret_from_fork+0x10/0x20 [ 28.206042] [ 28.206103] The buggy address belongs to the object at fff00000c56e8a00 [ 28.206103] which belongs to the cache kmalloc-128 of size 128 [ 28.206429] The buggy address is located 1 bytes inside of [ 28.206429] 128-byte region [fff00000c56e8a00, fff00000c56e8a80) [ 28.206573] [ 28.206664] The buggy address belongs to the physical page: [ 28.206909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 28.207181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.207457] page_type: f5(slab) [ 28.207558] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.207698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.207810] page dumped because: kasan: bad access detected [ 28.207968] [ 28.208025] Memory state around the buggy address: [ 28.208164] fff00000c56e8900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.208310] fff00000c56e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.208427] >fff00000c56e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.208529] ^ [ 28.208606] fff00000c56e8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.208763] fff00000c56e8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.208869] ================================================================== [ 28.232214] ================================================================== [ 28.232363] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.232512] Free of addr fff00000c78d8001 by task kunit_try_catch/244 [ 28.232621] [ 28.232841] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.233083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.233159] Hardware name: linux,dummy-virt (DT) [ 28.233900] Call trace: [ 28.234005] show_stack+0x20/0x38 (C) [ 28.234142] dump_stack_lvl+0x8c/0xd0 [ 28.234409] print_report+0x118/0x608 [ 28.234701] kasan_report_invalid_free+0xc0/0xe8 [ 28.235019] __kasan_mempool_poison_object+0xfc/0x150 [ 28.235157] mempool_free+0x28c/0x328 [ 28.235270] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.235446] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 28.235761] kunit_try_run_case+0x170/0x3f0 [ 28.236127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.236295] kthread+0x328/0x630 [ 28.236467] ret_from_fork+0x10/0x20 [ 28.236755] [ 28.236815] The buggy address belongs to the physical page: [ 28.236936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 28.237158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.237297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.237534] page_type: f8(unknown) [ 28.237655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.237887] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.238088] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.238328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.238453] head: 0bfffe0000000002 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff [ 28.238736] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.238851] page dumped because: kasan: bad access detected [ 28.238977] [ 28.239071] Memory state around the buggy address: [ 28.239186] fff00000c78d7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.239344] fff00000c78d7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.239459] >fff00000c78d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.239553] ^ [ 28.239663] fff00000c78d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.239904] fff00000c78d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.240047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 28.119737] ================================================================== [ 28.119873] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.120244] Free of addr fff00000c78d4000 by task kunit_try_catch/238 [ 28.120470] [ 28.120573] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.120938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.121015] Hardware name: linux,dummy-virt (DT) [ 28.121483] Call trace: [ 28.121544] show_stack+0x20/0x38 (C) [ 28.121677] dump_stack_lvl+0x8c/0xd0 [ 28.121829] print_report+0x118/0x608 [ 28.121946] kasan_report_invalid_free+0xc0/0xe8 [ 28.122075] __kasan_mempool_poison_object+0x14c/0x150 [ 28.122929] mempool_free+0x28c/0x328 [ 28.123164] mempool_double_free_helper+0x150/0x2e8 [ 28.123845] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.124211] kunit_try_run_case+0x170/0x3f0 [ 28.124439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.124609] kthread+0x328/0x630 [ 28.124744] ret_from_fork+0x10/0x20 [ 28.125491] [ 28.125658] The buggy address belongs to the physical page: [ 28.126156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d4 [ 28.126435] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.126851] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.126990] page_type: f8(unknown) [ 28.127128] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.127345] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.127467] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.127583] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.127724] head: 0bfffe0000000002 ffffc1ffc31e3501 00000000ffffffff 00000000ffffffff [ 28.127847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.127973] page dumped because: kasan: bad access detected [ 28.128190] [ 28.128238] Memory state around the buggy address: [ 28.128315] fff00000c78d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.128430] fff00000c78d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.128709] >fff00000c78d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.128806] ^ [ 28.129445] fff00000c78d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.129824] fff00000c78d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.129938] ================================================================== [ 28.148333] ================================================================== [ 28.148466] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.148613] Free of addr fff00000c78d4000 by task kunit_try_catch/240 [ 28.148752] [ 28.148846] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.149050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.149536] Hardware name: linux,dummy-virt (DT) [ 28.149986] Call trace: [ 28.150100] show_stack+0x20/0x38 (C) [ 28.150386] dump_stack_lvl+0x8c/0xd0 [ 28.150671] print_report+0x118/0x608 [ 28.151054] kasan_report_invalid_free+0xc0/0xe8 [ 28.151190] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.151422] mempool_free+0x24c/0x328 [ 28.151540] mempool_double_free_helper+0x150/0x2e8 [ 28.151879] mempool_page_alloc_double_free+0xbc/0x118 [ 28.152146] kunit_try_run_case+0x170/0x3f0 [ 28.152283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.152627] kthread+0x328/0x630 [ 28.152969] ret_from_fork+0x10/0x20 [ 28.153114] [ 28.153168] The buggy address belongs to the physical page: [ 28.153243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d4 [ 28.153388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.153550] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.154408] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.154964] page dumped because: kasan: bad access detected [ 28.155045] [ 28.155278] Memory state around the buggy address: [ 28.155492] fff00000c78d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.155704] fff00000c78d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.156217] >fff00000c78d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.156313] ^ [ 28.156875] fff00000c78d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.157414] fff00000c78d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.158103] ================================================================== [ 28.073221] ================================================================== [ 28.073393] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.073534] Free of addr fff00000c56e8700 by task kunit_try_catch/236 [ 28.073638] [ 28.074488] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.074948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.075023] Hardware name: linux,dummy-virt (DT) [ 28.075186] Call trace: [ 28.075567] show_stack+0x20/0x38 (C) [ 28.076155] dump_stack_lvl+0x8c/0xd0 [ 28.076662] print_report+0x118/0x608 [ 28.076802] kasan_report_invalid_free+0xc0/0xe8 [ 28.076931] check_slab_allocation+0xd4/0x108 [ 28.077054] __kasan_mempool_poison_object+0x78/0x150 [ 28.077181] mempool_free+0x28c/0x328 [ 28.077323] mempool_double_free_helper+0x150/0x2e8 [ 28.077445] mempool_kmalloc_double_free+0xc0/0x118 [ 28.079063] kunit_try_run_case+0x170/0x3f0 [ 28.079215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.080550] kthread+0x328/0x630 [ 28.080948] ret_from_fork+0x10/0x20 [ 28.081173] [ 28.081347] Allocated by task 236: [ 28.081426] kasan_save_stack+0x3c/0x68 [ 28.082053] kasan_save_track+0x20/0x40 [ 28.082225] kasan_save_alloc_info+0x40/0x58 [ 28.082900] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.083338] remove_element+0x130/0x1f8 [ 28.083489] mempool_alloc_preallocated+0x58/0xc0 [ 28.083616] mempool_double_free_helper+0x94/0x2e8 [ 28.084266] mempool_kmalloc_double_free+0xc0/0x118 [ 28.084385] kunit_try_run_case+0x170/0x3f0 [ 28.084491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.085968] kthread+0x328/0x630 [ 28.086275] ret_from_fork+0x10/0x20 [ 28.086380] [ 28.086904] Freed by task 236: [ 28.087484] kasan_save_stack+0x3c/0x68 [ 28.087634] kasan_save_track+0x20/0x40 [ 28.087775] kasan_save_free_info+0x4c/0x78 [ 28.087887] __kasan_mempool_poison_object+0xc0/0x150 [ 28.088006] mempool_free+0x28c/0x328 [ 28.088254] mempool_double_free_helper+0x100/0x2e8 [ 28.088479] mempool_kmalloc_double_free+0xc0/0x118 [ 28.088648] kunit_try_run_case+0x170/0x3f0 [ 28.088945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.089191] kthread+0x328/0x630 [ 28.089289] ret_from_fork+0x10/0x20 [ 28.089382] [ 28.089444] The buggy address belongs to the object at fff00000c56e8700 [ 28.089444] which belongs to the cache kmalloc-128 of size 128 [ 28.089647] The buggy address is located 0 bytes inside of [ 28.089647] 128-byte region [fff00000c56e8700, fff00000c56e8780) [ 28.090322] [ 28.090580] The buggy address belongs to the physical page: [ 28.090708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 28.091000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.091172] page_type: f5(slab) [ 28.091409] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.091534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.091630] page dumped because: kasan: bad access detected [ 28.091780] [ 28.091876] Memory state around the buggy address: [ 28.091991] fff00000c56e8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.092114] fff00000c56e8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.092225] >fff00000c56e8700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.092399] ^ [ 28.092587] fff00000c56e8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.092859] fff00000c56e8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.093128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 27.920593] ================================================================== [ 27.920840] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 27.921042] Read of size 1 at addr fff00000c78d0000 by task kunit_try_catch/230 [ 27.921237] [ 27.921337] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.921546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.921714] Hardware name: linux,dummy-virt (DT) [ 27.921824] Call trace: [ 27.921958] show_stack+0x20/0x38 (C) [ 27.922154] dump_stack_lvl+0x8c/0xd0 [ 27.922344] print_report+0x118/0x608 [ 27.922553] kasan_report+0xdc/0x128 [ 27.922675] __asan_report_load1_noabort+0x20/0x30 [ 27.923033] mempool_uaf_helper+0x314/0x340 [ 27.923208] mempool_kmalloc_large_uaf+0xc4/0x120 [ 27.923355] kunit_try_run_case+0x170/0x3f0 [ 27.923489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.923644] kthread+0x328/0x630 [ 27.923818] ret_from_fork+0x10/0x20 [ 27.924138] [ 27.924242] The buggy address belongs to the physical page: [ 27.924399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d0 [ 27.924528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.924631] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.924782] page_type: f8(unknown) [ 27.924961] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.925151] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.925304] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.925432] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.925623] head: 0bfffe0000000002 ffffc1ffc31e3401 00000000ffffffff 00000000ffffffff [ 27.925954] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.926084] page dumped because: kasan: bad access detected [ 27.926240] [ 27.926286] Memory state around the buggy address: [ 27.926468] fff00000c78cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.926601] fff00000c78cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.926750] >fff00000c78d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.926851] ^ [ 27.926921] fff00000c78d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.927029] fff00000c78d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.927126] ================================================================== [ 28.038485] ================================================================== [ 28.038625] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.038831] Read of size 1 at addr fff00000c78d0000 by task kunit_try_catch/234 [ 28.038968] [ 28.039071] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.042914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.043012] Hardware name: linux,dummy-virt (DT) [ 28.043155] Call trace: [ 28.043220] show_stack+0x20/0x38 (C) [ 28.043353] dump_stack_lvl+0x8c/0xd0 [ 28.043485] print_report+0x118/0x608 [ 28.044187] kasan_report+0xdc/0x128 [ 28.044315] __asan_report_load1_noabort+0x20/0x30 [ 28.044457] mempool_uaf_helper+0x314/0x340 [ 28.044580] mempool_page_alloc_uaf+0xc0/0x118 [ 28.044743] kunit_try_run_case+0x170/0x3f0 [ 28.044867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.044996] kthread+0x328/0x630 [ 28.045101] ret_from_fork+0x10/0x20 [ 28.045214] [ 28.045276] The buggy address belongs to the physical page: [ 28.045352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d0 [ 28.045478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.045622] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.045769] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.045870] page dumped because: kasan: bad access detected [ 28.045941] [ 28.045988] Memory state around the buggy address: [ 28.046076] fff00000c78cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.049014] fff00000c78cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.049148] >fff00000c78d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.049260] ^ [ 28.049338] fff00000c78d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.049447] fff00000c78d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.049542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 27.876549] ================================================================== [ 27.876699] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 27.876854] Read of size 1 at addr fff00000c56e8300 by task kunit_try_catch/228 [ 27.876972] [ 27.877055] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.877275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.877341] Hardware name: linux,dummy-virt (DT) [ 27.877415] Call trace: [ 27.877470] show_stack+0x20/0x38 (C) [ 27.877596] dump_stack_lvl+0x8c/0xd0 [ 27.878352] print_report+0x118/0x608 [ 27.878455] kasan_report+0xdc/0x128 [ 27.878555] __asan_report_load1_noabort+0x20/0x30 [ 27.878753] mempool_uaf_helper+0x314/0x340 [ 27.878961] mempool_kmalloc_uaf+0xc4/0x120 [ 27.879201] kunit_try_run_case+0x170/0x3f0 [ 27.879334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.879487] kthread+0x328/0x630 [ 27.879612] ret_from_fork+0x10/0x20 [ 27.879788] [ 27.879869] Allocated by task 228: [ 27.880000] kasan_save_stack+0x3c/0x68 [ 27.880110] kasan_save_track+0x20/0x40 [ 27.880235] kasan_save_alloc_info+0x40/0x58 [ 27.880382] __kasan_mempool_unpoison_object+0x11c/0x180 [ 27.880624] remove_element+0x130/0x1f8 [ 27.880756] mempool_alloc_preallocated+0x58/0xc0 [ 27.880870] mempool_uaf_helper+0xa4/0x340 [ 27.880979] mempool_kmalloc_uaf+0xc4/0x120 [ 27.881092] kunit_try_run_case+0x170/0x3f0 [ 27.881192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.881704] kthread+0x328/0x630 [ 27.882030] ret_from_fork+0x10/0x20 [ 27.882134] [ 27.882181] Freed by task 228: [ 27.882367] kasan_save_stack+0x3c/0x68 [ 27.882465] kasan_save_track+0x20/0x40 [ 27.882777] kasan_save_free_info+0x4c/0x78 [ 27.882892] __kasan_mempool_poison_object+0xc0/0x150 [ 27.883318] mempool_free+0x28c/0x328 [ 27.883500] mempool_uaf_helper+0x104/0x340 [ 27.883623] mempool_kmalloc_uaf+0xc4/0x120 [ 27.883914] kunit_try_run_case+0x170/0x3f0 [ 27.884030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.884255] kthread+0x328/0x630 [ 27.884550] ret_from_fork+0x10/0x20 [ 27.884700] [ 27.884772] The buggy address belongs to the object at fff00000c56e8300 [ 27.884772] which belongs to the cache kmalloc-128 of size 128 [ 27.884976] The buggy address is located 0 bytes inside of [ 27.884976] freed 128-byte region [fff00000c56e8300, fff00000c56e8380) [ 27.885138] [ 27.885196] The buggy address belongs to the physical page: [ 27.885296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 27.885437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.885824] page_type: f5(slab) [ 27.885961] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.886124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.886227] page dumped because: kasan: bad access detected [ 27.886332] [ 27.886378] Memory state around the buggy address: [ 27.886462] fff00000c56e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.886613] fff00000c56e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.887348] >fff00000c56e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.887473] ^ [ 27.887678] fff00000c56e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.888114] fff00000c56e8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.888231] ================================================================== [ 27.960494] ================================================================== [ 27.961143] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 27.961334] Read of size 1 at addr fff00000c7895240 by task kunit_try_catch/232 [ 27.961449] [ 27.961523] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.963265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.963875] Hardware name: linux,dummy-virt (DT) [ 27.964486] Call trace: [ 27.964651] show_stack+0x20/0x38 (C) [ 27.965093] dump_stack_lvl+0x8c/0xd0 [ 27.966161] print_report+0x118/0x608 [ 27.966430] kasan_report+0xdc/0x128 [ 27.967253] __asan_report_load1_noabort+0x20/0x30 [ 27.967766] mempool_uaf_helper+0x314/0x340 [ 27.968074] mempool_slab_uaf+0xc0/0x118 [ 27.968348] kunit_try_run_case+0x170/0x3f0 [ 27.968558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.968768] kthread+0x328/0x630 [ 27.968891] ret_from_fork+0x10/0x20 [ 27.969491] [ 27.969563] Allocated by task 232: [ 27.969666] kasan_save_stack+0x3c/0x68 [ 27.969794] kasan_save_track+0x20/0x40 [ 27.969969] kasan_save_alloc_info+0x40/0x58 [ 27.970072] __kasan_mempool_unpoison_object+0xbc/0x180 [ 27.970406] remove_element+0x16c/0x1f8 [ 27.970790] mempool_alloc_preallocated+0x58/0xc0 [ 27.971079] mempool_uaf_helper+0xa4/0x340 [ 27.971211] mempool_slab_uaf+0xc0/0x118 [ 27.971362] kunit_try_run_case+0x170/0x3f0 [ 27.971464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.971797] kthread+0x328/0x630 [ 27.972183] ret_from_fork+0x10/0x20 [ 27.972301] [ 27.972351] Freed by task 232: [ 27.972934] kasan_save_stack+0x3c/0x68 [ 27.973141] kasan_save_track+0x20/0x40 [ 27.973328] kasan_save_free_info+0x4c/0x78 [ 27.973907] __kasan_mempool_poison_object+0xc0/0x150 [ 27.974108] mempool_free+0x28c/0x328 [ 27.974463] mempool_uaf_helper+0x104/0x340 [ 27.974991] mempool_slab_uaf+0xc0/0x118 [ 27.975093] kunit_try_run_case+0x170/0x3f0 [ 27.975215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.975316] kthread+0x328/0x630 [ 27.975406] ret_from_fork+0x10/0x20 [ 27.975812] [ 27.976019] The buggy address belongs to the object at fff00000c7895240 [ 27.976019] which belongs to the cache test_cache of size 123 [ 27.976158] The buggy address is located 0 bytes inside of [ 27.976158] freed 123-byte region [fff00000c7895240, fff00000c78952bb) [ 27.976917] [ 27.977241] The buggy address belongs to the physical page: [ 27.977354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 27.977880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.978644] page_type: f5(slab) [ 27.978806] raw: 0bfffe0000000000 fff00000c56eb280 dead000000000122 0000000000000000 [ 27.979366] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 27.979593] page dumped because: kasan: bad access detected [ 27.979675] [ 27.979739] Memory state around the buggy address: [ 27.979819] fff00000c7895100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.980034] fff00000c7895180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.980151] >fff00000c7895200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 27.980558] ^ [ 27.981166] fff00000c7895280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.981286] fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.982006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 27.731935] ================================================================== [ 27.732032] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 27.732129] Read of size 1 at addr fff00000c61c8f73 by task kunit_try_catch/222 [ 27.732192] [ 27.732243] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.732349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.732383] Hardware name: linux,dummy-virt (DT) [ 27.732424] Call trace: [ 27.732452] show_stack+0x20/0x38 (C) [ 27.732521] dump_stack_lvl+0x8c/0xd0 [ 27.732590] print_report+0x118/0x608 [ 27.732648] kasan_report+0xdc/0x128 [ 27.732729] __asan_report_load1_noabort+0x20/0x30 [ 27.732792] mempool_oob_right_helper+0x2ac/0x2f0 [ 27.732855] mempool_kmalloc_oob_right+0xc4/0x120 [ 27.732917] kunit_try_run_case+0x170/0x3f0 [ 27.732981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.733050] kthread+0x328/0x630 [ 27.733104] ret_from_fork+0x10/0x20 [ 27.733165] [ 27.733187] Allocated by task 222: [ 27.733227] kasan_save_stack+0x3c/0x68 [ 27.733297] kasan_save_track+0x20/0x40 [ 27.733349] kasan_save_alloc_info+0x40/0x58 [ 27.733395] __kasan_mempool_unpoison_object+0x11c/0x180 [ 27.733451] remove_element+0x130/0x1f8 [ 27.733502] mempool_alloc_preallocated+0x58/0xc0 [ 27.733551] mempool_oob_right_helper+0x98/0x2f0 [ 27.733600] mempool_kmalloc_oob_right+0xc4/0x120 [ 27.733647] kunit_try_run_case+0x170/0x3f0 [ 27.733711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.733770] kthread+0x328/0x630 [ 27.733814] ret_from_fork+0x10/0x20 [ 27.733864] [ 27.733889] The buggy address belongs to the object at fff00000c61c8f00 [ 27.733889] which belongs to the cache kmalloc-128 of size 128 [ 27.733961] The buggy address is located 0 bytes to the right of [ 27.733961] allocated 115-byte region [fff00000c61c8f00, fff00000c61c8f73) [ 27.734037] [ 27.734065] The buggy address belongs to the physical page: [ 27.734104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c8 [ 27.734172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.734236] page_type: f5(slab) [ 27.734286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.734349] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 27.734399] page dumped because: kasan: bad access detected [ 27.734438] [ 27.734459] Memory state around the buggy address: [ 27.734500] fff00000c61c8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.734554] fff00000c61c8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734606] >fff00000c61c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.734745] ^ [ 27.734857] fff00000c61c8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734966] fff00000c61c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.735061] ================================================================== [ 27.764705] ================================================================== [ 27.764846] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 27.765003] Read of size 1 at addr fff00000c78ce001 by task kunit_try_catch/224 [ 27.765262] [ 27.765430] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.765832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.765978] Hardware name: linux,dummy-virt (DT) [ 27.766067] Call trace: [ 27.766128] show_stack+0x20/0x38 (C) [ 27.766262] dump_stack_lvl+0x8c/0xd0 [ 27.766382] print_report+0x118/0x608 [ 27.766512] kasan_report+0xdc/0x128 [ 27.766805] __asan_report_load1_noabort+0x20/0x30 [ 27.766953] mempool_oob_right_helper+0x2ac/0x2f0 [ 27.767096] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 27.767287] kunit_try_run_case+0x170/0x3f0 [ 27.767432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.767590] kthread+0x328/0x630 [ 27.767732] ret_from_fork+0x10/0x20 [ 27.767907] [ 27.767964] The buggy address belongs to the physical page: [ 27.768051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cc [ 27.768229] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.768399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.768746] page_type: f8(unknown) [ 27.768847] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.768971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.769094] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.769326] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.769615] head: 0bfffe0000000002 ffffc1ffc31e3301 00000000ffffffff 00000000ffffffff [ 27.769761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.769872] page dumped because: kasan: bad access detected [ 27.769964] [ 27.770018] Memory state around the buggy address: [ 27.770111] fff00000c78cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.770221] fff00000c78cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.770338] >fff00000c78ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.770437] ^ [ 27.770508] fff00000c78ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.770723] fff00000c78ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.770811] ================================================================== [ 27.801156] ================================================================== [ 27.801331] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 27.801481] Read of size 1 at addr fff00000c78b42bb by task kunit_try_catch/226 [ 27.801597] [ 27.801708] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.801932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.802013] Hardware name: linux,dummy-virt (DT) [ 27.802106] Call trace: [ 27.802179] show_stack+0x20/0x38 (C) [ 27.802316] dump_stack_lvl+0x8c/0xd0 [ 27.802458] print_report+0x118/0x608 [ 27.802595] kasan_report+0xdc/0x128 [ 27.802948] __asan_report_load1_noabort+0x20/0x30 [ 27.803088] mempool_oob_right_helper+0x2ac/0x2f0 [ 27.803284] mempool_slab_oob_right+0xc0/0x118 [ 27.803460] kunit_try_run_case+0x170/0x3f0 [ 27.804674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.805008] kthread+0x328/0x630 [ 27.805155] ret_from_fork+0x10/0x20 [ 27.806023] [ 27.806564] Allocated by task 226: [ 27.807289] kasan_save_stack+0x3c/0x68 [ 27.807788] kasan_save_track+0x20/0x40 [ 27.808494] kasan_save_alloc_info+0x40/0x58 [ 27.808948] __kasan_mempool_unpoison_object+0xbc/0x180 [ 27.809437] remove_element+0x16c/0x1f8 [ 27.809630] mempool_alloc_preallocated+0x58/0xc0 [ 27.810945] mempool_oob_right_helper+0x98/0x2f0 [ 27.811105] mempool_slab_oob_right+0xc0/0x118 [ 27.811237] kunit_try_run_case+0x170/0x3f0 [ 27.811473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.811811] kthread+0x328/0x630 [ 27.812093] ret_from_fork+0x10/0x20 [ 27.812189] [ 27.813129] The buggy address belongs to the object at fff00000c78b4240 [ 27.813129] which belongs to the cache test_cache of size 123 [ 27.814186] The buggy address is located 0 bytes to the right of [ 27.814186] allocated 123-byte region [fff00000c78b4240, fff00000c78b42bb) [ 27.814338] [ 27.814391] The buggy address belongs to the physical page: [ 27.814467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4 [ 27.814592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.816128] page_type: f5(slab) [ 27.816284] raw: 0bfffe0000000000 fff00000c56eb140 dead000000000122 0000000000000000 [ 27.816417] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 27.817793] page dumped because: kasan: bad access detected [ 27.818335] [ 27.818461] Memory state around the buggy address: [ 27.818541] fff00000c78b4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.818653] fff00000c78b4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 27.818776] >fff00000c78b4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 27.820176] ^ [ 27.820257] fff00000c78b4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.820361] fff00000c78b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.820455] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 27.114254] ================================================================== [ 27.114548] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 27.115021] Read of size 1 at addr fff00000c5bfedc0 by task kunit_try_catch/216 [ 27.115161] [ 27.115783] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.116132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.116208] Hardware name: linux,dummy-virt (DT) [ 27.116303] Call trace: [ 27.116366] show_stack+0x20/0x38 (C) [ 27.116492] dump_stack_lvl+0x8c/0xd0 [ 27.117406] print_report+0x118/0x608 [ 27.117565] kasan_report+0xdc/0x128 [ 27.118161] __kasan_check_byte+0x54/0x70 [ 27.118960] kmem_cache_destroy+0x34/0x218 [ 27.119100] kmem_cache_double_destroy+0x174/0x300 [ 27.119238] kunit_try_run_case+0x170/0x3f0 [ 27.119764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.120003] kthread+0x328/0x630 [ 27.120184] ret_from_fork+0x10/0x20 [ 27.120308] [ 27.120359] Allocated by task 216: [ 27.120433] kasan_save_stack+0x3c/0x68 [ 27.120757] kasan_save_track+0x20/0x40 [ 27.120864] kasan_save_alloc_info+0x40/0x58 [ 27.120955] __kasan_slab_alloc+0xa8/0xb0 [ 27.121052] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 27.121156] __kmem_cache_create_args+0x178/0x280 [ 27.121266] kmem_cache_double_destroy+0xc0/0x300 [ 27.121366] kunit_try_run_case+0x170/0x3f0 [ 27.121481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.121589] kthread+0x328/0x630 [ 27.121676] ret_from_fork+0x10/0x20 [ 27.122507] [ 27.122660] Freed by task 216: [ 27.122754] kasan_save_stack+0x3c/0x68 [ 27.122810] kasan_save_track+0x20/0x40 [ 27.122948] kasan_save_free_info+0x4c/0x78 [ 27.123051] __kasan_slab_free+0x6c/0x98 [ 27.123162] kmem_cache_free+0x260/0x470 [ 27.123270] slab_kmem_cache_release+0x38/0x50 [ 27.123578] kmem_cache_release+0x1c/0x30 [ 27.123702] kobject_put+0x17c/0x430 [ 27.123970] sysfs_slab_release+0x1c/0x30 [ 27.124168] kmem_cache_destroy+0x118/0x218 [ 27.124283] kmem_cache_double_destroy+0x128/0x300 [ 27.126721] kunit_try_run_case+0x170/0x3f0 [ 27.126841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.126967] kthread+0x328/0x630 [ 27.127071] ret_from_fork+0x10/0x20 [ 27.127256] [ 27.127310] The buggy address belongs to the object at fff00000c5bfedc0 [ 27.127310] which belongs to the cache kmem_cache of size 208 [ 27.127720] The buggy address is located 0 bytes inside of [ 27.127720] freed 208-byte region [fff00000c5bfedc0, fff00000c5bfee90) [ 27.128991] [ 27.129048] The buggy address belongs to the physical page: [ 27.129622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bfe [ 27.129823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.130468] page_type: f5(slab) [ 27.130605] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 27.130846] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 27.131404] page dumped because: kasan: bad access detected [ 27.131500] [ 27.131615] Memory state around the buggy address: [ 27.131827] fff00000c5bfec80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.132004] fff00000c5bfed00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 27.132113] >fff00000c5bfed80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 27.132217] ^ [ 27.132348] fff00000c5bfee00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.132556] fff00000c5bfee80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.132829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 26.764774] ================================================================== [ 26.764952] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 26.766670] Read of size 1 at addr fff00000c77f9000 by task kunit_try_catch/214 [ 26.767914] [ 26.768008] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.768751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.768839] Hardware name: linux,dummy-virt (DT) [ 26.768935] Call trace: [ 26.768992] show_stack+0x20/0x38 (C) [ 26.769103] dump_stack_lvl+0x8c/0xd0 [ 26.769170] print_report+0x118/0x608 [ 26.769229] kasan_report+0xdc/0x128 [ 26.769304] __asan_report_load1_noabort+0x20/0x30 [ 26.769364] kmem_cache_rcu_uaf+0x388/0x468 [ 26.769422] kunit_try_run_case+0x170/0x3f0 [ 26.769489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.769566] kthread+0x328/0x630 [ 26.769631] ret_from_fork+0x10/0x20 [ 26.769814] [ 26.769880] Allocated by task 214: [ 26.770251] kasan_save_stack+0x3c/0x68 [ 26.770524] kasan_save_track+0x20/0x40 [ 26.770718] kasan_save_alloc_info+0x40/0x58 [ 26.770805] __kasan_slab_alloc+0xa8/0xb0 [ 26.770859] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 26.770916] kmem_cache_rcu_uaf+0x12c/0x468 [ 26.771017] kunit_try_run_case+0x170/0x3f0 [ 26.771209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.771391] kthread+0x328/0x630 [ 26.771483] ret_from_fork+0x10/0x20 [ 26.771575] [ 26.771656] Freed by task 0: [ 26.771746] kasan_save_stack+0x3c/0x68 [ 26.771843] kasan_save_track+0x20/0x40 [ 26.771948] kasan_save_free_info+0x4c/0x78 [ 26.772054] __kasan_slab_free+0x6c/0x98 [ 26.772153] slab_free_after_rcu_debug+0xd4/0x2f8 [ 26.772252] rcu_core+0x9f4/0x1e20 [ 26.772355] rcu_core_si+0x18/0x30 [ 26.772442] handle_softirqs+0x374/0xb28 [ 26.772556] __do_softirq+0x1c/0x28 [ 26.772659] [ 26.772869] Last potentially related work creation: [ 26.772936] kasan_save_stack+0x3c/0x68 [ 26.773161] kasan_record_aux_stack+0xb4/0xc8 [ 26.773542] kmem_cache_free+0x120/0x470 [ 26.773788] kmem_cache_rcu_uaf+0x16c/0x468 [ 26.774012] kunit_try_run_case+0x170/0x3f0 [ 26.774177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.774303] kthread+0x328/0x630 [ 26.774392] ret_from_fork+0x10/0x20 [ 26.774511] [ 26.774611] The buggy address belongs to the object at fff00000c77f9000 [ 26.774611] which belongs to the cache test_cache of size 200 [ 26.774973] The buggy address is located 0 bytes inside of [ 26.774973] freed 200-byte region [fff00000c77f9000, fff00000c77f90c8) [ 26.775598] [ 26.775654] The buggy address belongs to the physical page: [ 26.775754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f9 [ 26.776130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.776649] page_type: f5(slab) [ 26.777292] raw: 0bfffe0000000000 fff00000c5bfec80 dead000000000122 0000000000000000 [ 26.777945] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.778363] page dumped because: kasan: bad access detected [ 26.779085] [ 26.779299] Memory state around the buggy address: [ 26.779625] fff00000c77f8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.780116] fff00000c77f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.780278] >fff00000c77f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.781259] ^ [ 26.781336] fff00000c77f9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 26.781995] fff00000c77f9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.782151] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 26.103392] ================================================================== [ 26.103664] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 26.103946] Free of addr fff00000c77f8001 by task kunit_try_catch/212 [ 26.104100] [ 26.104381] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.104593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.104660] Hardware name: linux,dummy-virt (DT) [ 26.104756] Call trace: [ 26.104814] show_stack+0x20/0x38 (C) [ 26.105319] dump_stack_lvl+0x8c/0xd0 [ 26.105475] print_report+0x118/0x608 [ 26.105611] kasan_report_invalid_free+0xc0/0xe8 [ 26.105766] check_slab_allocation+0xfc/0x108 [ 26.105899] __kasan_slab_pre_free+0x2c/0x48 [ 26.106123] kmem_cache_free+0xf0/0x470 [ 26.106386] kmem_cache_invalid_free+0x184/0x3c8 [ 26.106697] kunit_try_run_case+0x170/0x3f0 [ 26.106972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.107189] kthread+0x328/0x630 [ 26.107523] ret_from_fork+0x10/0x20 [ 26.107785] [ 26.107841] Allocated by task 212: [ 26.108011] kasan_save_stack+0x3c/0x68 [ 26.108118] kasan_save_track+0x20/0x40 [ 26.108211] kasan_save_alloc_info+0x40/0x58 [ 26.108313] __kasan_slab_alloc+0xa8/0xb0 [ 26.108581] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 26.108747] kmem_cache_invalid_free+0x12c/0x3c8 [ 26.108982] kunit_try_run_case+0x170/0x3f0 [ 26.109084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.109260] kthread+0x328/0x630 [ 26.109353] ret_from_fork+0x10/0x20 [ 26.109626] [ 26.109732] The buggy address belongs to the object at fff00000c77f8000 [ 26.109732] which belongs to the cache test_cache of size 200 [ 26.109874] The buggy address is located 1 bytes inside of [ 26.109874] 200-byte region [fff00000c77f8000, fff00000c77f80c8) [ 26.110063] [ 26.110126] The buggy address belongs to the physical page: [ 26.110211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8 [ 26.110347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.110697] page_type: f5(slab) [ 26.110805] raw: 0bfffe0000000000 fff00000c5bfeb40 dead000000000122 0000000000000000 [ 26.110935] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.111078] page dumped because: kasan: bad access detected [ 26.111164] [ 26.111210] Memory state around the buggy address: [ 26.111298] fff00000c77f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.111449] fff00000c77f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.111561] >fff00000c77f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.111646] ^ [ 26.111739] fff00000c77f8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 26.111930] fff00000c77f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.112118] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 26.027201] ================================================================== [ 26.027780] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 26.028478] Free of addr fff00000c77f5000 by task kunit_try_catch/210 [ 26.028585] [ 26.029382] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.030223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.030291] Hardware name: linux,dummy-virt (DT) [ 26.030371] Call trace: [ 26.030425] show_stack+0x20/0x38 (C) [ 26.030554] dump_stack_lvl+0x8c/0xd0 [ 26.032385] print_report+0x118/0x608 [ 26.032819] kasan_report_invalid_free+0xc0/0xe8 [ 26.033427] check_slab_allocation+0xd4/0x108 [ 26.034016] __kasan_slab_pre_free+0x2c/0x48 [ 26.034212] kmem_cache_free+0xf0/0x470 [ 26.034575] kmem_cache_double_free+0x190/0x3c8 [ 26.034805] kunit_try_run_case+0x170/0x3f0 [ 26.035305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.035733] kthread+0x328/0x630 [ 26.035949] ret_from_fork+0x10/0x20 [ 26.036124] [ 26.036174] Allocated by task 210: [ 26.036264] kasan_save_stack+0x3c/0x68 [ 26.036532] kasan_save_track+0x20/0x40 [ 26.036632] kasan_save_alloc_info+0x40/0x58 [ 26.036745] __kasan_slab_alloc+0xa8/0xb0 [ 26.036845] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 26.036943] kmem_cache_double_free+0x12c/0x3c8 [ 26.037035] kunit_try_run_case+0x170/0x3f0 [ 26.037128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.037309] kthread+0x328/0x630 [ 26.037500] ret_from_fork+0x10/0x20 [ 26.037594] [ 26.037643] Freed by task 210: [ 26.037727] kasan_save_stack+0x3c/0x68 [ 26.037836] kasan_save_track+0x20/0x40 [ 26.038017] kasan_save_free_info+0x4c/0x78 [ 26.038236] __kasan_slab_free+0x6c/0x98 [ 26.038342] kmem_cache_free+0x260/0x470 [ 26.038453] kmem_cache_double_free+0x140/0x3c8 [ 26.038707] kunit_try_run_case+0x170/0x3f0 [ 26.038818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.039002] kthread+0x328/0x630 [ 26.039139] ret_from_fork+0x10/0x20 [ 26.039320] [ 26.039436] The buggy address belongs to the object at fff00000c77f5000 [ 26.039436] which belongs to the cache test_cache of size 200 [ 26.039644] The buggy address is located 0 bytes inside of [ 26.039644] 200-byte region [fff00000c77f5000, fff00000c77f50c8) [ 26.039861] [ 26.039914] The buggy address belongs to the physical page: [ 26.039993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f5 [ 26.040130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.040254] page_type: f5(slab) [ 26.040358] raw: 0bfffe0000000000 fff00000c5bfea00 dead000000000122 0000000000000000 [ 26.040483] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.040629] page dumped because: kasan: bad access detected [ 26.040980] [ 26.041254] Memory state around the buggy address: [ 26.041505] fff00000c77f4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.041613] fff00000c77f4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.041734] >fff00000c77f5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.042063] ^ [ 26.042505] fff00000c77f5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 26.042610] fff00000c77f5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.042943] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 25.729385] ================================================================== [ 25.729516] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 25.729652] Read of size 1 at addr fff00000c77f30c8 by task kunit_try_catch/208 [ 25.729792] [ 25.729877] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.730074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.730138] Hardware name: linux,dummy-virt (DT) [ 25.730215] Call trace: [ 25.730265] show_stack+0x20/0x38 (C) [ 25.730386] dump_stack_lvl+0x8c/0xd0 [ 25.730507] print_report+0x118/0x608 [ 25.730622] kasan_report+0xdc/0x128 [ 25.730798] __asan_report_load1_noabort+0x20/0x30 [ 25.731011] kmem_cache_oob+0x344/0x430 [ 25.731213] kunit_try_run_case+0x170/0x3f0 [ 25.731358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.731568] kthread+0x328/0x630 [ 25.731722] ret_from_fork+0x10/0x20 [ 25.731859] [ 25.732005] Allocated by task 208: [ 25.732077] kasan_save_stack+0x3c/0x68 [ 25.732270] kasan_save_track+0x20/0x40 [ 25.732373] kasan_save_alloc_info+0x40/0x58 [ 25.732492] __kasan_slab_alloc+0xa8/0xb0 [ 25.732636] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 25.732841] kmem_cache_oob+0x12c/0x430 [ 25.733114] kunit_try_run_case+0x170/0x3f0 [ 25.733289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.733400] kthread+0x328/0x630 [ 25.733488] ret_from_fork+0x10/0x20 [ 25.733575] [ 25.733620] The buggy address belongs to the object at fff00000c77f3000 [ 25.733620] which belongs to the cache test_cache of size 200 [ 25.733801] The buggy address is located 0 bytes to the right of [ 25.733801] allocated 200-byte region [fff00000c77f3000, fff00000c77f30c8) [ 25.734042] [ 25.734197] The buggy address belongs to the physical page: [ 25.734418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f3 [ 25.734590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.734736] page_type: f5(slab) [ 25.734856] raw: 0bfffe0000000000 fff00000c5bfe8c0 dead000000000122 0000000000000000 [ 25.734994] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 25.735105] page dumped because: kasan: bad access detected [ 25.735269] [ 25.735329] Memory state around the buggy address: [ 25.735421] fff00000c77f2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.735538] fff00000c77f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.735660] >fff00000c77f3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 25.735780] ^ [ 25.735880] fff00000c77f3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.736205] fff00000c77f3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.736322] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 25.643936] ================================================================== [ 25.646072] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 25.646204] Read of size 8 at addr fff00000c77ed380 by task kunit_try_catch/201 [ 25.649478] [ 25.649583] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.652175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.652561] Hardware name: linux,dummy-virt (DT) [ 25.652650] Call trace: [ 25.652736] show_stack+0x20/0x38 (C) [ 25.652889] dump_stack_lvl+0x8c/0xd0 [ 25.653021] print_report+0x118/0x608 [ 25.653763] kasan_report+0xdc/0x128 [ 25.653888] __asan_report_load8_noabort+0x20/0x30 [ 25.654011] workqueue_uaf+0x480/0x4a8 [ 25.654118] kunit_try_run_case+0x170/0x3f0 [ 25.654240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.654364] kthread+0x328/0x630 [ 25.654468] ret_from_fork+0x10/0x20 [ 25.654579] [ 25.654626] Allocated by task 201: [ 25.654714] kasan_save_stack+0x3c/0x68 [ 25.654826] kasan_save_track+0x20/0x40 [ 25.655034] kasan_save_alloc_info+0x40/0x58 [ 25.655782] __kasan_kmalloc+0xd4/0xd8 [ 25.655902] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.656354] workqueue_uaf+0x13c/0x4a8 [ 25.656471] kunit_try_run_case+0x170/0x3f0 [ 25.656566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.656671] kthread+0x328/0x630 [ 25.656773] ret_from_fork+0x10/0x20 [ 25.656856] [ 25.656899] Freed by task 76: [ 25.656966] kasan_save_stack+0x3c/0x68 [ 25.657811] kasan_save_track+0x20/0x40 [ 25.657911] kasan_save_free_info+0x4c/0x78 [ 25.658004] __kasan_slab_free+0x6c/0x98 [ 25.658099] kfree+0x214/0x3c8 [ 25.658210] workqueue_uaf_work+0x18/0x30 [ 25.658428] process_one_work+0x530/0xf98 [ 25.658565] worker_thread+0x8ac/0xf28 [ 25.658653] kthread+0x328/0x630 [ 25.658760] ret_from_fork+0x10/0x20 [ 25.658859] [ 25.659000] Last potentially related work creation: [ 25.659180] kasan_save_stack+0x3c/0x68 [ 25.659470] kasan_record_aux_stack+0xb4/0xc8 [ 25.659587] __queue_work+0x65c/0x1010 [ 25.659758] queue_work_on+0xbc/0xf8 [ 25.659865] workqueue_uaf+0x210/0x4a8 [ 25.659981] kunit_try_run_case+0x170/0x3f0 [ 25.660098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.660222] kthread+0x328/0x630 [ 25.660568] ret_from_fork+0x10/0x20 [ 25.661029] [ 25.661462] The buggy address belongs to the object at fff00000c77ed380 [ 25.661462] which belongs to the cache kmalloc-32 of size 32 [ 25.661611] The buggy address is located 0 bytes inside of [ 25.661611] freed 32-byte region [fff00000c77ed380, fff00000c77ed3a0) [ 25.661969] [ 25.662056] The buggy address belongs to the physical page: [ 25.662135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ed [ 25.662271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.662411] page_type: f5(slab) [ 25.662719] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.662851] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.662953] page dumped because: kasan: bad access detected [ 25.663035] [ 25.663081] Memory state around the buggy address: [ 25.663189] fff00000c77ed280: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 25.663310] fff00000c77ed300: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 25.663656] >fff00000c77ed380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 25.664110] ^ [ 25.664189] fff00000c77ed400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.664298] fff00000c77ed480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.664406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 25.182331] ================================================================== [ 25.182472] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 25.182585] Free of addr fff00000c5ed4d40 by task kunit_try_catch/193 [ 25.185547] [ 25.185632] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.185844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.185907] Hardware name: linux,dummy-virt (DT) [ 25.185977] Call trace: [ 25.186037] show_stack+0x20/0x38 (C) [ 25.186145] dump_stack_lvl+0x8c/0xd0 [ 25.186255] print_report+0x118/0x608 [ 25.186374] kasan_report_invalid_free+0xc0/0xe8 [ 25.186487] check_slab_allocation+0xd4/0x108 [ 25.186605] __kasan_slab_pre_free+0x2c/0x48 [ 25.189143] kfree+0xe8/0x3c8 [ 25.189671] kfree_sensitive+0x3c/0xb0 [ 25.190547] kmalloc_double_kzfree+0x168/0x308 [ 25.190817] kunit_try_run_case+0x170/0x3f0 [ 25.190929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.191051] kthread+0x328/0x630 [ 25.191162] ret_from_fork+0x10/0x20 [ 25.191485] [ 25.191540] Allocated by task 193: [ 25.191923] kasan_save_stack+0x3c/0x68 [ 25.192249] kasan_save_track+0x20/0x40 [ 25.193261] kasan_save_alloc_info+0x40/0x58 [ 25.193377] __kasan_kmalloc+0xd4/0xd8 [ 25.193467] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.193565] kmalloc_double_kzfree+0xb8/0x308 [ 25.193658] kunit_try_run_case+0x170/0x3f0 [ 25.193771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.193872] kthread+0x328/0x630 [ 25.193954] ret_from_fork+0x10/0x20 [ 25.194037] [ 25.194084] Freed by task 193: [ 25.194143] kasan_save_stack+0x3c/0x68 [ 25.194243] kasan_save_track+0x20/0x40 [ 25.194339] kasan_save_free_info+0x4c/0x78 [ 25.194450] __kasan_slab_free+0x6c/0x98 [ 25.194570] kfree+0x214/0x3c8 [ 25.195501] kfree_sensitive+0x80/0xb0 [ 25.195619] kmalloc_double_kzfree+0x11c/0x308 [ 25.195814] kunit_try_run_case+0x170/0x3f0 [ 25.195964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.196081] kthread+0x328/0x630 [ 25.196167] ret_from_fork+0x10/0x20 [ 25.196274] [ 25.196382] The buggy address belongs to the object at fff00000c5ed4d40 [ 25.196382] which belongs to the cache kmalloc-16 of size 16 [ 25.196656] The buggy address is located 0 bytes inside of [ 25.196656] 16-byte region [fff00000c5ed4d40, fff00000c5ed4d50) [ 25.197097] [ 25.197312] The buggy address belongs to the physical page: [ 25.197661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4 [ 25.197806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.197923] page_type: f5(slab) [ 25.198215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.199652] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.199787] page dumped because: kasan: bad access detected [ 25.199898] [ 25.200023] Memory state around the buggy address: [ 25.200256] fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.200867] fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.201007] >fff00000c5ed4d00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 25.201113] ^ [ 25.201856] fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.202182] fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.202734] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 25.162284] ================================================================== [ 25.162417] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 25.162546] Read of size 1 at addr fff00000c5ed4d40 by task kunit_try_catch/193 [ 25.163747] [ 25.163836] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.164036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.164096] Hardware name: linux,dummy-virt (DT) [ 25.164168] Call trace: [ 25.164222] show_stack+0x20/0x38 (C) [ 25.164342] dump_stack_lvl+0x8c/0xd0 [ 25.164459] print_report+0x118/0x608 [ 25.164568] kasan_report+0xdc/0x128 [ 25.165319] __kasan_check_byte+0x54/0x70 [ 25.166113] kfree_sensitive+0x30/0xb0 [ 25.166242] kmalloc_double_kzfree+0x168/0x308 [ 25.166355] kunit_try_run_case+0x170/0x3f0 [ 25.166473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.166599] kthread+0x328/0x630 [ 25.168092] ret_from_fork+0x10/0x20 [ 25.168768] [ 25.168817] Allocated by task 193: [ 25.168880] kasan_save_stack+0x3c/0x68 [ 25.168981] kasan_save_track+0x20/0x40 [ 25.169068] kasan_save_alloc_info+0x40/0x58 [ 25.169160] __kasan_kmalloc+0xd4/0xd8 [ 25.169256] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.169354] kmalloc_double_kzfree+0xb8/0x308 [ 25.169452] kunit_try_run_case+0x170/0x3f0 [ 25.169541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.169650] kthread+0x328/0x630 [ 25.169760] ret_from_fork+0x10/0x20 [ 25.169847] [ 25.169891] Freed by task 193: [ 25.169950] kasan_save_stack+0x3c/0x68 [ 25.170047] kasan_save_track+0x20/0x40 [ 25.170140] kasan_save_free_info+0x4c/0x78 [ 25.170226] __kasan_slab_free+0x6c/0x98 [ 25.170316] kfree+0x214/0x3c8 [ 25.170405] kfree_sensitive+0x80/0xb0 [ 25.170489] kmalloc_double_kzfree+0x11c/0x308 [ 25.170583] kunit_try_run_case+0x170/0x3f0 [ 25.170675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.174441] kthread+0x328/0x630 [ 25.175153] ret_from_fork+0x10/0x20 [ 25.175610] [ 25.175661] The buggy address belongs to the object at fff00000c5ed4d40 [ 25.175661] which belongs to the cache kmalloc-16 of size 16 [ 25.175820] The buggy address is located 0 bytes inside of [ 25.175820] freed 16-byte region [fff00000c5ed4d40, fff00000c5ed4d50) [ 25.175963] [ 25.176014] The buggy address belongs to the physical page: [ 25.176087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4 [ 25.176205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.176320] page_type: f5(slab) [ 25.176408] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.176529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.176623] page dumped because: kasan: bad access detected [ 25.176716] [ 25.176762] Memory state around the buggy address: [ 25.176856] fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.176961] fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.177060] >fff00000c5ed4d00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 25.177156] ^ [ 25.177232] fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.177347] fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.180649] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 25.093067] ================================================================== [ 25.093273] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 25.093703] Read of size 1 at addr fff00000c77e79a8 by task kunit_try_catch/189 [ 25.093856] [ 25.093983] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.094191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.094320] Hardware name: linux,dummy-virt (DT) [ 25.094404] Call trace: [ 25.094521] show_stack+0x20/0x38 (C) [ 25.094657] dump_stack_lvl+0x8c/0xd0 [ 25.094886] print_report+0x118/0x608 [ 25.095022] kasan_report+0xdc/0x128 [ 25.095190] __asan_report_load1_noabort+0x20/0x30 [ 25.095349] kmalloc_uaf2+0x3f4/0x468 [ 25.095463] kunit_try_run_case+0x170/0x3f0 [ 25.095631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.095809] kthread+0x328/0x630 [ 25.095981] ret_from_fork+0x10/0x20 [ 25.096113] [ 25.096237] Allocated by task 189: [ 25.096380] kasan_save_stack+0x3c/0x68 [ 25.096521] kasan_save_track+0x20/0x40 [ 25.097398] kasan_save_alloc_info+0x40/0x58 [ 25.097907] __kasan_kmalloc+0xd4/0xd8 [ 25.098223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.098333] kmalloc_uaf2+0xc4/0x468 [ 25.098508] kunit_try_run_case+0x170/0x3f0 [ 25.099234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.099393] kthread+0x328/0x630 [ 25.099722] ret_from_fork+0x10/0x20 [ 25.100200] [ 25.100252] Freed by task 189: [ 25.100321] kasan_save_stack+0x3c/0x68 [ 25.100422] kasan_save_track+0x20/0x40 [ 25.100518] kasan_save_free_info+0x4c/0x78 [ 25.100611] __kasan_slab_free+0x6c/0x98 [ 25.100721] kfree+0x214/0x3c8 [ 25.100823] kmalloc_uaf2+0x134/0x468 [ 25.101080] kunit_try_run_case+0x170/0x3f0 [ 25.101209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.101327] kthread+0x328/0x630 [ 25.101413] ret_from_fork+0x10/0x20 [ 25.101535] [ 25.101664] The buggy address belongs to the object at fff00000c77e7980 [ 25.101664] which belongs to the cache kmalloc-64 of size 64 [ 25.101823] The buggy address is located 40 bytes inside of [ 25.101823] freed 64-byte region [fff00000c77e7980, fff00000c77e79c0) [ 25.102936] [ 25.102996] The buggy address belongs to the physical page: [ 25.103097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7 [ 25.103289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.103407] page_type: f5(slab) [ 25.103509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.103983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.104105] page dumped because: kasan: bad access detected [ 25.104265] [ 25.104317] Memory state around the buggy address: [ 25.104444] fff00000c77e7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.104581] fff00000c77e7900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.104723] >fff00000c77e7980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.105225] ^ [ 25.105361] fff00000c77e7a00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 25.105474] fff00000c77e7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.105566] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 25.048697] ================================================================== [ 25.048851] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 25.049085] Write of size 33 at addr fff00000c77e7800 by task kunit_try_catch/187 [ 25.049290] [ 25.049400] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.049620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.049702] Hardware name: linux,dummy-virt (DT) [ 25.049775] Call trace: [ 25.049830] show_stack+0x20/0x38 (C) [ 25.049954] dump_stack_lvl+0x8c/0xd0 [ 25.050079] print_report+0x118/0x608 [ 25.050194] kasan_report+0xdc/0x128 [ 25.050713] kasan_check_range+0x100/0x1a8 [ 25.051119] __asan_memset+0x34/0x78 [ 25.051487] kmalloc_uaf_memset+0x170/0x310 [ 25.051645] kunit_try_run_case+0x170/0x3f0 [ 25.051927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.052321] kthread+0x328/0x630 [ 25.052459] ret_from_fork+0x10/0x20 [ 25.052936] [ 25.053119] Allocated by task 187: [ 25.053213] kasan_save_stack+0x3c/0x68 [ 25.053645] kasan_save_track+0x20/0x40 [ 25.054059] kasan_save_alloc_info+0x40/0x58 [ 25.054267] __kasan_kmalloc+0xd4/0xd8 [ 25.054410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.054631] kmalloc_uaf_memset+0xb8/0x310 [ 25.054768] kunit_try_run_case+0x170/0x3f0 [ 25.054875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.055052] kthread+0x328/0x630 [ 25.055147] ret_from_fork+0x10/0x20 [ 25.055238] [ 25.055291] Freed by task 187: [ 25.055561] kasan_save_stack+0x3c/0x68 [ 25.055673] kasan_save_track+0x20/0x40 [ 25.055802] kasan_save_free_info+0x4c/0x78 [ 25.056034] __kasan_slab_free+0x6c/0x98 [ 25.056482] kfree+0x214/0x3c8 [ 25.056720] kmalloc_uaf_memset+0x11c/0x310 [ 25.056818] kunit_try_run_case+0x170/0x3f0 [ 25.056907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.057017] kthread+0x328/0x630 [ 25.057113] ret_from_fork+0x10/0x20 [ 25.057376] [ 25.057423] The buggy address belongs to the object at fff00000c77e7800 [ 25.057423] which belongs to the cache kmalloc-64 of size 64 [ 25.057735] The buggy address is located 0 bytes inside of [ 25.057735] freed 64-byte region [fff00000c77e7800, fff00000c77e7840) [ 25.057893] [ 25.057942] The buggy address belongs to the physical page: [ 25.058018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7 [ 25.058493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.058725] page_type: f5(slab) [ 25.058830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.058957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.059323] page dumped because: kasan: bad access detected [ 25.059528] [ 25.059572] Memory state around the buggy address: [ 25.059649] fff00000c77e7700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.059832] fff00000c77e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.059938] >fff00000c77e7800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.060029] ^ [ 25.060095] fff00000c77e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.060248] fff00000c77e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.060415] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 25.008916] ================================================================== [ 25.009037] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 25.009154] Read of size 1 at addr fff00000c5ed4d28 by task kunit_try_catch/185 [ 25.009284] [ 25.009357] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.009550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.009613] Hardware name: linux,dummy-virt (DT) [ 25.009709] Call trace: [ 25.009782] show_stack+0x20/0x38 (C) [ 25.010227] dump_stack_lvl+0x8c/0xd0 [ 25.010770] print_report+0x118/0x608 [ 25.011436] kasan_report+0xdc/0x128 [ 25.011608] __asan_report_load1_noabort+0x20/0x30 [ 25.011754] kmalloc_uaf+0x300/0x338 [ 25.011868] kunit_try_run_case+0x170/0x3f0 [ 25.012041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.012193] kthread+0x328/0x630 [ 25.012312] ret_from_fork+0x10/0x20 [ 25.012744] [ 25.012796] Allocated by task 185: [ 25.013263] kasan_save_stack+0x3c/0x68 [ 25.013374] kasan_save_track+0x20/0x40 [ 25.013471] kasan_save_alloc_info+0x40/0x58 [ 25.013563] __kasan_kmalloc+0xd4/0xd8 [ 25.013887] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.014138] kmalloc_uaf+0xb8/0x338 [ 25.014282] kunit_try_run_case+0x170/0x3f0 [ 25.014389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.014552] kthread+0x328/0x630 [ 25.014768] ret_from_fork+0x10/0x20 [ 25.015271] [ 25.015356] Freed by task 185: [ 25.015427] kasan_save_stack+0x3c/0x68 [ 25.015540] kasan_save_track+0x20/0x40 [ 25.015716] kasan_save_free_info+0x4c/0x78 [ 25.015997] __kasan_slab_free+0x6c/0x98 [ 25.016275] kfree+0x214/0x3c8 [ 25.016368] kmalloc_uaf+0x11c/0x338 [ 25.016459] kunit_try_run_case+0x170/0x3f0 [ 25.016567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.016769] kthread+0x328/0x630 [ 25.016877] ret_from_fork+0x10/0x20 [ 25.017445] [ 25.017574] The buggy address belongs to the object at fff00000c5ed4d20 [ 25.017574] which belongs to the cache kmalloc-16 of size 16 [ 25.017958] The buggy address is located 8 bytes inside of [ 25.017958] freed 16-byte region [fff00000c5ed4d20, fff00000c5ed4d30) [ 25.018117] [ 25.018173] The buggy address belongs to the physical page: [ 25.018246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4 [ 25.018390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.018929] page_type: f5(slab) [ 25.019118] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.019251] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.019735] page dumped because: kasan: bad access detected [ 25.019883] [ 25.019941] Memory state around the buggy address: [ 25.020050] fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.020335] fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.020444] >fff00000c5ed4d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 25.020539] ^ [ 25.020628] fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.020811] fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.020997] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 24.984598] ================================================================== [ 24.984736] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 24.984873] Read of size 64 at addr fff00000c77e7504 by task kunit_try_catch/183 [ 24.984989] [ 24.985078] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.985721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.985815] Hardware name: linux,dummy-virt (DT) [ 24.985893] Call trace: [ 24.986454] show_stack+0x20/0x38 (C) [ 24.986589] dump_stack_lvl+0x8c/0xd0 [ 24.986946] print_report+0x118/0x608 [ 24.987121] kasan_report+0xdc/0x128 [ 24.987521] kasan_check_range+0x100/0x1a8 [ 24.987767] __asan_memmove+0x3c/0x98 [ 24.987933] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 24.988068] kunit_try_run_case+0x170/0x3f0 [ 24.988204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.988559] kthread+0x328/0x630 [ 24.988723] ret_from_fork+0x10/0x20 [ 24.988852] [ 24.988972] Allocated by task 183: [ 24.989043] kasan_save_stack+0x3c/0x68 [ 24.989144] kasan_save_track+0x20/0x40 [ 24.989237] kasan_save_alloc_info+0x40/0x58 [ 24.989383] __kasan_kmalloc+0xd4/0xd8 [ 24.989631] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.989764] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 24.989886] kunit_try_run_case+0x170/0x3f0 [ 24.990002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.990383] kthread+0x328/0x630 [ 24.990489] ret_from_fork+0x10/0x20 [ 24.990595] [ 24.990785] The buggy address belongs to the object at fff00000c77e7500 [ 24.990785] which belongs to the cache kmalloc-64 of size 64 [ 24.990978] The buggy address is located 4 bytes inside of [ 24.990978] allocated 64-byte region [fff00000c77e7500, fff00000c77e7540) [ 24.991274] [ 24.991374] The buggy address belongs to the physical page: [ 24.991587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7 [ 24.991743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.991866] page_type: f5(slab) [ 24.992398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.992531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.992859] page dumped because: kasan: bad access detected [ 24.993296] [ 24.993594] Memory state around the buggy address: [ 24.993760] fff00000c77e7400: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.994315] fff00000c77e7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.994663] >fff00000c77e7500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 24.994779] ^ [ 24.994881] fff00000c77e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.995034] fff00000c77e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.995344] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 24.949112] ================================================================== [ 24.949350] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 24.949533] Read of size 18446744073709551614 at addr fff00000c77e7384 by task kunit_try_catch/181 [ 24.949750] [ 24.949842] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.950046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.950111] Hardware name: linux,dummy-virt (DT) [ 24.950189] Call trace: [ 24.950277] show_stack+0x20/0x38 (C) [ 24.950489] dump_stack_lvl+0x8c/0xd0 [ 24.950623] print_report+0x118/0x608 [ 24.950837] kasan_report+0xdc/0x128 [ 24.951279] kasan_check_range+0x100/0x1a8 [ 24.951422] __asan_memmove+0x3c/0x98 [ 24.951530] kmalloc_memmove_negative_size+0x154/0x2e0 [ 24.951648] kunit_try_run_case+0x170/0x3f0 [ 24.952210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.953168] kthread+0x328/0x630 [ 24.953903] ret_from_fork+0x10/0x20 [ 24.954028] [ 24.954073] Allocated by task 181: [ 24.954868] kasan_save_stack+0x3c/0x68 [ 24.955122] kasan_save_track+0x20/0x40 [ 24.955253] kasan_save_alloc_info+0x40/0x58 [ 24.955366] __kasan_kmalloc+0xd4/0xd8 [ 24.955563] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.955936] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 24.956040] kunit_try_run_case+0x170/0x3f0 [ 24.956518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.957669] kthread+0x328/0x630 [ 24.958375] ret_from_fork+0x10/0x20 [ 24.959180] [ 24.959244] The buggy address belongs to the object at fff00000c77e7380 [ 24.959244] which belongs to the cache kmalloc-64 of size 64 [ 24.959372] The buggy address is located 4 bytes inside of [ 24.959372] 64-byte region [fff00000c77e7380, fff00000c77e73c0) [ 24.959530] [ 24.959582] The buggy address belongs to the physical page: [ 24.959862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e7 [ 24.960401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.960523] page_type: f5(slab) [ 24.960721] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.961023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.961146] page dumped because: kasan: bad access detected [ 24.961263] [ 24.961308] Memory state around the buggy address: [ 24.961382] fff00000c77e7280: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 24.961555] fff00000c77e7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.961810] >fff00000c77e7380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 24.961985] ^ [ 24.962076] fff00000c77e7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.962445] fff00000c77e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.962583] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 24.911070] ================================================================== [ 24.911345] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 24.911485] Write of size 16 at addr fff00000c77e8169 by task kunit_try_catch/179 [ 24.911601] [ 24.911824] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.912578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.912644] Hardware name: linux,dummy-virt (DT) [ 24.912735] Call trace: [ 24.913439] show_stack+0x20/0x38 (C) [ 24.914085] dump_stack_lvl+0x8c/0xd0 [ 24.914269] print_report+0x118/0x608 [ 24.914385] kasan_report+0xdc/0x128 [ 24.914773] kasan_check_range+0x100/0x1a8 [ 24.914931] __asan_memset+0x34/0x78 [ 24.915058] kmalloc_oob_memset_16+0x150/0x2f8 [ 24.915534] kunit_try_run_case+0x170/0x3f0 [ 24.915972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.916671] kthread+0x328/0x630 [ 24.917103] ret_from_fork+0x10/0x20 [ 24.917277] [ 24.917425] Allocated by task 179: [ 24.917807] kasan_save_stack+0x3c/0x68 [ 24.917912] kasan_save_track+0x20/0x40 [ 24.918005] kasan_save_alloc_info+0x40/0x58 [ 24.918497] __kasan_kmalloc+0xd4/0xd8 [ 24.918786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.919490] kmalloc_oob_memset_16+0xb0/0x2f8 [ 24.919643] kunit_try_run_case+0x170/0x3f0 [ 24.919758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.919863] kthread+0x328/0x630 [ 24.919953] ret_from_fork+0x10/0x20 [ 24.920049] [ 24.920493] The buggy address belongs to the object at fff00000c77e8100 [ 24.920493] which belongs to the cache kmalloc-128 of size 128 [ 24.921583] The buggy address is located 105 bytes inside of [ 24.921583] allocated 120-byte region [fff00000c77e8100, fff00000c77e8178) [ 24.921765] [ 24.921825] The buggy address belongs to the physical page: [ 24.921917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 24.922266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.922430] page_type: f5(slab) [ 24.923029] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.923163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.923745] page dumped because: kasan: bad access detected [ 24.923818] [ 24.923861] Memory state around the buggy address: [ 24.923937] fff00000c77e8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.924232] fff00000c77e8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.924695] >fff00000c77e8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.924803] ^ [ 24.924913] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.925013] fff00000c77e8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.925135] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 24.852074] ================================================================== [ 24.852200] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 24.852327] Write of size 8 at addr fff00000c77e8071 by task kunit_try_catch/177 [ 24.852438] [ 24.852515] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.855998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.856778] Hardware name: linux,dummy-virt (DT) [ 24.856870] Call trace: [ 24.856932] show_stack+0x20/0x38 (C) [ 24.857074] dump_stack_lvl+0x8c/0xd0 [ 24.857209] print_report+0x118/0x608 [ 24.857345] kasan_report+0xdc/0x128 [ 24.857468] kasan_check_range+0x100/0x1a8 [ 24.857585] __asan_memset+0x34/0x78 [ 24.857716] kmalloc_oob_memset_8+0x150/0x2f8 [ 24.857847] kunit_try_run_case+0x170/0x3f0 [ 24.857969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.858090] kthread+0x328/0x630 [ 24.858200] ret_from_fork+0x10/0x20 [ 24.858324] [ 24.858375] Allocated by task 177: [ 24.858446] kasan_save_stack+0x3c/0x68 [ 24.858553] kasan_save_track+0x20/0x40 [ 24.861166] kasan_save_alloc_info+0x40/0x58 [ 24.861548] __kasan_kmalloc+0xd4/0xd8 [ 24.862389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.862714] kmalloc_oob_memset_8+0xb0/0x2f8 [ 24.862846] kunit_try_run_case+0x170/0x3f0 [ 24.863061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.863177] kthread+0x328/0x630 [ 24.863493] ret_from_fork+0x10/0x20 [ 24.863597] [ 24.863886] The buggy address belongs to the object at fff00000c77e8000 [ 24.863886] which belongs to the cache kmalloc-128 of size 128 [ 24.864147] The buggy address is located 113 bytes inside of [ 24.864147] allocated 120-byte region [fff00000c77e8000, fff00000c77e8078) [ 24.864287] [ 24.864334] The buggy address belongs to the physical page: [ 24.864403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 24.864526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.864645] page_type: f5(slab) [ 24.864765] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.864880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.864971] page dumped because: kasan: bad access detected [ 24.866174] [ 24.866230] Memory state around the buggy address: [ 24.866332] fff00000c77e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.866448] fff00000c77e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.867427] >fff00000c77e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.867525] ^ [ 24.867624] fff00000c77e8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.868871] fff00000c77e8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.868973] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 24.819982] ================================================================== [ 24.820095] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 24.820216] Write of size 4 at addr fff00000c5eeef75 by task kunit_try_catch/175 [ 24.820326] [ 24.820396] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.820587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.820647] Hardware name: linux,dummy-virt (DT) [ 24.821187] Call trace: [ 24.821431] show_stack+0x20/0x38 (C) [ 24.822429] dump_stack_lvl+0x8c/0xd0 [ 24.822990] print_report+0x118/0x608 [ 24.823804] kasan_report+0xdc/0x128 [ 24.824585] kasan_check_range+0x100/0x1a8 [ 24.824757] __asan_memset+0x34/0x78 [ 24.824883] kmalloc_oob_memset_4+0x150/0x300 [ 24.825182] kunit_try_run_case+0x170/0x3f0 [ 24.825458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.826055] kthread+0x328/0x630 [ 24.826406] ret_from_fork+0x10/0x20 [ 24.826784] [ 24.826840] Allocated by task 175: [ 24.827373] kasan_save_stack+0x3c/0x68 [ 24.827558] kasan_save_track+0x20/0x40 [ 24.828029] kasan_save_alloc_info+0x40/0x58 [ 24.828159] __kasan_kmalloc+0xd4/0xd8 [ 24.828282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.828667] kmalloc_oob_memset_4+0xb0/0x300 [ 24.829085] kunit_try_run_case+0x170/0x3f0 [ 24.829185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.829668] kthread+0x328/0x630 [ 24.829985] ret_from_fork+0x10/0x20 [ 24.830393] [ 24.830805] The buggy address belongs to the object at fff00000c5eeef00 [ 24.830805] which belongs to the cache kmalloc-128 of size 128 [ 24.830939] The buggy address is located 117 bytes inside of [ 24.830939] allocated 120-byte region [fff00000c5eeef00, fff00000c5eeef78) [ 24.831473] [ 24.831534] The buggy address belongs to the physical page: [ 24.831928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.832440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.832560] page_type: f5(slab) [ 24.832888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.833284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.833780] page dumped because: kasan: bad access detected [ 24.833932] [ 24.834201] Memory state around the buggy address: [ 24.834281] fff00000c5eeee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.834875] fff00000c5eeee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.835008] >fff00000c5eeef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.835092] ^ [ 24.835144] fff00000c5eeef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.835195] fff00000c5eef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.835260] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 24.789385] ================================================================== [ 24.789511] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 24.789637] Write of size 2 at addr fff00000c5eeee77 by task kunit_try_catch/173 [ 24.789769] [ 24.789849] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.790043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.790105] Hardware name: linux,dummy-virt (DT) [ 24.790173] Call trace: [ 24.790224] show_stack+0x20/0x38 (C) [ 24.790340] dump_stack_lvl+0x8c/0xd0 [ 24.790460] print_report+0x118/0x608 [ 24.791484] kasan_report+0xdc/0x128 [ 24.791802] kasan_check_range+0x100/0x1a8 [ 24.793779] __asan_memset+0x34/0x78 [ 24.793908] kmalloc_oob_memset_2+0x150/0x2f8 [ 24.794041] kunit_try_run_case+0x170/0x3f0 [ 24.794180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.794325] kthread+0x328/0x630 [ 24.794455] ret_from_fork+0x10/0x20 [ 24.794721] [ 24.794777] Allocated by task 173: [ 24.795310] kasan_save_stack+0x3c/0x68 [ 24.795505] kasan_save_track+0x20/0x40 [ 24.795693] kasan_save_alloc_info+0x40/0x58 [ 24.796421] __kasan_kmalloc+0xd4/0xd8 [ 24.796521] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.796620] kmalloc_oob_memset_2+0xb0/0x2f8 [ 24.797277] kunit_try_run_case+0x170/0x3f0 [ 24.797400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.797518] kthread+0x328/0x630 [ 24.797609] ret_from_fork+0x10/0x20 [ 24.798503] [ 24.798564] The buggy address belongs to the object at fff00000c5eeee00 [ 24.798564] which belongs to the cache kmalloc-128 of size 128 [ 24.798793] The buggy address is located 119 bytes inside of [ 24.798793] allocated 120-byte region [fff00000c5eeee00, fff00000c5eeee78) [ 24.798936] [ 24.798989] The buggy address belongs to the physical page: [ 24.799329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.800228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.800609] page_type: f5(slab) [ 24.801152] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.801293] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.801397] page dumped because: kasan: bad access detected [ 24.801472] [ 24.801799] Memory state around the buggy address: [ 24.802624] fff00000c5eeed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.802921] fff00000c5eeed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.803137] >fff00000c5eeee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.803257] ^ [ 24.803516] fff00000c5eeee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.803754] fff00000c5eeef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.803842] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 24.750704] ================================================================== [ 24.750831] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 24.750977] Write of size 128 at addr fff00000c5eeed00 by task kunit_try_catch/171 [ 24.751277] [ 24.751363] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.751804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.751886] Hardware name: linux,dummy-virt (DT) [ 24.751972] Call trace: [ 24.752116] show_stack+0x20/0x38 (C) [ 24.752240] dump_stack_lvl+0x8c/0xd0 [ 24.752357] print_report+0x118/0x608 [ 24.752471] kasan_report+0xdc/0x128 [ 24.752633] kasan_check_range+0x100/0x1a8 [ 24.752793] __asan_memset+0x34/0x78 [ 24.753011] kmalloc_oob_in_memset+0x144/0x2d0 [ 24.753135] kunit_try_run_case+0x170/0x3f0 [ 24.753319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.753523] kthread+0x328/0x630 [ 24.753659] ret_from_fork+0x10/0x20 [ 24.753869] [ 24.753974] Allocated by task 171: [ 24.754313] kasan_save_stack+0x3c/0x68 [ 24.754637] kasan_save_track+0x20/0x40 [ 24.755139] kasan_save_alloc_info+0x40/0x58 [ 24.755429] __kasan_kmalloc+0xd4/0xd8 [ 24.755525] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.756394] kmalloc_oob_in_memset+0xb0/0x2d0 [ 24.756502] kunit_try_run_case+0x170/0x3f0 [ 24.757413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.757549] kthread+0x328/0x630 [ 24.757852] ret_from_fork+0x10/0x20 [ 24.758497] [ 24.758551] The buggy address belongs to the object at fff00000c5eeed00 [ 24.758551] which belongs to the cache kmalloc-128 of size 128 [ 24.759127] The buggy address is located 0 bytes inside of [ 24.759127] allocated 120-byte region [fff00000c5eeed00, fff00000c5eeed78) [ 24.759989] [ 24.760045] The buggy address belongs to the physical page: [ 24.760120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.761102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.761274] page_type: f5(slab) [ 24.761371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.761485] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.761575] page dumped because: kasan: bad access detected [ 24.762280] [ 24.762897] Memory state around the buggy address: [ 24.763340] fff00000c5eeec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.763444] fff00000c5eeec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763870] >fff00000c5eeed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.763970] ^ [ 24.764084] fff00000c5eeed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.765471] fff00000c5eeee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.765790] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 24.720416] ================================================================== [ 24.720539] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.720711] Read of size 16 at addr fff00000c5ed4d00 by task kunit_try_catch/169 [ 24.720868] [ 24.720977] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.721326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.721433] Hardware name: linux,dummy-virt (DT) [ 24.721509] Call trace: [ 24.721565] show_stack+0x20/0x38 (C) [ 24.721708] dump_stack_lvl+0x8c/0xd0 [ 24.721845] print_report+0x118/0x608 [ 24.722184] kasan_report+0xdc/0x128 [ 24.722304] __asan_report_load16_noabort+0x20/0x30 [ 24.722423] kmalloc_uaf_16+0x3bc/0x438 [ 24.722539] kunit_try_run_case+0x170/0x3f0 [ 24.722747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.722988] kthread+0x328/0x630 [ 24.723206] ret_from_fork+0x10/0x20 [ 24.723342] [ 24.723414] Allocated by task 169: [ 24.723488] kasan_save_stack+0x3c/0x68 [ 24.723595] kasan_save_track+0x20/0x40 [ 24.723822] kasan_save_alloc_info+0x40/0x58 [ 24.723922] __kasan_kmalloc+0xd4/0xd8 [ 24.724055] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.724270] kmalloc_uaf_16+0x140/0x438 [ 24.724420] kunit_try_run_case+0x170/0x3f0 [ 24.724527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.724805] kthread+0x328/0x630 [ 24.724958] ret_from_fork+0x10/0x20 [ 24.725058] [ 24.725192] Freed by task 169: [ 24.725385] kasan_save_stack+0x3c/0x68 [ 24.725631] kasan_save_track+0x20/0x40 [ 24.725751] kasan_save_free_info+0x4c/0x78 [ 24.725857] __kasan_slab_free+0x6c/0x98 [ 24.725966] kfree+0x214/0x3c8 [ 24.726066] kmalloc_uaf_16+0x190/0x438 [ 24.726276] kunit_try_run_case+0x170/0x3f0 [ 24.726389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.726511] kthread+0x328/0x630 [ 24.726730] ret_from_fork+0x10/0x20 [ 24.726848] [ 24.727235] The buggy address belongs to the object at fff00000c5ed4d00 [ 24.727235] which belongs to the cache kmalloc-16 of size 16 [ 24.727373] The buggy address is located 0 bytes inside of [ 24.727373] freed 16-byte region [fff00000c5ed4d00, fff00000c5ed4d10) [ 24.727760] [ 24.727976] The buggy address belongs to the physical page: [ 24.728142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4 [ 24.728294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.728415] page_type: f5(slab) [ 24.728507] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.728622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.728735] page dumped because: kasan: bad access detected [ 24.730463] [ 24.730621] Memory state around the buggy address: [ 24.730766] fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 24.731021] fff00000c5ed4c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 24.733212] >fff00000c5ed4d00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.733329] ^ [ 24.733403] fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.733507] fff00000c5ed4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.733593] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 24.701261] ================================================================== [ 24.701390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 24.701505] Write of size 16 at addr fff00000c5ed4ca0 by task kunit_try_catch/167 [ 24.701617] [ 24.701713] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.701928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.702003] Hardware name: linux,dummy-virt (DT) [ 24.702123] Call trace: [ 24.702186] show_stack+0x20/0x38 (C) [ 24.702327] dump_stack_lvl+0x8c/0xd0 [ 24.702466] print_report+0x118/0x608 [ 24.702745] kasan_report+0xdc/0x128 [ 24.702878] __asan_report_store16_noabort+0x20/0x30 [ 24.703015] kmalloc_oob_16+0x3a0/0x3f8 [ 24.703230] kunit_try_run_case+0x170/0x3f0 [ 24.703382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703526] kthread+0x328/0x630 [ 24.703774] ret_from_fork+0x10/0x20 [ 24.703950] [ 24.704020] Allocated by task 167: [ 24.704186] kasan_save_stack+0x3c/0x68 [ 24.704338] kasan_save_track+0x20/0x40 [ 24.704434] kasan_save_alloc_info+0x40/0x58 [ 24.704697] __kasan_kmalloc+0xd4/0xd8 [ 24.704793] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.704920] kmalloc_oob_16+0xb4/0x3f8 [ 24.705142] kunit_try_run_case+0x170/0x3f0 [ 24.705284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.705448] kthread+0x328/0x630 [ 24.706002] ret_from_fork+0x10/0x20 [ 24.706121] [ 24.706175] The buggy address belongs to the object at fff00000c5ed4ca0 [ 24.706175] which belongs to the cache kmalloc-16 of size 16 [ 24.706317] The buggy address is located 0 bytes inside of [ 24.706317] allocated 13-byte region [fff00000c5ed4ca0, fff00000c5ed4cad) [ 24.706466] [ 24.706526] The buggy address belongs to the physical page: [ 24.706780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4 [ 24.706906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.707041] page_type: f5(slab) [ 24.707176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.707403] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.707501] page dumped because: kasan: bad access detected [ 24.707572] [ 24.707662] Memory state around the buggy address: [ 24.707828] fff00000c5ed4b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.707930] fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 24.708135] >fff00000c5ed4c80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 24.708227] ^ [ 24.708302] fff00000c5ed4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.708445] fff00000c5ed4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.708563] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 24.671288] ================================================================== [ 24.671546] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 24.671673] Read of size 1 at addr fff00000c5fb2200 by task kunit_try_catch/165 [ 24.671804] [ 24.671880] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.672195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.672351] Hardware name: linux,dummy-virt (DT) [ 24.672739] Call trace: [ 24.672843] show_stack+0x20/0x38 (C) [ 24.672973] dump_stack_lvl+0x8c/0xd0 [ 24.673096] print_report+0x118/0x608 [ 24.673208] kasan_report+0xdc/0x128 [ 24.673336] __asan_report_load1_noabort+0x20/0x30 [ 24.673456] krealloc_uaf+0x4c8/0x520 [ 24.673566] kunit_try_run_case+0x170/0x3f0 [ 24.673704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.673847] kthread+0x328/0x630 [ 24.674163] ret_from_fork+0x10/0x20 [ 24.674414] [ 24.674459] Allocated by task 165: [ 24.674620] kasan_save_stack+0x3c/0x68 [ 24.674802] kasan_save_track+0x20/0x40 [ 24.674912] kasan_save_alloc_info+0x40/0x58 [ 24.675021] __kasan_kmalloc+0xd4/0xd8 [ 24.675397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.675828] krealloc_uaf+0xc8/0x520 [ 24.676100] kunit_try_run_case+0x170/0x3f0 [ 24.676459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.676664] kthread+0x328/0x630 [ 24.676773] ret_from_fork+0x10/0x20 [ 24.676869] [ 24.676917] Freed by task 165: [ 24.677031] kasan_save_stack+0x3c/0x68 [ 24.677180] kasan_save_track+0x20/0x40 [ 24.677296] kasan_save_free_info+0x4c/0x78 [ 24.677630] __kasan_slab_free+0x6c/0x98 [ 24.677949] kfree+0x214/0x3c8 [ 24.678072] krealloc_uaf+0x12c/0x520 [ 24.678323] kunit_try_run_case+0x170/0x3f0 [ 24.678452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.678733] kthread+0x328/0x630 [ 24.678825] ret_from_fork+0x10/0x20 [ 24.678925] [ 24.678975] The buggy address belongs to the object at fff00000c5fb2200 [ 24.678975] which belongs to the cache kmalloc-256 of size 256 [ 24.679159] The buggy address is located 0 bytes inside of [ 24.679159] freed 256-byte region [fff00000c5fb2200, fff00000c5fb2300) [ 24.679525] [ 24.679643] The buggy address belongs to the physical page: [ 24.679848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.680004] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.680142] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.680296] page_type: f5(slab) [ 24.680467] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.680610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.680795] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.681328] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.681558] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.682067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.682167] page dumped because: kasan: bad access detected [ 24.682238] [ 24.682401] Memory state around the buggy address: [ 24.682505] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.682615] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.682820] >fff00000c5fb2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.683017] ^ [ 24.683160] fff00000c5fb2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.683265] fff00000c5fb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.683998] ================================================================== [ 24.649809] ================================================================== [ 24.650275] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 24.650556] Read of size 1 at addr fff00000c5fb2200 by task kunit_try_catch/165 [ 24.650750] [ 24.650838] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.651155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.651231] Hardware name: linux,dummy-virt (DT) [ 24.651313] Call trace: [ 24.651376] show_stack+0x20/0x38 (C) [ 24.651646] dump_stack_lvl+0x8c/0xd0 [ 24.652276] print_report+0x118/0x608 [ 24.652399] kasan_report+0xdc/0x128 [ 24.652650] __kasan_check_byte+0x54/0x70 [ 24.652789] krealloc_noprof+0x44/0x360 [ 24.652962] krealloc_uaf+0x180/0x520 [ 24.653088] kunit_try_run_case+0x170/0x3f0 [ 24.653440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.653581] kthread+0x328/0x630 [ 24.653759] ret_from_fork+0x10/0x20 [ 24.654008] [ 24.654110] Allocated by task 165: [ 24.654243] kasan_save_stack+0x3c/0x68 [ 24.654346] kasan_save_track+0x20/0x40 [ 24.654443] kasan_save_alloc_info+0x40/0x58 [ 24.654534] __kasan_kmalloc+0xd4/0xd8 [ 24.654623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.654943] krealloc_uaf+0xc8/0x520 [ 24.655061] kunit_try_run_case+0x170/0x3f0 [ 24.655174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.655297] kthread+0x328/0x630 [ 24.655403] ret_from_fork+0x10/0x20 [ 24.655509] [ 24.655585] Freed by task 165: [ 24.655726] kasan_save_stack+0x3c/0x68 [ 24.656027] kasan_save_track+0x20/0x40 [ 24.656134] kasan_save_free_info+0x4c/0x78 [ 24.656269] __kasan_slab_free+0x6c/0x98 [ 24.656478] kfree+0x214/0x3c8 [ 24.656600] krealloc_uaf+0x12c/0x520 [ 24.656851] kunit_try_run_case+0x170/0x3f0 [ 24.657013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.657120] kthread+0x328/0x630 [ 24.657209] ret_from_fork+0x10/0x20 [ 24.657360] [ 24.657544] The buggy address belongs to the object at fff00000c5fb2200 [ 24.657544] which belongs to the cache kmalloc-256 of size 256 [ 24.657956] The buggy address is located 0 bytes inside of [ 24.657956] freed 256-byte region [fff00000c5fb2200, fff00000c5fb2300) [ 24.658485] [ 24.658547] The buggy address belongs to the physical page: [ 24.658708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.658856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.658962] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.659330] page_type: f5(slab) [ 24.659742] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.660527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.661404] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.661986] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.662152] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.662425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.662519] page dumped because: kasan: bad access detected [ 24.663344] [ 24.663969] Memory state around the buggy address: [ 24.664212] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.664621] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.664970] >fff00000c5fb2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.665338] ^ [ 24.665413] fff00000c5fb2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.666368] fff00000c5fb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.666517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 24.632878] ================================================================== [ 24.633009] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 24.633312] Write of size 1 at addr fff00000c77b60eb by task kunit_try_catch/163 [ 24.633572] [ 24.633646] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.634098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.634162] Hardware name: linux,dummy-virt (DT) [ 24.634234] Call trace: [ 24.634282] show_stack+0x20/0x38 (C) [ 24.634394] dump_stack_lvl+0x8c/0xd0 [ 24.634505] print_report+0x118/0x608 [ 24.634627] kasan_report+0xdc/0x128 [ 24.634762] __asan_report_store1_noabort+0x20/0x30 [ 24.634939] krealloc_less_oob_helper+0xa58/0xc50 [ 24.635174] krealloc_large_less_oob+0x20/0x38 [ 24.635314] kunit_try_run_case+0x170/0x3f0 [ 24.635462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.635600] kthread+0x328/0x630 [ 24.635739] ret_from_fork+0x10/0x20 [ 24.636050] [ 24.636102] The buggy address belongs to the physical page: [ 24.636173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.636295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.636412] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.636533] page_type: f8(unknown) [ 24.636621] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.636756] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.636871] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.636981] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.637096] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.637210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.637329] page dumped because: kasan: bad access detected [ 24.637415] [ 24.637519] Memory state around the buggy address: [ 24.637632] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.637765] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.637976] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.638077] ^ [ 24.638186] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.638360] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.638487] ================================================================== [ 24.495738] ================================================================== [ 24.495908] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 24.496080] Write of size 1 at addr fff00000c5fb20eb by task kunit_try_catch/159 [ 24.496209] [ 24.496281] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.496569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.496720] Hardware name: linux,dummy-virt (DT) [ 24.496809] Call trace: [ 24.497118] show_stack+0x20/0x38 (C) [ 24.497261] dump_stack_lvl+0x8c/0xd0 [ 24.497415] print_report+0x118/0x608 [ 24.497629] kasan_report+0xdc/0x128 [ 24.497775] __asan_report_store1_noabort+0x20/0x30 [ 24.497995] krealloc_less_oob_helper+0xa58/0xc50 [ 24.498130] krealloc_less_oob+0x20/0x38 [ 24.498249] kunit_try_run_case+0x170/0x3f0 [ 24.498372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.498503] kthread+0x328/0x630 [ 24.498608] ret_from_fork+0x10/0x20 [ 24.498771] [ 24.498934] Allocated by task 159: [ 24.499095] kasan_save_stack+0x3c/0x68 [ 24.499211] kasan_save_track+0x20/0x40 [ 24.499324] kasan_save_alloc_info+0x40/0x58 [ 24.499528] __kasan_krealloc+0x118/0x178 [ 24.499643] krealloc_noprof+0x128/0x360 [ 24.499769] krealloc_less_oob_helper+0x168/0xc50 [ 24.499915] krealloc_less_oob+0x20/0x38 [ 24.500038] kunit_try_run_case+0x170/0x3f0 [ 24.500234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.500400] kthread+0x328/0x630 [ 24.500516] ret_from_fork+0x10/0x20 [ 24.500841] [ 24.500895] The buggy address belongs to the object at fff00000c5fb2000 [ 24.500895] which belongs to the cache kmalloc-256 of size 256 [ 24.501104] The buggy address is located 34 bytes to the right of [ 24.501104] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.501458] [ 24.501509] The buggy address belongs to the physical page: [ 24.501578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.501715] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.501828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.501975] page_type: f5(slab) [ 24.502228] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.502366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.502520] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.502635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.502781] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.503192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.503301] page dumped because: kasan: bad access detected [ 24.503384] [ 24.503434] Memory state around the buggy address: [ 24.503516] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.503625] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.503823] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.503918] ^ [ 24.504050] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.504236] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.504335] ================================================================== [ 24.486460] ================================================================== [ 24.486708] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 24.486852] Write of size 1 at addr fff00000c5fb20ea by task kunit_try_catch/159 [ 24.487132] [ 24.487222] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.487414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.487475] Hardware name: linux,dummy-virt (DT) [ 24.487548] Call trace: [ 24.487605] show_stack+0x20/0x38 (C) [ 24.487775] dump_stack_lvl+0x8c/0xd0 [ 24.487954] print_report+0x118/0x608 [ 24.488095] kasan_report+0xdc/0x128 [ 24.488225] __asan_report_store1_noabort+0x20/0x30 [ 24.488403] krealloc_less_oob_helper+0xae4/0xc50 [ 24.488531] krealloc_less_oob+0x20/0x38 [ 24.488654] kunit_try_run_case+0x170/0x3f0 [ 24.488817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.489055] kthread+0x328/0x630 [ 24.489379] ret_from_fork+0x10/0x20 [ 24.489512] [ 24.489563] Allocated by task 159: [ 24.489643] kasan_save_stack+0x3c/0x68 [ 24.489777] kasan_save_track+0x20/0x40 [ 24.489888] kasan_save_alloc_info+0x40/0x58 [ 24.490093] __kasan_krealloc+0x118/0x178 [ 24.490360] krealloc_noprof+0x128/0x360 [ 24.490458] krealloc_less_oob_helper+0x168/0xc50 [ 24.490570] krealloc_less_oob+0x20/0x38 [ 24.490844] kunit_try_run_case+0x170/0x3f0 [ 24.490944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.491060] kthread+0x328/0x630 [ 24.491301] ret_from_fork+0x10/0x20 [ 24.491394] [ 24.491469] The buggy address belongs to the object at fff00000c5fb2000 [ 24.491469] which belongs to the cache kmalloc-256 of size 256 [ 24.491652] The buggy address is located 33 bytes to the right of [ 24.491652] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.491914] [ 24.491974] The buggy address belongs to the physical page: [ 24.492055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.492189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.492316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.492447] page_type: f5(slab) [ 24.492537] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.492714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.492856] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.492988] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.493153] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.493302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.493434] page dumped because: kasan: bad access detected [ 24.493577] [ 24.493632] Memory state around the buggy address: [ 24.493735] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.493836] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.493925] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.494013] ^ [ 24.494201] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.494303] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.494389] ================================================================== [ 24.620642] ================================================================== [ 24.621267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 24.621594] Write of size 1 at addr fff00000c77b60ea by task kunit_try_catch/163 [ 24.621786] [ 24.621995] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.622196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.622261] Hardware name: linux,dummy-virt (DT) [ 24.622335] Call trace: [ 24.622383] show_stack+0x20/0x38 (C) [ 24.622496] dump_stack_lvl+0x8c/0xd0 [ 24.622629] print_report+0x118/0x608 [ 24.622842] kasan_report+0xdc/0x128 [ 24.623612] __asan_report_store1_noabort+0x20/0x30 [ 24.623761] krealloc_less_oob_helper+0xae4/0xc50 [ 24.624220] krealloc_large_less_oob+0x20/0x38 [ 24.624398] kunit_try_run_case+0x170/0x3f0 [ 24.624523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.624670] kthread+0x328/0x630 [ 24.624896] ret_from_fork+0x10/0x20 [ 24.625165] [ 24.625295] The buggy address belongs to the physical page: [ 24.625378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.625531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.625798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.625976] page_type: f8(unknown) [ 24.626067] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.626179] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.626291] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.626402] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.626516] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.627080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.627331] page dumped because: kasan: bad access detected [ 24.627633] [ 24.627698] Memory state around the buggy address: [ 24.627777] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.627882] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.629301] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.630149] ^ [ 24.630451] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.630555] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.630646] ================================================================== [ 24.589637] ================================================================== [ 24.589772] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.589890] Write of size 1 at addr fff00000c77b60d0 by task kunit_try_catch/163 [ 24.590005] [ 24.590075] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.593798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.593884] Hardware name: linux,dummy-virt (DT) [ 24.594431] Call trace: [ 24.594494] show_stack+0x20/0x38 (C) [ 24.594626] dump_stack_lvl+0x8c/0xd0 [ 24.595638] print_report+0x118/0x608 [ 24.595809] kasan_report+0xdc/0x128 [ 24.600167] __asan_report_store1_noabort+0x20/0x30 [ 24.600351] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.600500] krealloc_large_less_oob+0x20/0x38 [ 24.600757] kunit_try_run_case+0x170/0x3f0 [ 24.601060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.601209] kthread+0x328/0x630 [ 24.601337] ret_from_fork+0x10/0x20 [ 24.601475] [ 24.601534] The buggy address belongs to the physical page: [ 24.601906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.602384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.602559] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.602708] page_type: f8(unknown) [ 24.602986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.603185] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.603462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.603656] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.603808] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.604035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.604721] page dumped because: kasan: bad access detected [ 24.604834] [ 24.604887] Memory state around the buggy address: [ 24.605197] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.605319] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.605440] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.605610] ^ [ 24.605749] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.606048] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.606415] ================================================================== [ 24.418631] ================================================================== [ 24.418781] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.418921] Write of size 1 at addr fff00000c5fb20c9 by task kunit_try_catch/159 [ 24.419034] [ 24.419111] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.419302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.419364] Hardware name: linux,dummy-virt (DT) [ 24.419435] Call trace: [ 24.419484] show_stack+0x20/0x38 (C) [ 24.419605] dump_stack_lvl+0x8c/0xd0 [ 24.420400] print_report+0x118/0x608 [ 24.420533] kasan_report+0xdc/0x128 [ 24.420880] __asan_report_store1_noabort+0x20/0x30 [ 24.421076] krealloc_less_oob_helper+0xa48/0xc50 [ 24.421459] krealloc_less_oob+0x20/0x38 [ 24.421635] kunit_try_run_case+0x170/0x3f0 [ 24.422009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.422211] kthread+0x328/0x630 [ 24.422323] ret_from_fork+0x10/0x20 [ 24.423007] [ 24.423714] Allocated by task 159: [ 24.423803] kasan_save_stack+0x3c/0x68 [ 24.424264] kasan_save_track+0x20/0x40 [ 24.424831] kasan_save_alloc_info+0x40/0x58 [ 24.425060] __kasan_krealloc+0x118/0x178 [ 24.425668] krealloc_noprof+0x128/0x360 [ 24.425786] krealloc_less_oob_helper+0x168/0xc50 [ 24.426428] krealloc_less_oob+0x20/0x38 [ 24.426761] kunit_try_run_case+0x170/0x3f0 [ 24.427035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.428145] kthread+0x328/0x630 [ 24.428669] ret_from_fork+0x10/0x20 [ 24.429031] [ 24.429087] The buggy address belongs to the object at fff00000c5fb2000 [ 24.429087] which belongs to the cache kmalloc-256 of size 256 [ 24.429219] The buggy address is located 0 bytes to the right of [ 24.429219] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.429379] [ 24.429429] The buggy address belongs to the physical page: [ 24.429506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.429630] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.429755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.432089] page_type: f5(slab) [ 24.432408] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.432525] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.432929] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.433727] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.433850] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.433966] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.435153] page dumped because: kasan: bad access detected [ 24.435409] [ 24.435456] Memory state around the buggy address: [ 24.435756] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.435969] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.436068] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.436153] ^ [ 24.437113] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.437219] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.438390] ================================================================== [ 24.445601] ================================================================== [ 24.447255] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.448151] Write of size 1 at addr fff00000c5fb20d0 by task kunit_try_catch/159 [ 24.448319] [ 24.448710] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.448934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.448995] Hardware name: linux,dummy-virt (DT) [ 24.449037] Call trace: [ 24.449064] show_stack+0x20/0x38 (C) [ 24.449160] dump_stack_lvl+0x8c/0xd0 [ 24.449305] print_report+0x118/0x608 [ 24.449656] kasan_report+0xdc/0x128 [ 24.449905] __asan_report_store1_noabort+0x20/0x30 [ 24.450134] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.450355] krealloc_less_oob+0x20/0x38 [ 24.450506] kunit_try_run_case+0x170/0x3f0 [ 24.450736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.451179] kthread+0x328/0x630 [ 24.451410] ret_from_fork+0x10/0x20 [ 24.451635] [ 24.451751] Allocated by task 159: [ 24.451837] kasan_save_stack+0x3c/0x68 [ 24.452038] kasan_save_track+0x20/0x40 [ 24.452175] kasan_save_alloc_info+0x40/0x58 [ 24.452362] __kasan_krealloc+0x118/0x178 [ 24.452599] krealloc_noprof+0x128/0x360 [ 24.453324] krealloc_less_oob_helper+0x168/0xc50 [ 24.453432] krealloc_less_oob+0x20/0x38 [ 24.453521] kunit_try_run_case+0x170/0x3f0 [ 24.453610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.453733] kthread+0x328/0x630 [ 24.453832] ret_from_fork+0x10/0x20 [ 24.455032] [ 24.455113] The buggy address belongs to the object at fff00000c5fb2000 [ 24.455113] which belongs to the cache kmalloc-256 of size 256 [ 24.455423] The buggy address is located 7 bytes to the right of [ 24.455423] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.455847] [ 24.455966] The buggy address belongs to the physical page: [ 24.456052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.456180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.456295] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.456560] page_type: f5(slab) [ 24.456846] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.457600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.457740] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.458570] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.458862] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.459002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.459649] page dumped because: kasan: bad access detected [ 24.459744] [ 24.459792] Memory state around the buggy address: [ 24.459870] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.459973] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.460076] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.461510] ^ [ 24.462047] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462428] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462718] ================================================================== [ 24.464128] ================================================================== [ 24.464443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 24.464570] Write of size 1 at addr fff00000c5fb20da by task kunit_try_catch/159 [ 24.464952] [ 24.465062] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.465270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.465336] Hardware name: linux,dummy-virt (DT) [ 24.465411] Call trace: [ 24.465464] show_stack+0x20/0x38 (C) [ 24.466165] dump_stack_lvl+0x8c/0xd0 [ 24.466403] print_report+0x118/0x608 [ 24.466667] kasan_report+0xdc/0x128 [ 24.466957] __asan_report_store1_noabort+0x20/0x30 [ 24.467328] krealloc_less_oob_helper+0xa80/0xc50 [ 24.467777] krealloc_less_oob+0x20/0x38 [ 24.467955] kunit_try_run_case+0x170/0x3f0 [ 24.468478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.468621] kthread+0x328/0x630 [ 24.468867] ret_from_fork+0x10/0x20 [ 24.469338] [ 24.469560] Allocated by task 159: [ 24.469789] kasan_save_stack+0x3c/0x68 [ 24.469969] kasan_save_track+0x20/0x40 [ 24.470232] kasan_save_alloc_info+0x40/0x58 [ 24.470541] __kasan_krealloc+0x118/0x178 [ 24.470745] krealloc_noprof+0x128/0x360 [ 24.470848] krealloc_less_oob_helper+0x168/0xc50 [ 24.470956] krealloc_less_oob+0x20/0x38 [ 24.471423] kunit_try_run_case+0x170/0x3f0 [ 24.472227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.472592] kthread+0x328/0x630 [ 24.472943] ret_from_fork+0x10/0x20 [ 24.473037] [ 24.473086] The buggy address belongs to the object at fff00000c5fb2000 [ 24.473086] which belongs to the cache kmalloc-256 of size 256 [ 24.474159] The buggy address is located 17 bytes to the right of [ 24.474159] allocated 201-byte region [fff00000c5fb2000, fff00000c5fb20c9) [ 24.474648] [ 24.474897] The buggy address belongs to the physical page: [ 24.474980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.475744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.476206] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.476390] page_type: f5(slab) [ 24.477409] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.477979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.478352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.478653] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.479411] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.479552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.479992] page dumped because: kasan: bad access detected [ 24.480068] [ 24.481077] Memory state around the buggy address: [ 24.481843] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.482300] fff00000c5fb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.482769] >fff00000c5fb2080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.483096] ^ [ 24.483731] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.484296] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.484392] ================================================================== [ 24.608157] ================================================================== [ 24.608835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 24.609170] Write of size 1 at addr fff00000c77b60da by task kunit_try_catch/163 [ 24.609876] [ 24.609962] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.610150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.610211] Hardware name: linux,dummy-virt (DT) [ 24.610281] Call trace: [ 24.610331] show_stack+0x20/0x38 (C) [ 24.610447] dump_stack_lvl+0x8c/0xd0 [ 24.610564] print_report+0x118/0x608 [ 24.612442] kasan_report+0xdc/0x128 [ 24.612876] __asan_report_store1_noabort+0x20/0x30 [ 24.613368] krealloc_less_oob_helper+0xa80/0xc50 [ 24.613499] krealloc_large_less_oob+0x20/0x38 [ 24.613618] kunit_try_run_case+0x170/0x3f0 [ 24.613755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.613913] kthread+0x328/0x630 [ 24.614027] ret_from_fork+0x10/0x20 [ 24.614146] [ 24.614213] The buggy address belongs to the physical page: [ 24.614303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.614431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.614549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.615470] page_type: f8(unknown) [ 24.615569] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.615706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.616238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.616479] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.616731] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.617013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.617121] page dumped because: kasan: bad access detected [ 24.617193] [ 24.618148] Memory state around the buggy address: [ 24.618290] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.618460] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.618559] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.618652] ^ [ 24.618756] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.618903] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.619145] ================================================================== [ 24.573325] ================================================================== [ 24.573463] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.573779] Write of size 1 at addr fff00000c77b60c9 by task kunit_try_catch/163 [ 24.573951] [ 24.574177] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.574406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.574468] Hardware name: linux,dummy-virt (DT) [ 24.574539] Call trace: [ 24.574599] show_stack+0x20/0x38 (C) [ 24.574770] dump_stack_lvl+0x8c/0xd0 [ 24.574914] print_report+0x118/0x608 [ 24.575504] kasan_report+0xdc/0x128 [ 24.575637] __asan_report_store1_noabort+0x20/0x30 [ 24.575797] krealloc_less_oob_helper+0xa48/0xc50 [ 24.576173] krealloc_large_less_oob+0x20/0x38 [ 24.576506] kunit_try_run_case+0x170/0x3f0 [ 24.576696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.576849] kthread+0x328/0x630 [ 24.577060] ret_from_fork+0x10/0x20 [ 24.577373] [ 24.577506] The buggy address belongs to the physical page: [ 24.577727] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.577854] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.577966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.578089] page_type: f8(unknown) [ 24.578181] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.578295] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.578408] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.578520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.578631] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.578786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.578896] page dumped because: kasan: bad access detected [ 24.578979] [ 24.579030] Memory state around the buggy address: [ 24.579545] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.579665] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.579793] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.579879] ^ [ 24.579957] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.580053] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.580138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 24.541552] ================================================================== [ 24.541653] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.541791] Write of size 1 at addr fff00000c77b60f0 by task kunit_try_catch/161 [ 24.541902] [ 24.541978] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.542165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.542225] Hardware name: linux,dummy-virt (DT) [ 24.542296] Call trace: [ 24.542345] show_stack+0x20/0x38 (C) [ 24.542461] dump_stack_lvl+0x8c/0xd0 [ 24.542578] print_report+0x118/0x608 [ 24.546554] kasan_report+0xdc/0x128 [ 24.547443] __asan_report_store1_noabort+0x20/0x30 [ 24.547718] krealloc_more_oob_helper+0x5c0/0x678 [ 24.547856] krealloc_large_more_oob+0x20/0x38 [ 24.547977] kunit_try_run_case+0x170/0x3f0 [ 24.548170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.548355] kthread+0x328/0x630 [ 24.548622] ret_from_fork+0x10/0x20 [ 24.548799] [ 24.548924] The buggy address belongs to the physical page: [ 24.549062] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.549187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.549350] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.550709] page_type: f8(unknown) [ 24.550826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.550959] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.551097] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.551227] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.551360] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.551500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.552381] page dumped because: kasan: bad access detected [ 24.552469] [ 24.552519] Memory state around the buggy address: [ 24.552592] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552697] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552799] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.553777] ^ [ 24.553876] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.553980] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.554127] ================================================================== [ 24.525336] ================================================================== [ 24.526320] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.527917] Write of size 1 at addr fff00000c77b60eb by task kunit_try_catch/161 [ 24.528041] [ 24.528960] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.529660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.529769] Hardware name: linux,dummy-virt (DT) [ 24.529986] Call trace: [ 24.530099] show_stack+0x20/0x38 (C) [ 24.530787] dump_stack_lvl+0x8c/0xd0 [ 24.531417] print_report+0x118/0x608 [ 24.531790] kasan_report+0xdc/0x128 [ 24.532509] __asan_report_store1_noabort+0x20/0x30 [ 24.532937] krealloc_more_oob_helper+0x60c/0x678 [ 24.533063] krealloc_large_more_oob+0x20/0x38 [ 24.534488] kunit_try_run_case+0x170/0x3f0 [ 24.534800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.535262] kthread+0x328/0x630 [ 24.535382] ret_from_fork+0x10/0x20 [ 24.535514] [ 24.535565] The buggy address belongs to the physical page: [ 24.535640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 24.535789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.536345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.536503] page_type: f8(unknown) [ 24.536626] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.536769] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.536901] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.537027] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.537158] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 24.537934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.538095] page dumped because: kasan: bad access detected [ 24.538214] [ 24.538291] Memory state around the buggy address: [ 24.538368] fff00000c77b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.538471] fff00000c77b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.538568] >fff00000c77b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.538743] ^ [ 24.538851] fff00000c77b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.538964] fff00000c77b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.539065] ================================================================== [ 24.364218] ================================================================== [ 24.364362] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.364496] Write of size 1 at addr fff00000c5fb1eeb by task kunit_try_catch/157 [ 24.364607] [ 24.364705] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.364898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.364959] Hardware name: linux,dummy-virt (DT) [ 24.365030] Call trace: [ 24.365094] show_stack+0x20/0x38 (C) [ 24.365482] dump_stack_lvl+0x8c/0xd0 [ 24.365964] print_report+0x118/0x608 [ 24.366604] kasan_report+0xdc/0x128 [ 24.366822] __asan_report_store1_noabort+0x20/0x30 [ 24.366975] krealloc_more_oob_helper+0x60c/0x678 [ 24.367135] krealloc_more_oob+0x20/0x38 [ 24.367413] kunit_try_run_case+0x170/0x3f0 [ 24.367548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.367847] kthread+0x328/0x630 [ 24.368063] ret_from_fork+0x10/0x20 [ 24.368384] [ 24.368449] Allocated by task 157: [ 24.368641] kasan_save_stack+0x3c/0x68 [ 24.368968] kasan_save_track+0x20/0x40 [ 24.369071] kasan_save_alloc_info+0x40/0x58 [ 24.369633] __kasan_krealloc+0x118/0x178 [ 24.369777] krealloc_noprof+0x128/0x360 [ 24.369889] krealloc_more_oob_helper+0x168/0x678 [ 24.370002] krealloc_more_oob+0x20/0x38 [ 24.370554] kunit_try_run_case+0x170/0x3f0 [ 24.370783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.371161] kthread+0x328/0x630 [ 24.371241] ret_from_fork+0x10/0x20 [ 24.371333] [ 24.371382] The buggy address belongs to the object at fff00000c5fb1e00 [ 24.371382] which belongs to the cache kmalloc-256 of size 256 [ 24.371570] The buggy address is located 0 bytes to the right of [ 24.371570] allocated 235-byte region [fff00000c5fb1e00, fff00000c5fb1eeb) [ 24.371751] [ 24.371806] The buggy address belongs to the physical page: [ 24.371873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb0 [ 24.371993] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.372229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.372361] page_type: f5(slab) [ 24.372457] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.372591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.372802] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.372983] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.373282] head: 0bfffe0000000001 ffffc1ffc317ec01 00000000ffffffff 00000000ffffffff [ 24.373604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.373750] page dumped because: kasan: bad access detected [ 24.373834] [ 24.373886] Memory state around the buggy address: [ 24.373971] fff00000c5fb1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374083] fff00000c5fb1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.374197] >fff00000c5fb1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.374299] ^ [ 24.374401] fff00000c5fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374513] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374604] ================================================================== [ 24.375995] ================================================================== [ 24.376092] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.376201] Write of size 1 at addr fff00000c5fb1ef0 by task kunit_try_catch/157 [ 24.376315] [ 24.376380] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.376564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.376625] Hardware name: linux,dummy-virt (DT) [ 24.376716] Call trace: [ 24.376769] show_stack+0x20/0x38 (C) [ 24.376886] dump_stack_lvl+0x8c/0xd0 [ 24.377030] print_report+0x118/0x608 [ 24.377169] kasan_report+0xdc/0x128 [ 24.377323] __asan_report_store1_noabort+0x20/0x30 [ 24.377463] krealloc_more_oob_helper+0x5c0/0x678 [ 24.377606] krealloc_more_oob+0x20/0x38 [ 24.377759] kunit_try_run_case+0x170/0x3f0 [ 24.377901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.378047] kthread+0x328/0x630 [ 24.378165] ret_from_fork+0x10/0x20 [ 24.378292] [ 24.378337] Allocated by task 157: [ 24.378458] kasan_save_stack+0x3c/0x68 [ 24.379289] kasan_save_track+0x20/0x40 [ 24.379482] kasan_save_alloc_info+0x40/0x58 [ 24.380116] __kasan_krealloc+0x118/0x178 [ 24.381021] krealloc_noprof+0x128/0x360 [ 24.381591] krealloc_more_oob_helper+0x168/0x678 [ 24.382978] krealloc_more_oob+0x20/0x38 [ 24.383462] kunit_try_run_case+0x170/0x3f0 [ 24.384592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.384739] kthread+0x328/0x630 [ 24.384842] ret_from_fork+0x10/0x20 [ 24.385465] [ 24.385934] The buggy address belongs to the object at fff00000c5fb1e00 [ 24.385934] which belongs to the cache kmalloc-256 of size 256 [ 24.386606] The buggy address is located 5 bytes to the right of [ 24.386606] allocated 235-byte region [fff00000c5fb1e00, fff00000c5fb1eeb) [ 24.387109] [ 24.387350] The buggy address belongs to the physical page: [ 24.387433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb0 [ 24.387558] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.388041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.388237] page_type: f5(slab) [ 24.388333] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.388445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.388559] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.388670] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.388809] head: 0bfffe0000000001 ffffc1ffc317ec01 00000000ffffffff 00000000ffffffff [ 24.388920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.389027] page dumped because: kasan: bad access detected [ 24.389124] [ 24.389170] Memory state around the buggy address: [ 24.389274] fff00000c5fb1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.389375] fff00000c5fb1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.389473] >fff00000c5fb1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.389563] ^ [ 24.389664] fff00000c5fb1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.389783] fff00000c5fb1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.390343] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 24.327026] ================================================================== [ 24.327181] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 24.328027] Read of size 1 at addr fff00000c7800000 by task kunit_try_catch/155 [ 24.330723] [ 24.330881] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.331257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.331399] Hardware name: linux,dummy-virt (DT) [ 24.331479] Call trace: [ 24.331536] show_stack+0x20/0x38 (C) [ 24.331671] dump_stack_lvl+0x8c/0xd0 [ 24.331819] print_report+0x118/0x608 [ 24.331932] kasan_report+0xdc/0x128 [ 24.332054] __asan_report_load1_noabort+0x20/0x30 [ 24.332223] page_alloc_uaf+0x328/0x350 [ 24.333332] kunit_try_run_case+0x170/0x3f0 [ 24.333618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.333949] kthread+0x328/0x630 [ 24.334072] ret_from_fork+0x10/0x20 [ 24.334765] [ 24.334828] The buggy address belongs to the physical page: [ 24.334910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 24.335038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.335278] page_type: f0(buddy) [ 24.336369] raw: 0bfffe0000000000 fff00000ff616310 fff00000ff616310 0000000000000000 [ 24.336567] raw: 0000000000000000 000000000000000a 00000000f0000000 0000000000000000 [ 24.336660] page dumped because: kasan: bad access detected [ 24.337717] [ 24.338146] Memory state around the buggy address: [ 24.338299] fff00000c77fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.338501] fff00000c77fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.338856] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.338960] ^ [ 24.339213] fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.339660] fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.340264] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 24.262200] ================================================================== [ 24.262384] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 24.262533] Free of addr fff00000c77b0001 by task kunit_try_catch/151 [ 24.262701] [ 24.262960] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.263165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.264085] Hardware name: linux,dummy-virt (DT) [ 24.264177] Call trace: [ 24.264253] show_stack+0x20/0x38 (C) [ 24.264350] dump_stack_lvl+0x8c/0xd0 [ 24.264417] print_report+0x118/0x608 [ 24.264474] kasan_report_invalid_free+0xc0/0xe8 [ 24.264533] __kasan_kfree_large+0x5c/0xa8 [ 24.264588] free_large_kmalloc+0x64/0x190 [ 24.264642] kfree+0x270/0x3c8 [ 24.265240] kmalloc_large_invalid_free+0x108/0x270 [ 24.265477] kunit_try_run_case+0x170/0x3f0 [ 24.265799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.265927] kthread+0x328/0x630 [ 24.266038] ret_from_fork+0x10/0x20 [ 24.266157] [ 24.266749] The buggy address belongs to the physical page: [ 24.266987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 24.267315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.267455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.267587] page_type: f8(unknown) [ 24.268503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.269092] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.269234] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.269367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.270002] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff [ 24.270271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.270751] page dumped because: kasan: bad access detected [ 24.271205] [ 24.271452] Memory state around the buggy address: [ 24.271836] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.272174] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.272290] >fff00000c77b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.272380] ^ [ 24.272789] fff00000c77b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.272890] fff00000c77b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.272995] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 24.240326] ================================================================== [ 24.240482] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 24.240618] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/149 [ 24.240749] [ 24.240830] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.241025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.241085] Hardware name: linux,dummy-virt (DT) [ 24.241154] Call trace: [ 24.241209] show_stack+0x20/0x38 (C) [ 24.241345] dump_stack_lvl+0x8c/0xd0 [ 24.241462] print_report+0x118/0x608 [ 24.241571] kasan_report+0xdc/0x128 [ 24.241679] __asan_report_load1_noabort+0x20/0x30 [ 24.241814] kmalloc_large_uaf+0x2cc/0x2f8 [ 24.241923] kunit_try_run_case+0x170/0x3f0 [ 24.242039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.242165] kthread+0x328/0x630 [ 24.242273] ret_from_fork+0x10/0x20 [ 24.242384] [ 24.242432] The buggy address belongs to the physical page: [ 24.242501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 24.242614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.242831] raw: 0bfffe0000000000 ffffc1ffc31ded08 fff00000da448c40 0000000000000000 [ 24.242963] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 24.243283] page dumped because: kasan: bad access detected [ 24.243534] [ 24.245549] Memory state around the buggy address: [ 24.245637] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.245765] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.245863] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.245947] ^ [ 24.246825] fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.246955] fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.248327] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 24.201510] ================================================================== [ 24.201699] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 24.202247] Write of size 1 at addr fff00000c77b200a by task kunit_try_catch/147 [ 24.202788] [ 24.202907] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.203114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.203183] Hardware name: linux,dummy-virt (DT) [ 24.203259] Call trace: [ 24.203318] show_stack+0x20/0x38 (C) [ 24.203446] dump_stack_lvl+0x8c/0xd0 [ 24.203835] print_report+0x118/0x608 [ 24.204165] kasan_report+0xdc/0x128 [ 24.204500] __asan_report_store1_noabort+0x20/0x30 [ 24.205233] kmalloc_large_oob_right+0x278/0x2b8 [ 24.205389] kunit_try_run_case+0x170/0x3f0 [ 24.205603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.206169] kthread+0x328/0x630 [ 24.206414] ret_from_fork+0x10/0x20 [ 24.206909] [ 24.207047] The buggy address belongs to the physical page: [ 24.207400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 24.208353] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.208640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.209463] page_type: f8(unknown) [ 24.209725] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.211022] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.211775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.211926] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.213161] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff [ 24.213338] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.214197] page dumped because: kasan: bad access detected [ 24.214816] [ 24.215344] Memory state around the buggy address: [ 24.215594] fff00000c77b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.216033] fff00000c77b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.216728] >fff00000c77b2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.216832] ^ [ 24.216932] fff00000c77b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.217374] fff00000c77b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.217881] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 24.158658] ================================================================== [ 24.159043] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.159334] Write of size 1 at addr fff00000c77c9f00 by task kunit_try_catch/145 [ 24.159514] [ 24.159956] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.160198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.160878] Hardware name: linux,dummy-virt (DT) [ 24.160967] Call trace: [ 24.161044] show_stack+0x20/0x38 (C) [ 24.161736] dump_stack_lvl+0x8c/0xd0 [ 24.161861] print_report+0x118/0x608 [ 24.161983] kasan_report+0xdc/0x128 [ 24.162769] __asan_report_store1_noabort+0x20/0x30 [ 24.163614] kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.163760] kunit_try_run_case+0x170/0x3f0 [ 24.163892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.164604] kthread+0x328/0x630 [ 24.165241] ret_from_fork+0x10/0x20 [ 24.165668] [ 24.165765] Allocated by task 145: [ 24.166218] kasan_save_stack+0x3c/0x68 [ 24.166325] kasan_save_track+0x20/0x40 [ 24.166801] kasan_save_alloc_info+0x40/0x58 [ 24.167471] __kasan_kmalloc+0xd4/0xd8 [ 24.167624] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.167843] kmalloc_big_oob_right+0xb8/0x2f0 [ 24.168179] kunit_try_run_case+0x170/0x3f0 [ 24.168300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.168605] kthread+0x328/0x630 [ 24.168980] ret_from_fork+0x10/0x20 [ 24.169501] [ 24.169615] The buggy address belongs to the object at fff00000c77c8000 [ 24.169615] which belongs to the cache kmalloc-8k of size 8192 [ 24.169921] The buggy address is located 0 bytes to the right of [ 24.169921] allocated 7936-byte region [fff00000c77c8000, fff00000c77c9f00) [ 24.170076] [ 24.170223] The buggy address belongs to the physical page: [ 24.170523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c8 [ 24.170957] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.171182] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.171361] page_type: f5(slab) [ 24.171552] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.171699] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.171840] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.172175] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.172442] head: 0bfffe0000000003 ffffc1ffc31df201 00000000ffffffff 00000000ffffffff [ 24.172568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 24.172966] page dumped because: kasan: bad access detected [ 24.173073] [ 24.173348] Memory state around the buggy address: [ 24.173560] fff00000c77c9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.173662] fff00000c77c9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.173783] >fff00000c77c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.174832] ^ [ 24.175048] fff00000c77c9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.175184] fff00000c77ca000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.175274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 24.140091] ================================================================== [ 24.140253] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 24.140499] Write of size 1 at addr fff00000c5eeec78 by task kunit_try_catch/143 [ 24.140623] [ 24.140709] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.140900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.140963] Hardware name: linux,dummy-virt (DT) [ 24.141031] Call trace: [ 24.141078] show_stack+0x20/0x38 (C) [ 24.141200] dump_stack_lvl+0x8c/0xd0 [ 24.141334] print_report+0x118/0x608 [ 24.141445] kasan_report+0xdc/0x128 [ 24.141553] __asan_report_store1_noabort+0x20/0x30 [ 24.141671] kmalloc_track_caller_oob_right+0x418/0x488 [ 24.141817] kunit_try_run_case+0x170/0x3f0 [ 24.141936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.142061] kthread+0x328/0x630 [ 24.142169] ret_from_fork+0x10/0x20 [ 24.142286] [ 24.142328] Allocated by task 143: [ 24.142388] kasan_save_stack+0x3c/0x68 [ 24.142497] kasan_save_track+0x20/0x40 [ 24.142611] kasan_save_alloc_info+0x40/0x58 [ 24.142775] __kasan_kmalloc+0xd4/0xd8 [ 24.142884] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 24.143040] kmalloc_track_caller_oob_right+0x184/0x488 [ 24.143194] kunit_try_run_case+0x170/0x3f0 [ 24.143389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.143594] kthread+0x328/0x630 [ 24.143706] ret_from_fork+0x10/0x20 [ 24.143802] [ 24.143932] The buggy address belongs to the object at fff00000c5eeec00 [ 24.143932] which belongs to the cache kmalloc-128 of size 128 [ 24.144064] The buggy address is located 0 bytes to the right of [ 24.144064] allocated 120-byte region [fff00000c5eeec00, fff00000c5eeec78) [ 24.144239] [ 24.144368] The buggy address belongs to the physical page: [ 24.144463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.145175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.145328] page_type: f5(slab) [ 24.145435] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.145709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.145849] page dumped because: kasan: bad access detected [ 24.145992] [ 24.146038] Memory state around the buggy address: [ 24.146153] fff00000c5eeeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.146426] fff00000c5eeeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.146527] >fff00000c5eeec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.146613] ^ [ 24.146726] fff00000c5eeec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.146837] fff00000c5eeed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.146975] ================================================================== [ 24.130572] ================================================================== [ 24.130758] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 24.130924] Write of size 1 at addr fff00000c5eeeb78 by task kunit_try_catch/143 [ 24.131050] [ 24.131138] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.131335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.131403] Hardware name: linux,dummy-virt (DT) [ 24.131501] Call trace: [ 24.131568] show_stack+0x20/0x38 (C) [ 24.131781] dump_stack_lvl+0x8c/0xd0 [ 24.131995] print_report+0x118/0x608 [ 24.132230] kasan_report+0xdc/0x128 [ 24.132401] __asan_report_store1_noabort+0x20/0x30 [ 24.132646] kmalloc_track_caller_oob_right+0x40c/0x488 [ 24.132881] kunit_try_run_case+0x170/0x3f0 [ 24.133047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.133174] kthread+0x328/0x630 [ 24.133303] ret_from_fork+0x10/0x20 [ 24.133422] [ 24.133466] Allocated by task 143: [ 24.133535] kasan_save_stack+0x3c/0x68 [ 24.133632] kasan_save_track+0x20/0x40 [ 24.133750] kasan_save_alloc_info+0x40/0x58 [ 24.133900] __kasan_kmalloc+0xd4/0xd8 [ 24.134041] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 24.134172] kmalloc_track_caller_oob_right+0xa8/0x488 [ 24.134294] kunit_try_run_case+0x170/0x3f0 [ 24.134459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.134613] kthread+0x328/0x630 [ 24.134740] ret_from_fork+0x10/0x20 [ 24.134837] [ 24.134916] The buggy address belongs to the object at fff00000c5eeeb00 [ 24.134916] which belongs to the cache kmalloc-128 of size 128 [ 24.135054] The buggy address is located 0 bytes to the right of [ 24.135054] allocated 120-byte region [fff00000c5eeeb00, fff00000c5eeeb78) [ 24.135231] [ 24.135293] The buggy address belongs to the physical page: [ 24.135406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.135546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.135698] page_type: f5(slab) [ 24.135882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.136031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.136285] page dumped because: kasan: bad access detected [ 24.136517] [ 24.136621] Memory state around the buggy address: [ 24.136719] fff00000c5eeea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.136884] fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.137182] >fff00000c5eeeb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.137317] ^ [ 24.137577] fff00000c5eeeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.137730] fff00000c5eeec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.137840] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 24.040813] ================================================================== [ 24.041146] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 24.041383] Read of size 1 at addr fff00000c5ed4c7f by task kunit_try_catch/139 [ 24.041510] [ 24.041724] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.041988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.042405] Hardware name: linux,dummy-virt (DT) [ 24.042553] Call trace: [ 24.042729] show_stack+0x20/0x38 (C) [ 24.042955] dump_stack_lvl+0x8c/0xd0 [ 24.043190] print_report+0x118/0x608 [ 24.043506] kasan_report+0xdc/0x128 [ 24.043626] __asan_report_load1_noabort+0x20/0x30 [ 24.043802] kmalloc_oob_left+0x2ec/0x320 [ 24.044063] kunit_try_run_case+0x170/0x3f0 [ 24.044221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.045130] kthread+0x328/0x630 [ 24.045280] ret_from_fork+0x10/0x20 [ 24.045404] [ 24.045451] Allocated by task 9: [ 24.045516] kasan_save_stack+0x3c/0x68 [ 24.045616] kasan_save_track+0x20/0x40 [ 24.046102] kasan_save_alloc_info+0x40/0x58 [ 24.046210] __kasan_kmalloc+0xd4/0xd8 [ 24.046311] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 24.046425] kvasprintf+0xe0/0x180 [ 24.046520] __kthread_create_on_node+0x16c/0x350 [ 24.046611] kthread_create_on_node+0xe4/0x130 [ 24.046777] create_worker+0x380/0x6b8 [ 24.047158] worker_thread+0x5dc/0xf28 [ 24.047963] kthread+0x328/0x630 [ 24.048081] ret_from_fork+0x10/0x20 [ 24.048174] [ 24.048223] The buggy address belongs to the object at fff00000c5ed4c60 [ 24.048223] which belongs to the cache kmalloc-16 of size 16 [ 24.048354] The buggy address is located 19 bytes to the right of [ 24.048354] allocated 12-byte region [fff00000c5ed4c60, fff00000c5ed4c6c) [ 24.048502] [ 24.048549] The buggy address belongs to the physical page: [ 24.048618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed4 [ 24.050443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.051303] page_type: f5(slab) [ 24.051427] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.051579] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.051730] page dumped because: kasan: bad access detected [ 24.051805] [ 24.051879] Memory state around the buggy address: [ 24.051955] fff00000c5ed4b00: fa fb fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 24.052051] fff00000c5ed4b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.052155] >fff00000c5ed4c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 24.052321] ^ [ 24.052414] fff00000c5ed4c80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.052509] fff00000c5ed4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.052611] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 23.996572] ================================================================== [ 23.996669] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 23.996805] Read of size 1 at addr fff00000c5eee980 by task kunit_try_catch/137 [ 23.996922] [ 23.996992] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.997177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.997239] Hardware name: linux,dummy-virt (DT) [ 23.997321] Call trace: [ 23.997370] show_stack+0x20/0x38 (C) [ 23.997504] dump_stack_lvl+0x8c/0xd0 [ 23.997646] print_report+0x118/0x608 [ 23.998015] kasan_report+0xdc/0x128 [ 23.998153] __asan_report_load1_noabort+0x20/0x30 [ 23.999247] kmalloc_oob_right+0x5d0/0x660 [ 23.999430] kunit_try_run_case+0x170/0x3f0 [ 23.999568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.000286] kthread+0x328/0x630 [ 24.000443] ret_from_fork+0x10/0x20 [ 24.000562] [ 24.000606] Allocated by task 137: [ 24.001155] kasan_save_stack+0x3c/0x68 [ 24.001717] kasan_save_track+0x20/0x40 [ 24.001825] kasan_save_alloc_info+0x40/0x58 [ 24.001943] __kasan_kmalloc+0xd4/0xd8 [ 24.002053] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.002721] kmalloc_oob_right+0xb0/0x660 [ 24.003180] kunit_try_run_case+0x170/0x3f0 [ 24.003565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.003700] kthread+0x328/0x630 [ 24.003792] ret_from_fork+0x10/0x20 [ 24.003884] [ 24.004500] The buggy address belongs to the object at fff00000c5eee900 [ 24.004500] which belongs to the cache kmalloc-128 of size 128 [ 24.004667] The buggy address is located 13 bytes to the right of [ 24.004667] allocated 115-byte region [fff00000c5eee900, fff00000c5eee973) [ 24.004842] [ 24.004892] The buggy address belongs to the physical page: [ 24.005066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.005285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.005475] page_type: f5(slab) [ 24.005572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.005708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.005801] page dumped because: kasan: bad access detected [ 24.006242] [ 24.006302] Memory state around the buggy address: [ 24.006383] fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.006496] fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.006607] >fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.007062] ^ [ 24.007268] fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.007388] fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.007475] ================================================================== [ 23.985409] ================================================================== [ 23.985652] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 23.985956] Write of size 1 at addr fff00000c5eee978 by task kunit_try_catch/137 [ 23.986266] [ 23.986456] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.986749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.986807] Hardware name: linux,dummy-virt (DT) [ 23.986876] Call trace: [ 23.986931] show_stack+0x20/0x38 (C) [ 23.987063] dump_stack_lvl+0x8c/0xd0 [ 23.987193] print_report+0x118/0x608 [ 23.987326] kasan_report+0xdc/0x128 [ 23.987466] __asan_report_store1_noabort+0x20/0x30 [ 23.988308] kmalloc_oob_right+0x538/0x660 [ 23.989081] kunit_try_run_case+0x170/0x3f0 [ 23.989221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.989369] kthread+0x328/0x630 [ 23.989478] ret_from_fork+0x10/0x20 [ 23.989664] [ 23.989786] Allocated by task 137: [ 23.989858] kasan_save_stack+0x3c/0x68 [ 23.989963] kasan_save_track+0x20/0x40 [ 23.990223] kasan_save_alloc_info+0x40/0x58 [ 23.990319] __kasan_kmalloc+0xd4/0xd8 [ 23.990553] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.990655] kmalloc_oob_right+0xb0/0x660 [ 23.990781] kunit_try_run_case+0x170/0x3f0 [ 23.991241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.991370] kthread+0x328/0x630 [ 23.991495] ret_from_fork+0x10/0x20 [ 23.991850] [ 23.992120] The buggy address belongs to the object at fff00000c5eee900 [ 23.992120] which belongs to the cache kmalloc-128 of size 128 [ 23.992285] The buggy address is located 5 bytes to the right of [ 23.992285] allocated 115-byte region [fff00000c5eee900, fff00000c5eee973) [ 23.992620] [ 23.992669] The buggy address belongs to the physical page: [ 23.992784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 23.992924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.993032] page_type: f5(slab) [ 23.993122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.993238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.993343] page dumped because: kasan: bad access detected [ 23.993422] [ 23.993541] Memory state around the buggy address: [ 23.993696] fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.993812] fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.993928] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.994028] ^ [ 23.994128] fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.994429] fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.994936] ================================================================== [ 23.972652] ================================================================== [ 23.974135] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 23.976157] Write of size 1 at addr fff00000c5eee973 by task kunit_try_catch/137 [ 23.976383] [ 23.978053] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250530 #1 PREEMPT [ 23.978238] Tainted: [N]=TEST [ 23.978281] Hardware name: linux,dummy-virt (DT) [ 23.978552] Call trace: [ 23.978930] show_stack+0x20/0x38 (C) [ 23.979175] dump_stack_lvl+0x8c/0xd0 [ 23.979264] print_report+0x118/0x608 [ 23.979328] kasan_report+0xdc/0x128 [ 23.979384] __asan_report_store1_noabort+0x20/0x30 [ 23.979443] kmalloc_oob_right+0x5a4/0x660 [ 23.979501] kunit_try_run_case+0x170/0x3f0 [ 23.979565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.979629] kthread+0x328/0x630 [ 23.979709] ret_from_fork+0x10/0x20 [ 23.979914] [ 23.979965] Allocated by task 137: [ 23.980104] kasan_save_stack+0x3c/0x68 [ 23.980195] kasan_save_track+0x20/0x40 [ 23.980246] kasan_save_alloc_info+0x40/0x58 [ 23.980292] __kasan_kmalloc+0xd4/0xd8 [ 23.980336] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.980387] kmalloc_oob_right+0xb0/0x660 [ 23.980431] kunit_try_run_case+0x170/0x3f0 [ 23.980476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.980528] kthread+0x328/0x630 [ 23.980566] ret_from_fork+0x10/0x20 [ 23.980632] [ 23.980733] The buggy address belongs to the object at fff00000c5eee900 [ 23.980733] which belongs to the cache kmalloc-128 of size 128 [ 23.980853] The buggy address is located 0 bytes to the right of [ 23.980853] allocated 115-byte region [fff00000c5eee900, fff00000c5eee973) [ 23.980936] [ 23.981034] The buggy address belongs to the physical page: [ 23.981243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 23.981577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.981956] page_type: f5(slab) [ 23.982296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.982375] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.982513] page dumped because: kasan: bad access detected [ 23.982591] [ 23.982626] Memory state around the buggy address: [ 23.983102] fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.983194] fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.983265] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.983333] ^ [ 23.983434] fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.983485] fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.983562] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 114.291945] WARNING: CPU: 1 PID: 705 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 114.293474] Modules linked in: [ 114.293752] CPU: 1 UID: 0 PID: 705 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 PREEMPT [ 114.294201] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 114.294451] Hardware name: linux,dummy-virt (DT) [ 114.294747] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 114.295316] pc : intlog10+0x38/0x48 [ 114.296217] lr : intlog10_test+0xe4/0x200 [ 114.297006] sp : ffff800082247c10 [ 114.297767] x29: ffff800082247c90 x28: 0000000000000000 x27: 0000000000000000 [ 114.299228] x26: 1ffe000018f3f501 x25: 0000000000000000 x24: ffff800082247ce0 [ 114.300400] x23: ffff800082247d00 x22: 0000000000000000 x21: 1ffff00010448f82 [ 114.301373] x20: ffffa1cc1b0d30c0 x19: ffff800080087990 x18: 0000000008914d6e [ 114.302321] x17: 00000000a572806a x16: fff00000c0975c3c x15: 0000000047722e45 [ 114.303922] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cd89 x12: ffff743983def979 [ 114.304919] x11: 1ffff43983def978 x10: ffff743983def978 x9 : ffffa1cc1866b66c [ 114.305877] x8 : ffffa1cc1ef7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 114.306869] x5 : ffff700010448f82 x4 : 1ffff00010010f3a x3 : 1ffff4398361a618 [ 114.307708] x2 : 1ffff4398361a618 x1 : 0000000000000003 x0 : 0000000000000000 [ 114.308674] Call trace: [ 114.309132] intlog10+0x38/0x48 (P) [ 114.309745] kunit_try_run_case+0x170/0x3f0 [ 114.310369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 114.311264] kthread+0x328/0x630 [ 114.311776] ret_from_fork+0x10/0x20 [ 114.312313] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 114.195652] WARNING: CPU: 0 PID: 687 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 114.197754] Modules linked in: [ 114.198500] CPU: 0 UID: 0 PID: 687 Comm: kunit_try_catch Tainted: G B D N 6.15.0-next-20250530 #1 PREEMPT [ 114.199898] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 114.200409] Hardware name: linux,dummy-virt (DT) [ 114.201203] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 114.201841] pc : intlog2+0xd8/0xf8 [ 114.202358] lr : intlog2_test+0xe4/0x200 [ 114.202972] sp : ffff800082217c10 [ 114.203425] x29: ffff800082217c90 x28: 0000000000000000 x27: 0000000000000000 [ 114.204436] x26: 1ffe000018860341 x25: 0000000000000000 x24: ffff800082217ce0 [ 114.205164] x23: ffff800082217d00 x22: 0000000000000000 x21: 1ffff00010442f82 [ 114.206197] x20: ffffa1cc1b0d2fc0 x19: ffff800080087990 x18: 00000000e0ebf60a [ 114.207367] x17: 000000002c88365b x16: fff00000c097583c x15: 00000000b0a9061a [ 114.208448] x14: 00000000f1f1f1f1 x13: 1ffe00001b488989 x12: ffff743983def979 [ 114.209348] x11: 1ffff43983def978 x10: ffff743983def978 x9 : ffffa1cc1866b86c [ 114.210437] x8 : ffffa1cc1ef7cbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 114.211558] x5 : ffff700010442f82 x4 : 1ffff00010010f3a x3 : 1ffff4398361a5f8 [ 114.212489] x2 : 1ffff4398361a5f8 x1 : 0000000000000003 x0 : 0000000000000000 [ 114.213449] Call trace: [ 114.213798] intlog2+0xd8/0xf8 (P) [ 114.214228] kunit_try_run_case+0x170/0x3f0 [ 114.214726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 114.215303] kthread+0x328/0x630 [ 114.215891] ret_from_fork+0x10/0x20 [ 114.216417] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[ 395.575855] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[ 395.141169] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>