Date
June 3, 2025, 7:38 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
Automatically assigned
[ 19.921394] ================================================================== [ 19.921718] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 19.921906] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.922520] [ 19.922741] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.923072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.923109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.923138] Call Trace: [ 19.923167] <TASK> [ 19.923218] dump_stack_lvl+0x73/0xb0 [ 19.923272] print_report+0xd1/0x650 [ 19.923302] ? __virt_addr_valid+0x1db/0x2d0 [ 19.923331] ? strncpy_from_user+0x2e/0x1d0 [ 19.923405] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.923439] ? strncpy_from_user+0x2e/0x1d0 [ 19.923478] kasan_report+0x141/0x180 [ 19.923555] ? strncpy_from_user+0x2e/0x1d0 [ 19.923624] kasan_check_range+0x10c/0x1c0 [ 19.923666] __kasan_check_write+0x18/0x20 [ 19.923710] strncpy_from_user+0x2e/0x1d0 [ 19.923738] ? __kasan_check_read+0x15/0x20 [ 19.923764] copy_user_test_oob+0x760/0x10f0 [ 19.923795] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.923823] ? finish_task_switch.isra.0+0x153/0x700 [ 19.923854] ? __switch_to+0x47/0xf50 [ 19.923886] ? __schedule+0x10cc/0x2b60 [ 19.923916] ? __pfx_read_tsc+0x10/0x10 [ 19.923944] ? ktime_get_ts64+0x86/0x230 [ 19.923973] kunit_try_run_case+0x1a5/0x480 [ 19.924001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.924026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.924055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.924083] ? __kthread_parkme+0x82/0x180 [ 19.924108] ? preempt_count_sub+0x50/0x80 [ 19.924137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.924165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.924211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.924247] kthread+0x337/0x6f0 [ 19.924275] ? trace_preempt_on+0x20/0xc0 [ 19.924304] ? __pfx_kthread+0x10/0x10 [ 19.924330] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.924359] ? calculate_sigpending+0x7b/0xa0 [ 19.924391] ? __pfx_kthread+0x10/0x10 [ 19.924525] ret_from_fork+0x116/0x1d0 [ 19.924554] ? __pfx_kthread+0x10/0x10 [ 19.924578] ret_from_fork_asm+0x1a/0x30 [ 19.924615] </TASK> [ 19.924630] [ 19.936363] Allocated by task 302: [ 19.936734] kasan_save_stack+0x45/0x70 [ 19.936878] kasan_save_track+0x18/0x40 [ 19.937158] kasan_save_alloc_info+0x3b/0x50 [ 19.937504] __kasan_kmalloc+0xb7/0xc0 [ 19.937604] __kmalloc_noprof+0x1c9/0x500 [ 19.937907] kunit_kmalloc_array+0x25/0x60 [ 19.938030] copy_user_test_oob+0xab/0x10f0 [ 19.938331] kunit_try_run_case+0x1a5/0x480 [ 19.938487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.938708] kthread+0x337/0x6f0 [ 19.938921] ret_from_fork+0x116/0x1d0 [ 19.939032] ret_from_fork_asm+0x1a/0x30 [ 19.939179] [ 19.939504] The buggy address belongs to the object at ffff888103341c00 [ 19.939504] which belongs to the cache kmalloc-128 of size 128 [ 19.940039] The buggy address is located 0 bytes inside of [ 19.940039] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.940265] [ 19.940400] The buggy address belongs to the physical page: [ 19.940770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.941352] flags: 0x200000000000000(node=0|zone=2) [ 19.941756] page_type: f5(slab) [ 19.941906] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.942745] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.942917] page dumped because: kasan: bad access detected [ 19.943037] [ 19.943182] Memory state around the buggy address: [ 19.943782] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.944228] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.944634] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.945115] ^ [ 19.945466] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.945918] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.946407] ================================================================== [ 19.947518] ================================================================== [ 19.948309] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 19.948544] Write of size 1 at addr ffff888103341c78 by task kunit_try_catch/302 [ 19.948712] [ 19.948885] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.948947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.948963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.948990] Call Trace: [ 19.949016] <TASK> [ 19.949043] dump_stack_lvl+0x73/0xb0 [ 19.949075] print_report+0xd1/0x650 [ 19.949105] ? __virt_addr_valid+0x1db/0x2d0 [ 19.949132] ? strncpy_from_user+0x1a5/0x1d0 [ 19.949156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.949182] ? strncpy_from_user+0x1a5/0x1d0 [ 19.949207] kasan_report+0x141/0x180 [ 19.949233] ? strncpy_from_user+0x1a5/0x1d0 [ 19.949261] __asan_report_store1_noabort+0x1b/0x30 [ 19.949322] strncpy_from_user+0x1a5/0x1d0 [ 19.949364] copy_user_test_oob+0x760/0x10f0 [ 19.949399] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.949424] ? finish_task_switch.isra.0+0x153/0x700 [ 19.949451] ? __switch_to+0x47/0xf50 [ 19.949495] ? __schedule+0x10cc/0x2b60 [ 19.949524] ? __pfx_read_tsc+0x10/0x10 [ 19.949550] ? ktime_get_ts64+0x86/0x230 [ 19.949579] kunit_try_run_case+0x1a5/0x480 [ 19.949607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.949630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.949659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.949687] ? __kthread_parkme+0x82/0x180 [ 19.949712] ? preempt_count_sub+0x50/0x80 [ 19.949739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.949764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.949794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.949821] kthread+0x337/0x6f0 [ 19.949846] ? trace_preempt_on+0x20/0xc0 [ 19.949873] ? __pfx_kthread+0x10/0x10 [ 19.949897] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.949925] ? calculate_sigpending+0x7b/0xa0 [ 19.949953] ? __pfx_kthread+0x10/0x10 [ 19.949979] ret_from_fork+0x116/0x1d0 [ 19.950001] ? __pfx_kthread+0x10/0x10 [ 19.950028] ret_from_fork_asm+0x1a/0x30 [ 19.950065] </TASK> [ 19.950080] [ 19.957166] Allocated by task 302: [ 19.957508] kasan_save_stack+0x45/0x70 [ 19.957796] kasan_save_track+0x18/0x40 [ 19.958032] kasan_save_alloc_info+0x3b/0x50 [ 19.958172] __kasan_kmalloc+0xb7/0xc0 [ 19.958439] __kmalloc_noprof+0x1c9/0x500 [ 19.958590] kunit_kmalloc_array+0x25/0x60 [ 19.958796] copy_user_test_oob+0xab/0x10f0 [ 19.959022] kunit_try_run_case+0x1a5/0x480 [ 19.959293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.959539] kthread+0x337/0x6f0 [ 19.959734] ret_from_fork+0x116/0x1d0 [ 19.959849] ret_from_fork_asm+0x1a/0x30 [ 19.959963] [ 19.960111] The buggy address belongs to the object at ffff888103341c00 [ 19.960111] which belongs to the cache kmalloc-128 of size 128 [ 19.960524] The buggy address is located 0 bytes to the right of [ 19.960524] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.961193] [ 19.961328] The buggy address belongs to the physical page: [ 19.961554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.961739] flags: 0x200000000000000(node=0|zone=2) [ 19.961874] page_type: f5(slab) [ 19.961980] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.962151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.962314] page dumped because: kasan: bad access detected [ 19.962700] [ 19.962845] Memory state around the buggy address: [ 19.963359] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.963875] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.964061] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.964263] ^ [ 19.964782] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.964993] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.965418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
Automatically assigned
[ 19.896782] ================================================================== [ 19.897205] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 19.897388] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.897564] [ 19.897817] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.897885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.897903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.897929] Call Trace: [ 19.897952] <TASK> [ 19.897972] dump_stack_lvl+0x73/0xb0 [ 19.898003] print_report+0xd1/0x650 [ 19.898031] ? __virt_addr_valid+0x1db/0x2d0 [ 19.898059] ? copy_user_test_oob+0x604/0x10f0 [ 19.898084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.898109] ? copy_user_test_oob+0x604/0x10f0 [ 19.898135] kasan_report+0x141/0x180 [ 19.898159] ? copy_user_test_oob+0x604/0x10f0 [ 19.898190] kasan_check_range+0x10c/0x1c0 [ 19.898230] __kasan_check_read+0x15/0x20 [ 19.898256] copy_user_test_oob+0x604/0x10f0 [ 19.898286] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.898311] ? finish_task_switch.isra.0+0x153/0x700 [ 19.898337] ? __switch_to+0x47/0xf50 [ 19.898366] ? __schedule+0x10cc/0x2b60 [ 19.898392] ? __pfx_read_tsc+0x10/0x10 [ 19.898415] ? ktime_get_ts64+0x86/0x230 [ 19.898443] kunit_try_run_case+0x1a5/0x480 [ 19.898480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.898506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.898531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.898557] ? __kthread_parkme+0x82/0x180 [ 19.898579] ? preempt_count_sub+0x50/0x80 [ 19.898603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.898625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.898650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.898676] kthread+0x337/0x6f0 [ 19.898696] ? trace_preempt_on+0x20/0xc0 [ 19.898720] ? __pfx_kthread+0x10/0x10 [ 19.898741] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.898764] ? calculate_sigpending+0x7b/0xa0 [ 19.898789] ? __pfx_kthread+0x10/0x10 [ 19.898812] ret_from_fork+0x116/0x1d0 [ 19.898831] ? __pfx_kthread+0x10/0x10 [ 19.898852] ret_from_fork_asm+0x1a/0x30 [ 19.898885] </TASK> [ 19.898899] [ 19.908156] Allocated by task 302: [ 19.908547] kasan_save_stack+0x45/0x70 [ 19.908893] kasan_save_track+0x18/0x40 [ 19.909193] kasan_save_alloc_info+0x3b/0x50 [ 19.909733] __kasan_kmalloc+0xb7/0xc0 [ 19.909949] __kmalloc_noprof+0x1c9/0x500 [ 19.910156] kunit_kmalloc_array+0x25/0x60 [ 19.910728] copy_user_test_oob+0xab/0x10f0 [ 19.911148] kunit_try_run_case+0x1a5/0x480 [ 19.911271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.911842] kthread+0x337/0x6f0 [ 19.912179] ret_from_fork+0x116/0x1d0 [ 19.912299] ret_from_fork_asm+0x1a/0x30 [ 19.912420] [ 19.912853] The buggy address belongs to the object at ffff888103341c00 [ 19.912853] which belongs to the cache kmalloc-128 of size 128 [ 19.913694] The buggy address is located 0 bytes inside of [ 19.913694] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.914211] [ 19.914286] The buggy address belongs to the physical page: [ 19.914844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.915225] flags: 0x200000000000000(node=0|zone=2) [ 19.915479] page_type: f5(slab) [ 19.915695] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.916026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.916984] page dumped because: kasan: bad access detected [ 19.917651] [ 19.917771] Memory state around the buggy address: [ 19.917904] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.918207] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.918615] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.918773] ^ [ 19.919260] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.919529] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.920053] ================================================================== [ 19.877627] ================================================================== [ 19.878378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 19.878688] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.878995] [ 19.879085] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.879140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.879167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.879194] Call Trace: [ 19.879248] <TASK> [ 19.879273] dump_stack_lvl+0x73/0xb0 [ 19.879305] print_report+0xd1/0x650 [ 19.879345] ? __virt_addr_valid+0x1db/0x2d0 [ 19.879381] ? copy_user_test_oob+0x557/0x10f0 [ 19.879421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.879451] ? copy_user_test_oob+0x557/0x10f0 [ 19.879491] kasan_report+0x141/0x180 [ 19.879531] ? copy_user_test_oob+0x557/0x10f0 [ 19.879564] kasan_check_range+0x10c/0x1c0 [ 19.879603] __kasan_check_write+0x18/0x20 [ 19.879628] copy_user_test_oob+0x557/0x10f0 [ 19.879666] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.879696] ? finish_task_switch.isra.0+0x153/0x700 [ 19.879724] ? __switch_to+0x47/0xf50 [ 19.879766] ? __schedule+0x10cc/0x2b60 [ 19.879794] ? __pfx_read_tsc+0x10/0x10 [ 19.879830] ? ktime_get_ts64+0x86/0x230 [ 19.879859] kunit_try_run_case+0x1a5/0x480 [ 19.879899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.879924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.879951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.879991] ? __kthread_parkme+0x82/0x180 [ 19.880015] ? preempt_count_sub+0x50/0x80 [ 19.880053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.880079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.880107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.880134] kthread+0x337/0x6f0 [ 19.880157] ? trace_preempt_on+0x20/0xc0 [ 19.880184] ? __pfx_kthread+0x10/0x10 [ 19.880207] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.880232] ? calculate_sigpending+0x7b/0xa0 [ 19.880260] ? __pfx_kthread+0x10/0x10 [ 19.880285] ret_from_fork+0x116/0x1d0 [ 19.880307] ? __pfx_kthread+0x10/0x10 [ 19.880330] ret_from_fork_asm+0x1a/0x30 [ 19.880364] </TASK> [ 19.880380] [ 19.887537] Allocated by task 302: [ 19.887814] kasan_save_stack+0x45/0x70 [ 19.888030] kasan_save_track+0x18/0x40 [ 19.888142] kasan_save_alloc_info+0x3b/0x50 [ 19.888256] __kasan_kmalloc+0xb7/0xc0 [ 19.888358] __kmalloc_noprof+0x1c9/0x500 [ 19.888477] kunit_kmalloc_array+0x25/0x60 [ 19.888851] copy_user_test_oob+0xab/0x10f0 [ 19.889188] kunit_try_run_case+0x1a5/0x480 [ 19.889563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.889968] kthread+0x337/0x6f0 [ 19.890080] ret_from_fork+0x116/0x1d0 [ 19.890318] ret_from_fork_asm+0x1a/0x30 [ 19.890568] [ 19.890697] The buggy address belongs to the object at ffff888103341c00 [ 19.890697] which belongs to the cache kmalloc-128 of size 128 [ 19.891152] The buggy address is located 0 bytes inside of [ 19.891152] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.891684] [ 19.891751] The buggy address belongs to the physical page: [ 19.891883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.892059] flags: 0x200000000000000(node=0|zone=2) [ 19.892541] page_type: f5(slab) [ 19.892795] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.893275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.893608] page dumped because: kasan: bad access detected [ 19.893727] [ 19.893786] Memory state around the buggy address: [ 19.894136] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.894609] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894761] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.894901] ^ [ 19.895040] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.895184] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.895826] ================================================================== [ 19.858238] ================================================================== [ 19.858613] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 19.859065] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.859514] [ 19.859645] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.859700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.859737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.859767] Call Trace: [ 19.859789] <TASK> [ 19.859819] dump_stack_lvl+0x73/0xb0 [ 19.859854] print_report+0xd1/0x650 [ 19.859880] ? __virt_addr_valid+0x1db/0x2d0 [ 19.859908] ? copy_user_test_oob+0x4aa/0x10f0 [ 19.859934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.859960] ? copy_user_test_oob+0x4aa/0x10f0 [ 19.859986] kasan_report+0x141/0x180 [ 19.860012] ? copy_user_test_oob+0x4aa/0x10f0 [ 19.860042] kasan_check_range+0x10c/0x1c0 [ 19.860068] __kasan_check_read+0x15/0x20 [ 19.860091] copy_user_test_oob+0x4aa/0x10f0 [ 19.860118] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.860158] ? finish_task_switch.isra.0+0x153/0x700 [ 19.860185] ? __switch_to+0x47/0xf50 [ 19.860228] ? __schedule+0x10cc/0x2b60 [ 19.860256] ? __pfx_read_tsc+0x10/0x10 [ 19.860280] ? ktime_get_ts64+0x86/0x230 [ 19.860310] kunit_try_run_case+0x1a5/0x480 [ 19.860335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.860357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.860397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.860426] ? __kthread_parkme+0x82/0x180 [ 19.860451] ? preempt_count_sub+0x50/0x80 [ 19.860495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.860519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.860547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.860575] kthread+0x337/0x6f0 [ 19.860597] ? trace_preempt_on+0x20/0xc0 [ 19.860625] ? __pfx_kthread+0x10/0x10 [ 19.860649] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.860673] ? calculate_sigpending+0x7b/0xa0 [ 19.860713] ? __pfx_kthread+0x10/0x10 [ 19.860740] ret_from_fork+0x116/0x1d0 [ 19.860763] ? __pfx_kthread+0x10/0x10 [ 19.860801] ret_from_fork_asm+0x1a/0x30 [ 19.860836] </TASK> [ 19.860861] [ 19.868423] Allocated by task 302: [ 19.868614] kasan_save_stack+0x45/0x70 [ 19.868735] kasan_save_track+0x18/0x40 [ 19.868843] kasan_save_alloc_info+0x3b/0x50 [ 19.868959] __kasan_kmalloc+0xb7/0xc0 [ 19.869062] __kmalloc_noprof+0x1c9/0x500 [ 19.869171] kunit_kmalloc_array+0x25/0x60 [ 19.869277] copy_user_test_oob+0xab/0x10f0 [ 19.869389] kunit_try_run_case+0x1a5/0x480 [ 19.869508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.869640] kthread+0x337/0x6f0 [ 19.869892] ret_from_fork+0x116/0x1d0 [ 19.870180] ret_from_fork_asm+0x1a/0x30 [ 19.870576] [ 19.870733] The buggy address belongs to the object at ffff888103341c00 [ 19.870733] which belongs to the cache kmalloc-128 of size 128 [ 19.871796] The buggy address is located 0 bytes inside of [ 19.871796] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.872148] [ 19.872238] The buggy address belongs to the physical page: [ 19.872660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.872921] flags: 0x200000000000000(node=0|zone=2) [ 19.873053] page_type: f5(slab) [ 19.873346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.873814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.874171] page dumped because: kasan: bad access detected [ 19.874439] [ 19.874591] Memory state around the buggy address: [ 19.874815] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.875136] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.875481] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.875818] ^ [ 19.876123] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.876746] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.876967] ================================================================== [ 19.839187] ================================================================== [ 19.839620] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 19.839910] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.840190] [ 19.840391] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.840470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.840489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.840517] Call Trace: [ 19.840555] <TASK> [ 19.840584] dump_stack_lvl+0x73/0xb0 [ 19.840629] print_report+0xd1/0x650 [ 19.840662] ? __virt_addr_valid+0x1db/0x2d0 [ 19.840701] ? copy_user_test_oob+0x3fd/0x10f0 [ 19.840733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.840760] ? copy_user_test_oob+0x3fd/0x10f0 [ 19.840789] kasan_report+0x141/0x180 [ 19.840814] ? copy_user_test_oob+0x3fd/0x10f0 [ 19.840846] kasan_check_range+0x10c/0x1c0 [ 19.840873] __kasan_check_write+0x18/0x20 [ 19.840894] copy_user_test_oob+0x3fd/0x10f0 [ 19.840923] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.840959] ? finish_task_switch.isra.0+0x153/0x700 [ 19.840988] ? __switch_to+0x47/0xf50 [ 19.841027] ? __schedule+0x10cc/0x2b60 [ 19.841058] ? __pfx_read_tsc+0x10/0x10 [ 19.841083] ? ktime_get_ts64+0x86/0x230 [ 19.841123] kunit_try_run_case+0x1a5/0x480 [ 19.841151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.841175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.841244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.841273] ? __kthread_parkme+0x82/0x180 [ 19.841298] ? preempt_count_sub+0x50/0x80 [ 19.841324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.841348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.841376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.841401] kthread+0x337/0x6f0 [ 19.841424] ? trace_preempt_on+0x20/0xc0 [ 19.841451] ? __pfx_kthread+0x10/0x10 [ 19.841495] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.841520] ? calculate_sigpending+0x7b/0xa0 [ 19.841547] ? __pfx_kthread+0x10/0x10 [ 19.841571] ret_from_fork+0x116/0x1d0 [ 19.841593] ? __pfx_kthread+0x10/0x10 [ 19.841616] ret_from_fork_asm+0x1a/0x30 [ 19.841651] </TASK> [ 19.841667] [ 19.848216] Allocated by task 302: [ 19.848322] kasan_save_stack+0x45/0x70 [ 19.848663] kasan_save_track+0x18/0x40 [ 19.848980] kasan_save_alloc_info+0x3b/0x50 [ 19.849387] __kasan_kmalloc+0xb7/0xc0 [ 19.849749] __kmalloc_noprof+0x1c9/0x500 [ 19.850020] kunit_kmalloc_array+0x25/0x60 [ 19.850196] copy_user_test_oob+0xab/0x10f0 [ 19.850497] kunit_try_run_case+0x1a5/0x480 [ 19.850617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.850756] kthread+0x337/0x6f0 [ 19.851028] ret_from_fork+0x116/0x1d0 [ 19.851439] ret_from_fork_asm+0x1a/0x30 [ 19.851796] [ 19.851889] The buggy address belongs to the object at ffff888103341c00 [ 19.851889] which belongs to the cache kmalloc-128 of size 128 [ 19.852225] The buggy address is located 0 bytes inside of [ 19.852225] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.852919] [ 19.853093] The buggy address belongs to the physical page: [ 19.853386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.853665] flags: 0x200000000000000(node=0|zone=2) [ 19.853802] page_type: f5(slab) [ 19.853908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.854079] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.854326] page dumped because: kasan: bad access detected [ 19.854763] [ 19.854918] Memory state around the buggy address: [ 19.855328] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.855778] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855936] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.856243] ^ [ 19.856775] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.857084] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.857478] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user: Failure
Automatically assigned
[ 19.814114] ================================================================== [ 19.814477] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70 [ 19.814669] Read of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.814989] [ 19.815190] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.815255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.815271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.815298] Call Trace: [ 19.815325] <TASK> [ 19.815362] dump_stack_lvl+0x73/0xb0 [ 19.815416] print_report+0xd1/0x650 [ 19.815445] ? __virt_addr_valid+0x1db/0x2d0 [ 19.815490] ? _copy_to_user+0x3c/0x70 [ 19.815515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.815541] ? _copy_to_user+0x3c/0x70 [ 19.815579] kasan_report+0x141/0x180 [ 19.815605] ? _copy_to_user+0x3c/0x70 [ 19.815647] kasan_check_range+0x10c/0x1c0 [ 19.815675] __kasan_check_read+0x15/0x20 [ 19.815707] _copy_to_user+0x3c/0x70 [ 19.815736] copy_user_test_oob+0x364/0x10f0 [ 19.815766] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.815805] ? finish_task_switch.isra.0+0x153/0x700 [ 19.815833] ? __switch_to+0x47/0xf50 [ 19.815862] ? __schedule+0x10cc/0x2b60 [ 19.815889] ? __pfx_read_tsc+0x10/0x10 [ 19.815913] ? ktime_get_ts64+0x86/0x230 [ 19.815942] kunit_try_run_case+0x1a5/0x480 [ 19.815967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.815990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.816018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.816045] ? __kthread_parkme+0x82/0x180 [ 19.816069] ? preempt_count_sub+0x50/0x80 [ 19.816095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.816121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.816147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.816189] kthread+0x337/0x6f0 [ 19.816212] ? trace_preempt_on+0x20/0xc0 [ 19.816252] ? __pfx_kthread+0x10/0x10 [ 19.816277] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.816333] ? calculate_sigpending+0x7b/0xa0 [ 19.816362] ? __pfx_kthread+0x10/0x10 [ 19.816388] ret_from_fork+0x116/0x1d0 [ 19.816410] ? __pfx_kthread+0x10/0x10 [ 19.816435] ret_from_fork_asm+0x1a/0x30 [ 19.816487] </TASK> [ 19.816503] [ 19.823412] Allocated by task 302: [ 19.823729] kasan_save_stack+0x45/0x70 [ 19.824040] kasan_save_track+0x18/0x40 [ 19.824379] kasan_save_alloc_info+0x3b/0x50 [ 19.824511] __kasan_kmalloc+0xb7/0xc0 [ 19.824620] __kmalloc_noprof+0x1c9/0x500 [ 19.824729] kunit_kmalloc_array+0x25/0x60 [ 19.824929] copy_user_test_oob+0xab/0x10f0 [ 19.825265] kunit_try_run_case+0x1a5/0x480 [ 19.825613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.826030] kthread+0x337/0x6f0 [ 19.826277] ret_from_fork+0x116/0x1d0 [ 19.826489] ret_from_fork_asm+0x1a/0x30 [ 19.826718] [ 19.826886] The buggy address belongs to the object at ffff888103341c00 [ 19.826886] which belongs to the cache kmalloc-128 of size 128 [ 19.827686] The buggy address is located 0 bytes inside of [ 19.827686] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.827943] [ 19.828012] The buggy address belongs to the physical page: [ 19.828219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.828808] flags: 0x200000000000000(node=0|zone=2) [ 19.829371] page_type: f5(slab) [ 19.829650] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.829956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.830311] page dumped because: kasan: bad access detected [ 19.830444] [ 19.830521] Memory state around the buggy address: [ 19.830645] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.831060] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.831822] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.832178] ^ [ 19.832586] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832907] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.833259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user: Failure
Automatically assigned
[ 19.784279] ================================================================== [ 19.785572] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 19.785808] Write of size 121 at addr ffff888103341c00 by task kunit_try_catch/302 [ 19.786007] [ 19.786152] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.786242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.786261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.786290] Call Trace: [ 19.786311] <TASK> [ 19.786342] dump_stack_lvl+0x73/0xb0 [ 19.786383] print_report+0xd1/0x650 [ 19.786415] ? __virt_addr_valid+0x1db/0x2d0 [ 19.786449] ? _copy_from_user+0x32/0x90 [ 19.786492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.786524] ? _copy_from_user+0x32/0x90 [ 19.786549] kasan_report+0x141/0x180 [ 19.786576] ? _copy_from_user+0x32/0x90 [ 19.786606] kasan_check_range+0x10c/0x1c0 [ 19.786636] __kasan_check_write+0x18/0x20 [ 19.786659] _copy_from_user+0x32/0x90 [ 19.786687] copy_user_test_oob+0x2be/0x10f0 [ 19.786719] ? __pfx_copy_user_test_oob+0x10/0x10 [ 19.786747] ? finish_task_switch.isra.0+0x153/0x700 [ 19.786779] ? __switch_to+0x47/0xf50 [ 19.786811] ? __schedule+0x10cc/0x2b60 [ 19.786842] ? __pfx_read_tsc+0x10/0x10 [ 19.786869] ? ktime_get_ts64+0x86/0x230 [ 19.786901] kunit_try_run_case+0x1a5/0x480 [ 19.786928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.786950] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.786981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.787009] ? __kthread_parkme+0x82/0x180 [ 19.787035] ? preempt_count_sub+0x50/0x80 [ 19.787061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.787086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.787115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.787145] kthread+0x337/0x6f0 [ 19.787170] ? trace_preempt_on+0x20/0xc0 [ 19.787219] ? __pfx_kthread+0x10/0x10 [ 19.787296] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.787324] ? calculate_sigpending+0x7b/0xa0 [ 19.787381] ? __pfx_kthread+0x10/0x10 [ 19.787410] ret_from_fork+0x116/0x1d0 [ 19.787435] ? __pfx_kthread+0x10/0x10 [ 19.787474] ret_from_fork_asm+0x1a/0x30 [ 19.787518] </TASK> [ 19.787535] [ 19.797737] Allocated by task 302: [ 19.798079] kasan_save_stack+0x45/0x70 [ 19.798222] kasan_save_track+0x18/0x40 [ 19.798327] kasan_save_alloc_info+0x3b/0x50 [ 19.798885] __kasan_kmalloc+0xb7/0xc0 [ 19.799067] __kmalloc_noprof+0x1c9/0x500 [ 19.799505] kunit_kmalloc_array+0x25/0x60 [ 19.799701] copy_user_test_oob+0xab/0x10f0 [ 19.799819] kunit_try_run_case+0x1a5/0x480 [ 19.799926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.800098] kthread+0x337/0x6f0 [ 19.800583] ret_from_fork+0x116/0x1d0 [ 19.800960] ret_from_fork_asm+0x1a/0x30 [ 19.801274] [ 19.801884] The buggy address belongs to the object at ffff888103341c00 [ 19.801884] which belongs to the cache kmalloc-128 of size 128 [ 19.802708] The buggy address is located 0 bytes inside of [ 19.802708] allocated 120-byte region [ffff888103341c00, ffff888103341c78) [ 19.803200] [ 19.803380] The buggy address belongs to the physical page: [ 19.803861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.804218] flags: 0x200000000000000(node=0|zone=2) [ 19.804365] page_type: f5(slab) [ 19.804756] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.805408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.805779] page dumped because: kasan: bad access detected [ 19.806015] [ 19.806113] Memory state around the buggy address: [ 19.807035] ffff888103341b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.807282] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.807754] >ffff888103341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.808205] ^ [ 19.808638] ffff888103341c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.808880] ffff888103341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.809468] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
Automatically assigned
[ 19.735912] ================================================================== [ 19.736550] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 19.736778] Write of size 8 at addr ffff888103341b78 by task kunit_try_catch/298 [ 19.737438] [ 19.737628] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.737714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.737732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.737761] Call Trace: [ 19.737780] <TASK> [ 19.737805] dump_stack_lvl+0x73/0xb0 [ 19.737840] print_report+0xd1/0x650 [ 19.737867] ? __virt_addr_valid+0x1db/0x2d0 [ 19.737895] ? copy_to_kernel_nofault+0x99/0x260 [ 19.737921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.737949] ? copy_to_kernel_nofault+0x99/0x260 [ 19.737976] kasan_report+0x141/0x180 [ 19.738002] ? copy_to_kernel_nofault+0x99/0x260 [ 19.738033] kasan_check_range+0x10c/0x1c0 [ 19.738060] __kasan_check_write+0x18/0x20 [ 19.738082] copy_to_kernel_nofault+0x99/0x260 [ 19.738110] copy_to_kernel_nofault_oob+0x288/0x560 [ 19.738136] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 19.738162] ? finish_task_switch.isra.0+0x153/0x700 [ 19.738189] ? __schedule+0x10cc/0x2b60 [ 19.738244] ? trace_hardirqs_on+0x37/0xe0 [ 19.738280] ? __pfx_read_tsc+0x10/0x10 [ 19.738307] ? ktime_get_ts64+0x86/0x230 [ 19.738336] kunit_try_run_case+0x1a5/0x480 [ 19.738362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.738415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.738444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.738484] ? __kthread_parkme+0x82/0x180 [ 19.738508] ? preempt_count_sub+0x50/0x80 [ 19.738535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.738559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.738586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.738613] kthread+0x337/0x6f0 [ 19.738636] ? trace_preempt_on+0x20/0xc0 [ 19.738661] ? __pfx_kthread+0x10/0x10 [ 19.738706] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.738735] ? calculate_sigpending+0x7b/0xa0 [ 19.738764] ? __pfx_kthread+0x10/0x10 [ 19.738790] ret_from_fork+0x116/0x1d0 [ 19.738814] ? __pfx_kthread+0x10/0x10 [ 19.738838] ret_from_fork_asm+0x1a/0x30 [ 19.738873] </TASK> [ 19.738888] [ 19.750637] Allocated by task 298: [ 19.751079] kasan_save_stack+0x45/0x70 [ 19.751482] kasan_save_track+0x18/0x40 [ 19.751978] kasan_save_alloc_info+0x3b/0x50 [ 19.752361] __kasan_kmalloc+0xb7/0xc0 [ 19.752675] __kmalloc_cache_noprof+0x189/0x420 [ 19.753438] copy_to_kernel_nofault_oob+0x12f/0x560 [ 19.753634] kunit_try_run_case+0x1a5/0x480 [ 19.754000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.754549] kthread+0x337/0x6f0 [ 19.754800] ret_from_fork+0x116/0x1d0 [ 19.754934] ret_from_fork_asm+0x1a/0x30 [ 19.755231] [ 19.755369] The buggy address belongs to the object at ffff888103341b00 [ 19.755369] which belongs to the cache kmalloc-128 of size 128 [ 19.755821] The buggy address is located 0 bytes to the right of [ 19.755821] allocated 120-byte region [ffff888103341b00, ffff888103341b78) [ 19.756271] [ 19.756342] The buggy address belongs to the physical page: [ 19.756594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.757248] flags: 0x200000000000000(node=0|zone=2) [ 19.757601] page_type: f5(slab) [ 19.758512] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.758709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.759240] page dumped because: kasan: bad access detected [ 19.759611] [ 19.760044] Memory state around the buggy address: [ 19.760186] ffff888103341a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.760584] ffff888103341a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.760946] >ffff888103341b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.761315] ^ [ 19.761610] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.762122] ffff888103341c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.762541] ================================================================== [ 19.710632] ================================================================== [ 19.711742] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 19.712563] Read of size 8 at addr ffff888103341b78 by task kunit_try_catch/298 [ 19.713096] [ 19.713522] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.713600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.713618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.713646] Call Trace: [ 19.713666] <TASK> [ 19.713703] dump_stack_lvl+0x73/0xb0 [ 19.713754] print_report+0xd1/0x650 [ 19.713785] ? __virt_addr_valid+0x1db/0x2d0 [ 19.713816] ? copy_to_kernel_nofault+0x225/0x260 [ 19.713844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.713872] ? copy_to_kernel_nofault+0x225/0x260 [ 19.713955] kasan_report+0x141/0x180 [ 19.714026] ? copy_to_kernel_nofault+0x225/0x260 [ 19.714065] __asan_report_load8_noabort+0x18/0x20 [ 19.714093] copy_to_kernel_nofault+0x225/0x260 [ 19.714123] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 19.714151] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 19.714178] ? finish_task_switch.isra.0+0x153/0x700 [ 19.714232] ? __schedule+0x10cc/0x2b60 [ 19.714308] ? trace_hardirqs_on+0x37/0xe0 [ 19.714347] ? __pfx_read_tsc+0x10/0x10 [ 19.714375] ? ktime_get_ts64+0x86/0x230 [ 19.714406] kunit_try_run_case+0x1a5/0x480 [ 19.714436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.714479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.714511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.714539] ? __kthread_parkme+0x82/0x180 [ 19.714565] ? preempt_count_sub+0x50/0x80 [ 19.714591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.714617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.714646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.714673] kthread+0x337/0x6f0 [ 19.714696] ? trace_preempt_on+0x20/0xc0 [ 19.714809] ? __pfx_kthread+0x10/0x10 [ 19.714851] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.714881] ? calculate_sigpending+0x7b/0xa0 [ 19.714911] ? __pfx_kthread+0x10/0x10 [ 19.714935] ret_from_fork+0x116/0x1d0 [ 19.714962] ? __pfx_kthread+0x10/0x10 [ 19.714985] ret_from_fork_asm+0x1a/0x30 [ 19.715022] </TASK> [ 19.715037] [ 19.726029] Allocated by task 298: [ 19.726311] kasan_save_stack+0x45/0x70 [ 19.726606] kasan_save_track+0x18/0x40 [ 19.726739] kasan_save_alloc_info+0x3b/0x50 [ 19.726943] __kasan_kmalloc+0xb7/0xc0 [ 19.727126] __kmalloc_cache_noprof+0x189/0x420 [ 19.727395] copy_to_kernel_nofault_oob+0x12f/0x560 [ 19.727545] kunit_try_run_case+0x1a5/0x480 [ 19.727667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.728083] kthread+0x337/0x6f0 [ 19.728358] ret_from_fork+0x116/0x1d0 [ 19.728486] ret_from_fork_asm+0x1a/0x30 [ 19.728607] [ 19.728829] The buggy address belongs to the object at ffff888103341b00 [ 19.728829] which belongs to the cache kmalloc-128 of size 128 [ 19.729489] The buggy address is located 0 bytes to the right of [ 19.729489] allocated 120-byte region [ffff888103341b00, ffff888103341b78) [ 19.730020] [ 19.730237] The buggy address belongs to the physical page: [ 19.730615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 19.730848] flags: 0x200000000000000(node=0|zone=2) [ 19.730998] page_type: f5(slab) [ 19.731336] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.731858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.732038] page dumped because: kasan: bad access detected [ 19.732175] [ 19.732351] Memory state around the buggy address: [ 19.732775] ffff888103341a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.733235] ffff888103341a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.733504] >ffff888103341b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.733672] ^ [ 19.734129] ffff888103341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.734511] ffff888103341c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.734826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 18.629415] ================================================================== [ 18.629961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 18.630385] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.630622] [ 18.630760] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.630846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.630871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.630915] Call Trace: [ 18.630958] <TASK> [ 18.630995] dump_stack_lvl+0x73/0xb0 [ 18.631056] print_report+0xd1/0x650 [ 18.631107] ? __virt_addr_valid+0x1db/0x2d0 [ 18.631155] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.631199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.631247] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.631295] kasan_report+0x141/0x180 [ 18.631350] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.631407] __asan_report_load4_noabort+0x18/0x20 [ 18.631466] kasan_atomics_helper+0x4a02/0x5450 [ 18.631522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.631570] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.631616] ? kasan_atomics+0x152/0x310 [ 18.631673] kasan_atomics+0x1dc/0x310 [ 18.631724] ? __pfx_kasan_atomics+0x10/0x10 [ 18.631778] ? __pfx_read_tsc+0x10/0x10 [ 18.631823] ? ktime_get_ts64+0x86/0x230 [ 18.631879] kunit_try_run_case+0x1a5/0x480 [ 18.631927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.631973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.632030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.632085] ? __kthread_parkme+0x82/0x180 [ 18.632127] ? preempt_count_sub+0x50/0x80 [ 18.632175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.632220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.632274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.632325] kthread+0x337/0x6f0 [ 18.632370] ? trace_preempt_on+0x20/0xc0 [ 18.632422] ? __pfx_kthread+0x10/0x10 [ 18.632516] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.632573] ? calculate_sigpending+0x7b/0xa0 [ 18.632629] ? __pfx_kthread+0x10/0x10 [ 18.632677] ret_from_fork+0x116/0x1d0 [ 18.632718] ? __pfx_kthread+0x10/0x10 [ 18.632766] ret_from_fork_asm+0x1a/0x30 [ 18.632838] </TASK> [ 18.632866] [ 18.643315] Allocated by task 282: [ 18.643722] kasan_save_stack+0x45/0x70 [ 18.644119] kasan_save_track+0x18/0x40 [ 18.644448] kasan_save_alloc_info+0x3b/0x50 [ 18.644707] __kasan_kmalloc+0xb7/0xc0 [ 18.645030] __kmalloc_cache_noprof+0x189/0x420 [ 18.645429] kasan_atomics+0x95/0x310 [ 18.645666] kunit_try_run_case+0x1a5/0x480 [ 18.646033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.646333] kthread+0x337/0x6f0 [ 18.646594] ret_from_fork+0x116/0x1d0 [ 18.646903] ret_from_fork_asm+0x1a/0x30 [ 18.647286] [ 18.647480] The buggy address belongs to the object at ffff8881033ecb00 [ 18.647480] which belongs to the cache kmalloc-64 of size 64 [ 18.647939] The buggy address is located 0 bytes to the right of [ 18.647939] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.648430] [ 18.648635] The buggy address belongs to the physical page: [ 18.649082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.649722] flags: 0x200000000000000(node=0|zone=2) [ 18.650142] page_type: f5(slab) [ 18.650476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.651045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.651391] page dumped because: kasan: bad access detected [ 18.653617] [ 18.653705] Memory state around the buggy address: [ 18.653828] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.653980] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.654123] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.654507] ^ [ 18.655026] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.655658] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.656250] ================================================================== [ 18.360905] ================================================================== [ 18.361403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 18.361744] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.362388] [ 18.362849] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.362971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.363003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.363051] Call Trace: [ 18.363101] <TASK> [ 18.363147] dump_stack_lvl+0x73/0xb0 [ 18.363533] print_report+0xd1/0x650 [ 18.363612] ? __virt_addr_valid+0x1db/0x2d0 [ 18.363673] ? kasan_atomics_helper+0xde0/0x5450 [ 18.363728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.363787] ? kasan_atomics_helper+0xde0/0x5450 [ 18.363840] kasan_report+0x141/0x180 [ 18.363897] ? kasan_atomics_helper+0xde0/0x5450 [ 18.363960] kasan_check_range+0x10c/0x1c0 [ 18.364010] __kasan_check_write+0x18/0x20 [ 18.364050] kasan_atomics_helper+0xde0/0x5450 [ 18.364093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.364131] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.364175] ? kasan_atomics+0x152/0x310 [ 18.364246] kasan_atomics+0x1dc/0x310 [ 18.364304] ? __pfx_kasan_atomics+0x10/0x10 [ 18.364354] ? __pfx_read_tsc+0x10/0x10 [ 18.364422] ? ktime_get_ts64+0x86/0x230 [ 18.364493] kunit_try_run_case+0x1a5/0x480 [ 18.364545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.364591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.364642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.364694] ? __kthread_parkme+0x82/0x180 [ 18.364741] ? preempt_count_sub+0x50/0x80 [ 18.364796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.364841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.364886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.364931] kthread+0x337/0x6f0 [ 18.364974] ? trace_preempt_on+0x20/0xc0 [ 18.365025] ? __pfx_kthread+0x10/0x10 [ 18.365073] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.365119] ? calculate_sigpending+0x7b/0xa0 [ 18.365189] ? __pfx_kthread+0x10/0x10 [ 18.365276] ret_from_fork+0x116/0x1d0 [ 18.365324] ? __pfx_kthread+0x10/0x10 [ 18.365374] ret_from_fork_asm+0x1a/0x30 [ 18.365449] </TASK> [ 18.365490] [ 18.376424] Allocated by task 282: [ 18.376845] kasan_save_stack+0x45/0x70 [ 18.377160] kasan_save_track+0x18/0x40 [ 18.377534] kasan_save_alloc_info+0x3b/0x50 [ 18.377757] __kasan_kmalloc+0xb7/0xc0 [ 18.377952] __kmalloc_cache_noprof+0x189/0x420 [ 18.378176] kasan_atomics+0x95/0x310 [ 18.378566] kunit_try_run_case+0x1a5/0x480 [ 18.378947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.379409] kthread+0x337/0x6f0 [ 18.379747] ret_from_fork+0x116/0x1d0 [ 18.380117] ret_from_fork_asm+0x1a/0x30 [ 18.380565] [ 18.380714] The buggy address belongs to the object at ffff8881033ecb00 [ 18.380714] which belongs to the cache kmalloc-64 of size 64 [ 18.381212] The buggy address is located 0 bytes to the right of [ 18.381212] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.381669] [ 18.381804] The buggy address belongs to the physical page: [ 18.382048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.382367] flags: 0x200000000000000(node=0|zone=2) [ 18.382874] page_type: f5(slab) [ 18.383284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.383926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.384609] page dumped because: kasan: bad access detected [ 18.385043] [ 18.385205] Memory state around the buggy address: [ 18.385499] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.385964] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.386269] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.386827] ^ [ 18.387299] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.387649] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.387934] ================================================================== [ 18.490344] ================================================================== [ 18.491037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 18.491768] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.492418] [ 18.492682] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.492801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.492832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.492884] Call Trace: [ 18.492955] <TASK> [ 18.493003] dump_stack_lvl+0x73/0xb0 [ 18.493076] print_report+0xd1/0x650 [ 18.493126] ? __virt_addr_valid+0x1db/0x2d0 [ 18.493178] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.493267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.493346] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.493396] kasan_report+0x141/0x180 [ 18.493451] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.493525] __asan_report_load4_noabort+0x18/0x20 [ 18.493569] kasan_atomics_helper+0x4a36/0x5450 [ 18.493617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.493669] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.493720] ? kasan_atomics+0x152/0x310 [ 18.493779] kasan_atomics+0x1dc/0x310 [ 18.493826] ? __pfx_kasan_atomics+0x10/0x10 [ 18.493901] ? __pfx_read_tsc+0x10/0x10 [ 18.493947] ? ktime_get_ts64+0x86/0x230 [ 18.494008] kunit_try_run_case+0x1a5/0x480 [ 18.494063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.494110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.494148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.494176] ? __kthread_parkme+0x82/0x180 [ 18.494245] ? preempt_count_sub+0x50/0x80 [ 18.494279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.494304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.494333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.494363] kthread+0x337/0x6f0 [ 18.494386] ? trace_preempt_on+0x20/0xc0 [ 18.494414] ? __pfx_kthread+0x10/0x10 [ 18.494438] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.494486] ? calculate_sigpending+0x7b/0xa0 [ 18.494517] ? __pfx_kthread+0x10/0x10 [ 18.494543] ret_from_fork+0x116/0x1d0 [ 18.494565] ? __pfx_kthread+0x10/0x10 [ 18.494590] ret_from_fork_asm+0x1a/0x30 [ 18.494626] </TASK> [ 18.494641] [ 18.510039] Allocated by task 282: [ 18.510578] kasan_save_stack+0x45/0x70 [ 18.511160] kasan_save_track+0x18/0x40 [ 18.511750] kasan_save_alloc_info+0x3b/0x50 [ 18.512033] __kasan_kmalloc+0xb7/0xc0 [ 18.512991] __kmalloc_cache_noprof+0x189/0x420 [ 18.513627] kasan_atomics+0x95/0x310 [ 18.513931] kunit_try_run_case+0x1a5/0x480 [ 18.514312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.514782] kthread+0x337/0x6f0 [ 18.515015] ret_from_fork+0x116/0x1d0 [ 18.515385] ret_from_fork_asm+0x1a/0x30 [ 18.515794] [ 18.516004] The buggy address belongs to the object at ffff8881033ecb00 [ 18.516004] which belongs to the cache kmalloc-64 of size 64 [ 18.516611] The buggy address is located 0 bytes to the right of [ 18.516611] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.517597] [ 18.517741] The buggy address belongs to the physical page: [ 18.518349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.519035] flags: 0x200000000000000(node=0|zone=2) [ 18.519508] page_type: f5(slab) [ 18.519889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.520243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.520880] page dumped because: kasan: bad access detected [ 18.521180] [ 18.521371] Memory state around the buggy address: [ 18.521714] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.522038] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.522470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.523067] ^ [ 18.523536] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524105] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524634] ================================================================== [ 18.763625] ================================================================== [ 18.763894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 18.764161] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.766156] [ 18.766541] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.766660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.766687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.766725] Call Trace: [ 18.766757] <TASK> [ 18.766784] dump_stack_lvl+0x73/0xb0 [ 18.766850] print_report+0xd1/0x650 [ 18.766884] ? __virt_addr_valid+0x1db/0x2d0 [ 18.766914] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.766941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.766969] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.766995] kasan_report+0x141/0x180 [ 18.767022] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.767054] __asan_report_load4_noabort+0x18/0x20 [ 18.767079] kasan_atomics_helper+0x49ce/0x5450 [ 18.767106] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.767132] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.767158] ? kasan_atomics+0x152/0x310 [ 18.767191] kasan_atomics+0x1dc/0x310 [ 18.767271] ? __pfx_kasan_atomics+0x10/0x10 [ 18.767335] ? __pfx_read_tsc+0x10/0x10 [ 18.767409] ? ktime_get_ts64+0x86/0x230 [ 18.767483] kunit_try_run_case+0x1a5/0x480 [ 18.767532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.767557] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.767589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.767618] ? __kthread_parkme+0x82/0x180 [ 18.767643] ? preempt_count_sub+0x50/0x80 [ 18.767673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.767698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.767726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.767754] kthread+0x337/0x6f0 [ 18.767778] ? trace_preempt_on+0x20/0xc0 [ 18.767805] ? __pfx_kthread+0x10/0x10 [ 18.767829] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.767855] ? calculate_sigpending+0x7b/0xa0 [ 18.767884] ? __pfx_kthread+0x10/0x10 [ 18.767908] ret_from_fork+0x116/0x1d0 [ 18.767931] ? __pfx_kthread+0x10/0x10 [ 18.767954] ret_from_fork_asm+0x1a/0x30 [ 18.767991] </TASK> [ 18.768005] [ 18.783062] Allocated by task 282: [ 18.783362] kasan_save_stack+0x45/0x70 [ 18.783864] kasan_save_track+0x18/0x40 [ 18.784447] kasan_save_alloc_info+0x3b/0x50 [ 18.784690] __kasan_kmalloc+0xb7/0xc0 [ 18.785196] __kmalloc_cache_noprof+0x189/0x420 [ 18.785654] kasan_atomics+0x95/0x310 [ 18.785873] kunit_try_run_case+0x1a5/0x480 [ 18.786113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.786639] kthread+0x337/0x6f0 [ 18.787006] ret_from_fork+0x116/0x1d0 [ 18.787255] ret_from_fork_asm+0x1a/0x30 [ 18.787485] [ 18.787610] The buggy address belongs to the object at ffff8881033ecb00 [ 18.787610] which belongs to the cache kmalloc-64 of size 64 [ 18.788506] The buggy address is located 0 bytes to the right of [ 18.788506] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.789260] [ 18.789426] The buggy address belongs to the physical page: [ 18.789939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.790441] flags: 0x200000000000000(node=0|zone=2) [ 18.790849] page_type: f5(slab) [ 18.791051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.791373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.792015] page dumped because: kasan: bad access detected [ 18.792486] [ 18.792708] Memory state around the buggy address: [ 18.793070] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.793768] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.794057] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.794612] ^ [ 18.795074] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.795588] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.795979] ================================================================== [ 18.111607] ================================================================== [ 18.112732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 18.113193] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.114235] [ 18.114606] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.114717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.114737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.114764] Call Trace: [ 18.114790] <TASK> [ 18.114815] dump_stack_lvl+0x73/0xb0 [ 18.114856] print_report+0xd1/0x650 [ 18.114885] ? __virt_addr_valid+0x1db/0x2d0 [ 18.114912] ? kasan_atomics_helper+0x8f9/0x5450 [ 18.114937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.114963] ? kasan_atomics_helper+0x8f9/0x5450 [ 18.114988] kasan_report+0x141/0x180 [ 18.115013] ? kasan_atomics_helper+0x8f9/0x5450 [ 18.115043] kasan_check_range+0x10c/0x1c0 [ 18.115070] __kasan_check_write+0x18/0x20 [ 18.115094] kasan_atomics_helper+0x8f9/0x5450 [ 18.115120] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.115145] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.115171] ? kasan_atomics+0x152/0x310 [ 18.115211] kasan_atomics+0x1dc/0x310 [ 18.115272] ? __pfx_kasan_atomics+0x10/0x10 [ 18.115302] ? __pfx_read_tsc+0x10/0x10 [ 18.115328] ? ktime_get_ts64+0x86/0x230 [ 18.115373] kunit_try_run_case+0x1a5/0x480 [ 18.115401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.115424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.115473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.115508] ? __kthread_parkme+0x82/0x180 [ 18.115535] ? preempt_count_sub+0x50/0x80 [ 18.115564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.115589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.115619] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.115648] kthread+0x337/0x6f0 [ 18.115672] ? trace_preempt_on+0x20/0xc0 [ 18.115700] ? __pfx_kthread+0x10/0x10 [ 18.115723] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.115749] ? calculate_sigpending+0x7b/0xa0 [ 18.115778] ? __pfx_kthread+0x10/0x10 [ 18.115803] ret_from_fork+0x116/0x1d0 [ 18.115825] ? __pfx_kthread+0x10/0x10 [ 18.115849] ret_from_fork_asm+0x1a/0x30 [ 18.115885] </TASK> [ 18.115899] [ 18.128229] Allocated by task 282: [ 18.128687] kasan_save_stack+0x45/0x70 [ 18.129157] kasan_save_track+0x18/0x40 [ 18.129590] kasan_save_alloc_info+0x3b/0x50 [ 18.129992] __kasan_kmalloc+0xb7/0xc0 [ 18.130409] __kmalloc_cache_noprof+0x189/0x420 [ 18.130785] kasan_atomics+0x95/0x310 [ 18.130954] kunit_try_run_case+0x1a5/0x480 [ 18.131332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.131662] kthread+0x337/0x6f0 [ 18.131997] ret_from_fork+0x116/0x1d0 [ 18.132349] ret_from_fork_asm+0x1a/0x30 [ 18.132604] [ 18.132814] The buggy address belongs to the object at ffff8881033ecb00 [ 18.132814] which belongs to the cache kmalloc-64 of size 64 [ 18.133615] The buggy address is located 0 bytes to the right of [ 18.133615] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.134357] [ 18.134535] The buggy address belongs to the physical page: [ 18.134936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.135422] flags: 0x200000000000000(node=0|zone=2) [ 18.135810] page_type: f5(slab) [ 18.136136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.136623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.137071] page dumped because: kasan: bad access detected [ 18.137521] [ 18.137643] Memory state around the buggy address: [ 18.138054] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.138513] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.138998] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.139494] ^ [ 18.139854] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.140357] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.140786] ================================================================== [ 18.028049] ================================================================== [ 18.028388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 18.028662] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.030075] [ 18.030635] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.030770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.030794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.030824] Call Trace: [ 18.030851] <TASK> [ 18.030878] dump_stack_lvl+0x73/0xb0 [ 18.030924] print_report+0xd1/0x650 [ 18.030952] ? __virt_addr_valid+0x1db/0x2d0 [ 18.030981] ? kasan_atomics_helper+0x72f/0x5450 [ 18.031006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.031032] ? kasan_atomics_helper+0x72f/0x5450 [ 18.031059] kasan_report+0x141/0x180 [ 18.031085] ? kasan_atomics_helper+0x72f/0x5450 [ 18.031114] kasan_check_range+0x10c/0x1c0 [ 18.031141] __kasan_check_write+0x18/0x20 [ 18.031164] kasan_atomics_helper+0x72f/0x5450 [ 18.031206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.031268] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.031311] ? kasan_atomics+0x152/0x310 [ 18.031362] kasan_atomics+0x1dc/0x310 [ 18.031395] ? __pfx_kasan_atomics+0x10/0x10 [ 18.031425] ? __pfx_read_tsc+0x10/0x10 [ 18.031452] ? ktime_get_ts64+0x86/0x230 [ 18.031505] kunit_try_run_case+0x1a5/0x480 [ 18.031532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.031556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.031587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.031615] ? __kthread_parkme+0x82/0x180 [ 18.031641] ? preempt_count_sub+0x50/0x80 [ 18.031670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.031695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.031723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.031752] kthread+0x337/0x6f0 [ 18.031777] ? trace_preempt_on+0x20/0xc0 [ 18.031804] ? __pfx_kthread+0x10/0x10 [ 18.031829] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.031855] ? calculate_sigpending+0x7b/0xa0 [ 18.031884] ? __pfx_kthread+0x10/0x10 [ 18.031910] ret_from_fork+0x116/0x1d0 [ 18.031933] ? __pfx_kthread+0x10/0x10 [ 18.031958] ret_from_fork_asm+0x1a/0x30 [ 18.031994] </TASK> [ 18.032009] [ 18.040721] Allocated by task 282: [ 18.041046] kasan_save_stack+0x45/0x70 [ 18.041434] kasan_save_track+0x18/0x40 [ 18.041758] kasan_save_alloc_info+0x3b/0x50 [ 18.042088] __kasan_kmalloc+0xb7/0xc0 [ 18.042435] __kmalloc_cache_noprof+0x189/0x420 [ 18.042814] kasan_atomics+0x95/0x310 [ 18.043123] kunit_try_run_case+0x1a5/0x480 [ 18.043520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.043946] kthread+0x337/0x6f0 [ 18.044291] ret_from_fork+0x116/0x1d0 [ 18.044641] ret_from_fork_asm+0x1a/0x30 [ 18.044957] [ 18.045137] The buggy address belongs to the object at ffff8881033ecb00 [ 18.045137] which belongs to the cache kmalloc-64 of size 64 [ 18.045874] The buggy address is located 0 bytes to the right of [ 18.045874] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.046560] [ 18.046755] The buggy address belongs to the physical page: [ 18.047072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.047552] flags: 0x200000000000000(node=0|zone=2) [ 18.047796] page_type: f5(slab) [ 18.047995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.048341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.048866] page dumped because: kasan: bad access detected [ 18.049362] [ 18.049552] Memory state around the buggy address: [ 18.049945] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.050495] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.051027] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.051579] ^ [ 18.051815] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.052339] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.052854] ================================================================== [ 19.083913] ================================================================== [ 19.085114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 19.085810] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.086497] [ 19.086751] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.086866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.086900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.086950] Call Trace: [ 19.086999] <TASK> [ 19.087058] dump_stack_lvl+0x73/0xb0 [ 19.087139] print_report+0xd1/0x650 [ 19.087195] ? __virt_addr_valid+0x1db/0x2d0 [ 19.087266] ? kasan_atomics_helper+0x1818/0x5450 [ 19.087362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.087472] ? kasan_atomics_helper+0x1818/0x5450 [ 19.087526] kasan_report+0x141/0x180 [ 19.087586] ? kasan_atomics_helper+0x1818/0x5450 [ 19.087639] kasan_check_range+0x10c/0x1c0 [ 19.087694] __kasan_check_write+0x18/0x20 [ 19.087744] kasan_atomics_helper+0x1818/0x5450 [ 19.087800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.087853] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.087903] ? kasan_atomics+0x152/0x310 [ 19.087963] kasan_atomics+0x1dc/0x310 [ 19.088015] ? __pfx_kasan_atomics+0x10/0x10 [ 19.088068] ? __pfx_read_tsc+0x10/0x10 [ 19.088099] ? ktime_get_ts64+0x86/0x230 [ 19.088131] kunit_try_run_case+0x1a5/0x480 [ 19.088157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.088181] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.088424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.088514] ? __kthread_parkme+0x82/0x180 [ 19.088558] ? preempt_count_sub+0x50/0x80 [ 19.088588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.088613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.088642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.088669] kthread+0x337/0x6f0 [ 19.088692] ? trace_preempt_on+0x20/0xc0 [ 19.088718] ? __pfx_kthread+0x10/0x10 [ 19.088740] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.088765] ? calculate_sigpending+0x7b/0xa0 [ 19.088793] ? __pfx_kthread+0x10/0x10 [ 19.088815] ret_from_fork+0x116/0x1d0 [ 19.088839] ? __pfx_kthread+0x10/0x10 [ 19.088863] ret_from_fork_asm+0x1a/0x30 [ 19.088897] </TASK> [ 19.088912] [ 19.099798] Allocated by task 282: [ 19.100208] kasan_save_stack+0x45/0x70 [ 19.100660] kasan_save_track+0x18/0x40 [ 19.100909] kasan_save_alloc_info+0x3b/0x50 [ 19.101151] __kasan_kmalloc+0xb7/0xc0 [ 19.101530] __kmalloc_cache_noprof+0x189/0x420 [ 19.101949] kasan_atomics+0x95/0x310 [ 19.102185] kunit_try_run_case+0x1a5/0x480 [ 19.102527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.102813] kthread+0x337/0x6f0 [ 19.103104] ret_from_fork+0x116/0x1d0 [ 19.103545] ret_from_fork_asm+0x1a/0x30 [ 19.103894] [ 19.104052] The buggy address belongs to the object at ffff8881033ecb00 [ 19.104052] which belongs to the cache kmalloc-64 of size 64 [ 19.104782] The buggy address is located 0 bytes to the right of [ 19.104782] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.105298] [ 19.105450] The buggy address belongs to the physical page: [ 19.105724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.106098] flags: 0x200000000000000(node=0|zone=2) [ 19.106418] page_type: f5(slab) [ 19.106747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.107380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.108054] page dumped because: kasan: bad access detected [ 19.108498] [ 19.108744] Memory state around the buggy address: [ 19.109156] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.109722] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.110074] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.110838] ^ [ 19.111100] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.111729] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.112095] ================================================================== [ 19.234483] ================================================================== [ 19.235133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 19.235898] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.236726] [ 19.237033] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.237146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.237180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.237282] Call Trace: [ 19.237342] <TASK> [ 19.237388] dump_stack_lvl+0x73/0xb0 [ 19.237506] print_report+0xd1/0x650 [ 19.237559] ? __virt_addr_valid+0x1db/0x2d0 [ 19.237594] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.237620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.237645] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.237668] kasan_report+0x141/0x180 [ 19.237692] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.237738] kasan_check_range+0x10c/0x1c0 [ 19.237776] __kasan_check_write+0x18/0x20 [ 19.237799] kasan_atomics_helper+0x1b22/0x5450 [ 19.237825] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.237852] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.237876] ? kasan_atomics+0x152/0x310 [ 19.237904] kasan_atomics+0x1dc/0x310 [ 19.237930] ? __pfx_kasan_atomics+0x10/0x10 [ 19.237955] ? __pfx_read_tsc+0x10/0x10 [ 19.237980] ? ktime_get_ts64+0x86/0x230 [ 19.238011] kunit_try_run_case+0x1a5/0x480 [ 19.238036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.238058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.238085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.238111] ? __kthread_parkme+0x82/0x180 [ 19.238135] ? preempt_count_sub+0x50/0x80 [ 19.238163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.238186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.238261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.238290] kthread+0x337/0x6f0 [ 19.238313] ? trace_preempt_on+0x20/0xc0 [ 19.238339] ? __pfx_kthread+0x10/0x10 [ 19.238362] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.238386] ? calculate_sigpending+0x7b/0xa0 [ 19.238413] ? __pfx_kthread+0x10/0x10 [ 19.238436] ret_from_fork+0x116/0x1d0 [ 19.238475] ? __pfx_kthread+0x10/0x10 [ 19.238501] ret_from_fork_asm+0x1a/0x30 [ 19.238537] </TASK> [ 19.238550] [ 19.251874] Allocated by task 282: [ 19.252423] kasan_save_stack+0x45/0x70 [ 19.252881] kasan_save_track+0x18/0x40 [ 19.253160] kasan_save_alloc_info+0x3b/0x50 [ 19.254274] __kasan_kmalloc+0xb7/0xc0 [ 19.254708] __kmalloc_cache_noprof+0x189/0x420 [ 19.255071] kasan_atomics+0x95/0x310 [ 19.256555] kunit_try_run_case+0x1a5/0x480 [ 19.256784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.257252] kthread+0x337/0x6f0 [ 19.257443] ret_from_fork+0x116/0x1d0 [ 19.257836] ret_from_fork_asm+0x1a/0x30 [ 19.258023] [ 19.258169] The buggy address belongs to the object at ffff8881033ecb00 [ 19.258169] which belongs to the cache kmalloc-64 of size 64 [ 19.258667] The buggy address is located 0 bytes to the right of [ 19.258667] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.259212] [ 19.259396] The buggy address belongs to the physical page: [ 19.259817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.260407] flags: 0x200000000000000(node=0|zone=2) [ 19.260772] page_type: f5(slab) [ 19.261093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.262646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.263060] page dumped because: kasan: bad access detected [ 19.263402] [ 19.263581] Memory state around the buggy address: [ 19.263836] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.264502] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.265070] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.265703] ^ [ 19.266144] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.266780] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.267120] ================================================================== [ 17.873113] ================================================================== [ 17.874007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 17.874385] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.875044] [ 17.875476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.875606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.875642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.875698] Call Trace: [ 17.875742] <TASK> [ 17.875782] dump_stack_lvl+0x73/0xb0 [ 17.875852] print_report+0xd1/0x650 [ 17.876263] ? __virt_addr_valid+0x1db/0x2d0 [ 17.876321] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.876365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.876406] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.876439] kasan_report+0x141/0x180 [ 17.876491] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.876533] __asan_report_store4_noabort+0x1b/0x30 [ 17.876567] kasan_atomics_helper+0x4b3a/0x5450 [ 17.876604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.876638] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.876671] ? kasan_atomics+0x152/0x310 [ 17.876737] kasan_atomics+0x1dc/0x310 [ 17.876776] ? __pfx_kasan_atomics+0x10/0x10 [ 17.876817] ? __pfx_read_tsc+0x10/0x10 [ 17.876856] ? ktime_get_ts64+0x86/0x230 [ 17.876903] kunit_try_run_case+0x1a5/0x480 [ 17.876944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.876973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.877004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.877033] ? __kthread_parkme+0x82/0x180 [ 17.877057] ? preempt_count_sub+0x50/0x80 [ 17.877086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.877109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.877139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.877168] kthread+0x337/0x6f0 [ 17.877192] ? trace_preempt_on+0x20/0xc0 [ 17.877259] ? __pfx_kthread+0x10/0x10 [ 17.877287] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.877313] ? calculate_sigpending+0x7b/0xa0 [ 17.877342] ? __pfx_kthread+0x10/0x10 [ 17.877368] ret_from_fork+0x116/0x1d0 [ 17.877391] ? __pfx_kthread+0x10/0x10 [ 17.877415] ret_from_fork_asm+0x1a/0x30 [ 17.877467] </TASK> [ 17.877487] [ 17.893421] Allocated by task 282: [ 17.893915] kasan_save_stack+0x45/0x70 [ 17.895070] kasan_save_track+0x18/0x40 [ 17.895364] kasan_save_alloc_info+0x3b/0x50 [ 17.895800] __kasan_kmalloc+0xb7/0xc0 [ 17.896108] __kmalloc_cache_noprof+0x189/0x420 [ 17.896909] kasan_atomics+0x95/0x310 [ 17.897219] kunit_try_run_case+0x1a5/0x480 [ 17.897439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.898032] kthread+0x337/0x6f0 [ 17.898769] ret_from_fork+0x116/0x1d0 [ 17.899148] ret_from_fork_asm+0x1a/0x30 [ 17.899825] [ 17.900034] The buggy address belongs to the object at ffff8881033ecb00 [ 17.900034] which belongs to the cache kmalloc-64 of size 64 [ 17.900808] The buggy address is located 0 bytes to the right of [ 17.900808] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.901818] [ 17.901963] The buggy address belongs to the physical page: [ 17.902709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.903766] flags: 0x200000000000000(node=0|zone=2) [ 17.904053] page_type: f5(slab) [ 17.904257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.904908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.906530] page dumped because: kasan: bad access detected [ 17.907088] [ 17.907504] Memory state around the buggy address: [ 17.908508] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.909136] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.909627] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.910671] ^ [ 17.911328] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911632] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.912552] ================================================================== [ 18.458935] ================================================================== [ 18.459887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 18.460231] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.460525] [ 18.460702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.460822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.460863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.460915] Call Trace: [ 18.461321] <TASK> [ 18.461387] dump_stack_lvl+0x73/0xb0 [ 18.461468] print_report+0xd1/0x650 [ 18.461513] ? __virt_addr_valid+0x1db/0x2d0 [ 18.461608] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.461653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.461696] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.461742] kasan_report+0x141/0x180 [ 18.461793] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.461850] kasan_check_range+0x10c/0x1c0 [ 18.461907] __kasan_check_write+0x18/0x20 [ 18.461953] kasan_atomics_helper+0xfa9/0x5450 [ 18.462007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.462060] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.462109] ? kasan_atomics+0x152/0x310 [ 18.462166] kasan_atomics+0x1dc/0x310 [ 18.462218] ? __pfx_kasan_atomics+0x10/0x10 [ 18.462273] ? __pfx_read_tsc+0x10/0x10 [ 18.462321] ? ktime_get_ts64+0x86/0x230 [ 18.462373] kunit_try_run_case+0x1a5/0x480 [ 18.462418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.462472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.462526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.462575] ? __kthread_parkme+0x82/0x180 [ 18.462618] ? preempt_count_sub+0x50/0x80 [ 18.462666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.462709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.462755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.462802] kthread+0x337/0x6f0 [ 18.462845] ? trace_preempt_on+0x20/0xc0 [ 18.462894] ? __pfx_kthread+0x10/0x10 [ 18.462937] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.462984] ? calculate_sigpending+0x7b/0xa0 [ 18.463034] ? __pfx_kthread+0x10/0x10 [ 18.463080] ret_from_fork+0x116/0x1d0 [ 18.463120] ? __pfx_kthread+0x10/0x10 [ 18.463160] ret_from_fork_asm+0x1a/0x30 [ 18.463226] </TASK> [ 18.463252] [ 18.475950] Allocated by task 282: [ 18.476308] kasan_save_stack+0x45/0x70 [ 18.476660] kasan_save_track+0x18/0x40 [ 18.476983] kasan_save_alloc_info+0x3b/0x50 [ 18.477258] __kasan_kmalloc+0xb7/0xc0 [ 18.477670] __kmalloc_cache_noprof+0x189/0x420 [ 18.477919] kasan_atomics+0x95/0x310 [ 18.478132] kunit_try_run_case+0x1a5/0x480 [ 18.478395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.478656] kthread+0x337/0x6f0 [ 18.478866] ret_from_fork+0x116/0x1d0 [ 18.479080] ret_from_fork_asm+0x1a/0x30 [ 18.479333] [ 18.479539] The buggy address belongs to the object at ffff8881033ecb00 [ 18.479539] which belongs to the cache kmalloc-64 of size 64 [ 18.480543] The buggy address is located 0 bytes to the right of [ 18.480543] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.481601] [ 18.481814] The buggy address belongs to the physical page: [ 18.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.482975] flags: 0x200000000000000(node=0|zone=2) [ 18.483494] page_type: f5(slab) [ 18.483827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.484488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.485111] page dumped because: kasan: bad access detected [ 18.485564] [ 18.485696] Memory state around the buggy address: [ 18.485936] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.486268] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.486656] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.487271] ^ [ 18.487727] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.488360] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.488885] ================================================================== [ 18.201635] ================================================================== [ 18.202339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 18.203213] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.203784] [ 18.203932] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.204022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.204045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.204083] Call Trace: [ 18.204148] <TASK> [ 18.204213] dump_stack_lvl+0x73/0xb0 [ 18.204341] print_report+0xd1/0x650 [ 18.204417] ? __virt_addr_valid+0x1db/0x2d0 [ 18.204497] ? kasan_atomics_helper+0xac7/0x5450 [ 18.204563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.204629] ? kasan_atomics_helper+0xac7/0x5450 [ 18.204694] kasan_report+0x141/0x180 [ 18.204759] ? kasan_atomics_helper+0xac7/0x5450 [ 18.204821] kasan_check_range+0x10c/0x1c0 [ 18.204889] __kasan_check_write+0x18/0x20 [ 18.204948] kasan_atomics_helper+0xac7/0x5450 [ 18.205011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.205074] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.205131] ? kasan_atomics+0x152/0x310 [ 18.205227] kasan_atomics+0x1dc/0x310 [ 18.205282] ? __pfx_kasan_atomics+0x10/0x10 [ 18.205340] ? __pfx_read_tsc+0x10/0x10 [ 18.205395] ? ktime_get_ts64+0x86/0x230 [ 18.205463] kunit_try_run_case+0x1a5/0x480 [ 18.205508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.205552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.205612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.205670] ? __kthread_parkme+0x82/0x180 [ 18.205723] ? preempt_count_sub+0x50/0x80 [ 18.205781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.205831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.205890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.205946] kthread+0x337/0x6f0 [ 18.205996] ? trace_preempt_on+0x20/0xc0 [ 18.206056] ? __pfx_kthread+0x10/0x10 [ 18.206108] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.206163] ? calculate_sigpending+0x7b/0xa0 [ 18.206250] ? __pfx_kthread+0x10/0x10 [ 18.206303] ret_from_fork+0x116/0x1d0 [ 18.206351] ? __pfx_kthread+0x10/0x10 [ 18.206402] ret_from_fork_asm+0x1a/0x30 [ 18.206482] </TASK> [ 18.206506] [ 18.218414] Allocated by task 282: [ 18.218665] kasan_save_stack+0x45/0x70 [ 18.218919] kasan_save_track+0x18/0x40 [ 18.219110] kasan_save_alloc_info+0x3b/0x50 [ 18.219316] __kasan_kmalloc+0xb7/0xc0 [ 18.219700] __kmalloc_cache_noprof+0x189/0x420 [ 18.220138] kasan_atomics+0x95/0x310 [ 18.220544] kunit_try_run_case+0x1a5/0x480 [ 18.220976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.221645] kthread+0x337/0x6f0 [ 18.222039] ret_from_fork+0x116/0x1d0 [ 18.222425] ret_from_fork_asm+0x1a/0x30 [ 18.222847] [ 18.223054] The buggy address belongs to the object at ffff8881033ecb00 [ 18.223054] which belongs to the cache kmalloc-64 of size 64 [ 18.224090] The buggy address is located 0 bytes to the right of [ 18.224090] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.225266] [ 18.225529] The buggy address belongs to the physical page: [ 18.226030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.226787] flags: 0x200000000000000(node=0|zone=2) [ 18.227291] page_type: f5(slab) [ 18.227636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.228430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.229177] page dumped because: kasan: bad access detected [ 18.229720] [ 18.229845] Memory state around the buggy address: [ 18.230058] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.230793] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.231175] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.231686] ^ [ 18.232091] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232866] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.233574] ================================================================== [ 18.987414] ================================================================== [ 18.988074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 18.988724] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.989358] [ 18.989594] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.989697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.989724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.989774] Call Trace: [ 18.990288] <TASK> [ 18.990338] dump_stack_lvl+0x73/0xb0 [ 18.990409] print_report+0xd1/0x650 [ 18.990469] ? __virt_addr_valid+0x1db/0x2d0 [ 18.990522] ? kasan_atomics_helper+0x164f/0x5450 [ 18.990569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.990615] ? kasan_atomics_helper+0x164f/0x5450 [ 18.990660] kasan_report+0x141/0x180 [ 18.990706] ? kasan_atomics_helper+0x164f/0x5450 [ 18.990762] kasan_check_range+0x10c/0x1c0 [ 18.990809] __kasan_check_write+0x18/0x20 [ 18.990849] kasan_atomics_helper+0x164f/0x5450 [ 18.990898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.990945] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.990990] ? kasan_atomics+0x152/0x310 [ 18.991044] kasan_atomics+0x1dc/0x310 [ 18.991090] ? __pfx_kasan_atomics+0x10/0x10 [ 18.991138] ? __pfx_read_tsc+0x10/0x10 [ 18.991181] ? ktime_get_ts64+0x86/0x230 [ 18.991268] kunit_try_run_case+0x1a5/0x480 [ 18.991317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.991370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.991424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.991493] ? __kthread_parkme+0x82/0x180 [ 18.991534] ? preempt_count_sub+0x50/0x80 [ 18.991579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.991621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.991669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.991722] kthread+0x337/0x6f0 [ 18.991763] ? trace_preempt_on+0x20/0xc0 [ 18.991813] ? __pfx_kthread+0x10/0x10 [ 18.991862] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.991910] ? calculate_sigpending+0x7b/0xa0 [ 18.991954] ? __pfx_kthread+0x10/0x10 [ 18.991994] ret_from_fork+0x116/0x1d0 [ 18.992035] ? __pfx_kthread+0x10/0x10 [ 18.992072] ret_from_fork_asm+0x1a/0x30 [ 18.992131] </TASK> [ 18.992155] [ 19.005850] Allocated by task 282: [ 19.006249] kasan_save_stack+0x45/0x70 [ 19.006632] kasan_save_track+0x18/0x40 [ 19.006907] kasan_save_alloc_info+0x3b/0x50 [ 19.007335] __kasan_kmalloc+0xb7/0xc0 [ 19.007637] __kmalloc_cache_noprof+0x189/0x420 [ 19.008002] kasan_atomics+0x95/0x310 [ 19.008273] kunit_try_run_case+0x1a5/0x480 [ 19.008508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.008972] kthread+0x337/0x6f0 [ 19.009339] ret_from_fork+0x116/0x1d0 [ 19.009696] ret_from_fork_asm+0x1a/0x30 [ 19.009969] [ 19.010159] The buggy address belongs to the object at ffff8881033ecb00 [ 19.010159] which belongs to the cache kmalloc-64 of size 64 [ 19.010733] The buggy address is located 0 bytes to the right of [ 19.010733] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.011718] [ 19.011944] The buggy address belongs to the physical page: [ 19.012376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.012813] flags: 0x200000000000000(node=0|zone=2) [ 19.013300] page_type: f5(slab) [ 19.013833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.014789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.015237] page dumped because: kasan: bad access detected [ 19.016118] [ 19.016271] Memory state around the buggy address: [ 19.016575] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.017142] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.017735] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.018249] ^ [ 19.018742] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.019137] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.019637] ================================================================== [ 18.143077] ================================================================== [ 18.144177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 18.144708] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.145288] [ 18.145508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.145621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.145663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.145733] Call Trace: [ 18.145786] <TASK> [ 18.145830] dump_stack_lvl+0x73/0xb0 [ 18.145912] print_report+0xd1/0x650 [ 18.145982] ? __virt_addr_valid+0x1db/0x2d0 [ 18.146041] ? kasan_atomics_helper+0x992/0x5450 [ 18.146084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.146113] ? kasan_atomics_helper+0x992/0x5450 [ 18.146139] kasan_report+0x141/0x180 [ 18.146167] ? kasan_atomics_helper+0x992/0x5450 [ 18.146220] kasan_check_range+0x10c/0x1c0 [ 18.146289] __kasan_check_write+0x18/0x20 [ 18.146333] kasan_atomics_helper+0x992/0x5450 [ 18.146385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.146437] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.146502] ? kasan_atomics+0x152/0x310 [ 18.146567] kasan_atomics+0x1dc/0x310 [ 18.146615] ? __pfx_kasan_atomics+0x10/0x10 [ 18.146668] ? __pfx_read_tsc+0x10/0x10 [ 18.146716] ? ktime_get_ts64+0x86/0x230 [ 18.146789] kunit_try_run_case+0x1a5/0x480 [ 18.146860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.146903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.146952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.146990] ? __kthread_parkme+0x82/0x180 [ 18.147016] ? preempt_count_sub+0x50/0x80 [ 18.147046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.147072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.147103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.147133] kthread+0x337/0x6f0 [ 18.147157] ? trace_preempt_on+0x20/0xc0 [ 18.147186] ? __pfx_kthread+0x10/0x10 [ 18.147247] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.147278] ? calculate_sigpending+0x7b/0xa0 [ 18.147308] ? __pfx_kthread+0x10/0x10 [ 18.147334] ret_from_fork+0x116/0x1d0 [ 18.147372] ? __pfx_kthread+0x10/0x10 [ 18.147400] ret_from_fork_asm+0x1a/0x30 [ 18.147439] </TASK> [ 18.147488] [ 18.158032] Allocated by task 282: [ 18.158465] kasan_save_stack+0x45/0x70 [ 18.158732] kasan_save_track+0x18/0x40 [ 18.158937] kasan_save_alloc_info+0x3b/0x50 [ 18.159151] __kasan_kmalloc+0xb7/0xc0 [ 18.159437] __kmalloc_cache_noprof+0x189/0x420 [ 18.159876] kasan_atomics+0x95/0x310 [ 18.160229] kunit_try_run_case+0x1a5/0x480 [ 18.160659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.161112] kthread+0x337/0x6f0 [ 18.161405] ret_from_fork+0x116/0x1d0 [ 18.161894] ret_from_fork_asm+0x1a/0x30 [ 18.162203] [ 18.162404] The buggy address belongs to the object at ffff8881033ecb00 [ 18.162404] which belongs to the cache kmalloc-64 of size 64 [ 18.163106] The buggy address is located 0 bytes to the right of [ 18.163106] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.163820] [ 18.163967] The buggy address belongs to the physical page: [ 18.164210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.164870] flags: 0x200000000000000(node=0|zone=2) [ 18.165406] page_type: f5(slab) [ 18.165757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.166304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.166710] page dumped because: kasan: bad access detected [ 18.167108] [ 18.167321] Memory state around the buggy address: [ 18.167612] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.167913] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168375] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.168935] ^ [ 18.169416] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169917] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.170333] ================================================================== [ 19.473076] ================================================================== [ 19.473570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 19.473903] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.474417] [ 19.474692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.474802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.474836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.474891] Call Trace: [ 19.474939] <TASK> [ 19.474987] dump_stack_lvl+0x73/0xb0 [ 19.475048] print_report+0xd1/0x650 [ 19.475100] ? __virt_addr_valid+0x1db/0x2d0 [ 19.475152] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.475249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.475329] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.475409] kasan_report+0x141/0x180 [ 19.475483] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.475544] __asan_report_load8_noabort+0x18/0x20 [ 19.475598] kasan_atomics_helper+0x4f71/0x5450 [ 19.475657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.475718] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.475775] ? kasan_atomics+0x152/0x310 [ 19.475835] kasan_atomics+0x1dc/0x310 [ 19.475889] ? __pfx_kasan_atomics+0x10/0x10 [ 19.475954] ? __pfx_read_tsc+0x10/0x10 [ 19.476018] ? ktime_get_ts64+0x86/0x230 [ 19.476082] kunit_try_run_case+0x1a5/0x480 [ 19.476128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.476169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.476263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.476331] ? __kthread_parkme+0x82/0x180 [ 19.476399] ? preempt_count_sub+0x50/0x80 [ 19.476462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.476516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.476581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.476657] kthread+0x337/0x6f0 [ 19.476708] ? trace_preempt_on+0x20/0xc0 [ 19.476755] ? __pfx_kthread+0x10/0x10 [ 19.476794] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.476824] ? calculate_sigpending+0x7b/0xa0 [ 19.476854] ? __pfx_kthread+0x10/0x10 [ 19.476880] ret_from_fork+0x116/0x1d0 [ 19.476905] ? __pfx_kthread+0x10/0x10 [ 19.476929] ret_from_fork_asm+0x1a/0x30 [ 19.476967] </TASK> [ 19.476982] [ 19.487148] Allocated by task 282: [ 19.487595] kasan_save_stack+0x45/0x70 [ 19.488014] kasan_save_track+0x18/0x40 [ 19.488481] kasan_save_alloc_info+0x3b/0x50 [ 19.488866] __kasan_kmalloc+0xb7/0xc0 [ 19.489191] __kmalloc_cache_noprof+0x189/0x420 [ 19.489606] kasan_atomics+0x95/0x310 [ 19.489968] kunit_try_run_case+0x1a5/0x480 [ 19.490402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.490715] kthread+0x337/0x6f0 [ 19.490947] ret_from_fork+0x116/0x1d0 [ 19.491141] ret_from_fork_asm+0x1a/0x30 [ 19.491535] [ 19.491687] The buggy address belongs to the object at ffff8881033ecb00 [ 19.491687] which belongs to the cache kmalloc-64 of size 64 [ 19.493145] The buggy address is located 0 bytes to the right of [ 19.493145] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.494106] [ 19.495447] The buggy address belongs to the physical page: [ 19.495919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.496716] flags: 0x200000000000000(node=0|zone=2) [ 19.497395] page_type: f5(slab) [ 19.497552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.497735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.497923] page dumped because: kasan: bad access detected [ 19.498067] [ 19.498138] Memory state around the buggy address: [ 19.498438] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.498928] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499320] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.500047] ^ [ 19.500408] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.500764] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.501240] ================================================================== [ 17.603376] ================================================================== [ 17.604397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 17.605029] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.605353] [ 17.605587] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.605692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.605723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.605770] Call Trace: [ 17.605801] <TASK> [ 17.605839] dump_stack_lvl+0x73/0xb0 [ 17.605901] print_report+0xd1/0x650 [ 17.605947] ? __virt_addr_valid+0x1db/0x2d0 [ 17.605994] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.606037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.606089] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.606141] kasan_report+0x141/0x180 [ 17.606192] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.606256] __asan_report_load4_noabort+0x18/0x20 [ 17.606306] kasan_atomics_helper+0x4bbc/0x5450 [ 17.606350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.606394] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.606439] ? kasan_atomics+0x152/0x310 [ 17.606565] kasan_atomics+0x1dc/0x310 [ 17.606642] ? __pfx_kasan_atomics+0x10/0x10 [ 17.606706] ? __pfx_read_tsc+0x10/0x10 [ 17.606751] ? ktime_get_ts64+0x86/0x230 [ 17.606795] kunit_try_run_case+0x1a5/0x480 [ 17.606846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.606881] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.606928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.606978] ? __kthread_parkme+0x82/0x180 [ 17.607032] ? preempt_count_sub+0x50/0x80 [ 17.607091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.607136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.607167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.607217] kthread+0x337/0x6f0 [ 17.607253] ? trace_preempt_on+0x20/0xc0 [ 17.607281] ? __pfx_kthread+0x10/0x10 [ 17.607305] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.607331] ? calculate_sigpending+0x7b/0xa0 [ 17.607374] ? __pfx_kthread+0x10/0x10 [ 17.607399] ret_from_fork+0x116/0x1d0 [ 17.607422] ? __pfx_kthread+0x10/0x10 [ 17.607445] ret_from_fork_asm+0x1a/0x30 [ 17.607504] </TASK> [ 17.607519] [ 17.621796] Allocated by task 282: [ 17.622601] kasan_save_stack+0x45/0x70 [ 17.623037] kasan_save_track+0x18/0x40 [ 17.623596] kasan_save_alloc_info+0x3b/0x50 [ 17.624109] __kasan_kmalloc+0xb7/0xc0 [ 17.624316] __kmalloc_cache_noprof+0x189/0x420 [ 17.624619] kasan_atomics+0x95/0x310 [ 17.625188] kunit_try_run_case+0x1a5/0x480 [ 17.625604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.626384] kthread+0x337/0x6f0 [ 17.626866] ret_from_fork+0x116/0x1d0 [ 17.627154] ret_from_fork_asm+0x1a/0x30 [ 17.627621] [ 17.628033] The buggy address belongs to the object at ffff8881033ecb00 [ 17.628033] which belongs to the cache kmalloc-64 of size 64 [ 17.628895] The buggy address is located 0 bytes to the right of [ 17.628895] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.630362] [ 17.630587] The buggy address belongs to the physical page: [ 17.631391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.632161] flags: 0x200000000000000(node=0|zone=2) [ 17.632489] page_type: f5(slab) [ 17.632932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.633541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.634514] page dumped because: kasan: bad access detected [ 17.634814] [ 17.635123] Memory state around the buggy address: [ 17.635612] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.636132] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.636723] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.637243] ^ [ 17.637586] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.638547] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.639197] ================================================================== [ 19.113806] ================================================================== [ 19.114447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 19.114855] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.115227] [ 19.115463] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.115550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.115569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.115596] Call Trace: [ 19.115622] <TASK> [ 19.115653] dump_stack_lvl+0x73/0xb0 [ 19.115713] print_report+0xd1/0x650 [ 19.115757] ? __virt_addr_valid+0x1db/0x2d0 [ 19.115802] ? kasan_atomics_helper+0x18b1/0x5450 [ 19.115851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.115931] ? kasan_atomics_helper+0x18b1/0x5450 [ 19.115980] kasan_report+0x141/0x180 [ 19.116029] ? kasan_atomics_helper+0x18b1/0x5450 [ 19.116091] kasan_check_range+0x10c/0x1c0 [ 19.116149] __kasan_check_write+0x18/0x20 [ 19.116195] kasan_atomics_helper+0x18b1/0x5450 [ 19.116288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.116343] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.116395] ? kasan_atomics+0x152/0x310 [ 19.116452] kasan_atomics+0x1dc/0x310 [ 19.116519] ? __pfx_kasan_atomics+0x10/0x10 [ 19.116592] ? __pfx_read_tsc+0x10/0x10 [ 19.116644] ? ktime_get_ts64+0x86/0x230 [ 19.116706] kunit_try_run_case+0x1a5/0x480 [ 19.116778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.116839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.116912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.116980] ? __kthread_parkme+0x82/0x180 [ 19.117032] ? preempt_count_sub+0x50/0x80 [ 19.117103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.117166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.117252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.117308] kthread+0x337/0x6f0 [ 19.117352] ? trace_preempt_on+0x20/0xc0 [ 19.117405] ? __pfx_kthread+0x10/0x10 [ 19.117465] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.117524] ? calculate_sigpending+0x7b/0xa0 [ 19.117586] ? __pfx_kthread+0x10/0x10 [ 19.117642] ret_from_fork+0x116/0x1d0 [ 19.117693] ? __pfx_kthread+0x10/0x10 [ 19.117745] ret_from_fork_asm+0x1a/0x30 [ 19.117823] </TASK> [ 19.117855] [ 19.128849] Allocated by task 282: [ 19.129142] kasan_save_stack+0x45/0x70 [ 19.129437] kasan_save_track+0x18/0x40 [ 19.129832] kasan_save_alloc_info+0x3b/0x50 [ 19.130194] __kasan_kmalloc+0xb7/0xc0 [ 19.130652] __kmalloc_cache_noprof+0x189/0x420 [ 19.131058] kasan_atomics+0x95/0x310 [ 19.131501] kunit_try_run_case+0x1a5/0x480 [ 19.131874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.132399] kthread+0x337/0x6f0 [ 19.132751] ret_from_fork+0x116/0x1d0 [ 19.133108] ret_from_fork_asm+0x1a/0x30 [ 19.133583] [ 19.133774] The buggy address belongs to the object at ffff8881033ecb00 [ 19.133774] which belongs to the cache kmalloc-64 of size 64 [ 19.134631] The buggy address is located 0 bytes to the right of [ 19.134631] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.135086] [ 19.135215] The buggy address belongs to the physical page: [ 19.135711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.136528] flags: 0x200000000000000(node=0|zone=2) [ 19.137012] page_type: f5(slab) [ 19.137360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.137731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.138014] page dumped because: kasan: bad access detected [ 19.138252] [ 19.138470] Memory state around the buggy address: [ 19.138968] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.139591] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.140169] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.140606] ^ [ 19.140844] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.141121] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.141658] ================================================================== [ 18.389290] ================================================================== [ 18.391160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 18.391855] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.392551] [ 18.392800] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.392940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.392974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.393031] Call Trace: [ 18.393092] <TASK> [ 18.393139] dump_stack_lvl+0x73/0xb0 [ 18.393208] print_report+0xd1/0x650 [ 18.393258] ? __virt_addr_valid+0x1db/0x2d0 [ 18.393324] ? kasan_atomics_helper+0xe78/0x5450 [ 18.393390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.393441] ? kasan_atomics_helper+0xe78/0x5450 [ 18.393500] kasan_report+0x141/0x180 [ 18.393530] ? kasan_atomics_helper+0xe78/0x5450 [ 18.393559] kasan_check_range+0x10c/0x1c0 [ 18.393597] __kasan_check_write+0x18/0x20 [ 18.393638] kasan_atomics_helper+0xe78/0x5450 [ 18.393681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.393728] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.393776] ? kasan_atomics+0x152/0x310 [ 18.393833] kasan_atomics+0x1dc/0x310 [ 18.393894] ? __pfx_kasan_atomics+0x10/0x10 [ 18.393968] ? __pfx_read_tsc+0x10/0x10 [ 18.394020] ? ktime_get_ts64+0x86/0x230 [ 18.394080] kunit_try_run_case+0x1a5/0x480 [ 18.394130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.394170] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.394228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.394272] ? __kthread_parkme+0x82/0x180 [ 18.394314] ? preempt_count_sub+0x50/0x80 [ 18.394366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.394421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.394494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.394554] kthread+0x337/0x6f0 [ 18.394605] ? trace_preempt_on+0x20/0xc0 [ 18.394664] ? __pfx_kthread+0x10/0x10 [ 18.394711] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.394760] ? calculate_sigpending+0x7b/0xa0 [ 18.394822] ? __pfx_kthread+0x10/0x10 [ 18.394873] ret_from_fork+0x116/0x1d0 [ 18.394941] ? __pfx_kthread+0x10/0x10 [ 18.394992] ret_from_fork_asm+0x1a/0x30 [ 18.395087] </TASK> [ 18.395120] [ 18.407274] Allocated by task 282: [ 18.407656] kasan_save_stack+0x45/0x70 [ 18.408102] kasan_save_track+0x18/0x40 [ 18.408539] kasan_save_alloc_info+0x3b/0x50 [ 18.408833] __kasan_kmalloc+0xb7/0xc0 [ 18.409049] __kmalloc_cache_noprof+0x189/0x420 [ 18.409265] kasan_atomics+0x95/0x310 [ 18.409502] kunit_try_run_case+0x1a5/0x480 [ 18.409894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.410393] kthread+0x337/0x6f0 [ 18.410928] ret_from_fork+0x116/0x1d0 [ 18.411441] ret_from_fork_asm+0x1a/0x30 [ 18.411905] [ 18.412109] The buggy address belongs to the object at ffff8881033ecb00 [ 18.412109] which belongs to the cache kmalloc-64 of size 64 [ 18.412896] The buggy address is located 0 bytes to the right of [ 18.412896] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.413677] [ 18.413904] The buggy address belongs to the physical page: [ 18.414238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.414725] flags: 0x200000000000000(node=0|zone=2) [ 18.415129] page_type: f5(slab) [ 18.415569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.416117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.416650] page dumped because: kasan: bad access detected [ 18.417068] [ 18.417311] Memory state around the buggy address: [ 18.417694] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.418000] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.418293] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.418782] ^ [ 18.419331] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420305] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420914] ================================================================== [ 19.410285] ================================================================== [ 19.411008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 19.411581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.412134] [ 19.412439] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.412598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.412629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.412682] Call Trace: [ 19.412768] <TASK> [ 19.412816] dump_stack_lvl+0x73/0xb0 [ 19.412884] print_report+0xd1/0x650 [ 19.412934] ? __virt_addr_valid+0x1db/0x2d0 [ 19.412978] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.413021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.413067] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.413118] kasan_report+0x141/0x180 [ 19.413249] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.413314] kasan_check_range+0x10c/0x1c0 [ 19.413367] __kasan_check_write+0x18/0x20 [ 19.413447] kasan_atomics_helper+0x1eaa/0x5450 [ 19.413515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.413566] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.413652] ? kasan_atomics+0x152/0x310 [ 19.413717] kasan_atomics+0x1dc/0x310 [ 19.413772] ? __pfx_kasan_atomics+0x10/0x10 [ 19.413828] ? __pfx_read_tsc+0x10/0x10 [ 19.413897] ? ktime_get_ts64+0x86/0x230 [ 19.413954] kunit_try_run_case+0x1a5/0x480 [ 19.414028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.414092] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.414144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.414230] ? __kthread_parkme+0x82/0x180 [ 19.414285] ? preempt_count_sub+0x50/0x80 [ 19.414347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.414399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.414451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.414508] kthread+0x337/0x6f0 [ 19.414533] ? trace_preempt_on+0x20/0xc0 [ 19.414561] ? __pfx_kthread+0x10/0x10 [ 19.414584] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.414611] ? calculate_sigpending+0x7b/0xa0 [ 19.414640] ? __pfx_kthread+0x10/0x10 [ 19.414664] ret_from_fork+0x116/0x1d0 [ 19.414687] ? __pfx_kthread+0x10/0x10 [ 19.414710] ret_from_fork_asm+0x1a/0x30 [ 19.414747] </TASK> [ 19.414761] [ 19.428019] Allocated by task 282: [ 19.428174] kasan_save_stack+0x45/0x70 [ 19.428593] kasan_save_track+0x18/0x40 [ 19.429235] kasan_save_alloc_info+0x3b/0x50 [ 19.429684] __kasan_kmalloc+0xb7/0xc0 [ 19.430033] __kmalloc_cache_noprof+0x189/0x420 [ 19.430442] kasan_atomics+0x95/0x310 [ 19.430880] kunit_try_run_case+0x1a5/0x480 [ 19.431366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.431880] kthread+0x337/0x6f0 [ 19.432100] ret_from_fork+0x116/0x1d0 [ 19.432631] ret_from_fork_asm+0x1a/0x30 [ 19.433092] [ 19.433329] The buggy address belongs to the object at ffff8881033ecb00 [ 19.433329] which belongs to the cache kmalloc-64 of size 64 [ 19.434132] The buggy address is located 0 bytes to the right of [ 19.434132] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.435056] [ 19.435416] The buggy address belongs to the physical page: [ 19.435965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.436590] flags: 0x200000000000000(node=0|zone=2) [ 19.437067] page_type: f5(slab) [ 19.437314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.437843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.438201] page dumped because: kasan: bad access detected [ 19.438673] [ 19.438851] Memory state around the buggy address: [ 19.439119] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.439611] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.439909] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.440431] ^ [ 19.440874] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.441384] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.441679] ================================================================== [ 18.331619] ================================================================== [ 18.332114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 18.332758] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.333238] [ 18.333404] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.333506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.333534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.333581] Call Trace: [ 18.333624] <TASK> [ 18.333692] dump_stack_lvl+0x73/0xb0 [ 18.333757] print_report+0xd1/0x650 [ 18.333808] ? __virt_addr_valid+0x1db/0x2d0 [ 18.333857] ? kasan_atomics_helper+0xd47/0x5450 [ 18.333901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.333967] ? kasan_atomics_helper+0xd47/0x5450 [ 18.334015] kasan_report+0x141/0x180 [ 18.334065] ? kasan_atomics_helper+0xd47/0x5450 [ 18.334121] kasan_check_range+0x10c/0x1c0 [ 18.334189] __kasan_check_write+0x18/0x20 [ 18.334237] kasan_atomics_helper+0xd47/0x5450 [ 18.334299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.334348] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.334383] ? kasan_atomics+0x152/0x310 [ 18.334415] kasan_atomics+0x1dc/0x310 [ 18.334440] ? __pfx_kasan_atomics+0x10/0x10 [ 18.334488] ? __pfx_read_tsc+0x10/0x10 [ 18.334524] ? ktime_get_ts64+0x86/0x230 [ 18.334567] kunit_try_run_case+0x1a5/0x480 [ 18.334615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.334652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.334725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.334776] ? __kthread_parkme+0x82/0x180 [ 18.334820] ? preempt_count_sub+0x50/0x80 [ 18.334871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.334934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.334991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.335039] kthread+0x337/0x6f0 [ 18.335082] ? trace_preempt_on+0x20/0xc0 [ 18.335131] ? __pfx_kthread+0x10/0x10 [ 18.335164] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.335196] ? calculate_sigpending+0x7b/0xa0 [ 18.335252] ? __pfx_kthread+0x10/0x10 [ 18.335280] ret_from_fork+0x116/0x1d0 [ 18.335305] ? __pfx_kthread+0x10/0x10 [ 18.335330] ret_from_fork_asm+0x1a/0x30 [ 18.335380] </TASK> [ 18.335396] [ 18.347325] Allocated by task 282: [ 18.347756] kasan_save_stack+0x45/0x70 [ 18.348262] kasan_save_track+0x18/0x40 [ 18.348614] kasan_save_alloc_info+0x3b/0x50 [ 18.348921] __kasan_kmalloc+0xb7/0xc0 [ 18.349155] __kmalloc_cache_noprof+0x189/0x420 [ 18.349677] kasan_atomics+0x95/0x310 [ 18.349939] kunit_try_run_case+0x1a5/0x480 [ 18.350350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.350657] kthread+0x337/0x6f0 [ 18.350993] ret_from_fork+0x116/0x1d0 [ 18.351262] ret_from_fork_asm+0x1a/0x30 [ 18.351673] [ 18.351796] The buggy address belongs to the object at ffff8881033ecb00 [ 18.351796] which belongs to the cache kmalloc-64 of size 64 [ 18.352230] The buggy address is located 0 bytes to the right of [ 18.352230] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.353031] [ 18.353222] The buggy address belongs to the physical page: [ 18.353813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.354479] flags: 0x200000000000000(node=0|zone=2) [ 18.354718] page_type: f5(slab) [ 18.354923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.355579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.356007] page dumped because: kasan: bad access detected [ 18.356352] [ 18.356555] Memory state around the buggy address: [ 18.356910] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.357516] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.357901] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.358319] ^ [ 18.358724] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.359274] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.359760] ================================================================== [ 17.721990] ================================================================== [ 17.722378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 17.722794] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.723508] [ 17.723749] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.723858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.723886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.723936] Call Trace: [ 17.723980] <TASK> [ 17.724020] dump_stack_lvl+0x73/0xb0 [ 17.724086] print_report+0xd1/0x650 [ 17.724138] ? __virt_addr_valid+0x1db/0x2d0 [ 17.724228] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.724284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.724328] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.724366] kasan_report+0x141/0x180 [ 17.724428] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.724486] __asan_report_store4_noabort+0x1b/0x30 [ 17.724522] kasan_atomics_helper+0x4b6e/0x5450 [ 17.724560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.724596] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.724629] ? kasan_atomics+0x152/0x310 [ 17.724674] kasan_atomics+0x1dc/0x310 [ 17.724722] ? __pfx_kasan_atomics+0x10/0x10 [ 17.724761] ? __pfx_read_tsc+0x10/0x10 [ 17.724843] ? ktime_get_ts64+0x86/0x230 [ 17.724897] kunit_try_run_case+0x1a5/0x480 [ 17.724942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.724984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.725043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.725100] ? __kthread_parkme+0x82/0x180 [ 17.725151] ? preempt_count_sub+0x50/0x80 [ 17.725237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.725291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.725349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.725406] kthread+0x337/0x6f0 [ 17.725463] ? trace_preempt_on+0x20/0xc0 [ 17.725521] ? __pfx_kthread+0x10/0x10 [ 17.725572] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.725625] ? calculate_sigpending+0x7b/0xa0 [ 17.725671] ? __pfx_kthread+0x10/0x10 [ 17.725711] ret_from_fork+0x116/0x1d0 [ 17.725750] ? __pfx_kthread+0x10/0x10 [ 17.725792] ret_from_fork_asm+0x1a/0x30 [ 17.725883] </TASK> [ 17.726105] [ 17.742928] Allocated by task 282: [ 17.743640] kasan_save_stack+0x45/0x70 [ 17.743889] kasan_save_track+0x18/0x40 [ 17.744246] kasan_save_alloc_info+0x3b/0x50 [ 17.744515] __kasan_kmalloc+0xb7/0xc0 [ 17.744824] __kmalloc_cache_noprof+0x189/0x420 [ 17.745085] kasan_atomics+0x95/0x310 [ 17.745407] kunit_try_run_case+0x1a5/0x480 [ 17.746562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.747042] kthread+0x337/0x6f0 [ 17.747709] ret_from_fork+0x116/0x1d0 [ 17.747969] ret_from_fork_asm+0x1a/0x30 [ 17.748875] [ 17.749096] The buggy address belongs to the object at ffff8881033ecb00 [ 17.749096] which belongs to the cache kmalloc-64 of size 64 [ 17.750335] The buggy address is located 0 bytes to the right of [ 17.750335] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.751339] [ 17.751644] The buggy address belongs to the physical page: [ 17.752182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.753286] flags: 0x200000000000000(node=0|zone=2) [ 17.753921] page_type: f5(slab) [ 17.754122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.754616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.755801] page dumped because: kasan: bad access detected [ 17.756104] [ 17.756286] Memory state around the buggy address: [ 17.756592] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.757144] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.757592] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.758590] ^ [ 17.759154] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.759523] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.760693] ================================================================== [ 19.326283] ================================================================== [ 19.327093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 19.327755] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.328116] [ 19.328374] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.328485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.328518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.328567] Call Trace: [ 19.328613] <TASK> [ 19.328659] dump_stack_lvl+0x73/0xb0 [ 19.328730] print_report+0xd1/0x650 [ 19.328785] ? __virt_addr_valid+0x1db/0x2d0 [ 19.328836] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.328884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.328937] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.328991] kasan_report+0x141/0x180 [ 19.329047] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.329105] kasan_check_range+0x10c/0x1c0 [ 19.329158] __kasan_check_write+0x18/0x20 [ 19.329242] kasan_atomics_helper+0x1ce1/0x5450 [ 19.329297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.329342] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.329393] ? kasan_atomics+0x152/0x310 [ 19.329462] kasan_atomics+0x1dc/0x310 [ 19.329520] ? __pfx_kasan_atomics+0x10/0x10 [ 19.329579] ? __pfx_read_tsc+0x10/0x10 [ 19.329630] ? ktime_get_ts64+0x86/0x230 [ 19.329694] kunit_try_run_case+0x1a5/0x480 [ 19.329751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.329799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.329857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.329915] ? __kthread_parkme+0x82/0x180 [ 19.329967] ? preempt_count_sub+0x50/0x80 [ 19.330021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.330064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.330117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.330165] kthread+0x337/0x6f0 [ 19.330240] ? trace_preempt_on+0x20/0xc0 [ 19.330294] ? __pfx_kthread+0x10/0x10 [ 19.330339] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.330384] ? calculate_sigpending+0x7b/0xa0 [ 19.330432] ? __pfx_kthread+0x10/0x10 [ 19.330490] ret_from_fork+0x116/0x1d0 [ 19.330538] ? __pfx_kthread+0x10/0x10 [ 19.330589] ret_from_fork_asm+0x1a/0x30 [ 19.330656] </TASK> [ 19.330676] [ 19.340285] Allocated by task 282: [ 19.340668] kasan_save_stack+0x45/0x70 [ 19.341068] kasan_save_track+0x18/0x40 [ 19.341447] kasan_save_alloc_info+0x3b/0x50 [ 19.341825] __kasan_kmalloc+0xb7/0xc0 [ 19.342135] __kmalloc_cache_noprof+0x189/0x420 [ 19.342553] kasan_atomics+0x95/0x310 [ 19.342851] kunit_try_run_case+0x1a5/0x480 [ 19.343097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.343514] kthread+0x337/0x6f0 [ 19.343716] ret_from_fork+0x116/0x1d0 [ 19.344042] ret_from_fork_asm+0x1a/0x30 [ 19.344417] [ 19.344616] The buggy address belongs to the object at ffff8881033ecb00 [ 19.344616] which belongs to the cache kmalloc-64 of size 64 [ 19.345291] The buggy address is located 0 bytes to the right of [ 19.345291] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.345939] [ 19.346117] The buggy address belongs to the physical page: [ 19.346429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.346929] flags: 0x200000000000000(node=0|zone=2) [ 19.347360] page_type: f5(slab) [ 19.347615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.348069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.348410] page dumped because: kasan: bad access detected [ 19.348818] [ 19.348994] Memory state around the buggy address: [ 19.349421] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.349990] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.350365] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.350661] ^ [ 19.350886] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.351166] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.351462] ================================================================== [ 18.526832] ================================================================== [ 18.527469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 18.527765] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.528950] [ 18.529145] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.529228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.529247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.529277] Call Trace: [ 18.529305] <TASK> [ 18.529332] dump_stack_lvl+0x73/0xb0 [ 18.529378] print_report+0xd1/0x650 [ 18.529407] ? __virt_addr_valid+0x1db/0x2d0 [ 18.529435] ? kasan_atomics_helper+0x1079/0x5450 [ 18.529479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.529510] ? kasan_atomics_helper+0x1079/0x5450 [ 18.529536] kasan_report+0x141/0x180 [ 18.529563] ? kasan_atomics_helper+0x1079/0x5450 [ 18.529594] kasan_check_range+0x10c/0x1c0 [ 18.529622] __kasan_check_write+0x18/0x20 [ 18.529644] kasan_atomics_helper+0x1079/0x5450 [ 18.529672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.529699] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.529725] ? kasan_atomics+0x152/0x310 [ 18.529755] kasan_atomics+0x1dc/0x310 [ 18.529782] ? __pfx_kasan_atomics+0x10/0x10 [ 18.529810] ? __pfx_read_tsc+0x10/0x10 [ 18.529837] ? ktime_get_ts64+0x86/0x230 [ 18.529867] kunit_try_run_case+0x1a5/0x480 [ 18.529893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.529916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.529945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.529974] ? __kthread_parkme+0x82/0x180 [ 18.529999] ? preempt_count_sub+0x50/0x80 [ 18.530026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.530051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.530079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.530107] kthread+0x337/0x6f0 [ 18.530131] ? trace_preempt_on+0x20/0xc0 [ 18.530159] ? __pfx_kthread+0x10/0x10 [ 18.530184] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.530257] ? calculate_sigpending+0x7b/0xa0 [ 18.530320] ? __pfx_kthread+0x10/0x10 [ 18.530371] ret_from_fork+0x116/0x1d0 [ 18.530413] ? __pfx_kthread+0x10/0x10 [ 18.530476] ret_from_fork_asm+0x1a/0x30 [ 18.530551] </TASK> [ 18.530602] [ 18.546693] Allocated by task 282: [ 18.547361] kasan_save_stack+0x45/0x70 [ 18.547681] kasan_save_track+0x18/0x40 [ 18.548013] kasan_save_alloc_info+0x3b/0x50 [ 18.548726] __kasan_kmalloc+0xb7/0xc0 [ 18.549029] __kmalloc_cache_noprof+0x189/0x420 [ 18.549265] kasan_atomics+0x95/0x310 [ 18.549727] kunit_try_run_case+0x1a5/0x480 [ 18.550243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.550767] kthread+0x337/0x6f0 [ 18.551022] ret_from_fork+0x116/0x1d0 [ 18.551523] ret_from_fork_asm+0x1a/0x30 [ 18.551807] [ 18.551981] The buggy address belongs to the object at ffff8881033ecb00 [ 18.551981] which belongs to the cache kmalloc-64 of size 64 [ 18.552786] The buggy address is located 0 bytes to the right of [ 18.552786] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.553908] [ 18.554072] The buggy address belongs to the physical page: [ 18.554744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.555243] flags: 0x200000000000000(node=0|zone=2) [ 18.555891] page_type: f5(slab) [ 18.556221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.556973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.557542] page dumped because: kasan: bad access detected [ 18.558108] [ 18.558277] Memory state around the buggy address: [ 18.558578] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559006] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559854] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.560477] ^ [ 18.561065] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.561851] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562604] ================================================================== [ 19.594428] ================================================================== [ 19.595004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 19.595538] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.595917] [ 19.596067] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.596124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.596140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.596185] Call Trace: [ 19.596228] <TASK> [ 19.596250] dump_stack_lvl+0x73/0xb0 [ 19.596282] print_report+0xd1/0x650 [ 19.596309] ? __virt_addr_valid+0x1db/0x2d0 [ 19.596356] ? kasan_atomics_helper+0x218a/0x5450 [ 19.596383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.596410] ? kasan_atomics_helper+0x218a/0x5450 [ 19.596437] kasan_report+0x141/0x180 [ 19.596475] ? kasan_atomics_helper+0x218a/0x5450 [ 19.596526] kasan_check_range+0x10c/0x1c0 [ 19.596559] __kasan_check_write+0x18/0x20 [ 19.596583] kasan_atomics_helper+0x218a/0x5450 [ 19.596610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.596636] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.596680] ? kasan_atomics+0x152/0x310 [ 19.596713] kasan_atomics+0x1dc/0x310 [ 19.596740] ? __pfx_kasan_atomics+0x10/0x10 [ 19.596769] ? __pfx_read_tsc+0x10/0x10 [ 19.596795] ? ktime_get_ts64+0x86/0x230 [ 19.596825] kunit_try_run_case+0x1a5/0x480 [ 19.596872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.596895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.596925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.596954] ? __kthread_parkme+0x82/0x180 [ 19.596979] ? preempt_count_sub+0x50/0x80 [ 19.597022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.597057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.597086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.597115] kthread+0x337/0x6f0 [ 19.597136] ? trace_preempt_on+0x20/0xc0 [ 19.597163] ? __pfx_kthread+0x10/0x10 [ 19.597205] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.597239] ? calculate_sigpending+0x7b/0xa0 [ 19.597267] ? __pfx_kthread+0x10/0x10 [ 19.597293] ret_from_fork+0x116/0x1d0 [ 19.597316] ? __pfx_kthread+0x10/0x10 [ 19.597340] ret_from_fork_asm+0x1a/0x30 [ 19.597396] </TASK> [ 19.597413] [ 19.605016] Allocated by task 282: [ 19.605284] kasan_save_stack+0x45/0x70 [ 19.605429] kasan_save_track+0x18/0x40 [ 19.605639] kasan_save_alloc_info+0x3b/0x50 [ 19.605791] __kasan_kmalloc+0xb7/0xc0 [ 19.605924] __kmalloc_cache_noprof+0x189/0x420 [ 19.606261] kasan_atomics+0x95/0x310 [ 19.606551] kunit_try_run_case+0x1a5/0x480 [ 19.606662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.606790] kthread+0x337/0x6f0 [ 19.607057] ret_from_fork+0x116/0x1d0 [ 19.607345] ret_from_fork_asm+0x1a/0x30 [ 19.607639] [ 19.607754] The buggy address belongs to the object at ffff8881033ecb00 [ 19.607754] which belongs to the cache kmalloc-64 of size 64 [ 19.608098] The buggy address is located 0 bytes to the right of [ 19.608098] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.608676] [ 19.608802] The buggy address belongs to the physical page: [ 19.609093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.609411] flags: 0x200000000000000(node=0|zone=2) [ 19.609766] page_type: f5(slab) [ 19.609945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.610152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.610657] page dumped because: kasan: bad access detected [ 19.611013] [ 19.611145] Memory state around the buggy address: [ 19.611419] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611790] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612098] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.612306] ^ [ 19.612607] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.613032] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.613366] ================================================================== [ 19.550634] ================================================================== [ 19.551122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 19.551939] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.552285] [ 19.552443] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.552515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.552531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.552558] Call Trace: [ 19.552583] <TASK> [ 19.552609] dump_stack_lvl+0x73/0xb0 [ 19.552645] print_report+0xd1/0x650 [ 19.552672] ? __virt_addr_valid+0x1db/0x2d0 [ 19.552700] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.552756] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.552786] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.552849] kasan_report+0x141/0x180 [ 19.552878] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.552922] kasan_check_range+0x10c/0x1c0 [ 19.552952] __kasan_check_write+0x18/0x20 [ 19.552975] kasan_atomics_helper+0x20c8/0x5450 [ 19.553002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.553030] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.553056] ? kasan_atomics+0x152/0x310 [ 19.553089] kasan_atomics+0x1dc/0x310 [ 19.553118] ? __pfx_kasan_atomics+0x10/0x10 [ 19.553147] ? __pfx_read_tsc+0x10/0x10 [ 19.553174] ? ktime_get_ts64+0x86/0x230 [ 19.553219] kunit_try_run_case+0x1a5/0x480 [ 19.553251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.553274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.553302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.553331] ? __kthread_parkme+0x82/0x180 [ 19.553356] ? preempt_count_sub+0x50/0x80 [ 19.553385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.553530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.553561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.553588] kthread+0x337/0x6f0 [ 19.553611] ? trace_preempt_on+0x20/0xc0 [ 19.553637] ? __pfx_kthread+0x10/0x10 [ 19.553662] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.553687] ? calculate_sigpending+0x7b/0xa0 [ 19.553714] ? __pfx_kthread+0x10/0x10 [ 19.553740] ret_from_fork+0x116/0x1d0 [ 19.553766] ? __pfx_kthread+0x10/0x10 [ 19.553791] ret_from_fork_asm+0x1a/0x30 [ 19.553828] </TASK> [ 19.553843] [ 19.564142] Allocated by task 282: [ 19.564603] kasan_save_stack+0x45/0x70 [ 19.564951] kasan_save_track+0x18/0x40 [ 19.565155] kasan_save_alloc_info+0x3b/0x50 [ 19.565521] __kasan_kmalloc+0xb7/0xc0 [ 19.565865] __kmalloc_cache_noprof+0x189/0x420 [ 19.566044] kasan_atomics+0x95/0x310 [ 19.566223] kunit_try_run_case+0x1a5/0x480 [ 19.566374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.566579] kthread+0x337/0x6f0 [ 19.566744] ret_from_fork+0x116/0x1d0 [ 19.566921] ret_from_fork_asm+0x1a/0x30 [ 19.567117] [ 19.567753] The buggy address belongs to the object at ffff8881033ecb00 [ 19.567753] which belongs to the cache kmalloc-64 of size 64 [ 19.568193] The buggy address is located 0 bytes to the right of [ 19.568193] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.568912] [ 19.568998] The buggy address belongs to the physical page: [ 19.569174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.569871] flags: 0x200000000000000(node=0|zone=2) [ 19.570219] page_type: f5(slab) [ 19.570485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.570739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.571164] page dumped because: kasan: bad access detected [ 19.571419] [ 19.571677] Memory state around the buggy address: [ 19.572044] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.572267] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.572812] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.573436] ^ [ 19.573645] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.574171] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.574495] ================================================================== [ 17.686155] ================================================================== [ 17.686521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 17.687491] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.688528] [ 17.689351] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.689438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.689472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.689502] Call Trace: [ 17.689526] <TASK> [ 17.689554] dump_stack_lvl+0x73/0xb0 [ 17.689602] print_report+0xd1/0x650 [ 17.689630] ? __virt_addr_valid+0x1db/0x2d0 [ 17.689658] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.689683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.689708] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.689733] kasan_report+0x141/0x180 [ 17.689757] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.689787] __asan_report_load4_noabort+0x18/0x20 [ 17.689814] kasan_atomics_helper+0x4b88/0x5450 [ 17.689889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.689929] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.689970] ? kasan_atomics+0x152/0x310 [ 17.690003] kasan_atomics+0x1dc/0x310 [ 17.690031] ? __pfx_kasan_atomics+0x10/0x10 [ 17.690058] ? __pfx_read_tsc+0x10/0x10 [ 17.690083] ? ktime_get_ts64+0x86/0x230 [ 17.690113] kunit_try_run_case+0x1a5/0x480 [ 17.690138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.690160] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.690188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.690231] ? __kthread_parkme+0x82/0x180 [ 17.690257] ? preempt_count_sub+0x50/0x80 [ 17.690284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.690308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.690337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.690366] kthread+0x337/0x6f0 [ 17.690388] ? trace_preempt_on+0x20/0xc0 [ 17.690414] ? __pfx_kthread+0x10/0x10 [ 17.690438] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.690483] ? calculate_sigpending+0x7b/0xa0 [ 17.690514] ? __pfx_kthread+0x10/0x10 [ 17.690539] ret_from_fork+0x116/0x1d0 [ 17.690561] ? __pfx_kthread+0x10/0x10 [ 17.690584] ret_from_fork_asm+0x1a/0x30 [ 17.690620] </TASK> [ 17.690633] [ 17.705909] Allocated by task 282: [ 17.706111] kasan_save_stack+0x45/0x70 [ 17.706312] kasan_save_track+0x18/0x40 [ 17.706487] kasan_save_alloc_info+0x3b/0x50 [ 17.706668] __kasan_kmalloc+0xb7/0xc0 [ 17.706966] __kmalloc_cache_noprof+0x189/0x420 [ 17.707225] kasan_atomics+0x95/0x310 [ 17.707431] kunit_try_run_case+0x1a5/0x480 [ 17.708560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.709340] kthread+0x337/0x6f0 [ 17.709887] ret_from_fork+0x116/0x1d0 [ 17.710299] ret_from_fork_asm+0x1a/0x30 [ 17.710635] [ 17.710998] The buggy address belongs to the object at ffff8881033ecb00 [ 17.710998] which belongs to the cache kmalloc-64 of size 64 [ 17.712323] The buggy address is located 0 bytes to the right of [ 17.712323] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.713023] [ 17.713535] The buggy address belongs to the physical page: [ 17.714019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.714673] flags: 0x200000000000000(node=0|zone=2) [ 17.715217] page_type: f5(slab) [ 17.715434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.716244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.717158] page dumped because: kasan: bad access detected [ 17.717524] [ 17.717747] Memory state around the buggy address: [ 17.718077] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.718596] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.719206] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.719908] ^ [ 17.720092] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720403] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720982] ================================================================== [ 19.201168] ================================================================== [ 19.201801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 19.202581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.203142] [ 19.203420] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.203538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.203567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.203614] Call Trace: [ 19.203659] <TASK> [ 19.203704] dump_stack_lvl+0x73/0xb0 [ 19.203781] print_report+0xd1/0x650 [ 19.203840] ? __virt_addr_valid+0x1db/0x2d0 [ 19.203897] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.203954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.204009] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.204066] kasan_report+0x141/0x180 [ 19.204122] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.204188] kasan_check_range+0x10c/0x1c0 [ 19.204242] __kasan_check_write+0x18/0x20 [ 19.204294] kasan_atomics_helper+0x1a7f/0x5450 [ 19.204347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.204395] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.204445] ? kasan_atomics+0x152/0x310 [ 19.204514] kasan_atomics+0x1dc/0x310 [ 19.204561] ? __pfx_kasan_atomics+0x10/0x10 [ 19.204611] ? __pfx_read_tsc+0x10/0x10 [ 19.204659] ? ktime_get_ts64+0x86/0x230 [ 19.204717] kunit_try_run_case+0x1a5/0x480 [ 19.204766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.204812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.204870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.204925] ? __kthread_parkme+0x82/0x180 [ 19.204974] ? preempt_count_sub+0x50/0x80 [ 19.205032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.205082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.205146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.205190] kthread+0x337/0x6f0 [ 19.205253] ? trace_preempt_on+0x20/0xc0 [ 19.205298] ? __pfx_kthread+0x10/0x10 [ 19.205336] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.205379] ? calculate_sigpending+0x7b/0xa0 [ 19.205430] ? __pfx_kthread+0x10/0x10 [ 19.205484] ret_from_fork+0x116/0x1d0 [ 19.205527] ? __pfx_kthread+0x10/0x10 [ 19.205567] ret_from_fork_asm+0x1a/0x30 [ 19.205635] </TASK> [ 19.205663] [ 19.219955] Allocated by task 282: [ 19.220328] kasan_save_stack+0x45/0x70 [ 19.220854] kasan_save_track+0x18/0x40 [ 19.221355] kasan_save_alloc_info+0x3b/0x50 [ 19.221804] __kasan_kmalloc+0xb7/0xc0 [ 19.222214] __kmalloc_cache_noprof+0x189/0x420 [ 19.222553] kasan_atomics+0x95/0x310 [ 19.222673] kunit_try_run_case+0x1a5/0x480 [ 19.222780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.222901] kthread+0x337/0x6f0 [ 19.222996] ret_from_fork+0x116/0x1d0 [ 19.223091] ret_from_fork_asm+0x1a/0x30 [ 19.223193] [ 19.223392] The buggy address belongs to the object at ffff8881033ecb00 [ 19.223392] which belongs to the cache kmalloc-64 of size 64 [ 19.224472] The buggy address is located 0 bytes to the right of [ 19.224472] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.225539] [ 19.225775] The buggy address belongs to the physical page: [ 19.226283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.226940] flags: 0x200000000000000(node=0|zone=2) [ 19.227156] page_type: f5(slab) [ 19.227935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.228592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.229526] page dumped because: kasan: bad access detected [ 19.229859] [ 19.229997] Memory state around the buggy address: [ 19.230610] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.231059] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.231416] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.231898] ^ [ 19.232296] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.232621] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.233494] ================================================================== [ 17.834581] ================================================================== [ 17.835104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 17.835930] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.836367] [ 17.836638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.836990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.837030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.837079] Call Trace: [ 17.837130] <TASK> [ 17.837190] dump_stack_lvl+0x73/0xb0 [ 17.837295] print_report+0xd1/0x650 [ 17.837343] ? __virt_addr_valid+0x1db/0x2d0 [ 17.837395] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.837474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.837528] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.837589] kasan_report+0x141/0x180 [ 17.837634] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.837694] kasan_check_range+0x10c/0x1c0 [ 17.837759] __kasan_check_write+0x18/0x20 [ 17.837807] kasan_atomics_helper+0x4a0/0x5450 [ 17.837863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.837918] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.837973] ? kasan_atomics+0x152/0x310 [ 17.838014] kasan_atomics+0x1dc/0x310 [ 17.838043] ? __pfx_kasan_atomics+0x10/0x10 [ 17.838072] ? __pfx_read_tsc+0x10/0x10 [ 17.838100] ? ktime_get_ts64+0x86/0x230 [ 17.838132] kunit_try_run_case+0x1a5/0x480 [ 17.838159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.838182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.838223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.838260] ? __kthread_parkme+0x82/0x180 [ 17.838286] ? preempt_count_sub+0x50/0x80 [ 17.838314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.838338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.838368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.838397] kthread+0x337/0x6f0 [ 17.838421] ? trace_preempt_on+0x20/0xc0 [ 17.838450] ? __pfx_kthread+0x10/0x10 [ 17.838508] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.838548] ? calculate_sigpending+0x7b/0xa0 [ 17.838591] ? __pfx_kthread+0x10/0x10 [ 17.838628] ret_from_fork+0x116/0x1d0 [ 17.838661] ? __pfx_kthread+0x10/0x10 [ 17.838696] ret_from_fork_asm+0x1a/0x30 [ 17.838744] </TASK> [ 17.838767] [ 17.853604] Allocated by task 282: [ 17.853944] kasan_save_stack+0x45/0x70 [ 17.854629] kasan_save_track+0x18/0x40 [ 17.855570] kasan_save_alloc_info+0x3b/0x50 [ 17.856058] __kasan_kmalloc+0xb7/0xc0 [ 17.856492] __kmalloc_cache_noprof+0x189/0x420 [ 17.856982] kasan_atomics+0x95/0x310 [ 17.857263] kunit_try_run_case+0x1a5/0x480 [ 17.857652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.858268] kthread+0x337/0x6f0 [ 17.858589] ret_from_fork+0x116/0x1d0 [ 17.858925] ret_from_fork_asm+0x1a/0x30 [ 17.859914] [ 17.860057] The buggy address belongs to the object at ffff8881033ecb00 [ 17.860057] which belongs to the cache kmalloc-64 of size 64 [ 17.860815] The buggy address is located 0 bytes to the right of [ 17.860815] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.862620] [ 17.863440] The buggy address belongs to the physical page: [ 17.864031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.864622] flags: 0x200000000000000(node=0|zone=2) [ 17.865243] page_type: f5(slab) [ 17.865526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.866022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.866726] page dumped because: kasan: bad access detected [ 17.867418] [ 17.867648] Memory state around the buggy address: [ 17.868359] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.868746] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.869314] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.869949] ^ [ 17.870405] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870925] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.871578] ================================================================== [ 19.380959] ================================================================== [ 19.381712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 19.381993] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.382274] [ 19.382398] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.383308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.383365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.383417] Call Trace: [ 19.383478] <TASK> [ 19.383522] dump_stack_lvl+0x73/0xb0 [ 19.383601] print_report+0xd1/0x650 [ 19.383661] ? __virt_addr_valid+0x1db/0x2d0 [ 19.383714] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.383786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.383848] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.383906] kasan_report+0x141/0x180 [ 19.383965] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.384033] kasan_check_range+0x10c/0x1c0 [ 19.384094] __kasan_check_write+0x18/0x20 [ 19.384139] kasan_atomics_helper+0x1e12/0x5450 [ 19.384191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.384235] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.384279] ? kasan_atomics+0x152/0x310 [ 19.384336] kasan_atomics+0x1dc/0x310 [ 19.384386] ? __pfx_kasan_atomics+0x10/0x10 [ 19.384443] ? __pfx_read_tsc+0x10/0x10 [ 19.384506] ? ktime_get_ts64+0x86/0x230 [ 19.384569] kunit_try_run_case+0x1a5/0x480 [ 19.384628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.384679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.384740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.384799] ? __kthread_parkme+0x82/0x180 [ 19.384850] ? preempt_count_sub+0x50/0x80 [ 19.384923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.384968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.385018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.385076] kthread+0x337/0x6f0 [ 19.385126] ? trace_preempt_on+0x20/0xc0 [ 19.385182] ? __pfx_kthread+0x10/0x10 [ 19.385228] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.385282] ? calculate_sigpending+0x7b/0xa0 [ 19.385339] ? __pfx_kthread+0x10/0x10 [ 19.385393] ret_from_fork+0x116/0x1d0 [ 19.385438] ? __pfx_kthread+0x10/0x10 [ 19.385501] ret_from_fork_asm+0x1a/0x30 [ 19.385579] </TASK> [ 19.385608] [ 19.395919] Allocated by task 282: [ 19.396177] kasan_save_stack+0x45/0x70 [ 19.396464] kasan_save_track+0x18/0x40 [ 19.396840] kasan_save_alloc_info+0x3b/0x50 [ 19.397330] __kasan_kmalloc+0xb7/0xc0 [ 19.397727] __kmalloc_cache_noprof+0x189/0x420 [ 19.398132] kasan_atomics+0x95/0x310 [ 19.398549] kunit_try_run_case+0x1a5/0x480 [ 19.398958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.399481] kthread+0x337/0x6f0 [ 19.399845] ret_from_fork+0x116/0x1d0 [ 19.400246] ret_from_fork_asm+0x1a/0x30 [ 19.400653] [ 19.400846] The buggy address belongs to the object at ffff8881033ecb00 [ 19.400846] which belongs to the cache kmalloc-64 of size 64 [ 19.401479] The buggy address is located 0 bytes to the right of [ 19.401479] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.401932] [ 19.402061] The buggy address belongs to the physical page: [ 19.402318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.402922] flags: 0x200000000000000(node=0|zone=2) [ 19.403462] page_type: f5(slab) [ 19.403862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.404525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.405096] page dumped because: kasan: bad access detected [ 19.405534] [ 19.405655] Memory state around the buggy address: [ 19.405882] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406171] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406641] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.407294] ^ [ 19.407749] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408373] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408951] ================================================================== [ 17.762034] ================================================================== [ 17.762958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 17.763970] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.764717] [ 17.764864] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.764957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.764981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.765020] Call Trace: [ 17.765061] <TASK> [ 17.765100] dump_stack_lvl+0x73/0xb0 [ 17.765153] print_report+0xd1/0x650 [ 17.765249] ? __virt_addr_valid+0x1db/0x2d0 [ 17.765334] ? kasan_atomics_helper+0x3df/0x5450 [ 17.765384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.765469] ? kasan_atomics_helper+0x3df/0x5450 [ 17.765525] kasan_report+0x141/0x180 [ 17.765581] ? kasan_atomics_helper+0x3df/0x5450 [ 17.765638] kasan_check_range+0x10c/0x1c0 [ 17.765688] __kasan_check_read+0x15/0x20 [ 17.765968] kasan_atomics_helper+0x3df/0x5450 [ 17.766143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.766209] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.766258] ? kasan_atomics+0x152/0x310 [ 17.766323] kasan_atomics+0x1dc/0x310 [ 17.766382] ? __pfx_kasan_atomics+0x10/0x10 [ 17.766441] ? __pfx_read_tsc+0x10/0x10 [ 17.766516] ? ktime_get_ts64+0x86/0x230 [ 17.766552] kunit_try_run_case+0x1a5/0x480 [ 17.766581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.766605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.766638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.766667] ? __kthread_parkme+0x82/0x180 [ 17.766700] ? preempt_count_sub+0x50/0x80 [ 17.766747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.766772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.766802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.766832] kthread+0x337/0x6f0 [ 17.766857] ? trace_preempt_on+0x20/0xc0 [ 17.766885] ? __pfx_kthread+0x10/0x10 [ 17.766909] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.766936] ? calculate_sigpending+0x7b/0xa0 [ 17.766965] ? __pfx_kthread+0x10/0x10 [ 17.766990] ret_from_fork+0x116/0x1d0 [ 17.767013] ? __pfx_kthread+0x10/0x10 [ 17.767038] ret_from_fork_asm+0x1a/0x30 [ 17.767075] </TASK> [ 17.767090] [ 17.778020] Allocated by task 282: [ 17.778440] kasan_save_stack+0x45/0x70 [ 17.778954] kasan_save_track+0x18/0x40 [ 17.779312] kasan_save_alloc_info+0x3b/0x50 [ 17.779560] __kasan_kmalloc+0xb7/0xc0 [ 17.779768] __kmalloc_cache_noprof+0x189/0x420 [ 17.779991] kasan_atomics+0x95/0x310 [ 17.780228] kunit_try_run_case+0x1a5/0x480 [ 17.780445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.780914] kthread+0x337/0x6f0 [ 17.781208] ret_from_fork+0x116/0x1d0 [ 17.781536] ret_from_fork_asm+0x1a/0x30 [ 17.781877] [ 17.782369] The buggy address belongs to the object at ffff8881033ecb00 [ 17.782369] which belongs to the cache kmalloc-64 of size 64 [ 17.783444] The buggy address is located 0 bytes to the right of [ 17.783444] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.784133] [ 17.784268] The buggy address belongs to the physical page: [ 17.784521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.785105] flags: 0x200000000000000(node=0|zone=2) [ 17.785757] page_type: f5(slab) [ 17.786057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.786760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.787444] page dumped because: kasan: bad access detected [ 17.787913] [ 17.788102] Memory state around the buggy address: [ 17.788608] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.789307] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.789841] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.790483] ^ [ 17.790682] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.790931] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.791600] ================================================================== [ 18.054375] ================================================================== [ 18.054936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 18.055544] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.056029] [ 18.056296] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.056410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.056443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.056503] Call Trace: [ 18.056549] <TASK> [ 18.056589] dump_stack_lvl+0x73/0xb0 [ 18.056660] print_report+0xd1/0x650 [ 18.056716] ? __virt_addr_valid+0x1db/0x2d0 [ 18.056769] ? kasan_atomics_helper+0x7c7/0x5450 [ 18.056820] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.056868] ? kasan_atomics_helper+0x7c7/0x5450 [ 18.056916] kasan_report+0x141/0x180 [ 18.056964] ? kasan_atomics_helper+0x7c7/0x5450 [ 18.057024] kasan_check_range+0x10c/0x1c0 [ 18.057080] __kasan_check_write+0x18/0x20 [ 18.057129] kasan_atomics_helper+0x7c7/0x5450 [ 18.057184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.057280] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.057336] ? kasan_atomics+0x152/0x310 [ 18.057402] kasan_atomics+0x1dc/0x310 [ 18.057467] ? __pfx_kasan_atomics+0x10/0x10 [ 18.057525] ? __pfx_read_tsc+0x10/0x10 [ 18.057572] ? ktime_get_ts64+0x86/0x230 [ 18.057628] kunit_try_run_case+0x1a5/0x480 [ 18.057679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.057726] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.057789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.057848] ? __kthread_parkme+0x82/0x180 [ 18.057900] ? preempt_count_sub+0x50/0x80 [ 18.057959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.058012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.058061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.058116] kthread+0x337/0x6f0 [ 18.058164] ? trace_preempt_on+0x20/0xc0 [ 18.058256] ? __pfx_kthread+0x10/0x10 [ 18.058301] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.058348] ? calculate_sigpending+0x7b/0xa0 [ 18.058398] ? __pfx_kthread+0x10/0x10 [ 18.058438] ret_from_fork+0x116/0x1d0 [ 18.058490] ? __pfx_kthread+0x10/0x10 [ 18.058534] ret_from_fork_asm+0x1a/0x30 [ 18.058597] </TASK> [ 18.058624] [ 18.069559] Allocated by task 282: [ 18.069917] kasan_save_stack+0x45/0x70 [ 18.070226] kasan_save_track+0x18/0x40 [ 18.070510] kasan_save_alloc_info+0x3b/0x50 [ 18.070812] __kasan_kmalloc+0xb7/0xc0 [ 18.071077] __kmalloc_cache_noprof+0x189/0x420 [ 18.071330] kasan_atomics+0x95/0x310 [ 18.071621] kunit_try_run_case+0x1a5/0x480 [ 18.071993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.072462] kthread+0x337/0x6f0 [ 18.072751] ret_from_fork+0x116/0x1d0 [ 18.073071] ret_from_fork_asm+0x1a/0x30 [ 18.073322] [ 18.073512] The buggy address belongs to the object at ffff8881033ecb00 [ 18.073512] which belongs to the cache kmalloc-64 of size 64 [ 18.074084] The buggy address is located 0 bytes to the right of [ 18.074084] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.074748] [ 18.074877] The buggy address belongs to the physical page: [ 18.075094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.075444] flags: 0x200000000000000(node=0|zone=2) [ 18.075686] page_type: f5(slab) [ 18.075864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.076144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.076444] page dumped because: kasan: bad access detected [ 18.076878] [ 18.077066] Memory state around the buggy address: [ 18.077490] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.078006] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.078589] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.079095] ^ [ 18.079527] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.080070] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.080630] ================================================================== [ 18.797056] ================================================================== [ 18.798303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 18.798991] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.799733] [ 18.799918] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.800037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.800073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.800164] Call Trace: [ 18.800229] <TASK> [ 18.800303] dump_stack_lvl+0x73/0xb0 [ 18.800397] print_report+0xd1/0x650 [ 18.800465] ? __virt_addr_valid+0x1db/0x2d0 [ 18.800523] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.800575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.800661] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.800736] kasan_report+0x141/0x180 [ 18.800794] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.800856] kasan_check_range+0x10c/0x1c0 [ 18.800914] __kasan_check_read+0x15/0x20 [ 18.800995] kasan_atomics_helper+0x13b5/0x5450 [ 18.801064] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.801120] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.801163] ? kasan_atomics+0x152/0x310 [ 18.801204] kasan_atomics+0x1dc/0x310 [ 18.801273] ? __pfx_kasan_atomics+0x10/0x10 [ 18.801303] ? __pfx_read_tsc+0x10/0x10 [ 18.801331] ? ktime_get_ts64+0x86/0x230 [ 18.801363] kunit_try_run_case+0x1a5/0x480 [ 18.801390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.801413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.801444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.801498] ? __kthread_parkme+0x82/0x180 [ 18.801524] ? preempt_count_sub+0x50/0x80 [ 18.801552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.801577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.801608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.801636] kthread+0x337/0x6f0 [ 18.801660] ? trace_preempt_on+0x20/0xc0 [ 18.801687] ? __pfx_kthread+0x10/0x10 [ 18.801711] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.801736] ? calculate_sigpending+0x7b/0xa0 [ 18.801765] ? __pfx_kthread+0x10/0x10 [ 18.801788] ret_from_fork+0x116/0x1d0 [ 18.801810] ? __pfx_kthread+0x10/0x10 [ 18.801835] ret_from_fork_asm+0x1a/0x30 [ 18.801871] </TASK> [ 18.801886] [ 18.816589] Allocated by task 282: [ 18.816927] kasan_save_stack+0x45/0x70 [ 18.817939] kasan_save_track+0x18/0x40 [ 18.818205] kasan_save_alloc_info+0x3b/0x50 [ 18.818893] __kasan_kmalloc+0xb7/0xc0 [ 18.819090] __kmalloc_cache_noprof+0x189/0x420 [ 18.819750] kasan_atomics+0x95/0x310 [ 18.820041] kunit_try_run_case+0x1a5/0x480 [ 18.820539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.820839] kthread+0x337/0x6f0 [ 18.821352] ret_from_fork+0x116/0x1d0 [ 18.821601] ret_from_fork_asm+0x1a/0x30 [ 18.821915] [ 18.822048] The buggy address belongs to the object at ffff8881033ecb00 [ 18.822048] which belongs to the cache kmalloc-64 of size 64 [ 18.823256] The buggy address is located 0 bytes to the right of [ 18.823256] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.823782] [ 18.824290] The buggy address belongs to the physical page: [ 18.824811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.825330] flags: 0x200000000000000(node=0|zone=2) [ 18.825859] page_type: f5(slab) [ 18.826091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.826726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.827084] page dumped because: kasan: bad access detected [ 18.827581] [ 18.828048] Memory state around the buggy address: [ 18.828332] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.829115] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.829635] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.829988] ^ [ 18.830700] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.831082] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.831850] ================================================================== [ 19.575176] ================================================================== [ 19.575910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 19.576398] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.576711] [ 19.576868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.576932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.576948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.576977] Call Trace: [ 19.577004] <TASK> [ 19.577030] dump_stack_lvl+0x73/0xb0 [ 19.577067] print_report+0xd1/0x650 [ 19.577095] ? __virt_addr_valid+0x1db/0x2d0 [ 19.577124] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.577150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.577178] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.577252] kasan_report+0x141/0x180 [ 19.577298] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.577346] __asan_report_load8_noabort+0x18/0x20 [ 19.577371] kasan_atomics_helper+0x4fb2/0x5450 [ 19.577399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.577427] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.577462] ? kasan_atomics+0x152/0x310 [ 19.577500] kasan_atomics+0x1dc/0x310 [ 19.577529] ? __pfx_kasan_atomics+0x10/0x10 [ 19.577559] ? __pfx_read_tsc+0x10/0x10 [ 19.577586] ? ktime_get_ts64+0x86/0x230 [ 19.577616] kunit_try_run_case+0x1a5/0x480 [ 19.577644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.577668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.577698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.577729] ? __kthread_parkme+0x82/0x180 [ 19.577755] ? preempt_count_sub+0x50/0x80 [ 19.577784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.577809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.577839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.577868] kthread+0x337/0x6f0 [ 19.577892] ? trace_preempt_on+0x20/0xc0 [ 19.577919] ? __pfx_kthread+0x10/0x10 [ 19.577946] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.577973] ? calculate_sigpending+0x7b/0xa0 [ 19.578003] ? __pfx_kthread+0x10/0x10 [ 19.578030] ret_from_fork+0x116/0x1d0 [ 19.578053] ? __pfx_kthread+0x10/0x10 [ 19.578077] ret_from_fork_asm+0x1a/0x30 [ 19.578116] </TASK> [ 19.578130] [ 19.585582] Allocated by task 282: [ 19.585821] kasan_save_stack+0x45/0x70 [ 19.585936] kasan_save_track+0x18/0x40 [ 19.586037] kasan_save_alloc_info+0x3b/0x50 [ 19.586142] __kasan_kmalloc+0xb7/0xc0 [ 19.586330] __kmalloc_cache_noprof+0x189/0x420 [ 19.586508] kasan_atomics+0x95/0x310 [ 19.586656] kunit_try_run_case+0x1a5/0x480 [ 19.586799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.586965] kthread+0x337/0x6f0 [ 19.587080] ret_from_fork+0x116/0x1d0 [ 19.587372] ret_from_fork_asm+0x1a/0x30 [ 19.587678] [ 19.587817] The buggy address belongs to the object at ffff8881033ecb00 [ 19.587817] which belongs to the cache kmalloc-64 of size 64 [ 19.588557] The buggy address is located 0 bytes to the right of [ 19.588557] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.589088] [ 19.589156] The buggy address belongs to the physical page: [ 19.589304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.589484] flags: 0x200000000000000(node=0|zone=2) [ 19.589823] page_type: f5(slab) [ 19.590030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.590526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.590995] page dumped because: kasan: bad access detected [ 19.591236] [ 19.591369] Memory state around the buggy address: [ 19.591501] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591651] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591795] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.592271] ^ [ 19.592613] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593072] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593377] ================================================================== [ 19.636035] ================================================================== [ 19.636611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 19.637140] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.637477] [ 19.637638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.637839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.637888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.637919] Call Trace: [ 19.637949] <TASK> [ 19.637977] dump_stack_lvl+0x73/0xb0 [ 19.638033] print_report+0xd1/0x650 [ 19.638063] ? __virt_addr_valid+0x1db/0x2d0 [ 19.638093] ? kasan_atomics_helper+0x224c/0x5450 [ 19.638121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.638149] ? kasan_atomics_helper+0x224c/0x5450 [ 19.638176] kasan_report+0x141/0x180 [ 19.638218] ? kasan_atomics_helper+0x224c/0x5450 [ 19.638252] kasan_check_range+0x10c/0x1c0 [ 19.638281] __kasan_check_write+0x18/0x20 [ 19.638306] kasan_atomics_helper+0x224c/0x5450 [ 19.638333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.638361] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.638387] ? kasan_atomics+0x152/0x310 [ 19.638420] kasan_atomics+0x1dc/0x310 [ 19.638448] ? __pfx_kasan_atomics+0x10/0x10 [ 19.638500] ? __pfx_read_tsc+0x10/0x10 [ 19.638529] ? ktime_get_ts64+0x86/0x230 [ 19.638560] kunit_try_run_case+0x1a5/0x480 [ 19.638589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.638614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.638645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.638677] ? __kthread_parkme+0x82/0x180 [ 19.638705] ? preempt_count_sub+0x50/0x80 [ 19.638735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.638762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.638793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.638826] kthread+0x337/0x6f0 [ 19.638853] ? trace_preempt_on+0x20/0xc0 [ 19.638883] ? __pfx_kthread+0x10/0x10 [ 19.638910] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.638940] ? calculate_sigpending+0x7b/0xa0 [ 19.638974] ? __pfx_kthread+0x10/0x10 [ 19.639003] ret_from_fork+0x116/0x1d0 [ 19.639029] ? __pfx_kthread+0x10/0x10 [ 19.639057] ret_from_fork_asm+0x1a/0x30 [ 19.639098] </TASK> [ 19.639114] [ 19.647954] Allocated by task 282: [ 19.648254] kasan_save_stack+0x45/0x70 [ 19.648514] kasan_save_track+0x18/0x40 [ 19.648667] kasan_save_alloc_info+0x3b/0x50 [ 19.648814] __kasan_kmalloc+0xb7/0xc0 [ 19.648953] __kmalloc_cache_noprof+0x189/0x420 [ 19.649289] kasan_atomics+0x95/0x310 [ 19.649591] kunit_try_run_case+0x1a5/0x480 [ 19.649918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.650338] kthread+0x337/0x6f0 [ 19.650609] ret_from_fork+0x116/0x1d0 [ 19.650869] ret_from_fork_asm+0x1a/0x30 [ 19.651146] [ 19.651335] The buggy address belongs to the object at ffff8881033ecb00 [ 19.651335] which belongs to the cache kmalloc-64 of size 64 [ 19.651843] The buggy address is located 0 bytes to the right of [ 19.651843] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.652402] [ 19.652515] The buggy address belongs to the physical page: [ 19.653370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.653610] flags: 0x200000000000000(node=0|zone=2) [ 19.653749] page_type: f5(slab) [ 19.653889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.654436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.655482] page dumped because: kasan: bad access detected [ 19.655871] [ 19.655985] Memory state around the buggy address: [ 19.656234] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656562] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656727] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.657148] ^ [ 19.657502] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.657843] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.658234] ================================================================== [ 18.267042] ================================================================== [ 18.267520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 18.268284] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.269073] [ 18.269649] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.269725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.269743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.269772] Call Trace: [ 18.269798] <TASK> [ 18.269828] dump_stack_lvl+0x73/0xb0 [ 18.269873] print_report+0xd1/0x650 [ 18.269901] ? __virt_addr_valid+0x1db/0x2d0 [ 18.269930] ? kasan_atomics_helper+0xc70/0x5450 [ 18.269955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.269982] ? kasan_atomics_helper+0xc70/0x5450 [ 18.270007] kasan_report+0x141/0x180 [ 18.270032] ? kasan_atomics_helper+0xc70/0x5450 [ 18.270063] kasan_check_range+0x10c/0x1c0 [ 18.270089] __kasan_check_write+0x18/0x20 [ 18.270111] kasan_atomics_helper+0xc70/0x5450 [ 18.270135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.270159] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.270184] ? kasan_atomics+0x152/0x310 [ 18.270246] kasan_atomics+0x1dc/0x310 [ 18.270277] ? __pfx_kasan_atomics+0x10/0x10 [ 18.270306] ? __pfx_read_tsc+0x10/0x10 [ 18.270332] ? ktime_get_ts64+0x86/0x230 [ 18.270360] kunit_try_run_case+0x1a5/0x480 [ 18.270386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.270408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.270437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.270486] ? __kthread_parkme+0x82/0x180 [ 18.270514] ? preempt_count_sub+0x50/0x80 [ 18.270545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.270568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.270598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.270626] kthread+0x337/0x6f0 [ 18.270650] ? trace_preempt_on+0x20/0xc0 [ 18.270677] ? __pfx_kthread+0x10/0x10 [ 18.270701] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.270726] ? calculate_sigpending+0x7b/0xa0 [ 18.270756] ? __pfx_kthread+0x10/0x10 [ 18.270780] ret_from_fork+0x116/0x1d0 [ 18.270803] ? __pfx_kthread+0x10/0x10 [ 18.270826] ret_from_fork_asm+0x1a/0x30 [ 18.270861] </TASK> [ 18.270875] [ 18.284791] Allocated by task 282: [ 18.285035] kasan_save_stack+0x45/0x70 [ 18.285320] kasan_save_track+0x18/0x40 [ 18.286009] kasan_save_alloc_info+0x3b/0x50 [ 18.286192] __kasan_kmalloc+0xb7/0xc0 [ 18.286772] __kmalloc_cache_noprof+0x189/0x420 [ 18.287225] kasan_atomics+0x95/0x310 [ 18.287618] kunit_try_run_case+0x1a5/0x480 [ 18.288032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.288858] kthread+0x337/0x6f0 [ 18.289104] ret_from_fork+0x116/0x1d0 [ 18.289296] ret_from_fork_asm+0x1a/0x30 [ 18.289797] [ 18.290006] The buggy address belongs to the object at ffff8881033ecb00 [ 18.290006] which belongs to the cache kmalloc-64 of size 64 [ 18.291179] The buggy address is located 0 bytes to the right of [ 18.291179] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.291784] [ 18.292165] The buggy address belongs to the physical page: [ 18.292533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.293066] flags: 0x200000000000000(node=0|zone=2) [ 18.293477] page_type: f5(slab) [ 18.293833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.294239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.294724] page dumped because: kasan: bad access detected [ 18.295133] [ 18.295267] Memory state around the buggy address: [ 18.295528] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.296106] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.296470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.297017] ^ [ 18.297428] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.297742] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.298300] ================================================================== [ 18.563835] ================================================================== [ 18.564830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 18.565440] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.565761] [ 18.565972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.566078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.566110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.566163] Call Trace: [ 18.566206] <TASK> [ 18.566537] dump_stack_lvl+0x73/0xb0 [ 18.566627] print_report+0xd1/0x650 [ 18.566687] ? __virt_addr_valid+0x1db/0x2d0 [ 18.566747] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.566788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.566817] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.566845] kasan_report+0x141/0x180 [ 18.566871] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.566902] __asan_report_load4_noabort+0x18/0x20 [ 18.566926] kasan_atomics_helper+0x4a1c/0x5450 [ 18.566953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.566980] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.567006] ? kasan_atomics+0x152/0x310 [ 18.567037] kasan_atomics+0x1dc/0x310 [ 18.567065] ? __pfx_kasan_atomics+0x10/0x10 [ 18.567093] ? __pfx_read_tsc+0x10/0x10 [ 18.567119] ? ktime_get_ts64+0x86/0x230 [ 18.567147] kunit_try_run_case+0x1a5/0x480 [ 18.567174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.567219] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.567259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.567291] ? __kthread_parkme+0x82/0x180 [ 18.567316] ? preempt_count_sub+0x50/0x80 [ 18.567385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.567416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.567447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.567498] kthread+0x337/0x6f0 [ 18.567523] ? trace_preempt_on+0x20/0xc0 [ 18.567552] ? __pfx_kthread+0x10/0x10 [ 18.567577] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.567604] ? calculate_sigpending+0x7b/0xa0 [ 18.567633] ? __pfx_kthread+0x10/0x10 [ 18.567659] ret_from_fork+0x116/0x1d0 [ 18.567682] ? __pfx_kthread+0x10/0x10 [ 18.567706] ret_from_fork_asm+0x1a/0x30 [ 18.567744] </TASK> [ 18.567759] [ 18.581790] Allocated by task 282: [ 18.582574] kasan_save_stack+0x45/0x70 [ 18.582903] kasan_save_track+0x18/0x40 [ 18.583190] kasan_save_alloc_info+0x3b/0x50 [ 18.583799] __kasan_kmalloc+0xb7/0xc0 [ 18.584067] __kmalloc_cache_noprof+0x189/0x420 [ 18.584703] kasan_atomics+0x95/0x310 [ 18.584958] kunit_try_run_case+0x1a5/0x480 [ 18.585152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.585736] kthread+0x337/0x6f0 [ 18.585959] ret_from_fork+0x116/0x1d0 [ 18.586174] ret_from_fork_asm+0x1a/0x30 [ 18.587107] [ 18.587239] The buggy address belongs to the object at ffff8881033ecb00 [ 18.587239] which belongs to the cache kmalloc-64 of size 64 [ 18.588450] The buggy address is located 0 bytes to the right of [ 18.588450] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.589551] [ 18.589809] The buggy address belongs to the physical page: [ 18.590033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.590672] flags: 0x200000000000000(node=0|zone=2) [ 18.591286] page_type: f5(slab) [ 18.591842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.592299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.592898] page dumped because: kasan: bad access detected [ 18.593225] [ 18.593817] Memory state around the buggy address: [ 18.594128] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.594695] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.595173] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.595970] ^ [ 18.596478] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.596875] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.597525] ================================================================== [ 17.913775] ================================================================== [ 17.914856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 17.916402] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.917849] [ 17.918036] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.918145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.918177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.918224] Call Trace: [ 17.918268] <TASK> [ 17.918310] dump_stack_lvl+0x73/0xb0 [ 17.918386] print_report+0xd1/0x650 [ 17.918435] ? __virt_addr_valid+0x1db/0x2d0 [ 17.918498] ? kasan_atomics_helper+0x565/0x5450 [ 17.918571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.918618] ? kasan_atomics_helper+0x565/0x5450 [ 17.918667] kasan_report+0x141/0x180 [ 17.918716] ? kasan_atomics_helper+0x565/0x5450 [ 17.918773] kasan_check_range+0x10c/0x1c0 [ 17.918825] __kasan_check_write+0x18/0x20 [ 17.918868] kasan_atomics_helper+0x565/0x5450 [ 17.918917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.918965] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.919005] ? kasan_atomics+0x152/0x310 [ 17.919053] kasan_atomics+0x1dc/0x310 [ 17.919095] ? __pfx_kasan_atomics+0x10/0x10 [ 17.919139] ? __pfx_read_tsc+0x10/0x10 [ 17.919194] ? ktime_get_ts64+0x86/0x230 [ 17.919241] kunit_try_run_case+0x1a5/0x480 [ 17.919284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.919324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.919385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.919430] ? __kthread_parkme+0x82/0x180 [ 17.921094] ? preempt_count_sub+0x50/0x80 [ 17.921177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.921265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.921323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.921371] kthread+0x337/0x6f0 [ 17.921412] ? trace_preempt_on+0x20/0xc0 [ 17.921478] ? __pfx_kthread+0x10/0x10 [ 17.921521] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.921568] ? calculate_sigpending+0x7b/0xa0 [ 17.921618] ? __pfx_kthread+0x10/0x10 [ 17.921662] ret_from_fork+0x116/0x1d0 [ 17.921949] ? __pfx_kthread+0x10/0x10 [ 17.922005] ret_from_fork_asm+0x1a/0x30 [ 17.922072] </TASK> [ 17.922098] [ 17.941360] Allocated by task 282: [ 17.942813] kasan_save_stack+0x45/0x70 [ 17.943053] kasan_save_track+0x18/0x40 [ 17.943196] kasan_save_alloc_info+0x3b/0x50 [ 17.943865] __kasan_kmalloc+0xb7/0xc0 [ 17.944544] __kmalloc_cache_noprof+0x189/0x420 [ 17.944758] kasan_atomics+0x95/0x310 [ 17.945452] kunit_try_run_case+0x1a5/0x480 [ 17.945969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.946423] kthread+0x337/0x6f0 [ 17.946616] ret_from_fork+0x116/0x1d0 [ 17.946919] ret_from_fork_asm+0x1a/0x30 [ 17.947273] [ 17.947412] The buggy address belongs to the object at ffff8881033ecb00 [ 17.947412] which belongs to the cache kmalloc-64 of size 64 [ 17.948533] The buggy address is located 0 bytes to the right of [ 17.948533] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.949023] [ 17.949240] The buggy address belongs to the physical page: [ 17.949850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.950523] flags: 0x200000000000000(node=0|zone=2) [ 17.950971] page_type: f5(slab) [ 17.952285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.952683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.953306] page dumped because: kasan: bad access detected [ 17.953926] [ 17.954101] Memory state around the buggy address: [ 17.954518] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.955734] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.956258] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.956909] ^ [ 17.957545] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.958169] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.958730] ================================================================== [ 17.996533] ================================================================== [ 17.997207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 17.997844] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.998617] [ 17.998865] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.998965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.998990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.999031] Call Trace: [ 17.999071] <TASK> [ 17.999112] dump_stack_lvl+0x73/0xb0 [ 17.999175] print_report+0xd1/0x650 [ 17.999253] ? __virt_addr_valid+0x1db/0x2d0 [ 17.999295] ? kasan_atomics_helper+0x697/0x5450 [ 17.999332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.999385] ? kasan_atomics_helper+0x697/0x5450 [ 17.999428] kasan_report+0x141/0x180 [ 17.999491] ? kasan_atomics_helper+0x697/0x5450 [ 17.999545] kasan_check_range+0x10c/0x1c0 [ 17.999596] __kasan_check_write+0x18/0x20 [ 17.999643] kasan_atomics_helper+0x697/0x5450 [ 17.999724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.999784] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.999834] ? kasan_atomics+0x152/0x310 [ 17.999899] kasan_atomics+0x1dc/0x310 [ 17.999963] ? __pfx_kasan_atomics+0x10/0x10 [ 18.000019] ? __pfx_read_tsc+0x10/0x10 [ 18.000073] ? ktime_get_ts64+0x86/0x230 [ 18.000137] kunit_try_run_case+0x1a5/0x480 [ 18.000222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.000275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.000332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.000379] ? __kthread_parkme+0x82/0x180 [ 18.000424] ? preempt_count_sub+0x50/0x80 [ 18.000490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.000549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.000622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.000677] kthread+0x337/0x6f0 [ 18.000725] ? trace_preempt_on+0x20/0xc0 [ 18.000774] ? __pfx_kthread+0x10/0x10 [ 18.000834] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.000903] ? calculate_sigpending+0x7b/0xa0 [ 18.000955] ? __pfx_kthread+0x10/0x10 [ 18.000994] ret_from_fork+0x116/0x1d0 [ 18.001030] ? __pfx_kthread+0x10/0x10 [ 18.001054] ret_from_fork_asm+0x1a/0x30 [ 18.001091] </TASK> [ 18.001107] [ 18.012114] Allocated by task 282: [ 18.012568] kasan_save_stack+0x45/0x70 [ 18.013115] kasan_save_track+0x18/0x40 [ 18.013555] kasan_save_alloc_info+0x3b/0x50 [ 18.013980] __kasan_kmalloc+0xb7/0xc0 [ 18.014332] __kmalloc_cache_noprof+0x189/0x420 [ 18.014789] kasan_atomics+0x95/0x310 [ 18.015270] kunit_try_run_case+0x1a5/0x480 [ 18.015837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.016410] kthread+0x337/0x6f0 [ 18.016816] ret_from_fork+0x116/0x1d0 [ 18.017237] ret_from_fork_asm+0x1a/0x30 [ 18.017535] [ 18.017735] The buggy address belongs to the object at ffff8881033ecb00 [ 18.017735] which belongs to the cache kmalloc-64 of size 64 [ 18.018687] The buggy address is located 0 bytes to the right of [ 18.018687] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.019716] [ 18.019874] The buggy address belongs to the physical page: [ 18.020308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.020780] flags: 0x200000000000000(node=0|zone=2) [ 18.021265] page_type: f5(slab) [ 18.021510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.022013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.022506] page dumped because: kasan: bad access detected [ 18.022892] [ 18.023084] Memory state around the buggy address: [ 18.023573] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.024131] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.024741] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.025080] ^ [ 18.025531] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.025990] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.026544] ================================================================== [ 18.171675] ================================================================== [ 18.172504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 18.173092] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.173470] [ 18.173637] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.173744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.173776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.173829] Call Trace: [ 18.173877] <TASK> [ 18.173921] dump_stack_lvl+0x73/0xb0 [ 18.173959] print_report+0xd1/0x650 [ 18.173987] ? __virt_addr_valid+0x1db/0x2d0 [ 18.174015] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.174045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.174089] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.174131] kasan_report+0x141/0x180 [ 18.174175] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.174232] kasan_check_range+0x10c/0x1c0 [ 18.174288] __kasan_check_write+0x18/0x20 [ 18.174335] kasan_atomics_helper+0xa2b/0x5450 [ 18.174390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.174443] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.174565] ? kasan_atomics+0x152/0x310 [ 18.174621] kasan_atomics+0x1dc/0x310 [ 18.174669] ? __pfx_kasan_atomics+0x10/0x10 [ 18.174723] ? __pfx_read_tsc+0x10/0x10 [ 18.174775] ? ktime_get_ts64+0x86/0x230 [ 18.174837] kunit_try_run_case+0x1a5/0x480 [ 18.174890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.174938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.175000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.175060] ? __kthread_parkme+0x82/0x180 [ 18.175114] ? preempt_count_sub+0x50/0x80 [ 18.175175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.175274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.175365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.175427] kthread+0x337/0x6f0 [ 18.175480] ? trace_preempt_on+0x20/0xc0 [ 18.175537] ? __pfx_kthread+0x10/0x10 [ 18.175590] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.175648] ? calculate_sigpending+0x7b/0xa0 [ 18.175711] ? __pfx_kthread+0x10/0x10 [ 18.175766] ret_from_fork+0x116/0x1d0 [ 18.175815] ? __pfx_kthread+0x10/0x10 [ 18.175867] ret_from_fork_asm+0x1a/0x30 [ 18.175947] </TASK> [ 18.175978] [ 18.189363] Allocated by task 282: [ 18.189751] kasan_save_stack+0x45/0x70 [ 18.190142] kasan_save_track+0x18/0x40 [ 18.190515] kasan_save_alloc_info+0x3b/0x50 [ 18.190859] __kasan_kmalloc+0xb7/0xc0 [ 18.191215] __kmalloc_cache_noprof+0x189/0x420 [ 18.191544] kasan_atomics+0x95/0x310 [ 18.191732] kunit_try_run_case+0x1a5/0x480 [ 18.191912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.192116] kthread+0x337/0x6f0 [ 18.192396] ret_from_fork+0x116/0x1d0 [ 18.192632] ret_from_fork_asm+0x1a/0x30 [ 18.192937] [ 18.193104] The buggy address belongs to the object at ffff8881033ecb00 [ 18.193104] which belongs to the cache kmalloc-64 of size 64 [ 18.193886] The buggy address is located 0 bytes to the right of [ 18.193886] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.194350] [ 18.194480] The buggy address belongs to the physical page: [ 18.194709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.195044] flags: 0x200000000000000(node=0|zone=2) [ 18.195528] page_type: f5(slab) [ 18.195727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.196032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.196367] page dumped because: kasan: bad access detected [ 18.196777] [ 18.196994] Memory state around the buggy address: [ 18.197506] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198059] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198742] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.199041] ^ [ 18.199308] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.199645] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200034] ================================================================== [ 18.729234] ================================================================== [ 18.731298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 18.732347] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.733014] [ 18.733247] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.733563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.733612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.733666] Call Trace: [ 18.733725] <TASK> [ 18.733763] dump_stack_lvl+0x73/0xb0 [ 18.733816] print_report+0xd1/0x650 [ 18.733845] ? __virt_addr_valid+0x1db/0x2d0 [ 18.733874] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.733900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.733926] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.733952] kasan_report+0x141/0x180 [ 18.733977] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.734007] kasan_check_range+0x10c/0x1c0 [ 18.734035] __kasan_check_write+0x18/0x20 [ 18.734057] kasan_atomics_helper+0x12e6/0x5450 [ 18.734084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.734110] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.734135] ? kasan_atomics+0x152/0x310 [ 18.734166] kasan_atomics+0x1dc/0x310 [ 18.734194] ? __pfx_kasan_atomics+0x10/0x10 [ 18.734252] ? __pfx_read_tsc+0x10/0x10 [ 18.734280] ? ktime_get_ts64+0x86/0x230 [ 18.734309] kunit_try_run_case+0x1a5/0x480 [ 18.734337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.734360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.734389] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.734416] ? __kthread_parkme+0x82/0x180 [ 18.734440] ? preempt_count_sub+0x50/0x80 [ 18.734491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.734520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.734549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.734578] kthread+0x337/0x6f0 [ 18.734601] ? trace_preempt_on+0x20/0xc0 [ 18.734629] ? __pfx_kthread+0x10/0x10 [ 18.734654] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.734680] ? calculate_sigpending+0x7b/0xa0 [ 18.734708] ? __pfx_kthread+0x10/0x10 [ 18.734732] ret_from_fork+0x116/0x1d0 [ 18.734754] ? __pfx_kthread+0x10/0x10 [ 18.734779] ret_from_fork_asm+0x1a/0x30 [ 18.734815] </TASK> [ 18.734829] [ 18.747718] Allocated by task 282: [ 18.747953] kasan_save_stack+0x45/0x70 [ 18.748161] kasan_save_track+0x18/0x40 [ 18.748964] kasan_save_alloc_info+0x3b/0x50 [ 18.749675] __kasan_kmalloc+0xb7/0xc0 [ 18.750186] __kmalloc_cache_noprof+0x189/0x420 [ 18.750789] kasan_atomics+0x95/0x310 [ 18.751116] kunit_try_run_case+0x1a5/0x480 [ 18.751426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.751906] kthread+0x337/0x6f0 [ 18.752118] ret_from_fork+0x116/0x1d0 [ 18.752637] ret_from_fork_asm+0x1a/0x30 [ 18.752882] [ 18.753004] The buggy address belongs to the object at ffff8881033ecb00 [ 18.753004] which belongs to the cache kmalloc-64 of size 64 [ 18.754099] The buggy address is located 0 bytes to the right of [ 18.754099] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.754594] [ 18.755220] The buggy address belongs to the physical page: [ 18.755674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.756221] flags: 0x200000000000000(node=0|zone=2) [ 18.756563] page_type: f5(slab) [ 18.756850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.757336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.757844] page dumped because: kasan: bad access detected [ 18.758105] [ 18.758231] Memory state around the buggy address: [ 18.758644] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.759387] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.759899] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.760978] ^ [ 18.761652] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.762015] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.762625] ================================================================== [ 18.925261] ================================================================== [ 18.925940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 18.926637] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.927097] [ 18.927471] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.927594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.927626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.927675] Call Trace: [ 18.927723] <TASK> [ 18.927771] dump_stack_lvl+0x73/0xb0 [ 18.927831] print_report+0xd1/0x650 [ 18.927861] ? __virt_addr_valid+0x1db/0x2d0 [ 18.927889] ? kasan_atomics_helper+0x151d/0x5450 [ 18.927915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.927944] ? kasan_atomics_helper+0x151d/0x5450 [ 18.927984] kasan_report+0x141/0x180 [ 18.928031] ? kasan_atomics_helper+0x151d/0x5450 [ 18.928091] kasan_check_range+0x10c/0x1c0 [ 18.928146] __kasan_check_write+0x18/0x20 [ 18.928205] kasan_atomics_helper+0x151d/0x5450 [ 18.928250] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.928277] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.928303] ? kasan_atomics+0x152/0x310 [ 18.928334] kasan_atomics+0x1dc/0x310 [ 18.928361] ? __pfx_kasan_atomics+0x10/0x10 [ 18.928389] ? __pfx_read_tsc+0x10/0x10 [ 18.928416] ? ktime_get_ts64+0x86/0x230 [ 18.928444] kunit_try_run_case+0x1a5/0x480 [ 18.928500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.928535] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.928565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.928593] ? __kthread_parkme+0x82/0x180 [ 18.928619] ? preempt_count_sub+0x50/0x80 [ 18.928647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.928672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.928700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.928731] kthread+0x337/0x6f0 [ 18.928753] ? trace_preempt_on+0x20/0xc0 [ 18.928779] ? __pfx_kthread+0x10/0x10 [ 18.928803] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.928829] ? calculate_sigpending+0x7b/0xa0 [ 18.928858] ? __pfx_kthread+0x10/0x10 [ 18.928883] ret_from_fork+0x116/0x1d0 [ 18.928906] ? __pfx_kthread+0x10/0x10 [ 18.928929] ret_from_fork_asm+0x1a/0x30 [ 18.928966] </TASK> [ 18.928981] [ 18.940302] Allocated by task 282: [ 18.940635] kasan_save_stack+0x45/0x70 [ 18.941038] kasan_save_track+0x18/0x40 [ 18.941427] kasan_save_alloc_info+0x3b/0x50 [ 18.941774] __kasan_kmalloc+0xb7/0xc0 [ 18.942051] __kmalloc_cache_noprof+0x189/0x420 [ 18.942256] kasan_atomics+0x95/0x310 [ 18.942433] kunit_try_run_case+0x1a5/0x480 [ 18.942638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.943018] kthread+0x337/0x6f0 [ 18.943387] ret_from_fork+0x116/0x1d0 [ 18.943745] ret_from_fork_asm+0x1a/0x30 [ 18.944081] [ 18.944246] The buggy address belongs to the object at ffff8881033ecb00 [ 18.944246] which belongs to the cache kmalloc-64 of size 64 [ 18.945486] The buggy address is located 0 bytes to the right of [ 18.945486] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.945948] [ 18.946120] The buggy address belongs to the physical page: [ 18.946676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.947336] flags: 0x200000000000000(node=0|zone=2) [ 18.947631] page_type: f5(slab) [ 18.947837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.948147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.948736] page dumped because: kasan: bad access detected [ 18.949190] [ 18.949415] Memory state around the buggy address: [ 18.949815] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.950339] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.950628] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.950906] ^ [ 18.951126] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.951674] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.952227] ================================================================== [ 19.143484] ================================================================== [ 19.145286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 19.146099] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.146852] [ 19.147082] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.147201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.147247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.147299] Call Trace: [ 19.147380] <TASK> [ 19.147424] dump_stack_lvl+0x73/0xb0 [ 19.147511] print_report+0xd1/0x650 [ 19.147566] ? __virt_addr_valid+0x1db/0x2d0 [ 19.147624] ? kasan_atomics_helper+0x194a/0x5450 [ 19.147682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.147740] ? kasan_atomics_helper+0x194a/0x5450 [ 19.147794] kasan_report+0x141/0x180 [ 19.147849] ? kasan_atomics_helper+0x194a/0x5450 [ 19.147917] kasan_check_range+0x10c/0x1c0 [ 19.147977] __kasan_check_write+0x18/0x20 [ 19.148030] kasan_atomics_helper+0x194a/0x5450 [ 19.148087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.148145] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.148199] ? kasan_atomics+0x152/0x310 [ 19.148263] kasan_atomics+0x1dc/0x310 [ 19.148321] ? __pfx_kasan_atomics+0x10/0x10 [ 19.148380] ? __pfx_read_tsc+0x10/0x10 [ 19.148435] ? ktime_get_ts64+0x86/0x230 [ 19.148502] kunit_try_run_case+0x1a5/0x480 [ 19.148572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.148615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.148672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.148744] ? __kthread_parkme+0x82/0x180 [ 19.148808] ? preempt_count_sub+0x50/0x80 [ 19.148866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.148944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.148998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.149052] kthread+0x337/0x6f0 [ 19.149097] ? trace_preempt_on+0x20/0xc0 [ 19.149167] ? __pfx_kthread+0x10/0x10 [ 19.149230] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.149296] ? calculate_sigpending+0x7b/0xa0 [ 19.149345] ? __pfx_kthread+0x10/0x10 [ 19.149389] ret_from_fork+0x116/0x1d0 [ 19.149434] ? __pfx_kthread+0x10/0x10 [ 19.149495] ret_from_fork_asm+0x1a/0x30 [ 19.149570] </TASK> [ 19.149600] [ 19.163225] Allocated by task 282: [ 19.163604] kasan_save_stack+0x45/0x70 [ 19.163885] kasan_save_track+0x18/0x40 [ 19.164086] kasan_save_alloc_info+0x3b/0x50 [ 19.164710] __kasan_kmalloc+0xb7/0xc0 [ 19.165276] __kmalloc_cache_noprof+0x189/0x420 [ 19.165488] kasan_atomics+0x95/0x310 [ 19.165717] kunit_try_run_case+0x1a5/0x480 [ 19.165908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.166106] kthread+0x337/0x6f0 [ 19.166245] ret_from_fork+0x116/0x1d0 [ 19.166421] ret_from_fork_asm+0x1a/0x30 [ 19.166633] [ 19.166740] The buggy address belongs to the object at ffff8881033ecb00 [ 19.166740] which belongs to the cache kmalloc-64 of size 64 [ 19.167136] The buggy address is located 0 bytes to the right of [ 19.167136] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.168056] [ 19.168193] The buggy address belongs to the physical page: [ 19.168421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.168703] flags: 0x200000000000000(node=0|zone=2) [ 19.169103] page_type: f5(slab) [ 19.169342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.169676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.170240] page dumped because: kasan: bad access detected [ 19.170697] [ 19.170850] Memory state around the buggy address: [ 19.171189] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.171819] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.172112] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.172963] ^ [ 19.173410] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.173743] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.174134] ================================================================== [ 19.352951] ================================================================== [ 19.354129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 19.354771] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.355044] [ 19.355169] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.355258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.355277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.355307] Call Trace: [ 19.355334] <TASK> [ 19.355372] dump_stack_lvl+0x73/0xb0 [ 19.355410] print_report+0xd1/0x650 [ 19.355438] ? __virt_addr_valid+0x1db/0x2d0 [ 19.355522] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.355571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.355615] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.355663] kasan_report+0x141/0x180 [ 19.355715] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.356071] kasan_check_range+0x10c/0x1c0 [ 19.356565] __kasan_check_write+0x18/0x20 [ 19.356633] kasan_atomics_helper+0x1d7a/0x5450 [ 19.356691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.356748] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.356802] ? kasan_atomics+0x152/0x310 [ 19.356867] kasan_atomics+0x1dc/0x310 [ 19.356923] ? __pfx_kasan_atomics+0x10/0x10 [ 19.356986] ? __pfx_read_tsc+0x10/0x10 [ 19.357040] ? ktime_get_ts64+0x86/0x230 [ 19.357104] kunit_try_run_case+0x1a5/0x480 [ 19.357158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.357200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.357251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.357294] ? __kthread_parkme+0x82/0x180 [ 19.357333] ? preempt_count_sub+0x50/0x80 [ 19.357385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.357431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.357509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.357562] kthread+0x337/0x6f0 [ 19.357611] ? trace_preempt_on+0x20/0xc0 [ 19.357664] ? __pfx_kthread+0x10/0x10 [ 19.357713] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.357761] ? calculate_sigpending+0x7b/0xa0 [ 19.357821] ? __pfx_kthread+0x10/0x10 [ 19.357874] ret_from_fork+0x116/0x1d0 [ 19.357919] ? __pfx_kthread+0x10/0x10 [ 19.357964] ret_from_fork_asm+0x1a/0x30 [ 19.358026] </TASK> [ 19.358053] [ 19.368002] Allocated by task 282: [ 19.368393] kasan_save_stack+0x45/0x70 [ 19.368818] kasan_save_track+0x18/0x40 [ 19.369138] kasan_save_alloc_info+0x3b/0x50 [ 19.369433] __kasan_kmalloc+0xb7/0xc0 [ 19.369707] __kmalloc_cache_noprof+0x189/0x420 [ 19.369920] kasan_atomics+0x95/0x310 [ 19.370119] kunit_try_run_case+0x1a5/0x480 [ 19.370369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.370809] kthread+0x337/0x6f0 [ 19.371136] ret_from_fork+0x116/0x1d0 [ 19.371526] ret_from_fork_asm+0x1a/0x30 [ 19.371880] [ 19.372066] The buggy address belongs to the object at ffff8881033ecb00 [ 19.372066] which belongs to the cache kmalloc-64 of size 64 [ 19.372879] The buggy address is located 0 bytes to the right of [ 19.372879] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.373365] [ 19.373506] The buggy address belongs to the physical page: [ 19.373940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.374569] flags: 0x200000000000000(node=0|zone=2) [ 19.374969] page_type: f5(slab) [ 19.375292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.375860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.376281] page dumped because: kasan: bad access detected [ 19.376635] [ 19.376760] Memory state around the buggy address: [ 19.376981] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377307] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377610] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.378063] ^ [ 19.378484] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379026] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379543] ================================================================== [ 18.299679] ================================================================== [ 18.300373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 18.300846] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.301525] [ 18.301736] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.301847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.301904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.301955] Call Trace: [ 18.302006] <TASK> [ 18.302052] dump_stack_lvl+0x73/0xb0 [ 18.302126] print_report+0xd1/0x650 [ 18.302180] ? __virt_addr_valid+0x1db/0x2d0 [ 18.302257] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.302307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.302359] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.302435] kasan_report+0x141/0x180 [ 18.302502] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.302586] __asan_report_load4_noabort+0x18/0x20 [ 18.302637] kasan_atomics_helper+0x4a84/0x5450 [ 18.302693] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.302745] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.302817] ? kasan_atomics+0x152/0x310 [ 18.302881] kasan_atomics+0x1dc/0x310 [ 18.302936] ? __pfx_kasan_atomics+0x10/0x10 [ 18.302993] ? __pfx_read_tsc+0x10/0x10 [ 18.303041] ? ktime_get_ts64+0x86/0x230 [ 18.303125] kunit_try_run_case+0x1a5/0x480 [ 18.303179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.303223] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.303274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.303334] ? __kthread_parkme+0x82/0x180 [ 18.303396] ? preempt_count_sub+0x50/0x80 [ 18.303462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.303512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.303603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.303659] kthread+0x337/0x6f0 [ 18.303708] ? trace_preempt_on+0x20/0xc0 [ 18.303766] ? __pfx_kthread+0x10/0x10 [ 18.303818] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.303869] ? calculate_sigpending+0x7b/0xa0 [ 18.303901] ? __pfx_kthread+0x10/0x10 [ 18.303927] ret_from_fork+0x116/0x1d0 [ 18.303950] ? __pfx_kthread+0x10/0x10 [ 18.303975] ret_from_fork_asm+0x1a/0x30 [ 18.304013] </TASK> [ 18.304027] [ 18.315525] Allocated by task 282: [ 18.315787] kasan_save_stack+0x45/0x70 [ 18.316036] kasan_save_track+0x18/0x40 [ 18.316917] kasan_save_alloc_info+0x3b/0x50 [ 18.317712] __kasan_kmalloc+0xb7/0xc0 [ 18.318178] __kmalloc_cache_noprof+0x189/0x420 [ 18.318774] kasan_atomics+0x95/0x310 [ 18.319003] kunit_try_run_case+0x1a5/0x480 [ 18.319623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.319933] kthread+0x337/0x6f0 [ 18.320152] ret_from_fork+0x116/0x1d0 [ 18.320798] ret_from_fork_asm+0x1a/0x30 [ 18.321449] [ 18.321718] The buggy address belongs to the object at ffff8881033ecb00 [ 18.321718] which belongs to the cache kmalloc-64 of size 64 [ 18.322262] The buggy address is located 0 bytes to the right of [ 18.322262] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.322960] [ 18.323150] The buggy address belongs to the physical page: [ 18.323663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.324248] flags: 0x200000000000000(node=0|zone=2) [ 18.324649] page_type: f5(slab) [ 18.324852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.325558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.325998] page dumped because: kasan: bad access detected [ 18.326531] [ 18.326721] Memory state around the buggy address: [ 18.327064] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.327374] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.327955] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.328641] ^ [ 18.328910] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329291] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329675] ================================================================== [ 18.598846] ================================================================== [ 18.600335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 18.600806] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.601197] [ 18.601440] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.601570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.601604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.601682] Call Trace: [ 18.601730] <TASK> [ 18.601776] dump_stack_lvl+0x73/0xb0 [ 18.601865] print_report+0xd1/0x650 [ 18.601919] ? __virt_addr_valid+0x1db/0x2d0 [ 18.601974] ? kasan_atomics_helper+0x1148/0x5450 [ 18.602022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.602078] ? kasan_atomics_helper+0x1148/0x5450 [ 18.602125] kasan_report+0x141/0x180 [ 18.602176] ? kasan_atomics_helper+0x1148/0x5450 [ 18.602493] kasan_check_range+0x10c/0x1c0 [ 18.602580] __kasan_check_write+0x18/0x20 [ 18.602632] kasan_atomics_helper+0x1148/0x5450 [ 18.602663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.602691] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.602716] ? kasan_atomics+0x152/0x310 [ 18.602749] kasan_atomics+0x1dc/0x310 [ 18.602776] ? __pfx_kasan_atomics+0x10/0x10 [ 18.602804] ? __pfx_read_tsc+0x10/0x10 [ 18.602830] ? ktime_get_ts64+0x86/0x230 [ 18.602859] kunit_try_run_case+0x1a5/0x480 [ 18.602885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.602907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.602936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.602965] ? __kthread_parkme+0x82/0x180 [ 18.602990] ? preempt_count_sub+0x50/0x80 [ 18.603018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.603043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.603071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.603100] kthread+0x337/0x6f0 [ 18.603123] ? trace_preempt_on+0x20/0xc0 [ 18.603150] ? __pfx_kthread+0x10/0x10 [ 18.603175] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.603209] ? calculate_sigpending+0x7b/0xa0 [ 18.603269] ? __pfx_kthread+0x10/0x10 [ 18.603296] ret_from_fork+0x116/0x1d0 [ 18.603319] ? __pfx_kthread+0x10/0x10 [ 18.603354] ret_from_fork_asm+0x1a/0x30 [ 18.603398] </TASK> [ 18.603414] [ 18.615401] Allocated by task 282: [ 18.615880] kasan_save_stack+0x45/0x70 [ 18.616577] kasan_save_track+0x18/0x40 [ 18.616808] kasan_save_alloc_info+0x3b/0x50 [ 18.617159] __kasan_kmalloc+0xb7/0xc0 [ 18.617783] __kmalloc_cache_noprof+0x189/0x420 [ 18.618058] kasan_atomics+0x95/0x310 [ 18.618687] kunit_try_run_case+0x1a5/0x480 [ 18.618968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.619199] kthread+0x337/0x6f0 [ 18.619847] ret_from_fork+0x116/0x1d0 [ 18.620069] ret_from_fork_asm+0x1a/0x30 [ 18.620529] [ 18.620663] The buggy address belongs to the object at ffff8881033ecb00 [ 18.620663] which belongs to the cache kmalloc-64 of size 64 [ 18.621125] The buggy address is located 0 bytes to the right of [ 18.621125] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.621964] [ 18.622103] The buggy address belongs to the physical page: [ 18.622442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.622997] flags: 0x200000000000000(node=0|zone=2) [ 18.623489] page_type: f5(slab) [ 18.623712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.624101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.624703] page dumped because: kasan: bad access detected [ 18.625141] [ 18.625338] Memory state around the buggy address: [ 18.625576] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.626078] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.626506] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.627043] ^ [ 18.627358] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.627658] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.628217] ================================================================== [ 17.792436] ================================================================== [ 17.793420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 17.794344] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.795828] [ 17.796024] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.796140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.796172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.796391] Call Trace: [ 17.796445] <TASK> [ 17.796499] dump_stack_lvl+0x73/0xb0 [ 17.796574] print_report+0xd1/0x650 [ 17.796619] ? __virt_addr_valid+0x1db/0x2d0 [ 17.796669] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.797130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.797279] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.797344] kasan_report+0x141/0x180 [ 17.797404] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.797480] __asan_report_load4_noabort+0x18/0x20 [ 17.797538] kasan_atomics_helper+0x4b54/0x5450 [ 17.797597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.797656] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.797866] ? kasan_atomics+0x152/0x310 [ 17.797936] kasan_atomics+0x1dc/0x310 [ 17.797996] ? __pfx_kasan_atomics+0x10/0x10 [ 17.798055] ? __pfx_read_tsc+0x10/0x10 [ 17.798108] ? ktime_get_ts64+0x86/0x230 [ 17.798172] kunit_try_run_case+0x1a5/0x480 [ 17.798255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.798309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.798365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.798425] ? __kthread_parkme+0x82/0x180 [ 17.798489] ? preempt_count_sub+0x50/0x80 [ 17.798550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.798604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.798666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.799433] kthread+0x337/0x6f0 [ 17.799545] ? trace_preempt_on+0x20/0xc0 [ 17.799617] ? __pfx_kthread+0x10/0x10 [ 17.799668] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.799892] ? calculate_sigpending+0x7b/0xa0 [ 17.799957] ? __pfx_kthread+0x10/0x10 [ 17.800015] ret_from_fork+0x116/0x1d0 [ 17.800065] ? __pfx_kthread+0x10/0x10 [ 17.800105] ret_from_fork_asm+0x1a/0x30 [ 17.800145] </TASK> [ 17.800161] [ 17.815264] Allocated by task 282: [ 17.815722] kasan_save_stack+0x45/0x70 [ 17.816386] kasan_save_track+0x18/0x40 [ 17.816828] kasan_save_alloc_info+0x3b/0x50 [ 17.817112] __kasan_kmalloc+0xb7/0xc0 [ 17.817559] __kmalloc_cache_noprof+0x189/0x420 [ 17.818046] kasan_atomics+0x95/0x310 [ 17.818608] kunit_try_run_case+0x1a5/0x480 [ 17.819018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.819717] kthread+0x337/0x6f0 [ 17.820397] ret_from_fork+0x116/0x1d0 [ 17.821049] ret_from_fork_asm+0x1a/0x30 [ 17.821288] [ 17.821451] The buggy address belongs to the object at ffff8881033ecb00 [ 17.821451] which belongs to the cache kmalloc-64 of size 64 [ 17.822792] The buggy address is located 0 bytes to the right of [ 17.822792] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.823387] [ 17.823657] The buggy address belongs to the physical page: [ 17.824096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.824733] flags: 0x200000000000000(node=0|zone=2) [ 17.825787] page_type: f5(slab) [ 17.826034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.826918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.827513] page dumped because: kasan: bad access detected [ 17.828021] [ 17.828253] Memory state around the buggy address: [ 17.828828] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.829812] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.830507] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.831020] ^ [ 17.831608] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832080] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832908] ================================================================== [ 17.640602] ================================================================== [ 17.641382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 17.642065] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.643110] [ 17.643840] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.643967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.643999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.644045] Call Trace: [ 17.644086] <TASK> [ 17.644113] dump_stack_lvl+0x73/0xb0 [ 17.644159] print_report+0xd1/0x650 [ 17.644187] ? __virt_addr_valid+0x1db/0x2d0 [ 17.644254] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.644293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.644329] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.644363] kasan_report+0x141/0x180 [ 17.644402] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.644448] __asan_report_store4_noabort+0x1b/0x30 [ 17.644500] kasan_atomics_helper+0x4ba2/0x5450 [ 17.644537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.644573] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.644613] ? kasan_atomics+0x152/0x310 [ 17.644661] kasan_atomics+0x1dc/0x310 [ 17.644698] ? __pfx_kasan_atomics+0x10/0x10 [ 17.644741] ? __pfx_read_tsc+0x10/0x10 [ 17.644780] ? ktime_get_ts64+0x86/0x230 [ 17.644827] kunit_try_run_case+0x1a5/0x480 [ 17.644861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.644884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.644914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.644942] ? __kthread_parkme+0x82/0x180 [ 17.644967] ? preempt_count_sub+0x50/0x80 [ 17.644995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.645019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.645047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.645075] kthread+0x337/0x6f0 [ 17.645097] ? trace_preempt_on+0x20/0xc0 [ 17.645124] ? __pfx_kthread+0x10/0x10 [ 17.645148] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.645174] ? calculate_sigpending+0x7b/0xa0 [ 17.645210] ? __pfx_kthread+0x10/0x10 [ 17.645242] ret_from_fork+0x116/0x1d0 [ 17.645263] ? __pfx_kthread+0x10/0x10 [ 17.645286] ret_from_fork_asm+0x1a/0x30 [ 17.645320] </TASK> [ 17.645335] [ 17.665235] Allocated by task 282: [ 17.665666] kasan_save_stack+0x45/0x70 [ 17.666566] kasan_save_track+0x18/0x40 [ 17.666866] kasan_save_alloc_info+0x3b/0x50 [ 17.667274] __kasan_kmalloc+0xb7/0xc0 [ 17.667519] __kmalloc_cache_noprof+0x189/0x420 [ 17.668315] kasan_atomics+0x95/0x310 [ 17.668652] kunit_try_run_case+0x1a5/0x480 [ 17.669585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.670241] kthread+0x337/0x6f0 [ 17.670887] ret_from_fork+0x116/0x1d0 [ 17.671177] ret_from_fork_asm+0x1a/0x30 [ 17.671431] [ 17.671898] The buggy address belongs to the object at ffff8881033ecb00 [ 17.671898] which belongs to the cache kmalloc-64 of size 64 [ 17.672610] The buggy address is located 0 bytes to the right of [ 17.672610] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.674307] [ 17.674565] The buggy address belongs to the physical page: [ 17.674895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.675671] flags: 0x200000000000000(node=0|zone=2) [ 17.675940] page_type: f5(slab) [ 17.676149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.677273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.677729] page dumped because: kasan: bad access detected [ 17.678271] [ 17.678655] Memory state around the buggy address: [ 17.679504] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.680523] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.681042] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.681672] ^ [ 17.682469] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.683321] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684092] ================================================================== [ 19.269506] ================================================================== [ 19.269949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 19.270636] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.271198] [ 19.271442] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.271643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.271673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.271728] Call Trace: [ 19.271777] <TASK> [ 19.271825] dump_stack_lvl+0x73/0xb0 [ 19.271898] print_report+0xd1/0x650 [ 19.271959] ? __virt_addr_valid+0x1db/0x2d0 [ 19.272020] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.272071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.272108] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.272133] kasan_report+0x141/0x180 [ 19.272160] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.272206] kasan_check_range+0x10c/0x1c0 [ 19.272286] __kasan_check_write+0x18/0x20 [ 19.272336] kasan_atomics_helper+0x1c18/0x5450 [ 19.272392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.272480] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.272534] ? kasan_atomics+0x152/0x310 [ 19.272609] kasan_atomics+0x1dc/0x310 [ 19.272657] ? __pfx_kasan_atomics+0x10/0x10 [ 19.272705] ? __pfx_read_tsc+0x10/0x10 [ 19.272751] ? ktime_get_ts64+0x86/0x230 [ 19.272812] kunit_try_run_case+0x1a5/0x480 [ 19.272866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.272915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.272956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.272984] ? __kthread_parkme+0x82/0x180 [ 19.273011] ? preempt_count_sub+0x50/0x80 [ 19.273110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.273159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.273216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.273256] kthread+0x337/0x6f0 [ 19.273319] ? trace_preempt_on+0x20/0xc0 [ 19.273349] ? __pfx_kthread+0x10/0x10 [ 19.273375] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.273402] ? calculate_sigpending+0x7b/0xa0 [ 19.273430] ? __pfx_kthread+0x10/0x10 [ 19.273473] ret_from_fork+0x116/0x1d0 [ 19.273501] ? __pfx_kthread+0x10/0x10 [ 19.273524] ret_from_fork_asm+0x1a/0x30 [ 19.273563] </TASK> [ 19.273577] [ 19.284331] Allocated by task 282: [ 19.284609] kasan_save_stack+0x45/0x70 [ 19.285009] kasan_save_track+0x18/0x40 [ 19.285400] kasan_save_alloc_info+0x3b/0x50 [ 19.285789] __kasan_kmalloc+0xb7/0xc0 [ 19.286135] __kmalloc_cache_noprof+0x189/0x420 [ 19.286533] kasan_atomics+0x95/0x310 [ 19.286735] kunit_try_run_case+0x1a5/0x480 [ 19.286961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.287407] kthread+0x337/0x6f0 [ 19.287765] ret_from_fork+0x116/0x1d0 [ 19.288114] ret_from_fork_asm+0x1a/0x30 [ 19.288504] [ 19.288636] The buggy address belongs to the object at ffff8881033ecb00 [ 19.288636] which belongs to the cache kmalloc-64 of size 64 [ 19.289071] The buggy address is located 0 bytes to the right of [ 19.289071] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.290044] [ 19.290278] The buggy address belongs to the physical page: [ 19.290741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.291322] flags: 0x200000000000000(node=0|zone=2) [ 19.291598] page_type: f5(slab) [ 19.291945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.292582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.293005] page dumped because: kasan: bad access detected [ 19.293268] [ 19.293393] Memory state around the buggy address: [ 19.293847] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294448] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294991] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.295513] ^ [ 19.295776] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.296073] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.296688] ================================================================== [ 18.863422] ================================================================== [ 18.864038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 18.864377] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.865069] [ 18.865357] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.865492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.865526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.865574] Call Trace: [ 18.865620] <TASK> [ 18.865664] dump_stack_lvl+0x73/0xb0 [ 18.865740] print_report+0xd1/0x650 [ 18.865797] ? __virt_addr_valid+0x1db/0x2d0 [ 18.865858] ? kasan_atomics_helper+0x1467/0x5450 [ 18.865907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.865968] ? kasan_atomics_helper+0x1467/0x5450 [ 18.866037] kasan_report+0x141/0x180 [ 18.866092] ? kasan_atomics_helper+0x1467/0x5450 [ 18.866160] kasan_check_range+0x10c/0x1c0 [ 18.866249] __kasan_check_write+0x18/0x20 [ 18.866304] kasan_atomics_helper+0x1467/0x5450 [ 18.866361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.866418] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.866485] ? kasan_atomics+0x152/0x310 [ 18.866553] kasan_atomics+0x1dc/0x310 [ 18.866598] ? __pfx_kasan_atomics+0x10/0x10 [ 18.866649] ? __pfx_read_tsc+0x10/0x10 [ 18.866699] ? ktime_get_ts64+0x86/0x230 [ 18.866757] kunit_try_run_case+0x1a5/0x480 [ 18.866808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.866850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.866915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.866992] ? __kthread_parkme+0x82/0x180 [ 18.867064] ? preempt_count_sub+0x50/0x80 [ 18.867130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.867173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.867260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.867295] kthread+0x337/0x6f0 [ 18.867320] ? trace_preempt_on+0x20/0xc0 [ 18.867364] ? __pfx_kthread+0x10/0x10 [ 18.867392] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.867421] ? calculate_sigpending+0x7b/0xa0 [ 18.867451] ? __pfx_kthread+0x10/0x10 [ 18.867501] ret_from_fork+0x116/0x1d0 [ 18.867528] ? __pfx_kthread+0x10/0x10 [ 18.867554] ret_from_fork_asm+0x1a/0x30 [ 18.867592] </TASK> [ 18.867608] [ 18.877766] Allocated by task 282: [ 18.878146] kasan_save_stack+0x45/0x70 [ 18.878569] kasan_save_track+0x18/0x40 [ 18.878852] kasan_save_alloc_info+0x3b/0x50 [ 18.879125] __kasan_kmalloc+0xb7/0xc0 [ 18.879406] __kmalloc_cache_noprof+0x189/0x420 [ 18.881482] kasan_atomics+0x95/0x310 [ 18.881854] kunit_try_run_case+0x1a5/0x480 [ 18.882502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.883090] kthread+0x337/0x6f0 [ 18.883683] ret_from_fork+0x116/0x1d0 [ 18.883929] ret_from_fork_asm+0x1a/0x30 [ 18.884166] [ 18.884654] The buggy address belongs to the object at ffff8881033ecb00 [ 18.884654] which belongs to the cache kmalloc-64 of size 64 [ 18.885622] The buggy address is located 0 bytes to the right of [ 18.885622] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.886521] [ 18.886655] The buggy address belongs to the physical page: [ 18.887116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.887633] flags: 0x200000000000000(node=0|zone=2) [ 18.888069] page_type: f5(slab) [ 18.888503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.888938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.889446] page dumped because: kasan: bad access detected [ 18.889836] [ 18.890023] Memory state around the buggy address: [ 18.890353] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.890939] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.891238] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.891974] ^ [ 18.892198] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.892699] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.893164] ================================================================== [ 19.175545] ================================================================== [ 19.175926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 19.176526] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.176811] [ 19.176939] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.177004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.177021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.177049] Call Trace: [ 19.177075] <TASK> [ 19.177103] dump_stack_lvl+0x73/0xb0 [ 19.177139] print_report+0xd1/0x650 [ 19.177165] ? __virt_addr_valid+0x1db/0x2d0 [ 19.177194] ? kasan_atomics_helper+0x19e3/0x5450 [ 19.177218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.177246] ? kasan_atomics_helper+0x19e3/0x5450 [ 19.177271] kasan_report+0x141/0x180 [ 19.177297] ? kasan_atomics_helper+0x19e3/0x5450 [ 19.177327] kasan_check_range+0x10c/0x1c0 [ 19.177354] __kasan_check_write+0x18/0x20 [ 19.177377] kasan_atomics_helper+0x19e3/0x5450 [ 19.177403] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.177429] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.177681] ? kasan_atomics+0x152/0x310 [ 19.177757] kasan_atomics+0x1dc/0x310 [ 19.177819] ? __pfx_kasan_atomics+0x10/0x10 [ 19.177879] ? __pfx_read_tsc+0x10/0x10 [ 19.177926] ? ktime_get_ts64+0x86/0x230 [ 19.177975] kunit_try_run_case+0x1a5/0x480 [ 19.178014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.178053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.178101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.178155] ? __kthread_parkme+0x82/0x180 [ 19.178213] ? preempt_count_sub+0x50/0x80 [ 19.178273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.178323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.178379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.178447] kthread+0x337/0x6f0 [ 19.178500] ? trace_preempt_on+0x20/0xc0 [ 19.178547] ? __pfx_kthread+0x10/0x10 [ 19.178589] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.178637] ? calculate_sigpending+0x7b/0xa0 [ 19.178689] ? __pfx_kthread+0x10/0x10 [ 19.178731] ret_from_fork+0x116/0x1d0 [ 19.178767] ? __pfx_kthread+0x10/0x10 [ 19.178803] ret_from_fork_asm+0x1a/0x30 [ 19.178864] </TASK> [ 19.178890] [ 19.188486] Allocated by task 282: [ 19.188853] kasan_save_stack+0x45/0x70 [ 19.189228] kasan_save_track+0x18/0x40 [ 19.189579] kasan_save_alloc_info+0x3b/0x50 [ 19.189948] __kasan_kmalloc+0xb7/0xc0 [ 19.190309] __kmalloc_cache_noprof+0x189/0x420 [ 19.190588] kasan_atomics+0x95/0x310 [ 19.190900] kunit_try_run_case+0x1a5/0x480 [ 19.191137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.191472] kthread+0x337/0x6f0 [ 19.191769] ret_from_fork+0x116/0x1d0 [ 19.191975] ret_from_fork_asm+0x1a/0x30 [ 19.192185] [ 19.192391] The buggy address belongs to the object at ffff8881033ecb00 [ 19.192391] which belongs to the cache kmalloc-64 of size 64 [ 19.193183] The buggy address is located 0 bytes to the right of [ 19.193183] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.193851] [ 19.194020] The buggy address belongs to the physical page: [ 19.194412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.194785] flags: 0x200000000000000(node=0|zone=2) [ 19.195026] page_type: f5(slab) [ 19.195219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.195902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.196482] page dumped because: kasan: bad access detected [ 19.196880] [ 19.197010] Memory state around the buggy address: [ 19.197229] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.197568] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.198089] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.198827] ^ [ 19.199206] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.199549] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.199837] ================================================================== [ 19.658945] ================================================================== [ 19.659431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 19.660025] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.660401] [ 19.660572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.660633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.660650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.660677] Call Trace: [ 19.660721] <TASK> [ 19.660750] dump_stack_lvl+0x73/0xb0 [ 19.660785] print_report+0xd1/0x650 [ 19.660813] ? __virt_addr_valid+0x1db/0x2d0 [ 19.660843] ? kasan_atomics_helper+0x5115/0x5450 [ 19.660892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.660921] ? kasan_atomics_helper+0x5115/0x5450 [ 19.660948] kasan_report+0x141/0x180 [ 19.660975] ? kasan_atomics_helper+0x5115/0x5450 [ 19.661006] __asan_report_load8_noabort+0x18/0x20 [ 19.661031] kasan_atomics_helper+0x5115/0x5450 [ 19.661058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.661085] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.661133] ? kasan_atomics+0x152/0x310 [ 19.661168] kasan_atomics+0x1dc/0x310 [ 19.661218] ? __pfx_kasan_atomics+0x10/0x10 [ 19.661251] ? __pfx_read_tsc+0x10/0x10 [ 19.661298] ? ktime_get_ts64+0x86/0x230 [ 19.661331] kunit_try_run_case+0x1a5/0x480 [ 19.661359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.661382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.661412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.661442] ? __kthread_parkme+0x82/0x180 [ 19.661486] ? preempt_count_sub+0x50/0x80 [ 19.661516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.661541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.661571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.661600] kthread+0x337/0x6f0 [ 19.661625] ? trace_preempt_on+0x20/0xc0 [ 19.661653] ? __pfx_kthread+0x10/0x10 [ 19.661678] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.661705] ? calculate_sigpending+0x7b/0xa0 [ 19.661734] ? __pfx_kthread+0x10/0x10 [ 19.661760] ret_from_fork+0x116/0x1d0 [ 19.661785] ? __pfx_kthread+0x10/0x10 [ 19.661809] ret_from_fork_asm+0x1a/0x30 [ 19.661847] </TASK> [ 19.661861] [ 19.669802] Allocated by task 282: [ 19.670054] kasan_save_stack+0x45/0x70 [ 19.670308] kasan_save_track+0x18/0x40 [ 19.670549] kasan_save_alloc_info+0x3b/0x50 [ 19.670808] __kasan_kmalloc+0xb7/0xc0 [ 19.671062] __kmalloc_cache_noprof+0x189/0x420 [ 19.671244] kasan_atomics+0x95/0x310 [ 19.671460] kunit_try_run_case+0x1a5/0x480 [ 19.671712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.671937] kthread+0x337/0x6f0 [ 19.672170] ret_from_fork+0x116/0x1d0 [ 19.672332] ret_from_fork_asm+0x1a/0x30 [ 19.672636] [ 19.672792] The buggy address belongs to the object at ffff8881033ecb00 [ 19.672792] which belongs to the cache kmalloc-64 of size 64 [ 19.673314] The buggy address is located 0 bytes to the right of [ 19.673314] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.673873] [ 19.673981] The buggy address belongs to the physical page: [ 19.674264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.674510] flags: 0x200000000000000(node=0|zone=2) [ 19.674688] page_type: f5(slab) [ 19.674819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.675033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.675609] page dumped because: kasan: bad access detected [ 19.676019] [ 19.676170] Memory state around the buggy address: [ 19.676506] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.676672] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.676834] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.677026] ^ [ 19.677402] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.677963] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678445] ================================================================== [ 18.422888] ================================================================== [ 18.423412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 18.424075] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.424813] [ 18.425088] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.425213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.425245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.425314] Call Trace: [ 18.425362] <TASK> [ 18.425410] dump_stack_lvl+0x73/0xb0 [ 18.425505] print_report+0xd1/0x650 [ 18.425580] ? __virt_addr_valid+0x1db/0x2d0 [ 18.425634] ? kasan_atomics_helper+0xf10/0x5450 [ 18.425687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.425749] ? kasan_atomics_helper+0xf10/0x5450 [ 18.425817] kasan_report+0x141/0x180 [ 18.425875] ? kasan_atomics_helper+0xf10/0x5450 [ 18.425939] kasan_check_range+0x10c/0x1c0 [ 18.426008] __kasan_check_write+0x18/0x20 [ 18.426076] kasan_atomics_helper+0xf10/0x5450 [ 18.426132] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.426193] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.426298] ? kasan_atomics+0x152/0x310 [ 18.426361] kasan_atomics+0x1dc/0x310 [ 18.426411] ? __pfx_kasan_atomics+0x10/0x10 [ 18.426479] ? __pfx_read_tsc+0x10/0x10 [ 18.426529] ? ktime_get_ts64+0x86/0x230 [ 18.426578] kunit_try_run_case+0x1a5/0x480 [ 18.426622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.426661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.426708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.426756] ? __kthread_parkme+0x82/0x180 [ 18.426803] ? preempt_count_sub+0x50/0x80 [ 18.426855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.426897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.426948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.427000] kthread+0x337/0x6f0 [ 18.427037] ? trace_preempt_on+0x20/0xc0 [ 18.427080] ? __pfx_kthread+0x10/0x10 [ 18.427119] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.427164] ? calculate_sigpending+0x7b/0xa0 [ 18.427212] ? __pfx_kthread+0x10/0x10 [ 18.427289] ret_from_fork+0x116/0x1d0 [ 18.427332] ? __pfx_kthread+0x10/0x10 [ 18.427426] ret_from_fork_asm+0x1a/0x30 [ 18.427516] </TASK> [ 18.427544] [ 18.437830] Allocated by task 282: [ 18.438109] kasan_save_stack+0x45/0x70 [ 18.439898] kasan_save_track+0x18/0x40 [ 18.440380] kasan_save_alloc_info+0x3b/0x50 [ 18.440746] __kasan_kmalloc+0xb7/0xc0 [ 18.441019] __kmalloc_cache_noprof+0x189/0x420 [ 18.441764] kasan_atomics+0x95/0x310 [ 18.442018] kunit_try_run_case+0x1a5/0x480 [ 18.442252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.442494] kthread+0x337/0x6f0 [ 18.442606] ret_from_fork+0x116/0x1d0 [ 18.442711] ret_from_fork_asm+0x1a/0x30 [ 18.442826] [ 18.442888] The buggy address belongs to the object at ffff8881033ecb00 [ 18.442888] which belongs to the cache kmalloc-64 of size 64 [ 18.443142] The buggy address is located 0 bytes to the right of [ 18.443142] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.444405] [ 18.444686] The buggy address belongs to the physical page: [ 18.445147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.446418] flags: 0x200000000000000(node=0|zone=2) [ 18.446699] page_type: f5(slab) [ 18.446894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.447409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.447988] page dumped because: kasan: bad access detected [ 18.449074] [ 18.449715] Memory state around the buggy address: [ 18.450597] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452316] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452885] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.454299] ^ [ 18.454631] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.455136] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.456702] ================================================================== [ 19.021704] ================================================================== [ 19.022781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 19.023186] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.023620] [ 19.023922] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.024085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.024121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.024223] Call Trace: [ 19.024284] <TASK> [ 19.024331] dump_stack_lvl+0x73/0xb0 [ 19.024533] print_report+0xd1/0x650 [ 19.024588] ? __virt_addr_valid+0x1db/0x2d0 [ 19.024639] ? kasan_atomics_helper+0x16e7/0x5450 [ 19.024689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.024744] ? kasan_atomics_helper+0x16e7/0x5450 [ 19.024797] kasan_report+0x141/0x180 [ 19.024852] ? kasan_atomics_helper+0x16e7/0x5450 [ 19.024899] kasan_check_range+0x10c/0x1c0 [ 19.024929] __kasan_check_write+0x18/0x20 [ 19.024953] kasan_atomics_helper+0x16e7/0x5450 [ 19.024981] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.025008] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.025034] ? kasan_atomics+0x152/0x310 [ 19.025065] kasan_atomics+0x1dc/0x310 [ 19.025092] ? __pfx_kasan_atomics+0x10/0x10 [ 19.025121] ? __pfx_read_tsc+0x10/0x10 [ 19.025147] ? ktime_get_ts64+0x86/0x230 [ 19.025178] kunit_try_run_case+0x1a5/0x480 [ 19.025262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.025313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.025351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.025383] ? __kthread_parkme+0x82/0x180 [ 19.025409] ? preempt_count_sub+0x50/0x80 [ 19.025440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.025490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.025522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.025552] kthread+0x337/0x6f0 [ 19.025576] ? trace_preempt_on+0x20/0xc0 [ 19.025605] ? __pfx_kthread+0x10/0x10 [ 19.025630] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.025658] ? calculate_sigpending+0x7b/0xa0 [ 19.025687] ? __pfx_kthread+0x10/0x10 [ 19.025713] ret_from_fork+0x116/0x1d0 [ 19.025736] ? __pfx_kthread+0x10/0x10 [ 19.025761] ret_from_fork_asm+0x1a/0x30 [ 19.025798] </TASK> [ 19.025813] [ 19.039077] Allocated by task 282: [ 19.040032] kasan_save_stack+0x45/0x70 [ 19.040268] kasan_save_track+0x18/0x40 [ 19.040903] kasan_save_alloc_info+0x3b/0x50 [ 19.041374] __kasan_kmalloc+0xb7/0xc0 [ 19.041598] __kmalloc_cache_noprof+0x189/0x420 [ 19.041988] kasan_atomics+0x95/0x310 [ 19.042270] kunit_try_run_case+0x1a5/0x480 [ 19.042526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.042770] kthread+0x337/0x6f0 [ 19.043134] ret_from_fork+0x116/0x1d0 [ 19.043543] ret_from_fork_asm+0x1a/0x30 [ 19.043950] [ 19.044198] The buggy address belongs to the object at ffff8881033ecb00 [ 19.044198] which belongs to the cache kmalloc-64 of size 64 [ 19.044802] The buggy address is located 0 bytes to the right of [ 19.044802] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.045776] [ 19.046016] The buggy address belongs to the physical page: [ 19.046678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.047108] flags: 0x200000000000000(node=0|zone=2) [ 19.047529] page_type: f5(slab) [ 19.047749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.048317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.048821] page dumped because: kasan: bad access detected [ 19.049351] [ 19.049556] Memory state around the buggy address: [ 19.049942] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.050347] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.050824] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.051102] ^ [ 19.051520] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.052045] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.053120] ================================================================== [ 19.054876] ================================================================== [ 19.055262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 19.055997] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.056727] [ 19.056978] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.057072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.057089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.057116] Call Trace: [ 19.057140] <TASK> [ 19.057166] dump_stack_lvl+0x73/0xb0 [ 19.057224] print_report+0xd1/0x650 [ 19.057547] ? __virt_addr_valid+0x1db/0x2d0 [ 19.057589] ? kasan_atomics_helper+0x177f/0x5450 [ 19.057616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.057643] ? kasan_atomics_helper+0x177f/0x5450 [ 19.057669] kasan_report+0x141/0x180 [ 19.057695] ? kasan_atomics_helper+0x177f/0x5450 [ 19.057724] kasan_check_range+0x10c/0x1c0 [ 19.057752] __kasan_check_write+0x18/0x20 [ 19.057775] kasan_atomics_helper+0x177f/0x5450 [ 19.057802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.057828] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.057855] ? kasan_atomics+0x152/0x310 [ 19.057883] kasan_atomics+0x1dc/0x310 [ 19.057907] ? __pfx_kasan_atomics+0x10/0x10 [ 19.057934] ? __pfx_read_tsc+0x10/0x10 [ 19.057957] ? ktime_get_ts64+0x86/0x230 [ 19.057984] kunit_try_run_case+0x1a5/0x480 [ 19.058008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.058029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.058056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.058082] ? __kthread_parkme+0x82/0x180 [ 19.058104] ? preempt_count_sub+0x50/0x80 [ 19.058129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.058152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.058178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.058250] kthread+0x337/0x6f0 [ 19.058275] ? trace_preempt_on+0x20/0xc0 [ 19.058302] ? __pfx_kthread+0x10/0x10 [ 19.058324] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.058350] ? calculate_sigpending+0x7b/0xa0 [ 19.058377] ? __pfx_kthread+0x10/0x10 [ 19.058401] ret_from_fork+0x116/0x1d0 [ 19.058423] ? __pfx_kthread+0x10/0x10 [ 19.058446] ret_from_fork_asm+0x1a/0x30 [ 19.058499] </TASK> [ 19.058512] [ 19.069516] Allocated by task 282: [ 19.069909] kasan_save_stack+0x45/0x70 [ 19.070325] kasan_save_track+0x18/0x40 [ 19.070660] kasan_save_alloc_info+0x3b/0x50 [ 19.071041] __kasan_kmalloc+0xb7/0xc0 [ 19.071391] __kmalloc_cache_noprof+0x189/0x420 [ 19.071822] kasan_atomics+0x95/0x310 [ 19.072160] kunit_try_run_case+0x1a5/0x480 [ 19.072488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.072727] kthread+0x337/0x6f0 [ 19.072909] ret_from_fork+0x116/0x1d0 [ 19.073102] ret_from_fork_asm+0x1a/0x30 [ 19.073498] [ 19.073750] The buggy address belongs to the object at ffff8881033ecb00 [ 19.073750] which belongs to the cache kmalloc-64 of size 64 [ 19.074864] The buggy address is located 0 bytes to the right of [ 19.074864] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.075655] [ 19.075822] The buggy address belongs to the physical page: [ 19.076107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.076472] flags: 0x200000000000000(node=0|zone=2) [ 19.076909] page_type: f5(slab) [ 19.077262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.078024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.078732] page dumped because: kasan: bad access detected [ 19.079153] [ 19.079401] Memory state around the buggy address: [ 19.079761] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.080240] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.080761] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.081234] ^ [ 19.081604] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082117] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082467] ================================================================== [ 19.502421] ================================================================== [ 19.502712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 19.503628] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.504526] [ 19.504628] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.504732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.504751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.504789] Call Trace: [ 19.504818] <TASK> [ 19.504845] dump_stack_lvl+0x73/0xb0 [ 19.504885] print_report+0xd1/0x650 [ 19.504912] ? __virt_addr_valid+0x1db/0x2d0 [ 19.504941] ? kasan_atomics_helper+0x2006/0x5450 [ 19.504967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.504993] ? kasan_atomics_helper+0x2006/0x5450 [ 19.505046] kasan_report+0x141/0x180 [ 19.505077] ? kasan_atomics_helper+0x2006/0x5450 [ 19.505136] kasan_check_range+0x10c/0x1c0 [ 19.505168] __kasan_check_write+0x18/0x20 [ 19.505219] kasan_atomics_helper+0x2006/0x5450 [ 19.505249] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.505276] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.505304] ? kasan_atomics+0x152/0x310 [ 19.505335] kasan_atomics+0x1dc/0x310 [ 19.505362] ? __pfx_kasan_atomics+0x10/0x10 [ 19.505390] ? __pfx_read_tsc+0x10/0x10 [ 19.505417] ? ktime_get_ts64+0x86/0x230 [ 19.505446] kunit_try_run_case+0x1a5/0x480 [ 19.505492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.505516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.505546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.505575] ? __kthread_parkme+0x82/0x180 [ 19.505602] ? preempt_count_sub+0x50/0x80 [ 19.505631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.505656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.505684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.505713] kthread+0x337/0x6f0 [ 19.505736] ? trace_preempt_on+0x20/0xc0 [ 19.505765] ? __pfx_kthread+0x10/0x10 [ 19.505789] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.505815] ? calculate_sigpending+0x7b/0xa0 [ 19.505844] ? __pfx_kthread+0x10/0x10 [ 19.505869] ret_from_fork+0x116/0x1d0 [ 19.505892] ? __pfx_kthread+0x10/0x10 [ 19.505916] ret_from_fork_asm+0x1a/0x30 [ 19.505952] </TASK> [ 19.505966] [ 19.513093] Allocated by task 282: [ 19.513790] kasan_save_stack+0x45/0x70 [ 19.514135] kasan_save_track+0x18/0x40 [ 19.514405] kasan_save_alloc_info+0x3b/0x50 [ 19.515123] __kasan_kmalloc+0xb7/0xc0 [ 19.515405] __kmalloc_cache_noprof+0x189/0x420 [ 19.516088] kasan_atomics+0x95/0x310 [ 19.516895] kunit_try_run_case+0x1a5/0x480 [ 19.517767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.518376] kthread+0x337/0x6f0 [ 19.518936] ret_from_fork+0x116/0x1d0 [ 19.519293] ret_from_fork_asm+0x1a/0x30 [ 19.519704] [ 19.519941] The buggy address belongs to the object at ffff8881033ecb00 [ 19.519941] which belongs to the cache kmalloc-64 of size 64 [ 19.520849] The buggy address is located 0 bytes to the right of [ 19.520849] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.521756] [ 19.522004] The buggy address belongs to the physical page: [ 19.522370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.522759] flags: 0x200000000000000(node=0|zone=2) [ 19.522905] page_type: f5(slab) [ 19.523013] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.523174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.523899] page dumped because: kasan: bad access detected [ 19.524351] [ 19.524488] Memory state around the buggy address: [ 19.524940] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525349] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525747] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.526077] ^ [ 19.526218] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526675] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526844] ================================================================== [ 18.894269] ================================================================== [ 18.894663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 18.895047] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.895736] [ 18.895948] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.896032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.896055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.896093] Call Trace: [ 18.896132] <TASK> [ 18.896168] dump_stack_lvl+0x73/0xb0 [ 18.896219] print_report+0xd1/0x650 [ 18.896258] ? __virt_addr_valid+0x1db/0x2d0 [ 18.896297] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.896332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.896369] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.896407] kasan_report+0x141/0x180 [ 18.896448] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.896509] __asan_report_store8_noabort+0x1b/0x30 [ 18.896544] kasan_atomics_helper+0x50d4/0x5450 [ 18.896583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.896621] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.896656] ? kasan_atomics+0x152/0x310 [ 18.896698] kasan_atomics+0x1dc/0x310 [ 18.896748] ? __pfx_kasan_atomics+0x10/0x10 [ 18.896792] ? __pfx_read_tsc+0x10/0x10 [ 18.896834] ? ktime_get_ts64+0x86/0x230 [ 18.896889] kunit_try_run_case+0x1a5/0x480 [ 18.896936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.896982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.897038] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.897094] ? __kthread_parkme+0x82/0x180 [ 18.897139] ? preempt_count_sub+0x50/0x80 [ 18.897194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.897244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.897301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.897354] kthread+0x337/0x6f0 [ 18.897400] ? trace_preempt_on+0x20/0xc0 [ 18.897449] ? __pfx_kthread+0x10/0x10 [ 18.897559] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.897604] ? calculate_sigpending+0x7b/0xa0 [ 18.897651] ? __pfx_kthread+0x10/0x10 [ 18.897699] ret_from_fork+0x116/0x1d0 [ 18.897742] ? __pfx_kthread+0x10/0x10 [ 18.897791] ret_from_fork_asm+0x1a/0x30 [ 18.897853] </TASK> [ 18.897882] [ 18.909702] Allocated by task 282: [ 18.910098] kasan_save_stack+0x45/0x70 [ 18.910689] kasan_save_track+0x18/0x40 [ 18.911043] kasan_save_alloc_info+0x3b/0x50 [ 18.911476] __kasan_kmalloc+0xb7/0xc0 [ 18.911833] __kmalloc_cache_noprof+0x189/0x420 [ 18.912335] kasan_atomics+0x95/0x310 [ 18.912706] kunit_try_run_case+0x1a5/0x480 [ 18.912969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.913521] kthread+0x337/0x6f0 [ 18.913891] ret_from_fork+0x116/0x1d0 [ 18.914102] ret_from_fork_asm+0x1a/0x30 [ 18.914334] [ 18.914473] The buggy address belongs to the object at ffff8881033ecb00 [ 18.914473] which belongs to the cache kmalloc-64 of size 64 [ 18.915654] The buggy address is located 0 bytes to the right of [ 18.915654] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.916625] [ 18.916824] The buggy address belongs to the physical page: [ 18.917172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.917898] flags: 0x200000000000000(node=0|zone=2) [ 18.918144] page_type: f5(slab) [ 18.918371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.919082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.919794] page dumped because: kasan: bad access detected [ 18.920305] [ 18.920492] Memory state around the buggy address: [ 18.920895] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.921519] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.922094] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.922488] ^ [ 18.922761] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.923412] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.923953] ================================================================== [ 19.614101] ================================================================== [ 19.615169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 19.615675] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.615969] [ 19.616057] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.616115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.616131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.616159] Call Trace: [ 19.616183] <TASK> [ 19.616229] dump_stack_lvl+0x73/0xb0 [ 19.616262] print_report+0xd1/0x650 [ 19.616312] ? __virt_addr_valid+0x1db/0x2d0 [ 19.616342] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.616381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.616409] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.616435] kasan_report+0x141/0x180 [ 19.616472] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.616505] __asan_report_load8_noabort+0x18/0x20 [ 19.616531] kasan_atomics_helper+0x4fa5/0x5450 [ 19.616559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.616585] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.616611] ? kasan_atomics+0x152/0x310 [ 19.616666] kasan_atomics+0x1dc/0x310 [ 19.616694] ? __pfx_kasan_atomics+0x10/0x10 [ 19.616722] ? __pfx_read_tsc+0x10/0x10 [ 19.616749] ? ktime_get_ts64+0x86/0x230 [ 19.616795] kunit_try_run_case+0x1a5/0x480 [ 19.616828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.616851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.616881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.616911] ? __kthread_parkme+0x82/0x180 [ 19.616936] ? preempt_count_sub+0x50/0x80 [ 19.616966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.616991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.617021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.617049] kthread+0x337/0x6f0 [ 19.617071] ? trace_preempt_on+0x20/0xc0 [ 19.617098] ? __pfx_kthread+0x10/0x10 [ 19.617122] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.617148] ? calculate_sigpending+0x7b/0xa0 [ 19.617176] ? __pfx_kthread+0x10/0x10 [ 19.617220] ret_from_fork+0x116/0x1d0 [ 19.617298] ? __pfx_kthread+0x10/0x10 [ 19.617325] ret_from_fork_asm+0x1a/0x30 [ 19.617361] </TASK> [ 19.617376] [ 19.625011] Allocated by task 282: [ 19.625302] kasan_save_stack+0x45/0x70 [ 19.625558] kasan_save_track+0x18/0x40 [ 19.625821] kasan_save_alloc_info+0x3b/0x50 [ 19.626020] __kasan_kmalloc+0xb7/0xc0 [ 19.626233] __kmalloc_cache_noprof+0x189/0x420 [ 19.626400] kasan_atomics+0x95/0x310 [ 19.626532] kunit_try_run_case+0x1a5/0x480 [ 19.626814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.627148] kthread+0x337/0x6f0 [ 19.627525] ret_from_fork+0x116/0x1d0 [ 19.627749] ret_from_fork_asm+0x1a/0x30 [ 19.627966] [ 19.628110] The buggy address belongs to the object at ffff8881033ecb00 [ 19.628110] which belongs to the cache kmalloc-64 of size 64 [ 19.628715] The buggy address is located 0 bytes to the right of [ 19.628715] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.629200] [ 19.629308] The buggy address belongs to the physical page: [ 19.629536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.629932] flags: 0x200000000000000(node=0|zone=2) [ 19.630132] page_type: f5(slab) [ 19.630317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.630676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.631112] page dumped because: kasan: bad access detected [ 19.631305] [ 19.631394] Memory state around the buggy address: [ 19.631595] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.631830] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.632308] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.632812] ^ [ 19.633164] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.634496] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635060] ================================================================== [ 19.527932] ================================================================== [ 19.528659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 19.529052] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.529413] [ 19.529702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.529767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.529784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.529811] Call Trace: [ 19.529836] <TASK> [ 19.529863] dump_stack_lvl+0x73/0xb0 [ 19.529922] print_report+0xd1/0x650 [ 19.529951] ? __virt_addr_valid+0x1db/0x2d0 [ 19.529998] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.530027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.530055] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.530082] kasan_report+0x141/0x180 [ 19.530108] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.530140] __asan_report_load8_noabort+0x18/0x20 [ 19.530165] kasan_atomics_helper+0x4f98/0x5450 [ 19.530192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.530218] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.530245] ? kasan_atomics+0x152/0x310 [ 19.530297] kasan_atomics+0x1dc/0x310 [ 19.530337] ? __pfx_kasan_atomics+0x10/0x10 [ 19.530366] ? __pfx_read_tsc+0x10/0x10 [ 19.530394] ? ktime_get_ts64+0x86/0x230 [ 19.530425] kunit_try_run_case+0x1a5/0x480 [ 19.530451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.530488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.530520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.530549] ? __kthread_parkme+0x82/0x180 [ 19.530574] ? preempt_count_sub+0x50/0x80 [ 19.530602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.530627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.530657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.530688] kthread+0x337/0x6f0 [ 19.530711] ? trace_preempt_on+0x20/0xc0 [ 19.530740] ? __pfx_kthread+0x10/0x10 [ 19.530765] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.530792] ? calculate_sigpending+0x7b/0xa0 [ 19.530821] ? __pfx_kthread+0x10/0x10 [ 19.530847] ret_from_fork+0x116/0x1d0 [ 19.530870] ? __pfx_kthread+0x10/0x10 [ 19.530895] ret_from_fork_asm+0x1a/0x30 [ 19.530931] </TASK> [ 19.530948] [ 19.540428] Allocated by task 282: [ 19.540595] kasan_save_stack+0x45/0x70 [ 19.541481] kasan_save_track+0x18/0x40 [ 19.541765] kasan_save_alloc_info+0x3b/0x50 [ 19.542083] __kasan_kmalloc+0xb7/0xc0 [ 19.542229] __kmalloc_cache_noprof+0x189/0x420 [ 19.542344] kasan_atomics+0x95/0x310 [ 19.542442] kunit_try_run_case+0x1a5/0x480 [ 19.542554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.542678] kthread+0x337/0x6f0 [ 19.542769] ret_from_fork+0x116/0x1d0 [ 19.542866] ret_from_fork_asm+0x1a/0x30 [ 19.542967] [ 19.543081] The buggy address belongs to the object at ffff8881033ecb00 [ 19.543081] which belongs to the cache kmalloc-64 of size 64 [ 19.543795] The buggy address is located 0 bytes to the right of [ 19.543795] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.544131] [ 19.544198] The buggy address belongs to the physical page: [ 19.544321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.544498] flags: 0x200000000000000(node=0|zone=2) [ 19.544696] page_type: f5(slab) [ 19.545513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.546029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.546915] page dumped because: kasan: bad access detected [ 19.547332] [ 19.547406] Memory state around the buggy address: [ 19.547538] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548103] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548571] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.548975] ^ [ 19.549225] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549669] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549870] ================================================================== [ 18.832906] ================================================================== [ 18.833728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 18.834306] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.834574] [ 18.834738] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.834847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.834866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.834895] Call Trace: [ 18.834921] <TASK> [ 18.834947] dump_stack_lvl+0x73/0xb0 [ 18.834989] print_report+0xd1/0x650 [ 18.835032] ? __virt_addr_valid+0x1db/0x2d0 [ 18.835063] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.835089] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.835115] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.835140] kasan_report+0x141/0x180 [ 18.835167] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.835197] __asan_report_load8_noabort+0x18/0x20 [ 18.835221] kasan_atomics_helper+0x4eae/0x5450 [ 18.835249] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.835275] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.835300] ? kasan_atomics+0x152/0x310 [ 18.835331] kasan_atomics+0x1dc/0x310 [ 18.835380] ? __pfx_kasan_atomics+0x10/0x10 [ 18.835410] ? __pfx_read_tsc+0x10/0x10 [ 18.835437] ? ktime_get_ts64+0x86/0x230 [ 18.835601] kunit_try_run_case+0x1a5/0x480 [ 18.835665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.835714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.835771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.835825] ? __kthread_parkme+0x82/0x180 [ 18.835878] ? preempt_count_sub+0x50/0x80 [ 18.835936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.835991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.836046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.836105] kthread+0x337/0x6f0 [ 18.836154] ? trace_preempt_on+0x20/0xc0 [ 18.836211] ? __pfx_kthread+0x10/0x10 [ 18.836260] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.836316] ? calculate_sigpending+0x7b/0xa0 [ 18.836374] ? __pfx_kthread+0x10/0x10 [ 18.836429] ret_from_fork+0x116/0x1d0 [ 18.836491] ? __pfx_kthread+0x10/0x10 [ 18.836562] ret_from_fork_asm+0x1a/0x30 [ 18.836602] </TASK> [ 18.836617] [ 18.849289] Allocated by task 282: [ 18.849722] kasan_save_stack+0x45/0x70 [ 18.850175] kasan_save_track+0x18/0x40 [ 18.850627] kasan_save_alloc_info+0x3b/0x50 [ 18.851045] __kasan_kmalloc+0xb7/0xc0 [ 18.851357] __kmalloc_cache_noprof+0x189/0x420 [ 18.851571] kasan_atomics+0x95/0x310 [ 18.851754] kunit_try_run_case+0x1a5/0x480 [ 18.851941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.852157] kthread+0x337/0x6f0 [ 18.852518] ret_from_fork+0x116/0x1d0 [ 18.852849] ret_from_fork_asm+0x1a/0x30 [ 18.853223] [ 18.853404] The buggy address belongs to the object at ffff8881033ecb00 [ 18.853404] which belongs to the cache kmalloc-64 of size 64 [ 18.854415] The buggy address is located 0 bytes to the right of [ 18.854415] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.855432] [ 18.855655] The buggy address belongs to the physical page: [ 18.856097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.856821] flags: 0x200000000000000(node=0|zone=2) [ 18.857326] page_type: f5(slab) [ 18.857590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.857883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.858593] page dumped because: kasan: bad access detected [ 18.858987] [ 18.859104] Memory state around the buggy address: [ 18.859438] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.860029] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.860488] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.860909] ^ [ 18.861371] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.861721] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.861971] ================================================================== [ 19.298000] ================================================================== [ 19.299039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 19.299517] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.300025] [ 19.300309] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.300431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.300477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.300535] Call Trace: [ 19.300585] <TASK> [ 19.300651] dump_stack_lvl+0x73/0xb0 [ 19.300729] print_report+0xd1/0x650 [ 19.300784] ? __virt_addr_valid+0x1db/0x2d0 [ 19.300839] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.300892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.300948] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.301027] kasan_report+0x141/0x180 [ 19.301076] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.301136] __asan_report_load8_noabort+0x18/0x20 [ 19.301187] kasan_atomics_helper+0x4f30/0x5450 [ 19.301281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.301336] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.301389] ? kasan_atomics+0x152/0x310 [ 19.301464] kasan_atomics+0x1dc/0x310 [ 19.301526] ? __pfx_kasan_atomics+0x10/0x10 [ 19.301609] ? __pfx_read_tsc+0x10/0x10 [ 19.301664] ? ktime_get_ts64+0x86/0x230 [ 19.301723] kunit_try_run_case+0x1a5/0x480 [ 19.301781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.301826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.301865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.301899] ? __kthread_parkme+0x82/0x180 [ 19.301925] ? preempt_count_sub+0x50/0x80 [ 19.301955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.301981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.302011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.302040] kthread+0x337/0x6f0 [ 19.302064] ? trace_preempt_on+0x20/0xc0 [ 19.302092] ? __pfx_kthread+0x10/0x10 [ 19.302118] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.302144] ? calculate_sigpending+0x7b/0xa0 [ 19.302173] ? __pfx_kthread+0x10/0x10 [ 19.302222] ret_from_fork+0x116/0x1d0 [ 19.302276] ? __pfx_kthread+0x10/0x10 [ 19.302302] ret_from_fork_asm+0x1a/0x30 [ 19.302342] </TASK> [ 19.302358] [ 19.313120] Allocated by task 282: [ 19.313446] kasan_save_stack+0x45/0x70 [ 19.313905] kasan_save_track+0x18/0x40 [ 19.314116] kasan_save_alloc_info+0x3b/0x50 [ 19.314913] __kasan_kmalloc+0xb7/0xc0 [ 19.315501] __kmalloc_cache_noprof+0x189/0x420 [ 19.315718] kasan_atomics+0x95/0x310 [ 19.316036] kunit_try_run_case+0x1a5/0x480 [ 19.316387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.316699] kthread+0x337/0x6f0 [ 19.316992] ret_from_fork+0x116/0x1d0 [ 19.317267] ret_from_fork_asm+0x1a/0x30 [ 19.317623] [ 19.317759] The buggy address belongs to the object at ffff8881033ecb00 [ 19.317759] which belongs to the cache kmalloc-64 of size 64 [ 19.318511] The buggy address is located 0 bytes to the right of [ 19.318511] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.319167] [ 19.319369] The buggy address belongs to the physical page: [ 19.319748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.320245] flags: 0x200000000000000(node=0|zone=2) [ 19.320646] page_type: f5(slab) [ 19.320966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.321383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.321919] page dumped because: kasan: bad access detected [ 19.322263] [ 19.322416] Memory state around the buggy address: [ 19.322636] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.323139] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.323481] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.323762] ^ [ 19.324144] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324718] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.325263] ================================================================== [ 18.692301] ================================================================== [ 18.693021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 18.693368] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.693667] [ 18.694290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.694416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.694450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.694515] Call Trace: [ 18.694563] <TASK> [ 18.694608] dump_stack_lvl+0x73/0xb0 [ 18.694680] print_report+0xd1/0x650 [ 18.694737] ? __virt_addr_valid+0x1db/0x2d0 [ 18.694794] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.694843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.694888] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.694935] kasan_report+0x141/0x180 [ 18.695039] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.695135] __asan_report_load4_noabort+0x18/0x20 [ 18.695185] kasan_atomics_helper+0x49e8/0x5450 [ 18.695258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.695317] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.695406] ? kasan_atomics+0x152/0x310 [ 18.695442] kasan_atomics+0x1dc/0x310 [ 18.695496] ? __pfx_kasan_atomics+0x10/0x10 [ 18.695526] ? __pfx_read_tsc+0x10/0x10 [ 18.695554] ? ktime_get_ts64+0x86/0x230 [ 18.695586] kunit_try_run_case+0x1a5/0x480 [ 18.695613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.695636] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.695667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.695696] ? __kthread_parkme+0x82/0x180 [ 18.695721] ? preempt_count_sub+0x50/0x80 [ 18.695752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.695777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.695805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.695834] kthread+0x337/0x6f0 [ 18.695858] ? trace_preempt_on+0x20/0xc0 [ 18.695885] ? __pfx_kthread+0x10/0x10 [ 18.695910] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.695937] ? calculate_sigpending+0x7b/0xa0 [ 18.695966] ? __pfx_kthread+0x10/0x10 [ 18.695990] ret_from_fork+0x116/0x1d0 [ 18.696014] ? __pfx_kthread+0x10/0x10 [ 18.696038] ret_from_fork_asm+0x1a/0x30 [ 18.696074] </TASK> [ 18.696089] [ 18.709032] Allocated by task 282: [ 18.709847] kasan_save_stack+0x45/0x70 [ 18.710245] kasan_save_track+0x18/0x40 [ 18.710478] kasan_save_alloc_info+0x3b/0x50 [ 18.710702] __kasan_kmalloc+0xb7/0xc0 [ 18.710926] __kmalloc_cache_noprof+0x189/0x420 [ 18.711171] kasan_atomics+0x95/0x310 [ 18.711516] kunit_try_run_case+0x1a5/0x480 [ 18.711834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.712089] kthread+0x337/0x6f0 [ 18.712427] ret_from_fork+0x116/0x1d0 [ 18.712782] ret_from_fork_asm+0x1a/0x30 [ 18.713082] [ 18.713270] The buggy address belongs to the object at ffff8881033ecb00 [ 18.713270] which belongs to the cache kmalloc-64 of size 64 [ 18.714643] The buggy address is located 0 bytes to the right of [ 18.714643] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.715885] [ 18.716113] The buggy address belongs to the physical page: [ 18.716772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.717433] flags: 0x200000000000000(node=0|zone=2) [ 18.717657] page_type: f5(slab) [ 18.717818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.719760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.720719] page dumped because: kasan: bad access detected [ 18.721607] [ 18.721820] Memory state around the buggy address: [ 18.723734] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.724801] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.725900] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.726874] ^ [ 18.727598] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.727894] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.728145] ================================================================== [ 18.658281] ================================================================== [ 18.659216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 18.659888] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.660450] [ 18.660994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.661150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.661198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.661256] Call Trace: [ 18.661307] <TASK> [ 18.661351] dump_stack_lvl+0x73/0xb0 [ 18.661406] print_report+0xd1/0x650 [ 18.661435] ? __virt_addr_valid+0x1db/0x2d0 [ 18.661490] ? kasan_atomics_helper+0x1217/0x5450 [ 18.661519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.661547] ? kasan_atomics_helper+0x1217/0x5450 [ 18.661574] kasan_report+0x141/0x180 [ 18.661601] ? kasan_atomics_helper+0x1217/0x5450 [ 18.661632] kasan_check_range+0x10c/0x1c0 [ 18.661661] __kasan_check_write+0x18/0x20 [ 18.661685] kasan_atomics_helper+0x1217/0x5450 [ 18.661712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.661739] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.661766] ? kasan_atomics+0x152/0x310 [ 18.661796] kasan_atomics+0x1dc/0x310 [ 18.661823] ? __pfx_kasan_atomics+0x10/0x10 [ 18.661851] ? __pfx_read_tsc+0x10/0x10 [ 18.661877] ? ktime_get_ts64+0x86/0x230 [ 18.661905] kunit_try_run_case+0x1a5/0x480 [ 18.661932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.661956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.661985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.662013] ? __kthread_parkme+0x82/0x180 [ 18.662037] ? preempt_count_sub+0x50/0x80 [ 18.662065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.662089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.662118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.662147] kthread+0x337/0x6f0 [ 18.662171] ? trace_preempt_on+0x20/0xc0 [ 18.662206] ? __pfx_kthread+0x10/0x10 [ 18.662260] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.662288] ? calculate_sigpending+0x7b/0xa0 [ 18.662318] ? __pfx_kthread+0x10/0x10 [ 18.662343] ret_from_fork+0x116/0x1d0 [ 18.662366] ? __pfx_kthread+0x10/0x10 [ 18.662392] ret_from_fork_asm+0x1a/0x30 [ 18.662428] </TASK> [ 18.662443] [ 18.676091] Allocated by task 282: [ 18.676524] kasan_save_stack+0x45/0x70 [ 18.676802] kasan_save_track+0x18/0x40 [ 18.677010] kasan_save_alloc_info+0x3b/0x50 [ 18.677841] __kasan_kmalloc+0xb7/0xc0 [ 18.678238] __kmalloc_cache_noprof+0x189/0x420 [ 18.678653] kasan_atomics+0x95/0x310 [ 18.678837] kunit_try_run_case+0x1a5/0x480 [ 18.679016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.679228] kthread+0x337/0x6f0 [ 18.679388] ret_from_fork+0x116/0x1d0 [ 18.680297] ret_from_fork_asm+0x1a/0x30 [ 18.680555] [ 18.680692] The buggy address belongs to the object at ffff8881033ecb00 [ 18.680692] which belongs to the cache kmalloc-64 of size 64 [ 18.681985] The buggy address is located 0 bytes to the right of [ 18.681985] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.683086] [ 18.683443] The buggy address belongs to the physical page: [ 18.683748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.684201] flags: 0x200000000000000(node=0|zone=2) [ 18.684908] page_type: f5(slab) [ 18.685278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.685939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.686530] page dumped because: kasan: bad access detected [ 18.686864] [ 18.687046] Memory state around the buggy address: [ 18.687416] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.687936] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.688964] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.689312] ^ [ 18.689959] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.690691] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.691085] ================================================================== [ 17.960312] ================================================================== [ 17.960862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 17.961698] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.962448] [ 17.962739] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.962857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.962889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.962934] Call Trace: [ 17.962979] <TASK> [ 17.963022] dump_stack_lvl+0x73/0xb0 [ 17.963197] print_report+0xd1/0x650 [ 17.963319] ? __virt_addr_valid+0x1db/0x2d0 [ 17.963385] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.963439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.963508] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.963558] kasan_report+0x141/0x180 [ 17.963606] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.963667] kasan_check_range+0x10c/0x1c0 [ 17.964518] __kasan_check_write+0x18/0x20 [ 17.964582] kasan_atomics_helper+0x5fe/0x5450 [ 17.964612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.964640] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.964667] ? kasan_atomics+0x152/0x310 [ 17.964711] kasan_atomics+0x1dc/0x310 [ 17.964751] ? __pfx_kasan_atomics+0x10/0x10 [ 17.964793] ? __pfx_read_tsc+0x10/0x10 [ 17.964834] ? ktime_get_ts64+0x86/0x230 [ 17.964875] kunit_try_run_case+0x1a5/0x480 [ 17.964902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.964925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.964957] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.964986] ? __kthread_parkme+0x82/0x180 [ 17.965009] ? preempt_count_sub+0x50/0x80 [ 17.965037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.965061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.965089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.965117] kthread+0x337/0x6f0 [ 17.965140] ? trace_preempt_on+0x20/0xc0 [ 17.965167] ? __pfx_kthread+0x10/0x10 [ 17.965195] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.965246] ? calculate_sigpending+0x7b/0xa0 [ 17.965274] ? __pfx_kthread+0x10/0x10 [ 17.965299] ret_from_fork+0x116/0x1d0 [ 17.965322] ? __pfx_kthread+0x10/0x10 [ 17.965347] ret_from_fork_asm+0x1a/0x30 [ 17.965384] </TASK> [ 17.965399] [ 17.975836] Allocated by task 282: [ 17.976577] kasan_save_stack+0x45/0x70 [ 17.977901] kasan_save_track+0x18/0x40 [ 17.978620] kasan_save_alloc_info+0x3b/0x50 [ 17.979247] __kasan_kmalloc+0xb7/0xc0 [ 17.979624] __kmalloc_cache_noprof+0x189/0x420 [ 17.980261] kasan_atomics+0x95/0x310 [ 17.980497] kunit_try_run_case+0x1a5/0x480 [ 17.980884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.982426] kthread+0x337/0x6f0 [ 17.982968] ret_from_fork+0x116/0x1d0 [ 17.983266] ret_from_fork_asm+0x1a/0x30 [ 17.983511] [ 17.983948] The buggy address belongs to the object at ffff8881033ecb00 [ 17.983948] which belongs to the cache kmalloc-64 of size 64 [ 17.985625] The buggy address is located 0 bytes to the right of [ 17.985625] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.986676] [ 17.987013] The buggy address belongs to the physical page: [ 17.987429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.988253] flags: 0x200000000000000(node=0|zone=2) [ 17.988884] page_type: f5(slab) [ 17.989490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.990294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.990758] page dumped because: kasan: bad access detected [ 17.991069] [ 17.991303] Memory state around the buggy address: [ 17.991701] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.992147] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.992602] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.993232] ^ [ 17.993770] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.993994] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994216] ================================================================== [ 19.442969] ================================================================== [ 19.443688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 19.444469] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.444768] [ 19.444934] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.445042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.445069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.445119] Call Trace: [ 19.445167] <TASK> [ 19.445210] dump_stack_lvl+0x73/0xb0 [ 19.445281] print_report+0xd1/0x650 [ 19.445332] ? __virt_addr_valid+0x1db/0x2d0 [ 19.445382] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.445434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.445499] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.445548] kasan_report+0x141/0x180 [ 19.445577] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.445609] kasan_check_range+0x10c/0x1c0 [ 19.445637] __kasan_check_write+0x18/0x20 [ 19.445660] kasan_atomics_helper+0x1f43/0x5450 [ 19.445687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.445714] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.445740] ? kasan_atomics+0x152/0x310 [ 19.445771] kasan_atomics+0x1dc/0x310 [ 19.445797] ? __pfx_kasan_atomics+0x10/0x10 [ 19.445826] ? __pfx_read_tsc+0x10/0x10 [ 19.445852] ? ktime_get_ts64+0x86/0x230 [ 19.445882] kunit_try_run_case+0x1a5/0x480 [ 19.445908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.445930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.445959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.445986] ? __kthread_parkme+0x82/0x180 [ 19.446010] ? preempt_count_sub+0x50/0x80 [ 19.446038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.446062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.446089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.446118] kthread+0x337/0x6f0 [ 19.446141] ? trace_preempt_on+0x20/0xc0 [ 19.446168] ? __pfx_kthread+0x10/0x10 [ 19.446196] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.446253] ? calculate_sigpending+0x7b/0xa0 [ 19.446304] ? __pfx_kthread+0x10/0x10 [ 19.446352] ret_from_fork+0x116/0x1d0 [ 19.446399] ? __pfx_kthread+0x10/0x10 [ 19.446448] ret_from_fork_asm+0x1a/0x30 [ 19.446520] </TASK> [ 19.446544] [ 19.459233] Allocated by task 282: [ 19.459642] kasan_save_stack+0x45/0x70 [ 19.460034] kasan_save_track+0x18/0x40 [ 19.460581] kasan_save_alloc_info+0x3b/0x50 [ 19.460823] __kasan_kmalloc+0xb7/0xc0 [ 19.461010] __kmalloc_cache_noprof+0x189/0x420 [ 19.461595] kasan_atomics+0x95/0x310 [ 19.461889] kunit_try_run_case+0x1a5/0x480 [ 19.462110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.462576] kthread+0x337/0x6f0 [ 19.462897] ret_from_fork+0x116/0x1d0 [ 19.463154] ret_from_fork_asm+0x1a/0x30 [ 19.463483] [ 19.463676] The buggy address belongs to the object at ffff8881033ecb00 [ 19.463676] which belongs to the cache kmalloc-64 of size 64 [ 19.464509] The buggy address is located 0 bytes to the right of [ 19.464509] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.465308] [ 19.465517] The buggy address belongs to the physical page: [ 19.465984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.466508] flags: 0x200000000000000(node=0|zone=2) [ 19.466946] page_type: f5(slab) [ 19.467267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.467803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.468096] page dumped because: kasan: bad access detected [ 19.468593] [ 19.468797] Memory state around the buggy address: [ 19.469250] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469688] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.470040] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.470557] ^ [ 19.470923] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471439] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471948] ================================================================== [ 18.235263] ================================================================== [ 18.235854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 18.236557] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.237083] [ 18.237384] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.237552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.237587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.237636] Call Trace: [ 18.237684] <TASK> [ 18.237760] dump_stack_lvl+0x73/0xb0 [ 18.237855] print_report+0xd1/0x650 [ 18.237909] ? __virt_addr_valid+0x1db/0x2d0 [ 18.237956] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.238001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.238052] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.238134] kasan_report+0x141/0x180 [ 18.238238] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.238302] kasan_check_range+0x10c/0x1c0 [ 18.238385] __kasan_check_write+0x18/0x20 [ 18.238442] kasan_atomics_helper+0xb6a/0x5450 [ 18.238512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.238568] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.238601] ? kasan_atomics+0x152/0x310 [ 18.238634] kasan_atomics+0x1dc/0x310 [ 18.238662] ? __pfx_kasan_atomics+0x10/0x10 [ 18.238691] ? __pfx_read_tsc+0x10/0x10 [ 18.238718] ? ktime_get_ts64+0x86/0x230 [ 18.238750] kunit_try_run_case+0x1a5/0x480 [ 18.238777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.238801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.238831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.238860] ? __kthread_parkme+0x82/0x180 [ 18.238885] ? preempt_count_sub+0x50/0x80 [ 18.238913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.238938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.238966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.238995] kthread+0x337/0x6f0 [ 18.239018] ? trace_preempt_on+0x20/0xc0 [ 18.239044] ? __pfx_kthread+0x10/0x10 [ 18.239069] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.239094] ? calculate_sigpending+0x7b/0xa0 [ 18.239122] ? __pfx_kthread+0x10/0x10 [ 18.239148] ret_from_fork+0x116/0x1d0 [ 18.239170] ? __pfx_kthread+0x10/0x10 [ 18.239214] ret_from_fork_asm+0x1a/0x30 [ 18.239279] </TASK> [ 18.239295] [ 18.251845] Allocated by task 282: [ 18.252120] kasan_save_stack+0x45/0x70 [ 18.252392] kasan_save_track+0x18/0x40 [ 18.252585] kasan_save_alloc_info+0x3b/0x50 [ 18.252702] __kasan_kmalloc+0xb7/0xc0 [ 18.252804] __kmalloc_cache_noprof+0x189/0x420 [ 18.252917] kasan_atomics+0x95/0x310 [ 18.253018] kunit_try_run_case+0x1a5/0x480 [ 18.253120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.253242] kthread+0x337/0x6f0 [ 18.253338] ret_from_fork+0x116/0x1d0 [ 18.253438] ret_from_fork_asm+0x1a/0x30 [ 18.254141] [ 18.254392] The buggy address belongs to the object at ffff8881033ecb00 [ 18.254392] which belongs to the cache kmalloc-64 of size 64 [ 18.256716] The buggy address is located 0 bytes to the right of [ 18.256716] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.257763] [ 18.257856] The buggy address belongs to the physical page: [ 18.257987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.258164] flags: 0x200000000000000(node=0|zone=2) [ 18.258595] page_type: f5(slab) [ 18.258912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.259534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.260128] page dumped because: kasan: bad access detected [ 18.260562] [ 18.260692] Memory state around the buggy address: [ 18.261044] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.262208] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.262866] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.263223] ^ [ 18.263425] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.263687] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264197] ================================================================== [ 18.081979] ================================================================== [ 18.083013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 18.083577] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.083962] [ 18.084222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.084328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.084358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.084407] Call Trace: [ 18.084463] <TASK> [ 18.084511] dump_stack_lvl+0x73/0xb0 [ 18.084584] print_report+0xd1/0x650 [ 18.084642] ? __virt_addr_valid+0x1db/0x2d0 [ 18.084700] ? kasan_atomics_helper+0x860/0x5450 [ 18.084754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.084809] ? kasan_atomics_helper+0x860/0x5450 [ 18.084863] kasan_report+0x141/0x180 [ 18.084919] ? kasan_atomics_helper+0x860/0x5450 [ 18.084986] kasan_check_range+0x10c/0x1c0 [ 18.085045] __kasan_check_write+0x18/0x20 [ 18.085096] kasan_atomics_helper+0x860/0x5450 [ 18.085153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.085239] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.085297] ? kasan_atomics+0x152/0x310 [ 18.085352] kasan_atomics+0x1dc/0x310 [ 18.085396] ? __pfx_kasan_atomics+0x10/0x10 [ 18.085442] ? __pfx_read_tsc+0x10/0x10 [ 18.085502] ? ktime_get_ts64+0x86/0x230 [ 18.085560] kunit_try_run_case+0x1a5/0x480 [ 18.085612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.085658] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.085714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.085770] ? __kthread_parkme+0x82/0x180 [ 18.085818] ? preempt_count_sub+0x50/0x80 [ 18.085874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.085922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.085973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.086027] kthread+0x337/0x6f0 [ 18.086072] ? trace_preempt_on+0x20/0xc0 [ 18.086125] ? __pfx_kthread+0x10/0x10 [ 18.086175] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.086254] ? calculate_sigpending+0x7b/0xa0 [ 18.086300] ? __pfx_kthread+0x10/0x10 [ 18.086347] ret_from_fork+0x116/0x1d0 [ 18.086389] ? __pfx_kthread+0x10/0x10 [ 18.086427] ret_from_fork_asm+0x1a/0x30 [ 18.086505] </TASK> [ 18.086534] [ 18.096286] Allocated by task 282: [ 18.096682] kasan_save_stack+0x45/0x70 [ 18.097087] kasan_save_track+0x18/0x40 [ 18.097426] kasan_save_alloc_info+0x3b/0x50 [ 18.097837] __kasan_kmalloc+0xb7/0xc0 [ 18.098222] __kmalloc_cache_noprof+0x189/0x420 [ 18.098500] kasan_atomics+0x95/0x310 [ 18.098682] kunit_try_run_case+0x1a5/0x480 [ 18.098883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.099126] kthread+0x337/0x6f0 [ 18.099513] ret_from_fork+0x116/0x1d0 [ 18.099854] ret_from_fork_asm+0x1a/0x30 [ 18.100285] [ 18.100496] The buggy address belongs to the object at ffff8881033ecb00 [ 18.100496] which belongs to the cache kmalloc-64 of size 64 [ 18.101437] The buggy address is located 0 bytes to the right of [ 18.101437] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.102429] [ 18.102629] The buggy address belongs to the physical page: [ 18.103051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.103750] flags: 0x200000000000000(node=0|zone=2) [ 18.104165] page_type: f5(slab) [ 18.104492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.105077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.105651] page dumped because: kasan: bad access detected [ 18.106080] [ 18.106298] Memory state around the buggy address: [ 18.106726] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.107347] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.107849] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.108602] ^ [ 18.109028] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.109813] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.110302] ================================================================== [ 18.953540] ================================================================== [ 18.954060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 18.954399] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.954976] [ 18.955181] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.955267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.955326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.955382] Call Trace: [ 18.955443] <TASK> [ 18.955497] dump_stack_lvl+0x73/0xb0 [ 18.955568] print_report+0xd1/0x650 [ 18.955618] ? __virt_addr_valid+0x1db/0x2d0 [ 18.955675] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.955730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.955788] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.955845] kasan_report+0x141/0x180 [ 18.955902] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.955983] kasan_check_range+0x10c/0x1c0 [ 18.956038] __kasan_check_write+0x18/0x20 [ 18.956083] kasan_atomics_helper+0x15b6/0x5450 [ 18.956136] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.956204] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.956268] ? kasan_atomics+0x152/0x310 [ 18.956327] kasan_atomics+0x1dc/0x310 [ 18.956385] ? __pfx_kasan_atomics+0x10/0x10 [ 18.956447] ? __pfx_read_tsc+0x10/0x10 [ 18.956516] ? ktime_get_ts64+0x86/0x230 [ 18.956580] kunit_try_run_case+0x1a5/0x480 [ 18.956637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.956688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.956750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.956808] ? __kthread_parkme+0x82/0x180 [ 18.956858] ? preempt_count_sub+0x50/0x80 [ 18.956918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.956972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.957033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.957093] kthread+0x337/0x6f0 [ 18.957142] ? trace_preempt_on+0x20/0xc0 [ 18.957199] ? __pfx_kthread+0x10/0x10 [ 18.957266] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.957319] ? calculate_sigpending+0x7b/0xa0 [ 18.957373] ? __pfx_kthread+0x10/0x10 [ 18.957419] ret_from_fork+0x116/0x1d0 [ 18.957502] ? __pfx_kthread+0x10/0x10 [ 18.957552] ret_from_fork_asm+0x1a/0x30 [ 18.957632] </TASK> [ 18.957665] [ 18.969853] Allocated by task 282: [ 18.970451] kasan_save_stack+0x45/0x70 [ 18.970750] kasan_save_track+0x18/0x40 [ 18.971037] kasan_save_alloc_info+0x3b/0x50 [ 18.971479] __kasan_kmalloc+0xb7/0xc0 [ 18.971760] __kmalloc_cache_noprof+0x189/0x420 [ 18.972153] kasan_atomics+0x95/0x310 [ 18.972556] kunit_try_run_case+0x1a5/0x480 [ 18.972861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.973310] kthread+0x337/0x6f0 [ 18.973681] ret_from_fork+0x116/0x1d0 [ 18.973937] ret_from_fork_asm+0x1a/0x30 [ 18.974299] [ 18.974512] The buggy address belongs to the object at ffff8881033ecb00 [ 18.974512] which belongs to the cache kmalloc-64 of size 64 [ 18.975148] The buggy address is located 0 bytes to the right of [ 18.975148] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.975910] [ 18.976112] The buggy address belongs to the physical page: [ 18.976491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.977057] flags: 0x200000000000000(node=0|zone=2) [ 18.977529] page_type: f5(slab) [ 18.977819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.978292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.978864] page dumped because: kasan: bad access detected [ 18.979181] [ 18.979429] Memory state around the buggy address: [ 18.979743] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.980296] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.980626] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.980861] ^ [ 18.982749] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.983275] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.984601] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
Automatically assigned
[ 17.305832] ================================================================== [ 17.306356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.307643] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.308537] [ 17.309280] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.309359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.309374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.309400] Call Trace: [ 17.309425] <TASK> [ 17.309450] dump_stack_lvl+0x73/0xb0 [ 17.309536] print_report+0xd1/0x650 [ 17.309576] ? __virt_addr_valid+0x1db/0x2d0 [ 17.309614] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.309689] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309774] kasan_report+0x141/0x180 [ 17.309815] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309868] kasan_check_range+0x10c/0x1c0 [ 17.309907] __kasan_check_write+0x18/0x20 [ 17.309941] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309987] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.310037] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.310075] ? kasan_bitops_generic+0x92/0x1c0 [ 17.310119] kasan_bitops_generic+0x121/0x1c0 [ 17.310157] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.310211] ? __pfx_read_tsc+0x10/0x10 [ 17.310254] ? ktime_get_ts64+0x86/0x230 [ 17.310316] kunit_try_run_case+0x1a5/0x480 [ 17.310343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.310364] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.310393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.310420] ? __kthread_parkme+0x82/0x180 [ 17.310443] ? preempt_count_sub+0x50/0x80 [ 17.310496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.310520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.310548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.310575] kthread+0x337/0x6f0 [ 17.310598] ? trace_preempt_on+0x20/0xc0 [ 17.310625] ? __pfx_kthread+0x10/0x10 [ 17.310647] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.310672] ? calculate_sigpending+0x7b/0xa0 [ 17.310845] ? __pfx_kthread+0x10/0x10 [ 17.310875] ret_from_fork+0x116/0x1d0 [ 17.310898] ? __pfx_kthread+0x10/0x10 [ 17.310921] ret_from_fork_asm+0x1a/0x30 [ 17.310957] </TASK> [ 17.310972] [ 17.326585] Allocated by task 278: [ 17.327141] kasan_save_stack+0x45/0x70 [ 17.328334] kasan_save_track+0x18/0x40 [ 17.328757] kasan_save_alloc_info+0x3b/0x50 [ 17.329120] __kasan_kmalloc+0xb7/0xc0 [ 17.329738] __kmalloc_cache_noprof+0x189/0x420 [ 17.330107] kasan_bitops_generic+0x92/0x1c0 [ 17.330325] kunit_try_run_case+0x1a5/0x480 [ 17.331200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.331655] kthread+0x337/0x6f0 [ 17.331985] ret_from_fork+0x116/0x1d0 [ 17.332865] ret_from_fork_asm+0x1a/0x30 [ 17.333211] [ 17.333351] The buggy address belongs to the object at ffff8881023809a0 [ 17.333351] which belongs to the cache kmalloc-16 of size 16 [ 17.333927] The buggy address is located 8 bytes inside of [ 17.333927] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.335448] [ 17.335669] The buggy address belongs to the physical page: [ 17.335982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.337069] flags: 0x200000000000000(node=0|zone=2) [ 17.337847] page_type: f5(slab) [ 17.338099] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.338661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.339410] page dumped because: kasan: bad access detected [ 17.339749] [ 17.340199] Memory state around the buggy address: [ 17.341137] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.341557] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.342146] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.342680] ^ [ 17.343285] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.343761] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.344630] ================================================================== [ 17.433108] ================================================================== [ 17.433438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.434399] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.435027] [ 17.435476] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.435602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.435635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.435687] Call Trace: [ 17.435722] <TASK> [ 17.435766] dump_stack_lvl+0x73/0xb0 [ 17.435841] print_report+0xd1/0x650 [ 17.435887] ? __virt_addr_valid+0x1db/0x2d0 [ 17.435925] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.435957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.435984] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.436015] kasan_report+0x141/0x180 [ 17.436040] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.436076] kasan_check_range+0x10c/0x1c0 [ 17.436103] __kasan_check_write+0x18/0x20 [ 17.436125] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.436156] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.436188] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.436255] ? kasan_bitops_generic+0x92/0x1c0 [ 17.436324] kasan_bitops_generic+0x121/0x1c0 [ 17.436377] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.436489] ? __pfx_read_tsc+0x10/0x10 [ 17.436518] ? ktime_get_ts64+0x86/0x230 [ 17.436561] kunit_try_run_case+0x1a5/0x480 [ 17.436605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.436629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.436658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.436686] ? __kthread_parkme+0x82/0x180 [ 17.436710] ? preempt_count_sub+0x50/0x80 [ 17.436737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.436761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.436789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.436817] kthread+0x337/0x6f0 [ 17.436839] ? trace_preempt_on+0x20/0xc0 [ 17.436866] ? __pfx_kthread+0x10/0x10 [ 17.436888] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.436914] ? calculate_sigpending+0x7b/0xa0 [ 17.436940] ? __pfx_kthread+0x10/0x10 [ 17.436964] ret_from_fork+0x116/0x1d0 [ 17.436986] ? __pfx_kthread+0x10/0x10 [ 17.437008] ret_from_fork_asm+0x1a/0x30 [ 17.437044] </TASK> [ 17.437058] [ 17.451155] Allocated by task 278: [ 17.451673] kasan_save_stack+0x45/0x70 [ 17.452133] kasan_save_track+0x18/0x40 [ 17.452567] kasan_save_alloc_info+0x3b/0x50 [ 17.452844] __kasan_kmalloc+0xb7/0xc0 [ 17.453259] __kmalloc_cache_noprof+0x189/0x420 [ 17.453486] kasan_bitops_generic+0x92/0x1c0 [ 17.453918] kunit_try_run_case+0x1a5/0x480 [ 17.454604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.454940] kthread+0x337/0x6f0 [ 17.455231] ret_from_fork+0x116/0x1d0 [ 17.456085] ret_from_fork_asm+0x1a/0x30 [ 17.456407] [ 17.456536] The buggy address belongs to the object at ffff8881023809a0 [ 17.456536] which belongs to the cache kmalloc-16 of size 16 [ 17.457496] The buggy address is located 8 bytes inside of [ 17.457496] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.458206] [ 17.458471] The buggy address belongs to the physical page: [ 17.459050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.459528] flags: 0x200000000000000(node=0|zone=2) [ 17.459903] page_type: f5(slab) [ 17.460172] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.460648] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.461065] page dumped because: kasan: bad access detected [ 17.461523] [ 17.461646] Memory state around the buggy address: [ 17.462040] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.462776] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.463089] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.463657] ^ [ 17.464057] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.464496] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.464995] ================================================================== [ 17.466340] ================================================================== [ 17.466758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.467602] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.468098] [ 17.468272] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.468381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.468409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.468468] Call Trace: [ 17.468513] <TASK> [ 17.468556] dump_stack_lvl+0x73/0xb0 [ 17.468626] print_report+0xd1/0x650 [ 17.468679] ? __virt_addr_valid+0x1db/0x2d0 [ 17.468732] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.468776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.468803] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.468834] kasan_report+0x141/0x180 [ 17.468860] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.468907] kasan_check_range+0x10c/0x1c0 [ 17.468955] __kasan_check_write+0x18/0x20 [ 17.468991] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.469039] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.469098] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.469144] ? kasan_bitops_generic+0x92/0x1c0 [ 17.469204] kasan_bitops_generic+0x121/0x1c0 [ 17.470345] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.470464] ? __pfx_read_tsc+0x10/0x10 [ 17.470523] ? ktime_get_ts64+0x86/0x230 [ 17.470584] kunit_try_run_case+0x1a5/0x480 [ 17.470640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.470690] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.470725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.470754] ? __kthread_parkme+0x82/0x180 [ 17.470779] ? preempt_count_sub+0x50/0x80 [ 17.470806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.470830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.470859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.470886] kthread+0x337/0x6f0 [ 17.470908] ? trace_preempt_on+0x20/0xc0 [ 17.470935] ? __pfx_kthread+0x10/0x10 [ 17.470959] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.470983] ? calculate_sigpending+0x7b/0xa0 [ 17.471011] ? __pfx_kthread+0x10/0x10 [ 17.471034] ret_from_fork+0x116/0x1d0 [ 17.471056] ? __pfx_kthread+0x10/0x10 [ 17.471078] ret_from_fork_asm+0x1a/0x30 [ 17.471114] </TASK> [ 17.471127] [ 17.482680] Allocated by task 278: [ 17.482937] kasan_save_stack+0x45/0x70 [ 17.483186] kasan_save_track+0x18/0x40 [ 17.483583] kasan_save_alloc_info+0x3b/0x50 [ 17.483969] __kasan_kmalloc+0xb7/0xc0 [ 17.484288] __kmalloc_cache_noprof+0x189/0x420 [ 17.484812] kasan_bitops_generic+0x92/0x1c0 [ 17.485195] kunit_try_run_case+0x1a5/0x480 [ 17.485578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.486012] kthread+0x337/0x6f0 [ 17.486387] ret_from_fork+0x116/0x1d0 [ 17.486672] ret_from_fork_asm+0x1a/0x30 [ 17.486933] [ 17.487065] The buggy address belongs to the object at ffff8881023809a0 [ 17.487065] which belongs to the cache kmalloc-16 of size 16 [ 17.487513] The buggy address is located 8 bytes inside of [ 17.487513] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.488004] [ 17.488201] The buggy address belongs to the physical page: [ 17.488668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.489487] flags: 0x200000000000000(node=0|zone=2) [ 17.489925] page_type: f5(slab) [ 17.490254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.490864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.491368] page dumped because: kasan: bad access detected [ 17.491711] [ 17.491898] Memory state around the buggy address: [ 17.492192] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.492728] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.493160] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.493679] ^ [ 17.493916] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494194] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494495] ================================================================== [ 17.560950] ================================================================== [ 17.561524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.562289] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.562787] [ 17.563061] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.563229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.563265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.563314] Call Trace: [ 17.563367] <TASK> [ 17.563439] dump_stack_lvl+0x73/0xb0 [ 17.563530] print_report+0xd1/0x650 [ 17.563583] ? __virt_addr_valid+0x1db/0x2d0 [ 17.563634] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.563789] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563827] kasan_report+0x141/0x180 [ 17.563853] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563888] __asan_report_load8_noabort+0x18/0x20 [ 17.563911] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563951] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.564000] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.564045] ? kasan_bitops_generic+0x92/0x1c0 [ 17.564129] kasan_bitops_generic+0x121/0x1c0 [ 17.564236] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.564293] ? __pfx_read_tsc+0x10/0x10 [ 17.564368] ? ktime_get_ts64+0x86/0x230 [ 17.564443] kunit_try_run_case+0x1a5/0x480 [ 17.564500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.564568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.564595] ? __kthread_parkme+0x82/0x180 [ 17.564619] ? preempt_count_sub+0x50/0x80 [ 17.564645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.564695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.564722] kthread+0x337/0x6f0 [ 17.564745] ? trace_preempt_on+0x20/0xc0 [ 17.564771] ? __pfx_kthread+0x10/0x10 [ 17.564793] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.564817] ? calculate_sigpending+0x7b/0xa0 [ 17.564844] ? __pfx_kthread+0x10/0x10 [ 17.564868] ret_from_fork+0x116/0x1d0 [ 17.564889] ? __pfx_kthread+0x10/0x10 [ 17.564911] ret_from_fork_asm+0x1a/0x30 [ 17.564945] </TASK> [ 17.564959] [ 17.576666] Allocated by task 278: [ 17.577094] kasan_save_stack+0x45/0x70 [ 17.577553] kasan_save_track+0x18/0x40 [ 17.577923] kasan_save_alloc_info+0x3b/0x50 [ 17.578286] __kasan_kmalloc+0xb7/0xc0 [ 17.578499] __kmalloc_cache_noprof+0x189/0x420 [ 17.578759] kasan_bitops_generic+0x92/0x1c0 [ 17.579188] kunit_try_run_case+0x1a5/0x480 [ 17.579626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579998] kthread+0x337/0x6f0 [ 17.580398] ret_from_fork+0x116/0x1d0 [ 17.580745] ret_from_fork_asm+0x1a/0x30 [ 17.581090] [ 17.581272] The buggy address belongs to the object at ffff8881023809a0 [ 17.581272] which belongs to the cache kmalloc-16 of size 16 [ 17.582001] The buggy address is located 8 bytes inside of [ 17.582001] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.582974] [ 17.583177] The buggy address belongs to the physical page: [ 17.583517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.584184] flags: 0x200000000000000(node=0|zone=2) [ 17.584793] page_type: f5(slab) [ 17.585540] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.585932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.587423] page dumped because: kasan: bad access detected [ 17.587691] [ 17.587817] Memory state around the buggy address: [ 17.588075] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.588525] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.589184] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.589939] ^ [ 17.590223] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.591286] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.591637] ================================================================== [ 17.266344] ================================================================== [ 17.267171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.267635] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.268401] [ 17.268914] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.269020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.269044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.269081] Call Trace: [ 17.269120] <TASK> [ 17.269157] dump_stack_lvl+0x73/0xb0 [ 17.269219] print_report+0xd1/0x650 [ 17.269258] ? __virt_addr_valid+0x1db/0x2d0 [ 17.269296] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.269339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.269380] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.269426] kasan_report+0x141/0x180 [ 17.270000] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.270061] kasan_check_range+0x10c/0x1c0 [ 17.270091] __kasan_check_write+0x18/0x20 [ 17.270115] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.270147] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.270179] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.270213] ? kasan_bitops_generic+0x92/0x1c0 [ 17.270263] kasan_bitops_generic+0x121/0x1c0 [ 17.270290] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.270317] ? __pfx_read_tsc+0x10/0x10 [ 17.270344] ? ktime_get_ts64+0x86/0x230 [ 17.270373] kunit_try_run_case+0x1a5/0x480 [ 17.270399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.270420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.270450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.270501] ? __kthread_parkme+0x82/0x180 [ 17.270525] ? preempt_count_sub+0x50/0x80 [ 17.270556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.270580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.270608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.270636] kthread+0x337/0x6f0 [ 17.270660] ? trace_preempt_on+0x20/0xc0 [ 17.270687] ? __pfx_kthread+0x10/0x10 [ 17.270727] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.270765] ? calculate_sigpending+0x7b/0xa0 [ 17.270807] ? __pfx_kthread+0x10/0x10 [ 17.270844] ret_from_fork+0x116/0x1d0 [ 17.270881] ? __pfx_kthread+0x10/0x10 [ 17.270914] ret_from_fork_asm+0x1a/0x30 [ 17.270952] </TASK> [ 17.270967] [ 17.287662] Allocated by task 278: [ 17.288392] kasan_save_stack+0x45/0x70 [ 17.289338] kasan_save_track+0x18/0x40 [ 17.289989] kasan_save_alloc_info+0x3b/0x50 [ 17.290288] __kasan_kmalloc+0xb7/0xc0 [ 17.290663] __kmalloc_cache_noprof+0x189/0x420 [ 17.291218] kasan_bitops_generic+0x92/0x1c0 [ 17.291576] kunit_try_run_case+0x1a5/0x480 [ 17.292258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.292621] kthread+0x337/0x6f0 [ 17.293395] ret_from_fork+0x116/0x1d0 [ 17.293594] ret_from_fork_asm+0x1a/0x30 [ 17.293864] [ 17.294074] The buggy address belongs to the object at ffff8881023809a0 [ 17.294074] which belongs to the cache kmalloc-16 of size 16 [ 17.294932] The buggy address is located 8 bytes inside of [ 17.294932] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.295953] [ 17.296214] The buggy address belongs to the physical page: [ 17.296740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.297443] flags: 0x200000000000000(node=0|zone=2) [ 17.297983] page_type: f5(slab) [ 17.298503] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.299294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.299690] page dumped because: kasan: bad access detected [ 17.300857] [ 17.301012] Memory state around the buggy address: [ 17.301384] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.302278] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.302733] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.303245] ^ [ 17.303668] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.304735] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.305161] ================================================================== [ 17.385412] ================================================================== [ 17.385717] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.386060] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.386298] [ 17.386444] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.386832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.386864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.386992] Call Trace: [ 17.387114] <TASK> [ 17.387244] dump_stack_lvl+0x73/0xb0 [ 17.387319] print_report+0xd1/0x650 [ 17.387374] ? __virt_addr_valid+0x1db/0x2d0 [ 17.387420] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.387491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.387535] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.387584] kasan_report+0x141/0x180 [ 17.387622] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.387676] kasan_check_range+0x10c/0x1c0 [ 17.387719] __kasan_check_write+0x18/0x20 [ 17.387750] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.390898] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.390990] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.391035] ? kasan_bitops_generic+0x92/0x1c0 [ 17.391093] kasan_bitops_generic+0x121/0x1c0 [ 17.391142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.391185] ? __pfx_read_tsc+0x10/0x10 [ 17.391244] ? ktime_get_ts64+0x86/0x230 [ 17.391297] kunit_try_run_case+0x1a5/0x480 [ 17.391362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.391410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.391484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.391544] ? __kthread_parkme+0x82/0x180 [ 17.391595] ? preempt_count_sub+0x50/0x80 [ 17.391652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.391703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.391760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.391814] kthread+0x337/0x6f0 [ 17.391862] ? trace_preempt_on+0x20/0xc0 [ 17.391915] ? __pfx_kthread+0x10/0x10 [ 17.391964] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.392015] ? calculate_sigpending+0x7b/0xa0 [ 17.392072] ? __pfx_kthread+0x10/0x10 [ 17.392120] ret_from_fork+0x116/0x1d0 [ 17.392154] ? __pfx_kthread+0x10/0x10 [ 17.392192] ret_from_fork_asm+0x1a/0x30 [ 17.392250] </TASK> [ 17.392271] [ 17.412831] Allocated by task 278: [ 17.413090] kasan_save_stack+0x45/0x70 [ 17.413381] kasan_save_track+0x18/0x40 [ 17.414980] kasan_save_alloc_info+0x3b/0x50 [ 17.415332] __kasan_kmalloc+0xb7/0xc0 [ 17.416026] __kmalloc_cache_noprof+0x189/0x420 [ 17.416403] kasan_bitops_generic+0x92/0x1c0 [ 17.416658] kunit_try_run_case+0x1a5/0x480 [ 17.417300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.418372] kthread+0x337/0x6f0 [ 17.418626] ret_from_fork+0x116/0x1d0 [ 17.418902] ret_from_fork_asm+0x1a/0x30 [ 17.419511] [ 17.419808] The buggy address belongs to the object at ffff8881023809a0 [ 17.419808] which belongs to the cache kmalloc-16 of size 16 [ 17.420802] The buggy address is located 8 bytes inside of [ 17.420802] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.421404] [ 17.421871] The buggy address belongs to the physical page: [ 17.422194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.422534] flags: 0x200000000000000(node=0|zone=2) [ 17.422880] page_type: f5(slab) [ 17.423913] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.425167] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.426047] page dumped because: kasan: bad access detected [ 17.426540] [ 17.426929] Memory state around the buggy address: [ 17.427189] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.428551] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.429013] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.429474] ^ [ 17.429865] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430516] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.431239] ================================================================== [ 17.527503] ================================================================== [ 17.527858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.528247] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.529016] [ 17.529327] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.529439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.529477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.529529] Call Trace: [ 17.529578] <TASK> [ 17.529623] dump_stack_lvl+0x73/0xb0 [ 17.529693] print_report+0xd1/0x650 [ 17.529750] ? __virt_addr_valid+0x1db/0x2d0 [ 17.529806] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.529872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.529926] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.529989] kasan_report+0x141/0x180 [ 17.530043] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.530116] kasan_check_range+0x10c/0x1c0 [ 17.530172] __kasan_check_read+0x15/0x20 [ 17.530235] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.530293] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.530389] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.530465] ? kasan_bitops_generic+0x92/0x1c0 [ 17.530553] kasan_bitops_generic+0x121/0x1c0 [ 17.530646] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.530735] ? __pfx_read_tsc+0x10/0x10 [ 17.530783] ? ktime_get_ts64+0x86/0x230 [ 17.530858] kunit_try_run_case+0x1a5/0x480 [ 17.530909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.530951] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.530997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.531044] ? __kthread_parkme+0x82/0x180 [ 17.531092] ? preempt_count_sub+0x50/0x80 [ 17.531175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.531277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.531339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.531404] kthread+0x337/0x6f0 [ 17.531445] ? trace_preempt_on+0x20/0xc0 [ 17.531894] ? __pfx_kthread+0x10/0x10 [ 17.531979] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.532024] ? calculate_sigpending+0x7b/0xa0 [ 17.532056] ? __pfx_kthread+0x10/0x10 [ 17.532081] ret_from_fork+0x116/0x1d0 [ 17.532105] ? __pfx_kthread+0x10/0x10 [ 17.532128] ret_from_fork_asm+0x1a/0x30 [ 17.532164] </TASK> [ 17.532178] [ 17.545186] Allocated by task 278: [ 17.545758] kasan_save_stack+0x45/0x70 [ 17.546011] kasan_save_track+0x18/0x40 [ 17.546651] kasan_save_alloc_info+0x3b/0x50 [ 17.547074] __kasan_kmalloc+0xb7/0xc0 [ 17.547450] __kmalloc_cache_noprof+0x189/0x420 [ 17.548172] kasan_bitops_generic+0x92/0x1c0 [ 17.548647] kunit_try_run_case+0x1a5/0x480 [ 17.548852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.549505] kthread+0x337/0x6f0 [ 17.549989] ret_from_fork+0x116/0x1d0 [ 17.550304] ret_from_fork_asm+0x1a/0x30 [ 17.550804] [ 17.550956] The buggy address belongs to the object at ffff8881023809a0 [ 17.550956] which belongs to the cache kmalloc-16 of size 16 [ 17.551754] The buggy address is located 8 bytes inside of [ 17.551754] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.552434] [ 17.552917] The buggy address belongs to the physical page: [ 17.553231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.553996] flags: 0x200000000000000(node=0|zone=2) [ 17.554223] page_type: f5(slab) [ 17.554497] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.555069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.555397] page dumped because: kasan: bad access detected [ 17.555874] [ 17.556005] Memory state around the buggy address: [ 17.556266] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.556845] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.557569] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.558055] ^ [ 17.558313] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.558917] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.559568] ================================================================== [ 17.495968] ================================================================== [ 17.497152] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.497686] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.498162] [ 17.498422] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.498579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.498853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.498893] Call Trace: [ 17.498935] <TASK> [ 17.498977] dump_stack_lvl+0x73/0xb0 [ 17.499039] print_report+0xd1/0x650 [ 17.499088] ? __virt_addr_valid+0x1db/0x2d0 [ 17.499136] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.499193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.499942] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.499993] kasan_report+0x141/0x180 [ 17.500024] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.500061] kasan_check_range+0x10c/0x1c0 [ 17.500090] __kasan_check_write+0x18/0x20 [ 17.500113] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.500144] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.500176] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.500210] ? kasan_bitops_generic+0x92/0x1c0 [ 17.500562] kasan_bitops_generic+0x121/0x1c0 [ 17.500622] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.500680] ? __pfx_read_tsc+0x10/0x10 [ 17.500732] ? ktime_get_ts64+0x86/0x230 [ 17.500793] kunit_try_run_case+0x1a5/0x480 [ 17.500848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.500897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.500956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.501014] ? __kthread_parkme+0x82/0x180 [ 17.501063] ? preempt_count_sub+0x50/0x80 [ 17.501112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.501137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.501165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.501210] kthread+0x337/0x6f0 [ 17.501267] ? trace_preempt_on+0x20/0xc0 [ 17.501294] ? __pfx_kthread+0x10/0x10 [ 17.501316] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.501341] ? calculate_sigpending+0x7b/0xa0 [ 17.501368] ? __pfx_kthread+0x10/0x10 [ 17.501391] ret_from_fork+0x116/0x1d0 [ 17.501411] ? __pfx_kthread+0x10/0x10 [ 17.501434] ret_from_fork_asm+0x1a/0x30 [ 17.501485] </TASK> [ 17.501500] [ 17.513812] Allocated by task 278: [ 17.514199] kasan_save_stack+0x45/0x70 [ 17.514529] kasan_save_track+0x18/0x40 [ 17.514865] kasan_save_alloc_info+0x3b/0x50 [ 17.515243] __kasan_kmalloc+0xb7/0xc0 [ 17.515485] __kmalloc_cache_noprof+0x189/0x420 [ 17.515866] kasan_bitops_generic+0x92/0x1c0 [ 17.516167] kunit_try_run_case+0x1a5/0x480 [ 17.516581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.516876] kthread+0x337/0x6f0 [ 17.517069] ret_from_fork+0x116/0x1d0 [ 17.517339] ret_from_fork_asm+0x1a/0x30 [ 17.517777] [ 17.517994] The buggy address belongs to the object at ffff8881023809a0 [ 17.517994] which belongs to the cache kmalloc-16 of size 16 [ 17.518872] The buggy address is located 8 bytes inside of [ 17.518872] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.519297] [ 17.519442] The buggy address belongs to the physical page: [ 17.520019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.520726] flags: 0x200000000000000(node=0|zone=2) [ 17.521126] page_type: f5(slab) [ 17.521559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.522065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.522651] page dumped because: kasan: bad access detected [ 17.522883] [ 17.523000] Memory state around the buggy address: [ 17.523249] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.523747] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.524502] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.525078] ^ [ 17.525316] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.525772] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.526333] ================================================================== [ 17.345667] ================================================================== [ 17.346303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.346894] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.347997] [ 17.348249] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.349088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.349151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.349199] Call Trace: [ 17.349266] <TASK> [ 17.349310] dump_stack_lvl+0x73/0xb0 [ 17.349395] print_report+0xd1/0x650 [ 17.349444] ? __virt_addr_valid+0x1db/0x2d0 [ 17.349510] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.349641] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349698] kasan_report+0x141/0x180 [ 17.349746] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349792] kasan_check_range+0x10c/0x1c0 [ 17.349821] __kasan_check_write+0x18/0x20 [ 17.349844] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349875] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.349907] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.349932] ? kasan_bitops_generic+0x92/0x1c0 [ 17.349963] kasan_bitops_generic+0x121/0x1c0 [ 17.349990] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.350019] ? __pfx_read_tsc+0x10/0x10 [ 17.350043] ? ktime_get_ts64+0x86/0x230 [ 17.350073] kunit_try_run_case+0x1a5/0x480 [ 17.350097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.350119] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.350147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.350174] ? __kthread_parkme+0x82/0x180 [ 17.350203] ? preempt_count_sub+0x50/0x80 [ 17.350284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.350327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.350396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.350427] kthread+0x337/0x6f0 [ 17.350450] ? trace_preempt_on+0x20/0xc0 [ 17.350502] ? __pfx_kthread+0x10/0x10 [ 17.350527] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.350556] ? calculate_sigpending+0x7b/0xa0 [ 17.350585] ? __pfx_kthread+0x10/0x10 [ 17.350610] ret_from_fork+0x116/0x1d0 [ 17.350634] ? __pfx_kthread+0x10/0x10 [ 17.350658] ret_from_fork_asm+0x1a/0x30 [ 17.350719] </TASK> [ 17.350743] [ 17.367092] Allocated by task 278: [ 17.367329] kasan_save_stack+0x45/0x70 [ 17.368644] kasan_save_track+0x18/0x40 [ 17.369191] kasan_save_alloc_info+0x3b/0x50 [ 17.369747] __kasan_kmalloc+0xb7/0xc0 [ 17.370151] __kmalloc_cache_noprof+0x189/0x420 [ 17.370608] kasan_bitops_generic+0x92/0x1c0 [ 17.371436] kunit_try_run_case+0x1a5/0x480 [ 17.372507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.372908] kthread+0x337/0x6f0 [ 17.373073] ret_from_fork+0x116/0x1d0 [ 17.373180] ret_from_fork_asm+0x1a/0x30 [ 17.373409] [ 17.373550] The buggy address belongs to the object at ffff8881023809a0 [ 17.373550] which belongs to the cache kmalloc-16 of size 16 [ 17.374768] The buggy address is located 8 bytes inside of [ 17.374768] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.375597] [ 17.375783] The buggy address belongs to the physical page: [ 17.376104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.377240] flags: 0x200000000000000(node=0|zone=2) [ 17.377468] page_type: f5(slab) [ 17.377622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.379095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.379560] page dumped because: kasan: bad access detected [ 17.380251] [ 17.380380] Memory state around the buggy address: [ 17.381540] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.381928] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.382750] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.383199] ^ [ 17.384107] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.384370] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.384812] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
Automatically assigned
[ 17.105579] ================================================================== [ 17.106220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.107558] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.108275] [ 17.108581] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.108741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.108771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.108820] Call Trace: [ 17.108859] <TASK> [ 17.108900] dump_stack_lvl+0x73/0xb0 [ 17.108967] print_report+0xd1/0x650 [ 17.109020] ? __virt_addr_valid+0x1db/0x2d0 [ 17.109072] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.109372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.109425] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.109482] kasan_report+0x141/0x180 [ 17.109561] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.109621] kasan_check_range+0x10c/0x1c0 [ 17.109673] __kasan_check_write+0x18/0x20 [ 17.109716] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.109773] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.109831] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.109885] ? kasan_bitops_generic+0x92/0x1c0 [ 17.109949] kasan_bitops_generic+0x116/0x1c0 [ 17.110000] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.110102] ? __pfx_read_tsc+0x10/0x10 [ 17.110150] ? ktime_get_ts64+0x86/0x230 [ 17.110203] kunit_try_run_case+0x1a5/0x480 [ 17.110250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.110293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.110350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.110410] ? __kthread_parkme+0x82/0x180 [ 17.110471] ? preempt_count_sub+0x50/0x80 [ 17.110526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.110566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.110608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.110654] kthread+0x337/0x6f0 [ 17.110695] ? trace_preempt_on+0x20/0xc0 [ 17.110737] ? __pfx_kthread+0x10/0x10 [ 17.110775] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.110815] ? calculate_sigpending+0x7b/0xa0 [ 17.110865] ? __pfx_kthread+0x10/0x10 [ 17.110906] ret_from_fork+0x116/0x1d0 [ 17.110943] ? __pfx_kthread+0x10/0x10 [ 17.110976] ret_from_fork_asm+0x1a/0x30 [ 17.112008] </TASK> [ 17.112037] [ 17.126705] Allocated by task 278: [ 17.126948] kasan_save_stack+0x45/0x70 [ 17.127186] kasan_save_track+0x18/0x40 [ 17.127382] kasan_save_alloc_info+0x3b/0x50 [ 17.127601] __kasan_kmalloc+0xb7/0xc0 [ 17.127782] __kmalloc_cache_noprof+0x189/0x420 [ 17.127977] kasan_bitops_generic+0x92/0x1c0 [ 17.128425] kunit_try_run_case+0x1a5/0x480 [ 17.128881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.129135] kthread+0x337/0x6f0 [ 17.129315] ret_from_fork+0x116/0x1d0 [ 17.129524] ret_from_fork_asm+0x1a/0x30 [ 17.129734] [ 17.129863] The buggy address belongs to the object at ffff8881023809a0 [ 17.129863] which belongs to the cache kmalloc-16 of size 16 [ 17.130251] The buggy address is located 8 bytes inside of [ 17.130251] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.130660] [ 17.132361] The buggy address belongs to the physical page: [ 17.134198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.134878] flags: 0x200000000000000(node=0|zone=2) [ 17.135730] page_type: f5(slab) [ 17.136074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.137671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.138518] page dumped because: kasan: bad access detected [ 17.139089] [ 17.139317] Memory state around the buggy address: [ 17.139980] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.141075] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.142228] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.142681] ^ [ 17.143517] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144170] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144677] ================================================================== [ 17.063618] ================================================================== [ 17.064488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 17.065153] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.065870] [ 17.066469] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.066872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.066908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.066962] Call Trace: [ 17.067011] <TASK> [ 17.067052] dump_stack_lvl+0x73/0xb0 [ 17.067119] print_report+0xd1/0x650 [ 17.067150] ? __virt_addr_valid+0x1db/0x2d0 [ 17.067178] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 17.067217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.067307] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 17.067365] kasan_report+0x141/0x180 [ 17.067404] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 17.067468] kasan_check_range+0x10c/0x1c0 [ 17.067514] __kasan_check_write+0x18/0x20 [ 17.067549] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 17.067614] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.067663] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.067775] ? kasan_bitops_generic+0x92/0x1c0 [ 17.067812] kasan_bitops_generic+0x116/0x1c0 [ 17.067841] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.067871] ? __pfx_read_tsc+0x10/0x10 [ 17.067898] ? ktime_get_ts64+0x86/0x230 [ 17.067930] kunit_try_run_case+0x1a5/0x480 [ 17.067955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.067978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.068008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.068036] ? __kthread_parkme+0x82/0x180 [ 17.068060] ? preempt_count_sub+0x50/0x80 [ 17.068087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.068111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.068139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.068168] kthread+0x337/0x6f0 [ 17.068193] ? trace_preempt_on+0x20/0xc0 [ 17.068249] ? __pfx_kthread+0x10/0x10 [ 17.068274] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.068300] ? calculate_sigpending+0x7b/0xa0 [ 17.068331] ? __pfx_kthread+0x10/0x10 [ 17.068356] ret_from_fork+0x116/0x1d0 [ 17.068378] ? __pfx_kthread+0x10/0x10 [ 17.068402] ret_from_fork_asm+0x1a/0x30 [ 17.068439] </TASK> [ 17.068468] [ 17.085665] Allocated by task 278: [ 17.086345] kasan_save_stack+0x45/0x70 [ 17.086779] kasan_save_track+0x18/0x40 [ 17.087112] kasan_save_alloc_info+0x3b/0x50 [ 17.087980] __kasan_kmalloc+0xb7/0xc0 [ 17.088513] __kmalloc_cache_noprof+0x189/0x420 [ 17.088911] kasan_bitops_generic+0x92/0x1c0 [ 17.089605] kunit_try_run_case+0x1a5/0x480 [ 17.090419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.090668] kthread+0x337/0x6f0 [ 17.091007] ret_from_fork+0x116/0x1d0 [ 17.091697] ret_from_fork_asm+0x1a/0x30 [ 17.092179] [ 17.092572] The buggy address belongs to the object at ffff8881023809a0 [ 17.092572] which belongs to the cache kmalloc-16 of size 16 [ 17.093269] The buggy address is located 8 bytes inside of [ 17.093269] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.094321] [ 17.094672] The buggy address belongs to the physical page: [ 17.095572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.096110] flags: 0x200000000000000(node=0|zone=2) [ 17.096801] page_type: f5(slab) [ 17.097058] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.098249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.098949] page dumped because: kasan: bad access detected [ 17.099402] [ 17.099528] Memory state around the buggy address: [ 17.099932] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.100796] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.101341] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.101969] ^ [ 17.102757] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.103129] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.104048] ================================================================== [ 17.225597] ================================================================== [ 17.227149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.228118] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.229414] [ 17.229692] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.229826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.229854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.229900] Call Trace: [ 17.229945] <TASK> [ 17.229987] dump_stack_lvl+0x73/0xb0 [ 17.230068] print_report+0xd1/0x650 [ 17.230119] ? __virt_addr_valid+0x1db/0x2d0 [ 17.230160] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.230191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.230646] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.230726] kasan_report+0x141/0x180 [ 17.230771] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.230829] kasan_check_range+0x10c/0x1c0 [ 17.230865] __kasan_check_write+0x18/0x20 [ 17.230887] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.230917] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.230946] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.230971] ? kasan_bitops_generic+0x92/0x1c0 [ 17.231002] kasan_bitops_generic+0x116/0x1c0 [ 17.231029] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.231056] ? __pfx_read_tsc+0x10/0x10 [ 17.231081] ? ktime_get_ts64+0x86/0x230 [ 17.231109] kunit_try_run_case+0x1a5/0x480 [ 17.231134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.231157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.231185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.231226] ? __kthread_parkme+0x82/0x180 [ 17.231251] ? preempt_count_sub+0x50/0x80 [ 17.231278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.231303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.231331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.231377] kthread+0x337/0x6f0 [ 17.231401] ? trace_preempt_on+0x20/0xc0 [ 17.231428] ? __pfx_kthread+0x10/0x10 [ 17.231451] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.231493] ? calculate_sigpending+0x7b/0xa0 [ 17.231524] ? __pfx_kthread+0x10/0x10 [ 17.231548] ret_from_fork+0x116/0x1d0 [ 17.231570] ? __pfx_kthread+0x10/0x10 [ 17.231594] ret_from_fork_asm+0x1a/0x30 [ 17.231630] </TASK> [ 17.231645] [ 17.248434] Allocated by task 278: [ 17.248947] kasan_save_stack+0x45/0x70 [ 17.249478] kasan_save_track+0x18/0x40 [ 17.249957] kasan_save_alloc_info+0x3b/0x50 [ 17.250295] __kasan_kmalloc+0xb7/0xc0 [ 17.251271] __kmalloc_cache_noprof+0x189/0x420 [ 17.251963] kasan_bitops_generic+0x92/0x1c0 [ 17.252626] kunit_try_run_case+0x1a5/0x480 [ 17.253656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.254157] kthread+0x337/0x6f0 [ 17.254567] ret_from_fork+0x116/0x1d0 [ 17.255619] ret_from_fork_asm+0x1a/0x30 [ 17.256308] [ 17.256620] The buggy address belongs to the object at ffff8881023809a0 [ 17.256620] which belongs to the cache kmalloc-16 of size 16 [ 17.257557] The buggy address is located 8 bytes inside of [ 17.257557] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.258608] [ 17.258892] The buggy address belongs to the physical page: [ 17.259287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.259596] flags: 0x200000000000000(node=0|zone=2) [ 17.259805] page_type: f5(slab) [ 17.259995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.260191] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.260346] page dumped because: kasan: bad access detected [ 17.260494] [ 17.260620] Memory state around the buggy address: [ 17.261053] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.261875] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.262559] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.263072] ^ [ 17.263301] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.263623] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.263893] ================================================================== [ 17.022296] ================================================================== [ 17.022711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 17.024068] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.024916] [ 17.025178] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.025296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.025572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.025630] Call Trace: [ 17.025676] <TASK> [ 17.025748] dump_stack_lvl+0x73/0xb0 [ 17.025832] print_report+0xd1/0x650 [ 17.025865] ? __virt_addr_valid+0x1db/0x2d0 [ 17.025895] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 17.025927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.025952] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 17.025983] kasan_report+0x141/0x180 [ 17.026008] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 17.026042] kasan_check_range+0x10c/0x1c0 [ 17.026070] __kasan_check_write+0x18/0x20 [ 17.026092] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 17.026121] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.026151] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.026177] ? kasan_bitops_generic+0x92/0x1c0 [ 17.026219] kasan_bitops_generic+0x116/0x1c0 [ 17.026260] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.026302] ? __pfx_read_tsc+0x10/0x10 [ 17.026341] ? ktime_get_ts64+0x86/0x230 [ 17.026405] kunit_try_run_case+0x1a5/0x480 [ 17.026435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.026478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.026512] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.026541] ? __kthread_parkme+0x82/0x180 [ 17.026566] ? preempt_count_sub+0x50/0x80 [ 17.026595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.026619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.026649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.026676] kthread+0x337/0x6f0 [ 17.026726] ? trace_preempt_on+0x20/0xc0 [ 17.026773] ? __pfx_kthread+0x10/0x10 [ 17.026807] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.026833] ? calculate_sigpending+0x7b/0xa0 [ 17.026862] ? __pfx_kthread+0x10/0x10 [ 17.026886] ret_from_fork+0x116/0x1d0 [ 17.026907] ? __pfx_kthread+0x10/0x10 [ 17.026930] ret_from_fork_asm+0x1a/0x30 [ 17.026967] </TASK> [ 17.026981] [ 17.043382] Allocated by task 278: [ 17.044543] kasan_save_stack+0x45/0x70 [ 17.045179] kasan_save_track+0x18/0x40 [ 17.045558] kasan_save_alloc_info+0x3b/0x50 [ 17.045961] __kasan_kmalloc+0xb7/0xc0 [ 17.046333] __kmalloc_cache_noprof+0x189/0x420 [ 17.046842] kasan_bitops_generic+0x92/0x1c0 [ 17.047414] kunit_try_run_case+0x1a5/0x480 [ 17.047735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.048531] kthread+0x337/0x6f0 [ 17.048926] ret_from_fork+0x116/0x1d0 [ 17.049851] ret_from_fork_asm+0x1a/0x30 [ 17.050061] [ 17.050285] The buggy address belongs to the object at ffff8881023809a0 [ 17.050285] which belongs to the cache kmalloc-16 of size 16 [ 17.051422] The buggy address is located 8 bytes inside of [ 17.051422] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.052662] [ 17.052923] The buggy address belongs to the physical page: [ 17.053500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.054185] flags: 0x200000000000000(node=0|zone=2) [ 17.054576] page_type: f5(slab) [ 17.054884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.055861] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.056883] page dumped because: kasan: bad access detected [ 17.057626] [ 17.057997] Memory state around the buggy address: [ 17.058316] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.059147] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.059537] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.060193] ^ [ 17.060740] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.061635] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.062194] ================================================================== [ 16.980899] ================================================================== [ 16.982419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.983107] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 16.983881] [ 16.984063] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.984887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.984915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.984944] Call Trace: [ 16.984962] <TASK> [ 16.984987] dump_stack_lvl+0x73/0xb0 [ 16.985035] print_report+0xd1/0x650 [ 16.985062] ? __virt_addr_valid+0x1db/0x2d0 [ 16.985089] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.985119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.985144] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.985173] kasan_report+0x141/0x180 [ 16.985203] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.985289] kasan_check_range+0x10c/0x1c0 [ 16.985334] __kasan_check_write+0x18/0x20 [ 16.985372] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.985403] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.985432] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.985481] ? kasan_bitops_generic+0x92/0x1c0 [ 16.985539] kasan_bitops_generic+0x116/0x1c0 [ 16.985567] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.985596] ? __pfx_read_tsc+0x10/0x10 [ 16.985621] ? ktime_get_ts64+0x86/0x230 [ 16.985651] kunit_try_run_case+0x1a5/0x480 [ 16.985676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.986021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.986066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.986095] ? __kthread_parkme+0x82/0x180 [ 16.986120] ? preempt_count_sub+0x50/0x80 [ 16.986148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.986172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.986210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.986263] kthread+0x337/0x6f0 [ 16.986287] ? trace_preempt_on+0x20/0xc0 [ 16.986313] ? __pfx_kthread+0x10/0x10 [ 16.986336] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.986362] ? calculate_sigpending+0x7b/0xa0 [ 16.986389] ? __pfx_kthread+0x10/0x10 [ 16.986412] ret_from_fork+0x116/0x1d0 [ 16.986435] ? __pfx_kthread+0x10/0x10 [ 16.986477] ret_from_fork_asm+0x1a/0x30 [ 16.986515] </TASK> [ 16.986528] [ 17.001330] Allocated by task 278: [ 17.001736] kasan_save_stack+0x45/0x70 [ 17.002136] kasan_save_track+0x18/0x40 [ 17.003490] kasan_save_alloc_info+0x3b/0x50 [ 17.004122] __kasan_kmalloc+0xb7/0xc0 [ 17.004839] __kmalloc_cache_noprof+0x189/0x420 [ 17.005445] kasan_bitops_generic+0x92/0x1c0 [ 17.006017] kunit_try_run_case+0x1a5/0x480 [ 17.006619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.007144] kthread+0x337/0x6f0 [ 17.007452] ret_from_fork+0x116/0x1d0 [ 17.008501] ret_from_fork_asm+0x1a/0x30 [ 17.008946] [ 17.009194] The buggy address belongs to the object at ffff8881023809a0 [ 17.009194] which belongs to the cache kmalloc-16 of size 16 [ 17.009897] The buggy address is located 8 bytes inside of [ 17.009897] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.010865] [ 17.011074] The buggy address belongs to the physical page: [ 17.011431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.011833] flags: 0x200000000000000(node=0|zone=2) [ 17.012104] page_type: f5(slab) [ 17.013298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.014097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.014639] page dumped because: kasan: bad access detected [ 17.015251] [ 17.015482] Memory state around the buggy address: [ 17.016424] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.017153] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.017735] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.018216] ^ [ 17.018584] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.019418] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.019925] ================================================================== [ 17.186370] ================================================================== [ 17.186949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.187572] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.188405] [ 17.188729] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.188864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.188896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.188950] Call Trace: [ 17.188997] <TASK> [ 17.189043] dump_stack_lvl+0x73/0xb0 [ 17.189123] print_report+0xd1/0x650 [ 17.189178] ? __virt_addr_valid+0x1db/0x2d0 [ 17.189228] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.189268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.189295] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.189325] kasan_report+0x141/0x180 [ 17.189350] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.189383] kasan_check_range+0x10c/0x1c0 [ 17.189410] __kasan_check_write+0x18/0x20 [ 17.189432] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.189487] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.190275] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.190312] ? kasan_bitops_generic+0x92/0x1c0 [ 17.190345] kasan_bitops_generic+0x116/0x1c0 [ 17.190375] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.190402] ? __pfx_read_tsc+0x10/0x10 [ 17.190428] ? ktime_get_ts64+0x86/0x230 [ 17.190474] kunit_try_run_case+0x1a5/0x480 [ 17.190506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.190528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.190559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.190587] ? __kthread_parkme+0x82/0x180 [ 17.190612] ? preempt_count_sub+0x50/0x80 [ 17.190643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.190667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.190702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.190745] kthread+0x337/0x6f0 [ 17.190779] ? trace_preempt_on+0x20/0xc0 [ 17.190819] ? __pfx_kthread+0x10/0x10 [ 17.190868] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.190893] ? calculate_sigpending+0x7b/0xa0 [ 17.190921] ? __pfx_kthread+0x10/0x10 [ 17.190945] ret_from_fork+0x116/0x1d0 [ 17.190966] ? __pfx_kthread+0x10/0x10 [ 17.190990] ret_from_fork_asm+0x1a/0x30 [ 17.191025] </TASK> [ 17.191039] [ 17.208722] Allocated by task 278: [ 17.209158] kasan_save_stack+0x45/0x70 [ 17.209686] kasan_save_track+0x18/0x40 [ 17.210201] kasan_save_alloc_info+0x3b/0x50 [ 17.210864] __kasan_kmalloc+0xb7/0xc0 [ 17.211076] __kmalloc_cache_noprof+0x189/0x420 [ 17.211310] kasan_bitops_generic+0x92/0x1c0 [ 17.211729] kunit_try_run_case+0x1a5/0x480 [ 17.212053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.212850] kthread+0x337/0x6f0 [ 17.213179] ret_from_fork+0x116/0x1d0 [ 17.213532] ret_from_fork_asm+0x1a/0x30 [ 17.213746] [ 17.213946] The buggy address belongs to the object at ffff8881023809a0 [ 17.213946] which belongs to the cache kmalloc-16 of size 16 [ 17.215025] The buggy address is located 8 bytes inside of [ 17.215025] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.215679] [ 17.215818] The buggy address belongs to the physical page: [ 17.216208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.216811] flags: 0x200000000000000(node=0|zone=2) [ 17.217105] page_type: f5(slab) [ 17.217410] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.219195] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.219597] page dumped because: kasan: bad access detected [ 17.219841] [ 17.220020] Memory state around the buggy address: [ 17.220410] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.221464] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.222596] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.222963] ^ [ 17.223227] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224212] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224617] ================================================================== [ 17.145636] ================================================================== [ 17.146715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.147240] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.147699] [ 17.147909] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.148302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.148342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.148396] Call Trace: [ 17.148442] <TASK> [ 17.148497] dump_stack_lvl+0x73/0xb0 [ 17.148570] print_report+0xd1/0x650 [ 17.148623] ? __virt_addr_valid+0x1db/0x2d0 [ 17.148673] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.148729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.148779] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.148829] kasan_report+0x141/0x180 [ 17.148877] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.148973] kasan_check_range+0x10c/0x1c0 [ 17.149032] __kasan_check_write+0x18/0x20 [ 17.149083] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.149146] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.149250] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.149297] ? kasan_bitops_generic+0x92/0x1c0 [ 17.149338] kasan_bitops_generic+0x116/0x1c0 [ 17.149370] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.149400] ? __pfx_read_tsc+0x10/0x10 [ 17.149426] ? ktime_get_ts64+0x86/0x230 [ 17.149482] kunit_try_run_case+0x1a5/0x480 [ 17.149513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.149537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.149568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.149597] ? __kthread_parkme+0x82/0x180 [ 17.149621] ? preempt_count_sub+0x50/0x80 [ 17.149649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.149672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.149700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.149728] kthread+0x337/0x6f0 [ 17.149750] ? trace_preempt_on+0x20/0xc0 [ 17.149777] ? __pfx_kthread+0x10/0x10 [ 17.149800] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.149825] ? calculate_sigpending+0x7b/0xa0 [ 17.149856] ? __pfx_kthread+0x10/0x10 [ 17.149881] ret_from_fork+0x116/0x1d0 [ 17.149903] ? __pfx_kthread+0x10/0x10 [ 17.149926] ret_from_fork_asm+0x1a/0x30 [ 17.149962] </TASK> [ 17.149976] [ 17.165751] Allocated by task 278: [ 17.166119] kasan_save_stack+0x45/0x70 [ 17.166956] kasan_save_track+0x18/0x40 [ 17.167662] kasan_save_alloc_info+0x3b/0x50 [ 17.167908] __kasan_kmalloc+0xb7/0xc0 [ 17.168340] __kmalloc_cache_noprof+0x189/0x420 [ 17.169169] kasan_bitops_generic+0x92/0x1c0 [ 17.169982] kunit_try_run_case+0x1a5/0x480 [ 17.170177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.171330] kthread+0x337/0x6f0 [ 17.171602] ret_from_fork+0x116/0x1d0 [ 17.172391] ret_from_fork_asm+0x1a/0x30 [ 17.172666] [ 17.173574] The buggy address belongs to the object at ffff8881023809a0 [ 17.173574] which belongs to the cache kmalloc-16 of size 16 [ 17.174070] The buggy address is located 8 bytes inside of [ 17.174070] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.175258] [ 17.176024] The buggy address belongs to the physical page: [ 17.176291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.178018] flags: 0x200000000000000(node=0|zone=2) [ 17.178269] page_type: f5(slab) [ 17.178541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.179537] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.180102] page dumped because: kasan: bad access detected [ 17.180629] [ 17.180914] Memory state around the buggy address: [ 17.181326] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.181961] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.182673] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.183091] ^ [ 17.183575] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.184316] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.185006] ================================================================== [ 16.940041] ================================================================== [ 16.940605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.941578] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 16.941782] [ 16.941879] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.941943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.941959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.941987] Call Trace: [ 16.942003] <TASK> [ 16.942029] dump_stack_lvl+0x73/0xb0 [ 16.942070] print_report+0xd1/0x650 [ 16.942098] ? __virt_addr_valid+0x1db/0x2d0 [ 16.942128] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.942158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.942183] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.942418] kasan_report+0x141/0x180 [ 16.942448] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.942499] kasan_check_range+0x10c/0x1c0 [ 16.942528] __kasan_check_write+0x18/0x20 [ 16.942552] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.942582] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.942613] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.942639] ? kasan_bitops_generic+0x92/0x1c0 [ 16.942671] kasan_bitops_generic+0x116/0x1c0 [ 16.942769] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.942800] ? __pfx_read_tsc+0x10/0x10 [ 16.942828] ? ktime_get_ts64+0x86/0x230 [ 16.942857] kunit_try_run_case+0x1a5/0x480 [ 16.942885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.942906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.942936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.942963] ? __kthread_parkme+0x82/0x180 [ 16.942986] ? preempt_count_sub+0x50/0x80 [ 16.943013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.943036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.943065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.943099] kthread+0x337/0x6f0 [ 16.943122] ? trace_preempt_on+0x20/0xc0 [ 16.943149] ? __pfx_kthread+0x10/0x10 [ 16.943171] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.943196] ? calculate_sigpending+0x7b/0xa0 [ 16.943244] ? __pfx_kthread+0x10/0x10 [ 16.943272] ret_from_fork+0x116/0x1d0 [ 16.943294] ? __pfx_kthread+0x10/0x10 [ 16.943317] ret_from_fork_asm+0x1a/0x30 [ 16.943387] </TASK> [ 16.943403] [ 16.961222] Allocated by task 278: [ 16.961972] kasan_save_stack+0x45/0x70 [ 16.962722] kasan_save_track+0x18/0x40 [ 16.962998] kasan_save_alloc_info+0x3b/0x50 [ 16.963186] __kasan_kmalloc+0xb7/0xc0 [ 16.963500] __kmalloc_cache_noprof+0x189/0x420 [ 16.963875] kasan_bitops_generic+0x92/0x1c0 [ 16.964081] kunit_try_run_case+0x1a5/0x480 [ 16.965535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.965874] kthread+0x337/0x6f0 [ 16.966288] ret_from_fork+0x116/0x1d0 [ 16.966450] ret_from_fork_asm+0x1a/0x30 [ 16.966679] [ 16.967326] The buggy address belongs to the object at ffff8881023809a0 [ 16.967326] which belongs to the cache kmalloc-16 of size 16 [ 16.969088] The buggy address is located 8 bytes inside of [ 16.969088] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 16.969651] [ 16.969854] The buggy address belongs to the physical page: [ 16.971262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 16.971656] flags: 0x200000000000000(node=0|zone=2) [ 16.972290] page_type: f5(slab) [ 16.972570] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.972961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.973795] page dumped because: kasan: bad access detected [ 16.974719] [ 16.975099] Memory state around the buggy address: [ 16.975398] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.976109] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 16.976530] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.977092] ^ [ 16.977696] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.978241] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.978596] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
Automatically assigned
[ 16.906913] ================================================================== [ 16.907950] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 16.908343] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276 [ 16.908545] [ 16.908718] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.908775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.908790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.908814] Call Trace: [ 16.908923] <TASK> [ 16.908949] dump_stack_lvl+0x73/0xb0 [ 16.908982] print_report+0xd1/0x650 [ 16.909009] ? __virt_addr_valid+0x1db/0x2d0 [ 16.909036] ? strnlen+0x73/0x80 [ 16.909057] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.909081] ? strnlen+0x73/0x80 [ 16.909102] kasan_report+0x141/0x180 [ 16.909126] ? strnlen+0x73/0x80 [ 16.909152] __asan_report_load1_noabort+0x18/0x20 [ 16.909175] strnlen+0x73/0x80 [ 16.909196] kasan_strings+0x615/0xe80 [ 16.909276] ? trace_hardirqs_on+0x37/0xe0 [ 16.909338] ? __pfx_kasan_strings+0x10/0x10 [ 16.909365] ? finish_task_switch.isra.0+0x153/0x700 [ 16.909396] ? __switch_to+0x47/0xf50 [ 16.909426] ? __schedule+0x10cc/0x2b60 [ 16.909465] ? __pfx_read_tsc+0x10/0x10 [ 16.909496] ? ktime_get_ts64+0x86/0x230 [ 16.909524] kunit_try_run_case+0x1a5/0x480 [ 16.909550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.909599] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.909639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.909667] ? __kthread_parkme+0x82/0x180 [ 16.909703] ? preempt_count_sub+0x50/0x80 [ 16.909732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.909757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.909783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.909810] kthread+0x337/0x6f0 [ 16.909831] ? trace_preempt_on+0x20/0xc0 [ 16.909892] ? __pfx_kthread+0x10/0x10 [ 16.909917] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.909944] ? calculate_sigpending+0x7b/0xa0 [ 16.909971] ? __pfx_kthread+0x10/0x10 [ 16.909994] ret_from_fork+0x116/0x1d0 [ 16.910016] ? __pfx_kthread+0x10/0x10 [ 16.910038] ret_from_fork_asm+0x1a/0x30 [ 16.910073] </TASK> [ 16.910087] [ 16.920681] Allocated by task 276: [ 16.921055] kasan_save_stack+0x45/0x70 [ 16.921375] kasan_save_track+0x18/0x40 [ 16.921668] kasan_save_alloc_info+0x3b/0x50 [ 16.922005] __kasan_kmalloc+0xb7/0xc0 [ 16.922276] __kmalloc_cache_noprof+0x189/0x420 [ 16.922530] kasan_strings+0xc0/0xe80 [ 16.922745] kunit_try_run_case+0x1a5/0x480 [ 16.923011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.923365] kthread+0x337/0x6f0 [ 16.923591] ret_from_fork+0x116/0x1d0 [ 16.923942] ret_from_fork_asm+0x1a/0x30 [ 16.924198] [ 16.924337] Freed by task 276: [ 16.924544] kasan_save_stack+0x45/0x70 [ 16.924812] kasan_save_track+0x18/0x40 [ 16.925059] kasan_save_free_info+0x3f/0x60 [ 16.925320] __kasan_slab_free+0x56/0x70 [ 16.925601] kfree+0x222/0x3f0 [ 16.925885] kasan_strings+0x2aa/0xe80 [ 16.926071] kunit_try_run_case+0x1a5/0x480 [ 16.926403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.926580] kthread+0x337/0x6f0 [ 16.926912] ret_from_fork+0x116/0x1d0 [ 16.927073] ret_from_fork_asm+0x1a/0x30 [ 16.927308] [ 16.927416] The buggy address belongs to the object at ffff888103349900 [ 16.927416] which belongs to the cache kmalloc-32 of size 32 [ 16.928046] The buggy address is located 16 bytes inside of [ 16.928046] freed 32-byte region [ffff888103349900, ffff888103349920) [ 16.928761] [ 16.928914] The buggy address belongs to the physical page: [ 16.929051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.929258] flags: 0x200000000000000(node=0|zone=2) [ 16.929398] page_type: f5(slab) [ 16.929644] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.930279] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.930492] page dumped because: kasan: bad access detected [ 16.930667] [ 16.930817] Memory state around the buggy address: [ 16.931165] ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc [ 16.931696] ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.932024] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.932329] ^ [ 16.932631] ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.932995] ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.933487] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
Automatically assigned
[ 16.877126] ================================================================== [ 16.877502] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0 [ 16.877669] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276 [ 16.878273] [ 16.878463] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.878525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.878552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.878579] Call Trace: [ 16.878604] <TASK> [ 16.878644] dump_stack_lvl+0x73/0xb0 [ 16.878676] print_report+0xd1/0x650 [ 16.878706] ? __virt_addr_valid+0x1db/0x2d0 [ 16.878803] ? strlen+0x8f/0xb0 [ 16.878837] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.878868] ? strlen+0x8f/0xb0 [ 16.878889] kasan_report+0x141/0x180 [ 16.878928] ? strlen+0x8f/0xb0 [ 16.878955] __asan_report_load1_noabort+0x18/0x20 [ 16.878989] strlen+0x8f/0xb0 [ 16.879013] kasan_strings+0x57b/0xe80 [ 16.879035] ? trace_hardirqs_on+0x37/0xe0 [ 16.879079] ? __pfx_kasan_strings+0x10/0x10 [ 16.879104] ? finish_task_switch.isra.0+0x153/0x700 [ 16.879130] ? __switch_to+0x47/0xf50 [ 16.879159] ? __schedule+0x10cc/0x2b60 [ 16.879187] ? __pfx_read_tsc+0x10/0x10 [ 16.879229] ? ktime_get_ts64+0x86/0x230 [ 16.879259] kunit_try_run_case+0x1a5/0x480 [ 16.879286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.879321] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.879359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.879404] ? __kthread_parkme+0x82/0x180 [ 16.879428] ? preempt_count_sub+0x50/0x80 [ 16.879463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.879491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.879532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.879559] kthread+0x337/0x6f0 [ 16.879595] ? trace_preempt_on+0x20/0xc0 [ 16.879623] ? __pfx_kthread+0x10/0x10 [ 16.879647] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.879671] ? calculate_sigpending+0x7b/0xa0 [ 16.879698] ? __pfx_kthread+0x10/0x10 [ 16.879794] ret_from_fork+0x116/0x1d0 [ 16.879819] ? __pfx_kthread+0x10/0x10 [ 16.879843] ret_from_fork_asm+0x1a/0x30 [ 16.879878] </TASK> [ 16.879894] [ 16.888502] Allocated by task 276: [ 16.888740] kasan_save_stack+0x45/0x70 [ 16.888875] kasan_save_track+0x18/0x40 [ 16.888973] kasan_save_alloc_info+0x3b/0x50 [ 16.889584] __kasan_kmalloc+0xb7/0xc0 [ 16.889911] __kmalloc_cache_noprof+0x189/0x420 [ 16.891156] kasan_strings+0xc0/0xe80 [ 16.891474] kunit_try_run_case+0x1a5/0x480 [ 16.892020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.892399] kthread+0x337/0x6f0 [ 16.892702] ret_from_fork+0x116/0x1d0 [ 16.893125] ret_from_fork_asm+0x1a/0x30 [ 16.893506] [ 16.893620] Freed by task 276: [ 16.894279] kasan_save_stack+0x45/0x70 [ 16.894491] kasan_save_track+0x18/0x40 [ 16.894649] kasan_save_free_info+0x3f/0x60 [ 16.895479] __kasan_slab_free+0x56/0x70 [ 16.895757] kfree+0x222/0x3f0 [ 16.896059] kasan_strings+0x2aa/0xe80 [ 16.896196] kunit_try_run_case+0x1a5/0x480 [ 16.896512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.897008] kthread+0x337/0x6f0 [ 16.897178] ret_from_fork+0x116/0x1d0 [ 16.897494] ret_from_fork_asm+0x1a/0x30 [ 16.897919] [ 16.898043] The buggy address belongs to the object at ffff888103349900 [ 16.898043] which belongs to the cache kmalloc-32 of size 32 [ 16.898702] The buggy address is located 16 bytes inside of [ 16.898702] freed 32-byte region [ffff888103349900, ffff888103349920) [ 16.899879] [ 16.900034] The buggy address belongs to the physical page: [ 16.900209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.900400] flags: 0x200000000000000(node=0|zone=2) [ 16.901265] page_type: f5(slab) [ 16.901514] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.902258] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.902464] page dumped because: kasan: bad access detected [ 16.903004] [ 16.903180] Memory state around the buggy address: [ 16.903576] ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc [ 16.904567] ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.904766] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.905129] ^ [ 16.905319] ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.905659] ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.906137] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
Automatically assigned
[ 16.846065] ================================================================== [ 16.846690] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80 [ 16.847774] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276 [ 16.848558] [ 16.848665] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.848725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.848740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.848765] Call Trace: [ 16.848789] <TASK> [ 16.848814] dump_stack_lvl+0x73/0xb0 [ 16.848854] print_report+0xd1/0x650 [ 16.848880] ? __virt_addr_valid+0x1db/0x2d0 [ 16.849041] ? kasan_strings+0xcbc/0xe80 [ 16.849064] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.849088] ? kasan_strings+0xcbc/0xe80 [ 16.849111] kasan_report+0x141/0x180 [ 16.849134] ? kasan_strings+0xcbc/0xe80 [ 16.849163] __asan_report_load1_noabort+0x18/0x20 [ 16.849186] kasan_strings+0xcbc/0xe80 [ 16.849537] ? trace_hardirqs_on+0x37/0xe0 [ 16.849580] ? __pfx_kasan_strings+0x10/0x10 [ 16.849604] ? finish_task_switch.isra.0+0x153/0x700 [ 16.849630] ? __switch_to+0x47/0xf50 [ 16.849657] ? __schedule+0x10cc/0x2b60 [ 16.849684] ? __pfx_read_tsc+0x10/0x10 [ 16.849796] ? ktime_get_ts64+0x86/0x230 [ 16.849826] kunit_try_run_case+0x1a5/0x480 [ 16.849852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.849873] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.849899] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.849926] ? __kthread_parkme+0x82/0x180 [ 16.849948] ? preempt_count_sub+0x50/0x80 [ 16.849973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.849995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.850021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.850047] kthread+0x337/0x6f0 [ 16.850069] ? trace_preempt_on+0x20/0xc0 [ 16.850093] ? __pfx_kthread+0x10/0x10 [ 16.850116] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.850139] ? calculate_sigpending+0x7b/0xa0 [ 16.850166] ? __pfx_kthread+0x10/0x10 [ 16.850190] ret_from_fork+0x116/0x1d0 [ 16.850210] ? __pfx_kthread+0x10/0x10 [ 16.850232] ret_from_fork_asm+0x1a/0x30 [ 16.850267] </TASK> [ 16.850280] [ 16.860805] Allocated by task 276: [ 16.861742] kasan_save_stack+0x45/0x70 [ 16.862110] kasan_save_track+0x18/0x40 [ 16.862872] kasan_save_alloc_info+0x3b/0x50 [ 16.863166] __kasan_kmalloc+0xb7/0xc0 [ 16.863787] __kmalloc_cache_noprof+0x189/0x420 [ 16.864369] kasan_strings+0xc0/0xe80 [ 16.864571] kunit_try_run_case+0x1a5/0x480 [ 16.864692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.864827] kthread+0x337/0x6f0 [ 16.864927] ret_from_fork+0x116/0x1d0 [ 16.865033] ret_from_fork_asm+0x1a/0x30 [ 16.865156] [ 16.865220] Freed by task 276: [ 16.865309] kasan_save_stack+0x45/0x70 [ 16.865413] kasan_save_track+0x18/0x40 [ 16.865612] kasan_save_free_info+0x3f/0x60 [ 16.865834] __kasan_slab_free+0x56/0x70 [ 16.866037] kfree+0x222/0x3f0 [ 16.866467] kasan_strings+0x2aa/0xe80 [ 16.867067] kunit_try_run_case+0x1a5/0x480 [ 16.867676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.868290] kthread+0x337/0x6f0 [ 16.868442] ret_from_fork+0x116/0x1d0 [ 16.868636] ret_from_fork_asm+0x1a/0x30 [ 16.868998] [ 16.869288] The buggy address belongs to the object at ffff888103349900 [ 16.869288] which belongs to the cache kmalloc-32 of size 32 [ 16.870363] The buggy address is located 16 bytes inside of [ 16.870363] freed 32-byte region [ffff888103349900, ffff888103349920) [ 16.870907] [ 16.871099] The buggy address belongs to the physical page: [ 16.871491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.872086] flags: 0x200000000000000(node=0|zone=2) [ 16.872224] page_type: f5(slab) [ 16.872493] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.872949] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.873245] page dumped because: kasan: bad access detected [ 16.873541] [ 16.874031] Memory state around the buggy address: [ 16.874203] ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc [ 16.874506] ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.874814] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.875478] ^ [ 16.875780] ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.876014] ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.876367] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
Automatically assigned
[ 16.816108] ================================================================== [ 16.817239] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0 [ 16.817432] Read of size 1 at addr ffff888103349910 by task kunit_try_catch/276 [ 16.817726] [ 16.817886] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.817948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.817962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.817988] Call Trace: [ 16.818007] <TASK> [ 16.818031] dump_stack_lvl+0x73/0xb0 [ 16.818061] print_report+0xd1/0x650 [ 16.818091] ? __virt_addr_valid+0x1db/0x2d0 [ 16.818120] ? strcmp+0xb0/0xc0 [ 16.818141] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.818168] ? strcmp+0xb0/0xc0 [ 16.818188] kasan_report+0x141/0x180 [ 16.818212] ? strcmp+0xb0/0xc0 [ 16.818239] __asan_report_load1_noabort+0x18/0x20 [ 16.818353] strcmp+0xb0/0xc0 [ 16.818377] kasan_strings+0x431/0xe80 [ 16.818401] ? trace_hardirqs_on+0x37/0xe0 [ 16.818428] ? __pfx_kasan_strings+0x10/0x10 [ 16.818452] ? finish_task_switch.isra.0+0x153/0x700 [ 16.818494] ? __switch_to+0x47/0xf50 [ 16.818524] ? __schedule+0x10cc/0x2b60 [ 16.818551] ? __pfx_read_tsc+0x10/0x10 [ 16.818575] ? ktime_get_ts64+0x86/0x230 [ 16.818603] kunit_try_run_case+0x1a5/0x480 [ 16.818630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.818651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.818680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.818706] ? __kthread_parkme+0x82/0x180 [ 16.818730] ? preempt_count_sub+0x50/0x80 [ 16.818755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.818828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.818859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.818886] kthread+0x337/0x6f0 [ 16.818907] ? trace_preempt_on+0x20/0xc0 [ 16.818932] ? __pfx_kthread+0x10/0x10 [ 16.818954] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.818979] ? calculate_sigpending+0x7b/0xa0 [ 16.819007] ? __pfx_kthread+0x10/0x10 [ 16.819031] ret_from_fork+0x116/0x1d0 [ 16.819052] ? __pfx_kthread+0x10/0x10 [ 16.819075] ret_from_fork_asm+0x1a/0x30 [ 16.819111] </TASK> [ 16.819124] [ 16.829859] Allocated by task 276: [ 16.830332] kasan_save_stack+0x45/0x70 [ 16.830651] kasan_save_track+0x18/0x40 [ 16.830767] kasan_save_alloc_info+0x3b/0x50 [ 16.831179] __kasan_kmalloc+0xb7/0xc0 [ 16.831374] __kmalloc_cache_noprof+0x189/0x420 [ 16.831516] kasan_strings+0xc0/0xe80 [ 16.831881] kunit_try_run_case+0x1a5/0x480 [ 16.833013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.833265] kthread+0x337/0x6f0 [ 16.833508] ret_from_fork+0x116/0x1d0 [ 16.833819] ret_from_fork_asm+0x1a/0x30 [ 16.834488] [ 16.834802] Freed by task 276: [ 16.835228] kasan_save_stack+0x45/0x70 [ 16.835487] kasan_save_track+0x18/0x40 [ 16.835603] kasan_save_free_info+0x3f/0x60 [ 16.835739] __kasan_slab_free+0x56/0x70 [ 16.836027] kfree+0x222/0x3f0 [ 16.836260] kasan_strings+0x2aa/0xe80 [ 16.836497] kunit_try_run_case+0x1a5/0x480 [ 16.836712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.836974] kthread+0x337/0x6f0 [ 16.837153] ret_from_fork+0x116/0x1d0 [ 16.837347] ret_from_fork_asm+0x1a/0x30 [ 16.837574] [ 16.837641] The buggy address belongs to the object at ffff888103349900 [ 16.837641] which belongs to the cache kmalloc-32 of size 32 [ 16.837902] The buggy address is located 16 bytes inside of [ 16.837902] freed 32-byte region [ffff888103349900, ffff888103349920) [ 16.838407] [ 16.838561] The buggy address belongs to the physical page: [ 16.839039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.839579] flags: 0x200000000000000(node=0|zone=2) [ 16.840992] page_type: f5(slab) [ 16.841330] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.841811] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.842351] page dumped because: kasan: bad access detected [ 16.842558] [ 16.842705] Memory state around the buggy address: [ 16.842962] ffff888103349800: 00 00 00 04 fc fc fc fc fa fb fb fb fc fc fc fc [ 16.843225] ffff888103349880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.843426] >ffff888103349900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.843893] ^ [ 16.844372] ffff888103349980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.844779] ffff888103349a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 16.845379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
Automatically assigned
[ 13.686301] ================================================================== [ 13.687011] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 13.687492] Write of size 1 at addr ffff88810394a00a by task kunit_try_catch/163 [ 13.688492] [ 13.688681] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.689179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.689215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.689253] Call Trace: [ 13.689282] <TASK> [ 13.689317] dump_stack_lvl+0x73/0xb0 [ 13.689398] print_report+0xd1/0x650 [ 13.689424] ? __virt_addr_valid+0x1db/0x2d0 [ 13.689451] ? kmalloc_large_oob_right+0x2e9/0x330 [ 13.689498] ? kasan_addr_to_slab+0x11/0xa0 [ 13.689521] ? kmalloc_large_oob_right+0x2e9/0x330 [ 13.689545] kasan_report+0x141/0x180 [ 13.689568] ? kmalloc_large_oob_right+0x2e9/0x330 [ 13.689596] __asan_report_store1_noabort+0x1b/0x30 [ 13.689618] kmalloc_large_oob_right+0x2e9/0x330 [ 13.689642] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 13.689666] ? __schedule+0x10cc/0x2b60 [ 13.689699] ? __pfx_read_tsc+0x10/0x10 [ 13.689735] ? ktime_get_ts64+0x86/0x230 [ 13.689777] kunit_try_run_case+0x1a5/0x480 [ 13.689816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.689842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.689868] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.689893] ? __kthread_parkme+0x82/0x180 [ 13.689916] ? preempt_count_sub+0x50/0x80 [ 13.689941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.689963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.689988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.690013] kthread+0x337/0x6f0 [ 13.690034] ? trace_preempt_on+0x20/0xc0 [ 13.690059] ? __pfx_kthread+0x10/0x10 [ 13.690080] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.690104] ? calculate_sigpending+0x7b/0xa0 [ 13.690129] ? __pfx_kthread+0x10/0x10 [ 13.690153] ret_from_fork+0x116/0x1d0 [ 13.690173] ? __pfx_kthread+0x10/0x10 [ 13.690200] ret_from_fork_asm+0x1a/0x30 [ 13.690247] </TASK> [ 13.690261] [ 13.705636] The buggy address belongs to the physical page: [ 13.706105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103948 [ 13.706567] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.706889] flags: 0x200000000000040(head|node=0|zone=2) [ 13.707415] page_type: f8(unknown) [ 13.707754] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.708440] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.709190] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.709828] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.710115] head: 0200000000000002 ffffea00040e5201 00000000ffffffff 00000000ffffffff [ 13.710601] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.711296] page dumped because: kasan: bad access detected [ 13.711609] [ 13.711902] Memory state around the buggy address: [ 13.712120] ffff888103949f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.713180] ffff888103949f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.713972] >ffff88810394a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.714507] ^ [ 13.714678] ffff88810394a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.715518] ffff88810394a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.716097] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
Automatically assigned
[ 13.639033] ================================================================== [ 13.639822] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 13.640991] Write of size 1 at addr ffff888102a45f00 by task kunit_try_catch/161 [ 13.641820] [ 13.642069] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.642203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.642228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.642268] Call Trace: [ 13.642296] <TASK> [ 13.642339] dump_stack_lvl+0x73/0xb0 [ 13.642450] print_report+0xd1/0x650 [ 13.642533] ? __virt_addr_valid+0x1db/0x2d0 [ 13.642589] ? kmalloc_big_oob_right+0x316/0x370 [ 13.642636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.642683] ? kmalloc_big_oob_right+0x316/0x370 [ 13.642918] kasan_report+0x141/0x180 [ 13.642986] ? kmalloc_big_oob_right+0x316/0x370 [ 13.643035] __asan_report_store1_noabort+0x1b/0x30 [ 13.643074] kmalloc_big_oob_right+0x316/0x370 [ 13.643102] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 13.643128] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 13.643156] kunit_try_run_case+0x1a5/0x480 [ 13.643184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.643244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.643278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.643304] ? __kthread_parkme+0x82/0x180 [ 13.643330] ? preempt_count_sub+0x50/0x80 [ 13.643396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.643421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.643447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.643493] kthread+0x337/0x6f0 [ 13.643516] ? trace_preempt_on+0x20/0xc0 [ 13.643544] ? __pfx_kthread+0x10/0x10 [ 13.643566] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.643590] ? calculate_sigpending+0x7b/0xa0 [ 13.643616] ? __pfx_kthread+0x10/0x10 [ 13.643639] ret_from_fork+0x116/0x1d0 [ 13.643661] ? __pfx_kthread+0x10/0x10 [ 13.643687] ret_from_fork_asm+0x1a/0x30 [ 13.643770] </TASK> [ 13.643793] [ 13.656029] Allocated by task 161: [ 13.656404] kasan_save_stack+0x45/0x70 [ 13.656802] kasan_save_track+0x18/0x40 [ 13.657596] kasan_save_alloc_info+0x3b/0x50 [ 13.659155] __kasan_kmalloc+0xb7/0xc0 [ 13.659371] __kmalloc_cache_noprof+0x189/0x420 [ 13.660727] kmalloc_big_oob_right+0xa9/0x370 [ 13.662722] kunit_try_run_case+0x1a5/0x480 [ 13.663067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.663324] kthread+0x337/0x6f0 [ 13.664215] ret_from_fork+0x116/0x1d0 [ 13.664419] ret_from_fork_asm+0x1a/0x30 [ 13.665063] [ 13.665545] The buggy address belongs to the object at ffff888102a44000 [ 13.665545] which belongs to the cache kmalloc-8k of size 8192 [ 13.665950] The buggy address is located 0 bytes to the right of [ 13.665950] allocated 7936-byte region [ffff888102a44000, ffff888102a45f00) [ 13.668080] [ 13.668317] The buggy address belongs to the physical page: [ 13.669769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a40 [ 13.670180] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.670476] flags: 0x200000000000040(head|node=0|zone=2) [ 13.670729] page_type: f5(slab) [ 13.670913] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 13.671154] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 13.671418] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000 [ 13.672308] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 13.672724] head: 0200000000000003 ffffea00040a9001 00000000ffffffff 00000000ffffffff [ 13.673400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 13.674002] page dumped because: kasan: bad access detected [ 13.674287] [ 13.674410] Memory state around the buggy address: [ 13.674646] ffff888102a45e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.675181] ffff888102a45e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.675878] >ffff888102a45f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.677312] ^ [ 13.678359] ffff888102a45f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.679015] ffff888102a46000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.679701] ==================================================================
Failure - kunit - lib_ratelimit_lib_ratelimit
KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
Automatically assigned
<8>[ 391.998977] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - log-parser-boot - oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti
KNOWN ISSUE - log-parser-boot/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti: Failure
Automatically assigned
[ 124.107986] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
Automatically assigned
[ 52.190395] ================================================================== [ 52.190893] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0 [ 52.190893] [ 52.191252] Use-after-free read at 0x(____ptrval____) (in kfence-#160): [ 52.191702] test_krealloc+0x6fc/0xbe0 [ 52.191893] kunit_try_run_case+0x1a5/0x480 [ 52.192250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.192728] kthread+0x337/0x6f0 [ 52.192929] ret_from_fork+0x116/0x1d0 [ 52.193132] ret_from_fork_asm+0x1a/0x30 [ 52.193522] [ 52.193752] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 52.193752] [ 52.194431] allocated by task 354 on cpu 1 at 52.189384s (0.005041s ago): [ 52.194944] test_alloc+0x364/0x10f0 [ 52.195350] test_krealloc+0xad/0xbe0 [ 52.195567] kunit_try_run_case+0x1a5/0x480 [ 52.195953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.196195] kthread+0x337/0x6f0 [ 52.196387] ret_from_fork+0x116/0x1d0 [ 52.196758] ret_from_fork_asm+0x1a/0x30 [ 52.197138] [ 52.197387] freed by task 354 on cpu 1 at 52.189915s (0.007467s ago): [ 52.197882] krealloc_noprof+0x108/0x340 [ 52.198302] test_krealloc+0x226/0xbe0 [ 52.198518] kunit_try_run_case+0x1a5/0x480 [ 52.198907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.199401] kthread+0x337/0x6f0 [ 52.199671] ret_from_fork+0x116/0x1d0 [ 52.199913] ret_from_fork_asm+0x1a/0x30 [ 52.200295] [ 52.200580] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 52.201088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.201291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 52.201935] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
Automatically assigned
[ 52.114991] ================================================================== [ 52.115496] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 52.115496] [ 52.116100] Use-after-free read at 0x(____ptrval____) (in kfence-#159): [ 52.116656] test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 52.116953] kunit_try_run_case+0x1a5/0x480 [ 52.117152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.117693] kthread+0x337/0x6f0 [ 52.118062] ret_from_fork+0x116/0x1d0 [ 52.118440] ret_from_fork_asm+0x1a/0x30 [ 52.118688] [ 52.118821] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 52.118821] [ 52.119660] allocated by task 352 on cpu 1 at 52.085221s (0.034432s ago): [ 52.120293] test_alloc+0x2a6/0x10f0 [ 52.120645] test_memcache_typesafe_by_rcu+0x16f/0x670 [ 52.121006] kunit_try_run_case+0x1a5/0x480 [ 52.121482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.121887] kthread+0x337/0x6f0 [ 52.122326] ret_from_fork+0x116/0x1d0 [ 52.122654] ret_from_fork_asm+0x1a/0x30 [ 52.122959] [ 52.123232] freed by task 352 on cpu 1 at 52.085391s (0.037835s ago): [ 52.123844] test_memcache_typesafe_by_rcu+0x1bf/0x670 [ 52.124253] kunit_try_run_case+0x1a5/0x480 [ 52.124650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 52.124965] kthread+0x337/0x6f0 [ 52.125349] ret_from_fork+0x116/0x1d0 [ 52.125676] ret_from_fork_asm+0x1a/0x30 [ 52.125922] [ 52.126167] CPU: 1 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 52.126733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.127089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 52.127721] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
Automatically assigned
[ 27.561407] ================================================================== [ 27.562045] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210 [ 27.562045] [ 27.563012] Invalid read at 0x(____ptrval____): [ 27.563496] test_invalid_access+0xf0/0x210 [ 27.563916] kunit_try_run_case+0x1a5/0x480 [ 27.564151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.564481] kthread+0x337/0x6f0 [ 27.564812] ret_from_fork+0x116/0x1d0 [ 27.565152] ret_from_fork_asm+0x1a/0x30 [ 27.565982] [ 27.566257] CPU: 0 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 27.567055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.568058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.569080] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
Automatically assigned
[ 27.333814] ================================================================== [ 27.334246] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340 [ 27.334246] [ 27.334589] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#153): [ 27.336287] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 27.336721] kunit_try_run_case+0x1a5/0x480 [ 27.337029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.337478] kthread+0x337/0x6f0 [ 27.337765] ret_from_fork+0x116/0x1d0 [ 27.338127] ret_from_fork_asm+0x1a/0x30 [ 27.338523] [ 27.338657] kfence-#153: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 27.338657] [ 27.339594] allocated by task 342 on cpu 1 at 27.333391s (0.006197s ago): [ 27.340015] test_alloc+0x364/0x10f0 [ 27.340421] test_kmalloc_aligned_oob_write+0xc8/0x340 [ 27.340913] kunit_try_run_case+0x1a5/0x480 [ 27.341311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.341707] kthread+0x337/0x6f0 [ 27.342067] ret_from_fork+0x116/0x1d0 [ 27.342382] ret_from_fork_asm+0x1a/0x30 [ 27.342781] [ 27.342964] freed by task 342 on cpu 1 at 27.333613s (0.009344s ago): [ 27.343539] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 27.343948] kunit_try_run_case+0x1a5/0x480 [ 27.344418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.344785] kthread+0x337/0x6f0 [ 27.345102] ret_from_fork+0x116/0x1d0 [ 27.345512] ret_from_fork_asm+0x1a/0x30 [ 27.345822] [ 27.346017] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 27.346915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.347221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.347747] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
Automatically assigned
[ 27.229575] ================================================================== [ 27.230021] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560 [ 27.230021] [ 27.230412] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#152): [ 27.231044] test_kmalloc_aligned_oob_read+0x27e/0x560 [ 27.231495] kunit_try_run_case+0x1a5/0x480 [ 27.231723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.232172] kthread+0x337/0x6f0 [ 27.232462] ret_from_fork+0x116/0x1d0 [ 27.232743] ret_from_fork_asm+0x1a/0x30 [ 27.233063] [ 27.233235] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 27.233235] [ 27.233717] allocated by task 340 on cpu 0 at 27.229266s (0.004445s ago): [ 27.234217] test_alloc+0x364/0x10f0 [ 27.234588] test_kmalloc_aligned_oob_read+0x105/0x560 [ 27.234979] kunit_try_run_case+0x1a5/0x480 [ 27.235435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.235764] kthread+0x337/0x6f0 [ 27.236096] ret_from_fork+0x116/0x1d0 [ 27.236370] ret_from_fork_asm+0x1a/0x30 [ 27.236826] [ 27.237082] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 27.237546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.237908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.238738] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
Automatically assigned
[ 22.237563] ================================================================== [ 22.238017] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0 [ 22.238017] [ 22.238306] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#104): [ 22.239605] test_corruption+0x131/0x3e0 [ 22.239939] kunit_try_run_case+0x1a5/0x480 [ 22.240180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.240625] kthread+0x337/0x6f0 [ 22.241021] ret_from_fork+0x116/0x1d0 [ 22.241329] ret_from_fork_asm+0x1a/0x30 [ 22.241610] [ 22.241771] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 22.241771] [ 22.242376] allocated by task 330 on cpu 1 at 22.237319s (0.005051s ago): [ 22.242901] test_alloc+0x2a6/0x10f0 [ 22.243095] test_corruption+0xe6/0x3e0 [ 22.244196] kunit_try_run_case+0x1a5/0x480 [ 22.244666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.245067] kthread+0x337/0x6f0 [ 22.245640] ret_from_fork+0x116/0x1d0 [ 22.245887] ret_from_fork_asm+0x1a/0x30 [ 22.246109] [ 22.246565] freed by task 330 on cpu 1 at 22.237419s (0.009137s ago): [ 22.247019] test_corruption+0x131/0x3e0 [ 22.247204] kunit_try_run_case+0x1a5/0x480 [ 22.247619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.247917] kthread+0x337/0x6f0 [ 22.248168] ret_from_fork+0x116/0x1d0 [ 22.248564] ret_from_fork_asm+0x1a/0x30 [ 22.248862] [ 22.249091] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 22.249878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.250087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.250693] ================================================================== [ 22.653544] ================================================================== [ 22.654000] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0 [ 22.654000] [ 22.654287] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#108): [ 22.654930] test_corruption+0x216/0x3e0 [ 22.655312] kunit_try_run_case+0x1a5/0x480 [ 22.655595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.655973] kthread+0x337/0x6f0 [ 22.656245] ret_from_fork+0x116/0x1d0 [ 22.656480] ret_from_fork_asm+0x1a/0x30 [ 22.656744] [ 22.656913] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 22.656913] [ 22.657643] allocated by task 330 on cpu 1 at 22.653315s (0.004323s ago): [ 22.658229] test_alloc+0x2a6/0x10f0 [ 22.658483] test_corruption+0x1cb/0x3e0 [ 22.658756] kunit_try_run_case+0x1a5/0x480 [ 22.659101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.659484] kthread+0x337/0x6f0 [ 22.659679] ret_from_fork+0x116/0x1d0 [ 22.659874] ret_from_fork_asm+0x1a/0x30 [ 22.660116] [ 22.660283] freed by task 330 on cpu 1 at 22.653400s (0.006878s ago): [ 22.660865] test_corruption+0x216/0x3e0 [ 22.661221] kunit_try_run_case+0x1a5/0x480 [ 22.661594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.661949] kthread+0x337/0x6f0 [ 22.662106] ret_from_fork+0x116/0x1d0 [ 22.662298] ret_from_fork_asm+0x1a/0x30 [ 22.662519] [ 22.662698] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 22.663175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.663466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.664011] ================================================================== [ 22.029764] ================================================================== [ 22.030197] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0 [ 22.030197] [ 22.030539] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#102): [ 22.031195] test_corruption+0x2df/0x3e0 [ 22.031430] kunit_try_run_case+0x1a5/0x480 [ 22.031653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.032175] kthread+0x337/0x6f0 [ 22.032501] ret_from_fork+0x116/0x1d0 [ 22.032796] ret_from_fork_asm+0x1a/0x30 [ 22.033132] [ 22.033260] kfence-#102: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 22.033260] [ 22.033632] allocated by task 328 on cpu 0 at 22.029358s (0.004270s ago): [ 22.034306] test_alloc+0x364/0x10f0 [ 22.034645] test_corruption+0x1cb/0x3e0 [ 22.034997] kunit_try_run_case+0x1a5/0x480 [ 22.035227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.035621] kthread+0x337/0x6f0 [ 22.035811] ret_from_fork+0x116/0x1d0 [ 22.036007] ret_from_fork_asm+0x1a/0x30 [ 22.036352] [ 22.036567] freed by task 328 on cpu 0 at 22.029521s (0.007041s ago): [ 22.037053] test_corruption+0x2df/0x3e0 [ 22.037501] kunit_try_run_case+0x1a5/0x480 [ 22.037862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.038254] kthread+0x337/0x6f0 [ 22.038438] ret_from_fork+0x116/0x1d0 [ 22.038769] ret_from_fork_asm+0x1a/0x30 [ 22.039018] [ 22.039207] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 22.039985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.040320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.040928] ================================================================== [ 21.925727] ================================================================== [ 21.926160] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0 [ 21.926160] [ 21.926903] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#101): [ 21.928706] test_corruption+0x2d2/0x3e0 [ 21.929019] kunit_try_run_case+0x1a5/0x480 [ 21.929587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.929854] kthread+0x337/0x6f0 [ 21.930331] ret_from_fork+0x116/0x1d0 [ 21.930605] ret_from_fork_asm+0x1a/0x30 [ 21.930886] [ 21.931027] kfence-#101: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 21.931027] [ 21.931903] allocated by task 328 on cpu 0 at 21.925434s (0.006462s ago): [ 21.932517] test_alloc+0x364/0x10f0 [ 21.932713] test_corruption+0xe6/0x3e0 [ 21.933056] kunit_try_run_case+0x1a5/0x480 [ 21.933285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.933608] kthread+0x337/0x6f0 [ 21.933920] ret_from_fork+0x116/0x1d0 [ 21.934330] ret_from_fork_asm+0x1a/0x30 [ 21.934719] [ 21.934925] freed by task 328 on cpu 0 at 21.925584s (0.009336s ago): [ 21.935319] test_corruption+0x2d2/0x3e0 [ 21.935714] kunit_try_run_case+0x1a5/0x480 [ 21.936074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.936436] kthread+0x337/0x6f0 [ 21.936785] ret_from_fork+0x116/0x1d0 [ 21.937149] ret_from_fork_asm+0x1a/0x30 [ 21.937489] [ 21.937750] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.938383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.938756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.939407] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
Automatically assigned
[ 21.821465] ================================================================== [ 21.821910] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260 [ 21.821910] [ 21.822205] Invalid free of 0x(____ptrval____) (in kfence-#100): [ 21.823068] test_invalid_addr_free+0xfb/0x260 [ 21.823396] kunit_try_run_case+0x1a5/0x480 [ 21.823620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.824007] kthread+0x337/0x6f0 [ 21.824408] ret_from_fork+0x116/0x1d0 [ 21.824768] ret_from_fork_asm+0x1a/0x30 [ 21.825105] [ 21.825234] kfence-#100: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 21.825234] [ 21.825909] allocated by task 326 on cpu 1 at 21.821259s (0.004645s ago): [ 21.826327] test_alloc+0x2a6/0x10f0 [ 21.826619] test_invalid_addr_free+0xdb/0x260 [ 21.827003] kunit_try_run_case+0x1a5/0x480 [ 21.827380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.827756] kthread+0x337/0x6f0 [ 21.827949] ret_from_fork+0x116/0x1d0 [ 21.828148] ret_from_fork_asm+0x1a/0x30 [ 21.828506] [ 21.828795] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.829762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.830081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.830673] ================================================================== [ 21.717540] ================================================================== [ 21.718076] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260 [ 21.718076] [ 21.719221] Invalid free of 0x(____ptrval____) (in kfence-#99): [ 21.719787] test_invalid_addr_free+0x1e1/0x260 [ 21.720150] kunit_try_run_case+0x1a5/0x480 [ 21.720508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.720863] kthread+0x337/0x6f0 [ 21.721122] ret_from_fork+0x116/0x1d0 [ 21.721484] ret_from_fork_asm+0x1a/0x30 [ 21.721718] [ 21.721837] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 21.721837] [ 21.722466] allocated by task 324 on cpu 0 at 21.717306s (0.005143s ago): [ 21.722890] test_alloc+0x364/0x10f0 [ 21.723327] test_invalid_addr_free+0xdb/0x260 [ 21.723772] kunit_try_run_case+0x1a5/0x480 [ 21.724041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.724656] kthread+0x337/0x6f0 [ 21.724903] ret_from_fork+0x116/0x1d0 [ 21.725290] ret_from_fork_asm+0x1a/0x30 [ 21.725643] [ 21.726007] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.726797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.727102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.727669] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
Automatically assigned
[ 21.509697] ================================================================== [ 21.510223] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260 [ 21.510223] [ 21.510633] Invalid free of 0x(____ptrval____) (in kfence-#97): [ 21.511964] test_double_free+0x1d3/0x260 [ 21.512451] kunit_try_run_case+0x1a5/0x480 [ 21.512889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.513323] kthread+0x337/0x6f0 [ 21.513609] ret_from_fork+0x116/0x1d0 [ 21.513934] ret_from_fork_asm+0x1a/0x30 [ 21.514242] [ 21.514466] kfence-#97: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 21.514466] [ 21.514895] allocated by task 320 on cpu 0 at 21.509370s (0.005519s ago): [ 21.515519] test_alloc+0x364/0x10f0 [ 21.515769] test_double_free+0xdb/0x260 [ 21.516136] kunit_try_run_case+0x1a5/0x480 [ 21.516425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.516910] kthread+0x337/0x6f0 [ 21.517107] ret_from_fork+0x116/0x1d0 [ 21.517308] ret_from_fork_asm+0x1a/0x30 [ 21.517688] [ 21.518322] freed by task 320 on cpu 0 at 21.509476s (0.008840s ago): [ 21.518801] test_double_free+0x1e0/0x260 [ 21.519019] kunit_try_run_case+0x1a5/0x480 [ 21.519445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.519907] kthread+0x337/0x6f0 [ 21.520296] ret_from_fork+0x116/0x1d0 [ 21.520649] ret_from_fork_asm+0x1a/0x30 [ 21.521013] [ 21.521281] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.521922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.522131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.523135] ================================================================== [ 21.613795] ================================================================== [ 21.614279] BUG: KFENCE: invalid free in test_double_free+0x112/0x260 [ 21.614279] [ 21.614973] Invalid free of 0x(____ptrval____) (in kfence-#98): [ 21.615225] test_double_free+0x112/0x260 [ 21.615439] kunit_try_run_case+0x1a5/0x480 [ 21.615653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.615870] kthread+0x337/0x6f0 [ 21.616037] ret_from_fork+0x116/0x1d0 [ 21.616204] ret_from_fork_asm+0x1a/0x30 [ 21.616378] [ 21.616512] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 21.616512] [ 21.617210] allocated by task 322 on cpu 1 at 21.613485s (0.003719s ago): [ 21.617552] test_alloc+0x2a6/0x10f0 [ 21.617738] test_double_free+0xdb/0x260 [ 21.617927] kunit_try_run_case+0x1a5/0x480 [ 21.618118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.618346] kthread+0x337/0x6f0 [ 21.618695] ret_from_fork+0x116/0x1d0 [ 21.619587] ret_from_fork_asm+0x1a/0x30 [ 21.620141] [ 21.622869] freed by task 322 on cpu 1 at 21.613584s (0.009277s ago): [ 21.623870] test_double_free+0xfa/0x260 [ 21.624154] kunit_try_run_case+0x1a5/0x480 [ 21.624905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.625380] kthread+0x337/0x6f0 [ 21.625600] ret_from_fork+0x116/0x1d0 [ 21.626047] ret_from_fork_asm+0x1a/0x30 [ 21.626333] [ 21.626904] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.627848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.628146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.628918] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
Automatically assigned
[ 21.197528] ================================================================== [ 21.197991] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 21.197991] [ 21.198371] Use-after-free read at 0x(____ptrval____) (in kfence-#94): [ 21.198914] test_use_after_free_read+0x129/0x270 [ 21.199212] kunit_try_run_case+0x1a5/0x480 [ 21.199713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.200094] kthread+0x337/0x6f0 [ 21.200463] ret_from_fork+0x116/0x1d0 [ 21.200743] ret_from_fork_asm+0x1a/0x30 [ 21.201021] [ 21.201180] kfence-#94: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 21.201180] [ 21.201893] allocated by task 314 on cpu 1 at 21.197287s (0.004601s ago): [ 21.202663] test_alloc+0x2a6/0x10f0 [ 21.202894] test_use_after_free_read+0xdc/0x270 [ 21.203118] kunit_try_run_case+0x1a5/0x480 [ 21.203544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.204019] kthread+0x337/0x6f0 [ 21.204307] ret_from_fork+0x116/0x1d0 [ 21.204573] ret_from_fork_asm+0x1a/0x30 [ 21.204993] [ 21.205188] freed by task 314 on cpu 1 at 21.197388s (0.007795s ago): [ 21.205656] test_use_after_free_read+0xfb/0x270 [ 21.205926] kunit_try_run_case+0x1a5/0x480 [ 21.206294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.206736] kthread+0x337/0x6f0 [ 21.207161] ret_from_fork+0x116/0x1d0 [ 21.207480] ret_from_fork_asm+0x1a/0x30 [ 21.207699] [ 21.207939] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.209074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.209409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.209943] ================================================================== [ 21.094659] ================================================================== [ 21.095328] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 21.095328] [ 21.096005] Use-after-free read at 0x(____ptrval____) (in kfence-#93): [ 21.096571] test_use_after_free_read+0x129/0x270 [ 21.096965] kunit_try_run_case+0x1a5/0x480 [ 21.097184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.097865] kthread+0x337/0x6f0 [ 21.098443] ret_from_fork+0x116/0x1d0 [ 21.099133] ret_from_fork_asm+0x1a/0x30 [ 21.099681] [ 21.099846] kfence-#93: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 21.099846] [ 21.101158] allocated by task 312 on cpu 1 at 21.094266s (0.006886s ago): [ 21.101569] test_alloc+0x364/0x10f0 [ 21.101938] test_use_after_free_read+0xdc/0x270 [ 21.102385] kunit_try_run_case+0x1a5/0x480 [ 21.102805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.103052] kthread+0x337/0x6f0 [ 21.103468] ret_from_fork+0x116/0x1d0 [ 21.103832] ret_from_fork_asm+0x1a/0x30 [ 21.104055] [ 21.104184] freed by task 312 on cpu 1 at 21.094392s (0.009789s ago): [ 21.104444] test_use_after_free_read+0x1e7/0x270 [ 21.104723] kunit_try_run_case+0x1a5/0x480 [ 21.104950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.105903] kthread+0x337/0x6f0 [ 21.106271] ret_from_fork+0x116/0x1d0 [ 21.106737] ret_from_fork_asm+0x1a/0x30 [ 21.107333] [ 21.107539] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 21.108214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.108504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.109053] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
Automatically assigned
[ 20.989449] ================================================================== [ 20.990112] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 20.990112] [ 20.990903] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#92): [ 20.991396] test_out_of_bounds_write+0x10d/0x260 [ 20.991642] kunit_try_run_case+0x1a5/0x480 [ 20.992009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.993038] kthread+0x337/0x6f0 [ 20.993474] ret_from_fork+0x116/0x1d0 [ 20.993727] ret_from_fork_asm+0x1a/0x30 [ 20.993948] [ 20.994066] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 20.994066] [ 20.995286] allocated by task 310 on cpu 0 at 20.989354s (0.005925s ago): [ 20.996088] test_alloc+0x2a6/0x10f0 [ 20.996484] test_out_of_bounds_write+0xd4/0x260 [ 20.996775] kunit_try_run_case+0x1a5/0x480 [ 20.997018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.997681] kthread+0x337/0x6f0 [ 20.997918] ret_from_fork+0x116/0x1d0 [ 20.998138] ret_from_fork_asm+0x1a/0x30 [ 20.998807] [ 20.999277] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 20.999962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.000178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.000898] ================================================================== [ 20.885520] ================================================================== [ 20.886064] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 20.886064] [ 20.886644] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#91): [ 20.887097] test_out_of_bounds_write+0x10d/0x260 [ 20.887409] kunit_try_run_case+0x1a5/0x480 [ 20.887843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.888263] kthread+0x337/0x6f0 [ 20.888531] ret_from_fork+0x116/0x1d0 [ 20.888872] ret_from_fork_asm+0x1a/0x30 [ 20.889095] [ 20.889279] kfence-#91: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 20.889279] [ 20.890122] allocated by task 308 on cpu 1 at 20.885311s (0.004804s ago): [ 20.890613] test_alloc+0x364/0x10f0 [ 20.891120] test_out_of_bounds_write+0xd4/0x260 [ 20.891530] kunit_try_run_case+0x1a5/0x480 [ 20.891866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.892124] kthread+0x337/0x6f0 [ 20.892465] ret_from_fork+0x116/0x1d0 [ 20.892958] ret_from_fork_asm+0x1a/0x30 [ 20.893361] [ 20.893617] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 20.894165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.894560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.895323] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
Automatically assigned
[ 20.781681] ================================================================== [ 20.782213] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 20.782213] [ 20.782748] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#90): [ 20.783240] test_out_of_bounds_read+0x216/0x4e0 [ 20.783545] kunit_try_run_case+0x1a5/0x480 [ 20.783754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.784065] kthread+0x337/0x6f0 [ 20.784388] ret_from_fork+0x116/0x1d0 [ 20.784999] ret_from_fork_asm+0x1a/0x30 [ 20.785433] [ 20.785654] kfence-#90: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 20.785654] [ 20.786255] allocated by task 306 on cpu 0 at 20.781585s (0.004664s ago): [ 20.786931] test_alloc+0x2a6/0x10f0 [ 20.787171] test_out_of_bounds_read+0x1e2/0x4e0 [ 20.787622] kunit_try_run_case+0x1a5/0x480 [ 20.787871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.788119] kthread+0x337/0x6f0 [ 20.788336] ret_from_fork+0x116/0x1d0 [ 20.788685] ret_from_fork_asm+0x1a/0x30 [ 20.789103] [ 20.789339] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 20.790195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.790474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.791020] ================================================================== [ 20.677413] ================================================================== [ 20.677990] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 20.677990] [ 20.678616] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#89): [ 20.679102] test_out_of_bounds_read+0x126/0x4e0 [ 20.679430] kunit_try_run_case+0x1a5/0x480 [ 20.680022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.680587] kthread+0x337/0x6f0 [ 20.680967] ret_from_fork+0x116/0x1d0 [ 20.681552] ret_from_fork_asm+0x1a/0x30 [ 20.682038] [ 20.682331] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 20.682331] [ 20.682906] allocated by task 306 on cpu 0 at 20.677304s (0.005595s ago): [ 20.683692] test_alloc+0x2a6/0x10f0 [ 20.684137] test_out_of_bounds_read+0xed/0x4e0 [ 20.684583] kunit_try_run_case+0x1a5/0x480 [ 20.684885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.685282] kthread+0x337/0x6f0 [ 20.685673] ret_from_fork+0x116/0x1d0 [ 20.686064] ret_from_fork_asm+0x1a/0x30 [ 20.686353] [ 20.686680] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 20.687542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.687921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.688561] ================================================================== [ 20.158597] ================================================================== [ 20.159164] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 20.159164] [ 20.159935] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#84): [ 20.160616] test_out_of_bounds_read+0x126/0x4e0 [ 20.160935] kunit_try_run_case+0x1a5/0x480 [ 20.161241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.161529] kthread+0x337/0x6f0 [ 20.161710] ret_from_fork+0x116/0x1d0 [ 20.161902] ret_from_fork_asm+0x1a/0x30 [ 20.162116] [ 20.162269] kfence-#84: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 20.162269] [ 20.163016] allocated by task 304 on cpu 1 at 20.157312s (0.005698s ago): [ 20.163803] test_alloc+0x364/0x10f0 [ 20.164182] test_out_of_bounds_read+0xed/0x4e0 [ 20.164604] kunit_try_run_case+0x1a5/0x480 [ 20.164985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.165316] kthread+0x337/0x6f0 [ 20.165591] ret_from_fork+0x116/0x1d0 [ 20.165825] ret_from_fork_asm+0x1a/0x30 [ 20.166124] [ 20.166367] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 20.167248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.167520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.167863] ================================================================== [ 20.573498] ================================================================== [ 20.573893] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 20.573893] [ 20.574176] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#88): [ 20.574666] test_out_of_bounds_read+0x216/0x4e0 [ 20.574952] kunit_try_run_case+0x1a5/0x480 [ 20.575269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.575465] kthread+0x337/0x6f0 [ 20.575786] ret_from_fork+0x116/0x1d0 [ 20.576013] ret_from_fork_asm+0x1a/0x30 [ 20.576126] [ 20.576193] kfence-#88: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 20.576193] [ 20.576782] allocated by task 304 on cpu 1 at 20.573268s (0.003510s ago): [ 20.577177] test_alloc+0x364/0x10f0 [ 20.577362] test_out_of_bounds_read+0x1e2/0x4e0 [ 20.577493] kunit_try_run_case+0x1a5/0x480 [ 20.577810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.578115] kthread+0x337/0x6f0 [ 20.578329] ret_from_fork+0x116/0x1d0 [ 20.578434] ret_from_fork_asm+0x1a/0x30 [ 20.578720] [ 20.578853] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 20.579164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.579521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.579794] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 13.611243] ================================================================== [ 13.612878] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520 [ 13.612878] [ 13.613794] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#50): [ 13.616227] kmalloc_track_caller_oob_right+0x288/0x520 [ 13.616941] kunit_try_run_case+0x1a5/0x480 [ 13.617204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.618201] kthread+0x337/0x6f0 [ 13.618495] ret_from_fork+0x116/0x1d0 [ 13.618671] ret_from_fork_asm+0x1a/0x30 [ 13.619314] [ 13.620215] kfence-#50: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 13.620215] [ 13.621269] allocated by task 159 on cpu 1 at 13.607371s (0.013768s ago): [ 13.622501] kmalloc_track_caller_oob_right+0x19a/0x520 [ 13.623026] kunit_try_run_case+0x1a5/0x480 [ 13.623233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.623913] kthread+0x337/0x6f0 [ 13.624431] ret_from_fork+0x116/0x1d0 [ 13.624801] ret_from_fork_asm+0x1a/0x30 [ 13.625487] [ 13.625907] freed by task 159 on cpu 1 at 13.610447s (0.015305s ago): [ 13.626485] kmalloc_track_caller_oob_right+0x288/0x520 [ 13.626841] kunit_try_run_case+0x1a5/0x480 [ 13.627151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.628380] kthread+0x337/0x6f0 [ 13.628770] ret_from_fork+0x116/0x1d0 [ 13.629234] ret_from_fork_asm+0x1a/0x30 [ 13.629838] [ 13.630362] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.631681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.632030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.632342] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
Automatically assigned
[ 16.784983] ================================================================== [ 16.785448] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 [ 16.785905] Read of size 1 at addr ffff888103349898 by task kunit_try_catch/274 [ 16.786905] [ 16.787166] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.787238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.787260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.787288] Call Trace: [ 16.787306] <TASK> [ 16.787332] dump_stack_lvl+0x73/0xb0 [ 16.787406] print_report+0xd1/0x650 [ 16.787435] ? __virt_addr_valid+0x1db/0x2d0 [ 16.787479] ? memcmp+0x1b4/0x1d0 [ 16.787502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.787573] ? memcmp+0x1b4/0x1d0 [ 16.787645] kasan_report+0x141/0x180 [ 16.787734] ? memcmp+0x1b4/0x1d0 [ 16.787774] __asan_report_load1_noabort+0x18/0x20 [ 16.787801] memcmp+0x1b4/0x1d0 [ 16.787825] kasan_memcmp+0x18f/0x390 [ 16.787851] ? __pfx_kasan_memcmp+0x10/0x10 [ 16.787874] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.787911] ? __pfx_kasan_memcmp+0x10/0x10 [ 16.787942] kunit_try_run_case+0x1a5/0x480 [ 16.787967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.787989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.788017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.788044] ? __kthread_parkme+0x82/0x180 [ 16.788069] ? preempt_count_sub+0x50/0x80 [ 16.788095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.788118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.788144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.788171] kthread+0x337/0x6f0 [ 16.788192] ? trace_preempt_on+0x20/0xc0 [ 16.788239] ? __pfx_kthread+0x10/0x10 [ 16.788267] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.788293] ? calculate_sigpending+0x7b/0xa0 [ 16.788321] ? __pfx_kthread+0x10/0x10 [ 16.788345] ret_from_fork+0x116/0x1d0 [ 16.788369] ? __pfx_kthread+0x10/0x10 [ 16.788393] ret_from_fork_asm+0x1a/0x30 [ 16.788429] </TASK> [ 16.788444] [ 16.797137] Allocated by task 274: [ 16.797509] kasan_save_stack+0x45/0x70 [ 16.797936] kasan_save_track+0x18/0x40 [ 16.798149] kasan_save_alloc_info+0x3b/0x50 [ 16.798431] __kasan_kmalloc+0xb7/0xc0 [ 16.798674] __kmalloc_cache_noprof+0x189/0x420 [ 16.799026] kasan_memcmp+0xb7/0x390 [ 16.799207] kunit_try_run_case+0x1a5/0x480 [ 16.799518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.800475] kthread+0x337/0x6f0 [ 16.800633] ret_from_fork+0x116/0x1d0 [ 16.800749] ret_from_fork_asm+0x1a/0x30 [ 16.801473] [ 16.801601] The buggy address belongs to the object at ffff888103349880 [ 16.801601] which belongs to the cache kmalloc-32 of size 32 [ 16.802302] The buggy address is located 0 bytes to the right of [ 16.802302] allocated 24-byte region [ffff888103349880, ffff888103349898) [ 16.802854] [ 16.803020] The buggy address belongs to the physical page: [ 16.803269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.803519] flags: 0x200000000000000(node=0|zone=2) [ 16.803902] page_type: f5(slab) [ 16.804062] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 16.804476] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.805111] page dumped because: kasan: bad access detected [ 16.805406] [ 16.805514] Memory state around the buggy address: [ 16.805640] ffff888103349780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.806090] ffff888103349800: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 16.806394] >ffff888103349880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806710] ^ [ 16.806824] ffff888103349900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.807421] ffff888103349980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.807672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
Automatically assigned
[ 16.752183] ================================================================== [ 16.752787] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390 [ 16.753512] Read of size 1 at addr ffff8881039c7c4a by task kunit_try_catch/270 [ 16.754207] [ 16.754535] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.754612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.754629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.754689] Call Trace: [ 16.754722] <TASK> [ 16.754750] dump_stack_lvl+0x73/0xb0 [ 16.754810] print_report+0xd1/0x650 [ 16.754838] ? __virt_addr_valid+0x1db/0x2d0 [ 16.754866] ? kasan_alloca_oob_right+0x329/0x390 [ 16.754892] ? kasan_addr_to_slab+0x11/0xa0 [ 16.754916] ? kasan_alloca_oob_right+0x329/0x390 [ 16.754942] kasan_report+0x141/0x180 [ 16.754967] ? kasan_alloca_oob_right+0x329/0x390 [ 16.754997] __asan_report_load1_noabort+0x18/0x20 [ 16.755020] kasan_alloca_oob_right+0x329/0x390 [ 16.755046] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.755071] ? finish_task_switch.isra.0+0x153/0x700 [ 16.755097] ? __ww_mutex_lock.constprop.0+0xc5e/0x1e90 [ 16.755122] ? trace_hardirqs_on+0x37/0xe0 [ 16.755149] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 16.755176] ? __schedule+0x10cc/0x2b60 [ 16.755201] ? __pfx_read_tsc+0x10/0x10 [ 16.755242] ? ktime_get_ts64+0x86/0x230 [ 16.755273] kunit_try_run_case+0x1a5/0x480 [ 16.755300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.755322] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.755365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.755402] ? __kthread_parkme+0x82/0x180 [ 16.755426] ? preempt_count_sub+0x50/0x80 [ 16.755451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.755497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.755526] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.755553] kthread+0x337/0x6f0 [ 16.755577] ? trace_preempt_on+0x20/0xc0 [ 16.755602] ? __pfx_kthread+0x10/0x10 [ 16.755625] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.755650] ? calculate_sigpending+0x7b/0xa0 [ 16.755679] ? __pfx_kthread+0x10/0x10 [ 16.755703] ret_from_fork+0x116/0x1d0 [ 16.755726] ? __pfx_kthread+0x10/0x10 [ 16.755747] ret_from_fork_asm+0x1a/0x30 [ 16.755781] </TASK> [ 16.755795] [ 16.765241] The buggy address belongs to stack of task kunit_try_catch/270 [ 16.765724] [ 16.765849] The buggy address belongs to the physical page: [ 16.766144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c7 [ 16.766770] flags: 0x200000000000000(node=0|zone=2) [ 16.767048] raw: 0200000000000000 ffffea00040e71c8 ffffea00040e71c8 0000000000000000 [ 16.767292] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.767756] page dumped because: kasan: bad access detected [ 16.768075] [ 16.768207] Memory state around the buggy address: [ 16.768520] ffff8881039c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.768898] ffff8881039c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.769402] >ffff8881039c7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 16.769845] ^ [ 16.770154] ffff8881039c7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 16.770479] ffff8881039c7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.770676] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
Automatically assigned
[ 16.727637] ================================================================== [ 16.728296] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 16.728777] Read of size 1 at addr ffff888103a1fc3f by task kunit_try_catch/268 [ 16.729225] [ 16.729409] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.729489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.729506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.729544] Call Trace: [ 16.729563] <TASK> [ 16.729589] dump_stack_lvl+0x73/0xb0 [ 16.729634] print_report+0xd1/0x650 [ 16.729666] ? __virt_addr_valid+0x1db/0x2d0 [ 16.729694] ? kasan_alloca_oob_left+0x320/0x380 [ 16.729793] ? kasan_addr_to_slab+0x11/0xa0 [ 16.729819] ? kasan_alloca_oob_left+0x320/0x380 [ 16.729861] kasan_report+0x141/0x180 [ 16.729888] ? kasan_alloca_oob_left+0x320/0x380 [ 16.729919] __asan_report_load1_noabort+0x18/0x20 [ 16.729943] kasan_alloca_oob_left+0x320/0x380 [ 16.729971] ? finish_task_switch.isra.0+0x153/0x700 [ 16.729997] ? __ww_mutex_lock.constprop.0+0xc5e/0x1e90 [ 16.730024] ? trace_hardirqs_on+0x37/0xe0 [ 16.730052] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 16.730080] ? __schedule+0x10cc/0x2b60 [ 16.730105] ? __pfx_read_tsc+0x10/0x10 [ 16.730142] ? ktime_get_ts64+0x86/0x230 [ 16.730175] kunit_try_run_case+0x1a5/0x480 [ 16.730225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.730249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.730275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.730301] ? __kthread_parkme+0x82/0x180 [ 16.730325] ? preempt_count_sub+0x50/0x80 [ 16.730350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.730373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.730399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.730426] kthread+0x337/0x6f0 [ 16.730447] ? trace_preempt_on+0x20/0xc0 [ 16.730490] ? __pfx_kthread+0x10/0x10 [ 16.730515] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.730539] ? calculate_sigpending+0x7b/0xa0 [ 16.730567] ? __pfx_kthread+0x10/0x10 [ 16.730590] ret_from_fork+0x116/0x1d0 [ 16.730613] ? __pfx_kthread+0x10/0x10 [ 16.730636] ret_from_fork_asm+0x1a/0x30 [ 16.730670] </TASK> [ 16.730743] [ 16.739922] The buggy address belongs to stack of task kunit_try_catch/268 [ 16.740481] [ 16.740651] The buggy address belongs to the physical page: [ 16.740947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a1f [ 16.741472] flags: 0x200000000000000(node=0|zone=2) [ 16.741650] raw: 0200000000000000 ffffea00040e87c8 ffffea00040e87c8 0000000000000000 [ 16.742136] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.742657] page dumped because: kasan: bad access detected [ 16.742924] [ 16.742988] Memory state around the buggy address: [ 16.743111] ffff888103a1fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.743315] ffff888103a1fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.743836] >ffff888103a1fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 16.744101] ^ [ 16.744231] ffff888103a1fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 16.744385] ffff888103a1fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.745027] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
Automatically assigned
[ 16.701150] ================================================================== [ 16.702200] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 16.703066] Read of size 1 at addr ffff8881039c7d02 by task kunit_try_catch/266 [ 16.703506] [ 16.703657] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.703810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.703828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.703870] Call Trace: [ 16.703890] <TASK> [ 16.703927] dump_stack_lvl+0x73/0xb0 [ 16.703971] print_report+0xd1/0x650 [ 16.703998] ? __virt_addr_valid+0x1db/0x2d0 [ 16.704029] ? kasan_stack_oob+0x2b5/0x300 [ 16.704053] ? kasan_addr_to_slab+0x11/0xa0 [ 16.704077] ? kasan_stack_oob+0x2b5/0x300 [ 16.704101] kasan_report+0x141/0x180 [ 16.704129] ? kasan_stack_oob+0x2b5/0x300 [ 16.704158] __asan_report_load1_noabort+0x18/0x20 [ 16.704184] kasan_stack_oob+0x2b5/0x300 [ 16.704237] ? __pfx_kasan_stack_oob+0x10/0x10 [ 16.704261] ? finish_task_switch.isra.0+0x153/0x700 [ 16.704303] ? __switch_to+0x47/0xf50 [ 16.704335] ? __schedule+0x10cc/0x2b60 [ 16.704365] ? __pfx_read_tsc+0x10/0x10 [ 16.704392] ? ktime_get_ts64+0x86/0x230 [ 16.704425] kunit_try_run_case+0x1a5/0x480 [ 16.704467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.704495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.704528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.704556] ? __kthread_parkme+0x82/0x180 [ 16.704580] ? preempt_count_sub+0x50/0x80 [ 16.704607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.704631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.704661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.704764] kthread+0x337/0x6f0 [ 16.704793] ? trace_preempt_on+0x20/0xc0 [ 16.704826] ? __pfx_kthread+0x10/0x10 [ 16.704849] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.704877] ? calculate_sigpending+0x7b/0xa0 [ 16.704906] ? __pfx_kthread+0x10/0x10 [ 16.704930] ret_from_fork+0x116/0x1d0 [ 16.704952] ? __pfx_kthread+0x10/0x10 [ 16.704977] ret_from_fork_asm+0x1a/0x30 [ 16.705013] </TASK> [ 16.705027] [ 16.714358] The buggy address belongs to stack of task kunit_try_catch/266 [ 16.714969] and is located at offset 138 in frame: [ 16.715290] kasan_stack_oob+0x0/0x300 [ 16.715740] [ 16.715991] This frame has 4 objects: [ 16.716407] [48, 49) '__assertion' [ 16.716450] [64, 72) 'array' [ 16.716584] [96, 112) '__assertion' [ 16.716839] [128, 138) 'stack_array' [ 16.717079] [ 16.717354] The buggy address belongs to the physical page: [ 16.717889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c7 [ 16.718380] flags: 0x200000000000000(node=0|zone=2) [ 16.718817] raw: 0200000000000000 ffffea00040e71c8 ffffea00040e71c8 0000000000000000 [ 16.719128] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.719470] page dumped because: kasan: bad access detected [ 16.719837] [ 16.719933] Memory state around the buggy address: [ 16.720151] ffff8881039c7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.720474] ffff8881039c7c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 16.720929] >ffff8881039c7d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 16.721342] ^ [ 16.721489] ffff8881039c7d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 16.721950] ffff8881039c7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.722320] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
Automatically assigned
[ 16.674666] ================================================================== [ 16.675540] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 16.676052] Read of size 1 at addr ffffffff8f47ae4d by task kunit_try_catch/262 [ 16.676616] [ 16.676859] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.676929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.676947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.676974] Call Trace: [ 16.676993] <TASK> [ 16.677020] dump_stack_lvl+0x73/0xb0 [ 16.677057] print_report+0xd1/0x650 [ 16.677093] ? __virt_addr_valid+0x1db/0x2d0 [ 16.677127] ? kasan_global_oob_right+0x286/0x2d0 [ 16.677152] ? kasan_addr_to_slab+0x11/0xa0 [ 16.677210] ? kasan_global_oob_right+0x286/0x2d0 [ 16.677250] kasan_report+0x141/0x180 [ 16.677277] ? kasan_global_oob_right+0x286/0x2d0 [ 16.677322] __asan_report_load1_noabort+0x18/0x20 [ 16.677347] kasan_global_oob_right+0x286/0x2d0 [ 16.677372] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 16.677401] ? __schedule+0x10cc/0x2b60 [ 16.677429] ? __pfx_read_tsc+0x10/0x10 [ 16.677466] ? ktime_get_ts64+0x86/0x230 [ 16.677499] kunit_try_run_case+0x1a5/0x480 [ 16.677525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.677551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.677579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.677606] ? __kthread_parkme+0x82/0x180 [ 16.677643] ? preempt_count_sub+0x50/0x80 [ 16.677672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.677710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.677741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.677770] kthread+0x337/0x6f0 [ 16.677791] ? trace_preempt_on+0x20/0xc0 [ 16.677819] ? __pfx_kthread+0x10/0x10 [ 16.677842] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.677868] ? calculate_sigpending+0x7b/0xa0 [ 16.677897] ? __pfx_kthread+0x10/0x10 [ 16.677921] ret_from_fork+0x116/0x1d0 [ 16.677941] ? __pfx_kthread+0x10/0x10 [ 16.677964] ret_from_fork_asm+0x1a/0x30 [ 16.678001] </TASK> [ 16.678017] [ 16.685766] The buggy address belongs to the variable: [ 16.686007] global_array+0xd/0x40 [ 16.686137] [ 16.686355] The buggy address belongs to the physical page: [ 16.686748] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7947a [ 16.687041] flags: 0x100000000002000(reserved|node=0|zone=1) [ 16.687236] raw: 0100000000002000 ffffea0001e51e88 ffffea0001e51e88 0000000000000000 [ 16.687770] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 16.687998] page dumped because: kasan: bad access detected [ 16.688397] [ 16.688471] Memory state around the buggy address: [ 16.688598] ffffffff8f47ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.688757] ffffffff8f47ad80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.689189] >ffffffff8f47ae00: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 16.689706] ^ [ 16.690099] ffffffff8f47ae80: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 16.690301] ffffffff8f47af00: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 16.690467] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
Automatically assigned
[ 16.646633] ================================================================== [ 16.647184] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.647479] Free of addr ffff888103964001 by task kunit_try_catch/260 [ 16.648219] [ 16.648505] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.648568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.648583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.648607] Call Trace: [ 16.648628] <TASK> [ 16.648654] dump_stack_lvl+0x73/0xb0 [ 16.648690] print_report+0xd1/0x650 [ 16.648717] ? __virt_addr_valid+0x1db/0x2d0 [ 16.648744] ? kasan_addr_to_slab+0x11/0xa0 [ 16.648767] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.648794] kasan_report_invalid_free+0x10a/0x130 [ 16.648821] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.648851] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.648879] __kasan_mempool_poison_object+0x102/0x1d0 [ 16.648905] mempool_free+0x2ec/0x380 [ 16.648931] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.648959] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 16.649019] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.649046] ? finish_task_switch.isra.0+0x153/0x700 [ 16.649090] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 16.649120] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 16.649151] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.649204] ? __pfx_mempool_kfree+0x10/0x10 [ 16.649488] ? __pfx_read_tsc+0x10/0x10 [ 16.649531] ? ktime_get_ts64+0x86/0x230 [ 16.649561] kunit_try_run_case+0x1a5/0x480 [ 16.649593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.649616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.649646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.649674] ? __kthread_parkme+0x82/0x180 [ 16.649716] ? preempt_count_sub+0x50/0x80 [ 16.649746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.649773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.649805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.649833] kthread+0x337/0x6f0 [ 16.649856] ? trace_preempt_on+0x20/0xc0 [ 16.649884] ? __pfx_kthread+0x10/0x10 [ 16.649908] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.649935] ? calculate_sigpending+0x7b/0xa0 [ 16.649964] ? __pfx_kthread+0x10/0x10 [ 16.649989] ret_from_fork+0x116/0x1d0 [ 16.650154] ? __pfx_kthread+0x10/0x10 [ 16.650185] ret_from_fork_asm+0x1a/0x30 [ 16.650225] </TASK> [ 16.650240] [ 16.660319] The buggy address belongs to the physical page: [ 16.660621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103964 [ 16.661354] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.661897] flags: 0x200000000000040(head|node=0|zone=2) [ 16.662257] page_type: f8(unknown) [ 16.662583] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.663131] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.663469] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.663778] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.664255] head: 0200000000000002 ffffea00040e5901 00000000ffffffff 00000000ffffffff [ 16.664589] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.664954] page dumped because: kasan: bad access detected [ 16.665180] [ 16.665285] Memory state around the buggy address: [ 16.665509] ffff888103963f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.666001] ffff888103963f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.666227] >ffff888103964000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.666378] ^ [ 16.666611] ffff888103964080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.667166] ffff888103964100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.667492] ================================================================== [ 16.604415] ================================================================== [ 16.605410] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.606062] Free of addr ffff888103341801 by task kunit_try_catch/258 [ 16.606882] [ 16.607386] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.607481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.607500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.607525] Call Trace: [ 16.607547] <TASK> [ 16.607573] dump_stack_lvl+0x73/0xb0 [ 16.607782] print_report+0xd1/0x650 [ 16.607823] ? __virt_addr_valid+0x1db/0x2d0 [ 16.607858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.607883] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.607912] kasan_report_invalid_free+0x10a/0x130 [ 16.607941] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.607970] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.607997] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.608024] check_slab_allocation+0x11f/0x130 [ 16.608048] __kasan_mempool_poison_object+0x91/0x1d0 [ 16.608075] mempool_free+0x2ec/0x380 [ 16.608105] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.608134] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 16.608162] ? update_load_avg+0x1be/0x21b0 [ 16.608202] ? dequeue_entities+0x27e/0x1740 [ 16.608233] ? finish_task_switch.isra.0+0x153/0x700 [ 16.608267] mempool_kmalloc_invalid_free+0xed/0x140 [ 16.608296] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 16.608326] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.608347] ? __pfx_mempool_kfree+0x10/0x10 [ 16.608371] ? __pfx_read_tsc+0x10/0x10 [ 16.608396] ? ktime_get_ts64+0x86/0x230 [ 16.608423] kunit_try_run_case+0x1a5/0x480 [ 16.608450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.608491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.608523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.608552] ? __kthread_parkme+0x82/0x180 [ 16.608578] ? preempt_count_sub+0x50/0x80 [ 16.608604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.608628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.608762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.608790] kthread+0x337/0x6f0 [ 16.608813] ? trace_preempt_on+0x20/0xc0 [ 16.608841] ? __pfx_kthread+0x10/0x10 [ 16.608863] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.608888] ? calculate_sigpending+0x7b/0xa0 [ 16.608916] ? __pfx_kthread+0x10/0x10 [ 16.608940] ret_from_fork+0x116/0x1d0 [ 16.608960] ? __pfx_kthread+0x10/0x10 [ 16.608982] ret_from_fork_asm+0x1a/0x30 [ 16.609019] </TASK> [ 16.609034] [ 16.625055] Allocated by task 258: [ 16.625358] kasan_save_stack+0x45/0x70 [ 16.625625] kasan_save_track+0x18/0x40 [ 16.625909] kasan_save_alloc_info+0x3b/0x50 [ 16.626158] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.626625] remove_element+0x11e/0x190 [ 16.626916] mempool_alloc_preallocated+0x4d/0x90 [ 16.627184] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 16.627487] mempool_kmalloc_invalid_free+0xed/0x140 [ 16.628102] kunit_try_run_case+0x1a5/0x480 [ 16.628525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.629005] kthread+0x337/0x6f0 [ 16.629500] ret_from_fork+0x116/0x1d0 [ 16.630085] ret_from_fork_asm+0x1a/0x30 [ 16.630370] [ 16.630617] The buggy address belongs to the object at ffff888103341800 [ 16.630617] which belongs to the cache kmalloc-128 of size 128 [ 16.631485] The buggy address is located 1 bytes inside of [ 16.631485] 128-byte region [ffff888103341800, ffff888103341880) [ 16.632547] [ 16.633081] The buggy address belongs to the physical page: [ 16.633546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 16.634061] flags: 0x200000000000000(node=0|zone=2) [ 16.634439] page_type: f5(slab) [ 16.634585] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.635102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.635413] page dumped because: kasan: bad access detected [ 16.636155] [ 16.636418] Memory state around the buggy address: [ 16.636940] ffff888103341700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.637197] ffff888103341780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.637369] >ffff888103341800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.638014] ^ [ 16.638254] ffff888103341880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.639181] ffff888103341900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.639488] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
Automatically assigned
[ 16.507065] ================================================================== [ 16.507796] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 16.508517] Free of addr ffff888103341400 by task kunit_try_catch/252 [ 16.509299] [ 16.509646] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.509820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.509840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.509868] Call Trace: [ 16.509889] <TASK> [ 16.509919] dump_stack_lvl+0x73/0xb0 [ 16.509977] print_report+0xd1/0x650 [ 16.510010] ? __virt_addr_valid+0x1db/0x2d0 [ 16.510044] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.510070] ? mempool_double_free_helper+0x184/0x370 [ 16.510097] kasan_report_invalid_free+0x10a/0x130 [ 16.510125] ? mempool_double_free_helper+0x184/0x370 [ 16.510154] ? mempool_double_free_helper+0x184/0x370 [ 16.510180] ? mempool_double_free_helper+0x184/0x370 [ 16.510207] check_slab_allocation+0x101/0x130 [ 16.510254] __kasan_mempool_poison_object+0x91/0x1d0 [ 16.510284] mempool_free+0x2ec/0x380 [ 16.510311] ? __wake_up+0x49/0x60 [ 16.510344] mempool_double_free_helper+0x184/0x370 [ 16.510370] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 16.510399] ? __kasan_check_write+0x18/0x20 [ 16.510424] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.510450] ? finish_task_switch.isra.0+0x153/0x700 [ 16.510510] mempool_kmalloc_double_free+0xed/0x140 [ 16.510539] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 16.510574] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.510597] ? __pfx_mempool_kfree+0x10/0x10 [ 16.510622] ? __pfx_read_tsc+0x10/0x10 [ 16.510650] ? ktime_get_ts64+0x86/0x230 [ 16.510680] kunit_try_run_case+0x1a5/0x480 [ 16.510724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.510753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.510784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.510812] ? __kthread_parkme+0x82/0x180 [ 16.510837] ? preempt_count_sub+0x50/0x80 [ 16.510863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.510887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.510917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.510946] kthread+0x337/0x6f0 [ 16.510969] ? trace_preempt_on+0x20/0xc0 [ 16.510998] ? __pfx_kthread+0x10/0x10 [ 16.511022] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.511047] ? calculate_sigpending+0x7b/0xa0 [ 16.511077] ? __pfx_kthread+0x10/0x10 [ 16.511102] ret_from_fork+0x116/0x1d0 [ 16.511125] ? __pfx_kthread+0x10/0x10 [ 16.511148] ret_from_fork_asm+0x1a/0x30 [ 16.511186] </TASK> [ 16.511200] [ 16.523966] Allocated by task 252: [ 16.524620] kasan_save_stack+0x45/0x70 [ 16.525100] kasan_save_track+0x18/0x40 [ 16.525257] kasan_save_alloc_info+0x3b/0x50 [ 16.525510] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.526189] remove_element+0x11e/0x190 [ 16.526429] mempool_alloc_preallocated+0x4d/0x90 [ 16.526765] mempool_double_free_helper+0x8a/0x370 [ 16.527095] mempool_kmalloc_double_free+0xed/0x140 [ 16.527589] kunit_try_run_case+0x1a5/0x480 [ 16.528158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.528357] kthread+0x337/0x6f0 [ 16.528527] ret_from_fork+0x116/0x1d0 [ 16.528783] ret_from_fork_asm+0x1a/0x30 [ 16.529245] [ 16.529363] Freed by task 252: [ 16.529479] kasan_save_stack+0x45/0x70 [ 16.530191] kasan_save_track+0x18/0x40 [ 16.530416] kasan_save_free_info+0x3f/0x60 [ 16.530764] __kasan_mempool_poison_object+0x131/0x1d0 [ 16.531055] mempool_free+0x2ec/0x380 [ 16.531317] mempool_double_free_helper+0x109/0x370 [ 16.531795] mempool_kmalloc_double_free+0xed/0x140 [ 16.532039] kunit_try_run_case+0x1a5/0x480 [ 16.532225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.532594] kthread+0x337/0x6f0 [ 16.532849] ret_from_fork+0x116/0x1d0 [ 16.533091] ret_from_fork_asm+0x1a/0x30 [ 16.533386] [ 16.533541] The buggy address belongs to the object at ffff888103341400 [ 16.533541] which belongs to the cache kmalloc-128 of size 128 [ 16.534333] The buggy address is located 0 bytes inside of [ 16.534333] 128-byte region [ffff888103341400, ffff888103341480) [ 16.535033] [ 16.535182] The buggy address belongs to the physical page: [ 16.535500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 16.536074] flags: 0x200000000000000(node=0|zone=2) [ 16.536490] page_type: f5(slab) [ 16.536706] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.537106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.537555] page dumped because: kasan: bad access detected [ 16.537942] [ 16.538133] Memory state around the buggy address: [ 16.538835] ffff888103341300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.539105] ffff888103341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.539295] >ffff888103341400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.539526] ^ [ 16.539810] ffff888103341480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.540730] ffff888103341500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.541573] ================================================================== [ 16.576321] ================================================================== [ 16.577705] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 16.578224] Free of addr ffff888102ad4000 by task kunit_try_catch/256 [ 16.578420] [ 16.578834] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.578925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.578940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.578967] Call Trace: [ 16.578985] <TASK> [ 16.579011] dump_stack_lvl+0x73/0xb0 [ 16.579055] print_report+0xd1/0x650 [ 16.579082] ? __virt_addr_valid+0x1db/0x2d0 [ 16.579111] ? kasan_addr_to_slab+0x11/0xa0 [ 16.579135] ? mempool_double_free_helper+0x184/0x370 [ 16.579163] kasan_report_invalid_free+0x10a/0x130 [ 16.579190] ? mempool_double_free_helper+0x184/0x370 [ 16.579257] ? mempool_double_free_helper+0x184/0x370 [ 16.579312] __kasan_mempool_poison_pages+0x115/0x130 [ 16.579353] mempool_free+0x290/0x380 [ 16.579594] mempool_double_free_helper+0x184/0x370 [ 16.579660] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 16.579716] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.579749] ? irqentry_exit+0x2a/0x60 [ 16.579773] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.579805] mempool_page_alloc_double_free+0xe8/0x140 [ 16.579834] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 16.579867] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 16.579893] ? __pfx_mempool_free_pages+0x10/0x10 [ 16.579916] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 16.579947] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 16.579981] kunit_try_run_case+0x1a5/0x480 [ 16.580007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.580029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.580058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.580087] ? __kthread_parkme+0x82/0x180 [ 16.580112] ? preempt_count_sub+0x50/0x80 [ 16.580139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.580163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.580191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.580243] kthread+0x337/0x6f0 [ 16.580269] ? trace_preempt_on+0x20/0xc0 [ 16.580298] ? __pfx_kthread+0x10/0x10 [ 16.580323] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.580349] ? calculate_sigpending+0x7b/0xa0 [ 16.580378] ? __pfx_kthread+0x10/0x10 [ 16.580403] ret_from_fork+0x116/0x1d0 [ 16.580427] ? __pfx_kthread+0x10/0x10 [ 16.580452] ret_from_fork_asm+0x1a/0x30 [ 16.580512] </TASK> [ 16.580527] [ 16.589921] The buggy address belongs to the physical page: [ 16.590126] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.590808] flags: 0x200000000000000(node=0|zone=2) [ 16.590982] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 16.591166] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 16.594312] page dumped because: kasan: bad access detected [ 16.594826] [ 16.594979] Memory state around the buggy address: [ 16.595385] ffff888102ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.595943] ffff888102ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.596121] >ffff888102ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.596291] ^ [ 16.597006] ffff888102ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.597920] ffff888102ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.598120] ================================================================== [ 16.546433] ================================================================== [ 16.546946] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 16.547485] Free of addr ffff888102ad4000 by task kunit_try_catch/254 [ 16.548046] [ 16.548244] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.548336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.548362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.548390] Call Trace: [ 16.548406] <TASK> [ 16.548429] dump_stack_lvl+0x73/0xb0 [ 16.548474] print_report+0xd1/0x650 [ 16.548500] ? __virt_addr_valid+0x1db/0x2d0 [ 16.548529] ? kasan_addr_to_slab+0x11/0xa0 [ 16.548551] ? mempool_double_free_helper+0x184/0x370 [ 16.548578] kasan_report_invalid_free+0x10a/0x130 [ 16.548605] ? mempool_double_free_helper+0x184/0x370 [ 16.548660] ? mempool_double_free_helper+0x184/0x370 [ 16.548757] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 16.548790] mempool_free+0x2ec/0x380 [ 16.548909] mempool_double_free_helper+0x184/0x370 [ 16.549020] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 16.549052] ? update_load_avg+0x1be/0x21b0 [ 16.549085] ? dequeue_entities+0x27e/0x1740 [ 16.549113] ? finish_task_switch.isra.0+0x153/0x700 [ 16.549143] mempool_kmalloc_large_double_free+0xed/0x140 [ 16.549172] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 16.549215] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.549240] ? __pfx_mempool_kfree+0x10/0x10 [ 16.549263] ? __pfx_read_tsc+0x10/0x10 [ 16.549290] ? ktime_get_ts64+0x86/0x230 [ 16.549316] kunit_try_run_case+0x1a5/0x480 [ 16.549342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.549363] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.549392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.549421] ? __kthread_parkme+0x82/0x180 [ 16.549445] ? preempt_count_sub+0x50/0x80 [ 16.549493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.549518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.549547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.549575] kthread+0x337/0x6f0 [ 16.549597] ? trace_preempt_on+0x20/0xc0 [ 16.549624] ? __pfx_kthread+0x10/0x10 [ 16.549647] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.549674] ? calculate_sigpending+0x7b/0xa0 [ 16.549701] ? __pfx_kthread+0x10/0x10 [ 16.549736] ret_from_fork+0x116/0x1d0 [ 16.549758] ? __pfx_kthread+0x10/0x10 [ 16.549781] ret_from_fork_asm+0x1a/0x30 [ 16.549816] </TASK> [ 16.549830] [ 16.561912] The buggy address belongs to the physical page: [ 16.562366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.562822] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.563160] flags: 0x200000000000040(head|node=0|zone=2) [ 16.563450] page_type: f8(unknown) [ 16.563915] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.564488] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.564852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.565032] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.565235] head: 0200000000000002 ffffea00040ab501 00000000ffffffff 00000000ffffffff [ 16.565675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.566163] page dumped because: kasan: bad access detected [ 16.566679] [ 16.566828] Memory state around the buggy address: [ 16.567168] ffff888102ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.567737] ffff888102ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.568170] >ffff888102ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.568573] ^ [ 16.568799] ffff888102ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.569366] ffff888102ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.569789] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 16.369927] ================================================================== [ 16.370502] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 16.371730] Read of size 1 at addr ffff888102ad0000 by task kunit_try_catch/246 [ 16.373264] [ 16.373437] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.373534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.373558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.373599] Call Trace: [ 16.373622] <TASK> [ 16.373660] dump_stack_lvl+0x73/0xb0 [ 16.373730] print_report+0xd1/0x650 [ 16.373776] ? __virt_addr_valid+0x1db/0x2d0 [ 16.373822] ? mempool_uaf_helper+0x392/0x400 [ 16.373947] ? kasan_addr_to_slab+0x11/0xa0 [ 16.374010] ? mempool_uaf_helper+0x392/0x400 [ 16.374052] kasan_report+0x141/0x180 [ 16.374094] ? mempool_uaf_helper+0x392/0x400 [ 16.374137] __asan_report_load1_noabort+0x18/0x20 [ 16.374175] mempool_uaf_helper+0x392/0x400 [ 16.374225] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 16.374266] ? __kasan_check_write+0x18/0x20 [ 16.374301] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.374344] ? finish_task_switch.isra.0+0x153/0x700 [ 16.374390] mempool_kmalloc_large_uaf+0xef/0x140 [ 16.374436] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 16.374506] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.374552] ? __pfx_mempool_kfree+0x10/0x10 [ 16.374591] ? __pfx_read_tsc+0x10/0x10 [ 16.374667] ? ktime_get_ts64+0x86/0x230 [ 16.374707] kunit_try_run_case+0x1a5/0x480 [ 16.374756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.374790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.374845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.374892] ? __kthread_parkme+0x82/0x180 [ 16.374936] ? preempt_count_sub+0x50/0x80 [ 16.374981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.375111] kthread+0x337/0x6f0 [ 16.375153] ? trace_preempt_on+0x20/0xc0 [ 16.375200] ? __pfx_kthread+0x10/0x10 [ 16.375249] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.375296] ? calculate_sigpending+0x7b/0xa0 [ 16.375373] ? __pfx_kthread+0x10/0x10 [ 16.375422] ret_from_fork+0x116/0x1d0 [ 16.375484] ? __pfx_kthread+0x10/0x10 [ 16.375518] ret_from_fork_asm+0x1a/0x30 [ 16.375574] </TASK> [ 16.375590] [ 16.392742] The buggy address belongs to the physical page: [ 16.393640] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0 [ 16.394249] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.394854] flags: 0x200000000000040(head|node=0|zone=2) [ 16.396026] page_type: f8(unknown) [ 16.396702] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.397084] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.397788] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.398384] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.399172] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff [ 16.399647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.400846] page dumped because: kasan: bad access detected [ 16.401067] [ 16.401596] Memory state around the buggy address: [ 16.402197] ffff888102acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.402938] ffff888102acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.403478] >ffff888102ad0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.404154] ^ [ 16.404348] ffff888102ad0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.405582] ffff888102ad0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.406182] ================================================================== [ 16.478290] ================================================================== [ 16.478739] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 16.478944] Read of size 1 at addr ffff888102ad4000 by task kunit_try_catch/250 [ 16.479934] [ 16.480043] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.480109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.480125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.480153] Call Trace: [ 16.480172] <TASK> [ 16.480199] dump_stack_lvl+0x73/0xb0 [ 16.480241] print_report+0xd1/0x650 [ 16.480268] ? __virt_addr_valid+0x1db/0x2d0 [ 16.480296] ? mempool_uaf_helper+0x392/0x400 [ 16.480322] ? kasan_addr_to_slab+0x11/0xa0 [ 16.480345] ? mempool_uaf_helper+0x392/0x400 [ 16.480370] kasan_report+0x141/0x180 [ 16.480547] ? mempool_uaf_helper+0x392/0x400 [ 16.480587] __asan_report_load1_noabort+0x18/0x20 [ 16.480612] mempool_uaf_helper+0x392/0x400 [ 16.480639] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 16.480667] ? __kasan_check_write+0x18/0x20 [ 16.480808] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.480845] ? irqentry_exit+0x2a/0x60 [ 16.480872] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.480905] mempool_page_alloc_uaf+0xed/0x140 [ 16.480933] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 16.480966] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 16.480994] ? __pfx_mempool_free_pages+0x10/0x10 [ 16.481020] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 16.481053] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 16.481122] kunit_try_run_case+0x1a5/0x480 [ 16.481154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.481178] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.481237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.481270] ? __kthread_parkme+0x82/0x180 [ 16.481315] ? preempt_count_sub+0x50/0x80 [ 16.481350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.481376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.481413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.481447] kthread+0x337/0x6f0 [ 16.481500] ? trace_preempt_on+0x20/0xc0 [ 16.481534] ? __pfx_kthread+0x10/0x10 [ 16.481563] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.481597] ? calculate_sigpending+0x7b/0xa0 [ 16.481632] ? __pfx_kthread+0x10/0x10 [ 16.481661] ret_from_fork+0x116/0x1d0 [ 16.482160] ? __pfx_kthread+0x10/0x10 [ 16.482250] ret_from_fork_asm+0x1a/0x30 [ 16.482299] </TASK> [ 16.482315] [ 16.494680] The buggy address belongs to the physical page: [ 16.495064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.495262] flags: 0x200000000000000(node=0|zone=2) [ 16.495741] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 16.496511] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 16.497012] page dumped because: kasan: bad access detected [ 16.497263] [ 16.497558] Memory state around the buggy address: [ 16.497837] ffff888102ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.498308] ffff888102ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.498497] >ffff888102ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.498939] ^ [ 16.499205] ffff888102ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.499690] ffff888102ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.500542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 16.414636] ================================================================== [ 16.415553] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 16.416170] Read of size 1 at addr ffff888103349240 by task kunit_try_catch/248 [ 16.416450] [ 16.416616] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.416723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.416755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.416805] Call Trace: [ 16.416839] <TASK> [ 16.416883] dump_stack_lvl+0x73/0xb0 [ 16.416953] print_report+0xd1/0x650 [ 16.417045] ? __virt_addr_valid+0x1db/0x2d0 [ 16.417092] ? mempool_uaf_helper+0x392/0x400 [ 16.417132] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.417172] ? mempool_uaf_helper+0x392/0x400 [ 16.417215] kasan_report+0x141/0x180 [ 16.417262] ? mempool_uaf_helper+0x392/0x400 [ 16.417336] __asan_report_load1_noabort+0x18/0x20 [ 16.417384] mempool_uaf_helper+0x392/0x400 [ 16.417443] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 16.417506] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.417548] ? finish_task_switch.isra.0+0x153/0x700 [ 16.417628] mempool_slab_uaf+0xea/0x140 [ 16.417693] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 16.417747] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 16.417799] ? __pfx_mempool_free_slab+0x10/0x10 [ 16.417855] ? __pfx_read_tsc+0x10/0x10 [ 16.417908] ? ktime_get_ts64+0x86/0x230 [ 16.417967] kunit_try_run_case+0x1a5/0x480 [ 16.418023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.418072] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.418129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.418187] ? __kthread_parkme+0x82/0x180 [ 16.418292] ? preempt_count_sub+0x50/0x80 [ 16.418353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.418391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.418420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.418447] kthread+0x337/0x6f0 [ 16.418495] ? trace_preempt_on+0x20/0xc0 [ 16.418523] ? __pfx_kthread+0x10/0x10 [ 16.418546] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.418570] ? calculate_sigpending+0x7b/0xa0 [ 16.418597] ? __pfx_kthread+0x10/0x10 [ 16.418621] ret_from_fork+0x116/0x1d0 [ 16.418642] ? __pfx_kthread+0x10/0x10 [ 16.418665] ret_from_fork_asm+0x1a/0x30 [ 16.418745] </TASK> [ 16.418772] [ 16.435378] Allocated by task 248: [ 16.435649] kasan_save_stack+0x45/0x70 [ 16.436270] kasan_save_track+0x18/0x40 [ 16.436757] kasan_save_alloc_info+0x3b/0x50 [ 16.437131] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 16.437395] remove_element+0x11e/0x190 [ 16.437891] mempool_alloc_preallocated+0x4d/0x90 [ 16.439172] mempool_uaf_helper+0x96/0x400 [ 16.439433] mempool_slab_uaf+0xea/0x140 [ 16.439629] kunit_try_run_case+0x1a5/0x480 [ 16.439996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.440260] kthread+0x337/0x6f0 [ 16.441070] ret_from_fork+0x116/0x1d0 [ 16.441543] ret_from_fork_asm+0x1a/0x30 [ 16.441910] [ 16.442470] Freed by task 248: [ 16.442830] kasan_save_stack+0x45/0x70 [ 16.443655] kasan_save_track+0x18/0x40 [ 16.444233] kasan_save_free_info+0x3f/0x60 [ 16.444861] __kasan_mempool_poison_object+0x131/0x1d0 [ 16.445443] mempool_free+0x2ec/0x380 [ 16.446054] mempool_uaf_helper+0x11a/0x400 [ 16.446304] mempool_slab_uaf+0xea/0x140 [ 16.447199] kunit_try_run_case+0x1a5/0x480 [ 16.447440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.447909] kthread+0x337/0x6f0 [ 16.448169] ret_from_fork+0x116/0x1d0 [ 16.449342] ret_from_fork_asm+0x1a/0x30 [ 16.449702] [ 16.449975] The buggy address belongs to the object at ffff888103349240 [ 16.449975] which belongs to the cache test_cache of size 123 [ 16.450965] The buggy address is located 0 bytes inside of [ 16.450965] freed 123-byte region [ffff888103349240, ffff8881033492bb) [ 16.452320] [ 16.452725] The buggy address belongs to the physical page: [ 16.453387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.454082] flags: 0x200000000000000(node=0|zone=2) [ 16.454631] page_type: f5(slab) [ 16.454932] raw: 0200000000000000 ffff888103342140 dead000000000122 0000000000000000 [ 16.455434] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 16.455744] page dumped because: kasan: bad access detected [ 16.455946] [ 16.456028] Memory state around the buggy address: [ 16.456203] ffff888103349100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.456435] ffff888103349180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.456700] >ffff888103349200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 16.457172] ^ [ 16.457836] ffff888103349280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.458491] ffff888103349300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.459077] ================================================================== [ 16.307737] ================================================================== [ 16.308537] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 16.310118] Read of size 1 at addr ffff8881033dc500 by task kunit_try_catch/244 [ 16.310633] [ 16.310871] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.310968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.310992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.311038] Call Trace: [ 16.311071] <TASK> [ 16.311115] dump_stack_lvl+0x73/0xb0 [ 16.311192] print_report+0xd1/0x650 [ 16.311237] ? __virt_addr_valid+0x1db/0x2d0 [ 16.311283] ? mempool_uaf_helper+0x392/0x400 [ 16.311325] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.311402] ? mempool_uaf_helper+0x392/0x400 [ 16.311448] kasan_report+0x141/0x180 [ 16.311512] ? mempool_uaf_helper+0x392/0x400 [ 16.311564] __asan_report_load1_noabort+0x18/0x20 [ 16.311605] mempool_uaf_helper+0x392/0x400 [ 16.311655] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 16.311708] ? __kasan_check_write+0x18/0x20 [ 16.311748] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.311790] ? finish_task_switch.isra.0+0x153/0x700 [ 16.311823] mempool_kmalloc_uaf+0xef/0x140 [ 16.311849] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 16.311878] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.311903] ? __pfx_mempool_kfree+0x10/0x10 [ 16.311928] ? __pfx_read_tsc+0x10/0x10 [ 16.311954] ? ktime_get_ts64+0x86/0x230 [ 16.311983] kunit_try_run_case+0x1a5/0x480 [ 16.312010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.312062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.312090] ? __kthread_parkme+0x82/0x180 [ 16.312113] ? preempt_count_sub+0x50/0x80 [ 16.312139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.312190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.312218] kthread+0x337/0x6f0 [ 16.312240] ? trace_preempt_on+0x20/0xc0 [ 16.312268] ? __pfx_kthread+0x10/0x10 [ 16.312291] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.312316] ? calculate_sigpending+0x7b/0xa0 [ 16.312344] ? __pfx_kthread+0x10/0x10 [ 16.312368] ret_from_fork+0x116/0x1d0 [ 16.312390] ? __pfx_kthread+0x10/0x10 [ 16.312414] ret_from_fork_asm+0x1a/0x30 [ 16.312451] </TASK> [ 16.312517] [ 16.336332] Allocated by task 244: [ 16.336972] kasan_save_stack+0x45/0x70 [ 16.337657] kasan_save_track+0x18/0x40 [ 16.338002] kasan_save_alloc_info+0x3b/0x50 [ 16.338246] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.338442] remove_element+0x11e/0x190 [ 16.338686] mempool_alloc_preallocated+0x4d/0x90 [ 16.339792] mempool_uaf_helper+0x96/0x400 [ 16.340277] mempool_kmalloc_uaf+0xef/0x140 [ 16.340896] kunit_try_run_case+0x1a5/0x480 [ 16.341345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.341778] kthread+0x337/0x6f0 [ 16.342116] ret_from_fork+0x116/0x1d0 [ 16.342524] ret_from_fork_asm+0x1a/0x30 [ 16.343099] [ 16.343308] Freed by task 244: [ 16.344112] kasan_save_stack+0x45/0x70 [ 16.344359] kasan_save_track+0x18/0x40 [ 16.344781] kasan_save_free_info+0x3f/0x60 [ 16.345389] __kasan_mempool_poison_object+0x131/0x1d0 [ 16.346013] mempool_free+0x2ec/0x380 [ 16.346562] mempool_uaf_helper+0x11a/0x400 [ 16.347123] mempool_kmalloc_uaf+0xef/0x140 [ 16.347646] kunit_try_run_case+0x1a5/0x480 [ 16.348352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.348752] kthread+0x337/0x6f0 [ 16.349048] ret_from_fork+0x116/0x1d0 [ 16.349997] ret_from_fork_asm+0x1a/0x30 [ 16.350446] [ 16.350586] The buggy address belongs to the object at ffff8881033dc500 [ 16.350586] which belongs to the cache kmalloc-128 of size 128 [ 16.351598] The buggy address is located 0 bytes inside of [ 16.351598] freed 128-byte region [ffff8881033dc500, ffff8881033dc580) [ 16.352697] [ 16.352927] The buggy address belongs to the physical page: [ 16.353328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 16.353861] flags: 0x200000000000000(node=0|zone=2) [ 16.355251] page_type: f5(slab) [ 16.355565] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.356013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.356811] page dumped because: kasan: bad access detected [ 16.357160] [ 16.357563] Memory state around the buggy address: [ 16.357824] ffff8881033dc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.358276] ffff8881033dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.358744] >ffff8881033dc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.359119] ^ [ 16.359922] ffff8881033dc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360867] ffff8881033dc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.362093] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
Automatically assigned
[ 16.228328] ================================================================== [ 16.229002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.229669] Read of size 1 at addr ffff888103962001 by task kunit_try_catch/240 [ 16.230351] [ 16.230545] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.230651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.230683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.230730] Call Trace: [ 16.230760] <TASK> [ 16.230798] dump_stack_lvl+0x73/0xb0 [ 16.230864] print_report+0xd1/0x650 [ 16.230913] ? __virt_addr_valid+0x1db/0x2d0 [ 16.230956] ? mempool_oob_right_helper+0x318/0x380 [ 16.230986] ? kasan_addr_to_slab+0x11/0xa0 [ 16.231017] ? mempool_oob_right_helper+0x318/0x380 [ 16.231044] kasan_report+0x141/0x180 [ 16.231071] ? mempool_oob_right_helper+0x318/0x380 [ 16.231116] __asan_report_load1_noabort+0x18/0x20 [ 16.231148] mempool_oob_right_helper+0x318/0x380 [ 16.231175] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.231212] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.231598] ? finish_task_switch.isra.0+0x153/0x700 [ 16.231716] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 16.231811] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 16.231900] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.231953] ? __pfx_mempool_kfree+0x10/0x10 [ 16.232007] ? __pfx_read_tsc+0x10/0x10 [ 16.232055] ? ktime_get_ts64+0x86/0x230 [ 16.232105] kunit_try_run_case+0x1a5/0x480 [ 16.232132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.232154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.232182] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.232232] ? __kthread_parkme+0x82/0x180 [ 16.232266] ? preempt_count_sub+0x50/0x80 [ 16.232291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.232315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.232341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.232368] kthread+0x337/0x6f0 [ 16.232389] ? trace_preempt_on+0x20/0xc0 [ 16.232415] ? __pfx_kthread+0x10/0x10 [ 16.232438] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.232479] ? calculate_sigpending+0x7b/0xa0 [ 16.232509] ? __pfx_kthread+0x10/0x10 [ 16.232532] ret_from_fork+0x116/0x1d0 [ 16.232553] ? __pfx_kthread+0x10/0x10 [ 16.232575] ret_from_fork_asm+0x1a/0x30 [ 16.232607] </TASK> [ 16.232621] [ 16.247112] The buggy address belongs to the physical page: [ 16.248346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103960 [ 16.248859] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.249176] flags: 0x200000000000040(head|node=0|zone=2) [ 16.249531] page_type: f8(unknown) [ 16.249759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.250196] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.251100] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.251373] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.252210] head: 0200000000000002 ffffea00040e5801 00000000ffffffff 00000000ffffffff [ 16.252659] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.253017] page dumped because: kasan: bad access detected [ 16.253725] [ 16.253843] Memory state around the buggy address: [ 16.254062] ffff888103961f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.254847] ffff888103961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.255191] >ffff888103962000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.256012] ^ [ 16.256300] ffff888103962080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.256839] ffff888103962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.257366] ================================================================== [ 16.183500] ================================================================== [ 16.184178] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.184778] Read of size 1 at addr ffff888103341073 by task kunit_try_catch/238 [ 16.185522] [ 16.186072] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.186194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.186697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.186764] Call Trace: [ 16.186797] <TASK> [ 16.186839] dump_stack_lvl+0x73/0xb0 [ 16.186915] print_report+0xd1/0x650 [ 16.186964] ? __virt_addr_valid+0x1db/0x2d0 [ 16.187014] ? mempool_oob_right_helper+0x318/0x380 [ 16.187060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.187110] ? mempool_oob_right_helper+0x318/0x380 [ 16.187161] kasan_report+0x141/0x180 [ 16.187202] ? mempool_oob_right_helper+0x318/0x380 [ 16.187292] __asan_report_load1_noabort+0x18/0x20 [ 16.187382] mempool_oob_right_helper+0x318/0x380 [ 16.187426] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.187482] ? update_load_avg+0x1be/0x21b0 [ 16.187516] ? dequeue_entities+0x27e/0x1740 [ 16.187547] ? finish_task_switch.isra.0+0x153/0x700 [ 16.187575] mempool_kmalloc_oob_right+0xf2/0x150 [ 16.187601] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 16.187628] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.187651] ? __pfx_mempool_kfree+0x10/0x10 [ 16.187675] ? __pfx_read_tsc+0x10/0x10 [ 16.187750] ? ktime_get_ts64+0x86/0x230 [ 16.187801] kunit_try_run_case+0x1a5/0x480 [ 16.187836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.187858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.187884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.187910] ? __kthread_parkme+0x82/0x180 [ 16.187933] ? preempt_count_sub+0x50/0x80 [ 16.187957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.187979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.188004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.188029] kthread+0x337/0x6f0 [ 16.188050] ? trace_preempt_on+0x20/0xc0 [ 16.188075] ? __pfx_kthread+0x10/0x10 [ 16.188097] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.188119] ? calculate_sigpending+0x7b/0xa0 [ 16.188144] ? __pfx_kthread+0x10/0x10 [ 16.188169] ret_from_fork+0x116/0x1d0 [ 16.188190] ? __pfx_kthread+0x10/0x10 [ 16.188243] ret_from_fork_asm+0x1a/0x30 [ 16.188279] </TASK> [ 16.188293] [ 16.202417] Allocated by task 238: [ 16.202908] kasan_save_stack+0x45/0x70 [ 16.203384] kasan_save_track+0x18/0x40 [ 16.203789] kasan_save_alloc_info+0x3b/0x50 [ 16.204247] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.204589] remove_element+0x11e/0x190 [ 16.204798] mempool_alloc_preallocated+0x4d/0x90 [ 16.205010] mempool_oob_right_helper+0x8a/0x380 [ 16.205265] mempool_kmalloc_oob_right+0xf2/0x150 [ 16.205670] kunit_try_run_case+0x1a5/0x480 [ 16.206066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.206671] kthread+0x337/0x6f0 [ 16.207104] ret_from_fork+0x116/0x1d0 [ 16.207516] ret_from_fork_asm+0x1a/0x30 [ 16.207875] [ 16.208004] The buggy address belongs to the object at ffff888103341000 [ 16.208004] which belongs to the cache kmalloc-128 of size 128 [ 16.209641] The buggy address is located 0 bytes to the right of [ 16.209641] allocated 115-byte region [ffff888103341000, ffff888103341073) [ 16.210407] [ 16.210672] The buggy address belongs to the physical page: [ 16.211312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 16.212727] flags: 0x200000000000000(node=0|zone=2) [ 16.213419] page_type: f5(slab) [ 16.213945] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.214291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.214872] page dumped because: kasan: bad access detected [ 16.215426] [ 16.215625] Memory state around the buggy address: [ 16.216623] ffff888103340f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.217615] ffff888103340f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.218152] >ffff888103341000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.218737] ^ [ 16.219338] ffff888103341080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.220330] ffff888103341100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.221351] ================================================================== [ 16.264999] ================================================================== [ 16.265701] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.266681] Read of size 1 at addr ffff8881033452bb by task kunit_try_catch/242 [ 16.267164] [ 16.267796] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.267913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.267942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.267980] Call Trace: [ 16.267999] <TASK> [ 16.268028] dump_stack_lvl+0x73/0xb0 [ 16.268089] print_report+0xd1/0x650 [ 16.268117] ? __virt_addr_valid+0x1db/0x2d0 [ 16.268143] ? mempool_oob_right_helper+0x318/0x380 [ 16.268168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.268195] ? mempool_oob_right_helper+0x318/0x380 [ 16.268415] kasan_report+0x141/0x180 [ 16.268443] ? mempool_oob_right_helper+0x318/0x380 [ 16.268498] __asan_report_load1_noabort+0x18/0x20 [ 16.268522] mempool_oob_right_helper+0x318/0x380 [ 16.268547] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.268575] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.268601] ? finish_task_switch.isra.0+0x153/0x700 [ 16.268629] mempool_slab_oob_right+0xed/0x140 [ 16.268652] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 16.268679] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 16.268702] ? __pfx_mempool_free_slab+0x10/0x10 [ 16.268726] ? __pfx_read_tsc+0x10/0x10 [ 16.268750] ? ktime_get_ts64+0x86/0x230 [ 16.268776] kunit_try_run_case+0x1a5/0x480 [ 16.268800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.268821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.268848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.268873] ? __kthread_parkme+0x82/0x180 [ 16.268896] ? preempt_count_sub+0x50/0x80 [ 16.268920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.268943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.268970] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.268996] kthread+0x337/0x6f0 [ 16.269016] ? trace_preempt_on+0x20/0xc0 [ 16.269042] ? __pfx_kthread+0x10/0x10 [ 16.269065] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.269089] ? calculate_sigpending+0x7b/0xa0 [ 16.269115] ? __pfx_kthread+0x10/0x10 [ 16.269138] ret_from_fork+0x116/0x1d0 [ 16.269158] ? __pfx_kthread+0x10/0x10 [ 16.269181] ret_from_fork_asm+0x1a/0x30 [ 16.269246] </TASK> [ 16.269263] [ 16.280444] Allocated by task 242: [ 16.280715] kasan_save_stack+0x45/0x70 [ 16.280967] kasan_save_track+0x18/0x40 [ 16.281316] kasan_save_alloc_info+0x3b/0x50 [ 16.281662] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 16.282021] remove_element+0x11e/0x190 [ 16.282281] mempool_alloc_preallocated+0x4d/0x90 [ 16.282536] mempool_oob_right_helper+0x8a/0x380 [ 16.282899] mempool_slab_oob_right+0xed/0x140 [ 16.283277] kunit_try_run_case+0x1a5/0x480 [ 16.283593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.283848] kthread+0x337/0x6f0 [ 16.284077] ret_from_fork+0x116/0x1d0 [ 16.284292] ret_from_fork_asm+0x1a/0x30 [ 16.284512] [ 16.284701] The buggy address belongs to the object at ffff888103345240 [ 16.284701] which belongs to the cache test_cache of size 123 [ 16.285600] The buggy address is located 0 bytes to the right of [ 16.285600] allocated 123-byte region [ffff888103345240, ffff8881033452bb) [ 16.286326] [ 16.286452] The buggy address belongs to the physical page: [ 16.286679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103345 [ 16.286974] flags: 0x200000000000000(node=0|zone=2) [ 16.287330] page_type: f5(slab) [ 16.287658] raw: 0200000000000000 ffff888103342000 dead000000000122 0000000000000000 [ 16.288259] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 16.288810] page dumped because: kasan: bad access detected [ 16.289186] [ 16.289355] Memory state around the buggy address: [ 16.289622] ffff888103345180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.289889] ffff888103345200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 16.291715] >ffff888103345280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 16.292297] ^ [ 16.292624] ffff888103345300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.293005] ffff888103345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.294632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
Automatically assigned
[ 15.597414] ================================================================== [ 15.597876] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 15.598242] Read of size 1 at addr ffff888101117c80 by task kunit_try_catch/232 [ 15.598749] [ 15.599331] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.599439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.599465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.599525] Call Trace: [ 15.599544] <TASK> [ 15.599586] dump_stack_lvl+0x73/0xb0 [ 15.599647] print_report+0xd1/0x650 [ 15.599680] ? __virt_addr_valid+0x1db/0x2d0 [ 15.599761] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.599787] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.599814] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.599838] kasan_report+0x141/0x180 [ 15.599864] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.599892] ? kmem_cache_double_destroy+0x1bf/0x380 [ 15.599917] __kasan_check_byte+0x3d/0x50 [ 15.599942] kmem_cache_destroy+0x25/0x1d0 [ 15.599970] kmem_cache_double_destroy+0x1bf/0x380 [ 15.600214] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 15.600266] ? finish_task_switch.isra.0+0x153/0x700 [ 15.600300] ? __switch_to+0x47/0xf50 [ 15.600334] ? __pfx_read_tsc+0x10/0x10 [ 15.600362] ? ktime_get_ts64+0x86/0x230 [ 15.600393] kunit_try_run_case+0x1a5/0x480 [ 15.600420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.600441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.600492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.600520] ? __kthread_parkme+0x82/0x180 [ 15.600545] ? preempt_count_sub+0x50/0x80 [ 15.600570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.600594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.600622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.600649] kthread+0x337/0x6f0 [ 15.600671] ? trace_preempt_on+0x20/0xc0 [ 15.600699] ? __pfx_kthread+0x10/0x10 [ 15.600724] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.600750] ? calculate_sigpending+0x7b/0xa0 [ 15.600779] ? __pfx_kthread+0x10/0x10 [ 15.600803] ret_from_fork+0x116/0x1d0 [ 15.600825] ? __pfx_kthread+0x10/0x10 [ 15.600848] ret_from_fork_asm+0x1a/0x30 [ 15.600882] </TASK> [ 15.600897] [ 15.610757] Allocated by task 232: [ 15.611008] kasan_save_stack+0x45/0x70 [ 15.611384] kasan_save_track+0x18/0x40 [ 15.611565] kasan_save_alloc_info+0x3b/0x50 [ 15.612236] __kasan_slab_alloc+0x91/0xa0 [ 15.612379] kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.612585] __kmem_cache_create_args+0x169/0x240 [ 15.613073] kmem_cache_double_destroy+0xd5/0x380 [ 15.613288] kunit_try_run_case+0x1a5/0x480 [ 15.613577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.613963] kthread+0x337/0x6f0 [ 15.614202] ret_from_fork+0x116/0x1d0 [ 15.614422] ret_from_fork_asm+0x1a/0x30 [ 15.614649] [ 15.614881] Freed by task 232: [ 15.615060] kasan_save_stack+0x45/0x70 [ 15.615296] kasan_save_track+0x18/0x40 [ 15.615562] kasan_save_free_info+0x3f/0x60 [ 15.615970] __kasan_slab_free+0x56/0x70 [ 15.616539] kmem_cache_free+0x249/0x420 [ 15.616874] slab_kmem_cache_release+0x2e/0x40 [ 15.617009] kmem_cache_release+0x16/0x20 [ 15.617129] kobject_put+0x181/0x450 [ 15.617555] sysfs_slab_release+0x16/0x20 [ 15.617836] kmem_cache_destroy+0xf0/0x1d0 [ 15.618084] kmem_cache_double_destroy+0x14e/0x380 [ 15.618431] kunit_try_run_case+0x1a5/0x480 [ 15.618600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.619099] kthread+0x337/0x6f0 [ 15.619390] ret_from_fork+0x116/0x1d0 [ 15.619606] ret_from_fork_asm+0x1a/0x30 [ 15.620272] [ 15.620370] The buggy address belongs to the object at ffff888101117c80 [ 15.620370] which belongs to the cache kmem_cache of size 208 [ 15.620888] The buggy address is located 0 bytes inside of [ 15.620888] freed 208-byte region [ffff888101117c80, ffff888101117d50) [ 15.621351] [ 15.621480] The buggy address belongs to the physical page: [ 15.621725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101117 [ 15.622150] flags: 0x200000000000000(node=0|zone=2) [ 15.622299] page_type: f5(slab) [ 15.622407] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000 [ 15.623008] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 15.623408] page dumped because: kasan: bad access detected [ 15.623606] [ 15.624035] Memory state around the buggy address: [ 15.624365] ffff888101117b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.624771] ffff888101117c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.625014] >ffff888101117c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.625370] ^ [ 15.625553] ffff888101117d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 15.625946] ffff888101117d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.626160] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
Automatically assigned
[ 15.533056] ================================================================== [ 15.533722] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510 [ 15.533961] Read of size 1 at addr ffff8881033e6000 by task kunit_try_catch/230 [ 15.534130] [ 15.534602] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.534671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.534686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.534713] Call Trace: [ 15.534732] <TASK> [ 15.534760] dump_stack_lvl+0x73/0xb0 [ 15.534799] print_report+0xd1/0x650 [ 15.534829] ? __virt_addr_valid+0x1db/0x2d0 [ 15.534858] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 15.534918] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.534945] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 15.534971] kasan_report+0x141/0x180 [ 15.534997] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 15.535028] __asan_report_load1_noabort+0x18/0x20 [ 15.535051] kmem_cache_rcu_uaf+0x3e3/0x510 [ 15.535077] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [ 15.535102] ? finish_task_switch.isra.0+0x153/0x700 [ 15.535129] ? __switch_to+0x47/0xf50 [ 15.535162] ? __pfx_read_tsc+0x10/0x10 [ 15.535188] ? ktime_get_ts64+0x86/0x230 [ 15.535217] kunit_try_run_case+0x1a5/0x480 [ 15.535243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.535265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.535294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.535321] ? __kthread_parkme+0x82/0x180 [ 15.535379] ? preempt_count_sub+0x50/0x80 [ 15.535412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.535435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.535476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.535506] kthread+0x337/0x6f0 [ 15.535528] ? trace_preempt_on+0x20/0xc0 [ 15.535556] ? __pfx_kthread+0x10/0x10 [ 15.535610] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.535635] ? calculate_sigpending+0x7b/0xa0 [ 15.535663] ? __pfx_kthread+0x10/0x10 [ 15.535687] ret_from_fork+0x116/0x1d0 [ 15.535708] ? __pfx_kthread+0x10/0x10 [ 15.535732] ret_from_fork_asm+0x1a/0x30 [ 15.535767] </TASK> [ 15.535781] [ 15.544363] Allocated by task 230: [ 15.545269] kasan_save_stack+0x45/0x70 [ 15.545524] kasan_save_track+0x18/0x40 [ 15.546178] kasan_save_alloc_info+0x3b/0x50 [ 15.546448] __kasan_slab_alloc+0x91/0xa0 [ 15.546696] kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.546978] kmem_cache_rcu_uaf+0x155/0x510 [ 15.547237] kunit_try_run_case+0x1a5/0x480 [ 15.547515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547805] kthread+0x337/0x6f0 [ 15.548008] ret_from_fork+0x116/0x1d0 [ 15.548239] ret_from_fork_asm+0x1a/0x30 [ 15.548642] [ 15.549269] Freed by task 0: [ 15.549372] kasan_save_stack+0x45/0x70 [ 15.549616] kasan_save_track+0x18/0x40 [ 15.549843] kasan_save_free_info+0x3f/0x60 [ 15.550291] __kasan_slab_free+0x56/0x70 [ 15.550730] slab_free_after_rcu_debug+0xe4/0x310 [ 15.551178] rcu_core+0x66f/0x1c40 [ 15.551453] rcu_core_si+0x12/0x20 [ 15.551697] handle_softirqs+0x209/0x730 [ 15.552654] __irq_exit_rcu+0xc9/0x110 [ 15.552968] irq_exit_rcu+0x12/0x20 [ 15.553383] sysvec_apic_timer_interrupt+0x81/0x90 [ 15.553844] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 15.554431] [ 15.554689] Last potentially related work creation: [ 15.555043] kasan_save_stack+0x45/0x70 [ 15.555496] kasan_record_aux_stack+0xb2/0xc0 [ 15.555936] kmem_cache_free+0x131/0x420 [ 15.556362] kmem_cache_rcu_uaf+0x194/0x510 [ 15.556668] kunit_try_run_case+0x1a5/0x480 [ 15.557122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.557414] kthread+0x337/0x6f0 [ 15.557659] ret_from_fork+0x116/0x1d0 [ 15.558220] ret_from_fork_asm+0x1a/0x30 [ 15.558675] [ 15.558919] The buggy address belongs to the object at ffff8881033e6000 [ 15.558919] which belongs to the cache test_cache of size 200 [ 15.559213] The buggy address is located 0 bytes inside of [ 15.559213] freed 200-byte region [ffff8881033e6000, ffff8881033e60c8) [ 15.560212] [ 15.560349] The buggy address belongs to the physical page: [ 15.560669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033e6 [ 15.561009] flags: 0x200000000000000(node=0|zone=2) [ 15.561162] page_type: f5(slab) [ 15.561393] raw: 0200000000000000 ffff8881033e3000 dead000000000122 0000000000000000 [ 15.562159] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 15.562671] page dumped because: kasan: bad access detected [ 15.563110] [ 15.563520] Memory state around the buggy address: [ 15.563702] ffff8881033e5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.563903] ffff8881033e5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.564236] >ffff8881033e6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.564510] ^ [ 15.564771] ffff8881033e6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 15.565023] ffff8881033e6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.565273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
Automatically assigned
[ 15.471367] ================================================================== [ 15.471906] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 15.472372] Free of addr ffff88810333d001 by task kunit_try_catch/228 [ 15.472896] [ 15.473048] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.473111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.473126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.473150] Call Trace: [ 15.473168] <TASK> [ 15.473194] dump_stack_lvl+0x73/0xb0 [ 15.473238] print_report+0xd1/0x650 [ 15.473267] ? __virt_addr_valid+0x1db/0x2d0 [ 15.473313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.473341] ? kmem_cache_invalid_free+0x1d8/0x460 [ 15.473366] kasan_report_invalid_free+0x10a/0x130 [ 15.473396] ? kmem_cache_invalid_free+0x1d8/0x460 [ 15.473432] ? kmem_cache_invalid_free+0x1d8/0x460 [ 15.473469] check_slab_allocation+0x11f/0x130 [ 15.473500] __kasan_slab_pre_free+0x28/0x40 [ 15.473524] kmem_cache_free+0xed/0x420 [ 15.473548] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.473572] ? kmem_cache_invalid_free+0x1d8/0x460 [ 15.473601] kmem_cache_invalid_free+0x1d8/0x460 [ 15.473625] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 15.473648] ? finish_task_switch.isra.0+0x153/0x700 [ 15.473676] ? __switch_to+0x47/0xf50 [ 15.473715] ? __pfx_read_tsc+0x10/0x10 [ 15.473806] ? ktime_get_ts64+0x86/0x230 [ 15.473868] kunit_try_run_case+0x1a5/0x480 [ 15.473900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.473955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.473982] ? __kthread_parkme+0x82/0x180 [ 15.474006] ? preempt_count_sub+0x50/0x80 [ 15.474033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.474057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.474083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.474108] kthread+0x337/0x6f0 [ 15.474129] ? trace_preempt_on+0x20/0xc0 [ 15.474158] ? __pfx_kthread+0x10/0x10 [ 15.474181] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.474223] ? calculate_sigpending+0x7b/0xa0 [ 15.474254] ? __pfx_kthread+0x10/0x10 [ 15.474280] ret_from_fork+0x116/0x1d0 [ 15.474301] ? __pfx_kthread+0x10/0x10 [ 15.474325] ret_from_fork_asm+0x1a/0x30 [ 15.474369] </TASK> [ 15.474383] [ 15.484781] Allocated by task 228: [ 15.485117] kasan_save_stack+0x45/0x70 [ 15.485298] kasan_save_track+0x18/0x40 [ 15.485407] kasan_save_alloc_info+0x3b/0x50 [ 15.485824] __kasan_slab_alloc+0x91/0xa0 [ 15.486009] kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.486127] kmem_cache_invalid_free+0x157/0x460 [ 15.486420] kunit_try_run_case+0x1a5/0x480 [ 15.486818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.487185] kthread+0x337/0x6f0 [ 15.487325] ret_from_fork+0x116/0x1d0 [ 15.487564] ret_from_fork_asm+0x1a/0x30 [ 15.488163] [ 15.488291] The buggy address belongs to the object at ffff88810333d000 [ 15.488291] which belongs to the cache test_cache of size 200 [ 15.488869] The buggy address is located 1 bytes inside of [ 15.488869] 200-byte region [ffff88810333d000, ffff88810333d0c8) [ 15.489186] [ 15.489362] The buggy address belongs to the physical page: [ 15.489588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10333d [ 15.490055] flags: 0x200000000000000(node=0|zone=2) [ 15.490270] page_type: f5(slab) [ 15.490440] raw: 0200000000000000 ffff888101117b40 dead000000000122 0000000000000000 [ 15.490754] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 15.491108] page dumped because: kasan: bad access detected [ 15.491442] [ 15.491521] Memory state around the buggy address: [ 15.491870] ffff88810333cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.492175] ffff88810333cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.492535] >ffff88810333d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.493193] ^ [ 15.493407] ffff88810333d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 15.493696] ffff88810333d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.494095] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
Automatically assigned
[ 15.430609] ================================================================== [ 15.431132] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480 [ 15.431324] Free of addr ffff8881033e3000 by task kunit_try_catch/226 [ 15.431522] [ 15.431745] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.431809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.431824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.431875] Call Trace: [ 15.431892] <TASK> [ 15.431918] dump_stack_lvl+0x73/0xb0 [ 15.431952] print_report+0xd1/0x650 [ 15.431979] ? __virt_addr_valid+0x1db/0x2d0 [ 15.432009] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.432058] ? kmem_cache_double_free+0x1e5/0x480 [ 15.432083] kasan_report_invalid_free+0x10a/0x130 [ 15.432109] ? kmem_cache_double_free+0x1e5/0x480 [ 15.432132] ? kmem_cache_double_free+0x1e5/0x480 [ 15.432154] check_slab_allocation+0x101/0x130 [ 15.432178] __kasan_slab_pre_free+0x28/0x40 [ 15.432201] kmem_cache_free+0xed/0x420 [ 15.432276] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.432299] ? kmem_cache_double_free+0x1e5/0x480 [ 15.432324] kmem_cache_double_free+0x1e5/0x480 [ 15.432346] ? __pfx_kmem_cache_double_free+0x10/0x10 [ 15.432368] ? finish_task_switch.isra.0+0x153/0x700 [ 15.432395] ? __switch_to+0x47/0xf50 [ 15.432427] ? __pfx_read_tsc+0x10/0x10 [ 15.432463] ? ktime_get_ts64+0x86/0x230 [ 15.432494] kunit_try_run_case+0x1a5/0x480 [ 15.432520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.432541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.432570] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.432597] ? __kthread_parkme+0x82/0x180 [ 15.432620] ? preempt_count_sub+0x50/0x80 [ 15.432644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.432666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.432693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.432976] kthread+0x337/0x6f0 [ 15.433041] ? trace_preempt_on+0x20/0xc0 [ 15.433075] ? __pfx_kthread+0x10/0x10 [ 15.433122] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.433171] ? calculate_sigpending+0x7b/0xa0 [ 15.433203] ? __pfx_kthread+0x10/0x10 [ 15.433228] ret_from_fork+0x116/0x1d0 [ 15.433251] ? __pfx_kthread+0x10/0x10 [ 15.433273] ret_from_fork_asm+0x1a/0x30 [ 15.433309] </TASK> [ 15.433323] [ 15.444120] Allocated by task 226: [ 15.444502] kasan_save_stack+0x45/0x70 [ 15.444844] kasan_save_track+0x18/0x40 [ 15.445301] kasan_save_alloc_info+0x3b/0x50 [ 15.445496] __kasan_slab_alloc+0x91/0xa0 [ 15.445607] kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.445833] kmem_cache_double_free+0x14f/0x480 [ 15.446445] kunit_try_run_case+0x1a5/0x480 [ 15.446591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.447009] kthread+0x337/0x6f0 [ 15.447251] ret_from_fork+0x116/0x1d0 [ 15.447605] ret_from_fork_asm+0x1a/0x30 [ 15.447780] [ 15.448153] Freed by task 226: [ 15.448590] kasan_save_stack+0x45/0x70 [ 15.448818] kasan_save_track+0x18/0x40 [ 15.449038] kasan_save_free_info+0x3f/0x60 [ 15.449147] __kasan_slab_free+0x56/0x70 [ 15.449290] kmem_cache_free+0x249/0x420 [ 15.449650] kmem_cache_double_free+0x16a/0x480 [ 15.450079] kunit_try_run_case+0x1a5/0x480 [ 15.450322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.450593] kthread+0x337/0x6f0 [ 15.450815] ret_from_fork+0x116/0x1d0 [ 15.451372] ret_from_fork_asm+0x1a/0x30 [ 15.451634] [ 15.452047] The buggy address belongs to the object at ffff8881033e3000 [ 15.452047] which belongs to the cache test_cache of size 200 [ 15.452703] The buggy address is located 0 bytes inside of [ 15.452703] 200-byte region [ffff8881033e3000, ffff8881033e30c8) [ 15.453586] [ 15.453783] The buggy address belongs to the physical page: [ 15.454112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033e3 [ 15.454844] flags: 0x200000000000000(node=0|zone=2) [ 15.455123] page_type: f5(slab) [ 15.455253] raw: 0200000000000000 ffff8881018acdc0 dead000000000122 0000000000000000 [ 15.455765] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 15.456270] page dumped because: kasan: bad access detected [ 15.456424] [ 15.456511] Memory state around the buggy address: [ 15.456645] ffff8881033e2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.457378] ffff8881033e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.457998] >ffff8881033e3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.458412] ^ [ 15.458624] ffff8881033e3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 15.459217] ffff8881033e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.459432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
Automatically assigned
[ 15.385322] ================================================================== [ 15.385738] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 15.385981] Read of size 1 at addr ffff88810333b0c8 by task kunit_try_catch/224 [ 15.386135] [ 15.386570] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.386630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.386644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.386669] Call Trace: [ 15.386684] <TASK> [ 15.386710] dump_stack_lvl+0x73/0xb0 [ 15.386746] print_report+0xd1/0x650 [ 15.386771] ? __virt_addr_valid+0x1db/0x2d0 [ 15.386799] ? kmem_cache_oob+0x402/0x530 [ 15.386819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.386843] ? kmem_cache_oob+0x402/0x530 [ 15.386863] kasan_report+0x141/0x180 [ 15.386887] ? kmem_cache_oob+0x402/0x530 [ 15.386912] __asan_report_load1_noabort+0x18/0x20 [ 15.386934] kmem_cache_oob+0x402/0x530 [ 15.386954] ? trace_hardirqs_on+0x37/0xe0 [ 15.386981] ? __pfx_kmem_cache_oob+0x10/0x10 [ 15.387001] ? finish_task_switch.isra.0+0x153/0x700 [ 15.387026] ? __switch_to+0x47/0xf50 [ 15.387058] ? __pfx_read_tsc+0x10/0x10 [ 15.387082] ? ktime_get_ts64+0x86/0x230 [ 15.387201] kunit_try_run_case+0x1a5/0x480 [ 15.387231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.387252] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.387280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.387306] ? __kthread_parkme+0x82/0x180 [ 15.387330] ? preempt_count_sub+0x50/0x80 [ 15.387367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.387392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.387419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.387445] kthread+0x337/0x6f0 [ 15.387491] ? trace_preempt_on+0x20/0xc0 [ 15.387516] ? __pfx_kthread+0x10/0x10 [ 15.387540] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.387563] ? calculate_sigpending+0x7b/0xa0 [ 15.387590] ? __pfx_kthread+0x10/0x10 [ 15.387613] ret_from_fork+0x116/0x1d0 [ 15.387635] ? __pfx_kthread+0x10/0x10 [ 15.387656] ret_from_fork_asm+0x1a/0x30 [ 15.387689] </TASK> [ 15.387743] [ 15.397840] Allocated by task 224: [ 15.398410] kasan_save_stack+0x45/0x70 [ 15.398753] kasan_save_track+0x18/0x40 [ 15.399032] kasan_save_alloc_info+0x3b/0x50 [ 15.399263] __kasan_slab_alloc+0x91/0xa0 [ 15.399378] kmem_cache_alloc_noprof+0x123/0x3f0 [ 15.399728] kmem_cache_oob+0x157/0x530 [ 15.399950] kunit_try_run_case+0x1a5/0x480 [ 15.400064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.400603] kthread+0x337/0x6f0 [ 15.400865] ret_from_fork+0x116/0x1d0 [ 15.400996] ret_from_fork_asm+0x1a/0x30 [ 15.401171] [ 15.401345] The buggy address belongs to the object at ffff88810333b000 [ 15.401345] which belongs to the cache test_cache of size 200 [ 15.402046] The buggy address is located 0 bytes to the right of [ 15.402046] allocated 200-byte region [ffff88810333b000, ffff88810333b0c8) [ 15.402675] [ 15.403363] The buggy address belongs to the physical page: [ 15.403551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10333b [ 15.404058] flags: 0x200000000000000(node=0|zone=2) [ 15.404488] page_type: f5(slab) [ 15.404844] raw: 0200000000000000 ffff888101117a00 dead000000000122 0000000000000000 [ 15.405229] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 15.405585] page dumped because: kasan: bad access detected [ 15.405964] [ 15.406068] Memory state around the buggy address: [ 15.406386] ffff88810333af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.406822] ffff88810333b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.407224] >ffff88810333b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 15.407676] ^ [ 15.408220] ffff88810333b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.409063] ffff88810333b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.409379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
Automatically assigned
[ 15.338717] ================================================================== [ 15.339155] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560 [ 15.339428] Read of size 8 at addr ffff8881033355c0 by task kunit_try_catch/217 [ 15.340046] [ 15.340406] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.340483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.340499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.340523] Call Trace: [ 15.340540] <TASK> [ 15.340583] dump_stack_lvl+0x73/0xb0 [ 15.340622] print_report+0xd1/0x650 [ 15.340649] ? __virt_addr_valid+0x1db/0x2d0 [ 15.340677] ? workqueue_uaf+0x4d6/0x560 [ 15.340807] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.340835] ? workqueue_uaf+0x4d6/0x560 [ 15.340859] kasan_report+0x141/0x180 [ 15.340884] ? workqueue_uaf+0x4d6/0x560 [ 15.340913] __asan_report_load8_noabort+0x18/0x20 [ 15.340936] workqueue_uaf+0x4d6/0x560 [ 15.340960] ? __pfx_workqueue_uaf+0x10/0x10 [ 15.340985] ? __schedule+0x10cc/0x2b60 [ 15.341013] ? __pfx_read_tsc+0x10/0x10 [ 15.341040] ? ktime_get_ts64+0x86/0x230 [ 15.341069] kunit_try_run_case+0x1a5/0x480 [ 15.341093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.341114] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.341140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.341164] ? __kthread_parkme+0x82/0x180 [ 15.341211] ? preempt_count_sub+0x50/0x80 [ 15.341238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.341260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.341297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.341321] kthread+0x337/0x6f0 [ 15.341343] ? trace_preempt_on+0x20/0xc0 [ 15.341368] ? __pfx_kthread+0x10/0x10 [ 15.341412] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.341436] ? calculate_sigpending+0x7b/0xa0 [ 15.341476] ? __pfx_kthread+0x10/0x10 [ 15.341501] ret_from_fork+0x116/0x1d0 [ 15.341522] ? __pfx_kthread+0x10/0x10 [ 15.341543] ret_from_fork_asm+0x1a/0x30 [ 15.341580] </TASK> [ 15.341594] [ 15.350474] Allocated by task 217: [ 15.350782] kasan_save_stack+0x45/0x70 [ 15.351241] kasan_save_track+0x18/0x40 [ 15.351545] kasan_save_alloc_info+0x3b/0x50 [ 15.352076] __kasan_kmalloc+0xb7/0xc0 [ 15.352477] __kmalloc_cache_noprof+0x189/0x420 [ 15.352971] workqueue_uaf+0x152/0x560 [ 15.353166] kunit_try_run_case+0x1a5/0x480 [ 15.353301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.353541] kthread+0x337/0x6f0 [ 15.354129] ret_from_fork+0x116/0x1d0 [ 15.354569] ret_from_fork_asm+0x1a/0x30 [ 15.354960] [ 15.355186] Freed by task 41: [ 15.355606] kasan_save_stack+0x45/0x70 [ 15.356026] kasan_save_track+0x18/0x40 [ 15.356534] kasan_save_free_info+0x3f/0x60 [ 15.356738] __kasan_slab_free+0x56/0x70 [ 15.357011] kfree+0x222/0x3f0 [ 15.357158] workqueue_uaf_work+0x12/0x20 [ 15.357489] process_one_work+0x5ee/0xf60 [ 15.358042] worker_thread+0x758/0x1220 [ 15.358464] kthread+0x337/0x6f0 [ 15.358780] ret_from_fork+0x116/0x1d0 [ 15.359154] ret_from_fork_asm+0x1a/0x30 [ 15.359310] [ 15.359523] Last potentially related work creation: [ 15.359867] kasan_save_stack+0x45/0x70 [ 15.360507] kasan_record_aux_stack+0xb2/0xc0 [ 15.360864] __queue_work+0x626/0xeb0 [ 15.361170] queue_work_on+0xb6/0xc0 [ 15.361487] workqueue_uaf+0x26d/0x560 [ 15.361623] kunit_try_run_case+0x1a5/0x480 [ 15.361991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.362332] kthread+0x337/0x6f0 [ 15.362576] ret_from_fork+0x116/0x1d0 [ 15.362774] ret_from_fork_asm+0x1a/0x30 [ 15.362981] [ 15.363074] The buggy address belongs to the object at ffff8881033355c0 [ 15.363074] which belongs to the cache kmalloc-32 of size 32 [ 15.364208] The buggy address is located 0 bytes inside of [ 15.364208] freed 32-byte region [ffff8881033355c0, ffff8881033355e0) [ 15.365014] [ 15.365086] The buggy address belongs to the physical page: [ 15.365758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103335 [ 15.366312] flags: 0x200000000000000(node=0|zone=2) [ 15.367060] page_type: f5(slab) [ 15.367473] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 15.368046] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 15.368253] page dumped because: kasan: bad access detected [ 15.368589] [ 15.368828] Memory state around the buggy address: [ 15.369235] ffff888103335480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 15.369739] ffff888103335500: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 15.369912] >ffff888103335580: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 15.370066] ^ [ 15.370196] ffff888103335600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370352] ffff888103335680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370549] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
Automatically assigned
[ 15.300002] ================================================================== [ 15.300784] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 15.301173] Read of size 4 at addr ffff8881033354c0 by task swapper/1/0 [ 15.301869] [ 15.302051] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.302112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.302127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.302151] Call Trace: [ 15.302193] <IRQ> [ 15.302369] dump_stack_lvl+0x73/0xb0 [ 15.302414] print_report+0xd1/0x650 [ 15.302442] ? __virt_addr_valid+0x1db/0x2d0 [ 15.302488] ? rcu_uaf_reclaim+0x50/0x60 [ 15.302511] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.302534] ? rcu_uaf_reclaim+0x50/0x60 [ 15.302556] kasan_report+0x141/0x180 [ 15.302581] ? rcu_uaf_reclaim+0x50/0x60 [ 15.302608] __asan_report_load4_noabort+0x18/0x20 [ 15.302631] rcu_uaf_reclaim+0x50/0x60 [ 15.302653] rcu_core+0x66f/0x1c40 [ 15.302684] ? __pfx_rcu_core+0x10/0x10 [ 15.302707] ? ktime_get+0x6b/0x150 [ 15.302735] rcu_core_si+0x12/0x20 [ 15.302757] handle_softirqs+0x209/0x730 [ 15.302780] ? hrtimer_interrupt+0x2fe/0x780 [ 15.302804] ? __pfx_handle_softirqs+0x10/0x10 [ 15.302831] __irq_exit_rcu+0xc9/0x110 [ 15.302852] irq_exit_rcu+0x12/0x20 [ 15.302872] sysvec_apic_timer_interrupt+0x81/0x90 [ 15.302901] </IRQ> [ 15.302938] <TASK> [ 15.302951] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 15.303064] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 15.303375] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 23 a8 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 15.303513] RSP: 0000:ffff88810087fdc8 EFLAGS: 00010212 [ 15.303636] RAX: ffff8881cbd5b000 RBX: ffff88810085b000 RCX: ffffffff8ceb1245 [ 15.303695] RDX: ffffed102b62618b RSI: 0000000000000004 RDI: 0000000000016aec [ 15.303747] RBP: ffff88810087fdd0 R08: 0000000000000001 R09: ffffed102b62618a [ 15.303797] R10: ffff88815b130c53 R11: 0000000000039800 R12: 0000000000000001 [ 15.303849] R13: ffffed102010b600 R14: ffffffff8ebc3190 R15: 0000000000000000 [ 15.303921] ? ct_kernel_exit.constprop.0+0xa5/0xd0 [ 15.303990] ? default_idle+0xd/0x20 [ 15.304017] arch_cpu_idle+0xd/0x20 [ 15.304040] default_idle_call+0x48/0x80 [ 15.304063] do_idle+0x379/0x4f0 [ 15.304092] ? __pfx_do_idle+0x10/0x10 [ 15.304123] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 15.304153] ? complete+0x15b/0x1d0 [ 15.304186] cpu_startup_entry+0x5c/0x70 [ 15.304216] start_secondary+0x211/0x290 [ 15.304241] ? __pfx_start_secondary+0x10/0x10 [ 15.304270] common_startup_64+0x13e/0x148 [ 15.304308] </TASK> [ 15.304322] [ 15.315158] Allocated by task 215: [ 15.315547] kasan_save_stack+0x45/0x70 [ 15.315927] kasan_save_track+0x18/0x40 [ 15.316187] kasan_save_alloc_info+0x3b/0x50 [ 15.316391] __kasan_kmalloc+0xb7/0xc0 [ 15.316659] __kmalloc_cache_noprof+0x189/0x420 [ 15.316925] rcu_uaf+0xb0/0x330 [ 15.317054] kunit_try_run_case+0x1a5/0x480 [ 15.317342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.317627] kthread+0x337/0x6f0 [ 15.317813] ret_from_fork+0x116/0x1d0 [ 15.318022] ret_from_fork_asm+0x1a/0x30 [ 15.318285] [ 15.318361] Freed by task 0: [ 15.318551] kasan_save_stack+0x45/0x70 [ 15.318755] kasan_save_track+0x18/0x40 [ 15.318900] kasan_save_free_info+0x3f/0x60 [ 15.319012] __kasan_slab_free+0x56/0x70 [ 15.319131] kfree+0x222/0x3f0 [ 15.319312] rcu_uaf_reclaim+0x1f/0x60 [ 15.319432] rcu_core+0x66f/0x1c40 [ 15.319659] rcu_core_si+0x12/0x20 [ 15.319832] handle_softirqs+0x209/0x730 [ 15.320781] __irq_exit_rcu+0xc9/0x110 [ 15.321350] irq_exit_rcu+0x12/0x20 [ 15.321489] sysvec_apic_timer_interrupt+0x81/0x90 [ 15.321779] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 15.322002] [ 15.322152] Last potentially related work creation: [ 15.322502] kasan_save_stack+0x45/0x70 [ 15.322758] kasan_record_aux_stack+0xb2/0xc0 [ 15.322917] __call_rcu_common.constprop.0+0x72/0x9d0 [ 15.323189] call_rcu+0x12/0x20 [ 15.323390] rcu_uaf+0x168/0x330 [ 15.323507] kunit_try_run_case+0x1a5/0x480 [ 15.323836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.324089] kthread+0x337/0x6f0 [ 15.324317] ret_from_fork+0x116/0x1d0 [ 15.324466] ret_from_fork_asm+0x1a/0x30 [ 15.324728] [ 15.324808] The buggy address belongs to the object at ffff8881033354c0 [ 15.324808] which belongs to the cache kmalloc-32 of size 32 [ 15.325302] The buggy address is located 0 bytes inside of [ 15.325302] freed 32-byte region [ffff8881033354c0, ffff8881033354e0) [ 15.325761] [ 15.325920] The buggy address belongs to the physical page: [ 15.326061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103335 [ 15.326488] flags: 0x200000000000000(node=0|zone=2) [ 15.326680] page_type: f5(slab) [ 15.326921] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 15.327282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 15.327508] page dumped because: kasan: bad access detected [ 15.327861] [ 15.327956] Memory state around the buggy address: [ 15.328187] ffff888103335380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 15.328550] ffff888103335400: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 15.328845] >ffff888103335480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 15.329143] ^ [ 15.329378] ffff888103335500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.329710] ffff888103335580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.329960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
Automatically assigned
[ 15.218315] ================================================================== [ 15.219010] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 15.219597] Read of size 1 at addr ffff8881033dc200 by task kunit_try_catch/213 [ 15.219932] [ 15.220228] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.220334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.220362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.220408] Call Trace: [ 15.220445] <TASK> [ 15.220505] dump_stack_lvl+0x73/0xb0 [ 15.220592] print_report+0xd1/0x650 [ 15.220641] ? __virt_addr_valid+0x1db/0x2d0 [ 15.220693] ? ksize_uaf+0x5fe/0x6c0 [ 15.220749] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.220816] ? ksize_uaf+0x5fe/0x6c0 [ 15.220863] kasan_report+0x141/0x180 [ 15.220914] ? ksize_uaf+0x5fe/0x6c0 [ 15.220978] __asan_report_load1_noabort+0x18/0x20 [ 15.221041] ksize_uaf+0x5fe/0x6c0 [ 15.221092] ? __pfx_ksize_uaf+0x10/0x10 [ 15.221132] ? __schedule+0x10cc/0x2b60 [ 15.221175] ? __pfx_read_tsc+0x10/0x10 [ 15.221255] ? ktime_get_ts64+0x86/0x230 [ 15.221309] kunit_try_run_case+0x1a5/0x480 [ 15.221360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.221403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.221451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.221520] ? __kthread_parkme+0x82/0x180 [ 15.221581] ? preempt_count_sub+0x50/0x80 [ 15.221638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.221687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.221742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.221779] kthread+0x337/0x6f0 [ 15.221802] ? trace_preempt_on+0x20/0xc0 [ 15.221828] ? __pfx_kthread+0x10/0x10 [ 15.221851] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.221875] ? calculate_sigpending+0x7b/0xa0 [ 15.221903] ? __pfx_kthread+0x10/0x10 [ 15.221927] ret_from_fork+0x116/0x1d0 [ 15.221947] ? __pfx_kthread+0x10/0x10 [ 15.221969] ret_from_fork_asm+0x1a/0x30 [ 15.222003] </TASK> [ 15.222017] [ 15.232708] Allocated by task 213: [ 15.233049] kasan_save_stack+0x45/0x70 [ 15.233397] kasan_save_track+0x18/0x40 [ 15.233597] kasan_save_alloc_info+0x3b/0x50 [ 15.233978] __kasan_kmalloc+0xb7/0xc0 [ 15.234285] __kmalloc_cache_noprof+0x189/0x420 [ 15.234531] ksize_uaf+0xaa/0x6c0 [ 15.234805] kunit_try_run_case+0x1a5/0x480 [ 15.235056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.235520] kthread+0x337/0x6f0 [ 15.235722] ret_from_fork+0x116/0x1d0 [ 15.235915] ret_from_fork_asm+0x1a/0x30 [ 15.236213] [ 15.236417] Freed by task 213: [ 15.236693] kasan_save_stack+0x45/0x70 [ 15.236951] kasan_save_track+0x18/0x40 [ 15.237233] kasan_save_free_info+0x3f/0x60 [ 15.237626] __kasan_slab_free+0x56/0x70 [ 15.237841] kfree+0x222/0x3f0 [ 15.238085] ksize_uaf+0x12c/0x6c0 [ 15.238448] kunit_try_run_case+0x1a5/0x480 [ 15.238755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.239030] kthread+0x337/0x6f0 [ 15.239204] ret_from_fork+0x116/0x1d0 [ 15.239406] ret_from_fork_asm+0x1a/0x30 [ 15.239771] [ 15.239940] The buggy address belongs to the object at ffff8881033dc200 [ 15.239940] which belongs to the cache kmalloc-128 of size 128 [ 15.241087] The buggy address is located 0 bytes inside of [ 15.241087] freed 128-byte region [ffff8881033dc200, ffff8881033dc280) [ 15.241701] [ 15.241877] The buggy address belongs to the physical page: [ 15.242202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.242603] flags: 0x200000000000000(node=0|zone=2) [ 15.242841] page_type: f5(slab) [ 15.243032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.243578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.244098] page dumped because: kasan: bad access detected [ 15.244433] [ 15.244580] Memory state around the buggy address: [ 15.244788] ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.245061] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.245577] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.246074] ^ [ 15.246423] ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246781] ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.247154] ================================================================== [ 15.248769] ================================================================== [ 15.249182] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 15.251163] Read of size 1 at addr ffff8881033dc278 by task kunit_try_catch/213 [ 15.251622] [ 15.251855] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.251958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.251986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.252028] Call Trace: [ 15.252069] <TASK> [ 15.252110] dump_stack_lvl+0x73/0xb0 [ 15.252192] print_report+0xd1/0x650 [ 15.252245] ? __virt_addr_valid+0x1db/0x2d0 [ 15.252313] ? ksize_uaf+0x5e4/0x6c0 [ 15.252357] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.252404] ? ksize_uaf+0x5e4/0x6c0 [ 15.252444] kasan_report+0x141/0x180 [ 15.252505] ? ksize_uaf+0x5e4/0x6c0 [ 15.252558] __asan_report_load1_noabort+0x18/0x20 [ 15.252601] ksize_uaf+0x5e4/0x6c0 [ 15.252641] ? __pfx_ksize_uaf+0x10/0x10 [ 15.252684] ? __schedule+0x10cc/0x2b60 [ 15.252735] ? __pfx_read_tsc+0x10/0x10 [ 15.252780] ? ktime_get_ts64+0x86/0x230 [ 15.252830] kunit_try_run_case+0x1a5/0x480 [ 15.252879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.252922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.252971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.253017] ? __kthread_parkme+0x82/0x180 [ 15.253058] ? preempt_count_sub+0x50/0x80 [ 15.253111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.253150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.253194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.253276] kthread+0x337/0x6f0 [ 15.253311] ? trace_preempt_on+0x20/0xc0 [ 15.253351] ? __pfx_kthread+0x10/0x10 [ 15.253392] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.253437] ? calculate_sigpending+0x7b/0xa0 [ 15.253495] ? __pfx_kthread+0x10/0x10 [ 15.253533] ret_from_fork+0x116/0x1d0 [ 15.253570] ? __pfx_kthread+0x10/0x10 [ 15.253612] ret_from_fork_asm+0x1a/0x30 [ 15.253678] </TASK> [ 15.253701] [ 15.266605] Allocated by task 213: [ 15.266852] kasan_save_stack+0x45/0x70 [ 15.267125] kasan_save_track+0x18/0x40 [ 15.267959] kasan_save_alloc_info+0x3b/0x50 [ 15.268282] __kasan_kmalloc+0xb7/0xc0 [ 15.268886] __kmalloc_cache_noprof+0x189/0x420 [ 15.269150] ksize_uaf+0xaa/0x6c0 [ 15.269328] kunit_try_run_case+0x1a5/0x480 [ 15.269995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.270240] kthread+0x337/0x6f0 [ 15.270518] ret_from_fork+0x116/0x1d0 [ 15.270711] ret_from_fork_asm+0x1a/0x30 [ 15.271765] [ 15.271926] Freed by task 213: [ 15.272196] kasan_save_stack+0x45/0x70 [ 15.272382] kasan_save_track+0x18/0x40 [ 15.272990] kasan_save_free_info+0x3f/0x60 [ 15.273175] __kasan_slab_free+0x56/0x70 [ 15.273344] kfree+0x222/0x3f0 [ 15.273703] ksize_uaf+0x12c/0x6c0 [ 15.274017] kunit_try_run_case+0x1a5/0x480 [ 15.274282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.274927] kthread+0x337/0x6f0 [ 15.275183] ret_from_fork+0x116/0x1d0 [ 15.277079] ret_from_fork_asm+0x1a/0x30 [ 15.277289] [ 15.277397] The buggy address belongs to the object at ffff8881033dc200 [ 15.277397] which belongs to the cache kmalloc-128 of size 128 [ 15.278970] The buggy address is located 120 bytes inside of [ 15.278970] freed 128-byte region [ffff8881033dc200, ffff8881033dc280) [ 15.279790] [ 15.279921] The buggy address belongs to the physical page: [ 15.280129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.280405] flags: 0x200000000000000(node=0|zone=2) [ 15.280608] page_type: f5(slab) [ 15.280776] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.282620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.283121] page dumped because: kasan: bad access detected [ 15.284155] [ 15.284329] Memory state around the buggy address: [ 15.284614] ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.284878] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.285169] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.285525] ^ [ 15.286693] ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.287157] ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288002] ================================================================== [ 15.183372] ================================================================== [ 15.184673] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 15.185361] Read of size 1 at addr ffff8881033dc200 by task kunit_try_catch/213 [ 15.185653] [ 15.185815] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.185920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.185944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.185970] Call Trace: [ 15.185986] <TASK> [ 15.186010] dump_stack_lvl+0x73/0xb0 [ 15.186049] print_report+0xd1/0x650 [ 15.186081] ? __virt_addr_valid+0x1db/0x2d0 [ 15.186122] ? ksize_uaf+0x19d/0x6c0 [ 15.186146] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.186170] ? ksize_uaf+0x19d/0x6c0 [ 15.186196] kasan_report+0x141/0x180 [ 15.186282] ? ksize_uaf+0x19d/0x6c0 [ 15.186325] ? ksize_uaf+0x19d/0x6c0 [ 15.186385] __kasan_check_byte+0x3d/0x50 [ 15.186449] ksize+0x20/0x60 [ 15.186518] ksize_uaf+0x19d/0x6c0 [ 15.186584] ? __pfx_ksize_uaf+0x10/0x10 [ 15.186655] ? __schedule+0x10cc/0x2b60 [ 15.186728] ? __pfx_read_tsc+0x10/0x10 [ 15.186796] ? ktime_get_ts64+0x86/0x230 [ 15.186866] kunit_try_run_case+0x1a5/0x480 [ 15.186897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.186919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.186947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.186974] ? __kthread_parkme+0x82/0x180 [ 15.186998] ? preempt_count_sub+0x50/0x80 [ 15.187024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.187074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.187101] kthread+0x337/0x6f0 [ 15.187122] ? trace_preempt_on+0x20/0xc0 [ 15.187149] ? __pfx_kthread+0x10/0x10 [ 15.187172] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.187200] ? calculate_sigpending+0x7b/0xa0 [ 15.187264] ? __pfx_kthread+0x10/0x10 [ 15.187288] ret_from_fork+0x116/0x1d0 [ 15.187310] ? __pfx_kthread+0x10/0x10 [ 15.187333] ret_from_fork_asm+0x1a/0x30 [ 15.187380] </TASK> [ 15.187393] [ 15.199404] Allocated by task 213: [ 15.199773] kasan_save_stack+0x45/0x70 [ 15.200177] kasan_save_track+0x18/0x40 [ 15.200660] kasan_save_alloc_info+0x3b/0x50 [ 15.201126] __kasan_kmalloc+0xb7/0xc0 [ 15.201577] __kmalloc_cache_noprof+0x189/0x420 [ 15.201920] ksize_uaf+0xaa/0x6c0 [ 15.202282] kunit_try_run_case+0x1a5/0x480 [ 15.202655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.202976] kthread+0x337/0x6f0 [ 15.203308] ret_from_fork+0x116/0x1d0 [ 15.203693] ret_from_fork_asm+0x1a/0x30 [ 15.204045] [ 15.204286] Freed by task 213: [ 15.204489] kasan_save_stack+0x45/0x70 [ 15.204867] kasan_save_track+0x18/0x40 [ 15.205184] kasan_save_free_info+0x3f/0x60 [ 15.205592] __kasan_slab_free+0x56/0x70 [ 15.205848] kfree+0x222/0x3f0 [ 15.206151] ksize_uaf+0x12c/0x6c0 [ 15.206428] kunit_try_run_case+0x1a5/0x480 [ 15.206682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.207133] kthread+0x337/0x6f0 [ 15.207434] ret_from_fork+0x116/0x1d0 [ 15.207763] ret_from_fork_asm+0x1a/0x30 [ 15.208120] [ 15.208301] The buggy address belongs to the object at ffff8881033dc200 [ 15.208301] which belongs to the cache kmalloc-128 of size 128 [ 15.208937] The buggy address is located 0 bytes inside of [ 15.208937] freed 128-byte region [ffff8881033dc200, ffff8881033dc280) [ 15.209865] [ 15.210057] The buggy address belongs to the physical page: [ 15.210504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.211056] flags: 0x200000000000000(node=0|zone=2) [ 15.211410] page_type: f5(slab) [ 15.211610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.212087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.212725] page dumped because: kasan: bad access detected [ 15.212963] [ 15.213177] Memory state around the buggy address: [ 15.213598] ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.214092] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214614] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.215059] ^ [ 15.215292] ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.215882] ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.216285] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
Automatically assigned
[ 15.143297] ================================================================== [ 15.143710] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.144698] Read of size 1 at addr ffff8881033dc17f by task kunit_try_catch/211 [ 15.145280] [ 15.145540] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.145649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.145678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.145726] Call Trace: [ 15.145765] <TASK> [ 15.145793] dump_stack_lvl+0x73/0xb0 [ 15.145840] print_report+0xd1/0x650 [ 15.145867] ? __virt_addr_valid+0x1db/0x2d0 [ 15.145897] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.145938] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.145967] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.145993] kasan_report+0x141/0x180 [ 15.146018] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.146048] __asan_report_load1_noabort+0x18/0x20 [ 15.146071] ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.146098] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 15.146123] ? finish_task_switch.isra.0+0x153/0x700 [ 15.146148] ? __switch_to+0x47/0xf50 [ 15.146176] ? __schedule+0x10cc/0x2b60 [ 15.146211] ? __pfx_read_tsc+0x10/0x10 [ 15.146538] ? ktime_get_ts64+0x86/0x230 [ 15.146622] kunit_try_run_case+0x1a5/0x480 [ 15.146678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.146772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.146800] ? __kthread_parkme+0x82/0x180 [ 15.146824] ? preempt_count_sub+0x50/0x80 [ 15.146849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.146899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.146925] kthread+0x337/0x6f0 [ 15.146947] ? trace_preempt_on+0x20/0xc0 [ 15.146973] ? __pfx_kthread+0x10/0x10 [ 15.146996] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.147021] ? calculate_sigpending+0x7b/0xa0 [ 15.147050] ? __pfx_kthread+0x10/0x10 [ 15.147073] ret_from_fork+0x116/0x1d0 [ 15.147094] ? __pfx_kthread+0x10/0x10 [ 15.147116] ret_from_fork_asm+0x1a/0x30 [ 15.147150] </TASK> [ 15.147164] [ 15.162874] Allocated by task 211: [ 15.163659] kasan_save_stack+0x45/0x70 [ 15.163957] kasan_save_track+0x18/0x40 [ 15.164176] kasan_save_alloc_info+0x3b/0x50 [ 15.164807] __kasan_kmalloc+0xb7/0xc0 [ 15.165032] __kmalloc_cache_noprof+0x189/0x420 [ 15.165242] ksize_unpoisons_memory+0xc7/0x9b0 [ 15.165761] kunit_try_run_case+0x1a5/0x480 [ 15.166345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.167096] kthread+0x337/0x6f0 [ 15.167318] ret_from_fork+0x116/0x1d0 [ 15.167505] ret_from_fork_asm+0x1a/0x30 [ 15.167674] [ 15.167774] The buggy address belongs to the object at ffff8881033dc100 [ 15.167774] which belongs to the cache kmalloc-128 of size 128 [ 15.168172] The buggy address is located 12 bytes to the right of [ 15.168172] allocated 115-byte region [ffff8881033dc100, ffff8881033dc173) [ 15.168582] [ 15.168676] The buggy address belongs to the physical page: [ 15.168876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.169140] flags: 0x200000000000000(node=0|zone=2) [ 15.169332] page_type: f5(slab) [ 15.170704] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.171091] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.171356] page dumped because: kasan: bad access detected [ 15.172236] [ 15.172420] Memory state around the buggy address: [ 15.172872] ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.174190] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.174735] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.175700] ^ [ 15.176032] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.176574] ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177112] ================================================================== [ 15.066074] ================================================================== [ 15.066637] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 15.067403] Read of size 1 at addr ffff8881033dc173 by task kunit_try_catch/211 [ 15.067907] [ 15.068902] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.069300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.069324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.069350] Call Trace: [ 15.069370] <TASK> [ 15.069396] dump_stack_lvl+0x73/0xb0 [ 15.069443] print_report+0xd1/0x650 [ 15.069496] ? __virt_addr_valid+0x1db/0x2d0 [ 15.069524] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.069575] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069601] kasan_report+0x141/0x180 [ 15.069625] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069655] __asan_report_load1_noabort+0x18/0x20 [ 15.069677] ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069752] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 15.069800] ? finish_task_switch.isra.0+0x153/0x700 [ 15.069842] ? __switch_to+0x47/0xf50 [ 15.069885] ? __schedule+0x10cc/0x2b60 [ 15.069925] ? __pfx_read_tsc+0x10/0x10 [ 15.069960] ? ktime_get_ts64+0x86/0x230 [ 15.069999] kunit_try_run_case+0x1a5/0x480 [ 15.070037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.070103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.070140] ? __kthread_parkme+0x82/0x180 [ 15.070174] ? preempt_count_sub+0x50/0x80 [ 15.070225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.070381] kthread+0x337/0x6f0 [ 15.070405] ? trace_preempt_on+0x20/0xc0 [ 15.070432] ? __pfx_kthread+0x10/0x10 [ 15.070473] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.070505] ? calculate_sigpending+0x7b/0xa0 [ 15.070534] ? __pfx_kthread+0x10/0x10 [ 15.070557] ret_from_fork+0x116/0x1d0 [ 15.070579] ? __pfx_kthread+0x10/0x10 [ 15.070602] ret_from_fork_asm+0x1a/0x30 [ 15.070639] </TASK> [ 15.070653] [ 15.085618] Allocated by task 211: [ 15.085990] kasan_save_stack+0x45/0x70 [ 15.086260] kasan_save_track+0x18/0x40 [ 15.086574] kasan_save_alloc_info+0x3b/0x50 [ 15.086860] __kasan_kmalloc+0xb7/0xc0 [ 15.087130] __kmalloc_cache_noprof+0x189/0x420 [ 15.087418] ksize_unpoisons_memory+0xc7/0x9b0 [ 15.088825] kunit_try_run_case+0x1a5/0x480 [ 15.089063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090122] kthread+0x337/0x6f0 [ 15.090426] ret_from_fork+0x116/0x1d0 [ 15.090612] ret_from_fork_asm+0x1a/0x30 [ 15.091274] [ 15.091549] The buggy address belongs to the object at ffff8881033dc100 [ 15.091549] which belongs to the cache kmalloc-128 of size 128 [ 15.091947] The buggy address is located 0 bytes to the right of [ 15.091947] allocated 115-byte region [ffff8881033dc100, ffff8881033dc173) [ 15.093637] [ 15.093936] The buggy address belongs to the physical page: [ 15.094207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.094791] flags: 0x200000000000000(node=0|zone=2) [ 15.095158] page_type: f5(slab) [ 15.096119] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.096726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.097514] page dumped because: kasan: bad access detected [ 15.098277] [ 15.098531] Memory state around the buggy address: [ 15.099145] ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.099480] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.100536] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.100923] ^ [ 15.101341] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.101758] ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102204] ================================================================== [ 15.103042] ================================================================== [ 15.103801] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.104257] Read of size 1 at addr ffff8881033dc178 by task kunit_try_catch/211 [ 15.105541] [ 15.105896] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.106009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.106038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.106079] Call Trace: [ 15.106121] <TASK> [ 15.106157] dump_stack_lvl+0x73/0xb0 [ 15.106228] print_report+0xd1/0x650 [ 15.106282] ? __virt_addr_valid+0x1db/0x2d0 [ 15.106333] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.106437] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106502] kasan_report+0x141/0x180 [ 15.106546] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106605] __asan_report_load1_noabort+0x18/0x20 [ 15.106647] ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106692] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 15.106876] ? finish_task_switch.isra.0+0x153/0x700 [ 15.106930] ? __switch_to+0x47/0xf50 [ 15.106983] ? __schedule+0x10cc/0x2b60 [ 15.107030] ? __pfx_read_tsc+0x10/0x10 [ 15.107070] ? ktime_get_ts64+0x86/0x230 [ 15.107120] kunit_try_run_case+0x1a5/0x480 [ 15.107170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.107280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.107309] ? __kthread_parkme+0x82/0x180 [ 15.107333] ? preempt_count_sub+0x50/0x80 [ 15.107370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.107421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.107448] kthread+0x337/0x6f0 [ 15.107495] ? trace_preempt_on+0x20/0xc0 [ 15.107521] ? __pfx_kthread+0x10/0x10 [ 15.107545] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.107570] ? calculate_sigpending+0x7b/0xa0 [ 15.107598] ? __pfx_kthread+0x10/0x10 [ 15.107622] ret_from_fork+0x116/0x1d0 [ 15.107642] ? __pfx_kthread+0x10/0x10 [ 15.107665] ret_from_fork_asm+0x1a/0x30 [ 15.107741] </TASK> [ 15.107772] [ 15.123262] Allocated by task 211: [ 15.124564] kasan_save_stack+0x45/0x70 [ 15.125164] kasan_save_track+0x18/0x40 [ 15.125884] kasan_save_alloc_info+0x3b/0x50 [ 15.126553] __kasan_kmalloc+0xb7/0xc0 [ 15.126761] __kmalloc_cache_noprof+0x189/0x420 [ 15.127306] ksize_unpoisons_memory+0xc7/0x9b0 [ 15.127776] kunit_try_run_case+0x1a5/0x480 [ 15.128008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128407] kthread+0x337/0x6f0 [ 15.128668] ret_from_fork+0x116/0x1d0 [ 15.128938] ret_from_fork_asm+0x1a/0x30 [ 15.129148] [ 15.129451] The buggy address belongs to the object at ffff8881033dc100 [ 15.129451] which belongs to the cache kmalloc-128 of size 128 [ 15.130857] The buggy address is located 5 bytes to the right of [ 15.130857] allocated 115-byte region [ffff8881033dc100, ffff8881033dc173) [ 15.131837] [ 15.132606] The buggy address belongs to the physical page: [ 15.132940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.134047] flags: 0x200000000000000(node=0|zone=2) [ 15.134359] page_type: f5(slab) [ 15.134553] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.135414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.136397] page dumped because: kasan: bad access detected [ 15.136719] [ 15.137192] Memory state around the buggy address: [ 15.137622] ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.138088] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.138628] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.139321] ^ [ 15.140064] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.140937] ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.141307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
Automatically assigned
[ 15.016355] ================================================================== [ 15.019691] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 [ 15.020494] Free of addr ffff888102380980 by task kunit_try_catch/209 [ 15.020996] [ 15.021372] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.021826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.021878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.021917] Call Trace: [ 15.021955] <TASK> [ 15.021990] dump_stack_lvl+0x73/0xb0 [ 15.022052] print_report+0xd1/0x650 [ 15.022089] ? __virt_addr_valid+0x1db/0x2d0 [ 15.022127] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.022162] ? kfree_sensitive+0x2e/0x90 [ 15.022224] kasan_report_invalid_free+0x10a/0x130 [ 15.022268] ? kfree_sensitive+0x2e/0x90 [ 15.022305] ? kfree_sensitive+0x2e/0x90 [ 15.022341] check_slab_allocation+0x101/0x130 [ 15.022380] __kasan_slab_pre_free+0x28/0x40 [ 15.022420] kfree+0xf0/0x3f0 [ 15.022449] ? kfree_sensitive+0x2e/0x90 [ 15.022502] kfree_sensitive+0x2e/0x90 [ 15.022539] kmalloc_double_kzfree+0x19c/0x350 [ 15.022585] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 15.022634] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 15.022717] kunit_try_run_case+0x1a5/0x480 [ 15.023036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.023132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.023173] ? __kthread_parkme+0x82/0x180 [ 15.023237] ? preempt_count_sub+0x50/0x80 [ 15.023274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.023354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.023393] kthread+0x337/0x6f0 [ 15.023425] ? trace_preempt_on+0x20/0xc0 [ 15.023474] ? __pfx_kthread+0x10/0x10 [ 15.023509] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.023545] ? calculate_sigpending+0x7b/0xa0 [ 15.023572] ? __pfx_kthread+0x10/0x10 [ 15.023596] ret_from_fork+0x116/0x1d0 [ 15.023619] ? __pfx_kthread+0x10/0x10 [ 15.023642] ret_from_fork_asm+0x1a/0x30 [ 15.023677] </TASK> [ 15.023711] [ 15.039651] Allocated by task 209: [ 15.039893] kasan_save_stack+0x45/0x70 [ 15.040580] kasan_save_track+0x18/0x40 [ 15.040858] kasan_save_alloc_info+0x3b/0x50 [ 15.041650] __kasan_kmalloc+0xb7/0xc0 [ 15.042199] __kmalloc_cache_noprof+0x189/0x420 [ 15.042674] kmalloc_double_kzfree+0xa9/0x350 [ 15.043004] kunit_try_run_case+0x1a5/0x480 [ 15.043592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.043851] kthread+0x337/0x6f0 [ 15.044809] ret_from_fork+0x116/0x1d0 [ 15.045173] ret_from_fork_asm+0x1a/0x30 [ 15.045615] [ 15.045788] Freed by task 209: [ 15.046104] kasan_save_stack+0x45/0x70 [ 15.046436] kasan_save_track+0x18/0x40 [ 15.047134] kasan_save_free_info+0x3f/0x60 [ 15.047536] __kasan_slab_free+0x56/0x70 [ 15.047735] kfree+0x222/0x3f0 [ 15.047877] kfree_sensitive+0x67/0x90 [ 15.048038] kmalloc_double_kzfree+0x12b/0x350 [ 15.048211] kunit_try_run_case+0x1a5/0x480 [ 15.048379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049361] kthread+0x337/0x6f0 [ 15.049578] ret_from_fork+0x116/0x1d0 [ 15.050080] ret_from_fork_asm+0x1a/0x30 [ 15.050304] [ 15.050402] The buggy address belongs to the object at ffff888102380980 [ 15.050402] which belongs to the cache kmalloc-16 of size 16 [ 15.051898] The buggy address is located 0 bytes inside of [ 15.051898] 16-byte region [ffff888102380980, ffff888102380990) [ 15.052772] [ 15.052900] The buggy address belongs to the physical page: [ 15.053337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 15.053835] flags: 0x200000000000000(node=0|zone=2) [ 15.054234] page_type: f5(slab) [ 15.054427] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.054811] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.055627] page dumped because: kasan: bad access detected [ 15.055848] [ 15.055966] Memory state around the buggy address: [ 15.056431] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.056887] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.057155] >ffff888102380980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057716] ^ [ 15.057997] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059126] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059969] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
Automatically assigned
[ 14.970130] ================================================================== [ 14.971473] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350 [ 14.972209] Read of size 1 at addr ffff888102380980 by task kunit_try_catch/209 [ 14.972652] [ 14.973193] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.973279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.973294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.973321] Call Trace: [ 14.973339] <TASK> [ 14.973365] dump_stack_lvl+0x73/0xb0 [ 14.973407] print_report+0xd1/0x650 [ 14.973435] ? __virt_addr_valid+0x1db/0x2d0 [ 14.973487] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.973528] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.973568] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.973614] kasan_report+0x141/0x180 [ 14.973658] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.973708] ? kmalloc_double_kzfree+0x19c/0x350 [ 14.973756] __kasan_check_byte+0x3d/0x50 [ 14.973802] kfree_sensitive+0x22/0x90 [ 14.973849] kmalloc_double_kzfree+0x19c/0x350 [ 14.973896] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 14.973946] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 14.974023] kunit_try_run_case+0x1a5/0x480 [ 14.974297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.974368] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.974433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.974484] ? __kthread_parkme+0x82/0x180 [ 14.974513] ? preempt_count_sub+0x50/0x80 [ 14.974540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.974562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.974590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.974616] kthread+0x337/0x6f0 [ 14.974637] ? trace_preempt_on+0x20/0xc0 [ 14.974664] ? __pfx_kthread+0x10/0x10 [ 14.974695] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.974761] ? calculate_sigpending+0x7b/0xa0 [ 14.974805] ? __pfx_kthread+0x10/0x10 [ 14.974842] ret_from_fork+0x116/0x1d0 [ 14.974866] ? __pfx_kthread+0x10/0x10 [ 14.974889] ret_from_fork_asm+0x1a/0x30 [ 14.974925] </TASK> [ 14.974938] [ 14.990788] Allocated by task 209: [ 14.991546] kasan_save_stack+0x45/0x70 [ 14.992036] kasan_save_track+0x18/0x40 [ 14.992486] kasan_save_alloc_info+0x3b/0x50 [ 14.992982] __kasan_kmalloc+0xb7/0xc0 [ 14.993187] __kmalloc_cache_noprof+0x189/0x420 [ 14.994151] kmalloc_double_kzfree+0xa9/0x350 [ 14.994419] kunit_try_run_case+0x1a5/0x480 [ 14.994605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.995297] kthread+0x337/0x6f0 [ 14.995803] ret_from_fork+0x116/0x1d0 [ 14.996374] ret_from_fork_asm+0x1a/0x30 [ 14.996803] [ 14.997000] Freed by task 209: [ 14.997388] kasan_save_stack+0x45/0x70 [ 14.998243] kasan_save_track+0x18/0x40 [ 14.998667] kasan_save_free_info+0x3f/0x60 [ 14.999365] __kasan_slab_free+0x56/0x70 [ 14.999947] kfree+0x222/0x3f0 [ 15.000201] kfree_sensitive+0x67/0x90 [ 15.000665] kmalloc_double_kzfree+0x12b/0x350 [ 15.001031] kunit_try_run_case+0x1a5/0x480 [ 15.001628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.002523] kthread+0x337/0x6f0 [ 15.002829] ret_from_fork+0x116/0x1d0 [ 15.003142] ret_from_fork_asm+0x1a/0x30 [ 15.003495] [ 15.003733] The buggy address belongs to the object at ffff888102380980 [ 15.003733] which belongs to the cache kmalloc-16 of size 16 [ 15.004726] The buggy address is located 0 bytes inside of [ 15.004726] freed 16-byte region [ffff888102380980, ffff888102380990) [ 15.005822] [ 15.006023] The buggy address belongs to the physical page: [ 15.006265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 15.006984] flags: 0x200000000000000(node=0|zone=2) [ 15.007221] page_type: f5(slab) [ 15.007405] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.008865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.009137] page dumped because: kasan: bad access detected [ 15.009344] [ 15.009447] Memory state around the buggy address: [ 15.009665] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.009920] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.010176] >ffff888102380980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.011517] ^ [ 15.011715] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.014258] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.015108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
Automatically assigned
[ 14.925403] ================================================================== [ 14.925978] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520 [ 14.926980] Read of size 1 at addr ffff888103333928 by task kunit_try_catch/205 [ 14.927407] [ 14.927779] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.927915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.927933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.927983] Call Trace: [ 14.928011] <TASK> [ 14.928049] dump_stack_lvl+0x73/0xb0 [ 14.928121] print_report+0xd1/0x650 [ 14.928174] ? __virt_addr_valid+0x1db/0x2d0 [ 14.928311] ? kmalloc_uaf2+0x4a8/0x520 [ 14.928366] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.928418] ? kmalloc_uaf2+0x4a8/0x520 [ 14.928481] kasan_report+0x141/0x180 [ 14.928535] ? kmalloc_uaf2+0x4a8/0x520 [ 14.928589] __asan_report_load1_noabort+0x18/0x20 [ 14.928618] kmalloc_uaf2+0x4a8/0x520 [ 14.928641] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 14.928662] ? finish_task_switch.isra.0+0x153/0x700 [ 14.928689] ? __switch_to+0x47/0xf50 [ 14.928718] ? __schedule+0x10cc/0x2b60 [ 14.928745] ? __pfx_read_tsc+0x10/0x10 [ 14.928768] ? ktime_get_ts64+0x86/0x230 [ 14.928797] kunit_try_run_case+0x1a5/0x480 [ 14.928821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.928867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.928892] ? __kthread_parkme+0x82/0x180 [ 14.928913] ? preempt_count_sub+0x50/0x80 [ 14.928937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.928983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.929007] kthread+0x337/0x6f0 [ 14.929027] ? trace_preempt_on+0x20/0xc0 [ 14.929051] ? __pfx_kthread+0x10/0x10 [ 14.929073] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.929096] ? calculate_sigpending+0x7b/0xa0 [ 14.929120] ? __pfx_kthread+0x10/0x10 [ 14.929142] ret_from_fork+0x116/0x1d0 [ 14.929162] ? __pfx_kthread+0x10/0x10 [ 14.929184] ret_from_fork_asm+0x1a/0x30 [ 14.929260] </TASK> [ 14.929275] [ 14.941424] Allocated by task 205: [ 14.941913] kasan_save_stack+0x45/0x70 [ 14.942389] kasan_save_track+0x18/0x40 [ 14.942788] kasan_save_alloc_info+0x3b/0x50 [ 14.943337] __kasan_kmalloc+0xb7/0xc0 [ 14.943775] __kmalloc_cache_noprof+0x189/0x420 [ 14.944231] kmalloc_uaf2+0xc6/0x520 [ 14.944592] kunit_try_run_case+0x1a5/0x480 [ 14.944972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945360] kthread+0x337/0x6f0 [ 14.945730] ret_from_fork+0x116/0x1d0 [ 14.945942] ret_from_fork_asm+0x1a/0x30 [ 14.946356] [ 14.946541] Freed by task 205: [ 14.946761] kasan_save_stack+0x45/0x70 [ 14.947164] kasan_save_track+0x18/0x40 [ 14.947623] kasan_save_free_info+0x3f/0x60 [ 14.947978] __kasan_slab_free+0x56/0x70 [ 14.948254] kfree+0x222/0x3f0 [ 14.948567] kmalloc_uaf2+0x14c/0x520 [ 14.948892] kunit_try_run_case+0x1a5/0x480 [ 14.949153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.949607] kthread+0x337/0x6f0 [ 14.949870] ret_from_fork+0x116/0x1d0 [ 14.950176] ret_from_fork_asm+0x1a/0x30 [ 14.950424] [ 14.950648] The buggy address belongs to the object at ffff888103333900 [ 14.950648] which belongs to the cache kmalloc-64 of size 64 [ 14.951409] The buggy address is located 40 bytes inside of [ 14.951409] freed 64-byte region [ffff888103333900, ffff888103333940) [ 14.951943] [ 14.952162] The buggy address belongs to the physical page: [ 14.952646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103333 [ 14.953120] flags: 0x200000000000000(node=0|zone=2) [ 14.953591] page_type: f5(slab) [ 14.953839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.954374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.954811] page dumped because: kasan: bad access detected [ 14.955160] [ 14.955312] Memory state around the buggy address: [ 14.955726] ffff888103333800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.956279] ffff888103333880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.956614] >ffff888103333900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.957028] ^ [ 14.957445] ffff888103333980: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 14.957955] ffff888103333a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.958403] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
Automatically assigned
[ 14.881103] ================================================================== [ 14.881806] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360 [ 14.882367] Write of size 33 at addr ffff888103333880 by task kunit_try_catch/203 [ 14.882825] [ 14.883024] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.883123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.883152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.883200] Call Trace: [ 14.883232] <TASK> [ 14.883277] dump_stack_lvl+0x73/0xb0 [ 14.883357] print_report+0xd1/0x650 [ 14.883403] ? __virt_addr_valid+0x1db/0x2d0 [ 14.883450] ? kmalloc_uaf_memset+0x1a3/0x360 [ 14.884223] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.884282] ? kmalloc_uaf_memset+0x1a3/0x360 [ 14.884327] kasan_report+0x141/0x180 [ 14.884377] ? kmalloc_uaf_memset+0x1a3/0x360 [ 14.884434] kasan_check_range+0x10c/0x1c0 [ 14.884501] __asan_memset+0x27/0x50 [ 14.884549] kmalloc_uaf_memset+0x1a3/0x360 [ 14.884599] ? __pfx_kmalloc_uaf_memset+0x10/0x10 [ 14.884655] ? __pfx_kmalloc_uaf_memset+0x10/0x10 [ 14.884758] kunit_try_run_case+0x1a5/0x480 [ 14.884814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.884851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.884893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.884934] ? __kthread_parkme+0x82/0x180 [ 14.884972] ? preempt_count_sub+0x50/0x80 [ 14.885013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.885047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.885090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.885127] kthread+0x337/0x6f0 [ 14.885149] ? trace_preempt_on+0x20/0xc0 [ 14.885176] ? __pfx_kthread+0x10/0x10 [ 14.885220] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.885253] ? calculate_sigpending+0x7b/0xa0 [ 14.885281] ? __pfx_kthread+0x10/0x10 [ 14.885304] ret_from_fork+0x116/0x1d0 [ 14.885327] ? __pfx_kthread+0x10/0x10 [ 14.885349] ret_from_fork_asm+0x1a/0x30 [ 14.885386] </TASK> [ 14.885400] [ 14.897484] Allocated by task 203: [ 14.897971] kasan_save_stack+0x45/0x70 [ 14.898857] kasan_save_track+0x18/0x40 [ 14.899112] kasan_save_alloc_info+0x3b/0x50 [ 14.899862] __kasan_kmalloc+0xb7/0xc0 [ 14.900826] __kmalloc_cache_noprof+0x189/0x420 [ 14.901081] kmalloc_uaf_memset+0xa9/0x360 [ 14.901638] kunit_try_run_case+0x1a5/0x480 [ 14.902241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.902912] kthread+0x337/0x6f0 [ 14.903114] ret_from_fork+0x116/0x1d0 [ 14.903616] ret_from_fork_asm+0x1a/0x30 [ 14.904169] [ 14.904580] Freed by task 203: [ 14.904827] kasan_save_stack+0x45/0x70 [ 14.905310] kasan_save_track+0x18/0x40 [ 14.905495] kasan_save_free_info+0x3f/0x60 [ 14.905978] __kasan_slab_free+0x56/0x70 [ 14.906621] kfree+0x222/0x3f0 [ 14.907235] kmalloc_uaf_memset+0x12b/0x360 [ 14.907590] kunit_try_run_case+0x1a5/0x480 [ 14.907804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.908090] kthread+0x337/0x6f0 [ 14.908711] ret_from_fork+0x116/0x1d0 [ 14.909410] ret_from_fork_asm+0x1a/0x30 [ 14.909905] [ 14.910103] The buggy address belongs to the object at ffff888103333880 [ 14.910103] which belongs to the cache kmalloc-64 of size 64 [ 14.910752] The buggy address is located 0 bytes inside of [ 14.910752] freed 64-byte region [ffff888103333880, ffff8881033338c0) [ 14.911652] [ 14.911820] The buggy address belongs to the physical page: [ 14.912094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103333 [ 14.912721] flags: 0x200000000000000(node=0|zone=2) [ 14.912998] page_type: f5(slab) [ 14.913183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.913857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.914236] page dumped because: kasan: bad access detected [ 14.914639] [ 14.914753] Memory state around the buggy address: [ 14.915136] ffff888103333780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.915711] ffff888103333800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.915996] >ffff888103333880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.917614] ^ [ 14.918028] ffff888103333900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.918682] ffff888103333980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.919647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
Automatically assigned
[ 14.840642] ================================================================== [ 14.841615] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 14.842118] Read of size 1 at addr ffff888101c20688 by task kunit_try_catch/201 [ 14.842806] [ 14.843086] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.843191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843267] Call Trace: [ 14.843296] <TASK> [ 14.843358] dump_stack_lvl+0x73/0xb0 [ 14.843428] print_report+0xd1/0x650 [ 14.843488] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843538] ? kmalloc_uaf+0x320/0x380 [ 14.843588] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.843635] ? kmalloc_uaf+0x320/0x380 [ 14.843700] kasan_report+0x141/0x180 [ 14.843743] ? kmalloc_uaf+0x320/0x380 [ 14.843791] __asan_report_load1_noabort+0x18/0x20 [ 14.843835] kmalloc_uaf+0x320/0x380 [ 14.843878] ? __pfx_kmalloc_uaf+0x10/0x10 [ 14.843934] ? __schedule+0x10cc/0x2b60 [ 14.844002] ? __pfx_read_tsc+0x10/0x10 [ 14.844048] ? ktime_get_ts64+0x86/0x230 [ 14.844086] kunit_try_run_case+0x1a5/0x480 [ 14.844113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.844160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.844185] ? __kthread_parkme+0x82/0x180 [ 14.844219] ? preempt_count_sub+0x50/0x80 [ 14.844308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844383] kthread+0x337/0x6f0 [ 14.844405] ? trace_preempt_on+0x20/0xc0 [ 14.844430] ? __pfx_kthread+0x10/0x10 [ 14.844452] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844502] ? calculate_sigpending+0x7b/0xa0 [ 14.844529] ? __pfx_kthread+0x10/0x10 [ 14.844552] ret_from_fork+0x116/0x1d0 [ 14.844574] ? __pfx_kthread+0x10/0x10 [ 14.844596] ret_from_fork_asm+0x1a/0x30 [ 14.844630] </TASK> [ 14.844643] [ 14.856924] Allocated by task 201: [ 14.857426] kasan_save_stack+0x45/0x70 [ 14.857863] kasan_save_track+0x18/0x40 [ 14.858270] kasan_save_alloc_info+0x3b/0x50 [ 14.858670] __kasan_kmalloc+0xb7/0xc0 [ 14.859030] __kmalloc_cache_noprof+0x189/0x420 [ 14.859532] kmalloc_uaf+0xaa/0x380 [ 14.859789] kunit_try_run_case+0x1a5/0x480 [ 14.859993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.860444] kthread+0x337/0x6f0 [ 14.860753] ret_from_fork+0x116/0x1d0 [ 14.861062] ret_from_fork_asm+0x1a/0x30 [ 14.861394] [ 14.861548] Freed by task 201: [ 14.861716] kasan_save_stack+0x45/0x70 [ 14.862037] kasan_save_track+0x18/0x40 [ 14.862387] kasan_save_free_info+0x3f/0x60 [ 14.862677] __kasan_slab_free+0x56/0x70 [ 14.862879] kfree+0x222/0x3f0 [ 14.863143] kmalloc_uaf+0x12c/0x380 [ 14.863501] kunit_try_run_case+0x1a5/0x480 [ 14.863871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.864143] kthread+0x337/0x6f0 [ 14.864483] ret_from_fork+0x116/0x1d0 [ 14.864825] ret_from_fork_asm+0x1a/0x30 [ 14.865118] [ 14.865322] The buggy address belongs to the object at ffff888101c20680 [ 14.865322] which belongs to the cache kmalloc-16 of size 16 [ 14.866010] The buggy address is located 8 bytes inside of [ 14.866010] freed 16-byte region [ffff888101c20680, ffff888101c20690) [ 14.866618] [ 14.866755] The buggy address belongs to the physical page: [ 14.866993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20 [ 14.867706] flags: 0x200000000000000(node=0|zone=2) [ 14.868151] page_type: f5(slab) [ 14.868447] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.869029] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.869582] page dumped because: kasan: bad access detected [ 14.870007] [ 14.870245] Memory state around the buggy address: [ 14.870557] ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.871098] ffff888101c20600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.871703] >ffff888101c20680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.872089] ^ [ 14.872447] ffff888101c20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.872976] ffff888101c20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.873464] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
Automatically assigned
[ 14.797599] ================================================================== [ 14.798396] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.799152] Read of size 64 at addr ffff888103333784 by task kunit_try_catch/199 [ 14.799784] [ 14.800088] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.800221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.800247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.800286] Call Trace: [ 14.800307] <TASK> [ 14.800342] dump_stack_lvl+0x73/0xb0 [ 14.800405] print_report+0xd1/0x650 [ 14.800446] ? __virt_addr_valid+0x1db/0x2d0 [ 14.800500] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.800545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.800591] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.800634] kasan_report+0x141/0x180 [ 14.800714] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.800781] kasan_check_range+0x10c/0x1c0 [ 14.800823] __asan_memmove+0x27/0x70 [ 14.800863] kmalloc_memmove_invalid_size+0x16f/0x330 [ 14.800914] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 14.801032] ? __schedule+0x10cc/0x2b60 [ 14.801122] ? __pfx_read_tsc+0x10/0x10 [ 14.801171] ? ktime_get_ts64+0x86/0x230 [ 14.801256] kunit_try_run_case+0x1a5/0x480 [ 14.801306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.801349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.801445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.801551] ? __kthread_parkme+0x82/0x180 [ 14.801615] ? preempt_count_sub+0x50/0x80 [ 14.801669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.801718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.801772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.801827] kthread+0x337/0x6f0 [ 14.801882] ? trace_preempt_on+0x20/0xc0 [ 14.801925] ? __pfx_kthread+0x10/0x10 [ 14.801960] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.801997] ? calculate_sigpending+0x7b/0xa0 [ 14.802036] ? __pfx_kthread+0x10/0x10 [ 14.802071] ret_from_fork+0x116/0x1d0 [ 14.802102] ? __pfx_kthread+0x10/0x10 [ 14.802134] ret_from_fork_asm+0x1a/0x30 [ 14.802185] </TASK> [ 14.802242] [ 14.815854] Allocated by task 199: [ 14.816112] kasan_save_stack+0x45/0x70 [ 14.816674] kasan_save_track+0x18/0x40 [ 14.817215] kasan_save_alloc_info+0x3b/0x50 [ 14.817610] __kasan_kmalloc+0xb7/0xc0 [ 14.818045] __kmalloc_cache_noprof+0x189/0x420 [ 14.818450] kmalloc_memmove_invalid_size+0xac/0x330 [ 14.819474] kunit_try_run_case+0x1a5/0x480 [ 14.819824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.820076] kthread+0x337/0x6f0 [ 14.820267] ret_from_fork+0x116/0x1d0 [ 14.820618] ret_from_fork_asm+0x1a/0x30 [ 14.821123] [ 14.821323] The buggy address belongs to the object at ffff888103333780 [ 14.821323] which belongs to the cache kmalloc-64 of size 64 [ 14.822387] The buggy address is located 4 bytes inside of [ 14.822387] allocated 64-byte region [ffff888103333780, ffff8881033337c0) [ 14.823301] [ 14.823453] The buggy address belongs to the physical page: [ 14.823702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103333 [ 14.824904] flags: 0x200000000000000(node=0|zone=2) [ 14.825373] page_type: f5(slab) [ 14.825680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.826531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.826838] page dumped because: kasan: bad access detected [ 14.827054] [ 14.827172] Memory state around the buggy address: [ 14.827637] ffff888103333680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.829097] ffff888103333700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.830013] >ffff888103333780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.830682] ^ [ 14.831205] ffff888103333800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.832167] ffff888103333880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.832990] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
Automatically assigned
[ 14.757450] ================================================================== [ 14.758588] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 14.759769] Read of size 18446744073709551614 at addr ffff8881033d4a04 by task kunit_try_catch/197 [ 14.760602] [ 14.760767] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.761054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.761090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.761132] Call Trace: [ 14.761163] <TASK> [ 14.761202] dump_stack_lvl+0x73/0xb0 [ 14.761260] print_report+0xd1/0x650 [ 14.761289] ? __virt_addr_valid+0x1db/0x2d0 [ 14.761317] ? kmalloc_memmove_negative_size+0x171/0x330 [ 14.761345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.761369] ? kmalloc_memmove_negative_size+0x171/0x330 [ 14.761433] kasan_report+0x141/0x180 [ 14.761490] ? kmalloc_memmove_negative_size+0x171/0x330 [ 14.761549] kasan_check_range+0x10c/0x1c0 [ 14.761598] __asan_memmove+0x27/0x70 [ 14.761645] kmalloc_memmove_negative_size+0x171/0x330 [ 14.761698] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 14.761759] ? __schedule+0x10cc/0x2b60 [ 14.761801] ? __pfx_read_tsc+0x10/0x10 [ 14.761840] ? ktime_get_ts64+0x86/0x230 [ 14.761882] kunit_try_run_case+0x1a5/0x480 [ 14.761916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.761946] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.761984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.762022] ? __kthread_parkme+0x82/0x180 [ 14.762054] ? preempt_count_sub+0x50/0x80 [ 14.762093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.762126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.762201] kthread+0x337/0x6f0 [ 14.762232] ? trace_preempt_on+0x20/0xc0 [ 14.762270] ? __pfx_kthread+0x10/0x10 [ 14.762303] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.762340] ? calculate_sigpending+0x7b/0xa0 [ 14.762371] ? __pfx_kthread+0x10/0x10 [ 14.762395] ret_from_fork+0x116/0x1d0 [ 14.762416] ? __pfx_kthread+0x10/0x10 [ 14.762438] ret_from_fork_asm+0x1a/0x30 [ 14.762493] </TASK> [ 14.762507] [ 14.775952] Allocated by task 197: [ 14.776227] kasan_save_stack+0x45/0x70 [ 14.776482] kasan_save_track+0x18/0x40 [ 14.776689] kasan_save_alloc_info+0x3b/0x50 [ 14.776900] __kasan_kmalloc+0xb7/0xc0 [ 14.777093] __kmalloc_cache_noprof+0x189/0x420 [ 14.777484] kmalloc_memmove_negative_size+0xac/0x330 [ 14.777913] kunit_try_run_case+0x1a5/0x480 [ 14.778279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.778854] kthread+0x337/0x6f0 [ 14.779367] ret_from_fork+0x116/0x1d0 [ 14.779861] ret_from_fork_asm+0x1a/0x30 [ 14.780135] [ 14.780341] The buggy address belongs to the object at ffff8881033d4a00 [ 14.780341] which belongs to the cache kmalloc-64 of size 64 [ 14.781348] The buggy address is located 4 bytes inside of [ 14.781348] 64-byte region [ffff8881033d4a00, ffff8881033d4a40) [ 14.783651] [ 14.783923] The buggy address belongs to the physical page: [ 14.784143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033d4 [ 14.784787] flags: 0x200000000000000(node=0|zone=2) [ 14.785081] page_type: f5(slab) [ 14.785281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.785957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.786427] page dumped because: kasan: bad access detected [ 14.786889] [ 14.787119] Memory state around the buggy address: [ 14.787403] ffff8881033d4900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.788049] ffff8881033d4980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.788701] >ffff8881033d4a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.789256] ^ [ 14.789576] ffff8881033d4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789962] ffff8881033d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.790150] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
Automatically assigned
[ 14.709568] ================================================================== [ 14.710346] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 14.711381] Write of size 16 at addr ffff888103324d69 by task kunit_try_catch/195 [ 14.711766] [ 14.712228] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.712349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.712375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.712420] Call Trace: [ 14.712452] <TASK> [ 14.712504] dump_stack_lvl+0x73/0xb0 [ 14.712578] print_report+0xd1/0x650 [ 14.712623] ? __virt_addr_valid+0x1db/0x2d0 [ 14.712668] ? kmalloc_oob_memset_16+0x166/0x330 [ 14.712716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.712765] ? kmalloc_oob_memset_16+0x166/0x330 [ 14.712815] kasan_report+0x141/0x180 [ 14.712856] ? kmalloc_oob_memset_16+0x166/0x330 [ 14.712901] kasan_check_range+0x10c/0x1c0 [ 14.712940] __asan_memset+0x27/0x50 [ 14.712975] kmalloc_oob_memset_16+0x166/0x330 [ 14.713033] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 14.713081] ? __schedule+0x10cc/0x2b60 [ 14.713155] ? __pfx_read_tsc+0x10/0x10 [ 14.713235] ? ktime_get_ts64+0x86/0x230 [ 14.713298] kunit_try_run_case+0x1a5/0x480 [ 14.713351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.713396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.713443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.713498] ? __kthread_parkme+0x82/0x180 [ 14.713523] ? preempt_count_sub+0x50/0x80 [ 14.713550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.713572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.713599] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.713625] kthread+0x337/0x6f0 [ 14.713646] ? trace_preempt_on+0x20/0xc0 [ 14.713672] ? __pfx_kthread+0x10/0x10 [ 14.713807] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.713837] ? calculate_sigpending+0x7b/0xa0 [ 14.713863] ? __pfx_kthread+0x10/0x10 [ 14.713885] ret_from_fork+0x116/0x1d0 [ 14.713906] ? __pfx_kthread+0x10/0x10 [ 14.713927] ret_from_fork_asm+0x1a/0x30 [ 14.713960] </TASK> [ 14.713973] [ 14.728618] Allocated by task 195: [ 14.729203] kasan_save_stack+0x45/0x70 [ 14.729603] kasan_save_track+0x18/0x40 [ 14.730132] kasan_save_alloc_info+0x3b/0x50 [ 14.730618] __kasan_kmalloc+0xb7/0xc0 [ 14.731516] __kmalloc_cache_noprof+0x189/0x420 [ 14.732001] kmalloc_oob_memset_16+0xac/0x330 [ 14.732882] kunit_try_run_case+0x1a5/0x480 [ 14.733144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.733364] kthread+0x337/0x6f0 [ 14.734124] ret_from_fork+0x116/0x1d0 [ 14.734710] ret_from_fork_asm+0x1a/0x30 [ 14.735047] [ 14.735182] The buggy address belongs to the object at ffff888103324d00 [ 14.735182] which belongs to the cache kmalloc-128 of size 128 [ 14.735887] The buggy address is located 105 bytes inside of [ 14.735887] allocated 120-byte region [ffff888103324d00, ffff888103324d78) [ 14.736971] [ 14.737267] The buggy address belongs to the physical page: [ 14.737642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 14.738160] flags: 0x200000000000000(node=0|zone=2) [ 14.738548] page_type: f5(slab) [ 14.738911] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.739372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.739627] page dumped because: kasan: bad access detected [ 14.740111] [ 14.740345] Memory state around the buggy address: [ 14.740799] ffff888103324c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.741317] ffff888103324c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.741657] >ffff888103324d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.741916] ^ [ 14.742169] ffff888103324d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742410] ffff888103324e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
Automatically assigned
[ 14.666135] ================================================================== [ 14.666820] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 14.667809] Write of size 8 at addr ffff8881033dc071 by task kunit_try_catch/193 [ 14.668817] [ 14.669146] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.669317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.669364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.669414] Call Trace: [ 14.669445] <TASK> [ 14.669500] dump_stack_lvl+0x73/0xb0 [ 14.669603] print_report+0xd1/0x650 [ 14.669672] ? __virt_addr_valid+0x1db/0x2d0 [ 14.669831] ? kmalloc_oob_memset_8+0x166/0x330 [ 14.669873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.669907] ? kmalloc_oob_memset_8+0x166/0x330 [ 14.669932] kasan_report+0x141/0x180 [ 14.669959] ? kmalloc_oob_memset_8+0x166/0x330 [ 14.669988] kasan_check_range+0x10c/0x1c0 [ 14.670014] __asan_memset+0x27/0x50 [ 14.670037] kmalloc_oob_memset_8+0x166/0x330 [ 14.670062] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 14.670089] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 14.670118] kunit_try_run_case+0x1a5/0x480 [ 14.670144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.670165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.670194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.670235] ? __kthread_parkme+0x82/0x180 [ 14.670259] ? preempt_count_sub+0x50/0x80 [ 14.670286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.670309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.670336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.670362] kthread+0x337/0x6f0 [ 14.670384] ? trace_preempt_on+0x20/0xc0 [ 14.670412] ? __pfx_kthread+0x10/0x10 [ 14.670434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.670479] ? calculate_sigpending+0x7b/0xa0 [ 14.670510] ? __pfx_kthread+0x10/0x10 [ 14.670534] ret_from_fork+0x116/0x1d0 [ 14.670557] ? __pfx_kthread+0x10/0x10 [ 14.670579] ret_from_fork_asm+0x1a/0x30 [ 14.670614] </TASK> [ 14.670628] [ 14.684522] Allocated by task 193: [ 14.685088] kasan_save_stack+0x45/0x70 [ 14.685727] kasan_save_track+0x18/0x40 [ 14.685967] kasan_save_alloc_info+0x3b/0x50 [ 14.686191] __kasan_kmalloc+0xb7/0xc0 [ 14.686480] __kmalloc_cache_noprof+0x189/0x420 [ 14.686762] kmalloc_oob_memset_8+0xac/0x330 [ 14.687355] kunit_try_run_case+0x1a5/0x480 [ 14.688753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.689009] kthread+0x337/0x6f0 [ 14.689623] ret_from_fork+0x116/0x1d0 [ 14.689970] ret_from_fork_asm+0x1a/0x30 [ 14.690554] [ 14.690896] The buggy address belongs to the object at ffff8881033dc000 [ 14.690896] which belongs to the cache kmalloc-128 of size 128 [ 14.692065] The buggy address is located 113 bytes inside of [ 14.692065] allocated 120-byte region [ffff8881033dc000, ffff8881033dc078) [ 14.692947] [ 14.693436] The buggy address belongs to the physical page: [ 14.694152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 14.694595] flags: 0x200000000000000(node=0|zone=2) [ 14.694887] page_type: f5(slab) [ 14.695201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.695586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.695953] page dumped because: kasan: bad access detected [ 14.696232] [ 14.696412] Memory state around the buggy address: [ 14.697908] ffff8881033dbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.698298] ffff8881033dbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.698794] >ffff8881033dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.699200] ^ [ 14.700314] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700634] ffff8881033dc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.701573] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
Automatically assigned
[ 14.628221] ================================================================== [ 14.628804] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 14.629720] Write of size 4 at addr ffff88810335df75 by task kunit_try_catch/191 [ 14.630483] [ 14.630865] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.631074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.631102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.631141] Call Trace: [ 14.631161] <TASK> [ 14.631188] dump_stack_lvl+0x73/0xb0 [ 14.631260] print_report+0xd1/0x650 [ 14.631288] ? __virt_addr_valid+0x1db/0x2d0 [ 14.631315] ? kmalloc_oob_memset_4+0x166/0x330 [ 14.631339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.631380] ? kmalloc_oob_memset_4+0x166/0x330 [ 14.631405] kasan_report+0x141/0x180 [ 14.631430] ? kmalloc_oob_memset_4+0x166/0x330 [ 14.631478] kasan_check_range+0x10c/0x1c0 [ 14.631509] __asan_memset+0x27/0x50 [ 14.631531] kmalloc_oob_memset_4+0x166/0x330 [ 14.631556] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 14.631582] ? __schedule+0x10cc/0x2b60 [ 14.631609] ? __pfx_read_tsc+0x10/0x10 [ 14.631635] ? ktime_get_ts64+0x86/0x230 [ 14.631663] kunit_try_run_case+0x1a5/0x480 [ 14.631688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.631737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.631764] ? __kthread_parkme+0x82/0x180 [ 14.631787] ? preempt_count_sub+0x50/0x80 [ 14.631813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.631862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.631889] kthread+0x337/0x6f0 [ 14.631910] ? trace_preempt_on+0x20/0xc0 [ 14.631936] ? __pfx_kthread+0x10/0x10 [ 14.631959] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.631983] ? calculate_sigpending+0x7b/0xa0 [ 14.632011] ? __pfx_kthread+0x10/0x10 [ 14.632034] ret_from_fork+0x116/0x1d0 [ 14.632055] ? __pfx_kthread+0x10/0x10 [ 14.632077] ret_from_fork_asm+0x1a/0x30 [ 14.632113] </TASK> [ 14.632126] [ 14.643591] Allocated by task 191: [ 14.643864] kasan_save_stack+0x45/0x70 [ 14.644281] kasan_save_track+0x18/0x40 [ 14.644637] kasan_save_alloc_info+0x3b/0x50 [ 14.645011] __kasan_kmalloc+0xb7/0xc0 [ 14.645353] __kmalloc_cache_noprof+0x189/0x420 [ 14.645709] kmalloc_oob_memset_4+0xac/0x330 [ 14.646007] kunit_try_run_case+0x1a5/0x480 [ 14.646298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.646597] kthread+0x337/0x6f0 [ 14.646841] ret_from_fork+0x116/0x1d0 [ 14.647117] ret_from_fork_asm+0x1a/0x30 [ 14.647585] [ 14.647820] The buggy address belongs to the object at ffff88810335df00 [ 14.647820] which belongs to the cache kmalloc-128 of size 128 [ 14.648825] The buggy address is located 117 bytes inside of [ 14.648825] allocated 120-byte region [ffff88810335df00, ffff88810335df78) [ 14.649804] [ 14.650076] The buggy address belongs to the physical page: [ 14.650602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10335d [ 14.651055] flags: 0x200000000000000(node=0|zone=2) [ 14.651521] page_type: f5(slab) [ 14.651721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.652026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.652556] page dumped because: kasan: bad access detected [ 14.653721] [ 14.653918] Memory state around the buggy address: [ 14.654319] ffff88810335de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.654890] ffff88810335de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.655445] >ffff88810335df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.657031] ^ [ 14.657372] ffff88810335df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657953] ffff88810335e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.658629] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
Automatically assigned
[ 14.585116] ================================================================== [ 14.585706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 14.586903] Write of size 2 at addr ffff88810335de77 by task kunit_try_catch/189 [ 14.587486] [ 14.588193] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.588540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.588564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.588591] Call Trace: [ 14.588609] <TASK> [ 14.588637] dump_stack_lvl+0x73/0xb0 [ 14.588705] print_report+0xd1/0x650 [ 14.588780] ? __virt_addr_valid+0x1db/0x2d0 [ 14.588824] ? kmalloc_oob_memset_2+0x166/0x330 [ 14.588861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.588900] ? kmalloc_oob_memset_2+0x166/0x330 [ 14.588935] kasan_report+0x141/0x180 [ 14.588961] ? kmalloc_oob_memset_2+0x166/0x330 [ 14.588990] kasan_check_range+0x10c/0x1c0 [ 14.589017] __asan_memset+0x27/0x50 [ 14.589039] kmalloc_oob_memset_2+0x166/0x330 [ 14.589065] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 14.589092] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 14.589121] kunit_try_run_case+0x1a5/0x480 [ 14.589146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589167] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.589208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.589255] ? __kthread_parkme+0x82/0x180 [ 14.589281] ? preempt_count_sub+0x50/0x80 [ 14.589307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.589357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.589383] kthread+0x337/0x6f0 [ 14.589405] ? trace_preempt_on+0x20/0xc0 [ 14.589432] ? __pfx_kthread+0x10/0x10 [ 14.589470] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.589500] ? calculate_sigpending+0x7b/0xa0 [ 14.589528] ? __pfx_kthread+0x10/0x10 [ 14.589551] ret_from_fork+0x116/0x1d0 [ 14.589575] ? __pfx_kthread+0x10/0x10 [ 14.589598] ret_from_fork_asm+0x1a/0x30 [ 14.589633] </TASK> [ 14.589647] [ 14.604565] Allocated by task 189: [ 14.605103] kasan_save_stack+0x45/0x70 [ 14.605571] kasan_save_track+0x18/0x40 [ 14.605820] kasan_save_alloc_info+0x3b/0x50 [ 14.606376] __kasan_kmalloc+0xb7/0xc0 [ 14.606888] __kmalloc_cache_noprof+0x189/0x420 [ 14.607111] kmalloc_oob_memset_2+0xac/0x330 [ 14.607339] kunit_try_run_case+0x1a5/0x480 [ 14.608285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.609042] kthread+0x337/0x6f0 [ 14.609364] ret_from_fork+0x116/0x1d0 [ 14.609825] ret_from_fork_asm+0x1a/0x30 [ 14.610051] [ 14.610444] The buggy address belongs to the object at ffff88810335de00 [ 14.610444] which belongs to the cache kmalloc-128 of size 128 [ 14.611278] The buggy address is located 119 bytes inside of [ 14.611278] allocated 120-byte region [ffff88810335de00, ffff88810335de78) [ 14.612356] [ 14.612951] The buggy address belongs to the physical page: [ 14.613441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10335d [ 14.614272] flags: 0x200000000000000(node=0|zone=2) [ 14.614635] page_type: f5(slab) [ 14.615126] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.615582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.616411] page dumped because: kasan: bad access detected [ 14.617038] [ 14.617160] Memory state around the buggy address: [ 14.617624] ffff88810335dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.619296] ffff88810335dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.619810] >ffff88810335de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.620309] ^ [ 14.620748] ffff88810335de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.621082] ffff88810335df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.622065] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
Automatically assigned
[ 14.543322] ================================================================== [ 14.544043] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 14.544484] Write of size 128 at addr ffff888103324c00 by task kunit_try_catch/187 [ 14.544949] [ 14.545150] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.545247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.545271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.545384] Call Trace: [ 14.545416] <TASK> [ 14.545507] dump_stack_lvl+0x73/0xb0 [ 14.545582] print_report+0xd1/0x650 [ 14.545628] ? __virt_addr_valid+0x1db/0x2d0 [ 14.545677] ? kmalloc_oob_in_memset+0x15f/0x320 [ 14.545716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.545762] ? kmalloc_oob_in_memset+0x15f/0x320 [ 14.545807] kasan_report+0x141/0x180 [ 14.545852] ? kmalloc_oob_in_memset+0x15f/0x320 [ 14.545911] kasan_check_range+0x10c/0x1c0 [ 14.545963] __asan_memset+0x27/0x50 [ 14.546008] kmalloc_oob_in_memset+0x15f/0x320 [ 14.546059] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 14.546111] ? __schedule+0x10cc/0x2b60 [ 14.546164] ? __pfx_read_tsc+0x10/0x10 [ 14.546213] ? ktime_get_ts64+0x86/0x230 [ 14.546264] kunit_try_run_case+0x1a5/0x480 [ 14.546305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.546344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.546392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.546479] ? __kthread_parkme+0x82/0x180 [ 14.546522] ? preempt_count_sub+0x50/0x80 [ 14.546563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.546597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.546639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.546678] kthread+0x337/0x6f0 [ 14.546714] ? trace_preempt_on+0x20/0xc0 [ 14.546759] ? __pfx_kthread+0x10/0x10 [ 14.546797] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.546841] ? calculate_sigpending+0x7b/0xa0 [ 14.546892] ? __pfx_kthread+0x10/0x10 [ 14.546925] ret_from_fork+0x116/0x1d0 [ 14.546947] ? __pfx_kthread+0x10/0x10 [ 14.546969] ret_from_fork_asm+0x1a/0x30 [ 14.547004] </TASK> [ 14.547018] [ 14.560832] Allocated by task 187: [ 14.561415] kasan_save_stack+0x45/0x70 [ 14.561768] kasan_save_track+0x18/0x40 [ 14.562128] kasan_save_alloc_info+0x3b/0x50 [ 14.562536] __kasan_kmalloc+0xb7/0xc0 [ 14.562734] __kmalloc_cache_noprof+0x189/0x420 [ 14.563260] kmalloc_oob_in_memset+0xac/0x320 [ 14.563792] kunit_try_run_case+0x1a5/0x480 [ 14.564174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.565229] kthread+0x337/0x6f0 [ 14.565496] ret_from_fork+0x116/0x1d0 [ 14.566021] ret_from_fork_asm+0x1a/0x30 [ 14.566570] [ 14.566905] The buggy address belongs to the object at ffff888103324c00 [ 14.566905] which belongs to the cache kmalloc-128 of size 128 [ 14.567937] The buggy address is located 0 bytes inside of [ 14.567937] allocated 120-byte region [ffff888103324c00, ffff888103324c78) [ 14.569090] [ 14.569228] The buggy address belongs to the physical page: [ 14.569699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 14.570453] flags: 0x200000000000000(node=0|zone=2) [ 14.570776] page_type: f5(slab) [ 14.570976] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.571467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.572258] page dumped because: kasan: bad access detected [ 14.572866] [ 14.573097] Memory state around the buggy address: [ 14.573481] ffff888103324b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.574145] ffff888103324b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.574666] >ffff888103324c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.575404] ^ [ 14.576516] ffff888103324c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576991] ffff888103324d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.577654] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
Automatically assigned
[ 14.494489] ================================================================== [ 14.495591] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 14.496070] Read of size 16 at addr ffff888101c20660 by task kunit_try_catch/185 [ 14.496547] [ 14.496819] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.496926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.496950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.496990] Call Trace: [ 14.497017] <TASK> [ 14.497055] dump_stack_lvl+0x73/0xb0 [ 14.497129] print_report+0xd1/0x650 [ 14.497174] ? __virt_addr_valid+0x1db/0x2d0 [ 14.497328] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.497377] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.497419] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.497476] kasan_report+0x141/0x180 [ 14.497525] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.497583] __asan_report_load16_noabort+0x18/0x20 [ 14.497631] kmalloc_uaf_16+0x47b/0x4c0 [ 14.497680] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 14.497725] ? __schedule+0x10cc/0x2b60 [ 14.497771] ? __pfx_read_tsc+0x10/0x10 [ 14.497978] ? ktime_get_ts64+0x86/0x230 [ 14.498032] kunit_try_run_case+0x1a5/0x480 [ 14.498081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.498120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.498171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.498372] ? __kthread_parkme+0x82/0x180 [ 14.498434] ? preempt_count_sub+0x50/0x80 [ 14.498509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.498535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.498563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.498588] kthread+0x337/0x6f0 [ 14.498609] ? trace_preempt_on+0x20/0xc0 [ 14.498636] ? __pfx_kthread+0x10/0x10 [ 14.498658] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.498682] ? calculate_sigpending+0x7b/0xa0 [ 14.498820] ? __pfx_kthread+0x10/0x10 [ 14.498848] ret_from_fork+0x116/0x1d0 [ 14.498870] ? __pfx_kthread+0x10/0x10 [ 14.498892] ret_from_fork_asm+0x1a/0x30 [ 14.498927] </TASK> [ 14.498941] [ 14.513863] Allocated by task 185: [ 14.514261] kasan_save_stack+0x45/0x70 [ 14.514658] kasan_save_track+0x18/0x40 [ 14.514999] kasan_save_alloc_info+0x3b/0x50 [ 14.515296] __kasan_kmalloc+0xb7/0xc0 [ 14.515982] __kmalloc_cache_noprof+0x189/0x420 [ 14.516516] kmalloc_uaf_16+0x15b/0x4c0 [ 14.517448] kunit_try_run_case+0x1a5/0x480 [ 14.518453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.518751] kthread+0x337/0x6f0 [ 14.519168] ret_from_fork+0x116/0x1d0 [ 14.519881] ret_from_fork_asm+0x1a/0x30 [ 14.520167] [ 14.520571] Freed by task 185: [ 14.521021] kasan_save_stack+0x45/0x70 [ 14.521624] kasan_save_track+0x18/0x40 [ 14.522157] kasan_save_free_info+0x3f/0x60 [ 14.522346] __kasan_slab_free+0x56/0x70 [ 14.522504] kfree+0x222/0x3f0 [ 14.522630] kmalloc_uaf_16+0x1d6/0x4c0 [ 14.523382] kunit_try_run_case+0x1a5/0x480 [ 14.523646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.523888] kthread+0x337/0x6f0 [ 14.524735] ret_from_fork+0x116/0x1d0 [ 14.525189] ret_from_fork_asm+0x1a/0x30 [ 14.525887] [ 14.526004] The buggy address belongs to the object at ffff888101c20660 [ 14.526004] which belongs to the cache kmalloc-16 of size 16 [ 14.527063] The buggy address is located 0 bytes inside of [ 14.527063] freed 16-byte region [ffff888101c20660, ffff888101c20670) [ 14.527916] [ 14.528417] The buggy address belongs to the physical page: [ 14.529148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20 [ 14.529400] flags: 0x200000000000000(node=0|zone=2) [ 14.529597] page_type: f5(slab) [ 14.529739] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.530559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.530868] page dumped because: kasan: bad access detected [ 14.531299] [ 14.531433] Memory state around the buggy address: [ 14.532007] ffff888101c20500: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.532434] ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.533753] >ffff888101c20600: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 14.534350] ^ [ 14.534985] ffff888101c20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.535432] ffff888101c20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.535763] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
Automatically assigned
[ 14.442491] ================================================================== [ 14.443118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 14.444174] Write of size 16 at addr ffff888101c20600 by task kunit_try_catch/183 [ 14.444937] [ 14.445364] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.445487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.445518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.445563] Call Trace: [ 14.445592] <TASK> [ 14.445633] dump_stack_lvl+0x73/0xb0 [ 14.445716] print_report+0xd1/0x650 [ 14.445767] ? __virt_addr_valid+0x1db/0x2d0 [ 14.445816] ? kmalloc_oob_16+0x452/0x4a0 [ 14.445853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.445882] ? kmalloc_oob_16+0x452/0x4a0 [ 14.445904] kasan_report+0x141/0x180 [ 14.445926] ? kmalloc_oob_16+0x452/0x4a0 [ 14.445953] __asan_report_store16_noabort+0x1b/0x30 [ 14.445974] kmalloc_oob_16+0x452/0x4a0 [ 14.445996] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 14.446020] ? __schedule+0x10cc/0x2b60 [ 14.446046] ? __pfx_read_tsc+0x10/0x10 [ 14.446070] ? ktime_get_ts64+0x86/0x230 [ 14.446098] kunit_try_run_case+0x1a5/0x480 [ 14.446124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.446144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.446170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.446195] ? __kthread_parkme+0x82/0x180 [ 14.446218] ? preempt_count_sub+0x50/0x80 [ 14.446243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.446265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.446290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.446315] kthread+0x337/0x6f0 [ 14.446335] ? trace_preempt_on+0x20/0xc0 [ 14.446361] ? __pfx_kthread+0x10/0x10 [ 14.446383] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.446406] ? calculate_sigpending+0x7b/0xa0 [ 14.446431] ? __pfx_kthread+0x10/0x10 [ 14.446473] ret_from_fork+0x116/0x1d0 [ 14.446531] ? __pfx_kthread+0x10/0x10 [ 14.446555] ret_from_fork_asm+0x1a/0x30 [ 14.446589] </TASK> [ 14.446603] [ 14.459870] Allocated by task 183: [ 14.460299] kasan_save_stack+0x45/0x70 [ 14.462753] kasan_save_track+0x18/0x40 [ 14.463013] kasan_save_alloc_info+0x3b/0x50 [ 14.463207] __kasan_kmalloc+0xb7/0xc0 [ 14.463397] __kmalloc_cache_noprof+0x189/0x420 [ 14.463677] kmalloc_oob_16+0xa8/0x4a0 [ 14.463998] kunit_try_run_case+0x1a5/0x480 [ 14.464299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.466058] kthread+0x337/0x6f0 [ 14.466433] ret_from_fork+0x116/0x1d0 [ 14.466874] ret_from_fork_asm+0x1a/0x30 [ 14.467055] [ 14.467156] The buggy address belongs to the object at ffff888101c20600 [ 14.467156] which belongs to the cache kmalloc-16 of size 16 [ 14.467594] The buggy address is located 0 bytes inside of [ 14.467594] allocated 13-byte region [ffff888101c20600, ffff888101c2060d) [ 14.468085] [ 14.468632] The buggy address belongs to the physical page: [ 14.470055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20 [ 14.470841] flags: 0x200000000000000(node=0|zone=2) [ 14.471170] page_type: f5(slab) [ 14.471490] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.472200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.472551] page dumped because: kasan: bad access detected [ 14.472915] [ 14.473045] Memory state around the buggy address: [ 14.473463] ffff888101c20500: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.474838] ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.475531] >ffff888101c20600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.477169] ^ [ 14.481786] ffff888101c20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.482353] ffff888101c20700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.482781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
Automatically assigned
[ 14.392279] ================================================================== [ 14.393492] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 14.393828] Read of size 1 at addr ffff888100342000 by task kunit_try_catch/181 [ 14.394106] [ 14.394263] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.394417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.394447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.394513] Call Trace: [ 14.394558] <TASK> [ 14.394599] dump_stack_lvl+0x73/0xb0 [ 14.394666] print_report+0xd1/0x650 [ 14.394787] ? __virt_addr_valid+0x1db/0x2d0 [ 14.394859] ? krealloc_uaf+0x53c/0x5e0 [ 14.394902] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.394941] ? krealloc_uaf+0x53c/0x5e0 [ 14.394979] kasan_report+0x141/0x180 [ 14.395021] ? krealloc_uaf+0x53c/0x5e0 [ 14.395076] __asan_report_load1_noabort+0x18/0x20 [ 14.395151] krealloc_uaf+0x53c/0x5e0 [ 14.395231] ? __pfx_krealloc_uaf+0x10/0x10 [ 14.395281] ? finish_task_switch.isra.0+0x153/0x700 [ 14.395332] ? __switch_to+0x47/0xf50 [ 14.395429] ? __schedule+0x10cc/0x2b60 [ 14.395502] ? __pfx_read_tsc+0x10/0x10 [ 14.395548] ? ktime_get_ts64+0x86/0x230 [ 14.395583] kunit_try_run_case+0x1a5/0x480 [ 14.395610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.395659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.395705] ? __kthread_parkme+0x82/0x180 [ 14.395772] ? preempt_count_sub+0x50/0x80 [ 14.395811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.395893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.395938] kthread+0x337/0x6f0 [ 14.395980] ? trace_preempt_on+0x20/0xc0 [ 14.396025] ? __pfx_kthread+0x10/0x10 [ 14.396070] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.396118] ? calculate_sigpending+0x7b/0xa0 [ 14.396167] ? __pfx_kthread+0x10/0x10 [ 14.396228] ret_from_fork+0x116/0x1d0 [ 14.396269] ? __pfx_kthread+0x10/0x10 [ 14.396324] ret_from_fork_asm+0x1a/0x30 [ 14.396395] </TASK> [ 14.396420] [ 14.410151] Allocated by task 181: [ 14.410436] kasan_save_stack+0x45/0x70 [ 14.411284] kasan_save_track+0x18/0x40 [ 14.411551] kasan_save_alloc_info+0x3b/0x50 [ 14.412274] __kasan_kmalloc+0xb7/0xc0 [ 14.412595] __kmalloc_cache_noprof+0x189/0x420 [ 14.413168] krealloc_uaf+0xbb/0x5e0 [ 14.413467] kunit_try_run_case+0x1a5/0x480 [ 14.414066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.414567] kthread+0x337/0x6f0 [ 14.414847] ret_from_fork+0x116/0x1d0 [ 14.415106] ret_from_fork_asm+0x1a/0x30 [ 14.415801] [ 14.416101] Freed by task 181: [ 14.416522] kasan_save_stack+0x45/0x70 [ 14.417204] kasan_save_track+0x18/0x40 [ 14.417542] kasan_save_free_info+0x3f/0x60 [ 14.418199] __kasan_slab_free+0x56/0x70 [ 14.418579] kfree+0x222/0x3f0 [ 14.419102] krealloc_uaf+0x13d/0x5e0 [ 14.419835] kunit_try_run_case+0x1a5/0x480 [ 14.420333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420564] kthread+0x337/0x6f0 [ 14.420811] ret_from_fork+0x116/0x1d0 [ 14.421577] ret_from_fork_asm+0x1a/0x30 [ 14.422271] [ 14.422407] The buggy address belongs to the object at ffff888100342000 [ 14.422407] which belongs to the cache kmalloc-256 of size 256 [ 14.423555] The buggy address is located 0 bytes inside of [ 14.423555] freed 256-byte region [ffff888100342000, ffff888100342100) [ 14.424028] [ 14.424159] The buggy address belongs to the physical page: [ 14.424383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 14.425120] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.425613] flags: 0x200000000000040(head|node=0|zone=2) [ 14.426074] page_type: f5(slab) [ 14.426475] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.426876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.427780] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.428569] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.429512] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 14.430261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.430845] page dumped because: kasan: bad access detected [ 14.431482] [ 14.431638] Memory state around the buggy address: [ 14.432024] ffff888100341f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.432669] ffff888100341f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.432889] >ffff888100342000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.433343] ^ [ 14.433696] ffff888100342080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.434565] ffff888100342100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.435383] ================================================================== [ 14.341532] ================================================================== [ 14.342795] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 14.343418] Read of size 1 at addr ffff888100342000 by task kunit_try_catch/181 [ 14.344652] [ 14.345015] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.345132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.345161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.345206] Call Trace: [ 14.345237] <TASK> [ 14.345281] dump_stack_lvl+0x73/0xb0 [ 14.345355] print_report+0xd1/0x650 [ 14.345405] ? __virt_addr_valid+0x1db/0x2d0 [ 14.345467] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345522] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.345580] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345624] kasan_report+0x141/0x180 [ 14.345671] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345720] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345824] __kasan_check_byte+0x3d/0x50 [ 14.345863] krealloc_noprof+0x3f/0x340 [ 14.345900] krealloc_uaf+0x1b8/0x5e0 [ 14.345931] ? __pfx_krealloc_uaf+0x10/0x10 [ 14.345960] ? finish_task_switch.isra.0+0x153/0x700 [ 14.345993] ? __switch_to+0x47/0xf50 [ 14.346029] ? __schedule+0x10cc/0x2b60 [ 14.346063] ? __pfx_read_tsc+0x10/0x10 [ 14.346094] ? ktime_get_ts64+0x86/0x230 [ 14.346133] kunit_try_run_case+0x1a5/0x480 [ 14.346172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.346200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.346239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.346278] ? __kthread_parkme+0x82/0x180 [ 14.346310] ? preempt_count_sub+0x50/0x80 [ 14.346345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.346375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.346412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.346492] kthread+0x337/0x6f0 [ 14.346518] ? trace_preempt_on+0x20/0xc0 [ 14.346545] ? __pfx_kthread+0x10/0x10 [ 14.346567] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.346592] ? calculate_sigpending+0x7b/0xa0 [ 14.346618] ? __pfx_kthread+0x10/0x10 [ 14.346641] ret_from_fork+0x116/0x1d0 [ 14.346661] ? __pfx_kthread+0x10/0x10 [ 14.346687] ret_from_fork_asm+0x1a/0x30 [ 14.346778] </TASK> [ 14.346802] [ 14.363373] Allocated by task 181: [ 14.363672] kasan_save_stack+0x45/0x70 [ 14.364254] kasan_save_track+0x18/0x40 [ 14.365043] kasan_save_alloc_info+0x3b/0x50 [ 14.365422] __kasan_kmalloc+0xb7/0xc0 [ 14.366070] __kmalloc_cache_noprof+0x189/0x420 [ 14.366416] krealloc_uaf+0xbb/0x5e0 [ 14.366960] kunit_try_run_case+0x1a5/0x480 [ 14.367171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.368140] kthread+0x337/0x6f0 [ 14.368392] ret_from_fork+0x116/0x1d0 [ 14.368564] ret_from_fork_asm+0x1a/0x30 [ 14.368905] [ 14.369402] Freed by task 181: [ 14.369705] kasan_save_stack+0x45/0x70 [ 14.370609] kasan_save_track+0x18/0x40 [ 14.371070] kasan_save_free_info+0x3f/0x60 [ 14.371869] __kasan_slab_free+0x56/0x70 [ 14.372172] kfree+0x222/0x3f0 [ 14.372357] krealloc_uaf+0x13d/0x5e0 [ 14.372744] kunit_try_run_case+0x1a5/0x480 [ 14.373351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.374168] kthread+0x337/0x6f0 [ 14.374382] ret_from_fork+0x116/0x1d0 [ 14.375033] ret_from_fork_asm+0x1a/0x30 [ 14.375611] [ 14.375796] The buggy address belongs to the object at ffff888100342000 [ 14.375796] which belongs to the cache kmalloc-256 of size 256 [ 14.377236] The buggy address is located 0 bytes inside of [ 14.377236] freed 256-byte region [ffff888100342000, ffff888100342100) [ 14.378341] [ 14.378765] The buggy address belongs to the physical page: [ 14.379083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 14.379647] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.380439] flags: 0x200000000000040(head|node=0|zone=2) [ 14.380876] page_type: f5(slab) [ 14.381319] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.381657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.382216] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.382974] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.383660] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 14.384767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.385086] page dumped because: kasan: bad access detected [ 14.385262] [ 14.385395] Memory state around the buggy address: [ 14.386446] ffff888100341f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387353] ffff888100341f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.388171] >ffff888100342000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.388878] ^ [ 14.389202] ffff888100342080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.390370] ffff888100342100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.390878] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
Automatically assigned
[ 14.217514] ================================================================== [ 14.217803] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 14.218144] Write of size 1 at addr ffff88810394e0d0 by task kunit_try_catch/179 [ 14.219593] [ 14.220263] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.220408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.220441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.220499] Call Trace: [ 14.220542] <TASK> [ 14.220584] dump_stack_lvl+0x73/0xb0 [ 14.220639] print_report+0xd1/0x650 [ 14.220666] ? __virt_addr_valid+0x1db/0x2d0 [ 14.220700] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 14.220779] ? kasan_addr_to_slab+0x11/0xa0 [ 14.220816] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 14.220853] kasan_report+0x141/0x180 [ 14.220886] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 14.220926] __asan_report_store1_noabort+0x1b/0x30 [ 14.220958] krealloc_less_oob_helper+0xe23/0x11d0 [ 14.220999] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.221033] ? finish_task_switch.isra.0+0x153/0x700 [ 14.221068] ? __switch_to+0x47/0xf50 [ 14.221109] ? __schedule+0x10cc/0x2b60 [ 14.221145] ? __pfx_read_tsc+0x10/0x10 [ 14.221182] krealloc_large_less_oob+0x1c/0x30 [ 14.221250] kunit_try_run_case+0x1a5/0x480 [ 14.221277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.221297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.221324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.221348] ? __kthread_parkme+0x82/0x180 [ 14.221371] ? preempt_count_sub+0x50/0x80 [ 14.221394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.221415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.221440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.221487] kthread+0x337/0x6f0 [ 14.221511] ? trace_preempt_on+0x20/0xc0 [ 14.221536] ? __pfx_kthread+0x10/0x10 [ 14.221557] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.221580] ? calculate_sigpending+0x7b/0xa0 [ 14.221605] ? __pfx_kthread+0x10/0x10 [ 14.221627] ret_from_fork+0x116/0x1d0 [ 14.221646] ? __pfx_kthread+0x10/0x10 [ 14.221666] ret_from_fork_asm+0x1a/0x30 [ 14.221714] </TASK> [ 14.221740] [ 14.234995] The buggy address belongs to the physical page: [ 14.235244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 14.236694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.237873] flags: 0x200000000000040(head|node=0|zone=2) [ 14.238292] page_type: f8(unknown) [ 14.238470] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.238733] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.239019] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.239283] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.239553] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 14.239811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.240062] page dumped because: kasan: bad access detected [ 14.240255] [ 14.240351] Memory state around the buggy address: [ 14.242320] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.242595] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.243394] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.243808] ^ [ 14.244448] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.244769] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.245566] ================================================================== [ 13.939106] ================================================================== [ 13.940785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 13.941805] Write of size 1 at addr ffff888100ab48d0 by task kunit_try_catch/175 [ 13.942697] [ 13.942864] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.942957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.942981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.943023] Call Trace: [ 13.943061] <TASK> [ 13.943098] dump_stack_lvl+0x73/0xb0 [ 13.943165] print_report+0xd1/0x650 [ 13.943209] ? __virt_addr_valid+0x1db/0x2d0 [ 13.943255] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.943299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.943340] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.943404] kasan_report+0x141/0x180 [ 13.943441] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 13.944229] __asan_report_store1_noabort+0x1b/0x30 [ 13.944312] krealloc_less_oob_helper+0xe23/0x11d0 [ 13.944358] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.944395] ? finish_task_switch.isra.0+0x153/0x700 [ 13.944434] ? __switch_to+0x47/0xf50 [ 13.944546] ? __schedule+0x10cc/0x2b60 [ 13.944587] ? __pfx_read_tsc+0x10/0x10 [ 13.944624] krealloc_less_oob+0x1c/0x30 [ 13.944657] kunit_try_run_case+0x1a5/0x480 [ 13.944695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.944755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.944800] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.944840] ? __kthread_parkme+0x82/0x180 [ 13.944874] ? preempt_count_sub+0x50/0x80 [ 13.944914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.944940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.944966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.944991] kthread+0x337/0x6f0 [ 13.945012] ? trace_preempt_on+0x20/0xc0 [ 13.945037] ? __pfx_kthread+0x10/0x10 [ 13.945059] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.945082] ? calculate_sigpending+0x7b/0xa0 [ 13.945107] ? __pfx_kthread+0x10/0x10 [ 13.945129] ret_from_fork+0x116/0x1d0 [ 13.945150] ? __pfx_kthread+0x10/0x10 [ 13.945171] ret_from_fork_asm+0x1a/0x30 [ 13.945226] </TASK> [ 13.945248] [ 13.959684] Allocated by task 175: [ 13.960061] kasan_save_stack+0x45/0x70 [ 13.960385] kasan_save_track+0x18/0x40 [ 13.961747] kasan_save_alloc_info+0x3b/0x50 [ 13.961974] __kasan_krealloc+0x190/0x1f0 [ 13.962120] krealloc_noprof+0xf3/0x340 [ 13.962258] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.963465] krealloc_less_oob+0x1c/0x30 [ 13.964050] kunit_try_run_case+0x1a5/0x480 [ 13.964493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.964803] kthread+0x337/0x6f0 [ 13.965358] ret_from_fork+0x116/0x1d0 [ 13.966161] ret_from_fork_asm+0x1a/0x30 [ 13.966635] [ 13.966839] The buggy address belongs to the object at ffff888100ab4800 [ 13.966839] which belongs to the cache kmalloc-256 of size 256 [ 13.967854] The buggy address is located 7 bytes to the right of [ 13.967854] allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9) [ 13.968751] [ 13.968994] The buggy address belongs to the physical page: [ 13.970281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 13.970616] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.971588] flags: 0x200000000000040(head|node=0|zone=2) [ 13.972346] page_type: f5(slab) [ 13.972775] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.973185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.974087] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.975298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.975917] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 13.977001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.977355] page dumped because: kasan: bad access detected [ 13.977575] [ 13.977719] Memory state around the buggy address: [ 13.978554] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.979175] ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.979607] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.980820] ^ [ 13.981159] ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.982211] ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.982515] ================================================================== [ 13.983860] ================================================================== [ 13.984357] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 13.985539] Write of size 1 at addr ffff888100ab48da by task kunit_try_catch/175 [ 13.986680] [ 13.986925] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.987024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.987045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.987079] Call Trace: [ 13.987116] <TASK> [ 13.987153] dump_stack_lvl+0x73/0xb0 [ 13.987217] print_report+0xd1/0x650 [ 13.987254] ? __virt_addr_valid+0x1db/0x2d0 [ 13.987291] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.987327] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.987375] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.987695] kasan_report+0x141/0x180 [ 13.987827] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 13.987896] __asan_report_store1_noabort+0x1b/0x30 [ 13.987936] krealloc_less_oob_helper+0xec6/0x11d0 [ 13.987981] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.988015] ? finish_task_switch.isra.0+0x153/0x700 [ 13.988041] ? __switch_to+0x47/0xf50 [ 13.988069] ? __schedule+0x10cc/0x2b60 [ 13.988095] ? __pfx_read_tsc+0x10/0x10 [ 13.988121] krealloc_less_oob+0x1c/0x30 [ 13.988144] kunit_try_run_case+0x1a5/0x480 [ 13.988168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.988189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.988243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.988271] ? __kthread_parkme+0x82/0x180 [ 13.988293] ? preempt_count_sub+0x50/0x80 [ 13.988317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.988339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.988365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.988390] kthread+0x337/0x6f0 [ 13.988411] ? trace_preempt_on+0x20/0xc0 [ 13.988436] ? __pfx_kthread+0x10/0x10 [ 13.988478] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.988506] ? calculate_sigpending+0x7b/0xa0 [ 13.988532] ? __pfx_kthread+0x10/0x10 [ 13.988554] ret_from_fork+0x116/0x1d0 [ 13.988575] ? __pfx_kthread+0x10/0x10 [ 13.988597] ret_from_fork_asm+0x1a/0x30 [ 13.988632] </TASK> [ 13.988645] [ 14.004392] Allocated by task 175: [ 14.005008] kasan_save_stack+0x45/0x70 [ 14.006254] kasan_save_track+0x18/0x40 [ 14.006548] kasan_save_alloc_info+0x3b/0x50 [ 14.006733] __kasan_krealloc+0x190/0x1f0 [ 14.007231] krealloc_noprof+0xf3/0x340 [ 14.007569] krealloc_less_oob_helper+0x1aa/0x11d0 [ 14.007964] krealloc_less_oob+0x1c/0x30 [ 14.008201] kunit_try_run_case+0x1a5/0x480 [ 14.008443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.009018] kthread+0x337/0x6f0 [ 14.009301] ret_from_fork+0x116/0x1d0 [ 14.009501] ret_from_fork_asm+0x1a/0x30 [ 14.010606] [ 14.010979] The buggy address belongs to the object at ffff888100ab4800 [ 14.010979] which belongs to the cache kmalloc-256 of size 256 [ 14.011778] The buggy address is located 17 bytes to the right of [ 14.011778] allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9) [ 14.012809] [ 14.012947] The buggy address belongs to the physical page: [ 14.013254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 14.013779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.014185] flags: 0x200000000000040(head|node=0|zone=2) [ 14.014719] page_type: f5(slab) [ 14.015027] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.015312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.016689] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.017316] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.017821] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 14.018340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.018736] page dumped because: kasan: bad access detected [ 14.019169] [ 14.019387] Memory state around the buggy address: [ 14.019815] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020287] ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.020578] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 14.021097] ^ [ 14.021625] ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.022097] ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.023647] ================================================================== [ 14.024922] ================================================================== [ 14.026013] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 14.026502] Write of size 1 at addr ffff888100ab48ea by task kunit_try_catch/175 [ 14.027553] [ 14.028091] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.028194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.028234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.028283] Call Trace: [ 14.028326] <TASK> [ 14.028404] dump_stack_lvl+0x73/0xb0 [ 14.028505] print_report+0xd1/0x650 [ 14.028556] ? __virt_addr_valid+0x1db/0x2d0 [ 14.028599] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.028628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.028651] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.028676] kasan_report+0x141/0x180 [ 14.028699] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.028747] __asan_report_store1_noabort+0x1b/0x30 [ 14.028812] krealloc_less_oob_helper+0xe90/0x11d0 [ 14.028857] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.028900] ? finish_task_switch.isra.0+0x153/0x700 [ 14.028925] ? __switch_to+0x47/0xf50 [ 14.028952] ? __schedule+0x10cc/0x2b60 [ 14.028977] ? __pfx_read_tsc+0x10/0x10 [ 14.029002] krealloc_less_oob+0x1c/0x30 [ 14.029025] kunit_try_run_case+0x1a5/0x480 [ 14.029049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.029069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.029094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.029118] ? __kthread_parkme+0x82/0x180 [ 14.029139] ? preempt_count_sub+0x50/0x80 [ 14.029162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.029183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.029246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.029275] kthread+0x337/0x6f0 [ 14.029295] ? trace_preempt_on+0x20/0xc0 [ 14.029320] ? __pfx_kthread+0x10/0x10 [ 14.029341] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.029363] ? calculate_sigpending+0x7b/0xa0 [ 14.029389] ? __pfx_kthread+0x10/0x10 [ 14.029411] ret_from_fork+0x116/0x1d0 [ 14.029430] ? __pfx_kthread+0x10/0x10 [ 14.029451] ret_from_fork_asm+0x1a/0x30 [ 14.029504] </TASK> [ 14.029517] [ 14.045243] Allocated by task 175: [ 14.045514] kasan_save_stack+0x45/0x70 [ 14.046204] kasan_save_track+0x18/0x40 [ 14.046595] kasan_save_alloc_info+0x3b/0x50 [ 14.047166] __kasan_krealloc+0x190/0x1f0 [ 14.047515] krealloc_noprof+0xf3/0x340 [ 14.047973] krealloc_less_oob_helper+0x1aa/0x11d0 [ 14.048405] krealloc_less_oob+0x1c/0x30 [ 14.048622] kunit_try_run_case+0x1a5/0x480 [ 14.049285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.049635] kthread+0x337/0x6f0 [ 14.050019] ret_from_fork+0x116/0x1d0 [ 14.050376] ret_from_fork_asm+0x1a/0x30 [ 14.050637] [ 14.051003] The buggy address belongs to the object at ffff888100ab4800 [ 14.051003] which belongs to the cache kmalloc-256 of size 256 [ 14.052070] The buggy address is located 33 bytes to the right of [ 14.052070] allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9) [ 14.053081] [ 14.053258] The buggy address belongs to the physical page: [ 14.053577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 14.054329] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.055265] flags: 0x200000000000040(head|node=0|zone=2) [ 14.055521] page_type: f5(slab) [ 14.055973] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.056492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.057088] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.057946] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.058599] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 14.059192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.059825] page dumped because: kasan: bad access detected [ 14.060134] [ 14.061303] Memory state around the buggy address: [ 14.061550] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.061804] ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.062447] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 14.062983] ^ [ 14.063405] ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.063945] ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.065266] ================================================================== [ 14.246592] ================================================================== [ 14.247034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 14.247361] Write of size 1 at addr ffff88810394e0da by task kunit_try_catch/179 [ 14.248687] [ 14.249469] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.249565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.249587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.249622] Call Trace: [ 14.249660] <TASK> [ 14.249696] dump_stack_lvl+0x73/0xb0 [ 14.249758] print_report+0xd1/0x650 [ 14.249798] ? __virt_addr_valid+0x1db/0x2d0 [ 14.249835] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 14.249873] ? kasan_addr_to_slab+0x11/0xa0 [ 14.249907] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 14.249952] kasan_report+0x141/0x180 [ 14.249999] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 14.250059] __asan_report_store1_noabort+0x1b/0x30 [ 14.250105] krealloc_less_oob_helper+0xec6/0x11d0 [ 14.250347] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.250412] ? finish_task_switch.isra.0+0x153/0x700 [ 14.250520] ? __switch_to+0x47/0xf50 [ 14.250560] ? __schedule+0x10cc/0x2b60 [ 14.250589] ? __pfx_read_tsc+0x10/0x10 [ 14.250615] krealloc_large_less_oob+0x1c/0x30 [ 14.250640] kunit_try_run_case+0x1a5/0x480 [ 14.250664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.250688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.250751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.250791] ? __kthread_parkme+0x82/0x180 [ 14.250827] ? preempt_count_sub+0x50/0x80 [ 14.250857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.250880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.250904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.250927] kthread+0x337/0x6f0 [ 14.250946] ? trace_preempt_on+0x20/0xc0 [ 14.250970] ? __pfx_kthread+0x10/0x10 [ 14.250990] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.251011] ? calculate_sigpending+0x7b/0xa0 [ 14.251036] ? __pfx_kthread+0x10/0x10 [ 14.251058] ret_from_fork+0x116/0x1d0 [ 14.251076] ? __pfx_kthread+0x10/0x10 [ 14.251096] ret_from_fork_asm+0x1a/0x30 [ 14.251128] </TASK> [ 14.251141] [ 14.267092] The buggy address belongs to the physical page: [ 14.268046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 14.268666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.269144] flags: 0x200000000000040(head|node=0|zone=2) [ 14.269407] page_type: f8(unknown) [ 14.269727] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.270125] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.270724] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.271090] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.271714] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 14.272083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.272554] page dumped because: kasan: bad access detected [ 14.273035] [ 14.273224] Memory state around the buggy address: [ 14.273479] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.273766] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.274040] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.274646] ^ [ 14.275903] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.276688] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.277182] ================================================================== [ 13.897505] ================================================================== [ 13.898625] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 13.899541] Write of size 1 at addr ffff888100ab48c9 by task kunit_try_catch/175 [ 13.900776] [ 13.901172] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.901369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.901400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.901441] Call Trace: [ 13.901490] <TASK> [ 13.901519] dump_stack_lvl+0x73/0xb0 [ 13.901570] print_report+0xd1/0x650 [ 13.901597] ? __virt_addr_valid+0x1db/0x2d0 [ 13.901623] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.901649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.901673] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.901752] kasan_report+0x141/0x180 [ 13.901798] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 13.901846] __asan_report_store1_noabort+0x1b/0x30 [ 13.901871] krealloc_less_oob_helper+0xd70/0x11d0 [ 13.901898] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 13.901924] ? finish_task_switch.isra.0+0x153/0x700 [ 13.901950] ? __switch_to+0x47/0xf50 [ 13.901979] ? __schedule+0x10cc/0x2b60 [ 13.902005] ? __pfx_read_tsc+0x10/0x10 [ 13.902031] krealloc_less_oob+0x1c/0x30 [ 13.902054] kunit_try_run_case+0x1a5/0x480 [ 13.902078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.902099] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.902125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.902150] ? __kthread_parkme+0x82/0x180 [ 13.902172] ? preempt_count_sub+0x50/0x80 [ 13.902211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.902261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.902288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.902314] kthread+0x337/0x6f0 [ 13.902335] ? trace_preempt_on+0x20/0xc0 [ 13.902362] ? __pfx_kthread+0x10/0x10 [ 13.902384] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.902408] ? calculate_sigpending+0x7b/0xa0 [ 13.902434] ? __pfx_kthread+0x10/0x10 [ 13.902472] ret_from_fork+0x116/0x1d0 [ 13.902498] ? __pfx_kthread+0x10/0x10 [ 13.902521] ret_from_fork_asm+0x1a/0x30 [ 13.902555] </TASK> [ 13.902569] [ 13.914941] Allocated by task 175: [ 13.915340] kasan_save_stack+0x45/0x70 [ 13.915758] kasan_save_track+0x18/0x40 [ 13.916197] kasan_save_alloc_info+0x3b/0x50 [ 13.916387] __kasan_krealloc+0x190/0x1f0 [ 13.917237] krealloc_noprof+0xf3/0x340 [ 13.917539] krealloc_less_oob_helper+0x1aa/0x11d0 [ 13.918626] krealloc_less_oob+0x1c/0x30 [ 13.919086] kunit_try_run_case+0x1a5/0x480 [ 13.919432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.919864] kthread+0x337/0x6f0 [ 13.920223] ret_from_fork+0x116/0x1d0 [ 13.920496] ret_from_fork_asm+0x1a/0x30 [ 13.920957] [ 13.921179] The buggy address belongs to the object at ffff888100ab4800 [ 13.921179] which belongs to the cache kmalloc-256 of size 256 [ 13.922371] The buggy address is located 0 bytes to the right of [ 13.922371] allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9) [ 13.923141] [ 13.923387] The buggy address belongs to the physical page: [ 13.924268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 13.924897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.925757] flags: 0x200000000000040(head|node=0|zone=2) [ 13.926548] page_type: f5(slab) [ 13.926837] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.927086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.927362] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.928317] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.928571] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 13.928789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.931079] page dumped because: kasan: bad access detected [ 13.931509] [ 13.931615] Memory state around the buggy address: [ 13.931825] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.932095] ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.932350] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 13.932618] ^ [ 13.932859] ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.933135] ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.933414] ================================================================== [ 14.278248] ================================================================== [ 14.278774] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 14.279645] Write of size 1 at addr ffff88810394e0ea by task kunit_try_catch/179 [ 14.280768] [ 14.281487] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.281563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.281577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.281601] Call Trace: [ 14.281625] <TASK> [ 14.281649] dump_stack_lvl+0x73/0xb0 [ 14.281702] print_report+0xd1/0x650 [ 14.281775] ? __virt_addr_valid+0x1db/0x2d0 [ 14.281818] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.281856] ? kasan_addr_to_slab+0x11/0xa0 [ 14.281887] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.281925] kasan_report+0x141/0x180 [ 14.281959] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 14.282002] __asan_report_store1_noabort+0x1b/0x30 [ 14.282033] krealloc_less_oob_helper+0xe90/0x11d0 [ 14.282071] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.282107] ? finish_task_switch.isra.0+0x153/0x700 [ 14.282143] ? __switch_to+0x47/0xf50 [ 14.282183] ? __schedule+0x10cc/0x2b60 [ 14.282241] ? __pfx_read_tsc+0x10/0x10 [ 14.282284] krealloc_large_less_oob+0x1c/0x30 [ 14.282321] kunit_try_run_case+0x1a5/0x480 [ 14.282348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.282368] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.282394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.282419] ? __kthread_parkme+0x82/0x180 [ 14.282441] ? preempt_count_sub+0x50/0x80 [ 14.282491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.282516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.282541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.282565] kthread+0x337/0x6f0 [ 14.282585] ? trace_preempt_on+0x20/0xc0 [ 14.282610] ? __pfx_kthread+0x10/0x10 [ 14.282631] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.282654] ? calculate_sigpending+0x7b/0xa0 [ 14.282679] ? __pfx_kthread+0x10/0x10 [ 14.282810] ret_from_fork+0x116/0x1d0 [ 14.282835] ? __pfx_kthread+0x10/0x10 [ 14.282856] ret_from_fork_asm+0x1a/0x30 [ 14.282890] </TASK> [ 14.282903] [ 14.294536] The buggy address belongs to the physical page: [ 14.295065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 14.295747] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.296261] flags: 0x200000000000040(head|node=0|zone=2) [ 14.297419] page_type: f8(unknown) [ 14.298259] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.299556] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.300178] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.300860] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.301389] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 14.301970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.302426] page dumped because: kasan: bad access detected [ 14.302898] [ 14.303040] Memory state around the buggy address: [ 14.303440] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.303814] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.304032] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.304232] ^ [ 14.304792] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.305378] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.305887] ================================================================== [ 14.066028] ================================================================== [ 14.066352] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 14.067208] Write of size 1 at addr ffff888100ab48eb by task kunit_try_catch/175 [ 14.068241] [ 14.068539] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.068643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.068670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.068721] Call Trace: [ 14.068768] <TASK> [ 14.068825] dump_stack_lvl+0x73/0xb0 [ 14.068897] print_report+0xd1/0x650 [ 14.068947] ? __virt_addr_valid+0x1db/0x2d0 [ 14.068995] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.069384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.069439] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.069495] kasan_report+0x141/0x180 [ 14.069524] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.069555] __asan_report_store1_noabort+0x1b/0x30 [ 14.069586] krealloc_less_oob_helper+0xd47/0x11d0 [ 14.069630] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.069676] ? finish_task_switch.isra.0+0x153/0x700 [ 14.069723] ? __switch_to+0x47/0xf50 [ 14.069771] ? __schedule+0x10cc/0x2b60 [ 14.069821] ? __pfx_read_tsc+0x10/0x10 [ 14.069873] krealloc_less_oob+0x1c/0x30 [ 14.069916] kunit_try_run_case+0x1a5/0x480 [ 14.070325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.070370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.070398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.070424] ? __kthread_parkme+0x82/0x180 [ 14.070447] ? preempt_count_sub+0x50/0x80 [ 14.070488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.070512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.070539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.070565] kthread+0x337/0x6f0 [ 14.070586] ? trace_preempt_on+0x20/0xc0 [ 14.070613] ? __pfx_kthread+0x10/0x10 [ 14.070635] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.070659] ? calculate_sigpending+0x7b/0xa0 [ 14.070688] ? __pfx_kthread+0x10/0x10 [ 14.070760] ret_from_fork+0x116/0x1d0 [ 14.070804] ? __pfx_kthread+0x10/0x10 [ 14.070835] ret_from_fork_asm+0x1a/0x30 [ 14.070871] </TASK> [ 14.070884] [ 14.087173] Allocated by task 175: [ 14.087581] kasan_save_stack+0x45/0x70 [ 14.088480] kasan_save_track+0x18/0x40 [ 14.089036] kasan_save_alloc_info+0x3b/0x50 [ 14.089314] __kasan_krealloc+0x190/0x1f0 [ 14.089537] krealloc_noprof+0xf3/0x340 [ 14.090196] krealloc_less_oob_helper+0x1aa/0x11d0 [ 14.090499] krealloc_less_oob+0x1c/0x30 [ 14.090839] kunit_try_run_case+0x1a5/0x480 [ 14.091368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091727] kthread+0x337/0x6f0 [ 14.091934] ret_from_fork+0x116/0x1d0 [ 14.092213] ret_from_fork_asm+0x1a/0x30 [ 14.093035] [ 14.093394] The buggy address belongs to the object at ffff888100ab4800 [ 14.093394] which belongs to the cache kmalloc-256 of size 256 [ 14.094033] The buggy address is located 34 bytes to the right of [ 14.094033] allocated 201-byte region [ffff888100ab4800, ffff888100ab48c9) [ 14.094679] [ 14.094891] The buggy address belongs to the physical page: [ 14.095449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 14.096283] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.096965] flags: 0x200000000000040(head|node=0|zone=2) [ 14.097216] page_type: f5(slab) [ 14.097576] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.098470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.099023] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.099623] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.100280] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 14.100641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.100872] page dumped because: kasan: bad access detected [ 14.101572] [ 14.102044] Memory state around the buggy address: [ 14.103051] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.103892] ffff888100ab4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.104794] >ffff888100ab4880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 14.105173] ^ [ 14.105995] ffff888100ab4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107053] ffff888100ab4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107560] ================================================================== [ 14.178331] ================================================================== [ 14.179265] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 14.179645] Write of size 1 at addr ffff88810394e0c9 by task kunit_try_catch/179 [ 14.180072] [ 14.180496] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.180613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.180643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.180687] Call Trace: [ 14.180716] <TASK> [ 14.180753] dump_stack_lvl+0x73/0xb0 [ 14.180819] print_report+0xd1/0x650 [ 14.180891] ? __virt_addr_valid+0x1db/0x2d0 [ 14.180939] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 14.181121] ? kasan_addr_to_slab+0x11/0xa0 [ 14.181161] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 14.181203] kasan_report+0x141/0x180 [ 14.181262] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 14.181314] __asan_report_store1_noabort+0x1b/0x30 [ 14.181355] krealloc_less_oob_helper+0xd70/0x11d0 [ 14.181405] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.181469] ? finish_task_switch.isra.0+0x153/0x700 [ 14.181517] ? __switch_to+0x47/0xf50 [ 14.181570] ? __schedule+0x10cc/0x2b60 [ 14.181621] ? __pfx_read_tsc+0x10/0x10 [ 14.181672] krealloc_large_less_oob+0x1c/0x30 [ 14.181870] kunit_try_run_case+0x1a5/0x480 [ 14.181929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.181974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.182035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.182076] ? __kthread_parkme+0x82/0x180 [ 14.182111] ? preempt_count_sub+0x50/0x80 [ 14.182147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.182243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.182287] kthread+0x337/0x6f0 [ 14.182311] ? trace_preempt_on+0x20/0xc0 [ 14.182337] ? __pfx_kthread+0x10/0x10 [ 14.182358] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.182382] ? calculate_sigpending+0x7b/0xa0 [ 14.182407] ? __pfx_kthread+0x10/0x10 [ 14.182429] ret_from_fork+0x116/0x1d0 [ 14.182449] ? __pfx_kthread+0x10/0x10 [ 14.182497] ret_from_fork_asm+0x1a/0x30 [ 14.182531] </TASK> [ 14.182545] [ 14.198929] The buggy address belongs to the physical page: [ 14.199442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 14.200075] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.203847] flags: 0x200000000000040(head|node=0|zone=2) [ 14.204573] page_type: f8(unknown) [ 14.205728] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.207303] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.207700] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.207996] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.209373] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 14.209636] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.210180] page dumped because: kasan: bad access detected [ 14.211235] [ 14.211437] Memory state around the buggy address: [ 14.211744] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.212403] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.213698] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.214079] ^ [ 14.214794] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.215360] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.216119] ================================================================== [ 14.306539] ================================================================== [ 14.307280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 14.307787] Write of size 1 at addr ffff88810394e0eb by task kunit_try_catch/179 [ 14.308214] [ 14.308439] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.308539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.308558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.308594] Call Trace: [ 14.308632] <TASK> [ 14.308666] dump_stack_lvl+0x73/0xb0 [ 14.308755] print_report+0xd1/0x650 [ 14.308802] ? __virt_addr_valid+0x1db/0x2d0 [ 14.308850] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.308897] ? kasan_addr_to_slab+0x11/0xa0 [ 14.308944] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.308998] kasan_report+0x141/0x180 [ 14.309050] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 14.309114] __asan_report_store1_noabort+0x1b/0x30 [ 14.309168] krealloc_less_oob_helper+0xd47/0x11d0 [ 14.309256] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 14.309318] ? finish_task_switch.isra.0+0x153/0x700 [ 14.309365] ? __switch_to+0x47/0xf50 [ 14.309421] ? __schedule+0x10cc/0x2b60 [ 14.309487] ? __pfx_read_tsc+0x10/0x10 [ 14.309538] krealloc_large_less_oob+0x1c/0x30 [ 14.309594] kunit_try_run_case+0x1a5/0x480 [ 14.309646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.309691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.309746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.309800] ? __kthread_parkme+0x82/0x180 [ 14.309849] ? preempt_count_sub+0x50/0x80 [ 14.309900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.309956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.309993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.310029] kthread+0x337/0x6f0 [ 14.310068] ? trace_preempt_on+0x20/0xc0 [ 14.310105] ? __pfx_kthread+0x10/0x10 [ 14.310137] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.310173] ? calculate_sigpending+0x7b/0xa0 [ 14.310224] ? __pfx_kthread+0x10/0x10 [ 14.310259] ret_from_fork+0x116/0x1d0 [ 14.310289] ? __pfx_kthread+0x10/0x10 [ 14.310325] ret_from_fork_asm+0x1a/0x30 [ 14.310386] </TASK> [ 14.310408] [ 14.319870] The buggy address belongs to the physical page: [ 14.320435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394c [ 14.321101] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.321740] flags: 0x200000000000040(head|node=0|zone=2) [ 14.322171] page_type: f8(unknown) [ 14.322523] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.323306] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.323984] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.324344] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.325024] head: 0200000000000002 ffffea00040e5301 00000000ffffffff 00000000ffffffff [ 14.325516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.325987] page dumped because: kasan: bad access detected [ 14.326222] [ 14.326343] Memory state around the buggy address: [ 14.326575] ffff88810394df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.327138] ffff88810394e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.327791] >ffff88810394e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 14.328232] ^ [ 14.328564] ffff88810394e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.329056] ffff88810394e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.329561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
Automatically assigned
[ 14.145353] ================================================================== [ 14.145814] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 14.146261] Write of size 1 at addr ffff8881038ba0f0 by task kunit_try_catch/177 [ 14.146832] [ 14.147055] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.147154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.147182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.148231] Call Trace: [ 14.148293] <TASK> [ 14.148336] dump_stack_lvl+0x73/0xb0 [ 14.148414] print_report+0xd1/0x650 [ 14.148479] ? __virt_addr_valid+0x1db/0x2d0 [ 14.148535] ? krealloc_more_oob_helper+0x7eb/0x930 [ 14.148589] ? kasan_addr_to_slab+0x11/0xa0 [ 14.148637] ? krealloc_more_oob_helper+0x7eb/0x930 [ 14.148677] kasan_report+0x141/0x180 [ 14.148719] ? krealloc_more_oob_helper+0x7eb/0x930 [ 14.148784] __asan_report_store1_noabort+0x1b/0x30 [ 14.148833] krealloc_more_oob_helper+0x7eb/0x930 [ 14.148884] ? __schedule+0x10cc/0x2b60 [ 14.148938] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 14.148994] ? finish_task_switch.isra.0+0x153/0x700 [ 14.149074] ? __switch_to+0x47/0xf50 [ 14.149129] ? __schedule+0x10cc/0x2b60 [ 14.149170] ? __pfx_read_tsc+0x10/0x10 [ 14.149230] krealloc_large_more_oob+0x1c/0x30 [ 14.149273] kunit_try_run_case+0x1a5/0x480 [ 14.149299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.149321] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.149349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.149375] ? __kthread_parkme+0x82/0x180 [ 14.149398] ? preempt_count_sub+0x50/0x80 [ 14.149424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.149446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.149500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.149528] kthread+0x337/0x6f0 [ 14.149551] ? trace_preempt_on+0x20/0xc0 [ 14.149576] ? __pfx_kthread+0x10/0x10 [ 14.149599] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.149623] ? calculate_sigpending+0x7b/0xa0 [ 14.149648] ? __pfx_kthread+0x10/0x10 [ 14.149669] ret_from_fork+0x116/0x1d0 [ 14.149695] ? __pfx_kthread+0x10/0x10 [ 14.149751] ret_from_fork_asm+0x1a/0x30 [ 14.149808] </TASK> [ 14.149824] [ 14.159086] The buggy address belongs to the physical page: [ 14.159516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b8 [ 14.160115] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.160691] flags: 0x200000000000040(head|node=0|zone=2) [ 14.160959] page_type: f8(unknown) [ 14.161159] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.161498] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.162094] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.162879] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.163506] head: 0200000000000002 ffffea00040e2e01 00000000ffffffff 00000000ffffffff [ 14.163925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.164249] page dumped because: kasan: bad access detected [ 14.164502] [ 14.164687] Memory state around the buggy address: [ 14.165162] ffff8881038b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.165692] ffff8881038ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.166351] >ffff8881038ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 14.166557] ^ [ 14.166770] ffff8881038ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.166971] ffff8881038ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.167502] ================================================================== [ 13.823255] ================================================================== [ 13.823991] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 13.825515] Write of size 1 at addr ffff888100ab46eb by task kunit_try_catch/173 [ 13.826275] [ 13.826474] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.826618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.826663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.826868] Call Trace: [ 13.826953] <TASK> [ 13.826996] dump_stack_lvl+0x73/0xb0 [ 13.827047] print_report+0xd1/0x650 [ 13.827075] ? __virt_addr_valid+0x1db/0x2d0 [ 13.827103] ? krealloc_more_oob_helper+0x821/0x930 [ 13.827137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.827175] ? krealloc_more_oob_helper+0x821/0x930 [ 13.827245] kasan_report+0x141/0x180 [ 13.827273] ? krealloc_more_oob_helper+0x821/0x930 [ 13.827303] __asan_report_store1_noabort+0x1b/0x30 [ 13.827325] krealloc_more_oob_helper+0x821/0x930 [ 13.827362] ? trace_hardirqs_on+0x37/0xe0 [ 13.827398] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.827423] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.827472] ? __pfx_krealloc_more_oob+0x10/0x10 [ 13.827506] krealloc_more_oob+0x1c/0x30 [ 13.827530] kunit_try_run_case+0x1a5/0x480 [ 13.827556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.827577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.827605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.827631] ? __kthread_parkme+0x82/0x180 [ 13.827655] ? preempt_count_sub+0x50/0x80 [ 13.827681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.827703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.827729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.827791] kthread+0x337/0x6f0 [ 13.827826] ? trace_preempt_on+0x20/0xc0 [ 13.827862] ? __pfx_kthread+0x10/0x10 [ 13.827896] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.827932] ? calculate_sigpending+0x7b/0xa0 [ 13.827968] ? __pfx_kthread+0x10/0x10 [ 13.827991] ret_from_fork+0x116/0x1d0 [ 13.828014] ? __pfx_kthread+0x10/0x10 [ 13.828036] ret_from_fork_asm+0x1a/0x30 [ 13.828069] </TASK> [ 13.828082] [ 13.839683] Allocated by task 173: [ 13.840088] kasan_save_stack+0x45/0x70 [ 13.840629] kasan_save_track+0x18/0x40 [ 13.841082] kasan_save_alloc_info+0x3b/0x50 [ 13.841317] __kasan_krealloc+0x190/0x1f0 [ 13.841731] krealloc_noprof+0xf3/0x340 [ 13.842171] krealloc_more_oob_helper+0x1a9/0x930 [ 13.842365] krealloc_more_oob+0x1c/0x30 [ 13.842608] kunit_try_run_case+0x1a5/0x480 [ 13.843000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.843496] kthread+0x337/0x6f0 [ 13.843813] ret_from_fork+0x116/0x1d0 [ 13.844143] ret_from_fork_asm+0x1a/0x30 [ 13.844603] [ 13.844805] The buggy address belongs to the object at ffff888100ab4600 [ 13.844805] which belongs to the cache kmalloc-256 of size 256 [ 13.845619] The buggy address is located 0 bytes to the right of [ 13.845619] allocated 235-byte region [ffff888100ab4600, ffff888100ab46eb) [ 13.846078] [ 13.846237] The buggy address belongs to the physical page: [ 13.846559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 13.847148] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.847769] flags: 0x200000000000040(head|node=0|zone=2) [ 13.848245] page_type: f5(slab) [ 13.848439] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.849263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.849831] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.850130] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.852200] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 13.852747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.853079] page dumped because: kasan: bad access detected [ 13.853351] [ 13.853483] Memory state around the buggy address: [ 13.853716] ffff888100ab4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.853988] ffff888100ab4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.854307] >ffff888100ab4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 13.854823] ^ [ 13.855385] ffff888100ab4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.855919] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.856509] ================================================================== [ 14.114116] ================================================================== [ 14.114738] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 14.115616] Write of size 1 at addr ffff8881038ba0eb by task kunit_try_catch/177 [ 14.116250] [ 14.116413] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.116522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.116548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.116591] Call Trace: [ 14.116620] <TASK> [ 14.116663] dump_stack_lvl+0x73/0xb0 [ 14.116732] print_report+0xd1/0x650 [ 14.116775] ? __virt_addr_valid+0x1db/0x2d0 [ 14.116815] ? krealloc_more_oob_helper+0x821/0x930 [ 14.116853] ? kasan_addr_to_slab+0x11/0xa0 [ 14.116889] ? krealloc_more_oob_helper+0x821/0x930 [ 14.116928] kasan_report+0x141/0x180 [ 14.116972] ? krealloc_more_oob_helper+0x821/0x930 [ 14.117028] __asan_report_store1_noabort+0x1b/0x30 [ 14.117072] krealloc_more_oob_helper+0x821/0x930 [ 14.117118] ? __schedule+0x10cc/0x2b60 [ 14.117166] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 14.117760] ? finish_task_switch.isra.0+0x153/0x700 [ 14.117851] ? __switch_to+0x47/0xf50 [ 14.117893] ? __schedule+0x10cc/0x2b60 [ 14.117931] ? __pfx_read_tsc+0x10/0x10 [ 14.117971] krealloc_large_more_oob+0x1c/0x30 [ 14.118010] kunit_try_run_case+0x1a5/0x480 [ 14.118047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.118078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.118117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.118156] ? __kthread_parkme+0x82/0x180 [ 14.118240] ? preempt_count_sub+0x50/0x80 [ 14.118296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.118354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.118385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.118411] kthread+0x337/0x6f0 [ 14.118434] ? trace_preempt_on+0x20/0xc0 [ 14.118483] ? __pfx_kthread+0x10/0x10 [ 14.118509] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.118533] ? calculate_sigpending+0x7b/0xa0 [ 14.118560] ? __pfx_kthread+0x10/0x10 [ 14.118583] ret_from_fork+0x116/0x1d0 [ 14.118605] ? __pfx_kthread+0x10/0x10 [ 14.118627] ret_from_fork_asm+0x1a/0x30 [ 14.118661] </TASK> [ 14.118676] [ 14.134481] The buggy address belongs to the physical page: [ 14.135518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b8 [ 14.136507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.137084] flags: 0x200000000000040(head|node=0|zone=2) [ 14.137495] page_type: f8(unknown) [ 14.137697] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.138499] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.139158] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.139505] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.140205] head: 0200000000000002 ffffea00040e2e01 00000000ffffffff 00000000ffffffff [ 14.140495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.140744] page dumped because: kasan: bad access detected [ 14.140928] [ 14.141022] Memory state around the buggy address: [ 14.141199] ffff8881038b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.141429] ffff8881038ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.141703] >ffff8881038ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 14.141971] ^ [ 14.142228] ffff8881038ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.143405] ffff8881038ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.144063] ================================================================== [ 13.857524] ================================================================== [ 13.858377] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 13.859148] Write of size 1 at addr ffff888100ab46f0 by task kunit_try_catch/173 [ 13.859730] [ 13.859892] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.859992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.860052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.860090] Call Trace: [ 13.860129] <TASK> [ 13.860167] dump_stack_lvl+0x73/0xb0 [ 13.860253] print_report+0xd1/0x650 [ 13.860293] ? __virt_addr_valid+0x1db/0x2d0 [ 13.860332] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.860368] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.860402] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.860440] kasan_report+0x141/0x180 [ 13.860495] ? krealloc_more_oob_helper+0x7eb/0x930 [ 13.860545] __asan_report_store1_noabort+0x1b/0x30 [ 13.860586] krealloc_more_oob_helper+0x7eb/0x930 [ 13.860629] ? trace_hardirqs_on+0x37/0xe0 [ 13.860678] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 13.860740] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.860810] ? __pfx_krealloc_more_oob+0x10/0x10 [ 13.860871] krealloc_more_oob+0x1c/0x30 [ 13.860913] kunit_try_run_case+0x1a5/0x480 [ 13.860954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.860994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.861044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.861092] ? __kthread_parkme+0x82/0x180 [ 13.861138] ? preempt_count_sub+0x50/0x80 [ 13.861189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.861236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.861291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.861344] kthread+0x337/0x6f0 [ 13.861390] ? trace_preempt_on+0x20/0xc0 [ 13.861439] ? __pfx_kthread+0x10/0x10 [ 13.861499] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.861549] ? calculate_sigpending+0x7b/0xa0 [ 13.861602] ? __pfx_kthread+0x10/0x10 [ 13.861652] ret_from_fork+0x116/0x1d0 [ 13.861698] ? __pfx_kthread+0x10/0x10 [ 13.861746] ret_from_fork_asm+0x1a/0x30 [ 13.861820] </TASK> [ 13.861848] [ 13.871586] Allocated by task 173: [ 13.871844] kasan_save_stack+0x45/0x70 [ 13.872090] kasan_save_track+0x18/0x40 [ 13.872324] kasan_save_alloc_info+0x3b/0x50 [ 13.872601] __kasan_krealloc+0x190/0x1f0 [ 13.872950] krealloc_noprof+0xf3/0x340 [ 13.873333] krealloc_more_oob_helper+0x1a9/0x930 [ 13.873790] krealloc_more_oob+0x1c/0x30 [ 13.874118] kunit_try_run_case+0x1a5/0x480 [ 13.874472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.874900] kthread+0x337/0x6f0 [ 13.875240] ret_from_fork+0x116/0x1d0 [ 13.875600] ret_from_fork_asm+0x1a/0x30 [ 13.876016] [ 13.876222] The buggy address belongs to the object at ffff888100ab4600 [ 13.876222] which belongs to the cache kmalloc-256 of size 256 [ 13.876725] The buggy address is located 5 bytes to the right of [ 13.876725] allocated 235-byte region [ffff888100ab4600, ffff888100ab46eb) [ 13.877725] [ 13.877890] The buggy address belongs to the physical page: [ 13.878128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab4 [ 13.878470] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.879063] flags: 0x200000000000040(head|node=0|zone=2) [ 13.879593] page_type: f5(slab) [ 13.879894] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.880343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.880574] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 13.881055] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.881689] head: 0200000000000001 ffffea000402ad01 00000000ffffffff 00000000ffffffff [ 13.882101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 13.883443] page dumped because: kasan: bad access detected [ 13.883930] [ 13.884052] Memory state around the buggy address: [ 13.884334] ffff888100ab4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.885056] ffff888100ab4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.885641] >ffff888100ab4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 13.886912] ^ [ 13.887553] ffff888100ab4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.888235] ffff888100ab4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.888548] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
Automatically assigned
[ 13.793476] ================================================================== [ 13.795016] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 13.795520] Read of size 1 at addr ffff888103990000 by task kunit_try_catch/171 [ 13.796104] [ 13.796295] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.796364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.796379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.796404] Call Trace: [ 13.796422] <TASK> [ 13.796447] dump_stack_lvl+0x73/0xb0 [ 13.796505] print_report+0xd1/0x650 [ 13.796532] ? __virt_addr_valid+0x1db/0x2d0 [ 13.796558] ? page_alloc_uaf+0x356/0x3d0 [ 13.796583] ? kasan_addr_to_slab+0x11/0xa0 [ 13.796605] ? page_alloc_uaf+0x356/0x3d0 [ 13.796630] kasan_report+0x141/0x180 [ 13.796654] ? page_alloc_uaf+0x356/0x3d0 [ 13.796683] __asan_report_load1_noabort+0x18/0x20 [ 13.796705] page_alloc_uaf+0x356/0x3d0 [ 13.796729] ? __pfx_page_alloc_uaf+0x10/0x10 [ 13.796755] ? __schedule+0x10cc/0x2b60 [ 13.796781] ? __pfx_read_tsc+0x10/0x10 [ 13.796805] ? ktime_get_ts64+0x86/0x230 [ 13.796833] kunit_try_run_case+0x1a5/0x480 [ 13.796856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.796877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.796904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.796930] ? __kthread_parkme+0x82/0x180 [ 13.796953] ? preempt_count_sub+0x50/0x80 [ 13.796979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.797001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.797028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.797054] kthread+0x337/0x6f0 [ 13.797075] ? trace_preempt_on+0x20/0xc0 [ 13.797101] ? __pfx_kthread+0x10/0x10 [ 13.797123] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.797147] ? calculate_sigpending+0x7b/0xa0 [ 13.797174] ? __pfx_kthread+0x10/0x10 [ 13.797203] ret_from_fork+0x116/0x1d0 [ 13.797264] ? __pfx_kthread+0x10/0x10 [ 13.797306] ret_from_fork_asm+0x1a/0x30 [ 13.797373] </TASK> [ 13.797397] [ 13.809204] The buggy address belongs to the physical page: [ 13.809775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990 [ 13.810528] flags: 0x200000000000000(node=0|zone=2) [ 13.811043] page_type: f0(buddy) [ 13.811510] raw: 0200000000000000 ffff88817fffb460 ffff88817fffb460 0000000000000000 [ 13.812168] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 13.812776] page dumped because: kasan: bad access detected [ 13.813106] [ 13.813257] Memory state around the buggy address: [ 13.813492] ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.813877] ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.814222] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.814731] ^ [ 13.814913] ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.815497] ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.815965] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
Automatically assigned
[ 13.754157] ================================================================== [ 13.754837] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 13.756035] Free of addr ffff888103948001 by task kunit_try_catch/167 [ 13.756325] [ 13.756471] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.756562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.756585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.756617] Call Trace: [ 13.756635] <TASK> [ 13.756661] dump_stack_lvl+0x73/0xb0 [ 13.756702] print_report+0xd1/0x650 [ 13.756729] ? __virt_addr_valid+0x1db/0x2d0 [ 13.756757] ? kasan_addr_to_slab+0x11/0xa0 [ 13.756779] ? kfree+0x274/0x3f0 [ 13.756898] kasan_report_invalid_free+0x10a/0x130 [ 13.756959] ? kfree+0x274/0x3f0 [ 13.757003] ? kfree+0x274/0x3f0 [ 13.757036] __kasan_kfree_large+0x86/0xd0 [ 13.757078] free_large_kmalloc+0x4b/0x110 [ 13.757130] kfree+0x274/0x3f0 [ 13.757176] kmalloc_large_invalid_free+0x120/0x2b0 [ 13.757239] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 13.757295] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 13.757356] kunit_try_run_case+0x1a5/0x480 [ 13.757406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.757441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.757531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.757584] ? __kthread_parkme+0x82/0x180 [ 13.757633] ? preempt_count_sub+0x50/0x80 [ 13.757697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.757747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.757803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.757855] kthread+0x337/0x6f0 [ 13.757901] ? trace_preempt_on+0x20/0xc0 [ 13.757957] ? __pfx_kthread+0x10/0x10 [ 13.757997] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.758037] ? calculate_sigpending+0x7b/0xa0 [ 13.758108] ? __pfx_kthread+0x10/0x10 [ 13.758148] ret_from_fork+0x116/0x1d0 [ 13.758186] ? __pfx_kthread+0x10/0x10 [ 13.758256] ret_from_fork_asm+0x1a/0x30 [ 13.758297] </TASK> [ 13.758311] [ 13.770631] The buggy address belongs to the physical page: [ 13.771054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103948 [ 13.771418] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.771712] flags: 0x200000000000040(head|node=0|zone=2) [ 13.772119] page_type: f8(unknown) [ 13.772441] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.773143] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.773883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.774699] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.775004] head: 0200000000000002 ffffea00040e5201 00000000ffffffff 00000000ffffffff [ 13.775354] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.775991] page dumped because: kasan: bad access detected [ 13.776426] [ 13.776657] Memory state around the buggy address: [ 13.777070] ffff888103947f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.777484] ffff888103947f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.777766] >ffff888103948000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.778297] ^ [ 13.778657] ffff888103948080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.779122] ffff888103948100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.779524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
Automatically assigned
[ 13.722356] ================================================================== [ 13.723118] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 13.723498] Read of size 1 at addr ffff888103948000 by task kunit_try_catch/165 [ 13.723855] [ 13.723995] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.724054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.724068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.724091] Call Trace: [ 13.724108] <TASK> [ 13.724133] dump_stack_lvl+0x73/0xb0 [ 13.724166] print_report+0xd1/0x650 [ 13.724190] ? __virt_addr_valid+0x1db/0x2d0 [ 13.724702] ? kmalloc_large_uaf+0x2f1/0x340 [ 13.724770] ? kasan_addr_to_slab+0x11/0xa0 [ 13.725163] ? kmalloc_large_uaf+0x2f1/0x340 [ 13.725218] kasan_report+0x141/0x180 [ 13.725273] ? kmalloc_large_uaf+0x2f1/0x340 [ 13.725353] __asan_report_load1_noabort+0x18/0x20 [ 13.725385] kmalloc_large_uaf+0x2f1/0x340 [ 13.725409] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 13.725435] ? __schedule+0x10cc/0x2b60 [ 13.725486] ? __pfx_read_tsc+0x10/0x10 [ 13.725516] ? ktime_get_ts64+0x86/0x230 [ 13.725544] kunit_try_run_case+0x1a5/0x480 [ 13.725568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.725589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.725617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.725643] ? __kthread_parkme+0x82/0x180 [ 13.725666] ? preempt_count_sub+0x50/0x80 [ 13.725692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.725714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.725740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.725765] kthread+0x337/0x6f0 [ 13.725787] ? trace_preempt_on+0x20/0xc0 [ 13.725812] ? __pfx_kthread+0x10/0x10 [ 13.725834] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.725858] ? calculate_sigpending+0x7b/0xa0 [ 13.725884] ? __pfx_kthread+0x10/0x10 [ 13.725907] ret_from_fork+0x116/0x1d0 [ 13.725928] ? __pfx_kthread+0x10/0x10 [ 13.725950] ret_from_fork_asm+0x1a/0x30 [ 13.725983] </TASK> [ 13.725996] [ 13.735988] The buggy address belongs to the physical page: [ 13.736539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103948 [ 13.737356] flags: 0x200000000000000(node=0|zone=2) [ 13.737826] raw: 0200000000000000 ffffea00040e5308 ffff88815b139f80 0000000000000000 [ 13.738123] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 13.738867] page dumped because: kasan: bad access detected [ 13.739082] [ 13.739273] Memory state around the buggy address: [ 13.739783] ffff888103947f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.740098] ffff888103947f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.740739] >ffff888103948000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.741225] ^ [ 13.741651] ffff888103948080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.742058] ffff888103948100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.742417] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
Automatically assigned
[ 13.570876] ================================================================== [ 13.571687] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.572489] Write of size 1 at addr ffff888103324a78 by task kunit_try_catch/159 [ 13.572742] [ 13.572894] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.572982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.573005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.573047] Call Trace: [ 13.573072] <TASK> [ 13.573108] dump_stack_lvl+0x73/0xb0 [ 13.573170] print_report+0xd1/0x650 [ 13.573210] ? __virt_addr_valid+0x1db/0x2d0 [ 13.573251] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.573293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.573368] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.573415] kasan_report+0x141/0x180 [ 13.573467] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.573524] __asan_report_store1_noabort+0x1b/0x30 [ 13.573569] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 13.573618] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 13.573669] ? __schedule+0x10cc/0x2b60 [ 13.573721] ? __pfx_read_tsc+0x10/0x10 [ 13.573769] ? ktime_get_ts64+0x86/0x230 [ 13.573824] kunit_try_run_case+0x1a5/0x480 [ 13.573871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.573962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.574023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.574067] ? __kthread_parkme+0x82/0x180 [ 13.574110] ? preempt_count_sub+0x50/0x80 [ 13.574159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.574302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.574349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.574408] kthread+0x337/0x6f0 [ 13.574448] ? trace_preempt_on+0x20/0xc0 [ 13.574499] ? __pfx_kthread+0x10/0x10 [ 13.574536] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.574584] ? calculate_sigpending+0x7b/0xa0 [ 13.574635] ? __pfx_kthread+0x10/0x10 [ 13.574711] ret_from_fork+0x116/0x1d0 [ 13.574760] ? __pfx_kthread+0x10/0x10 [ 13.574809] ret_from_fork_asm+0x1a/0x30 [ 13.574882] </TASK> [ 13.574910] [ 13.592034] Allocated by task 159: [ 13.592412] kasan_save_stack+0x45/0x70 [ 13.592939] kasan_save_track+0x18/0x40 [ 13.593351] kasan_save_alloc_info+0x3b/0x50 [ 13.593664] __kasan_kmalloc+0xb7/0xc0 [ 13.594042] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 13.594492] kmalloc_track_caller_oob_right+0x99/0x520 [ 13.595043] kunit_try_run_case+0x1a5/0x480 [ 13.595497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.595984] kthread+0x337/0x6f0 [ 13.596319] ret_from_fork+0x116/0x1d0 [ 13.596599] ret_from_fork_asm+0x1a/0x30 [ 13.596996] [ 13.597198] The buggy address belongs to the object at ffff888103324a00 [ 13.597198] which belongs to the cache kmalloc-128 of size 128 [ 13.598064] The buggy address is located 0 bytes to the right of [ 13.598064] allocated 120-byte region [ffff888103324a00, ffff888103324a78) [ 13.598598] [ 13.598789] The buggy address belongs to the physical page: [ 13.599352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.600080] flags: 0x200000000000000(node=0|zone=2) [ 13.600397] page_type: f5(slab) [ 13.600800] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.601289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.601791] page dumped because: kasan: bad access detected [ 13.602279] [ 13.602407] Memory state around the buggy address: [ 13.602657] ffff888103324900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.603251] ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.603995] >ffff888103324a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 13.604583] ^ [ 13.605034] ffff888103324a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.605366] ffff888103324b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.606107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
Automatically assigned
[ 13.526273] ================================================================== [ 13.526887] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 13.527125] Read of size 1 at addr ffff8881038d1000 by task kunit_try_catch/157 [ 13.527635] [ 13.528316] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.528403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.528422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.528450] Call Trace: [ 13.528480] <TASK> [ 13.528509] dump_stack_lvl+0x73/0xb0 [ 13.528553] print_report+0xd1/0x650 [ 13.528580] ? __virt_addr_valid+0x1db/0x2d0 [ 13.528609] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.528635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.528660] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.528686] kasan_report+0x141/0x180 [ 13.528710] ? kmalloc_node_oob_right+0x369/0x3c0 [ 13.528741] __asan_report_load1_noabort+0x18/0x20 [ 13.529147] kmalloc_node_oob_right+0x369/0x3c0 [ 13.529178] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 13.529207] ? __schedule+0x10cc/0x2b60 [ 13.529422] ? __pfx_read_tsc+0x10/0x10 [ 13.529520] ? ktime_get_ts64+0x86/0x230 [ 13.529553] kunit_try_run_case+0x1a5/0x480 [ 13.529583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.529604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.529632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.529660] ? __kthread_parkme+0x82/0x180 [ 13.529687] ? preempt_count_sub+0x50/0x80 [ 13.529877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.529905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.529934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.529962] kthread+0x337/0x6f0 [ 13.529985] ? trace_preempt_on+0x20/0xc0 [ 13.530012] ? __pfx_kthread+0x10/0x10 [ 13.530035] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.530061] ? calculate_sigpending+0x7b/0xa0 [ 13.530089] ? __pfx_kthread+0x10/0x10 [ 13.530113] ret_from_fork+0x116/0x1d0 [ 13.530135] ? __pfx_kthread+0x10/0x10 [ 13.530158] ret_from_fork_asm+0x1a/0x30 [ 13.530195] </TASK> [ 13.530218] [ 13.545598] Allocated by task 157: [ 13.546151] kasan_save_stack+0x45/0x70 [ 13.546626] kasan_save_track+0x18/0x40 [ 13.547091] kasan_save_alloc_info+0x3b/0x50 [ 13.547398] __kasan_kmalloc+0xb7/0xc0 [ 13.548115] __kmalloc_cache_node_noprof+0x188/0x420 [ 13.548638] kmalloc_node_oob_right+0xab/0x3c0 [ 13.549139] kunit_try_run_case+0x1a5/0x480 [ 13.549992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.550375] kthread+0x337/0x6f0 [ 13.550836] ret_from_fork+0x116/0x1d0 [ 13.551125] ret_from_fork_asm+0x1a/0x30 [ 13.551596] [ 13.551842] The buggy address belongs to the object at ffff8881038d0000 [ 13.551842] which belongs to the cache kmalloc-4k of size 4096 [ 13.552926] The buggy address is located 0 bytes to the right of [ 13.552926] allocated 4096-byte region [ffff8881038d0000, ffff8881038d1000) [ 13.553821] [ 13.554188] The buggy address belongs to the physical page: [ 13.555068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d0 [ 13.555865] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.556525] flags: 0x200000000000040(head|node=0|zone=2) [ 13.557133] page_type: f5(slab) [ 13.557321] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 13.557886] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 13.558620] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000 [ 13.559143] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 13.560118] head: 0200000000000003 ffffea00040e3401 00000000ffffffff 00000000ffffffff [ 13.560614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 13.561376] page dumped because: kasan: bad access detected [ 13.561917] [ 13.562051] Memory state around the buggy address: [ 13.562513] ffff8881038d0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.562979] ffff8881038d0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.563385] >ffff8881038d1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.563935] ^ [ 13.564207] ffff8881038d1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.564745] ffff8881038d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.565345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
Automatically assigned
[ 13.492406] ================================================================== [ 13.493114] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 13.493347] Read of size 1 at addr ffff888101c205df by task kunit_try_catch/155 [ 13.493524] [ 13.493769] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.494012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.494036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.494062] Call Trace: [ 13.494081] <TASK> [ 13.494106] dump_stack_lvl+0x73/0xb0 [ 13.494144] print_report+0xd1/0x650 [ 13.494169] ? __virt_addr_valid+0x1db/0x2d0 [ 13.494196] ? kmalloc_oob_left+0x361/0x3c0 [ 13.494231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.494255] ? kmalloc_oob_left+0x361/0x3c0 [ 13.494277] kasan_report+0x141/0x180 [ 13.494300] ? kmalloc_oob_left+0x361/0x3c0 [ 13.494380] __asan_report_load1_noabort+0x18/0x20 [ 13.494434] kmalloc_oob_left+0x361/0x3c0 [ 13.494501] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 13.494538] ? __schedule+0x10cc/0x2b60 [ 13.494581] ? __pfx_read_tsc+0x10/0x10 [ 13.494606] ? ktime_get_ts64+0x86/0x230 [ 13.494634] kunit_try_run_case+0x1a5/0x480 [ 13.494660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.494752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.494786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.494812] ? __kthread_parkme+0x82/0x180 [ 13.494835] ? preempt_count_sub+0x50/0x80 [ 13.494862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.494884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.494947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.494973] kthread+0x337/0x6f0 [ 13.495009] ? trace_preempt_on+0x20/0xc0 [ 13.495036] ? __pfx_kthread+0x10/0x10 [ 13.495089] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.495113] ? calculate_sigpending+0x7b/0xa0 [ 13.495159] ? __pfx_kthread+0x10/0x10 [ 13.495183] ret_from_fork+0x116/0x1d0 [ 13.495222] ? __pfx_kthread+0x10/0x10 [ 13.495267] ret_from_fork_asm+0x1a/0x30 [ 13.495302] </TASK> [ 13.495316] [ 13.505578] Allocated by task 25: [ 13.506022] kasan_save_stack+0x45/0x70 [ 13.506363] kasan_save_track+0x18/0x40 [ 13.506652] kasan_save_alloc_info+0x3b/0x50 [ 13.507372] __kasan_kmalloc+0xb7/0xc0 [ 13.507674] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 13.508057] kvasprintf+0xc5/0x150 [ 13.508188] __kthread_create_on_node+0x18b/0x3a0 [ 13.508606] kthread_create_on_node+0xab/0xe0 [ 13.509028] create_worker+0x3e5/0x7b0 [ 13.509282] worker_thread+0x992/0x1220 [ 13.509538] kthread+0x337/0x6f0 [ 13.510093] ret_from_fork+0x116/0x1d0 [ 13.510428] ret_from_fork_asm+0x1a/0x30 [ 13.510604] [ 13.510784] The buggy address belongs to the object at ffff888101c205c0 [ 13.510784] which belongs to the cache kmalloc-16 of size 16 [ 13.511376] The buggy address is located 18 bytes to the right of [ 13.511376] allocated 13-byte region [ffff888101c205c0, ffff888101c205cd) [ 13.512871] [ 13.513042] The buggy address belongs to the physical page: [ 13.513845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c20 [ 13.514700] flags: 0x200000000000000(node=0|zone=2) [ 13.515202] page_type: f5(slab) [ 13.515484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.515690] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.516126] page dumped because: kasan: bad access detected [ 13.516556] [ 13.516914] Memory state around the buggy address: [ 13.517503] ffff888101c20480: 00 01 fc fc fa fb fc fc 00 01 fc fc 00 01 fc fc [ 13.517917] ffff888101c20500: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.518567] >ffff888101c20580: 00 01 fc fc fa fb fc fc 00 05 fc fc 00 07 fc fc [ 13.519479] ^ [ 13.519856] ffff888101c20600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.520173] ffff888101c20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.520603] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
Automatically assigned
[ 13.436590] ================================================================== [ 13.437447] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 13.437883] Write of size 1 at addr ffff888103324978 by task kunit_try_catch/153 [ 13.438379] [ 13.438507] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.438567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.438582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.438607] Call Trace: [ 13.438632] <TASK> [ 13.438657] dump_stack_lvl+0x73/0xb0 [ 13.438692] print_report+0xd1/0x650 [ 13.438717] ? __virt_addr_valid+0x1db/0x2d0 [ 13.438744] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.438768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.438792] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.438817] kasan_report+0x141/0x180 [ 13.438842] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.438870] __asan_report_store1_noabort+0x1b/0x30 [ 13.438895] kmalloc_oob_right+0x6bd/0x7f0 [ 13.438920] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.438945] ? __schedule+0x10cc/0x2b60 [ 13.438973] ? __pfx_read_tsc+0x10/0x10 [ 13.438997] ? ktime_get_ts64+0x86/0x230 [ 13.439026] kunit_try_run_case+0x1a5/0x480 [ 13.439051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.439073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.439099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.439125] ? __kthread_parkme+0x82/0x180 [ 13.439148] ? preempt_count_sub+0x50/0x80 [ 13.439174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.439197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.439230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.439268] kthread+0x337/0x6f0 [ 13.439291] ? trace_preempt_on+0x20/0xc0 [ 13.439368] ? __pfx_kthread+0x10/0x10 [ 13.439398] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.439425] ? calculate_sigpending+0x7b/0xa0 [ 13.439452] ? __pfx_kthread+0x10/0x10 [ 13.439489] ret_from_fork+0x116/0x1d0 [ 13.439511] ? __pfx_kthread+0x10/0x10 [ 13.439534] ret_from_fork_asm+0x1a/0x30 [ 13.439570] </TASK> [ 13.439584] [ 13.449697] Allocated by task 153: [ 13.450066] kasan_save_stack+0x45/0x70 [ 13.450340] kasan_save_track+0x18/0x40 [ 13.450562] kasan_save_alloc_info+0x3b/0x50 [ 13.450755] __kasan_kmalloc+0xb7/0xc0 [ 13.450969] __kmalloc_cache_noprof+0x189/0x420 [ 13.451116] kmalloc_oob_right+0xa9/0x7f0 [ 13.451269] kunit_try_run_case+0x1a5/0x480 [ 13.451536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.452189] kthread+0x337/0x6f0 [ 13.452386] ret_from_fork+0x116/0x1d0 [ 13.452570] ret_from_fork_asm+0x1a/0x30 [ 13.452882] [ 13.453004] The buggy address belongs to the object at ffff888103324900 [ 13.453004] which belongs to the cache kmalloc-128 of size 128 [ 13.453667] The buggy address is located 5 bytes to the right of [ 13.453667] allocated 115-byte region [ffff888103324900, ffff888103324973) [ 13.454357] [ 13.454428] The buggy address belongs to the physical page: [ 13.454656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.455100] flags: 0x200000000000000(node=0|zone=2) [ 13.455359] page_type: f5(slab) [ 13.455490] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.456272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.456652] page dumped because: kasan: bad access detected [ 13.456853] [ 13.457000] Memory state around the buggy address: [ 13.457237] ffff888103324800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.457594] ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.457878] >ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.458063] ^ [ 13.458368] ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.458948] ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.459396] ================================================================== [ 13.402228] ================================================================== [ 13.402923] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.403961] Write of size 1 at addr ffff888103324973 by task kunit_try_catch/153 [ 13.404257] [ 13.405598] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.406470] Tainted: [N]=TEST [ 13.406536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.406927] Call Trace: [ 13.407065] <TASK> [ 13.407291] dump_stack_lvl+0x73/0xb0 [ 13.407432] print_report+0xd1/0x650 [ 13.407484] ? __virt_addr_valid+0x1db/0x2d0 [ 13.407519] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.407543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.407567] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.407590] kasan_report+0x141/0x180 [ 13.407614] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.407641] __asan_report_store1_noabort+0x1b/0x30 [ 13.407664] kmalloc_oob_right+0x6f0/0x7f0 [ 13.407688] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.407712] ? __schedule+0x10cc/0x2b60 [ 13.407737] ? __pfx_read_tsc+0x10/0x10 [ 13.407762] ? ktime_get_ts64+0x86/0x230 [ 13.407796] kunit_try_run_case+0x1a5/0x480 [ 13.407831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.407852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.407880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.407905] ? __kthread_parkme+0x82/0x180 [ 13.407930] ? preempt_count_sub+0x50/0x80 [ 13.407956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.407979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.408004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.408030] kthread+0x337/0x6f0 [ 13.408051] ? trace_preempt_on+0x20/0xc0 [ 13.408077] ? __pfx_kthread+0x10/0x10 [ 13.408099] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.408122] ? calculate_sigpending+0x7b/0xa0 [ 13.408148] ? __pfx_kthread+0x10/0x10 [ 13.408171] ret_from_fork+0x116/0x1d0 [ 13.408192] ? __pfx_kthread+0x10/0x10 [ 13.408214] ret_from_fork_asm+0x1a/0x30 [ 13.408279] </TASK> [ 13.408365] [ 13.420946] Allocated by task 153: [ 13.421296] kasan_save_stack+0x45/0x70 [ 13.421658] kasan_save_track+0x18/0x40 [ 13.421926] kasan_save_alloc_info+0x3b/0x50 [ 13.422247] __kasan_kmalloc+0xb7/0xc0 [ 13.422551] __kmalloc_cache_noprof+0x189/0x420 [ 13.423048] kmalloc_oob_right+0xa9/0x7f0 [ 13.424021] kunit_try_run_case+0x1a5/0x480 [ 13.424390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.424777] kthread+0x337/0x6f0 [ 13.425062] ret_from_fork+0x116/0x1d0 [ 13.425303] ret_from_fork_asm+0x1a/0x30 [ 13.425637] [ 13.426685] The buggy address belongs to the object at ffff888103324900 [ 13.426685] which belongs to the cache kmalloc-128 of size 128 [ 13.427255] The buggy address is located 0 bytes to the right of [ 13.427255] allocated 115-byte region [ffff888103324900, ffff888103324973) [ 13.427807] [ 13.428033] The buggy address belongs to the physical page: [ 13.428595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.429323] flags: 0x200000000000000(node=0|zone=2) [ 13.430095] page_type: f5(slab) [ 13.430719] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.431166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.431612] page dumped because: kasan: bad access detected [ 13.431805] [ 13.431975] Memory state around the buggy address: [ 13.432499] ffff888103324800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.432909] ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.433671] >ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.434000] ^ [ 13.434211] ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.434359] ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435199] ================================================================== [ 13.460302] ================================================================== [ 13.460647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 13.461068] Read of size 1 at addr ffff888103324980 by task kunit_try_catch/153 [ 13.461420] [ 13.461572] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 13.461630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.461644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.461671] Call Trace: [ 13.461858] <TASK> [ 13.461889] dump_stack_lvl+0x73/0xb0 [ 13.461926] print_report+0xd1/0x650 [ 13.461953] ? __virt_addr_valid+0x1db/0x2d0 [ 13.461982] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.462005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.462028] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.462052] kasan_report+0x141/0x180 [ 13.462076] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.462105] __asan_report_load1_noabort+0x18/0x20 [ 13.462128] kmalloc_oob_right+0x68a/0x7f0 [ 13.462152] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.462178] ? __schedule+0x10cc/0x2b60 [ 13.462207] ? __pfx_read_tsc+0x10/0x10 [ 13.462234] ? ktime_get_ts64+0x86/0x230 [ 13.462262] kunit_try_run_case+0x1a5/0x480 [ 13.462286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.462307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.462354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.462382] ? __kthread_parkme+0x82/0x180 [ 13.462405] ? preempt_count_sub+0x50/0x80 [ 13.462433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.462464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.462495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.462522] kthread+0x337/0x6f0 [ 13.462543] ? trace_preempt_on+0x20/0xc0 [ 13.462570] ? __pfx_kthread+0x10/0x10 [ 13.462592] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.462616] ? calculate_sigpending+0x7b/0xa0 [ 13.462644] ? __pfx_kthread+0x10/0x10 [ 13.462667] ret_from_fork+0x116/0x1d0 [ 13.462703] ? __pfx_kthread+0x10/0x10 [ 13.462727] ret_from_fork_asm+0x1a/0x30 [ 13.462766] </TASK> [ 13.462780] [ 13.474662] Allocated by task 153: [ 13.475038] kasan_save_stack+0x45/0x70 [ 13.475435] kasan_save_track+0x18/0x40 [ 13.475783] kasan_save_alloc_info+0x3b/0x50 [ 13.475970] __kasan_kmalloc+0xb7/0xc0 [ 13.476275] __kmalloc_cache_noprof+0x189/0x420 [ 13.476450] kmalloc_oob_right+0xa9/0x7f0 [ 13.476877] kunit_try_run_case+0x1a5/0x480 [ 13.477185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.477492] kthread+0x337/0x6f0 [ 13.477627] ret_from_fork+0x116/0x1d0 [ 13.478196] ret_from_fork_asm+0x1a/0x30 [ 13.478598] [ 13.478975] The buggy address belongs to the object at ffff888103324900 [ 13.478975] which belongs to the cache kmalloc-128 of size 128 [ 13.479493] The buggy address is located 13 bytes to the right of [ 13.479493] allocated 115-byte region [ffff888103324900, ffff888103324973) [ 13.480252] [ 13.480325] The buggy address belongs to the physical page: [ 13.480449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 13.481138] flags: 0x200000000000000(node=0|zone=2) [ 13.481381] page_type: f5(slab) [ 13.481614] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.482535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.483023] page dumped because: kasan: bad access detected [ 13.483301] [ 13.483543] Memory state around the buggy address: [ 13.483791] ffff888103324880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.484260] ffff888103324900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.484469] >ffff888103324980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.485073] ^ [ 13.485325] ffff888103324a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.485688] ffff888103324a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.485972] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale: Failure
Automatically assigned
------------[ cut here ]------------ [ 169.954673] WARNING: CPU: 0 PID: 2817 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190 [ 169.955568] Modules linked in: [ 169.956931] CPU: 0 UID: 0 PID: 2817 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 169.957487] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 169.957817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 169.958260] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 [ 169.959036] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 90 aa 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 169.960049] RSP: 0000:ffff888108f67c78 EFLAGS: 00010286 [ 169.960305] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 [ 169.961242] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffff8d43cb9c [ 169.961534] RBP: ffff888108f67ca0 R08: 0000000000000000 R09: ffffed1020c489e0 [ 169.962198] R10: ffff888106244f07 R11: 0000000000000000 R12: ffffffff8d43cb88 [ 169.962456] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888108f67d38 [ 169.963181] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 169.964237] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.964439] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 169.964652] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 169.965150] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 169.965538] Call Trace: [ 169.965678] <TASK> [ 169.965860] drm_test_rect_calc_vscale+0x108/0x270 [ 169.966242] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [ 169.967461] ? __schedule+0x10cc/0x2b60 [ 169.967878] ? __pfx_read_tsc+0x10/0x10 [ 169.968550] ? ktime_get_ts64+0x86/0x230 [ 169.968993] kunit_try_run_case+0x1a5/0x480 [ 169.969206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.969564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 169.970173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 169.970616] ? __kthread_parkme+0x82/0x180 [ 169.971111] ? preempt_count_sub+0x50/0x80 [ 169.971464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.972052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 169.972356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 169.972924] kthread+0x337/0x6f0 [ 169.973365] ? trace_preempt_on+0x20/0xc0 [ 169.973641] ? __pfx_kthread+0x10/0x10 [ 169.974131] ? _raw_spin_unlock_irq+0x47/0x80 [ 169.974906] ? calculate_sigpending+0x7b/0xa0 [ 169.975246] ? __pfx_kthread+0x10/0x10 [ 169.975620] ret_from_fork+0x116/0x1d0 [ 169.976098] ? __pfx_kthread+0x10/0x10 [ 169.976490] ret_from_fork_asm+0x1a/0x30 [ 169.976949] </TASK> [ 169.977084] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 169.983443] WARNING: CPU: 0 PID: 2819 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190 [ 169.984328] Modules linked in: [ 169.984633] CPU: 0 UID: 0 PID: 2819 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 169.985501] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 169.985872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 169.986386] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 [ 169.986919] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d e9 90 aa 1e 02 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 169.987961] RSP: 0000:ffff888108f47c78 EFLAGS: 00010286 [ 169.988350] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 [ 169.988814] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffff8d43cbd4 [ 169.989304] RBP: ffff888108f47ca0 R08: 0000000000000000 R09: ffffed1020f49800 [ 169.989665] R10: ffff888107a4c007 R11: 0000000000000000 R12: ffffffff8d43cbc0 [ 169.990266] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888108f47d38 [ 169.990498] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 169.991635] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.991936] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 169.992379] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 169.992573] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 169.992928] Call Trace: [ 169.993199] <TASK> [ 169.993469] drm_test_rect_calc_vscale+0x108/0x270 [ 169.993923] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [ 169.994468] ? __schedule+0x10cc/0x2b60 [ 169.994651] ? __pfx_read_tsc+0x10/0x10 [ 169.995206] ? ktime_get_ts64+0x86/0x230 [ 169.996190] kunit_try_run_case+0x1a5/0x480 [ 169.996486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.996930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 169.997267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 169.997513] ? __kthread_parkme+0x82/0x180 [ 169.997979] ? preempt_count_sub+0x50/0x80 [ 169.998205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.998394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 169.998593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 169.998793] kthread+0x337/0x6f0 [ 169.999597] ? trace_preempt_on+0x20/0xc0 [ 170.000193] ? __pfx_kthread+0x10/0x10 [ 170.000415] ? _raw_spin_unlock_irq+0x47/0x80 [ 170.000603] ? calculate_sigpending+0x7b/0xa0 [ 170.000784] ? __pfx_kthread+0x10/0x10 [ 170.000939] ret_from_fork+0x116/0x1d0 [ 170.001098] ? __pfx_kthread+0x10/0x10 [ 170.001257] ret_from_fork_asm+0x1a/0x30 [ 170.001444] </TASK> [ 170.001566] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale: Failure
Automatically assigned
------------[ cut here ]------------ [ 169.909565] WARNING: CPU: 1 PID: 2807 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190 [ 169.911277] Modules linked in: [ 169.911580] CPU: 1 UID: 0 PID: 2807 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 169.912645] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 169.913318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 169.913516] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 [ 169.913651] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 169.915329] RSP: 0000:ffff88810800fc78 EFLAGS: 00010286 [ 169.915661] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 [ 169.916012] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8d43cbd8 [ 169.916355] RBP: ffff88810800fca0 R08: 0000000000000000 R09: ffffed1020c48940 [ 169.916713] R10: ffff888106244a07 R11: 0000000000000000 R12: ffffffff8d43cbc0 [ 169.917081] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810800fd38 [ 169.918114] FS: 0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000 [ 169.918593] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.919246] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 169.920052] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403 [ 169.920493] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 169.921166] Call Trace: [ 169.921459] <TASK> [ 169.921952] drm_test_rect_calc_hscale+0x108/0x270 [ 169.922231] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [ 169.922782] ? __schedule+0x10cc/0x2b60 [ 169.923319] ? __pfx_read_tsc+0x10/0x10 [ 169.923622] ? ktime_get_ts64+0x86/0x230 [ 169.924152] kunit_try_run_case+0x1a5/0x480 [ 169.924590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.924810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 169.925856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 169.926225] ? __kthread_parkme+0x82/0x180 [ 169.926523] ? preempt_count_sub+0x50/0x80 [ 169.926800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.927023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 169.927907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 169.928268] kthread+0x337/0x6f0 [ 169.929133] ? trace_preempt_on+0x20/0xc0 [ 169.929531] ? __pfx_kthread+0x10/0x10 [ 169.930062] ? _raw_spin_unlock_irq+0x47/0x80 [ 169.930492] ? calculate_sigpending+0x7b/0xa0 [ 169.930749] ? __pfx_kthread+0x10/0x10 [ 169.931447] ret_from_fork+0x116/0x1d0 [ 169.931721] ? __pfx_kthread+0x10/0x10 [ 169.932301] ret_from_fork_asm+0x1a/0x30 [ 169.932687] </TASK> [ 169.932891] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 169.878486] WARNING: CPU: 1 PID: 2805 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190 [ 169.879880] Modules linked in: [ 169.880166] CPU: 1 UID: 0 PID: 2805 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 169.881444] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 169.882031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 169.883246] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 [ 169.883648] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 169.885081] RSP: 0000:ffff888108f9fc78 EFLAGS: 00010286 [ 169.885368] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 [ 169.886259] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8d43cba0 [ 169.886667] RBP: ffff888108f9fca0 R08: 0000000000000000 R09: ffffed1020c48900 [ 169.887512] R10: ffff888106244807 R11: 0000000000000000 R12: ffffffff8d43cb88 [ 169.888055] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888108f9fd38 [ 169.888360] FS: 0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000 [ 169.889340] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.889863] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 169.890215] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403 [ 169.891034] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 169.891528] Call Trace: [ 169.892377] <TASK> [ 169.892583] drm_test_rect_calc_hscale+0x108/0x270 [ 169.892806] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [ 169.893622] ? __schedule+0x10cc/0x2b60 [ 169.894097] ? __pfx_read_tsc+0x10/0x10 [ 169.894316] ? ktime_get_ts64+0x86/0x230 [ 169.894663] kunit_try_run_case+0x1a5/0x480 [ 169.895260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.895619] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 169.896189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 169.896439] ? __kthread_parkme+0x82/0x180 [ 169.896997] ? preempt_count_sub+0x50/0x80 [ 169.897435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.897836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 169.898287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 169.898922] kthread+0x337/0x6f0 [ 169.899190] ? trace_preempt_on+0x20/0xc0 [ 169.900341] ? __pfx_kthread+0x10/0x10 [ 169.900706] ? _raw_spin_unlock_irq+0x47/0x80 [ 169.901074] ? calculate_sigpending+0x7b/0xa0 [ 169.901455] ? __pfx_kthread+0x10/0x10 [ 169.901761] ret_from_fork+0x116/0x1d0 [ 169.902415] ? __pfx_kthread+0x10/0x10 [ 169.903162] ret_from_fork_asm+0x1a/0x30 [ 169.903614] </TASK> [ 169.903843] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count
KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_gem_shmem_test_get_pages_sgtdrm-kunit-mock-device-drm-drm_warn_onrefcount_readshmem-pages_pin_count: Failure
Automatically assigned
------------[ cut here ]------------ [ 168.887726] drm-kunit-mock-device drm_gem_shmem_test_get_pages_sgt.drm-kunit-mock-device: [drm] drm_WARN_ON(refcount_read(&shmem->pages_pin_count)) [ 168.887910] WARNING: CPU: 0 PID: 2622 at drivers/gpu/drm/drm_gem_shmem_helper.c:180 drm_gem_shmem_free+0x3ed/0x6c0 [ 168.890273] Modules linked in: [ 168.890717] CPU: 0 UID: 0 PID: 2622 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 168.891647] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 168.892138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 168.892694] RIP: 0010:drm_gem_shmem_free+0x3ed/0x6c0 [ 168.893594] Code: 85 f6 0f 84 ba 01 00 00 4c 89 e7 e8 9d 27 80 00 48 c7 c1 80 1a 3f 8d 4c 89 f2 48 c7 c7 40 17 3f 8d 48 89 c6 e8 94 c1 73 fe 90 <0f> 0b 90 90 e9 09 ff ff ff 90 48 b8 00 00 00 00 00 fc ff df 48 8d [ 168.895039] RSP: 0000:ffff88810159fd18 EFLAGS: 00010286 [ 168.895319] RAX: 0000000000000000 RBX: ffff888102502400 RCX: 1ffffffff1c24c5c [ 168.896498] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 168.897179] RBP: ffff88810159fd48 R08: 0000000000000000 R09: fffffbfff1c24c5c [ 168.897669] R10: 0000000000000003 R11: 0000000000039408 R12: ffff888103a04000 [ 168.898028] R13: ffff8881025024f8 R14: ffff888107aa9200 R15: ffff8881003c7b40 [ 168.898292] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 168.898564] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.898897] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 168.899381] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 168.900088] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 168.900882] Call Trace: [ 168.901168] <TASK> [ 168.901441] ? trace_preempt_on+0x20/0xc0 [ 168.901847] ? __pfx_drm_gem_shmem_free_wrapper+0x10/0x10 [ 168.902236] drm_gem_shmem_free_wrapper+0x12/0x20 [ 168.902541] __kunit_action_free+0x57/0x70 [ 168.902911] kunit_remove_resource+0x133/0x200 [ 168.903313] ? preempt_count_sub+0x50/0x80 [ 168.903706] kunit_cleanup+0x7a/0x120 [ 168.904013] kunit_try_run_case_cleanup+0xbd/0xf0 [ 168.904220] ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 [ 168.904788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 168.905266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 168.905622] kthread+0x337/0x6f0 [ 168.906052] ? trace_preempt_on+0x20/0xc0 [ 168.906453] ? __pfx_kthread+0x10/0x10 [ 168.906876] ? _raw_spin_unlock_irq+0x47/0x80 [ 168.907319] ? calculate_sigpending+0x7b/0xa0 [ 168.907850] ? __pfx_kthread+0x10/0x10 [ 168.908078] ret_from_fork+0x116/0x1d0 [ 168.908426] ? __pfx_kthread+0x10/0x10 [ 168.908814] ret_from_fork_asm+0x1a/0x30 [ 168.909073] </TASK> [ 168.909321] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init: Failure
Automatically assigned
------------[ cut here ]------------ [ 168.681233] WARNING: CPU: 0 PID: 2603 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300 [ 168.681826] Modules linked in: [ 168.682197] CPU: 0 UID: 0 PID: 2603 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 168.683012] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 168.683512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 168.684267] RIP: 0010:drm_framebuffer_init+0x44/0x300 [ 168.684665] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41 [ 168.687008] RSP: 0000:ffff88810159fb30 EFLAGS: 00010246 [ 168.687309] RAX: dffffc0000000000 RBX: ffff88810159fc28 RCX: 0000000000000000 [ 168.687565] RDX: 1ffff110202b3f8e RSI: ffff88810159fc28 RDI: ffff88810159fc70 [ 168.687796] RBP: ffff88810159fb70 R08: ffff888103a77000 R09: ffffffff8d3e1da0 [ 168.688028] R10: 0000000000000003 R11: 00000000169a8e6a R12: ffff888103a77000 [ 168.690358] R13: ffff8881003c7ae8 R14: ffff88810159fba8 R15: 0000000000000000 [ 168.690836] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 168.691126] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.691362] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 168.691623] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 168.694021] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 168.694293] Call Trace: [ 168.694999] <TASK> [ 168.695257] ? add_dr+0xc1/0x1d0 [ 168.695587] drm_test_framebuffer_init_bad_format+0xfc/0x240 [ 168.695812] ? add_dr+0x148/0x1d0 [ 168.695972] ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10 [ 168.697008] ? __drmm_add_action+0x1a4/0x280 [ 168.697428] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 168.697687] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 168.699012] ? __drmm_add_action_or_reset+0x22/0x50 [ 168.699293] ? __schedule+0x10cc/0x2b60 [ 168.700541] ? __pfx_read_tsc+0x10/0x10 [ 168.701655] ? ktime_get_ts64+0x86/0x230 [ 168.702062] kunit_try_run_case+0x1a5/0x480 [ 168.703440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.703816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 168.704153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 168.704554] ? __kthread_parkme+0x82/0x180 [ 168.704892] ? preempt_count_sub+0x50/0x80 [ 168.705472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.706203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 168.706995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 168.707533] kthread+0x337/0x6f0 [ 168.708298] ? trace_preempt_on+0x20/0xc0 [ 168.708685] ? __pfx_kthread+0x10/0x10 [ 168.709492] ? _raw_spin_unlock_irq+0x47/0x80 [ 168.710205] ? calculate_sigpending+0x7b/0xa0 [ 168.710525] ? __pfx_kthread+0x10/0x10 [ 168.711104] ret_from_fork+0x116/0x1d0 [ 168.711423] ? __pfx_kthread+0x10/0x10 [ 168.711811] ret_from_fork_asm+0x1a/0x30 [ 168.712236] </TASK> [ 168.712489] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head
KNOWN ISSUE - log-parser-boot/exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head: Failure
Automatically assigned
------------[ cut here ]------------ [ 168.631602] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 168.632437] WARNING: CPU: 0 PID: 2599 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x13f/0x1c0 [ 168.634528] Modules linked in: [ 168.635103] CPU: 0 UID: 0 PID: 2599 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 168.635773] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 168.636368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 168.637039] RIP: 0010:drm_framebuffer_free+0x13f/0x1c0 [ 168.637342] Code: 8b 7d 50 4d 85 ff 74 2b 4c 89 ef e8 cb 41 87 00 48 c7 c1 60 cd 3d 8d 4c 89 fa 48 c7 c7 c0 cd 3d 8d 48 89 c6 e8 c2 db 7a fe 90 <0f> 0b 90 90 e9 1c ff ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 ea [ 168.638187] RSP: 0000:ffff8881011efb68 EFLAGS: 00010282 [ 168.638908] RAX: 0000000000000000 RBX: ffff8881011efc40 RCX: 1ffffffff1c24c5c [ 168.639375] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 168.640155] RBP: ffff8881011efb90 R08: 0000000000000000 R09: fffffbfff1c24c5c [ 168.640553] R10: 0000000000000003 R11: 0000000000037ad0 R12: ffff8881011efc18 [ 168.641205] R13: ffff888100f73000 R14: ffff888103a73000 R15: ffff888106586a00 [ 168.641885] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 168.642362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.642895] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 168.643245] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 168.643499] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 168.644306] Call Trace: [ 168.644529] <TASK> [ 168.644908] drm_test_framebuffer_free+0x1ab/0x610 [ 168.645409] ? __pfx_drm_test_framebuffer_free+0x10/0x10 [ 168.645818] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 168.646322] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 168.646675] ? __drmm_add_action_or_reset+0x22/0x50 [ 168.647133] ? __schedule+0x10cc/0x2b60 [ 168.647596] ? __pfx_read_tsc+0x10/0x10 [ 168.647888] ? ktime_get_ts64+0x86/0x230 [ 168.648646] kunit_try_run_case+0x1a5/0x480 [ 168.649146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.649351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 168.649602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 168.650580] ? __kthread_parkme+0x82/0x180 [ 168.651014] ? preempt_count_sub+0x50/0x80 [ 168.651492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.651716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 168.652311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 168.652678] kthread+0x337/0x6f0 [ 168.653037] ? trace_preempt_on+0x20/0xc0 [ 168.654181] ? __pfx_kthread+0x10/0x10 [ 168.654471] ? _raw_spin_unlock_irq+0x47/0x80 [ 168.654810] ? calculate_sigpending+0x7b/0xa0 [ 168.655418] ? __pfx_kthread+0x10/0x10 [ 168.655676] ret_from_fork+0x116/0x1d0 [ 168.656120] ? __pfx_kthread+0x10/0x10 [ 168.656452] ret_from_fork_asm+0x1a/0x30 [ 168.657051] </TASK> [ 168.657307] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register: Failure
Automatically assigned
------------[ cut here ]------------ [ 166.601547] WARNING: CPU: 0 PID: 2029 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110 [ 166.602339] Modules linked in: [ 166.602602] CPU: 0 UID: 0 PID: 2029 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 166.604960] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 166.605424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 166.605745] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110 [ 166.606508] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d e9 82 f5 25 02 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 68 [ 166.607608] RSP: 0000:ffff888102c87c90 EFLAGS: 00010246 [ 166.608188] RAX: dffffc0000000000 RBX: ffff8881027f4000 RCX: 0000000000000000 [ 166.608576] RDX: 1ffff110204fe832 RSI: ffffffff8a643b58 RDI: ffff8881027f4190 [ 166.609116] RBP: ffff888102c87ca0 R08: 1ffff11020078f69 R09: ffffed1020590f65 [ 166.609516] R10: 0000000000000003 R11: ffffffff89b87518 R12: 0000000000000000 [ 166.609875] R13: ffff888102c87d38 R14: ffff8881003c7c50 R15: ffff8881003c7c58 [ 166.610216] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 166.610834] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.611196] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 166.611505] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 166.612192] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 166.612857] Call Trace: [ 166.613161] <TASK> [ 166.613387] drm_test_drm_connector_dynamic_register_early_no_init+0x104/0x290 [ 166.614020] ? __pfx_drm_test_drm_connector_dynamic_register_early_no_init+0x10/0x10 [ 166.614646] ? __schedule+0x10cc/0x2b60 [ 166.615206] ? __pfx_read_tsc+0x10/0x10 [ 166.615490] ? ktime_get_ts64+0x86/0x230 [ 166.616008] kunit_try_run_case+0x1a5/0x480 [ 166.616347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.616630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 166.617164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 166.617555] ? __kthread_parkme+0x82/0x180 [ 166.617931] ? preempt_count_sub+0x50/0x80 [ 166.618350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.618628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 166.619294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 166.619637] kthread+0x337/0x6f0 [ 166.620178] ? trace_preempt_on+0x20/0xc0 [ 166.620533] ? __pfx_kthread+0x10/0x10 [ 166.621163] ? _raw_spin_unlock_irq+0x47/0x80 [ 166.621512] ? calculate_sigpending+0x7b/0xa0 [ 166.621967] ? __pfx_kthread+0x10/0x10 [ 166.622368] ret_from_fork+0x116/0x1d0 [ 166.622630] ? __pfx_kthread+0x10/0x10 [ 166.623128] ret_from_fork_asm+0x1a/0x30 [ 166.623431] </TASK> [ 166.623674] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 166.712937] WARNING: CPU: 1 PID: 2037 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110 [ 166.713969] Modules linked in: [ 166.714231] CPU: 1 UID: 0 PID: 2037 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 166.715257] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 166.715603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 166.716320] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110 [ 166.716671] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d e9 82 f5 25 02 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 68 [ 166.717885] RSP: 0000:ffff888102c7fc90 EFLAGS: 00010246 [ 166.718305] RAX: dffffc0000000000 RBX: ffff888102e10000 RCX: 0000000000000000 [ 166.718921] RDX: 1ffff110205c2032 RSI: ffffffff8a643b58 RDI: ffff888102e10190 [ 166.719365] RBP: ffff888102c7fca0 R08: 1ffff11020078f69 R09: ffffed102058ff65 [ 166.720058] R10: 0000000000000003 R11: ffffffff89b87518 R12: 0000000000000000 [ 166.720365] R13: ffff888102c7fd38 R14: ffff8881003c7c50 R15: ffff8881003c7c58 [ 166.721098] FS: 0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000 [ 166.721391] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.721963] CR2: 00007ffff7ffe000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 166.722337] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403 [ 166.722761] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 166.723539] Call Trace: [ 166.723980] <TASK> [ 166.724220] drm_test_drm_connector_dynamic_register_no_init+0x104/0x290 [ 166.724614] ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10 [ 166.724935] ? __schedule+0x10cc/0x2b60 [ 166.725192] ? __pfx_read_tsc+0x10/0x10 [ 166.725674] ? ktime_get_ts64+0x86/0x230 [ 166.726179] kunit_try_run_case+0x1a5/0x480 [ 166.726600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.727155] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 166.727436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 166.728015] ? __kthread_parkme+0x82/0x180 [ 166.728446] ? preempt_count_sub+0x50/0x80 [ 166.728916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.729358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 166.729893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 166.730292] kthread+0x337/0x6f0 [ 166.730611] ? trace_preempt_on+0x20/0xc0 [ 166.731126] ? __pfx_kthread+0x10/0x10 [ 166.731463] ? _raw_spin_unlock_irq+0x47/0x80 [ 166.731853] ? calculate_sigpending+0x7b/0xa0 [ 166.732288] ? __pfx_kthread+0x10/0x10 [ 166.732532] ret_from_fork+0x116/0x1d0 [ 166.733017] ? __pfx_kthread+0x10/0x10 [ 166.733279] ret_from_fork_asm+0x1a/0x30 [ 166.733632] </TASK> [ 166.733954] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
Automatically assigned
------------[ cut here ]------------ [ 124.860963] WARNING: CPU: 1 PID: 721 at lib/math/int_log.c:120 intlog10+0x2a/0x40 [ 124.861900] Modules linked in: [ 124.862185] CPU: 1 UID: 0 PID: 721 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 124.863972] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 124.864660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 124.865530] RIP: 0010:intlog10+0x2a/0x40 [ 124.866849] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 [ 124.867668] RSP: 0000:ffff8881088b7cb0 EFLAGS: 00010246 [ 124.868945] RAX: 0000000000000000 RBX: ffff8881003c7ae8 RCX: 1ffff11021116fb4 [ 124.869478] RDX: 1ffffffff1a53dfc RSI: 1ffff11021116fb3 RDI: 0000000000000000 [ 124.869876] RBP: ffff8881088b7d60 R08: 0000000000000000 R09: ffffed10210e5a00 [ 124.870094] R10: ffff88810872d007 R11: 0000000000000000 R12: 1ffff11021116f97 [ 124.870229] R13: ffffffff8d29efe0 R14: 0000000000000000 R15: ffff8881088b7d38 [ 124.870356] FS: 0000000000000000(0000) GS:ffff8881cbd5b000(0000) knlGS:0000000000000000 [ 124.870834] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 124.871178] CR2: ffff88815a942000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 124.871534] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469403 [ 124.872038] DR3: ffffffff8f469405 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 124.872535] Call Trace: [ 124.872927] <TASK> [ 124.873054] ? intlog10_test+0xf2/0x220 [ 124.873328] ? __pfx_intlog10_test+0x10/0x10 [ 124.873497] ? __schedule+0x10cc/0x2b60 [ 124.873623] ? __pfx_read_tsc+0x10/0x10 [ 124.873764] ? ktime_get_ts64+0x86/0x230 [ 124.873885] kunit_try_run_case+0x1a5/0x480 [ 124.874000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.874112] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 124.874549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 124.874810] ? __kthread_parkme+0x82/0x180 [ 124.875052] ? preempt_count_sub+0x50/0x80 [ 124.875794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.876374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 124.876847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 124.877283] kthread+0x337/0x6f0 [ 124.877461] ? trace_preempt_on+0x20/0xc0 [ 124.877609] ? __pfx_kthread+0x10/0x10 [ 124.877845] ? _raw_spin_unlock_irq+0x47/0x80 [ 124.878423] ? calculate_sigpending+0x7b/0xa0 [ 124.878997] ? __pfx_kthread+0x10/0x10 [ 124.879278] ret_from_fork+0x116/0x1d0 [ 124.879434] ? __pfx_kthread+0x10/0x10 [ 124.879633] ret_from_fork_asm+0x1a/0x30 [ 124.879867] </TASK> [ 124.880042] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
Automatically assigned
------------[ cut here ]------------ [ 124.810561] WARNING: CPU: 0 PID: 703 at lib/math/int_log.c:63 intlog2+0xdf/0x110 [ 124.811321] Modules linked in: [ 124.811830] CPU: 0 UID: 0 PID: 703 Comm: kunit_try_catch Tainted: G B D N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 124.812523] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 124.812639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 124.813017] RIP: 0010:intlog2+0xdf/0x110 [ 124.813168] Code: 29 8d c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d e9 52 98 86 02 90 <0f> 0b 90 31 c0 e9 47 98 86 02 89 45 e4 e8 6f 20 52 ff 8b 45 e4 eb [ 124.814619] RSP: 0000:ffff88810874fcb0 EFLAGS: 00010246 [ 124.814972] RAX: 0000000000000000 RBX: ffff8881003c7ae8 RCX: 1ffff110210e9fb4 [ 124.815608] RDX: 1ffffffff1a53e50 RSI: 1ffff110210e9fb3 RDI: 0000000000000000 [ 124.816032] RBP: ffff88810874fd60 R08: 0000000000000000 R09: ffffed102048aa80 [ 124.816598] R10: ffff888102455407 R11: 0000000000000000 R12: 1ffff110210e9f97 [ 124.817332] R13: ffffffff8d29f280 R14: 0000000000000000 R15: ffff88810874fd38 [ 124.818092] FS: 0000000000000000(0000) GS:ffff8881cbc5b000(0000) knlGS:0000000000000000 [ 124.818549] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 124.818906] CR2: dffffc0000000000 CR3: 00000000780bc000 CR4: 00000000000006f0 [ 124.819063] DR0: ffffffff8f469400 DR1: ffffffff8f469401 DR2: ffffffff8f469402 [ 124.819483] DR3: ffffffff8f469403 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 124.820067] Call Trace: [ 124.820359] <TASK> [ 124.820516] ? intlog2_test+0xf2/0x220 [ 124.820823] ? __pfx_intlog2_test+0x10/0x10 [ 124.821118] ? __schedule+0x10cc/0x2b60 [ 124.821410] ? __pfx_read_tsc+0x10/0x10 [ 124.821552] ? ktime_get_ts64+0x86/0x230 [ 124.821663] kunit_try_run_case+0x1a5/0x480 [ 124.821849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.821962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 124.822138] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 124.822451] ? __kthread_parkme+0x82/0x180 [ 124.822726] ? preempt_count_sub+0x50/0x80 [ 124.822972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.823233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 124.823390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 124.824189] kthread+0x337/0x6f0 [ 124.824454] ? trace_preempt_on+0x20/0xc0 [ 124.824610] ? __pfx_kthread+0x10/0x10 [ 124.824966] ? _raw_spin_unlock_irq+0x47/0x80 [ 124.825186] ? calculate_sigpending+0x7b/0xa0 [ 124.825430] ? __pfx_kthread+0x10/0x10 [ 124.825674] ret_from_fork+0x116/0x1d0 [ 124.826020] ? __pfx_kthread+0x10/0x10 [ 124.826280] ret_from_fork_asm+0x1a/0x30 [ 124.826546] </TASK> [ 124.827071] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
Automatically assigned
<8>[ 391.698669] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>