Date
June 3, 2025, 7:38 a.m.
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
Automatically assigned
[ 24.088133] ================================================================== [ 24.088231] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 24.088231] [ 24.088294] Corrupted memory at 0x00000000057d2b75 [ ! ] (in kfence-#102): [ 24.088443] test_corruption+0x284/0x378 [ 24.088490] kunit_try_run_case+0x170/0x3f0 [ 24.088536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.088581] kthread+0x328/0x630 [ 24.088619] ret_from_fork+0x10/0x20 [ 24.088660] [ 24.088684] kfence-#102: 0x000000007834d2bf-0x000000006af668ba, size=32, cache=kmalloc-32 [ 24.088684] [ 24.088743] allocated by task 311 on cpu 1 at 24.087848s (0.000890s ago): [ 24.088805] test_alloc+0x29c/0x628 [ 24.088850] test_corruption+0x198/0x378 [ 24.088889] kunit_try_run_case+0x170/0x3f0 [ 24.088929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.088972] kthread+0x328/0x630 [ 24.089007] ret_from_fork+0x10/0x20 [ 24.089046] [ 24.089069] freed by task 311 on cpu 1 at 24.087957s (0.001108s ago): [ 24.089129] test_corruption+0x284/0x378 [ 24.089167] kunit_try_run_case+0x170/0x3f0 [ 24.089207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.089250] kthread+0x328/0x630 [ 24.089284] ret_from_fork+0x10/0x20 [ 24.089321] [ 24.089368] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 24.089456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.089486] Hardware name: linux,dummy-virt (DT) [ 24.089522] ================================================================== [ 23.464146] ================================================================== [ 23.464251] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 23.464251] [ 23.464319] Corrupted memory at 0x0000000049129c9c [ ! . . . . . . . . . . . . . . . ] (in kfence-#96): [ 23.465457] test_corruption+0x278/0x378 [ 23.465512] kunit_try_run_case+0x170/0x3f0 [ 23.465560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.465605] kthread+0x328/0x630 [ 23.465644] ret_from_fork+0x10/0x20 [ 23.465686] [ 23.465711] kfence-#96: 0x000000000f52b70a-0x0000000048f0aafc, size=32, cache=kmalloc-32 [ 23.465711] [ 23.465770] allocated by task 311 on cpu 1 at 23.463862s (0.001903s ago): [ 23.465834] test_alloc+0x29c/0x628 [ 23.465875] test_corruption+0xdc/0x378 [ 23.465915] kunit_try_run_case+0x170/0x3f0 [ 23.465955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.465999] kthread+0x328/0x630 [ 23.466033] ret_from_fork+0x10/0x20 [ 23.466072] [ 23.466097] freed by task 311 on cpu 1 at 23.463968s (0.002125s ago): [ 23.466157] test_corruption+0x278/0x378 [ 23.466197] kunit_try_run_case+0x170/0x3f0 [ 23.466237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.466281] kthread+0x328/0x630 [ 23.466315] ret_from_fork+0x10/0x20 [ 23.466354] [ 23.466399] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 23.466489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.466517] Hardware name: linux,dummy-virt (DT) [ 23.466552] ================================================================== [ 24.192083] ================================================================== [ 24.192181] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 24.192181] [ 24.192243] Corrupted memory at 0x0000000036029ed6 [ ! . . . . . . . . . . . . . . . ] (in kfence-#103): [ 24.192579] test_corruption+0x120/0x378 [ 24.192629] kunit_try_run_case+0x170/0x3f0 [ 24.192673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.192718] kthread+0x328/0x630 [ 24.192756] ret_from_fork+0x10/0x20 [ 24.192796] [ 24.192828] kfence-#103: 0x00000000dc7d01ba-0x00000000e3ad14c8, size=32, cache=test [ 24.192828] [ 24.192885] allocated by task 313 on cpu 1 at 24.191920s (0.000960s ago): [ 24.192949] test_alloc+0x230/0x628 [ 24.192989] test_corruption+0xdc/0x378 [ 24.193029] kunit_try_run_case+0x170/0x3f0 [ 24.193070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.193114] kthread+0x328/0x630 [ 24.193149] ret_from_fork+0x10/0x20 [ 24.193188] [ 24.193211] freed by task 313 on cpu 1 at 24.191989s (0.001218s ago): [ 24.193271] test_corruption+0x120/0x378 [ 24.193312] kunit_try_run_case+0x170/0x3f0 [ 24.193351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.193395] kthread+0x328/0x630 [ 24.193439] ret_from_fork+0x10/0x20 [ 24.193478] [ 24.193522] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 24.193602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.193632] Hardware name: linux,dummy-virt (DT) [ 24.193665] ================================================================== [ 24.399974] ================================================================== [ 24.400067] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 24.400067] [ 24.400128] Corrupted memory at 0x00000000ba8a0396 [ ! ] (in kfence-#105): [ 24.400243] test_corruption+0x1d8/0x378 [ 24.400290] kunit_try_run_case+0x170/0x3f0 [ 24.400333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.400377] kthread+0x328/0x630 [ 24.400415] ret_from_fork+0x10/0x20 [ 24.400470] [ 24.400493] kfence-#105: 0x0000000006a011a7-0x0000000044831441, size=32, cache=test [ 24.400493] [ 24.400548] allocated by task 313 on cpu 1 at 24.399822s (0.000722s ago): [ 24.400610] test_alloc+0x230/0x628 [ 24.400649] test_corruption+0x198/0x378 [ 24.400690] kunit_try_run_case+0x170/0x3f0 [ 24.400730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.400773] kthread+0x328/0x630 [ 24.400808] ret_from_fork+0x10/0x20 [ 24.400854] [ 24.400879] freed by task 313 on cpu 1 at 24.399882s (0.000992s ago): [ 24.400940] test_corruption+0x1d8/0x378 [ 24.400982] kunit_try_run_case+0x170/0x3f0 [ 24.401022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.401065] kthread+0x328/0x630 [ 24.401101] ret_from_fork+0x10/0x20 [ 24.401140] [ 24.401184] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 24.401265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.401296] Hardware name: linux,dummy-virt (DT) [ 24.401330] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 20.410524] ================================================================== [ 20.410608] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.410682] Read of size 1 at addr fff00000c65b1900 by task kunit_try_catch/227 [ 20.410735] [ 20.410793] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.410883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.410910] Hardware name: linux,dummy-virt (DT) [ 20.410943] Call trace: [ 20.411031] show_stack+0x20/0x38 (C) [ 20.411085] dump_stack_lvl+0x8c/0xd0 [ 20.411152] print_report+0x118/0x608 [ 20.411205] kasan_report+0xdc/0x128 [ 20.411281] __asan_report_load1_noabort+0x20/0x30 [ 20.411336] mempool_uaf_helper+0x314/0x340 [ 20.411413] mempool_kmalloc_uaf+0xc4/0x120 [ 20.411550] kunit_try_run_case+0x170/0x3f0 [ 20.411601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.411677] kthread+0x328/0x630 [ 20.411721] ret_from_fork+0x10/0x20 [ 20.411773] [ 20.412180] Allocated by task 227: [ 20.412292] kasan_save_stack+0x3c/0x68 [ 20.412334] kasan_save_track+0x20/0x40 [ 20.412372] kasan_save_alloc_info+0x40/0x58 [ 20.412408] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.412464] remove_element+0x130/0x1f8 [ 20.412503] mempool_alloc_preallocated+0x58/0xc0 [ 20.412541] mempool_uaf_helper+0xa4/0x340 [ 20.412576] mempool_kmalloc_uaf+0xc4/0x120 [ 20.412614] kunit_try_run_case+0x170/0x3f0 [ 20.412650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.412694] kthread+0x328/0x630 [ 20.412726] ret_from_fork+0x10/0x20 [ 20.412762] [ 20.412780] Freed by task 227: [ 20.412846] kasan_save_stack+0x3c/0x68 [ 20.412885] kasan_save_track+0x20/0x40 [ 20.412921] kasan_save_free_info+0x4c/0x78 [ 20.412998] __kasan_mempool_poison_object+0xc0/0x150 [ 20.413297] mempool_free+0x28c/0x328 [ 20.413332] mempool_uaf_helper+0x104/0x340 [ 20.413369] mempool_kmalloc_uaf+0xc4/0x120 [ 20.413518] kunit_try_run_case+0x170/0x3f0 [ 20.413604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.413675] kthread+0x328/0x630 [ 20.413723] ret_from_fork+0x10/0x20 [ 20.413769] [ 20.413801] The buggy address belongs to the object at fff00000c65b1900 [ 20.413801] which belongs to the cache kmalloc-128 of size 128 [ 20.413897] The buggy address is located 0 bytes inside of [ 20.413897] freed 128-byte region [fff00000c65b1900, fff00000c65b1980) [ 20.414016] [ 20.414068] The buggy address belongs to the physical page: [ 20.414144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 20.414216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.414269] page_type: f5(slab) [ 20.414309] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.414358] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.414399] page dumped because: kasan: bad access detected [ 20.414441] [ 20.414459] Memory state around the buggy address: [ 20.414492] fff00000c65b1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.414657] fff00000c65b1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.414781] >fff00000c65b1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.414904] ^ [ 20.414964] fff00000c65b1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.415249] fff00000c65b1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.415442] ================================================================== [ 20.431068] ================================================================== [ 20.431135] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.431220] Read of size 1 at addr fff00000c58a5240 by task kunit_try_catch/231 [ 20.431271] [ 20.431335] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.431500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.431599] Hardware name: linux,dummy-virt (DT) [ 20.431660] Call trace: [ 20.431682] show_stack+0x20/0x38 (C) [ 20.431754] dump_stack_lvl+0x8c/0xd0 [ 20.431802] print_report+0x118/0x608 [ 20.431849] kasan_report+0xdc/0x128 [ 20.431984] __asan_report_load1_noabort+0x20/0x30 [ 20.432033] mempool_uaf_helper+0x314/0x340 [ 20.432110] mempool_slab_uaf+0xc0/0x118 [ 20.432272] kunit_try_run_case+0x170/0x3f0 [ 20.432404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.432571] kthread+0x328/0x630 [ 20.432674] ret_from_fork+0x10/0x20 [ 20.432835] [ 20.432874] Allocated by task 231: [ 20.432904] kasan_save_stack+0x3c/0x68 [ 20.433001] kasan_save_track+0x20/0x40 [ 20.433266] kasan_save_alloc_info+0x40/0x58 [ 20.433360] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.433508] remove_element+0x16c/0x1f8 [ 20.433595] mempool_alloc_preallocated+0x58/0xc0 [ 20.433655] mempool_uaf_helper+0xa4/0x340 [ 20.433938] mempool_slab_uaf+0xc0/0x118 [ 20.434006] kunit_try_run_case+0x170/0x3f0 [ 20.434104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.434221] kthread+0x328/0x630 [ 20.434306] ret_from_fork+0x10/0x20 [ 20.434393] [ 20.434500] Freed by task 231: [ 20.434528] kasan_save_stack+0x3c/0x68 [ 20.434566] kasan_save_track+0x20/0x40 [ 20.434774] kasan_save_free_info+0x4c/0x78 [ 20.434858] __kasan_mempool_poison_object+0xc0/0x150 [ 20.434939] mempool_free+0x28c/0x328 [ 20.435064] mempool_uaf_helper+0x104/0x340 [ 20.435143] mempool_slab_uaf+0xc0/0x118 [ 20.435180] kunit_try_run_case+0x170/0x3f0 [ 20.435216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.435259] kthread+0x328/0x630 [ 20.435290] ret_from_fork+0x10/0x20 [ 20.435324] [ 20.435343] The buggy address belongs to the object at fff00000c58a5240 [ 20.435343] which belongs to the cache test_cache of size 123 [ 20.435445] The buggy address is located 0 bytes inside of [ 20.435445] freed 123-byte region [fff00000c58a5240, fff00000c58a52bb) [ 20.435505] [ 20.435526] The buggy address belongs to the physical page: [ 20.435570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a5 [ 20.435713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.435790] page_type: f5(slab) [ 20.435885] raw: 0bfffe0000000000 fff00000c65c9640 dead000000000122 0000000000000000 [ 20.435973] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.436042] page dumped because: kasan: bad access detected [ 20.436072] [ 20.436091] Memory state around the buggy address: [ 20.436147] fff00000c58a5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.436191] fff00000c58a5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.436232] >fff00000c58a5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 20.436555] ^ [ 20.436718] fff00000c58a5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.436851] fff00000c58a5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.436917] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 20.998418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 21.012043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 20.963706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
Automatically assigned
[ 20.869606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 20.860620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
Automatically assigned
[ 22.196150] ================================================================== [ 22.196227] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.196227] [ 22.196320] Out-of-bounds write at 0x0000000003e52060 (1B left of kfence-#84): [ 22.196375] test_out_of_bounds_write+0x100/0x240 [ 22.196435] kunit_try_run_case+0x170/0x3f0 [ 22.196481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.196527] kthread+0x328/0x630 [ 22.196565] ret_from_fork+0x10/0x20 [ 22.196616] [ 22.196641] kfence-#84: 0x00000000945ae29a-0x0000000053702eea, size=32, cache=kmalloc-32 [ 22.196641] [ 22.196694] allocated by task 291 on cpu 1 at 22.195828s (0.000862s ago): [ 22.196795] test_alloc+0x29c/0x628 [ 22.196841] test_out_of_bounds_write+0xc8/0x240 [ 22.196882] kunit_try_run_case+0x170/0x3f0 [ 22.196932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.197011] kthread+0x328/0x630 [ 22.197045] ret_from_fork+0x10/0x20 [ 22.197113] [ 22.197157] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 22.197257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.197287] Hardware name: linux,dummy-virt (DT) [ 22.197320] ================================================================== [ 22.408676] ================================================================== [ 22.408929] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.408929] [ 22.409030] Out-of-bounds write at 0x000000004601b10d (1B left of kfence-#86): [ 22.409121] test_out_of_bounds_write+0x100/0x240 [ 22.409173] kunit_try_run_case+0x170/0x3f0 [ 22.409315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.409371] kthread+0x328/0x630 [ 22.409603] ret_from_fork+0x10/0x20 [ 22.409661] [ 22.409691] kfence-#86: 0x0000000096c64e9d-0x000000004a744bf2, size=32, cache=test [ 22.409691] [ 22.409765] allocated by task 293 on cpu 1 at 22.408566s (0.001189s ago): [ 22.409891] test_alloc+0x230/0x628 [ 22.409941] test_out_of_bounds_write+0xc8/0x240 [ 22.409984] kunit_try_run_case+0x170/0x3f0 [ 22.410043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.410096] kthread+0x328/0x630 [ 22.410150] ret_from_fork+0x10/0x20 [ 22.410208] [ 22.410253] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 22.410365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.410403] Hardware name: linux,dummy-virt (DT) [ 22.410454] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
Automatically assigned
[ 94.902258] Internal error: Oops: 0000000096000005 [#1] SMP [ 94.911960] Modules linked in: [ 94.913086] CPU: 0 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 94.914338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.914664] Hardware name: linux,dummy-virt (DT) [ 94.914977] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.915307] pc : kunit_test_null_dereference+0x70/0x170 [ 94.916251] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.917179] sp : ffff800082037d30 [ 94.917762] x29: ffff800082037d90 x28: 0000000000000000 x27: 0000000000000000 [ 94.918776] x26: 1ffe000018b28541 x25: 0000000000000000 x24: 0000000000000004 [ 94.919836] x23: fff00000c5942a0c x22: ffff9fc2fb858458 x21: fff00000c41eee08 [ 94.920851] x20: 1ffff00010406fa6 x19: ffff800080087990 x18: 0000000055299f6c [ 94.921573] x17: 0000000000000001 x16: fff00000c097543c x15: fff00000ff616b08 [ 94.921938] x14: 0000000000018fff x13: 1ffe00001b48cdcd x12: fffd80001968911c [ 94.922285] x11: 1ffe00001968911b x10: fffd80001968911b x9 : ffff9fc2fb84f8c0 [ 94.923508] x8 : ffff800082037c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 94.924676] x5 : ffff700010406fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 94.925570] x2 : dfff800000000000 x1 : fff00000cb448000 x0 : ffff800080087990 [ 94.926714] Call trace: [ 94.927142] kunit_test_null_dereference+0x70/0x170 (P) [ 94.927971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.929403] kthread+0x328/0x630 [ 94.929993] ret_from_fork+0x10/0x20 [ 94.930678] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 94.931165] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
Automatically assigned
[ 51.136323] ================================================================== [ 51.136375] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.136375] [ 51.136473] Use-after-free read at 0x00000000e33fe1fd (in kfence-#149): [ 51.136524] test_krealloc+0x51c/0x830 [ 51.136570] kunit_try_run_case+0x170/0x3f0 [ 51.136613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.136658] kthread+0x328/0x630 [ 51.136696] ret_from_fork+0x10/0x20 [ 51.136736] [ 51.136760] kfence-#149: 0x00000000e33fe1fd-0x00000000da82f877, size=32, cache=kmalloc-32 [ 51.136760] [ 51.136820] allocated by task 337 on cpu 0 at 51.135725s (0.001085s ago): [ 51.136886] test_alloc+0x29c/0x628 [ 51.136926] test_krealloc+0xc0/0x830 [ 51.136966] kunit_try_run_case+0x170/0x3f0 [ 51.137005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.137050] kthread+0x328/0x630 [ 51.137084] ret_from_fork+0x10/0x20 [ 51.137122] [ 51.137145] freed by task 337 on cpu 0 at 51.135937s (0.001206s ago): [ 51.137206] krealloc_noprof+0x148/0x360 [ 51.137246] test_krealloc+0x1dc/0x830 [ 51.137285] kunit_try_run_case+0x170/0x3f0 [ 51.137324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.137367] kthread+0x328/0x630 [ 51.137403] ret_from_fork+0x10/0x20 [ 51.137451] [ 51.137495] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 51.137575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.137605] Hardware name: linux,dummy-virt (DT) [ 51.137640] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
Automatically assigned
[ 51.063915] ================================================================== [ 51.064020] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.064020] [ 51.064120] Use-after-free read at 0x00000000bf04db14 (in kfence-#148): [ 51.064175] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.064225] kunit_try_run_case+0x170/0x3f0 [ 51.064271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.064317] kthread+0x328/0x630 [ 51.064355] ret_from_fork+0x10/0x20 [ 51.064395] [ 51.064418] kfence-#148: 0x00000000bf04db14-0x0000000092e8e4c1, size=32, cache=test [ 51.064418] [ 51.064492] allocated by task 335 on cpu 1 at 51.035691s (0.028796s ago): [ 51.064563] test_alloc+0x230/0x628 [ 51.064603] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.064646] kunit_try_run_case+0x170/0x3f0 [ 51.064685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.064728] kthread+0x328/0x630 [ 51.064764] ret_from_fork+0x10/0x20 [ 51.064801] [ 51.064834] freed by task 335 on cpu 1 at 51.035804s (0.029026s ago): [ 51.064889] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.064932] kunit_try_run_case+0x170/0x3f0 [ 51.064972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.065015] kthread+0x328/0x630 [ 51.065049] ret_from_fork+0x10/0x20 [ 51.065089] [ 51.065134] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 51.065215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.065243] Hardware name: linux,dummy-virt (DT) [ 51.065280] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
Automatically assigned
[ 28.584976] ================================================================== [ 28.585141] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 28.585141] [ 28.585247] Invalid read at 0x000000006af6c3c2: [ 28.585315] test_invalid_access+0xdc/0x1f0 [ 28.585369] kunit_try_run_case+0x170/0x3f0 [ 28.585420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.585489] kthread+0x328/0x630 [ 28.585533] ret_from_fork+0x10/0x20 [ 28.585586] [ 28.585637] CPU: 1 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 28.585727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.586092] Hardware name: linux,dummy-virt (DT) [ 28.586156] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
Automatically assigned
[ 20.641169] ================================================================== [ 20.641250] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 20.641317] Read of size 1 at addr ffff800080a97b5f by task kunit_try_catch/251 [ 20.641610] [ 20.641735] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.642043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.642183] Hardware name: linux,dummy-virt (DT) [ 20.642358] Call trace: [ 20.642382] show_stack+0x20/0x38 (C) [ 20.642679] dump_stack_lvl+0x8c/0xd0 [ 20.643283] print_report+0x310/0x608 [ 20.643568] kasan_report+0xdc/0x128 [ 20.643644] __asan_report_load1_noabort+0x20/0x30 [ 20.643698] kasan_alloca_oob_left+0x2b8/0x310 [ 20.643747] kunit_try_run_case+0x170/0x3f0 [ 20.643799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.643855] kthread+0x328/0x630 [ 20.643900] ret_from_fork+0x10/0x20 [ 20.644153] [ 20.644224] The buggy address belongs to stack of task kunit_try_catch/251 [ 20.644494] [ 20.644528] The buggy address belongs to the virtual mapping at [ 20.644528] [ffff800080a90000, ffff800080a99000) created by: [ 20.644528] kernel_clone+0x150/0x7a8 [ 20.644610] [ 20.644634] The buggy address belongs to the physical page: [ 20.644668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd [ 20.644722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.644792] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.644862] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.644906] page dumped because: kasan: bad access detected [ 20.645103] [ 20.645125] Memory state around the buggy address: [ 20.645477] ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.645770] ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.645817] >ffff800080a97b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 20.645858] ^ [ 20.645951] ffff800080a97b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.645996] ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.646151] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
Automatically assigned
[ 28.352010] ================================================================== [ 28.352103] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.352103] [ 28.352166] Corrupted memory at 0x00000000cfba42a4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143): [ 28.352487] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.352536] kunit_try_run_case+0x170/0x3f0 [ 28.352580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.352622] kthread+0x328/0x630 [ 28.352661] ret_from_fork+0x10/0x20 [ 28.352701] [ 28.352725] kfence-#143: 0x000000005e274b6c-0x000000006f7eca48, size=73, cache=kmalloc-96 [ 28.352725] [ 28.352781] allocated by task 325 on cpu 0 at 28.351767s (0.001010s ago): [ 28.352850] test_alloc+0x29c/0x628 [ 28.352890] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 28.352933] kunit_try_run_case+0x170/0x3f0 [ 28.352973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.353015] kthread+0x328/0x630 [ 28.353051] ret_from_fork+0x10/0x20 [ 28.353089] [ 28.353112] freed by task 325 on cpu 0 at 28.351915s (0.001193s ago): [ 28.353175] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.353217] kunit_try_run_case+0x170/0x3f0 [ 28.353257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.353301] kthread+0x328/0x630 [ 28.353336] ret_from_fork+0x10/0x20 [ 28.353375] [ 28.353418] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 28.353510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.353539] Hardware name: linux,dummy-virt (DT) [ 28.353573] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
Automatically assigned
[ 28.248064] ================================================================== [ 28.248153] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.248153] [ 28.248252] Out-of-bounds read at 0x00000000a753c172 (105B right of kfence-#142): [ 28.248314] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.248364] kunit_try_run_case+0x170/0x3f0 [ 28.248410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.248472] kthread+0x328/0x630 [ 28.248510] ret_from_fork+0x10/0x20 [ 28.248550] [ 28.248577] kfence-#142: 0x00000000c1caea93-0x00000000ab11a409, size=73, cache=kmalloc-96 [ 28.248577] [ 28.248631] allocated by task 323 on cpu 0 at 28.247821s (0.000807s ago): [ 28.248702] test_alloc+0x29c/0x628 [ 28.248743] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.248786] kunit_try_run_case+0x170/0x3f0 [ 28.248834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.248875] kthread+0x328/0x630 [ 28.248909] ret_from_fork+0x10/0x20 [ 28.248949] [ 28.248996] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 28.249077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.249106] Hardware name: linux,dummy-virt (DT) [ 28.249141] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
Automatically assigned
[ 23.252271] ================================================================== [ 23.252344] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 23.252344] [ 23.252465] Invalid free of 0x00000000cdd0bcc7 (in kfence-#94): [ 23.252534] test_invalid_addr_free+0xec/0x238 [ 23.252606] kunit_try_run_case+0x170/0x3f0 [ 23.252651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.252703] kthread+0x328/0x630 [ 23.252760] ret_from_fork+0x10/0x20 [ 23.252850] [ 23.253117] kfence-#94: 0x0000000016109bed-0x0000000063283060, size=32, cache=test [ 23.253117] [ 23.253219] allocated by task 309 on cpu 1 at 23.252143s (0.001046s ago): [ 23.253286] test_alloc+0x230/0x628 [ 23.253332] test_invalid_addr_free+0xd4/0x238 [ 23.253563] kunit_try_run_case+0x170/0x3f0 [ 23.253651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.253698] kthread+0x328/0x630 [ 23.253734] ret_from_fork+0x10/0x20 [ 23.253784] [ 23.253836] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 23.253918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.253948] Hardware name: linux,dummy-virt (DT) [ 23.253990] ================================================================== [ 23.148637] ================================================================== [ 23.148722] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 23.148722] [ 23.148809] Invalid free of 0x000000000716ec25 (in kfence-#93): [ 23.148906] test_invalid_addr_free+0x1ac/0x238 [ 23.148970] kunit_try_run_case+0x170/0x3f0 [ 23.149017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.149062] kthread+0x328/0x630 [ 23.149326] ret_from_fork+0x10/0x20 [ 23.149384] [ 23.149410] kfence-#93: 0x00000000d5137858-0x00000000812dd8ba, size=32, cache=kmalloc-32 [ 23.149410] [ 23.149479] allocated by task 307 on cpu 1 at 23.148241s (0.001235s ago): [ 23.149545] test_alloc+0x29c/0x628 [ 23.149596] test_invalid_addr_free+0xd4/0x238 [ 23.149650] kunit_try_run_case+0x170/0x3f0 [ 23.149691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.149734] kthread+0x328/0x630 [ 23.149770] ret_from_fork+0x10/0x20 [ 23.149825] [ 23.149871] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 23.149951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.149981] Hardware name: linux,dummy-virt (DT) [ 23.150017] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
Automatically assigned
[ 23.041575] ================================================================== [ 23.041664] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 23.041664] [ 23.042038] Invalid free of 0x000000004ac2cf51 (in kfence-#92): [ 23.042150] test_double_free+0x100/0x238 [ 23.042208] kunit_try_run_case+0x170/0x3f0 [ 23.042255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.042301] kthread+0x328/0x630 [ 23.042502] ret_from_fork+0x10/0x20 [ 23.042710] [ 23.042745] kfence-#92: 0x000000004ac2cf51-0x000000002fa93f85, size=32, cache=test [ 23.042745] [ 23.042947] allocated by task 305 on cpu 1 at 23.040990s (0.001948s ago): [ 23.043191] test_alloc+0x230/0x628 [ 23.043249] test_double_free+0xd4/0x238 [ 23.043310] kunit_try_run_case+0x170/0x3f0 [ 23.043698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.043832] kthread+0x328/0x630 [ 23.043871] ret_from_fork+0x10/0x20 [ 23.043928] [ 23.044116] freed by task 305 on cpu 1 at 23.041178s (0.002771s ago): [ 23.044378] test_double_free+0xf0/0x238 [ 23.044496] kunit_try_run_case+0x170/0x3f0 [ 23.044780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.044976] kthread+0x328/0x630 [ 23.045149] ret_from_fork+0x10/0x20 [ 23.045205] [ 23.045417] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 23.045666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.045841] Hardware name: linux,dummy-virt (DT) [ 23.046068] ================================================================== [ 22.938551] ================================================================== [ 22.938788] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 22.938788] [ 22.938911] Invalid free of 0x00000000bbecc36f (in kfence-#91): [ 22.939294] test_double_free+0x1bc/0x238 [ 22.939402] kunit_try_run_case+0x170/0x3f0 [ 22.939584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.939633] kthread+0x328/0x630 [ 22.940044] ret_from_fork+0x10/0x20 [ 22.940181] [ 22.940237] kfence-#91: 0x00000000bbecc36f-0x0000000077703c52, size=32, cache=kmalloc-32 [ 22.940237] [ 22.940682] allocated by task 303 on cpu 1 at 22.937660s (0.002968s ago): [ 22.940870] test_alloc+0x29c/0x628 [ 22.941009] test_double_free+0xd4/0x238 [ 22.941384] kunit_try_run_case+0x170/0x3f0 [ 22.941738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.941936] kthread+0x328/0x630 [ 22.941995] ret_from_fork+0x10/0x20 [ 22.942202] [ 22.942252] freed by task 303 on cpu 1 at 22.938066s (0.004180s ago): [ 22.942495] test_double_free+0x1ac/0x238 [ 22.942673] kunit_try_run_case+0x170/0x3f0 [ 22.942723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.942943] kthread+0x328/0x630 [ 22.943126] ret_from_fork+0x10/0x20 [ 22.943316] [ 22.943605] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 22.943799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.943834] Hardware name: linux,dummy-virt (DT) [ 22.944220] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
Automatically assigned
[ 22.517582] ================================================================== [ 22.518012] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.518012] [ 22.518202] Use-after-free read at 0x00000000a14afa81 (in kfence-#87): [ 22.518520] test_use_after_free_read+0x114/0x248 [ 22.518714] kunit_try_run_case+0x170/0x3f0 [ 22.518862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.519157] kthread+0x328/0x630 [ 22.519303] ret_from_fork+0x10/0x20 [ 22.519710] [ 22.519797] kfence-#87: 0x00000000a14afa81-0x00000000646ee562, size=32, cache=kmalloc-32 [ 22.519797] [ 22.519901] allocated by task 295 on cpu 1 at 22.516773s (0.003102s ago): [ 22.519974] test_alloc+0x29c/0x628 [ 22.520013] test_use_after_free_read+0xd0/0x248 [ 22.520055] kunit_try_run_case+0x170/0x3f0 [ 22.520095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.520242] kthread+0x328/0x630 [ 22.520282] ret_from_fork+0x10/0x20 [ 22.520550] [ 22.521118] freed by task 295 on cpu 1 at 22.516867s (0.003986s ago): [ 22.521323] test_use_after_free_read+0x1c0/0x248 [ 22.521736] kunit_try_run_case+0x170/0x3f0 [ 22.521931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.521984] kthread+0x328/0x630 [ 22.522020] ret_from_fork+0x10/0x20 [ 22.522080] [ 22.522132] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 22.522406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.522590] Hardware name: linux,dummy-virt (DT) [ 22.522671] ================================================================== [ 22.622144] ================================================================== [ 22.622227] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.622227] [ 22.622606] Use-after-free read at 0x00000000e86ddff5 (in kfence-#88): [ 22.622669] test_use_after_free_read+0x114/0x248 [ 22.622771] kunit_try_run_case+0x170/0x3f0 [ 22.622816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.622860] kthread+0x328/0x630 [ 22.623162] ret_from_fork+0x10/0x20 [ 22.623295] [ 22.623323] kfence-#88: 0x00000000e86ddff5-0x00000000516e3525, size=32, cache=test [ 22.623323] [ 22.623396] allocated by task 297 on cpu 1 at 22.621548s (0.001834s ago): [ 22.623817] test_alloc+0x230/0x628 [ 22.623884] test_use_after_free_read+0xd0/0x248 [ 22.623953] kunit_try_run_case+0x170/0x3f0 [ 22.624112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.624219] kthread+0x328/0x630 [ 22.624316] ret_from_fork+0x10/0x20 [ 22.624601] [ 22.624782] freed by task 297 on cpu 1 at 22.621613s (0.003135s ago): [ 22.625223] test_use_after_free_read+0xf0/0x248 [ 22.625330] kunit_try_run_case+0x170/0x3f0 [ 22.625589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.625759] kthread+0x328/0x630 [ 22.626073] ret_from_fork+0x10/0x20 [ 22.626272] [ 22.626465] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 22.626579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.627022] Hardware name: linux,dummy-virt (DT) [ 22.627194] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
Automatically assigned
[ 22.092354] ================================================================== [ 22.092470] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 22.092470] [ 22.092551] Out-of-bounds read at 0x00000000ca232e99 (32B right of kfence-#83): [ 22.092606] test_out_of_bounds_read+0x1c8/0x3e0 [ 22.092673] kunit_try_run_case+0x170/0x3f0 [ 22.092736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.092885] kthread+0x328/0x630 [ 22.092924] ret_from_fork+0x10/0x20 [ 22.092963] [ 22.092988] kfence-#83: 0x000000000a12d390-0x00000000625af727, size=32, cache=test [ 22.092988] [ 22.093060] allocated by task 289 on cpu 1 at 22.092274s (0.000781s ago): [ 22.093130] test_alloc+0x230/0x628 [ 22.093171] test_out_of_bounds_read+0x198/0x3e0 [ 22.093213] kunit_try_run_case+0x170/0x3f0 [ 22.093269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.093436] kthread+0x328/0x630 [ 22.093504] ret_from_fork+0x10/0x20 [ 22.093683] [ 22.093729] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 22.093812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.093840] Hardware name: linux,dummy-virt (DT) [ 22.093872] ================================================================== [ 21.984140] ================================================================== [ 21.984385] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.984385] [ 21.984486] Out-of-bounds read at 0x000000002cad4313 (1B left of kfence-#82): [ 21.984543] test_out_of_bounds_read+0x114/0x3e0 [ 21.984590] kunit_try_run_case+0x170/0x3f0 [ 21.984633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.984675] kthread+0x328/0x630 [ 21.984713] ret_from_fork+0x10/0x20 [ 21.984751] [ 21.984774] kfence-#82: 0x0000000064f0dfbd-0x00000000821e94c9, size=32, cache=test [ 21.984774] [ 21.984838] allocated by task 289 on cpu 1 at 21.983957s (0.000869s ago): [ 21.985321] test_alloc+0x230/0x628 [ 21.985556] test_out_of_bounds_read+0xdc/0x3e0 [ 21.985599] kunit_try_run_case+0x170/0x3f0 [ 21.985807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.986033] kthread+0x328/0x630 [ 21.986219] ret_from_fork+0x10/0x20 [ 21.986264] [ 21.986434] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.986520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.986547] Hardware name: linux,dummy-virt (DT) [ 21.986579] ================================================================== [ 21.880116] ================================================================== [ 21.880212] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.880212] [ 21.880318] Out-of-bounds read at 0x00000000945418ee (32B right of kfence-#81): [ 21.880376] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.880434] kunit_try_run_case+0x170/0x3f0 [ 21.880480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.880559] kthread+0x328/0x630 [ 21.880606] ret_from_fork+0x10/0x20 [ 21.880759] [ 21.880835] kfence-#81: 0x00000000eb656d6a-0x000000006617d380, size=32, cache=kmalloc-32 [ 21.880835] [ 21.880888] allocated by task 287 on cpu 1 at 21.879915s (0.000968s ago): [ 21.880959] test_alloc+0x29c/0x628 [ 21.881000] test_out_of_bounds_read+0x198/0x3e0 [ 21.881041] kunit_try_run_case+0x170/0x3f0 [ 21.881080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.881124] kthread+0x328/0x630 [ 21.881159] ret_from_fork+0x10/0x20 [ 21.881207] [ 21.881250] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.881331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.881359] Hardware name: linux,dummy-virt (DT) [ 21.881393] ================================================================== [ 21.775397] ================================================================== [ 21.776559] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.776559] [ 21.777327] Out-of-bounds read at 0x0000000013da60c7 (1B left of kfence-#80): [ 21.778234] test_out_of_bounds_read+0x114/0x3e0 [ 21.778399] kunit_try_run_case+0x170/0x3f0 [ 21.778495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.778599] kthread+0x328/0x630 [ 21.778907] ret_from_fork+0x10/0x20 [ 21.779089] [ 21.779869] kfence-#80: 0x0000000055586c0e-0x000000004d5fdac6, size=32, cache=kmalloc-32 [ 21.779869] [ 21.780696] allocated by task 287 on cpu 1 at 21.773492s (0.007021s ago): [ 21.781939] test_alloc+0x29c/0x628 [ 21.782025] test_out_of_bounds_read+0xdc/0x3e0 [ 21.782091] kunit_try_run_case+0x170/0x3f0 [ 21.782132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.782186] kthread+0x328/0x630 [ 21.782224] ret_from_fork+0x10/0x20 [ 21.782320] [ 21.782449] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.782549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.782588] Hardware name: linux,dummy-virt (DT) [ 21.782647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
Automatically assigned
[ 21.623161] ================================================================== [ 21.623557] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 21.623721] Write of size 1 at addr fff00000c58a9678 by task kunit_try_catch/285 [ 21.623834] [ 21.623870] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.623960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.624405] Hardware name: linux,dummy-virt (DT) [ 21.624477] Call trace: [ 21.624655] show_stack+0x20/0x38 (C) [ 21.624903] dump_stack_lvl+0x8c/0xd0 [ 21.625175] print_report+0x118/0x608 [ 21.625365] kasan_report+0xdc/0x128 [ 21.625589] __asan_report_store1_noabort+0x20/0x30 [ 21.625800] strncpy_from_user+0x270/0x2a0 [ 21.626018] copy_user_test_oob+0x5c0/0xec8 [ 21.626192] kunit_try_run_case+0x170/0x3f0 [ 21.626457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.626888] kthread+0x328/0x630 [ 21.627093] ret_from_fork+0x10/0x20 [ 21.627151] [ 21.627172] Allocated by task 285: [ 21.627203] kasan_save_stack+0x3c/0x68 [ 21.627339] kasan_save_track+0x20/0x40 [ 21.627405] kasan_save_alloc_info+0x40/0x58 [ 21.627869] __kasan_kmalloc+0xd4/0xd8 [ 21.628024] __kmalloc_noprof+0x198/0x4c8 [ 21.628146] kunit_kmalloc_array+0x34/0x88 [ 21.628381] copy_user_test_oob+0xac/0xec8 [ 21.628444] kunit_try_run_case+0x170/0x3f0 [ 21.628487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.628602] kthread+0x328/0x630 [ 21.628855] ret_from_fork+0x10/0x20 [ 21.629163] [ 21.629291] The buggy address belongs to the object at fff00000c58a9600 [ 21.629291] which belongs to the cache kmalloc-128 of size 128 [ 21.629763] The buggy address is located 0 bytes to the right of [ 21.629763] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.629951] [ 21.630135] The buggy address belongs to the physical page: [ 21.630277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.630539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.630660] page_type: f5(slab) [ 21.630806] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.630885] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.631015] page dumped because: kasan: bad access detected [ 21.631063] [ 21.631116] Memory state around the buggy address: [ 21.631171] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.631217] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.631262] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.631304] ^ [ 21.631363] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.632058] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.632139] ================================================================== [ 21.612095] ================================================================== [ 21.612158] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 21.612646] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.612759] [ 21.613128] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.613529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.613677] Hardware name: linux,dummy-virt (DT) [ 21.613720] Call trace: [ 21.613771] show_stack+0x20/0x38 (C) [ 21.614006] dump_stack_lvl+0x8c/0xd0 [ 21.614258] print_report+0x118/0x608 [ 21.614329] kasan_report+0xdc/0x128 [ 21.614541] kasan_check_range+0x100/0x1a8 [ 21.614661] __kasan_check_write+0x20/0x30 [ 21.614722] strncpy_from_user+0x3c/0x2a0 [ 21.615129] copy_user_test_oob+0x5c0/0xec8 [ 21.615244] kunit_try_run_case+0x170/0x3f0 [ 21.615438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.615502] kthread+0x328/0x630 [ 21.615554] ret_from_fork+0x10/0x20 [ 21.615834] [ 21.615868] Allocated by task 285: [ 21.615903] kasan_save_stack+0x3c/0x68 [ 21.615949] kasan_save_track+0x20/0x40 [ 21.616004] kasan_save_alloc_info+0x40/0x58 [ 21.616044] __kasan_kmalloc+0xd4/0xd8 [ 21.616081] __kmalloc_noprof+0x198/0x4c8 [ 21.616130] kunit_kmalloc_array+0x34/0x88 [ 21.616167] copy_user_test_oob+0xac/0xec8 [ 21.616220] kunit_try_run_case+0x170/0x3f0 [ 21.616274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.616321] kthread+0x328/0x630 [ 21.616364] ret_from_fork+0x10/0x20 [ 21.616416] [ 21.616567] The buggy address belongs to the object at fff00000c58a9600 [ 21.616567] which belongs to the cache kmalloc-128 of size 128 [ 21.617207] The buggy address is located 0 bytes inside of [ 21.617207] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.617420] [ 21.617683] The buggy address belongs to the physical page: [ 21.618032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.618221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.618616] page_type: f5(slab) [ 21.618828] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.619081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.619161] page dumped because: kasan: bad access detected [ 21.619498] [ 21.619688] Memory state around the buggy address: [ 21.619986] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.620078] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.620134] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.620374] ^ [ 21.620739] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.620894] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.621540] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
Automatically assigned
[ 21.574346] ================================================================== [ 21.574734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.574891] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.574977] [ 21.575013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.575180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.575209] Hardware name: linux,dummy-virt (DT) [ 21.575250] Call trace: [ 21.575442] show_stack+0x20/0x38 (C) [ 21.575762] dump_stack_lvl+0x8c/0xd0 [ 21.575885] print_report+0x118/0x608 [ 21.576005] kasan_report+0xdc/0x128 [ 21.576054] kasan_check_range+0x100/0x1a8 [ 21.576119] __kasan_check_write+0x20/0x30 [ 21.576168] copy_user_test_oob+0x35c/0xec8 [ 21.576217] kunit_try_run_case+0x170/0x3f0 [ 21.576576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.576730] kthread+0x328/0x630 [ 21.576840] ret_from_fork+0x10/0x20 [ 21.577295] [ 21.577414] Allocated by task 285: [ 21.577561] kasan_save_stack+0x3c/0x68 [ 21.577717] kasan_save_track+0x20/0x40 [ 21.577763] kasan_save_alloc_info+0x40/0x58 [ 21.577836] __kasan_kmalloc+0xd4/0xd8 [ 21.578103] __kmalloc_noprof+0x198/0x4c8 [ 21.578356] kunit_kmalloc_array+0x34/0x88 [ 21.578435] copy_user_test_oob+0xac/0xec8 [ 21.578488] kunit_try_run_case+0x170/0x3f0 [ 21.578527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.578573] kthread+0x328/0x630 [ 21.578607] ret_from_fork+0x10/0x20 [ 21.578656] [ 21.578688] The buggy address belongs to the object at fff00000c58a9600 [ 21.578688] which belongs to the cache kmalloc-128 of size 128 [ 21.578763] The buggy address is located 0 bytes inside of [ 21.578763] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.578850] [ 21.578892] The buggy address belongs to the physical page: [ 21.578942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.579005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.579067] page_type: f5(slab) [ 21.579110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.579163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.579206] page dumped because: kasan: bad access detected [ 21.579239] [ 21.579280] Memory state around the buggy address: [ 21.579330] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.579688] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.579850] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.579898] ^ [ 21.579943] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.579988] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.580259] ================================================================== [ 21.533992] ================================================================== [ 21.534170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.534267] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.534323] [ 21.534382] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.535577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.535669] Hardware name: linux,dummy-virt (DT) [ 21.535740] Call trace: [ 21.535865] show_stack+0x20/0x38 (C) [ 21.535951] dump_stack_lvl+0x8c/0xd0 [ 21.536397] print_report+0x118/0x608 [ 21.536617] kasan_report+0xdc/0x128 [ 21.536762] kasan_check_range+0x100/0x1a8 [ 21.536858] __kasan_check_write+0x20/0x30 [ 21.537009] copy_user_test_oob+0x234/0xec8 [ 21.537079] kunit_try_run_case+0x170/0x3f0 [ 21.537746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.537819] kthread+0x328/0x630 [ 21.538558] ret_from_fork+0x10/0x20 [ 21.538619] [ 21.538886] Allocated by task 285: [ 21.539096] kasan_save_stack+0x3c/0x68 [ 21.539186] kasan_save_track+0x20/0x40 [ 21.539329] kasan_save_alloc_info+0x40/0x58 [ 21.539431] __kasan_kmalloc+0xd4/0xd8 [ 21.539575] __kmalloc_noprof+0x198/0x4c8 [ 21.539623] kunit_kmalloc_array+0x34/0x88 [ 21.539662] copy_user_test_oob+0xac/0xec8 [ 21.539937] kunit_try_run_case+0x170/0x3f0 [ 21.540056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.540165] kthread+0x328/0x630 [ 21.540243] ret_from_fork+0x10/0x20 [ 21.540376] [ 21.540456] The buggy address belongs to the object at fff00000c58a9600 [ 21.540456] which belongs to the cache kmalloc-128 of size 128 [ 21.540861] The buggy address is located 0 bytes inside of [ 21.540861] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.541017] [ 21.541074] The buggy address belongs to the physical page: [ 21.541206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.541345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.541511] page_type: f5(slab) [ 21.541573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.542018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.542113] page dumped because: kasan: bad access detected [ 21.542178] [ 21.542388] Memory state around the buggy address: [ 21.542601] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.542739] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.542883] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.542974] ^ [ 21.543350] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.543525] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.543591] ================================================================== [ 21.592707] ================================================================== [ 21.592807] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.592880] Write of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.592935] [ 21.593145] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.593340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.593380] Hardware name: linux,dummy-virt (DT) [ 21.593414] Call trace: [ 21.593449] show_stack+0x20/0x38 (C) [ 21.594058] dump_stack_lvl+0x8c/0xd0 [ 21.594156] print_report+0x118/0x608 [ 21.594393] kasan_report+0xdc/0x128 [ 21.594496] kasan_check_range+0x100/0x1a8 [ 21.594558] __kasan_check_write+0x20/0x30 [ 21.594674] copy_user_test_oob+0x434/0xec8 [ 21.594748] kunit_try_run_case+0x170/0x3f0 [ 21.595064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.595275] kthread+0x328/0x630 [ 21.595328] ret_from_fork+0x10/0x20 [ 21.595677] [ 21.595745] Allocated by task 285: [ 21.595861] kasan_save_stack+0x3c/0x68 [ 21.595951] kasan_save_track+0x20/0x40 [ 21.596199] kasan_save_alloc_info+0x40/0x58 [ 21.596256] __kasan_kmalloc+0xd4/0xd8 [ 21.596597] __kmalloc_noprof+0x198/0x4c8 [ 21.597022] kunit_kmalloc_array+0x34/0x88 [ 21.597149] copy_user_test_oob+0xac/0xec8 [ 21.597247] kunit_try_run_case+0x170/0x3f0 [ 21.597404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.597500] kthread+0x328/0x630 [ 21.597810] ret_from_fork+0x10/0x20 [ 21.597961] [ 21.597984] The buggy address belongs to the object at fff00000c58a9600 [ 21.597984] which belongs to the cache kmalloc-128 of size 128 [ 21.598106] The buggy address is located 0 bytes inside of [ 21.598106] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.598177] [ 21.598225] The buggy address belongs to the physical page: [ 21.598272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.598332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.598403] page_type: f5(slab) [ 21.598476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.598529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.598581] page dumped because: kasan: bad access detected [ 21.598616] [ 21.598638] Memory state around the buggy address: [ 21.598672] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.598717] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.598769] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.598818] ^ [ 21.598865] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.598915] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.598961] ================================================================== [ 21.554901] ================================================================== [ 21.554990] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.555055] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.555109] [ 21.556967] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.557311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.557344] Hardware name: linux,dummy-virt (DT) [ 21.558133] Call trace: [ 21.558242] show_stack+0x20/0x38 (C) [ 21.558632] dump_stack_lvl+0x8c/0xd0 [ 21.558795] print_report+0x118/0x608 [ 21.559186] kasan_report+0xdc/0x128 [ 21.559340] kasan_check_range+0x100/0x1a8 [ 21.559698] __kasan_check_read+0x20/0x30 [ 21.559841] copy_user_test_oob+0x728/0xec8 [ 21.559931] kunit_try_run_case+0x170/0x3f0 [ 21.560250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.560389] kthread+0x328/0x630 [ 21.560497] ret_from_fork+0x10/0x20 [ 21.560624] [ 21.560645] Allocated by task 285: [ 21.560712] kasan_save_stack+0x3c/0x68 [ 21.561029] kasan_save_track+0x20/0x40 [ 21.561170] kasan_save_alloc_info+0x40/0x58 [ 21.561215] __kasan_kmalloc+0xd4/0xd8 [ 21.561534] __kmalloc_noprof+0x198/0x4c8 [ 21.561623] kunit_kmalloc_array+0x34/0x88 [ 21.561681] copy_user_test_oob+0xac/0xec8 [ 21.561720] kunit_try_run_case+0x170/0x3f0 [ 21.561761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.561828] kthread+0x328/0x630 [ 21.561869] ret_from_fork+0x10/0x20 [ 21.561913] [ 21.561937] The buggy address belongs to the object at fff00000c58a9600 [ 21.561937] which belongs to the cache kmalloc-128 of size 128 [ 21.562017] The buggy address is located 0 bytes inside of [ 21.562017] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.562081] [ 21.562104] The buggy address belongs to the physical page: [ 21.562150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.562206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.562261] page_type: f5(slab) [ 21.562306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.562359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.562401] page dumped because: kasan: bad access detected [ 21.562461] [ 21.562490] Memory state around the buggy address: [ 21.562527] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.562572] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.562626] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.562695] ^ [ 21.562761] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.562813] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.562855] ================================================================== [ 21.599198] ================================================================== [ 21.599243] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.599313] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.599365] [ 21.600012] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.600295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.600386] Hardware name: linux,dummy-virt (DT) [ 21.600917] Call trace: [ 21.601023] show_stack+0x20/0x38 (C) [ 21.601296] dump_stack_lvl+0x8c/0xd0 [ 21.601716] print_report+0x118/0x608 [ 21.601910] kasan_report+0xdc/0x128 [ 21.602080] kasan_check_range+0x100/0x1a8 [ 21.602136] __kasan_check_read+0x20/0x30 [ 21.602183] copy_user_test_oob+0x4a0/0xec8 [ 21.602407] kunit_try_run_case+0x170/0x3f0 [ 21.602654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.603040] kthread+0x328/0x630 [ 21.603213] ret_from_fork+0x10/0x20 [ 21.603499] [ 21.603539] Allocated by task 285: [ 21.603573] kasan_save_stack+0x3c/0x68 [ 21.603750] kasan_save_track+0x20/0x40 [ 21.603940] kasan_save_alloc_info+0x40/0x58 [ 21.604041] __kasan_kmalloc+0xd4/0xd8 [ 21.604235] __kmalloc_noprof+0x198/0x4c8 [ 21.604522] kunit_kmalloc_array+0x34/0x88 [ 21.604673] copy_user_test_oob+0xac/0xec8 [ 21.604774] kunit_try_run_case+0x170/0x3f0 [ 21.604827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.605063] kthread+0x328/0x630 [ 21.605660] ret_from_fork+0x10/0x20 [ 21.605799] [ 21.605879] The buggy address belongs to the object at fff00000c58a9600 [ 21.605879] which belongs to the cache kmalloc-128 of size 128 [ 21.606054] The buggy address is located 0 bytes inside of [ 21.606054] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.606138] [ 21.606169] The buggy address belongs to the physical page: [ 21.606343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.606495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.606860] page_type: f5(slab) [ 21.607017] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.607492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.607777] page dumped because: kasan: bad access detected [ 21.608034] [ 21.608214] Memory state around the buggy address: [ 21.608464] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.608702] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.608952] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.609065] ^ [ 21.609503] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.609603] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.609647] ================================================================== [ 21.581806] ================================================================== [ 21.582290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.582626] Read of size 121 at addr fff00000c58a9600 by task kunit_try_catch/285 [ 21.582715] [ 21.582749] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.582835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.583107] Hardware name: linux,dummy-virt (DT) [ 21.583157] Call trace: [ 21.583448] show_stack+0x20/0x38 (C) [ 21.583729] dump_stack_lvl+0x8c/0xd0 [ 21.583868] print_report+0x118/0x608 [ 21.583979] kasan_report+0xdc/0x128 [ 21.584029] kasan_check_range+0x100/0x1a8 [ 21.584080] __kasan_check_read+0x20/0x30 [ 21.584127] copy_user_test_oob+0x3c8/0xec8 [ 21.584757] kunit_try_run_case+0x170/0x3f0 [ 21.584950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.585124] kthread+0x328/0x630 [ 21.585320] ret_from_fork+0x10/0x20 [ 21.585401] [ 21.585717] Allocated by task 285: [ 21.585837] kasan_save_stack+0x3c/0x68 [ 21.586125] kasan_save_track+0x20/0x40 [ 21.586621] kasan_save_alloc_info+0x40/0x58 [ 21.586790] __kasan_kmalloc+0xd4/0xd8 [ 21.587330] __kmalloc_noprof+0x198/0x4c8 [ 21.587415] kunit_kmalloc_array+0x34/0x88 [ 21.587580] copy_user_test_oob+0xac/0xec8 [ 21.587660] kunit_try_run_case+0x170/0x3f0 [ 21.587702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.587749] kthread+0x328/0x630 [ 21.587783] ret_from_fork+0x10/0x20 [ 21.587822] [ 21.587844] The buggy address belongs to the object at fff00000c58a9600 [ 21.587844] which belongs to the cache kmalloc-128 of size 128 [ 21.588617] The buggy address is located 0 bytes inside of [ 21.588617] allocated 120-byte region [fff00000c58a9600, fff00000c58a9678) [ 21.588805] [ 21.588927] The buggy address belongs to the physical page: [ 21.589205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.589269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.589539] page_type: f5(slab) [ 21.589601] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.589967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.590284] page dumped because: kasan: bad access detected [ 21.590516] [ 21.590647] Memory state around the buggy address: [ 21.590845] fff00000c58a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.590907] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.590952] >fff00000c58a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.590993] ^ [ 21.591059] fff00000c58a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.591103] fff00000c58a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.591146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
Automatically assigned
[ 21.477865] ================================================================== [ 21.477943] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 21.478015] Read of size 8 at addr fff00000c58a9578 by task kunit_try_catch/281 [ 21.478070] [ 21.478111] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.478199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.478229] Hardware name: linux,dummy-virt (DT) [ 21.478262] Call trace: [ 21.478288] show_stack+0x20/0x38 (C) [ 21.478342] dump_stack_lvl+0x8c/0xd0 [ 21.478651] print_report+0x118/0x608 [ 21.478704] kasan_report+0xdc/0x128 [ 21.478751] __asan_report_load8_noabort+0x20/0x30 [ 21.479359] copy_to_kernel_nofault+0x204/0x250 [ 21.479469] copy_to_kernel_nofault_oob+0x158/0x418 [ 21.479638] kunit_try_run_case+0x170/0x3f0 [ 21.479714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.479770] kthread+0x328/0x630 [ 21.480118] ret_from_fork+0x10/0x20 [ 21.480309] [ 21.480360] Allocated by task 281: [ 21.480423] kasan_save_stack+0x3c/0x68 [ 21.480653] kasan_save_track+0x20/0x40 [ 21.480824] kasan_save_alloc_info+0x40/0x58 [ 21.481020] __kasan_kmalloc+0xd4/0xd8 [ 21.481193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.481279] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.481320] kunit_try_run_case+0x170/0x3f0 [ 21.481518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.481749] kthread+0x328/0x630 [ 21.481811] ret_from_fork+0x10/0x20 [ 21.481947] [ 21.482028] The buggy address belongs to the object at fff00000c58a9500 [ 21.482028] which belongs to the cache kmalloc-128 of size 128 [ 21.482182] The buggy address is located 0 bytes to the right of [ 21.482182] allocated 120-byte region [fff00000c58a9500, fff00000c58a9578) [ 21.482598] [ 21.482781] The buggy address belongs to the physical page: [ 21.482936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.483044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.483130] page_type: f5(slab) [ 21.483173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.483369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.484014] page dumped because: kasan: bad access detected [ 21.484075] [ 21.484107] Memory state around the buggy address: [ 21.484146] fff00000c58a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.484192] fff00000c58a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.484481] >fff00000c58a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.484810] ^ [ 21.485305] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.485388] fff00000c58a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.485616] ================================================================== [ 21.487116] ================================================================== [ 21.487174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 21.487228] Write of size 8 at addr fff00000c58a9578 by task kunit_try_catch/281 [ 21.487329] [ 21.487377] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.487831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.487940] Hardware name: linux,dummy-virt (DT) [ 21.488042] Call trace: [ 21.488167] show_stack+0x20/0x38 (C) [ 21.488226] dump_stack_lvl+0x8c/0xd0 [ 21.488448] print_report+0x118/0x608 [ 21.488640] kasan_report+0xdc/0x128 [ 21.488774] kasan_check_range+0x100/0x1a8 [ 21.489161] __kasan_check_write+0x20/0x30 [ 21.489377] copy_to_kernel_nofault+0x8c/0x250 [ 21.489657] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 21.489921] kunit_try_run_case+0x170/0x3f0 [ 21.490139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.490209] kthread+0x328/0x630 [ 21.490415] ret_from_fork+0x10/0x20 [ 21.490621] [ 21.490646] Allocated by task 281: [ 21.490679] kasan_save_stack+0x3c/0x68 [ 21.490722] kasan_save_track+0x20/0x40 [ 21.490763] kasan_save_alloc_info+0x40/0x58 [ 21.490801] __kasan_kmalloc+0xd4/0xd8 [ 21.490840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.490889] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.490930] kunit_try_run_case+0x170/0x3f0 [ 21.490979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.491025] kthread+0x328/0x630 [ 21.491058] ret_from_fork+0x10/0x20 [ 21.491104] [ 21.491135] The buggy address belongs to the object at fff00000c58a9500 [ 21.491135] which belongs to the cache kmalloc-128 of size 128 [ 21.491202] The buggy address is located 0 bytes to the right of [ 21.491202] allocated 120-byte region [fff00000c58a9500, fff00000c58a9578) [ 21.491270] [ 21.491290] The buggy address belongs to the physical page: [ 21.491347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 21.491436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.491867] page_type: f5(slab) [ 21.491916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.491971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.492484] page dumped because: kasan: bad access detected [ 21.492814] [ 21.492958] Memory state around the buggy address: [ 21.493039] fff00000c58a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.493213] fff00000c58a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.493408] >fff00000c58a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.493492] ^ [ 21.493680] fff00000c58a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.493923] fff00000c58a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.494026] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
Automatically assigned
[ 21.414033] ================================================================== [ 21.414397] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 21.414564] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 21.414650] [ 21.414689] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.415015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.415061] Hardware name: linux,dummy-virt (DT) [ 21.415096] Call trace: [ 21.415123] show_stack+0x20/0x38 (C) [ 21.415177] dump_stack_lvl+0x8c/0xd0 [ 21.415228] print_report+0x310/0x608 [ 21.415588] kasan_report+0xdc/0x128 [ 21.415755] __asan_report_load1_noabort+0x20/0x30 [ 21.416026] vmalloc_oob+0x578/0x5d0 [ 21.416187] kunit_try_run_case+0x170/0x3f0 [ 21.416328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.416398] kthread+0x328/0x630 [ 21.416738] ret_from_fork+0x10/0x20 [ 21.416874] [ 21.417022] The buggy address belongs to the virtual mapping at [ 21.417022] [ffff8000800fe000, ffff800080100000) created by: [ 21.417022] vmalloc_oob+0x98/0x5d0 [ 21.417104] [ 21.417129] The buggy address belongs to the physical page: [ 21.417338] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c4 [ 21.417696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.418139] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.418458] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.418549] page dumped because: kasan: bad access detected [ 21.418725] [ 21.418751] Memory state around the buggy address: [ 21.418912] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.419099] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.419157] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 21.419447] ^ [ 21.419651] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.419704] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.419895] ================================================================== [ 21.421632] ================================================================== [ 21.421698] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 21.421750] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 21.421800] [ 21.421841] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.421929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.421957] Hardware name: linux,dummy-virt (DT) [ 21.421990] Call trace: [ 21.422013] show_stack+0x20/0x38 (C) [ 21.422073] dump_stack_lvl+0x8c/0xd0 [ 21.422125] print_report+0x310/0x608 [ 21.422171] kasan_report+0xdc/0x128 [ 21.422219] __asan_report_load1_noabort+0x20/0x30 [ 21.422267] vmalloc_oob+0x51c/0x5d0 [ 21.422313] kunit_try_run_case+0x170/0x3f0 [ 21.422364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.422419] kthread+0x328/0x630 [ 21.423084] ret_from_fork+0x10/0x20 [ 21.423162] [ 21.423201] The buggy address belongs to the virtual mapping at [ 21.423201] [ffff8000800fe000, ffff800080100000) created by: [ 21.423201] vmalloc_oob+0x98/0x5d0 [ 21.423411] [ 21.423456] The buggy address belongs to the physical page: [ 21.423573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c4 [ 21.423654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.423984] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.424334] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.424464] page dumped because: kasan: bad access detected [ 21.424627] [ 21.424723] Memory state around the buggy address: [ 21.424773] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.424885] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.425029] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 21.425256] ^ [ 21.425465] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.425976] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.426115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 21.365133] ================================================================== [ 21.365186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.365384] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.365468] [ 21.365561] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.365651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.365680] Hardware name: linux,dummy-virt (DT) [ 21.365769] Call trace: [ 21.365808] show_stack+0x20/0x38 (C) [ 21.365862] dump_stack_lvl+0x8c/0xd0 [ 21.365965] print_report+0x118/0x608 [ 21.366040] kasan_report+0xdc/0x128 [ 21.366108] __asan_report_load8_noabort+0x20/0x30 [ 21.366160] kasan_atomics_helper+0x3df4/0x4858 [ 21.366210] kasan_atomics+0x198/0x2e0 [ 21.366258] kunit_try_run_case+0x170/0x3f0 [ 21.366307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.366476] kthread+0x328/0x630 [ 21.366538] ret_from_fork+0x10/0x20 [ 21.366598] [ 21.366627] Allocated by task 265: [ 21.366660] kasan_save_stack+0x3c/0x68 [ 21.366700] kasan_save_track+0x20/0x40 [ 21.366756] kasan_save_alloc_info+0x40/0x58 [ 21.366795] __kasan_kmalloc+0xd4/0xd8 [ 21.366835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.366882] kasan_atomics+0xb8/0x2e0 [ 21.366920] kunit_try_run_case+0x170/0x3f0 [ 21.366960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.367016] kthread+0x328/0x630 [ 21.367060] ret_from_fork+0x10/0x20 [ 21.367110] [ 21.367132] The buggy address belongs to the object at fff00000c58c1080 [ 21.367132] which belongs to the cache kmalloc-64 of size 64 [ 21.367199] The buggy address is located 0 bytes to the right of [ 21.367199] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.367264] [ 21.367287] The buggy address belongs to the physical page: [ 21.367320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.367604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.367662] page_type: f5(slab) [ 21.367702] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.367762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.367805] page dumped because: kasan: bad access detected [ 21.367840] [ 21.367860] Memory state around the buggy address: [ 21.368066] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368127] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.368172] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.368212] ^ [ 21.368248] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368352] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368437] ================================================================== [ 21.378183] ================================================================== [ 21.378234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.378298] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.378360] [ 21.378393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.378493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.379121] Hardware name: linux,dummy-virt (DT) [ 21.379200] Call trace: [ 21.379228] show_stack+0x20/0x38 (C) [ 21.379296] dump_stack_lvl+0x8c/0xd0 [ 21.379676] print_report+0x118/0x608 [ 21.379782] kasan_report+0xdc/0x128 [ 21.379870] kasan_check_range+0x100/0x1a8 [ 21.380106] __kasan_check_write+0x20/0x30 [ 21.380315] kasan_atomics_helper+0x175c/0x4858 [ 21.380451] kasan_atomics+0x198/0x2e0 [ 21.380537] kunit_try_run_case+0x170/0x3f0 [ 21.380670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.380755] kthread+0x328/0x630 [ 21.380798] ret_from_fork+0x10/0x20 [ 21.380981] [ 21.381002] Allocated by task 265: [ 21.381032] kasan_save_stack+0x3c/0x68 [ 21.381084] kasan_save_track+0x20/0x40 [ 21.381145] kasan_save_alloc_info+0x40/0x58 [ 21.381251] __kasan_kmalloc+0xd4/0xd8 [ 21.381329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.381463] kasan_atomics+0xb8/0x2e0 [ 21.381551] kunit_try_run_case+0x170/0x3f0 [ 21.381767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.382031] kthread+0x328/0x630 [ 21.382115] ret_from_fork+0x10/0x20 [ 21.382224] [ 21.382272] The buggy address belongs to the object at fff00000c58c1080 [ 21.382272] which belongs to the cache kmalloc-64 of size 64 [ 21.382551] The buggy address is located 0 bytes to the right of [ 21.382551] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.382702] [ 21.382770] The buggy address belongs to the physical page: [ 21.382839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.382897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.382949] page_type: f5(slab) [ 21.383174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.383304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.383359] page dumped because: kasan: bad access detected [ 21.383588] [ 21.383731] Memory state around the buggy address: [ 21.383800] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383906] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.383993] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.384076] ^ [ 21.384114] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.384261] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.384383] ================================================================== [ 21.054656] ================================================================== [ 21.054944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.055060] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.055135] [ 21.055170] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.055551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.055607] Hardware name: linux,dummy-virt (DT) [ 21.055646] Call trace: [ 21.055670] show_stack+0x20/0x38 (C) [ 21.055725] dump_stack_lvl+0x8c/0xd0 [ 21.055776] print_report+0x118/0x608 [ 21.055826] kasan_report+0xdc/0x128 [ 21.055874] kasan_check_range+0x100/0x1a8 [ 21.055924] __kasan_check_write+0x20/0x30 [ 21.055971] kasan_atomics_helper+0xa04/0x4858 [ 21.056022] kasan_atomics+0x198/0x2e0 [ 21.056067] kunit_try_run_case+0x170/0x3f0 [ 21.056117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.056449] __kasan_kmalloc+0xd4/0xd8 [ 21.056704] kunit_try_run_case+0x170/0x3f0 [ 21.057281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.057334] kthread+0x328/0x630 [ 21.057369] ret_from_fork+0x10/0x20 [ 21.057410] [ 21.057446] The buggy address belongs to the object at fff00000c58c1080 [ 21.057446] which belongs to the cache kmalloc-64 of size 64 [ 21.057504] The buggy address is located 0 bytes to the right of [ 21.057504] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.057569] [ 21.059073] The buggy address belongs to the physical page: [ 21.059641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.059910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.060263] page_type: f5(slab) [ 21.060303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.060779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.061174] page dumped because: kasan: bad access detected [ 21.061490] [ 21.061515] Memory state around the buggy address: [ 21.061897] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.062671] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.062725] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.063230] ^ [ 21.063530] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.063897] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.063940] ================================================================== [ 21.085344] ================================================================== [ 21.085409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.085482] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.085535] [ 21.085570] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.087732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.088279] Hardware name: linux,dummy-virt (DT) [ 21.088325] Call trace: [ 21.088357] show_stack+0x20/0x38 (C) [ 21.088413] dump_stack_lvl+0x8c/0xd0 [ 21.088952] print_report+0x118/0x608 [ 21.089078] kasan_report+0xdc/0x128 [ 21.089595] kasan_check_range+0x100/0x1a8 [ 21.090249] __kasan_check_write+0x20/0x30 [ 21.090631] kasan_atomics_helper+0xad4/0x4858 [ 21.090693] kasan_atomics+0x198/0x2e0 [ 21.090743] kunit_try_run_case+0x170/0x3f0 [ 21.090804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.091590] kthread+0x328/0x630 [ 21.092150] ret_from_fork+0x10/0x20 [ 21.092625] [ 21.092654] Allocated by task 265: [ 21.092691] kasan_save_stack+0x3c/0x68 [ 21.095746] [ 21.096114] The buggy address belongs to the object at fff00000c58c1080 [ 21.096114] which belongs to the cache kmalloc-64 of size 64 [ 21.096656] The buggy address is located 0 bytes to the right of [ 21.096656] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.097150] [ 21.097238] The buggy address belongs to the physical page: [ 21.097531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.098011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.099065] page_type: f5(slab) [ 21.099174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.099629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.099820] page dumped because: kasan: bad access detected [ 21.099857] [ 21.100164] Memory state around the buggy address: [ 21.100556] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.100679] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.100741] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.100783] ^ [ 21.102251] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.102668] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106224] ================================================================== [ 21.067298] ================================================================== [ 21.067649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.068157] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.068565] [ 21.068605] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.068699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.068729] Hardware name: linux,dummy-virt (DT) [ 21.068763] Call trace: [ 21.069796] show_stack+0x20/0x38 (C) [ 21.070171] dump_stack_lvl+0x8c/0xd0 [ 21.070259] print_report+0x118/0x608 [ 21.070310] kasan_report+0xdc/0x128 [ 21.071153] kasan_check_range+0x100/0x1a8 [ 21.071307] __kasan_check_write+0x20/0x30 [ 21.071361] kasan_atomics_helper+0xa6c/0x4858 [ 21.071412] kasan_atomics+0x198/0x2e0 [ 21.072051] kunit_try_run_case+0x170/0x3f0 [ 21.072117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.072218] kthread+0x328/0x630 [ 21.072262] ret_from_fork+0x10/0x20 [ 21.072866] [ 21.072942] Allocated by task 265: [ 21.072976] kasan_save_stack+0x3c/0x68 [ 21.073418] kasan_save_track+0x20/0x40 [ 21.073828] kasan_save_alloc_info+0x40/0x58 [ 21.074407] __kasan_kmalloc+0xd4/0xd8 [ 21.074770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.074876] kasan_atomics+0xb8/0x2e0 [ 21.074972] kunit_try_run_case+0x170/0x3f0 [ 21.075015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.075061] kthread+0x328/0x630 [ 21.075095] ret_from_fork+0x10/0x20 [ 21.075919] [ 21.076053] The buggy address belongs to the object at fff00000c58c1080 [ 21.076053] which belongs to the cache kmalloc-64 of size 64 [ 21.076403] The buggy address is located 0 bytes to the right of [ 21.076403] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.076488] [ 21.076514] The buggy address belongs to the physical page: [ 21.076547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.076604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078157] page_type: f5(slab) [ 21.078296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.079012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.079861] page dumped because: kasan: bad access detected [ 21.080054] [ 21.080076] Memory state around the buggy address: [ 21.080156] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.080220] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.080265] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.080305] ^ [ 21.081373] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081579] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081880] ================================================================== [ 21.227320] ================================================================== [ 21.227418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.227785] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.228419] [ 21.228781] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.228955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.229067] Hardware name: linux,dummy-virt (DT) [ 21.229218] Call trace: [ 21.229310] show_stack+0x20/0x38 (C) [ 21.229643] dump_stack_lvl+0x8c/0xd0 [ 21.229991] print_report+0x118/0x608 [ 21.230165] kasan_report+0xdc/0x128 [ 21.230251] kasan_check_range+0x100/0x1a8 [ 21.230440] __kasan_check_write+0x20/0x30 [ 21.230740] kasan_atomics_helper+0xeb8/0x4858 [ 21.230968] kasan_atomics+0x198/0x2e0 [ 21.231217] kunit_try_run_case+0x170/0x3f0 [ 21.231525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.231722] kthread+0x328/0x630 [ 21.231830] ret_from_fork+0x10/0x20 [ 21.232150] [ 21.232269] Allocated by task 265: [ 21.232345] kasan_save_stack+0x3c/0x68 [ 21.232768] kasan_save_track+0x20/0x40 [ 21.233028] kasan_save_alloc_info+0x40/0x58 [ 21.233401] __kasan_kmalloc+0xd4/0xd8 [ 21.233613] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.233945] kasan_atomics+0xb8/0x2e0 [ 21.234073] kunit_try_run_case+0x170/0x3f0 [ 21.234214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.234269] kthread+0x328/0x630 [ 21.234306] ret_from_fork+0x10/0x20 [ 21.234349] [ 21.234377] The buggy address belongs to the object at fff00000c58c1080 [ 21.234377] which belongs to the cache kmalloc-64 of size 64 [ 21.234450] The buggy address is located 0 bytes to the right of [ 21.234450] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.234541] [ 21.234563] The buggy address belongs to the physical page: [ 21.234606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.234659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.234710] page_type: f5(slab) [ 21.234751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.234803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.234846] page dumped because: kasan: bad access detected [ 21.234878] [ 21.234898] Memory state around the buggy address: [ 21.234946] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235006] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.235059] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.235106] ^ [ 21.235139] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235199] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235240] ================================================================== [ 21.207150] ================================================================== [ 21.207377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.207868] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.208036] [ 21.208106] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.208221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.208250] Hardware name: linux,dummy-virt (DT) [ 21.208665] Call trace: [ 21.208804] show_stack+0x20/0x38 (C) [ 21.209129] dump_stack_lvl+0x8c/0xd0 [ 21.209247] print_report+0x118/0x608 [ 21.209335] kasan_report+0xdc/0x128 [ 21.209475] kasan_check_range+0x100/0x1a8 [ 21.209525] __kasan_check_write+0x20/0x30 [ 21.209908] kasan_atomics_helper+0xe44/0x4858 [ 21.210350] kasan_atomics+0x198/0x2e0 [ 21.210498] kunit_try_run_case+0x170/0x3f0 [ 21.210607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.210687] kthread+0x328/0x630 [ 21.210922] ret_from_fork+0x10/0x20 [ 21.211167] [ 21.211365] Allocated by task 265: [ 21.211464] kasan_save_stack+0x3c/0x68 [ 21.211618] kasan_save_track+0x20/0x40 [ 21.211969] kasan_save_alloc_info+0x40/0x58 [ 21.212207] __kasan_kmalloc+0xd4/0xd8 [ 21.212436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.212681] kasan_atomics+0xb8/0x2e0 [ 21.212844] kunit_try_run_case+0x170/0x3f0 [ 21.213037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.213633] kthread+0x328/0x630 [ 21.213821] ret_from_fork+0x10/0x20 [ 21.214002] [ 21.214060] The buggy address belongs to the object at fff00000c58c1080 [ 21.214060] which belongs to the cache kmalloc-64 of size 64 [ 21.214266] The buggy address is located 0 bytes to the right of [ 21.214266] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.214348] [ 21.214388] The buggy address belongs to the physical page: [ 21.214421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.214483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.214578] page_type: f5(slab) [ 21.214621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.214673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.214730] page dumped because: kasan: bad access detected [ 21.214783] [ 21.214805] Memory state around the buggy address: [ 21.214839] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.214885] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.214937] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.214993] ^ [ 21.215043] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215096] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215137] ================================================================== [ 21.236878] ================================================================== [ 21.237328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.237398] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.237632] [ 21.237677] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.238068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.238270] Hardware name: linux,dummy-virt (DT) [ 21.238311] Call trace: [ 21.238571] show_stack+0x20/0x38 (C) [ 21.238641] dump_stack_lvl+0x8c/0xd0 [ 21.238853] print_report+0x118/0x608 [ 21.239035] kasan_report+0xdc/0x128 [ 21.239272] kasan_check_range+0x100/0x1a8 [ 21.239347] __kasan_check_write+0x20/0x30 [ 21.239547] kasan_atomics_helper+0xf20/0x4858 [ 21.239597] kasan_atomics+0x198/0x2e0 [ 21.239646] kunit_try_run_case+0x170/0x3f0 [ 21.240191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.240523] kthread+0x328/0x630 [ 21.240715] ret_from_fork+0x10/0x20 [ 21.240821] [ 21.240955] Allocated by task 265: [ 21.241060] kasan_save_stack+0x3c/0x68 [ 21.241260] kasan_save_track+0x20/0x40 [ 21.241331] kasan_save_alloc_info+0x40/0x58 [ 21.241448] __kasan_kmalloc+0xd4/0xd8 [ 21.241502] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.241546] kasan_atomics+0xb8/0x2e0 [ 21.241935] kunit_try_run_case+0x170/0x3f0 [ 21.242282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.242439] kthread+0x328/0x630 [ 21.242686] ret_from_fork+0x10/0x20 [ 21.242853] [ 21.243040] The buggy address belongs to the object at fff00000c58c1080 [ 21.243040] which belongs to the cache kmalloc-64 of size 64 [ 21.243239] The buggy address is located 0 bytes to the right of [ 21.243239] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.243311] [ 21.243334] The buggy address belongs to the physical page: [ 21.243615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.243796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.244025] page_type: f5(slab) [ 21.244241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.244301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.244555] page dumped because: kasan: bad access detected [ 21.244751] [ 21.244828] Memory state around the buggy address: [ 21.244890] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.245095] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.245533] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.245954] ^ [ 21.246085] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.246215] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.246382] ================================================================== [ 21.216773] ================================================================== [ 21.216832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.217281] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.217365] [ 21.217400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.217590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.217662] Hardware name: linux,dummy-virt (DT) [ 21.217696] Call trace: [ 21.217721] show_stack+0x20/0x38 (C) [ 21.217773] dump_stack_lvl+0x8c/0xd0 [ 21.218336] print_report+0x118/0x608 [ 21.218495] kasan_report+0xdc/0x128 [ 21.218558] __asan_report_store8_noabort+0x20/0x30 [ 21.218726] kasan_atomics_helper+0x3e5c/0x4858 [ 21.218787] kasan_atomics+0x198/0x2e0 [ 21.218834] kunit_try_run_case+0x170/0x3f0 [ 21.218901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.218956] kthread+0x328/0x630 [ 21.219395] ret_from_fork+0x10/0x20 [ 21.219479] [ 21.219925] Allocated by task 265: [ 21.220118] kasan_save_stack+0x3c/0x68 [ 21.220363] kasan_save_track+0x20/0x40 [ 21.220436] kasan_save_alloc_info+0x40/0x58 [ 21.220477] __kasan_kmalloc+0xd4/0xd8 [ 21.220538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.220905] kasan_atomics+0xb8/0x2e0 [ 21.221157] kunit_try_run_case+0x170/0x3f0 [ 21.221323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.221450] kthread+0x328/0x630 [ 21.221700] ret_from_fork+0x10/0x20 [ 21.221951] [ 21.222172] The buggy address belongs to the object at fff00000c58c1080 [ 21.222172] which belongs to the cache kmalloc-64 of size 64 [ 21.222561] The buggy address is located 0 bytes to the right of [ 21.222561] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.222929] [ 21.222958] The buggy address belongs to the physical page: [ 21.223077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.223339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.223793] page_type: f5(slab) [ 21.223856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.224054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.224234] page dumped because: kasan: bad access detected [ 21.224359] [ 21.224621] Memory state around the buggy address: [ 21.224846] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.224917] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.225123] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.225454] ^ [ 21.225542] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.225643] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.225825] ================================================================== [ 21.249245] ================================================================== [ 21.249358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.249450] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.249796] [ 21.249941] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.250236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.250440] Hardware name: linux,dummy-virt (DT) [ 21.250498] Call trace: [ 21.250601] show_stack+0x20/0x38 (C) [ 21.250666] dump_stack_lvl+0x8c/0xd0 [ 21.250718] print_report+0x118/0x608 [ 21.250774] kasan_report+0xdc/0x128 [ 21.250821] kasan_check_range+0x100/0x1a8 [ 21.251055] __kasan_check_write+0x20/0x30 [ 21.251119] kasan_atomics_helper+0xf88/0x4858 [ 21.251172] kasan_atomics+0x198/0x2e0 [ 21.251219] kunit_try_run_case+0x170/0x3f0 [ 21.251658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.251739] kthread+0x328/0x630 [ 21.251786] ret_from_fork+0x10/0x20 [ 21.251943] [ 21.252229] Allocated by task 265: [ 21.252268] kasan_save_stack+0x3c/0x68 [ 21.252314] kasan_save_track+0x20/0x40 [ 21.252354] kasan_save_alloc_info+0x40/0x58 [ 21.252394] __kasan_kmalloc+0xd4/0xd8 [ 21.252444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.252486] kasan_atomics+0xb8/0x2e0 [ 21.252535] kunit_try_run_case+0x170/0x3f0 [ 21.252586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.252632] kthread+0x328/0x630 [ 21.252665] ret_from_fork+0x10/0x20 [ 21.252704] [ 21.252725] The buggy address belongs to the object at fff00000c58c1080 [ 21.252725] which belongs to the cache kmalloc-64 of size 64 [ 21.252785] The buggy address is located 0 bytes to the right of [ 21.252785] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.252869] [ 21.252911] The buggy address belongs to the physical page: [ 21.252953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.253006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.253067] page_type: f5(slab) [ 21.253108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.253167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.253211] page dumped because: kasan: bad access detected [ 21.253243] [ 21.253279] Memory state around the buggy address: [ 21.253313] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253368] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.253414] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.253464] ^ [ 21.253499] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253552] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253592] ================================================================== [ 21.033271] ================================================================== [ 21.033322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.033374] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.033461] [ 21.033497] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.033582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033611] Hardware name: linux,dummy-virt (DT) [ 21.033644] Call trace: [ 21.033668] show_stack+0x20/0x38 (C) [ 21.033717] dump_stack_lvl+0x8c/0xd0 [ 21.033768] print_report+0x118/0x608 [ 21.033815] kasan_report+0xdc/0x128 [ 21.033863] __asan_report_load4_noabort+0x20/0x30 [ 21.033913] kasan_atomics_helper+0x42d8/0x4858 [ 21.033962] kasan_atomics+0x198/0x2e0 [ 21.034009] kunit_try_run_case+0x170/0x3f0 [ 21.034059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.034113] kthread+0x328/0x630 [ 21.034155] ret_from_fork+0x10/0x20 [ 21.034203] [ 21.034223] Allocated by task 265: [ 21.034253] kasan_save_stack+0x3c/0x68 [ 21.034371] __kasan_kmalloc+0xd4/0xd8 [ 21.038304] The buggy address belongs to the object at fff00000c58c1080 [ 21.038304] which belongs to the cache kmalloc-64 of size 64 [ 21.038470] The buggy address is located 0 bytes to the right of [ 21.038470] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.039861] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.040166] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.042398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.043286] __kasan_check_write+0x20/0x30 [ 21.043511] kunit_try_run_case+0x170/0x3f0 [ 21.043602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.043723] kthread+0x328/0x630 [ 21.043769] ret_from_fork+0x10/0x20 [ 21.044064] [ 21.044179] Allocated by task 265: [ 21.044237] kasan_save_stack+0x3c/0x68 [ 21.044343] kasan_save_track+0x20/0x40 [ 21.044386] kasan_save_alloc_info+0x40/0x58 [ 21.044435] __kasan_kmalloc+0xd4/0xd8 [ 21.044491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.044533] kasan_atomics+0xb8/0x2e0 [ 21.044570] kunit_try_run_case+0x170/0x3f0 [ 21.044611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.044670] kthread+0x328/0x630 [ 21.044705] ret_from_fork+0x10/0x20 [ 21.044743] [ 21.044775] The buggy address belongs to the object at fff00000c58c1080 [ 21.044775] which belongs to the cache kmalloc-64 of size 64 [ 21.044854] The buggy address is located 0 bytes to the right of [ 21.044854] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.044918] [ 21.044946] The buggy address belongs to the physical page: [ 21.044995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.045059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.045110] page_type: f5(slab) [ 21.045178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.045247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.045289] page dumped because: kasan: bad access detected [ 21.045322] [ 21.045343] Memory state around the buggy address: [ 21.045384] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.045453] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.045499] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.045540] ^ [ 21.045591] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.045644] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.045693] ================================================================== [ 21.369077] ================================================================== [ 21.369169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.369224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.369278] [ 21.369375] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.369480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.369524] Hardware name: linux,dummy-virt (DT) [ 21.369785] Call trace: [ 21.369842] show_stack+0x20/0x38 (C) [ 21.369913] dump_stack_lvl+0x8c/0xd0 [ 21.369980] print_report+0x118/0x608 [ 21.370046] kasan_report+0xdc/0x128 [ 21.370269] kasan_check_range+0x100/0x1a8 [ 21.370339] __kasan_check_write+0x20/0x30 [ 21.370461] kasan_atomics_helper+0x16d0/0x4858 [ 21.370515] kasan_atomics+0x198/0x2e0 [ 21.370569] kunit_try_run_case+0x170/0x3f0 [ 21.370672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.370749] kthread+0x328/0x630 [ 21.370794] ret_from_fork+0x10/0x20 [ 21.370889] [ 21.370919] Allocated by task 265: [ 21.370951] kasan_save_stack+0x3c/0x68 [ 21.371000] kasan_save_track+0x20/0x40 [ 21.371234] kasan_save_alloc_info+0x40/0x58 [ 21.371339] __kasan_kmalloc+0xd4/0xd8 [ 21.371442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.371543] kasan_atomics+0xb8/0x2e0 [ 21.371633] kunit_try_run_case+0x170/0x3f0 [ 21.371906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.371998] kthread+0x328/0x630 [ 21.372125] ret_from_fork+0x10/0x20 [ 21.372192] [ 21.372304] The buggy address belongs to the object at fff00000c58c1080 [ 21.372304] which belongs to the cache kmalloc-64 of size 64 [ 21.372373] The buggy address is located 0 bytes to the right of [ 21.372373] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.372452] [ 21.372476] The buggy address belongs to the physical page: [ 21.372509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.372648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.372729] page_type: f5(slab) [ 21.372859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.373130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.373241] page dumped because: kasan: bad access detected [ 21.373322] [ 21.373441] Memory state around the buggy address: [ 21.373515] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.373565] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.373794] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.373912] ^ [ 21.373969] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.374083] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.374172] ================================================================== [ 21.344405] ================================================================== [ 21.344486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.344541] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.344609] [ 21.344805] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.344906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.345131] Hardware name: linux,dummy-virt (DT) [ 21.345170] Call trace: [ 21.345321] show_stack+0x20/0x38 (C) [ 21.345391] dump_stack_lvl+0x8c/0xd0 [ 21.345465] print_report+0x118/0x608 [ 21.345793] kasan_report+0xdc/0x128 [ 21.345875] kasan_check_range+0x100/0x1a8 [ 21.345927] __kasan_check_write+0x20/0x30 [ 21.346076] kasan_atomics_helper+0x15b4/0x4858 [ 21.346128] kasan_atomics+0x198/0x2e0 [ 21.346178] kunit_try_run_case+0x170/0x3f0 [ 21.346225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.346281] kthread+0x328/0x630 [ 21.346324] ret_from_fork+0x10/0x20 [ 21.346589] [ 21.346866] Allocated by task 265: [ 21.346908] kasan_save_stack+0x3c/0x68 [ 21.346963] kasan_save_track+0x20/0x40 [ 21.347013] kasan_save_alloc_info+0x40/0x58 [ 21.347061] __kasan_kmalloc+0xd4/0xd8 [ 21.347199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.347243] kasan_atomics+0xb8/0x2e0 [ 21.347322] kunit_try_run_case+0x170/0x3f0 [ 21.347372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347562] kthread+0x328/0x630 [ 21.347651] ret_from_fork+0x10/0x20 [ 21.347701] [ 21.347729] The buggy address belongs to the object at fff00000c58c1080 [ 21.347729] which belongs to the cache kmalloc-64 of size 64 [ 21.347789] The buggy address is located 0 bytes to the right of [ 21.347789] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.347855] [ 21.347876] The buggy address belongs to the physical page: [ 21.347908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.347961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.348010] page_type: f5(slab) [ 21.348050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.348515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.348600] page dumped because: kasan: bad access detected [ 21.348891] [ 21.349033] Memory state around the buggy address: [ 21.349118] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349171] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.349399] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.349620] ^ [ 21.349693] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349889] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349936] ================================================================== [ 21.177274] ================================================================== [ 21.177329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.177380] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.177660] [ 21.177751] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.177857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.177940] Hardware name: linux,dummy-virt (DT) [ 21.177974] Call trace: [ 21.178014] show_stack+0x20/0x38 (C) [ 21.178075] dump_stack_lvl+0x8c/0xd0 [ 21.178123] print_report+0x118/0x608 [ 21.178335] kasan_report+0xdc/0x128 [ 21.178501] kasan_check_range+0x100/0x1a8 [ 21.178563] __kasan_check_write+0x20/0x30 [ 21.178612] kasan_atomics_helper+0xd3c/0x4858 [ 21.178679] kasan_atomics+0x198/0x2e0 [ 21.178793] kunit_try_run_case+0x170/0x3f0 [ 21.178872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.178930] kthread+0x328/0x630 [ 21.179131] ret_from_fork+0x10/0x20 [ 21.179194] [ 21.179234] Allocated by task 265: [ 21.179274] kasan_save_stack+0x3c/0x68 [ 21.179319] kasan_save_track+0x20/0x40 [ 21.179371] kasan_save_alloc_info+0x40/0x58 [ 21.179497] __kasan_kmalloc+0xd4/0xd8 [ 21.179849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.179952] kasan_atomics+0xb8/0x2e0 [ 21.180022] kunit_try_run_case+0x170/0x3f0 [ 21.180193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.180376] kthread+0x328/0x630 [ 21.180453] ret_from_fork+0x10/0x20 [ 21.180515] [ 21.180635] The buggy address belongs to the object at fff00000c58c1080 [ 21.180635] which belongs to the cache kmalloc-64 of size 64 [ 21.180740] The buggy address is located 0 bytes to the right of [ 21.180740] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.181124] [ 21.181176] The buggy address belongs to the physical page: [ 21.181252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.181307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.181528] page_type: f5(slab) [ 21.181631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.181773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.181852] page dumped because: kasan: bad access detected [ 21.182084] [ 21.182196] Memory state around the buggy address: [ 21.182233] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.182515] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.182685] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.182782] ^ [ 21.183077] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183217] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183260] ================================================================== [ 21.360014] ================================================================== [ 21.360123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.360199] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.360321] [ 21.360378] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.360481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.360583] Hardware name: linux,dummy-virt (DT) [ 21.360643] Call trace: [ 21.360670] show_stack+0x20/0x38 (C) [ 21.360721] dump_stack_lvl+0x8c/0xd0 [ 21.360963] print_report+0x118/0x608 [ 21.361057] kasan_report+0xdc/0x128 [ 21.361117] kasan_check_range+0x100/0x1a8 [ 21.361182] __kasan_check_write+0x20/0x30 [ 21.361247] kasan_atomics_helper+0x1644/0x4858 [ 21.361299] kasan_atomics+0x198/0x2e0 [ 21.361552] kunit_try_run_case+0x170/0x3f0 [ 21.361642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.361745] kthread+0x328/0x630 [ 21.361791] ret_from_fork+0x10/0x20 [ 21.361847] [ 21.361929] Allocated by task 265: [ 21.361969] kasan_save_stack+0x3c/0x68 [ 21.362013] kasan_save_track+0x20/0x40 [ 21.362060] kasan_save_alloc_info+0x40/0x58 [ 21.362117] __kasan_kmalloc+0xd4/0xd8 [ 21.362159] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.362201] kasan_atomics+0xb8/0x2e0 [ 21.362240] kunit_try_run_case+0x170/0x3f0 [ 21.362407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.362504] kthread+0x328/0x630 [ 21.362587] ret_from_fork+0x10/0x20 [ 21.362645] [ 21.362696] The buggy address belongs to the object at fff00000c58c1080 [ 21.362696] which belongs to the cache kmalloc-64 of size 64 [ 21.362899] The buggy address is located 0 bytes to the right of [ 21.362899] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.363013] [ 21.363141] The buggy address belongs to the physical page: [ 21.363197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.363279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.363331] page_type: f5(slab) [ 21.363371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.363434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.363643] page dumped because: kasan: bad access detected [ 21.363800] [ 21.363860] Memory state around the buggy address: [ 21.363906] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364251] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.364340] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.364497] ^ [ 21.364538] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364583] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364624] ================================================================== [ 21.321295] ================================================================== [ 21.321347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.321397] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.321464] [ 21.321495] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.321580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.321608] Hardware name: linux,dummy-virt (DT) [ 21.321640] Call trace: [ 21.321664] show_stack+0x20/0x38 (C) [ 21.321712] dump_stack_lvl+0x8c/0xd0 [ 21.321763] print_report+0x118/0x608 [ 21.321810] kasan_report+0xdc/0x128 [ 21.321858] __asan_report_load8_noabort+0x20/0x30 [ 21.321907] kasan_atomics_helper+0x3f04/0x4858 [ 21.321957] kasan_atomics+0x198/0x2e0 [ 21.322004] kunit_try_run_case+0x170/0x3f0 [ 21.322055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.322120] kthread+0x328/0x630 [ 21.322168] ret_from_fork+0x10/0x20 [ 21.322218] [ 21.322239] Allocated by task 265: [ 21.322278] kasan_save_stack+0x3c/0x68 [ 21.322320] kasan_save_track+0x20/0x40 [ 21.322367] kasan_save_alloc_info+0x40/0x58 [ 21.322406] __kasan_kmalloc+0xd4/0xd8 [ 21.322455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.322496] kasan_atomics+0xb8/0x2e0 [ 21.322533] kunit_try_run_case+0x170/0x3f0 [ 21.322573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.322618] kthread+0x328/0x630 [ 21.322651] ret_from_fork+0x10/0x20 [ 21.322689] [ 21.322710] The buggy address belongs to the object at fff00000c58c1080 [ 21.322710] which belongs to the cache kmalloc-64 of size 64 [ 21.322768] The buggy address is located 0 bytes to the right of [ 21.322768] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.322834] [ 21.322855] The buggy address belongs to the physical page: [ 21.322887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.322939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.322995] page_type: f5(slab) [ 21.323051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.323104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.323210] page dumped because: kasan: bad access detected [ 21.323261] [ 21.323300] Memory state around the buggy address: [ 21.323437] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.323504] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.323547] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.323588] ^ [ 21.323622] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.323666] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.323707] ================================================================== [ 21.285214] ================================================================== [ 21.285269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.285321] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.285841] [ 21.285894] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.285986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.286014] Hardware name: linux,dummy-virt (DT) [ 21.286048] Call trace: [ 21.286124] show_stack+0x20/0x38 (C) [ 21.286178] dump_stack_lvl+0x8c/0xd0 [ 21.286514] print_report+0x118/0x608 [ 21.286611] kasan_report+0xdc/0x128 [ 21.286666] kasan_check_range+0x100/0x1a8 [ 21.287052] __kasan_check_write+0x20/0x30 [ 21.287858] kasan_atomics_helper+0x1128/0x4858 [ 21.289469] kasan_atomics+0x198/0x2e0 [ 21.289530] kunit_try_run_case+0x170/0x3f0 [ 21.289583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.289639] kthread+0x328/0x630 [ 21.289682] ret_from_fork+0x10/0x20 [ 21.289733] [ 21.289754] Allocated by task 265: [ 21.289783] kasan_save_stack+0x3c/0x68 [ 21.289828] kasan_save_track+0x20/0x40 [ 21.289866] kasan_save_alloc_info+0x40/0x58 [ 21.289903] __kasan_kmalloc+0xd4/0xd8 [ 21.289945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.289988] kasan_atomics+0xb8/0x2e0 [ 21.290026] kunit_try_run_case+0x170/0x3f0 [ 21.290066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.290112] kthread+0x328/0x630 [ 21.290147] ret_from_fork+0x10/0x20 [ 21.290185] [ 21.290206] The buggy address belongs to the object at fff00000c58c1080 [ 21.290206] which belongs to the cache kmalloc-64 of size 64 [ 21.290266] The buggy address is located 0 bytes to the right of [ 21.290266] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.290330] [ 21.290354] The buggy address belongs to the physical page: [ 21.290388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.290455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.290506] page_type: f5(slab) [ 21.290548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.290603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.290645] page dumped because: kasan: bad access detected [ 21.290680] [ 21.290699] Memory state around the buggy address: [ 21.290734] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290777] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.290822] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.290861] ^ [ 21.290895] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290939] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290979] ================================================================== [ 21.323904] ================================================================== [ 21.323949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.323998] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.324050] [ 21.324079] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.324195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.324232] Hardware name: linux,dummy-virt (DT) [ 21.324281] Call trace: [ 21.324330] show_stack+0x20/0x38 (C) [ 21.324379] dump_stack_lvl+0x8c/0xd0 [ 21.324475] print_report+0x118/0x608 [ 21.324541] kasan_report+0xdc/0x128 [ 21.324605] kasan_check_range+0x100/0x1a8 [ 21.324656] __kasan_check_write+0x20/0x30 [ 21.324702] kasan_atomics_helper+0x1414/0x4858 [ 21.325007] kasan_atomics+0x198/0x2e0 [ 21.325072] kunit_try_run_case+0x170/0x3f0 [ 21.325139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.325212] kthread+0x328/0x630 [ 21.325271] ret_from_fork+0x10/0x20 [ 21.325349] [ 21.325469] Allocated by task 265: [ 21.325507] kasan_save_stack+0x3c/0x68 [ 21.325565] kasan_save_track+0x20/0x40 [ 21.325608] kasan_save_alloc_info+0x40/0x58 [ 21.325685] __kasan_kmalloc+0xd4/0xd8 [ 21.325783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.325859] kasan_atomics+0xb8/0x2e0 [ 21.325898] kunit_try_run_case+0x170/0x3f0 [ 21.325938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.326150] kthread+0x328/0x630 [ 21.326317] ret_from_fork+0x10/0x20 [ 21.326356] [ 21.326378] The buggy address belongs to the object at fff00000c58c1080 [ 21.326378] which belongs to the cache kmalloc-64 of size 64 [ 21.326469] The buggy address is located 0 bytes to the right of [ 21.326469] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.326554] [ 21.326594] The buggy address belongs to the physical page: [ 21.326798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.326882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.326963] page_type: f5(slab) [ 21.327037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.327110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.327154] page dumped because: kasan: bad access detected [ 21.327204] [ 21.327244] Memory state around the buggy address: [ 21.327277] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.327369] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.327460] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.327501] ^ [ 21.327533] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.327800] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.327841] ================================================================== [ 21.183571] ================================================================== [ 21.183622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.183672] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.183991] [ 21.184086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.184374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.184442] Hardware name: linux,dummy-virt (DT) [ 21.184486] Call trace: [ 21.184510] show_stack+0x20/0x38 (C) [ 21.184570] dump_stack_lvl+0x8c/0xd0 [ 21.184675] print_report+0x118/0x608 [ 21.184727] kasan_report+0xdc/0x128 [ 21.184776] __asan_report_load4_noabort+0x20/0x30 [ 21.184838] kasan_atomics_helper+0x3e04/0x4858 [ 21.184890] kasan_atomics+0x198/0x2e0 [ 21.184942] kunit_try_run_case+0x170/0x3f0 [ 21.184993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185053] kthread+0x328/0x630 [ 21.185097] ret_from_fork+0x10/0x20 [ 21.185156] [ 21.185177] Allocated by task 265: [ 21.185208] kasan_save_stack+0x3c/0x68 [ 21.185251] kasan_save_track+0x20/0x40 [ 21.185300] kasan_save_alloc_info+0x40/0x58 [ 21.185339] __kasan_kmalloc+0xd4/0xd8 [ 21.185386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.185561] kasan_atomics+0xb8/0x2e0 [ 21.185862] kunit_try_run_case+0x170/0x3f0 [ 21.185933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185989] kthread+0x328/0x630 [ 21.186073] ret_from_fork+0x10/0x20 [ 21.186144] [ 21.186183] The buggy address belongs to the object at fff00000c58c1080 [ 21.186183] which belongs to the cache kmalloc-64 of size 64 [ 21.186530] The buggy address is located 0 bytes to the right of [ 21.186530] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.186611] [ 21.186632] The buggy address belongs to the physical page: [ 21.186664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.186717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.186768] page_type: f5(slab) [ 21.186809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.186861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.186903] page dumped because: kasan: bad access detected [ 21.186935] [ 21.186956] Memory state around the buggy address: [ 21.186988] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187032] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187076] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.187117] ^ [ 21.187150] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187194] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187235] ================================================================== [ 21.171686] ================================================================== [ 21.171827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.171883] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.171935] [ 21.171965] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.172307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.172357] Hardware name: linux,dummy-virt (DT) [ 21.172454] Call trace: [ 21.172501] show_stack+0x20/0x38 (C) [ 21.172587] dump_stack_lvl+0x8c/0xd0 [ 21.172857] print_report+0x118/0x608 [ 21.172974] kasan_report+0xdc/0x128 [ 21.173044] __asan_report_load4_noabort+0x20/0x30 [ 21.173097] kasan_atomics_helper+0x3dd8/0x4858 [ 21.173153] kasan_atomics+0x198/0x2e0 [ 21.173265] kunit_try_run_case+0x170/0x3f0 [ 21.173319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.173535] kthread+0x328/0x630 [ 21.173597] ret_from_fork+0x10/0x20 [ 21.173768] [ 21.173796] Allocated by task 265: [ 21.173849] kasan_save_stack+0x3c/0x68 [ 21.173902] kasan_save_track+0x20/0x40 [ 21.174132] kasan_save_alloc_info+0x40/0x58 [ 21.174206] __kasan_kmalloc+0xd4/0xd8 [ 21.174301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.174347] kasan_atomics+0xb8/0x2e0 [ 21.174383] kunit_try_run_case+0x170/0x3f0 [ 21.174437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.174484] kthread+0x328/0x630 [ 21.174517] ret_from_fork+0x10/0x20 [ 21.174786] [ 21.174901] The buggy address belongs to the object at fff00000c58c1080 [ 21.174901] which belongs to the cache kmalloc-64 of size 64 [ 21.174984] The buggy address is located 0 bytes to the right of [ 21.174984] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.175269] [ 21.175304] The buggy address belongs to the physical page: [ 21.175337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.175393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.175604] page_type: f5(slab) [ 21.175738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.175833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.175913] page dumped because: kasan: bad access detected [ 21.176105] [ 21.176145] Memory state around the buggy address: [ 21.176181] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176244] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.176308] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.176489] ^ [ 21.176531] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176578] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176628] ================================================================== [ 21.195040] ================================================================== [ 21.195096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.195438] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.195680] [ 21.195736] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.196440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.196641] Hardware name: linux,dummy-virt (DT) [ 21.196701] Call trace: [ 21.196797] show_stack+0x20/0x38 (C) [ 21.196892] dump_stack_lvl+0x8c/0xd0 [ 21.196978] print_report+0x118/0x608 [ 21.198088] kasan_report+0xdc/0x128 [ 21.198212] __asan_report_load8_noabort+0x20/0x30 [ 21.198314] kasan_atomics_helper+0x3f58/0x4858 [ 21.198405] kasan_atomics+0x198/0x2e0 [ 21.198743] kunit_try_run_case+0x170/0x3f0 [ 21.199396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.199606] kthread+0x328/0x630 [ 21.199824] ret_from_fork+0x10/0x20 [ 21.200037] [ 21.200106] Allocated by task 265: [ 21.200215] kasan_save_stack+0x3c/0x68 [ 21.200265] kasan_save_track+0x20/0x40 [ 21.200471] kasan_save_alloc_info+0x40/0x58 [ 21.200706] __kasan_kmalloc+0xd4/0xd8 [ 21.200770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.201082] kasan_atomics+0xb8/0x2e0 [ 21.201136] kunit_try_run_case+0x170/0x3f0 [ 21.201600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201891] kthread+0x328/0x630 [ 21.201959] ret_from_fork+0x10/0x20 [ 21.202023] [ 21.202160] The buggy address belongs to the object at fff00000c58c1080 [ 21.202160] which belongs to the cache kmalloc-64 of size 64 [ 21.202639] The buggy address is located 0 bytes to the right of [ 21.202639] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.202816] [ 21.202977] The buggy address belongs to the physical page: [ 21.203351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.203650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.203854] page_type: f5(slab) [ 21.203904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.204019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.204193] page dumped because: kasan: bad access detected [ 21.204590] [ 21.204646] Memory state around the buggy address: [ 21.204697] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.204855] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.205143] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.205371] ^ [ 21.205417] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.205677] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.205817] ================================================================== [ 21.309991] ================================================================== [ 21.310044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.310101] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.310602] [ 21.310634] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.310730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.310779] Hardware name: linux,dummy-virt (DT) [ 21.310829] Call trace: [ 21.310854] show_stack+0x20/0x38 (C) [ 21.310939] dump_stack_lvl+0x8c/0xd0 [ 21.311005] print_report+0x118/0x608 [ 21.311072] kasan_report+0xdc/0x128 [ 21.311119] kasan_check_range+0x100/0x1a8 [ 21.311196] __kasan_check_write+0x20/0x30 [ 21.311262] kasan_atomics_helper+0x12d8/0x4858 [ 21.311608] kasan_atomics+0x198/0x2e0 [ 21.311694] kunit_try_run_case+0x170/0x3f0 [ 21.311827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.311915] kthread+0x328/0x630 [ 21.311989] ret_from_fork+0x10/0x20 [ 21.312158] [ 21.312229] Allocated by task 265: [ 21.312258] kasan_save_stack+0x3c/0x68 [ 21.312309] kasan_save_track+0x20/0x40 [ 21.312350] kasan_save_alloc_info+0x40/0x58 [ 21.312388] __kasan_kmalloc+0xd4/0xd8 [ 21.312437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.312730] kasan_atomics+0xb8/0x2e0 [ 21.312768] kunit_try_run_case+0x170/0x3f0 [ 21.312809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.312945] kthread+0x328/0x630 [ 21.313021] ret_from_fork+0x10/0x20 [ 21.313060] [ 21.313082] The buggy address belongs to the object at fff00000c58c1080 [ 21.313082] which belongs to the cache kmalloc-64 of size 64 [ 21.313180] The buggy address is located 0 bytes to the right of [ 21.313180] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.313256] [ 21.313278] The buggy address belongs to the physical page: [ 21.313348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.313443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.313662] page_type: f5(slab) [ 21.313840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.313958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.314035] page dumped because: kasan: bad access detected [ 21.314166] [ 21.314189] Memory state around the buggy address: [ 21.314220] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314264] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.314365] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.314571] ^ [ 21.314772] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314827] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314867] ================================================================== [ 21.328274] ================================================================== [ 21.328402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.328474] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.328525] [ 21.328573] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.328780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.328845] Hardware name: linux,dummy-virt (DT) [ 21.328885] Call trace: [ 21.328924] show_stack+0x20/0x38 (C) [ 21.329016] dump_stack_lvl+0x8c/0xd0 [ 21.329093] print_report+0x118/0x608 [ 21.329160] kasan_report+0xdc/0x128 [ 21.329216] kasan_check_range+0x100/0x1a8 [ 21.329344] __kasan_check_write+0x20/0x30 [ 21.329411] kasan_atomics_helper+0x147c/0x4858 [ 21.329471] kasan_atomics+0x198/0x2e0 [ 21.329518] kunit_try_run_case+0x170/0x3f0 [ 21.329720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.329785] kthread+0x328/0x630 [ 21.329866] ret_from_fork+0x10/0x20 [ 21.329947] [ 21.329986] Allocated by task 265: [ 21.330022] kasan_save_stack+0x3c/0x68 [ 21.330082] kasan_save_track+0x20/0x40 [ 21.330130] kasan_save_alloc_info+0x40/0x58 [ 21.330169] __kasan_kmalloc+0xd4/0xd8 [ 21.330447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.330489] kasan_atomics+0xb8/0x2e0 [ 21.330527] kunit_try_run_case+0x170/0x3f0 [ 21.330574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.330647] kthread+0x328/0x630 [ 21.330698] ret_from_fork+0x10/0x20 [ 21.330827] [ 21.330876] The buggy address belongs to the object at fff00000c58c1080 [ 21.330876] which belongs to the cache kmalloc-64 of size 64 [ 21.330951] The buggy address is located 0 bytes to the right of [ 21.330951] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.331017] [ 21.331038] The buggy address belongs to the physical page: [ 21.331151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.331204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.331280] page_type: f5(slab) [ 21.331336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.331481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.331575] page dumped because: kasan: bad access detected [ 21.331610] [ 21.331630] Memory state around the buggy address: [ 21.331661] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.331705] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.331749] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.331789] ^ [ 21.331822] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.332337] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.332412] ================================================================== [ 21.350736] ================================================================== [ 21.350789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.350841] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.351108] [ 21.351164] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.351445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.351648] Hardware name: linux,dummy-virt (DT) [ 21.351727] Call trace: [ 21.351788] show_stack+0x20/0x38 (C) [ 21.352065] dump_stack_lvl+0x8c/0xd0 [ 21.352282] print_report+0x118/0x608 [ 21.352383] kasan_report+0xdc/0x128 [ 21.353015] __asan_report_load8_noabort+0x20/0x30 [ 21.353259] kasan_atomics_helper+0x3db0/0x4858 [ 21.353340] kasan_atomics+0x198/0x2e0 [ 21.353717] kunit_try_run_case+0x170/0x3f0 [ 21.353820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.353965] kthread+0x328/0x630 [ 21.354075] ret_from_fork+0x10/0x20 [ 21.354289] [ 21.354350] Allocated by task 265: [ 21.354406] kasan_save_stack+0x3c/0x68 [ 21.354749] kasan_save_track+0x20/0x40 [ 21.354837] kasan_save_alloc_info+0x40/0x58 [ 21.355343] __kasan_kmalloc+0xd4/0xd8 [ 21.355587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.355694] kasan_atomics+0xb8/0x2e0 [ 21.355761] kunit_try_run_case+0x170/0x3f0 [ 21.356170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.356301] kthread+0x328/0x630 [ 21.356383] ret_from_fork+0x10/0x20 [ 21.356505] [ 21.356558] The buggy address belongs to the object at fff00000c58c1080 [ 21.356558] which belongs to the cache kmalloc-64 of size 64 [ 21.356859] The buggy address is located 0 bytes to the right of [ 21.356859] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.357027] [ 21.357097] The buggy address belongs to the physical page: [ 21.357132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.357391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.357528] page_type: f5(slab) [ 21.357571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.357624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.357695] page dumped because: kasan: bad access detected [ 21.357755] [ 21.357776] Memory state around the buggy address: [ 21.357823] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.357868] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.357913] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.357969] ^ [ 21.358006] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.358060] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.358109] ================================================================== [ 21.374753] ================================================================== [ 21.374831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.374926] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.375005] [ 21.375042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.375273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.375331] Hardware name: linux,dummy-virt (DT) [ 21.375366] Call trace: [ 21.375412] show_stack+0x20/0x38 (C) [ 21.375546] dump_stack_lvl+0x8c/0xd0 [ 21.375643] print_report+0x118/0x608 [ 21.375781] kasan_report+0xdc/0x128 [ 21.375942] __asan_report_load8_noabort+0x20/0x30 [ 21.376001] kasan_atomics_helper+0x3e10/0x4858 [ 21.376053] kasan_atomics+0x198/0x2e0 [ 21.376108] kunit_try_run_case+0x170/0x3f0 [ 21.376158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.376294] kthread+0x328/0x630 [ 21.376383] ret_from_fork+0x10/0x20 [ 21.376519] [ 21.376541] Allocated by task 265: [ 21.376581] kasan_save_stack+0x3c/0x68 [ 21.376665] kasan_save_track+0x20/0x40 [ 21.376713] kasan_save_alloc_info+0x40/0x58 [ 21.376750] __kasan_kmalloc+0xd4/0xd8 [ 21.376798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.376847] kasan_atomics+0xb8/0x2e0 [ 21.376884] kunit_try_run_case+0x170/0x3f0 [ 21.376932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.376982] kthread+0x328/0x630 [ 21.377018] ret_from_fork+0x10/0x20 [ 21.377064] [ 21.377085] The buggy address belongs to the object at fff00000c58c1080 [ 21.377085] which belongs to the cache kmalloc-64 of size 64 [ 21.377144] The buggy address is located 0 bytes to the right of [ 21.377144] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.377218] [ 21.377239] The buggy address belongs to the physical page: [ 21.377273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.377328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.377379] page_type: f5(slab) [ 21.377444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.377497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.377540] page dumped because: kasan: bad access detected [ 21.377590] [ 21.377610] Memory state around the buggy address: [ 21.377643] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.377698] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.377751] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.377790] ^ [ 21.377833] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.377878] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.377918] ================================================================== [ 21.187982] ================================================================== [ 21.188036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.188086] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.188138] [ 21.188752] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.189033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.189200] Hardware name: linux,dummy-virt (DT) [ 21.189268] Call trace: [ 21.189318] show_stack+0x20/0x38 (C) [ 21.189473] dump_stack_lvl+0x8c/0xd0 [ 21.190125] print_report+0x118/0x608 [ 21.190347] kasan_report+0xdc/0x128 [ 21.190503] kasan_check_range+0x100/0x1a8 [ 21.190633] __kasan_check_read+0x20/0x30 [ 21.190811] kasan_atomics_helper+0xdd4/0x4858 [ 21.190865] kasan_atomics+0x198/0x2e0 [ 21.191143] kunit_try_run_case+0x170/0x3f0 [ 21.191482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191764] kthread+0x328/0x630 [ 21.191810] ret_from_fork+0x10/0x20 [ 21.191862] [ 21.191883] Allocated by task 265: [ 21.192282] kasan_save_stack+0x3c/0x68 [ 21.192355] kasan_save_track+0x20/0x40 [ 21.192396] kasan_save_alloc_info+0x40/0x58 [ 21.192443] __kasan_kmalloc+0xd4/0xd8 [ 21.192483] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.192524] kasan_atomics+0xb8/0x2e0 [ 21.192561] kunit_try_run_case+0x170/0x3f0 [ 21.192609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192655] kthread+0x328/0x630 [ 21.192701] ret_from_fork+0x10/0x20 [ 21.192739] [ 21.192762] The buggy address belongs to the object at fff00000c58c1080 [ 21.192762] which belongs to the cache kmalloc-64 of size 64 [ 21.192829] The buggy address is located 0 bytes to the right of [ 21.192829] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.192909] [ 21.192932] The buggy address belongs to the physical page: [ 21.192964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.193025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.193076] page_type: f5(slab) [ 21.193116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.193174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.193216] page dumped because: kasan: bad access detected [ 21.193250] [ 21.193272] Memory state around the buggy address: [ 21.193306] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193365] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.193410] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.193460] ^ [ 21.193504] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193561] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193611] ================================================================== [ 21.297340] ================================================================== [ 21.297512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.297578] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.297632] [ 21.297667] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.297755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.297782] Hardware name: linux,dummy-virt (DT) [ 21.297816] Call trace: [ 21.297839] show_stack+0x20/0x38 (C) [ 21.297891] dump_stack_lvl+0x8c/0xd0 [ 21.297942] print_report+0x118/0x608 [ 21.297989] kasan_report+0xdc/0x128 [ 21.298094] kasan_check_range+0x100/0x1a8 [ 21.298153] __kasan_check_write+0x20/0x30 [ 21.298238] kasan_atomics_helper+0x1190/0x4858 [ 21.298288] kasan_atomics+0x198/0x2e0 [ 21.298335] kunit_try_run_case+0x170/0x3f0 [ 21.298384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.298462] kthread+0x328/0x630 [ 21.298507] ret_from_fork+0x10/0x20 [ 21.298556] [ 21.298576] Allocated by task 265: [ 21.298608] kasan_save_stack+0x3c/0x68 [ 21.298650] kasan_save_track+0x20/0x40 [ 21.298688] kasan_save_alloc_info+0x40/0x58 [ 21.298728] __kasan_kmalloc+0xd4/0xd8 [ 21.298767] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.298808] kasan_atomics+0xb8/0x2e0 [ 21.298846] kunit_try_run_case+0x170/0x3f0 [ 21.298896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.298943] kthread+0x328/0x630 [ 21.298978] ret_from_fork+0x10/0x20 [ 21.299015] [ 21.299038] The buggy address belongs to the object at fff00000c58c1080 [ 21.299038] which belongs to the cache kmalloc-64 of size 64 [ 21.299105] The buggy address is located 0 bytes to the right of [ 21.299105] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.299171] [ 21.299193] The buggy address belongs to the physical page: [ 21.299233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.299286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.299347] page_type: f5(slab) [ 21.299396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.299473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.299516] page dumped because: kasan: bad access detected [ 21.299552] [ 21.299574] Memory state around the buggy address: [ 21.299608] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299653] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.299696] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.299736] ^ [ 21.299771] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299815] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299855] ================================================================== [ 21.047040] ================================================================== [ 21.047250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.047353] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.047673] [ 21.047732] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.047870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.047912] Hardware name: linux,dummy-virt (DT) [ 21.047945] Call trace: [ 21.047971] show_stack+0x20/0x38 (C) [ 21.048031] dump_stack_lvl+0x8c/0xd0 [ 21.048324] print_report+0x118/0x608 [ 21.048478] kasan_report+0xdc/0x128 [ 21.048623] kasan_check_range+0x100/0x1a8 [ 21.048732] __kasan_check_write+0x20/0x30 [ 21.049017] kasan_atomics_helper+0x99c/0x4858 [ 21.049151] kasan_atomics+0x198/0x2e0 [ 21.049248] kunit_try_run_case+0x170/0x3f0 [ 21.049380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049490] kthread+0x328/0x630 [ 21.049666] ret_from_fork+0x10/0x20 [ 21.049724] [ 21.049777] Allocated by task 265: [ 21.049849] kasan_save_stack+0x3c/0x68 [ 21.050005] kasan_save_track+0x20/0x40 [ 21.050070] kasan_save_alloc_info+0x40/0x58 [ 21.050133] __kasan_kmalloc+0xd4/0xd8 [ 21.050401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.050520] kasan_atomics+0xb8/0x2e0 [ 21.050634] kunit_try_run_case+0x170/0x3f0 [ 21.050758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.050805] kthread+0x328/0x630 [ 21.051066] ret_from_fork+0x10/0x20 [ 21.051188] [ 21.051237] The buggy address belongs to the object at fff00000c58c1080 [ 21.051237] which belongs to the cache kmalloc-64 of size 64 [ 21.051366] The buggy address is located 0 bytes to the right of [ 21.051366] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.051468] [ 21.051712] The buggy address belongs to the physical page: [ 21.051845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.051930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.052048] page_type: f5(slab) [ 21.052133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.052233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.052445] page dumped because: kasan: bad access detected [ 21.052615] [ 21.052664] Memory state around the buggy address: [ 21.052755] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052875] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.052941] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.053176] ^ [ 21.053264] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053442] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053601] ================================================================== [ 21.254806] ================================================================== [ 21.254861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.254913] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.255227] [ 21.255273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.255371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.255574] Hardware name: linux,dummy-virt (DT) [ 21.255705] Call trace: [ 21.255739] show_stack+0x20/0x38 (C) [ 21.256131] dump_stack_lvl+0x8c/0xd0 [ 21.256310] print_report+0x118/0x608 [ 21.256631] kasan_report+0xdc/0x128 [ 21.256778] kasan_check_range+0x100/0x1a8 [ 21.257002] __kasan_check_write+0x20/0x30 [ 21.257054] kasan_atomics_helper+0xff0/0x4858 [ 21.257511] kasan_atomics+0x198/0x2e0 [ 21.258078] kunit_try_run_case+0x170/0x3f0 [ 21.258431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.258578] kthread+0x328/0x630 [ 21.258663] ret_from_fork+0x10/0x20 [ 21.259107] [ 21.259173] Allocated by task 265: [ 21.259721] kasan_save_stack+0x3c/0x68 [ 21.259906] kasan_save_track+0x20/0x40 [ 21.259955] kasan_save_alloc_info+0x40/0x58 [ 21.260150] __kasan_kmalloc+0xd4/0xd8 [ 21.260389] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.260849] kasan_atomics+0xb8/0x2e0 [ 21.260905] kunit_try_run_case+0x170/0x3f0 [ 21.260973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.261320] kthread+0x328/0x630 [ 21.261391] ret_from_fork+0x10/0x20 [ 21.261588] [ 21.261700] The buggy address belongs to the object at fff00000c58c1080 [ 21.261700] which belongs to the cache kmalloc-64 of size 64 [ 21.261765] The buggy address is located 0 bytes to the right of [ 21.261765] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.262384] [ 21.262455] The buggy address belongs to the physical page: [ 21.262506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.262777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.263129] page_type: f5(slab) [ 21.263204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.263420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.263483] page dumped because: kasan: bad access detected [ 21.263519] [ 21.263539] Memory state around the buggy address: [ 21.264083] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264408] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.264574] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.264651] ^ [ 21.264884] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.265212] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.265309] ================================================================== [ 21.303376] ================================================================== [ 21.303568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.303648] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.303753] [ 21.303886] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.304014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.304334] Hardware name: linux,dummy-virt (DT) [ 21.304402] Call trace: [ 21.304490] show_stack+0x20/0x38 (C) [ 21.304590] dump_stack_lvl+0x8c/0xd0 [ 21.304726] print_report+0x118/0x608 [ 21.304838] kasan_report+0xdc/0x128 [ 21.304986] kasan_check_range+0x100/0x1a8 [ 21.305096] __kasan_check_write+0x20/0x30 [ 21.305180] kasan_atomics_helper+0x126c/0x4858 [ 21.305291] kasan_atomics+0x198/0x2e0 [ 21.305366] kunit_try_run_case+0x170/0x3f0 [ 21.305417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.305741] kthread+0x328/0x630 [ 21.305784] ret_from_fork+0x10/0x20 [ 21.305834] [ 21.305934] Allocated by task 265: [ 21.305997] kasan_save_stack+0x3c/0x68 [ 21.306159] kasan_save_track+0x20/0x40 [ 21.306229] kasan_save_alloc_info+0x40/0x58 [ 21.306343] __kasan_kmalloc+0xd4/0xd8 [ 21.306663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.306740] kasan_atomics+0xb8/0x2e0 [ 21.306808] kunit_try_run_case+0x170/0x3f0 [ 21.306851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.307160] kthread+0x328/0x630 [ 21.307208] ret_from_fork+0x10/0x20 [ 21.307278] [ 21.307405] The buggy address belongs to the object at fff00000c58c1080 [ 21.307405] which belongs to the cache kmalloc-64 of size 64 [ 21.307496] The buggy address is located 0 bytes to the right of [ 21.307496] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.307599] [ 21.307866] The buggy address belongs to the physical page: [ 21.307960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.308073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.308170] page_type: f5(slab) [ 21.308232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.308332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.308374] page dumped because: kasan: bad access detected [ 21.308409] [ 21.308752] Memory state around the buggy address: [ 21.308784] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.308833] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.308875] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.308915] ^ [ 21.308974] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.309054] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.309226] ================================================================== [ 21.338959] ================================================================== [ 21.339218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.339418] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.339530] [ 21.339600] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.339770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.339798] Hardware name: linux,dummy-virt (DT) [ 21.339918] Call trace: [ 21.339958] show_stack+0x20/0x38 (C) [ 21.340159] dump_stack_lvl+0x8c/0xd0 [ 21.340240] print_report+0x118/0x608 [ 21.340411] kasan_report+0xdc/0x128 [ 21.340498] kasan_check_range+0x100/0x1a8 [ 21.340601] __kasan_check_write+0x20/0x30 [ 21.340840] kasan_atomics_helper+0x154c/0x4858 [ 21.341056] kasan_atomics+0x198/0x2e0 [ 21.341143] kunit_try_run_case+0x170/0x3f0 [ 21.341364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.341445] kthread+0x328/0x630 [ 21.341687] ret_from_fork+0x10/0x20 [ 21.341907] [ 21.341939] Allocated by task 265: [ 21.341978] kasan_save_stack+0x3c/0x68 [ 21.342023] kasan_save_track+0x20/0x40 [ 21.342064] kasan_save_alloc_info+0x40/0x58 [ 21.342105] __kasan_kmalloc+0xd4/0xd8 [ 21.342151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.342192] kasan_atomics+0xb8/0x2e0 [ 21.342241] kunit_try_run_case+0x170/0x3f0 [ 21.342283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.342330] kthread+0x328/0x630 [ 21.342363] ret_from_fork+0x10/0x20 [ 21.342401] [ 21.342434] The buggy address belongs to the object at fff00000c58c1080 [ 21.342434] which belongs to the cache kmalloc-64 of size 64 [ 21.342494] The buggy address is located 0 bytes to the right of [ 21.342494] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.342570] [ 21.342596] The buggy address belongs to the physical page: [ 21.342642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.342694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.342752] page_type: f5(slab) [ 21.342800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.342853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.342895] page dumped because: kasan: bad access detected [ 21.342929] [ 21.342949] Memory state around the buggy address: [ 21.342981] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343034] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.343078] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.343126] ^ [ 21.343159] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343203] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343249] ================================================================== [ 21.300051] ================================================================== [ 21.300098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.300146] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.300249] [ 21.300291] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.300375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.300404] Hardware name: linux,dummy-virt (DT) [ 21.300473] Call trace: [ 21.300499] show_stack+0x20/0x38 (C) [ 21.300548] dump_stack_lvl+0x8c/0xd0 [ 21.300596] print_report+0x118/0x608 [ 21.300644] kasan_report+0xdc/0x128 [ 21.300691] kasan_check_range+0x100/0x1a8 [ 21.300741] __kasan_check_write+0x20/0x30 [ 21.300786] kasan_atomics_helper+0x11f8/0x4858 [ 21.300842] kasan_atomics+0x198/0x2e0 [ 21.300887] kunit_try_run_case+0x170/0x3f0 [ 21.300936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.300990] kthread+0x328/0x630 [ 21.301032] ret_from_fork+0x10/0x20 [ 21.301087] [ 21.301119] Allocated by task 265: [ 21.301168] kasan_save_stack+0x3c/0x68 [ 21.301215] kasan_save_track+0x20/0x40 [ 21.301291] kasan_save_alloc_info+0x40/0x58 [ 21.301348] __kasan_kmalloc+0xd4/0xd8 [ 21.301395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.301447] kasan_atomics+0xb8/0x2e0 [ 21.301488] kunit_try_run_case+0x170/0x3f0 [ 21.301536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.301601] kthread+0x328/0x630 [ 21.301645] ret_from_fork+0x10/0x20 [ 21.301903] [ 21.301932] The buggy address belongs to the object at fff00000c58c1080 [ 21.301932] which belongs to the cache kmalloc-64 of size 64 [ 21.301990] The buggy address is located 0 bytes to the right of [ 21.301990] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.302057] [ 21.302303] The buggy address belongs to the physical page: [ 21.302365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.302417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.302477] page_type: f5(slab) [ 21.302531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.302603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.302662] page dumped because: kasan: bad access detected [ 21.302697] [ 21.302735] Memory state around the buggy address: [ 21.302767] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.302810] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.303079] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.303137] ^ [ 21.303172] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.303216] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.303256] ================================================================== [ 21.333082] ================================================================== [ 21.333189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.333264] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.333505] [ 21.333541] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.333630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.333658] Hardware name: linux,dummy-virt (DT) [ 21.333690] Call trace: [ 21.333715] show_stack+0x20/0x38 (C) [ 21.333779] dump_stack_lvl+0x8c/0xd0 [ 21.333831] print_report+0x118/0x608 [ 21.333878] kasan_report+0xdc/0x128 [ 21.333926] kasan_check_range+0x100/0x1a8 [ 21.333975] __kasan_check_write+0x20/0x30 [ 21.334022] kasan_atomics_helper+0x14e4/0x4858 [ 21.334071] kasan_atomics+0x198/0x2e0 [ 21.334118] kunit_try_run_case+0x170/0x3f0 [ 21.334165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.334219] kthread+0x328/0x630 [ 21.334263] ret_from_fork+0x10/0x20 [ 21.334324] [ 21.334352] Allocated by task 265: [ 21.334381] kasan_save_stack+0x3c/0x68 [ 21.334435] kasan_save_track+0x20/0x40 [ 21.334862] kasan_save_alloc_info+0x40/0x58 [ 21.334909] __kasan_kmalloc+0xd4/0xd8 [ 21.334957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.335015] kasan_atomics+0xb8/0x2e0 [ 21.335124] kunit_try_run_case+0x170/0x3f0 [ 21.335173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.335240] kthread+0x328/0x630 [ 21.335291] ret_from_fork+0x10/0x20 [ 21.335437] [ 21.335493] The buggy address belongs to the object at fff00000c58c1080 [ 21.335493] which belongs to the cache kmalloc-64 of size 64 [ 21.335586] The buggy address is located 0 bytes to the right of [ 21.335586] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.335655] [ 21.335676] The buggy address belongs to the physical page: [ 21.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.335762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.335810] page_type: f5(slab) [ 21.335850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.335902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.336384] page dumped because: kasan: bad access detected [ 21.336464] [ 21.336535] Memory state around the buggy address: [ 21.336855] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337017] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.337064] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.337164] ^ [ 21.337590] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337679] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337761] ================================================================== [ 21.315126] ================================================================== [ 21.315176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.315224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.315275] [ 21.315306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.315883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.315996] Hardware name: linux,dummy-virt (DT) [ 21.316065] Call trace: [ 21.316101] show_stack+0x20/0x38 (C) [ 21.316170] dump_stack_lvl+0x8c/0xd0 [ 21.316257] print_report+0x118/0x608 [ 21.316307] kasan_report+0xdc/0x128 [ 21.316363] kasan_check_range+0x100/0x1a8 [ 21.316489] __kasan_check_write+0x20/0x30 [ 21.316575] kasan_atomics_helper+0x1384/0x4858 [ 21.316691] kasan_atomics+0x198/0x2e0 [ 21.316737] kunit_try_run_case+0x170/0x3f0 [ 21.316787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.316847] kthread+0x328/0x630 [ 21.317093] ret_from_fork+0x10/0x20 [ 21.317261] [ 21.317341] Allocated by task 265: [ 21.317445] kasan_save_stack+0x3c/0x68 [ 21.317594] kasan_save_track+0x20/0x40 [ 21.317699] kasan_save_alloc_info+0x40/0x58 [ 21.317991] __kasan_kmalloc+0xd4/0xd8 [ 21.318114] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.318155] kasan_atomics+0xb8/0x2e0 [ 21.318415] kunit_try_run_case+0x170/0x3f0 [ 21.318491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.318588] kthread+0x328/0x630 [ 21.318646] ret_from_fork+0x10/0x20 [ 21.318814] [ 21.318883] The buggy address belongs to the object at fff00000c58c1080 [ 21.318883] which belongs to the cache kmalloc-64 of size 64 [ 21.318987] The buggy address is located 0 bytes to the right of [ 21.318987] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.319269] [ 21.319390] The buggy address belongs to the physical page: [ 21.319453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.319556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.319640] page_type: f5(slab) [ 21.319750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.319802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.319844] page dumped because: kasan: bad access detected [ 21.319878] [ 21.319898] Memory state around the buggy address: [ 21.319929] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320130] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.320320] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.320442] ^ [ 21.320533] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320660] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320750] ================================================================== [ 21.384869] ================================================================== [ 21.385083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.385254] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.385319] [ 21.385376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.385560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.385609] Hardware name: linux,dummy-virt (DT) [ 21.385668] Call trace: [ 21.385836] show_stack+0x20/0x38 (C) [ 21.385904] dump_stack_lvl+0x8c/0xd0 [ 21.385993] print_report+0x118/0x608 [ 21.386075] kasan_report+0xdc/0x128 [ 21.386141] __asan_report_load8_noabort+0x20/0x30 [ 21.386339] kasan_atomics_helper+0x3e20/0x4858 [ 21.386405] kasan_atomics+0x198/0x2e0 [ 21.386543] kunit_try_run_case+0x170/0x3f0 [ 21.386596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.386726] kthread+0x328/0x630 [ 21.386804] ret_from_fork+0x10/0x20 [ 21.386871] [ 21.386909] Allocated by task 265: [ 21.387087] kasan_save_stack+0x3c/0x68 [ 21.387144] kasan_save_track+0x20/0x40 [ 21.387233] kasan_save_alloc_info+0x40/0x58 [ 21.387291] __kasan_kmalloc+0xd4/0xd8 [ 21.387338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.387443] kasan_atomics+0xb8/0x2e0 [ 21.387534] kunit_try_run_case+0x170/0x3f0 [ 21.387753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.387816] kthread+0x328/0x630 [ 21.387851] ret_from_fork+0x10/0x20 [ 21.387889] [ 21.387917] The buggy address belongs to the object at fff00000c58c1080 [ 21.387917] which belongs to the cache kmalloc-64 of size 64 [ 21.387979] The buggy address is located 0 bytes to the right of [ 21.387979] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.388045] [ 21.388167] The buggy address belongs to the physical page: [ 21.388231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.388361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.388524] page_type: f5(slab) [ 21.388614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.388886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.388992] page dumped because: kasan: bad access detected [ 21.389071] [ 21.389092] Memory state around the buggy address: [ 21.389127] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.389486] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.389583] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.389798] ^ [ 21.389903] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.389970] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.390107] ================================================================== [ 21.390822] ================================================================== [ 21.390875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.390973] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.391028] [ 21.391076] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.391227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.391275] Hardware name: linux,dummy-virt (DT) [ 21.391310] Call trace: [ 21.391349] show_stack+0x20/0x38 (C) [ 21.391563] dump_stack_lvl+0x8c/0xd0 [ 21.391631] print_report+0x118/0x608 [ 21.391680] kasan_report+0xdc/0x128 [ 21.391728] kasan_check_range+0x100/0x1a8 [ 21.391777] __kasan_check_write+0x20/0x30 [ 21.391960] kasan_atomics_helper+0x17ec/0x4858 [ 21.392018] kasan_atomics+0x198/0x2e0 [ 21.392076] kunit_try_run_case+0x170/0x3f0 [ 21.392124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.392190] kthread+0x328/0x630 [ 21.392244] ret_from_fork+0x10/0x20 [ 21.392298] [ 21.392329] Allocated by task 265: [ 21.392368] kasan_save_stack+0x3c/0x68 [ 21.392410] kasan_save_track+0x20/0x40 [ 21.392611] kasan_save_alloc_info+0x40/0x58 [ 21.392651] __kasan_kmalloc+0xd4/0xd8 [ 21.392689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.392738] kasan_atomics+0xb8/0x2e0 [ 21.392886] kunit_try_run_case+0x170/0x3f0 [ 21.392964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.393147] kthread+0x328/0x630 [ 21.393234] ret_from_fork+0x10/0x20 [ 21.393410] [ 21.393445] The buggy address belongs to the object at fff00000c58c1080 [ 21.393445] which belongs to the cache kmalloc-64 of size 64 [ 21.393610] The buggy address is located 0 bytes to the right of [ 21.393610] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.393732] [ 21.393866] The buggy address belongs to the physical page: [ 21.393901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.393955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.394255] page_type: f5(slab) [ 21.394330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.394453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.394534] page dumped because: kasan: bad access detected [ 21.394813] [ 21.394880] Memory state around the buggy address: [ 21.394985] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.395046] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.395089] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.395371] ^ [ 21.395502] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.395589] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.395862] ================================================================== [ 21.276737] ================================================================== [ 21.277177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.277249] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.277301] [ 21.277442] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.277877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.278119] Hardware name: linux,dummy-virt (DT) [ 21.278167] Call trace: [ 21.278211] show_stack+0x20/0x38 (C) [ 21.278405] dump_stack_lvl+0x8c/0xd0 [ 21.278495] print_report+0x118/0x608 [ 21.278912] kasan_report+0xdc/0x128 [ 21.279061] kasan_check_range+0x100/0x1a8 [ 21.279116] __kasan_check_write+0x20/0x30 [ 21.279193] kasan_atomics_helper+0x10c0/0x4858 [ 21.279316] kasan_atomics+0x198/0x2e0 [ 21.279520] kunit_try_run_case+0x170/0x3f0 [ 21.279719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.280054] kthread+0x328/0x630 [ 21.280219] ret_from_fork+0x10/0x20 [ 21.280474] [ 21.280542] Allocated by task 265: [ 21.280686] kasan_save_stack+0x3c/0x68 [ 21.280781] kasan_save_track+0x20/0x40 [ 21.280825] kasan_save_alloc_info+0x40/0x58 [ 21.280898] __kasan_kmalloc+0xd4/0xd8 [ 21.281274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.281353] kasan_atomics+0xb8/0x2e0 [ 21.281581] kunit_try_run_case+0x170/0x3f0 [ 21.281634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.281680] kthread+0x328/0x630 [ 21.281870] ret_from_fork+0x10/0x20 [ 21.281924] [ 21.281964] The buggy address belongs to the object at fff00000c58c1080 [ 21.281964] which belongs to the cache kmalloc-64 of size 64 [ 21.282031] The buggy address is located 0 bytes to the right of [ 21.282031] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.282098] [ 21.282123] The buggy address belongs to the physical page: [ 21.282157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.282230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.282281] page_type: f5(slab) [ 21.282322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.282384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.282436] page dumped because: kasan: bad access detected [ 21.282496] [ 21.282544] Memory state around the buggy address: [ 21.282844] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283255] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.283322] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.283445] ^ [ 21.283625] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.284166] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.284334] ================================================================== [ 21.266858] ================================================================== [ 21.267120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.267214] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.267276] [ 21.267380] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.267493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267869] Hardware name: linux,dummy-virt (DT) [ 21.268001] Call trace: [ 21.268195] show_stack+0x20/0x38 (C) [ 21.268300] dump_stack_lvl+0x8c/0xd0 [ 21.268400] print_report+0x118/0x608 [ 21.268568] kasan_report+0xdc/0x128 [ 21.268623] kasan_check_range+0x100/0x1a8 [ 21.268696] __kasan_check_write+0x20/0x30 [ 21.268744] kasan_atomics_helper+0x1058/0x4858 [ 21.268968] kasan_atomics+0x198/0x2e0 [ 21.269298] kunit_try_run_case+0x170/0x3f0 [ 21.269572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.269714] kthread+0x328/0x630 [ 21.269811] ret_from_fork+0x10/0x20 [ 21.269964] [ 21.270080] Allocated by task 265: [ 21.270125] kasan_save_stack+0x3c/0x68 [ 21.270170] kasan_save_track+0x20/0x40 [ 21.270390] kasan_save_alloc_info+0x40/0x58 [ 21.270583] __kasan_kmalloc+0xd4/0xd8 [ 21.270911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.271026] kasan_atomics+0xb8/0x2e0 [ 21.271087] kunit_try_run_case+0x170/0x3f0 [ 21.271174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.271463] kthread+0x328/0x630 [ 21.271632] ret_from_fork+0x10/0x20 [ 21.271819] [ 21.271889] The buggy address belongs to the object at fff00000c58c1080 [ 21.271889] which belongs to the cache kmalloc-64 of size 64 [ 21.272157] The buggy address is located 0 bytes to the right of [ 21.272157] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.272379] [ 21.272504] The buggy address belongs to the physical page: [ 21.272776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.273135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.273482] page_type: f5(slab) [ 21.273759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.273827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.273872] page dumped because: kasan: bad access detected [ 21.273909] [ 21.273964] Memory state around the buggy address: [ 21.274009] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.274065] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.274110] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.274151] ^ [ 21.274185] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.274238] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.274288] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
Automatically assigned
[ 20.749832] ================================================================== [ 20.749888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.750021] Read of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261 [ 20.750185] [ 20.750281] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.750402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.750458] Hardware name: linux,dummy-virt (DT) [ 20.750493] Call trace: [ 20.750534] show_stack+0x20/0x38 (C) [ 20.750585] dump_stack_lvl+0x8c/0xd0 [ 20.750652] print_report+0x118/0x608 [ 20.750728] kasan_report+0xdc/0x128 [ 20.750793] __asan_report_load8_noabort+0x20/0x30 [ 20.750873] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.750926] kasan_bitops_generic+0x110/0x1c8 [ 20.750982] kunit_try_run_case+0x170/0x3f0 [ 20.751033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.751088] kthread+0x328/0x630 [ 20.751502] ret_from_fork+0x10/0x20 [ 20.751652] [ 20.751741] Allocated by task 261: [ 20.751820] kasan_save_stack+0x3c/0x68 [ 20.751973] kasan_save_track+0x20/0x40 [ 20.752071] kasan_save_alloc_info+0x40/0x58 [ 20.752193] __kasan_kmalloc+0xd4/0xd8 [ 20.752253] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.752292] kasan_bitops_generic+0xa0/0x1c8 [ 20.752333] kunit_try_run_case+0x170/0x3f0 [ 20.752657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.752724] kthread+0x328/0x630 [ 20.753021] ret_from_fork+0x10/0x20 [ 20.753095] [ 20.753168] The buggy address belongs to the object at fff00000c4473c00 [ 20.753168] which belongs to the cache kmalloc-16 of size 16 [ 20.753256] The buggy address is located 8 bytes inside of [ 20.753256] allocated 9-byte region [fff00000c4473c00, fff00000c4473c09) [ 20.753361] [ 20.753470] The buggy address belongs to the physical page: [ 20.753537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 20.753595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.753925] page_type: f5(slab) [ 20.754002] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.754099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.754186] page dumped because: kasan: bad access detected [ 20.754301] [ 20.754380] Memory state around the buggy address: [ 20.754451] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.754502] fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.754548] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.754589] ^ [ 20.754619] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.754664] fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.754726] ================================================================== [ 20.759231] ================================================================== [ 20.759271] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.759330] Read of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261 [ 20.759416] [ 20.759460] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.759789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.760034] Hardware name: linux,dummy-virt (DT) [ 20.760100] Call trace: [ 20.760183] show_stack+0x20/0x38 (C) [ 20.760868] kasan_bitops_generic+0x110/0x1c8 [ 20.762561] [ 20.762999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.764034] fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.765853] kasan_check_range+0x100/0x1a8 [ 20.768716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.777506] page dumped because: kasan: bad access detected [ 20.779413] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.781880] [ 20.782639] dump_stack_lvl+0x8c/0xd0 [ 20.783259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.784520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.785076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.786365] fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.787478] show_stack+0x20/0x38 (C) [ 20.788690] [ 20.789823] kthread+0x328/0x630 [ 20.790695] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.791031] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792588] dump_stack_lvl+0x8c/0xd0 [ 20.793200] kthread+0x328/0x630 [ 20.793808] [ 20.794078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.794982] ^ [ 20.795625] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261 [ 20.796285] kasan_report+0xdc/0x128 [ 20.797743] kasan_save_alloc_info+0x40/0x58 [ 20.800189] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.801363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 20.801839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.802023] dump_stack_lvl+0x8c/0xd0 [ 20.802220] __asan_report_load8_noabort+0x20/0x30 [ 20.803290] kunit_try_run_case+0x170/0x3f0 [ 20.805093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.805634] fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.806364] ================================================================== [ 20.755707] ================================================================== [ 20.755764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.755816] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261 [ 20.755867] [ 20.755899] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.756138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.756205] Hardware name: linux,dummy-virt (DT) [ 20.756239] Call trace: [ 20.756287] show_stack+0x20/0x38 (C) [ 20.756339] dump_stack_lvl+0x8c/0xd0 [ 20.756406] print_report+0x118/0x608 [ 20.756526] kasan_report+0xdc/0x128 [ 20.756592] kasan_check_range+0x100/0x1a8 [ 20.756656] __kasan_check_write+0x20/0x30 [ 20.756704] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.756999] kasan_bitops_generic+0x110/0x1c8 [ 20.757094] kunit_try_run_case+0x170/0x3f0 [ 20.757146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.757230] kthread+0x328/0x630 [ 20.757275] ret_from_fork+0x10/0x20 [ 20.757369] [ 20.757408] Allocated by task 261: [ 20.757468] kasan_save_stack+0x3c/0x68 [ 20.757513] kasan_save_track+0x20/0x40 [ 20.757588] kasan_save_alloc_info+0x40/0x58 [ 20.757634] __kasan_kmalloc+0xd4/0xd8 [ 20.757691] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.757745] kasan_bitops_generic+0xa0/0x1c8 [ 20.757900] kunit_try_run_case+0x170/0x3f0 [ 20.757944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.758092] kthread+0x328/0x630 [ 20.758209] ret_from_fork+0x10/0x20 [ 20.758258] [ 20.758286] The buggy address belongs to the object at fff00000c4473c00 [ 20.758286] which belongs to the cache kmalloc-16 of size 16 [ 20.758346] The buggy address is located 8 bytes inside of [ 20.758346] allocated 9-byte region [fff00000c4473c00, fff00000c4473c09) [ 20.758409] [ 20.758443] The buggy address belongs to the physical page: [ 20.758475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 20.758527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.758576] page_type: f5(slab) [ 20.758629] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.758691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.758740] page dumped because: kasan: bad access detected [ 20.758782] [ 20.758805] Memory state around the buggy address: [ 20.758839] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.758891] fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.758936] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.758987] ^ [ 20.759016] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.759060] fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.759110] ================================================================== [ 20.743230] ================================================================== [ 20.743325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.743484] Write of size 8 at addr fff00000c4473c08 by task kunit_try_catch/261 [ 20.743572] [ 20.743609] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.743914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.744078] Hardware name: linux,dummy-virt (DT) [ 20.744193] Call trace: [ 20.744234] show_stack+0x20/0x38 (C) [ 20.744315] dump_stack_lvl+0x8c/0xd0 [ 20.744630] print_report+0x118/0x608 [ 20.744770] kasan_report+0xdc/0x128 [ 20.744864] kasan_check_range+0x100/0x1a8 [ 20.744916] __kasan_check_write+0x20/0x30 [ 20.745224] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.745563] kasan_bitops_generic+0x110/0x1c8 [ 20.745650] kunit_try_run_case+0x170/0x3f0 [ 20.745717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.745773] kthread+0x328/0x630 [ 20.745819] ret_from_fork+0x10/0x20 [ 20.745877] [ 20.745901] Allocated by task 261: [ 20.745931] kasan_save_stack+0x3c/0x68 [ 20.745975] kasan_save_track+0x20/0x40 [ 20.746025] kasan_save_alloc_info+0x40/0x58 [ 20.746062] __kasan_kmalloc+0xd4/0xd8 [ 20.746100] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.746152] kasan_bitops_generic+0xa0/0x1c8 [ 20.746193] kunit_try_run_case+0x170/0x3f0 [ 20.746240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.746291] kthread+0x328/0x630 [ 20.746326] ret_from_fork+0x10/0x20 [ 20.746365] [ 20.746395] The buggy address belongs to the object at fff00000c4473c00 [ 20.746395] which belongs to the cache kmalloc-16 of size 16 [ 20.746466] The buggy address is located 8 bytes inside of [ 20.746466] allocated 9-byte region [fff00000c4473c00, fff00000c4473c09) [ 20.746531] [ 20.746554] The buggy address belongs to the physical page: [ 20.746589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 20.746775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.747049] page_type: f5(slab) [ 20.747247] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.747373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.747606] page dumped because: kasan: bad access detected [ 20.747687] [ 20.747720] Memory state around the buggy address: [ 20.747793] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.747862] fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.747907] >fff00000c4473c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.747945] ^ [ 20.748039] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748203] fff00000c4473d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748296] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
Automatically assigned
[ 20.726443] ================================================================== [ 20.726495] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 20.726546] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259 [ 20.726597] [ 20.726627] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.726713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.726741] Hardware name: linux,dummy-virt (DT) [ 20.726772] Call trace: [ 20.726977] show_stack+0x20/0x38 (C) [ 20.727044] dump_stack_lvl+0x8c/0xd0 [ 20.727094] print_report+0x118/0x608 [ 20.727369] kasan_report+0xdc/0x128 [ 20.727492] __asan_report_load1_noabort+0x20/0x30 [ 20.727640] strnlen+0x80/0x88 [ 20.727732] kasan_strings+0x478/0xb00 [ 20.727861] kunit_try_run_case+0x170/0x3f0 [ 20.727970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.728167] kthread+0x328/0x630 [ 20.728249] ret_from_fork+0x10/0x20 [ 20.728324] [ 20.728345] Allocated by task 259: [ 20.728376] kasan_save_stack+0x3c/0x68 [ 20.728420] kasan_save_track+0x20/0x40 [ 20.728471] kasan_save_alloc_info+0x40/0x58 [ 20.728510] __kasan_kmalloc+0xd4/0xd8 [ 20.728755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.728899] kasan_strings+0xc8/0xb00 [ 20.728952] kunit_try_run_case+0x170/0x3f0 [ 20.729003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.729049] kthread+0x328/0x630 [ 20.729094] ret_from_fork+0x10/0x20 [ 20.729142] [ 20.729172] Freed by task 259: [ 20.729203] kasan_save_stack+0x3c/0x68 [ 20.729242] kasan_save_track+0x20/0x40 [ 20.729285] kasan_save_free_info+0x4c/0x78 [ 20.729322] __kasan_slab_free+0x6c/0x98 [ 20.729371] kfree+0x214/0x3c8 [ 20.729431] kasan_strings+0x24c/0xb00 [ 20.729470] kunit_try_run_case+0x170/0x3f0 [ 20.729510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.729557] kthread+0x328/0x630 [ 20.729592] ret_from_fork+0x10/0x20 [ 20.729636] [ 20.729659] The buggy address belongs to the object at fff00000c58ba040 [ 20.729659] which belongs to the cache kmalloc-32 of size 32 [ 20.729733] The buggy address is located 16 bytes inside of [ 20.729733] freed 32-byte region [fff00000c58ba040, fff00000c58ba060) [ 20.729812] [ 20.729842] The buggy address belongs to the physical page: [ 20.729875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba [ 20.729944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.730003] page_type: f5(slab) [ 20.730043] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.730105] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.730148] page dumped because: kasan: bad access detected [ 20.730180] [ 20.730227] Memory state around the buggy address: [ 20.730262] fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.730307] fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.730360] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.730408] ^ [ 20.730929] fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.731186] fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.731319] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
Automatically assigned
[ 20.717862] ================================================================== [ 20.718405] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 20.718552] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259 [ 20.718607] [ 20.718988] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.719196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.719303] Hardware name: linux,dummy-virt (DT) [ 20.719416] Call trace: [ 20.719450] show_stack+0x20/0x38 (C) [ 20.719504] dump_stack_lvl+0x8c/0xd0 [ 20.719572] print_report+0x118/0x608 [ 20.719621] kasan_report+0xdc/0x128 [ 20.719922] __asan_report_load1_noabort+0x20/0x30 [ 20.720043] strlen+0xa8/0xb0 [ 20.720196] kasan_strings+0x418/0xb00 [ 20.720275] kunit_try_run_case+0x170/0x3f0 [ 20.720326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720460] kthread+0x328/0x630 [ 20.720507] ret_from_fork+0x10/0x20 [ 20.720565] [ 20.720795] Allocated by task 259: [ 20.721127] kasan_save_stack+0x3c/0x68 [ 20.721174] kasan_save_track+0x20/0x40 [ 20.721215] kasan_save_alloc_info+0x40/0x58 [ 20.721254] __kasan_kmalloc+0xd4/0xd8 [ 20.721311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.721367] kasan_strings+0xc8/0xb00 [ 20.721503] kunit_try_run_case+0x170/0x3f0 [ 20.721544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.721641] kthread+0x328/0x630 [ 20.721808] ret_from_fork+0x10/0x20 [ 20.721895] [ 20.721941] Freed by task 259: [ 20.721969] kasan_save_stack+0x3c/0x68 [ 20.722008] kasan_save_track+0x20/0x40 [ 20.722067] kasan_save_free_info+0x4c/0x78 [ 20.722259] __kasan_slab_free+0x6c/0x98 [ 20.722305] kfree+0x214/0x3c8 [ 20.722668] kasan_strings+0x24c/0xb00 [ 20.723011] kunit_try_run_case+0x170/0x3f0 [ 20.723061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.723108] kthread+0x328/0x630 [ 20.723433] ret_from_fork+0x10/0x20 [ 20.723622] [ 20.723648] The buggy address belongs to the object at fff00000c58ba040 [ 20.723648] which belongs to the cache kmalloc-32 of size 32 [ 20.723707] The buggy address is located 16 bytes inside of [ 20.723707] freed 32-byte region [fff00000c58ba040, fff00000c58ba060) [ 20.724046] [ 20.724079] The buggy address belongs to the physical page: [ 20.724192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba [ 20.724249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.724364] page_type: f5(slab) [ 20.724406] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.724515] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.724591] page dumped because: kasan: bad access detected [ 20.724655] [ 20.724676] Memory state around the buggy address: [ 20.725128] fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.725225] fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.725319] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.725499] ^ [ 20.725558] fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.725605] fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.725645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
Automatically assigned
[ 20.709372] ================================================================== [ 20.709455] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 20.709725] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259 [ 20.709824] [ 20.709961] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.710300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.710359] Hardware name: linux,dummy-virt (DT) [ 20.710451] Call trace: [ 20.710474] show_stack+0x20/0x38 (C) [ 20.710615] dump_stack_lvl+0x8c/0xd0 [ 20.710972] print_report+0x118/0x608 [ 20.711027] kasan_report+0xdc/0x128 [ 20.711073] __asan_report_load1_noabort+0x20/0x30 [ 20.711123] kasan_strings+0x95c/0xb00 [ 20.711643] kunit_try_run_case+0x170/0x3f0 [ 20.712063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.712216] kthread+0x328/0x630 [ 20.712262] ret_from_fork+0x10/0x20 [ 20.712526] [ 20.712652] Allocated by task 259: [ 20.712695] kasan_save_stack+0x3c/0x68 [ 20.712741] kasan_save_track+0x20/0x40 [ 20.712781] kasan_save_alloc_info+0x40/0x58 [ 20.712825] __kasan_kmalloc+0xd4/0xd8 [ 20.712873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.712914] kasan_strings+0xc8/0xb00 [ 20.713141] kunit_try_run_case+0x170/0x3f0 [ 20.713397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.713785] kthread+0x328/0x630 [ 20.713825] ret_from_fork+0x10/0x20 [ 20.714021] [ 20.714262] Freed by task 259: [ 20.714358] kasan_save_stack+0x3c/0x68 [ 20.714463] kasan_save_track+0x20/0x40 [ 20.714558] kasan_save_free_info+0x4c/0x78 [ 20.714604] __kasan_slab_free+0x6c/0x98 [ 20.714644] kfree+0x214/0x3c8 [ 20.714678] kasan_strings+0x24c/0xb00 [ 20.714718] kunit_try_run_case+0x170/0x3f0 [ 20.714759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.714806] kthread+0x328/0x630 [ 20.714851] ret_from_fork+0x10/0x20 [ 20.714891] [ 20.714912] The buggy address belongs to the object at fff00000c58ba040 [ 20.714912] which belongs to the cache kmalloc-32 of size 32 [ 20.715347] The buggy address is located 16 bytes inside of [ 20.715347] freed 32-byte region [fff00000c58ba040, fff00000c58ba060) [ 20.715580] [ 20.715605] The buggy address belongs to the physical page: [ 20.715768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba [ 20.715835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.715997] page_type: f5(slab) [ 20.716208] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.716495] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.716546] page dumped because: kasan: bad access detected [ 20.716583] [ 20.716642] Memory state around the buggy address: [ 20.716782] fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.716853] fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.716905] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.717107] ^ [ 20.717149] fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.717248] fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.717415] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
Automatically assigned
[ 20.699341] ================================================================== [ 20.699550] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 20.699657] Read of size 1 at addr fff00000c58ba050 by task kunit_try_catch/259 [ 20.699710] [ 20.699746] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.700019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.700065] Hardware name: linux,dummy-virt (DT) [ 20.700483] Call trace: [ 20.700674] show_stack+0x20/0x38 (C) [ 20.700971] dump_stack_lvl+0x8c/0xd0 [ 20.701354] print_report+0x118/0x608 [ 20.701433] kasan_report+0xdc/0x128 [ 20.701481] __asan_report_load1_noabort+0x20/0x30 [ 20.701532] strcmp+0xc0/0xc8 [ 20.701577] kasan_strings+0x340/0xb00 [ 20.701624] kunit_try_run_case+0x170/0x3f0 [ 20.701685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.701739] kthread+0x328/0x630 [ 20.701912] ret_from_fork+0x10/0x20 [ 20.701965] [ 20.701985] Allocated by task 259: [ 20.702015] kasan_save_stack+0x3c/0x68 [ 20.702867] kasan_save_track+0x20/0x40 [ 20.702924] kasan_save_alloc_info+0x40/0x58 [ 20.702970] __kasan_kmalloc+0xd4/0xd8 [ 20.703008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.703158] kasan_strings+0xc8/0xb00 [ 20.703227] kunit_try_run_case+0x170/0x3f0 [ 20.703300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.703348] kthread+0x328/0x630 [ 20.703437] ret_from_fork+0x10/0x20 [ 20.703966] [ 20.704069] Freed by task 259: [ 20.704375] kasan_save_stack+0x3c/0x68 [ 20.704435] kasan_save_track+0x20/0x40 [ 20.704475] kasan_save_free_info+0x4c/0x78 [ 20.704512] __kasan_slab_free+0x6c/0x98 [ 20.704578] kfree+0x214/0x3c8 [ 20.704613] kasan_strings+0x24c/0xb00 [ 20.704673] kunit_try_run_case+0x170/0x3f0 [ 20.704794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.704967] kthread+0x328/0x630 [ 20.705197] ret_from_fork+0x10/0x20 [ 20.705240] [ 20.705718] The buggy address belongs to the object at fff00000c58ba040 [ 20.705718] which belongs to the cache kmalloc-32 of size 32 [ 20.705805] The buggy address is located 16 bytes inside of [ 20.705805] freed 32-byte region [fff00000c58ba040, fff00000c58ba060) [ 20.706132] [ 20.706169] The buggy address belongs to the physical page: [ 20.706210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ba [ 20.706331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.706564] page_type: f5(slab) [ 20.706715] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.706768] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.707060] page dumped because: kasan: bad access detected [ 20.707149] [ 20.707176] Memory state around the buggy address: [ 20.707212] fff00000c58b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.707258] fff00000c58b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.707303] >fff00000c58ba000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.707615] ^ [ 20.707762] fff00000c58ba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.707811] fff00000c58ba100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.707852] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
Automatically assigned
[ 20.681317] ================================================================== [ 20.681388] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 20.681477] Read of size 1 at addr fff00000c58a7e98 by task kunit_try_catch/257 [ 20.681746] [ 20.681783] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.682184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.682213] Hardware name: linux,dummy-virt (DT) [ 20.682318] Call trace: [ 20.682342] show_stack+0x20/0x38 (C) [ 20.682398] dump_stack_lvl+0x8c/0xd0 [ 20.682755] print_report+0x118/0x608 [ 20.682845] kasan_report+0xdc/0x128 [ 20.682895] __asan_report_load1_noabort+0x20/0x30 [ 20.682945] memcmp+0x198/0x1d8 [ 20.682992] kasan_memcmp+0x16c/0x300 [ 20.683040] kunit_try_run_case+0x170/0x3f0 [ 20.683759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684035] kthread+0x328/0x630 [ 20.684087] ret_from_fork+0x10/0x20 [ 20.684141] [ 20.684161] Allocated by task 257: [ 20.684222] kasan_save_stack+0x3c/0x68 [ 20.684418] kasan_save_track+0x20/0x40 [ 20.684477] kasan_save_alloc_info+0x40/0x58 [ 20.684573] __kasan_kmalloc+0xd4/0xd8 [ 20.684653] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.684721] kasan_memcmp+0xbc/0x300 [ 20.684796] kunit_try_run_case+0x170/0x3f0 [ 20.684943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684990] kthread+0x328/0x630 [ 20.685029] ret_from_fork+0x10/0x20 [ 20.685067] [ 20.685091] The buggy address belongs to the object at fff00000c58a7e80 [ 20.685091] which belongs to the cache kmalloc-32 of size 32 [ 20.685190] The buggy address is located 0 bytes to the right of [ 20.685190] allocated 24-byte region [fff00000c58a7e80, fff00000c58a7e98) [ 20.685497] [ 20.685546] The buggy address belongs to the physical page: [ 20.685582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 20.685847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.686068] page_type: f5(slab) [ 20.686399] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.686474] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.686624] page dumped because: kasan: bad access detected [ 20.686787] [ 20.686810] Memory state around the buggy address: [ 20.686922] fff00000c58a7d80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 20.686980] fff00000c58a7e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.687119] >fff00000c58a7e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.687177] ^ [ 20.687209] fff00000c58a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.687436] fff00000c58a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.687699] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
Automatically assigned
[ 20.657479] ================================================================== [ 20.657548] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 20.657883] Read of size 1 at addr ffff800080a97b4a by task kunit_try_catch/253 [ 20.658073] [ 20.658218] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.658335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.658363] Hardware name: linux,dummy-virt (DT) [ 20.658397] Call trace: [ 20.658438] show_stack+0x20/0x38 (C) [ 20.658690] dump_stack_lvl+0x8c/0xd0 [ 20.658763] print_report+0x310/0x608 [ 20.658819] kasan_report+0xdc/0x128 [ 20.658922] __asan_report_load1_noabort+0x20/0x30 [ 20.659098] kasan_alloca_oob_right+0x2dc/0x340 [ 20.659181] kunit_try_run_case+0x170/0x3f0 [ 20.659236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.659440] kthread+0x328/0x630 [ 20.659509] ret_from_fork+0x10/0x20 [ 20.659833] [ 20.659858] The buggy address belongs to stack of task kunit_try_catch/253 [ 20.659914] [ 20.659944] The buggy address belongs to the virtual mapping at [ 20.659944] [ffff800080a90000, ffff800080a99000) created by: [ 20.659944] kernel_clone+0x150/0x7a8 [ 20.660323] [ 20.660369] The buggy address belongs to the physical page: [ 20.660480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd [ 20.660535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.660606] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.660658] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.660702] page dumped because: kasan: bad access detected [ 20.660760] [ 20.660824] Memory state around the buggy address: [ 20.660913] ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.660970] ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.661017] >ffff800080a97b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.661057] ^ [ 20.661095] ffff800080a97b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.661138] ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.661224] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
Automatically assigned
[ 20.625286] ================================================================== [ 20.625368] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.625739] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/249 [ 20.626071] [ 20.626717] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.627121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.627392] Hardware name: linux,dummy-virt (DT) [ 20.627440] Call trace: [ 20.627466] show_stack+0x20/0x38 (C) [ 20.627548] dump_stack_lvl+0x8c/0xd0 [ 20.627636] print_report+0x310/0x608 [ 20.627694] kasan_report+0xdc/0x128 [ 20.627742] __asan_report_load1_noabort+0x20/0x30 [ 20.627793] kasan_stack_oob+0x238/0x270 [ 20.627839] kunit_try_run_case+0x170/0x3f0 [ 20.627890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.627945] kthread+0x328/0x630 [ 20.627992] ret_from_fork+0x10/0x20 [ 20.628043] [ 20.628106] The buggy address belongs to stack of task kunit_try_catch/249 [ 20.628888] and is located at offset 138 in frame: [ 20.628991] kasan_stack_oob+0x0/0x270 [ 20.629173] [ 20.629473] This frame has 4 objects: [ 20.629736] [48, 49) '__assertion' [ 20.629778] [64, 72) 'array' [ 20.629858] [96, 112) '__assertion' [ 20.629910] [128, 138) 'stack_array' [ 20.630081] [ 20.630118] The buggy address belongs to the virtual mapping at [ 20.630118] [ffff800080a90000, ffff800080a99000) created by: [ 20.630118] kernel_clone+0x150/0x7a8 [ 20.630204] [ 20.630298] The buggy address belongs to the physical page: [ 20.630444] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd [ 20.630503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.630949] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.631103] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.631236] page dumped because: kasan: bad access detected [ 20.631299] [ 20.631431] Memory state around the buggy address: [ 20.631513] ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.631559] ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 20.631603] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 20.631688] ^ [ 20.631807] ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 20.631852] ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.631915] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
Automatically assigned
[ 20.568545] ================================================================== [ 20.568632] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.568704] Read of size 1 at addr ffff9fc3021b558d by task kunit_try_catch/245 [ 20.568755] [ 20.568801] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.568894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.568922] Hardware name: linux,dummy-virt (DT) [ 20.568957] Call trace: [ 20.573217] show_stack+0x20/0x38 (C) [ 20.573655] dump_stack_lvl+0x8c/0xd0 [ 20.574276] print_report+0x310/0x608 [ 20.574646] kasan_report+0xdc/0x128 [ 20.574713] __asan_report_load1_noabort+0x20/0x30 [ 20.575526] kasan_global_oob_right+0x230/0x270 [ 20.575609] kunit_try_run_case+0x170/0x3f0 [ 20.575659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.576350] kthread+0x328/0x630 [ 20.577097] ret_from_fork+0x10/0x20 [ 20.577662] [ 20.578024] The buggy address belongs to the variable: [ 20.578327] global_array+0xd/0x40 [ 20.578390] [ 20.579689] The buggy address belongs to the virtual mapping at [ 20.579689] [ffff9fc300350000, ffff9fc302271000) created by: [ 20.579689] paging_init+0x66c/0x7d0 [ 20.580275] [ 20.580792] The buggy address belongs to the physical page: [ 20.581337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db5 [ 20.581416] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.581969] raw: 03fffe0000002000 ffffc1ffc01f6d48 ffffc1ffc01f6d48 0000000000000000 [ 20.582508] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.582834] page dumped because: kasan: bad access detected [ 20.583143] [ 20.583352] Memory state around the buggy address: [ 20.583800] ffff9fc3021b5480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.584070] ffff9fc3021b5500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 20.584475] >ffff9fc3021b5580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 20.584692] ^ [ 20.585144] ffff9fc3021b5600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 20.585540] ffff9fc3021b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.586124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
Automatically assigned
[ 20.493648] ================================================================== [ 20.493724] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.493784] Free of addr fff00000c58a9101 by task kunit_try_catch/241 [ 20.493825] [ 20.493857] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.493944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.493970] Hardware name: linux,dummy-virt (DT) [ 20.494002] Call trace: [ 20.494025] show_stack+0x20/0x38 (C) [ 20.494074] dump_stack_lvl+0x8c/0xd0 [ 20.494124] print_report+0x118/0x608 [ 20.494172] kasan_report_invalid_free+0xc0/0xe8 [ 20.494222] check_slab_allocation+0xfc/0x108 [ 20.494271] __kasan_mempool_poison_object+0x78/0x150 [ 20.494322] mempool_free+0x28c/0x328 [ 20.494367] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.494419] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.494591] kunit_try_run_case+0x170/0x3f0 [ 20.494739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.495032] kthread+0x328/0x630 [ 20.495260] ret_from_fork+0x10/0x20 [ 20.495443] [ 20.495464] Allocated by task 241: [ 20.495493] kasan_save_stack+0x3c/0x68 [ 20.495534] kasan_save_track+0x20/0x40 [ 20.495570] kasan_save_alloc_info+0x40/0x58 [ 20.495609] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.495653] remove_element+0x130/0x1f8 [ 20.495689] mempool_alloc_preallocated+0x58/0xc0 [ 20.495726] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.495768] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.495806] kunit_try_run_case+0x170/0x3f0 [ 20.495843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.495904] kthread+0x328/0x630 [ 20.495958] ret_from_fork+0x10/0x20 [ 20.496055] [ 20.496198] The buggy address belongs to the object at fff00000c58a9100 [ 20.496198] which belongs to the cache kmalloc-128 of size 128 [ 20.496290] The buggy address is located 1 bytes inside of [ 20.496290] 128-byte region [fff00000c58a9100, fff00000c58a9180) [ 20.496349] [ 20.496369] The buggy address belongs to the physical page: [ 20.496400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 20.496464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.496515] page_type: f5(slab) [ 20.496556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.496606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.496645] page dumped because: kasan: bad access detected [ 20.496702] [ 20.496719] Memory state around the buggy address: [ 20.496752] fff00000c58a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.496794] fff00000c58a9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.496842] >fff00000c58a9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.496879] ^ [ 20.496930] fff00000c58a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.496979] fff00000c58a9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.497019] ================================================================== [ 20.511314] ================================================================== [ 20.511395] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.511483] Free of addr fff00000c79b0001 by task kunit_try_catch/243 [ 20.511528] [ 20.511566] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.511654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.511682] Hardware name: linux,dummy-virt (DT) [ 20.514128] Call trace: [ 20.514175] show_stack+0x20/0x38 (C) [ 20.514378] dump_stack_lvl+0x8c/0xd0 [ 20.514451] print_report+0x118/0x608 [ 20.514501] kasan_report_invalid_free+0xc0/0xe8 [ 20.514552] __kasan_mempool_poison_object+0xfc/0x150 [ 20.514603] mempool_free+0x28c/0x328 [ 20.514650] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.516682] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.517463] kunit_try_run_case+0x170/0x3f0 [ 20.517637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.518204] kthread+0x328/0x630 [ 20.518822] ret_from_fork+0x10/0x20 [ 20.519027] [ 20.519052] The buggy address belongs to the physical page: [ 20.519664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0 [ 20.520293] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.520374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.520449] page_type: f8(unknown) [ 20.520495] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.520547] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.521913] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.522766] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.522842] head: 0bfffe0000000002 ffffc1ffc31e6c01 00000000ffffffff 00000000ffffffff [ 20.522892] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.523530] page dumped because: kasan: bad access detected [ 20.524131] [ 20.524406] Memory state around the buggy address: [ 20.524697] fff00000c79aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.524776] fff00000c79aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.525372] >fff00000c79b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.525996] ^ [ 20.526273] fff00000c79b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.526667] fff00000c79b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.526713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
Automatically assigned
[ 20.476454] ================================================================== [ 20.476524] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.476581] Free of addr fff00000c79b0000 by task kunit_try_catch/237 [ 20.476641] [ 20.476676] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.476763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.476791] Hardware name: linux,dummy-virt (DT) [ 20.476829] Call trace: [ 20.476851] show_stack+0x20/0x38 (C) [ 20.476900] dump_stack_lvl+0x8c/0xd0 [ 20.476949] print_report+0x118/0x608 [ 20.476996] kasan_report_invalid_free+0xc0/0xe8 [ 20.477053] __kasan_mempool_poison_object+0x14c/0x150 [ 20.477142] mempool_free+0x28c/0x328 [ 20.477358] mempool_double_free_helper+0x150/0x2e8 [ 20.477548] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.477842] kunit_try_run_case+0x170/0x3f0 [ 20.477896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.477955] kthread+0x328/0x630 [ 20.478005] ret_from_fork+0x10/0x20 [ 20.478252] [ 20.478297] The buggy address belongs to the physical page: [ 20.478344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0 [ 20.479174] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.479355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.479431] page_type: f8(unknown) [ 20.479474] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.479523] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.479571] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.479619] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.479667] head: 0bfffe0000000002 ffffc1ffc31e6c01 00000000ffffffff 00000000ffffffff [ 20.479945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.479988] page dumped because: kasan: bad access detected [ 20.480020] [ 20.480038] Memory state around the buggy address: [ 20.480079] fff00000c79aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.480123] fff00000c79aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.480165] >fff00000c79b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.480203] ^ [ 20.480231] fff00000c79b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.480273] fff00000c79b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.480311] ================================================================== [ 20.485761] ================================================================== [ 20.485822] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.485881] Free of addr fff00000c79b0000 by task kunit_try_catch/239 [ 20.485926] [ 20.485960] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.486061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.486088] Hardware name: linux,dummy-virt (DT) [ 20.486120] Call trace: [ 20.486141] show_stack+0x20/0x38 (C) [ 20.486191] dump_stack_lvl+0x8c/0xd0 [ 20.486241] print_report+0x118/0x608 [ 20.486356] kasan_report_invalid_free+0xc0/0xe8 [ 20.486407] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.486657] mempool_free+0x24c/0x328 [ 20.486737] mempool_double_free_helper+0x150/0x2e8 [ 20.486981] mempool_page_alloc_double_free+0xbc/0x118 [ 20.487083] kunit_try_run_case+0x170/0x3f0 [ 20.487234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.487436] kthread+0x328/0x630 [ 20.487521] ret_from_fork+0x10/0x20 [ 20.487588] [ 20.487619] The buggy address belongs to the physical page: [ 20.487651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0 [ 20.487704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.487769] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.487818] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.487858] page dumped because: kasan: bad access detected [ 20.487888] [ 20.487906] Memory state around the buggy address: [ 20.487938] fff00000c79aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.487982] fff00000c79aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.488024] >fff00000c79b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.488064] ^ [ 20.488091] fff00000c79b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.488132] fff00000c79b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.488170] ================================================================== [ 20.461808] ================================================================== [ 20.461918] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.461976] Free of addr fff00000c65b1d00 by task kunit_try_catch/235 [ 20.462044] [ 20.462079] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.462164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.462191] Hardware name: linux,dummy-virt (DT) [ 20.462232] Call trace: [ 20.462273] show_stack+0x20/0x38 (C) [ 20.462350] dump_stack_lvl+0x8c/0xd0 [ 20.462656] print_report+0x118/0x608 [ 20.462712] kasan_report_invalid_free+0xc0/0xe8 [ 20.462761] check_slab_allocation+0xd4/0x108 [ 20.462833] __kasan_mempool_poison_object+0x78/0x150 [ 20.462884] mempool_free+0x28c/0x328 [ 20.462932] mempool_double_free_helper+0x150/0x2e8 [ 20.462981] mempool_kmalloc_double_free+0xc0/0x118 [ 20.463060] kunit_try_run_case+0x170/0x3f0 [ 20.463150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.463262] kthread+0x328/0x630 [ 20.463451] ret_from_fork+0x10/0x20 [ 20.463576] [ 20.463837] Allocated by task 235: [ 20.463896] kasan_save_stack+0x3c/0x68 [ 20.464157] kasan_save_track+0x20/0x40 [ 20.464282] kasan_save_alloc_info+0x40/0x58 [ 20.464373] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.464465] remove_element+0x130/0x1f8 [ 20.464512] mempool_alloc_preallocated+0x58/0xc0 [ 20.464551] mempool_double_free_helper+0x94/0x2e8 [ 20.464590] mempool_kmalloc_double_free+0xc0/0x118 [ 20.464906] kunit_try_run_case+0x170/0x3f0 [ 20.464979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.465058] kthread+0x328/0x630 [ 20.465114] ret_from_fork+0x10/0x20 [ 20.465200] [ 20.465252] Freed by task 235: [ 20.465298] kasan_save_stack+0x3c/0x68 [ 20.465371] kasan_save_track+0x20/0x40 [ 20.465419] kasan_save_free_info+0x4c/0x78 [ 20.465482] __kasan_mempool_poison_object+0xc0/0x150 [ 20.465549] mempool_free+0x28c/0x328 [ 20.465608] mempool_double_free_helper+0x100/0x2e8 [ 20.465719] mempool_kmalloc_double_free+0xc0/0x118 [ 20.465821] kunit_try_run_case+0x170/0x3f0 [ 20.465913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.465956] kthread+0x328/0x630 [ 20.466017] ret_from_fork+0x10/0x20 [ 20.466183] [ 20.466294] The buggy address belongs to the object at fff00000c65b1d00 [ 20.466294] which belongs to the cache kmalloc-128 of size 128 [ 20.466474] The buggy address is located 0 bytes inside of [ 20.466474] 128-byte region [fff00000c65b1d00, fff00000c65b1d80) [ 20.466558] [ 20.466742] The buggy address belongs to the physical page: [ 20.466821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 20.466974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.467061] page_type: f5(slab) [ 20.467157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.467248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.467383] page dumped because: kasan: bad access detected [ 20.467485] [ 20.467539] Memory state around the buggy address: [ 20.467628] fff00000c65b1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.467728] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.467848] >fff00000c65b1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.467951] ^ [ 20.468031] fff00000c65b1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.468122] fff00000c65b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.468194] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 20.455523] ================================================================== [ 20.455589] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.455777] Read of size 1 at addr fff00000c79a8000 by task kunit_try_catch/233 [ 20.455830] [ 20.455867] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.456046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.456206] Hardware name: linux,dummy-virt (DT) [ 20.456286] Call trace: [ 20.456352] show_stack+0x20/0x38 (C) [ 20.456901] dump_stack_lvl+0x8c/0xd0 [ 20.456962] print_report+0x118/0x608 [ 20.457009] kasan_report+0xdc/0x128 [ 20.457056] __asan_report_load1_noabort+0x20/0x30 [ 20.457109] mempool_uaf_helper+0x314/0x340 [ 20.457155] mempool_page_alloc_uaf+0xc0/0x118 [ 20.457204] kunit_try_run_case+0x170/0x3f0 [ 20.457256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.457308] kthread+0x328/0x630 [ 20.457352] ret_from_fork+0x10/0x20 [ 20.457403] [ 20.457437] The buggy address belongs to the physical page: [ 20.457587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a8 [ 20.457735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.457813] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.457865] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.457915] page dumped because: kasan: bad access detected [ 20.457953] [ 20.457971] Memory state around the buggy address: [ 20.458004] fff00000c79a7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.458055] fff00000c79a7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.458097] >fff00000c79a8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.458135] ^ [ 20.458162] fff00000c79a8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.458211] fff00000c79a8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.458250] ================================================================== [ 20.421241] ================================================================== [ 20.421300] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.421355] Read of size 1 at addr fff00000c79a8000 by task kunit_try_catch/229 [ 20.421405] [ 20.421469] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.421556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.421583] Hardware name: linux,dummy-virt (DT) [ 20.421614] Call trace: [ 20.421636] show_stack+0x20/0x38 (C) [ 20.421694] dump_stack_lvl+0x8c/0xd0 [ 20.421751] print_report+0x118/0x608 [ 20.421799] kasan_report+0xdc/0x128 [ 20.421844] __asan_report_load1_noabort+0x20/0x30 [ 20.421892] mempool_uaf_helper+0x314/0x340 [ 20.421938] mempool_kmalloc_large_uaf+0xc4/0x120 [ 20.421986] kunit_try_run_case+0x170/0x3f0 [ 20.422042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.422096] kthread+0x328/0x630 [ 20.422137] ret_from_fork+0x10/0x20 [ 20.422185] [ 20.422204] The buggy address belongs to the physical page: [ 20.422244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a8 [ 20.422296] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.422341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.422393] page_type: f8(unknown) [ 20.423051] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.423141] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.423198] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.423252] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.423307] head: 0bfffe0000000002 ffffc1ffc31e6a01 00000000ffffffff 00000000ffffffff [ 20.423384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.423441] page dumped because: kasan: bad access detected [ 20.423482] [ 20.423596] Memory state around the buggy address: [ 20.423636] fff00000c79a7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.423709] fff00000c79a7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.423752] >fff00000c79a8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.423789] ^ [ 20.423815] fff00000c79a8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.423857] fff00000c79a8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.423895] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
Automatically assigned
[ 20.392945] ================================================================== [ 20.393025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.393119] Read of size 1 at addr fff00000c588b2bb by task kunit_try_catch/225 [ 20.393171] [ 20.393236] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.393363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.393400] Hardware name: linux,dummy-virt (DT) [ 20.393466] Call trace: [ 20.393491] show_stack+0x20/0x38 (C) [ 20.393540] dump_stack_lvl+0x8c/0xd0 [ 20.393592] print_report+0x118/0x608 [ 20.393639] kasan_report+0xdc/0x128 [ 20.393695] __asan_report_load1_noabort+0x20/0x30 [ 20.393744] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.393794] mempool_slab_oob_right+0xc0/0x118 [ 20.393850] kunit_try_run_case+0x170/0x3f0 [ 20.393899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.393953] kthread+0x328/0x630 [ 20.393995] ret_from_fork+0x10/0x20 [ 20.394043] [ 20.394061] Allocated by task 225: [ 20.394090] kasan_save_stack+0x3c/0x68 [ 20.394129] kasan_save_track+0x20/0x40 [ 20.394175] kasan_save_alloc_info+0x40/0x58 [ 20.394213] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.394264] remove_element+0x16c/0x1f8 [ 20.394302] mempool_alloc_preallocated+0x58/0xc0 [ 20.394341] mempool_oob_right_helper+0x98/0x2f0 [ 20.394384] mempool_slab_oob_right+0xc0/0x118 [ 20.394433] kunit_try_run_case+0x170/0x3f0 [ 20.394470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.394514] kthread+0x328/0x630 [ 20.394545] ret_from_fork+0x10/0x20 [ 20.394580] [ 20.394600] The buggy address belongs to the object at fff00000c588b240 [ 20.394600] which belongs to the cache test_cache of size 123 [ 20.394655] The buggy address is located 0 bytes to the right of [ 20.394655] allocated 123-byte region [fff00000c588b240, fff00000c588b2bb) [ 20.394715] [ 20.394737] The buggy address belongs to the physical page: [ 20.394767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10588b [ 20.394817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.394889] page_type: f5(slab) [ 20.394932] raw: 0bfffe0000000000 fff00000c65c9500 dead000000000122 0000000000000000 [ 20.394980] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.395020] page dumped because: kasan: bad access detected [ 20.395051] [ 20.395068] Memory state around the buggy address: [ 20.395102] fff00000c588b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.395146] fff00000c588b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.395188] >fff00000c588b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.395225] ^ [ 20.395257] fff00000c588b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.395299] fff00000c588b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.395374] ================================================================== [ 20.342369] ================================================================== [ 20.342475] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.342556] Read of size 1 at addr fff00000c657ca73 by task kunit_try_catch/221 [ 20.342608] [ 20.342653] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.342746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.342774] Hardware name: linux,dummy-virt (DT) [ 20.342809] Call trace: [ 20.342833] show_stack+0x20/0x38 (C) [ 20.342888] dump_stack_lvl+0x8c/0xd0 [ 20.342940] print_report+0x118/0x608 [ 20.342988] kasan_report+0xdc/0x128 [ 20.343033] __asan_report_load1_noabort+0x20/0x30 [ 20.343080] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.343127] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.343176] kunit_try_run_case+0x170/0x3f0 [ 20.343227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.343280] kthread+0x328/0x630 [ 20.343324] ret_from_fork+0x10/0x20 [ 20.343392] [ 20.343412] Allocated by task 221: [ 20.343454] kasan_save_stack+0x3c/0x68 [ 20.343498] kasan_save_track+0x20/0x40 [ 20.343535] kasan_save_alloc_info+0x40/0x58 [ 20.343572] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.343616] remove_element+0x130/0x1f8 [ 20.343653] mempool_alloc_preallocated+0x58/0xc0 [ 20.343692] mempool_oob_right_helper+0x98/0x2f0 [ 20.343730] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.343769] kunit_try_run_case+0x170/0x3f0 [ 20.343806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.343849] kthread+0x328/0x630 [ 20.343881] ret_from_fork+0x10/0x20 [ 20.343916] [ 20.343936] The buggy address belongs to the object at fff00000c657ca00 [ 20.343936] which belongs to the cache kmalloc-128 of size 128 [ 20.343994] The buggy address is located 0 bytes to the right of [ 20.343994] allocated 115-byte region [fff00000c657ca00, fff00000c657ca73) [ 20.344057] [ 20.344078] The buggy address belongs to the physical page: [ 20.344113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 20.344166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.344221] page_type: f5(slab) [ 20.344264] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.344316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.344357] page dumped because: kasan: bad access detected [ 20.344389] [ 20.344408] Memory state around the buggy address: [ 20.344450] fff00000c657c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.344493] fff00000c657c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.344536] >fff00000c657ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.344576] ^ [ 20.344615] fff00000c657ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.344656] fff00000c657cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.344695] ================================================================== [ 20.373838] ================================================================== [ 20.373922] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.373999] Read of size 1 at addr fff00000c795e001 by task kunit_try_catch/223 [ 20.374049] [ 20.374089] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.374178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.374206] Hardware name: linux,dummy-virt (DT) [ 20.374239] Call trace: [ 20.374264] show_stack+0x20/0x38 (C) [ 20.374314] dump_stack_lvl+0x8c/0xd0 [ 20.374366] print_report+0x118/0x608 [ 20.374413] kasan_report+0xdc/0x128 [ 20.374476] __asan_report_load1_noabort+0x20/0x30 [ 20.374524] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.374572] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.374622] kunit_try_run_case+0x170/0x3f0 [ 20.374674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.374726] kthread+0x328/0x630 [ 20.374772] ret_from_fork+0x10/0x20 [ 20.374819] [ 20.374842] The buggy address belongs to the physical page: [ 20.374877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c [ 20.374931] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.374977] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.375036] page_type: f8(unknown) [ 20.375081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.375130] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.375180] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.375228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.375276] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff [ 20.375325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.375408] page dumped because: kasan: bad access detected [ 20.375447] [ 20.375487] Memory state around the buggy address: [ 20.375521] fff00000c795df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.375564] fff00000c795df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.375607] >fff00000c795e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.375646] ^ [ 20.375673] fff00000c795e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.375715] fff00000c795e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.375753] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
Automatically assigned
[ 19.783213] ================================================================== [ 19.783303] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.783418] Read of size 1 at addr fff00000c65c9280 by task kunit_try_catch/215 [ 19.783480] [ 19.783520] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 19.783610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.783638] Hardware name: linux,dummy-virt (DT) [ 19.783672] Call trace: [ 19.783698] show_stack+0x20/0x38 (C) [ 19.783749] dump_stack_lvl+0x8c/0xd0 [ 19.783801] print_report+0x118/0x608 [ 19.783847] kasan_report+0xdc/0x128 [ 19.783892] __kasan_check_byte+0x54/0x70 [ 19.783939] kmem_cache_destroy+0x34/0x218 [ 19.783988] kmem_cache_double_destroy+0x174/0x300 [ 19.784043] kunit_try_run_case+0x170/0x3f0 [ 19.784093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.784147] kthread+0x328/0x630 [ 19.784191] ret_from_fork+0x10/0x20 [ 19.784238] [ 19.784257] Allocated by task 215: [ 19.784287] kasan_save_stack+0x3c/0x68 [ 19.784326] kasan_save_track+0x20/0x40 [ 19.784365] kasan_save_alloc_info+0x40/0x58 [ 19.784400] __kasan_slab_alloc+0xa8/0xb0 [ 19.784447] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.784487] __kmem_cache_create_args+0x178/0x280 [ 19.784527] kmem_cache_double_destroy+0xc0/0x300 [ 19.784565] kunit_try_run_case+0x170/0x3f0 [ 19.784604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.784648] kthread+0x328/0x630 [ 19.784679] ret_from_fork+0x10/0x20 [ 19.784715] [ 19.784733] Freed by task 215: [ 19.784759] kasan_save_stack+0x3c/0x68 [ 19.784797] kasan_save_track+0x20/0x40 [ 19.784838] kasan_save_free_info+0x4c/0x78 [ 19.784874] __kasan_slab_free+0x6c/0x98 [ 19.784911] kmem_cache_free+0x260/0x468 [ 19.784947] slab_kmem_cache_release+0x38/0x50 [ 19.784986] kmem_cache_release+0x1c/0x30 [ 19.785022] kobject_put+0x17c/0x420 [ 19.785058] sysfs_slab_release+0x1c/0x30 [ 19.785094] kmem_cache_destroy+0x118/0x218 [ 19.785133] kmem_cache_double_destroy+0x128/0x300 [ 19.785171] kunit_try_run_case+0x170/0x3f0 [ 19.785209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.785252] kthread+0x328/0x630 [ 19.785284] ret_from_fork+0x10/0x20 [ 19.785318] [ 19.785339] The buggy address belongs to the object at fff00000c65c9280 [ 19.785339] which belongs to the cache kmem_cache of size 208 [ 19.785396] The buggy address is located 0 bytes inside of [ 19.785396] freed 208-byte region [fff00000c65c9280, fff00000c65c9350) [ 19.785466] [ 19.785487] The buggy address belongs to the physical page: [ 19.785521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c9 [ 19.785575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.785630] page_type: f5(slab) [ 19.785672] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.785723] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.785765] page dumped because: kasan: bad access detected [ 19.785799] [ 19.785816] Memory state around the buggy address: [ 19.785850] fff00000c65c9180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.785893] fff00000c65c9200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785937] >fff00000c65c9280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.785983] ^ [ 19.786014] fff00000c65c9300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.786055] fff00000c65c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786095] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
Automatically assigned
[ 19.529135] ================================================================== [ 19.529461] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 19.529586] Read of size 1 at addr fff00000c65d7000 by task kunit_try_catch/213 [ 19.529640] [ 19.529690] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 19.529787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.529813] Hardware name: linux,dummy-virt (DT) [ 19.529874] Call trace: [ 19.529899] show_stack+0x20/0x38 (C) [ 19.529969] dump_stack_lvl+0x8c/0xd0 [ 19.530030] print_report+0x118/0x608 [ 19.530098] kasan_report+0xdc/0x128 [ 19.530145] __asan_report_load1_noabort+0x20/0x30 [ 19.530194] kmem_cache_rcu_uaf+0x388/0x468 [ 19.530255] kunit_try_run_case+0x170/0x3f0 [ 19.530522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530612] kthread+0x328/0x630 [ 19.530658] ret_from_fork+0x10/0x20 [ 19.530730] [ 19.530749] Allocated by task 213: [ 19.530781] kasan_save_stack+0x3c/0x68 [ 19.530838] kasan_save_track+0x20/0x40 [ 19.530883] kasan_save_alloc_info+0x40/0x58 [ 19.531100] __kasan_slab_alloc+0xa8/0xb0 [ 19.531179] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.531239] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.531285] kunit_try_run_case+0x170/0x3f0 [ 19.531338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.531410] kthread+0x328/0x630 [ 19.531455] ret_from_fork+0x10/0x20 [ 19.531491] [ 19.531509] Freed by task 0: [ 19.531810] kasan_save_stack+0x3c/0x68 [ 19.531885] kasan_save_track+0x20/0x40 [ 19.531933] kasan_save_free_info+0x4c/0x78 [ 19.532021] __kasan_slab_free+0x6c/0x98 [ 19.532057] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.532130] rcu_core+0x9f4/0x1e20 [ 19.532505] rcu_core_si+0x18/0x30 [ 19.532610] handle_softirqs+0x374/0xb28 [ 19.532678] __do_softirq+0x1c/0x28 [ 19.532735] [ 19.532771] Last potentially related work creation: [ 19.532860] kasan_save_stack+0x3c/0x68 [ 19.532929] kasan_record_aux_stack+0xb4/0xc8 [ 19.533014] kmem_cache_free+0x120/0x468 [ 19.533103] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.533180] kunit_try_run_case+0x170/0x3f0 [ 19.533253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.533523] kthread+0x328/0x630 [ 19.533612] ret_from_fork+0x10/0x20 [ 19.533728] [ 19.533800] The buggy address belongs to the object at fff00000c65d7000 [ 19.533800] which belongs to the cache test_cache of size 200 [ 19.533938] The buggy address is located 0 bytes inside of [ 19.533938] freed 200-byte region [fff00000c65d7000, fff00000c65d70c8) [ 19.534048] [ 19.534091] The buggy address belongs to the physical page: [ 19.534124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d7 [ 19.534406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.534509] page_type: f5(slab) [ 19.534562] raw: 0bfffe0000000000 fff00000c65c9140 dead000000000122 0000000000000000 [ 19.534614] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.534656] page dumped because: kasan: bad access detected [ 19.534688] [ 19.534717] Memory state around the buggy address: [ 19.534777] fff00000c65d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.534836] fff00000c65d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.534890] >fff00000c65d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.534946] ^ [ 19.534976] fff00000c65d7080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.535028] fff00000c65d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.535097] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
Automatically assigned
[ 19.022342] ================================================================== [ 19.022552] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 19.022839] Free of addr fff00000c65da001 by task kunit_try_catch/211 [ 19.022965] [ 19.023167] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 19.023412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.023450] Hardware name: linux,dummy-virt (DT) [ 19.023485] Call trace: [ 19.023508] show_stack+0x20/0x38 (C) [ 19.023563] dump_stack_lvl+0x8c/0xd0 [ 19.023613] print_report+0x118/0x608 [ 19.023743] kasan_report_invalid_free+0xc0/0xe8 [ 19.024255] check_slab_allocation+0xfc/0x108 [ 19.024308] __kasan_slab_pre_free+0x2c/0x48 [ 19.024499] kmem_cache_free+0xf0/0x468 [ 19.024876] kmem_cache_invalid_free+0x184/0x3c8 [ 19.025088] kunit_try_run_case+0x170/0x3f0 [ 19.025256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.025397] kthread+0x328/0x630 [ 19.025455] ret_from_fork+0x10/0x20 [ 19.025521] [ 19.025574] Allocated by task 211: [ 19.025603] kasan_save_stack+0x3c/0x68 [ 19.025814] kasan_save_track+0x20/0x40 [ 19.025945] kasan_save_alloc_info+0x40/0x58 [ 19.025990] __kasan_slab_alloc+0xa8/0xb0 [ 19.026045] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.026086] kmem_cache_invalid_free+0x12c/0x3c8 [ 19.026125] kunit_try_run_case+0x170/0x3f0 [ 19.026195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.026239] kthread+0x328/0x630 [ 19.026278] ret_from_fork+0x10/0x20 [ 19.026437] [ 19.026458] The buggy address belongs to the object at fff00000c65da000 [ 19.026458] which belongs to the cache test_cache of size 200 [ 19.026515] The buggy address is located 1 bytes inside of [ 19.026515] 200-byte region [fff00000c65da000, fff00000c65da0c8) [ 19.026573] [ 19.026596] The buggy address belongs to the physical page: [ 19.026629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065da [ 19.026685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.026930] page_type: f5(slab) [ 19.027127] raw: 0bfffe0000000000 fff00000c65c9000 dead000000000122 0000000000000000 [ 19.027328] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.027538] page dumped because: kasan: bad access detected [ 19.027573] [ 19.027591] Memory state around the buggy address: [ 19.027626] fff00000c65d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.027670] fff00000c65d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.027713] >fff00000c65da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.027750] ^ [ 19.027777] fff00000c65da080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.028106] fff00000c65da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.028268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
Automatically assigned
[ 18.981156] ================================================================== [ 18.981251] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 18.981509] Free of addr fff00000c65c9000 by task kunit_try_catch/209 [ 18.981565] [ 18.981763] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.981883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.981937] Hardware name: linux,dummy-virt (DT) [ 18.981974] Call trace: [ 18.982013] show_stack+0x20/0x38 (C) [ 18.982069] dump_stack_lvl+0x8c/0xd0 [ 18.982166] print_report+0x118/0x608 [ 18.982215] kasan_report_invalid_free+0xc0/0xe8 [ 18.982303] check_slab_allocation+0xd4/0x108 [ 18.982471] __kasan_slab_pre_free+0x2c/0x48 [ 18.982598] kmem_cache_free+0xf0/0x468 [ 18.982679] kmem_cache_double_free+0x190/0x3c8 [ 18.982747] kunit_try_run_case+0x170/0x3f0 [ 18.982798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.982853] kthread+0x328/0x630 [ 18.982897] ret_from_fork+0x10/0x20 [ 18.982947] [ 18.982982] Allocated by task 209: [ 18.983139] kasan_save_stack+0x3c/0x68 [ 18.983184] kasan_save_track+0x20/0x40 [ 18.983219] kasan_save_alloc_info+0x40/0x58 [ 18.983257] __kasan_slab_alloc+0xa8/0xb0 [ 18.983418] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.983568] kmem_cache_double_free+0x12c/0x3c8 [ 18.983619] kunit_try_run_case+0x170/0x3f0 [ 18.983658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.983724] kthread+0x328/0x630 [ 18.983757] ret_from_fork+0x10/0x20 [ 18.983793] [ 18.983811] Freed by task 209: [ 18.983930] kasan_save_stack+0x3c/0x68 [ 18.983972] kasan_save_track+0x20/0x40 [ 18.984007] kasan_save_free_info+0x4c/0x78 [ 18.984043] __kasan_slab_free+0x6c/0x98 [ 18.984079] kmem_cache_free+0x260/0x468 [ 18.984116] kmem_cache_double_free+0x140/0x3c8 [ 18.984154] kunit_try_run_case+0x170/0x3f0 [ 18.984190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.984234] kthread+0x328/0x630 [ 18.984318] ret_from_fork+0x10/0x20 [ 18.984375] [ 18.984494] The buggy address belongs to the object at fff00000c65c9000 [ 18.984494] which belongs to the cache test_cache of size 200 [ 18.984611] The buggy address is located 0 bytes inside of [ 18.984611] 200-byte region [fff00000c65c9000, fff00000c65c90c8) [ 18.984742] [ 18.984852] The buggy address belongs to the physical page: [ 18.984931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c9 [ 18.984988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.985043] page_type: f5(slab) [ 18.985085] raw: 0bfffe0000000000 fff00000c16fadc0 dead000000000122 0000000000000000 [ 18.985135] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.985317] page dumped because: kasan: bad access detected [ 18.985402] [ 18.985452] Memory state around the buggy address: [ 18.985537] fff00000c65c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.985623] fff00000c65c8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.985687] >fff00000c65c9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.985728] ^ [ 18.985755] fff00000c65c9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.985798] fff00000c65c9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.985838] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
Automatically assigned
[ 18.721765] ================================================================== [ 18.721836] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 18.721901] Read of size 1 at addr fff00000c65cb0c8 by task kunit_try_catch/207 [ 18.721953] [ 18.721991] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.722270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.722328] Hardware name: linux,dummy-virt (DT) [ 18.722362] Call trace: [ 18.722394] show_stack+0x20/0x38 (C) [ 18.722638] dump_stack_lvl+0x8c/0xd0 [ 18.722996] print_report+0x118/0x608 [ 18.723075] kasan_report+0xdc/0x128 [ 18.723134] __asan_report_load1_noabort+0x20/0x30 [ 18.723184] kmem_cache_oob+0x344/0x430 [ 18.723228] kunit_try_run_case+0x170/0x3f0 [ 18.723402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.723508] kthread+0x328/0x630 [ 18.723623] ret_from_fork+0x10/0x20 [ 18.723772] [ 18.723810] Allocated by task 207: [ 18.723840] kasan_save_stack+0x3c/0x68 [ 18.723901] kasan_save_track+0x20/0x40 [ 18.724177] kasan_save_alloc_info+0x40/0x58 [ 18.724267] __kasan_slab_alloc+0xa8/0xb0 [ 18.724340] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.724379] kmem_cache_oob+0x12c/0x430 [ 18.724416] kunit_try_run_case+0x170/0x3f0 [ 18.724463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.724690] kthread+0x328/0x630 [ 18.724790] ret_from_fork+0x10/0x20 [ 18.724916] [ 18.724999] The buggy address belongs to the object at fff00000c65cb000 [ 18.724999] which belongs to the cache test_cache of size 200 [ 18.725114] The buggy address is located 0 bytes to the right of [ 18.725114] allocated 200-byte region [fff00000c65cb000, fff00000c65cb0c8) [ 18.725242] [ 18.725311] The buggy address belongs to the physical page: [ 18.725343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cb [ 18.725733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.725871] page_type: f5(slab) [ 18.725958] raw: 0bfffe0000000000 fff00000c16fac80 dead000000000122 0000000000000000 [ 18.726084] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.726152] page dumped because: kasan: bad access detected [ 18.726250] [ 18.726302] Memory state around the buggy address: [ 18.726359] fff00000c65caf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.726495] fff00000c65cb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.726575] >fff00000c65cb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.726635] ^ [ 18.726671] fff00000c65cb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.726912] fff00000c65cb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.727083] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
Automatically assigned
[ 18.670330] ================================================================== [ 18.670420] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 18.670503] Read of size 8 at addr fff00000c5933840 by task kunit_try_catch/200 [ 18.670556] [ 18.671081] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.671487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.671553] Hardware name: linux,dummy-virt (DT) [ 18.671614] Call trace: [ 18.671811] show_stack+0x20/0x38 (C) [ 18.672076] dump_stack_lvl+0x8c/0xd0 [ 18.672135] print_report+0x118/0x608 [ 18.672326] kasan_report+0xdc/0x128 [ 18.672376] __asan_report_load8_noabort+0x20/0x30 [ 18.672516] workqueue_uaf+0x480/0x4a8 [ 18.672691] kunit_try_run_case+0x170/0x3f0 [ 18.672742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.672797] kthread+0x328/0x630 [ 18.672848] ret_from_fork+0x10/0x20 [ 18.672900] [ 18.673776] Allocated by task 200: [ 18.673912] kasan_save_stack+0x3c/0x68 [ 18.674240] kasan_save_track+0x20/0x40 [ 18.674281] kasan_save_alloc_info+0x40/0x58 [ 18.674318] __kasan_kmalloc+0xd4/0xd8 [ 18.674357] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.674550] workqueue_uaf+0x13c/0x4a8 [ 18.674595] kunit_try_run_case+0x170/0x3f0 [ 18.674634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.674676] kthread+0x328/0x630 [ 18.674834] ret_from_fork+0x10/0x20 [ 18.674901] [ 18.675016] Freed by task 47: [ 18.675219] kasan_save_stack+0x3c/0x68 [ 18.675266] kasan_save_track+0x20/0x40 [ 18.675302] kasan_save_free_info+0x4c/0x78 [ 18.675871] __kasan_slab_free+0x6c/0x98 [ 18.676193] kfree+0x214/0x3c8 [ 18.676241] workqueue_uaf_work+0x18/0x30 [ 18.676278] process_one_work+0x530/0xf98 [ 18.676317] worker_thread+0x618/0xf38 [ 18.676354] kthread+0x328/0x630 [ 18.676385] ret_from_fork+0x10/0x20 [ 18.676421] [ 18.676454] Last potentially related work creation: [ 18.676481] kasan_save_stack+0x3c/0x68 [ 18.676520] kasan_record_aux_stack+0xb4/0xc8 [ 18.676557] __queue_work+0x65c/0x1008 [ 18.676592] queue_work_on+0xbc/0xf8 [ 18.676628] workqueue_uaf+0x210/0x4a8 [ 18.677348] kunit_try_run_case+0x170/0x3f0 [ 18.677649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.677752] kthread+0x328/0x630 [ 18.678198] ret_from_fork+0x10/0x20 [ 18.678254] [ 18.678275] The buggy address belongs to the object at fff00000c5933840 [ 18.678275] which belongs to the cache kmalloc-32 of size 32 [ 18.678574] The buggy address is located 0 bytes inside of [ 18.678574] freed 32-byte region [fff00000c5933840, fff00000c5933860) [ 18.678634] [ 18.678655] The buggy address belongs to the physical page: [ 18.679257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105933 [ 18.679567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.679626] page_type: f5(slab) [ 18.679670] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.680070] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.680339] page dumped because: kasan: bad access detected [ 18.680613] [ 18.680904] Memory state around the buggy address: [ 18.680942] fff00000c5933700: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 18.680987] fff00000c5933780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.681462] >fff00000c5933800: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 18.681508] ^ [ 18.681544] fff00000c5933880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.681597] fff00000c5933900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.681729] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
Automatically assigned
[ 18.624213] ================================================================== [ 18.624352] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 18.624439] Read of size 4 at addr fff00000c5933640 by task swapper/1/0 [ 18.624486] [ 18.624526] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.624614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.624642] Hardware name: linux,dummy-virt (DT) [ 18.624676] Call trace: [ 18.624699] show_stack+0x20/0x38 (C) [ 18.624751] dump_stack_lvl+0x8c/0xd0 [ 18.624801] print_report+0x118/0x608 [ 18.624853] kasan_report+0xdc/0x128 [ 18.624897] __asan_report_load4_noabort+0x20/0x30 [ 18.624944] rcu_uaf_reclaim+0x64/0x70 [ 18.624988] rcu_core+0x9f4/0x1e20 [ 18.625034] rcu_core_si+0x18/0x30 [ 18.625077] handle_softirqs+0x374/0xb28 [ 18.627542] __do_softirq+0x1c/0x28 [ 18.627615] ____do_softirq+0x18/0x30 [ 18.627661] call_on_irq_stack+0x24/0x30 [ 18.627760] do_softirq_own_stack+0x24/0x38 [ 18.627809] __irq_exit_rcu+0x1fc/0x318 [ 18.627853] irq_exit_rcu+0x1c/0x80 [ 18.627897] el1_interrupt+0x38/0x58 [ 18.627940] el1h_64_irq_handler+0x18/0x28 [ 18.627986] el1h_64_irq+0x6c/0x70 [ 18.628090] arch_local_irq_enable+0x4/0x8 (P) [ 18.628172] do_idle+0x384/0x4e8 [ 18.628366] cpu_startup_entry+0x64/0x80 [ 18.628558] secondary_start_kernel+0x288/0x340 [ 18.628834] __secondary_switched+0xc0/0xc8 [ 18.628924] [ 18.628945] Allocated by task 198: [ 18.629102] kasan_save_stack+0x3c/0x68 [ 18.629543] kasan_save_track+0x20/0x40 [ 18.629839] kasan_save_alloc_info+0x40/0x58 [ 18.629956] __kasan_kmalloc+0xd4/0xd8 [ 18.629997] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.630220] rcu_uaf+0xb0/0x2d8 [ 18.630259] kunit_try_run_case+0x170/0x3f0 [ 18.630866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.631256] kthread+0x328/0x630 [ 18.631299] ret_from_fork+0x10/0x20 [ 18.631336] [ 18.631850] Freed by task 0: [ 18.631993] kasan_save_stack+0x3c/0x68 [ 18.632144] kasan_save_track+0x20/0x40 [ 18.632280] kasan_save_free_info+0x4c/0x78 [ 18.632317] __kasan_slab_free+0x6c/0x98 [ 18.632354] kfree+0x214/0x3c8 [ 18.632865] rcu_uaf_reclaim+0x28/0x70 [ 18.632913] rcu_core+0x9f4/0x1e20 [ 18.632950] rcu_core_si+0x18/0x30 [ 18.632984] handle_softirqs+0x374/0xb28 [ 18.633021] __do_softirq+0x1c/0x28 [ 18.633056] [ 18.633105] Last potentially related work creation: [ 18.633197] kasan_save_stack+0x3c/0x68 [ 18.633239] kasan_record_aux_stack+0xb4/0xc8 [ 18.633277] __call_rcu_common.constprop.0+0x70/0x8b0 [ 18.633358] call_rcu+0x18/0x30 [ 18.633519] rcu_uaf+0x14c/0x2d8 [ 18.633643] kunit_try_run_case+0x170/0x3f0 [ 18.633712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.633757] kthread+0x328/0x630 [ 18.633844] ret_from_fork+0x10/0x20 [ 18.633999] [ 18.634061] The buggy address belongs to the object at fff00000c5933640 [ 18.634061] which belongs to the cache kmalloc-32 of size 32 [ 18.634233] The buggy address is located 0 bytes inside of [ 18.634233] freed 32-byte region [fff00000c5933640, fff00000c5933660) [ 18.634401] [ 18.634432] The buggy address belongs to the physical page: [ 18.634947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105933 [ 18.635069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.635318] page_type: f5(slab) [ 18.635449] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.635502] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.635769] page dumped because: kasan: bad access detected [ 18.636048] [ 18.636067] Memory state around the buggy address: [ 18.636558] fff00000c5933500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.636629] fff00000c5933580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.637088] >fff00000c5933600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.637243] ^ [ 18.637750] fff00000c5933680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.638210] fff00000c5933700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.638256] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
Automatically assigned
[ 18.492928] ================================================================== [ 18.492986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.493036] Read of size 1 at addr fff00000c65b1600 by task kunit_try_catch/196 [ 18.493110] [ 18.493140] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.493252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.493305] Hardware name: linux,dummy-virt (DT) [ 18.493334] Call trace: [ 18.493357] show_stack+0x20/0x38 (C) [ 18.493418] dump_stack_lvl+0x8c/0xd0 [ 18.493477] print_report+0x118/0x608 [ 18.493539] kasan_report+0xdc/0x128 [ 18.493594] __asan_report_load1_noabort+0x20/0x30 [ 18.493704] ksize_uaf+0x598/0x5f8 [ 18.493748] kunit_try_run_case+0x170/0x3f0 [ 18.493814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.493890] kthread+0x328/0x630 [ 18.493957] ret_from_fork+0x10/0x20 [ 18.494012] [ 18.494079] Allocated by task 196: [ 18.494147] kasan_save_stack+0x3c/0x68 [ 18.494189] kasan_save_track+0x20/0x40 [ 18.494227] kasan_save_alloc_info+0x40/0x58 [ 18.494263] __kasan_kmalloc+0xd4/0xd8 [ 18.494298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.494369] ksize_uaf+0xb8/0x5f8 [ 18.494404] kunit_try_run_case+0x170/0x3f0 [ 18.494461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.494505] kthread+0x328/0x630 [ 18.494571] ret_from_fork+0x10/0x20 [ 18.494607] [ 18.494626] Freed by task 196: [ 18.494652] kasan_save_stack+0x3c/0x68 [ 18.494689] kasan_save_track+0x20/0x40 [ 18.494726] kasan_save_free_info+0x4c/0x78 [ 18.494770] __kasan_slab_free+0x6c/0x98 [ 18.494827] kfree+0x214/0x3c8 [ 18.494865] ksize_uaf+0x11c/0x5f8 [ 18.494900] kunit_try_run_case+0x170/0x3f0 [ 18.494955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.495006] kthread+0x328/0x630 [ 18.495065] ret_from_fork+0x10/0x20 [ 18.495133] [ 18.495158] The buggy address belongs to the object at fff00000c65b1600 [ 18.495158] which belongs to the cache kmalloc-128 of size 128 [ 18.495227] The buggy address is located 0 bytes inside of [ 18.495227] freed 128-byte region [fff00000c65b1600, fff00000c65b1680) [ 18.495289] [ 18.495308] The buggy address belongs to the physical page: [ 18.495369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.495476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.495539] page_type: f5(slab) [ 18.495846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.495938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.496042] page dumped because: kasan: bad access detected [ 18.496074] [ 18.496092] Memory state around the buggy address: [ 18.496187] fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.496342] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496383] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.496420] ^ [ 18.496457] fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496540] fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496654] ================================================================== [ 18.497102] ================================================================== [ 18.497189] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.497236] Read of size 1 at addr fff00000c65b1678 by task kunit_try_catch/196 [ 18.497406] [ 18.497448] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.497545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.497590] Hardware name: linux,dummy-virt (DT) [ 18.497637] Call trace: [ 18.497666] show_stack+0x20/0x38 (C) [ 18.497747] dump_stack_lvl+0x8c/0xd0 [ 18.497823] print_report+0x118/0x608 [ 18.497869] kasan_report+0xdc/0x128 [ 18.497932] __asan_report_load1_noabort+0x20/0x30 [ 18.497994] ksize_uaf+0x544/0x5f8 [ 18.498037] kunit_try_run_case+0x170/0x3f0 [ 18.498084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.498136] kthread+0x328/0x630 [ 18.498181] ret_from_fork+0x10/0x20 [ 18.498229] [ 18.498247] Allocated by task 196: [ 18.498275] kasan_save_stack+0x3c/0x68 [ 18.498313] kasan_save_track+0x20/0x40 [ 18.498375] kasan_save_alloc_info+0x40/0x58 [ 18.498413] __kasan_kmalloc+0xd4/0xd8 [ 18.498469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.498508] ksize_uaf+0xb8/0x5f8 [ 18.498552] kunit_try_run_case+0x170/0x3f0 [ 18.498589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.498631] kthread+0x328/0x630 [ 18.498664] ret_from_fork+0x10/0x20 [ 18.498699] [ 18.498717] Freed by task 196: [ 18.498752] kasan_save_stack+0x3c/0x68 [ 18.498790] kasan_save_track+0x20/0x40 [ 18.498827] kasan_save_free_info+0x4c/0x78 [ 18.498864] __kasan_slab_free+0x6c/0x98 [ 18.498901] kfree+0x214/0x3c8 [ 18.498933] ksize_uaf+0x11c/0x5f8 [ 18.498967] kunit_try_run_case+0x170/0x3f0 [ 18.499005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.499048] kthread+0x328/0x630 [ 18.499078] ret_from_fork+0x10/0x20 [ 18.499113] [ 18.499132] The buggy address belongs to the object at fff00000c65b1600 [ 18.499132] which belongs to the cache kmalloc-128 of size 128 [ 18.499190] The buggy address is located 120 bytes inside of [ 18.499190] freed 128-byte region [fff00000c65b1600, fff00000c65b1680) [ 18.499262] [ 18.499288] The buggy address belongs to the physical page: [ 18.499326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.499435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.499484] page_type: f5(slab) [ 18.499522] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.499783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.499825] page dumped because: kasan: bad access detected [ 18.499854] [ 18.499872] Memory state around the buggy address: [ 18.499920] fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.499962] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500003] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.500058] ^ [ 18.500099] fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500140] fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500178] ================================================================== [ 18.485014] ================================================================== [ 18.485106] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.485158] Read of size 1 at addr fff00000c65b1600 by task kunit_try_catch/196 [ 18.485235] [ 18.485267] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.485446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.485487] Hardware name: linux,dummy-virt (DT) [ 18.485583] Call trace: [ 18.485624] show_stack+0x20/0x38 (C) [ 18.485729] dump_stack_lvl+0x8c/0xd0 [ 18.485815] print_report+0x118/0x608 [ 18.485861] kasan_report+0xdc/0x128 [ 18.485905] __kasan_check_byte+0x54/0x70 [ 18.485951] ksize+0x30/0x88 [ 18.485994] ksize_uaf+0x168/0x5f8 [ 18.486051] kunit_try_run_case+0x170/0x3f0 [ 18.486117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.486170] kthread+0x328/0x630 [ 18.486212] ret_from_fork+0x10/0x20 [ 18.486349] [ 18.486376] Allocated by task 196: [ 18.486403] kasan_save_stack+0x3c/0x68 [ 18.486462] kasan_save_track+0x20/0x40 [ 18.486498] kasan_save_alloc_info+0x40/0x58 [ 18.486551] __kasan_kmalloc+0xd4/0xd8 [ 18.486655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.486712] ksize_uaf+0xb8/0x5f8 [ 18.486747] kunit_try_run_case+0x170/0x3f0 [ 18.486785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.486828] kthread+0x328/0x630 [ 18.486893] ret_from_fork+0x10/0x20 [ 18.486929] [ 18.486947] Freed by task 196: [ 18.486988] kasan_save_stack+0x3c/0x68 [ 18.487026] kasan_save_track+0x20/0x40 [ 18.487062] kasan_save_free_info+0x4c/0x78 [ 18.487204] __kasan_slab_free+0x6c/0x98 [ 18.487259] kfree+0x214/0x3c8 [ 18.487387] ksize_uaf+0x11c/0x5f8 [ 18.487451] kunit_try_run_case+0x170/0x3f0 [ 18.487587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.487678] kthread+0x328/0x630 [ 18.487822] ret_from_fork+0x10/0x20 [ 18.487890] [ 18.487912] The buggy address belongs to the object at fff00000c65b1600 [ 18.487912] which belongs to the cache kmalloc-128 of size 128 [ 18.487970] The buggy address is located 0 bytes inside of [ 18.487970] freed 128-byte region [fff00000c65b1600, fff00000c65b1680) [ 18.488049] [ 18.488071] The buggy address belongs to the physical page: [ 18.488102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.488156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.488390] page_type: f5(slab) [ 18.488503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.488582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.488709] page dumped because: kasan: bad access detected [ 18.488829] [ 18.488933] Memory state around the buggy address: [ 18.489072] fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.489134] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489288] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.489541] ^ [ 18.489634] fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489789] fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489891] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
Automatically assigned
[ 18.472862] ================================================================== [ 18.472934] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.472999] Read of size 1 at addr fff00000c65b1578 by task kunit_try_catch/194 [ 18.473063] [ 18.473113] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.473214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.473243] Hardware name: linux,dummy-virt (DT) [ 18.473275] Call trace: [ 18.473295] show_stack+0x20/0x38 (C) [ 18.473407] dump_stack_lvl+0x8c/0xd0 [ 18.473527] print_report+0x118/0x608 [ 18.473596] kasan_report+0xdc/0x128 [ 18.473672] __asan_report_load1_noabort+0x20/0x30 [ 18.473739] ksize_unpoisons_memory+0x618/0x740 [ 18.473807] kunit_try_run_case+0x170/0x3f0 [ 18.473880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.473933] kthread+0x328/0x630 [ 18.473999] ret_from_fork+0x10/0x20 [ 18.474046] [ 18.474065] Allocated by task 194: [ 18.474193] kasan_save_stack+0x3c/0x68 [ 18.474341] kasan_save_track+0x20/0x40 [ 18.474378] kasan_save_alloc_info+0x40/0x58 [ 18.474414] __kasan_kmalloc+0xd4/0xd8 [ 18.474460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.474518] ksize_unpoisons_memory+0xc0/0x740 [ 18.474575] kunit_try_run_case+0x170/0x3f0 [ 18.474642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.474736] kthread+0x328/0x630 [ 18.474769] ret_from_fork+0x10/0x20 [ 18.474802] [ 18.474827] The buggy address belongs to the object at fff00000c65b1500 [ 18.474827] which belongs to the cache kmalloc-128 of size 128 [ 18.475023] The buggy address is located 5 bytes to the right of [ 18.475023] allocated 115-byte region [fff00000c65b1500, fff00000c65b1573) [ 18.475098] [ 18.475204] The buggy address belongs to the physical page: [ 18.475253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.475321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.475376] page_type: f5(slab) [ 18.475445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.475603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.475713] page dumped because: kasan: bad access detected [ 18.475745] [ 18.475763] Memory state around the buggy address: [ 18.475794] fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.475857] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.475900] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.475938] ^ [ 18.475977] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.476040] fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.476227] ================================================================== [ 18.477353] ================================================================== [ 18.477409] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.477491] Read of size 1 at addr fff00000c65b157f by task kunit_try_catch/194 [ 18.477558] [ 18.477606] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.477696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.477724] Hardware name: linux,dummy-virt (DT) [ 18.477754] Call trace: [ 18.477880] show_stack+0x20/0x38 (C) [ 18.477939] dump_stack_lvl+0x8c/0xd0 [ 18.478000] print_report+0x118/0x608 [ 18.478045] kasan_report+0xdc/0x128 [ 18.478095] __asan_report_load1_noabort+0x20/0x30 [ 18.478144] ksize_unpoisons_memory+0x690/0x740 [ 18.478194] kunit_try_run_case+0x170/0x3f0 [ 18.478241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.478292] kthread+0x328/0x630 [ 18.478335] ret_from_fork+0x10/0x20 [ 18.478380] [ 18.478414] Allocated by task 194: [ 18.478460] kasan_save_stack+0x3c/0x68 [ 18.478500] kasan_save_track+0x20/0x40 [ 18.478545] kasan_save_alloc_info+0x40/0x58 [ 18.478581] __kasan_kmalloc+0xd4/0xd8 [ 18.478616] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.478670] ksize_unpoisons_memory+0xc0/0x740 [ 18.478706] kunit_try_run_case+0x170/0x3f0 [ 18.478744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.478786] kthread+0x328/0x630 [ 18.478817] ret_from_fork+0x10/0x20 [ 18.478852] [ 18.478875] The buggy address belongs to the object at fff00000c65b1500 [ 18.478875] which belongs to the cache kmalloc-128 of size 128 [ 18.478930] The buggy address is located 12 bytes to the right of [ 18.478930] allocated 115-byte region [fff00000c65b1500, fff00000c65b1573) [ 18.478994] [ 18.479013] The buggy address belongs to the physical page: [ 18.479052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.479103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.479150] page_type: f5(slab) [ 18.479187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.479237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.479290] page dumped because: kasan: bad access detected [ 18.479322] [ 18.479339] Memory state around the buggy address: [ 18.479405] fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.479460] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.479503] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.479542] ^ [ 18.479581] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.479623] fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.479662] ================================================================== [ 18.467730] ================================================================== [ 18.467858] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.467951] Read of size 1 at addr fff00000c65b1573 by task kunit_try_catch/194 [ 18.468085] [ 18.468175] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.468300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.468382] Hardware name: linux,dummy-virt (DT) [ 18.468497] Call trace: [ 18.468580] show_stack+0x20/0x38 (C) [ 18.468680] dump_stack_lvl+0x8c/0xd0 [ 18.468780] print_report+0x118/0x608 [ 18.468883] kasan_report+0xdc/0x128 [ 18.468930] __asan_report_load1_noabort+0x20/0x30 [ 18.469006] ksize_unpoisons_memory+0x628/0x740 [ 18.469055] kunit_try_run_case+0x170/0x3f0 [ 18.469104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.469288] kthread+0x328/0x630 [ 18.469334] ret_from_fork+0x10/0x20 [ 18.469383] [ 18.469402] Allocated by task 194: [ 18.469516] kasan_save_stack+0x3c/0x68 [ 18.469590] kasan_save_track+0x20/0x40 [ 18.469628] kasan_save_alloc_info+0x40/0x58 [ 18.469712] __kasan_kmalloc+0xd4/0xd8 [ 18.469800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.469862] ksize_unpoisons_memory+0xc0/0x740 [ 18.469939] kunit_try_run_case+0x170/0x3f0 [ 18.470035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.470077] kthread+0x328/0x630 [ 18.470155] ret_from_fork+0x10/0x20 [ 18.470299] [ 18.470320] The buggy address belongs to the object at fff00000c65b1500 [ 18.470320] which belongs to the cache kmalloc-128 of size 128 [ 18.470399] The buggy address is located 0 bytes to the right of [ 18.470399] allocated 115-byte region [fff00000c65b1500, fff00000c65b1573) [ 18.470510] [ 18.470558] The buggy address belongs to the physical page: [ 18.470630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.470716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.470824] page_type: f5(slab) [ 18.470904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.470956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.470996] page dumped because: kasan: bad access detected [ 18.471275] [ 18.471337] Memory state around the buggy address: [ 18.471471] fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.471555] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471597] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.471636] ^ [ 18.471702] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471745] fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471785] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
Automatically assigned
[ 18.454883] ================================================================== [ 18.454957] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 18.455051] Free of addr fff00000c4473be0 by task kunit_try_catch/192 [ 18.455145] [ 18.455194] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.455303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.455329] Hardware name: linux,dummy-virt (DT) [ 18.455445] Call trace: [ 18.455491] show_stack+0x20/0x38 (C) [ 18.455541] dump_stack_lvl+0x8c/0xd0 [ 18.455588] print_report+0x118/0x608 [ 18.455805] kasan_report_invalid_free+0xc0/0xe8 [ 18.455860] check_slab_allocation+0xd4/0x108 [ 18.455920] __kasan_slab_pre_free+0x2c/0x48 [ 18.455992] kfree+0xe8/0x3c8 [ 18.456128] kfree_sensitive+0x3c/0xb0 [ 18.456253] kmalloc_double_kzfree+0x168/0x308 [ 18.456386] kunit_try_run_case+0x170/0x3f0 [ 18.456505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.456633] kthread+0x328/0x630 [ 18.456744] ret_from_fork+0x10/0x20 [ 18.456964] [ 18.456984] Allocated by task 192: [ 18.457011] kasan_save_stack+0x3c/0x68 [ 18.457219] kasan_save_track+0x20/0x40 [ 18.457270] kasan_save_alloc_info+0x40/0x58 [ 18.457317] __kasan_kmalloc+0xd4/0xd8 [ 18.457391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.457481] kmalloc_double_kzfree+0xb8/0x308 [ 18.457625] kunit_try_run_case+0x170/0x3f0 [ 18.457716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.457812] kthread+0x328/0x630 [ 18.457949] ret_from_fork+0x10/0x20 [ 18.458012] [ 18.458056] Freed by task 192: [ 18.458142] kasan_save_stack+0x3c/0x68 [ 18.458234] kasan_save_track+0x20/0x40 [ 18.458311] kasan_save_free_info+0x4c/0x78 [ 18.458366] __kasan_slab_free+0x6c/0x98 [ 18.458663] kfree+0x214/0x3c8 [ 18.458714] kfree_sensitive+0x80/0xb0 [ 18.458784] kmalloc_double_kzfree+0x11c/0x308 [ 18.458939] kunit_try_run_case+0x170/0x3f0 [ 18.459030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.459191] kthread+0x328/0x630 [ 18.459271] ret_from_fork+0x10/0x20 [ 18.459452] [ 18.459523] The buggy address belongs to the object at fff00000c4473be0 [ 18.459523] which belongs to the cache kmalloc-16 of size 16 [ 18.459623] The buggy address is located 0 bytes inside of [ 18.459623] 16-byte region [fff00000c4473be0, fff00000c4473bf0) [ 18.459682] [ 18.459710] The buggy address belongs to the physical page: [ 18.459741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 18.459962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.460152] page_type: f5(slab) [ 18.460296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.460399] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.460537] page dumped because: kasan: bad access detected [ 18.460649] [ 18.460764] Memory state around the buggy address: [ 18.460837] fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.460941] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.461067] >fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.461130] ^ [ 18.461168] fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.461219] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.461367] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
Automatically assigned
[ 18.450420] ================================================================== [ 18.450500] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 18.450567] Read of size 1 at addr fff00000c4473be0 by task kunit_try_catch/192 [ 18.450630] [ 18.450676] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.450766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.450793] Hardware name: linux,dummy-virt (DT) [ 18.450834] Call trace: [ 18.450868] show_stack+0x20/0x38 (C) [ 18.450919] dump_stack_lvl+0x8c/0xd0 [ 18.450968] print_report+0x118/0x608 [ 18.451015] kasan_report+0xdc/0x128 [ 18.451061] __kasan_check_byte+0x54/0x70 [ 18.451118] kfree_sensitive+0x30/0xb0 [ 18.451165] kmalloc_double_kzfree+0x168/0x308 [ 18.451217] kunit_try_run_case+0x170/0x3f0 [ 18.451267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.451319] kthread+0x328/0x630 [ 18.451410] ret_from_fork+0x10/0x20 [ 18.451471] [ 18.451489] Allocated by task 192: [ 18.451518] kasan_save_stack+0x3c/0x68 [ 18.451558] kasan_save_track+0x20/0x40 [ 18.451596] kasan_save_alloc_info+0x40/0x58 [ 18.451669] __kasan_kmalloc+0xd4/0xd8 [ 18.451709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.451759] kmalloc_double_kzfree+0xb8/0x308 [ 18.451798] kunit_try_run_case+0x170/0x3f0 [ 18.451835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.451904] kthread+0x328/0x630 [ 18.451937] ret_from_fork+0x10/0x20 [ 18.451984] [ 18.452002] Freed by task 192: [ 18.452030] kasan_save_stack+0x3c/0x68 [ 18.452069] kasan_save_track+0x20/0x40 [ 18.452131] kasan_save_free_info+0x4c/0x78 [ 18.452170] __kasan_slab_free+0x6c/0x98 [ 18.452490] kfree+0x214/0x3c8 [ 18.452528] kfree_sensitive+0x80/0xb0 [ 18.452564] kmalloc_double_kzfree+0x11c/0x308 [ 18.452601] kunit_try_run_case+0x170/0x3f0 [ 18.452639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452683] kthread+0x328/0x630 [ 18.452714] ret_from_fork+0x10/0x20 [ 18.452748] [ 18.452769] The buggy address belongs to the object at fff00000c4473be0 [ 18.452769] which belongs to the cache kmalloc-16 of size 16 [ 18.452832] The buggy address is located 0 bytes inside of [ 18.452832] freed 16-byte region [fff00000c4473be0, fff00000c4473bf0) [ 18.452892] [ 18.452913] The buggy address belongs to the physical page: [ 18.452946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 18.452998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.453050] page_type: f5(slab) [ 18.453091] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.453140] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.453180] page dumped because: kasan: bad access detected [ 18.453212] [ 18.453229] Memory state around the buggy address: [ 18.453263] fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.453306] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.453348] >fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.453386] ^ [ 18.453433] fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.453514] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.453574] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
Automatically assigned
[ 18.429968] ================================================================== [ 18.430042] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 18.430109] Read of size 1 at addr fff00000c65b5e28 by task kunit_try_catch/188 [ 18.430160] [ 18.430199] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.430286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.430314] Hardware name: linux,dummy-virt (DT) [ 18.430346] Call trace: [ 18.430369] show_stack+0x20/0x38 (C) [ 18.430420] dump_stack_lvl+0x8c/0xd0 [ 18.433986] print_report+0x118/0x608 [ 18.434036] kasan_report+0xdc/0x128 [ 18.434083] __asan_report_load1_noabort+0x20/0x30 [ 18.434133] kmalloc_uaf2+0x3f4/0x468 [ 18.434179] kunit_try_run_case+0x170/0x3f0 [ 18.434234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.434287] kthread+0x328/0x630 [ 18.434335] ret_from_fork+0x10/0x20 [ 18.434386] [ 18.434406] Allocated by task 188: [ 18.434695] kasan_save_stack+0x3c/0x68 [ 18.434815] kasan_save_track+0x20/0x40 [ 18.434914] kasan_save_alloc_info+0x40/0x58 [ 18.434969] __kasan_kmalloc+0xd4/0xd8 [ 18.435058] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.435197] kmalloc_uaf2+0xc4/0x468 [ 18.435275] kunit_try_run_case+0x170/0x3f0 [ 18.435550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.435685] kthread+0x328/0x630 [ 18.435744] ret_from_fork+0x10/0x20 [ 18.435826] [ 18.435934] Freed by task 188: [ 18.436016] kasan_save_stack+0x3c/0x68 [ 18.436055] kasan_save_track+0x20/0x40 [ 18.436092] kasan_save_free_info+0x4c/0x78 [ 18.436136] __kasan_slab_free+0x6c/0x98 [ 18.436173] kfree+0x214/0x3c8 [ 18.436207] kmalloc_uaf2+0x134/0x468 [ 18.436240] kunit_try_run_case+0x170/0x3f0 [ 18.436311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.436388] kthread+0x328/0x630 [ 18.436419] ret_from_fork+0x10/0x20 [ 18.436502] [ 18.436524] The buggy address belongs to the object at fff00000c65b5e00 [ 18.436524] which belongs to the cache kmalloc-64 of size 64 [ 18.436582] The buggy address is located 40 bytes inside of [ 18.436582] freed 64-byte region [fff00000c65b5e00, fff00000c65b5e40) [ 18.436642] [ 18.436664] The buggy address belongs to the physical page: [ 18.436696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5 [ 18.436812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.436888] page_type: f5(slab) [ 18.436929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.436981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.437023] page dumped because: kasan: bad access detected [ 18.437054] [ 18.437072] Memory state around the buggy address: [ 18.437165] fff00000c65b5d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.437254] fff00000c65b5d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.437328] >fff00000c65b5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.437377] ^ [ 18.437409] fff00000c65b5e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 18.437470] fff00000c65b5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.437510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
Automatically assigned
[ 18.418172] ================================================================== [ 18.418254] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 18.418315] Write of size 33 at addr fff00000c65b5c80 by task kunit_try_catch/186 [ 18.418380] [ 18.418442] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.418531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.418557] Hardware name: linux,dummy-virt (DT) [ 18.418589] Call trace: [ 18.418620] show_stack+0x20/0x38 (C) [ 18.418671] dump_stack_lvl+0x8c/0xd0 [ 18.418720] print_report+0x118/0x608 [ 18.418768] kasan_report+0xdc/0x128 [ 18.418812] kasan_check_range+0x100/0x1a8 [ 18.418861] __asan_memset+0x34/0x78 [ 18.418987] kmalloc_uaf_memset+0x170/0x310 [ 18.419078] kunit_try_run_case+0x170/0x3f0 [ 18.419156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.419211] kthread+0x328/0x630 [ 18.419273] ret_from_fork+0x10/0x20 [ 18.419329] [ 18.419374] Allocated by task 186: [ 18.419404] kasan_save_stack+0x3c/0x68 [ 18.419483] kasan_save_track+0x20/0x40 [ 18.419524] kasan_save_alloc_info+0x40/0x58 [ 18.419592] __kasan_kmalloc+0xd4/0xd8 [ 18.419631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.419671] kmalloc_uaf_memset+0xb8/0x310 [ 18.419706] kunit_try_run_case+0x170/0x3f0 [ 18.419795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.419939] kthread+0x328/0x630 [ 18.420026] ret_from_fork+0x10/0x20 [ 18.420138] [ 18.420200] Freed by task 186: [ 18.420247] kasan_save_stack+0x3c/0x68 [ 18.420285] kasan_save_track+0x20/0x40 [ 18.420320] kasan_save_free_info+0x4c/0x78 [ 18.420382] __kasan_slab_free+0x6c/0x98 [ 18.420433] kfree+0x214/0x3c8 [ 18.420465] kmalloc_uaf_memset+0x11c/0x310 [ 18.420502] kunit_try_run_case+0x170/0x3f0 [ 18.420619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.420662] kthread+0x328/0x630 [ 18.420746] ret_from_fork+0x10/0x20 [ 18.420805] [ 18.420893] The buggy address belongs to the object at fff00000c65b5c80 [ 18.420893] which belongs to the cache kmalloc-64 of size 64 [ 18.420978] The buggy address is located 0 bytes inside of [ 18.420978] freed 64-byte region [fff00000c65b5c80, fff00000c65b5cc0) [ 18.421106] [ 18.421170] The buggy address belongs to the physical page: [ 18.421221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5 [ 18.421327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.421400] page_type: f5(slab) [ 18.421451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.421541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.421802] page dumped because: kasan: bad access detected [ 18.421873] [ 18.421945] Memory state around the buggy address: [ 18.422030] fff00000c65b5b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.422131] fff00000c65b5c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.422184] >fff00000c65b5c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.422230] ^ [ 18.422533] fff00000c65b5d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.422635] fff00000c65b5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.422742] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
Automatically assigned
[ 18.406266] ================================================================== [ 18.406337] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 18.406395] Read of size 1 at addr fff00000c4473bc8 by task kunit_try_catch/184 [ 18.406460] [ 18.406510] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.406598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.406625] Hardware name: linux,dummy-virt (DT) [ 18.406655] Call trace: [ 18.406676] show_stack+0x20/0x38 (C) [ 18.406725] dump_stack_lvl+0x8c/0xd0 [ 18.406849] print_report+0x118/0x608 [ 18.406905] kasan_report+0xdc/0x128 [ 18.406978] __asan_report_load1_noabort+0x20/0x30 [ 18.407066] kmalloc_uaf+0x300/0x338 [ 18.407111] kunit_try_run_case+0x170/0x3f0 [ 18.407177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.407239] kthread+0x328/0x630 [ 18.407283] ret_from_fork+0x10/0x20 [ 18.407330] [ 18.407347] Allocated by task 184: [ 18.407394] kasan_save_stack+0x3c/0x68 [ 18.407444] kasan_save_track+0x20/0x40 [ 18.407659] kasan_save_alloc_info+0x40/0x58 [ 18.407728] __kasan_kmalloc+0xd4/0xd8 [ 18.407812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.407921] kmalloc_uaf+0xb8/0x338 [ 18.407976] kunit_try_run_case+0x170/0x3f0 [ 18.408014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.408058] kthread+0x328/0x630 [ 18.408113] ret_from_fork+0x10/0x20 [ 18.408151] [ 18.408172] Freed by task 184: [ 18.408198] kasan_save_stack+0x3c/0x68 [ 18.408234] kasan_save_track+0x20/0x40 [ 18.408537] kasan_save_free_info+0x4c/0x78 [ 18.408607] __kasan_slab_free+0x6c/0x98 [ 18.408733] kfree+0x214/0x3c8 [ 18.408802] kmalloc_uaf+0x11c/0x338 [ 18.408865] kunit_try_run_case+0x170/0x3f0 [ 18.408928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.408991] kthread+0x328/0x630 [ 18.409300] ret_from_fork+0x10/0x20 [ 18.409399] [ 18.409514] The buggy address belongs to the object at fff00000c4473bc0 [ 18.409514] which belongs to the cache kmalloc-16 of size 16 [ 18.409644] The buggy address is located 8 bytes inside of [ 18.409644] freed 16-byte region [fff00000c4473bc0, fff00000c4473bd0) [ 18.409714] [ 18.409735] The buggy address belongs to the physical page: [ 18.409767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 18.409817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.409867] page_type: f5(slab) [ 18.409907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.410065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.410134] page dumped because: kasan: bad access detected [ 18.410176] [ 18.410218] Memory state around the buggy address: [ 18.410331] fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.410469] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.410513] >fff00000c4473b80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 18.410551] ^ [ 18.410586] fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.410629] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.410667] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
Automatically assigned
[ 18.394341] ================================================================== [ 18.394401] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 18.394473] Read of size 64 at addr fff00000c65b5984 by task kunit_try_catch/182 [ 18.394521] [ 18.394553] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.394795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.394853] Hardware name: linux,dummy-virt (DT) [ 18.394891] Call trace: [ 18.394913] show_stack+0x20/0x38 (C) [ 18.394964] dump_stack_lvl+0x8c/0xd0 [ 18.395017] print_report+0x118/0x608 [ 18.395065] kasan_report+0xdc/0x128 [ 18.395110] kasan_check_range+0x100/0x1a8 [ 18.395157] __asan_memmove+0x3c/0x98 [ 18.395201] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 18.395252] kunit_try_run_case+0x170/0x3f0 [ 18.395453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.395545] kthread+0x328/0x630 [ 18.395614] ret_from_fork+0x10/0x20 [ 18.395761] [ 18.395799] Allocated by task 182: [ 18.395826] kasan_save_stack+0x3c/0x68 [ 18.395868] kasan_save_track+0x20/0x40 [ 18.395905] kasan_save_alloc_info+0x40/0x58 [ 18.395942] __kasan_kmalloc+0xd4/0xd8 [ 18.395979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.396045] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 18.396088] kunit_try_run_case+0x170/0x3f0 [ 18.396128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.396171] kthread+0x328/0x630 [ 18.396204] ret_from_fork+0x10/0x20 [ 18.396238] [ 18.396257] The buggy address belongs to the object at fff00000c65b5980 [ 18.396257] which belongs to the cache kmalloc-64 of size 64 [ 18.396409] The buggy address is located 4 bytes inside of [ 18.396409] allocated 64-byte region [fff00000c65b5980, fff00000c65b59c0) [ 18.396537] [ 18.396590] The buggy address belongs to the physical page: [ 18.396704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5 [ 18.396805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.396950] page_type: f5(slab) [ 18.397040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.397156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.397259] page dumped because: kasan: bad access detected [ 18.397312] [ 18.397332] Memory state around the buggy address: [ 18.397583] fff00000c65b5880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.397669] fff00000c65b5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.397798] >fff00000c65b5980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.397932] ^ [ 18.398018] fff00000c65b5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.398089] fff00000c65b5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.398168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
Automatically assigned
[ 18.383567] ================================================================== [ 18.383788] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.383846] Read of size 18446744073709551614 at addr fff00000c65b5784 by task kunit_try_catch/180 [ 18.383952] [ 18.383985] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.384070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.384095] Hardware name: linux,dummy-virt (DT) [ 18.384125] Call trace: [ 18.384147] show_stack+0x20/0x38 (C) [ 18.384335] dump_stack_lvl+0x8c/0xd0 [ 18.384400] print_report+0x118/0x608 [ 18.385352] kasan_report+0xdc/0x128 [ 18.385413] kasan_check_range+0x100/0x1a8 [ 18.385475] __asan_memmove+0x3c/0x98 [ 18.385523] kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.385589] kunit_try_run_case+0x170/0x3f0 [ 18.385644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.385729] kthread+0x328/0x630 [ 18.385775] ret_from_fork+0x10/0x20 [ 18.385825] [ 18.385844] Allocated by task 180: [ 18.385872] kasan_save_stack+0x3c/0x68 [ 18.385927] kasan_save_track+0x20/0x40 [ 18.385966] kasan_save_alloc_info+0x40/0x58 [ 18.386001] __kasan_kmalloc+0xd4/0xd8 [ 18.386038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.386085] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 18.386125] kunit_try_run_case+0x170/0x3f0 [ 18.386169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.386213] kthread+0x328/0x630 [ 18.386257] ret_from_fork+0x10/0x20 [ 18.386294] [ 18.386313] The buggy address belongs to the object at fff00000c65b5780 [ 18.386313] which belongs to the cache kmalloc-64 of size 64 [ 18.386371] The buggy address is located 4 bytes inside of [ 18.386371] 64-byte region [fff00000c65b5780, fff00000c65b57c0) [ 18.386827] [ 18.386909] The buggy address belongs to the physical page: [ 18.386984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b5 [ 18.387046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.387298] page_type: f5(slab) [ 18.387344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.387468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.387560] page dumped because: kasan: bad access detected [ 18.387644] [ 18.387682] Memory state around the buggy address: [ 18.387735] fff00000c65b5680: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 18.387834] fff00000c65b5700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.387877] >fff00000c65b5780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.387963] ^ [ 18.388073] fff00000c65b5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.388182] fff00000c65b5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.388275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
Automatically assigned
[ 18.374121] ================================================================== [ 18.374196] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 18.374250] Write of size 16 at addr fff00000c65b1469 by task kunit_try_catch/178 [ 18.374349] [ 18.374388] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.374495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.374536] Hardware name: linux,dummy-virt (DT) [ 18.374566] Call trace: [ 18.374588] show_stack+0x20/0x38 (C) [ 18.374666] dump_stack_lvl+0x8c/0xd0 [ 18.374817] print_report+0x118/0x608 [ 18.374952] kasan_report+0xdc/0x128 [ 18.375022] kasan_check_range+0x100/0x1a8 [ 18.375088] __asan_memset+0x34/0x78 [ 18.375130] kmalloc_oob_memset_16+0x150/0x2f8 [ 18.375176] kunit_try_run_case+0x170/0x3f0 [ 18.375244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.375316] kthread+0x328/0x630 [ 18.375392] ret_from_fork+0x10/0x20 [ 18.375457] [ 18.375475] Allocated by task 178: [ 18.375503] kasan_save_stack+0x3c/0x68 [ 18.375542] kasan_save_track+0x20/0x40 [ 18.375580] kasan_save_alloc_info+0x40/0x58 [ 18.375615] __kasan_kmalloc+0xd4/0xd8 [ 18.375894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.376031] kmalloc_oob_memset_16+0xb0/0x2f8 [ 18.376102] kunit_try_run_case+0x170/0x3f0 [ 18.376216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.376259] kthread+0x328/0x630 [ 18.376325] ret_from_fork+0x10/0x20 [ 18.376570] [ 18.376662] The buggy address belongs to the object at fff00000c65b1400 [ 18.376662] which belongs to the cache kmalloc-128 of size 128 [ 18.376769] The buggy address is located 105 bytes inside of [ 18.376769] allocated 120-byte region [fff00000c65b1400, fff00000c65b1478) [ 18.376900] [ 18.376956] The buggy address belongs to the physical page: [ 18.376988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.377219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.377334] page_type: f5(slab) [ 18.377471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.377558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.377825] page dumped because: kasan: bad access detected [ 18.377862] [ 18.377880] Memory state around the buggy address: [ 18.377965] fff00000c65b1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.378048] fff00000c65b1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378119] >fff00000c65b1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.378198] ^ [ 18.378291] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378349] fff00000c65b1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378400] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
Automatically assigned
[ 18.365000] ================================================================== [ 18.365076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 18.365128] Write of size 8 at addr fff00000c65b1371 by task kunit_try_catch/176 [ 18.365240] [ 18.365299] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.365407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.365492] Hardware name: linux,dummy-virt (DT) [ 18.365527] Call trace: [ 18.365567] show_stack+0x20/0x38 (C) [ 18.365633] dump_stack_lvl+0x8c/0xd0 [ 18.365685] print_report+0x118/0x608 [ 18.365731] kasan_report+0xdc/0x128 [ 18.365775] kasan_check_range+0x100/0x1a8 [ 18.365822] __asan_memset+0x34/0x78 [ 18.365863] kmalloc_oob_memset_8+0x150/0x2f8 [ 18.366181] kunit_try_run_case+0x170/0x3f0 [ 18.366254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.366323] kthread+0x328/0x630 [ 18.366396] ret_from_fork+0x10/0x20 [ 18.366513] [ 18.366552] Allocated by task 176: [ 18.366600] kasan_save_stack+0x3c/0x68 [ 18.366646] kasan_save_track+0x20/0x40 [ 18.366747] kasan_save_alloc_info+0x40/0x58 [ 18.366783] __kasan_kmalloc+0xd4/0xd8 [ 18.366819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.366856] kmalloc_oob_memset_8+0xb0/0x2f8 [ 18.366911] kunit_try_run_case+0x170/0x3f0 [ 18.366988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.367030] kthread+0x328/0x630 [ 18.367061] ret_from_fork+0x10/0x20 [ 18.367115] [ 18.367151] The buggy address belongs to the object at fff00000c65b1300 [ 18.367151] which belongs to the cache kmalloc-128 of size 128 [ 18.367299] The buggy address is located 113 bytes inside of [ 18.367299] allocated 120-byte region [fff00000c65b1300, fff00000c65b1378) [ 18.367746] [ 18.367780] The buggy address belongs to the physical page: [ 18.367840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.368066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.368145] page_type: f5(slab) [ 18.368186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.368244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.368283] page dumped because: kasan: bad access detected [ 18.368334] [ 18.368362] Memory state around the buggy address: [ 18.368402] fff00000c65b1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.368454] fff00000c65b1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.368495] >fff00000c65b1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.368540] ^ [ 18.368607] fff00000c65b1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.368656] fff00000c65b1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.368694] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
Automatically assigned
[ 18.357356] ================================================================== [ 18.357446] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 18.357519] Write of size 4 at addr fff00000c65b1275 by task kunit_try_catch/174 [ 18.357585] [ 18.357618] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.357720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.357746] Hardware name: linux,dummy-virt (DT) [ 18.357796] Call trace: [ 18.357846] show_stack+0x20/0x38 (C) [ 18.357894] dump_stack_lvl+0x8c/0xd0 [ 18.357941] print_report+0x118/0x608 [ 18.357987] kasan_report+0xdc/0x128 [ 18.358032] kasan_check_range+0x100/0x1a8 [ 18.358079] __asan_memset+0x34/0x78 [ 18.358121] kmalloc_oob_memset_4+0x150/0x300 [ 18.358248] kunit_try_run_case+0x170/0x3f0 [ 18.358301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.358364] kthread+0x328/0x630 [ 18.358407] ret_from_fork+0x10/0x20 [ 18.358468] [ 18.358485] Allocated by task 174: [ 18.358512] kasan_save_stack+0x3c/0x68 [ 18.358551] kasan_save_track+0x20/0x40 [ 18.358667] kasan_save_alloc_info+0x40/0x58 [ 18.358702] __kasan_kmalloc+0xd4/0xd8 [ 18.358738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.358816] kmalloc_oob_memset_4+0xb0/0x300 [ 18.358876] kunit_try_run_case+0x170/0x3f0 [ 18.358914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.358993] kthread+0x328/0x630 [ 18.359025] ret_from_fork+0x10/0x20 [ 18.359060] [ 18.359080] The buggy address belongs to the object at fff00000c65b1200 [ 18.359080] which belongs to the cache kmalloc-128 of size 128 [ 18.359134] The buggy address is located 117 bytes inside of [ 18.359134] allocated 120-byte region [fff00000c65b1200, fff00000c65b1278) [ 18.359194] [ 18.359213] The buggy address belongs to the physical page: [ 18.359242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.359290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.359338] page_type: f5(slab) [ 18.359523] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.359618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.359717] page dumped because: kasan: bad access detected [ 18.359787] [ 18.359870] Memory state around the buggy address: [ 18.359963] fff00000c65b1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.360020] fff00000c65b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.360113] >fff00000c65b1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.360232] ^ [ 18.360300] fff00000c65b1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.360357] fff00000c65b1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.360393] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
Automatically assigned
[ 18.346930] ================================================================== [ 18.347017] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 18.347071] Write of size 2 at addr fff00000c65b1177 by task kunit_try_catch/172 [ 18.347339] [ 18.347472] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.347601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.347651] Hardware name: linux,dummy-virt (DT) [ 18.347743] Call trace: [ 18.347812] show_stack+0x20/0x38 (C) [ 18.347932] dump_stack_lvl+0x8c/0xd0 [ 18.348045] print_report+0x118/0x608 [ 18.348159] kasan_report+0xdc/0x128 [ 18.348260] kasan_check_range+0x100/0x1a8 [ 18.348309] __asan_memset+0x34/0x78 [ 18.348377] kmalloc_oob_memset_2+0x150/0x2f8 [ 18.348434] kunit_try_run_case+0x170/0x3f0 [ 18.348685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.348780] kthread+0x328/0x630 [ 18.348900] ret_from_fork+0x10/0x20 [ 18.348968] [ 18.348998] Allocated by task 172: [ 18.349263] kasan_save_stack+0x3c/0x68 [ 18.349360] kasan_save_track+0x20/0x40 [ 18.349462] kasan_save_alloc_info+0x40/0x58 [ 18.349585] __kasan_kmalloc+0xd4/0xd8 [ 18.349656] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.349758] kmalloc_oob_memset_2+0xb0/0x2f8 [ 18.349868] kunit_try_run_case+0x170/0x3f0 [ 18.349985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.350084] kthread+0x328/0x630 [ 18.350221] ret_from_fork+0x10/0x20 [ 18.350312] [ 18.350415] The buggy address belongs to the object at fff00000c65b1100 [ 18.350415] which belongs to the cache kmalloc-128 of size 128 [ 18.350522] The buggy address is located 119 bytes inside of [ 18.350522] allocated 120-byte region [fff00000c65b1100, fff00000c65b1178) [ 18.350867] [ 18.350930] The buggy address belongs to the physical page: [ 18.350992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.351043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.351125] page_type: f5(slab) [ 18.351250] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.351341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.351500] page dumped because: kasan: bad access detected [ 18.351634] [ 18.351728] Memory state around the buggy address: [ 18.351771] fff00000c65b1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.351839] fff00000c65b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.351880] >fff00000c65b1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.351935] ^ [ 18.351974] fff00000c65b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.352014] fff00000c65b1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.352050] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
Automatically assigned
[ 18.339095] ================================================================== [ 18.339152] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 18.339205] Write of size 128 at addr fff00000c65b1000 by task kunit_try_catch/170 [ 18.339254] [ 18.339287] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.339542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.339622] Hardware name: linux,dummy-virt (DT) [ 18.339726] Call trace: [ 18.339777] show_stack+0x20/0x38 (C) [ 18.339904] dump_stack_lvl+0x8c/0xd0 [ 18.339968] print_report+0x118/0x608 [ 18.340016] kasan_report+0xdc/0x128 [ 18.340061] kasan_check_range+0x100/0x1a8 [ 18.340109] __asan_memset+0x34/0x78 [ 18.340150] kmalloc_oob_in_memset+0x144/0x2d0 [ 18.340221] kunit_try_run_case+0x170/0x3f0 [ 18.340270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.340323] kthread+0x328/0x630 [ 18.340368] ret_from_fork+0x10/0x20 [ 18.340534] [ 18.340597] Allocated by task 170: [ 18.340707] kasan_save_stack+0x3c/0x68 [ 18.340778] kasan_save_track+0x20/0x40 [ 18.340823] kasan_save_alloc_info+0x40/0x58 [ 18.340859] __kasan_kmalloc+0xd4/0xd8 [ 18.340895] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.340934] kmalloc_oob_in_memset+0xb0/0x2d0 [ 18.340970] kunit_try_run_case+0x170/0x3f0 [ 18.341008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.341050] kthread+0x328/0x630 [ 18.341083] ret_from_fork+0x10/0x20 [ 18.341133] [ 18.341154] The buggy address belongs to the object at fff00000c65b1000 [ 18.341154] which belongs to the cache kmalloc-128 of size 128 [ 18.341216] The buggy address is located 0 bytes inside of [ 18.341216] allocated 120-byte region [fff00000c65b1000, fff00000c65b1078) [ 18.341284] [ 18.341303] The buggy address belongs to the physical page: [ 18.341334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.341382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.341450] page_type: f5(slab) [ 18.341487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.341545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.341583] page dumped because: kasan: bad access detected [ 18.341615] [ 18.341645] Memory state around the buggy address: [ 18.341685] fff00000c65b0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.341725] fff00000c65b0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.341767] >fff00000c65b1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.341803] ^ [ 18.341843] fff00000c65b1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.341891] fff00000c65b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.341929] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
Automatically assigned
[ 18.329333] ================================================================== [ 18.329522] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 18.329623] Read of size 16 at addr fff00000c4473ba0 by task kunit_try_catch/168 [ 18.329679] [ 18.329736] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.329837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.329864] Hardware name: linux,dummy-virt (DT) [ 18.329903] Call trace: [ 18.329942] show_stack+0x20/0x38 (C) [ 18.330009] dump_stack_lvl+0x8c/0xd0 [ 18.330057] print_report+0x118/0x608 [ 18.330103] kasan_report+0xdc/0x128 [ 18.330148] __asan_report_load16_noabort+0x20/0x30 [ 18.330195] kmalloc_uaf_16+0x3bc/0x438 [ 18.330238] kunit_try_run_case+0x170/0x3f0 [ 18.330285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.330336] kthread+0x328/0x630 [ 18.330379] ret_from_fork+0x10/0x20 [ 18.330507] [ 18.330548] Allocated by task 168: [ 18.330597] kasan_save_stack+0x3c/0x68 [ 18.330656] kasan_save_track+0x20/0x40 [ 18.330693] kasan_save_alloc_info+0x40/0x58 [ 18.330727] __kasan_kmalloc+0xd4/0xd8 [ 18.330767] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.330970] kmalloc_uaf_16+0x140/0x438 [ 18.331032] kunit_try_run_case+0x170/0x3f0 [ 18.331080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.331150] kthread+0x328/0x630 [ 18.331190] ret_from_fork+0x10/0x20 [ 18.331247] [ 18.331266] Freed by task 168: [ 18.331292] kasan_save_stack+0x3c/0x68 [ 18.331341] kasan_save_track+0x20/0x40 [ 18.331386] kasan_save_free_info+0x4c/0x78 [ 18.331420] __kasan_slab_free+0x6c/0x98 [ 18.331466] kfree+0x214/0x3c8 [ 18.331498] kmalloc_uaf_16+0x190/0x438 [ 18.331531] kunit_try_run_case+0x170/0x3f0 [ 18.331567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.331630] kthread+0x328/0x630 [ 18.331668] ret_from_fork+0x10/0x20 [ 18.331764] [ 18.331853] The buggy address belongs to the object at fff00000c4473ba0 [ 18.331853] which belongs to the cache kmalloc-16 of size 16 [ 18.331975] The buggy address is located 0 bytes inside of [ 18.331975] freed 16-byte region [fff00000c4473ba0, fff00000c4473bb0) [ 18.332095] [ 18.332123] The buggy address belongs to the physical page: [ 18.332194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 18.332288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.332337] page_type: f5(slab) [ 18.332375] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.332434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.332473] page dumped because: kasan: bad access detected [ 18.332502] [ 18.332541] Memory state around the buggy address: [ 18.332574] fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.332615] fff00000c4473b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.332802] >fff00000c4473b80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 18.332848] ^ [ 18.332904] fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.332961] fff00000c4473c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.333063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
Automatically assigned
[ 18.319382] ================================================================== [ 18.319551] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 18.319642] Write of size 16 at addr fff00000c4473b40 by task kunit_try_catch/166 [ 18.319702] [ 18.319735] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.319831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.319894] Hardware name: linux,dummy-virt (DT) [ 18.319934] Call trace: [ 18.319957] show_stack+0x20/0x38 (C) [ 18.320006] dump_stack_lvl+0x8c/0xd0 [ 18.320073] print_report+0x118/0x608 [ 18.320121] kasan_report+0xdc/0x128 [ 18.320167] __asan_report_store16_noabort+0x20/0x30 [ 18.320224] kmalloc_oob_16+0x3a0/0x3f8 [ 18.320283] kunit_try_run_case+0x170/0x3f0 [ 18.320330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.320401] kthread+0x328/0x630 [ 18.320468] ret_from_fork+0x10/0x20 [ 18.320526] [ 18.320549] Allocated by task 166: [ 18.320577] kasan_save_stack+0x3c/0x68 [ 18.320630] kasan_save_track+0x20/0x40 [ 18.320667] kasan_save_alloc_info+0x40/0x58 [ 18.320701] __kasan_kmalloc+0xd4/0xd8 [ 18.320751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.320789] kmalloc_oob_16+0xb4/0x3f8 [ 18.320828] kunit_try_run_case+0x170/0x3f0 [ 18.320866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.320907] kthread+0x328/0x630 [ 18.320947] ret_from_fork+0x10/0x20 [ 18.320980] [ 18.320999] The buggy address belongs to the object at fff00000c4473b40 [ 18.320999] which belongs to the cache kmalloc-16 of size 16 [ 18.321063] The buggy address is located 0 bytes inside of [ 18.321063] allocated 13-byte region [fff00000c4473b40, fff00000c4473b4d) [ 18.321122] [ 18.321141] The buggy address belongs to the physical page: [ 18.321188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 18.321247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.321310] page_type: f5(slab) [ 18.321357] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.321413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.322008] page dumped because: kasan: bad access detected [ 18.322114] [ 18.322155] Memory state around the buggy address: [ 18.322266] fff00000c4473a00: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 18.322339] fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.322400] >fff00000c4473b00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 18.322488] ^ [ 18.322543] fff00000c4473b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.322634] fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.322704] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
Automatically assigned
[ 18.309173] ================================================================== [ 18.309476] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 18.309558] Read of size 1 at addr fff00000c1828a00 by task kunit_try_catch/164 [ 18.309645] [ 18.309694] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.309778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.309840] Hardware name: linux,dummy-virt (DT) [ 18.309888] Call trace: [ 18.309910] show_stack+0x20/0x38 (C) [ 18.309964] dump_stack_lvl+0x8c/0xd0 [ 18.310031] print_report+0x118/0x608 [ 18.310103] kasan_report+0xdc/0x128 [ 18.310167] __asan_report_load1_noabort+0x20/0x30 [ 18.310234] krealloc_uaf+0x4c8/0x520 [ 18.310280] kunit_try_run_case+0x170/0x3f0 [ 18.310355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.310409] kthread+0x328/0x630 [ 18.310465] ret_from_fork+0x10/0x20 [ 18.310530] [ 18.310736] Allocated by task 164: [ 18.310771] kasan_save_stack+0x3c/0x68 [ 18.310813] kasan_save_track+0x20/0x40 [ 18.310849] kasan_save_alloc_info+0x40/0x58 [ 18.310885] __kasan_kmalloc+0xd4/0xd8 [ 18.310937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.310977] krealloc_uaf+0xc8/0x520 [ 18.311027] kunit_try_run_case+0x170/0x3f0 [ 18.311095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.311139] kthread+0x328/0x630 [ 18.311199] ret_from_fork+0x10/0x20 [ 18.311254] [ 18.311272] Freed by task 164: [ 18.311298] kasan_save_stack+0x3c/0x68 [ 18.311334] kasan_save_track+0x20/0x40 [ 18.311501] kasan_save_free_info+0x4c/0x78 [ 18.311560] __kasan_slab_free+0x6c/0x98 [ 18.311597] kfree+0x214/0x3c8 [ 18.311629] krealloc_uaf+0x12c/0x520 [ 18.311683] kunit_try_run_case+0x170/0x3f0 [ 18.311720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.311762] kthread+0x328/0x630 [ 18.311794] ret_from_fork+0x10/0x20 [ 18.311828] [ 18.311847] The buggy address belongs to the object at fff00000c1828a00 [ 18.311847] which belongs to the cache kmalloc-256 of size 256 [ 18.311995] The buggy address is located 0 bytes inside of [ 18.311995] freed 256-byte region [fff00000c1828a00, fff00000c1828b00) [ 18.312114] [ 18.312183] The buggy address belongs to the physical page: [ 18.312248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.312346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.312494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.312592] page_type: f5(slab) [ 18.312666] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.312749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.312855] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.312941] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.313011] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.313071] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.313376] page dumped because: kasan: bad access detected [ 18.313482] [ 18.313598] Memory state around the buggy address: [ 18.313667] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.313740] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.313862] >fff00000c1828a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.313970] ^ [ 18.314066] fff00000c1828a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.314123] fff00000c1828b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.314231] ================================================================== [ 18.302606] ================================================================== [ 18.302683] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 18.302747] Read of size 1 at addr fff00000c1828a00 by task kunit_try_catch/164 [ 18.302798] [ 18.302839] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.303017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.303060] Hardware name: linux,dummy-virt (DT) [ 18.303090] Call trace: [ 18.303112] show_stack+0x20/0x38 (C) [ 18.303177] dump_stack_lvl+0x8c/0xd0 [ 18.303225] print_report+0x118/0x608 [ 18.303271] kasan_report+0xdc/0x128 [ 18.303328] __kasan_check_byte+0x54/0x70 [ 18.303436] krealloc_noprof+0x44/0x360 [ 18.303485] krealloc_uaf+0x180/0x520 [ 18.303728] kunit_try_run_case+0x170/0x3f0 [ 18.303794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.303869] kthread+0x328/0x630 [ 18.303916] ret_from_fork+0x10/0x20 [ 18.303965] [ 18.303984] Allocated by task 164: [ 18.304012] kasan_save_stack+0x3c/0x68 [ 18.304053] kasan_save_track+0x20/0x40 [ 18.304090] kasan_save_alloc_info+0x40/0x58 [ 18.304126] __kasan_kmalloc+0xd4/0xd8 [ 18.304268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.304340] krealloc_uaf+0xc8/0x520 [ 18.304389] kunit_try_run_case+0x170/0x3f0 [ 18.304496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304575] kthread+0x328/0x630 [ 18.304694] ret_from_fork+0x10/0x20 [ 18.304786] [ 18.304860] Freed by task 164: [ 18.304943] kasan_save_stack+0x3c/0x68 [ 18.305000] kasan_save_track+0x20/0x40 [ 18.305037] kasan_save_free_info+0x4c/0x78 [ 18.305299] __kasan_slab_free+0x6c/0x98 [ 18.305376] kfree+0x214/0x3c8 [ 18.305456] krealloc_uaf+0x12c/0x520 [ 18.305568] kunit_try_run_case+0x170/0x3f0 [ 18.305651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.305765] kthread+0x328/0x630 [ 18.305810] ret_from_fork+0x10/0x20 [ 18.305845] [ 18.305877] The buggy address belongs to the object at fff00000c1828a00 [ 18.305877] which belongs to the cache kmalloc-256 of size 256 [ 18.306266] The buggy address is located 0 bytes inside of [ 18.306266] freed 256-byte region [fff00000c1828a00, fff00000c1828b00) [ 18.306365] [ 18.306405] The buggy address belongs to the physical page: [ 18.306450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.306511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.306555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.306624] page_type: f5(slab) [ 18.306663] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.306712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.306761] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.306808] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.306863] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.306911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.306949] page dumped because: kasan: bad access detected [ 18.306980] [ 18.306997] Memory state around the buggy address: [ 18.307045] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307087] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307128] >fff00000c1828a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.307165] ^ [ 18.307201] fff00000c1828a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.307244] fff00000c1828b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307291] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
Automatically assigned
[ 18.229614] ================================================================== [ 18.229674] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.229941] Write of size 1 at addr fff00000c18288ea by task kunit_try_catch/158 [ 18.230039] [ 18.230094] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.230205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.230235] Hardware name: linux,dummy-virt (DT) [ 18.230381] Call trace: [ 18.230437] show_stack+0x20/0x38 (C) [ 18.230578] dump_stack_lvl+0x8c/0xd0 [ 18.230634] print_report+0x118/0x608 [ 18.230763] kasan_report+0xdc/0x128 [ 18.230816] __asan_report_store1_noabort+0x20/0x30 [ 18.230863] krealloc_less_oob_helper+0xae4/0xc50 [ 18.231144] krealloc_less_oob+0x20/0x38 [ 18.231230] kunit_try_run_case+0x170/0x3f0 [ 18.231319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.231470] kthread+0x328/0x630 [ 18.231515] ret_from_fork+0x10/0x20 [ 18.231826] [ 18.231892] Allocated by task 158: [ 18.231977] kasan_save_stack+0x3c/0x68 [ 18.232107] kasan_save_track+0x20/0x40 [ 18.232185] kasan_save_alloc_info+0x40/0x58 [ 18.232362] __kasan_krealloc+0x118/0x178 [ 18.232542] krealloc_noprof+0x128/0x360 [ 18.232607] krealloc_less_oob_helper+0x168/0xc50 [ 18.232728] krealloc_less_oob+0x20/0x38 [ 18.232776] kunit_try_run_case+0x170/0x3f0 [ 18.233048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.233144] kthread+0x328/0x630 [ 18.233477] ret_from_fork+0x10/0x20 [ 18.233555] [ 18.233594] The buggy address belongs to the object at fff00000c1828800 [ 18.233594] which belongs to the cache kmalloc-256 of size 256 [ 18.233818] The buggy address is located 33 bytes to the right of [ 18.233818] allocated 201-byte region [fff00000c1828800, fff00000c18288c9) [ 18.234012] [ 18.234091] The buggy address belongs to the physical page: [ 18.234169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.234221] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.234525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.234619] page_type: f5(slab) [ 18.234709] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.234761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.235097] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.235182] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.235296] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.235405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.235458] page dumped because: kasan: bad access detected [ 18.235489] [ 18.235863] Memory state around the buggy address: [ 18.236220] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236302] fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.236405] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.236492] ^ [ 18.236617] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236669] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236725] ================================================================== [ 18.290061] ================================================================== [ 18.290106] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.290155] Write of size 1 at addr fff00000c647e0ea by task kunit_try_catch/162 [ 18.290205] [ 18.290269] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.290353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.290385] Hardware name: linux,dummy-virt (DT) [ 18.290417] Call trace: [ 18.290789] show_stack+0x20/0x38 (C) [ 18.290880] dump_stack_lvl+0x8c/0xd0 [ 18.290968] print_report+0x118/0x608 [ 18.291036] kasan_report+0xdc/0x128 [ 18.291083] __asan_report_store1_noabort+0x20/0x30 [ 18.291131] krealloc_less_oob_helper+0xae4/0xc50 [ 18.291181] krealloc_large_less_oob+0x20/0x38 [ 18.291228] kunit_try_run_case+0x170/0x3f0 [ 18.291276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.291846] kthread+0x328/0x630 [ 18.291957] ret_from_fork+0x10/0x20 [ 18.292100] [ 18.292150] The buggy address belongs to the physical page: [ 18.292209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c [ 18.292299] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.292399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.292465] page_type: f8(unknown) [ 18.292503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.292553] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.292603] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.292991] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.293061] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff [ 18.293134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.293213] page dumped because: kasan: bad access detected [ 18.293279] [ 18.293343] Memory state around the buggy address: [ 18.293442] fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.293523] fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.293627] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.293719] ^ [ 18.293801] fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.293869] fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.293907] ================================================================== [ 18.214003] ================================================================== [ 18.214051] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.214282] Write of size 1 at addr fff00000c18288d0 by task kunit_try_catch/158 [ 18.214366] [ 18.214506] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.214677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.214725] Hardware name: linux,dummy-virt (DT) [ 18.214773] Call trace: [ 18.214913] show_stack+0x20/0x38 (C) [ 18.214967] dump_stack_lvl+0x8c/0xd0 [ 18.215045] print_report+0x118/0x608 [ 18.215093] kasan_report+0xdc/0x128 [ 18.215138] __asan_report_store1_noabort+0x20/0x30 [ 18.215314] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.215413] krealloc_less_oob+0x20/0x38 [ 18.215582] kunit_try_run_case+0x170/0x3f0 [ 18.215736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.215846] kthread+0x328/0x630 [ 18.215939] ret_from_fork+0x10/0x20 [ 18.216067] [ 18.216115] Allocated by task 158: [ 18.216143] kasan_save_stack+0x3c/0x68 [ 18.216230] kasan_save_track+0x20/0x40 [ 18.216480] kasan_save_alloc_info+0x40/0x58 [ 18.216744] __kasan_krealloc+0x118/0x178 [ 18.216896] krealloc_noprof+0x128/0x360 [ 18.217061] krealloc_less_oob_helper+0x168/0xc50 [ 18.217151] krealloc_less_oob+0x20/0x38 [ 18.217213] kunit_try_run_case+0x170/0x3f0 [ 18.217251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.217572] kthread+0x328/0x630 [ 18.217711] ret_from_fork+0x10/0x20 [ 18.217803] [ 18.217858] The buggy address belongs to the object at fff00000c1828800 [ 18.217858] which belongs to the cache kmalloc-256 of size 256 [ 18.218025] The buggy address is located 7 bytes to the right of [ 18.218025] allocated 201-byte region [fff00000c1828800, fff00000c18288c9) [ 18.218416] [ 18.218472] The buggy address belongs to the physical page: [ 18.218537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.218670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.218760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.218916] page_type: f5(slab) [ 18.218984] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.219111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.219160] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.219239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.219468] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.219641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.219714] page dumped because: kasan: bad access detected [ 18.219771] [ 18.219858] Memory state around the buggy address: [ 18.219918] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.219981] fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.220093] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.220137] ^ [ 18.220173] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.220477] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.220592] ================================================================== [ 18.209022] ================================================================== [ 18.209084] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.209378] Write of size 1 at addr fff00000c18288c9 by task kunit_try_catch/158 [ 18.209526] [ 18.209612] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.209779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.209807] Hardware name: linux,dummy-virt (DT) [ 18.209855] Call trace: [ 18.209884] show_stack+0x20/0x38 (C) [ 18.209981] dump_stack_lvl+0x8c/0xd0 [ 18.210031] print_report+0x118/0x608 [ 18.210228] kasan_report+0xdc/0x128 [ 18.210308] __asan_report_store1_noabort+0x20/0x30 [ 18.210452] krealloc_less_oob_helper+0xa48/0xc50 [ 18.210505] krealloc_less_oob+0x20/0x38 [ 18.210550] kunit_try_run_case+0x170/0x3f0 [ 18.210645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.210709] kthread+0x328/0x630 [ 18.210756] ret_from_fork+0x10/0x20 [ 18.210806] [ 18.210824] Allocated by task 158: [ 18.210852] kasan_save_stack+0x3c/0x68 [ 18.210902] kasan_save_track+0x20/0x40 [ 18.210938] kasan_save_alloc_info+0x40/0x58 [ 18.210977] __kasan_krealloc+0x118/0x178 [ 18.211014] krealloc_noprof+0x128/0x360 [ 18.211059] krealloc_less_oob_helper+0x168/0xc50 [ 18.211097] krealloc_less_oob+0x20/0x38 [ 18.211132] kunit_try_run_case+0x170/0x3f0 [ 18.211183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.211225] kthread+0x328/0x630 [ 18.211264] ret_from_fork+0x10/0x20 [ 18.211298] [ 18.211322] The buggy address belongs to the object at fff00000c1828800 [ 18.211322] which belongs to the cache kmalloc-256 of size 256 [ 18.211828] The buggy address is located 0 bytes to the right of [ 18.211828] allocated 201-byte region [fff00000c1828800, fff00000c18288c9) [ 18.211898] [ 18.211952] The buggy address belongs to the physical page: [ 18.211984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.212212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.212327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.212384] page_type: f5(slab) [ 18.212482] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.212543] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.212602] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.212656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.212714] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.212767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.212805] page dumped because: kasan: bad access detected [ 18.212858] [ 18.212876] Memory state around the buggy address: [ 18.212920] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.212962] fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.213003] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.213054] ^ [ 18.213102] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.213158] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.213194] ================================================================== [ 18.221721] ================================================================== [ 18.222122] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.222177] Write of size 1 at addr fff00000c18288da by task kunit_try_catch/158 [ 18.222227] [ 18.222256] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.222336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.222371] Hardware name: linux,dummy-virt (DT) [ 18.222401] Call trace: [ 18.222438] show_stack+0x20/0x38 (C) [ 18.222497] dump_stack_lvl+0x8c/0xd0 [ 18.222554] print_report+0x118/0x608 [ 18.222600] kasan_report+0xdc/0x128 [ 18.222654] __asan_report_store1_noabort+0x20/0x30 [ 18.222703] krealloc_less_oob_helper+0xa80/0xc50 [ 18.222751] krealloc_less_oob+0x20/0x38 [ 18.222805] kunit_try_run_case+0x170/0x3f0 [ 18.222852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.222913] kthread+0x328/0x630 [ 18.222954] ret_from_fork+0x10/0x20 [ 18.223001] [ 18.223019] Allocated by task 158: [ 18.223052] kasan_save_stack+0x3c/0x68 [ 18.223101] kasan_save_track+0x20/0x40 [ 18.223137] kasan_save_alloc_info+0x40/0x58 [ 18.223181] __kasan_krealloc+0x118/0x178 [ 18.223217] krealloc_noprof+0x128/0x360 [ 18.223262] krealloc_less_oob_helper+0x168/0xc50 [ 18.223300] krealloc_less_oob+0x20/0x38 [ 18.223343] kunit_try_run_case+0x170/0x3f0 [ 18.223413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.223596] kthread+0x328/0x630 [ 18.224472] ret_from_fork+0x10/0x20 [ 18.224924] [ 18.224959] The buggy address belongs to the object at fff00000c1828800 [ 18.224959] which belongs to the cache kmalloc-256 of size 256 [ 18.225233] The buggy address is located 17 bytes to the right of [ 18.225233] allocated 201-byte region [fff00000c1828800, fff00000c18288c9) [ 18.225330] [ 18.225360] The buggy address belongs to the physical page: [ 18.225402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.225519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.225565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.225656] page_type: f5(slab) [ 18.225913] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.226003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.226174] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.226224] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.226556] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.226739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.226908] page dumped because: kasan: bad access detected [ 18.227053] [ 18.227126] Memory state around the buggy address: [ 18.227176] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.227525] fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.227688] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.227743] ^ [ 18.227780] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.228124] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.228213] ================================================================== [ 18.280341] ================================================================== [ 18.280385] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.280453] Write of size 1 at addr fff00000c647e0d0 by task kunit_try_catch/162 [ 18.280586] [ 18.280667] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.280833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.280862] Hardware name: linux,dummy-virt (DT) [ 18.280911] Call trace: [ 18.281067] show_stack+0x20/0x38 (C) [ 18.281121] dump_stack_lvl+0x8c/0xd0 [ 18.281170] print_report+0x118/0x608 [ 18.281348] kasan_report+0xdc/0x128 [ 18.281406] __asan_report_store1_noabort+0x20/0x30 [ 18.281690] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.282017] krealloc_large_less_oob+0x20/0x38 [ 18.282075] kunit_try_run_case+0x170/0x3f0 [ 18.282151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.282255] kthread+0x328/0x630 [ 18.282298] ret_from_fork+0x10/0x20 [ 18.282346] [ 18.282717] The buggy address belongs to the physical page: [ 18.282761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c [ 18.282814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.282860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.282915] page_type: f8(unknown) [ 18.282972] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.283052] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.283117] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.283355] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.283756] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff [ 18.283886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.283998] page dumped because: kasan: bad access detected [ 18.284070] [ 18.284181] Memory state around the buggy address: [ 18.284270] fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.284583] fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.284688] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.284848] ^ [ 18.284950] fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.285116] fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.285196] ================================================================== [ 18.294162] ================================================================== [ 18.294209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 18.294257] Write of size 1 at addr fff00000c647e0eb by task kunit_try_catch/162 [ 18.294326] [ 18.294375] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.294498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.294526] Hardware name: linux,dummy-virt (DT) [ 18.294566] Call trace: [ 18.294606] show_stack+0x20/0x38 (C) [ 18.294795] dump_stack_lvl+0x8c/0xd0 [ 18.294856] print_report+0x118/0x608 [ 18.295104] kasan_report+0xdc/0x128 [ 18.295161] __asan_report_store1_noabort+0x20/0x30 [ 18.295210] krealloc_less_oob_helper+0xa58/0xc50 [ 18.295403] krealloc_large_less_oob+0x20/0x38 [ 18.295549] kunit_try_run_case+0x170/0x3f0 [ 18.295649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.295742] kthread+0x328/0x630 [ 18.295877] ret_from_fork+0x10/0x20 [ 18.296001] [ 18.296072] The buggy address belongs to the physical page: [ 18.296113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c [ 18.296206] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.296308] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.296399] page_type: f8(unknown) [ 18.296481] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.296542] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.296591] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.296640] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.296690] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff [ 18.296738] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.296778] page dumped because: kasan: bad access detected [ 18.296808] [ 18.296831] Memory state around the buggy address: [ 18.296861] fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.296903] fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.297161] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.297240] ^ [ 18.297299] fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.297340] fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.297380] ================================================================== [ 18.237987] ================================================================== [ 18.238245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 18.238544] Write of size 1 at addr fff00000c18288eb by task kunit_try_catch/158 [ 18.238652] [ 18.238724] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.238809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.238834] Hardware name: linux,dummy-virt (DT) [ 18.239121] Call trace: [ 18.239154] show_stack+0x20/0x38 (C) [ 18.239214] dump_stack_lvl+0x8c/0xd0 [ 18.239262] print_report+0x118/0x608 [ 18.239308] kasan_report+0xdc/0x128 [ 18.239360] __asan_report_store1_noabort+0x20/0x30 [ 18.239406] krealloc_less_oob_helper+0xa58/0xc50 [ 18.239802] krealloc_less_oob+0x20/0x38 [ 18.240018] kunit_try_run_case+0x170/0x3f0 [ 18.240191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.240355] kthread+0x328/0x630 [ 18.240414] ret_from_fork+0x10/0x20 [ 18.240616] [ 18.240688] Allocated by task 158: [ 18.240870] kasan_save_stack+0x3c/0x68 [ 18.241279] kasan_save_track+0x20/0x40 [ 18.241405] kasan_save_alloc_info+0x40/0x58 [ 18.241601] __kasan_krealloc+0x118/0x178 [ 18.241667] krealloc_noprof+0x128/0x360 [ 18.241705] krealloc_less_oob_helper+0x168/0xc50 [ 18.242077] krealloc_less_oob+0x20/0x38 [ 18.242195] kunit_try_run_case+0x170/0x3f0 [ 18.242350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.242448] kthread+0x328/0x630 [ 18.242496] ret_from_fork+0x10/0x20 [ 18.242557] [ 18.242576] The buggy address belongs to the object at fff00000c1828800 [ 18.242576] which belongs to the cache kmalloc-256 of size 256 [ 18.242643] The buggy address is located 34 bytes to the right of [ 18.242643] allocated 201-byte region [fff00000c1828800, fff00000c18288c9) [ 18.242706] [ 18.242740] The buggy address belongs to the physical page: [ 18.242783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.242842] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.242887] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.242949] page_type: f5(slab) [ 18.242987] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.243035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.243098] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.243155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.243202] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.243248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.243298] page dumped because: kasan: bad access detected [ 18.243337] [ 18.243630] Memory state around the buggy address: [ 18.244007] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.244064] fff00000c1828800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.244114] >fff00000c1828880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.244291] ^ [ 18.244447] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.244499] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.244537] ================================================================== [ 18.274744] ================================================================== [ 18.274841] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.274904] Write of size 1 at addr fff00000c647e0c9 by task kunit_try_catch/162 [ 18.274954] [ 18.275212] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.275510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.275580] Hardware name: linux,dummy-virt (DT) [ 18.275696] Call trace: [ 18.275764] show_stack+0x20/0x38 (C) [ 18.275897] dump_stack_lvl+0x8c/0xd0 [ 18.275951] print_report+0x118/0x608 [ 18.276122] kasan_report+0xdc/0x128 [ 18.276352] __asan_report_store1_noabort+0x20/0x30 [ 18.276491] krealloc_less_oob_helper+0xa48/0xc50 [ 18.276582] krealloc_large_less_oob+0x20/0x38 [ 18.276726] kunit_try_run_case+0x170/0x3f0 [ 18.276878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276995] kthread+0x328/0x630 [ 18.277134] ret_from_fork+0x10/0x20 [ 18.277186] [ 18.277377] The buggy address belongs to the physical page: [ 18.277639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c [ 18.277728] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.277844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.277931] page_type: f8(unknown) [ 18.278098] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.278213] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.278510] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.278633] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.278731] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff [ 18.278870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.278950] page dumped because: kasan: bad access detected [ 18.279060] [ 18.279131] Memory state around the buggy address: [ 18.279221] fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.279666] fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.279710] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.279754] ^ [ 18.279790] fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.279831] fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.279869] ================================================================== [ 18.286186] ================================================================== [ 18.286235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.286315] Write of size 1 at addr fff00000c647e0da by task kunit_try_catch/162 [ 18.286366] [ 18.286415] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.286589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.286624] Hardware name: linux,dummy-virt (DT) [ 18.286665] Call trace: [ 18.286703] show_stack+0x20/0x38 (C) [ 18.286763] dump_stack_lvl+0x8c/0xd0 [ 18.286957] print_report+0x118/0x608 [ 18.287035] kasan_report+0xdc/0x128 [ 18.287100] __asan_report_store1_noabort+0x20/0x30 [ 18.287168] krealloc_less_oob_helper+0xa80/0xc50 [ 18.287236] krealloc_large_less_oob+0x20/0x38 [ 18.287305] kunit_try_run_case+0x170/0x3f0 [ 18.287371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.287465] kthread+0x328/0x630 [ 18.287546] ret_from_fork+0x10/0x20 [ 18.287702] [ 18.287724] The buggy address belongs to the physical page: [ 18.287756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10647c [ 18.287816] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.287862] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.288063] page_type: f8(unknown) [ 18.288270] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.288375] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.288489] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.288632] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.288681] head: 0bfffe0000000002 ffffc1ffc3191f01 00000000ffffffff 00000000ffffffff [ 18.288753] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.288956] page dumped because: kasan: bad access detected [ 18.289057] [ 18.289223] Memory state around the buggy address: [ 18.289331] fff00000c647df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.289386] fff00000c647e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.289459] >fff00000c647e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.289506] ^ [ 18.289543] fff00000c647e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.289594] fff00000c647e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.289631] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
Automatically assigned
[ 18.186963] ================================================================== [ 18.187056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 18.187242] Write of size 1 at addr fff00000c18286eb by task kunit_try_catch/156 [ 18.187295] [ 18.187344] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.187515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.187587] Hardware name: linux,dummy-virt (DT) [ 18.187634] Call trace: [ 18.187666] show_stack+0x20/0x38 (C) [ 18.187716] dump_stack_lvl+0x8c/0xd0 [ 18.187799] print_report+0x118/0x608 [ 18.187846] kasan_report+0xdc/0x128 [ 18.187891] __asan_report_store1_noabort+0x20/0x30 [ 18.187944] krealloc_more_oob_helper+0x60c/0x678 [ 18.187992] krealloc_more_oob+0x20/0x38 [ 18.188048] kunit_try_run_case+0x170/0x3f0 [ 18.188105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.188163] kthread+0x328/0x630 [ 18.188216] ret_from_fork+0x10/0x20 [ 18.188279] [ 18.188311] Allocated by task 156: [ 18.188339] kasan_save_stack+0x3c/0x68 [ 18.188379] kasan_save_track+0x20/0x40 [ 18.188415] kasan_save_alloc_info+0x40/0x58 [ 18.188471] __kasan_krealloc+0x118/0x178 [ 18.188508] krealloc_noprof+0x128/0x360 [ 18.188560] krealloc_more_oob_helper+0x168/0x678 [ 18.188608] krealloc_more_oob+0x20/0x38 [ 18.188652] kunit_try_run_case+0x170/0x3f0 [ 18.188688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.188744] kthread+0x328/0x630 [ 18.188789] ret_from_fork+0x10/0x20 [ 18.188843] [ 18.188874] The buggy address belongs to the object at fff00000c1828600 [ 18.188874] which belongs to the cache kmalloc-256 of size 256 [ 18.188957] The buggy address is located 0 bytes to the right of [ 18.188957] allocated 235-byte region [fff00000c1828600, fff00000c18286eb) [ 18.189033] [ 18.189053] The buggy address belongs to the physical page: [ 18.189085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.189136] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.189182] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.189235] page_type: f5(slab) [ 18.189273] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.189330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.189388] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.190011] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.190084] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.190199] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.190437] page dumped because: kasan: bad access detected [ 18.190535] [ 18.190555] Memory state around the buggy address: [ 18.190587] fff00000c1828580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.190669] fff00000c1828600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.190952] >fff00000c1828680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.191018] ^ [ 18.191068] fff00000c1828700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.191164] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.191224] ================================================================== [ 18.192542] ================================================================== [ 18.192684] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 18.192738] Write of size 1 at addr fff00000c18286f0 by task kunit_try_catch/156 [ 18.192881] [ 18.192929] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.193060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.193107] Hardware name: linux,dummy-virt (DT) [ 18.193137] Call trace: [ 18.193157] show_stack+0x20/0x38 (C) [ 18.193492] dump_stack_lvl+0x8c/0xd0 [ 18.193549] print_report+0x118/0x608 [ 18.193595] kasan_report+0xdc/0x128 [ 18.193702] __asan_report_store1_noabort+0x20/0x30 [ 18.193755] krealloc_more_oob_helper+0x5c0/0x678 [ 18.193803] krealloc_more_oob+0x20/0x38 [ 18.193898] kunit_try_run_case+0x170/0x3f0 [ 18.193974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.194028] kthread+0x328/0x630 [ 18.194091] ret_from_fork+0x10/0x20 [ 18.194289] [ 18.194351] Allocated by task 156: [ 18.194379] kasan_save_stack+0x3c/0x68 [ 18.194468] kasan_save_track+0x20/0x40 [ 18.194527] kasan_save_alloc_info+0x40/0x58 [ 18.194562] __kasan_krealloc+0x118/0x178 [ 18.194599] krealloc_noprof+0x128/0x360 [ 18.194741] krealloc_more_oob_helper+0x168/0x678 [ 18.194839] krealloc_more_oob+0x20/0x38 [ 18.194967] kunit_try_run_case+0x170/0x3f0 [ 18.195016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.195081] kthread+0x328/0x630 [ 18.195266] ret_from_fork+0x10/0x20 [ 18.195315] [ 18.195334] The buggy address belongs to the object at fff00000c1828600 [ 18.195334] which belongs to the cache kmalloc-256 of size 256 [ 18.195441] The buggy address is located 5 bytes to the right of [ 18.195441] allocated 235-byte region [fff00000c1828600, fff00000c18286eb) [ 18.195595] [ 18.195625] The buggy address belongs to the physical page: [ 18.195655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.195867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.195942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.196004] page_type: f5(slab) [ 18.196074] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.196187] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.196274] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.196374] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.196584] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.196687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.196808] page dumped because: kasan: bad access detected [ 18.196893] [ 18.197013] Memory state around the buggy address: [ 18.197046] fff00000c1828580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197203] fff00000c1828600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.197290] >fff00000c1828680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.197414] ^ [ 18.197504] fff00000c1828700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197614] fff00000c1828780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197685] ================================================================== [ 18.258903] ================================================================== [ 18.259035] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 18.259090] Write of size 1 at addr fff00000c647a0f0 by task kunit_try_catch/160 [ 18.259934] [ 18.260047] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.260229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.260295] Hardware name: linux,dummy-virt (DT) [ 18.260326] Call trace: [ 18.260348] show_stack+0x20/0x38 (C) [ 18.260433] dump_stack_lvl+0x8c/0xd0 [ 18.260506] print_report+0x118/0x608 [ 18.260841] kasan_report+0xdc/0x128 [ 18.260995] __asan_report_store1_noabort+0x20/0x30 [ 18.261093] krealloc_more_oob_helper+0x5c0/0x678 [ 18.261528] krealloc_large_more_oob+0x20/0x38 [ 18.261620] kunit_try_run_case+0x170/0x3f0 [ 18.261914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.262032] kthread+0x328/0x630 [ 18.262112] ret_from_fork+0x10/0x20 [ 18.262200] [ 18.262279] The buggy address belongs to the physical page: [ 18.262318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106478 [ 18.262391] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.262533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.262632] page_type: f8(unknown) [ 18.262914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.262997] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.263325] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.263499] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.263659] head: 0bfffe0000000002 ffffc1ffc3191e01 00000000ffffffff 00000000ffffffff [ 18.263745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.263840] page dumped because: kasan: bad access detected [ 18.263920] [ 18.263995] Memory state around the buggy address: [ 18.264096] fff00000c6479f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.264211] fff00000c647a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.264255] >fff00000c647a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.264310] ^ [ 18.264358] fff00000c647a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.264527] fff00000c647a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.264721] ================================================================== [ 18.251224] ================================================================== [ 18.251278] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 18.251332] Write of size 1 at addr fff00000c647a0eb by task kunit_try_catch/160 [ 18.251718] [ 18.251754] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.252158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.252197] Hardware name: linux,dummy-virt (DT) [ 18.252228] Call trace: [ 18.252249] show_stack+0x20/0x38 (C) [ 18.252674] dump_stack_lvl+0x8c/0xd0 [ 18.252794] print_report+0x118/0x608 [ 18.252898] kasan_report+0xdc/0x128 [ 18.253060] __asan_report_store1_noabort+0x20/0x30 [ 18.253338] krealloc_more_oob_helper+0x60c/0x678 [ 18.253411] krealloc_large_more_oob+0x20/0x38 [ 18.253623] kunit_try_run_case+0x170/0x3f0 [ 18.253749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.253937] kthread+0x328/0x630 [ 18.254028] ret_from_fork+0x10/0x20 [ 18.254154] [ 18.254176] The buggy address belongs to the physical page: [ 18.254438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106478 [ 18.254621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.254687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.254781] page_type: f8(unknown) [ 18.254872] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.254959] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.255209] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.255534] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.255617] head: 0bfffe0000000002 ffffc1ffc3191e01 00000000ffffffff 00000000ffffffff [ 18.255873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.256064] page dumped because: kasan: bad access detected [ 18.256163] [ 18.256205] Memory state around the buggy address: [ 18.256278] fff00000c6479f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.256350] fff00000c647a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.256517] >fff00000c647a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.256605] ^ [ 18.256966] fff00000c647a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.257118] fff00000c647a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.257209] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
Automatically assigned
[ 18.176704] ================================================================== [ 18.176787] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 18.176923] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/154 [ 18.176989] [ 18.177060] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.177203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.177232] Hardware name: linux,dummy-virt (DT) [ 18.177264] Call trace: [ 18.177287] show_stack+0x20/0x38 (C) [ 18.177338] dump_stack_lvl+0x8c/0xd0 [ 18.177386] print_report+0x118/0x608 [ 18.177446] kasan_report+0xdc/0x128 [ 18.177502] __asan_report_load1_noabort+0x20/0x30 [ 18.177549] page_alloc_uaf+0x328/0x350 [ 18.177594] kunit_try_run_case+0x170/0x3f0 [ 18.177642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.177695] kthread+0x328/0x630 [ 18.177740] ret_from_fork+0x10/0x20 [ 18.177798] [ 18.177827] The buggy address belongs to the physical page: [ 18.177867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 18.177918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.177969] page_type: f0(buddy) [ 18.178018] raw: 0bfffe0000000000 fff00000ff616240 fff00000ff616240 0000000000000000 [ 18.178067] raw: 0000000000000000 0000000000000008 00000000f0000000 0000000000000000 [ 18.178107] page dumped because: kasan: bad access detected [ 18.178146] [ 18.178164] Memory state around the buggy address: [ 18.178198] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.178239] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.178285] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.178324] ^ [ 18.178362] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.178405] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.178463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
Automatically assigned
[ 18.147492] ================================================================== [ 18.147601] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 18.147975] Free of addr fff00000c6478001 by task kunit_try_catch/150 [ 18.148083] [ 18.148128] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.148403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.148588] Hardware name: linux,dummy-virt (DT) [ 18.148669] Call trace: [ 18.148713] show_stack+0x20/0x38 (C) [ 18.148776] dump_stack_lvl+0x8c/0xd0 [ 18.148852] print_report+0x118/0x608 [ 18.148918] kasan_report_invalid_free+0xc0/0xe8 [ 18.148967] __kasan_kfree_large+0x5c/0xa8 [ 18.149028] free_large_kmalloc+0x64/0x190 [ 18.149081] kfree+0x270/0x3c8 [ 18.149122] kmalloc_large_invalid_free+0x108/0x270 [ 18.149179] kunit_try_run_case+0x170/0x3f0 [ 18.149246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.149297] kthread+0x328/0x630 [ 18.149349] ret_from_fork+0x10/0x20 [ 18.149415] [ 18.149446] The buggy address belongs to the physical page: [ 18.149818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106478 [ 18.149913] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.150057] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.150218] page_type: f8(unknown) [ 18.150402] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.150587] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.150679] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.150773] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.150821] head: 0bfffe0000000002 ffffc1ffc3191e01 00000000ffffffff 00000000ffffffff [ 18.151017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.151225] page dumped because: kasan: bad access detected [ 18.151314] [ 18.151445] Memory state around the buggy address: [ 18.151481] fff00000c6477f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151542] fff00000c6477f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151697] >fff00000c6478000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.151736] ^ [ 18.151765] fff00000c6478080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.151805] fff00000c6478100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.151920] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
Automatically assigned
[ 18.136640] ================================================================== [ 18.136717] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 18.136775] Read of size 1 at addr fff00000c6474000 by task kunit_try_catch/148 [ 18.136829] [ 18.136863] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.136947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.136973] Hardware name: linux,dummy-virt (DT) [ 18.137002] Call trace: [ 18.137024] show_stack+0x20/0x38 (C) [ 18.137071] dump_stack_lvl+0x8c/0xd0 [ 18.137118] print_report+0x118/0x608 [ 18.137163] kasan_report+0xdc/0x128 [ 18.137206] __asan_report_load1_noabort+0x20/0x30 [ 18.137252] kmalloc_large_uaf+0x2cc/0x2f8 [ 18.137296] kunit_try_run_case+0x170/0x3f0 [ 18.137342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.137393] kthread+0x328/0x630 [ 18.137448] ret_from_fork+0x10/0x20 [ 18.137495] [ 18.137516] The buggy address belongs to the physical page: [ 18.137547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106474 [ 18.137596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.137660] raw: 0bfffe0000000000 ffffc1ffc3191e08 fff00000da46ac40 0000000000000000 [ 18.137707] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 18.137746] page dumped because: kasan: bad access detected [ 18.137775] [ 18.137793] Memory state around the buggy address: [ 18.137824] fff00000c6473f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.137864] fff00000c6473f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.137904] >fff00000c6474000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.137941] ^ [ 18.137970] fff00000c6474080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.138010] fff00000c6474100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.138046] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
Automatically assigned
[ 18.116562] ================================================================== [ 18.116632] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 18.116685] Write of size 1 at addr fff00000c647600a by task kunit_try_catch/146 [ 18.116734] [ 18.116767] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.116982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.117079] Hardware name: linux,dummy-virt (DT) [ 18.117159] Call trace: [ 18.117200] show_stack+0x20/0x38 (C) [ 18.117289] dump_stack_lvl+0x8c/0xd0 [ 18.117443] print_report+0x118/0x608 [ 18.117513] kasan_report+0xdc/0x128 [ 18.117569] __asan_report_store1_noabort+0x20/0x30 [ 18.117638] kmalloc_large_oob_right+0x278/0x2b8 [ 18.117737] kunit_try_run_case+0x170/0x3f0 [ 18.117806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.117902] kthread+0x328/0x630 [ 18.118032] ret_from_fork+0x10/0x20 [ 18.118079] [ 18.118138] The buggy address belongs to the physical page: [ 18.118356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106474 [ 18.118570] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.118640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.118800] page_type: f8(unknown) [ 18.118904] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.119024] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.119124] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.119263] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.119339] head: 0bfffe0000000002 ffffc1ffc3191d01 00000000ffffffff 00000000ffffffff [ 18.119770] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.119811] page dumped because: kasan: bad access detected [ 18.119841] [ 18.119859] Memory state around the buggy address: [ 18.119890] fff00000c6475f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.119931] fff00000c6475f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.119974] >fff00000c6476000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.120009] ^ [ 18.120037] fff00000c6476080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.120077] fff00000c6476100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.120113] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
Automatically assigned
[ 18.108532] ================================================================== [ 18.108596] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.108648] Write of size 1 at addr fff00000c78d9f00 by task kunit_try_catch/144 [ 18.108824] [ 18.108863] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.108949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.108991] Hardware name: linux,dummy-virt (DT) [ 18.109040] Call trace: [ 18.109079] show_stack+0x20/0x38 (C) [ 18.109150] dump_stack_lvl+0x8c/0xd0 [ 18.109227] print_report+0x118/0x608 [ 18.109323] kasan_report+0xdc/0x128 [ 18.109368] __asan_report_store1_noabort+0x20/0x30 [ 18.109414] kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.109473] kunit_try_run_case+0x170/0x3f0 [ 18.109519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.109644] kthread+0x328/0x630 [ 18.109717] ret_from_fork+0x10/0x20 [ 18.109785] [ 18.109804] Allocated by task 144: [ 18.109832] kasan_save_stack+0x3c/0x68 [ 18.109871] kasan_save_track+0x20/0x40 [ 18.109925] kasan_save_alloc_info+0x40/0x58 [ 18.109961] __kasan_kmalloc+0xd4/0xd8 [ 18.109996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.110034] kmalloc_big_oob_right+0xb8/0x2f0 [ 18.110077] kunit_try_run_case+0x170/0x3f0 [ 18.110134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.110180] kthread+0x328/0x630 [ 18.110487] ret_from_fork+0x10/0x20 [ 18.110532] [ 18.110551] The buggy address belongs to the object at fff00000c78d8000 [ 18.110551] which belongs to the cache kmalloc-8k of size 8192 [ 18.110606] The buggy address is located 0 bytes to the right of [ 18.110606] allocated 7936-byte region [fff00000c78d8000, fff00000c78d9f00) [ 18.110683] [ 18.110722] The buggy address belongs to the physical page: [ 18.110771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 18.110852] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.110897] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.110950] page_type: f5(slab) [ 18.110987] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 18.111034] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.111082] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 18.111128] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.111210] head: 0bfffe0000000003 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff [ 18.111334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.111625] page dumped because: kasan: bad access detected [ 18.111661] [ 18.111679] Memory state around the buggy address: [ 18.111730] fff00000c78d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.111772] fff00000c78d9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.111840] >fff00000c78d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.111943] ^ [ 18.112036] fff00000c78d9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.112094] fff00000c78da000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.112152] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
Automatically assigned
[ 18.094655] ================================================================== [ 18.094715] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.094877] Write of size 1 at addr fff00000c446ee78 by task kunit_try_catch/142 [ 18.094927] [ 18.095037] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.095145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.095172] Hardware name: linux,dummy-virt (DT) [ 18.095225] Call trace: [ 18.095265] show_stack+0x20/0x38 (C) [ 18.095342] dump_stack_lvl+0x8c/0xd0 [ 18.095503] print_report+0x118/0x608 [ 18.095562] kasan_report+0xdc/0x128 [ 18.095607] __asan_report_store1_noabort+0x20/0x30 [ 18.095673] kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.095723] kunit_try_run_case+0x170/0x3f0 [ 18.095771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.095823] kthread+0x328/0x630 [ 18.095868] ret_from_fork+0x10/0x20 [ 18.096111] [ 18.096177] Allocated by task 142: [ 18.096238] kasan_save_stack+0x3c/0x68 [ 18.096298] kasan_save_track+0x20/0x40 [ 18.096377] kasan_save_alloc_info+0x40/0x58 [ 18.096442] __kasan_kmalloc+0xd4/0xd8 [ 18.096506] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.096564] kmalloc_track_caller_oob_right+0xa8/0x488 [ 18.096615] kunit_try_run_case+0x170/0x3f0 [ 18.096653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.096694] kthread+0x328/0x630 [ 18.096764] ret_from_fork+0x10/0x20 [ 18.096982] [ 18.097082] The buggy address belongs to the object at fff00000c446ee00 [ 18.097082] which belongs to the cache kmalloc-128 of size 128 [ 18.097241] The buggy address is located 0 bytes to the right of [ 18.097241] allocated 120-byte region [fff00000c446ee00, fff00000c446ee78) [ 18.097340] [ 18.097388] The buggy address belongs to the physical page: [ 18.097491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 18.097595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.097674] page_type: f5(slab) [ 18.097714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.097789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.097990] page dumped because: kasan: bad access detected [ 18.098061] [ 18.098226] Memory state around the buggy address: [ 18.098318] fff00000c446ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.098371] fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.098451] >fff00000c446ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.098531] ^ [ 18.098624] fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.098664] fff00000c446ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.098838] ================================================================== [ 18.100443] ================================================================== [ 18.100539] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 18.100591] Write of size 1 at addr fff00000c446ef78 by task kunit_try_catch/142 [ 18.100640] [ 18.100668] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.100748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.100773] Hardware name: linux,dummy-virt (DT) [ 18.100832] Call trace: [ 18.100881] show_stack+0x20/0x38 (C) [ 18.100956] dump_stack_lvl+0x8c/0xd0 [ 18.101012] print_report+0x118/0x608 [ 18.101068] kasan_report+0xdc/0x128 [ 18.101113] __asan_report_store1_noabort+0x20/0x30 [ 18.101159] kmalloc_track_caller_oob_right+0x418/0x488 [ 18.101209] kunit_try_run_case+0x170/0x3f0 [ 18.101255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.101373] kthread+0x328/0x630 [ 18.101522] ret_from_fork+0x10/0x20 [ 18.101587] [ 18.101623] Allocated by task 142: [ 18.101650] kasan_save_stack+0x3c/0x68 [ 18.101708] kasan_save_track+0x20/0x40 [ 18.101765] kasan_save_alloc_info+0x40/0x58 [ 18.101829] __kasan_kmalloc+0xd4/0xd8 [ 18.101865] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.101915] kmalloc_track_caller_oob_right+0x184/0x488 [ 18.101980] kunit_try_run_case+0x170/0x3f0 [ 18.102105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.102164] kthread+0x328/0x630 [ 18.102195] ret_from_fork+0x10/0x20 [ 18.102234] [ 18.102253] The buggy address belongs to the object at fff00000c446ef00 [ 18.102253] which belongs to the cache kmalloc-128 of size 128 [ 18.102307] The buggy address is located 0 bytes to the right of [ 18.102307] allocated 120-byte region [fff00000c446ef00, fff00000c446ef78) [ 18.102368] [ 18.102386] The buggy address belongs to the physical page: [ 18.102413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 18.102473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.102655] page_type: f5(slab) [ 18.102815] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.102869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.102926] page dumped because: kasan: bad access detected [ 18.102956] [ 18.103170] Memory state around the buggy address: [ 18.103222] fff00000c446ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.103282] fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.103340] >fff00000c446ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.103468] ^ [ 18.103545] fff00000c446ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.103586] fff00000c446f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.103645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
Automatically assigned
[ 18.082069] ================================================================== [ 18.084446] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 18.084538] Read of size 1 at addr fff00000c668b000 by task kunit_try_catch/140 [ 18.084590] [ 18.084627] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.084713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.084738] Hardware name: linux,dummy-virt (DT) [ 18.084770] Call trace: [ 18.084793] show_stack+0x20/0x38 (C) [ 18.084851] dump_stack_lvl+0x8c/0xd0 [ 18.084900] print_report+0x118/0x608 [ 18.084947] kasan_report+0xdc/0x128 [ 18.084992] __asan_report_load1_noabort+0x20/0x30 [ 18.085038] kmalloc_node_oob_right+0x2f4/0x330 [ 18.085086] kunit_try_run_case+0x170/0x3f0 [ 18.085134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.085186] kthread+0x328/0x630 [ 18.085229] ret_from_fork+0x10/0x20 [ 18.085277] [ 18.085295] Allocated by task 140: [ 18.085323] kasan_save_stack+0x3c/0x68 [ 18.085363] kasan_save_track+0x20/0x40 [ 18.085399] kasan_save_alloc_info+0x40/0x58 [ 18.085446] __kasan_kmalloc+0xd4/0xd8 [ 18.085481] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 18.085522] kmalloc_node_oob_right+0xbc/0x330 [ 18.085559] kunit_try_run_case+0x170/0x3f0 [ 18.085595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.085637] kthread+0x328/0x630 [ 18.085667] ret_from_fork+0x10/0x20 [ 18.085702] [ 18.085721] The buggy address belongs to the object at fff00000c668a000 [ 18.085721] which belongs to the cache kmalloc-4k of size 4096 [ 18.085776] The buggy address is located 0 bytes to the right of [ 18.085776] allocated 4096-byte region [fff00000c668a000, fff00000c668b000) [ 18.085838] [ 18.085858] The buggy address belongs to the physical page: [ 18.085932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106688 [ 18.086090] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.086136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.086202] page_type: f5(slab) [ 18.086242] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 18.086291] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.086345] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 18.086393] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.086452] head: 0bfffe0000000003 ffffc1ffc319a201 00000000ffffffff 00000000ffffffff [ 18.086500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.086543] page dumped because: kasan: bad access detected [ 18.086572] [ 18.086590] Memory state around the buggy address: [ 18.086622] fff00000c668af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.086663] fff00000c668af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.086703] >fff00000c668b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.086739] ^ [ 18.086766] fff00000c668b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.086805] fff00000c668b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.086842] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
Automatically assigned
[ 18.023188] ================================================================== [ 18.023290] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 18.026644] Read of size 1 at addr fff00000c4473b1f by task kunit_try_catch/138 [ 18.026901] [ 18.027571] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.028598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.028635] Hardware name: linux,dummy-virt (DT) [ 18.029016] Call trace: [ 18.029043] show_stack+0x20/0x38 (C) [ 18.029099] dump_stack_lvl+0x8c/0xd0 [ 18.030075] print_report+0x118/0x608 [ 18.031243] kasan_report+0xdc/0x128 [ 18.031353] __asan_report_load1_noabort+0x20/0x30 [ 18.031936] kmalloc_oob_left+0x2ec/0x320 [ 18.032014] kunit_try_run_case+0x170/0x3f0 [ 18.032072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.032886] kthread+0x328/0x630 [ 18.033772] ret_from_fork+0x10/0x20 [ 18.033960] [ 18.034325] Allocated by task 26: [ 18.034879] kasan_save_stack+0x3c/0x68 [ 18.035412] kasan_save_track+0x20/0x40 [ 18.035494] kasan_save_alloc_info+0x40/0x58 [ 18.035530] __kasan_kmalloc+0xd4/0xd8 [ 18.035565] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.036233] kstrdup+0x54/0xc8 [ 18.036594] devtmpfs_work_loop+0x6f8/0xa58 [ 18.037106] devtmpfsd+0x50/0x58 [ 18.037657] kthread+0x328/0x630 [ 18.038189] ret_from_fork+0x10/0x20 [ 18.038253] [ 18.038324] Freed by task 26: [ 18.038673] kasan_save_stack+0x3c/0x68 [ 18.039254] kasan_save_track+0x20/0x40 [ 18.039482] kasan_save_free_info+0x4c/0x78 [ 18.039525] __kasan_slab_free+0x6c/0x98 [ 18.039561] kfree+0x214/0x3c8 [ 18.039594] devtmpfs_work_loop+0x804/0xa58 [ 18.039630] devtmpfsd+0x50/0x58 [ 18.039663] kthread+0x328/0x630 [ 18.040609] ret_from_fork+0x10/0x20 [ 18.041355] [ 18.041523] The buggy address belongs to the object at fff00000c4473b00 [ 18.041523] which belongs to the cache kmalloc-16 of size 16 [ 18.042334] The buggy address is located 15 bytes to the right of [ 18.042334] allocated 16-byte region [fff00000c4473b00, fff00000c4473b10) [ 18.043010] [ 18.043157] The buggy address belongs to the physical page: [ 18.043371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104473 [ 18.043438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.043492] page_type: f5(slab) [ 18.043534] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.044366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.044473] page dumped because: kasan: bad access detected [ 18.044642] [ 18.045043] Memory state around the buggy address: [ 18.045394] fff00000c4473a00: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 18.045751] fff00000c4473a80: fa fb fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.046558] >fff00000c4473b00: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 18.046838] ^ [ 18.047007] fff00000c4473b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047517] fff00000c4473c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047930] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
Automatically assigned
[ 17.972932] ================================================================== [ 17.973297] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.974187] Write of size 1 at addr fff00000c446ed73 by task kunit_try_catch/136 [ 17.974443] [ 17.975330] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250603 #1 PREEMPT [ 17.975779] Tainted: [N]=TEST [ 17.976216] Hardware name: linux,dummy-virt (DT) [ 17.978817] Call trace: [ 17.980101] show_stack+0x20/0x38 (C) [ 17.980263] dump_stack_lvl+0x8c/0xd0 [ 17.980609] print_report+0x118/0x608 [ 17.980741] kasan_report+0xdc/0x128 [ 17.980789] __asan_report_store1_noabort+0x20/0x30 [ 17.980844] kmalloc_oob_right+0x5a4/0x660 [ 17.981080] kunit_try_run_case+0x170/0x3f0 [ 17.981205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.981331] kthread+0x328/0x630 [ 17.981408] ret_from_fork+0x10/0x20 [ 17.982020] [ 17.982103] Allocated by task 136: [ 17.982264] kasan_save_stack+0x3c/0x68 [ 17.982604] kasan_save_track+0x20/0x40 [ 17.982679] kasan_save_alloc_info+0x40/0x58 [ 17.982770] __kasan_kmalloc+0xd4/0xd8 [ 17.982843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.982885] kmalloc_oob_right+0xb0/0x660 [ 17.983196] kunit_try_run_case+0x170/0x3f0 [ 17.983302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.983368] kthread+0x328/0x630 [ 17.983399] ret_from_fork+0x10/0x20 [ 17.983486] [ 17.983577] The buggy address belongs to the object at fff00000c446ed00 [ 17.983577] which belongs to the cache kmalloc-128 of size 128 [ 17.983869] The buggy address is located 0 bytes to the right of [ 17.983869] allocated 115-byte region [fff00000c446ed00, fff00000c446ed73) [ 17.983999] [ 17.984301] The buggy address belongs to the physical page: [ 17.984991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 17.985757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.986577] page_type: f5(slab) [ 17.986989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.987059] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.987194] page dumped because: kasan: bad access detected [ 17.987238] [ 17.987263] Memory state around the buggy address: [ 17.988172] fff00000c446ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.988421] fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.988519] >fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.988573] ^ [ 17.988903] fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.988968] fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.989102] ================================================================== [ 17.995177] ================================================================== [ 17.995223] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.995270] Read of size 1 at addr fff00000c446ed80 by task kunit_try_catch/136 [ 17.995317] [ 17.995345] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 17.995450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.995476] Hardware name: linux,dummy-virt (DT) [ 17.995531] Call trace: [ 17.995552] show_stack+0x20/0x38 (C) [ 17.995600] dump_stack_lvl+0x8c/0xd0 [ 17.995833] print_report+0x118/0x608 [ 17.996014] kasan_report+0xdc/0x128 [ 17.996113] __asan_report_load1_noabort+0x20/0x30 [ 17.996172] kmalloc_oob_right+0x5d0/0x660 [ 17.996229] kunit_try_run_case+0x170/0x3f0 [ 17.996325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996688] kthread+0x328/0x630 [ 17.996845] ret_from_fork+0x10/0x20 [ 17.996994] [ 17.997068] Allocated by task 136: [ 17.997142] kasan_save_stack+0x3c/0x68 [ 17.997210] kasan_save_track+0x20/0x40 [ 17.997283] kasan_save_alloc_info+0x40/0x58 [ 17.997318] __kasan_kmalloc+0xd4/0xd8 [ 17.997352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.997389] kmalloc_oob_right+0xb0/0x660 [ 17.997434] kunit_try_run_case+0x170/0x3f0 [ 17.997471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.997706] kthread+0x328/0x630 [ 17.997785] ret_from_fork+0x10/0x20 [ 17.997831] [ 17.997903] The buggy address belongs to the object at fff00000c446ed00 [ 17.997903] which belongs to the cache kmalloc-128 of size 128 [ 17.997979] The buggy address is located 13 bytes to the right of [ 17.997979] allocated 115-byte region [fff00000c446ed00, fff00000c446ed73) [ 17.998092] [ 17.998151] The buggy address belongs to the physical page: [ 17.998188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 17.998274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.998451] page_type: f5(slab) [ 17.998509] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.998566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.998604] page dumped because: kasan: bad access detected [ 17.998635] [ 17.998707] Memory state around the buggy address: [ 17.998826] fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.998962] fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.999070] >fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999153] ^ [ 17.999220] fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999300] fff00000c446ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999408] ================================================================== [ 17.990239] ================================================================== [ 17.990286] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.990439] Write of size 1 at addr fff00000c446ed78 by task kunit_try_catch/136 [ 17.990552] [ 17.990587] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 17.990698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.990753] Hardware name: linux,dummy-virt (DT) [ 17.990785] Call trace: [ 17.990807] show_stack+0x20/0x38 (C) [ 17.990874] dump_stack_lvl+0x8c/0xd0 [ 17.991052] print_report+0x118/0x608 [ 17.991231] kasan_report+0xdc/0x128 [ 17.991295] __asan_report_store1_noabort+0x20/0x30 [ 17.991344] kmalloc_oob_right+0x538/0x660 [ 17.991441] kunit_try_run_case+0x170/0x3f0 [ 17.991488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.991662] kthread+0x328/0x630 [ 17.991706] ret_from_fork+0x10/0x20 [ 17.991954] [ 17.992024] Allocated by task 136: [ 17.992096] kasan_save_stack+0x3c/0x68 [ 17.992151] kasan_save_track+0x20/0x40 [ 17.992269] kasan_save_alloc_info+0x40/0x58 [ 17.992328] __kasan_kmalloc+0xd4/0xd8 [ 17.992460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.992530] kmalloc_oob_right+0xb0/0x660 [ 17.992565] kunit_try_run_case+0x170/0x3f0 [ 17.992886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.992985] kthread+0x328/0x630 [ 17.993119] ret_from_fork+0x10/0x20 [ 17.993215] [ 17.993235] The buggy address belongs to the object at fff00000c446ed00 [ 17.993235] which belongs to the cache kmalloc-128 of size 128 [ 17.993682] The buggy address is located 5 bytes to the right of [ 17.993682] allocated 115-byte region [fff00000c446ed00, fff00000c446ed73) [ 17.993836] [ 17.993889] The buggy address belongs to the physical page: [ 17.993945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10446e [ 17.994010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.994057] page_type: f5(slab) [ 17.994325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.994394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.994446] page dumped because: kasan: bad access detected [ 17.994476] [ 17.994516] Memory state around the buggy address: [ 17.994546] fff00000c446ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.994587] fff00000c446ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994650] >fff00000c446ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.994695] ^ [ 17.994739] fff00000c446ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994787] fff00000c446ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994822] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
Automatically assigned
------------[ cut here ]------------ [ 95.841316] WARNING: CPU: 0 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 95.842251] Modules linked in: [ 95.842522] CPU: 0 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250603 #1 PREEMPT [ 95.844039] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 95.844513] Hardware name: linux,dummy-virt (DT) [ 95.844945] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.845293] pc : intlog10+0x38/0x48 [ 95.845539] lr : intlog10_test+0xe4/0x200 [ 95.845859] sp : ffff800082067c10 [ 95.846035] x29: ffff800082067c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.846786] x26: 1ffe000019392021 x25: 0000000000000000 x24: ffff800082067ce0 [ 95.847347] x23: ffff800082067d00 x22: 0000000000000000 x21: 1ffff0001040cf82 [ 95.847946] x20: ffff9fc2fe2d30c0 x19: ffff800080087990 x18: 000000003bda6c21 [ 95.848527] x17: 000000004d799a42 x16: fff00000c097543c x15: 00000000b425ba76 [ 95.849115] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cdcd x12: ffff73f86042ff79 [ 95.849685] x11: 1ffff3f86042ff78 x10: ffff73f86042ff78 x9 : ffff9fc2fb86ae7c [ 95.850247] x8 : ffff9fc30217fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.850819] x5 : ffff70001040cf82 x4 : 1ffff00010010f3a x3 : 1ffff3f85fc5a618 [ 95.851596] x2 : 1ffff3f85fc5a618 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.852030] Call trace: [ 95.852392] intlog10+0x38/0x48 (P) [ 95.852802] kunit_try_run_case+0x170/0x3f0 [ 95.853225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.853688] kthread+0x328/0x630 [ 95.854056] ret_from_fork+0x10/0x20 [ 95.854414] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
Automatically assigned
------------[ cut here ]------------ [ 95.797136] WARNING: CPU: 1 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 95.799099] Modules linked in: [ 95.799408] CPU: 1 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G B D N 6.15.0-next-20250603 #1 PREEMPT [ 95.801262] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 95.801998] Hardware name: linux,dummy-virt (DT) [ 95.802669] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.803515] pc : intlog2+0xd8/0xf8 [ 95.804085] lr : intlog2_test+0xe4/0x200 [ 95.804701] sp : ffff800082237c10 [ 95.805193] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.806083] x26: 1ffe00001957d201 x25: 0000000000000000 x24: ffff800082237ce0 [ 95.807001] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82 [ 95.807893] x20: ffff9fc2fe2d2fc0 x19: ffff800080087990 x18: 00000000223fa386 [ 95.808735] x17: 00000000ada6b054 x16: fff00000c097583c x15: 00000000f8463ac4 [ 95.809100] x14: 00000000f1f1f1f1 x13: 1ffe00001b4889cd x12: ffff73f86042ff79 [ 95.809459] x11: 1ffff3f86042ff78 x10: ffff73f86042ff78 x9 : ffff9fc2fb86b07c [ 95.809890] x8 : ffff9fc30217fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.810267] x5 : ffff700010446f82 x4 : 1ffff00010010f3a x3 : 1ffff3f85fc5a5f8 [ 95.810748] x2 : 1ffff3f85fc5a5f8 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.811189] Call trace: [ 95.811365] intlog2+0xd8/0xf8 (P) [ 95.811619] kunit_try_run_case+0x170/0x3f0 [ 95.811851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.812149] kthread+0x328/0x630 [ 95.812350] ret_from_fork+0x10/0x20 [ 95.812673] ---[ end trace 0000000000000000 ]---