Date
June 5, 2025, 7:08 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
Automatically assigned
[ 25.087213] ================================================================== [ 25.087324] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 25.087507] Read of size 1 at addr fff00000c4657200 by task kunit_try_catch/164 [ 25.087643] [ 25.087718] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.088033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.088153] Hardware name: linux,dummy-virt (DT) [ 25.088314] Call trace: [ 25.088391] show_stack+0x20/0x38 (C) [ 25.088539] dump_stack_lvl+0x8c/0xd0 [ 25.088754] print_report+0x118/0x608 [ 25.088966] kasan_report+0xdc/0x128 [ 25.089100] __asan_report_load1_noabort+0x20/0x30 [ 25.089295] krealloc_uaf+0x4c8/0x520 [ 25.089439] kunit_try_run_case+0x170/0x3f0 [ 25.089605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.089691] kthread+0x328/0x630 [ 25.089744] ret_from_fork+0x10/0x20 [ 25.089803] [ 25.089825] Allocated by task 164: [ 25.089860] kasan_save_stack+0x3c/0x68 [ 25.089911] kasan_save_track+0x20/0x40 [ 25.089957] kasan_save_alloc_info+0x40/0x58 [ 25.090006] __kasan_kmalloc+0xd4/0xd8 [ 25.090051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.090101] krealloc_uaf+0xc8/0x520 [ 25.090145] kunit_try_run_case+0x170/0x3f0 [ 25.090192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.090246] kthread+0x328/0x630 [ 25.090284] ret_from_fork+0x10/0x20 [ 25.090351] [ 25.090400] Freed by task 164: [ 25.090466] kasan_save_stack+0x3c/0x68 [ 25.090630] kasan_save_track+0x20/0x40 [ 25.090765] kasan_save_free_info+0x4c/0x78 [ 25.090866] __kasan_slab_free+0x6c/0x98 [ 25.091584] kfree+0x214/0x3c8 [ 25.092106] krealloc_uaf+0x12c/0x520 [ 25.092220] kunit_try_run_case+0x170/0x3f0 [ 25.092584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.092699] kthread+0x328/0x630 [ 25.093025] ret_from_fork+0x10/0x20 [ 25.093436] [ 25.093487] The buggy address belongs to the object at fff00000c4657200 [ 25.093487] which belongs to the cache kmalloc-256 of size 256 [ 25.093628] The buggy address is located 0 bytes inside of [ 25.093628] freed 256-byte region [fff00000c4657200, fff00000c4657300) [ 25.094403] [ 25.094540] The buggy address belongs to the physical page: [ 25.094886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104656 [ 25.095013] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.095545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.096199] page_type: f5(slab) [ 25.096471] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.096596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.096723] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.096845] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.097610] head: 0bfffe0000000001 ffffc1ffc3119581 00000000ffffffff 00000000ffffffff [ 25.097955] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.098233] page dumped because: kasan: bad access detected [ 25.098696] [ 25.098930] Memory state around the buggy address: [ 25.099068] fff00000c4657100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.099513] fff00000c4657180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.099991] >fff00000c4657200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.100088] ^ [ 25.100372] fff00000c4657280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.100761] fff00000c4657300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.101119] ================================================================== [ 25.065627] ================================================================== [ 25.067799] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.067971] Read of size 1 at addr fff00000c4657200 by task kunit_try_catch/164 [ 25.068105] [ 25.068189] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.068412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.068481] Hardware name: linux,dummy-virt (DT) [ 25.068563] Call trace: [ 25.068614] show_stack+0x20/0x38 (C) [ 25.068817] dump_stack_lvl+0x8c/0xd0 [ 25.068938] print_report+0x118/0x608 [ 25.069041] kasan_report+0xdc/0x128 [ 25.069147] __kasan_check_byte+0x54/0x70 [ 25.069261] krealloc_noprof+0x44/0x360 [ 25.069411] krealloc_uaf+0x180/0x520 [ 25.069517] kunit_try_run_case+0x170/0x3f0 [ 25.069626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.069750] kthread+0x328/0x630 [ 25.069852] ret_from_fork+0x10/0x20 [ 25.069958] [ 25.069999] Allocated by task 164: [ 25.070067] kasan_save_stack+0x3c/0x68 [ 25.070754] kasan_save_track+0x20/0x40 [ 25.070897] kasan_save_alloc_info+0x40/0x58 [ 25.071077] __kasan_kmalloc+0xd4/0xd8 [ 25.071709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.071818] krealloc_uaf+0xc8/0x520 [ 25.071911] kunit_try_run_case+0x170/0x3f0 [ 25.072211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.072497] kthread+0x328/0x630 [ 25.073001] ret_from_fork+0x10/0x20 [ 25.073446] [ 25.073714] Freed by task 164: [ 25.073805] kasan_save_stack+0x3c/0x68 [ 25.073907] kasan_save_track+0x20/0x40 [ 25.074000] kasan_save_free_info+0x4c/0x78 [ 25.074094] __kasan_slab_free+0x6c/0x98 [ 25.074183] kfree+0x214/0x3c8 [ 25.075227] krealloc_uaf+0x12c/0x520 [ 25.075363] kunit_try_run_case+0x170/0x3f0 [ 25.075921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.076010] kthread+0x328/0x630 [ 25.076083] ret_from_fork+0x10/0x20 [ 25.076189] [ 25.076232] The buggy address belongs to the object at fff00000c4657200 [ 25.076232] which belongs to the cache kmalloc-256 of size 256 [ 25.078227] The buggy address is located 0 bytes inside of [ 25.078227] freed 256-byte region [fff00000c4657200, fff00000c4657300) [ 25.078322] [ 25.078391] The buggy address belongs to the physical page: [ 25.078476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104656 [ 25.078894] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.079045] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.079204] page_type: f5(slab) [ 25.079310] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.079658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.079855] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.079991] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.080174] head: 0bfffe0000000001 ffffc1ffc3119581 00000000ffffffff 00000000ffffffff [ 25.080309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.080449] page dumped because: kasan: bad access detected [ 25.080788] [ 25.080898] Memory state around the buggy address: [ 25.081349] fff00000c4657100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.081793] fff00000c4657180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.082029] >fff00000c4657200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.082154] ^ [ 25.082282] fff00000c4657280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.082582] fff00000c4657300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.083112] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 29.301007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 29.450041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 29.322516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 29.401499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 29.348917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 29.702067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
Automatically assigned
[ 29.126559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 29.180774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 29.065525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
Automatically assigned
[ 116.535261] Internal error: Oops: 0000000096000005 [#1] SMP [ 116.551236] Modules linked in: [ 116.552792] CPU: 1 UID: 0 PID: 580 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 116.554696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 116.555354] Hardware name: linux,dummy-virt (DT) [ 116.556689] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 116.557511] pc : kunit_test_null_dereference+0x70/0x170 [ 116.558070] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 116.558658] sp : ffff800081ff7d30 [ 116.559184] x29: ffff800081ff7d90 x28: 0000000000000000 x27: 0000000000000000 [ 116.560282] x26: 1ffe0000194239a1 x25: 0000000000000000 x24: 0000000000000004 [ 116.561222] x23: fff00000ca11cd0c x22: ffff9ca723a56d58 x21: fff00000c3e59508 [ 116.562162] x20: 1ffff000103fefa6 x19: ffff800080087990 x18: 000000000e09a452 [ 116.563096] x17: 0000000000000001 x16: fff00000da466d28 x15: 000000006cfaaf5c [ 116.564030] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cd89 x12: fffd80001981762c [ 116.564991] x11: 1ffe00001981762b x10: fffd80001981762b x9 : ffff9ca723a4e1c0 [ 116.565975] x8 : ffff800081ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 116.566883] x5 : ffff7000103fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 116.567797] x2 : dfff800000000000 x1 : fff00000cc0ba880 x0 : ffff800080087990 [ 116.568781] Call trace: [ 116.569171] kunit_test_null_dereference+0x70/0x170 (P) [ 116.569790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 116.570474] kthread+0x328/0x630 [ 116.571001] ret_from_fork+0x10/0x20 [ 116.571925] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 116.572944] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
Automatically assigned
[ 59.697452] ================================================================== [ 59.697538] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 59.697538] [ 59.697644] Use-after-free read at 0x00000000979c8cc7 (in kfence-#188): [ 59.697711] test_krealloc+0x51c/0x830 [ 59.697769] kunit_try_run_case+0x170/0x3f0 [ 59.697830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.697888] kthread+0x328/0x630 [ 59.697939] ret_from_fork+0x10/0x20 [ 59.697994] [ 59.698025] kfence-#188: 0x00000000979c8cc7-0x00000000f3e5840a, size=32, cache=kmalloc-32 [ 59.698025] [ 59.698093] allocated by task 337 on cpu 0 at 59.696520s (0.001568s ago): [ 59.698176] test_alloc+0x29c/0x628 [ 59.698230] test_krealloc+0xc0/0x830 [ 59.698281] kunit_try_run_case+0x170/0x3f0 [ 59.698352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.698414] kthread+0x328/0x630 [ 59.698458] ret_from_fork+0x10/0x20 [ 59.698508] [ 59.698539] freed by task 337 on cpu 0 at 59.696893s (0.001641s ago): [ 59.698617] krealloc_noprof+0x148/0x360 [ 59.698668] test_krealloc+0x1dc/0x830 [ 59.698720] kunit_try_run_case+0x170/0x3f0 [ 59.698770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.698826] kthread+0x328/0x630 [ 59.698872] ret_from_fork+0x10/0x20 [ 59.698922] [ 59.698976] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 59.699078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.699115] Hardware name: linux,dummy-virt (DT) [ 59.699160] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
Automatically assigned
[ 59.504223] ================================================================== [ 59.504304] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 59.504304] [ 59.504428] Use-after-free read at 0x000000002de2bbcc (in kfence-#186): [ 59.504493] test_memcache_typesafe_by_rcu+0x280/0x560 [ 59.504557] kunit_try_run_case+0x170/0x3f0 [ 59.504616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.504671] kthread+0x328/0x630 [ 59.504722] ret_from_fork+0x10/0x20 [ 59.504771] [ 59.504801] kfence-#186: 0x000000002de2bbcc-0x00000000d91db6d0, size=32, cache=test [ 59.504801] [ 59.504866] allocated by task 335 on cpu 1 at 59.489154s (0.015708s ago): [ 59.504949] test_alloc+0x230/0x628 [ 59.505003] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 59.505057] kunit_try_run_case+0x170/0x3f0 [ 59.505110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.505167] kthread+0x328/0x630 [ 59.505213] ret_from_fork+0x10/0x20 [ 59.505262] [ 59.505290] freed by task 335 on cpu 1 at 59.489314s (0.015971s ago): [ 59.505390] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 59.505448] kunit_try_run_case+0x170/0x3f0 [ 59.505501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.505557] kthread+0x328/0x630 [ 59.505603] ret_from_fork+0x10/0x20 [ 59.505652] [ 59.505705] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 59.505803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.505840] Hardware name: linux,dummy-virt (DT) [ 59.505885] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
Automatically assigned
[ 38.295425] ================================================================== [ 38.295679] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 38.295679] [ 38.295908] Invalid read at 0x00000000340a32c7: [ 38.296908] test_invalid_access+0xdc/0x1f0 [ 38.297059] kunit_try_run_case+0x170/0x3f0 [ 38.297771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.297903] kthread+0x328/0x630 [ 38.298018] ret_from_fork+0x10/0x20 [ 38.298149] [ 38.298265] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 38.300298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.300410] Hardware name: linux,dummy-virt (DT) [ 38.301637] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
Automatically assigned
[ 38.060788] ================================================================== [ 38.060882] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.060882] [ 38.060958] Corrupted memory at 0x00000000882550f7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#182): [ 38.061368] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.061437] kunit_try_run_case+0x170/0x3f0 [ 38.061493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.061550] kthread+0x328/0x630 [ 38.061597] ret_from_fork+0x10/0x20 [ 38.061648] [ 38.061679] kfence-#182: 0x0000000041de3c5d-0x00000000916ddcc8, size=73, cache=kmalloc-96 [ 38.061679] [ 38.061748] allocated by task 325 on cpu 0 at 38.060454s (0.001289s ago): [ 38.061823] test_alloc+0x29c/0x628 [ 38.061876] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 38.061932] kunit_try_run_case+0x170/0x3f0 [ 38.061982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.062038] kthread+0x328/0x630 [ 38.062083] ret_from_fork+0x10/0x20 [ 38.062133] [ 38.062164] freed by task 325 on cpu 0 at 38.060674s (0.001485s ago): [ 38.062246] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.062300] kunit_try_run_case+0x170/0x3f0 [ 38.062374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.062435] kthread+0x328/0x630 [ 38.062480] ret_from_fork+0x10/0x20 [ 38.062535] [ 38.062585] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 38.062689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.062727] Hardware name: linux,dummy-virt (DT) [ 38.062772] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
Automatically assigned
[ 37.958869] ================================================================== [ 37.959004] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 37.959004] [ 37.959186] Out-of-bounds read at 0x00000000753a0683 (105B right of kfence-#181): [ 37.959263] test_kmalloc_aligned_oob_read+0x238/0x468 [ 37.959357] kunit_try_run_case+0x170/0x3f0 [ 37.959428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.959487] kthread+0x328/0x630 [ 37.959536] ret_from_fork+0x10/0x20 [ 37.959589] [ 37.959619] kfence-#181: 0x000000002aeef090-0x0000000054bde486, size=73, cache=kmalloc-96 [ 37.959619] [ 37.959686] allocated by task 323 on cpu 0 at 37.958444s (0.001238s ago): [ 37.959771] test_alloc+0x29c/0x628 [ 37.959865] test_kmalloc_aligned_oob_read+0x100/0x468 [ 37.959992] kunit_try_run_case+0x170/0x3f0 [ 37.960109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.960229] kthread+0x328/0x630 [ 37.960342] ret_from_fork+0x10/0x20 [ 37.960447] [ 37.960544] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 37.960739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.960822] Hardware name: linux,dummy-virt (DT) [ 37.960872] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
Automatically assigned
[ 34.318199] ================================================================== [ 34.318382] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 34.318382] [ 34.318939] Corrupted memory at 0x0000000089028fa8 [ ! ] (in kfence-#146): [ 34.319531] test_corruption+0x1d8/0x378 [ 34.319644] kunit_try_run_case+0x170/0x3f0 [ 34.319749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.320083] kthread+0x328/0x630 [ 34.320406] ret_from_fork+0x10/0x20 [ 34.320523] [ 34.320592] kfence-#146: 0x00000000c12ea180-0x000000004f79a524, size=32, cache=test [ 34.320592] [ 34.320738] allocated by task 313 on cpu 0 at 34.317760s (0.002968s ago): [ 34.321030] test_alloc+0x230/0x628 [ 34.321149] test_corruption+0x198/0x378 [ 34.321536] kunit_try_run_case+0x170/0x3f0 [ 34.321650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.321770] kthread+0x328/0x630 [ 34.321885] ret_from_fork+0x10/0x20 [ 34.322105] [ 34.322174] freed by task 313 on cpu 0 at 34.318025s (0.004139s ago): [ 34.322734] test_corruption+0x1d8/0x378 [ 34.323008] kunit_try_run_case+0x170/0x3f0 [ 34.323145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.323270] kthread+0x328/0x630 [ 34.323435] ret_from_fork+0x10/0x20 [ 34.323834] [ 34.324093] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 34.324372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.324586] Hardware name: linux,dummy-virt (DT) [ 34.324903] ================================================================== [ 33.902887] ================================================================== [ 33.903027] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 33.903027] [ 33.903164] Corrupted memory at 0x000000009159547a [ ! . . . . . . . . . . . . . . . ] (in kfence-#142): [ 33.903961] test_corruption+0x120/0x378 [ 33.904552] kunit_try_run_case+0x170/0x3f0 [ 33.904979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.905164] kthread+0x328/0x630 [ 33.906960] ret_from_fork+0x10/0x20 [ 33.907095] [ 33.907161] kfence-#142: 0x00000000ed7a644e-0x00000000d777a3ac, size=32, cache=test [ 33.907161] [ 33.907299] allocated by task 313 on cpu 0 at 33.901109s (0.006182s ago): [ 33.907484] test_alloc+0x230/0x628 [ 33.907577] test_corruption+0xdc/0x378 [ 33.907671] kunit_try_run_case+0x170/0x3f0 [ 33.907767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.907932] kthread+0x328/0x630 [ 33.908068] ret_from_fork+0x10/0x20 [ 33.908160] [ 33.908214] freed by task 313 on cpu 0 at 33.902722s (0.005485s ago): [ 33.908380] test_corruption+0x120/0x378 [ 33.909142] kunit_try_run_case+0x170/0x3f0 [ 33.909263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.909416] kthread+0x328/0x630 [ 33.909507] ret_from_fork+0x10/0x20 [ 33.909629] [ 33.909828] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.910175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.910364] Hardware name: linux,dummy-virt (DT) [ 33.910453] ================================================================== [ 33.481027] ================================================================== [ 33.481163] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 33.481163] [ 33.481344] Corrupted memory at 0x00000000035e21f0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#138): [ 33.484069] test_corruption+0x278/0x378 [ 33.484222] kunit_try_run_case+0x170/0x3f0 [ 33.484594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.484751] kthread+0x328/0x630 [ 33.484878] ret_from_fork+0x10/0x20 [ 33.485074] [ 33.485136] kfence-#138: 0x00000000ad8f681c-0x000000006b352bfd, size=32, cache=kmalloc-32 [ 33.485136] [ 33.485414] allocated by task 311 on cpu 0 at 33.479898s (0.005504s ago): [ 33.485587] test_alloc+0x29c/0x628 [ 33.485695] test_corruption+0xdc/0x378 [ 33.486024] kunit_try_run_case+0x170/0x3f0 [ 33.486175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.486450] kthread+0x328/0x630 [ 33.486673] ret_from_fork+0x10/0x20 [ 33.486784] [ 33.486934] freed by task 311 on cpu 0 at 33.480633s (0.006291s ago): [ 33.487087] test_corruption+0x278/0x378 [ 33.487186] kunit_try_run_case+0x170/0x3f0 [ 33.487284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.487412] kthread+0x328/0x630 [ 33.487504] ret_from_fork+0x10/0x20 [ 33.487600] [ 33.487696] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.488175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.488263] Hardware name: linux,dummy-virt (DT) [ 33.488381] ================================================================== [ 33.794872] ================================================================== [ 33.795012] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 33.795012] [ 33.795135] Corrupted memory at 0x00000000138b3509 [ ! ] (in kfence-#141): [ 33.799850] test_corruption+0x284/0x378 [ 33.800069] kunit_try_run_case+0x170/0x3f0 [ 33.800219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.800625] kthread+0x328/0x630 [ 33.801360] ret_from_fork+0x10/0x20 [ 33.801467] [ 33.801525] kfence-#141: 0x000000006be5454f-0x00000000631527fb, size=32, cache=kmalloc-32 [ 33.801525] [ 33.803018] allocated by task 311 on cpu 0 at 33.794427s (0.008565s ago): [ 33.803187] test_alloc+0x29c/0x628 [ 33.803495] test_corruption+0x198/0x378 [ 33.803625] kunit_try_run_case+0x170/0x3f0 [ 33.803953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.804070] kthread+0x328/0x630 [ 33.804198] ret_from_fork+0x10/0x20 [ 33.804457] [ 33.804516] freed by task 311 on cpu 0 at 33.794581s (0.009927s ago): [ 33.804676] test_corruption+0x284/0x378 [ 33.804777] kunit_try_run_case+0x170/0x3f0 [ 33.804925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.805098] kthread+0x328/0x630 [ 33.805366] ret_from_fork+0x10/0x20 [ 33.805480] [ 33.805687] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.806112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.806204] Hardware name: linux,dummy-virt (DT) [ 33.806378] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
Automatically assigned
[ 33.270921] ================================================================== [ 33.271028] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 33.271028] [ 33.271407] Invalid free of 0x0000000021cca9fa (in kfence-#136): [ 33.271609] test_invalid_addr_free+0x1ac/0x238 [ 33.271734] kunit_try_run_case+0x170/0x3f0 [ 33.271878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.272137] kthread+0x328/0x630 [ 33.272437] ret_from_fork+0x10/0x20 [ 33.272644] [ 33.272678] kfence-#136: 0x000000004133f8ef-0x000000002c1a6a2c, size=32, cache=kmalloc-32 [ 33.272678] [ 33.272748] allocated by task 307 on cpu 0 at 33.270714s (0.002029s ago): [ 33.272826] test_alloc+0x29c/0x628 [ 33.272880] test_invalid_addr_free+0xd4/0x238 [ 33.272934] kunit_try_run_case+0x170/0x3f0 [ 33.272986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.273041] kthread+0x328/0x630 [ 33.273085] ret_from_fork+0x10/0x20 [ 33.273134] [ 33.273183] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.273293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.273354] Hardware name: linux,dummy-virt (DT) [ 33.273405] ================================================================== [ 33.378030] ================================================================== [ 33.378195] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 33.378195] [ 33.378384] Invalid free of 0x000000005e11359b (in kfence-#137): [ 33.378587] test_invalid_addr_free+0xec/0x238 [ 33.378827] kunit_try_run_case+0x170/0x3f0 [ 33.378953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.379151] kthread+0x328/0x630 [ 33.379291] ret_from_fork+0x10/0x20 [ 33.379452] [ 33.379514] kfence-#137: 0x0000000043216fe3-0x000000006890fd88, size=32, cache=test [ 33.379514] [ 33.379802] allocated by task 309 on cpu 0 at 33.377581s (0.002212s ago): [ 33.380077] test_alloc+0x230/0x628 [ 33.380197] test_invalid_addr_free+0xd4/0x238 [ 33.380316] kunit_try_run_case+0x170/0x3f0 [ 33.380563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.380694] kthread+0x328/0x630 [ 33.380837] ret_from_fork+0x10/0x20 [ 33.381030] [ 33.381146] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.381367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.381442] Hardware name: linux,dummy-virt (DT) [ 33.381579] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
Automatically assigned
[ 33.063612] ================================================================== [ 33.063798] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 33.063798] [ 33.064425] Invalid free of 0x00000000c915c51c (in kfence-#134): [ 33.064664] test_double_free+0x1bc/0x238 [ 33.064802] kunit_try_run_case+0x170/0x3f0 [ 33.065220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.065902] kthread+0x328/0x630 [ 33.066282] ret_from_fork+0x10/0x20 [ 33.066436] [ 33.066528] kfence-#134: 0x00000000c915c51c-0x000000008d8deb11, size=32, cache=kmalloc-32 [ 33.066528] [ 33.066764] allocated by task 303 on cpu 0 at 33.063035s (0.003718s ago): [ 33.067211] test_alloc+0x29c/0x628 [ 33.067319] test_double_free+0xd4/0x238 [ 33.067445] kunit_try_run_case+0x170/0x3f0 [ 33.067554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.067666] kthread+0x328/0x630 [ 33.067757] ret_from_fork+0x10/0x20 [ 33.067865] [ 33.067935] freed by task 303 on cpu 0 at 33.063199s (0.004727s ago): [ 33.068463] test_double_free+0x1ac/0x238 [ 33.068588] kunit_try_run_case+0x170/0x3f0 [ 33.068783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.068913] kthread+0x328/0x630 [ 33.069662] ret_from_fork+0x10/0x20 [ 33.070214] [ 33.070319] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.070555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.070687] Hardware name: linux,dummy-virt (DT) [ 33.070776] ================================================================== [ 33.165517] ================================================================== [ 33.165860] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 33.165860] [ 33.166583] Invalid free of 0x0000000048f6cd5e (in kfence-#135): [ 33.167474] test_double_free+0x100/0x238 [ 33.167620] kunit_try_run_case+0x170/0x3f0 [ 33.167751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.167918] kthread+0x328/0x630 [ 33.168191] ret_from_fork+0x10/0x20 [ 33.168522] [ 33.168585] kfence-#135: 0x0000000048f6cd5e-0x000000007bb004a5, size=32, cache=test [ 33.168585] [ 33.168721] allocated by task 305 on cpu 0 at 33.164834s (0.003878s ago): [ 33.168988] test_alloc+0x230/0x628 [ 33.169293] test_double_free+0xd4/0x238 [ 33.169420] kunit_try_run_case+0x170/0x3f0 [ 33.169567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.169680] kthread+0x328/0x630 [ 33.169815] ret_from_fork+0x10/0x20 [ 33.169915] [ 33.169974] freed by task 305 on cpu 0 at 33.164930s (0.005036s ago): [ 33.170249] test_double_free+0xf0/0x238 [ 33.170653] kunit_try_run_case+0x170/0x3f0 [ 33.170772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.170994] kthread+0x328/0x630 [ 33.171200] ret_from_fork+0x10/0x20 [ 33.171711] [ 33.171871] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 33.172169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.172259] Hardware name: linux,dummy-virt (DT) [ 33.172416] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
Automatically assigned
[ 32.733498] ================================================================== [ 32.733994] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 32.733994] [ 32.734182] Use-after-free read at 0x000000005d6a7440 (in kfence-#131): [ 32.734342] test_use_after_free_read+0x114/0x248 [ 32.734482] kunit_try_run_case+0x170/0x3f0 [ 32.734985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.735108] kthread+0x328/0x630 [ 32.735204] ret_from_fork+0x10/0x20 [ 32.735300] [ 32.735377] kfence-#131: 0x000000005d6a7440-0x000000007ec29a65, size=32, cache=test [ 32.735377] [ 32.735501] allocated by task 297 on cpu 0 at 32.732831s (0.002662s ago): [ 32.735669] test_alloc+0x230/0x628 [ 32.736139] test_use_after_free_read+0xd0/0x248 [ 32.736520] kunit_try_run_case+0x170/0x3f0 [ 32.736912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.737054] kthread+0x328/0x630 [ 32.737193] ret_from_fork+0x10/0x20 [ 32.737340] [ 32.737401] freed by task 297 on cpu 0 at 32.733097s (0.004295s ago): [ 32.738106] test_use_after_free_read+0xf0/0x248 [ 32.738270] kunit_try_run_case+0x170/0x3f0 [ 32.738397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.739235] kthread+0x328/0x630 [ 32.739561] ret_from_fork+0x10/0x20 [ 32.739862] [ 32.740153] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 32.740406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.740605] Hardware name: linux,dummy-virt (DT) [ 32.740907] ================================================================== [ 32.633190] ================================================================== [ 32.634065] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 32.634065] [ 32.634867] Use-after-free read at 0x00000000fac58b55 (in kfence-#130): [ 32.635780] test_use_after_free_read+0x114/0x248 [ 32.636375] kunit_try_run_case+0x170/0x3f0 [ 32.636563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.636793] kthread+0x328/0x630 [ 32.636892] ret_from_fork+0x10/0x20 [ 32.638139] [ 32.638248] kfence-#130: 0x00000000fac58b55-0x00000000d57c698d, size=32, cache=kmalloc-32 [ 32.638248] [ 32.638599] allocated by task 295 on cpu 0 at 32.630227s (0.008315s ago): [ 32.639146] test_alloc+0x29c/0x628 [ 32.640102] test_use_after_free_read+0xd0/0x248 [ 32.640608] kunit_try_run_case+0x170/0x3f0 [ 32.640734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.641760] kthread+0x328/0x630 [ 32.641908] ret_from_fork+0x10/0x20 [ 32.642026] [ 32.642269] freed by task 295 on cpu 0 at 32.630809s (0.011315s ago): [ 32.644400] test_use_after_free_read+0x1c0/0x248 [ 32.644527] kunit_try_run_case+0x170/0x3f0 [ 32.644663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.644814] kthread+0x328/0x630 [ 32.644912] ret_from_fork+0x10/0x20 [ 32.645266] [ 32.645428] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 32.645984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.646191] Hardware name: linux,dummy-virt (DT) [ 32.646404] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
Automatically assigned
[ 32.517732] ================================================================== [ 32.517880] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 32.517880] [ 32.518053] Out-of-bounds write at 0x00000000128ca38b (1B left of kfence-#129): [ 32.518186] test_out_of_bounds_write+0x100/0x240 [ 32.518295] kunit_try_run_case+0x170/0x3f0 [ 32.520374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.520547] kthread+0x328/0x630 [ 32.520628] ret_from_fork+0x10/0x20 [ 32.520683] [ 32.520718] kfence-#129: 0x00000000a56eb345-0x00000000e95609df, size=32, cache=test [ 32.520718] [ 32.520932] allocated by task 293 on cpu 0 at 32.516551s (0.004362s ago): [ 32.521135] test_alloc+0x230/0x628 [ 32.521404] test_out_of_bounds_write+0xc8/0x240 [ 32.521688] kunit_try_run_case+0x170/0x3f0 [ 32.521899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.522431] kthread+0x328/0x630 [ 32.522538] ret_from_fork+0x10/0x20 [ 32.523025] [ 32.523146] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 32.523585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.523921] Hardware name: linux,dummy-virt (DT) [ 32.523967] ================================================================== [ 31.864583] ================================================================== [ 31.865650] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.865650] [ 31.866615] Out-of-bounds write at 0x0000000077669080 (1B left of kfence-#123): [ 31.866854] test_out_of_bounds_write+0x100/0x240 [ 31.867705] kunit_try_run_case+0x170/0x3f0 [ 31.867829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.868695] kthread+0x328/0x630 [ 31.869153] ret_from_fork+0x10/0x20 [ 31.869274] [ 31.869773] kfence-#123: 0x000000004091c0c8-0x0000000099a37d7e, size=32, cache=kmalloc-32 [ 31.869773] [ 31.869905] allocated by task 291 on cpu 0 at 31.862834s (0.007062s ago): [ 31.870826] test_alloc+0x29c/0x628 [ 31.870987] test_out_of_bounds_write+0xc8/0x240 [ 31.871598] kunit_try_run_case+0x170/0x3f0 [ 31.871823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.872482] kthread+0x328/0x630 [ 31.872801] ret_from_fork+0x10/0x20 [ 31.873256] [ 31.873715] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 31.873911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.873984] Hardware name: linux,dummy-virt (DT) [ 31.875011] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
Automatically assigned
[ 30.904204] ================================================================== [ 30.904458] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.904458] [ 30.904774] Out-of-bounds read at 0x00000000efc9bfca (1B left of kfence-#114): [ 30.905875] test_out_of_bounds_read+0x114/0x3e0 [ 30.906007] kunit_try_run_case+0x170/0x3f0 [ 30.906166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.906347] kthread+0x328/0x630 [ 30.906454] ret_from_fork+0x10/0x20 [ 30.906861] [ 30.907567] kfence-#114: 0x00000000bc441aae-0x00000000cb44580c, size=32, cache=kmalloc-32 [ 30.907567] [ 30.908038] allocated by task 287 on cpu 0 at 30.900881s (0.007047s ago): [ 30.909369] test_alloc+0x29c/0x628 [ 30.909542] test_out_of_bounds_read+0xdc/0x3e0 [ 30.909748] kunit_try_run_case+0x170/0x3f0 [ 30.909936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.910102] kthread+0x328/0x630 [ 30.910355] ret_from_fork+0x10/0x20 [ 30.910610] [ 30.910928] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.911127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.911198] Hardware name: linux,dummy-virt (DT) [ 30.911298] ================================================================== [ 31.645319] ================================================================== [ 31.645651] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 31.645651] [ 31.646149] Out-of-bounds read at 0x00000000a587696e (1B left of kfence-#121): [ 31.646360] test_out_of_bounds_read+0x114/0x3e0 [ 31.646565] kunit_try_run_case+0x170/0x3f0 [ 31.646719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.647016] kthread+0x328/0x630 [ 31.647194] ret_from_fork+0x10/0x20 [ 31.647400] [ 31.647498] kfence-#121: 0x0000000063f8f0cd-0x00000000d3811c1a, size=32, cache=test [ 31.647498] [ 31.647632] allocated by task 289 on cpu 0 at 31.644810s (0.002813s ago): [ 31.647989] test_alloc+0x230/0x628 [ 31.648114] test_out_of_bounds_read+0xdc/0x3e0 [ 31.648315] kunit_try_run_case+0x170/0x3f0 [ 31.648520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.648853] kthread+0x328/0x630 [ 31.648973] ret_from_fork+0x10/0x20 [ 31.649094] [ 31.649268] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 31.649498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.649593] Hardware name: linux,dummy-virt (DT) [ 31.649781] ================================================================== [ 31.754769] ================================================================== [ 31.754910] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 31.754910] [ 31.755075] Out-of-bounds read at 0x000000006248890a (32B right of kfence-#122): [ 31.755163] test_out_of_bounds_read+0x1c8/0x3e0 [ 31.755226] kunit_try_run_case+0x170/0x3f0 [ 31.755284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.755380] kthread+0x328/0x630 [ 31.755477] ret_from_fork+0x10/0x20 [ 31.755573] [ 31.755632] kfence-#122: 0x0000000079baa0be-0x00000000a2142328, size=32, cache=test [ 31.755632] [ 31.755751] allocated by task 289 on cpu 0 at 31.754625s (0.001118s ago): [ 31.755956] test_alloc+0x230/0x628 [ 31.756064] test_out_of_bounds_read+0x198/0x3e0 [ 31.756178] kunit_try_run_case+0x170/0x3f0 [ 31.756285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.756416] kthread+0x328/0x630 [ 31.757799] ret_from_fork+0x10/0x20 [ 31.757940] [ 31.758034] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 31.759241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.759316] Hardware name: linux,dummy-virt (DT) [ 31.759518] ================================================================== [ 31.117883] ================================================================== [ 31.118030] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 31.118030] [ 31.118224] Out-of-bounds read at 0x00000000ab33e70c (32B right of kfence-#116): [ 31.118910] test_out_of_bounds_read+0x1c8/0x3e0 [ 31.119398] kunit_try_run_case+0x170/0x3f0 [ 31.119516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.120165] kthread+0x328/0x630 [ 31.120269] ret_from_fork+0x10/0x20 [ 31.120454] [ 31.120518] kfence-#116: 0x000000000eb20a0a-0x0000000042a23c91, size=32, cache=kmalloc-32 [ 31.120518] [ 31.120827] allocated by task 287 on cpu 0 at 31.117268s (0.003550s ago): [ 31.121106] test_alloc+0x29c/0x628 [ 31.121214] test_out_of_bounds_read+0x198/0x3e0 [ 31.121400] kunit_try_run_case+0x170/0x3f0 [ 31.121516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.121678] kthread+0x328/0x630 [ 31.121781] ret_from_fork+0x10/0x20 [ 31.121879] [ 31.121969] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 31.122607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.122741] Hardware name: linux,dummy-virt (DT) [ 31.122826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
Automatically assigned
[ 30.664587] ================================================================== [ 30.665524] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 30.667176] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.667312] [ 30.669060] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.669854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.670360] Hardware name: linux,dummy-virt (DT) [ 30.670474] Call trace: [ 30.670548] show_stack+0x20/0x38 (C) [ 30.670685] dump_stack_lvl+0x8c/0xd0 [ 30.670827] print_report+0x118/0x608 [ 30.670961] kasan_report+0xdc/0x128 [ 30.671093] kasan_check_range+0x100/0x1a8 [ 30.671216] __kasan_check_write+0x20/0x30 [ 30.671354] strncpy_from_user+0x3c/0x2a0 [ 30.671474] copy_user_test_oob+0x5c0/0xec8 [ 30.671598] kunit_try_run_case+0x170/0x3f0 [ 30.671733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.671884] kthread+0x328/0x630 [ 30.672001] ret_from_fork+0x10/0x20 [ 30.680541] [ 30.680581] Allocated by task 285: [ 30.680626] kasan_save_stack+0x3c/0x68 [ 30.680749] kasan_save_track+0x20/0x40 [ 30.680871] kasan_save_alloc_info+0x40/0x58 [ 30.680989] __kasan_kmalloc+0xd4/0xd8 [ 30.681048] __kmalloc_noprof+0x198/0x4c8 [ 30.681099] kunit_kmalloc_array+0x34/0x88 [ 30.681153] copy_user_test_oob+0xac/0xec8 [ 30.681203] kunit_try_run_case+0x170/0x3f0 [ 30.681253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.681322] kthread+0x328/0x630 [ 30.681501] ret_from_fork+0x10/0x20 [ 30.681618] [ 30.681678] The buggy address belongs to the object at fff00000c7719c00 [ 30.681678] which belongs to the cache kmalloc-128 of size 128 [ 30.681847] The buggy address is located 0 bytes inside of [ 30.681847] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.682015] [ 30.682091] The buggy address belongs to the physical page: [ 30.682177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.682310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.682508] page_type: f5(slab) [ 30.682610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.682739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.682867] page dumped because: kasan: bad access detected [ 30.683003] [ 30.683053] Memory state around the buggy address: [ 30.683149] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.683409] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.683542] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.683698] ^ [ 30.683864] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.684016] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.684174] ================================================================== [ 30.688189] ================================================================== [ 30.688345] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 30.688484] Write of size 1 at addr fff00000c7719c78 by task kunit_try_catch/285 [ 30.688730] [ 30.688909] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.689132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.689255] Hardware name: linux,dummy-virt (DT) [ 30.689386] Call trace: [ 30.689498] show_stack+0x20/0x38 (C) [ 30.689645] dump_stack_lvl+0x8c/0xd0 [ 30.689779] print_report+0x118/0x608 [ 30.690028] kasan_report+0xdc/0x128 [ 30.690250] __asan_report_store1_noabort+0x20/0x30 [ 30.690548] strncpy_from_user+0x270/0x2a0 [ 30.690679] copy_user_test_oob+0x5c0/0xec8 [ 30.690869] kunit_try_run_case+0x170/0x3f0 [ 30.691022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.691374] kthread+0x328/0x630 [ 30.691495] ret_from_fork+0x10/0x20 [ 30.691648] [ 30.691763] Allocated by task 285: [ 30.691975] kasan_save_stack+0x3c/0x68 [ 30.692160] kasan_save_track+0x20/0x40 [ 30.692364] kasan_save_alloc_info+0x40/0x58 [ 30.692492] __kasan_kmalloc+0xd4/0xd8 [ 30.692626] __kmalloc_noprof+0x198/0x4c8 [ 30.692758] kunit_kmalloc_array+0x34/0x88 [ 30.693008] copy_user_test_oob+0xac/0xec8 [ 30.693188] kunit_try_run_case+0x170/0x3f0 [ 30.693527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.693726] kthread+0x328/0x630 [ 30.693812] ret_from_fork+0x10/0x20 [ 30.693904] [ 30.693992] The buggy address belongs to the object at fff00000c7719c00 [ 30.693992] which belongs to the cache kmalloc-128 of size 128 [ 30.694270] The buggy address is located 0 bytes to the right of [ 30.694270] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.694460] [ 30.694532] The buggy address belongs to the physical page: [ 30.694626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.694815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.694956] page_type: f5(slab) [ 30.695075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.695219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.695457] page dumped because: kasan: bad access detected [ 30.695636] [ 30.695699] Memory state around the buggy address: [ 30.696218] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.696407] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.696860] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.696974] ^ [ 30.697121] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.697241] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.697387] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
Automatically assigned
[ 30.590183] ================================================================== [ 30.590467] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 30.590615] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.590752] [ 30.590859] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.591282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.591388] Hardware name: linux,dummy-virt (DT) [ 30.591506] Call trace: [ 30.591658] show_stack+0x20/0x38 (C) [ 30.591926] dump_stack_lvl+0x8c/0xd0 [ 30.592032] print_report+0x118/0x608 [ 30.592147] kasan_report+0xdc/0x128 [ 30.592215] kasan_check_range+0x100/0x1a8 [ 30.592277] __kasan_check_read+0x20/0x30 [ 30.592362] copy_user_test_oob+0x728/0xec8 [ 30.592432] kunit_try_run_case+0x170/0x3f0 [ 30.592495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.592567] kthread+0x328/0x630 [ 30.592623] ret_from_fork+0x10/0x20 [ 30.592685] [ 30.592711] Allocated by task 285: [ 30.592748] kasan_save_stack+0x3c/0x68 [ 30.592800] kasan_save_track+0x20/0x40 [ 30.592851] kasan_save_alloc_info+0x40/0x58 [ 30.592905] __kasan_kmalloc+0xd4/0xd8 [ 30.592951] __kmalloc_noprof+0x198/0x4c8 [ 30.593002] kunit_kmalloc_array+0x34/0x88 [ 30.593051] copy_user_test_oob+0xac/0xec8 [ 30.593100] kunit_try_run_case+0x170/0x3f0 [ 30.593150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.593207] kthread+0x328/0x630 [ 30.593248] ret_from_fork+0x10/0x20 [ 30.593307] [ 30.593370] The buggy address belongs to the object at fff00000c7719c00 [ 30.593370] which belongs to the cache kmalloc-128 of size 128 [ 30.593577] The buggy address is located 0 bytes inside of [ 30.593577] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.593744] [ 30.593801] The buggy address belongs to the physical page: [ 30.594324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.594515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.594743] page_type: f5(slab) [ 30.594861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.594994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.596186] page dumped because: kasan: bad access detected [ 30.596285] [ 30.596358] Memory state around the buggy address: [ 30.596643] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.597512] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.597966] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.598891] ^ [ 30.599357] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.600276] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.600691] ================================================================== [ 30.628528] ================================================================== [ 30.628635] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 30.628740] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.628867] [ 30.628952] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.629161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.629236] Hardware name: linux,dummy-virt (DT) [ 30.629525] Call trace: [ 30.629595] show_stack+0x20/0x38 (C) [ 30.629914] dump_stack_lvl+0x8c/0xd0 [ 30.630041] print_report+0x118/0x608 [ 30.630156] kasan_report+0xdc/0x128 [ 30.630300] kasan_check_range+0x100/0x1a8 [ 30.630464] __kasan_check_read+0x20/0x30 [ 30.630605] copy_user_test_oob+0x3c8/0xec8 [ 30.630752] kunit_try_run_case+0x170/0x3f0 [ 30.630892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.631052] kthread+0x328/0x630 [ 30.631186] ret_from_fork+0x10/0x20 [ 30.631323] [ 30.631403] Allocated by task 285: [ 30.631487] kasan_save_stack+0x3c/0x68 [ 30.631590] kasan_save_track+0x20/0x40 [ 30.631706] kasan_save_alloc_info+0x40/0x58 [ 30.631907] __kasan_kmalloc+0xd4/0xd8 [ 30.632107] __kmalloc_noprof+0x198/0x4c8 [ 30.632268] kunit_kmalloc_array+0x34/0x88 [ 30.632415] copy_user_test_oob+0xac/0xec8 [ 30.632541] kunit_try_run_case+0x170/0x3f0 [ 30.632662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.632797] kthread+0x328/0x630 [ 30.632995] ret_from_fork+0x10/0x20 [ 30.633201] [ 30.633258] The buggy address belongs to the object at fff00000c7719c00 [ 30.633258] which belongs to the cache kmalloc-128 of size 128 [ 30.633442] The buggy address is located 0 bytes inside of [ 30.633442] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.633621] [ 30.633789] The buggy address belongs to the physical page: [ 30.633929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.634095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.634254] page_type: f5(slab) [ 30.634384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.634533] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.634656] page dumped because: kasan: bad access detected [ 30.634747] [ 30.634802] Memory state around the buggy address: [ 30.634895] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.635010] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.635181] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.635419] ^ [ 30.635729] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.635853] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.635973] ================================================================== [ 30.636409] ================================================================== [ 30.636516] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 30.636621] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.636758] [ 30.636830] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.637039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.637114] Hardware name: linux,dummy-virt (DT) [ 30.637191] Call trace: [ 30.637253] show_stack+0x20/0x38 (C) [ 30.637406] dump_stack_lvl+0x8c/0xd0 [ 30.637533] print_report+0x118/0x608 [ 30.637646] kasan_report+0xdc/0x128 [ 30.637758] kasan_check_range+0x100/0x1a8 [ 30.637879] __kasan_check_write+0x20/0x30 [ 30.637996] copy_user_test_oob+0x434/0xec8 [ 30.638115] kunit_try_run_case+0x170/0x3f0 [ 30.638231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.639869] kthread+0x328/0x630 [ 30.640008] ret_from_fork+0x10/0x20 [ 30.640154] [ 30.640205] Allocated by task 285: [ 30.640297] kasan_save_stack+0x3c/0x68 [ 30.640435] kasan_save_track+0x20/0x40 [ 30.640606] kasan_save_alloc_info+0x40/0x58 [ 30.640748] __kasan_kmalloc+0xd4/0xd8 [ 30.641235] __kmalloc_noprof+0x198/0x4c8 [ 30.641392] kunit_kmalloc_array+0x34/0x88 [ 30.641512] copy_user_test_oob+0xac/0xec8 [ 30.641612] kunit_try_run_case+0x170/0x3f0 [ 30.641715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641857] kthread+0x328/0x630 [ 30.642026] ret_from_fork+0x10/0x20 [ 30.642299] [ 30.642370] The buggy address belongs to the object at fff00000c7719c00 [ 30.642370] which belongs to the cache kmalloc-128 of size 128 [ 30.642518] The buggy address is located 0 bytes inside of [ 30.642518] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.642673] [ 30.642724] The buggy address belongs to the physical page: [ 30.642834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.643157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.643279] page_type: f5(slab) [ 30.643402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.643545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.644139] page dumped because: kasan: bad access detected [ 30.644248] [ 30.644309] Memory state around the buggy address: [ 30.644426] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.644560] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.644689] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.644852] ^ [ 30.644999] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.645247] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.645417] ================================================================== [ 30.559926] ================================================================== [ 30.560211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 30.560421] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.560560] [ 30.560660] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.562267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.562413] Hardware name: linux,dummy-virt (DT) [ 30.562853] Call trace: [ 30.563263] show_stack+0x20/0x38 (C) [ 30.563823] dump_stack_lvl+0x8c/0xd0 [ 30.564250] print_report+0x118/0x608 [ 30.564495] kasan_report+0xdc/0x128 [ 30.564631] kasan_check_range+0x100/0x1a8 [ 30.565152] __kasan_check_write+0x20/0x30 [ 30.565861] copy_user_test_oob+0x234/0xec8 [ 30.566098] kunit_try_run_case+0x170/0x3f0 [ 30.566429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.566570] kthread+0x328/0x630 [ 30.566695] ret_from_fork+0x10/0x20 [ 30.567082] [ 30.567247] Allocated by task 285: [ 30.567449] kasan_save_stack+0x3c/0x68 [ 30.567658] kasan_save_track+0x20/0x40 [ 30.567754] kasan_save_alloc_info+0x40/0x58 [ 30.567866] __kasan_kmalloc+0xd4/0xd8 [ 30.567976] __kmalloc_noprof+0x198/0x4c8 [ 30.568142] kunit_kmalloc_array+0x34/0x88 [ 30.568354] copy_user_test_oob+0xac/0xec8 [ 30.568471] kunit_try_run_case+0x170/0x3f0 [ 30.568584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.568966] kthread+0x328/0x630 [ 30.569162] ret_from_fork+0x10/0x20 [ 30.569269] [ 30.569350] The buggy address belongs to the object at fff00000c7719c00 [ 30.569350] which belongs to the cache kmalloc-128 of size 128 [ 30.569506] The buggy address is located 0 bytes inside of [ 30.569506] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.569677] [ 30.569797] The buggy address belongs to the physical page: [ 30.570062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.570220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.570461] page_type: f5(slab) [ 30.570576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.570717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.570832] page dumped because: kasan: bad access detected [ 30.570977] [ 30.571077] Memory state around the buggy address: [ 30.571172] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.571393] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.571577] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.571684] ^ [ 30.571956] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572021] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572124] ================================================================== [ 30.616657] ================================================================== [ 30.616781] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 30.616898] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.617023] [ 30.617298] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.617541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.617877] Hardware name: linux,dummy-virt (DT) [ 30.618107] Call trace: [ 30.618267] show_stack+0x20/0x38 (C) [ 30.618413] dump_stack_lvl+0x8c/0xd0 [ 30.618531] print_report+0x118/0x608 [ 30.618655] kasan_report+0xdc/0x128 [ 30.618798] kasan_check_range+0x100/0x1a8 [ 30.618929] __kasan_check_write+0x20/0x30 [ 30.619045] copy_user_test_oob+0x35c/0xec8 [ 30.619167] kunit_try_run_case+0x170/0x3f0 [ 30.619287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.619439] kthread+0x328/0x630 [ 30.619551] ret_from_fork+0x10/0x20 [ 30.619674] [ 30.619726] Allocated by task 285: [ 30.619805] kasan_save_stack+0x3c/0x68 [ 30.619984] kasan_save_track+0x20/0x40 [ 30.620107] kasan_save_alloc_info+0x40/0x58 [ 30.620774] __kasan_kmalloc+0xd4/0xd8 [ 30.621255] __kmalloc_noprof+0x198/0x4c8 [ 30.621795] kunit_kmalloc_array+0x34/0x88 [ 30.622111] copy_user_test_oob+0xac/0xec8 [ 30.622359] kunit_try_run_case+0x170/0x3f0 [ 30.622489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.622653] kthread+0x328/0x630 [ 30.622754] ret_from_fork+0x10/0x20 [ 30.622924] [ 30.623038] The buggy address belongs to the object at fff00000c7719c00 [ 30.623038] which belongs to the cache kmalloc-128 of size 128 [ 30.623188] The buggy address is located 0 bytes inside of [ 30.623188] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.623363] [ 30.623418] The buggy address belongs to the physical page: [ 30.623499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.623659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.623882] page_type: f5(slab) [ 30.623977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.624303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.624438] page dumped because: kasan: bad access detected [ 30.624533] [ 30.624593] Memory state around the buggy address: [ 30.624690] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.624824] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.624955] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.625133] ^ [ 30.627204] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.627355] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.627475] ================================================================== [ 30.646251] ================================================================== [ 30.646418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 30.646576] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.646793] [ 30.646996] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.647568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.647786] Hardware name: linux,dummy-virt (DT) [ 30.648146] Call trace: [ 30.648249] show_stack+0x20/0x38 (C) [ 30.648393] dump_stack_lvl+0x8c/0xd0 [ 30.648511] print_report+0x118/0x608 [ 30.648628] kasan_report+0xdc/0x128 [ 30.648740] kasan_check_range+0x100/0x1a8 [ 30.648863] __kasan_check_read+0x20/0x30 [ 30.648979] copy_user_test_oob+0x4a0/0xec8 [ 30.649099] kunit_try_run_case+0x170/0x3f0 [ 30.649224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.649388] kthread+0x328/0x630 [ 30.649496] ret_from_fork+0x10/0x20 [ 30.649614] [ 30.649662] Allocated by task 285: [ 30.649733] kasan_save_stack+0x3c/0x68 [ 30.649828] kasan_save_track+0x20/0x40 [ 30.649925] kasan_save_alloc_info+0x40/0x58 [ 30.650026] __kasan_kmalloc+0xd4/0xd8 [ 30.650675] __kmalloc_noprof+0x198/0x4c8 [ 30.651095] kunit_kmalloc_array+0x34/0x88 [ 30.655387] copy_user_test_oob+0xac/0xec8 [ 30.655740] kunit_try_run_case+0x170/0x3f0 [ 30.656139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.657386] kthread+0x328/0x630 [ 30.657488] ret_from_fork+0x10/0x20 [ 30.657580] [ 30.657637] The buggy address belongs to the object at fff00000c7719c00 [ 30.657637] which belongs to the cache kmalloc-128 of size 128 [ 30.657838] The buggy address is located 0 bytes inside of [ 30.657838] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.658072] [ 30.658136] The buggy address belongs to the physical page: [ 30.658236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.658777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.658994] page_type: f5(slab) [ 30.659113] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.659312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.659789] page dumped because: kasan: bad access detected [ 30.659937] [ 30.660039] Memory state around the buggy address: [ 30.660241] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.661192] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.661764] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.661878] ^ [ 30.661993] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.662114] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.662222] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
Automatically assigned
[ 30.462993] ================================================================== [ 30.463102] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 30.463214] Write of size 8 at addr fff00000c7719b78 by task kunit_try_catch/281 [ 30.466387] [ 30.466447] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.466645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.466684] Hardware name: linux,dummy-virt (DT) [ 30.466728] Call trace: [ 30.466758] show_stack+0x20/0x38 (C) [ 30.466822] dump_stack_lvl+0x8c/0xd0 [ 30.466885] print_report+0x118/0x608 [ 30.466944] kasan_report+0xdc/0x128 [ 30.467004] kasan_check_range+0x100/0x1a8 [ 30.467066] __kasan_check_write+0x20/0x30 [ 30.467127] copy_to_kernel_nofault+0x8c/0x250 [ 30.467188] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 30.467252] kunit_try_run_case+0x170/0x3f0 [ 30.467313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.467627] kthread+0x328/0x630 [ 30.467774] ret_from_fork+0x10/0x20 [ 30.468088] [ 30.468448] Allocated by task 281: [ 30.468898] kasan_save_stack+0x3c/0x68 [ 30.469009] kasan_save_track+0x20/0x40 [ 30.470193] kasan_save_alloc_info+0x40/0x58 [ 30.470481] __kasan_kmalloc+0xd4/0xd8 [ 30.470587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.470706] copy_to_kernel_nofault_oob+0xc8/0x418 [ 30.472138] kunit_try_run_case+0x170/0x3f0 [ 30.472254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.472403] kthread+0x328/0x630 [ 30.473786] ret_from_fork+0x10/0x20 [ 30.474054] [ 30.474161] The buggy address belongs to the object at fff00000c7719b00 [ 30.474161] which belongs to the cache kmalloc-128 of size 128 [ 30.474877] The buggy address is located 0 bytes to the right of [ 30.474877] allocated 120-byte region [fff00000c7719b00, fff00000c7719b78) [ 30.475274] [ 30.475366] The buggy address belongs to the physical page: [ 30.475451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.476087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.476281] page_type: f5(slab) [ 30.476477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.476652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.476781] page dumped because: kasan: bad access detected [ 30.476921] [ 30.476984] Memory state around the buggy address: [ 30.477075] fff00000c7719a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.477189] fff00000c7719a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.477324] >fff00000c7719b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.477556] ^ [ 30.477668] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.477778] fff00000c7719c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.477877] ================================================================== [ 30.446045] ================================================================== [ 30.446301] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 30.446569] Read of size 8 at addr fff00000c7719b78 by task kunit_try_catch/281 [ 30.446793] [ 30.446938] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.447245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.447390] Hardware name: linux,dummy-virt (DT) [ 30.447481] Call trace: [ 30.447552] show_stack+0x20/0x38 (C) [ 30.447689] dump_stack_lvl+0x8c/0xd0 [ 30.448008] print_report+0x118/0x608 [ 30.448130] kasan_report+0xdc/0x128 [ 30.448197] __asan_report_load8_noabort+0x20/0x30 [ 30.448259] copy_to_kernel_nofault+0x204/0x250 [ 30.448344] copy_to_kernel_nofault_oob+0x158/0x418 [ 30.448501] kunit_try_run_case+0x170/0x3f0 [ 30.449745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.449905] kthread+0x328/0x630 [ 30.450040] ret_from_fork+0x10/0x20 [ 30.450174] [ 30.450298] Allocated by task 281: [ 30.450516] kasan_save_stack+0x3c/0x68 [ 30.450844] kasan_save_track+0x20/0x40 [ 30.451196] kasan_save_alloc_info+0x40/0x58 [ 30.451322] __kasan_kmalloc+0xd4/0xd8 [ 30.451441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.451541] copy_to_kernel_nofault_oob+0xc8/0x418 [ 30.451643] kunit_try_run_case+0x170/0x3f0 [ 30.451741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.451848] kthread+0x328/0x630 [ 30.451952] ret_from_fork+0x10/0x20 [ 30.452050] [ 30.452104] The buggy address belongs to the object at fff00000c7719b00 [ 30.452104] which belongs to the cache kmalloc-128 of size 128 [ 30.452249] The buggy address is located 0 bytes to the right of [ 30.452249] allocated 120-byte region [fff00000c7719b00, fff00000c7719b78) [ 30.453458] [ 30.453821] The buggy address belongs to the physical page: [ 30.454589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.455568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.456139] page_type: f5(slab) [ 30.456592] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.456732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.457092] page dumped because: kasan: bad access detected [ 30.457454] [ 30.457509] Memory state around the buggy address: [ 30.458002] fff00000c7719a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.458320] fff00000c7719a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.458458] >fff00000c7719b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.458563] ^ [ 30.458669] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.458883] fff00000c7719c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.459524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
Automatically assigned
[ 30.345099] ================================================================== [ 30.345384] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 30.345597] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 30.345723] [ 30.345793] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.345995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.346068] Hardware name: linux,dummy-virt (DT) [ 30.346625] Call trace: [ 30.346709] show_stack+0x20/0x38 (C) [ 30.346855] dump_stack_lvl+0x8c/0xd0 [ 30.346991] print_report+0x310/0x608 [ 30.347114] kasan_report+0xdc/0x128 [ 30.347229] __asan_report_load1_noabort+0x20/0x30 [ 30.347385] vmalloc_oob+0x51c/0x5d0 [ 30.347777] kunit_try_run_case+0x170/0x3f0 [ 30.348183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.348350] kthread+0x328/0x630 [ 30.348506] ret_from_fork+0x10/0x20 [ 30.348701] [ 30.348814] The buggy address belongs to the virtual mapping at [ 30.348814] [ffff8000800fe000, ffff800080100000) created by: [ 30.348814] vmalloc_oob+0x98/0x5d0 [ 30.349113] [ 30.349270] The buggy address belongs to the physical page: [ 30.349480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107723 [ 30.349617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.350015] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.350172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.350381] page dumped because: kasan: bad access detected [ 30.350552] [ 30.350675] Memory state around the buggy address: [ 30.350778] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.350902] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.351031] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.351316] ^ [ 30.351459] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.351666] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.351778] ================================================================== [ 30.331253] ================================================================== [ 30.331459] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 30.331600] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 30.331742] [ 30.331850] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.332166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.332286] Hardware name: linux,dummy-virt (DT) [ 30.332449] Call trace: [ 30.332547] show_stack+0x20/0x38 (C) [ 30.332698] dump_stack_lvl+0x8c/0xd0 [ 30.332836] print_report+0x310/0x608 [ 30.333077] kasan_report+0xdc/0x128 [ 30.333211] __asan_report_load1_noabort+0x20/0x30 [ 30.333410] vmalloc_oob+0x578/0x5d0 [ 30.333602] kunit_try_run_case+0x170/0x3f0 [ 30.333783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.334017] kthread+0x328/0x630 [ 30.334386] ret_from_fork+0x10/0x20 [ 30.335045] [ 30.335339] The buggy address belongs to the virtual mapping at [ 30.335339] [ffff8000800fe000, ffff800080100000) created by: [ 30.335339] vmalloc_oob+0x98/0x5d0 [ 30.335530] [ 30.335588] The buggy address belongs to the physical page: [ 30.336519] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107723 [ 30.337142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.337720] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.337906] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.338177] page dumped because: kasan: bad access detected [ 30.338454] [ 30.339025] Memory state around the buggy address: [ 30.339115] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.339234] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.340292] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.340430] ^ [ 30.341224] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.341718] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.341826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 29.967624] ================================================================== [ 29.967741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.968068] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.968392] [ 29.968630] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.968868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.968940] Hardware name: linux,dummy-virt (DT) [ 29.969025] Call trace: [ 29.969270] show_stack+0x20/0x38 (C) [ 29.969736] dump_stack_lvl+0x8c/0xd0 [ 29.970371] print_report+0x118/0x608 [ 29.970895] kasan_report+0xdc/0x128 [ 29.971023] kasan_check_range+0x100/0x1a8 [ 29.971409] __kasan_check_write+0x20/0x30 [ 29.971692] kasan_atomics_helper+0x10c0/0x4858 [ 29.972317] kasan_atomics+0x198/0x2e0 [ 29.972935] kunit_try_run_case+0x170/0x3f0 [ 29.973115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973252] kthread+0x328/0x630 [ 29.973391] ret_from_fork+0x10/0x20 [ 29.973516] [ 29.973759] Allocated by task 265: [ 29.974508] kasan_save_stack+0x3c/0x68 [ 29.974703] kasan_save_track+0x20/0x40 [ 29.974913] kasan_save_alloc_info+0x40/0x58 [ 29.975081] __kasan_kmalloc+0xd4/0xd8 [ 29.975203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.975497] kasan_atomics+0xb8/0x2e0 [ 29.975612] kunit_try_run_case+0x170/0x3f0 [ 29.975937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.976122] kthread+0x328/0x630 [ 29.976258] ret_from_fork+0x10/0x20 [ 29.976394] [ 29.976453] The buggy address belongs to the object at fff00000c770a480 [ 29.976453] which belongs to the cache kmalloc-64 of size 64 [ 29.976624] The buggy address is located 0 bytes to the right of [ 29.976624] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.976880] [ 29.976977] The buggy address belongs to the physical page: [ 29.977063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.977195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.977356] page_type: f5(slab) [ 29.977472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.977666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.977982] page dumped because: kasan: bad access detected [ 29.978120] [ 29.978174] Memory state around the buggy address: [ 29.978256] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.978390] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.978508] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.978605] ^ [ 29.978883] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979042] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979160] ================================================================== [ 30.035564] ================================================================== [ 30.035678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 30.035804] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.036707] [ 30.036823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.037654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.037764] Hardware name: linux,dummy-virt (DT) [ 30.038017] Call trace: [ 30.038189] show_stack+0x20/0x38 (C) [ 30.038989] dump_stack_lvl+0x8c/0xd0 [ 30.039381] print_report+0x118/0x608 [ 30.039756] kasan_report+0xdc/0x128 [ 30.040381] kasan_check_range+0x100/0x1a8 [ 30.040756] __kasan_check_write+0x20/0x30 [ 30.041296] kasan_atomics_helper+0x126c/0x4858 [ 30.041503] kasan_atomics+0x198/0x2e0 [ 30.041630] kunit_try_run_case+0x170/0x3f0 [ 30.042254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.043034] kthread+0x328/0x630 [ 30.043457] ret_from_fork+0x10/0x20 [ 30.043747] [ 30.044167] Allocated by task 265: [ 30.044256] kasan_save_stack+0x3c/0x68 [ 30.044457] kasan_save_track+0x20/0x40 [ 30.045227] kasan_save_alloc_info+0x40/0x58 [ 30.045387] __kasan_kmalloc+0xd4/0xd8 [ 30.045773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.045881] kasan_atomics+0xb8/0x2e0 [ 30.046761] kunit_try_run_case+0x170/0x3f0 [ 30.046906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047022] kthread+0x328/0x630 [ 30.047074] ret_from_fork+0x10/0x20 [ 30.047126] [ 30.047153] The buggy address belongs to the object at fff00000c770a480 [ 30.047153] which belongs to the cache kmalloc-64 of size 64 [ 30.047230] The buggy address is located 0 bytes to the right of [ 30.047230] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.047314] [ 30.047402] The buggy address belongs to the physical page: [ 30.047609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.047743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.047921] page_type: f5(slab) [ 30.048106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.048244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.048384] page dumped because: kasan: bad access detected [ 30.048471] [ 30.048519] Memory state around the buggy address: [ 30.048640] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.048993] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.049574] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.049846] ^ [ 30.049943] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050566] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050940] ================================================================== [ 29.518953] ================================================================== [ 29.519063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 29.519172] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.519758] [ 29.520734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.521094] Hardware name: linux,dummy-virt (DT) [ 29.521247] Call trace: [ 29.521862] show_stack+0x20/0x38 (C) [ 29.522034] dump_stack_lvl+0x8c/0xd0 [ 29.522504] print_report+0x118/0x608 [ 29.522667] kasan_report+0xdc/0x128 [ 29.523456] __kasan_check_write+0x20/0x30 [ 29.526492] kthread+0x328/0x630 [ 29.527268] [ 29.527802] __kasan_kmalloc+0xd4/0xd8 [ 29.527976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.529084] ret_from_fork+0x10/0x20 [ 29.529204] [ 29.529686] The buggy address is located 0 bytes to the right of [ 29.529686] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.529991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.530883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.531037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.531144] page dumped because: kasan: bad access detected [ 29.531257] [ 29.531319] Memory state around the buggy address: [ 29.531602] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.531857] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.532672] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.538462] kasan_report+0xdc/0x128 [ 29.540869] kthread+0x328/0x630 [ 29.542528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.544317] [ 29.546679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.546820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.546926] page dumped because: kasan: bad access detected [ 29.547008] [ 29.547080] Memory state around the buggy address: [ 29.547161] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.547274] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.547419] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.547525] ^ [ 29.547612] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.547719] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.548041] ================================================================== [ 30.005300] ================================================================== [ 30.005426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 30.005546] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.005676] [ 30.005739] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.006128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.006243] Hardware name: linux,dummy-virt (DT) [ 30.006356] Call trace: [ 30.006467] show_stack+0x20/0x38 (C) [ 30.006914] dump_stack_lvl+0x8c/0xd0 [ 30.007108] print_report+0x118/0x608 [ 30.007226] kasan_report+0xdc/0x128 [ 30.007360] kasan_check_range+0x100/0x1a8 [ 30.007490] __kasan_check_write+0x20/0x30 [ 30.007610] kasan_atomics_helper+0x11f8/0x4858 [ 30.007728] kasan_atomics+0x198/0x2e0 [ 30.007859] kunit_try_run_case+0x170/0x3f0 [ 30.009660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.011533] kthread+0x328/0x630 [ 30.012360] ret_from_fork+0x10/0x20 [ 30.013111] [ 30.013166] Allocated by task 265: [ 30.013765] kasan_save_stack+0x3c/0x68 [ 30.014010] kasan_save_track+0x20/0x40 [ 30.014678] kasan_save_alloc_info+0x40/0x58 [ 30.014797] __kasan_kmalloc+0xd4/0xd8 [ 30.015627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.016075] kasan_atomics+0xb8/0x2e0 [ 30.016175] kunit_try_run_case+0x170/0x3f0 [ 30.016275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.018427] kthread+0x328/0x630 [ 30.018968] ret_from_fork+0x10/0x20 [ 30.019558] [ 30.019616] The buggy address belongs to the object at fff00000c770a480 [ 30.019616] which belongs to the cache kmalloc-64 of size 64 [ 30.020267] The buggy address is located 0 bytes to the right of [ 30.020267] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.021636] [ 30.021783] The buggy address belongs to the physical page: [ 30.021867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.021997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.022116] page_type: f5(slab) [ 30.022209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.024544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.025534] page dumped because: kasan: bad access detected [ 30.025725] [ 30.025777] Memory state around the buggy address: [ 30.026617] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027438] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.028219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.028435] ^ [ 30.028920] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030125] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030400] ================================================================== [ 30.255580] ================================================================== [ 30.257271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.257889] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.258465] [ 30.258541] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.259166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.259238] Hardware name: linux,dummy-virt (DT) [ 30.259321] Call trace: [ 30.259400] show_stack+0x20/0x38 (C) [ 30.260864] dump_stack_lvl+0x8c/0xd0 [ 30.261855] print_report+0x118/0x608 [ 30.262002] kasan_report+0xdc/0x128 [ 30.262122] __asan_report_load8_noabort+0x20/0x30 [ 30.262251] kasan_atomics_helper+0x3e20/0x4858 [ 30.264588] kasan_atomics+0x198/0x2e0 [ 30.264928] kunit_try_run_case+0x170/0x3f0 [ 30.265520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.266469] kthread+0x328/0x630 [ 30.266586] ret_from_fork+0x10/0x20 [ 30.267766] [ 30.267994] Allocated by task 265: [ 30.268080] kasan_save_stack+0x3c/0x68 [ 30.268188] kasan_save_track+0x20/0x40 [ 30.268286] kasan_save_alloc_info+0x40/0x58 [ 30.269541] __kasan_kmalloc+0xd4/0xd8 [ 30.269652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.270851] kasan_atomics+0xb8/0x2e0 [ 30.271403] kunit_try_run_case+0x170/0x3f0 [ 30.272726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.273205] kthread+0x328/0x630 [ 30.273534] ret_from_fork+0x10/0x20 [ 30.274292] [ 30.274369] The buggy address belongs to the object at fff00000c770a480 [ 30.274369] which belongs to the cache kmalloc-64 of size 64 [ 30.274780] The buggy address is located 0 bytes to the right of [ 30.274780] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.276119] [ 30.276502] The buggy address belongs to the physical page: [ 30.276921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.277724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.277867] page_type: f5(slab) [ 30.278844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.279631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.280212] page dumped because: kasan: bad access detected [ 30.280302] [ 30.280375] Memory state around the buggy address: [ 30.281582] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.282658] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.283397] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.284089] ^ [ 30.284908] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.285072] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.285175] ================================================================== [ 29.928772] ================================================================== [ 29.928883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.929018] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.929146] [ 29.929220] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.929456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.929525] Hardware name: linux,dummy-virt (DT) [ 29.929604] Call trace: [ 29.929657] show_stack+0x20/0x38 (C) [ 29.929776] dump_stack_lvl+0x8c/0xd0 [ 29.929889] print_report+0x118/0x608 [ 29.930006] kasan_report+0xdc/0x128 [ 29.930118] kasan_check_range+0x100/0x1a8 [ 29.930238] __kasan_check_write+0x20/0x30 [ 29.932295] kasan_atomics_helper+0xf88/0x4858 [ 29.932555] kasan_atomics+0x198/0x2e0 [ 29.932691] kunit_try_run_case+0x170/0x3f0 [ 29.932835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.933479] kthread+0x328/0x630 [ 29.933633] ret_from_fork+0x10/0x20 [ 29.934278] [ 29.934640] Allocated by task 265: [ 29.934954] kasan_save_stack+0x3c/0x68 [ 29.935083] kasan_save_track+0x20/0x40 [ 29.935504] kasan_save_alloc_info+0x40/0x58 [ 29.935908] __kasan_kmalloc+0xd4/0xd8 [ 29.936434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.937079] kasan_atomics+0xb8/0x2e0 [ 29.937211] kunit_try_run_case+0x170/0x3f0 [ 29.937363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.937599] kthread+0x328/0x630 [ 29.938076] ret_from_fork+0x10/0x20 [ 29.938436] [ 29.938828] The buggy address belongs to the object at fff00000c770a480 [ 29.938828] which belongs to the cache kmalloc-64 of size 64 [ 29.939025] The buggy address is located 0 bytes to the right of [ 29.939025] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.939979] [ 29.940048] The buggy address belongs to the physical page: [ 29.940141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.940661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.940938] page_type: f5(slab) [ 29.941039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.941261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.941898] page dumped because: kasan: bad access detected [ 29.942009] [ 29.942063] Memory state around the buggy address: [ 29.942129] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.942193] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.942250] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.942300] ^ [ 29.942751] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.943031] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.943224] ================================================================== [ 29.731680] ================================================================== [ 29.731744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.731808] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.733223] kthread+0x328/0x630 [ 29.740746] [ 29.740810] The buggy address belongs to the physical page: [ 29.741079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.742353] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.747385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.748203] dump_stack_lvl+0x8c/0xd0 [ 29.755143] The buggy address belongs to the physical page: [ 29.755511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.755787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.755959] page_type: f5(slab) [ 29.756299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.756566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.756676] page dumped because: kasan: bad access detected [ 29.756758] [ 29.756810] Memory state around the buggy address: [ 29.757137] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.757674] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.758206] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.758533] ^ [ 29.758677] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.758909] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.759018] ================================================================== [ 29.979803] ================================================================== [ 29.979906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.980147] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.980380] [ 29.980610] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.981083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.981250] Hardware name: linux,dummy-virt (DT) [ 29.981477] Call trace: [ 29.981588] show_stack+0x20/0x38 (C) [ 29.981758] dump_stack_lvl+0x8c/0xd0 [ 29.981893] print_report+0x118/0x608 [ 29.982023] kasan_report+0xdc/0x128 [ 29.982248] kasan_check_range+0x100/0x1a8 [ 29.982424] __kasan_check_write+0x20/0x30 [ 29.982544] kasan_atomics_helper+0x1128/0x4858 [ 29.983926] kasan_atomics+0x198/0x2e0 [ 29.984440] kunit_try_run_case+0x170/0x3f0 [ 29.984638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.984884] kthread+0x328/0x630 [ 29.985073] ret_from_fork+0x10/0x20 [ 29.985319] [ 29.985422] Allocated by task 265: [ 29.985757] kasan_save_stack+0x3c/0x68 [ 29.985908] kasan_save_track+0x20/0x40 [ 29.986015] kasan_save_alloc_info+0x40/0x58 [ 29.986165] __kasan_kmalloc+0xd4/0xd8 [ 29.987937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.988425] kasan_atomics+0xb8/0x2e0 [ 29.989363] kunit_try_run_case+0x170/0x3f0 [ 29.989624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.989929] kthread+0x328/0x630 [ 29.990022] ret_from_fork+0x10/0x20 [ 29.990283] [ 29.990490] The buggy address belongs to the object at fff00000c770a480 [ 29.990490] which belongs to the cache kmalloc-64 of size 64 [ 29.991302] The buggy address is located 0 bytes to the right of [ 29.991302] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.991761] [ 29.992198] The buggy address belongs to the physical page: [ 29.992293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.992506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.992681] page_type: f5(slab) [ 29.992798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.993084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.993193] page dumped because: kasan: bad access detected [ 29.993316] [ 29.993447] Memory state around the buggy address: [ 29.993526] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.993717] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.993962] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.994140] ^ [ 29.994277] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.994843] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995368] ================================================================== [ 29.717808] ================================================================== [ 29.718000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 29.718119] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.719064] Hardware name: linux,dummy-virt (DT) [ 29.722364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.727282] The buggy address is located 0 bytes to the right of [ 29.727282] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.728211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.730593] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.730697] ================================================================== [ 29.549485] ================================================================== [ 29.549593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.549873] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.550012] [ 29.550081] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.550382] Hardware name: linux,dummy-virt (DT) [ 29.551313] __asan_report_load4_noabort+0x20/0x30 [ 29.554707] [ 29.557094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.558635] [ 29.558841] The buggy address is located 0 bytes to the right of [ 29.558841] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.560558] page_type: f5(slab) [ 29.561757] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.565879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 29.572364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.572509] kthread+0x328/0x630 [ 29.572627] ret_from_fork+0x10/0x20 [ 29.573964] [ 29.574216] Allocated by task 265: [ 29.574298] kasan_save_stack+0x3c/0x68 [ 29.575018] kasan_save_track+0x20/0x40 [ 29.575404] kasan_save_alloc_info+0x40/0x58 [ 29.576001] __kasan_kmalloc+0xd4/0xd8 [ 29.576119] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.576667] kasan_atomics+0xb8/0x2e0 [ 29.576812] kunit_try_run_case+0x170/0x3f0 [ 29.577223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.577767] kthread+0x328/0x630 [ 29.577910] ret_from_fork+0x10/0x20 [ 29.578013] [ 29.578770] The buggy address belongs to the object at fff00000c770a480 [ 29.578770] which belongs to the cache kmalloc-64 of size 64 [ 29.579245] The buggy address is located 0 bytes to the right of [ 29.579245] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.579705] [ 29.579762] The buggy address belongs to the physical page: [ 29.580451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.581058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.581191] page_type: f5(slab) [ 29.581298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.581448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.581557] page dumped because: kasan: bad access detected [ 29.581640] [ 29.581687] Memory state around the buggy address: [ 29.582380] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.582612] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.582819] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.583902] ^ [ 29.584313] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584457] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585261] ================================================================== [ 29.630227] ================================================================== [ 29.630361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.630482] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.630610] [ 29.630681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.632609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.633964] Hardware name: linux,dummy-virt (DT) [ 29.634054] Call trace: [ 29.635011] show_stack+0x20/0x38 (C) [ 29.635216] dump_stack_lvl+0x8c/0xd0 [ 29.635457] print_report+0x118/0x608 [ 29.636368] kasan_report+0xdc/0x128 [ 29.636642] kasan_check_range+0x100/0x1a8 [ 29.636782] __kasan_check_write+0x20/0x30 [ 29.637702] kasan_atomics_helper+0xa6c/0x4858 [ 29.638559] kasan_atomics+0x198/0x2e0 [ 29.638972] kunit_try_run_case+0x170/0x3f0 [ 29.639431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.640626] kthread+0x328/0x630 [ 29.641037] ret_from_fork+0x10/0x20 [ 29.642016] [ 29.642136] Allocated by task 265: [ 29.642221] kasan_save_stack+0x3c/0x68 [ 29.643293] kasan_save_track+0x20/0x40 [ 29.643571] kasan_save_alloc_info+0x40/0x58 [ 29.644515] __kasan_kmalloc+0xd4/0xd8 [ 29.644994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.645111] kasan_atomics+0xb8/0x2e0 [ 29.645603] kunit_try_run_case+0x170/0x3f0 [ 29.645970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.646094] kthread+0x328/0x630 [ 29.647404] ret_from_fork+0x10/0x20 [ 29.647927] [ 29.648104] The buggy address belongs to the object at fff00000c770a480 [ 29.648104] which belongs to the cache kmalloc-64 of size 64 [ 29.648485] The buggy address is located 0 bytes to the right of [ 29.648485] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.648658] [ 29.649421] The buggy address belongs to the physical page: [ 29.649547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.650871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.651436] page_type: f5(slab) [ 29.651577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.651707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.651814] page dumped because: kasan: bad access detected [ 29.652877] [ 29.652989] Memory state around the buggy address: [ 29.653506] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.654272] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.654408] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.654512] ^ [ 29.655847] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656016] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656809] ================================================================== [ 29.885390] ================================================================== [ 29.885493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.886886] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.887312] [ 29.887434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.887668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.887953] Hardware name: linux,dummy-virt (DT) [ 29.888940] Call trace: [ 29.889029] show_stack+0x20/0x38 (C) [ 29.889157] dump_stack_lvl+0x8c/0xd0 [ 29.889427] print_report+0x118/0x608 [ 29.889567] kasan_report+0xdc/0x128 [ 29.889797] kasan_check_range+0x100/0x1a8 [ 29.889968] __kasan_check_write+0x20/0x30 [ 29.890160] kasan_atomics_helper+0xeb8/0x4858 [ 29.890443] kasan_atomics+0x198/0x2e0 [ 29.890627] kunit_try_run_case+0x170/0x3f0 [ 29.890955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.891102] kthread+0x328/0x630 [ 29.891668] ret_from_fork+0x10/0x20 [ 29.892078] [ 29.892135] Allocated by task 265: [ 29.892236] kasan_save_stack+0x3c/0x68 [ 29.892369] kasan_save_track+0x20/0x40 [ 29.892473] kasan_save_alloc_info+0x40/0x58 [ 29.893749] __kasan_kmalloc+0xd4/0xd8 [ 29.894823] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.894976] kasan_atomics+0xb8/0x2e0 [ 29.895662] kunit_try_run_case+0x170/0x3f0 [ 29.896129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.896257] kthread+0x328/0x630 [ 29.896375] ret_from_fork+0x10/0x20 [ 29.896482] [ 29.896538] The buggy address belongs to the object at fff00000c770a480 [ 29.896538] which belongs to the cache kmalloc-64 of size 64 [ 29.896687] The buggy address is located 0 bytes to the right of [ 29.896687] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.896847] [ 29.897722] The buggy address belongs to the physical page: [ 29.897982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.898359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.898965] page_type: f5(slab) [ 29.899418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.900026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.900131] page dumped because: kasan: bad access detected [ 29.900922] [ 29.901356] Memory state around the buggy address: [ 29.901460] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.901590] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.901716] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.902611] ^ [ 29.902866] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.903589] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.903856] ================================================================== [ 30.198510] ================================================================== [ 30.198624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.198801] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.199167] [ 30.199248] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.199474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.199544] Hardware name: linux,dummy-virt (DT) [ 30.199650] Call trace: [ 30.199729] show_stack+0x20/0x38 (C) [ 30.199931] dump_stack_lvl+0x8c/0xd0 [ 30.200362] print_report+0x118/0x608 [ 30.200523] kasan_report+0xdc/0x128 [ 30.200654] __asan_report_load8_noabort+0x20/0x30 [ 30.200791] kasan_atomics_helper+0x3df4/0x4858 [ 30.200942] kasan_atomics+0x198/0x2e0 [ 30.201238] kunit_try_run_case+0x170/0x3f0 [ 30.201532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.201733] kthread+0x328/0x630 [ 30.201882] ret_from_fork+0x10/0x20 [ 30.202165] [ 30.202316] Allocated by task 265: [ 30.202444] kasan_save_stack+0x3c/0x68 [ 30.202717] kasan_save_track+0x20/0x40 [ 30.202833] kasan_save_alloc_info+0x40/0x58 [ 30.202968] __kasan_kmalloc+0xd4/0xd8 [ 30.203264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.203403] kasan_atomics+0xb8/0x2e0 [ 30.203797] kunit_try_run_case+0x170/0x3f0 [ 30.203933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.204072] kthread+0x328/0x630 [ 30.204174] ret_from_fork+0x10/0x20 [ 30.205034] [ 30.205405] The buggy address belongs to the object at fff00000c770a480 [ 30.205405] which belongs to the cache kmalloc-64 of size 64 [ 30.205833] The buggy address is located 0 bytes to the right of [ 30.205833] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.206486] [ 30.206601] The buggy address belongs to the physical page: [ 30.206699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.207396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.207565] page_type: f5(slab) [ 30.207668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.207797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.207909] page dumped because: kasan: bad access detected [ 30.208015] [ 30.208081] Memory state around the buggy address: [ 30.208359] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.208868] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.208991] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.209674] ^ [ 30.209994] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210522] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210703] ================================================================== [ 29.588949] ================================================================== [ 29.589052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.589159] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.589300] [ 29.589429] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.589662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.589742] Hardware name: linux,dummy-virt (DT) [ 29.589821] Call trace: [ 29.589876] show_stack+0x20/0x38 (C) [ 29.589994] dump_stack_lvl+0x8c/0xd0 [ 29.590116] print_report+0x118/0x608 [ 29.590241] kasan_report+0xdc/0x128 [ 29.590784] kasan_check_range+0x100/0x1a8 [ 29.590916] __kasan_check_write+0x20/0x30 [ 29.591028] kasan_atomics_helper+0x99c/0x4858 [ 29.591147] kasan_atomics+0x198/0x2e0 [ 29.591254] kunit_try_run_case+0x170/0x3f0 [ 29.592032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.592418] kthread+0x328/0x630 [ 29.592540] ret_from_fork+0x10/0x20 [ 29.592660] [ 29.592712] Allocated by task 265: [ 29.592781] kasan_save_stack+0x3c/0x68 [ 29.592890] kasan_save_track+0x20/0x40 [ 29.592993] kasan_save_alloc_info+0x40/0x58 [ 29.593091] __kasan_kmalloc+0xd4/0xd8 [ 29.593177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.593289] kasan_atomics+0xb8/0x2e0 [ 29.594416] kunit_try_run_case+0x170/0x3f0 [ 29.594537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.594662] kthread+0x328/0x630 [ 29.594745] ret_from_fork+0x10/0x20 [ 29.594836] [ 29.594897] The buggy address belongs to the object at fff00000c770a480 [ 29.594897] which belongs to the cache kmalloc-64 of size 64 [ 29.596591] The buggy address is located 0 bytes to the right of [ 29.596591] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.597070] [ 29.597128] The buggy address belongs to the physical page: [ 29.597206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.597373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.597655] page_type: f5(slab) [ 29.597772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.597903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.598012] page dumped because: kasan: bad access detected [ 29.598103] [ 29.598159] Memory state around the buggy address: [ 29.598246] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598383] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598495] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.598595] ^ [ 29.598677] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.598788] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.598886] ================================================================== [ 29.873306] ================================================================== [ 29.873478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.873596] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.873722] [ 29.873806] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.874220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.874393] Hardware name: linux,dummy-virt (DT) [ 29.874490] Call trace: [ 29.874548] show_stack+0x20/0x38 (C) [ 29.874776] dump_stack_lvl+0x8c/0xd0 [ 29.875137] print_report+0x118/0x608 [ 29.875399] kasan_report+0xdc/0x128 [ 29.875527] __asan_report_store8_noabort+0x20/0x30 [ 29.875670] kasan_atomics_helper+0x3e5c/0x4858 [ 29.875806] kasan_atomics+0x198/0x2e0 [ 29.876060] kunit_try_run_case+0x170/0x3f0 [ 29.876406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.876673] kthread+0x328/0x630 [ 29.876795] ret_from_fork+0x10/0x20 [ 29.876945] [ 29.877010] Allocated by task 265: [ 29.877350] kasan_save_stack+0x3c/0x68 [ 29.877644] kasan_save_track+0x20/0x40 [ 29.877753] kasan_save_alloc_info+0x40/0x58 [ 29.878145] __kasan_kmalloc+0xd4/0xd8 [ 29.878257] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.878385] kasan_atomics+0xb8/0x2e0 [ 29.878589] kunit_try_run_case+0x170/0x3f0 [ 29.878707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.878845] kthread+0x328/0x630 [ 29.879033] ret_from_fork+0x10/0x20 [ 29.879221] [ 29.879792] The buggy address belongs to the object at fff00000c770a480 [ 29.879792] which belongs to the cache kmalloc-64 of size 64 [ 29.880013] The buggy address is located 0 bytes to the right of [ 29.880013] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.880186] [ 29.880250] The buggy address belongs to the physical page: [ 29.880349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.880482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.880643] page_type: f5(slab) [ 29.880738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.881009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.881148] page dumped because: kasan: bad access detected [ 29.881367] [ 29.882201] Memory state around the buggy address: [ 29.882929] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.883101] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.883230] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.883364] ^ [ 29.883624] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.884225] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.884507] ================================================================== [ 29.906919] ================================================================== [ 29.907024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.907135] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.907258] [ 29.907324] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.907968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.908525] Hardware name: linux,dummy-virt (DT) [ 29.908726] Call trace: [ 29.909749] show_stack+0x20/0x38 (C) [ 29.910888] dump_stack_lvl+0x8c/0xd0 [ 29.911387] print_report+0x118/0x608 [ 29.911516] kasan_report+0xdc/0x128 [ 29.912437] kasan_check_range+0x100/0x1a8 [ 29.913205] __kasan_check_write+0x20/0x30 [ 29.913986] kasan_atomics_helper+0xf20/0x4858 [ 29.914136] kasan_atomics+0x198/0x2e0 [ 29.914257] kunit_try_run_case+0x170/0x3f0 [ 29.914407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.914553] kthread+0x328/0x630 [ 29.914672] ret_from_fork+0x10/0x20 [ 29.915897] [ 29.916046] Allocated by task 265: [ 29.916142] kasan_save_stack+0x3c/0x68 [ 29.916263] kasan_save_track+0x20/0x40 [ 29.917068] kasan_save_alloc_info+0x40/0x58 [ 29.917266] __kasan_kmalloc+0xd4/0xd8 [ 29.917645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.918121] kasan_atomics+0xb8/0x2e0 [ 29.918768] kunit_try_run_case+0x170/0x3f0 [ 29.918883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.919790] kthread+0x328/0x630 [ 29.919882] ret_from_fork+0x10/0x20 [ 29.919935] [ 29.919962] The buggy address belongs to the object at fff00000c770a480 [ 29.919962] which belongs to the cache kmalloc-64 of size 64 [ 29.920141] The buggy address is located 0 bytes to the right of [ 29.920141] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.920515] [ 29.920600] The buggy address belongs to the physical page: [ 29.920954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.921431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.921893] page_type: f5(slab) [ 29.922538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.922676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.923354] page dumped because: kasan: bad access detected [ 29.923460] [ 29.923509] Memory state around the buggy address: [ 29.924612] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.924825] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.924937] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.925035] ^ [ 29.925126] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.926756] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.927432] ================================================================== [ 30.052058] ================================================================== [ 30.052171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 30.052420] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.053102] [ 30.053307] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.053545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.053616] Hardware name: linux,dummy-virt (DT) [ 30.054136] Call trace: [ 30.054265] show_stack+0x20/0x38 (C) [ 30.054416] dump_stack_lvl+0x8c/0xd0 [ 30.054670] print_report+0x118/0x608 [ 30.054820] kasan_report+0xdc/0x128 [ 30.054953] kasan_check_range+0x100/0x1a8 [ 30.055377] __kasan_check_write+0x20/0x30 [ 30.055541] kasan_atomics_helper+0x12d8/0x4858 [ 30.055790] kasan_atomics+0x198/0x2e0 [ 30.055953] kunit_try_run_case+0x170/0x3f0 [ 30.056095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.056299] kthread+0x328/0x630 [ 30.056431] ret_from_fork+0x10/0x20 [ 30.056626] [ 30.056841] Allocated by task 265: [ 30.056917] kasan_save_stack+0x3c/0x68 [ 30.057024] kasan_save_track+0x20/0x40 [ 30.057120] kasan_save_alloc_info+0x40/0x58 [ 30.057246] __kasan_kmalloc+0xd4/0xd8 [ 30.057404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.057606] kasan_atomics+0xb8/0x2e0 [ 30.057898] kunit_try_run_case+0x170/0x3f0 [ 30.058008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.058123] kthread+0x328/0x630 [ 30.058219] ret_from_fork+0x10/0x20 [ 30.058478] [ 30.058536] The buggy address belongs to the object at fff00000c770a480 [ 30.058536] which belongs to the cache kmalloc-64 of size 64 [ 30.058715] The buggy address is located 0 bytes to the right of [ 30.058715] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.058970] [ 30.059133] The buggy address belongs to the physical page: [ 30.059362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.059505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.059626] page_type: f5(slab) [ 30.059740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.059957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.060081] page dumped because: kasan: bad access detected [ 30.060175] [ 30.060221] Memory state around the buggy address: [ 30.060300] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.060445] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.060570] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.060736] ^ [ 30.060834] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.060980] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061124] ================================================================== [ 30.125234] ================================================================== [ 30.125434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 30.125550] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.125668] [ 30.125744] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.125952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.126028] Hardware name: linux,dummy-virt (DT) [ 30.126107] Call trace: [ 30.126165] show_stack+0x20/0x38 (C) [ 30.126300] dump_stack_lvl+0x8c/0xd0 [ 30.126447] print_report+0x118/0x608 [ 30.126702] kasan_report+0xdc/0x128 [ 30.127535] kasan_check_range+0x100/0x1a8 [ 30.127660] __kasan_check_write+0x20/0x30 [ 30.127768] kasan_atomics_helper+0x14e4/0x4858 [ 30.127979] kasan_atomics+0x198/0x2e0 [ 30.128158] kunit_try_run_case+0x170/0x3f0 [ 30.128277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.128442] kthread+0x328/0x630 [ 30.128549] ret_from_fork+0x10/0x20 [ 30.128661] [ 30.128722] Allocated by task 265: [ 30.128813] kasan_save_stack+0x3c/0x68 [ 30.129011] kasan_save_track+0x20/0x40 [ 30.130307] kasan_save_alloc_info+0x40/0x58 [ 30.130502] __kasan_kmalloc+0xd4/0xd8 [ 30.130689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.130825] kasan_atomics+0xb8/0x2e0 [ 30.130936] kunit_try_run_case+0x170/0x3f0 [ 30.131053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.131180] kthread+0x328/0x630 [ 30.131281] ret_from_fork+0x10/0x20 [ 30.131413] [ 30.131468] The buggy address belongs to the object at fff00000c770a480 [ 30.131468] which belongs to the cache kmalloc-64 of size 64 [ 30.131614] The buggy address is located 0 bytes to the right of [ 30.131614] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.131774] [ 30.131825] The buggy address belongs to the physical page: [ 30.131907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.132039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.132166] page_type: f5(slab) [ 30.132269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.133035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.133183] page dumped because: kasan: bad access detected [ 30.133261] [ 30.133316] Memory state around the buggy address: [ 30.133512] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.134464] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.134666] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.134784] ^ [ 30.134877] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.134986] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135083] ================================================================== [ 29.830139] ================================================================== [ 29.830243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.830374] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.830505] [ 29.830572] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.830771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.831384] Hardware name: linux,dummy-virt (DT) [ 29.831801] Call trace: [ 29.832456] show_stack+0x20/0x38 (C) [ 29.833366] dump_stack_lvl+0x8c/0xd0 [ 29.833834] print_report+0x118/0x608 [ 29.834085] kasan_report+0xdc/0x128 [ 29.834817] __asan_report_load8_noabort+0x20/0x30 [ 29.834976] kasan_atomics_helper+0x3f58/0x4858 [ 29.835432] kasan_atomics+0x198/0x2e0 [ 29.835656] kunit_try_run_case+0x170/0x3f0 [ 29.835810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.835978] kthread+0x328/0x630 [ 29.836467] ret_from_fork+0x10/0x20 [ 29.837171] [ 29.837446] Allocated by task 265: [ 29.837538] kasan_save_stack+0x3c/0x68 [ 29.837674] kasan_save_track+0x20/0x40 [ 29.837776] kasan_save_alloc_info+0x40/0x58 [ 29.838297] __kasan_kmalloc+0xd4/0xd8 [ 29.838420] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.839213] kasan_atomics+0xb8/0x2e0 [ 29.839322] kunit_try_run_case+0x170/0x3f0 [ 29.839459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.839581] kthread+0x328/0x630 [ 29.839675] ret_from_fork+0x10/0x20 [ 29.840841] [ 29.840933] The buggy address belongs to the object at fff00000c770a480 [ 29.840933] which belongs to the cache kmalloc-64 of size 64 [ 29.841196] The buggy address is located 0 bytes to the right of [ 29.841196] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.841504] [ 29.841788] The buggy address belongs to the physical page: [ 29.842566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.842959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.843638] page_type: f5(slab) [ 29.843933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.844080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.844193] page dumped because: kasan: bad access detected [ 29.845042] [ 29.845097] Memory state around the buggy address: [ 29.845179] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.846305] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.846450] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.846904] ^ [ 29.847351] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.847701] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.847808] ================================================================== [ 30.076939] ================================================================== [ 30.077130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 30.077252] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.077409] [ 30.077484] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.078122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.078263] Hardware name: linux,dummy-virt (DT) [ 30.078513] Call trace: [ 30.078731] show_stack+0x20/0x38 (C) [ 30.078864] dump_stack_lvl+0x8c/0xd0 [ 30.078989] print_report+0x118/0x608 [ 30.079105] kasan_report+0xdc/0x128 [ 30.079223] __asan_report_load8_noabort+0x20/0x30 [ 30.079364] kasan_atomics_helper+0x3f04/0x4858 [ 30.079489] kasan_atomics+0x198/0x2e0 [ 30.079620] kunit_try_run_case+0x170/0x3f0 [ 30.079922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.080225] kthread+0x328/0x630 [ 30.080437] ret_from_fork+0x10/0x20 [ 30.080588] [ 30.080647] Allocated by task 265: [ 30.080830] kasan_save_stack+0x3c/0x68 [ 30.081152] kasan_save_track+0x20/0x40 [ 30.081273] kasan_save_alloc_info+0x40/0x58 [ 30.081445] __kasan_kmalloc+0xd4/0xd8 [ 30.081761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.081872] kasan_atomics+0xb8/0x2e0 [ 30.082028] kunit_try_run_case+0x170/0x3f0 [ 30.082155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.082376] kthread+0x328/0x630 [ 30.082485] ret_from_fork+0x10/0x20 [ 30.082594] [ 30.082644] The buggy address belongs to the object at fff00000c770a480 [ 30.082644] which belongs to the cache kmalloc-64 of size 64 [ 30.082831] The buggy address is located 0 bytes to the right of [ 30.082831] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.083048] [ 30.083221] The buggy address belongs to the physical page: [ 30.083784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.084189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.084320] page_type: f5(slab) [ 30.084443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.084570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.084679] page dumped because: kasan: bad access detected [ 30.086253] [ 30.086696] Memory state around the buggy address: [ 30.087449] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.088298] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.088448] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.088987] ^ [ 30.089425] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.089639] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.089742] ================================================================== [ 30.211853] ================================================================== [ 30.211961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.212075] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.212146] [ 30.212187] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.212442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.212609] Hardware name: linux,dummy-virt (DT) [ 30.212951] Call trace: [ 30.213011] show_stack+0x20/0x38 (C) [ 30.213880] dump_stack_lvl+0x8c/0xd0 [ 30.214846] print_report+0x118/0x608 [ 30.215789] kasan_report+0xdc/0x128 [ 30.216320] kasan_check_range+0x100/0x1a8 [ 30.217039] __kasan_check_write+0x20/0x30 [ 30.217513] kasan_atomics_helper+0x16d0/0x4858 [ 30.218234] kasan_atomics+0x198/0x2e0 [ 30.218374] kunit_try_run_case+0x170/0x3f0 [ 30.218505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.219898] kthread+0x328/0x630 [ 30.220037] ret_from_fork+0x10/0x20 [ 30.220183] [ 30.220247] Allocated by task 265: [ 30.220350] kasan_save_stack+0x3c/0x68 [ 30.220469] kasan_save_track+0x20/0x40 [ 30.220591] kasan_save_alloc_info+0x40/0x58 [ 30.220717] __kasan_kmalloc+0xd4/0xd8 [ 30.220833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.220958] kasan_atomics+0xb8/0x2e0 [ 30.221072] kunit_try_run_case+0x170/0x3f0 [ 30.221191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221349] kthread+0x328/0x630 [ 30.221457] ret_from_fork+0x10/0x20 [ 30.221573] [ 30.221630] The buggy address belongs to the object at fff00000c770a480 [ 30.221630] which belongs to the cache kmalloc-64 of size 64 [ 30.221776] The buggy address is located 0 bytes to the right of [ 30.221776] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.221938] [ 30.221996] The buggy address belongs to the physical page: [ 30.222072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.222203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.222318] page_type: f5(slab) [ 30.222506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.222655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.222778] page dumped because: kasan: bad access detected [ 30.222897] [ 30.222957] Memory state around the buggy address: [ 30.223068] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.223904] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.224033] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.224193] ^ [ 30.224290] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224428] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224538] ================================================================== [ 30.290850] ================================================================== [ 30.290959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.292260] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.292695] [ 30.292775] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.292993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.295585] Hardware name: linux,dummy-virt (DT) [ 30.295845] Call trace: [ 30.295912] show_stack+0x20/0x38 (C) [ 30.296039] dump_stack_lvl+0x8c/0xd0 [ 30.296175] print_report+0x118/0x608 [ 30.297362] kasan_report+0xdc/0x128 [ 30.297504] kasan_check_range+0x100/0x1a8 [ 30.297575] __kasan_check_write+0x20/0x30 [ 30.297651] kasan_atomics_helper+0x17ec/0x4858 [ 30.297758] kasan_atomics+0x198/0x2e0 [ 30.297819] kunit_try_run_case+0x170/0x3f0 [ 30.297888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.297959] kthread+0x328/0x630 [ 30.298012] ret_from_fork+0x10/0x20 [ 30.298074] [ 30.298099] Allocated by task 265: [ 30.298136] kasan_save_stack+0x3c/0x68 [ 30.298191] kasan_save_track+0x20/0x40 [ 30.298241] kasan_save_alloc_info+0x40/0x58 [ 30.298292] __kasan_kmalloc+0xd4/0xd8 [ 30.298413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.298758] kasan_atomics+0xb8/0x2e0 [ 30.298954] kunit_try_run_case+0x170/0x3f0 [ 30.299188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.299555] kthread+0x328/0x630 [ 30.299663] ret_from_fork+0x10/0x20 [ 30.299782] [ 30.299983] The buggy address belongs to the object at fff00000c770a480 [ 30.299983] which belongs to the cache kmalloc-64 of size 64 [ 30.300618] The buggy address is located 0 bytes to the right of [ 30.300618] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.301135] [ 30.301486] The buggy address belongs to the physical page: [ 30.301613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.301770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.301911] page_type: f5(slab) [ 30.302117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.303064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.303180] page dumped because: kasan: bad access detected [ 30.303598] [ 30.303806] Memory state around the buggy address: [ 30.303959] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.304596] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.304977] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.305082] ^ [ 30.305545] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305660] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305757] ================================================================== [ 30.182658] ================================================================== [ 30.182764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 30.182883] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.183007] [ 30.183073] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.183276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.183360] Hardware name: linux,dummy-virt (DT) [ 30.184053] Call trace: [ 30.184185] show_stack+0x20/0x38 (C) [ 30.184419] dump_stack_lvl+0x8c/0xd0 [ 30.184763] print_report+0x118/0x608 [ 30.184888] kasan_report+0xdc/0x128 [ 30.185004] kasan_check_range+0x100/0x1a8 [ 30.185531] __kasan_check_write+0x20/0x30 [ 30.185874] kasan_atomics_helper+0x1644/0x4858 [ 30.186292] kasan_atomics+0x198/0x2e0 [ 30.186524] kunit_try_run_case+0x170/0x3f0 [ 30.187054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.187202] kthread+0x328/0x630 [ 30.187313] ret_from_fork+0x10/0x20 [ 30.187572] [ 30.187663] Allocated by task 265: [ 30.187736] kasan_save_stack+0x3c/0x68 [ 30.188836] kasan_save_track+0x20/0x40 [ 30.189060] kasan_save_alloc_info+0x40/0x58 [ 30.189349] __kasan_kmalloc+0xd4/0xd8 [ 30.190105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.190226] kasan_atomics+0xb8/0x2e0 [ 30.190854] kunit_try_run_case+0x170/0x3f0 [ 30.190971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.191382] kthread+0x328/0x630 [ 30.191937] ret_from_fork+0x10/0x20 [ 30.192230] [ 30.192295] The buggy address belongs to the object at fff00000c770a480 [ 30.192295] which belongs to the cache kmalloc-64 of size 64 [ 30.192757] The buggy address is located 0 bytes to the right of [ 30.192757] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.193077] [ 30.193174] The buggy address belongs to the physical page: [ 30.193348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.193500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.193889] page_type: f5(slab) [ 30.194171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.194314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.194659] page dumped because: kasan: bad access detected [ 30.195087] [ 30.195151] Memory state around the buggy address: [ 30.195232] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.195735] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.195975] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.196360] ^ [ 30.196467] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.196581] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.196691] ================================================================== [ 30.165435] ================================================================== [ 30.165831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 30.165970] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.166576] [ 30.166662] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.166976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.167057] Hardware name: linux,dummy-virt (DT) [ 30.167141] Call trace: [ 30.167195] show_stack+0x20/0x38 (C) [ 30.167318] dump_stack_lvl+0x8c/0xd0 [ 30.167467] print_report+0x118/0x608 [ 30.168478] kasan_report+0xdc/0x128 [ 30.168777] __asan_report_load8_noabort+0x20/0x30 [ 30.169043] kasan_atomics_helper+0x3db0/0x4858 [ 30.169400] kasan_atomics+0x198/0x2e0 [ 30.169551] kunit_try_run_case+0x170/0x3f0 [ 30.169691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.170216] kthread+0x328/0x630 [ 30.170366] ret_from_fork+0x10/0x20 [ 30.171133] [ 30.171263] Allocated by task 265: [ 30.171359] kasan_save_stack+0x3c/0x68 [ 30.171488] kasan_save_track+0x20/0x40 [ 30.171606] kasan_save_alloc_info+0x40/0x58 [ 30.171739] __kasan_kmalloc+0xd4/0xd8 [ 30.172013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.172415] kasan_atomics+0xb8/0x2e0 [ 30.172533] kunit_try_run_case+0x170/0x3f0 [ 30.172875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.173436] kthread+0x328/0x630 [ 30.173564] ret_from_fork+0x10/0x20 [ 30.173953] [ 30.174310] The buggy address belongs to the object at fff00000c770a480 [ 30.174310] which belongs to the cache kmalloc-64 of size 64 [ 30.174680] The buggy address is located 0 bytes to the right of [ 30.174680] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.174852] [ 30.175705] The buggy address belongs to the physical page: [ 30.176680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.176957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.177677] page_type: f5(slab) [ 30.178463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.179127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.179375] page dumped because: kasan: bad access detected [ 30.180096] [ 30.180155] Memory state around the buggy address: [ 30.180553] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.181083] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.181260] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.181395] ^ [ 30.181480] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.181666] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.181971] ================================================================== [ 30.137118] ================================================================== [ 30.137227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 30.137367] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.137492] [ 30.137562] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.137769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.137840] Hardware name: linux,dummy-virt (DT) [ 30.137917] Call trace: [ 30.137969] show_stack+0x20/0x38 (C) [ 30.138082] dump_stack_lvl+0x8c/0xd0 [ 30.138199] print_report+0x118/0x608 [ 30.138321] kasan_report+0xdc/0x128 [ 30.138474] kasan_check_range+0x100/0x1a8 [ 30.138593] __kasan_check_write+0x20/0x30 [ 30.138708] kasan_atomics_helper+0x154c/0x4858 [ 30.138857] kasan_atomics+0x198/0x2e0 [ 30.138992] kunit_try_run_case+0x170/0x3f0 [ 30.139125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.139257] kthread+0x328/0x630 [ 30.139766] ret_from_fork+0x10/0x20 [ 30.140464] [ 30.140609] Allocated by task 265: [ 30.140703] kasan_save_stack+0x3c/0x68 [ 30.140812] kasan_save_track+0x20/0x40 [ 30.140909] kasan_save_alloc_info+0x40/0x58 [ 30.141680] __kasan_kmalloc+0xd4/0xd8 [ 30.141791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.141897] kasan_atomics+0xb8/0x2e0 [ 30.141997] kunit_try_run_case+0x170/0x3f0 [ 30.142780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.143011] kthread+0x328/0x630 [ 30.143291] ret_from_fork+0x10/0x20 [ 30.143418] [ 30.143748] The buggy address belongs to the object at fff00000c770a480 [ 30.143748] which belongs to the cache kmalloc-64 of size 64 [ 30.144040] The buggy address is located 0 bytes to the right of [ 30.144040] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.144853] [ 30.145158] The buggy address belongs to the physical page: [ 30.145349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.145740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.145954] page_type: f5(slab) [ 30.146053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.146287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.146861] page dumped because: kasan: bad access detected [ 30.147215] [ 30.147307] Memory state around the buggy address: [ 30.147452] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.148125] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.148312] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.148489] ^ [ 30.148587] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.148720] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.148822] ================================================================== [ 29.788929] ================================================================== [ 29.789043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.789802] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.790848] [ 29.791040] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.791546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.791634] Hardware name: linux,dummy-virt (DT) [ 29.791884] Call trace: [ 29.791944] show_stack+0x20/0x38 (C) [ 29.792298] dump_stack_lvl+0x8c/0xd0 [ 29.792520] print_report+0x118/0x608 [ 29.792647] kasan_report+0xdc/0x128 [ 29.792811] kasan_check_range+0x100/0x1a8 [ 29.793105] __kasan_check_write+0x20/0x30 [ 29.793484] kasan_atomics_helper+0xd3c/0x4858 [ 29.793627] kasan_atomics+0x198/0x2e0 [ 29.793958] kunit_try_run_case+0x170/0x3f0 [ 29.794086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794842] kthread+0x328/0x630 [ 29.794976] ret_from_fork+0x10/0x20 [ 29.795099] [ 29.795163] Allocated by task 265: [ 29.795253] kasan_save_stack+0x3c/0x68 [ 29.795415] kasan_save_track+0x20/0x40 [ 29.795665] kasan_save_alloc_info+0x40/0x58 [ 29.795761] __kasan_kmalloc+0xd4/0xd8 [ 29.796355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.796484] kasan_atomics+0xb8/0x2e0 [ 29.796750] kunit_try_run_case+0x170/0x3f0 [ 29.796871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.796994] kthread+0x328/0x630 [ 29.797097] ret_from_fork+0x10/0x20 [ 29.797194] [ 29.797245] The buggy address belongs to the object at fff00000c770a480 [ 29.797245] which belongs to the cache kmalloc-64 of size 64 [ 29.799913] The buggy address is located 0 bytes to the right of [ 29.799913] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.800135] [ 29.800257] The buggy address belongs to the physical page: [ 29.800364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.800494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.800617] page_type: f5(slab) [ 29.800711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.800840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.800942] page dumped because: kasan: bad access detected [ 29.801081] [ 29.801175] Memory state around the buggy address: [ 29.801263] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.801457] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.801575] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.801673] ^ [ 29.801759] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801866] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801963] ================================================================== [ 30.150550] ================================================================== [ 30.151283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 30.151668] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.152203] [ 30.152547] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.153394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.153706] Hardware name: linux,dummy-virt (DT) [ 30.154072] Call trace: [ 30.154193] show_stack+0x20/0x38 (C) [ 30.154582] dump_stack_lvl+0x8c/0xd0 [ 30.154714] print_report+0x118/0x608 [ 30.155510] kasan_report+0xdc/0x128 [ 30.155744] kasan_check_range+0x100/0x1a8 [ 30.155887] __kasan_check_write+0x20/0x30 [ 30.156007] kasan_atomics_helper+0x15b4/0x4858 [ 30.156134] kasan_atomics+0x198/0x2e0 [ 30.156246] kunit_try_run_case+0x170/0x3f0 [ 30.156389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.156548] kthread+0x328/0x630 [ 30.157324] ret_from_fork+0x10/0x20 [ 30.158771] [ 30.158836] Allocated by task 265: [ 30.158943] kasan_save_stack+0x3c/0x68 [ 30.159058] kasan_save_track+0x20/0x40 [ 30.159223] kasan_save_alloc_info+0x40/0x58 [ 30.159514] __kasan_kmalloc+0xd4/0xd8 [ 30.159657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.159794] kasan_atomics+0xb8/0x2e0 [ 30.159970] kunit_try_run_case+0x170/0x3f0 [ 30.160111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.160235] kthread+0x328/0x630 [ 30.160364] ret_from_fork+0x10/0x20 [ 30.160482] [ 30.160544] The buggy address belongs to the object at fff00000c770a480 [ 30.160544] which belongs to the cache kmalloc-64 of size 64 [ 30.160811] The buggy address is located 0 bytes to the right of [ 30.160811] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.160999] [ 30.161063] The buggy address belongs to the physical page: [ 30.161154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.161307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.161488] page_type: f5(slab) [ 30.161592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.161714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.161819] page dumped because: kasan: bad access detected [ 30.161895] [ 30.161994] Memory state around the buggy address: [ 30.162083] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.162196] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.162374] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.162932] ^ [ 30.163058] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.163174] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.163272] ================================================================== [ 29.603599] ================================================================== [ 29.603720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.603832] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.603951] [ 29.604022] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.604288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.609294] ret_from_fork+0x10/0x20 [ 29.614357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.614959] kthread+0x328/0x630 [ 29.615058] ret_from_fork+0x10/0x20 [ 29.615155] [ 29.615838] The buggy address belongs to the object at fff00000c770a480 [ 29.615838] which belongs to the cache kmalloc-64 of size 64 [ 29.616206] The buggy address is located 0 bytes to the right of [ 29.616206] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.616473] [ 29.616535] The buggy address belongs to the physical page: [ 29.616618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.618603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.618787] page_type: f5(slab) [ 29.618881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.620115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.620965] page dumped because: kasan: bad access detected [ 29.621103] [ 29.621153] Memory state around the buggy address: [ 29.621234] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.622306] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.622520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.623244] ^ [ 29.623411] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.623911] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.624156] ================================================================== [ 29.849046] ================================================================== [ 29.849150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.850287] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.850449] [ 29.851242] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.852063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.852776] Hardware name: linux,dummy-virt (DT) [ 29.852921] Call trace: [ 29.852984] show_stack+0x20/0x38 (C) [ 29.853117] dump_stack_lvl+0x8c/0xd0 [ 29.853238] print_report+0x118/0x608 [ 29.853388] kasan_report+0xdc/0x128 [ 29.853512] kasan_check_range+0x100/0x1a8 [ 29.853630] __kasan_check_write+0x20/0x30 [ 29.856402] kasan_atomics_helper+0xe44/0x4858 [ 29.856545] kasan_atomics+0x198/0x2e0 [ 29.858130] kunit_try_run_case+0x170/0x3f0 [ 29.858401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.858553] kthread+0x328/0x630 [ 29.858676] ret_from_fork+0x10/0x20 [ 29.858802] [ 29.858851] Allocated by task 265: [ 29.858928] kasan_save_stack+0x3c/0x68 [ 29.859062] kasan_save_track+0x20/0x40 [ 29.859168] kasan_save_alloc_info+0x40/0x58 [ 29.859302] __kasan_kmalloc+0xd4/0xd8 [ 29.859426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.859537] kasan_atomics+0xb8/0x2e0 [ 29.860066] kunit_try_run_case+0x170/0x3f0 [ 29.860742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.862856] kthread+0x328/0x630 [ 29.862970] ret_from_fork+0x10/0x20 [ 29.863081] [ 29.863140] The buggy address belongs to the object at fff00000c770a480 [ 29.863140] which belongs to the cache kmalloc-64 of size 64 [ 29.863299] The buggy address is located 0 bytes to the right of [ 29.863299] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.863558] [ 29.865397] The buggy address belongs to the physical page: [ 29.865485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.865629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.865811] page_type: f5(slab) [ 29.865907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.866045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.866145] page dumped because: kasan: bad access detected [ 29.866229] [ 29.866276] Memory state around the buggy address: [ 29.867410] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.867540] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.869305] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.870028] ^ [ 29.870168] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.872738] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.872861] ================================================================== [ 30.091306] ================================================================== [ 30.091895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 30.092650] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.093032] [ 30.093152] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.094175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.094303] Hardware name: linux,dummy-virt (DT) [ 30.094484] Call trace: [ 30.094541] show_stack+0x20/0x38 (C) [ 30.094663] dump_stack_lvl+0x8c/0xd0 [ 30.094783] print_report+0x118/0x608 [ 30.094908] kasan_report+0xdc/0x128 [ 30.095023] kasan_check_range+0x100/0x1a8 [ 30.095146] __kasan_check_write+0x20/0x30 [ 30.095263] kasan_atomics_helper+0x1414/0x4858 [ 30.096531] kasan_atomics+0x198/0x2e0 [ 30.096879] kunit_try_run_case+0x170/0x3f0 [ 30.097229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.097404] kthread+0x328/0x630 [ 30.098219] ret_from_fork+0x10/0x20 [ 30.098982] [ 30.099268] Allocated by task 265: [ 30.099887] kasan_save_stack+0x3c/0x68 [ 30.100015] kasan_save_track+0x20/0x40 [ 30.100231] kasan_save_alloc_info+0x40/0x58 [ 30.100815] __kasan_kmalloc+0xd4/0xd8 [ 30.101185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.101433] kasan_atomics+0xb8/0x2e0 [ 30.101535] kunit_try_run_case+0x170/0x3f0 [ 30.101948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.102096] kthread+0x328/0x630 [ 30.102190] ret_from_fork+0x10/0x20 [ 30.102792] [ 30.102863] The buggy address belongs to the object at fff00000c770a480 [ 30.102863] which belongs to the cache kmalloc-64 of size 64 [ 30.103570] The buggy address is located 0 bytes to the right of [ 30.103570] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.104501] [ 30.104653] The buggy address belongs to the physical page: [ 30.104829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.105221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.106024] page_type: f5(slab) [ 30.106134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.106805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.106934] page dumped because: kasan: bad access detected [ 30.107782] [ 30.108019] Memory state around the buggy address: [ 30.108247] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.108449] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.108561] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.108657] ^ [ 30.110823] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110893] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110945] ================================================================== [ 29.944511] ================================================================== [ 29.944616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.944725] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.944849] [ 29.944927] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.946064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.946601] Hardware name: linux,dummy-virt (DT) [ 29.946872] Call trace: [ 29.946967] show_stack+0x20/0x38 (C) [ 29.947305] dump_stack_lvl+0x8c/0xd0 [ 29.948013] print_report+0x118/0x608 [ 29.948180] kasan_report+0xdc/0x128 [ 29.948345] kasan_check_range+0x100/0x1a8 [ 29.949041] __kasan_check_write+0x20/0x30 [ 29.949173] kasan_atomics_helper+0xff0/0x4858 [ 29.949632] kasan_atomics+0x198/0x2e0 [ 29.950316] kunit_try_run_case+0x170/0x3f0 [ 29.950758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.950905] kthread+0x328/0x630 [ 29.951577] ret_from_fork+0x10/0x20 [ 29.951743] [ 29.951801] Allocated by task 265: [ 29.952322] kasan_save_stack+0x3c/0x68 [ 29.952827] kasan_save_track+0x20/0x40 [ 29.952977] kasan_save_alloc_info+0x40/0x58 [ 29.953259] __kasan_kmalloc+0xd4/0xd8 [ 29.953589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.953913] kasan_atomics+0xb8/0x2e0 [ 29.954398] kunit_try_run_case+0x170/0x3f0 [ 29.954531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.954996] kthread+0x328/0x630 [ 29.955091] ret_from_fork+0x10/0x20 [ 29.955186] [ 29.955733] The buggy address belongs to the object at fff00000c770a480 [ 29.955733] which belongs to the cache kmalloc-64 of size 64 [ 29.956280] The buggy address is located 0 bytes to the right of [ 29.956280] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.956790] [ 29.956892] The buggy address belongs to the physical page: [ 29.956985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.957119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.957238] page_type: f5(slab) [ 29.957356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.957619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.957880] page dumped because: kasan: bad access detected [ 29.958047] [ 29.958098] Memory state around the buggy address: [ 29.958244] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.958406] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.958520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.958618] ^ [ 29.958704] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.958816] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.958978] ================================================================== [ 29.761942] ================================================================== [ 29.762047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.762164] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.762287] [ 29.762603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.763137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.763418] Hardware name: linux,dummy-virt (DT) [ 29.764314] Call trace: [ 29.764962] show_stack+0x20/0x38 (C) [ 29.765919] dump_stack_lvl+0x8c/0xd0 [ 29.766419] print_report+0x118/0x608 [ 29.767422] kasan_report+0xdc/0x128 [ 29.767947] __asan_report_load4_noabort+0x20/0x30 [ 29.768223] kasan_atomics_helper+0x3dd8/0x4858 [ 29.768845] kasan_atomics+0x198/0x2e0 [ 29.769411] kunit_try_run_case+0x170/0x3f0 [ 29.770395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.770675] kthread+0x328/0x630 [ 29.770798] ret_from_fork+0x10/0x20 [ 29.771769] [ 29.772049] Allocated by task 265: [ 29.772221] kasan_save_stack+0x3c/0x68 [ 29.772931] kasan_save_track+0x20/0x40 [ 29.773063] kasan_save_alloc_info+0x40/0x58 [ 29.773742] __kasan_kmalloc+0xd4/0xd8 [ 29.773850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.774772] kasan_atomics+0xb8/0x2e0 [ 29.775196] kunit_try_run_case+0x170/0x3f0 [ 29.775763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.776181] kthread+0x328/0x630 [ 29.776737] ret_from_fork+0x10/0x20 [ 29.776846] [ 29.777105] The buggy address belongs to the object at fff00000c770a480 [ 29.777105] which belongs to the cache kmalloc-64 of size 64 [ 29.777738] The buggy address is located 0 bytes to the right of [ 29.777738] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.777946] [ 29.778807] The buggy address belongs to the physical page: [ 29.779036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.779425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.780247] page_type: f5(slab) [ 29.780477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.780608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.781622] page dumped because: kasan: bad access detected [ 29.782030] [ 29.782364] Memory state around the buggy address: [ 29.782623] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.782745] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.782861] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.783942] ^ [ 29.784423] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784613] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784737] ================================================================== [ 30.112460] ================================================================== [ 30.112575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 30.112703] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.113053] [ 30.113217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.113457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.113554] Hardware name: linux,dummy-virt (DT) [ 30.113793] Call trace: [ 30.113888] show_stack+0x20/0x38 (C) [ 30.114006] dump_stack_lvl+0x8c/0xd0 [ 30.114126] print_report+0x118/0x608 [ 30.114238] kasan_report+0xdc/0x128 [ 30.114694] kasan_check_range+0x100/0x1a8 [ 30.115495] __kasan_check_write+0x20/0x30 [ 30.115875] kasan_atomics_helper+0x147c/0x4858 [ 30.116033] kasan_atomics+0x198/0x2e0 [ 30.116223] kunit_try_run_case+0x170/0x3f0 [ 30.116721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.117172] kthread+0x328/0x630 [ 30.117323] ret_from_fork+0x10/0x20 [ 30.117475] [ 30.117845] Allocated by task 265: [ 30.117934] kasan_save_stack+0x3c/0x68 [ 30.118042] kasan_save_track+0x20/0x40 [ 30.118160] kasan_save_alloc_info+0x40/0x58 [ 30.118288] __kasan_kmalloc+0xd4/0xd8 [ 30.118428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.118543] kasan_atomics+0xb8/0x2e0 [ 30.119367] kunit_try_run_case+0x170/0x3f0 [ 30.119514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.119863] kthread+0x328/0x630 [ 30.119987] ret_from_fork+0x10/0x20 [ 30.120199] [ 30.120292] The buggy address belongs to the object at fff00000c770a480 [ 30.120292] which belongs to the cache kmalloc-64 of size 64 [ 30.120616] The buggy address is located 0 bytes to the right of [ 30.120616] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.121222] [ 30.121290] The buggy address belongs to the physical page: [ 30.121389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.121520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.122143] page_type: f5(slab) [ 30.123122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.123274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.123413] page dumped because: kasan: bad access detected [ 30.123499] [ 30.123553] Memory state around the buggy address: [ 30.123642] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.123756] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.123970] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.124071] ^ [ 30.124155] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.124264] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.124383] ================================================================== [ 30.225505] ================================================================== [ 30.225631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.225815] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.225945] [ 30.226015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.226211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.226282] Hardware name: linux,dummy-virt (DT) [ 30.226385] Call trace: [ 30.226555] show_stack+0x20/0x38 (C) [ 30.226677] dump_stack_lvl+0x8c/0xd0 [ 30.226956] print_report+0x118/0x608 [ 30.227317] kasan_report+0xdc/0x128 [ 30.227602] __asan_report_load8_noabort+0x20/0x30 [ 30.227760] kasan_atomics_helper+0x3e10/0x4858 [ 30.227904] kasan_atomics+0x198/0x2e0 [ 30.228048] kunit_try_run_case+0x170/0x3f0 [ 30.228300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.228484] kthread+0x328/0x630 [ 30.228798] ret_from_fork+0x10/0x20 [ 30.229164] [ 30.229248] Allocated by task 265: [ 30.229419] kasan_save_stack+0x3c/0x68 [ 30.229523] kasan_save_track+0x20/0x40 [ 30.229630] kasan_save_alloc_info+0x40/0x58 [ 30.229738] __kasan_kmalloc+0xd4/0xd8 [ 30.229839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.229941] kasan_atomics+0xb8/0x2e0 [ 30.230036] kunit_try_run_case+0x170/0x3f0 [ 30.230145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.230401] kthread+0x328/0x630 [ 30.230542] ret_from_fork+0x10/0x20 [ 30.230691] [ 30.230756] The buggy address belongs to the object at fff00000c770a480 [ 30.230756] which belongs to the cache kmalloc-64 of size 64 [ 30.230915] The buggy address is located 0 bytes to the right of [ 30.230915] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.231179] [ 30.231246] The buggy address belongs to the physical page: [ 30.231425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.231663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.231812] page_type: f5(slab) [ 30.231923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.232107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.232232] page dumped because: kasan: bad access detected [ 30.232321] [ 30.232385] Memory state around the buggy address: [ 30.232465] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.232645] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.232780] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.233113] ^ [ 30.233234] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.233436] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.233553] ================================================================== [ 30.234145] ================================================================== [ 30.234248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.234376] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.234502] [ 30.234568] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.234771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.234853] Hardware name: linux,dummy-virt (DT) [ 30.234952] Call trace: [ 30.235054] show_stack+0x20/0x38 (C) [ 30.235194] dump_stack_lvl+0x8c/0xd0 [ 30.235344] print_report+0x118/0x608 [ 30.235642] kasan_report+0xdc/0x128 [ 30.235865] kasan_check_range+0x100/0x1a8 [ 30.236130] __kasan_check_write+0x20/0x30 [ 30.236353] kasan_atomics_helper+0x175c/0x4858 [ 30.236545] kasan_atomics+0x198/0x2e0 [ 30.236685] kunit_try_run_case+0x170/0x3f0 [ 30.236866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.237024] kthread+0x328/0x630 [ 30.237203] ret_from_fork+0x10/0x20 [ 30.237356] [ 30.237407] Allocated by task 265: [ 30.237611] kasan_save_stack+0x3c/0x68 [ 30.237990] kasan_save_track+0x20/0x40 [ 30.238348] kasan_save_alloc_info+0x40/0x58 [ 30.238694] __kasan_kmalloc+0xd4/0xd8 [ 30.239594] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.239833] kasan_atomics+0xb8/0x2e0 [ 30.239935] kunit_try_run_case+0x170/0x3f0 [ 30.241578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.241713] kthread+0x328/0x630 [ 30.241811] ret_from_fork+0x10/0x20 [ 30.241920] [ 30.241976] The buggy address belongs to the object at fff00000c770a480 [ 30.241976] which belongs to the cache kmalloc-64 of size 64 [ 30.244171] The buggy address is located 0 bytes to the right of [ 30.244171] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.244811] [ 30.244868] The buggy address belongs to the physical page: [ 30.244959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.245790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.246414] page_type: f5(slab) [ 30.246635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.246790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.247176] page dumped because: kasan: bad access detected [ 30.247421] [ 30.247483] Memory state around the buggy address: [ 30.247586] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.248605] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.248736] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.248912] ^ [ 30.249212] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.249555] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.249679] ================================================================== [ 29.802345] ================================================================== [ 29.802456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.802585] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.802725] [ 29.802914] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.803237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.803363] Hardware name: linux,dummy-virt (DT) [ 29.803438] Call trace: [ 29.803573] show_stack+0x20/0x38 (C) [ 29.804213] dump_stack_lvl+0x8c/0xd0 [ 29.804378] print_report+0x118/0x608 [ 29.804511] kasan_report+0xdc/0x128 [ 29.804705] __asan_report_load4_noabort+0x20/0x30 [ 29.804838] kasan_atomics_helper+0x3e04/0x4858 [ 29.804974] kasan_atomics+0x198/0x2e0 [ 29.805324] kunit_try_run_case+0x170/0x3f0 [ 29.805661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.805898] kthread+0x328/0x630 [ 29.806029] ret_from_fork+0x10/0x20 [ 29.806362] [ 29.806411] Allocated by task 265: [ 29.806483] kasan_save_stack+0x3c/0x68 [ 29.806675] kasan_save_track+0x20/0x40 [ 29.807007] kasan_save_alloc_info+0x40/0x58 [ 29.807154] __kasan_kmalloc+0xd4/0xd8 [ 29.807256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.807397] kasan_atomics+0xb8/0x2e0 [ 29.807508] kunit_try_run_case+0x170/0x3f0 [ 29.807650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.807894] kthread+0x328/0x630 [ 29.808054] ret_from_fork+0x10/0x20 [ 29.808273] [ 29.808360] The buggy address belongs to the object at fff00000c770a480 [ 29.808360] which belongs to the cache kmalloc-64 of size 64 [ 29.808547] The buggy address is located 0 bytes to the right of [ 29.808547] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.808718] [ 29.808773] The buggy address belongs to the physical page: [ 29.808862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.809105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.809248] page_type: f5(slab) [ 29.809387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.809515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.809644] page dumped because: kasan: bad access detected [ 29.809819] [ 29.809864] Memory state around the buggy address: [ 29.809986] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.810110] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.810219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.810322] ^ [ 29.810453] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810909] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.811017] ================================================================== [ 30.061751] ================================================================== [ 30.061830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 30.061897] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.062007] [ 30.062130] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.062379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.062447] Hardware name: linux,dummy-virt (DT) [ 30.062525] Call trace: [ 30.062579] show_stack+0x20/0x38 (C) [ 30.062693] dump_stack_lvl+0x8c/0xd0 [ 30.062812] print_report+0x118/0x608 [ 30.062930] kasan_report+0xdc/0x128 [ 30.063043] kasan_check_range+0x100/0x1a8 [ 30.063165] __kasan_check_write+0x20/0x30 [ 30.063279] kasan_atomics_helper+0x1384/0x4858 [ 30.064120] kasan_atomics+0x198/0x2e0 [ 30.064487] kunit_try_run_case+0x170/0x3f0 [ 30.064649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.064827] kthread+0x328/0x630 [ 30.065138] ret_from_fork+0x10/0x20 [ 30.065496] [ 30.065576] Allocated by task 265: [ 30.065652] kasan_save_stack+0x3c/0x68 [ 30.065831] kasan_save_track+0x20/0x40 [ 30.065985] kasan_save_alloc_info+0x40/0x58 [ 30.066319] __kasan_kmalloc+0xd4/0xd8 [ 30.067270] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.067420] kasan_atomics+0xb8/0x2e0 [ 30.067767] kunit_try_run_case+0x170/0x3f0 [ 30.068343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.069051] kthread+0x328/0x630 [ 30.069470] ret_from_fork+0x10/0x20 [ 30.069717] [ 30.069887] The buggy address belongs to the object at fff00000c770a480 [ 30.069887] which belongs to the cache kmalloc-64 of size 64 [ 30.070036] The buggy address is located 0 bytes to the right of [ 30.070036] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.070200] [ 30.070960] The buggy address belongs to the physical page: [ 30.071377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.071851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.072079] page_type: f5(slab) [ 30.072287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.072748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.073353] page dumped because: kasan: bad access detected [ 30.073442] [ 30.073959] Memory state around the buggy address: [ 30.074057] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.074625] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.074978] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.075085] ^ [ 30.075175] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.075287] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.075405] ================================================================== [ 29.662141] ================================================================== [ 29.662252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.663236] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.664683] [ 29.664774] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.664997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.665743] Hardware name: linux,dummy-virt (DT) [ 29.665834] Call trace: [ 29.666436] show_stack+0x20/0x38 (C) [ 29.666577] dump_stack_lvl+0x8c/0xd0 [ 29.667445] kasan_atomics_helper+0xad4/0x4858 [ 29.669120] ret_from_fork+0x10/0x20 [ 29.670043] kasan_save_alloc_info+0x40/0x58 [ 29.670814] kasan_atomics+0xb8/0x2e0 [ 29.672071] The buggy address belongs to the object at fff00000c770a480 [ 29.672071] which belongs to the cache kmalloc-64 of size 64 [ 29.672255] The buggy address is located 0 bytes to the right of [ 29.672255] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.672451] [ 29.672612] The buggy address belongs to the physical page: [ 29.672938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.673152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.673583] page_type: f5(slab) [ 29.673697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.673771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.673825] page dumped because: kasan: bad access detected [ 29.673915] [ 29.673946] Memory state around the buggy address: [ 29.674104] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.674303] ================================================================== [ 29.959463] ================================================================== [ 29.959577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.959709] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.959852] [ 29.959934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.960167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.960247] Hardware name: linux,dummy-virt (DT) [ 29.960342] Call trace: [ 29.960468] show_stack+0x20/0x38 (C) [ 29.960596] dump_stack_lvl+0x8c/0xd0 [ 29.960716] print_report+0x118/0x608 [ 29.960840] kasan_report+0xdc/0x128 [ 29.960974] kasan_check_range+0x100/0x1a8 [ 29.961197] __kasan_check_write+0x20/0x30 [ 29.961364] kasan_atomics_helper+0x1058/0x4858 [ 29.961510] kasan_atomics+0x198/0x2e0 [ 29.961667] kunit_try_run_case+0x170/0x3f0 [ 29.961834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.961980] kthread+0x328/0x630 [ 29.962271] ret_from_fork+0x10/0x20 [ 29.962416] [ 29.962467] Allocated by task 265: [ 29.962552] kasan_save_stack+0x3c/0x68 [ 29.962860] kasan_save_track+0x20/0x40 [ 29.962974] kasan_save_alloc_info+0x40/0x58 [ 29.963098] __kasan_kmalloc+0xd4/0xd8 [ 29.963312] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.963466] kasan_atomics+0xb8/0x2e0 [ 29.963584] kunit_try_run_case+0x170/0x3f0 [ 29.963706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.963869] kthread+0x328/0x630 [ 29.963976] ret_from_fork+0x10/0x20 [ 29.964107] [ 29.964233] The buggy address belongs to the object at fff00000c770a480 [ 29.964233] which belongs to the cache kmalloc-64 of size 64 [ 29.964504] The buggy address is located 0 bytes to the right of [ 29.964504] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.964740] [ 29.964804] The buggy address belongs to the physical page: [ 29.964895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.965047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.965174] page_type: f5(slab) [ 29.965324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.965525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.965825] page dumped because: kasan: bad access detected [ 29.965912] [ 29.965966] Memory state around the buggy address: [ 29.966052] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.966177] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.966313] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.966475] ^ [ 29.966569] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.966677] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.966875] ================================================================== [ 29.813045] ================================================================== [ 29.813148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.813268] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.813423] [ 29.813492] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.813693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.813763] Hardware name: linux,dummy-virt (DT) [ 29.813836] Call trace: [ 29.813894] show_stack+0x20/0x38 (C) [ 29.814008] dump_stack_lvl+0x8c/0xd0 [ 29.814260] print_report+0x118/0x608 [ 29.814402] kasan_report+0xdc/0x128 [ 29.814523] kasan_check_range+0x100/0x1a8 [ 29.814652] __kasan_check_read+0x20/0x30 [ 29.814783] kasan_atomics_helper+0xdd4/0x4858 [ 29.814913] kasan_atomics+0x198/0x2e0 [ 29.815029] kunit_try_run_case+0x170/0x3f0 [ 29.815148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.816454] kthread+0x328/0x630 [ 29.816777] ret_from_fork+0x10/0x20 [ 29.817068] [ 29.817128] Allocated by task 265: [ 29.817236] kasan_save_stack+0x3c/0x68 [ 29.817368] kasan_save_track+0x20/0x40 [ 29.817591] kasan_save_alloc_info+0x40/0x58 [ 29.817756] __kasan_kmalloc+0xd4/0xd8 [ 29.818079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.818193] kasan_atomics+0xb8/0x2e0 [ 29.818947] kunit_try_run_case+0x170/0x3f0 [ 29.819809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.820041] kthread+0x328/0x630 [ 29.820582] ret_from_fork+0x10/0x20 [ 29.820719] [ 29.820777] The buggy address belongs to the object at fff00000c770a480 [ 29.820777] which belongs to the cache kmalloc-64 of size 64 [ 29.820930] The buggy address is located 0 bytes to the right of [ 29.820930] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.821996] [ 29.822159] The buggy address belongs to the physical page: [ 29.822759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.823240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.823403] page_type: f5(slab) [ 29.824206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.824589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.825220] page dumped because: kasan: bad access detected [ 29.825944] [ 29.826006] Memory state around the buggy address: [ 29.826385] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.827186] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.827433] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.827548] ^ [ 29.827648] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.827777] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.829119] ================================================================== [ 29.996546] ================================================================== [ 29.996653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.996776] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.996904] [ 29.996976] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.997181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.997259] Hardware name: linux,dummy-virt (DT) [ 29.997368] Call trace: [ 29.997428] show_stack+0x20/0x38 (C) [ 29.997547] dump_stack_lvl+0x8c/0xd0 [ 29.997666] print_report+0x118/0x608 [ 29.997777] kasan_report+0xdc/0x128 [ 29.997893] kasan_check_range+0x100/0x1a8 [ 29.998367] __kasan_check_write+0x20/0x30 [ 29.998852] kasan_atomics_helper+0x1190/0x4858 [ 29.999125] kasan_atomics+0x198/0x2e0 [ 29.999283] kunit_try_run_case+0x170/0x3f0 [ 29.999701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.000017] kthread+0x328/0x630 [ 30.000142] ret_from_fork+0x10/0x20 [ 30.000290] [ 30.000376] Allocated by task 265: [ 30.000859] kasan_save_stack+0x3c/0x68 [ 30.001211] kasan_save_track+0x20/0x40 [ 30.001374] kasan_save_alloc_info+0x40/0x58 [ 30.001514] __kasan_kmalloc+0xd4/0xd8 [ 30.001741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.001858] kasan_atomics+0xb8/0x2e0 [ 30.001963] kunit_try_run_case+0x170/0x3f0 [ 30.002145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.002728] kthread+0x328/0x630 [ 30.002902] ret_from_fork+0x10/0x20 [ 30.003483] [ 30.003620] The buggy address belongs to the object at fff00000c770a480 [ 30.003620] which belongs to the cache kmalloc-64 of size 64 [ 30.003974] The buggy address is located 0 bytes to the right of [ 30.003974] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.004124] [ 30.004155] The buggy address belongs to the physical page: [ 30.004197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.004277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.004395] page_type: f5(slab) [ 30.004447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.004513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.004567] page dumped because: kasan: bad access detected [ 30.004609] [ 30.004633] Memory state around the buggy address: [ 30.004672] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.004728] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.004784] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.004834] ^ [ 30.004874] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.004930] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.004981] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop: Failure
Automatically assigned
[ 28.888685] ================================================================== [ 28.888825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.888956] Write of size 8 at addr fff00000c3fa5928 by task kunit_try_catch/261 [ 28.889089] [ 28.889168] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.890479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.890585] Hardware name: linux,dummy-virt (DT) [ 28.890681] Call trace: [ 28.891070] show_stack+0x20/0x38 (C) [ 28.891910] dump_stack_lvl+0x8c/0xd0 [ 28.892319] print_report+0x118/0x608 [ 28.892684] kasan_report+0xdc/0x128 [ 28.893040] kasan_check_range+0x100/0x1a8 [ 28.893658] __kasan_check_write+0x20/0x30 [ 28.893829] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.894023] kasan_bitops_generic+0x110/0x1c8 [ 28.894156] kunit_try_run_case+0x170/0x3f0 [ 28.894636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.895373] kthread+0x328/0x630 [ 28.895570] ret_from_fork+0x10/0x20 [ 28.895851] [ 28.896196] Allocated by task 261: [ 28.896290] kasan_save_stack+0x3c/0x68 [ 28.896439] kasan_save_track+0x20/0x40 [ 28.896790] kasan_save_alloc_info+0x40/0x58 [ 28.897315] __kasan_kmalloc+0xd4/0xd8 [ 28.897435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.897779] kasan_bitops_generic+0xa0/0x1c8 [ 28.898159] kunit_try_run_case+0x170/0x3f0 [ 28.898927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.899129] kthread+0x328/0x630 [ 28.899222] ret_from_fork+0x10/0x20 [ 28.899749] [ 28.899946] The buggy address belongs to the object at fff00000c3fa5920 [ 28.899946] which belongs to the cache kmalloc-16 of size 16 [ 28.900385] The buggy address is located 8 bytes inside of [ 28.900385] allocated 9-byte region [fff00000c3fa5920, fff00000c3fa5929) [ 28.900553] [ 28.900607] The buggy address belongs to the physical page: [ 28.900690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 28.901454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.902055] page_type: f5(slab) [ 28.902160] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.903424] fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.904655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen: Failure
Automatically assigned
[ 28.846851] ================================================================== [ 28.847680] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 28.848204] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259 [ 28.848365] [ 28.848439] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.849179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.849318] Hardware name: linux,dummy-virt (DT) [ 28.849430] Call trace: [ 28.849587] show_stack+0x20/0x38 (C) [ 28.849939] dump_stack_lvl+0x8c/0xd0 [ 28.850076] print_report+0x118/0x608 [ 28.850364] kasan_report+0xdc/0x128 [ 28.850501] __asan_report_load1_noabort+0x20/0x30 [ 28.850647] strnlen+0x80/0x88 [ 28.850775] kasan_strings+0x478/0xb00 [ 28.850916] kunit_try_run_case+0x170/0x3f0 [ 28.851764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.852088] kthread+0x328/0x630 [ 28.852175] ret_from_fork+0x10/0x20 [ 28.852270] [ 28.852297] Allocated by task 259: [ 28.852363] kasan_save_stack+0x3c/0x68 [ 28.852473] kasan_save_track+0x20/0x40 [ 28.852822] kasan_save_alloc_info+0x40/0x58 [ 28.853139] __kasan_kmalloc+0xd4/0xd8 [ 28.853247] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.853407] kasan_strings+0xc8/0xb00 [ 28.853685] kunit_try_run_case+0x170/0x3f0 [ 28.853812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.853973] kthread+0x328/0x630 [ 28.854208] ret_from_fork+0x10/0x20 [ 28.854706] [ 28.854772] Freed by task 259: [ 28.854855] kasan_save_stack+0x3c/0x68 [ 28.855520] kasan_save_track+0x20/0x40 [ 28.855825] kasan_save_free_info+0x4c/0x78 [ 28.855958] __kasan_slab_free+0x6c/0x98 [ 28.856284] kfree+0x214/0x3c8 [ 28.856414] kasan_strings+0x24c/0xb00 [ 28.856526] kunit_try_run_case+0x170/0x3f0 [ 28.856643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.856775] kthread+0x328/0x630 [ 28.857562] ret_from_fork+0x10/0x20 [ 28.857766] [ 28.857842] The buggy address belongs to the object at fff00000c770c040 [ 28.857842] which belongs to the cache kmalloc-32 of size 32 [ 28.858133] The buggy address is located 16 bytes inside of [ 28.858133] freed 32-byte region [fff00000c770c040, fff00000c770c060) [ 28.858302] [ 28.858662] The buggy address belongs to the physical page: [ 28.858755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c [ 28.858892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.859053] page_type: f5(slab) [ 28.859256] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.859492] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.859609] page dumped because: kasan: bad access detected [ 28.859818] [ 28.859882] Memory state around the buggy address: [ 28.860010] fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.860341] fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.860475] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.860837] ^ [ 28.860945] fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.861297] fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.861488] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen: Failure
Automatically assigned
[ 28.819443] ================================================================== [ 28.819553] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 28.819662] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259 [ 28.819791] [ 28.819862] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.820066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.820138] Hardware name: linux,dummy-virt (DT) [ 28.825352] Call trace: [ 28.825706] show_stack+0x20/0x38 (C) [ 28.825836] dump_stack_lvl+0x8c/0xd0 [ 28.826857] print_report+0x118/0x608 [ 28.827536] kasan_report+0xdc/0x128 [ 28.827671] __asan_report_load1_noabort+0x20/0x30 [ 28.827800] strlen+0xa8/0xb0 [ 28.827920] kasan_strings+0x418/0xb00 [ 28.828039] kunit_try_run_case+0x170/0x3f0 [ 28.829770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.829936] kthread+0x328/0x630 [ 28.830891] ret_from_fork+0x10/0x20 [ 28.831473] [ 28.831779] Allocated by task 259: [ 28.831978] kasan_save_stack+0x3c/0x68 [ 28.832214] kasan_save_track+0x20/0x40 [ 28.832623] kasan_save_alloc_info+0x40/0x58 [ 28.833157] __kasan_kmalloc+0xd4/0xd8 [ 28.833263] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.833758] kasan_strings+0xc8/0xb00 [ 28.834492] kunit_try_run_case+0x170/0x3f0 [ 28.834604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.834719] kthread+0x328/0x630 [ 28.835258] ret_from_fork+0x10/0x20 [ 28.835885] [ 28.836147] Freed by task 259: [ 28.836434] kasan_save_stack+0x3c/0x68 [ 28.836546] kasan_save_track+0x20/0x40 [ 28.836652] kasan_save_free_info+0x4c/0x78 [ 28.836768] __kasan_slab_free+0x6c/0x98 [ 28.837513] kfree+0x214/0x3c8 [ 28.838818] kasan_strings+0x24c/0xb00 [ 28.839015] kunit_try_run_case+0x170/0x3f0 [ 28.839478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.839598] kthread+0x328/0x630 [ 28.839686] ret_from_fork+0x10/0x20 [ 28.840059] [ 28.840391] The buggy address belongs to the object at fff00000c770c040 [ 28.840391] which belongs to the cache kmalloc-32 of size 32 [ 28.841202] The buggy address is located 16 bytes inside of [ 28.841202] freed 32-byte region [fff00000c770c040, fff00000c770c060) [ 28.841493] [ 28.841550] The buggy address belongs to the physical page: [ 28.841632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c [ 28.842300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.842583] page_type: f5(slab) [ 28.842680] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.842811] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.842918] page dumped because: kasan: bad access detected [ 28.842999] [ 28.843888] Memory state around the buggy address: [ 28.844535] fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.844745] fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.844872] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.844984] ^ [ 28.845173] fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.845413] fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.845579] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
Automatically assigned
[ 28.792131] ================================================================== [ 28.792250] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 28.795872] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259 [ 28.796032] [ 28.796107] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.796354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.796436] Hardware name: linux,dummy-virt (DT) [ 28.796515] Call trace: [ 28.796569] show_stack+0x20/0x38 (C) [ 28.796699] dump_stack_lvl+0x8c/0xd0 [ 28.796813] print_report+0x118/0x608 [ 28.796924] kasan_report+0xdc/0x128 [ 28.797038] __asan_report_load1_noabort+0x20/0x30 [ 28.797156] kasan_strings+0x95c/0xb00 [ 28.797271] kunit_try_run_case+0x170/0x3f0 [ 28.799885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.800047] kthread+0x328/0x630 [ 28.800164] ret_from_fork+0x10/0x20 [ 28.801189] [ 28.801288] Allocated by task 259: [ 28.801388] kasan_save_stack+0x3c/0x68 [ 28.801501] kasan_save_track+0x20/0x40 [ 28.802772] kasan_save_alloc_info+0x40/0x58 [ 28.803193] __kasan_kmalloc+0xd4/0xd8 [ 28.803446] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.803999] kasan_strings+0xc8/0xb00 [ 28.804545] kunit_try_run_case+0x170/0x3f0 [ 28.804955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.805423] kthread+0x328/0x630 [ 28.805529] ret_from_fork+0x10/0x20 [ 28.805633] [ 28.806304] Freed by task 259: [ 28.806435] kasan_save_stack+0x3c/0x68 [ 28.806781] kasan_save_track+0x20/0x40 [ 28.807314] kasan_save_free_info+0x4c/0x78 [ 28.807575] __kasan_slab_free+0x6c/0x98 [ 28.807681] kfree+0x214/0x3c8 [ 28.807769] kasan_strings+0x24c/0xb00 [ 28.807874] kunit_try_run_case+0x170/0x3f0 [ 28.808490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.809593] kthread+0x328/0x630 [ 28.809703] ret_from_fork+0x10/0x20 [ 28.810569] [ 28.811635] The buggy address belongs to the object at fff00000c770c040 [ 28.811635] which belongs to the cache kmalloc-32 of size 32 [ 28.811816] The buggy address is located 16 bytes inside of [ 28.811816] freed 32-byte region [fff00000c770c040, fff00000c770c060) [ 28.812576] [ 28.812725] The buggy address belongs to the physical page: [ 28.812807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c [ 28.812936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.813981] page_type: f5(slab) [ 28.814340] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.814666] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.814779] page dumped because: kasan: bad access detected [ 28.816053] [ 28.816128] Memory state around the buggy address: [ 28.816238] fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.816437] fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.816602] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.816815] ^ [ 28.816915] fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.817087] fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.817219] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
Automatically assigned
[ 28.774571] ================================================================== [ 28.774700] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 28.774819] Read of size 1 at addr fff00000c770c050 by task kunit_try_catch/259 [ 28.774949] [ 28.775028] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.775866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.776034] Hardware name: linux,dummy-virt (DT) [ 28.776107] Call trace: [ 28.776141] show_stack+0x20/0x38 (C) [ 28.776218] dump_stack_lvl+0x8c/0xd0 [ 28.776358] print_report+0x118/0x608 [ 28.776695] kasan_report+0xdc/0x128 [ 28.776821] __asan_report_load1_noabort+0x20/0x30 [ 28.776971] strcmp+0xc0/0xc8 [ 28.777124] kasan_strings+0x340/0xb00 [ 28.777504] kunit_try_run_case+0x170/0x3f0 [ 28.777646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.778154] kthread+0x328/0x630 [ 28.778295] ret_from_fork+0x10/0x20 [ 28.779178] [ 28.779268] Allocated by task 259: [ 28.779594] kasan_save_stack+0x3c/0x68 [ 28.779927] kasan_save_track+0x20/0x40 [ 28.780068] kasan_save_alloc_info+0x40/0x58 [ 28.780187] __kasan_kmalloc+0xd4/0xd8 [ 28.780785] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.780896] kasan_strings+0xc8/0xb00 [ 28.780959] kunit_try_run_case+0x170/0x3f0 [ 28.781011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.781111] kthread+0x328/0x630 [ 28.781221] ret_from_fork+0x10/0x20 [ 28.781355] [ 28.781468] Freed by task 259: [ 28.781645] kasan_save_stack+0x3c/0x68 [ 28.781752] kasan_save_track+0x20/0x40 [ 28.781855] kasan_save_free_info+0x4c/0x78 [ 28.782278] __kasan_slab_free+0x6c/0x98 [ 28.782463] kfree+0x214/0x3c8 [ 28.782581] kasan_strings+0x24c/0xb00 [ 28.782765] kunit_try_run_case+0x170/0x3f0 [ 28.782885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.783005] kthread+0x328/0x630 [ 28.783117] ret_from_fork+0x10/0x20 [ 28.783217] [ 28.783272] The buggy address belongs to the object at fff00000c770c040 [ 28.783272] which belongs to the cache kmalloc-32 of size 32 [ 28.783461] The buggy address is located 16 bytes inside of [ 28.783461] freed 32-byte region [fff00000c770c040, fff00000c770c060) [ 28.783652] [ 28.783705] The buggy address belongs to the physical page: [ 28.783790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c [ 28.783950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.784278] page_type: f5(slab) [ 28.785115] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.785255] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.787544] page dumped because: kasan: bad access detected [ 28.790505] [ 28.790567] Memory state around the buggy address: [ 28.790649] fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.790762] fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.790886] >fff00000c770c000: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.790989] ^ [ 28.791085] fff00000c770c080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.791196] fff00000c770c100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.791297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
Automatically assigned
[ 28.725063] ================================================================== [ 28.725141] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 28.725213] Read of size 1 at addr fff00000c7710e98 by task kunit_try_catch/257 [ 28.725290] [ 28.725354] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.725467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.725505] Hardware name: linux,dummy-virt (DT) [ 28.725549] Call trace: [ 28.725578] show_stack+0x20/0x38 (C) [ 28.725649] dump_stack_lvl+0x8c/0xd0 [ 28.725713] print_report+0x118/0x608 [ 28.725777] kasan_report+0xdc/0x128 [ 28.725839] __asan_report_load1_noabort+0x20/0x30 [ 28.725901] memcmp+0x198/0x1d8 [ 28.725957] kasan_memcmp+0x16c/0x300 [ 28.726016] kunit_try_run_case+0x170/0x3f0 [ 28.726079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.726148] kthread+0x328/0x630 [ 28.726202] ret_from_fork+0x10/0x20 [ 28.726266] [ 28.726291] Allocated by task 257: [ 28.726368] kasan_save_stack+0x3c/0x68 [ 28.726483] kasan_save_track+0x20/0x40 [ 28.726762] kasan_save_alloc_info+0x40/0x58 [ 28.727039] __kasan_kmalloc+0xd4/0xd8 [ 28.727591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.727803] kasan_memcmp+0xbc/0x300 [ 28.727920] kunit_try_run_case+0x170/0x3f0 [ 28.728021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.728260] kthread+0x328/0x630 [ 28.728693] ret_from_fork+0x10/0x20 [ 28.729481] [ 28.729640] The buggy address belongs to the object at fff00000c7710e80 [ 28.729640] which belongs to the cache kmalloc-32 of size 32 [ 28.729797] The buggy address is located 0 bytes to the right of [ 28.729797] allocated 24-byte region [fff00000c7710e80, fff00000c7710e98) [ 28.729964] [ 28.730943] The buggy address belongs to the physical page: [ 28.731030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107710 [ 28.732292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.732958] page_type: f5(slab) [ 28.733085] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.733230] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.733454] page dumped because: kasan: bad access detected [ 28.733563] [ 28.733622] Memory state around the buggy address: [ 28.733807] fff00000c7710d80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 28.733922] fff00000c7710e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.734032] >fff00000c7710e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.734136] ^ [ 28.734266] fff00000c7710f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.734599] fff00000c7710f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.734739] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
Automatically assigned
[ 28.677972] ================================================================== [ 28.678101] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 28.678219] Read of size 1 at addr ffff800080aa7b4a by task kunit_try_catch/253 [ 28.678374] [ 28.678487] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.678999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.679081] Hardware name: linux,dummy-virt (DT) [ 28.679166] Call trace: [ 28.679274] show_stack+0x20/0x38 (C) [ 28.679471] dump_stack_lvl+0x8c/0xd0 [ 28.679612] print_report+0x310/0x608 [ 28.679757] kasan_report+0xdc/0x128 [ 28.680030] __asan_report_load1_noabort+0x20/0x30 [ 28.680213] kasan_alloca_oob_right+0x2dc/0x340 [ 28.680372] kunit_try_run_case+0x170/0x3f0 [ 28.680541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.680760] kthread+0x328/0x630 [ 28.680894] ret_from_fork+0x10/0x20 [ 28.681262] [ 28.681355] The buggy address belongs to stack of task kunit_try_catch/253 [ 28.681539] [ 28.681792] The buggy address belongs to the virtual mapping at [ 28.681792] [ffff800080aa0000, ffff800080aa9000) created by: [ 28.681792] kernel_clone+0x150/0x7a8 [ 28.682090] [ 28.682168] The buggy address belongs to the physical page: [ 28.682356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107763 [ 28.682658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.682819] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.683194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.683445] page dumped because: kasan: bad access detected [ 28.683572] [ 28.683689] Memory state around the buggy address: [ 28.683901] ffff800080aa7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.684228] ffff800080aa7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.684369] >ffff800080aa7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 28.684477] ^ [ 28.684635] ffff800080aa7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.684759] ffff800080aa7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.684876] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
Automatically assigned
[ 28.651270] ================================================================== [ 28.651471] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 28.651601] Read of size 1 at addr ffff800080aa7b5f by task kunit_try_catch/251 [ 28.651726] [ 28.651804] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.652026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.652097] Hardware name: linux,dummy-virt (DT) [ 28.652175] Call trace: [ 28.652233] show_stack+0x20/0x38 (C) [ 28.652373] dump_stack_lvl+0x8c/0xd0 [ 28.652503] print_report+0x310/0x608 [ 28.652626] kasan_report+0xdc/0x128 [ 28.652742] __asan_report_load1_noabort+0x20/0x30 [ 28.652865] kasan_alloca_oob_left+0x2b8/0x310 [ 28.652991] kunit_try_run_case+0x170/0x3f0 [ 28.653116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.653299] kthread+0x328/0x630 [ 28.653443] ret_from_fork+0x10/0x20 [ 28.653594] [ 28.653657] The buggy address belongs to stack of task kunit_try_catch/251 [ 28.654406] [ 28.654931] The buggy address belongs to the virtual mapping at [ 28.654931] [ffff800080aa0000, ffff800080aa9000) created by: [ 28.654931] kernel_clone+0x150/0x7a8 [ 28.655497] [ 28.655568] The buggy address belongs to the physical page: [ 28.655658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107763 [ 28.655815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.656060] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.656210] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.656348] page dumped because: kasan: bad access detected [ 28.656436] [ 28.656530] Memory state around the buggy address: [ 28.656625] ffff800080aa7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.656844] ffff800080aa7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.657056] >ffff800080aa7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 28.657170] ^ [ 28.657550] ffff800080aa7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.658156] ffff800080aa7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.658369] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
Automatically assigned
[ 28.617106] ================================================================== [ 28.617264] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 28.617419] Read of size 1 at addr ffff800080aa7c2a by task kunit_try_catch/249 [ 28.617565] [ 28.617646] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.618166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.618297] Hardware name: linux,dummy-virt (DT) [ 28.618442] Call trace: [ 28.618503] show_stack+0x20/0x38 (C) [ 28.618686] dump_stack_lvl+0x8c/0xd0 [ 28.618820] print_report+0x310/0x608 [ 28.619031] kasan_report+0xdc/0x128 [ 28.619462] __asan_report_load1_noabort+0x20/0x30 [ 28.619618] kasan_stack_oob+0x238/0x270 [ 28.620369] kunit_try_run_case+0x170/0x3f0 [ 28.620598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.620744] kthread+0x328/0x630 [ 28.621023] ret_from_fork+0x10/0x20 [ 28.621177] [ 28.621310] The buggy address belongs to stack of task kunit_try_catch/249 [ 28.621937] and is located at offset 138 in frame: [ 28.622130] kasan_stack_oob+0x0/0x270 [ 28.622639] [ 28.622722] This frame has 4 objects: [ 28.622971] [48, 49) '__assertion' [ 28.623101] [64, 72) 'array' [ 28.623192] [96, 112) '__assertion' [ 28.623383] [128, 138) 'stack_array' [ 28.623518] [ 28.623599] The buggy address belongs to the virtual mapping at [ 28.623599] [ffff800080aa0000, ffff800080aa9000) created by: [ 28.623599] kernel_clone+0x150/0x7a8 [ 28.623805] [ 28.623880] The buggy address belongs to the physical page: [ 28.623975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107763 [ 28.624127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.624811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.624952] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.625589] page dumped because: kasan: bad access detected [ 28.625743] [ 28.625806] Memory state around the buggy address: [ 28.625997] ffff800080aa7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.626215] ffff800080aa7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 28.626348] >ffff800080aa7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 28.626474] ^ [ 28.626617] ffff800080aa7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 28.626742] ffff800080aa7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.627044] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
Automatically assigned
[ 28.585636] ================================================================== [ 28.585769] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 28.585882] Read of size 1 at addr ffff9ca72a3b558d by task kunit_try_catch/245 [ 28.586003] [ 28.586078] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.586276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.586385] Hardware name: linux,dummy-virt (DT) [ 28.586481] Call trace: [ 28.587089] show_stack+0x20/0x38 (C) [ 28.587533] dump_stack_lvl+0x8c/0xd0 [ 28.587706] print_report+0x310/0x608 [ 28.588023] kasan_report+0xdc/0x128 [ 28.588547] __asan_report_load1_noabort+0x20/0x30 [ 28.588807] kasan_global_oob_right+0x230/0x270 [ 28.588973] kunit_try_run_case+0x170/0x3f0 [ 28.589117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.589268] kthread+0x328/0x630 [ 28.589417] ret_from_fork+0x10/0x20 [ 28.589947] [ 28.590083] The buggy address belongs to the variable: [ 28.590234] global_array+0xd/0x40 [ 28.590579] [ 28.590834] The buggy address belongs to the virtual mapping at [ 28.590834] [ffff9ca728550000, ffff9ca72a471000) created by: [ 28.590834] paging_init+0x66c/0x7d0 [ 28.591049] [ 28.591311] The buggy address belongs to the physical page: [ 28.591415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db5 [ 28.591542] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 28.591802] raw: 03fffe0000002000 ffffc1ffc01f6d48 ffffc1ffc01f6d48 0000000000000000 [ 28.592405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.592614] page dumped because: kasan: bad access detected [ 28.592702] [ 28.592755] Memory state around the buggy address: [ 28.592844] ffff9ca72a3b5480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.592966] ffff9ca72a3b5500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 28.593079] >ffff9ca72a3b5580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 28.593179] ^ [ 28.593256] ffff9ca72a3b5600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 28.593588] ffff9ca72a3b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.593709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
Automatically assigned
[ 28.527052] ================================================================== [ 28.527189] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.527322] Free of addr fff00000c7719701 by task kunit_try_catch/241 [ 28.527476] [ 28.527583] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.528165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.528240] Hardware name: linux,dummy-virt (DT) [ 28.528323] Call trace: [ 28.529307] show_stack+0x20/0x38 (C) [ 28.529473] dump_stack_lvl+0x8c/0xd0 [ 28.531134] print_report+0x118/0x608 [ 28.531285] kasan_report_invalid_free+0xc0/0xe8 [ 28.532593] check_slab_allocation+0xfc/0x108 [ 28.532756] __kasan_mempool_poison_object+0x78/0x150 [ 28.532889] mempool_free+0x28c/0x328 [ 28.533006] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.533138] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.533258] kunit_try_run_case+0x170/0x3f0 [ 28.533476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.533616] kthread+0x328/0x630 [ 28.533712] ret_from_fork+0x10/0x20 [ 28.533823] [ 28.533869] Allocated by task 241: [ 28.534048] kasan_save_stack+0x3c/0x68 [ 28.535889] kasan_save_track+0x20/0x40 [ 28.536210] kasan_save_alloc_info+0x40/0x58 [ 28.536409] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.536527] remove_element+0x130/0x1f8 [ 28.537464] mempool_alloc_preallocated+0x58/0xc0 [ 28.537587] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.537707] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.537914] kunit_try_run_case+0x170/0x3f0 [ 28.538476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.538840] kthread+0x328/0x630 [ 28.539132] ret_from_fork+0x10/0x20 [ 28.539229] [ 28.539663] The buggy address belongs to the object at fff00000c7719700 [ 28.539663] which belongs to the cache kmalloc-128 of size 128 [ 28.540062] The buggy address is located 1 bytes inside of [ 28.540062] 128-byte region [fff00000c7719700, fff00000c7719780) [ 28.540758] [ 28.540877] The buggy address belongs to the physical page: [ 28.540954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 28.541569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.541684] page_type: f5(slab) [ 28.541735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.541820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.541904] page dumped because: kasan: bad access detected [ 28.541944] [ 28.541968] Memory state around the buggy address: [ 28.542009] fff00000c7719600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.542065] fff00000c7719680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.542119] >fff00000c7719700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.542166] ^ [ 28.542200] fff00000c7719780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.542254] fff00000c7719800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.542302] ================================================================== [ 28.558459] ================================================================== [ 28.558573] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.558689] Free of addr fff00000c78b0001 by task kunit_try_catch/243 [ 28.558808] [ 28.558892] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.560000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.560109] Hardware name: linux,dummy-virt (DT) [ 28.560197] Call trace: [ 28.560257] show_stack+0x20/0x38 (C) [ 28.560403] dump_stack_lvl+0x8c/0xd0 [ 28.560535] print_report+0x118/0x608 [ 28.560848] kasan_report_invalid_free+0xc0/0xe8 [ 28.561001] __kasan_mempool_poison_object+0xfc/0x150 [ 28.561194] mempool_free+0x28c/0x328 [ 28.561488] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.561683] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 28.562305] kunit_try_run_case+0x170/0x3f0 [ 28.562506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.563040] kthread+0x328/0x630 [ 28.563595] ret_from_fork+0x10/0x20 [ 28.564139] [ 28.564202] The buggy address belongs to the physical page: [ 28.564278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 28.564433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.564553] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.564731] page_type: f8(unknown) [ 28.565007] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.565376] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.566159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.566316] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.566632] head: 0bfffe0000000002 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff [ 28.566773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.566876] page dumped because: kasan: bad access detected [ 28.566948] [ 28.566993] Memory state around the buggy address: [ 28.567147] fff00000c78aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.567422] fff00000c78aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.567555] >fff00000c78b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.567823] ^ [ 28.567899] fff00000c78b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.568034] fff00000c78b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.568146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
Automatically assigned
[ 28.482719] ================================================================== [ 28.482831] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.483149] Free of addr fff00000c787c000 by task kunit_try_catch/239 [ 28.483275] [ 28.483361] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.483662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.483739] Hardware name: linux,dummy-virt (DT) [ 28.483821] Call trace: [ 28.483903] show_stack+0x20/0x38 (C) [ 28.484034] dump_stack_lvl+0x8c/0xd0 [ 28.484160] print_report+0x118/0x608 [ 28.484514] kasan_report_invalid_free+0xc0/0xe8 [ 28.484734] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.484901] mempool_free+0x24c/0x328 [ 28.485020] mempool_double_free_helper+0x150/0x2e8 [ 28.485160] mempool_page_alloc_double_free+0xbc/0x118 [ 28.485396] kunit_try_run_case+0x170/0x3f0 [ 28.485567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.485830] kthread+0x328/0x630 [ 28.485978] ret_from_fork+0x10/0x20 [ 28.486098] [ 28.486204] The buggy address belongs to the physical page: [ 28.486438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c [ 28.486751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.486956] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.487081] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.487180] page dumped because: kasan: bad access detected [ 28.487305] [ 28.487451] Memory state around the buggy address: [ 28.487609] fff00000c787bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.487718] fff00000c787bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.488219] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.488622] ^ [ 28.488730] fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.488849] fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.489599] ================================================================== [ 28.431548] ================================================================== [ 28.431665] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.431773] Free of addr fff00000c7719300 by task kunit_try_catch/235 [ 28.431879] [ 28.431947] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.432470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.432596] Hardware name: linux,dummy-virt (DT) [ 28.432687] Call trace: [ 28.432746] show_stack+0x20/0x38 (C) [ 28.432880] dump_stack_lvl+0x8c/0xd0 [ 28.433010] print_report+0x118/0x608 [ 28.433665] kasan_report_invalid_free+0xc0/0xe8 [ 28.434261] check_slab_allocation+0xd4/0x108 [ 28.434596] __kasan_mempool_poison_object+0x78/0x150 [ 28.434751] mempool_free+0x28c/0x328 [ 28.435088] mempool_double_free_helper+0x150/0x2e8 [ 28.435257] mempool_kmalloc_double_free+0xc0/0x118 [ 28.435425] kunit_try_run_case+0x170/0x3f0 [ 28.435594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.435999] kthread+0x328/0x630 [ 28.436127] ret_from_fork+0x10/0x20 [ 28.436532] [ 28.436617] Allocated by task 235: [ 28.436844] kasan_save_stack+0x3c/0x68 [ 28.436980] kasan_save_track+0x20/0x40 [ 28.437169] kasan_save_alloc_info+0x40/0x58 [ 28.437372] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.437805] remove_element+0x130/0x1f8 [ 28.437923] mempool_alloc_preallocated+0x58/0xc0 [ 28.438053] mempool_double_free_helper+0x94/0x2e8 [ 28.438223] mempool_kmalloc_double_free+0xc0/0x118 [ 28.438352] kunit_try_run_case+0x170/0x3f0 [ 28.438824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.439012] kthread+0x328/0x630 [ 28.439104] ret_from_fork+0x10/0x20 [ 28.439226] [ 28.439304] Freed by task 235: [ 28.439399] kasan_save_stack+0x3c/0x68 [ 28.439514] kasan_save_track+0x20/0x40 [ 28.440014] kasan_save_free_info+0x4c/0x78 [ 28.440223] __kasan_mempool_poison_object+0xc0/0x150 [ 28.440638] mempool_free+0x28c/0x328 [ 28.440746] mempool_double_free_helper+0x100/0x2e8 [ 28.440891] mempool_kmalloc_double_free+0xc0/0x118 [ 28.441431] kunit_try_run_case+0x170/0x3f0 [ 28.441660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.441775] kthread+0x328/0x630 [ 28.441857] ret_from_fork+0x10/0x20 [ 28.441978] [ 28.442122] The buggy address belongs to the object at fff00000c7719300 [ 28.442122] which belongs to the cache kmalloc-128 of size 128 [ 28.442502] The buggy address is located 0 bytes inside of [ 28.442502] 128-byte region [fff00000c7719300, fff00000c7719380) [ 28.442652] [ 28.442709] The buggy address belongs to the physical page: [ 28.442916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 28.443043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.443186] page_type: f5(slab) [ 28.443281] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.443433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.443588] page dumped because: kasan: bad access detected [ 28.443711] [ 28.443779] Memory state around the buggy address: [ 28.444083] fff00000c7719200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.444658] fff00000c7719280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.445078] >fff00000c7719300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.445185] ^ [ 28.445265] fff00000c7719380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.445408] fff00000c7719400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.445509] ================================================================== [ 28.466040] ================================================================== [ 28.466215] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.466432] Free of addr fff00000c787c000 by task kunit_try_catch/237 [ 28.466615] [ 28.466696] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.466992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.467073] Hardware name: linux,dummy-virt (DT) [ 28.467159] Call trace: [ 28.467249] show_stack+0x20/0x38 (C) [ 28.467475] dump_stack_lvl+0x8c/0xd0 [ 28.467599] print_report+0x118/0x608 [ 28.467725] kasan_report_invalid_free+0xc0/0xe8 [ 28.467868] __kasan_mempool_poison_object+0x14c/0x150 [ 28.468026] mempool_free+0x28c/0x328 [ 28.468159] mempool_double_free_helper+0x150/0x2e8 [ 28.468388] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.468575] kunit_try_run_case+0x170/0x3f0 [ 28.468789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.468934] kthread+0x328/0x630 [ 28.469098] ret_from_fork+0x10/0x20 [ 28.469225] [ 28.469277] The buggy address belongs to the physical page: [ 28.469405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c [ 28.469575] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.469696] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.469927] page_type: f8(unknown) [ 28.470089] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.470347] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.470536] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.470660] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.470783] head: 0bfffe0000000002 ffffc1ffc31e1f01 00000000ffffffff 00000000ffffffff [ 28.471001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.471113] page dumped because: kasan: bad access detected [ 28.471350] [ 28.471399] Memory state around the buggy address: [ 28.471488] fff00000c787bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.471689] fff00000c787bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.471841] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.471942] ^ [ 28.472020] fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.472198] fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.472300] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 28.410442] ================================================================== [ 28.410682] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.410929] Read of size 1 at addr fff00000c787c000 by task kunit_try_catch/233 [ 28.411061] [ 28.411253] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.411640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.411712] Hardware name: linux,dummy-virt (DT) [ 28.411787] Call trace: [ 28.411846] show_stack+0x20/0x38 (C) [ 28.411972] dump_stack_lvl+0x8c/0xd0 [ 28.412518] print_report+0x118/0x608 [ 28.412701] kasan_report+0xdc/0x128 [ 28.412959] __asan_report_load1_noabort+0x20/0x30 [ 28.413369] mempool_uaf_helper+0x314/0x340 [ 28.413502] mempool_page_alloc_uaf+0xc0/0x118 [ 28.413643] kunit_try_run_case+0x170/0x3f0 [ 28.413794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.413947] kthread+0x328/0x630 [ 28.414952] ret_from_fork+0x10/0x20 [ 28.415137] [ 28.415283] The buggy address belongs to the physical page: [ 28.415384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c [ 28.415514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.415783] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.416207] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.416324] page dumped because: kasan: bad access detected [ 28.416425] [ 28.416482] Memory state around the buggy address: [ 28.416875] fff00000c787bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.417191] fff00000c787bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.417317] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.417429] ^ [ 28.417496] fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.417649] fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.417815] ================================================================== [ 28.303509] ================================================================== [ 28.303631] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.303737] Read of size 1 at addr fff00000c7878000 by task kunit_try_catch/229 [ 28.303878] [ 28.303965] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.305025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.305102] Hardware name: linux,dummy-virt (DT) [ 28.305182] Call trace: [ 28.305237] show_stack+0x20/0x38 (C) [ 28.305563] dump_stack_lvl+0x8c/0xd0 [ 28.305700] print_report+0x118/0x608 [ 28.306171] kasan_report+0xdc/0x128 [ 28.307149] __asan_report_load1_noabort+0x20/0x30 [ 28.307522] mempool_uaf_helper+0x314/0x340 [ 28.307646] mempool_kmalloc_large_uaf+0xc4/0x120 [ 28.308642] kunit_try_run_case+0x170/0x3f0 [ 28.309043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.309214] kthread+0x328/0x630 [ 28.309463] ret_from_fork+0x10/0x20 [ 28.309647] [ 28.309699] The buggy address belongs to the physical page: [ 28.310071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107878 [ 28.310572] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.310692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.310976] page_type: f8(unknown) [ 28.311142] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.312029] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.312200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.312343] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.312470] head: 0bfffe0000000002 ffffc1ffc31e1e01 00000000ffffffff 00000000ffffffff [ 28.312597] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.312703] page dumped because: kasan: bad access detected [ 28.312795] [ 28.312929] Memory state around the buggy address: [ 28.313110] fff00000c7877f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.313265] fff00000c7877f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.313568] >fff00000c7878000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.313673] ^ [ 28.313743] fff00000c7878080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.313847] fff00000c7878100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.313942] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 28.278617] ================================================================== [ 28.278755] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.278955] Read of size 1 at addr fff00000c6419f00 by task kunit_try_catch/227 [ 28.279100] [ 28.279237] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.279544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.279629] Hardware name: linux,dummy-virt (DT) [ 28.279774] Call trace: [ 28.279902] show_stack+0x20/0x38 (C) [ 28.280176] dump_stack_lvl+0x8c/0xd0 [ 28.280517] print_report+0x118/0x608 [ 28.280783] kasan_report+0xdc/0x128 [ 28.280953] __asan_report_load1_noabort+0x20/0x30 [ 28.281025] mempool_uaf_helper+0x314/0x340 [ 28.281140] mempool_kmalloc_uaf+0xc4/0x120 [ 28.281221] kunit_try_run_case+0x170/0x3f0 [ 28.281309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.281451] kthread+0x328/0x630 [ 28.281512] ret_from_fork+0x10/0x20 [ 28.281574] [ 28.281597] Allocated by task 227: [ 28.281634] kasan_save_stack+0x3c/0x68 [ 28.281687] kasan_save_track+0x20/0x40 [ 28.281735] kasan_save_alloc_info+0x40/0x58 [ 28.281786] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.281841] remove_element+0x130/0x1f8 [ 28.281893] mempool_alloc_preallocated+0x58/0xc0 [ 28.281940] mempool_uaf_helper+0xa4/0x340 [ 28.281986] mempool_kmalloc_uaf+0xc4/0x120 [ 28.282033] kunit_try_run_case+0x170/0x3f0 [ 28.282079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.282132] kthread+0x328/0x630 [ 28.282175] ret_from_fork+0x10/0x20 [ 28.282218] [ 28.282243] Freed by task 227: [ 28.282275] kasan_save_stack+0x3c/0x68 [ 28.282322] kasan_save_track+0x20/0x40 [ 28.282591] kasan_save_free_info+0x4c/0x78 [ 28.282773] __kasan_mempool_poison_object+0xc0/0x150 [ 28.282880] mempool_free+0x28c/0x328 [ 28.282976] mempool_uaf_helper+0x104/0x340 [ 28.283259] mempool_kmalloc_uaf+0xc4/0x120 [ 28.284263] kunit_try_run_case+0x170/0x3f0 [ 28.284874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.285449] kthread+0x328/0x630 [ 28.285672] ret_from_fork+0x10/0x20 [ 28.285795] [ 28.285909] The buggy address belongs to the object at fff00000c6419f00 [ 28.285909] which belongs to the cache kmalloc-128 of size 128 [ 28.286095] The buggy address is located 0 bytes inside of [ 28.286095] freed 128-byte region [fff00000c6419f00, fff00000c6419f80) [ 28.286250] [ 28.286308] The buggy address belongs to the physical page: [ 28.286426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 28.286632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.286777] page_type: f5(slab) [ 28.287322] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.287813] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 28.287928] page dumped because: kasan: bad access detected [ 28.288019] [ 28.288072] Memory state around the buggy address: [ 28.288497] fff00000c6419e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.288857] fff00000c6419e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.289044] >fff00000c6419f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.289210] ^ [ 28.289310] fff00000c6419f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.289671] fff00000c641a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.289781] ================================================================== [ 28.345596] ================================================================== [ 28.345730] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.345862] Read of size 1 at addr fff00000c7715180 by task kunit_try_catch/231 [ 28.346201] [ 28.346717] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.347416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.347514] Hardware name: linux,dummy-virt (DT) [ 28.347650] Call trace: [ 28.347731] show_stack+0x20/0x38 (C) [ 28.347887] dump_stack_lvl+0x8c/0xd0 [ 28.348110] print_report+0x118/0x608 [ 28.348245] kasan_report+0xdc/0x128 [ 28.348399] __asan_report_load1_noabort+0x20/0x30 [ 28.348676] mempool_uaf_helper+0x314/0x340 [ 28.348831] mempool_slab_uaf+0xc0/0x118 [ 28.349134] kunit_try_run_case+0x170/0x3f0 [ 28.349316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.349523] kthread+0x328/0x630 [ 28.349756] ret_from_fork+0x10/0x20 [ 28.349901] [ 28.350016] Allocated by task 231: [ 28.350166] kasan_save_stack+0x3c/0x68 [ 28.350398] kasan_save_track+0x20/0x40 [ 28.350509] kasan_save_alloc_info+0x40/0x58 [ 28.350614] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.350720] remove_element+0x16c/0x1f8 [ 28.350827] mempool_alloc_preallocated+0x58/0xc0 [ 28.351025] mempool_uaf_helper+0xa4/0x340 [ 28.351235] mempool_slab_uaf+0xc0/0x118 [ 28.351433] kunit_try_run_case+0x170/0x3f0 [ 28.351539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.351659] kthread+0x328/0x630 [ 28.351764] ret_from_fork+0x10/0x20 [ 28.351879] [ 28.351933] Freed by task 231: [ 28.352105] kasan_save_stack+0x3c/0x68 [ 28.352223] kasan_save_track+0x20/0x40 [ 28.352519] kasan_save_free_info+0x4c/0x78 [ 28.352771] __kasan_mempool_poison_object+0xc0/0x150 [ 28.352894] mempool_free+0x28c/0x328 [ 28.352993] mempool_uaf_helper+0x104/0x340 [ 28.353101] mempool_slab_uaf+0xc0/0x118 [ 28.353203] kunit_try_run_case+0x170/0x3f0 [ 28.353313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.353460] kthread+0x328/0x630 [ 28.353565] ret_from_fork+0x10/0x20 [ 28.353717] [ 28.353772] The buggy address belongs to the object at fff00000c7715180 [ 28.353772] which belongs to the cache test_cache of size 123 [ 28.354070] The buggy address is located 0 bytes inside of [ 28.354070] freed 123-byte region [fff00000c7715180, fff00000c77151fb) [ 28.354251] [ 28.354355] The buggy address belongs to the physical page: [ 28.354437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107715 [ 28.354580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.354809] page_type: f5(slab) [ 28.354958] raw: 0bfffe0000000000 fff00000c772c280 dead000000000122 0000000000000000 [ 28.355230] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.355435] page dumped because: kasan: bad access detected [ 28.355532] [ 28.355580] Memory state around the buggy address: [ 28.356353] fff00000c7715080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 28.356955] fff00000c7715100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.357525] >fff00000c7715180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.357822] ^ [ 28.357901] fff00000c7715200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.358005] fff00000c7715280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.358100] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
Automatically assigned
[ 28.151818] ================================================================== [ 28.151965] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.152428] Read of size 1 at addr fff00000c787a001 by task kunit_try_catch/223 [ 28.152696] [ 28.152809] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.153024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.153372] Hardware name: linux,dummy-virt (DT) [ 28.153489] Call trace: [ 28.153548] show_stack+0x20/0x38 (C) [ 28.153800] dump_stack_lvl+0x8c/0xd0 [ 28.154004] print_report+0x118/0x608 [ 28.154175] kasan_report+0xdc/0x128 [ 28.154354] __asan_report_load1_noabort+0x20/0x30 [ 28.154665] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.155252] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.155982] kunit_try_run_case+0x170/0x3f0 [ 28.156450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.156596] kthread+0x328/0x630 [ 28.156718] ret_from_fork+0x10/0x20 [ 28.157371] [ 28.157439] The buggy address belongs to the physical page: [ 28.157649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107878 [ 28.158132] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.158398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.158612] page_type: f8(unknown) [ 28.158719] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.159053] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.159388] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.159581] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.159707] head: 0bfffe0000000002 ffffc1ffc31e1e01 00000000ffffffff 00000000ffffffff [ 28.160015] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.160128] page dumped because: kasan: bad access detected [ 28.160227] [ 28.160788] Memory state around the buggy address: [ 28.160921] fff00000c7879f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.161082] fff00000c7879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.161194] >fff00000c787a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.161347] ^ [ 28.161544] fff00000c787a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.161730] fff00000c787a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.162178] ================================================================== [ 28.189967] ================================================================== [ 28.190118] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.190247] Read of size 1 at addr fff00000c77262bb by task kunit_try_catch/225 [ 28.190410] [ 28.190491] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.190708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.190780] Hardware name: linux,dummy-virt (DT) [ 28.190916] Call trace: [ 28.190992] show_stack+0x20/0x38 (C) [ 28.191216] dump_stack_lvl+0x8c/0xd0 [ 28.191377] print_report+0x118/0x608 [ 28.191513] kasan_report+0xdc/0x128 [ 28.191894] __asan_report_load1_noabort+0x20/0x30 [ 28.192033] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.192197] mempool_slab_oob_right+0xc0/0x118 [ 28.192526] kunit_try_run_case+0x170/0x3f0 [ 28.192916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.193186] kthread+0x328/0x630 [ 28.193473] ret_from_fork+0x10/0x20 [ 28.193905] [ 28.193956] Allocated by task 225: [ 28.194028] kasan_save_stack+0x3c/0x68 [ 28.194870] kasan_save_track+0x20/0x40 [ 28.195078] kasan_save_alloc_info+0x40/0x58 [ 28.195537] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.195994] remove_element+0x16c/0x1f8 [ 28.196480] mempool_alloc_preallocated+0x58/0xc0 [ 28.196600] mempool_oob_right_helper+0x98/0x2f0 [ 28.197075] mempool_slab_oob_right+0xc0/0x118 [ 28.197576] kunit_try_run_case+0x170/0x3f0 [ 28.197687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.197800] kthread+0x328/0x630 [ 28.198855] ret_from_fork+0x10/0x20 [ 28.198989] [ 28.199037] The buggy address belongs to the object at fff00000c7726240 [ 28.199037] which belongs to the cache test_cache of size 123 [ 28.199994] The buggy address is located 0 bytes to the right of [ 28.199994] allocated 123-byte region [fff00000c7726240, fff00000c77262bb) [ 28.200517] [ 28.200573] The buggy address belongs to the physical page: [ 28.200904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107726 [ 28.201453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.201751] page_type: f5(slab) [ 28.201850] raw: 0bfffe0000000000 fff00000c772c140 dead000000000122 0000000000000000 [ 28.201977] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.202078] page dumped because: kasan: bad access detected [ 28.203302] [ 28.203545] Memory state around the buggy address: [ 28.203957] fff00000c7726180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.204142] fff00000c7726200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.204739] >fff00000c7726280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.204876] ^ [ 28.205260] fff00000c7726300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.205460] fff00000c7726380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.206268] ================================================================== [ 28.087069] ================================================================== [ 28.089039] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.089416] Read of size 1 at addr fff00000c6419b73 by task kunit_try_catch/221 [ 28.090830] [ 28.091342] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.092400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.092841] Hardware name: linux,dummy-virt (DT) [ 28.093031] Call trace: [ 28.093089] show_stack+0x20/0x38 (C) [ 28.094546] dump_stack_lvl+0x8c/0xd0 [ 28.094713] print_report+0x118/0x608 [ 28.094834] kasan_report+0xdc/0x128 [ 28.096245] __asan_report_load1_noabort+0x20/0x30 [ 28.096506] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.096627] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.096749] kunit_try_run_case+0x170/0x3f0 [ 28.096877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.097009] kthread+0x328/0x630 [ 28.097118] ret_from_fork+0x10/0x20 [ 28.099490] [ 28.099682] Allocated by task 221: [ 28.100546] kasan_save_stack+0x3c/0x68 [ 28.100674] kasan_save_track+0x20/0x40 [ 28.100764] kasan_save_alloc_info+0x40/0x58 [ 28.101875] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.102560] remove_element+0x130/0x1f8 [ 28.102775] mempool_alloc_preallocated+0x58/0xc0 [ 28.103867] mempool_oob_right_helper+0x98/0x2f0 [ 28.103987] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.104100] kunit_try_run_case+0x170/0x3f0 [ 28.104198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.105786] kthread+0x328/0x630 [ 28.105938] ret_from_fork+0x10/0x20 [ 28.106031] [ 28.106881] The buggy address belongs to the object at fff00000c6419b00 [ 28.106881] which belongs to the cache kmalloc-128 of size 128 [ 28.107384] The buggy address is located 0 bytes to the right of [ 28.107384] allocated 115-byte region [fff00000c6419b00, fff00000c6419b73) [ 28.108079] [ 28.108723] The buggy address belongs to the physical page: [ 28.109014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 28.109632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.109763] page_type: f5(slab) [ 28.109860] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.111277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.111406] page dumped because: kasan: bad access detected [ 28.111489] [ 28.111531] Memory state around the buggy address: [ 28.111609] fff00000c6419a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.113037] fff00000c6419a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.113477] >fff00000c6419b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.114704] ^ [ 28.115253] fff00000c6419b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.115388] fff00000c6419c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.115489] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
Automatically assigned
[ 27.359117] ================================================================== [ 27.359264] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 27.360505] Read of size 1 at addr fff00000c11a6dc0 by task kunit_try_catch/215 [ 27.360719] [ 27.360815] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 27.361461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.361542] Hardware name: linux,dummy-virt (DT) [ 27.362174] Call trace: [ 27.362592] show_stack+0x20/0x38 (C) [ 27.362800] dump_stack_lvl+0x8c/0xd0 [ 27.363147] print_report+0x118/0x608 [ 27.363527] kasan_report+0xdc/0x128 [ 27.363646] __kasan_check_byte+0x54/0x70 [ 27.364048] kmem_cache_destroy+0x34/0x218 [ 27.364403] kmem_cache_double_destroy+0x174/0x300 [ 27.364864] kunit_try_run_case+0x170/0x3f0 [ 27.365021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.365399] kthread+0x328/0x630 [ 27.365827] ret_from_fork+0x10/0x20 [ 27.366438] [ 27.366506] Allocated by task 215: [ 27.366611] kasan_save_stack+0x3c/0x68 [ 27.366864] kasan_save_track+0x20/0x40 [ 27.367049] kasan_save_alloc_info+0x40/0x58 [ 27.367238] __kasan_slab_alloc+0xa8/0xb0 [ 27.367536] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.367859] __kmem_cache_create_args+0x178/0x280 [ 27.368361] kmem_cache_double_destroy+0xc0/0x300 [ 27.368487] kunit_try_run_case+0x170/0x3f0 [ 27.368901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.369055] kthread+0x328/0x630 [ 27.369149] ret_from_fork+0x10/0x20 [ 27.369393] [ 27.369830] Freed by task 215: [ 27.369917] kasan_save_stack+0x3c/0x68 [ 27.370046] kasan_save_track+0x20/0x40 [ 27.370181] kasan_save_free_info+0x4c/0x78 [ 27.370626] __kasan_slab_free+0x6c/0x98 [ 27.370930] kmem_cache_free+0x260/0x468 [ 27.371055] slab_kmem_cache_release+0x38/0x50 [ 27.372098] kmem_cache_release+0x1c/0x30 [ 27.372846] kobject_put+0x17c/0x420 [ 27.372979] sysfs_slab_release+0x1c/0x30 [ 27.373118] kmem_cache_destroy+0x118/0x218 [ 27.373454] kmem_cache_double_destroy+0x128/0x300 [ 27.373564] kunit_try_run_case+0x170/0x3f0 [ 27.373878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.374223] kthread+0x328/0x630 [ 27.374740] ret_from_fork+0x10/0x20 [ 27.374842] [ 27.374889] The buggy address belongs to the object at fff00000c11a6dc0 [ 27.374889] which belongs to the cache kmem_cache of size 208 [ 27.375031] The buggy address is located 0 bytes inside of [ 27.375031] freed 208-byte region [fff00000c11a6dc0, fff00000c11a6e90) [ 27.375182] [ 27.375233] The buggy address belongs to the physical page: [ 27.375924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1011a6 [ 27.376276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.377121] page_type: f5(slab) [ 27.377324] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 27.377752] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 27.378263] page dumped because: kasan: bad access detected [ 27.378409] [ 27.378525] Memory state around the buggy address: [ 27.379028] fff00000c11a6c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.379184] fff00000c11a6d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 27.379343] >fff00000c11a6d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 27.379655] ^ [ 27.380119] fff00000c11a6e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.380315] fff00000c11a6e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.380443] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
Automatically assigned
[ 26.963944] ================================================================== [ 26.964263] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 26.964780] Read of size 1 at addr fff00000c7760000 by task kunit_try_catch/213 [ 26.964950] [ 26.965048] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 26.965402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.965589] Hardware name: linux,dummy-virt (DT) [ 26.965675] Call trace: [ 26.965831] show_stack+0x20/0x38 (C) [ 26.966342] dump_stack_lvl+0x8c/0xd0 [ 26.966479] print_report+0x118/0x608 [ 26.966594] kasan_report+0xdc/0x128 [ 26.966981] __asan_report_load1_noabort+0x20/0x30 [ 26.967224] kmem_cache_rcu_uaf+0x388/0x468 [ 26.967740] kunit_try_run_case+0x170/0x3f0 [ 26.968155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.968370] kthread+0x328/0x630 [ 26.968531] ret_from_fork+0x10/0x20 [ 26.968892] [ 26.969024] Allocated by task 213: [ 26.969140] kasan_save_stack+0x3c/0x68 [ 26.969322] kasan_save_track+0x20/0x40 [ 26.969510] kasan_save_alloc_info+0x40/0x58 [ 26.969788] __kasan_slab_alloc+0xa8/0xb0 [ 26.969890] kmem_cache_alloc_noprof+0x10c/0x398 [ 26.969999] kmem_cache_rcu_uaf+0x12c/0x468 [ 26.970089] kunit_try_run_case+0x170/0x3f0 [ 26.970184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.970296] kthread+0x328/0x630 [ 26.971252] ret_from_fork+0x10/0x20 [ 26.971385] [ 26.971548] Freed by task 0: [ 26.971640] kasan_save_stack+0x3c/0x68 [ 26.971935] kasan_save_track+0x20/0x40 [ 26.972214] kasan_save_free_info+0x4c/0x78 [ 26.972316] __kasan_slab_free+0x6c/0x98 [ 26.972436] slab_free_after_rcu_debug+0xd4/0x2f8 [ 26.972606] rcu_core+0x9f4/0x1e20 [ 26.972744] rcu_core_si+0x18/0x30 [ 26.972986] handle_softirqs+0x374/0xb28 [ 26.973125] __do_softirq+0x1c/0x28 [ 26.973220] [ 26.973270] Last potentially related work creation: [ 26.973438] kasan_save_stack+0x3c/0x68 [ 26.973586] kasan_record_aux_stack+0xb4/0xc8 [ 26.973680] kmem_cache_free+0x120/0x468 [ 26.973807] kmem_cache_rcu_uaf+0x16c/0x468 [ 26.974071] kunit_try_run_case+0x170/0x3f0 [ 26.974352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.974471] kthread+0x328/0x630 [ 26.974573] ret_from_fork+0x10/0x20 [ 26.974675] [ 26.974733] The buggy address belongs to the object at fff00000c7760000 [ 26.974733] which belongs to the cache test_cache of size 200 [ 26.975630] The buggy address is located 0 bytes inside of [ 26.975630] freed 200-byte region [fff00000c7760000, fff00000c77600c8) [ 26.975734] [ 26.975761] The buggy address belongs to the physical page: [ 26.975818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760 [ 26.975940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.976009] page_type: f5(slab) [ 26.976061] raw: 0bfffe0000000000 fff00000c11a6c80 dead000000000122 0000000000000000 [ 26.976124] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.976177] page dumped because: kasan: bad access detected [ 26.976217] [ 26.976237] Memory state around the buggy address: [ 26.976279] fff00000c775ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.976370] fff00000c775ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.976657] >fff00000c7760000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.976770] ^ [ 26.976851] fff00000c7760080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 26.977247] fff00000c7760100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.977494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
Automatically assigned
[ 26.350565] ================================================================== [ 26.350701] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 26.350842] Free of addr fff00000c7761001 by task kunit_try_catch/211 [ 26.350946] [ 26.351023] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 26.353585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.354120] Hardware name: linux,dummy-virt (DT) [ 26.354240] Call trace: [ 26.354313] show_stack+0x20/0x38 (C) [ 26.354467] dump_stack_lvl+0x8c/0xd0 [ 26.355156] print_report+0x118/0x608 [ 26.355917] kasan_report_invalid_free+0xc0/0xe8 [ 26.356214] check_slab_allocation+0xfc/0x108 [ 26.356489] __kasan_slab_pre_free+0x2c/0x48 [ 26.356664] kmem_cache_free+0xf0/0x468 [ 26.356904] kmem_cache_invalid_free+0x184/0x3c8 [ 26.357173] kunit_try_run_case+0x170/0x3f0 [ 26.357553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.357940] kthread+0x328/0x630 [ 26.358093] ret_from_fork+0x10/0x20 [ 26.358235] [ 26.358430] Allocated by task 211: [ 26.358516] kasan_save_stack+0x3c/0x68 [ 26.358745] kasan_save_track+0x20/0x40 [ 26.358875] kasan_save_alloc_info+0x40/0x58 [ 26.359102] __kasan_slab_alloc+0xa8/0xb0 [ 26.359229] kmem_cache_alloc_noprof+0x10c/0x398 [ 26.359370] kmem_cache_invalid_free+0x12c/0x3c8 [ 26.359671] kunit_try_run_case+0x170/0x3f0 [ 26.359787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.359928] kthread+0x328/0x630 [ 26.360655] ret_from_fork+0x10/0x20 [ 26.360796] [ 26.360847] The buggy address belongs to the object at fff00000c7761000 [ 26.360847] which belongs to the cache test_cache of size 200 [ 26.360995] The buggy address is located 1 bytes inside of [ 26.360995] 200-byte region [fff00000c7761000, fff00000c77610c8) [ 26.361370] [ 26.362115] The buggy address belongs to the physical page: [ 26.362222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107761 [ 26.362427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.362667] page_type: f5(slab) [ 26.362984] raw: 0bfffe0000000000 fff00000ffeb0f00 dead000000000122 0000000000000000 [ 26.363131] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.363324] page dumped because: kasan: bad access detected [ 26.363464] [ 26.363541] Memory state around the buggy address: [ 26.363640] fff00000c7760f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.363757] fff00000c7760f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.363866] >fff00000c7761000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.364116] ^ [ 26.364193] fff00000c7761080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 26.364297] fff00000c7761100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.364640] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
Automatically assigned
[ 26.295413] ================================================================== [ 26.295727] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 26.295922] Free of addr fff00000c7798000 by task kunit_try_catch/209 [ 26.296036] [ 26.296127] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 26.296427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.296692] Hardware name: linux,dummy-virt (DT) [ 26.296790] Call trace: [ 26.296873] show_stack+0x20/0x38 (C) [ 26.297101] dump_stack_lvl+0x8c/0xd0 [ 26.297421] print_report+0x118/0x608 [ 26.297558] kasan_report_invalid_free+0xc0/0xe8 [ 26.297689] check_slab_allocation+0xd4/0x108 [ 26.297811] __kasan_slab_pre_free+0x2c/0x48 [ 26.297962] kmem_cache_free+0xf0/0x468 [ 26.298166] kmem_cache_double_free+0x190/0x3c8 [ 26.298469] kunit_try_run_case+0x170/0x3f0 [ 26.298807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.298942] kthread+0x328/0x630 [ 26.299090] ret_from_fork+0x10/0x20 [ 26.299432] [ 26.299487] Allocated by task 209: [ 26.299579] kasan_save_stack+0x3c/0x68 [ 26.299691] kasan_save_track+0x20/0x40 [ 26.299910] kasan_save_alloc_info+0x40/0x58 [ 26.300035] __kasan_slab_alloc+0xa8/0xb0 [ 26.300147] kmem_cache_alloc_noprof+0x10c/0x398 [ 26.300264] kmem_cache_double_free+0x12c/0x3c8 [ 26.300527] kunit_try_run_case+0x170/0x3f0 [ 26.300636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.300802] kthread+0x328/0x630 [ 26.301032] ret_from_fork+0x10/0x20 [ 26.301131] [ 26.301227] Freed by task 209: [ 26.301415] kasan_save_stack+0x3c/0x68 [ 26.301530] kasan_save_track+0x20/0x40 [ 26.301833] kasan_save_free_info+0x4c/0x78 [ 26.301948] __kasan_slab_free+0x6c/0x98 [ 26.302183] kmem_cache_free+0x260/0x468 [ 26.302277] kmem_cache_double_free+0x140/0x3c8 [ 26.302402] kunit_try_run_case+0x170/0x3f0 [ 26.302520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.302696] kthread+0x328/0x630 [ 26.302801] ret_from_fork+0x10/0x20 [ 26.302940] [ 26.302993] The buggy address belongs to the object at fff00000c7798000 [ 26.302993] which belongs to the cache test_cache of size 200 [ 26.303153] The buggy address is located 0 bytes inside of [ 26.303153] 200-byte region [fff00000c7798000, fff00000c77980c8) [ 26.303314] [ 26.303445] The buggy address belongs to the physical page: [ 26.303533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107798 [ 26.303674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.303801] page_type: f5(slab) [ 26.304000] raw: 0bfffe0000000000 fff00000c11a6b40 dead000000000122 0000000000000000 [ 26.304140] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.304290] page dumped because: kasan: bad access detected [ 26.304405] [ 26.304461] Memory state around the buggy address: [ 26.304548] fff00000c7797f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.304713] fff00000c7797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.304997] >fff00000c7798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.305115] ^ [ 26.305265] fff00000c7798080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 26.305478] fff00000c7798100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.305641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
Automatically assigned
[ 26.001872] ================================================================== [ 26.004151] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 26.004398] Read of size 1 at addr fff00000c77970c8 by task kunit_try_catch/207 [ 26.004664] [ 26.004787] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 26.005222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.005357] Hardware name: linux,dummy-virt (DT) [ 26.005655] Call trace: [ 26.005717] show_stack+0x20/0x38 (C) [ 26.005919] dump_stack_lvl+0x8c/0xd0 [ 26.006161] print_report+0x118/0x608 [ 26.006291] kasan_report+0xdc/0x128 [ 26.006847] __asan_report_load1_noabort+0x20/0x30 [ 26.007005] kmem_cache_oob+0x344/0x430 [ 26.007298] kunit_try_run_case+0x170/0x3f0 [ 26.007747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.007959] kthread+0x328/0x630 [ 26.008180] ret_from_fork+0x10/0x20 [ 26.008346] [ 26.008398] Allocated by task 207: [ 26.008470] kasan_save_stack+0x3c/0x68 [ 26.009197] kasan_save_track+0x20/0x40 [ 26.009341] kasan_save_alloc_info+0x40/0x58 [ 26.009698] __kasan_slab_alloc+0xa8/0xb0 [ 26.009895] kmem_cache_alloc_noprof+0x10c/0x398 [ 26.010057] kmem_cache_oob+0x12c/0x430 [ 26.010304] kunit_try_run_case+0x170/0x3f0 [ 26.010433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.011058] kthread+0x328/0x630 [ 26.011769] ret_from_fork+0x10/0x20 [ 26.011935] [ 26.011983] The buggy address belongs to the object at fff00000c7797000 [ 26.011983] which belongs to the cache test_cache of size 200 [ 26.012187] The buggy address is located 0 bytes to the right of [ 26.012187] allocated 200-byte region [fff00000c7797000, fff00000c77970c8) [ 26.013480] [ 26.013538] The buggy address belongs to the physical page: [ 26.014001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107797 [ 26.014209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.014992] page_type: f5(slab) [ 26.015436] raw: 0bfffe0000000000 fff00000c11a6a00 dead000000000122 0000000000000000 [ 26.016094] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.016703] page dumped because: kasan: bad access detected [ 26.016789] [ 26.017038] Memory state around the buggy address: [ 26.017139] fff00000c7796f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.017964] fff00000c7797000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.018575] >fff00000c7797080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 26.018704] ^ [ 26.019197] fff00000c7797100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.019312] fff00000c7797180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.020167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
Automatically assigned
[ 25.910567] ================================================================== [ 25.910855] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 25.911115] Read of size 8 at addr fff00000c7739440 by task kunit_try_catch/200 [ 25.911378] [ 25.911619] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.912106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.912197] Hardware name: linux,dummy-virt (DT) [ 25.912290] Call trace: [ 25.912377] show_stack+0x20/0x38 (C) [ 25.912497] dump_stack_lvl+0x8c/0xd0 [ 25.912563] print_report+0x118/0x608 [ 25.912623] kasan_report+0xdc/0x128 [ 25.912680] __asan_report_load8_noabort+0x20/0x30 [ 25.912741] workqueue_uaf+0x480/0x4a8 [ 25.912799] kunit_try_run_case+0x170/0x3f0 [ 25.912862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.912928] kthread+0x328/0x630 [ 25.912982] ret_from_fork+0x10/0x20 [ 25.913039] [ 25.913064] Allocated by task 200: [ 25.913097] kasan_save_stack+0x3c/0x68 [ 25.913151] kasan_save_track+0x20/0x40 [ 25.913198] kasan_save_alloc_info+0x40/0x58 [ 25.913249] __kasan_kmalloc+0xd4/0xd8 [ 25.913311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.913520] workqueue_uaf+0x13c/0x4a8 [ 25.913729] kunit_try_run_case+0x170/0x3f0 [ 25.913881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.914090] kthread+0x328/0x630 [ 25.914357] ret_from_fork+0x10/0x20 [ 25.914464] [ 25.914516] Freed by task 9: [ 25.914585] kasan_save_stack+0x3c/0x68 [ 25.914687] kasan_save_track+0x20/0x40 [ 25.914819] kasan_save_free_info+0x4c/0x78 [ 25.915064] __kasan_slab_free+0x6c/0x98 [ 25.915198] kfree+0x214/0x3c8 [ 25.915288] workqueue_uaf_work+0x18/0x30 [ 25.915407] process_one_work+0x530/0xf98 [ 25.915561] worker_thread+0x618/0xf38 [ 25.916015] kthread+0x328/0x630 [ 25.916198] ret_from_fork+0x10/0x20 [ 25.916374] [ 25.916469] Last potentially related work creation: [ 25.916647] kasan_save_stack+0x3c/0x68 [ 25.916782] kasan_record_aux_stack+0xb4/0xc8 [ 25.916952] __queue_work+0x65c/0x1008 [ 25.917068] queue_work_on+0xbc/0xf8 [ 25.917164] workqueue_uaf+0x210/0x4a8 [ 25.919374] kunit_try_run_case+0x170/0x3f0 [ 25.919493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.919616] kthread+0x328/0x630 [ 25.919728] ret_from_fork+0x10/0x20 [ 25.919833] [ 25.919883] The buggy address belongs to the object at fff00000c7739440 [ 25.919883] which belongs to the cache kmalloc-32 of size 32 [ 25.920028] The buggy address is located 0 bytes inside of [ 25.920028] freed 32-byte region [fff00000c7739440, fff00000c7739460) [ 25.920172] [ 25.920225] The buggy address belongs to the physical page: [ 25.920301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107739 [ 25.920445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.920565] page_type: f5(slab) [ 25.920657] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.920781] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.920887] page dumped because: kasan: bad access detected [ 25.920998] [ 25.921057] Memory state around the buggy address: [ 25.921154] fff00000c7739300: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 25.921289] fff00000c7739380: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 25.921429] >fff00000c7739400: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 25.921538] ^ [ 25.921639] fff00000c7739480: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.921832] fff00000c7739500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.921940] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
Automatically assigned
[ 25.837653] ================================================================== [ 25.837895] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 25.838034] Read of size 4 at addr fff00000c7739240 by task swapper/0/0 [ 25.838145] [ 25.840294] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.840460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.840497] Hardware name: linux,dummy-virt (DT) [ 25.840586] Call trace: [ 25.840625] show_stack+0x20/0x38 (C) [ 25.840692] dump_stack_lvl+0x8c/0xd0 [ 25.840752] print_report+0x118/0x608 [ 25.840812] kasan_report+0xdc/0x128 [ 25.840869] __asan_report_load4_noabort+0x20/0x30 [ 25.840928] rcu_uaf_reclaim+0x64/0x70 [ 25.840982] rcu_core+0x9f4/0x1e20 [ 25.841044] rcu_core_si+0x18/0x30 [ 25.841097] handle_softirqs+0x374/0xb28 [ 25.841157] __do_softirq+0x1c/0x28 [ 25.841209] ____do_softirq+0x18/0x30 [ 25.841265] call_on_irq_stack+0x24/0x30 [ 25.841409] do_softirq_own_stack+0x24/0x38 [ 25.841542] __irq_exit_rcu+0x1fc/0x318 [ 25.841688] irq_exit_rcu+0x1c/0x80 [ 25.842215] el1_interrupt+0x38/0x58 [ 25.842442] el1h_64_irq_handler+0x18/0x28 [ 25.842724] el1h_64_irq+0x6c/0x70 [ 25.843233] arch_local_irq_enable+0x4/0x8 (P) [ 25.843451] do_idle+0x384/0x4e8 [ 25.843985] cpu_startup_entry+0x64/0x80 [ 25.844209] rest_init+0x160/0x188 [ 25.844498] start_kernel+0x30c/0x3d0 [ 25.844646] __primary_switched+0x8c/0xa0 [ 25.844932] [ 25.845006] Allocated by task 198: [ 25.845136] kasan_save_stack+0x3c/0x68 [ 25.845287] kasan_save_track+0x20/0x40 [ 25.845518] kasan_save_alloc_info+0x40/0x58 [ 25.845668] __kasan_kmalloc+0xd4/0xd8 [ 25.845788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.845966] rcu_uaf+0xb0/0x2d8 [ 25.846069] kunit_try_run_case+0x170/0x3f0 [ 25.846178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.846459] kthread+0x328/0x630 [ 25.846569] ret_from_fork+0x10/0x20 [ 25.846663] [ 25.847357] Freed by task 0: [ 25.847727] kasan_save_stack+0x3c/0x68 [ 25.847906] kasan_save_track+0x20/0x40 [ 25.848124] kasan_save_free_info+0x4c/0x78 [ 25.848280] __kasan_slab_free+0x6c/0x98 [ 25.848550] kfree+0x214/0x3c8 [ 25.848696] rcu_uaf_reclaim+0x28/0x70 [ 25.848970] rcu_core+0x9f4/0x1e20 [ 25.849090] rcu_core_si+0x18/0x30 [ 25.849193] handle_softirqs+0x374/0xb28 [ 25.849368] __do_softirq+0x1c/0x28 [ 25.849478] [ 25.849549] Last potentially related work creation: [ 25.849637] kasan_save_stack+0x3c/0x68 [ 25.849888] kasan_record_aux_stack+0xb4/0xc8 [ 25.850008] __call_rcu_common.constprop.0+0x70/0x8b0 [ 25.850343] call_rcu+0x18/0x30 [ 25.850825] rcu_uaf+0x14c/0x2d8 [ 25.850918] kunit_try_run_case+0x170/0x3f0 [ 25.851018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.851127] kthread+0x328/0x630 [ 25.851823] ret_from_fork+0x10/0x20 [ 25.851975] [ 25.852436] The buggy address belongs to the object at fff00000c7739240 [ 25.852436] which belongs to the cache kmalloc-32 of size 32 [ 25.852924] The buggy address is located 0 bytes inside of [ 25.852924] freed 32-byte region [fff00000c7739240, fff00000c7739260) [ 25.853501] [ 25.853744] The buggy address belongs to the physical page: [ 25.853824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107739 [ 25.854423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.854575] page_type: f5(slab) [ 25.854843] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.854972] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.855103] page dumped because: kasan: bad access detected [ 25.855320] [ 25.855479] Memory state around the buggy address: [ 25.855677] fff00000c7739100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 25.855800] fff00000c7739180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 25.855974] >fff00000c7739200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.856472] ^ [ 25.856894] fff00000c7739280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.857394] fff00000c7739300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.857500] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
Automatically assigned
[ 25.585970] ================================================================== [ 25.586091] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 25.586199] Read of size 1 at addr fff00000c6419800 by task kunit_try_catch/196 [ 25.586315] [ 25.586403] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.588031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.588115] Hardware name: linux,dummy-virt (DT) [ 25.588201] Call trace: [ 25.588258] show_stack+0x20/0x38 (C) [ 25.588419] dump_stack_lvl+0x8c/0xd0 [ 25.588550] print_report+0x118/0x608 [ 25.588672] kasan_report+0xdc/0x128 [ 25.588796] __kasan_check_byte+0x54/0x70 [ 25.588917] ksize+0x30/0x88 [ 25.589021] ksize_uaf+0x168/0x5f8 [ 25.589124] kunit_try_run_case+0x170/0x3f0 [ 25.589238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.589405] kthread+0x328/0x630 [ 25.589697] ret_from_fork+0x10/0x20 [ 25.590018] [ 25.591202] Allocated by task 196: [ 25.591283] kasan_save_stack+0x3c/0x68 [ 25.595237] kasan_save_track+0x20/0x40 [ 25.595384] kasan_save_alloc_info+0x40/0x58 [ 25.595603] __kasan_kmalloc+0xd4/0xd8 [ 25.595733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.597372] ksize_uaf+0xb8/0x5f8 [ 25.597524] kunit_try_run_case+0x170/0x3f0 [ 25.597638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.597760] kthread+0x328/0x630 [ 25.597889] ret_from_fork+0x10/0x20 [ 25.598478] [ 25.598534] Freed by task 196: [ 25.598630] kasan_save_stack+0x3c/0x68 [ 25.598738] kasan_save_track+0x20/0x40 [ 25.598846] kasan_save_free_info+0x4c/0x78 [ 25.598953] __kasan_slab_free+0x6c/0x98 [ 25.599060] kfree+0x214/0x3c8 [ 25.599144] ksize_uaf+0x11c/0x5f8 [ 25.599240] kunit_try_run_case+0x170/0x3f0 [ 25.599367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.599480] kthread+0x328/0x630 [ 25.599567] ret_from_fork+0x10/0x20 [ 25.599668] [ 25.599718] The buggy address belongs to the object at fff00000c6419800 [ 25.599718] which belongs to the cache kmalloc-128 of size 128 [ 25.599883] The buggy address is located 0 bytes inside of [ 25.599883] freed 128-byte region [fff00000c6419800, fff00000c6419880) [ 25.600042] [ 25.600309] The buggy address belongs to the physical page: [ 25.600409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.601731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.601970] page_type: f5(slab) [ 25.602071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.602212] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.602325] page dumped because: kasan: bad access detected [ 25.602428] [ 25.602491] Memory state around the buggy address: [ 25.602573] fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.602679] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.602789] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.603758] ^ [ 25.603988] fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.604117] fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.604228] ================================================================== [ 25.607539] ================================================================== [ 25.607651] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 25.607756] Read of size 1 at addr fff00000c6419800 by task kunit_try_catch/196 [ 25.608014] [ 25.608124] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.608363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.608563] Hardware name: linux,dummy-virt (DT) [ 25.608675] Call trace: [ 25.608822] show_stack+0x20/0x38 (C) [ 25.609154] dump_stack_lvl+0x8c/0xd0 [ 25.609410] print_report+0x118/0x608 [ 25.609617] kasan_report+0xdc/0x128 [ 25.609765] __asan_report_load1_noabort+0x20/0x30 [ 25.610049] ksize_uaf+0x598/0x5f8 [ 25.610235] kunit_try_run_case+0x170/0x3f0 [ 25.610395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.610553] kthread+0x328/0x630 [ 25.610774] ret_from_fork+0x10/0x20 [ 25.610967] [ 25.611430] Allocated by task 196: [ 25.611765] kasan_save_stack+0x3c/0x68 [ 25.612350] kasan_save_track+0x20/0x40 [ 25.612723] kasan_save_alloc_info+0x40/0x58 [ 25.613237] __kasan_kmalloc+0xd4/0xd8 [ 25.613669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.613844] ksize_uaf+0xb8/0x5f8 [ 25.613931] kunit_try_run_case+0x170/0x3f0 [ 25.614034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.614142] kthread+0x328/0x630 [ 25.614220] ret_from_fork+0x10/0x20 [ 25.615879] [ 25.616325] Freed by task 196: [ 25.616574] kasan_save_stack+0x3c/0x68 [ 25.616672] kasan_save_track+0x20/0x40 [ 25.616768] kasan_save_free_info+0x4c/0x78 [ 25.616879] __kasan_slab_free+0x6c/0x98 [ 25.616978] kfree+0x214/0x3c8 [ 25.618537] ksize_uaf+0x11c/0x5f8 [ 25.618638] kunit_try_run_case+0x170/0x3f0 [ 25.619290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.619554] kthread+0x328/0x630 [ 25.619765] ret_from_fork+0x10/0x20 [ 25.620190] [ 25.620403] The buggy address belongs to the object at fff00000c6419800 [ 25.620403] which belongs to the cache kmalloc-128 of size 128 [ 25.620666] The buggy address is located 0 bytes inside of [ 25.620666] freed 128-byte region [fff00000c6419800, fff00000c6419880) [ 25.620834] [ 25.621466] The buggy address belongs to the physical page: [ 25.622167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.622562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.622821] page_type: f5(slab) [ 25.623635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.623798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.624666] page dumped because: kasan: bad access detected [ 25.624762] [ 25.624832] Memory state around the buggy address: [ 25.624907] fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.625278] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.625517] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.625639] ^ [ 25.626032] fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.626138] fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.626238] ================================================================== [ 25.631790] ================================================================== [ 25.632512] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 25.633629] Read of size 1 at addr fff00000c6419878 by task kunit_try_catch/196 [ 25.633735] [ 25.633803] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.633912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.633947] Hardware name: linux,dummy-virt (DT) [ 25.633987] Call trace: [ 25.634017] show_stack+0x20/0x38 (C) [ 25.634080] dump_stack_lvl+0x8c/0xd0 [ 25.634138] print_report+0x118/0x608 [ 25.634197] kasan_report+0xdc/0x128 [ 25.634252] __asan_report_load1_noabort+0x20/0x30 [ 25.634311] ksize_uaf+0x544/0x5f8 [ 25.634621] kunit_try_run_case+0x170/0x3f0 [ 25.634766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.634934] kthread+0x328/0x630 [ 25.635249] ret_from_fork+0x10/0x20 [ 25.635907] [ 25.636010] Allocated by task 196: [ 25.636436] kasan_save_stack+0x3c/0x68 [ 25.636836] kasan_save_track+0x20/0x40 [ 25.636948] kasan_save_alloc_info+0x40/0x58 [ 25.637051] __kasan_kmalloc+0xd4/0xd8 [ 25.637179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.637323] ksize_uaf+0xb8/0x5f8 [ 25.637577] kunit_try_run_case+0x170/0x3f0 [ 25.637681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.637828] kthread+0x328/0x630 [ 25.637988] ret_from_fork+0x10/0x20 [ 25.638092] [ 25.638253] Freed by task 196: [ 25.638323] kasan_save_stack+0x3c/0x68 [ 25.638440] kasan_save_track+0x20/0x40 [ 25.638537] kasan_save_free_info+0x4c/0x78 [ 25.638647] __kasan_slab_free+0x6c/0x98 [ 25.638886] kfree+0x214/0x3c8 [ 25.639033] ksize_uaf+0x11c/0x5f8 [ 25.639118] kunit_try_run_case+0x170/0x3f0 [ 25.639221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.639585] kthread+0x328/0x630 [ 25.639695] ret_from_fork+0x10/0x20 [ 25.640123] [ 25.640419] The buggy address belongs to the object at fff00000c6419800 [ 25.640419] which belongs to the cache kmalloc-128 of size 128 [ 25.640726] The buggy address is located 120 bytes inside of [ 25.640726] freed 128-byte region [fff00000c6419800, fff00000c6419880) [ 25.640898] [ 25.640950] The buggy address belongs to the physical page: [ 25.641033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.641161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.641683] page_type: f5(slab) [ 25.641885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.642107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.642219] page dumped because: kasan: bad access detected [ 25.642467] [ 25.642547] Memory state around the buggy address: [ 25.642866] fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.642984] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.643264] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.643425] ^ [ 25.643538] fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.643646] fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.643762] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
Automatically assigned
[ 25.538275] ================================================================== [ 25.538433] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 25.538569] Read of size 1 at addr fff00000c6419773 by task kunit_try_catch/194 [ 25.538709] [ 25.538880] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.539776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.539852] Hardware name: linux,dummy-virt (DT) [ 25.539946] Call trace: [ 25.540026] show_stack+0x20/0x38 (C) [ 25.540164] dump_stack_lvl+0x8c/0xd0 [ 25.540552] print_report+0x118/0x608 [ 25.540896] kasan_report+0xdc/0x128 [ 25.541019] __asan_report_load1_noabort+0x20/0x30 [ 25.541140] ksize_unpoisons_memory+0x628/0x740 [ 25.541268] kunit_try_run_case+0x170/0x3f0 [ 25.541428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.541567] kthread+0x328/0x630 [ 25.541681] ret_from_fork+0x10/0x20 [ 25.541798] [ 25.541843] Allocated by task 194: [ 25.541930] kasan_save_stack+0x3c/0x68 [ 25.542050] kasan_save_track+0x20/0x40 [ 25.542169] kasan_save_alloc_info+0x40/0x58 [ 25.542497] __kasan_kmalloc+0xd4/0xd8 [ 25.542951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.543190] ksize_unpoisons_memory+0xc0/0x740 [ 25.543304] kunit_try_run_case+0x170/0x3f0 [ 25.543427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.543561] kthread+0x328/0x630 [ 25.543664] ret_from_fork+0x10/0x20 [ 25.544007] [ 25.544278] The buggy address belongs to the object at fff00000c6419700 [ 25.544278] which belongs to the cache kmalloc-128 of size 128 [ 25.544437] The buggy address is located 0 bytes to the right of [ 25.544437] allocated 115-byte region [fff00000c6419700, fff00000c6419773) [ 25.545061] [ 25.545197] The buggy address belongs to the physical page: [ 25.545271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.545447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.545560] page_type: f5(slab) [ 25.545651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.545776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.545871] page dumped because: kasan: bad access detected [ 25.545945] [ 25.546012] Memory state around the buggy address: [ 25.546088] fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.546194] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546301] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.546415] ^ [ 25.546509] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546615] fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546732] ================================================================== [ 25.558931] ================================================================== [ 25.559143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 25.559349] Read of size 1 at addr fff00000c641977f by task kunit_try_catch/194 [ 25.559476] [ 25.559541] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.559737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.559804] Hardware name: linux,dummy-virt (DT) [ 25.560361] Call trace: [ 25.560450] show_stack+0x20/0x38 (C) [ 25.560577] dump_stack_lvl+0x8c/0xd0 [ 25.560804] print_report+0x118/0x608 [ 25.561065] kasan_report+0xdc/0x128 [ 25.561350] __asan_report_load1_noabort+0x20/0x30 [ 25.561937] ksize_unpoisons_memory+0x690/0x740 [ 25.562088] kunit_try_run_case+0x170/0x3f0 [ 25.562210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.562360] kthread+0x328/0x630 [ 25.562549] ret_from_fork+0x10/0x20 [ 25.563269] [ 25.563423] Allocated by task 194: [ 25.563847] kasan_save_stack+0x3c/0x68 [ 25.563959] kasan_save_track+0x20/0x40 [ 25.564083] kasan_save_alloc_info+0x40/0x58 [ 25.564616] __kasan_kmalloc+0xd4/0xd8 [ 25.564959] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.565076] ksize_unpoisons_memory+0xc0/0x740 [ 25.565175] kunit_try_run_case+0x170/0x3f0 [ 25.565858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.566113] kthread+0x328/0x630 [ 25.566552] ret_from_fork+0x10/0x20 [ 25.566926] [ 25.567417] The buggy address belongs to the object at fff00000c6419700 [ 25.567417] which belongs to the cache kmalloc-128 of size 128 [ 25.567600] The buggy address is located 12 bytes to the right of [ 25.567600] allocated 115-byte region [fff00000c6419700, fff00000c6419773) [ 25.568378] [ 25.568442] The buggy address belongs to the physical page: [ 25.568483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.568549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.568666] page_type: f5(slab) [ 25.568715] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.568781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.568832] page dumped because: kasan: bad access detected [ 25.568872] [ 25.568893] Memory state around the buggy address: [ 25.568932] fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.568991] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.569047] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.569095] ^ [ 25.569145] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.569203] fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.569254] ================================================================== [ 25.548566] ================================================================== [ 25.548688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 25.548881] Read of size 1 at addr fff00000c6419778 by task kunit_try_catch/194 [ 25.549433] [ 25.549650] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.550179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.550440] Hardware name: linux,dummy-virt (DT) [ 25.550544] Call trace: [ 25.550596] show_stack+0x20/0x38 (C) [ 25.550714] dump_stack_lvl+0x8c/0xd0 [ 25.551193] print_report+0x118/0x608 [ 25.551592] kasan_report+0xdc/0x128 [ 25.551729] __asan_report_load1_noabort+0x20/0x30 [ 25.551918] ksize_unpoisons_memory+0x618/0x740 [ 25.551998] kunit_try_run_case+0x170/0x3f0 [ 25.552059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.552182] kthread+0x328/0x630 [ 25.552240] ret_from_fork+0x10/0x20 [ 25.552301] [ 25.552323] Allocated by task 194: [ 25.552469] kasan_save_stack+0x3c/0x68 [ 25.552631] kasan_save_track+0x20/0x40 [ 25.552831] kasan_save_alloc_info+0x40/0x58 [ 25.552944] __kasan_kmalloc+0xd4/0xd8 [ 25.553043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.553216] ksize_unpoisons_memory+0xc0/0x740 [ 25.553449] kunit_try_run_case+0x170/0x3f0 [ 25.553581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.553883] kthread+0x328/0x630 [ 25.554103] ret_from_fork+0x10/0x20 [ 25.554194] [ 25.554293] The buggy address belongs to the object at fff00000c6419700 [ 25.554293] which belongs to the cache kmalloc-128 of size 128 [ 25.555046] The buggy address is located 5 bytes to the right of [ 25.555046] allocated 115-byte region [fff00000c6419700, fff00000c6419773) [ 25.555223] [ 25.555278] The buggy address belongs to the physical page: [ 25.555377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.555687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.555828] page_type: f5(slab) [ 25.555966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.556090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.556242] page dumped because: kasan: bad access detected [ 25.556348] [ 25.556424] Memory state around the buggy address: [ 25.556549] fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.556864] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.556977] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.557125] ^ [ 25.557383] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.557539] fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.557679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
Automatically assigned
[ 25.495124] ================================================================== [ 25.495258] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 25.495389] Free of addr fff00000c3fa5900 by task kunit_try_catch/192 [ 25.495488] [ 25.495551] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.495751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.495814] Hardware name: linux,dummy-virt (DT) [ 25.495896] Call trace: [ 25.495945] show_stack+0x20/0x38 (C) [ 25.496058] dump_stack_lvl+0x8c/0xd0 [ 25.496168] print_report+0x118/0x608 [ 25.496280] kasan_report_invalid_free+0xc0/0xe8 [ 25.496781] check_slab_allocation+0xd4/0x108 [ 25.496976] __kasan_slab_pre_free+0x2c/0x48 [ 25.497116] kfree+0xe8/0x3c8 [ 25.497633] kfree_sensitive+0x3c/0xb0 [ 25.497762] kmalloc_double_kzfree+0x168/0x308 [ 25.497895] kunit_try_run_case+0x170/0x3f0 [ 25.498085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.498318] kthread+0x328/0x630 [ 25.498484] ret_from_fork+0x10/0x20 [ 25.498775] [ 25.498824] Allocated by task 192: [ 25.498895] kasan_save_stack+0x3c/0x68 [ 25.498997] kasan_save_track+0x20/0x40 [ 25.499160] kasan_save_alloc_info+0x40/0x58 [ 25.499274] __kasan_kmalloc+0xd4/0xd8 [ 25.499554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.499682] kmalloc_double_kzfree+0xb8/0x308 [ 25.499800] kunit_try_run_case+0x170/0x3f0 [ 25.500070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.500187] kthread+0x328/0x630 [ 25.500419] ret_from_fork+0x10/0x20 [ 25.500533] [ 25.500984] Freed by task 192: [ 25.501068] kasan_save_stack+0x3c/0x68 [ 25.501174] kasan_save_track+0x20/0x40 [ 25.501272] kasan_save_free_info+0x4c/0x78 [ 25.501425] __kasan_slab_free+0x6c/0x98 [ 25.501619] kfree+0x214/0x3c8 [ 25.501761] kfree_sensitive+0x80/0xb0 [ 25.501873] kmalloc_double_kzfree+0x11c/0x308 [ 25.502136] kunit_try_run_case+0x170/0x3f0 [ 25.502237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.502369] kthread+0x328/0x630 [ 25.502465] ret_from_fork+0x10/0x20 [ 25.502689] [ 25.502736] The buggy address belongs to the object at fff00000c3fa5900 [ 25.502736] which belongs to the cache kmalloc-16 of size 16 [ 25.502874] The buggy address is located 0 bytes inside of [ 25.502874] 16-byte region [fff00000c3fa5900, fff00000c3fa5910) [ 25.503050] [ 25.503178] The buggy address belongs to the physical page: [ 25.503357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 25.503484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.503617] page_type: f5(slab) [ 25.503717] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.504123] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.504247] page dumped because: kasan: bad access detected [ 25.504350] [ 25.504393] Memory state around the buggy address: [ 25.504571] fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.504683] fff00000c3fa5880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.504870] >fff00000c3fa5900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.505169] ^ [ 25.505255] fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.505498] fff00000c3fa5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.505639] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
Automatically assigned
[ 25.478902] ================================================================== [ 25.479018] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 25.479128] Read of size 1 at addr fff00000c3fa5900 by task kunit_try_catch/192 [ 25.479244] [ 25.479312] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.480827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.481038] Hardware name: linux,dummy-virt (DT) [ 25.481265] Call trace: [ 25.481466] show_stack+0x20/0x38 (C) [ 25.481626] dump_stack_lvl+0x8c/0xd0 [ 25.481784] print_report+0x118/0x608 [ 25.481955] kasan_report+0xdc/0x128 [ 25.482242] __kasan_check_byte+0x54/0x70 [ 25.482441] kfree_sensitive+0x30/0xb0 [ 25.482776] kmalloc_double_kzfree+0x168/0x308 [ 25.482933] kunit_try_run_case+0x170/0x3f0 [ 25.483076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.483395] kthread+0x328/0x630 [ 25.483560] ret_from_fork+0x10/0x20 [ 25.483737] [ 25.483783] Allocated by task 192: [ 25.483904] kasan_save_stack+0x3c/0x68 [ 25.484020] kasan_save_track+0x20/0x40 [ 25.484240] kasan_save_alloc_info+0x40/0x58 [ 25.484416] __kasan_kmalloc+0xd4/0xd8 [ 25.484522] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.484628] kmalloc_double_kzfree+0xb8/0x308 [ 25.484787] kunit_try_run_case+0x170/0x3f0 [ 25.484944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.485070] kthread+0x328/0x630 [ 25.485155] ret_from_fork+0x10/0x20 [ 25.485274] [ 25.485423] Freed by task 192: [ 25.485495] kasan_save_stack+0x3c/0x68 [ 25.485615] kasan_save_track+0x20/0x40 [ 25.485807] kasan_save_free_info+0x4c/0x78 [ 25.485982] __kasan_slab_free+0x6c/0x98 [ 25.486102] kfree+0x214/0x3c8 [ 25.486285] kfree_sensitive+0x80/0xb0 [ 25.486482] kmalloc_double_kzfree+0x11c/0x308 [ 25.486618] kunit_try_run_case+0x170/0x3f0 [ 25.486778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.486986] kthread+0x328/0x630 [ 25.487116] ret_from_fork+0x10/0x20 [ 25.487212] [ 25.487260] The buggy address belongs to the object at fff00000c3fa5900 [ 25.487260] which belongs to the cache kmalloc-16 of size 16 [ 25.487416] The buggy address is located 0 bytes inside of [ 25.487416] freed 16-byte region [fff00000c3fa5900, fff00000c3fa5910) [ 25.487566] [ 25.487636] The buggy address belongs to the physical page: [ 25.487720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 25.487928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.488059] page_type: f5(slab) [ 25.488279] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.488495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.488710] page dumped because: kasan: bad access detected [ 25.488832] [ 25.488923] Memory state around the buggy address: [ 25.489017] fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.489216] fff00000c3fa5880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.489577] >fff00000c3fa5900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.489684] ^ [ 25.489759] fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.490300] fff00000c3fa5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.490446] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
Automatically assigned
[ 25.442221] ================================================================== [ 25.442357] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 25.442465] Read of size 1 at addr fff00000c776e3a8 by task kunit_try_catch/188 [ 25.442588] [ 25.442667] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.442897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.442974] Hardware name: linux,dummy-virt (DT) [ 25.443066] Call trace: [ 25.443125] show_stack+0x20/0x38 (C) [ 25.443702] dump_stack_lvl+0x8c/0xd0 [ 25.443905] print_report+0x118/0x608 [ 25.444052] kasan_report+0xdc/0x128 [ 25.444179] __asan_report_load1_noabort+0x20/0x30 [ 25.444322] kmalloc_uaf2+0x3f4/0x468 [ 25.444669] kunit_try_run_case+0x170/0x3f0 [ 25.446374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.446458] kthread+0x328/0x630 [ 25.446519] ret_from_fork+0x10/0x20 [ 25.446624] [ 25.446650] Allocated by task 188: [ 25.446688] kasan_save_stack+0x3c/0x68 [ 25.446738] kasan_save_track+0x20/0x40 [ 25.446785] kasan_save_alloc_info+0x40/0x58 [ 25.446835] __kasan_kmalloc+0xd4/0xd8 [ 25.446882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.446933] kmalloc_uaf2+0xc4/0x468 [ 25.446975] kunit_try_run_case+0x170/0x3f0 [ 25.447024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.447079] kthread+0x328/0x630 [ 25.447118] ret_from_fork+0x10/0x20 [ 25.447162] [ 25.447185] Freed by task 188: [ 25.447217] kasan_save_stack+0x3c/0x68 [ 25.447265] kasan_save_track+0x20/0x40 [ 25.447310] kasan_save_free_info+0x4c/0x78 [ 25.447764] __kasan_slab_free+0x6c/0x98 [ 25.447876] kfree+0x214/0x3c8 [ 25.447971] kmalloc_uaf2+0x134/0x468 [ 25.448070] kunit_try_run_case+0x170/0x3f0 [ 25.448173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.448305] kthread+0x328/0x630 [ 25.448426] ret_from_fork+0x10/0x20 [ 25.448874] [ 25.449033] The buggy address belongs to the object at fff00000c776e380 [ 25.449033] which belongs to the cache kmalloc-64 of size 64 [ 25.449207] The buggy address is located 40 bytes inside of [ 25.449207] freed 64-byte region [fff00000c776e380, fff00000c776e3c0) [ 25.449381] [ 25.449464] The buggy address belongs to the physical page: [ 25.449576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776e [ 25.449909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.450092] page_type: f5(slab) [ 25.450189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.450313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.450440] page dumped because: kasan: bad access detected [ 25.450530] [ 25.450583] Memory state around the buggy address: [ 25.451182] fff00000c776e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.451491] fff00000c776e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.451614] >fff00000c776e380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.451717] ^ [ 25.451819] fff00000c776e400: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 25.452128] fff00000c776e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.452412] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
Automatically assigned
[ 25.410777] ================================================================== [ 25.411040] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 25.411190] Write of size 33 at addr fff00000c776e200 by task kunit_try_catch/186 [ 25.411430] [ 25.411558] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.411788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.411941] Hardware name: linux,dummy-virt (DT) [ 25.412034] Call trace: [ 25.412131] show_stack+0x20/0x38 (C) [ 25.412254] dump_stack_lvl+0x8c/0xd0 [ 25.412387] print_report+0x118/0x608 [ 25.412505] kasan_report+0xdc/0x128 [ 25.412622] kasan_check_range+0x100/0x1a8 [ 25.413078] __asan_memset+0x34/0x78 [ 25.413287] kmalloc_uaf_memset+0x170/0x310 [ 25.413849] kunit_try_run_case+0x170/0x3f0 [ 25.413984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.414116] kthread+0x328/0x630 [ 25.414223] ret_from_fork+0x10/0x20 [ 25.414434] [ 25.414549] Allocated by task 186: [ 25.414623] kasan_save_stack+0x3c/0x68 [ 25.414727] kasan_save_track+0x20/0x40 [ 25.414988] kasan_save_alloc_info+0x40/0x58 [ 25.415245] __kasan_kmalloc+0xd4/0xd8 [ 25.415357] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.415467] kmalloc_uaf_memset+0xb8/0x310 [ 25.415937] kunit_try_run_case+0x170/0x3f0 [ 25.416129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.416347] kthread+0x328/0x630 [ 25.416850] ret_from_fork+0x10/0x20 [ 25.417314] [ 25.417381] Freed by task 186: [ 25.417485] kasan_save_stack+0x3c/0x68 [ 25.419889] kasan_save_track+0x20/0x40 [ 25.420000] kasan_save_free_info+0x4c/0x78 [ 25.420102] __kasan_slab_free+0x6c/0x98 [ 25.420202] kfree+0x214/0x3c8 [ 25.420946] kmalloc_uaf_memset+0x11c/0x310 [ 25.421213] kunit_try_run_case+0x170/0x3f0 [ 25.421344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.421469] kthread+0x328/0x630 [ 25.421707] ret_from_fork+0x10/0x20 [ 25.421800] [ 25.421884] The buggy address belongs to the object at fff00000c776e200 [ 25.421884] which belongs to the cache kmalloc-64 of size 64 [ 25.422274] The buggy address is located 0 bytes inside of [ 25.422274] freed 64-byte region [fff00000c776e200, fff00000c776e240) [ 25.422684] [ 25.422738] The buggy address belongs to the physical page: [ 25.422809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776e [ 25.422932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.423080] page_type: f5(slab) [ 25.423874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.424389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.424523] page dumped because: kasan: bad access detected [ 25.424602] [ 25.424655] Memory state around the buggy address: [ 25.424741] fff00000c776e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.425021] fff00000c776e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.425201] >fff00000c776e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.425786] ^ [ 25.425932] fff00000c776e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.426078] fff00000c776e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.426209] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
Automatically assigned
[ 25.388556] ================================================================== [ 25.388635] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 25.388697] Read of size 1 at addr fff00000c3fa58e8 by task kunit_try_catch/184 [ 25.388759] [ 25.388799] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.388902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.388936] Hardware name: linux,dummy-virt (DT) [ 25.388976] Call trace: [ 25.389003] show_stack+0x20/0x38 (C) [ 25.389063] dump_stack_lvl+0x8c/0xd0 [ 25.389125] print_report+0x118/0x608 [ 25.389184] kasan_report+0xdc/0x128 [ 25.389242] __asan_report_load1_noabort+0x20/0x30 [ 25.389316] kmalloc_uaf+0x300/0x338 [ 25.389401] kunit_try_run_case+0x170/0x3f0 [ 25.389461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.389531] kthread+0x328/0x630 [ 25.389582] ret_from_fork+0x10/0x20 [ 25.389639] [ 25.389662] Allocated by task 184: [ 25.389697] kasan_save_stack+0x3c/0x68 [ 25.389749] kasan_save_track+0x20/0x40 [ 25.389799] kasan_save_alloc_info+0x40/0x58 [ 25.389848] __kasan_kmalloc+0xd4/0xd8 [ 25.389896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.389943] kmalloc_uaf+0xb8/0x338 [ 25.389987] kunit_try_run_case+0x170/0x3f0 [ 25.390034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.390090] kthread+0x328/0x630 [ 25.390131] ret_from_fork+0x10/0x20 [ 25.390177] [ 25.390201] Freed by task 184: [ 25.390233] kasan_save_stack+0x3c/0x68 [ 25.390282] kasan_save_track+0x20/0x40 [ 25.390506] kasan_save_free_info+0x4c/0x78 [ 25.390630] __kasan_slab_free+0x6c/0x98 [ 25.390909] kfree+0x214/0x3c8 [ 25.391157] kmalloc_uaf+0x11c/0x338 [ 25.391288] kunit_try_run_case+0x170/0x3f0 [ 25.391402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.391513] kthread+0x328/0x630 [ 25.391591] ret_from_fork+0x10/0x20 [ 25.391689] [ 25.391810] The buggy address belongs to the object at fff00000c3fa58e0 [ 25.391810] which belongs to the cache kmalloc-16 of size 16 [ 25.392020] The buggy address is located 8 bytes inside of [ 25.392020] freed 16-byte region [fff00000c3fa58e0, fff00000c3fa58f0) [ 25.392267] [ 25.392376] The buggy address belongs to the physical page: [ 25.392470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 25.392631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.392843] page_type: f5(slab) [ 25.393083] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.393782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.393994] page dumped because: kasan: bad access detected [ 25.394384] [ 25.394506] Memory state around the buggy address: [ 25.394586] fff00000c3fa5780: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 25.394850] fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.395490] >fff00000c3fa5880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.395906] ^ [ 25.396101] fff00000c3fa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.396240] fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.396490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
Automatically assigned
[ 25.365427] ================================================================== [ 25.365548] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 25.365660] Read of size 64 at addr fff00000c7781f04 by task kunit_try_catch/182 [ 25.365780] [ 25.365849] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.366049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.366113] Hardware name: linux,dummy-virt (DT) [ 25.366187] Call trace: [ 25.366236] show_stack+0x20/0x38 (C) [ 25.366449] dump_stack_lvl+0x8c/0xd0 [ 25.366588] print_report+0x118/0x608 [ 25.366733] kasan_report+0xdc/0x128 [ 25.366868] kasan_check_range+0x100/0x1a8 [ 25.367013] __asan_memmove+0x3c/0x98 [ 25.367142] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 25.367291] kunit_try_run_case+0x170/0x3f0 [ 25.367454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.367772] kthread+0x328/0x630 [ 25.367940] ret_from_fork+0x10/0x20 [ 25.368077] [ 25.368137] Allocated by task 182: [ 25.368216] kasan_save_stack+0x3c/0x68 [ 25.368346] kasan_save_track+0x20/0x40 [ 25.368453] kasan_save_alloc_info+0x40/0x58 [ 25.368569] __kasan_kmalloc+0xd4/0xd8 [ 25.368764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.369085] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 25.369226] kunit_try_run_case+0x170/0x3f0 [ 25.369473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.369671] kthread+0x328/0x630 [ 25.369931] ret_from_fork+0x10/0x20 [ 25.370066] [ 25.370112] The buggy address belongs to the object at fff00000c7781f00 [ 25.370112] which belongs to the cache kmalloc-64 of size 64 [ 25.370253] The buggy address is located 4 bytes inside of [ 25.370253] allocated 64-byte region [fff00000c7781f00, fff00000c7781f40) [ 25.370567] [ 25.370629] The buggy address belongs to the physical page: [ 25.370717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781 [ 25.370858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.371877] page_type: f5(slab) [ 25.372150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.372231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.372283] page dumped because: kasan: bad access detected [ 25.372323] [ 25.372370] Memory state around the buggy address: [ 25.372413] fff00000c7781e00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.372470] fff00000c7781e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.372524] >fff00000c7781f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.372573] ^ [ 25.372616] fff00000c7781f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.372670] fff00000c7782000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 25.372717] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
Automatically assigned
[ 25.334947] ================================================================== [ 25.335101] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 25.335216] Read of size 18446744073709551614 at addr fff00000c7781d04 by task kunit_try_catch/180 [ 25.337120] [ 25.337212] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.337428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.337465] Hardware name: linux,dummy-virt (DT) [ 25.337509] Call trace: [ 25.337537] show_stack+0x20/0x38 (C) [ 25.337601] dump_stack_lvl+0x8c/0xd0 [ 25.337661] print_report+0x118/0x608 [ 25.337720] kasan_report+0xdc/0x128 [ 25.337776] kasan_check_range+0x100/0x1a8 [ 25.337835] __asan_memmove+0x3c/0x98 [ 25.337887] kmalloc_memmove_negative_size+0x154/0x2e0 [ 25.337948] kunit_try_run_case+0x170/0x3f0 [ 25.338009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.338298] kthread+0x328/0x630 [ 25.338412] ret_from_fork+0x10/0x20 [ 25.338612] [ 25.338674] Allocated by task 180: [ 25.339033] kasan_save_stack+0x3c/0x68 [ 25.339472] kasan_save_track+0x20/0x40 [ 25.340291] kasan_save_alloc_info+0x40/0x58 [ 25.340461] __kasan_kmalloc+0xd4/0xd8 [ 25.340588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.340687] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 25.340822] kunit_try_run_case+0x170/0x3f0 [ 25.341306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.341483] kthread+0x328/0x630 [ 25.341611] ret_from_fork+0x10/0x20 [ 25.341884] [ 25.341935] The buggy address belongs to the object at fff00000c7781d00 [ 25.341935] which belongs to the cache kmalloc-64 of size 64 [ 25.342119] The buggy address is located 4 bytes inside of [ 25.342119] 64-byte region [fff00000c7781d00, fff00000c7781d40) [ 25.342304] [ 25.343478] The buggy address belongs to the physical page: [ 25.343560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781 [ 25.343706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.343822] page_type: f5(slab) [ 25.343930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.344070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.344179] page dumped because: kasan: bad access detected [ 25.344732] [ 25.344797] Memory state around the buggy address: [ 25.345006] fff00000c7781c00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 25.345190] fff00000c7781c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.345323] >fff00000c7781d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.345455] ^ [ 25.345738] fff00000c7781d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.345931] fff00000c7781e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.346431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
Automatically assigned
[ 25.300721] ================================================================== [ 25.301050] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 25.301158] Write of size 16 at addr fff00000c6419669 by task kunit_try_catch/178 [ 25.301408] [ 25.301478] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.301672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.301735] Hardware name: linux,dummy-virt (DT) [ 25.301811] Call trace: [ 25.301860] show_stack+0x20/0x38 (C) [ 25.301971] dump_stack_lvl+0x8c/0xd0 [ 25.302085] print_report+0x118/0x608 [ 25.302195] kasan_report+0xdc/0x128 [ 25.302301] kasan_check_range+0x100/0x1a8 [ 25.302458] __asan_memset+0x34/0x78 [ 25.302637] kmalloc_oob_memset_16+0x150/0x2f8 [ 25.303084] kunit_try_run_case+0x170/0x3f0 [ 25.303550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.303921] kthread+0x328/0x630 [ 25.304543] ret_from_fork+0x10/0x20 [ 25.304804] [ 25.304855] Allocated by task 178: [ 25.305021] kasan_save_stack+0x3c/0x68 [ 25.305191] kasan_save_track+0x20/0x40 [ 25.305357] kasan_save_alloc_info+0x40/0x58 [ 25.305529] __kasan_kmalloc+0xd4/0xd8 [ 25.305758] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.305870] kmalloc_oob_memset_16+0xb0/0x2f8 [ 25.305975] kunit_try_run_case+0x170/0x3f0 [ 25.306296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.306436] kthread+0x328/0x630 [ 25.306522] ret_from_fork+0x10/0x20 [ 25.306627] [ 25.306745] The buggy address belongs to the object at fff00000c6419600 [ 25.306745] which belongs to the cache kmalloc-128 of size 128 [ 25.306984] The buggy address is located 105 bytes inside of [ 25.306984] allocated 120-byte region [fff00000c6419600, fff00000c6419678) [ 25.307291] [ 25.307363] The buggy address belongs to the physical page: [ 25.307545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.307725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.307838] page_type: f5(slab) [ 25.307933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.308053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.308146] page dumped because: kasan: bad access detected [ 25.308234] [ 25.308291] Memory state around the buggy address: [ 25.308495] fff00000c6419500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.308813] fff00000c6419580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.309118] >fff00000c6419600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.309477] ^ [ 25.309639] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.309761] fff00000c6419700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.309869] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
Automatically assigned
[ 25.266572] ================================================================== [ 25.266688] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 25.266851] Write of size 8 at addr fff00000c6419571 by task kunit_try_catch/176 [ 25.266977] [ 25.267825] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.268069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.268218] Hardware name: linux,dummy-virt (DT) [ 25.268297] Call trace: [ 25.268588] show_stack+0x20/0x38 (C) [ 25.268798] dump_stack_lvl+0x8c/0xd0 [ 25.269016] print_report+0x118/0x608 [ 25.269220] kasan_report+0xdc/0x128 [ 25.269609] kasan_check_range+0x100/0x1a8 [ 25.269909] __asan_memset+0x34/0x78 [ 25.270110] kmalloc_oob_memset_8+0x150/0x2f8 [ 25.270485] kunit_try_run_case+0x170/0x3f0 [ 25.270773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.270973] kthread+0x328/0x630 [ 25.271633] ret_from_fork+0x10/0x20 [ 25.271848] [ 25.272322] Allocated by task 176: [ 25.272420] kasan_save_stack+0x3c/0x68 [ 25.272538] kasan_save_track+0x20/0x40 [ 25.272630] kasan_save_alloc_info+0x40/0x58 [ 25.273307] __kasan_kmalloc+0xd4/0xd8 [ 25.273431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.273529] kmalloc_oob_memset_8+0xb0/0x2f8 [ 25.274339] kunit_try_run_case+0x170/0x3f0 [ 25.274636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.275446] kthread+0x328/0x630 [ 25.275541] ret_from_fork+0x10/0x20 [ 25.275647] [ 25.275701] The buggy address belongs to the object at fff00000c6419500 [ 25.275701] which belongs to the cache kmalloc-128 of size 128 [ 25.276541] The buggy address is located 113 bytes inside of [ 25.276541] allocated 120-byte region [fff00000c6419500, fff00000c6419578) [ 25.277127] [ 25.277240] The buggy address belongs to the physical page: [ 25.277428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.277556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.277692] page_type: f5(slab) [ 25.277915] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.278064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.278173] page dumped because: kasan: bad access detected [ 25.278519] [ 25.278601] Memory state around the buggy address: [ 25.278749] fff00000c6419400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.278944] fff00000c6419480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.279102] >fff00000c6419500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.279204] ^ [ 25.279473] fff00000c6419580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.279579] fff00000c6419600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.279668] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
Automatically assigned
[ 25.236037] ================================================================== [ 25.236480] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 25.236644] Write of size 4 at addr fff00000c6419475 by task kunit_try_catch/174 [ 25.236848] [ 25.238001] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.238280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.238428] Hardware name: linux,dummy-virt (DT) [ 25.238672] Call trace: [ 25.238732] show_stack+0x20/0x38 (C) [ 25.238848] dump_stack_lvl+0x8c/0xd0 [ 25.238961] print_report+0x118/0x608 [ 25.239110] kasan_report+0xdc/0x128 [ 25.239382] kasan_check_range+0x100/0x1a8 [ 25.239519] __asan_memset+0x34/0x78 [ 25.239648] kmalloc_oob_memset_4+0x150/0x300 [ 25.239868] kunit_try_run_case+0x170/0x3f0 [ 25.240867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.241245] kthread+0x328/0x630 [ 25.243379] ret_from_fork+0x10/0x20 [ 25.243459] [ 25.243483] Allocated by task 174: [ 25.243518] kasan_save_stack+0x3c/0x68 [ 25.243615] kasan_save_track+0x20/0x40 [ 25.243671] kasan_save_alloc_info+0x40/0x58 [ 25.243723] __kasan_kmalloc+0xd4/0xd8 [ 25.243769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.243821] kmalloc_oob_memset_4+0xb0/0x300 [ 25.243897] kunit_try_run_case+0x170/0x3f0 [ 25.243951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.244008] kthread+0x328/0x630 [ 25.244048] ret_from_fork+0x10/0x20 [ 25.244093] [ 25.244118] The buggy address belongs to the object at fff00000c6419400 [ 25.244118] which belongs to the cache kmalloc-128 of size 128 [ 25.244188] The buggy address is located 117 bytes inside of [ 25.244188] allocated 120-byte region [fff00000c6419400, fff00000c6419478) [ 25.244263] [ 25.244287] The buggy address belongs to the physical page: [ 25.244324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.244510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.245008] page_type: f5(slab) [ 25.245110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.245593] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.245700] page dumped because: kasan: bad access detected [ 25.245775] [ 25.245817] Memory state around the buggy address: [ 25.245899] fff00000c6419300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.246009] fff00000c6419380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.246153] >fff00000c6419400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.246260] ^ [ 25.246576] fff00000c6419480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.246745] fff00000c6419500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.247002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
Automatically assigned
[ 25.210269] ================================================================== [ 25.210432] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 25.210557] Write of size 2 at addr fff00000c6419377 by task kunit_try_catch/172 [ 25.210744] [ 25.210826] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.211341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.211432] Hardware name: linux,dummy-virt (DT) [ 25.211739] Call trace: [ 25.211854] show_stack+0x20/0x38 (C) [ 25.211974] dump_stack_lvl+0x8c/0xd0 [ 25.212099] print_report+0x118/0x608 [ 25.212383] kasan_report+0xdc/0x128 [ 25.212609] kasan_check_range+0x100/0x1a8 [ 25.212770] __asan_memset+0x34/0x78 [ 25.212885] kmalloc_oob_memset_2+0x150/0x2f8 [ 25.213016] kunit_try_run_case+0x170/0x3f0 [ 25.213230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.213473] kthread+0x328/0x630 [ 25.213598] ret_from_fork+0x10/0x20 [ 25.213788] [ 25.213860] Allocated by task 172: [ 25.214144] kasan_save_stack+0x3c/0x68 [ 25.214271] kasan_save_track+0x20/0x40 [ 25.214442] kasan_save_alloc_info+0x40/0x58 [ 25.214543] __kasan_kmalloc+0xd4/0xd8 [ 25.214649] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.214813] kmalloc_oob_memset_2+0xb0/0x2f8 [ 25.214950] kunit_try_run_case+0x170/0x3f0 [ 25.215098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.215399] kthread+0x328/0x630 [ 25.215518] ret_from_fork+0x10/0x20 [ 25.215781] [ 25.215906] The buggy address belongs to the object at fff00000c6419300 [ 25.215906] which belongs to the cache kmalloc-128 of size 128 [ 25.216106] The buggy address is located 119 bytes inside of [ 25.216106] allocated 120-byte region [fff00000c6419300, fff00000c6419378) [ 25.216275] [ 25.216534] The buggy address belongs to the physical page: [ 25.216636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.216761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.216890] page_type: f5(slab) [ 25.217093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.217220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.217379] page dumped because: kasan: bad access detected [ 25.217481] [ 25.217599] Memory state around the buggy address: [ 25.217871] fff00000c6419200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.218121] fff00000c6419280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.218364] >fff00000c6419300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.218490] ^ [ 25.218617] fff00000c6419380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.218721] fff00000c6419400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.218812] ==================================================================
Failure - kunit - lib_ratelimit_lib_ratelimit
KNOWN ISSUE - kunit/lib_ratelimit_lib_ratelimit: Failure
Automatically assigned
<8>[ 426.158368] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
Automatically assigned
[ 25.181582] ================================================================== [ 25.181704] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 25.181816] Write of size 128 at addr fff00000c6419200 by task kunit_try_catch/170 [ 25.181934] [ 25.182004] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.182202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.182351] Hardware name: linux,dummy-virt (DT) [ 25.182450] Call trace: [ 25.182514] show_stack+0x20/0x38 (C) [ 25.182652] dump_stack_lvl+0x8c/0xd0 [ 25.182881] print_report+0x118/0x608 [ 25.183046] kasan_report+0xdc/0x128 [ 25.183258] kasan_check_range+0x100/0x1a8 [ 25.183530] __asan_memset+0x34/0x78 [ 25.183784] kmalloc_oob_in_memset+0x144/0x2d0 [ 25.184152] kunit_try_run_case+0x170/0x3f0 [ 25.184314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.184474] kthread+0x328/0x630 [ 25.184589] ret_from_fork+0x10/0x20 [ 25.184764] [ 25.184906] Allocated by task 170: [ 25.185103] kasan_save_stack+0x3c/0x68 [ 25.185421] kasan_save_track+0x20/0x40 [ 25.185657] kasan_save_alloc_info+0x40/0x58 [ 25.185758] __kasan_kmalloc+0xd4/0xd8 [ 25.185846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.185944] kmalloc_oob_in_memset+0xb0/0x2d0 [ 25.186075] kunit_try_run_case+0x170/0x3f0 [ 25.186206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.186419] kthread+0x328/0x630 [ 25.186522] ret_from_fork+0x10/0x20 [ 25.186627] [ 25.187080] The buggy address belongs to the object at fff00000c6419200 [ 25.187080] which belongs to the cache kmalloc-128 of size 128 [ 25.187259] The buggy address is located 0 bytes inside of [ 25.187259] allocated 120-byte region [fff00000c6419200, fff00000c6419278) [ 25.187448] [ 25.187506] The buggy address belongs to the physical page: [ 25.187633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.187834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.187951] page_type: f5(slab) [ 25.188043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.188282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.188410] page dumped because: kasan: bad access detected [ 25.188486] [ 25.188799] Memory state around the buggy address: [ 25.188881] fff00000c6419100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.189236] fff00000c6419180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.189485] >fff00000c6419200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.189774] ^ [ 25.190131] fff00000c6419280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.190347] fff00000c6419300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.190442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
Automatically assigned
[ 25.143763] ================================================================== [ 25.143898] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 25.144007] Read of size 16 at addr fff00000c3fa58c0 by task kunit_try_catch/168 [ 25.144124] [ 25.144190] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.144428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.144510] Hardware name: linux,dummy-virt (DT) [ 25.144649] Call trace: [ 25.145824] show_stack+0x20/0x38 (C) [ 25.145967] dump_stack_lvl+0x8c/0xd0 [ 25.146105] print_report+0x118/0x608 [ 25.146275] kasan_report+0xdc/0x128 [ 25.146430] __asan_report_load16_noabort+0x20/0x30 [ 25.146769] kmalloc_uaf_16+0x3bc/0x438 [ 25.146876] kunit_try_run_case+0x170/0x3f0 [ 25.146937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.147054] kthread+0x328/0x630 [ 25.147175] ret_from_fork+0x10/0x20 [ 25.147565] [ 25.147622] Allocated by task 168: [ 25.147740] kasan_save_stack+0x3c/0x68 [ 25.147991] kasan_save_track+0x20/0x40 [ 25.148100] kasan_save_alloc_info+0x40/0x58 [ 25.148280] __kasan_kmalloc+0xd4/0xd8 [ 25.148628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.148860] kmalloc_uaf_16+0x140/0x438 [ 25.148949] kunit_try_run_case+0x170/0x3f0 [ 25.149813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.150190] kthread+0x328/0x630 [ 25.150671] ret_from_fork+0x10/0x20 [ 25.150991] [ 25.151052] Freed by task 168: [ 25.151892] kasan_save_stack+0x3c/0x68 [ 25.151954] kasan_save_track+0x20/0x40 [ 25.152027] kasan_save_free_info+0x4c/0x78 [ 25.152195] __kasan_slab_free+0x6c/0x98 [ 25.152311] kfree+0x214/0x3c8 [ 25.152419] kmalloc_uaf_16+0x190/0x438 [ 25.152516] kunit_try_run_case+0x170/0x3f0 [ 25.153342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.154079] kthread+0x328/0x630 [ 25.154414] ret_from_fork+0x10/0x20 [ 25.154547] [ 25.154602] The buggy address belongs to the object at fff00000c3fa58c0 [ 25.154602] which belongs to the cache kmalloc-16 of size 16 [ 25.155290] The buggy address is located 0 bytes inside of [ 25.155290] freed 16-byte region [fff00000c3fa58c0, fff00000c3fa58d0) [ 25.156542] [ 25.156603] The buggy address belongs to the physical page: [ 25.156752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 25.156928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.157299] page_type: f5(slab) [ 25.158271] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.158879] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.158985] page dumped because: kasan: bad access detected [ 25.159354] [ 25.159423] Memory state around the buggy address: [ 25.159521] fff00000c3fa5780: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 25.159988] fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.160743] >fff00000c3fa5880: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 25.160979] ^ [ 25.161073] fff00000c3fa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.161722] fff00000c3fa5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.161856] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
Automatically assigned
[ 25.121370] ================================================================== [ 25.121519] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 25.121695] Write of size 16 at addr fff00000c3fa5860 by task kunit_try_catch/166 [ 25.121828] [ 25.121909] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.122107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.122187] Hardware name: linux,dummy-virt (DT) [ 25.122408] Call trace: [ 25.122609] show_stack+0x20/0x38 (C) [ 25.122840] dump_stack_lvl+0x8c/0xd0 [ 25.122965] print_report+0x118/0x608 [ 25.123101] kasan_report+0xdc/0x128 [ 25.123285] __asan_report_store16_noabort+0x20/0x30 [ 25.123488] kmalloc_oob_16+0x3a0/0x3f8 [ 25.123611] kunit_try_run_case+0x170/0x3f0 [ 25.123738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.123886] kthread+0x328/0x630 [ 25.124176] ret_from_fork+0x10/0x20 [ 25.124394] [ 25.124467] Allocated by task 166: [ 25.124577] kasan_save_stack+0x3c/0x68 [ 25.124697] kasan_save_track+0x20/0x40 [ 25.124878] kasan_save_alloc_info+0x40/0x58 [ 25.125042] __kasan_kmalloc+0xd4/0xd8 [ 25.125224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.125466] kmalloc_oob_16+0xb4/0x3f8 [ 25.125628] kunit_try_run_case+0x170/0x3f0 [ 25.125890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.126174] kthread+0x328/0x630 [ 25.126261] ret_from_fork+0x10/0x20 [ 25.126400] [ 25.126538] The buggy address belongs to the object at fff00000c3fa5860 [ 25.126538] which belongs to the cache kmalloc-16 of size 16 [ 25.126723] The buggy address is located 0 bytes inside of [ 25.126723] allocated 13-byte region [fff00000c3fa5860, fff00000c3fa586d) [ 25.126966] [ 25.127077] The buggy address belongs to the physical page: [ 25.127179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 25.127881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.128100] page_type: f5(slab) [ 25.128198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.129152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.129261] page dumped because: kasan: bad access detected [ 25.129360] [ 25.129465] Memory state around the buggy address: [ 25.129559] fff00000c3fa5700: 00 05 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 25.129645] fff00000c3fa5780: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 25.129729] >fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 25.129782] ^ [ 25.129831] fff00000c3fa5880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.129883] fff00000c3fa5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.129928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
Automatically assigned
[ 24.866296] ================================================================== [ 24.866430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 24.866690] Write of size 1 at addr fff00000c19db6da by task kunit_try_catch/158 [ 24.867039] [ 24.867121] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.867349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.867435] Hardware name: linux,dummy-virt (DT) [ 24.867529] Call trace: [ 24.867589] show_stack+0x20/0x38 (C) [ 24.867926] dump_stack_lvl+0x8c/0xd0 [ 24.868096] print_report+0x118/0x608 [ 24.868313] kasan_report+0xdc/0x128 [ 24.868612] __asan_report_store1_noabort+0x20/0x30 [ 24.868773] krealloc_less_oob_helper+0xa80/0xc50 [ 24.868914] krealloc_less_oob+0x20/0x38 [ 24.869098] kunit_try_run_case+0x170/0x3f0 [ 24.869234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.869502] kthread+0x328/0x630 [ 24.869842] ret_from_fork+0x10/0x20 [ 24.870109] [ 24.870155] Allocated by task 158: [ 24.870263] kasan_save_stack+0x3c/0x68 [ 24.870434] kasan_save_track+0x20/0x40 [ 24.870530] kasan_save_alloc_info+0x40/0x58 [ 24.870632] __kasan_krealloc+0x118/0x178 [ 24.870757] krealloc_noprof+0x128/0x360 [ 24.870949] krealloc_less_oob_helper+0x168/0xc50 [ 24.871112] krealloc_less_oob+0x20/0x38 [ 24.871206] kunit_try_run_case+0x170/0x3f0 [ 24.871298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.871429] kthread+0x328/0x630 [ 24.871526] ret_from_fork+0x10/0x20 [ 24.871630] [ 24.871684] The buggy address belongs to the object at fff00000c19db600 [ 24.871684] which belongs to the cache kmalloc-256 of size 256 [ 24.871847] The buggy address is located 17 bytes to the right of [ 24.871847] allocated 201-byte region [fff00000c19db600, fff00000c19db6c9) [ 24.872112] [ 24.872240] The buggy address belongs to the physical page: [ 24.872324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.872479] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.872602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.872844] page_type: f5(slab) [ 24.873004] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.873222] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.873449] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.873574] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.873785] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.874149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.874294] page dumped because: kasan: bad access detected [ 24.874388] [ 24.874436] Memory state around the buggy address: [ 24.874544] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.874756] fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.875034] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.875272] ^ [ 24.875991] fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.876054] fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.876101] ================================================================== [ 24.877908] ================================================================== [ 24.878007] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 24.878117] Write of size 1 at addr fff00000c19db6ea by task kunit_try_catch/158 [ 24.878232] [ 24.878298] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.878525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.878589] Hardware name: linux,dummy-virt (DT) [ 24.878675] Call trace: [ 24.878814] show_stack+0x20/0x38 (C) [ 24.879095] dump_stack_lvl+0x8c/0xd0 [ 24.879270] print_report+0x118/0x608 [ 24.880087] kasan_report+0xdc/0x128 [ 24.880282] __asan_report_store1_noabort+0x20/0x30 [ 24.880420] krealloc_less_oob_helper+0xae4/0xc50 [ 24.880487] krealloc_less_oob+0x20/0x38 [ 24.880550] kunit_try_run_case+0x170/0x3f0 [ 24.881913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.882021] kthread+0x328/0x630 [ 24.882121] ret_from_fork+0x10/0x20 [ 24.882185] [ 24.882207] Allocated by task 158: [ 24.882241] kasan_save_stack+0x3c/0x68 [ 24.882291] kasan_save_track+0x20/0x40 [ 24.882370] kasan_save_alloc_info+0x40/0x58 [ 24.882651] __kasan_krealloc+0x118/0x178 [ 24.882773] krealloc_noprof+0x128/0x360 [ 24.882885] krealloc_less_oob_helper+0x168/0xc50 [ 24.883051] krealloc_less_oob+0x20/0x38 [ 24.883194] kunit_try_run_case+0x170/0x3f0 [ 24.883667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.883972] kthread+0x328/0x630 [ 24.884063] ret_from_fork+0x10/0x20 [ 24.885157] [ 24.885208] The buggy address belongs to the object at fff00000c19db600 [ 24.885208] which belongs to the cache kmalloc-256 of size 256 [ 24.885396] The buggy address is located 33 bytes to the right of [ 24.885396] allocated 201-byte region [fff00000c19db600, fff00000c19db6c9) [ 24.885633] [ 24.885690] The buggy address belongs to the physical page: [ 24.885844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.886012] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.886131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.886368] page_type: f5(slab) [ 24.886505] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.887047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.887223] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.887361] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.887483] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.888860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.889221] page dumped because: kasan: bad access detected [ 24.889312] [ 24.889901] Memory state around the buggy address: [ 24.890201] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.890361] fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.890880] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.891571] ^ [ 24.891806] fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.891949] fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.892051] ================================================================== [ 24.962550] ================================================================== [ 24.962670] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.962800] Write of size 1 at addr fff00000c64660c9 by task kunit_try_catch/162 [ 24.962920] [ 24.962998] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.963194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.963259] Hardware name: linux,dummy-virt (DT) [ 24.963458] Call trace: [ 24.963518] show_stack+0x20/0x38 (C) [ 24.963644] dump_stack_lvl+0x8c/0xd0 [ 24.963772] print_report+0x118/0x608 [ 24.964988] kasan_report+0xdc/0x128 [ 24.966028] __asan_report_store1_noabort+0x20/0x30 [ 24.966440] krealloc_less_oob_helper+0xa48/0xc50 [ 24.966654] krealloc_large_less_oob+0x20/0x38 [ 24.966855] kunit_try_run_case+0x170/0x3f0 [ 24.966996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.967225] kthread+0x328/0x630 [ 24.967369] ret_from_fork+0x10/0x20 [ 24.967496] [ 24.967548] The buggy address belongs to the physical page: [ 24.967634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 24.967862] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.967989] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.968142] page_type: f8(unknown) [ 24.968244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.968400] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.968818] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.969065] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.969311] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff [ 24.969521] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.969852] page dumped because: kasan: bad access detected [ 24.969970] [ 24.970020] Memory state around the buggy address: [ 24.970092] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.970201] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.970433] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.970528] ^ [ 24.970647] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.970750] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.970890] ================================================================== [ 24.852732] ================================================================== [ 24.852843] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.852964] Write of size 1 at addr fff00000c19db6d0 by task kunit_try_catch/158 [ 24.853092] [ 24.853162] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.853549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.853660] Hardware name: linux,dummy-virt (DT) [ 24.853772] Call trace: [ 24.853899] show_stack+0x20/0x38 (C) [ 24.854037] dump_stack_lvl+0x8c/0xd0 [ 24.854346] print_report+0x118/0x608 [ 24.854482] kasan_report+0xdc/0x128 [ 24.854598] __asan_report_store1_noabort+0x20/0x30 [ 24.854747] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.854873] krealloc_less_oob+0x20/0x38 [ 24.854992] kunit_try_run_case+0x170/0x3f0 [ 24.855116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.855246] kthread+0x328/0x630 [ 24.855369] ret_from_fork+0x10/0x20 [ 24.855485] [ 24.855528] Allocated by task 158: [ 24.855592] kasan_save_stack+0x3c/0x68 [ 24.855686] kasan_save_track+0x20/0x40 [ 24.855774] kasan_save_alloc_info+0x40/0x58 [ 24.856958] __kasan_krealloc+0x118/0x178 [ 24.857079] krealloc_noprof+0x128/0x360 [ 24.857297] krealloc_less_oob_helper+0x168/0xc50 [ 24.857572] krealloc_less_oob+0x20/0x38 [ 24.857666] kunit_try_run_case+0x170/0x3f0 [ 24.858673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.858792] kthread+0x328/0x630 [ 24.858874] ret_from_fork+0x10/0x20 [ 24.859700] [ 24.859784] The buggy address belongs to the object at fff00000c19db600 [ 24.859784] which belongs to the cache kmalloc-256 of size 256 [ 24.860097] The buggy address is located 7 bytes to the right of [ 24.860097] allocated 201-byte region [fff00000c19db600, fff00000c19db6c9) [ 24.860274] [ 24.860742] The buggy address belongs to the physical page: [ 24.860964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.861270] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.861413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.861535] page_type: f5(slab) [ 24.861619] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.861737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.861878] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.862155] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.862737] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.862867] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.862978] page dumped because: kasan: bad access detected [ 24.863237] [ 24.863310] Memory state around the buggy address: [ 24.863413] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.863694] fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.863975] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.864124] ^ [ 24.864358] fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864471] fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864570] ================================================================== [ 24.986286] ================================================================== [ 24.986398] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 24.986503] Write of size 1 at addr fff00000c64660da by task kunit_try_catch/162 [ 24.986650] [ 24.986720] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.986914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.986978] Hardware name: linux,dummy-virt (DT) [ 24.987049] Call trace: [ 24.987096] show_stack+0x20/0x38 (C) [ 24.987209] dump_stack_lvl+0x8c/0xd0 [ 24.987345] print_report+0x118/0x608 [ 24.987485] kasan_report+0xdc/0x128 [ 24.987619] __asan_report_store1_noabort+0x20/0x30 [ 24.987849] krealloc_less_oob_helper+0xa80/0xc50 [ 24.988002] krealloc_large_less_oob+0x20/0x38 [ 24.988143] kunit_try_run_case+0x170/0x3f0 [ 24.988315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.988505] kthread+0x328/0x630 [ 24.988619] ret_from_fork+0x10/0x20 [ 24.988743] [ 24.988789] The buggy address belongs to the physical page: [ 24.988879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 24.989150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.989566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.989709] page_type: f8(unknown) [ 24.989801] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.989920] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.990309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.991720] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.991937] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff [ 24.992134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.992684] page dumped because: kasan: bad access detected [ 24.992795] [ 24.992941] Memory state around the buggy address: [ 24.993053] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.993287] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.993418] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.993926] ^ [ 24.994074] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.994624] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.995105] ================================================================== [ 24.838742] ================================================================== [ 24.838856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.838965] Write of size 1 at addr fff00000c19db6c9 by task kunit_try_catch/158 [ 24.839080] [ 24.839145] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.839362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.839430] Hardware name: linux,dummy-virt (DT) [ 24.839507] Call trace: [ 24.839557] show_stack+0x20/0x38 (C) [ 24.839670] dump_stack_lvl+0x8c/0xd0 [ 24.839797] print_report+0x118/0x608 [ 24.839996] kasan_report+0xdc/0x128 [ 24.840186] __asan_report_store1_noabort+0x20/0x30 [ 24.840347] krealloc_less_oob_helper+0xa48/0xc50 [ 24.840491] krealloc_less_oob+0x20/0x38 [ 24.841432] kunit_try_run_case+0x170/0x3f0 [ 24.841723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.841875] kthread+0x328/0x630 [ 24.842207] ret_from_fork+0x10/0x20 [ 24.842349] [ 24.842396] Allocated by task 158: [ 24.842463] kasan_save_stack+0x3c/0x68 [ 24.842559] kasan_save_track+0x20/0x40 [ 24.842668] kasan_save_alloc_info+0x40/0x58 [ 24.842785] __kasan_krealloc+0x118/0x178 [ 24.843122] krealloc_noprof+0x128/0x360 [ 24.843508] krealloc_less_oob_helper+0x168/0xc50 [ 24.843806] krealloc_less_oob+0x20/0x38 [ 24.844009] kunit_try_run_case+0x170/0x3f0 [ 24.844569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.844688] kthread+0x328/0x630 [ 24.845039] ret_from_fork+0x10/0x20 [ 24.845146] [ 24.845257] The buggy address belongs to the object at fff00000c19db600 [ 24.845257] which belongs to the cache kmalloc-256 of size 256 [ 24.845463] The buggy address is located 0 bytes to the right of [ 24.845463] allocated 201-byte region [fff00000c19db600, fff00000c19db6c9) [ 24.845638] [ 24.845684] The buggy address belongs to the physical page: [ 24.845755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.846203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.846364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.846497] page_type: f5(slab) [ 24.846585] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.846703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.847722] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.848434] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.848784] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.848995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.849102] page dumped because: kasan: bad access detected [ 24.849182] [ 24.849239] Memory state around the buggy address: [ 24.849361] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.849507] fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.849801] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.849898] ^ [ 24.850014] fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.850131] fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.850300] ================================================================== [ 24.972671] ================================================================== [ 24.972777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.972880] Write of size 1 at addr fff00000c64660d0 by task kunit_try_catch/162 [ 24.972997] [ 24.973058] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.973251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.973347] Hardware name: linux,dummy-virt (DT) [ 24.973426] Call trace: [ 24.975969] show_stack+0x20/0x38 (C) [ 24.976633] dump_stack_lvl+0x8c/0xd0 [ 24.976758] print_report+0x118/0x608 [ 24.978105] kasan_report+0xdc/0x128 [ 24.978399] __asan_report_store1_noabort+0x20/0x30 [ 24.979302] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.980056] krealloc_large_less_oob+0x20/0x38 [ 24.980209] kunit_try_run_case+0x170/0x3f0 [ 24.980763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.981024] kthread+0x328/0x630 [ 24.981720] ret_from_fork+0x10/0x20 [ 24.981904] [ 24.981962] The buggy address belongs to the physical page: [ 24.982135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 24.982267] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.982402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.982524] page_type: f8(unknown) [ 24.982613] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.982729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.982845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.982962] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.983083] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff [ 24.983226] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.983426] page dumped because: kasan: bad access detected [ 24.983509] [ 24.983553] Memory state around the buggy address: [ 24.983629] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.983925] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.984074] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.984204] ^ [ 24.984311] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.984452] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.984555] ================================================================== [ 24.893423] ================================================================== [ 24.893519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 24.893625] Write of size 1 at addr fff00000c19db6eb by task kunit_try_catch/158 [ 24.893740] [ 24.893804] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.894001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.894064] Hardware name: linux,dummy-virt (DT) [ 24.894137] Call trace: [ 24.894186] show_stack+0x20/0x38 (C) [ 24.894295] dump_stack_lvl+0x8c/0xd0 [ 24.894449] print_report+0x118/0x608 [ 24.895288] kasan_report+0xdc/0x128 [ 24.895536] __asan_report_store1_noabort+0x20/0x30 [ 24.895781] krealloc_less_oob_helper+0xa58/0xc50 [ 24.895994] krealloc_less_oob+0x20/0x38 [ 24.896078] kunit_try_run_case+0x170/0x3f0 [ 24.896139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.896251] kthread+0x328/0x630 [ 24.896324] ret_from_fork+0x10/0x20 [ 24.896561] [ 24.896753] Allocated by task 158: [ 24.896988] kasan_save_stack+0x3c/0x68 [ 24.897087] kasan_save_track+0x20/0x40 [ 24.897191] kasan_save_alloc_info+0x40/0x58 [ 24.897308] __kasan_krealloc+0x118/0x178 [ 24.897424] krealloc_noprof+0x128/0x360 [ 24.899170] krealloc_less_oob_helper+0x168/0xc50 [ 24.900042] krealloc_less_oob+0x20/0x38 [ 24.900165] kunit_try_run_case+0x170/0x3f0 [ 24.900316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.900450] kthread+0x328/0x630 [ 24.900532] ret_from_fork+0x10/0x20 [ 24.900698] [ 24.900776] The buggy address belongs to the object at fff00000c19db600 [ 24.900776] which belongs to the cache kmalloc-256 of size 256 [ 24.900915] The buggy address is located 34 bytes to the right of [ 24.900915] allocated 201-byte region [fff00000c19db600, fff00000c19db6c9) [ 24.901068] [ 24.901143] The buggy address belongs to the physical page: [ 24.901217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.901367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.901512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.901659] page_type: f5(slab) [ 24.901768] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.901887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.902003] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.902118] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.902239] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.903220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.903352] page dumped because: kasan: bad access detected [ 24.903689] [ 24.903804] Memory state around the buggy address: [ 24.904309] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.904473] fff00000c19db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.905077] >fff00000c19db680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.905555] ^ [ 24.906073] fff00000c19db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.906224] fff00000c19db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.906646] ================================================================== [ 25.003005] ================================================================== [ 25.003228] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.003350] Write of size 1 at addr fff00000c64660ea by task kunit_try_catch/162 [ 25.003472] [ 25.003538] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.003728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.003790] Hardware name: linux,dummy-virt (DT) [ 25.003877] Call trace: [ 25.003927] show_stack+0x20/0x38 (C) [ 25.004042] dump_stack_lvl+0x8c/0xd0 [ 25.004153] print_report+0x118/0x608 [ 25.004264] kasan_report+0xdc/0x128 [ 25.010235] __asan_report_store1_noabort+0x20/0x30 [ 25.010641] krealloc_less_oob_helper+0xae4/0xc50 [ 25.013160] krealloc_large_less_oob+0x20/0x38 [ 25.013298] kunit_try_run_case+0x170/0x3f0 [ 25.013445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.016934] kthread+0x328/0x630 [ 25.018151] ret_from_fork+0x10/0x20 [ 25.018280] [ 25.018346] The buggy address belongs to the physical page: [ 25.018421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 25.018544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.018655] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.018781] page_type: f8(unknown) [ 25.018871] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.022446] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.022581] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.022720] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.022852] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff [ 25.022927] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.022979] page dumped because: kasan: bad access detected [ 25.023019] [ 25.023041] Memory state around the buggy address: [ 25.023079] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.023133] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.023184] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.023231] ^ [ 25.023279] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.023358] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.023457] ================================================================== [ 25.024883] ================================================================== [ 25.025012] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.025213] Write of size 1 at addr fff00000c64660eb by task kunit_try_catch/162 [ 25.025442] [ 25.025663] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.026023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.026098] Hardware name: linux,dummy-virt (DT) [ 25.026313] Call trace: [ 25.026390] show_stack+0x20/0x38 (C) [ 25.026663] dump_stack_lvl+0x8c/0xd0 [ 25.027000] print_report+0x118/0x608 [ 25.027502] kasan_report+0xdc/0x128 [ 25.027622] __asan_report_store1_noabort+0x20/0x30 [ 25.027745] krealloc_less_oob_helper+0xa58/0xc50 [ 25.027879] krealloc_large_less_oob+0x20/0x38 [ 25.027999] kunit_try_run_case+0x170/0x3f0 [ 25.028115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.028241] kthread+0x328/0x630 [ 25.028359] ret_from_fork+0x10/0x20 [ 25.028475] [ 25.028520] The buggy address belongs to the physical page: [ 25.028589] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464 [ 25.028709] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.028819] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.028935] page_type: f8(unknown) [ 25.029022] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.029139] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.029254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.031435] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.031881] head: 0bfffe0000000002 ffffc1ffc3191901 00000000ffffffff 00000000ffffffff [ 25.032195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.032719] page dumped because: kasan: bad access detected [ 25.032833] [ 25.033137] Memory state around the buggy address: [ 25.033452] fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.033618] fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.033725] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.034319] ^ [ 25.034653] fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.035048] fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.035368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
Automatically assigned
[ 24.947072] ================================================================== [ 24.947177] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.947473] Write of size 1 at addr fff00000c77d60f0 by task kunit_try_catch/160 [ 24.947646] [ 24.947719] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.947915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.947990] Hardware name: linux,dummy-virt (DT) [ 24.948123] Call trace: [ 24.948232] show_stack+0x20/0x38 (C) [ 24.948402] dump_stack_lvl+0x8c/0xd0 [ 24.948541] print_report+0x118/0x608 [ 24.948692] kasan_report+0xdc/0x128 [ 24.948902] __asan_report_store1_noabort+0x20/0x30 [ 24.949117] krealloc_more_oob_helper+0x5c0/0x678 [ 24.949350] krealloc_large_more_oob+0x20/0x38 [ 24.949550] kunit_try_run_case+0x170/0x3f0 [ 24.949675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.949808] kthread+0x328/0x630 [ 24.949910] ret_from_fork+0x10/0x20 [ 24.950028] [ 24.950080] The buggy address belongs to the physical page: [ 24.950156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d4 [ 24.950281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.950433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.950622] page_type: f8(unknown) [ 24.950762] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.950937] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.951284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.951542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.951664] head: 0bfffe0000000002 ffffc1ffc31df501 00000000ffffffff 00000000ffffffff [ 24.951957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.952062] page dumped because: kasan: bad access detected [ 24.952138] [ 24.952185] Memory state around the buggy address: [ 24.952259] fff00000c77d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.952381] fff00000c77d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.952494] >fff00000c77d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.952753] ^ [ 24.952852] fff00000c77d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.952955] fff00000c77d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.953080] ================================================================== [ 24.812431] ================================================================== [ 24.812528] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.812635] Write of size 1 at addr fff00000c19db4f0 by task kunit_try_catch/156 [ 24.812757] [ 24.812826] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.813018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.813080] Hardware name: linux,dummy-virt (DT) [ 24.813151] Call trace: [ 24.813198] show_stack+0x20/0x38 (C) [ 24.813320] dump_stack_lvl+0x8c/0xd0 [ 24.813454] print_report+0x118/0x608 [ 24.813565] kasan_report+0xdc/0x128 [ 24.813691] __asan_report_store1_noabort+0x20/0x30 [ 24.813813] krealloc_more_oob_helper+0x5c0/0x678 [ 24.813937] krealloc_more_oob+0x20/0x38 [ 24.814048] kunit_try_run_case+0x170/0x3f0 [ 24.814159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.814284] kthread+0x328/0x630 [ 24.814410] ret_from_fork+0x10/0x20 [ 24.814544] [ 24.814783] Allocated by task 156: [ 24.815135] kasan_save_stack+0x3c/0x68 [ 24.815255] kasan_save_track+0x20/0x40 [ 24.815448] kasan_save_alloc_info+0x40/0x58 [ 24.815853] __kasan_krealloc+0x118/0x178 [ 24.815973] krealloc_noprof+0x128/0x360 [ 24.816082] krealloc_more_oob_helper+0x168/0x678 [ 24.816198] krealloc_more_oob+0x20/0x38 [ 24.816402] kunit_try_run_case+0x170/0x3f0 [ 24.816677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.816935] kthread+0x328/0x630 [ 24.817070] ret_from_fork+0x10/0x20 [ 24.817349] [ 24.817454] The buggy address belongs to the object at fff00000c19db400 [ 24.817454] which belongs to the cache kmalloc-256 of size 256 [ 24.817637] The buggy address is located 5 bytes to the right of [ 24.817637] allocated 235-byte region [fff00000c19db400, fff00000c19db4eb) [ 24.817800] [ 24.817860] The buggy address belongs to the physical page: [ 24.818073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.818201] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.818320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.818525] page_type: f5(slab) [ 24.818634] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.818773] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.818984] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.819999] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.820231] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.820695] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.820798] page dumped because: kasan: bad access detected [ 24.822020] [ 24.822358] Memory state around the buggy address: [ 24.822455] fff00000c19db380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.822561] fff00000c19db400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.823874] >fff00000c19db480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.823994] ^ [ 24.824092] fff00000c19db500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.824150] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.824199] ================================================================== [ 24.797947] ================================================================== [ 24.798154] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.798420] Write of size 1 at addr fff00000c19db4eb by task kunit_try_catch/156 [ 24.798683] [ 24.798800] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.799122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.799198] Hardware name: linux,dummy-virt (DT) [ 24.799388] Call trace: [ 24.799532] show_stack+0x20/0x38 (C) [ 24.799661] dump_stack_lvl+0x8c/0xd0 [ 24.799784] print_report+0x118/0x608 [ 24.800053] kasan_report+0xdc/0x128 [ 24.800202] __asan_report_store1_noabort+0x20/0x30 [ 24.800678] krealloc_more_oob_helper+0x60c/0x678 [ 24.800828] krealloc_more_oob+0x20/0x38 [ 24.800981] kunit_try_run_case+0x170/0x3f0 [ 24.801211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.801378] kthread+0x328/0x630 [ 24.801530] ret_from_fork+0x10/0x20 [ 24.801751] [ 24.801845] Allocated by task 156: [ 24.801914] kasan_save_stack+0x3c/0x68 [ 24.802044] kasan_save_track+0x20/0x40 [ 24.802319] kasan_save_alloc_info+0x40/0x58 [ 24.802961] __kasan_krealloc+0x118/0x178 [ 24.803097] krealloc_noprof+0x128/0x360 [ 24.803204] krealloc_more_oob_helper+0x168/0x678 [ 24.803397] krealloc_more_oob+0x20/0x38 [ 24.803503] kunit_try_run_case+0x170/0x3f0 [ 24.803599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.803721] kthread+0x328/0x630 [ 24.804026] ret_from_fork+0x10/0x20 [ 24.804359] [ 24.804535] The buggy address belongs to the object at fff00000c19db400 [ 24.804535] which belongs to the cache kmalloc-256 of size 256 [ 24.804795] The buggy address is located 0 bytes to the right of [ 24.804795] allocated 235-byte region [fff00000c19db400, fff00000c19db4eb) [ 24.805045] [ 24.805115] The buggy address belongs to the physical page: [ 24.805197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019da [ 24.805641] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.805928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.806320] page_type: f5(slab) [ 24.806429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.807627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.808087] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.808272] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.808443] head: 0bfffe0000000001 ffffc1ffc3067681 00000000ffffffff 00000000ffffffff [ 24.808566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.808722] page dumped because: kasan: bad access detected [ 24.808888] [ 24.808933] Memory state around the buggy address: [ 24.809068] fff00000c19db380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.809398] fff00000c19db400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.809583] >fff00000c19db480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 24.809708] ^ [ 24.809978] fff00000c19db500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.810084] fff00000c19db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.810176] ================================================================== [ 24.935095] ================================================================== [ 24.935221] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.935372] Write of size 1 at addr fff00000c77d60eb by task kunit_try_catch/160 [ 24.935872] [ 24.936109] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.936365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.936439] Hardware name: linux,dummy-virt (DT) [ 24.936910] Call trace: [ 24.937165] show_stack+0x20/0x38 (C) [ 24.937315] dump_stack_lvl+0x8c/0xd0 [ 24.937676] print_report+0x118/0x608 [ 24.937964] kasan_report+0xdc/0x128 [ 24.938131] __asan_report_store1_noabort+0x20/0x30 [ 24.938488] krealloc_more_oob_helper+0x60c/0x678 [ 24.938803] krealloc_large_more_oob+0x20/0x38 [ 24.938971] kunit_try_run_case+0x170/0x3f0 [ 24.939093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.939232] kthread+0x328/0x630 [ 24.939476] ret_from_fork+0x10/0x20 [ 24.940430] [ 24.940502] The buggy address belongs to the physical page: [ 24.940581] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d4 [ 24.940715] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.940829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.940958] page_type: f8(unknown) [ 24.941075] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.941527] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.941761] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.942174] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.942324] head: 0bfffe0000000002 ffffc1ffc31df501 00000000ffffffff 00000000ffffffff [ 24.942472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.942694] page dumped because: kasan: bad access detected [ 24.942778] [ 24.943250] Memory state around the buggy address: [ 24.943541] fff00000c77d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.943747] fff00000c77d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.943926] >fff00000c77d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.944291] ^ [ 24.944461] fff00000c77d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.944819] fff00000c77d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.945479] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
Automatically assigned
[ 24.759347] ================================================================== [ 24.759470] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 24.759593] Read of size 1 at addr fff00000c7800000 by task kunit_try_catch/154 [ 24.759728] [ 24.759805] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.760049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.760125] Hardware name: linux,dummy-virt (DT) [ 24.760209] Call trace: [ 24.760268] show_stack+0x20/0x38 (C) [ 24.760427] dump_stack_lvl+0x8c/0xd0 [ 24.760603] print_report+0x118/0x608 [ 24.761310] kasan_report+0xdc/0x128 [ 24.761468] __asan_report_load1_noabort+0x20/0x30 [ 24.761617] page_alloc_uaf+0x328/0x350 [ 24.761744] kunit_try_run_case+0x170/0x3f0 [ 24.761884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.762186] kthread+0x328/0x630 [ 24.762305] ret_from_fork+0x10/0x20 [ 24.762445] [ 24.762516] The buggy address belongs to the physical page: [ 24.762600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 24.762737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.762868] page_type: f0(buddy) [ 24.763054] raw: 0bfffe0000000000 fff00000ff616310 fff00000ff616310 0000000000000000 [ 24.763360] raw: 0000000000000000 000000000000000a 00000000f0000000 0000000000000000 [ 24.763533] page dumped because: kasan: bad access detected [ 24.763659] [ 24.763738] Memory state around the buggy address: [ 24.763816] fff00000c77fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763934] fff00000c77fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.764057] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.764161] ^ [ 24.764238] fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.764395] fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.764490] ==================================================================
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
KNOWN ISSUE - kunit/lib_ratelimit_test_ratelimit_smoke: Failure
Automatically assigned
<8>[ 425.801619] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
Automatically assigned
[ 24.726440] ================================================================== [ 24.726607] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 24.726734] Free of addr fff00000c77d4001 by task kunit_try_catch/150 [ 24.726840] [ 24.726909] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.727316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.727422] Hardware name: linux,dummy-virt (DT) [ 24.727522] Call trace: [ 24.727554] show_stack+0x20/0x38 (C) [ 24.727618] dump_stack_lvl+0x8c/0xd0 [ 24.727680] print_report+0x118/0x608 [ 24.727737] kasan_report_invalid_free+0xc0/0xe8 [ 24.727798] __kasan_kfree_large+0x5c/0xa8 [ 24.728080] free_large_kmalloc+0x64/0x190 [ 24.728224] kfree+0x270/0x3c8 [ 24.728850] kmalloc_large_invalid_free+0x108/0x270 [ 24.729085] kunit_try_run_case+0x170/0x3f0 [ 24.729223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.729383] kthread+0x328/0x630 [ 24.729488] ret_from_fork+0x10/0x20 [ 24.729600] [ 24.729649] The buggy address belongs to the physical page: [ 24.731118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d4 [ 24.731890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.732271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.732432] page_type: f8(unknown) [ 24.732529] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.732706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.733287] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.733590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.733713] head: 0bfffe0000000002 ffffc1ffc31df501 00000000ffffffff 00000000ffffffff [ 24.733836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.734015] page dumped because: kasan: bad access detected [ 24.734113] [ 24.734272] Memory state around the buggy address: [ 24.734372] fff00000c77d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.734483] fff00000c77d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.735407] >fff00000c77d4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.735596] ^ [ 24.735693] fff00000c77d4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.735897] fff00000c77d4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.736012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
Automatically assigned
[ 24.705752] ================================================================== [ 24.705880] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 24.705984] Read of size 1 at addr fff00000c77d0000 by task kunit_try_catch/148 [ 24.706096] [ 24.706161] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.706377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.706443] Hardware name: linux,dummy-virt (DT) [ 24.706518] Call trace: [ 24.706569] show_stack+0x20/0x38 (C) [ 24.706681] dump_stack_lvl+0x8c/0xd0 [ 24.706793] print_report+0x118/0x608 [ 24.706901] kasan_report+0xdc/0x128 [ 24.707011] __asan_report_load1_noabort+0x20/0x30 [ 24.707144] kmalloc_large_uaf+0x2cc/0x2f8 [ 24.707362] kunit_try_run_case+0x170/0x3f0 [ 24.707866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.708022] kthread+0x328/0x630 [ 24.708143] ret_from_fork+0x10/0x20 [ 24.708273] [ 24.708495] The buggy address belongs to the physical page: [ 24.708609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d0 [ 24.708731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.708874] raw: 0bfffe0000000000 ffffc1ffc31df508 fff00000da46ac40 0000000000000000 [ 24.709053] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 24.709369] page dumped because: kasan: bad access detected [ 24.709477] [ 24.709522] Memory state around the buggy address: [ 24.709595] fff00000c77cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.709720] fff00000c77cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.709826] >fff00000c77d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.709996] ^ [ 24.710115] fff00000c77d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.710311] fff00000c77d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.710427] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
Automatically assigned
[ 24.682276] ================================================================== [ 24.682533] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 24.682652] Write of size 1 at addr fff00000c77d200a by task kunit_try_catch/146 [ 24.682786] [ 24.682863] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.683065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.683129] Hardware name: linux,dummy-virt (DT) [ 24.683200] Call trace: [ 24.683249] show_stack+0x20/0x38 (C) [ 24.683382] dump_stack_lvl+0x8c/0xd0 [ 24.683503] print_report+0x118/0x608 [ 24.683611] kasan_report+0xdc/0x128 [ 24.683717] __asan_report_store1_noabort+0x20/0x30 [ 24.683954] kmalloc_large_oob_right+0x278/0x2b8 [ 24.684379] kunit_try_run_case+0x170/0x3f0 [ 24.684532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.684852] kthread+0x328/0x630 [ 24.684959] ret_from_fork+0x10/0x20 [ 24.685075] [ 24.685145] The buggy address belongs to the physical page: [ 24.685265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d0 [ 24.685502] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.685846] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.685998] page_type: f8(unknown) [ 24.686105] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.686240] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.686392] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.686577] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.686766] head: 0bfffe0000000002 ffffc1ffc31df401 00000000ffffffff 00000000ffffffff [ 24.686895] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.687013] page dumped because: kasan: bad access detected [ 24.687103] [ 24.687870] Memory state around the buggy address: [ 24.688045] fff00000c77d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.688271] fff00000c77d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.688393] >fff00000c77d2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.688489] ^ [ 24.688565] fff00000c77d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.688670] fff00000c77d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.688776] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
Automatically assigned
[ 24.657423] ================================================================== [ 24.657553] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.657674] Write of size 1 at addr fff00000c77e9f00 by task kunit_try_catch/144 [ 24.657789] [ 24.657862] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.658059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.658124] Hardware name: linux,dummy-virt (DT) [ 24.658211] Call trace: [ 24.658843] show_stack+0x20/0x38 (C) [ 24.659321] dump_stack_lvl+0x8c/0xd0 [ 24.660011] print_report+0x118/0x608 [ 24.660246] kasan_report+0xdc/0x128 [ 24.660424] __asan_report_store1_noabort+0x20/0x30 [ 24.660552] kmalloc_big_oob_right+0x2a4/0x2f0 [ 24.660676] kunit_try_run_case+0x170/0x3f0 [ 24.660804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.660936] kthread+0x328/0x630 [ 24.661056] ret_from_fork+0x10/0x20 [ 24.661499] [ 24.661603] Allocated by task 144: [ 24.661837] kasan_save_stack+0x3c/0x68 [ 24.661943] kasan_save_track+0x20/0x40 [ 24.662043] kasan_save_alloc_info+0x40/0x58 [ 24.662323] __kasan_kmalloc+0xd4/0xd8 [ 24.662480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.662644] kmalloc_big_oob_right+0xb8/0x2f0 [ 24.662838] kunit_try_run_case+0x170/0x3f0 [ 24.663054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.663167] kthread+0x328/0x630 [ 24.663248] ret_from_fork+0x10/0x20 [ 24.663354] [ 24.663401] The buggy address belongs to the object at fff00000c77e8000 [ 24.663401] which belongs to the cache kmalloc-8k of size 8192 [ 24.663955] The buggy address is located 0 bytes to the right of [ 24.663955] allocated 7936-byte region [fff00000c77e8000, fff00000c77e9f00) [ 24.664306] [ 24.664374] The buggy address belongs to the physical page: [ 24.664456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 24.664592] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.664709] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.664836] page_type: f5(slab) [ 24.665434] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.665624] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.665749] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 24.665866] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 24.665985] head: 0bfffe0000000003 ffffc1ffc31dfa01 00000000ffffffff 00000000ffffffff [ 24.666132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 24.666600] page dumped because: kasan: bad access detected [ 24.666726] [ 24.666803] Memory state around the buggy address: [ 24.666882] fff00000c77e9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.667029] fff00000c77e9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.667203] >fff00000c77e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667503] ^ [ 24.667759] fff00000c77e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667963] fff00000c77ea000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.668061] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
Automatically assigned
[ 24.618366] ================================================================== [ 24.618582] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 24.618710] Write of size 1 at addr fff00000c703a578 by task kunit_try_catch/142 [ 24.618992] [ 24.619079] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.619647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.620113] Hardware name: linux,dummy-virt (DT) [ 24.620423] Call trace: [ 24.620486] show_stack+0x20/0x38 (C) [ 24.620663] dump_stack_lvl+0x8c/0xd0 [ 24.620838] print_report+0x118/0x608 [ 24.620973] kasan_report+0xdc/0x128 [ 24.621088] __asan_report_store1_noabort+0x20/0x30 [ 24.621205] kmalloc_track_caller_oob_right+0x418/0x488 [ 24.621402] kunit_try_run_case+0x170/0x3f0 [ 24.621526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.621689] kthread+0x328/0x630 [ 24.621806] ret_from_fork+0x10/0x20 [ 24.621932] [ 24.621979] Allocated by task 142: [ 24.622065] kasan_save_stack+0x3c/0x68 [ 24.622195] kasan_save_track+0x20/0x40 [ 24.622291] kasan_save_alloc_info+0x40/0x58 [ 24.622674] __kasan_kmalloc+0xd4/0xd8 [ 24.622844] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 24.623314] kmalloc_track_caller_oob_right+0x184/0x488 [ 24.623734] kunit_try_run_case+0x170/0x3f0 [ 24.623974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.624385] kthread+0x328/0x630 [ 24.624686] ret_from_fork+0x10/0x20 [ 24.625072] [ 24.625144] The buggy address belongs to the object at fff00000c703a500 [ 24.625144] which belongs to the cache kmalloc-128 of size 128 [ 24.625292] The buggy address is located 0 bytes to the right of [ 24.625292] allocated 120-byte region [fff00000c703a500, fff00000c703a578) [ 24.626409] [ 24.627290] The buggy address belongs to the physical page: [ 24.627405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a [ 24.627788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.628134] page_type: f5(slab) [ 24.628508] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.628639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.629201] page dumped because: kasan: bad access detected [ 24.629365] [ 24.629461] Memory state around the buggy address: [ 24.629539] fff00000c703a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.629642] fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.629744] >fff00000c703a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.629848] ^ [ 24.629981] fff00000c703a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.630104] fff00000c703a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.630204] ================================================================== [ 24.601930] ================================================================== [ 24.602243] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 24.602474] Write of size 1 at addr fff00000c703a478 by task kunit_try_catch/142 [ 24.602696] [ 24.602769] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.602972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.603153] Hardware name: linux,dummy-virt (DT) [ 24.603232] Call trace: [ 24.603282] show_stack+0x20/0x38 (C) [ 24.603420] dump_stack_lvl+0x8c/0xd0 [ 24.603696] print_report+0x118/0x608 [ 24.603924] kasan_report+0xdc/0x128 [ 24.604591] __asan_report_store1_noabort+0x20/0x30 [ 24.604763] kmalloc_track_caller_oob_right+0x40c/0x488 [ 24.605022] kunit_try_run_case+0x170/0x3f0 [ 24.606039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.607257] kthread+0x328/0x630 [ 24.608168] ret_from_fork+0x10/0x20 [ 24.608504] [ 24.608551] Allocated by task 142: [ 24.608662] kasan_save_stack+0x3c/0x68 [ 24.608767] kasan_save_track+0x20/0x40 [ 24.608862] kasan_save_alloc_info+0x40/0x58 [ 24.609147] __kasan_kmalloc+0xd4/0xd8 [ 24.609323] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 24.609453] kmalloc_track_caller_oob_right+0xa8/0x488 [ 24.609608] kunit_try_run_case+0x170/0x3f0 [ 24.609715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.609939] kthread+0x328/0x630 [ 24.610050] ret_from_fork+0x10/0x20 [ 24.610238] [ 24.610293] The buggy address belongs to the object at fff00000c703a400 [ 24.610293] which belongs to the cache kmalloc-128 of size 128 [ 24.610473] The buggy address is located 0 bytes to the right of [ 24.610473] allocated 120-byte region [fff00000c703a400, fff00000c703a478) [ 24.610643] [ 24.610699] The buggy address belongs to the physical page: [ 24.611268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a [ 24.611416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.611534] page_type: f5(slab) [ 24.611767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.611951] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.612163] page dumped because: kasan: bad access detected [ 24.612243] [ 24.612292] Memory state around the buggy address: [ 24.612388] fff00000c703a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.612507] fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.612786] >fff00000c703a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.612885] ^ [ 24.613239] fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.613604] fff00000c703a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.613872] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
Automatically assigned
[ 24.574184] ================================================================== [ 24.574313] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 24.574445] Read of size 1 at addr fff00000c6447000 by task kunit_try_catch/140 [ 24.574560] [ 24.574624] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.574817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.574900] Hardware name: linux,dummy-virt (DT) [ 24.574993] Call trace: [ 24.575209] show_stack+0x20/0x38 (C) [ 24.575402] dump_stack_lvl+0x8c/0xd0 [ 24.575545] print_report+0x118/0x608 [ 24.575872] kasan_report+0xdc/0x128 [ 24.576073] __asan_report_load1_noabort+0x20/0x30 [ 24.576236] kmalloc_node_oob_right+0x2f4/0x330 [ 24.576384] kunit_try_run_case+0x170/0x3f0 [ 24.576513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.576680] kthread+0x328/0x630 [ 24.577180] ret_from_fork+0x10/0x20 [ 24.577517] [ 24.577618] Allocated by task 140: [ 24.577705] kasan_save_stack+0x3c/0x68 [ 24.577806] kasan_save_track+0x20/0x40 [ 24.577904] kasan_save_alloc_info+0x40/0x58 [ 24.578006] __kasan_kmalloc+0xd4/0xd8 [ 24.578094] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 24.578205] kmalloc_node_oob_right+0xbc/0x330 [ 24.578321] kunit_try_run_case+0x170/0x3f0 [ 24.578787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.578968] kthread+0x328/0x630 [ 24.579133] ret_from_fork+0x10/0x20 [ 24.579878] [ 24.579941] The buggy address belongs to the object at fff00000c6446000 [ 24.579941] which belongs to the cache kmalloc-4k of size 4096 [ 24.580051] The buggy address is located 0 bytes to the right of [ 24.580051] allocated 4096-byte region [fff00000c6446000, fff00000c6447000) [ 24.580134] [ 24.580174] The buggy address belongs to the physical page: [ 24.580419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106440 [ 24.580800] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.581148] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.581371] page_type: f5(slab) [ 24.581480] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 24.581627] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 24.581867] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 24.582083] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 24.582368] head: 0bfffe0000000003 ffffc1ffc3191001 00000000ffffffff 00000000ffffffff [ 24.582494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 24.582677] page dumped because: kasan: bad access detected [ 24.582813] [ 24.582944] Memory state around the buggy address: [ 24.583104] fff00000c6446f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.583255] fff00000c6446f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.584033] >fff00000c6447000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.584577] ^ [ 24.584858] fff00000c6447080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.584978] fff00000c6447100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.585402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
Automatically assigned
[ 24.543686] ================================================================== [ 24.543810] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 24.543950] Read of size 1 at addr fff00000c5881b7f by task kunit_try_catch/138 [ 24.544878] [ 24.544974] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.546089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.546177] Hardware name: linux,dummy-virt (DT) [ 24.546264] Call trace: [ 24.546343] show_stack+0x20/0x38 (C) [ 24.546978] dump_stack_lvl+0x8c/0xd0 [ 24.547143] print_report+0x118/0x608 [ 24.547648] kasan_report+0xdc/0x128 [ 24.547797] __asan_report_load1_noabort+0x20/0x30 [ 24.547969] kmalloc_oob_left+0x2ec/0x320 [ 24.548097] kunit_try_run_case+0x170/0x3f0 [ 24.548222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.548588] kthread+0x328/0x630 [ 24.548714] ret_from_fork+0x10/0x20 [ 24.548834] [ 24.548876] Allocated by task 24: [ 24.548989] kasan_save_stack+0x3c/0x68 [ 24.549120] kasan_save_track+0x20/0x40 [ 24.549382] kasan_save_alloc_info+0x40/0x58 [ 24.549520] __kasan_kmalloc+0xd4/0xd8 [ 24.549648] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 24.549963] kvasprintf+0xe0/0x180 [ 24.550054] __kthread_create_on_node+0x16c/0x350 [ 24.550145] kthread_create_on_node+0xe4/0x130 [ 24.550234] create_worker+0x380/0x6b8 [ 24.550320] worker_thread+0x808/0xf38 [ 24.550442] kthread+0x328/0x630 [ 24.550540] ret_from_fork+0x10/0x20 [ 24.550648] [ 24.550703] The buggy address belongs to the object at fff00000c5881b60 [ 24.550703] which belongs to the cache kmalloc-16 of size 16 [ 24.550847] The buggy address is located 19 bytes to the right of [ 24.550847] allocated 12-byte region [fff00000c5881b60, fff00000c5881b6c) [ 24.551001] [ 24.551051] The buggy address belongs to the physical page: [ 24.551149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105881 [ 24.551287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.551444] page_type: f5(slab) [ 24.551551] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.551692] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.551800] page dumped because: kasan: bad access detected [ 24.551930] [ 24.551983] Memory state around the buggy address: [ 24.552069] fff00000c5881a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc [ 24.552238] fff00000c5881a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 24.552376] >fff00000c5881b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 24.552475] ^ [ 24.552576] fff00000c5881b80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.552678] fff00000c5881c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.554347] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
Automatically assigned
[ 24.497917] ================================================================== [ 24.498013] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 24.498113] Read of size 1 at addr fff00000c703a380 by task kunit_try_catch/136 [ 24.498230] [ 24.498297] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.500228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.500296] Hardware name: linux,dummy-virt (DT) [ 24.500389] Call trace: [ 24.500440] show_stack+0x20/0x38 (C) [ 24.500554] dump_stack_lvl+0x8c/0xd0 [ 24.500674] print_report+0x118/0x608 [ 24.501899] kasan_report+0xdc/0x128 [ 24.502434] __asan_report_load1_noabort+0x20/0x30 [ 24.502771] kmalloc_oob_right+0x5d0/0x660 [ 24.503802] kunit_try_run_case+0x170/0x3f0 [ 24.503978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.504175] kthread+0x328/0x630 [ 24.504310] ret_from_fork+0x10/0x20 [ 24.504887] [ 24.505064] Allocated by task 136: [ 24.505344] kasan_save_stack+0x3c/0x68 [ 24.505491] kasan_save_track+0x20/0x40 [ 24.505903] kasan_save_alloc_info+0x40/0x58 [ 24.506044] __kasan_kmalloc+0xd4/0xd8 [ 24.506164] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.506877] kmalloc_oob_right+0xb0/0x660 [ 24.507150] kunit_try_run_case+0x170/0x3f0 [ 24.507880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.508166] kthread+0x328/0x630 [ 24.508475] ret_from_fork+0x10/0x20 [ 24.508741] [ 24.508792] The buggy address belongs to the object at fff00000c703a300 [ 24.508792] which belongs to the cache kmalloc-128 of size 128 [ 24.509449] The buggy address is located 13 bytes to the right of [ 24.509449] allocated 115-byte region [fff00000c703a300, fff00000c703a373) [ 24.511362] [ 24.511422] The buggy address belongs to the physical page: [ 24.511479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a [ 24.511544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.511625] page_type: f5(slab) [ 24.511717] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.511879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.511986] page dumped because: kasan: bad access detected [ 24.512074] [ 24.512125] Memory state around the buggy address: [ 24.512209] fff00000c703a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.512442] fff00000c703a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.512567] >fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.512866] ^ [ 24.513030] fff00000c703a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.513145] fff00000c703a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.513237] ================================================================== [ 24.463457] ================================================================== [ 24.464031] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 24.465435] Write of size 1 at addr fff00000c703a373 by task kunit_try_catch/136 [ 24.465575] [ 24.466513] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250605 #1 PREEMPT [ 24.466703] Tainted: [N]=TEST [ 24.466749] Hardware name: linux,dummy-virt (DT) [ 24.467022] Call trace: [ 24.467223] show_stack+0x20/0x38 (C) [ 24.467421] dump_stack_lvl+0x8c/0xd0 [ 24.467515] print_report+0x118/0x608 [ 24.467581] kasan_report+0xdc/0x128 [ 24.467639] __asan_report_store1_noabort+0x20/0x30 [ 24.467697] kmalloc_oob_right+0x5a4/0x660 [ 24.467754] kunit_try_run_case+0x170/0x3f0 [ 24.467829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.467972] kthread+0x328/0x630 [ 24.468097] ret_from_fork+0x10/0x20 [ 24.468458] [ 24.468695] Allocated by task 136: [ 24.469911] kasan_save_stack+0x3c/0x68 [ 24.470200] kasan_save_track+0x20/0x40 [ 24.470374] kasan_save_alloc_info+0x40/0x58 [ 24.470652] __kasan_kmalloc+0xd4/0xd8 [ 24.470888] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.471030] kmalloc_oob_right+0xb0/0x660 [ 24.471189] kunit_try_run_case+0x170/0x3f0 [ 24.471432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.472741] kthread+0x328/0x630 [ 24.472847] ret_from_fork+0x10/0x20 [ 24.473009] [ 24.473135] The buggy address belongs to the object at fff00000c703a300 [ 24.473135] which belongs to the cache kmalloc-128 of size 128 [ 24.473395] The buggy address is located 0 bytes to the right of [ 24.473395] allocated 115-byte region [fff00000c703a300, fff00000c703a373) [ 24.473569] [ 24.473765] The buggy address belongs to the physical page: [ 24.474161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a [ 24.474755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.475659] page_type: f5(slab) [ 24.476661] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.476978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.477814] page dumped because: kasan: bad access detected [ 24.478273] [ 24.478576] Memory state around the buggy address: [ 24.480137] fff00000c703a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.480569] fff00000c703a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.480716] >fff00000c703a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.480851] ^ [ 24.481098] fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.481207] fff00000c703a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.481384] ================================================================== [ 24.483543] ================================================================== [ 24.483850] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 24.484137] Write of size 1 at addr fff00000c703a378 by task kunit_try_catch/136 [ 24.484389] [ 24.484512] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 24.484786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.484891] Hardware name: linux,dummy-virt (DT) [ 24.484973] Call trace: [ 24.485057] show_stack+0x20/0x38 (C) [ 24.485236] dump_stack_lvl+0x8c/0xd0 [ 24.485617] print_report+0x118/0x608 [ 24.485738] kasan_report+0xdc/0x128 [ 24.485891] __asan_report_store1_noabort+0x20/0x30 [ 24.486231] kmalloc_oob_right+0x538/0x660 [ 24.486381] kunit_try_run_case+0x170/0x3f0 [ 24.486522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.486667] kthread+0x328/0x630 [ 24.486778] ret_from_fork+0x10/0x20 [ 24.487468] [ 24.487713] Allocated by task 136: [ 24.487876] kasan_save_stack+0x3c/0x68 [ 24.488444] kasan_save_track+0x20/0x40 [ 24.488544] kasan_save_alloc_info+0x40/0x58 [ 24.488643] __kasan_kmalloc+0xd4/0xd8 [ 24.488793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.489053] kmalloc_oob_right+0xb0/0x660 [ 24.489440] kunit_try_run_case+0x170/0x3f0 [ 24.489543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.489651] kthread+0x328/0x630 [ 24.490167] ret_from_fork+0x10/0x20 [ 24.490388] [ 24.490437] The buggy address belongs to the object at fff00000c703a300 [ 24.490437] which belongs to the cache kmalloc-128 of size 128 [ 24.491027] The buggy address is located 5 bytes to the right of [ 24.491027] allocated 115-byte region [fff00000c703a300, fff00000c703a373) [ 24.491574] [ 24.491624] The buggy address belongs to the physical page: [ 24.491694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10703a [ 24.492220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.492376] page_type: f5(slab) [ 24.492482] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.492834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.492947] page dumped because: kasan: bad access detected [ 24.493029] [ 24.493077] Memory state around the buggy address: [ 24.493153] fff00000c703a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.494073] fff00000c703a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.494248] >fff00000c703a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.494559] ^ [ 24.494675] fff00000c703a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.495149] fff00000c703a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.495354] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10: Failure
Automatically assigned
------------[ cut here ]------------ [ 117.977286] WARNING: CPU: 1 PID: 704 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 117.979276] Modules linked in: [ 117.979713] CPU: 1 UID: 0 PID: 704 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250605 #1 PREEMPT [ 117.983055] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 117.984038] Hardware name: linux,dummy-virt (DT) [ 117.984813] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 117.985685] pc : intlog10+0x38/0x48 [ 117.986288] lr : intlog10_test+0xe4/0x200 [ 117.986791] sp : ffff800082427c10 [ 117.987183] x29: ffff800082427c90 x28: 0000000000000000 x27: 0000000000000000 [ 117.988055] x26: 1ffe00001981fe81 x25: 0000000000000000 x24: ffff800082427ce0 [ 117.989068] x23: ffff800082427d00 x22: 0000000000000000 x21: 1ffff00010484f82 [ 117.989872] x20: ffff9ca7264d2f40 x19: ffff800080087990 x18: 0000000077c004c6 [ 117.990842] x17: 000000007af72250 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 117.991783] x14: 0000000000018fff x13: 1ffe00001b4889cd x12: ffff7394e546ff79 [ 117.992950] x11: 1ffff394e546ff78 x10: ffff7394e546ff78 x9 : ffff9ca723a6977c [ 117.993948] x8 : ffff9ca72a37fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 117.994923] x5 : ffff700010484f82 x4 : 1ffff00010010f3a x3 : 1ffff394e4c9a5e8 [ 117.995942] x2 : 1ffff394e4c9a5e8 x1 : 0000000000000003 x0 : 0000000000000000 [ 117.997153] Call trace: [ 117.997483] intlog10+0x38/0x48 (P) [ 117.998041] kunit_try_run_case+0x170/0x3f0 [ 117.998911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.999704] kthread+0x328/0x630 [ 118.000449] ret_from_fork+0x10/0x20 [ 118.001277] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
KNOWN ISSUE - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2: Failure
Automatically assigned
------------[ cut here ]------------ [ 117.883137] WARNING: CPU: 1 PID: 686 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 117.888310] Modules linked in: [ 117.889666] CPU: 1 UID: 0 PID: 686 Comm: kunit_try_catch Tainted: G B D N 6.15.0-next-20250605 #1 PREEMPT [ 117.890727] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 117.891240] Hardware name: linux,dummy-virt (DT) [ 117.892084] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 117.893017] pc : intlog2+0xd8/0xf8 [ 117.893641] lr : intlog2_test+0xe4/0x200 [ 117.894204] sp : ffff800082377c10 [ 117.894651] x29: ffff800082377c90 x28: 0000000000000000 x27: 0000000000000000 [ 117.895661] x26: 1ffe00001985d4a1 x25: 0000000000000000 x24: ffff800082377ce0 [ 117.896865] x23: ffff800082377d00 x22: 0000000000000000 x21: 1ffff0001046ef82 [ 117.897902] x20: ffff9ca7264d2e40 x19: ffff800080087990 x18: 000000006bc9d805 [ 117.898883] x17: 0000000037e1f0aa x16: fff00000c0975c3c x15: fff00000ff616b08 [ 117.899594] x14: 0000000000018fff x13: 1ffe00001b4889cd x12: ffff7394e546ff79 [ 117.900705] x11: 1ffff394e546ff78 x10: ffff7394e546ff78 x9 : ffff9ca723a6997c [ 117.901866] x8 : ffff9ca72a37fbc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 117.903270] x5 : ffff70001046ef82 x4 : 1ffff00010010f3a x3 : 1ffff394e4c9a5c8 [ 117.904751] x2 : 1ffff394e4c9a5c8 x1 : 0000000000000003 x0 : 0000000000000000 [ 117.905769] Call trace: [ 117.906126] intlog2+0xd8/0xf8 (P) [ 117.906604] kunit_try_run_case+0x170/0x3f0 [ 117.907081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.907693] kthread+0x328/0x630 [ 117.908209] ret_from_fork+0x10/0x20 [ 117.908869] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-spawned-test_ratelimit_stress_child
------------[ cut here ]------------ [ 196.359385] Spawned test_ratelimit_stress_child 0 [ 196.359424] WARNING: CPU: 0 PID: 1599 at lib/tests/test_ratelimit.c:87 test_ratelimit_stress_child+0x160/0x1b8 [ 196.361682] Modules linked in: [ 196.362133] CPU: 0 UID: 0 PID: 1599 Comm: test_ratelimit_ Tainted: G B D W N 6.15.0-next-20250605 #1 PREEMPT [ 196.362979] Spawned test_ratelimit_stress_child 1 [ 196.365703] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 196.366551] Hardware name: linux,dummy-virt (DT) [ 196.367309] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 196.367905] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 196.369580] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 196.371232] sp : ffff800089777d90 [ 196.372168] x29: ffff800089777d90 x28: 0000000000000000 x27: 0000000000000000 [ 196.373763] x26: 1ffe000019330041 x25: 0000000000000000 x24: 0000000000000004 [ 196.375092] x23: fff00000c998020c x22: fff00000c9617980 x21: ffff9ca723b650f0 [ 196.376741] x20: fff00000c9980200 x19: fff00000c9617980 x18: 0000000095da9fc2 [ 196.377502] x17: 0000000000000001 x16: fff00000da444d28 x15: fff00000ff616b08 [ 196.378166] x14: 00000000f1f1f1f1 x13: 1ffe00001b488989 x12: fffd80001b488849 [ 196.379828] x11: 1ffe00001b488848 x10: fffd80001b488848 x9 : ffff9ca72620ee1c [ 196.381146] x8 : ffff800089777ae8 x7 : 0000000000000001 x6 : ffff800089777c00 [ 196.382622] x5 : 0000000000000001 x4 : ffff9ca7285643e0 x3 : 0000000000000000 [ 196.384725] x2 : 1ffe0000192c2f34 x1 : 0000000000000000 x0 : 0000000000000000 [ 196.386681] Call trace: [ 196.387705] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 196.388822] kthread+0x328/0x630 [ 196.389285] ret_from_fork+0x10/0x20 [ 196.389778] ---[ end trace 0000000000000000 ]---