Executive Summary
Total Issues: 87 (17 Critical, 6 High, 64 Medium, 0 Low)
New Issues: 85
Recurring Issues: 2
Comparison Base: next-20250923
Test Plan Statistics
Builds: 50 total (380 pass, 15 fail, 0 skip) - 760.0% success rate
Boots: 2572 total (2477 pass, 7 fail, 15 skip, 73 in progress) - 96.3% success rate (Plan in progress) - 5 boots skipped due to dependency issues
Test Suites: 3027 total (2088 pass, 669 fail, 270 unknown) - 69.0% success rate
Individual Test Cases: 375896 total (353066 pass, 5549 fail, 17281 skip) - 93.9% success rate
Critical Issues (17):
- Boot Failure: panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block on e850-96 [NEW]
- Boot Failure: exception-warning-driversgpudrmdrm_connector-at-drm_connector_dynamic_register on qemu-x86_64 [NEW]
- Boot Failure: exception-warning-driversgpudrmdrm_rect-at-drm_rect_calc_hscale on qemu-x86_64 [NEW]
- ... and 14 more
High Priority Issues (6):
- Build Failure: clang-compiler-fs_btrfs_disk-io_c-warning-format-specifies-type-size_t-aka-unsigned-int-but-the-argument-has-type-unsigned-long on riscv (x3) [NEW]
- Build Failure: clang-compiler-futex_numa_mpol_c-warning-unused-function-test_futex_mpol on x86_64 (x2) [NEW]
- Build Failure: clang-compiler-kselftest_h-error-unknown-type-name-bool on x86_64 (x2) [NEW]
- ... and 3 more
Medium Priority Issues (64):
- 9 issues on dragonboard-410c
- 10 issues on graviton4-vm
- 3 issues on qemu-riscv64
- 7 issues on qemu-x86_64
- 4 issues on qemu-x86_64-compat
- 24 issues on x86
- 7 issues on x86-compat
Build Information
Kernel version: 6.17.0-rc7
Git Tree: https://kernel.googlesource.com/pub/scm/linux/kernel/git/next/linux-next.git
Git SHA: b5a4da2c459f79a2c87c867398f1c0c315779781
Git Describe: next-20250924
Test Details: https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20250924
Architecture Impact Assessment
qemu-x86_64: 23 issues (22 new, 1 recurring) - 16 Critical, 7 Medium e850-96: 1 issues (1 new, 0 recurring) - 1 Critical x86: 24 issues (23 new, 1 recurring) - 24 Medium graviton4-vm: 10 issues (10 new, 0 recurring) - 10 Medium dragonboard-410c: 9 issues (9 new, 0 recurring) - 9 Medium x86-compat: 7 issues (7 new, 0 recurring) - 7 Medium x86_64: 5 issues (5 new, 0 recurring) - 5 High qemu-x86_64-compat: 4 issues (4 new, 0 recurring) - 4 Medium qemu-riscv64: 3 issues (3 new, 0 recurring) - 3 Medium riscv: 1 issues (1 new, 0 recurring) - 1 High
Critical: Boot Regressions (compared to next-20250923)
e850-96, log-parser-boot
- panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block (gcc-13-lkftconfig-no-kselftest-frag:1) Regression Log 1 (artefacts: Test Reproducer, Test Log)
qemu-x86_64, log-parser-boot
- exception-warning-driversgpudrmdrm_connector-at-drm_connector_dynamic_register (gcc-13-lkftconfig-kunit:1) Regression Log 2 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- exception-warning-driversgpudrmdrm_rect-at-drm_rect_calc_hscale (gcc-13-lkftconfig-kunit:1) Regression Log 3 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-double-free-in-kfree_sensitive (gcc-13-lkftconfig-kunit:1) Regression Log 4 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper (gcc-13-lkftconfig-kunit:1) Regression Log 5 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size (gcc-13-lkftconfig-kunit:1) Regression Log 6 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper (gcc-13-lkftconfig-kunit:6) Regression Log 7 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper (gcc-13-lkftconfig-kunit:4) Regression Log 8 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-memchr (gcc-13-lkftconfig-kunit:1) Regression Log 9 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper (gcc-13-lkftconfig-kunit:1) Regression Log 10 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-kasan_strings (gcc-13-lkftconfig-kunit:1) Regression Log 11 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper (gcc-13-lkftconfig-kunit:1) Regression Log 12 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim (gcc-13-lkftconfig-kunit:1) Regression Log 13 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf (gcc-13-lkftconfig-kunit:1) Regression Log 14 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob (gcc-13-lkftconfig-kunit:1) Regression Log 15 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-use-after-free-in-mempool_uaf_helper (gcc-13-lkftconfig-kunit:1) Regression Log 16 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-use-after-free-in-page_alloc_uaf (gcc-13-lkftconfig-kunit:1) Regression Log 17 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
High Priority: Build Regressions (compared to next-20250923)
riscv, log-parser-build-clang
- clang-compiler-fs_btrfs_disk-io_c-warning-format-specifies-type-size_t-aka-unsigned-int-but-the-argument-has-type-unsigned-long (rv32-clang-20-allnoconfig:3) Regression Log 1 (artefacts: Kernel Config, Build Reproducer, Build Log)
x86_64, log-parser-build-clang
- clang-compiler-futex_numa_mpol_c-warning-unused-function-test_futex_mpol (clang-20-lkftconfig-no-kselftest-frag:2) Regression Log 2 (artefacts: Kernel Config, Build Reproducer, Build Log)
- clang-compiler-kselftest_h-error-unknown-type-name-bool (clang-20-lkftconfig-no-kselftest-frag:2) Regression Log 3 (artefacts: Kernel Config, Build Reproducer, Build Log)
- clang-compiler-utils_cpupower-info_c-warning-implicit-truncation-from-int-to-a-one-bit-wide-bit-field-changes-value-from-to-cc-_home_tuxbuild__cache_tuxmake_builds__build_utils_powercap-info_o (clang-nightly-lkftconfig-kselftest:1) Regression Log 4 (artefacts: Kernel Config, Build Reproducer, Build Log)
x86_64, log-parser-build-gcc
- gcc-compiler-futex_numa_mpol_c-warning-test_futex_mpol-defined-but-not-used (gcc-13-lkftconfig-kselftest:2) Regression Log 5 (artefacts: Kernel Config, Build Reproducer, Build Log)
- gcc-compiler-kselftest_h-error-unknown-type-name-bool (gcc-13-lkftconfig-kselftest:2) Regression Log 6 (artefacts: Kernel Config, Build Reproducer, Build Log)
Medium Priority: Test Regressions (compared to next-20250923)
dragonboard-410c, log-parser-test
- internal-error-oops-oops-smp (gcc-13-lkftconfig-64k_page_size:3) Regression Log 1 (artefacts: Test Reproducer, Test Log)
- exception-warning-kerneltracetrace_functions_graph-at-print_graph_entry (gcc-13-lkftconfig:4) Regression Log 2 (artefacts: Test Reproducer, Test Log)
qemu-riscv64, log-parser-test
- exception-event-ma_read-has-unsafe-pointer-field-fn (gcc-13-lkftconfig:1) Regression Log 3 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64-compat, log-parser-test
- bug-bug-kernel-null-pointer-dereference-address (clang-20-lkftconfig-compat:9) Regression Log 4 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- oops-oops-oops-smp-pti (clang-20-lkftconfig-compat:9) Regression Log 5 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
Medium Priority: Test Regressions (compared to next-20250923)
dragonboard-410c, ltp-syscalls
- listmount04 (gcc-13-lkftconfig-64k_page_size) Regression Log 1 (artefacts: Test Reproducer, Test Log)
- sendmsg03 (gcc-13-lkftconfig-64k_page_size) Regression Log 2 (artefacts: Test Reproducer, Test Log)
- sendto03 (gcc-13-lkftconfig-64k_page_size) Regression Log 3 (artefacts: Test Reproducer, Test Log)
- setsockopt05 (gcc-13-lkftconfig-64k_page_size) Regression Log 4 (artefacts: Test Reproducer, Test Log)
- setsockopt09 (gcc-13-lkftconfig-64k_page_size) Regression Log 5 (artefacts: Test Reproducer, Test Log)
- timerfd_settime02 (gcc-13-lkftconfig-64k_page_size) Regression Log 6 (artefacts: Test Reproducer, Test Log)
- wait403 (gcc-13-lkftconfig-64k_page_size) Regression Log 7 (artefacts: Test Reproducer, Test Log)
graviton4-vm, kselftest-arm64
- arm64_fp-ptrace (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 8 (artefacts: Test Reproducer, Test Log)
- arm64_fp-stress (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 9 (artefacts: Test Reproducer, Test Log)
- arm64_hwcap (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 10 (artefacts: Test Reproducer, Test Log)
- arm64_ptrace (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 11 (artefacts: Test Reproducer, Test Log)
- arm64_sve-probe-vls (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 12 (artefacts: Test Reproducer, Test Log)
- arm64_sve-ptrace (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 13 (artefacts: Test Reproducer, Test Log)
- arm64_syscall-abi (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 14 (artefacts: Test Reproducer, Test Log)
- arm64_tpidr2 (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 15 (artefacts: Test Reproducer, Test Log)
- arm64_vec-syscfg (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 16 (artefacts: Test Reproducer, Test Log)
- arm64_za-fork (gcc-12-lkftconfig-graviton4-no-kselftest-frag) Regression Log 17 (artefacts: Test Reproducer, Test Log)
qemu-riscv64, ltp-syscalls
- listmount04 (clang-20-lkftconfig) Regression Log 18 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- listmount04 (gcc-13-lkftconfig) Regression Log 19 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64-compat, ltp-syscalls
- listmount04 (clang-20-lkftconfig-compat) Regression Log 20 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- listmount04 (gcc-13-lkftconfig-compat) Regression Log 21 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, kselftest-vDSO
- shardfile-vDSO (clang-20-lkftconfig-no-kselftest-frag) Regression Log 22 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, ltp-syscalls
- listmount04 (clang-20-lkftconfig) Regression Log 23 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, kselftest-mm
- mm_run_vmtests_sh_uffd-unit-tests (clang-nightly-lkftconfig-kselftest) Regression Log 24 Also seen in: lkft/linux-mainline-master on devices: qemu-armv7, qemu-x86_64, x15 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, ltp-syscalls
- listmount04 (clang-nightly-lkftconfig) Regression Log 25 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, kselftest-cgroup
- cgroup_test_cpu_test_cpucg_nice (gcc-13-lkftconfig-kselftest) Regression Log 26 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, kselftest-vDSO
- shardfile-vDSO (gcc-13-lkftconfig-no-kselftest-frag) Regression Log 27 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
qemu-x86_64, ltp-syscalls
- listmount04 (gcc-13-lkftconfig) Regression Log 28 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
x86-compat, ltp-syscalls
- listmount04 (gcc-13-lkftconfig-compat) Regression Log 29 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendmsg03 (gcc-13-lkftconfig-compat) Regression Log 30 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendto03 (gcc-13-lkftconfig-compat) Regression Log 31 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt05 (gcc-13-lkftconfig-compat) Regression Log 32 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt09 (gcc-13-lkftconfig-compat) Regression Log 33 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- timerfd_settime02 (gcc-13-lkftconfig-compat) Regression Log 34 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- wait403 (gcc-13-lkftconfig-compat) Regression Log 35 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
x86, kselftest-vDSO
- shardfile-vDSO (clang-20-lkftconfig-no-kselftest-frag) Regression Log 36 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
x86, ltp-syscalls
- listmount04 (gcc-13-defconfig-preempt_rt) Regression Log 37 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendmsg03 (gcc-13-defconfig-preempt_rt) Regression Log 38 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendto03 (gcc-13-defconfig-preempt_rt) Regression Log 39 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt05 (gcc-13-defconfig-preempt_rt) Regression Log 40 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt09 (gcc-13-defconfig-preempt_rt) Regression Log 41 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- timerfd_settime02 (gcc-13-defconfig-preempt_rt) Regression Log 42 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- wait403 (gcc-13-defconfig-preempt_rt) Regression Log 43 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
x86, rt-tests-cyclicdeadline
- rt-tests-cyclicdeadline (gcc-13-defconfig-preempt_rt) Regression Log 44 Also seen in: lkft/linux-mainline-master on devices: x86 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
x86, kselftest-vDSO
- shardfile-vDSO (gcc-13-lkftconfig-no-kselftest-frag) Regression Log 45 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
x86, ltp-syscalls
- listmount04 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 46 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendmsg03 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 47 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendto03 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 48 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt05 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 49 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt09 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 50 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- timerfd_settime02 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 51 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- wait403 (gcc-13-lkftconfig-sched-proxy-exec) Regression Log 52 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- listmount04 (gcc-13-lkftconfig) Regression Log 53 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendmsg03 (gcc-13-lkftconfig) Regression Log 54 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- sendto03 (gcc-13-lkftconfig) Regression Log 55 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt05 (gcc-13-lkftconfig) Regression Log 56 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- setsockopt09 (gcc-13-lkftconfig) Regression Log 57 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- timerfd_settime02 (gcc-13-lkftconfig) Regression Log 58 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- wait403 (gcc-13-lkftconfig) Regression Log 59 (artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
Regression Logs
panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block Regression Log 1 (gcc-13-lkftconfig-no-kselftest-frag)
[ 1.741650] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[ 1.741659] CPU: 5 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.17.0-rc7-next-20250924 #1 PREEMPT
[ 1.741668] Hardware name: WinLink E850-96 board (DT)
[ 1.741673] Call trace:
[ 1.741677] show_stack+0x18/0x24 (C)
[ 1.741695] dump_stack_lvl+0x34/0x8c
[ 1.741713] dump_stack+0x18/0x24
[ 1.741724] vpanic+0x324/0x368
[ 1.741740] nmi_panic+0x0/0x64
[ 1.741753] mount_root_generic+0x288/0x368
[ 1.741771] mount_root+0x174/0x338
[ 1.741783] prepare_namespace+0x6c/0x2a4
[ 1.741797] kernel_init_freeable+0x2a4/0x2e4
[ 1.741808] kernel_init+0x20/0x1d8
[ 1.741822] ret_from_fork+0x10/0x20
[ 1.741837] SMP: stopping secondary CPUs
[ 1.743540] Kernel Offset: disabled
[ 1.743542] CPU features: 0x080000,00000000,40046280,0400721b
[ 1.743551] Memory Limit: none
[ 1.836331] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
exception-warning-driversgpudrmdrm_connector-at-drm_connector_dynamic_register Regression Log 2 (gcc-13-lkftconfig-kunit)
------------[ cut here ]------------
[ 206.559110] WARNING: drivers/gpu/drm/drm_connector.c:903 at drm_connector_dynamic_register+0xbf/0x110, CPU#0: kunit_try_catch/2324
[ 206.559740] Modules linked in:
[ 206.559930] CPU: 0 UID: 0 PID: 2324 Comm: kunit_try_catch Tainted: G B D W N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 206.560548] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 206.560874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 206.561251] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[ 206.561748] Code: 49 8d 7c 24 60 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 60 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 68
[ 206.562678] RSP: 0000:ffff88810431fc80 EFLAGS: 00010246
[ 206.562975] RAX: dffffc0000000000 RBX: ffff8881041b6000 RCX: 0000000000000000
[ 206.563513] RDX: 1ffff11020836c34 RSI: ffffffff8c441ee4 RDI: ffff8881041b61a0
[ 206.563863] RBP: ffff88810431fc90 R08: 1ffff1102007af29 R09: ffffed1020863f63
[ 206.564167] R10: 0000000000000003 R11: ffffffff8b9a66e8 R12: 0000000000000000
[ 206.564546] R13: ffff88810431fd28 R14: ffff8881003d7a50 R15: ffff8881003d7a58
[ 206.564909] FS: 0000000000000000(0000) GS:ffff8881c9ba0000(0000) knlGS:0000000000000000
[ 206.565318] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 206.565706] CR2: 00007ffff7ffe000 CR3: 00000001192bc000 CR4: 00000000000006f0
[ 206.566187] DR0: ffffffff91527740 DR1: ffffffff91527741 DR2: ffffffff91527742
[ 206.566576] DR3: ffffffff91527743 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[ 206.566989] Call Trace:
[ 206.567109] <TASK>
[ 206.567275] drm_test_drm_connector_dynamic_register_no_init+0x104/0x290
[ 206.567802] ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10
[ 206.568365] ? __schedule+0x10e1/0x2b50
[ 206.568564] ? __pfx_read_tsc+0x10/0x10
[ 206.569021] ? ktime_get_ts64+0x86/0x230
[ 206.569548] kunit_try_run_case+0x1a5/0x490
[ 206.569849] ? __pfx_kunit_try_run_case+0x10/0x10
[ 206.570057] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 206.570672] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 206.571062] ? __kthread_parkme+0x82/0x180
[ 206.571642] ? preempt_count_sub+0x50/0x80
[ 206.572056] ? __pfx_kunit_try_run_case+0x10/0x10
[ 206.572448] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 206.572713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 206.572973] kthread+0x337/0x6f0
[ 206.573123] ? trace_preempt_on+0x20/0xc0
[ 206.573659] ? __pfx_kthread+0x10/0x10
[ 206.574119] ? _raw_spin_unlock_irq+0x47/0x80
[ 206.574520] ? calculate_sigpending+0x7b/0xa0
[ 206.574781] ? __pfx_kthread+0x10/0x10
[ 206.574960] ret_from_fork+0x1c5/0x240
[ 206.575401] ? __pfx_kthread+0x10/0x10
[ 206.575698] ret_from_fork_asm+0x1a/0x30
[ 206.576039] </TASK>
[ 206.576407] ---[ end trace 0000000000000000 ]---
exception-warning-driversgpudrmdrm_rect-at-drm_rect_calc_hscale Regression Log 3 (gcc-13-lkftconfig-kunit)
------------[ cut here ]------------
[ 208.586756] WARNING: drivers/gpu/drm/drm_rect.c:137 at drm_rect_calc_hscale+0x125/0x190, CPU#0: kunit_try_catch/3096
[ 208.587453] Modules linked in:
[ 208.587666] CPU: 0 UID: 0 PID: 3096 Comm: kunit_try_catch Tainted: G B D W N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 208.588240] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 208.588458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 208.588870] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[ 208.589077] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[ 208.589909] RSP: 0000:ffff8881023efc68 EFLAGS: 00010286
[ 208.590151] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[ 208.590460] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffff8f47c318
[ 208.590904] RBP: ffff8881023efc90 R08: 0000000000000000 R09: ffffed1020bc5640
[ 208.591175] R10: ffff888105e2b207 R11: 0000000000000000 R12: ffffffff8f47c300
[ 208.591568] R13: 0000000000000000 R14: 000000007fffffff R15: ffff8881023efd28
[ 208.591901] FS: 0000000000000000(0000) GS:ffff8881c9ba0000(0000) knlGS:0000000000000000
[ 208.592202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 208.592727] CR2: 00007ffff7ffe000 CR3: 00000001192bc000 CR4: 00000000000006f0
[ 208.593052] DR0: ffffffff91527740 DR1: ffffffff91527741 DR2: ffffffff91527742
[ 208.593442] DR3: ffffffff91527743 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[ 208.593824] Call Trace:
[ 208.593931] <TASK>
[ 208.594035] drm_test_rect_calc_hscale+0x108/0x270
[ 208.594522] ? __kasan_check_write+0x18/0x20
[ 208.594702] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[ 208.595405] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 208.595666] ? trace_hardirqs_on+0x37/0xe0
[ 208.595862] ? __pfx_read_tsc+0x10/0x10
[ 208.596036] ? ktime_get_ts64+0x86/0x230
[ 208.596693] kunit_try_run_case+0x1a5/0x490
[ 208.596858] ? __pfx_kunit_try_run_case+0x10/0x10
[ 208.597067] ? queued_spin_lock_slowpath+0x116/0xb40
[ 208.597511] ? __kthread_parkme+0x82/0x180
[ 208.597771] ? preempt_count_sub+0x50/0x80
[ 208.597963] ? __pfx_kunit_try_run_case+0x10/0x10
[ 208.598660] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 208.598997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 208.599659] kthread+0x337/0x6f0
[ 208.599837] ? trace_preempt_on+0x20/0xc0
[ 208.600020] ? __pfx_kthread+0x10/0x10
[ 208.600724] ? _raw_spin_unlock_irq+0x47/0x80
[ 208.601001] ? calculate_sigpending+0x7b/0xa0
[ 208.601529] ? __pfx_kthread+0x10/0x10
[ 208.601737] ret_from_fork+0x1c5/0x240
[ 208.601909] ? __pfx_kthread+0x10/0x10
[ 208.602079] ret_from_fork_asm+0x1a/0x30
[ 208.602659] </TASK>
[ 208.602989] ---[ end trace 0000000000000000 ]---
kasan-bug-kasan-double-free-in-kfree_sensitive Regression Log 4 (gcc-13-lkftconfig-kunit)
[ 22.909800] ==================================================================
[ 22.910167] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[ 22.910408] Free of addr ffff8881056bca20 by task kunit_try_catch/248
[ 22.910696]
[ 22.910797] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 22.910842] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.910854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.910874] Call Trace:
[ 22.910888] <TASK>
[ 22.910902] dump_stack_lvl+0x73/0xb0
[ 22.910928] print_report+0xd1/0x640
[ 22.910950] ? __virt_addr_valid+0x1db/0x2d0
[ 22.910972] ? kasan_complete_mode_report_info+0x64/0x200
[ 22.910994] ? kfree_sensitive+0x2e/0x90
[ 22.911016] kasan_report_invalid_free+0x10d/0x130
[ 22.911040] ? kfree_sensitive+0x2e/0x90
[ 22.911064] ? kfree_sensitive+0x2e/0x90
[ 22.911086] check_slab_allocation+0x101/0x130
[ 22.911108] __kasan_slab_pre_free+0x28/0x40
[ 22.911128] kfree+0xee/0x4f0
[ 22.911149] ? kfree_sensitive+0x2e/0x90
[ 22.911173] kfree_sensitive+0x2e/0x90
[ 22.911195] kmalloc_double_kzfree+0x19c/0x370
[ 22.911217] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 22.911240] ? __schedule+0x10e1/0x2b50
[ 22.911261] ? __pfx_read_tsc+0x10/0x10
[ 22.911279] ? ktime_get_ts64+0x86/0x230
[ 22.911302] kunit_try_run_case+0x1a5/0x490
[ 22.911324] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.911344] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 22.911365] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.911387] ? __kthread_parkme+0x82/0x180
[ 22.911409] ? preempt_count_sub+0x50/0x80
[ 22.911434] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.911456] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.911480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.911505] kthread+0x337/0x6f0
[ 22.911522] ? trace_preempt_on+0x20/0xc0
[ 22.911543] ? __pfx_kthread+0x10/0x10
[ 22.911562] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.911582] ? calculate_sigpending+0x7b/0xa0
[ 22.911604] ? __pfx_kthread+0x10/0x10
[ 22.911624] ret_from_fork+0x1c5/0x240
[ 22.911644] ? __pfx_kthread+0x10/0x10
[ 22.911668] ret_from_fork_asm+0x1a/0x30
[ 22.911699] </TASK>
[ 22.911710]
[ 22.925000] Allocated by task 248:
[ 22.925376] kasan_save_stack+0x45/0x70
[ 22.925607] kasan_save_track+0x18/0x40
[ 22.925810] kasan_save_alloc_info+0x3b/0x50
[ 22.926043] __kasan_kmalloc+0xb7/0xc0
[ 22.926328] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 22.926488] kmalloc_double_kzfree+0xa9/0x370
[ 22.926653] kunit_try_run_case+0x1a5/0x490
[ 22.926891] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.927368] kthread+0x337/0x6f0
[ 22.927551] ret_from_fork+0x1c5/0x240
[ 22.927786] ret_from_fork_asm+0x1a/0x30
[ 22.927934]
[ 22.928066] Freed by task 248:
[ 22.928309] kasan_save_stack+0x45/0x70
[ 22.928509] kasan_save_track+0x18/0x40
[ 22.928719] __kasan_save_free_info+0x3f/0x60
[ 22.928943] __kasan_slab_free+0x68/0x90
[ 22.929312] kfree+0x225/0x4f0
[ 22.929524] kfree_sensitive+0x67/0x90
[ 22.929667] kmalloc_double_kzfree+0x12b/0x370
[ 22.929822] kunit_try_run_case+0x1a5/0x490
[ 22.930052] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.930398] kthread+0x337/0x6f0
[ 22.930524] ret_from_fork+0x1c5/0x240
[ 22.930672] ret_from_fork_asm+0x1a/0x30
[ 22.930906]
[ 22.931014] The buggy address belongs to the object at ffff8881056bca20
[ 22.931014] which belongs to the cache kmalloc-16 of size 16
[ 22.931515] The buggy address is located 0 bytes inside of
[ 22.931515] 16-byte region [ffff8881056bca20, ffff8881056bca30)
[ 22.932019]
[ 22.932145] The buggy address belongs to the physical page:
[ 22.932450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056bc
[ 22.932711] flags: 0x200000000000000(node=0|zone=2)
[ 22.932992] page_type: f5(slab)
[ 22.933315] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 22.933641] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 22.933999] page dumped because: kasan: bad access detected
[ 22.934319]
[ 22.934423] Memory state around the buggy address:
[ 22.934640] ffff8881056bc900: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[ 22.934937] ffff8881056bc980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 22.935227] >ffff8881056bca00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 22.935547] ^
[ 22.935754] ffff8881056bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.936102] ffff8881056bcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.936457] ==================================================================
kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper Regression Log 5 (gcc-13-lkftconfig-kunit)
[ 24.264123] ==================================================================
[ 24.264557] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x320
[ 24.265403] Free of addr ffff888105da5801 by task kunit_try_catch/299
[ 24.266077]
[ 24.266410] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 24.266467] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.266481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.266503] Call Trace:
[ 24.266519] <TASK>
[ 24.266533] dump_stack_lvl+0x73/0xb0
[ 24.266563] print_report+0xd1/0x640
[ 24.266586] ? __virt_addr_valid+0x1db/0x2d0
[ 24.266611] ? kasan_complete_mode_report_info+0x2a/0x200
[ 24.266634] ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[ 24.266659] kasan_report_invalid_free+0x10d/0x130
[ 24.266682] ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[ 24.266709] ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[ 24.266732] ? mempool_kmalloc_invalid_free_helper+0x132/0x320
[ 24.266757] check_slab_allocation+0x11f/0x130
[ 24.266792] __kasan_mempool_poison_object+0x91/0x1d0
[ 24.266816] mempool_free+0x45f/0x6a0
[ 24.266841] mempool_kmalloc_invalid_free_helper+0x132/0x320
[ 24.266873] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[ 24.266897] ? __pfx_call_function_single_prep_ipi+0x10/0x10
[ 24.266921] ? __kasan_check_write+0x18/0x20
[ 24.266943] ? finish_task_switch.isra.0+0x153/0x700
[ 24.266971] mempool_kmalloc_invalid_free+0xed/0x140
[ 24.266994] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[ 24.267017] ? update_rq_clock+0x1b2/0x4d0
[ 24.267038] ? __pfx_mempool_kmalloc+0x10/0x10
[ 24.267058] ? __pfx_mempool_kfree+0x10/0x10
[ 24.267082] ? __pfx_read_tsc+0x10/0x10
[ 24.267101] ? ktime_get_ts64+0x86/0x230
[ 24.267123] kunit_try_run_case+0x1a5/0x490
[ 24.267147] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.267167] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 24.267190] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.267213] ? __kthread_parkme+0x82/0x180
[ 24.267235] ? preempt_count_sub+0x50/0x80
[ 24.267260] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.267281] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.267307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.267333] kthread+0x337/0x6f0
[ 24.267350] ? trace_preempt_on+0x20/0xc0
[ 24.267372] ? __pfx_kthread+0x10/0x10
[ 24.267391] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.267411] ? calculate_sigpending+0x7b/0xa0
[ 24.267433] ? __pfx_kthread+0x10/0x10
[ 24.267453] ret_from_fork+0x1c5/0x240
[ 24.267473] ? __pfx_kthread+0x10/0x10
[ 24.267492] ret_from_fork_asm+0x1a/0x30
[ 24.267525] </TASK>
[ 24.267539]
[ 24.282227] Allocated by task 299:
[ 24.282422] kasan_save_stack+0x45/0x70
[ 24.282610] kasan_save_track+0x18/0x40
[ 24.282805] kasan_save_alloc_info+0x3b/0x50
[ 24.283002] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 24.283231] remove_element+0x11e/0x190
[ 24.283405] mempool_alloc_preallocated+0x4d/0x90
[ 24.283613] mempool_kmalloc_invalid_free_helper+0x83/0x320
[ 24.283884] mempool_kmalloc_invalid_free+0xed/0x140
[ 24.284050] kunit_try_run_case+0x1a5/0x490
[ 24.284189] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.284357] kthread+0x337/0x6f0
[ 24.284469] ret_from_fork+0x1c5/0x240
[ 24.284925] ret_from_fork_asm+0x1a/0x30
[ 24.285113]
[ 24.285649] The buggy address belongs to the object at ffff888105da5800
[ 24.285649] which belongs to the cache kmalloc-128 of size 128
[ 24.286577] The buggy address is located 1 bytes inside of
[ 24.286577] 128-byte region [ffff888105da5800, ffff888105da5880)
[ 24.287604]
[ 24.287877] The buggy address belongs to the physical page:
[ 24.288360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da5
[ 24.288692] flags: 0x200000000000000(node=0|zone=2)
[ 24.289111] page_type: f5(slab)
[ 24.289451] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 24.289968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 24.290520] page dumped because: kasan: bad access detected
[ 24.290770]
[ 24.290865] Memory state around the buggy address:
[ 24.291071] ffff888105da5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.291637] ffff888105da5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.292133] >ffff888105da5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.292662] ^
[ 24.292835] ffff888105da5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.293662] ffff888105da5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.294016] ==================================================================
kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size Regression Log 6 (gcc-13-lkftconfig-kunit)
[ 22.728332] ==================================================================
[ 22.728796] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x350
[ 22.729112] Read of size 18446744073709551614 at addr ffff8881054d1f04 by task kunit_try_catch/236
[ 22.729728]
[ 22.729851] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 22.729901] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.729914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.729934] Call Trace:
[ 22.729948] <TASK>
[ 22.729962] dump_stack_lvl+0x73/0xb0
[ 22.729992] print_report+0xd1/0x640
[ 22.730014] ? __virt_addr_valid+0x1db/0x2d0
[ 22.730048] ? kmalloc_memmove_negative_size+0x171/0x350
[ 22.730072] ? kasan_complete_mode_report_info+0x2a/0x200
[ 22.730093] ? kmalloc_memmove_negative_size+0x171/0x350
[ 22.730150] kasan_report+0x144/0x180
[ 22.730173] ? kmalloc_memmove_negative_size+0x171/0x350
[ 22.730202] kasan_check_range+0x10c/0x1c0
[ 22.730452] __asan_memmove+0x27/0x70
[ 22.730475] kmalloc_memmove_negative_size+0x171/0x350
[ 22.730511] ? __kasan_check_write+0x18/0x20
[ 22.730531] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[ 22.730555] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 22.730580] ? trace_hardirqs_on+0x37/0xe0
[ 22.730605] ? __pfx_read_tsc+0x10/0x10
[ 22.730626] ? ktime_get_ts64+0x86/0x230
[ 22.730649] kunit_try_run_case+0x1a5/0x490
[ 22.730673] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.730696] ? queued_spin_lock_slowpath+0x116/0xb40
[ 22.730719] ? __kthread_parkme+0x82/0x180
[ 22.730743] ? preempt_count_sub+0x50/0x80
[ 22.730769] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.730801] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.730827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.730852] kthread+0x337/0x6f0
[ 22.730869] ? trace_preempt_on+0x20/0xc0
[ 22.730890] ? __pfx_kthread+0x10/0x10
[ 22.730909] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.730930] ? calculate_sigpending+0x7b/0xa0
[ 22.730952] ? __pfx_kthread+0x10/0x10
[ 22.730972] ret_from_fork+0x1c5/0x240
[ 22.730992] ? __pfx_kthread+0x10/0x10
[ 22.731011] ret_from_fork_asm+0x1a/0x30
[ 22.731044] </TASK>
[ 22.731055]
[ 22.738957] Allocated by task 236:
[ 22.739089] kasan_save_stack+0x45/0x70
[ 22.739458] kasan_save_track+0x18/0x40
[ 22.739622] kasan_save_alloc_info+0x3b/0x50
[ 22.740011] __kasan_kmalloc+0xb7/0xc0
[ 22.740488] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 22.740652] kmalloc_memmove_negative_size+0xac/0x350
[ 22.740825] kunit_try_run_case+0x1a5/0x490
[ 22.740991] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.742215] kthread+0x337/0x6f0
[ 22.742709] ret_from_fork+0x1c5/0x240
[ 22.743313] ret_from_fork_asm+0x1a/0x30
[ 22.743877]
[ 22.744263] The buggy address belongs to the object at ffff8881054d1f00
[ 22.744263] which belongs to the cache kmalloc-64 of size 64
[ 22.745468] The buggy address is located 4 bytes inside of
[ 22.745468] 64-byte region [ffff8881054d1f00, ffff8881054d1f40)
[ 22.746486]
[ 22.746795] The buggy address belongs to the physical page:
[ 22.747572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054d1
[ 22.747848] flags: 0x200000000000000(node=0|zone=2)
[ 22.748015] page_type: f5(slab)
[ 22.748135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 22.748364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 22.748583] page dumped because: kasan: bad access detected
[ 22.748748]
[ 22.748842] Memory state around the buggy address:
[ 22.749197] ffff8881054d1e00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[ 22.749670] ffff8881054d1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 22.749996] >ffff8881054d1f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 22.750629] ^
[ 22.750948] ffff8881054d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.751549] ffff8881054d2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 22.751788] ==================================================================
kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper Regression Log 7 (gcc-13-lkftconfig-kunit)
[ 26.115197] ==================================================================
[ 26.115682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x302f/0x59f0
[ 26.116008] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.116386]
[ 26.116541] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.116616] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.116630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.116661] Call Trace:
[ 26.116675] <TASK>
[ 26.116690] dump_stack_lvl+0x73/0xb0
[ 26.116717] print_report+0xd1/0x640
[ 26.116740] ? __virt_addr_valid+0x1db/0x2d0
[ 26.116799] ? kasan_atomics_helper+0x302f/0x59f0
[ 26.116825] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.116887] ? kasan_atomics_helper+0x302f/0x59f0
[ 26.116923] kasan_report+0x144/0x180
[ 26.116959] ? kasan_atomics_helper+0x302f/0x59f0
[ 26.117015] kasan_check_range+0x10c/0x1c0
[ 26.117040] __kasan_check_write+0x18/0x20
[ 26.117061] kasan_atomics_helper+0x302f/0x59f0
[ 26.117095] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.117119] ? kasan_save_alloc_info+0x3b/0x50
[ 26.117149] kasan_atomics+0x1dc/0x310
[ 26.117174] ? __pfx_kasan_atomics+0x10/0x10
[ 26.117199] ? __pfx_read_tsc+0x10/0x10
[ 26.117219] ? ktime_get_ts64+0x86/0x230
[ 26.117242] kunit_try_run_case+0x1a5/0x490
[ 26.117296] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.117319] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.117364] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.117388] ? __kthread_parkme+0x82/0x180
[ 26.117411] ? preempt_count_sub+0x50/0x80
[ 26.117437] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.117461] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.117488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.117514] kthread+0x337/0x6f0
[ 26.117534] ? trace_preempt_on+0x20/0xc0
[ 26.117557] ? __pfx_kthread+0x10/0x10
[ 26.117577] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.117600] ? calculate_sigpending+0x7b/0xa0
[ 26.117624] ? __pfx_kthread+0x10/0x10
[ 26.117659] ret_from_fork+0x1c5/0x240
[ 26.117681] ? __pfx_kthread+0x10/0x10
[ 26.117702] ret_from_fork_asm+0x1a/0x30
[ 26.117735] </TASK>
[ 26.117747]
[ 26.125042] Allocated by task 323:
[ 26.125200] kasan_save_stack+0x45/0x70
[ 26.125341] kasan_save_track+0x18/0x40
[ 26.125473] kasan_save_alloc_info+0x3b/0x50
[ 26.125685] __kasan_kmalloc+0xb7/0xc0
[ 26.125895] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.126110] kasan_atomics+0x95/0x310
[ 26.126241] kunit_try_run_case+0x1a5/0x490
[ 26.126436] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.126672] kthread+0x337/0x6f0
[ 26.126848] ret_from_fork+0x1c5/0x240
[ 26.127067] ret_from_fork_asm+0x1a/0x30
[ 26.127265]
[ 26.127340] The buggy address belongs to the object at ffff888105db2a00
[ 26.127340] which belongs to the cache kmalloc-64 of size 64
[ 26.127838] The buggy address is located 0 bytes to the right of
[ 26.127838] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.128383]
[ 26.128486] The buggy address belongs to the physical page:
[ 26.128715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.129103] flags: 0x200000000000000(node=0|zone=2)
[ 26.129309] page_type: f5(slab)
[ 26.129477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.129749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.130006] page dumped because: kasan: bad access detected
[ 26.130174]
[ 26.130239] Memory state around the buggy address:
[ 26.130413] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.130748] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.131096] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.131407] ^
[ 26.131592] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.131818] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.132051] ==================================================================
---
[ 26.435665] ==================================================================
[ 26.436015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4012/0x59f0
[ 26.436345] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.436759]
[ 26.436854] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.436901] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.436915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.436937] Call Trace:
[ 26.436952] <TASK>
[ 26.436967] dump_stack_lvl+0x73/0xb0
[ 26.436994] print_report+0xd1/0x640
[ 26.437017] ? __virt_addr_valid+0x1db/0x2d0
[ 26.437039] ? kasan_atomics_helper+0x4012/0x59f0
[ 26.437062] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.437084] ? kasan_atomics_helper+0x4012/0x59f0
[ 26.437107] kasan_report+0x144/0x180
[ 26.437130] ? kasan_atomics_helper+0x4012/0x59f0
[ 26.437159] kasan_check_range+0x10c/0x1c0
[ 26.437183] __kasan_check_write+0x18/0x20
[ 26.437204] kasan_atomics_helper+0x4012/0x59f0
[ 26.437228] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.437251] ? kasan_save_alloc_info+0x3b/0x50
[ 26.437281] kasan_atomics+0x1dc/0x310
[ 26.437304] ? __pfx_kasan_atomics+0x10/0x10
[ 26.437329] ? __pfx_read_tsc+0x10/0x10
[ 26.437348] ? ktime_get_ts64+0x86/0x230
[ 26.437373] kunit_try_run_case+0x1a5/0x490
[ 26.437396] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.437418] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.437441] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.437465] ? __kthread_parkme+0x82/0x180
[ 26.437488] ? preempt_count_sub+0x50/0x80
[ 26.437515] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.437539] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.437565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.437591] kthread+0x337/0x6f0
[ 26.437610] ? trace_preempt_on+0x20/0xc0
[ 26.437632] ? __pfx_kthread+0x10/0x10
[ 26.437652] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.437675] ? calculate_sigpending+0x7b/0xa0
[ 26.437697] ? __pfx_kthread+0x10/0x10
[ 26.437718] ret_from_fork+0x1c5/0x240
[ 26.437740] ? __pfx_kthread+0x10/0x10
[ 26.437760] ret_from_fork_asm+0x1a/0x30
[ 26.437802] </TASK>
[ 26.437815]
[ 26.444634] Allocated by task 323:
[ 26.444819] kasan_save_stack+0x45/0x70
[ 26.445014] kasan_save_track+0x18/0x40
[ 26.445201] kasan_save_alloc_info+0x3b/0x50
[ 26.445384] __kasan_kmalloc+0xb7/0xc0
[ 26.445624] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.445785] kasan_atomics+0x95/0x310
[ 26.446073] kunit_try_run_case+0x1a5/0x490
[ 26.446275] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.446500] kthread+0x337/0x6f0
[ 26.446640] ret_from_fork+0x1c5/0x240
[ 26.446801] ret_from_fork_asm+0x1a/0x30
[ 26.446974]
[ 26.447057] The buggy address belongs to the object at ffff888105db2a00
[ 26.447057] which belongs to the cache kmalloc-64 of size 64
[ 26.447505] The buggy address is located 0 bytes to the right of
[ 26.447505] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.447994]
[ 26.448089] The buggy address belongs to the physical page:
[ 26.448319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.448629] flags: 0x200000000000000(node=0|zone=2)
[ 26.448818] page_type: f5(slab)
[ 26.448934] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.449161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.449382] page dumped because: kasan: bad access detected
[ 26.449547]
[ 26.449613] Memory state around the buggy address:
[ 26.449893] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.450219] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.450530] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.450852] ^
[ 26.451075] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.451372] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.451582] ==================================================================
---
[ 26.149527] ==================================================================
[ 26.149831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32ab/0x59f0
[ 26.150074] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.150303]
[ 26.150380] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.150427] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.150440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.150460] Call Trace:
[ 26.150476] <TASK>
[ 26.150492] dump_stack_lvl+0x73/0xb0
[ 26.150519] print_report+0xd1/0x640
[ 26.150542] ? __virt_addr_valid+0x1db/0x2d0
[ 26.150576] ? kasan_atomics_helper+0x32ab/0x59f0
[ 26.150599] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.150622] ? kasan_atomics_helper+0x32ab/0x59f0
[ 26.150656] kasan_report+0x144/0x180
[ 26.150679] ? kasan_atomics_helper+0x32ab/0x59f0
[ 26.150706] kasan_check_range+0x10c/0x1c0
[ 26.150731] __kasan_check_write+0x18/0x20
[ 26.150752] kasan_atomics_helper+0x32ab/0x59f0
[ 26.150785] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.150809] ? kasan_save_alloc_info+0x3b/0x50
[ 26.150839] kasan_atomics+0x1dc/0x310
[ 26.150881] ? __pfx_kasan_atomics+0x10/0x10
[ 26.150907] ? __pfx_read_tsc+0x10/0x10
[ 26.150927] ? ktime_get_ts64+0x86/0x230
[ 26.150951] kunit_try_run_case+0x1a5/0x490
[ 26.150974] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.150996] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.151020] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.151044] ? __kthread_parkme+0x82/0x180
[ 26.151067] ? preempt_count_sub+0x50/0x80
[ 26.151092] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.151116] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.151144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.151171] kthread+0x337/0x6f0
[ 26.151190] ? trace_preempt_on+0x20/0xc0
[ 26.151212] ? __pfx_kthread+0x10/0x10
[ 26.151232] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.151254] ? calculate_sigpending+0x7b/0xa0
[ 26.151278] ? __pfx_kthread+0x10/0x10
[ 26.151299] ret_from_fork+0x1c5/0x240
[ 26.151321] ? __pfx_kthread+0x10/0x10
[ 26.151341] ret_from_fork_asm+0x1a/0x30
[ 26.151373] </TASK>
[ 26.151386]
[ 26.158530] Allocated by task 323:
[ 26.158722] kasan_save_stack+0x45/0x70
[ 26.158920] kasan_save_track+0x18/0x40
[ 26.159117] kasan_save_alloc_info+0x3b/0x50
[ 26.159322] __kasan_kmalloc+0xb7/0xc0
[ 26.159519] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.159740] kasan_atomics+0x95/0x310
[ 26.159970] kunit_try_run_case+0x1a5/0x490
[ 26.160185] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.160427] kthread+0x337/0x6f0
[ 26.160595] ret_from_fork+0x1c5/0x240
[ 26.160799] ret_from_fork_asm+0x1a/0x30
[ 26.160997]
[ 26.161084] The buggy address belongs to the object at ffff888105db2a00
[ 26.161084] which belongs to the cache kmalloc-64 of size 64
[ 26.161568] The buggy address is located 0 bytes to the right of
[ 26.161568] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.161990]
[ 26.162069] The buggy address belongs to the physical page:
[ 26.162267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.162529] flags: 0x200000000000000(node=0|zone=2)
[ 26.162706] page_type: f5(slab)
[ 26.162844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.163203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.163524] page dumped because: kasan: bad access detected
[ 26.163769]
[ 26.163893] Memory state around the buggy address:
[ 26.164106] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.164410] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.164715] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.165049] ^
[ 26.165263] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.165566] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.165792] ==================================================================
---
[ 25.426767] ==================================================================
[ 25.427113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1451/0x59f0
[ 25.427522] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.427919]
[ 25.428033] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.428104] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.428119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.428155] Call Trace:
[ 25.428171] <TASK>
[ 25.428186] dump_stack_lvl+0x73/0xb0
[ 25.428215] print_report+0xd1/0x640
[ 25.428239] ? __virt_addr_valid+0x1db/0x2d0
[ 25.428261] ? kasan_atomics_helper+0x1451/0x59f0
[ 25.428283] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.428306] ? kasan_atomics_helper+0x1451/0x59f0
[ 25.428329] kasan_report+0x144/0x180
[ 25.428707] ? kasan_atomics_helper+0x1451/0x59f0
[ 25.428736] kasan_check_range+0x10c/0x1c0
[ 25.428760] __kasan_check_write+0x18/0x20
[ 25.428793] kasan_atomics_helper+0x1451/0x59f0
[ 25.428817] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.428841] ? kasan_save_alloc_info+0x3b/0x50
[ 25.428870] kasan_atomics+0x1dc/0x310
[ 25.428894] ? __pfx_kasan_atomics+0x10/0x10
[ 25.429148] ? __pfx_read_tsc+0x10/0x10
[ 25.429175] ? ktime_get_ts64+0x86/0x230
[ 25.429199] kunit_try_run_case+0x1a5/0x490
[ 25.429224] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.429247] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.429271] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.429295] ? __kthread_parkme+0x82/0x180
[ 25.429318] ? preempt_count_sub+0x50/0x80
[ 25.429345] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.429369] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.429396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.429423] kthread+0x337/0x6f0
[ 25.429442] ? trace_preempt_on+0x20/0xc0
[ 25.429465] ? __pfx_kthread+0x10/0x10
[ 25.429486] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.429507] ? calculate_sigpending+0x7b/0xa0
[ 25.429529] ? __pfx_kthread+0x10/0x10
[ 25.429551] ret_from_fork+0x1c5/0x240
[ 25.429572] ? __pfx_kthread+0x10/0x10
[ 25.429592] ret_from_fork_asm+0x1a/0x30
[ 25.429626] </TASK>
[ 25.429638]
[ 25.439173] Allocated by task 323:
[ 25.439404] kasan_save_stack+0x45/0x70
[ 25.439590] kasan_save_track+0x18/0x40
[ 25.439806] kasan_save_alloc_info+0x3b/0x50
[ 25.440003] __kasan_kmalloc+0xb7/0xc0
[ 25.440226] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.440436] kasan_atomics+0x95/0x310
[ 25.440615] kunit_try_run_case+0x1a5/0x490
[ 25.440821] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.441345] kthread+0x337/0x6f0
[ 25.441481] ret_from_fork+0x1c5/0x240
[ 25.441640] ret_from_fork_asm+0x1a/0x30
[ 25.441850]
[ 25.441982] The buggy address belongs to the object at ffff888105db2a00
[ 25.441982] which belongs to the cache kmalloc-64 of size 64
[ 25.442758] The buggy address is located 0 bytes to the right of
[ 25.442758] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.443385]
[ 25.443458] The buggy address belongs to the physical page:
[ 25.443738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.444113] flags: 0x200000000000000(node=0|zone=2)
[ 25.444448] page_type: f5(slab)
[ 25.444659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.445066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.445592] page dumped because: kasan: bad access detected
[ 25.445861]
[ 25.445964] Memory state around the buggy address:
[ 25.446318] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.446620] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.446932] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.447311] ^
[ 25.447559] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.447878] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.448125] ==================================================================
---
[ 25.675397] ==================================================================
[ 25.675724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f1b/0x59f0
[ 25.676235] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.676483]
[ 25.676565] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.676613] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.676627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.676648] Call Trace:
[ 25.676664] <TASK>
[ 25.676679] dump_stack_lvl+0x73/0xb0
[ 25.676707] print_report+0xd1/0x640
[ 25.676731] ? __virt_addr_valid+0x1db/0x2d0
[ 25.676754] ? kasan_atomics_helper+0x1f1b/0x59f0
[ 25.676790] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.677201] ? kasan_atomics_helper+0x1f1b/0x59f0
[ 25.677226] kasan_report+0x144/0x180
[ 25.677250] ? kasan_atomics_helper+0x1f1b/0x59f0
[ 25.677277] kasan_check_range+0x10c/0x1c0
[ 25.677302] __kasan_check_write+0x18/0x20
[ 25.677323] kasan_atomics_helper+0x1f1b/0x59f0
[ 25.677346] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.677370] ? kasan_save_alloc_info+0x3b/0x50
[ 25.677399] kasan_atomics+0x1dc/0x310
[ 25.677424] ? __pfx_kasan_atomics+0x10/0x10
[ 25.677450] ? __pfx_read_tsc+0x10/0x10
[ 25.677470] ? ktime_get_ts64+0x86/0x230
[ 25.677494] kunit_try_run_case+0x1a5/0x490
[ 25.677517] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.677540] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.677563] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.677587] ? __kthread_parkme+0x82/0x180
[ 25.677611] ? preempt_count_sub+0x50/0x80
[ 25.677637] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.677661] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.677688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.677714] kthread+0x337/0x6f0
[ 25.677733] ? trace_preempt_on+0x20/0xc0
[ 25.677757] ? __pfx_kthread+0x10/0x10
[ 25.677788] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.677810] ? calculate_sigpending+0x7b/0xa0
[ 25.677833] ? __pfx_kthread+0x10/0x10
[ 25.677855] ret_from_fork+0x1c5/0x240
[ 25.677876] ? __pfx_kthread+0x10/0x10
[ 25.677896] ret_from_fork_asm+0x1a/0x30
[ 25.677929] </TASK>
[ 25.677941]
[ 25.687802] Allocated by task 323:
[ 25.688067] kasan_save_stack+0x45/0x70
[ 25.688737] kasan_save_track+0x18/0x40
[ 25.688950] kasan_save_alloc_info+0x3b/0x50
[ 25.689351] __kasan_kmalloc+0xb7/0xc0
[ 25.689661] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.690043] kasan_atomics+0x95/0x310
[ 25.690184] kunit_try_run_case+0x1a5/0x490
[ 25.690664] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.690914] kthread+0x337/0x6f0
[ 25.691150] ret_from_fork+0x1c5/0x240
[ 25.691330] ret_from_fork_asm+0x1a/0x30
[ 25.691870]
[ 25.692059] The buggy address belongs to the object at ffff888105db2a00
[ 25.692059] which belongs to the cache kmalloc-64 of size 64
[ 25.692993] The buggy address is located 0 bytes to the right of
[ 25.692993] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.693878]
[ 25.694054] The buggy address belongs to the physical page:
[ 25.694314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.694853] flags: 0x200000000000000(node=0|zone=2)
[ 25.695191] page_type: f5(slab)
[ 25.695507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.695984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.696473] page dumped because: kasan: bad access detected
[ 25.696660]
[ 25.696845] Memory state around the buggy address:
[ 25.697357] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.697621] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.698154] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.698436] ^
[ 25.698636] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.699122] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.699516] ==================================================================
---
[ 26.401918] ==================================================================
[ 26.402404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ead/0x59f0
[ 26.402740] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.403354]
[ 26.403457] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.403506] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.403519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.403539] Call Trace:
[ 26.403554] <TASK>
[ 26.403570] dump_stack_lvl+0x73/0xb0
[ 26.403596] print_report+0xd1/0x640
[ 26.403619] ? __virt_addr_valid+0x1db/0x2d0
[ 26.403641] ? kasan_atomics_helper+0x3ead/0x59f0
[ 26.403669] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.403692] ? kasan_atomics_helper+0x3ead/0x59f0
[ 26.403715] kasan_report+0x144/0x180
[ 26.403737] ? kasan_atomics_helper+0x3ead/0x59f0
[ 26.403765] kasan_check_range+0x10c/0x1c0
[ 26.403799] __kasan_check_write+0x18/0x20
[ 26.403820] kasan_atomics_helper+0x3ead/0x59f0
[ 26.403845] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.403884] ? kasan_save_alloc_info+0x3b/0x50
[ 26.403914] kasan_atomics+0x1dc/0x310
[ 26.403937] ? __pfx_kasan_atomics+0x10/0x10
[ 26.403963] ? __pfx_read_tsc+0x10/0x10
[ 26.403983] ? ktime_get_ts64+0x86/0x230
[ 26.404007] kunit_try_run_case+0x1a5/0x490
[ 26.404030] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.404052] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.404075] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.404098] ? __kthread_parkme+0x82/0x180
[ 26.404121] ? preempt_count_sub+0x50/0x80
[ 26.404148] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.404171] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.404198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.404224] kthread+0x337/0x6f0
[ 26.404243] ? trace_preempt_on+0x20/0xc0
[ 26.404265] ? __pfx_kthread+0x10/0x10
[ 26.404285] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.404307] ? calculate_sigpending+0x7b/0xa0
[ 26.404329] ? __pfx_kthread+0x10/0x10
[ 26.404350] ret_from_fork+0x1c5/0x240
[ 26.404372] ? __pfx_kthread+0x10/0x10
[ 26.404393] ret_from_fork_asm+0x1a/0x30
[ 26.404425] </TASK>
[ 26.404436]
[ 26.411510] Allocated by task 323:
[ 26.411663] kasan_save_stack+0x45/0x70
[ 26.411855] kasan_save_track+0x18/0x40
[ 26.412016] kasan_save_alloc_info+0x3b/0x50
[ 26.412197] __kasan_kmalloc+0xb7/0xc0
[ 26.412360] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.412557] kasan_atomics+0x95/0x310
[ 26.412724] kunit_try_run_case+0x1a5/0x490
[ 26.412954] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.413186] kthread+0x337/0x6f0
[ 26.413327] ret_from_fork+0x1c5/0x240
[ 26.413511] ret_from_fork_asm+0x1a/0x30
[ 26.413677]
[ 26.413749] The buggy address belongs to the object at ffff888105db2a00
[ 26.413749] which belongs to the cache kmalloc-64 of size 64
[ 26.414357] The buggy address is located 0 bytes to the right of
[ 26.414357] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.414834]
[ 26.414931] The buggy address belongs to the physical page:
[ 26.415145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.415442] flags: 0x200000000000000(node=0|zone=2)
[ 26.415639] page_type: f5(slab)
[ 26.415788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.416173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.416397] page dumped because: kasan: bad access detected
[ 26.416565]
[ 26.416629] Memory state around the buggy address:
[ 26.416790] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.417000] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.417211] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.417418] ^
[ 26.417568] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.417814] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.418168] ==================================================================
---
[ 25.468513] ==================================================================
[ 25.468982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1741/0x59f0
[ 25.469546] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.469900]
[ 25.470023] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.470318] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.470338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.470361] Call Trace:
[ 25.470378] <TASK>
[ 25.470394] dump_stack_lvl+0x73/0xb0
[ 25.470425] print_report+0xd1/0x640
[ 25.470449] ? __virt_addr_valid+0x1db/0x2d0
[ 25.470471] ? kasan_atomics_helper+0x1741/0x59f0
[ 25.470495] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.470520] ? kasan_atomics_helper+0x1741/0x59f0
[ 25.470543] kasan_report+0x144/0x180
[ 25.470566] ? kasan_atomics_helper+0x1741/0x59f0
[ 25.470594] kasan_check_range+0x10c/0x1c0
[ 25.470619] __kasan_check_write+0x18/0x20
[ 25.470639] kasan_atomics_helper+0x1741/0x59f0
[ 25.470663] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.470687] ? kasan_save_alloc_info+0x3b/0x50
[ 25.470717] kasan_atomics+0x1dc/0x310
[ 25.470742] ? __pfx_kasan_atomics+0x10/0x10
[ 25.470767] ? __pfx_read_tsc+0x10/0x10
[ 25.470799] ? ktime_get_ts64+0x86/0x230
[ 25.470825] kunit_try_run_case+0x1a5/0x490
[ 25.470849] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.470882] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.470906] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.470929] ? __kthread_parkme+0x82/0x180
[ 25.470954] ? preempt_count_sub+0x50/0x80
[ 25.470980] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.471004] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.471051] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.471091] kthread+0x337/0x6f0
[ 25.471111] ? trace_preempt_on+0x20/0xc0
[ 25.471400] ? __pfx_kthread+0x10/0x10
[ 25.471435] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.471459] ? calculate_sigpending+0x7b/0xa0
[ 25.471483] ? __pfx_kthread+0x10/0x10
[ 25.471505] ret_from_fork+0x1c5/0x240
[ 25.471528] ? __pfx_kthread+0x10/0x10
[ 25.471550] ret_from_fork_asm+0x1a/0x30
[ 25.471584] </TASK>
[ 25.471597]
[ 25.480324] Allocated by task 323:
[ 25.480508] kasan_save_stack+0x45/0x70
[ 25.480731] kasan_save_track+0x18/0x40
[ 25.480971] kasan_save_alloc_info+0x3b/0x50
[ 25.481233] __kasan_kmalloc+0xb7/0xc0
[ 25.481445] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.481661] kasan_atomics+0x95/0x310
[ 25.481836] kunit_try_run_case+0x1a5/0x490
[ 25.482043] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.482391] kthread+0x337/0x6f0
[ 25.482547] ret_from_fork+0x1c5/0x240
[ 25.482720] ret_from_fork_asm+0x1a/0x30
[ 25.482869]
[ 25.482962] The buggy address belongs to the object at ffff888105db2a00
[ 25.482962] which belongs to the cache kmalloc-64 of size 64
[ 25.483804] The buggy address is located 0 bytes to the right of
[ 25.483804] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.484341]
[ 25.484467] The buggy address belongs to the physical page:
[ 25.484833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.485198] flags: 0x200000000000000(node=0|zone=2)
[ 25.485427] page_type: f5(slab)
[ 25.485590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.486131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.486521] page dumped because: kasan: bad access detected
[ 25.486769]
[ 25.486869] Memory state around the buggy address:
[ 25.487053] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.487710] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.488027] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.488238] ^
[ 25.488390] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.488622] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.488968] ==================================================================
---
[ 25.626335] ==================================================================
[ 25.626620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1da8/0x59f0
[ 25.626968] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.627560]
[ 25.627680] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.627885] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.627928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.628008] Call Trace:
[ 25.628024] <TASK>
[ 25.628040] dump_stack_lvl+0x73/0xb0
[ 25.628070] print_report+0xd1/0x640
[ 25.628204] ? __virt_addr_valid+0x1db/0x2d0
[ 25.628228] ? kasan_atomics_helper+0x1da8/0x59f0
[ 25.628252] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.628275] ? kasan_atomics_helper+0x1da8/0x59f0
[ 25.628298] kasan_report+0x144/0x180
[ 25.628342] ? kasan_atomics_helper+0x1da8/0x59f0
[ 25.628384] kasan_check_range+0x10c/0x1c0
[ 25.628534] __kasan_check_write+0x18/0x20
[ 25.628560] kasan_atomics_helper+0x1da8/0x59f0
[ 25.628585] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.628609] ? kasan_save_alloc_info+0x3b/0x50
[ 25.628639] kasan_atomics+0x1dc/0x310
[ 25.628662] ? __pfx_kasan_atomics+0x10/0x10
[ 25.628687] ? __pfx_read_tsc+0x10/0x10
[ 25.628708] ? ktime_get_ts64+0x86/0x230
[ 25.628732] kunit_try_run_case+0x1a5/0x490
[ 25.628756] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.628788] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.628811] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.628835] ? __kthread_parkme+0x82/0x180
[ 25.628858] ? preempt_count_sub+0x50/0x80
[ 25.628885] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.628908] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.628934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.628961] kthread+0x337/0x6f0
[ 25.628980] ? trace_preempt_on+0x20/0xc0
[ 25.629003] ? __pfx_kthread+0x10/0x10
[ 25.629023] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.629045] ? calculate_sigpending+0x7b/0xa0
[ 25.629068] ? __pfx_kthread+0x10/0x10
[ 25.629089] ret_from_fork+0x1c5/0x240
[ 25.629111] ? __pfx_kthread+0x10/0x10
[ 25.629131] ret_from_fork_asm+0x1a/0x30
[ 25.629164] </TASK>
[ 25.629175]
[ 25.640533] Allocated by task 323:
[ 25.640694] kasan_save_stack+0x45/0x70
[ 25.640981] kasan_save_track+0x18/0x40
[ 25.641169] kasan_save_alloc_info+0x3b/0x50
[ 25.641835] __kasan_kmalloc+0xb7/0xc0
[ 25.642033] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.642382] kasan_atomics+0x95/0x310
[ 25.642543] kunit_try_run_case+0x1a5/0x490
[ 25.642893] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.643356] kthread+0x337/0x6f0
[ 25.643701] ret_from_fork+0x1c5/0x240
[ 25.643978] ret_from_fork_asm+0x1a/0x30
[ 25.644333]
[ 25.644433] The buggy address belongs to the object at ffff888105db2a00
[ 25.644433] which belongs to the cache kmalloc-64 of size 64
[ 25.645160] The buggy address is located 0 bytes to the right of
[ 25.645160] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.646002]
[ 25.646109] The buggy address belongs to the physical page:
[ 25.646569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.646961] flags: 0x200000000000000(node=0|zone=2)
[ 25.647174] page_type: f5(slab)
[ 25.647366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.648148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.648617] page dumped because: kasan: bad access detected
[ 25.648885]
[ 25.648979] Memory state around the buggy address:
[ 25.649602] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.649935] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.650305] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.650837] ^
[ 25.651128] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.651494] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.651911] ==================================================================
---
[ 25.298659] ==================================================================
[ 25.299663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xce9/0x59f0
[ 25.300282] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.301174]
[ 25.301279] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.301330] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.301343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.301366] Call Trace:
[ 25.301381] <TASK>
[ 25.301399] dump_stack_lvl+0x73/0xb0
[ 25.301430] print_report+0xd1/0x640
[ 25.301454] ? __virt_addr_valid+0x1db/0x2d0
[ 25.301476] ? kasan_atomics_helper+0xce9/0x59f0
[ 25.301499] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.301523] ? kasan_atomics_helper+0xce9/0x59f0
[ 25.301545] kasan_report+0x144/0x180
[ 25.301568] ? kasan_atomics_helper+0xce9/0x59f0
[ 25.301596] kasan_check_range+0x10c/0x1c0
[ 25.301622] __kasan_check_write+0x18/0x20
[ 25.301642] kasan_atomics_helper+0xce9/0x59f0
[ 25.301666] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.301690] ? kasan_save_alloc_info+0x3b/0x50
[ 25.301720] kasan_atomics+0x1dc/0x310
[ 25.301744] ? __pfx_kasan_atomics+0x10/0x10
[ 25.301769] ? __pfx_read_tsc+0x10/0x10
[ 25.301803] ? ktime_get_ts64+0x86/0x230
[ 25.301827] kunit_try_run_case+0x1a5/0x490
[ 25.301852] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.301875] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.301898] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.302092] ? __kthread_parkme+0x82/0x180
[ 25.302122] ? preempt_count_sub+0x50/0x80
[ 25.302149] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.302174] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.302202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.302230] kthread+0x337/0x6f0
[ 25.302249] ? trace_preempt_on+0x20/0xc0
[ 25.302273] ? __pfx_kthread+0x10/0x10
[ 25.302293] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.302315] ? calculate_sigpending+0x7b/0xa0
[ 25.302339] ? __pfx_kthread+0x10/0x10
[ 25.302360] ret_from_fork+0x1c5/0x240
[ 25.302382] ? __pfx_kthread+0x10/0x10
[ 25.302403] ret_from_fork_asm+0x1a/0x30
[ 25.302436] </TASK>
[ 25.302450]
[ 25.313444] Allocated by task 323:
[ 25.313623] kasan_save_stack+0x45/0x70
[ 25.313832] kasan_save_track+0x18/0x40
[ 25.314462] kasan_save_alloc_info+0x3b/0x50
[ 25.314658] __kasan_kmalloc+0xb7/0xc0
[ 25.315050] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.315483] kasan_atomics+0x95/0x310
[ 25.315660] kunit_try_run_case+0x1a5/0x490
[ 25.316084] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.316587] kthread+0x337/0x6f0
[ 25.316737] ret_from_fork+0x1c5/0x240
[ 25.317146] ret_from_fork_asm+0x1a/0x30
[ 25.317351]
[ 25.317439] The buggy address belongs to the object at ffff888105db2a00
[ 25.317439] which belongs to the cache kmalloc-64 of size 64
[ 25.318428] The buggy address is located 0 bytes to the right of
[ 25.318428] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.319280]
[ 25.319486] The buggy address belongs to the physical page:
[ 25.319839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.320342] flags: 0x200000000000000(node=0|zone=2)
[ 25.320765] page_type: f5(slab)
[ 25.320985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.321477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.321837] page dumped because: kasan: bad access detected
[ 25.322255]
[ 25.322329] Memory state around the buggy address:
[ 25.322551] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.322789] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.323349] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.323608] ^
[ 25.324040] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.324390] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.324792] ==================================================================
---
[ 26.285942] ==================================================================
[ 26.286310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3aa6/0x59f0
[ 26.286544] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.286852]
[ 26.286956] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.287005] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.287018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.287041] Call Trace:
[ 26.287058] <TASK>
[ 26.287075] dump_stack_lvl+0x73/0xb0
[ 26.287105] print_report+0xd1/0x640
[ 26.287132] ? __virt_addr_valid+0x1db/0x2d0
[ 26.287155] ? kasan_atomics_helper+0x3aa6/0x59f0
[ 26.287178] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.287201] ? kasan_atomics_helper+0x3aa6/0x59f0
[ 26.287224] kasan_report+0x144/0x180
[ 26.287248] ? kasan_atomics_helper+0x3aa6/0x59f0
[ 26.287276] kasan_check_range+0x10c/0x1c0
[ 26.287302] __kasan_check_write+0x18/0x20
[ 26.287323] kasan_atomics_helper+0x3aa6/0x59f0
[ 26.287347] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.287370] ? kasan_save_alloc_info+0x3b/0x50
[ 26.287425] kasan_atomics+0x1dc/0x310
[ 26.287450] ? __pfx_kasan_atomics+0x10/0x10
[ 26.287475] ? __pfx_read_tsc+0x10/0x10
[ 26.287497] ? ktime_get_ts64+0x86/0x230
[ 26.287522] kunit_try_run_case+0x1a5/0x490
[ 26.287546] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.287569] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.287593] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.287616] ? __kthread_parkme+0x82/0x180
[ 26.287641] ? preempt_count_sub+0x50/0x80
[ 26.287680] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.287707] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.287736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.287763] kthread+0x337/0x6f0
[ 26.287792] ? trace_preempt_on+0x20/0xc0
[ 26.287815] ? __pfx_kthread+0x10/0x10
[ 26.287837] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.287860] ? calculate_sigpending+0x7b/0xa0
[ 26.287897] ? __pfx_kthread+0x10/0x10
[ 26.287919] ret_from_fork+0x1c5/0x240
[ 26.287941] ? __pfx_kthread+0x10/0x10
[ 26.287963] ret_from_fork_asm+0x1a/0x30
[ 26.287999] </TASK>
[ 26.288013]
[ 26.304209] Allocated by task 323:
[ 26.304640] kasan_save_stack+0x45/0x70
[ 26.305058] kasan_save_track+0x18/0x40
[ 26.305202] kasan_save_alloc_info+0x3b/0x50
[ 26.305348] __kasan_kmalloc+0xb7/0xc0
[ 26.305472] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.305626] kasan_atomics+0x95/0x310
[ 26.305755] kunit_try_run_case+0x1a5/0x490
[ 26.305983] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.306563] kthread+0x337/0x6f0
[ 26.306893] ret_from_fork+0x1c5/0x240
[ 26.307106] ret_from_fork_asm+0x1a/0x30
[ 26.307413]
[ 26.307492] The buggy address belongs to the object at ffff888105db2a00
[ 26.307492] which belongs to the cache kmalloc-64 of size 64
[ 26.308293] The buggy address is located 0 bytes to the right of
[ 26.308293] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.309051]
[ 26.309168] The buggy address belongs to the physical page:
[ 26.309456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.309800] flags: 0x200000000000000(node=0|zone=2)
[ 26.310049] page_type: f5(slab)
[ 26.310215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.310558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.311314] page dumped because: kasan: bad access detected
[ 26.311663]
[ 26.311768] Memory state around the buggy address:
[ 26.312149] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.312568] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.313001] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.313282] ^
[ 26.313592] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.314025] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.314401] ==================================================================
---
[ 26.017261] ==================================================================
[ 26.017604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2a06/0x59f0
[ 26.017917] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.018312]
[ 26.018496] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.018580] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.018595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.018617] Call Trace:
[ 26.018634] <TASK>
[ 26.018648] dump_stack_lvl+0x73/0xb0
[ 26.018675] print_report+0xd1/0x640
[ 26.018699] ? __virt_addr_valid+0x1db/0x2d0
[ 26.018754] ? kasan_atomics_helper+0x2a06/0x59f0
[ 26.018788] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.018811] ? kasan_atomics_helper+0x2a06/0x59f0
[ 26.018834] kasan_report+0x144/0x180
[ 26.018857] ? kasan_atomics_helper+0x2a06/0x59f0
[ 26.018924] kasan_check_range+0x10c/0x1c0
[ 26.018950] __kasan_check_write+0x18/0x20
[ 26.018970] kasan_atomics_helper+0x2a06/0x59f0
[ 26.018994] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.019018] ? kasan_save_alloc_info+0x3b/0x50
[ 26.019049] kasan_atomics+0x1dc/0x310
[ 26.019104] ? __pfx_kasan_atomics+0x10/0x10
[ 26.019130] ? __pfx_read_tsc+0x10/0x10
[ 26.019149] ? ktime_get_ts64+0x86/0x230
[ 26.019174] kunit_try_run_case+0x1a5/0x490
[ 26.019199] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.019252] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.019276] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.019299] ? __kthread_parkme+0x82/0x180
[ 26.019324] ? preempt_count_sub+0x50/0x80
[ 26.019350] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.019404] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.019433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.019460] kthread+0x337/0x6f0
[ 26.019479] ? trace_preempt_on+0x20/0xc0
[ 26.019502] ? __pfx_kthread+0x10/0x10
[ 26.019522] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.019576] ? calculate_sigpending+0x7b/0xa0
[ 26.019599] ? __pfx_kthread+0x10/0x10
[ 26.019620] ret_from_fork+0x1c5/0x240
[ 26.019642] ? __pfx_kthread+0x10/0x10
[ 26.019670] ret_from_fork_asm+0x1a/0x30
[ 26.019729] </TASK>
[ 26.019743]
[ 26.029375] Allocated by task 323:
[ 26.029510] kasan_save_stack+0x45/0x70
[ 26.029654] kasan_save_track+0x18/0x40
[ 26.029797] kasan_save_alloc_info+0x3b/0x50
[ 26.029943] __kasan_kmalloc+0xb7/0xc0
[ 26.030071] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.030221] kasan_atomics+0x95/0x310
[ 26.030348] kunit_try_run_case+0x1a5/0x490
[ 26.030488] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.031938] kthread+0x337/0x6f0
[ 26.032965] ret_from_fork+0x1c5/0x240
[ 26.033399] ret_from_fork_asm+0x1a/0x30
[ 26.033849]
[ 26.034167] The buggy address belongs to the object at ffff888105db2a00
[ 26.034167] which belongs to the cache kmalloc-64 of size 64
[ 26.034724] The buggy address is located 0 bytes to the right of
[ 26.034724] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.036582]
[ 26.036689] The buggy address belongs to the physical page:
[ 26.036992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.037348] flags: 0x200000000000000(node=0|zone=2)
[ 26.037577] page_type: f5(slab)
[ 26.037694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.038393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.038742] page dumped because: kasan: bad access detected
[ 26.039047]
[ 26.039191] Memory state around the buggy address:
[ 26.039470] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.039810] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.040188] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.040461] ^
[ 26.040647] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.041046] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.041320] ==================================================================
---
[ 25.325505] ==================================================================
[ 25.325757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe23/0x59f0
[ 25.326037] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.326353]
[ 25.326448] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.326496] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.326510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.326532] Call Trace:
[ 25.326549] <TASK>
[ 25.326566] dump_stack_lvl+0x73/0xb0
[ 25.326608] print_report+0xd1/0x640
[ 25.326633] ? __virt_addr_valid+0x1db/0x2d0
[ 25.326656] ? kasan_atomics_helper+0xe23/0x59f0
[ 25.326677] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.326702] ? kasan_atomics_helper+0xe23/0x59f0
[ 25.326725] kasan_report+0x144/0x180
[ 25.326748] ? kasan_atomics_helper+0xe23/0x59f0
[ 25.326785] kasan_check_range+0x10c/0x1c0
[ 25.326810] __kasan_check_write+0x18/0x20
[ 25.326831] kasan_atomics_helper+0xe23/0x59f0
[ 25.326854] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.327035] ? kasan_save_alloc_info+0x3b/0x50
[ 25.327074] kasan_atomics+0x1dc/0x310
[ 25.327100] ? __pfx_kasan_atomics+0x10/0x10
[ 25.327126] ? __pfx_read_tsc+0x10/0x10
[ 25.327202] ? ktime_get_ts64+0x86/0x230
[ 25.327229] kunit_try_run_case+0x1a5/0x490
[ 25.327254] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.327278] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.327303] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.327328] ? __kthread_parkme+0x82/0x180
[ 25.327351] ? preempt_count_sub+0x50/0x80
[ 25.327378] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.327400] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.327427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.327455] kthread+0x337/0x6f0
[ 25.327473] ? trace_preempt_on+0x20/0xc0
[ 25.327496] ? __pfx_kthread+0x10/0x10
[ 25.327516] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.327538] ? calculate_sigpending+0x7b/0xa0
[ 25.327560] ? __pfx_kthread+0x10/0x10
[ 25.327582] ret_from_fork+0x1c5/0x240
[ 25.327604] ? __pfx_kthread+0x10/0x10
[ 25.327625] ret_from_fork_asm+0x1a/0x30
[ 25.327663] </TASK>
[ 25.327676]
[ 25.335398] Allocated by task 323:
[ 25.335576] kasan_save_stack+0x45/0x70
[ 25.335763] kasan_save_track+0x18/0x40
[ 25.335969] kasan_save_alloc_info+0x3b/0x50
[ 25.336143] __kasan_kmalloc+0xb7/0xc0
[ 25.336323] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.336531] kasan_atomics+0x95/0x310
[ 25.336715] kunit_try_run_case+0x1a5/0x490
[ 25.336890] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.337130] kthread+0x337/0x6f0
[ 25.337263] ret_from_fork+0x1c5/0x240
[ 25.337427] ret_from_fork_asm+0x1a/0x30
[ 25.337588]
[ 25.337683] The buggy address belongs to the object at ffff888105db2a00
[ 25.337683] which belongs to the cache kmalloc-64 of size 64
[ 25.338452] The buggy address is located 0 bytes to the right of
[ 25.338452] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.338932]
[ 25.339001] The buggy address belongs to the physical page:
[ 25.339266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.339696] flags: 0x200000000000000(node=0|zone=2)
[ 25.339973] page_type: f5(slab)
[ 25.340182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.340486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.340795] page dumped because: kasan: bad access detected
[ 25.341015]
[ 25.341107] Memory state around the buggy address:
[ 25.341377] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.341661] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.341912] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.342119] ^
[ 25.342268] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.342478] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.342683] ==================================================================
---
[ 26.184228] ==================================================================
[ 26.184466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3588/0x59f0
[ 26.185064] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.185381]
[ 26.185542] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.185592] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.185606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.185627] Call Trace:
[ 26.185644] <TASK>
[ 26.185659] dump_stack_lvl+0x73/0xb0
[ 26.185687] print_report+0xd1/0x640
[ 26.185710] ? __virt_addr_valid+0x1db/0x2d0
[ 26.185733] ? kasan_atomics_helper+0x3588/0x59f0
[ 26.185755] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.185788] ? kasan_atomics_helper+0x3588/0x59f0
[ 26.185812] kasan_report+0x144/0x180
[ 26.185836] ? kasan_atomics_helper+0x3588/0x59f0
[ 26.185884] kasan_check_range+0x10c/0x1c0
[ 26.185910] __kasan_check_write+0x18/0x20
[ 26.185930] kasan_atomics_helper+0x3588/0x59f0
[ 26.185953] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.185978] ? kasan_save_alloc_info+0x3b/0x50
[ 26.186008] kasan_atomics+0x1dc/0x310
[ 26.186032] ? __pfx_kasan_atomics+0x10/0x10
[ 26.186057] ? __pfx_read_tsc+0x10/0x10
[ 26.186077] ? ktime_get_ts64+0x86/0x230
[ 26.186101] kunit_try_run_case+0x1a5/0x490
[ 26.186125] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.186147] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.186171] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.186194] ? __kthread_parkme+0x82/0x180
[ 26.186218] ? preempt_count_sub+0x50/0x80
[ 26.186245] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.186269] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.186295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.186323] kthread+0x337/0x6f0
[ 26.186341] ? trace_preempt_on+0x20/0xc0
[ 26.186364] ? __pfx_kthread+0x10/0x10
[ 26.186384] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.186407] ? calculate_sigpending+0x7b/0xa0
[ 26.186431] ? __pfx_kthread+0x10/0x10
[ 26.186452] ret_from_fork+0x1c5/0x240
[ 26.186474] ? __pfx_kthread+0x10/0x10
[ 26.186530] ret_from_fork_asm+0x1a/0x30
[ 26.186563] </TASK>
[ 26.186587]
[ 26.194075] Allocated by task 323:
[ 26.194201] kasan_save_stack+0x45/0x70
[ 26.194339] kasan_save_track+0x18/0x40
[ 26.194558] kasan_save_alloc_info+0x3b/0x50
[ 26.194768] __kasan_kmalloc+0xb7/0xc0
[ 26.194985] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.195201] kasan_atomics+0x95/0x310
[ 26.195383] kunit_try_run_case+0x1a5/0x490
[ 26.195582] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.195849] kthread+0x337/0x6f0
[ 26.196031] ret_from_fork+0x1c5/0x240
[ 26.196201] ret_from_fork_asm+0x1a/0x30
[ 26.196335]
[ 26.196402] The buggy address belongs to the object at ffff888105db2a00
[ 26.196402] which belongs to the cache kmalloc-64 of size 64
[ 26.196917] The buggy address is located 0 bytes to the right of
[ 26.196917] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.197491]
[ 26.197587] The buggy address belongs to the physical page:
[ 26.197970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.198290] flags: 0x200000000000000(node=0|zone=2)
[ 26.198518] page_type: f5(slab)
[ 26.198638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.198900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.199126] page dumped because: kasan: bad access detected
[ 26.199401]
[ 26.199491] Memory state around the buggy address:
[ 26.199713] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.200056] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.200366] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.200670] ^
[ 26.200918] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.201130] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.201339] ==================================================================
---
[ 26.363477] ==================================================================
[ 26.363817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3d47/0x59f0
[ 26.364351] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.364828]
[ 26.365002] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.365106] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.365122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.365146] Call Trace:
[ 26.365161] <TASK>
[ 26.365179] dump_stack_lvl+0x73/0xb0
[ 26.365211] print_report+0xd1/0x640
[ 26.365332] ? __virt_addr_valid+0x1db/0x2d0
[ 26.365357] ? kasan_atomics_helper+0x3d47/0x59f0
[ 26.365379] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.365402] ? kasan_atomics_helper+0x3d47/0x59f0
[ 26.365426] kasan_report+0x144/0x180
[ 26.365449] ? kasan_atomics_helper+0x3d47/0x59f0
[ 26.365476] kasan_check_range+0x10c/0x1c0
[ 26.365503] __kasan_check_write+0x18/0x20
[ 26.365524] kasan_atomics_helper+0x3d47/0x59f0
[ 26.365547] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.365571] ? kasan_save_alloc_info+0x3b/0x50
[ 26.365602] kasan_atomics+0x1dc/0x310
[ 26.365626] ? __pfx_kasan_atomics+0x10/0x10
[ 26.365651] ? __pfx_read_tsc+0x10/0x10
[ 26.365672] ? ktime_get_ts64+0x86/0x230
[ 26.365697] kunit_try_run_case+0x1a5/0x490
[ 26.365720] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.365742] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.365766] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.365802] ? __kthread_parkme+0x82/0x180
[ 26.365827] ? preempt_count_sub+0x50/0x80
[ 26.365854] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.365889] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.365916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.365943] kthread+0x337/0x6f0
[ 26.365963] ? trace_preempt_on+0x20/0xc0
[ 26.365985] ? __pfx_kthread+0x10/0x10
[ 26.366005] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.366028] ? calculate_sigpending+0x7b/0xa0
[ 26.366052] ? __pfx_kthread+0x10/0x10
[ 26.366074] ret_from_fork+0x1c5/0x240
[ 26.366098] ? __pfx_kthread+0x10/0x10
[ 26.366119] ret_from_fork_asm+0x1a/0x30
[ 26.366154] </TASK>
[ 26.366168]
[ 26.375104] Allocated by task 323:
[ 26.375268] kasan_save_stack+0x45/0x70
[ 26.375457] kasan_save_track+0x18/0x40
[ 26.375616] kasan_save_alloc_info+0x3b/0x50
[ 26.375809] __kasan_kmalloc+0xb7/0xc0
[ 26.375976] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.376667] kasan_atomics+0x95/0x310
[ 26.376955] kunit_try_run_case+0x1a5/0x490
[ 26.377147] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.377485] kthread+0x337/0x6f0
[ 26.377644] ret_from_fork+0x1c5/0x240
[ 26.377969] ret_from_fork_asm+0x1a/0x30
[ 26.378127]
[ 26.378370] The buggy address belongs to the object at ffff888105db2a00
[ 26.378370] which belongs to the cache kmalloc-64 of size 64
[ 26.378961] The buggy address is located 0 bytes to the right of
[ 26.378961] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.379635]
[ 26.379723] The buggy address belongs to the physical page:
[ 26.379962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.380443] flags: 0x200000000000000(node=0|zone=2)
[ 26.380659] page_type: f5(slab)
[ 26.380817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.381324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.381681] page dumped because: kasan: bad access detected
[ 26.381916]
[ 26.382022] Memory state around the buggy address:
[ 26.382338] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.382722] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.383142] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.383392] ^
[ 26.383681] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.383972] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.384439] ==================================================================
---
[ 25.517627] ==================================================================
[ 25.518059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bb/0x59f0
[ 25.518876] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.519598]
[ 25.519858] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.519911] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.519926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.519949] Call Trace:
[ 25.519966] <TASK>
[ 25.519982] dump_stack_lvl+0x73/0xb0
[ 25.520014] print_report+0xd1/0x640
[ 25.520038] ? __virt_addr_valid+0x1db/0x2d0
[ 25.520062] ? kasan_atomics_helper+0x18bb/0x59f0
[ 25.520085] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.520108] ? kasan_atomics_helper+0x18bb/0x59f0
[ 25.520131] kasan_report+0x144/0x180
[ 25.520154] ? kasan_atomics_helper+0x18bb/0x59f0
[ 25.520182] kasan_check_range+0x10c/0x1c0
[ 25.520208] __kasan_check_write+0x18/0x20
[ 25.520228] kasan_atomics_helper+0x18bb/0x59f0
[ 25.520264] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.520289] ? kasan_save_alloc_info+0x3b/0x50
[ 25.520318] kasan_atomics+0x1dc/0x310
[ 25.520342] ? __pfx_kasan_atomics+0x10/0x10
[ 25.520367] ? __pfx_read_tsc+0x10/0x10
[ 25.520389] ? ktime_get_ts64+0x86/0x230
[ 25.520413] kunit_try_run_case+0x1a5/0x490
[ 25.520437] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.520460] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.520483] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.520507] ? __kthread_parkme+0x82/0x180
[ 25.520531] ? preempt_count_sub+0x50/0x80
[ 25.520558] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.520581] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.520608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.520635] kthread+0x337/0x6f0
[ 25.520654] ? trace_preempt_on+0x20/0xc0
[ 25.520678] ? __pfx_kthread+0x10/0x10
[ 25.520698] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.520720] ? calculate_sigpending+0x7b/0xa0
[ 25.520744] ? __pfx_kthread+0x10/0x10
[ 25.520766] ret_from_fork+0x1c5/0x240
[ 25.520800] ? __pfx_kthread+0x10/0x10
[ 25.520820] ret_from_fork_asm+0x1a/0x30
[ 25.520854] </TASK>
[ 25.520868]
[ 25.533674] Allocated by task 323:
[ 25.533812] kasan_save_stack+0x45/0x70
[ 25.533951] kasan_save_track+0x18/0x40
[ 25.534099] kasan_save_alloc_info+0x3b/0x50
[ 25.534304] __kasan_kmalloc+0xb7/0xc0
[ 25.534512] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.534730] kasan_atomics+0x95/0x310
[ 25.534960] kunit_try_run_case+0x1a5/0x490
[ 25.535114] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.535289] kthread+0x337/0x6f0
[ 25.535412] ret_from_fork+0x1c5/0x240
[ 25.535766] ret_from_fork_asm+0x1a/0x30
[ 25.536097]
[ 25.536176] The buggy address belongs to the object at ffff888105db2a00
[ 25.536176] which belongs to the cache kmalloc-64 of size 64
[ 25.536638] The buggy address is located 0 bytes to the right of
[ 25.536638] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.537156]
[ 25.537225] The buggy address belongs to the physical page:
[ 25.537396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.537992] flags: 0x200000000000000(node=0|zone=2)
[ 25.538200] page_type: f5(slab)
[ 25.538341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.538726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.539053] page dumped because: kasan: bad access detected
[ 25.539220]
[ 25.539285] Memory state around the buggy address:
[ 25.539436] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.540146] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.540684] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.541013] ^
[ 25.541193] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.541471] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.541808] ==================================================================
---
[ 26.132474] ==================================================================
[ 26.132909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x316c/0x59f0
[ 26.133340] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.133700]
[ 26.133811] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.133877] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.133892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.133912] Call Trace:
[ 26.133926] <TASK>
[ 26.133941] dump_stack_lvl+0x73/0xb0
[ 26.133967] print_report+0xd1/0x640
[ 26.133991] ? __virt_addr_valid+0x1db/0x2d0
[ 26.134013] ? kasan_atomics_helper+0x316c/0x59f0
[ 26.134035] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.134058] ? kasan_atomics_helper+0x316c/0x59f0
[ 26.134080] kasan_report+0x144/0x180
[ 26.134103] ? kasan_atomics_helper+0x316c/0x59f0
[ 26.134131] kasan_check_range+0x10c/0x1c0
[ 26.134155] __kasan_check_write+0x18/0x20
[ 26.134176] kasan_atomics_helper+0x316c/0x59f0
[ 26.134200] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.134224] ? kasan_save_alloc_info+0x3b/0x50
[ 26.134264] kasan_atomics+0x1dc/0x310
[ 26.134289] ? __pfx_kasan_atomics+0x10/0x10
[ 26.134313] ? __pfx_read_tsc+0x10/0x10
[ 26.134345] ? ktime_get_ts64+0x86/0x230
[ 26.134369] kunit_try_run_case+0x1a5/0x490
[ 26.134393] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.134415] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.134438] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.134462] ? __kthread_parkme+0x82/0x180
[ 26.134486] ? preempt_count_sub+0x50/0x80
[ 26.134513] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.134537] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.134564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.134592] kthread+0x337/0x6f0
[ 26.134611] ? trace_preempt_on+0x20/0xc0
[ 26.134634] ? __pfx_kthread+0x10/0x10
[ 26.134654] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.134676] ? calculate_sigpending+0x7b/0xa0
[ 26.134699] ? __pfx_kthread+0x10/0x10
[ 26.134721] ret_from_fork+0x1c5/0x240
[ 26.134743] ? __pfx_kthread+0x10/0x10
[ 26.134764] ret_from_fork_asm+0x1a/0x30
[ 26.134805] </TASK>
[ 26.134818]
[ 26.141811] Allocated by task 323:
[ 26.142015] kasan_save_stack+0x45/0x70
[ 26.142214] kasan_save_track+0x18/0x40
[ 26.142403] kasan_save_alloc_info+0x3b/0x50
[ 26.142581] __kasan_kmalloc+0xb7/0xc0
[ 26.142791] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.142963] kasan_atomics+0x95/0x310
[ 26.143088] kunit_try_run_case+0x1a5/0x490
[ 26.143225] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.143392] kthread+0x337/0x6f0
[ 26.143567] ret_from_fork+0x1c5/0x240
[ 26.143769] ret_from_fork_asm+0x1a/0x30
[ 26.143996]
[ 26.144086] The buggy address belongs to the object at ffff888105db2a00
[ 26.144086] which belongs to the cache kmalloc-64 of size 64
[ 26.144594] The buggy address is located 0 bytes to the right of
[ 26.144594] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.145069]
[ 26.145136] The buggy address belongs to the physical page:
[ 26.145331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.145681] flags: 0x200000000000000(node=0|zone=2)
[ 26.145958] page_type: f5(slab)
[ 26.146118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.146437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.146746] page dumped because: kasan: bad access detected
[ 26.147000]
[ 26.147094] Memory state around the buggy address:
[ 26.147295] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.147599] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.147933] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.148225] ^
[ 26.148412] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.148711] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.149060] ==================================================================
---
[ 25.970709] ==================================================================
[ 25.971257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x278f/0x59f0
[ 25.971610] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.972365]
[ 25.972722] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.972788] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.972803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.972936] Call Trace:
[ 25.972957] <TASK>
[ 25.972975] dump_stack_lvl+0x73/0xb0
[ 25.973006] print_report+0xd1/0x640
[ 25.973030] ? __virt_addr_valid+0x1db/0x2d0
[ 25.973053] ? kasan_atomics_helper+0x278f/0x59f0
[ 25.973076] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.973099] ? kasan_atomics_helper+0x278f/0x59f0
[ 25.973121] kasan_report+0x144/0x180
[ 25.973146] ? kasan_atomics_helper+0x278f/0x59f0
[ 25.973183] kasan_check_range+0x10c/0x1c0
[ 25.973208] __kasan_check_write+0x18/0x20
[ 25.973228] kasan_atomics_helper+0x278f/0x59f0
[ 25.973252] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.973275] ? kasan_save_alloc_info+0x3b/0x50
[ 25.973305] kasan_atomics+0x1dc/0x310
[ 25.973329] ? __pfx_kasan_atomics+0x10/0x10
[ 25.973355] ? __pfx_read_tsc+0x10/0x10
[ 25.973375] ? ktime_get_ts64+0x86/0x230
[ 25.973399] kunit_try_run_case+0x1a5/0x490
[ 25.973423] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.973445] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.973469] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.973493] ? __kthread_parkme+0x82/0x180
[ 25.973516] ? preempt_count_sub+0x50/0x80
[ 25.973542] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.973565] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.973591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.973619] kthread+0x337/0x6f0
[ 25.973638] ? trace_preempt_on+0x20/0xc0
[ 25.973661] ? __pfx_kthread+0x10/0x10
[ 25.973682] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.973705] ? calculate_sigpending+0x7b/0xa0
[ 25.973728] ? __pfx_kthread+0x10/0x10
[ 25.973749] ret_from_fork+0x1c5/0x240
[ 25.973785] ? __pfx_kthread+0x10/0x10
[ 25.973808] ret_from_fork_asm+0x1a/0x30
[ 25.973842] </TASK>
[ 25.973855]
[ 25.985023] Allocated by task 323:
[ 25.985434] kasan_save_stack+0x45/0x70
[ 25.985668] kasan_save_track+0x18/0x40
[ 25.985877] kasan_save_alloc_info+0x3b/0x50
[ 25.986064] __kasan_kmalloc+0xb7/0xc0
[ 25.986616] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.986826] kasan_atomics+0x95/0x310
[ 25.987292] kunit_try_run_case+0x1a5/0x490
[ 25.987513] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.987721] kthread+0x337/0x6f0
[ 25.988136] ret_from_fork+0x1c5/0x240
[ 25.988506] ret_from_fork_asm+0x1a/0x30
[ 25.988691]
[ 25.988799] The buggy address belongs to the object at ffff888105db2a00
[ 25.988799] which belongs to the cache kmalloc-64 of size 64
[ 25.989696] The buggy address is located 0 bytes to the right of
[ 25.989696] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.990487]
[ 25.990596] The buggy address belongs to the physical page:
[ 25.990909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.991567] flags: 0x200000000000000(node=0|zone=2)
[ 25.991753] page_type: f5(slab)
[ 25.991926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.992311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.992727] page dumped because: kasan: bad access detected
[ 25.993441]
[ 25.993622] Memory state around the buggy address:
[ 25.993976] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.994507] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.994993] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.995375] ^
[ 25.995730] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.996077] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.996370] ==================================================================
---
[ 26.041951] ==================================================================
[ 26.042353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b42/0x59f0
[ 26.042692] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.043056]
[ 26.043211] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.043265] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.043279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.043332] Call Trace:
[ 26.043348] <TASK>
[ 26.043365] dump_stack_lvl+0x73/0xb0
[ 26.043405] print_report+0xd1/0x640
[ 26.043430] ? __virt_addr_valid+0x1db/0x2d0
[ 26.043453] ? kasan_atomics_helper+0x2b42/0x59f0
[ 26.043475] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.043499] ? kasan_atomics_helper+0x2b42/0x59f0
[ 26.043521] kasan_report+0x144/0x180
[ 26.043544] ? kasan_atomics_helper+0x2b42/0x59f0
[ 26.043572] kasan_check_range+0x10c/0x1c0
[ 26.043597] __kasan_check_write+0x18/0x20
[ 26.043649] kasan_atomics_helper+0x2b42/0x59f0
[ 26.043681] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.043717] ? kasan_save_alloc_info+0x3b/0x50
[ 26.043747] kasan_atomics+0x1dc/0x310
[ 26.043771] ? __pfx_kasan_atomics+0x10/0x10
[ 26.043834] ? __pfx_read_tsc+0x10/0x10
[ 26.043879] ? ktime_get_ts64+0x86/0x230
[ 26.043933] kunit_try_run_case+0x1a5/0x490
[ 26.043969] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.044002] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.044025] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.044049] ? __kthread_parkme+0x82/0x180
[ 26.044073] ? preempt_count_sub+0x50/0x80
[ 26.044102] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.044125] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.044152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.044179] kthread+0x337/0x6f0
[ 26.044198] ? trace_preempt_on+0x20/0xc0
[ 26.044222] ? __pfx_kthread+0x10/0x10
[ 26.044242] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.044295] ? calculate_sigpending+0x7b/0xa0
[ 26.044318] ? __pfx_kthread+0x10/0x10
[ 26.044350] ret_from_fork+0x1c5/0x240
[ 26.044386] ? __pfx_kthread+0x10/0x10
[ 26.044407] ret_from_fork_asm+0x1a/0x30
[ 26.044439] </TASK>
[ 26.044452]
[ 26.051840] Allocated by task 323:
[ 26.052048] kasan_save_stack+0x45/0x70
[ 26.052259] kasan_save_track+0x18/0x40
[ 26.052445] kasan_save_alloc_info+0x3b/0x50
[ 26.052648] __kasan_kmalloc+0xb7/0xc0
[ 26.052785] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.052961] kasan_atomics+0x95/0x310
[ 26.053153] kunit_try_run_case+0x1a5/0x490
[ 26.053358] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.053700] kthread+0x337/0x6f0
[ 26.053938] ret_from_fork+0x1c5/0x240
[ 26.054116] ret_from_fork_asm+0x1a/0x30
[ 26.054337]
[ 26.054460] The buggy address belongs to the object at ffff888105db2a00
[ 26.054460] which belongs to the cache kmalloc-64 of size 64
[ 26.054979] The buggy address is located 0 bytes to the right of
[ 26.054979] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.055674]
[ 26.055745] The buggy address belongs to the physical page:
[ 26.055995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.056406] flags: 0x200000000000000(node=0|zone=2)
[ 26.056600] page_type: f5(slab)
[ 26.056717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.057034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.057379] page dumped because: kasan: bad access detected
[ 26.057624]
[ 26.057713] Memory state around the buggy address:
[ 26.057973] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.058192] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.058437] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.058753] ^
[ 26.059043] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.059406] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.059690] ==================================================================
---
[ 25.215543] ==================================================================
[ 25.215857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x936/0x59f0
[ 25.216153] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.216631]
[ 25.216751] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.216813] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.216827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.216850] Call Trace:
[ 25.216865] <TASK>
[ 25.217054] dump_stack_lvl+0x73/0xb0
[ 25.217087] print_report+0xd1/0x640
[ 25.217112] ? __virt_addr_valid+0x1db/0x2d0
[ 25.217135] ? kasan_atomics_helper+0x936/0x59f0
[ 25.217230] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.217254] ? kasan_atomics_helper+0x936/0x59f0
[ 25.217279] kasan_report+0x144/0x180
[ 25.217305] ? kasan_atomics_helper+0x936/0x59f0
[ 25.217332] kasan_check_range+0x10c/0x1c0
[ 25.217359] __kasan_check_write+0x18/0x20
[ 25.217380] kasan_atomics_helper+0x936/0x59f0
[ 25.217403] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.217427] ? kasan_save_alloc_info+0x3b/0x50
[ 25.217457] kasan_atomics+0x1dc/0x310
[ 25.217482] ? __pfx_kasan_atomics+0x10/0x10
[ 25.217508] ? __pfx_read_tsc+0x10/0x10
[ 25.217528] ? ktime_get_ts64+0x86/0x230
[ 25.217552] kunit_try_run_case+0x1a5/0x490
[ 25.217576] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.217599] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.217623] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.217646] ? __kthread_parkme+0x82/0x180
[ 25.217671] ? preempt_count_sub+0x50/0x80
[ 25.217697] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.217721] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.217748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.217786] kthread+0x337/0x6f0
[ 25.217805] ? trace_preempt_on+0x20/0xc0
[ 25.217828] ? __pfx_kthread+0x10/0x10
[ 25.217848] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.217870] ? calculate_sigpending+0x7b/0xa0
[ 25.217895] ? __pfx_kthread+0x10/0x10
[ 25.217916] ret_from_fork+0x1c5/0x240
[ 25.217937] ? __pfx_kthread+0x10/0x10
[ 25.217957] ret_from_fork_asm+0x1a/0x30
[ 25.217991] </TASK>
[ 25.218004]
[ 25.228227] Allocated by task 323:
[ 25.228484] kasan_save_stack+0x45/0x70
[ 25.228648] kasan_save_track+0x18/0x40
[ 25.228856] kasan_save_alloc_info+0x3b/0x50
[ 25.229401] __kasan_kmalloc+0xb7/0xc0
[ 25.229655] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.229831] kasan_atomics+0x95/0x310
[ 25.230176] kunit_try_run_case+0x1a5/0x490
[ 25.230402] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.230805] kthread+0x337/0x6f0
[ 25.231323] ret_from_fork+0x1c5/0x240
[ 25.231484] ret_from_fork_asm+0x1a/0x30
[ 25.231692]
[ 25.231758] The buggy address belongs to the object at ffff888105db2a00
[ 25.231758] which belongs to the cache kmalloc-64 of size 64
[ 25.232741] The buggy address is located 0 bytes to the right of
[ 25.232741] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.233849]
[ 25.233943] The buggy address belongs to the physical page:
[ 25.234289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.234654] flags: 0x200000000000000(node=0|zone=2)
[ 25.234856] page_type: f5(slab)
[ 25.235350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.235640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.236256] page dumped because: kasan: bad access detected
[ 25.236740]
[ 25.236854] Memory state around the buggy address:
[ 25.237245] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.237482] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.237820] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.238320] ^
[ 25.238623] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.239081] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.239566] ==================================================================
---
[ 25.542293] ==================================================================
[ 25.542596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19f6/0x59f0
[ 25.542867] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.543079]
[ 25.543155] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.543202] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.543215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.543237] Call Trace:
[ 25.543253] <TASK>
[ 25.543268] dump_stack_lvl+0x73/0xb0
[ 25.543295] print_report+0xd1/0x640
[ 25.543318] ? __virt_addr_valid+0x1db/0x2d0
[ 25.543340] ? kasan_atomics_helper+0x19f6/0x59f0
[ 25.543363] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.543385] ? kasan_atomics_helper+0x19f6/0x59f0
[ 25.543408] kasan_report+0x144/0x180
[ 25.543432] ? kasan_atomics_helper+0x19f6/0x59f0
[ 25.543459] kasan_check_range+0x10c/0x1c0
[ 25.543485] __kasan_check_write+0x18/0x20
[ 25.543505] kasan_atomics_helper+0x19f6/0x59f0
[ 25.543528] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.543553] ? kasan_save_alloc_info+0x3b/0x50
[ 25.543582] kasan_atomics+0x1dc/0x310
[ 25.543606] ? __pfx_kasan_atomics+0x10/0x10
[ 25.543631] ? __pfx_read_tsc+0x10/0x10
[ 25.543656] ? ktime_get_ts64+0x86/0x230
[ 25.543680] kunit_try_run_case+0x1a5/0x490
[ 25.543704] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.543726] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.543749] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.543782] ? __kthread_parkme+0x82/0x180
[ 25.543807] ? preempt_count_sub+0x50/0x80
[ 25.543833] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.543857] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.543883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.543911] kthread+0x337/0x6f0
[ 25.543930] ? trace_preempt_on+0x20/0xc0
[ 25.543953] ? __pfx_kthread+0x10/0x10
[ 25.543973] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.543995] ? calculate_sigpending+0x7b/0xa0
[ 25.544018] ? __pfx_kthread+0x10/0x10
[ 25.544061] ret_from_fork+0x1c5/0x240
[ 25.544101] ? __pfx_kthread+0x10/0x10
[ 25.544123] ret_from_fork_asm+0x1a/0x30
[ 25.544157] </TASK>
[ 25.544170]
[ 25.554425] Allocated by task 323:
[ 25.554822] kasan_save_stack+0x45/0x70
[ 25.555228] kasan_save_track+0x18/0x40
[ 25.555723] kasan_save_alloc_info+0x3b/0x50
[ 25.555895] __kasan_kmalloc+0xb7/0xc0
[ 25.556023] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.556661] kasan_atomics+0x95/0x310
[ 25.557088] kunit_try_run_case+0x1a5/0x490
[ 25.557623] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.558201] kthread+0x337/0x6f0
[ 25.558469] ret_from_fork+0x1c5/0x240
[ 25.558606] ret_from_fork_asm+0x1a/0x30
[ 25.558742]
[ 25.558896] The buggy address belongs to the object at ffff888105db2a00
[ 25.558896] which belongs to the cache kmalloc-64 of size 64
[ 25.560147] The buggy address is located 0 bytes to the right of
[ 25.560147] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.561263]
[ 25.561337] The buggy address belongs to the physical page:
[ 25.561509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.561745] flags: 0x200000000000000(node=0|zone=2)
[ 25.561919] page_type: f5(slab)
[ 25.562038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.562475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.563289] page dumped because: kasan: bad access detected
[ 25.563502]
[ 25.563609] Memory state around the buggy address:
[ 25.563805] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.564428] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.564929] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.565197] ^
[ 25.565592] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.566069] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.566866] ==================================================================
---
[ 25.725836] ==================================================================
[ 25.726100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x208c/0x59f0
[ 25.726334] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.726553]
[ 25.726636] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.726685] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.726699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.726722] Call Trace:
[ 25.726737] <TASK>
[ 25.726754] dump_stack_lvl+0x73/0xb0
[ 25.726793] print_report+0xd1/0x640
[ 25.726842] ? __virt_addr_valid+0x1db/0x2d0
[ 25.726864] ? kasan_atomics_helper+0x208c/0x59f0
[ 25.726887] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.726910] ? kasan_atomics_helper+0x208c/0x59f0
[ 25.726933] kasan_report+0x144/0x180
[ 25.726956] ? kasan_atomics_helper+0x208c/0x59f0
[ 25.726983] kasan_check_range+0x10c/0x1c0
[ 25.727007] __kasan_check_write+0x18/0x20
[ 25.727028] kasan_atomics_helper+0x208c/0x59f0
[ 25.727052] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.727076] ? kasan_save_alloc_info+0x3b/0x50
[ 25.727106] kasan_atomics+0x1dc/0x310
[ 25.727129] ? __pfx_kasan_atomics+0x10/0x10
[ 25.727202] ? __pfx_read_tsc+0x10/0x10
[ 25.727224] ? ktime_get_ts64+0x86/0x230
[ 25.727248] kunit_try_run_case+0x1a5/0x490
[ 25.727284] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.727306] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.727329] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.727353] ? __kthread_parkme+0x82/0x180
[ 25.727377] ? preempt_count_sub+0x50/0x80
[ 25.727404] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.727427] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.727454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.727481] kthread+0x337/0x6f0
[ 25.727534] ? trace_preempt_on+0x20/0xc0
[ 25.727558] ? __pfx_kthread+0x10/0x10
[ 25.727579] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.727601] ? calculate_sigpending+0x7b/0xa0
[ 25.727625] ? __pfx_kthread+0x10/0x10
[ 25.727648] ret_from_fork+0x1c5/0x240
[ 25.727676] ? __pfx_kthread+0x10/0x10
[ 25.727697] ret_from_fork_asm+0x1a/0x30
[ 25.727730] </TASK>
[ 25.727742]
[ 25.740179] Allocated by task 323:
[ 25.740307] kasan_save_stack+0x45/0x70
[ 25.740664] kasan_save_track+0x18/0x40
[ 25.741015] kasan_save_alloc_info+0x3b/0x50
[ 25.741401] __kasan_kmalloc+0xb7/0xc0
[ 25.741822] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.742249] kasan_atomics+0x95/0x310
[ 25.742609] kunit_try_run_case+0x1a5/0x490
[ 25.743041] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.743559] kthread+0x337/0x6f0
[ 25.743915] ret_from_fork+0x1c5/0x240
[ 25.744165] ret_from_fork_asm+0x1a/0x30
[ 25.744306]
[ 25.744383] The buggy address belongs to the object at ffff888105db2a00
[ 25.744383] which belongs to the cache kmalloc-64 of size 64
[ 25.744730] The buggy address is located 0 bytes to the right of
[ 25.744730] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.745571]
[ 25.745645] The buggy address belongs to the physical page:
[ 25.746008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.746305] flags: 0x200000000000000(node=0|zone=2)
[ 25.746701] page_type: f5(slab)
[ 25.747000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.747459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.747746] page dumped because: kasan: bad access detected
[ 25.748312]
[ 25.748475] Memory state around the buggy address:
[ 25.748981] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.749717] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.750402] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.751074] ^
[ 25.751592] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.752342] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.752886] ==================================================================
---
[ 25.923691] ==================================================================
[ 25.923956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2637/0x59f0
[ 25.924279] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.924559]
[ 25.924639] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.924685] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.924699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.924722] Call Trace:
[ 25.924737] <TASK>
[ 25.924753] dump_stack_lvl+0x73/0xb0
[ 25.924790] print_report+0xd1/0x640
[ 25.924813] ? __virt_addr_valid+0x1db/0x2d0
[ 25.924837] ? kasan_atomics_helper+0x2637/0x59f0
[ 25.924860] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.924883] ? kasan_atomics_helper+0x2637/0x59f0
[ 25.924905] kasan_report+0x144/0x180
[ 25.924928] ? kasan_atomics_helper+0x2637/0x59f0
[ 25.924957] kasan_check_range+0x10c/0x1c0
[ 25.924982] __kasan_check_write+0x18/0x20
[ 25.925003] kasan_atomics_helper+0x2637/0x59f0
[ 25.925027] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.925051] ? kasan_save_alloc_info+0x3b/0x50
[ 25.925081] kasan_atomics+0x1dc/0x310
[ 25.925105] ? __pfx_kasan_atomics+0x10/0x10
[ 25.925131] ? __pfx_read_tsc+0x10/0x10
[ 25.925164] ? ktime_get_ts64+0x86/0x230
[ 25.925188] kunit_try_run_case+0x1a5/0x490
[ 25.925211] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.925233] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.925256] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.925280] ? __kthread_parkme+0x82/0x180
[ 25.925304] ? preempt_count_sub+0x50/0x80
[ 25.925331] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.925355] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.925383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.925409] kthread+0x337/0x6f0
[ 25.925429] ? trace_preempt_on+0x20/0xc0
[ 25.925452] ? __pfx_kthread+0x10/0x10
[ 25.925473] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.925495] ? calculate_sigpending+0x7b/0xa0
[ 25.925518] ? __pfx_kthread+0x10/0x10
[ 25.925539] ret_from_fork+0x1c5/0x240
[ 25.925561] ? __pfx_kthread+0x10/0x10
[ 25.925583] ret_from_fork_asm+0x1a/0x30
[ 25.925616] </TASK>
[ 25.925629]
[ 25.933010] Allocated by task 323:
[ 25.933130] kasan_save_stack+0x45/0x70
[ 25.933265] kasan_save_track+0x18/0x40
[ 25.933394] kasan_save_alloc_info+0x3b/0x50
[ 25.933535] __kasan_kmalloc+0xb7/0xc0
[ 25.933842] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.934294] kasan_atomics+0x95/0x310
[ 25.934558] kunit_try_run_case+0x1a5/0x490
[ 25.934761] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.935091] kthread+0x337/0x6f0
[ 25.935209] ret_from_fork+0x1c5/0x240
[ 25.935339] ret_from_fork_asm+0x1a/0x30
[ 25.935472]
[ 25.935538] The buggy address belongs to the object at ffff888105db2a00
[ 25.935538] which belongs to the cache kmalloc-64 of size 64
[ 25.935982] The buggy address is located 0 bytes to the right of
[ 25.935982] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.936532]
[ 25.936625] The buggy address belongs to the physical page:
[ 25.937003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.937547] flags: 0x200000000000000(node=0|zone=2)
[ 25.937851] page_type: f5(slab)
[ 25.938015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.938400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.938684] page dumped because: kasan: bad access detected
[ 25.938947]
[ 25.939021] Memory state around the buggy address:
[ 25.939298] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.939584] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.939880] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.940154] ^
[ 25.940362] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.940597] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.940815] ==================================================================
---
[ 26.097090] ==================================================================
[ 26.097481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2ef3/0x59f0
[ 26.097725] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.098185]
[ 26.098330] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.098378] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.098391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.098412] Call Trace:
[ 26.098427] <TASK>
[ 26.098441] dump_stack_lvl+0x73/0xb0
[ 26.098468] print_report+0xd1/0x640
[ 26.098491] ? __virt_addr_valid+0x1db/0x2d0
[ 26.098513] ? kasan_atomics_helper+0x2ef3/0x59f0
[ 26.098535] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.098558] ? kasan_atomics_helper+0x2ef3/0x59f0
[ 26.098616] kasan_report+0x144/0x180
[ 26.098641] ? kasan_atomics_helper+0x2ef3/0x59f0
[ 26.098668] kasan_check_range+0x10c/0x1c0
[ 26.098704] __kasan_check_write+0x18/0x20
[ 26.098725] kasan_atomics_helper+0x2ef3/0x59f0
[ 26.098788] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.098813] ? kasan_save_alloc_info+0x3b/0x50
[ 26.098894] kasan_atomics+0x1dc/0x310
[ 26.098919] ? __pfx_kasan_atomics+0x10/0x10
[ 26.098944] ? __pfx_read_tsc+0x10/0x10
[ 26.098964] ? ktime_get_ts64+0x86/0x230
[ 26.098988] kunit_try_run_case+0x1a5/0x490
[ 26.099012] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.099034] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.099058] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.099112] ? __kthread_parkme+0x82/0x180
[ 26.099136] ? preempt_count_sub+0x50/0x80
[ 26.099185] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.099208] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.099235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.099262] kthread+0x337/0x6f0
[ 26.099282] ? trace_preempt_on+0x20/0xc0
[ 26.099305] ? __pfx_kthread+0x10/0x10
[ 26.099325] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.099348] ? calculate_sigpending+0x7b/0xa0
[ 26.099371] ? __pfx_kthread+0x10/0x10
[ 26.099392] ret_from_fork+0x1c5/0x240
[ 26.099414] ? __pfx_kthread+0x10/0x10
[ 26.099435] ret_from_fork_asm+0x1a/0x30
[ 26.099498] </TASK>
[ 26.099510]
[ 26.106638] Allocated by task 323:
[ 26.106762] kasan_save_stack+0x45/0x70
[ 26.106931] kasan_save_track+0x18/0x40
[ 26.107122] kasan_save_alloc_info+0x3b/0x50
[ 26.107376] __kasan_kmalloc+0xb7/0xc0
[ 26.107568] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.107849] kasan_atomics+0x95/0x310
[ 26.108062] kunit_try_run_case+0x1a5/0x490
[ 26.108267] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.108568] kthread+0x337/0x6f0
[ 26.108737] ret_from_fork+0x1c5/0x240
[ 26.108983] ret_from_fork_asm+0x1a/0x30
[ 26.109189]
[ 26.109318] The buggy address belongs to the object at ffff888105db2a00
[ 26.109318] which belongs to the cache kmalloc-64 of size 64
[ 26.109665] The buggy address is located 0 bytes to the right of
[ 26.109665] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.110361]
[ 26.110499] The buggy address belongs to the physical page:
[ 26.110812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.111064] flags: 0x200000000000000(node=0|zone=2)
[ 26.111298] page_type: f5(slab)
[ 26.111512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.111951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.112295] page dumped because: kasan: bad access detected
[ 26.112484]
[ 26.112615] Memory state around the buggy address:
[ 26.112880] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.113293] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.113511] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.113800] ^
[ 26.114092] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.114367] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.114621] ==================================================================
---
[ 25.599826] ==================================================================
[ 25.600116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c6b/0x59f0
[ 25.600783] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.601085]
[ 25.601205] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.601267] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.601281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.601306] Call Trace:
[ 25.601452] <TASK>
[ 25.601471] dump_stack_lvl+0x73/0xb0
[ 25.601596] print_report+0xd1/0x640
[ 25.601621] ? __virt_addr_valid+0x1db/0x2d0
[ 25.601651] ? kasan_atomics_helper+0x1c6b/0x59f0
[ 25.601674] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.601698] ? kasan_atomics_helper+0x1c6b/0x59f0
[ 25.601721] kasan_report+0x144/0x180
[ 25.601745] ? kasan_atomics_helper+0x1c6b/0x59f0
[ 25.601781] kasan_check_range+0x10c/0x1c0
[ 25.601806] __kasan_check_write+0x18/0x20
[ 25.601827] kasan_atomics_helper+0x1c6b/0x59f0
[ 25.601851] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.601875] ? kasan_save_alloc_info+0x3b/0x50
[ 25.601905] kasan_atomics+0x1dc/0x310
[ 25.601928] ? __pfx_kasan_atomics+0x10/0x10
[ 25.601954] ? __pfx_read_tsc+0x10/0x10
[ 25.601974] ? ktime_get_ts64+0x86/0x230
[ 25.601998] kunit_try_run_case+0x1a5/0x490
[ 25.602022] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.602044] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.602067] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.602090] ? __kthread_parkme+0x82/0x180
[ 25.602114] ? preempt_count_sub+0x50/0x80
[ 25.602140] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.602164] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.602191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.602217] kthread+0x337/0x6f0
[ 25.602237] ? trace_preempt_on+0x20/0xc0
[ 25.602259] ? __pfx_kthread+0x10/0x10
[ 25.602281] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.602303] ? calculate_sigpending+0x7b/0xa0
[ 25.602326] ? __pfx_kthread+0x10/0x10
[ 25.602347] ret_from_fork+0x1c5/0x240
[ 25.602370] ? __pfx_kthread+0x10/0x10
[ 25.602391] ret_from_fork_asm+0x1a/0x30
[ 25.602424] </TASK>
[ 25.602436]
[ 25.613848] Allocated by task 323:
[ 25.614213] kasan_save_stack+0x45/0x70
[ 25.614645] kasan_save_track+0x18/0x40
[ 25.614816] kasan_save_alloc_info+0x3b/0x50
[ 25.615197] __kasan_kmalloc+0xb7/0xc0
[ 25.615642] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.615901] kasan_atomics+0x95/0x310
[ 25.616033] kunit_try_run_case+0x1a5/0x490
[ 25.616538] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.616897] kthread+0x337/0x6f0
[ 25.617069] ret_from_fork+0x1c5/0x240
[ 25.617378] ret_from_fork_asm+0x1a/0x30
[ 25.617726]
[ 25.617839] The buggy address belongs to the object at ffff888105db2a00
[ 25.617839] which belongs to the cache kmalloc-64 of size 64
[ 25.618679] The buggy address is located 0 bytes to the right of
[ 25.618679] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.619221]
[ 25.619423] The buggy address belongs to the physical page:
[ 25.619927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.620397] flags: 0x200000000000000(node=0|zone=2)
[ 25.620587] page_type: f5(slab)
[ 25.620755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.621355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.621845] page dumped because: kasan: bad access detected
[ 25.622142]
[ 25.622495] Memory state around the buggy address:
[ 25.622665] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.622994] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.623710] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.624079] ^
[ 25.624560] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.624985] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.625444] ==================================================================
---
[ 26.060396] ==================================================================
[ 26.060807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c7d/0x59f0
[ 26.061122] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.061446]
[ 26.061626] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.061699] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.061715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.061738] Call Trace:
[ 26.061753] <TASK>
[ 26.061769] dump_stack_lvl+0x73/0xb0
[ 26.061806] print_report+0xd1/0x640
[ 26.061830] ? __virt_addr_valid+0x1db/0x2d0
[ 26.061890] ? kasan_atomics_helper+0x2c7d/0x59f0
[ 26.061915] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.061938] ? kasan_atomics_helper+0x2c7d/0x59f0
[ 26.061972] kasan_report+0x144/0x180
[ 26.061995] ? kasan_atomics_helper+0x2c7d/0x59f0
[ 26.062023] kasan_check_range+0x10c/0x1c0
[ 26.062079] __kasan_check_write+0x18/0x20
[ 26.062099] kasan_atomics_helper+0x2c7d/0x59f0
[ 26.062133] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.062157] ? kasan_save_alloc_info+0x3b/0x50
[ 26.062187] kasan_atomics+0x1dc/0x310
[ 26.062211] ? __pfx_kasan_atomics+0x10/0x10
[ 26.062237] ? __pfx_read_tsc+0x10/0x10
[ 26.062258] ? ktime_get_ts64+0x86/0x230
[ 26.062282] kunit_try_run_case+0x1a5/0x490
[ 26.062307] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.062329] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.062353] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.062379] ? __kthread_parkme+0x82/0x180
[ 26.062403] ? preempt_count_sub+0x50/0x80
[ 26.062429] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.062453] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.062480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.062507] kthread+0x337/0x6f0
[ 26.062526] ? trace_preempt_on+0x20/0xc0
[ 26.062549] ? __pfx_kthread+0x10/0x10
[ 26.062570] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.062592] ? calculate_sigpending+0x7b/0xa0
[ 26.062615] ? __pfx_kthread+0x10/0x10
[ 26.062637] ret_from_fork+0x1c5/0x240
[ 26.062659] ? __pfx_kthread+0x10/0x10
[ 26.062680] ret_from_fork_asm+0x1a/0x30
[ 26.062713] </TASK>
[ 26.062726]
[ 26.070197] Allocated by task 323:
[ 26.070346] kasan_save_stack+0x45/0x70
[ 26.070532] kasan_save_track+0x18/0x40
[ 26.070713] kasan_save_alloc_info+0x3b/0x50
[ 26.070972] __kasan_kmalloc+0xb7/0xc0
[ 26.071108] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.071269] kasan_atomics+0x95/0x310
[ 26.071436] kunit_try_run_case+0x1a5/0x490
[ 26.071590] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.071901] kthread+0x337/0x6f0
[ 26.072018] ret_from_fork+0x1c5/0x240
[ 26.072148] ret_from_fork_asm+0x1a/0x30
[ 26.072280]
[ 26.072415] The buggy address belongs to the object at ffff888105db2a00
[ 26.072415] which belongs to the cache kmalloc-64 of size 64
[ 26.072965] The buggy address is located 0 bytes to the right of
[ 26.072965] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.073495]
[ 26.073562] The buggy address belongs to the physical page:
[ 26.073731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.074061] flags: 0x200000000000000(node=0|zone=2)
[ 26.074377] page_type: f5(slab)
[ 26.074618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.075065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.075497] page dumped because: kasan: bad access detected
[ 26.075674]
[ 26.075739] Memory state around the buggy address:
[ 26.075936] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.076290] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.076624] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.077050] ^
[ 26.077377] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.077661] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.077905] ==================================================================
---
[ 26.078432] ==================================================================
[ 26.078782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2db8/0x59f0
[ 26.079247] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.079553]
[ 26.079710] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.079831] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.079848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.079894] Call Trace:
[ 26.079908] <TASK>
[ 26.079923] dump_stack_lvl+0x73/0xb0
[ 26.079951] print_report+0xd1/0x640
[ 26.079974] ? __virt_addr_valid+0x1db/0x2d0
[ 26.079996] ? kasan_atomics_helper+0x2db8/0x59f0
[ 26.080019] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.080042] ? kasan_atomics_helper+0x2db8/0x59f0
[ 26.080097] kasan_report+0x144/0x180
[ 26.080122] ? kasan_atomics_helper+0x2db8/0x59f0
[ 26.080173] kasan_check_range+0x10c/0x1c0
[ 26.080225] __kasan_check_write+0x18/0x20
[ 26.080247] kasan_atomics_helper+0x2db8/0x59f0
[ 26.080293] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.080318] ? kasan_save_alloc_info+0x3b/0x50
[ 26.080348] kasan_atomics+0x1dc/0x310
[ 26.080372] ? __pfx_kasan_atomics+0x10/0x10
[ 26.080397] ? __pfx_read_tsc+0x10/0x10
[ 26.080417] ? ktime_get_ts64+0x86/0x230
[ 26.080441] kunit_try_run_case+0x1a5/0x490
[ 26.080464] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.080487] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.080511] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.080535] ? __kthread_parkme+0x82/0x180
[ 26.080558] ? preempt_count_sub+0x50/0x80
[ 26.080585] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.080609] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.080637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.080663] kthread+0x337/0x6f0
[ 26.080683] ? trace_preempt_on+0x20/0xc0
[ 26.080707] ? __pfx_kthread+0x10/0x10
[ 26.080729] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.080753] ? calculate_sigpending+0x7b/0xa0
[ 26.080786] ? __pfx_kthread+0x10/0x10
[ 26.080836] ret_from_fork+0x1c5/0x240
[ 26.080882] ? __pfx_kthread+0x10/0x10
[ 26.080903] ret_from_fork_asm+0x1a/0x30
[ 26.080936] </TASK>
[ 26.080949]
[ 26.088716] Allocated by task 323:
[ 26.088922] kasan_save_stack+0x45/0x70
[ 26.089116] kasan_save_track+0x18/0x40
[ 26.089304] kasan_save_alloc_info+0x3b/0x50
[ 26.089482] __kasan_kmalloc+0xb7/0xc0
[ 26.089614] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.089841] kasan_atomics+0x95/0x310
[ 26.090094] kunit_try_run_case+0x1a5/0x490
[ 26.090274] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.090506] kthread+0x337/0x6f0
[ 26.090661] ret_from_fork+0x1c5/0x240
[ 26.090910] ret_from_fork_asm+0x1a/0x30
[ 26.091148]
[ 26.091242] The buggy address belongs to the object at ffff888105db2a00
[ 26.091242] which belongs to the cache kmalloc-64 of size 64
[ 26.091674] The buggy address is located 0 bytes to the right of
[ 26.091674] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.092192]
[ 26.092285] The buggy address belongs to the physical page:
[ 26.092531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.092956] flags: 0x200000000000000(node=0|zone=2)
[ 26.093118] page_type: f5(slab)
[ 26.093234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.093517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.093929] page dumped because: kasan: bad access detected
[ 26.094290]
[ 26.094426] Memory state around the buggy address:
[ 26.094742] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.095079] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.095295] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.095583] ^
[ 26.095822] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.096189] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.096507] ==================================================================
---
[ 26.316041] ==================================================================
[ 26.316471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3be1/0x59f0
[ 26.316726] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.317093]
[ 26.317374] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.317438] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.317453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.317478] Call Trace:
[ 26.317502] <TASK>
[ 26.317527] dump_stack_lvl+0x73/0xb0
[ 26.317564] print_report+0xd1/0x640
[ 26.317592] ? __virt_addr_valid+0x1db/0x2d0
[ 26.317615] ? kasan_atomics_helper+0x3be1/0x59f0
[ 26.317639] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.317663] ? kasan_atomics_helper+0x3be1/0x59f0
[ 26.317687] kasan_report+0x144/0x180
[ 26.317710] ? kasan_atomics_helper+0x3be1/0x59f0
[ 26.317738] kasan_check_range+0x10c/0x1c0
[ 26.317765] __kasan_check_write+0x18/0x20
[ 26.317795] kasan_atomics_helper+0x3be1/0x59f0
[ 26.317820] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.317844] ? kasan_save_alloc_info+0x3b/0x50
[ 26.317875] kasan_atomics+0x1dc/0x310
[ 26.317910] ? __pfx_kasan_atomics+0x10/0x10
[ 26.317936] ? __pfx_read_tsc+0x10/0x10
[ 26.317957] ? ktime_get_ts64+0x86/0x230
[ 26.317984] kunit_try_run_case+0x1a5/0x490
[ 26.318010] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.318034] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.318058] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.318082] ? __kthread_parkme+0x82/0x180
[ 26.318115] ? preempt_count_sub+0x50/0x80
[ 26.318151] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.318176] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.318207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.318235] kthread+0x337/0x6f0
[ 26.318257] ? trace_preempt_on+0x20/0xc0
[ 26.318280] ? __pfx_kthread+0x10/0x10
[ 26.318301] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.318324] ? calculate_sigpending+0x7b/0xa0
[ 26.318350] ? __pfx_kthread+0x10/0x10
[ 26.318372] ret_from_fork+0x1c5/0x240
[ 26.318395] ? __pfx_kthread+0x10/0x10
[ 26.318416] ret_from_fork_asm+0x1a/0x30
[ 26.318451] </TASK>
[ 26.318466]
[ 26.330304] Allocated by task 323:
[ 26.330641] kasan_save_stack+0x45/0x70
[ 26.331062] kasan_save_track+0x18/0x40
[ 26.331395] kasan_save_alloc_info+0x3b/0x50
[ 26.331544] __kasan_kmalloc+0xb7/0xc0
[ 26.331681] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.331844] kasan_atomics+0x95/0x310
[ 26.331994] kunit_try_run_case+0x1a5/0x490
[ 26.332206] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.332457] kthread+0x337/0x6f0
[ 26.332622] ret_from_fork+0x1c5/0x240
[ 26.332815] ret_from_fork_asm+0x1a/0x30
[ 26.333014]
[ 26.333154] The buggy address belongs to the object at ffff888105db2a00
[ 26.333154] which belongs to the cache kmalloc-64 of size 64
[ 26.333672] The buggy address is located 0 bytes to the right of
[ 26.333672] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.335077]
[ 26.335183] The buggy address belongs to the physical page:
[ 26.335399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.335741] flags: 0x200000000000000(node=0|zone=2)
[ 26.336220] page_type: f5(slab)
[ 26.336490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.336944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.337360] page dumped because: kasan: bad access detected
[ 26.337706]
[ 26.337804] Memory state around the buggy address:
[ 26.338068] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.338765] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.339279] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.339502] ^
[ 26.339665] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.339912] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.340582] ==================================================================
---
[ 26.245751] ==================================================================
[ 26.246002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3831/0x59f0
[ 26.246683] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.247273]
[ 26.247376] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.247427] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.247441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.247464] Call Trace:
[ 26.247479] <TASK>
[ 26.247496] dump_stack_lvl+0x73/0xb0
[ 26.247526] print_report+0xd1/0x640
[ 26.247550] ? __virt_addr_valid+0x1db/0x2d0
[ 26.247573] ? kasan_atomics_helper+0x3831/0x59f0
[ 26.247596] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.247620] ? kasan_atomics_helper+0x3831/0x59f0
[ 26.247642] kasan_report+0x144/0x180
[ 26.247672] ? kasan_atomics_helper+0x3831/0x59f0
[ 26.247699] kasan_check_range+0x10c/0x1c0
[ 26.247724] __kasan_check_write+0x18/0x20
[ 26.247743] kasan_atomics_helper+0x3831/0x59f0
[ 26.247768] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.247802] ? kasan_save_alloc_info+0x3b/0x50
[ 26.247831] kasan_atomics+0x1dc/0x310
[ 26.247856] ? __pfx_kasan_atomics+0x10/0x10
[ 26.247882] ? __pfx_read_tsc+0x10/0x10
[ 26.247914] ? ktime_get_ts64+0x86/0x230
[ 26.247940] kunit_try_run_case+0x1a5/0x490
[ 26.247965] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.247987] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.248011] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.248034] ? __kthread_parkme+0x82/0x180
[ 26.248058] ? preempt_count_sub+0x50/0x80
[ 26.248085] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.248108] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.248135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.248162] kthread+0x337/0x6f0
[ 26.248181] ? trace_preempt_on+0x20/0xc0
[ 26.248203] ? __pfx_kthread+0x10/0x10
[ 26.248224] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.248246] ? calculate_sigpending+0x7b/0xa0
[ 26.248268] ? __pfx_kthread+0x10/0x10
[ 26.248290] ret_from_fork+0x1c5/0x240
[ 26.248312] ? __pfx_kthread+0x10/0x10
[ 26.248333] ret_from_fork_asm+0x1a/0x30
[ 26.248365] </TASK>
[ 26.248378]
[ 26.257167] Allocated by task 323:
[ 26.257597] kasan_save_stack+0x45/0x70
[ 26.257892] kasan_save_track+0x18/0x40
[ 26.258082] kasan_save_alloc_info+0x3b/0x50
[ 26.258369] __kasan_kmalloc+0xb7/0xc0
[ 26.258546] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.258754] kasan_atomics+0x95/0x310
[ 26.258954] kunit_try_run_case+0x1a5/0x490
[ 26.259131] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.259366] kthread+0x337/0x6f0
[ 26.259513] ret_from_fork+0x1c5/0x240
[ 26.259690] ret_from_fork_asm+0x1a/0x30
[ 26.260406]
[ 26.260486] The buggy address belongs to the object at ffff888105db2a00
[ 26.260486] which belongs to the cache kmalloc-64 of size 64
[ 26.261315] The buggy address is located 0 bytes to the right of
[ 26.261315] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.262043]
[ 26.262142] The buggy address belongs to the physical page:
[ 26.262494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.262933] flags: 0x200000000000000(node=0|zone=2)
[ 26.263153] page_type: f5(slab)
[ 26.263442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.263821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.264298] page dumped because: kasan: bad access detected
[ 26.264537]
[ 26.264798] Memory state around the buggy address:
[ 26.264995] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.265460] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.265765] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.266282] ^
[ 26.266600] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.266981] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.267329] ==================================================================
---
[ 26.268210] ==================================================================
[ 26.268985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x396c/0x59f0
[ 26.269408] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.269842]
[ 26.270135] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.270193] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.270228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.270252] Call Trace:
[ 26.270273] <TASK>
[ 26.270290] dump_stack_lvl+0x73/0xb0
[ 26.270320] print_report+0xd1/0x640
[ 26.270345] ? __virt_addr_valid+0x1db/0x2d0
[ 26.270369] ? kasan_atomics_helper+0x396c/0x59f0
[ 26.270393] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.270417] ? kasan_atomics_helper+0x396c/0x59f0
[ 26.270439] kasan_report+0x144/0x180
[ 26.270463] ? kasan_atomics_helper+0x396c/0x59f0
[ 26.270492] kasan_check_range+0x10c/0x1c0
[ 26.270518] __kasan_check_write+0x18/0x20
[ 26.270538] kasan_atomics_helper+0x396c/0x59f0
[ 26.270562] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.270586] ? kasan_save_alloc_info+0x3b/0x50
[ 26.270616] kasan_atomics+0x1dc/0x310
[ 26.270640] ? __pfx_kasan_atomics+0x10/0x10
[ 26.270665] ? __pfx_read_tsc+0x10/0x10
[ 26.270687] ? ktime_get_ts64+0x86/0x230
[ 26.270712] kunit_try_run_case+0x1a5/0x490
[ 26.270738] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.270759] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.270797] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.270821] ? __kthread_parkme+0x82/0x180
[ 26.270847] ? preempt_count_sub+0x50/0x80
[ 26.270888] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.270912] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.270941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.270971] kthread+0x337/0x6f0
[ 26.270991] ? trace_preempt_on+0x20/0xc0
[ 26.271016] ? __pfx_kthread+0x10/0x10
[ 26.271037] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.271060] ? calculate_sigpending+0x7b/0xa0
[ 26.271084] ? __pfx_kthread+0x10/0x10
[ 26.271105] ret_from_fork+0x1c5/0x240
[ 26.271128] ? __pfx_kthread+0x10/0x10
[ 26.271148] ret_from_fork_asm+0x1a/0x30
[ 26.271181] </TASK>
[ 26.271195]
[ 26.278103] Allocated by task 323:
[ 26.278274] kasan_save_stack+0x45/0x70
[ 26.278484] kasan_save_track+0x18/0x40
[ 26.278624] kasan_save_alloc_info+0x3b/0x50
[ 26.278853] __kasan_kmalloc+0xb7/0xc0
[ 26.279004] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.279228] kasan_atomics+0x95/0x310
[ 26.279407] kunit_try_run_case+0x1a5/0x490
[ 26.279589] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.279838] kthread+0x337/0x6f0
[ 26.280015] ret_from_fork+0x1c5/0x240
[ 26.280141] ret_from_fork_asm+0x1a/0x30
[ 26.280274]
[ 26.280385] The buggy address belongs to the object at ffff888105db2a00
[ 26.280385] which belongs to the cache kmalloc-64 of size 64
[ 26.280909] The buggy address is located 0 bytes to the right of
[ 26.280909] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.281462]
[ 26.281529] The buggy address belongs to the physical page:
[ 26.281695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.282125] flags: 0x200000000000000(node=0|zone=2)
[ 26.282405] page_type: f5(slab)
[ 26.282576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.282992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.283306] page dumped because: kasan: bad access detected
[ 26.283467]
[ 26.283529] Memory state around the buggy address:
[ 26.283683] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.283963] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.284265] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.284529] ^
[ 26.284674] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.285077] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.285403] ==================================================================
---
[ 25.782734] ==================================================================
[ 25.783412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x21fd/0x59f0
[ 25.783695] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.784030]
[ 25.784175] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.784352] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.784368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.784393] Call Trace:
[ 25.784410] <TASK>
[ 25.784427] dump_stack_lvl+0x73/0xb0
[ 25.784457] print_report+0xd1/0x640
[ 25.784481] ? __virt_addr_valid+0x1db/0x2d0
[ 25.784504] ? kasan_atomics_helper+0x21fd/0x59f0
[ 25.784528] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.784551] ? kasan_atomics_helper+0x21fd/0x59f0
[ 25.784574] kasan_report+0x144/0x180
[ 25.784597] ? kasan_atomics_helper+0x21fd/0x59f0
[ 25.784626] kasan_check_range+0x10c/0x1c0
[ 25.784650] __kasan_check_write+0x18/0x20
[ 25.784670] kasan_atomics_helper+0x21fd/0x59f0
[ 25.784694] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.784718] ? kasan_save_alloc_info+0x3b/0x50
[ 25.784748] kasan_atomics+0x1dc/0x310
[ 25.784787] ? __pfx_kasan_atomics+0x10/0x10
[ 25.784813] ? __pfx_read_tsc+0x10/0x10
[ 25.784833] ? ktime_get_ts64+0x86/0x230
[ 25.784858] kunit_try_run_case+0x1a5/0x490
[ 25.784882] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.784904] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.784927] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.784951] ? __kthread_parkme+0x82/0x180
[ 25.784975] ? preempt_count_sub+0x50/0x80
[ 25.785002] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.785025] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.785053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.785081] kthread+0x337/0x6f0
[ 25.785100] ? trace_preempt_on+0x20/0xc0
[ 25.785123] ? __pfx_kthread+0x10/0x10
[ 25.785143] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.785165] ? calculate_sigpending+0x7b/0xa0
[ 25.785189] ? __pfx_kthread+0x10/0x10
[ 25.785210] ret_from_fork+0x1c5/0x240
[ 25.785231] ? __pfx_kthread+0x10/0x10
[ 25.785252] ret_from_fork_asm+0x1a/0x30
[ 25.785285] </TASK>
[ 25.785298]
[ 25.796433] Allocated by task 323:
[ 25.796614] kasan_save_stack+0x45/0x70
[ 25.796762] kasan_save_track+0x18/0x40
[ 25.796996] kasan_save_alloc_info+0x3b/0x50
[ 25.797186] __kasan_kmalloc+0xb7/0xc0
[ 25.797771] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.797998] kasan_atomics+0x95/0x310
[ 25.798167] kunit_try_run_case+0x1a5/0x490
[ 25.798492] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.799008] kthread+0x337/0x6f0
[ 25.799186] ret_from_fork+0x1c5/0x240
[ 25.799423] ret_from_fork_asm+0x1a/0x30
[ 25.799617]
[ 25.799924] The buggy address belongs to the object at ffff888105db2a00
[ 25.799924] which belongs to the cache kmalloc-64 of size 64
[ 25.800647] The buggy address is located 0 bytes to the right of
[ 25.800647] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.801562]
[ 25.801748] The buggy address belongs to the physical page:
[ 25.802263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.802583] flags: 0x200000000000000(node=0|zone=2)
[ 25.802813] page_type: f5(slab)
[ 25.803183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.803530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.804030] page dumped because: kasan: bad access detected
[ 25.804293]
[ 25.804367] Memory state around the buggy address:
[ 25.804754] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.805230] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.805587] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.806023] ^
[ 25.806254] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.806654] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.806915] ==================================================================
---
[ 25.401722] ==================================================================
[ 25.402399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1313/0x59f0
[ 25.402706] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.403514]
[ 25.403635] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.403687] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.403701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.403724] Call Trace:
[ 25.403740] <TASK>
[ 25.403755] dump_stack_lvl+0x73/0xb0
[ 25.403794] print_report+0xd1/0x640
[ 25.403818] ? __virt_addr_valid+0x1db/0x2d0
[ 25.403840] ? kasan_atomics_helper+0x1313/0x59f0
[ 25.403863] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.403886] ? kasan_atomics_helper+0x1313/0x59f0
[ 25.403909] kasan_report+0x144/0x180
[ 25.403932] ? kasan_atomics_helper+0x1313/0x59f0
[ 25.403960] kasan_check_range+0x10c/0x1c0
[ 25.403984] __kasan_check_write+0x18/0x20
[ 25.404004] kasan_atomics_helper+0x1313/0x59f0
[ 25.404028] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.404052] ? kasan_save_alloc_info+0x3b/0x50
[ 25.404083] kasan_atomics+0x1dc/0x310
[ 25.404484] ? __pfx_kasan_atomics+0x10/0x10
[ 25.404516] ? __pfx_read_tsc+0x10/0x10
[ 25.404538] ? ktime_get_ts64+0x86/0x230
[ 25.404563] kunit_try_run_case+0x1a5/0x490
[ 25.404587] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.404646] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.404670] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.404694] ? __kthread_parkme+0x82/0x180
[ 25.404718] ? preempt_count_sub+0x50/0x80
[ 25.404744] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.404768] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.404805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.404831] kthread+0x337/0x6f0
[ 25.404850] ? trace_preempt_on+0x20/0xc0
[ 25.404874] ? __pfx_kthread+0x10/0x10
[ 25.404894] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.404917] ? calculate_sigpending+0x7b/0xa0
[ 25.404939] ? __pfx_kthread+0x10/0x10
[ 25.404961] ret_from_fork+0x1c5/0x240
[ 25.404982] ? __pfx_kthread+0x10/0x10
[ 25.405002] ret_from_fork_asm+0x1a/0x30
[ 25.405036] </TASK>
[ 25.405048]
[ 25.416812] Allocated by task 323:
[ 25.417015] kasan_save_stack+0x45/0x70
[ 25.417385] kasan_save_track+0x18/0x40
[ 25.417612] kasan_save_alloc_info+0x3b/0x50
[ 25.417834] __kasan_kmalloc+0xb7/0xc0
[ 25.418344] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.418574] kasan_atomics+0x95/0x310
[ 25.418787] kunit_try_run_case+0x1a5/0x490
[ 25.419086] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.419488] kthread+0x337/0x6f0
[ 25.419616] ret_from_fork+0x1c5/0x240
[ 25.419848] ret_from_fork_asm+0x1a/0x30
[ 25.420057]
[ 25.420151] The buggy address belongs to the object at ffff888105db2a00
[ 25.420151] which belongs to the cache kmalloc-64 of size 64
[ 25.420643] The buggy address is located 0 bytes to the right of
[ 25.420643] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.421526]
[ 25.421607] The buggy address belongs to the physical page:
[ 25.421910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.422245] flags: 0x200000000000000(node=0|zone=2)
[ 25.422555] page_type: f5(slab)
[ 25.422710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.423057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.423599] page dumped because: kasan: bad access detected
[ 25.423828]
[ 25.423918] Memory state around the buggy address:
[ 25.424285] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.424523] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.424965] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.425214] ^
[ 25.425558] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.425879] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.426229] ==================================================================
---
[ 25.271993] ==================================================================
[ 25.272642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbaf/0x59f0
[ 25.273333] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.273564]
[ 25.273649] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.273698] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.273712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.273735] Call Trace:
[ 25.273752] <TASK>
[ 25.273768] dump_stack_lvl+0x73/0xb0
[ 25.273813] print_report+0xd1/0x640
[ 25.273838] ? __virt_addr_valid+0x1db/0x2d0
[ 25.273862] ? kasan_atomics_helper+0xbaf/0x59f0
[ 25.273884] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.273909] ? kasan_atomics_helper+0xbaf/0x59f0
[ 25.273931] kasan_report+0x144/0x180
[ 25.273954] ? kasan_atomics_helper+0xbaf/0x59f0
[ 25.273981] kasan_check_range+0x10c/0x1c0
[ 25.274018] __kasan_check_write+0x18/0x20
[ 25.274038] kasan_atomics_helper+0xbaf/0x59f0
[ 25.274062] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.274098] ? kasan_save_alloc_info+0x3b/0x50
[ 25.274127] kasan_atomics+0x1dc/0x310
[ 25.274151] ? __pfx_kasan_atomics+0x10/0x10
[ 25.274176] ? __pfx_read_tsc+0x10/0x10
[ 25.274197] ? ktime_get_ts64+0x86/0x230
[ 25.274220] kunit_try_run_case+0x1a5/0x490
[ 25.274244] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.274267] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.274291] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.274314] ? __kthread_parkme+0x82/0x180
[ 25.274338] ? preempt_count_sub+0x50/0x80
[ 25.274365] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.274398] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.274424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.274453] kthread+0x337/0x6f0
[ 25.274483] ? trace_preempt_on+0x20/0xc0
[ 25.274506] ? __pfx_kthread+0x10/0x10
[ 25.274527] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.274549] ? calculate_sigpending+0x7b/0xa0
[ 25.274572] ? __pfx_kthread+0x10/0x10
[ 25.274603] ret_from_fork+0x1c5/0x240
[ 25.274624] ? __pfx_kthread+0x10/0x10
[ 25.274645] ret_from_fork_asm+0x1a/0x30
[ 25.274683] </TASK>
[ 25.274696]
[ 25.284936] Allocated by task 323:
[ 25.285268] kasan_save_stack+0x45/0x70
[ 25.285424] kasan_save_track+0x18/0x40
[ 25.285557] kasan_save_alloc_info+0x3b/0x50
[ 25.285703] __kasan_kmalloc+0xb7/0xc0
[ 25.285848] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.286010] kasan_atomics+0x95/0x310
[ 25.286137] kunit_try_run_case+0x1a5/0x490
[ 25.286277] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.286448] kthread+0x337/0x6f0
[ 25.286561] ret_from_fork+0x1c5/0x240
[ 25.286692] ret_from_fork_asm+0x1a/0x30
[ 25.286994]
[ 25.287148] The buggy address belongs to the object at ffff888105db2a00
[ 25.287148] which belongs to the cache kmalloc-64 of size 64
[ 25.288212] The buggy address is located 0 bytes to the right of
[ 25.288212] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.289589]
[ 25.289769] The buggy address belongs to the physical page:
[ 25.290452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.291307] flags: 0x200000000000000(node=0|zone=2)
[ 25.291908] page_type: f5(slab)
[ 25.292266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.293118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.293893] page dumped because: kasan: bad access detected
[ 25.294511]
[ 25.294602] Memory state around the buggy address:
[ 25.294987] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.295662] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.296253] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.296478] ^
[ 25.296633] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.296867] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.297703] ==================================================================
---
[ 25.448715] ==================================================================
[ 25.449040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1597/0x59f0
[ 25.449573] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.449892]
[ 25.450001] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.450069] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.450083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.450105] Call Trace:
[ 25.450137] <TASK>
[ 25.450169] dump_stack_lvl+0x73/0xb0
[ 25.450200] print_report+0xd1/0x640
[ 25.450224] ? __virt_addr_valid+0x1db/0x2d0
[ 25.450247] ? kasan_atomics_helper+0x1597/0x59f0
[ 25.450269] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.450292] ? kasan_atomics_helper+0x1597/0x59f0
[ 25.450315] kasan_report+0x144/0x180
[ 25.450339] ? kasan_atomics_helper+0x1597/0x59f0
[ 25.450462] kasan_check_range+0x10c/0x1c0
[ 25.450502] __kasan_check_write+0x18/0x20
[ 25.450535] kasan_atomics_helper+0x1597/0x59f0
[ 25.450572] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.450610] ? kasan_save_alloc_info+0x3b/0x50
[ 25.450652] kasan_atomics+0x1dc/0x310
[ 25.450690] ? __pfx_kasan_atomics+0x10/0x10
[ 25.450728] ? __pfx_read_tsc+0x10/0x10
[ 25.450761] ? ktime_get_ts64+0x86/0x230
[ 25.450797] kunit_try_run_case+0x1a5/0x490
[ 25.450821] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.450844] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.450868] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.450892] ? __kthread_parkme+0x82/0x180
[ 25.450915] ? preempt_count_sub+0x50/0x80
[ 25.450942] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.450965] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.450992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.451020] kthread+0x337/0x6f0
[ 25.451039] ? trace_preempt_on+0x20/0xc0
[ 25.451063] ? __pfx_kthread+0x10/0x10
[ 25.451083] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.451107] ? calculate_sigpending+0x7b/0xa0
[ 25.451130] ? __pfx_kthread+0x10/0x10
[ 25.451152] ret_from_fork+0x1c5/0x240
[ 25.451173] ? __pfx_kthread+0x10/0x10
[ 25.451194] ret_from_fork_asm+0x1a/0x30
[ 25.451227] </TASK>
[ 25.451239]
[ 25.459506] Allocated by task 323:
[ 25.459707] kasan_save_stack+0x45/0x70
[ 25.459933] kasan_save_track+0x18/0x40
[ 25.460105] kasan_save_alloc_info+0x3b/0x50
[ 25.460386] __kasan_kmalloc+0xb7/0xc0
[ 25.460543] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.460770] kasan_atomics+0x95/0x310
[ 25.460990] kunit_try_run_case+0x1a5/0x490
[ 25.461197] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.461567] kthread+0x337/0x6f0
[ 25.461769] ret_from_fork+0x1c5/0x240
[ 25.461963] ret_from_fork_asm+0x1a/0x30
[ 25.462256]
[ 25.462377] The buggy address belongs to the object at ffff888105db2a00
[ 25.462377] which belongs to the cache kmalloc-64 of size 64
[ 25.462824] The buggy address is located 0 bytes to the right of
[ 25.462824] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.463532]
[ 25.463625] The buggy address belongs to the physical page:
[ 25.463858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.464228] flags: 0x200000000000000(node=0|zone=2)
[ 25.464536] page_type: f5(slab)
[ 25.464662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.465133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.465382] page dumped because: kasan: bad access detected
[ 25.465544]
[ 25.465609] Memory state around the buggy address:
[ 25.465754] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.466475] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.466837] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.467247] ^
[ 25.467398] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.467603] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.467825] ==================================================================
---
[ 25.240407] ==================================================================
[ 25.241125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa73/0x59f0
[ 25.241627] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.242394]
[ 25.242688] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.242748] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.242763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.242798] Call Trace:
[ 25.242816] <TASK>
[ 25.242832] dump_stack_lvl+0x73/0xb0
[ 25.242863] print_report+0xd1/0x640
[ 25.242887] ? __virt_addr_valid+0x1db/0x2d0
[ 25.242910] ? kasan_atomics_helper+0xa73/0x59f0
[ 25.242933] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.242959] ? kasan_atomics_helper+0xa73/0x59f0
[ 25.242982] kasan_report+0x144/0x180
[ 25.243007] ? kasan_atomics_helper+0xa73/0x59f0
[ 25.243034] kasan_check_range+0x10c/0x1c0
[ 25.243059] __kasan_check_write+0x18/0x20
[ 25.243080] kasan_atomics_helper+0xa73/0x59f0
[ 25.243103] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.243127] ? kasan_save_alloc_info+0x3b/0x50
[ 25.243158] kasan_atomics+0x1dc/0x310
[ 25.243181] ? __pfx_kasan_atomics+0x10/0x10
[ 25.243206] ? __pfx_read_tsc+0x10/0x10
[ 25.243227] ? ktime_get_ts64+0x86/0x230
[ 25.243251] kunit_try_run_case+0x1a5/0x490
[ 25.243276] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.243298] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.243322] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.243346] ? __kthread_parkme+0x82/0x180
[ 25.243370] ? preempt_count_sub+0x50/0x80
[ 25.243397] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.243424] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.243451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.243478] kthread+0x337/0x6f0
[ 25.243497] ? trace_preempt_on+0x20/0xc0
[ 25.243520] ? __pfx_kthread+0x10/0x10
[ 25.243542] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.243563] ? calculate_sigpending+0x7b/0xa0
[ 25.243586] ? __pfx_kthread+0x10/0x10
[ 25.243608] ret_from_fork+0x1c5/0x240
[ 25.243630] ? __pfx_kthread+0x10/0x10
[ 25.243659] ret_from_fork_asm+0x1a/0x30
[ 25.243692] </TASK>
[ 25.243705]
[ 25.258341] Allocated by task 323:
[ 25.258853] kasan_save_stack+0x45/0x70
[ 25.259012] kasan_save_track+0x18/0x40
[ 25.259203] kasan_save_alloc_info+0x3b/0x50
[ 25.259658] __kasan_kmalloc+0xb7/0xc0
[ 25.260070] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.260618] kasan_atomics+0x95/0x310
[ 25.261011] kunit_try_run_case+0x1a5/0x490
[ 25.261464] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.261647] kthread+0x337/0x6f0
[ 25.261763] ret_from_fork+0x1c5/0x240
[ 25.262006] ret_from_fork_asm+0x1a/0x30
[ 25.262375]
[ 25.262705] The buggy address belongs to the object at ffff888105db2a00
[ 25.262705] which belongs to the cache kmalloc-64 of size 64
[ 25.264112] The buggy address is located 0 bytes to the right of
[ 25.264112] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.264974]
[ 25.265053] The buggy address belongs to the physical page:
[ 25.265450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.266199] flags: 0x200000000000000(node=0|zone=2)
[ 25.266669] page_type: f5(slab)
[ 25.266814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.267160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.267930] page dumped because: kasan: bad access detected
[ 25.268553]
[ 25.268737] Memory state around the buggy address:
[ 25.269197] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.269869] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.270459] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.270676] ^
[ 25.270845] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.271058] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.271284] ==================================================================
---
[ 25.361908] ==================================================================
[ 25.362377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x109c/0x59f0
[ 25.362655] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.362932]
[ 25.363042] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.363087] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.363101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.363124] Call Trace:
[ 25.363139] <TASK>
[ 25.363155] dump_stack_lvl+0x73/0xb0
[ 25.363181] print_report+0xd1/0x640
[ 25.363204] ? __virt_addr_valid+0x1db/0x2d0
[ 25.363227] ? kasan_atomics_helper+0x109c/0x59f0
[ 25.363249] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.363273] ? kasan_atomics_helper+0x109c/0x59f0
[ 25.363296] kasan_report+0x144/0x180
[ 25.363319] ? kasan_atomics_helper+0x109c/0x59f0
[ 25.363347] kasan_check_range+0x10c/0x1c0
[ 25.363372] __kasan_check_write+0x18/0x20
[ 25.363392] kasan_atomics_helper+0x109c/0x59f0
[ 25.363415] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.363439] ? kasan_save_alloc_info+0x3b/0x50
[ 25.363467] kasan_atomics+0x1dc/0x310
[ 25.363491] ? __pfx_kasan_atomics+0x10/0x10
[ 25.363516] ? __pfx_read_tsc+0x10/0x10
[ 25.363537] ? ktime_get_ts64+0x86/0x230
[ 25.363561] kunit_try_run_case+0x1a5/0x490
[ 25.363586] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.363608] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.363631] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.363660] ? __kthread_parkme+0x82/0x180
[ 25.363683] ? preempt_count_sub+0x50/0x80
[ 25.363710] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.363733] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.363760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.363797] kthread+0x337/0x6f0
[ 25.363816] ? trace_preempt_on+0x20/0xc0
[ 25.363838] ? __pfx_kthread+0x10/0x10
[ 25.363859] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.363934] ? calculate_sigpending+0x7b/0xa0
[ 25.363960] ? __pfx_kthread+0x10/0x10
[ 25.363981] ret_from_fork+0x1c5/0x240
[ 25.364003] ? __pfx_kthread+0x10/0x10
[ 25.364023] ret_from_fork_asm+0x1a/0x30
[ 25.364056] </TASK>
[ 25.364069]
[ 25.372183] Allocated by task 323:
[ 25.372362] kasan_save_stack+0x45/0x70
[ 25.372561] kasan_save_track+0x18/0x40
[ 25.372754] kasan_save_alloc_info+0x3b/0x50
[ 25.373138] __kasan_kmalloc+0xb7/0xc0
[ 25.373398] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.373618] kasan_atomics+0x95/0x310
[ 25.373819] kunit_try_run_case+0x1a5/0x490
[ 25.374197] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.374428] kthread+0x337/0x6f0
[ 25.374566] ret_from_fork+0x1c5/0x240
[ 25.374735] ret_from_fork_asm+0x1a/0x30
[ 25.374879]
[ 25.374972] The buggy address belongs to the object at ffff888105db2a00
[ 25.374972] which belongs to the cache kmalloc-64 of size 64
[ 25.375459] The buggy address is located 0 bytes to the right of
[ 25.375459] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.376125]
[ 25.376328] The buggy address belongs to the physical page:
[ 25.376553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.376831] flags: 0x200000000000000(node=0|zone=2)
[ 25.377314] page_type: f5(slab)
[ 25.377554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.377883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.378120] page dumped because: kasan: bad access detected
[ 25.378439]
[ 25.378571] Memory state around the buggy address:
[ 25.378765] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.379058] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.379459] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.379715] ^
[ 25.379882] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.380093] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.380299] ==================================================================
---
[ 26.223279] ==================================================================
[ 26.223689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x36f4/0x59f0
[ 26.224303] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.224906]
[ 26.225020] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.225069] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.225083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.225262] Call Trace:
[ 26.225288] <TASK>
[ 26.225304] dump_stack_lvl+0x73/0xb0
[ 26.225336] print_report+0xd1/0x640
[ 26.225359] ? __virt_addr_valid+0x1db/0x2d0
[ 26.225382] ? kasan_atomics_helper+0x36f4/0x59f0
[ 26.225404] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.225427] ? kasan_atomics_helper+0x36f4/0x59f0
[ 26.225450] kasan_report+0x144/0x180
[ 26.225474] ? kasan_atomics_helper+0x36f4/0x59f0
[ 26.225502] kasan_check_range+0x10c/0x1c0
[ 26.225527] __kasan_check_write+0x18/0x20
[ 26.225547] kasan_atomics_helper+0x36f4/0x59f0
[ 26.225570] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.225595] ? kasan_save_alloc_info+0x3b/0x50
[ 26.225625] kasan_atomics+0x1dc/0x310
[ 26.225650] ? __pfx_kasan_atomics+0x10/0x10
[ 26.225676] ? __pfx_read_tsc+0x10/0x10
[ 26.225697] ? ktime_get_ts64+0x86/0x230
[ 26.225722] kunit_try_run_case+0x1a5/0x490
[ 26.225747] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.225769] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.225804] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.225828] ? __kthread_parkme+0x82/0x180
[ 26.225874] ? preempt_count_sub+0x50/0x80
[ 26.225902] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.225926] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.225953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.225980] kthread+0x337/0x6f0
[ 26.225999] ? trace_preempt_on+0x20/0xc0
[ 26.226022] ? __pfx_kthread+0x10/0x10
[ 26.226042] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.226064] ? calculate_sigpending+0x7b/0xa0
[ 26.226087] ? __pfx_kthread+0x10/0x10
[ 26.226108] ret_from_fork+0x1c5/0x240
[ 26.226130] ? __pfx_kthread+0x10/0x10
[ 26.226151] ret_from_fork_asm+0x1a/0x30
[ 26.226184] </TASK>
[ 26.226197]
[ 26.235395] Allocated by task 323:
[ 26.235528] kasan_save_stack+0x45/0x70
[ 26.236030] kasan_save_track+0x18/0x40
[ 26.236343] kasan_save_alloc_info+0x3b/0x50
[ 26.236512] __kasan_kmalloc+0xb7/0xc0
[ 26.236700] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.236915] kasan_atomics+0x95/0x310
[ 26.237274] kunit_try_run_case+0x1a5/0x490
[ 26.237477] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.237789] kthread+0x337/0x6f0
[ 26.238095] ret_from_fork+0x1c5/0x240
[ 26.238274] ret_from_fork_asm+0x1a/0x30
[ 26.238578]
[ 26.238670] The buggy address belongs to the object at ffff888105db2a00
[ 26.238670] which belongs to the cache kmalloc-64 of size 64
[ 26.239276] The buggy address is located 0 bytes to the right of
[ 26.239276] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.239813]
[ 26.239903] The buggy address belongs to the physical page:
[ 26.240409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.240796] flags: 0x200000000000000(node=0|zone=2)
[ 26.241069] page_type: f5(slab)
[ 26.241337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.241653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.242164] page dumped because: kasan: bad access detected
[ 26.242499]
[ 26.242581] Memory state around the buggy address:
[ 26.242927] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.243311] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.243574] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.244034] ^
[ 26.244344] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.244647] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.245092] ==================================================================
---
[ 25.343221] ==================================================================
[ 25.344037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf5f/0x59f0
[ 25.344488] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.344716]
[ 25.344807] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.344853] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.344865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.344887] Call Trace:
[ 25.344904] <TASK>
[ 25.344918] dump_stack_lvl+0x73/0xb0
[ 25.344946] print_report+0xd1/0x640
[ 25.344970] ? __virt_addr_valid+0x1db/0x2d0
[ 25.344993] ? kasan_atomics_helper+0xf5f/0x59f0
[ 25.345015] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.345038] ? kasan_atomics_helper+0xf5f/0x59f0
[ 25.345060] kasan_report+0x144/0x180
[ 25.345084] ? kasan_atomics_helper+0xf5f/0x59f0
[ 25.345111] kasan_check_range+0x10c/0x1c0
[ 25.345136] __kasan_check_write+0x18/0x20
[ 25.345156] kasan_atomics_helper+0xf5f/0x59f0
[ 25.345179] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.345215] ? kasan_save_alloc_info+0x3b/0x50
[ 25.345244] kasan_atomics+0x1dc/0x310
[ 25.345267] ? __pfx_kasan_atomics+0x10/0x10
[ 25.345293] ? __pfx_read_tsc+0x10/0x10
[ 25.345313] ? ktime_get_ts64+0x86/0x230
[ 25.345336] kunit_try_run_case+0x1a5/0x490
[ 25.345359] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.345381] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.345404] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.345428] ? __kthread_parkme+0x82/0x180
[ 25.345451] ? preempt_count_sub+0x50/0x80
[ 25.345477] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.345500] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.345526] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.345553] kthread+0x337/0x6f0
[ 25.345572] ? trace_preempt_on+0x20/0xc0
[ 25.345594] ? __pfx_kthread+0x10/0x10
[ 25.345614] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.345636] ? calculate_sigpending+0x7b/0xa0
[ 25.345658] ? __pfx_kthread+0x10/0x10
[ 25.345680] ret_from_fork+0x1c5/0x240
[ 25.345702] ? __pfx_kthread+0x10/0x10
[ 25.345724] ret_from_fork_asm+0x1a/0x30
[ 25.345756] </TASK>
[ 25.345769]
[ 25.353723] Allocated by task 323:
[ 25.353932] kasan_save_stack+0x45/0x70
[ 25.354118] kasan_save_track+0x18/0x40
[ 25.354277] kasan_save_alloc_info+0x3b/0x50
[ 25.354487] __kasan_kmalloc+0xb7/0xc0
[ 25.354646] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.354859] kasan_atomics+0x95/0x310
[ 25.355145] kunit_try_run_case+0x1a5/0x490
[ 25.355292] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.355538] kthread+0x337/0x6f0
[ 25.355711] ret_from_fork+0x1c5/0x240
[ 25.356049] ret_from_fork_asm+0x1a/0x30
[ 25.356305]
[ 25.356379] The buggy address belongs to the object at ffff888105db2a00
[ 25.356379] which belongs to the cache kmalloc-64 of size 64
[ 25.356859] The buggy address is located 0 bytes to the right of
[ 25.356859] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.357436]
[ 25.357521] The buggy address belongs to the physical page:
[ 25.357725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.357973] flags: 0x200000000000000(node=0|zone=2)
[ 25.358129] page_type: f5(slab)
[ 25.358246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.358473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.358693] page dumped because: kasan: bad access detected
[ 25.358913]
[ 25.359002] Memory state around the buggy address:
[ 25.359324] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.359637] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.360075] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.360385] ^
[ 25.360600] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.361094] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.361469] ==================================================================
---
[ 25.169443] ==================================================================
[ 25.169798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7ce/0x59f0
[ 25.170302] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.170823]
[ 25.170961] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.171009] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.171023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.171128] Call Trace:
[ 25.171151] <TASK>
[ 25.171187] dump_stack_lvl+0x73/0xb0
[ 25.171233] print_report+0xd1/0x640
[ 25.171257] ? __virt_addr_valid+0x1db/0x2d0
[ 25.171280] ? kasan_atomics_helper+0x7ce/0x59f0
[ 25.171303] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.171327] ? kasan_atomics_helper+0x7ce/0x59f0
[ 25.171349] kasan_report+0x144/0x180
[ 25.171372] ? kasan_atomics_helper+0x7ce/0x59f0
[ 25.171400] kasan_check_range+0x10c/0x1c0
[ 25.171425] __kasan_check_write+0x18/0x20
[ 25.171445] kasan_atomics_helper+0x7ce/0x59f0
[ 25.171469] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.171495] ? kasan_save_alloc_info+0x3b/0x50
[ 25.171525] kasan_atomics+0x1dc/0x310
[ 25.171549] ? __pfx_kasan_atomics+0x10/0x10
[ 25.171575] ? __pfx_read_tsc+0x10/0x10
[ 25.171596] ? ktime_get_ts64+0x86/0x230
[ 25.171638] kunit_try_run_case+0x1a5/0x490
[ 25.171667] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.171703] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.171727] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.171752] ? __kthread_parkme+0x82/0x180
[ 25.171788] ? preempt_count_sub+0x50/0x80
[ 25.171815] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.171839] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.171865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.171893] kthread+0x337/0x6f0
[ 25.171913] ? trace_preempt_on+0x20/0xc0
[ 25.171936] ? __pfx_kthread+0x10/0x10
[ 25.171957] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.171978] ? calculate_sigpending+0x7b/0xa0
[ 25.172001] ? __pfx_kthread+0x10/0x10
[ 25.172023] ret_from_fork+0x1c5/0x240
[ 25.172045] ? __pfx_kthread+0x10/0x10
[ 25.172066] ret_from_fork_asm+0x1a/0x30
[ 25.172099] </TASK>
[ 25.172111]
[ 25.180047] Allocated by task 323:
[ 25.180220] kasan_save_stack+0x45/0x70
[ 25.180421] kasan_save_track+0x18/0x40
[ 25.180622] kasan_save_alloc_info+0x3b/0x50
[ 25.180859] __kasan_kmalloc+0xb7/0xc0
[ 25.181055] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.181290] kasan_atomics+0x95/0x310
[ 25.181493] kunit_try_run_case+0x1a5/0x490
[ 25.181696] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.181956] kthread+0x337/0x6f0
[ 25.182116] ret_from_fork+0x1c5/0x240
[ 25.182443] ret_from_fork_asm+0x1a/0x30
[ 25.182580]
[ 25.182671] The buggy address belongs to the object at ffff888105db2a00
[ 25.182671] which belongs to the cache kmalloc-64 of size 64
[ 25.183068] The buggy address is located 0 bytes to the right of
[ 25.183068] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.183450]
[ 25.183625] The buggy address belongs to the physical page:
[ 25.184111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.184869] flags: 0x200000000000000(node=0|zone=2)
[ 25.185109] page_type: f5(slab)
[ 25.185248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.185599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.185942] page dumped because: kasan: bad access detected
[ 25.186221]
[ 25.186287] Memory state around the buggy address:
[ 25.186436] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.186750] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.187418] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.187736] ^
[ 25.187966] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.188275] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.188531] ==================================================================
---
[ 26.468660] ==================================================================
[ 26.469212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4176/0x59f0
[ 26.469544] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.470028]
[ 26.470214] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.470263] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.470276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.470298] Call Trace:
[ 26.470311] <TASK>
[ 26.470326] dump_stack_lvl+0x73/0xb0
[ 26.470352] print_report+0xd1/0x640
[ 26.470376] ? __virt_addr_valid+0x1db/0x2d0
[ 26.470398] ? kasan_atomics_helper+0x4176/0x59f0
[ 26.470420] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.470442] ? kasan_atomics_helper+0x4176/0x59f0
[ 26.470465] kasan_report+0x144/0x180
[ 26.470488] ? kasan_atomics_helper+0x4176/0x59f0
[ 26.470515] kasan_check_range+0x10c/0x1c0
[ 26.470540] __kasan_check_write+0x18/0x20
[ 26.470560] kasan_atomics_helper+0x4176/0x59f0
[ 26.470583] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.470607] ? kasan_save_alloc_info+0x3b/0x50
[ 26.470638] kasan_atomics+0x1dc/0x310
[ 26.470661] ? __pfx_kasan_atomics+0x10/0x10
[ 26.470686] ? __pfx_read_tsc+0x10/0x10
[ 26.470706] ? ktime_get_ts64+0x86/0x230
[ 26.470729] kunit_try_run_case+0x1a5/0x490
[ 26.470753] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.470785] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.470808] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.470831] ? __kthread_parkme+0x82/0x180
[ 26.470855] ? preempt_count_sub+0x50/0x80
[ 26.470892] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.470915] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.470942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.470969] kthread+0x337/0x6f0
[ 26.470989] ? trace_preempt_on+0x20/0xc0
[ 26.471013] ? __pfx_kthread+0x10/0x10
[ 26.471034] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.471055] ? calculate_sigpending+0x7b/0xa0
[ 26.471078] ? __pfx_kthread+0x10/0x10
[ 26.471099] ret_from_fork+0x1c5/0x240
[ 26.471122] ? __pfx_kthread+0x10/0x10
[ 26.471143] ret_from_fork_asm+0x1a/0x30
[ 26.471176] </TASK>
[ 26.471188]
[ 26.478244] Allocated by task 323:
[ 26.478395] kasan_save_stack+0x45/0x70
[ 26.478569] kasan_save_track+0x18/0x40
[ 26.478732] kasan_save_alloc_info+0x3b/0x50
[ 26.478948] __kasan_kmalloc+0xb7/0xc0
[ 26.479096] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.479244] kasan_atomics+0x95/0x310
[ 26.479373] kunit_try_run_case+0x1a5/0x490
[ 26.479515] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.479751] kthread+0x337/0x6f0
[ 26.479923] ret_from_fork+0x1c5/0x240
[ 26.480107] ret_from_fork_asm+0x1a/0x30
[ 26.480299]
[ 26.480387] The buggy address belongs to the object at ffff888105db2a00
[ 26.480387] which belongs to the cache kmalloc-64 of size 64
[ 26.481022] The buggy address is located 0 bytes to the right of
[ 26.481022] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.481385]
[ 26.481475] The buggy address belongs to the physical page:
[ 26.481727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.482363] flags: 0x200000000000000(node=0|zone=2)
[ 26.482593] page_type: f5(slab)
[ 26.482727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.483054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.483378] page dumped because: kasan: bad access detected
[ 26.483588]
[ 26.483682] Memory state around the buggy address:
[ 26.483885] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.484133] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.484438] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.484712] ^
[ 26.484943] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.485185] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.485470] ==================================================================
---
[ 25.380620] ==================================================================
[ 25.380956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11d8/0x59f0
[ 25.381282] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.381599]
[ 25.381700] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.381747] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.381761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.381793] Call Trace:
[ 25.381807] <TASK>
[ 25.381822] dump_stack_lvl+0x73/0xb0
[ 25.381848] print_report+0xd1/0x640
[ 25.381872] ? __virt_addr_valid+0x1db/0x2d0
[ 25.381894] ? kasan_atomics_helper+0x11d8/0x59f0
[ 25.381916] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.381939] ? kasan_atomics_helper+0x11d8/0x59f0
[ 25.381962] kasan_report+0x144/0x180
[ 25.381985] ? kasan_atomics_helper+0x11d8/0x59f0
[ 25.382013] kasan_check_range+0x10c/0x1c0
[ 25.382037] __kasan_check_write+0x18/0x20
[ 25.382058] kasan_atomics_helper+0x11d8/0x59f0
[ 25.382081] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.382104] ? kasan_save_alloc_info+0x3b/0x50
[ 25.382134] kasan_atomics+0x1dc/0x310
[ 25.382157] ? __pfx_kasan_atomics+0x10/0x10
[ 25.382182] ? __pfx_read_tsc+0x10/0x10
[ 25.382203] ? ktime_get_ts64+0x86/0x230
[ 25.382226] kunit_try_run_case+0x1a5/0x490
[ 25.382250] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.382272] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.382295] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.382319] ? __kthread_parkme+0x82/0x180
[ 25.382342] ? preempt_count_sub+0x50/0x80
[ 25.382369] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.382392] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.382419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.382446] kthread+0x337/0x6f0
[ 25.382465] ? trace_preempt_on+0x20/0xc0
[ 25.382488] ? __pfx_kthread+0x10/0x10
[ 25.382509] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.382530] ? calculate_sigpending+0x7b/0xa0
[ 25.382716] ? __pfx_kthread+0x10/0x10
[ 25.382740] ret_from_fork+0x1c5/0x240
[ 25.382763] ? __pfx_kthread+0x10/0x10
[ 25.382797] ret_from_fork_asm+0x1a/0x30
[ 25.382831] </TASK>
[ 25.382844]
[ 25.390402] Allocated by task 323:
[ 25.390533] kasan_save_stack+0x45/0x70
[ 25.390671] kasan_save_track+0x18/0x40
[ 25.390824] kasan_save_alloc_info+0x3b/0x50
[ 25.391242] __kasan_kmalloc+0xb7/0xc0
[ 25.391435] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.391648] kasan_atomics+0x95/0x310
[ 25.391837] kunit_try_run_case+0x1a5/0x490
[ 25.392297] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.392566] kthread+0x337/0x6f0
[ 25.392730] ret_from_fork+0x1c5/0x240
[ 25.392987] ret_from_fork_asm+0x1a/0x30
[ 25.393180]
[ 25.393297] The buggy address belongs to the object at ffff888105db2a00
[ 25.393297] which belongs to the cache kmalloc-64 of size 64
[ 25.393855] The buggy address is located 0 bytes to the right of
[ 25.393855] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.394433]
[ 25.394519] The buggy address belongs to the physical page:
[ 25.394755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.395085] flags: 0x200000000000000(node=0|zone=2)
[ 25.395636] page_type: f5(slab)
[ 25.395814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.396075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.396678] page dumped because: kasan: bad access detected
[ 25.396895]
[ 25.396987] Memory state around the buggy address:
[ 25.397277] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.397490] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.397700] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.399538] ^
[ 25.399760] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.400048] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.400581] ==================================================================
---
[ 25.567370] ==================================================================
[ 25.568172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b30/0x59f0
[ 25.568791] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.569156]
[ 25.569233] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.569306] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.569320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.569354] Call Trace:
[ 25.569369] <TASK>
[ 25.569385] dump_stack_lvl+0x73/0xb0
[ 25.569414] print_report+0xd1/0x640
[ 25.569450] ? __virt_addr_valid+0x1db/0x2d0
[ 25.569472] ? kasan_atomics_helper+0x1b30/0x59f0
[ 25.569493] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.569517] ? kasan_atomics_helper+0x1b30/0x59f0
[ 25.569540] kasan_report+0x144/0x180
[ 25.569563] ? kasan_atomics_helper+0x1b30/0x59f0
[ 25.569590] kasan_check_range+0x10c/0x1c0
[ 25.569643] __kasan_check_write+0x18/0x20
[ 25.569664] kasan_atomics_helper+0x1b30/0x59f0
[ 25.569687] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.569722] ? kasan_save_alloc_info+0x3b/0x50
[ 25.569752] kasan_atomics+0x1dc/0x310
[ 25.569784] ? __pfx_kasan_atomics+0x10/0x10
[ 25.569837] ? __pfx_read_tsc+0x10/0x10
[ 25.569858] ? ktime_get_ts64+0x86/0x230
[ 25.569895] kunit_try_run_case+0x1a5/0x490
[ 25.569931] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.569952] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.569975] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.569999] ? __kthread_parkme+0x82/0x180
[ 25.570023] ? preempt_count_sub+0x50/0x80
[ 25.570049] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.570072] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.570099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.570126] kthread+0x337/0x6f0
[ 25.570161] ? trace_preempt_on+0x20/0xc0
[ 25.570186] ? __pfx_kthread+0x10/0x10
[ 25.570206] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.570228] ? calculate_sigpending+0x7b/0xa0
[ 25.570251] ? __pfx_kthread+0x10/0x10
[ 25.570272] ret_from_fork+0x1c5/0x240
[ 25.570294] ? __pfx_kthread+0x10/0x10
[ 25.570314] ret_from_fork_asm+0x1a/0x30
[ 25.570346] </TASK>
[ 25.570358]
[ 25.584622] Allocated by task 323:
[ 25.584967] kasan_save_stack+0x45/0x70
[ 25.585165] kasan_save_track+0x18/0x40
[ 25.585402] kasan_save_alloc_info+0x3b/0x50
[ 25.585817] __kasan_kmalloc+0xb7/0xc0
[ 25.586040] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.586272] kasan_atomics+0x95/0x310
[ 25.586587] kunit_try_run_case+0x1a5/0x490
[ 25.586945] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.587116] kthread+0x337/0x6f0
[ 25.587439] ret_from_fork+0x1c5/0x240
[ 25.587903] ret_from_fork_asm+0x1a/0x30
[ 25.588282]
[ 25.588446] The buggy address belongs to the object at ffff888105db2a00
[ 25.588446] which belongs to the cache kmalloc-64 of size 64
[ 25.589373] The buggy address is located 0 bytes to the right of
[ 25.589373] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.590307]
[ 25.590499] The buggy address belongs to the physical page:
[ 25.591095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.591647] flags: 0x200000000000000(node=0|zone=2)
[ 25.591818] page_type: f5(slab)
[ 25.592076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.592861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.593891] page dumped because: kasan: bad access detected
[ 25.594426]
[ 25.594637] Memory state around the buggy address:
[ 25.595287] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.595849] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.596065] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.596520] ^
[ 25.597233] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.598055] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.598937] ==================================================================
---
[ 25.832681] ==================================================================
[ 25.833019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x236f/0x59f0
[ 25.833431] Write of size 4 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.833761]
[ 25.833881] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.833932] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.833946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.833968] Call Trace:
[ 25.833984] <TASK>
[ 25.834000] dump_stack_lvl+0x73/0xb0
[ 25.834027] print_report+0xd1/0x640
[ 25.834050] ? __virt_addr_valid+0x1db/0x2d0
[ 25.834073] ? kasan_atomics_helper+0x236f/0x59f0
[ 25.834096] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.834119] ? kasan_atomics_helper+0x236f/0x59f0
[ 25.834141] kasan_report+0x144/0x180
[ 25.834566] ? kasan_atomics_helper+0x236f/0x59f0
[ 25.834605] kasan_check_range+0x10c/0x1c0
[ 25.834631] __kasan_check_write+0x18/0x20
[ 25.834653] kasan_atomics_helper+0x236f/0x59f0
[ 25.834677] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 25.834702] ? kasan_save_alloc_info+0x3b/0x50
[ 25.834731] kasan_atomics+0x1dc/0x310
[ 25.834863] ? __pfx_kasan_atomics+0x10/0x10
[ 25.834894] ? __pfx_read_tsc+0x10/0x10
[ 25.834915] ? ktime_get_ts64+0x86/0x230
[ 25.834942] kunit_try_run_case+0x1a5/0x490
[ 25.834966] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.834988] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 25.835011] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.835036] ? __kthread_parkme+0x82/0x180
[ 25.835060] ? preempt_count_sub+0x50/0x80
[ 25.835087] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.835111] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.835138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.835165] kthread+0x337/0x6f0
[ 25.835185] ? trace_preempt_on+0x20/0xc0
[ 25.835208] ? __pfx_kthread+0x10/0x10
[ 25.835230] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.835253] ? calculate_sigpending+0x7b/0xa0
[ 25.835276] ? __pfx_kthread+0x10/0x10
[ 25.835297] ret_from_fork+0x1c5/0x240
[ 25.835319] ? __pfx_kthread+0x10/0x10
[ 25.835340] ret_from_fork_asm+0x1a/0x30
[ 25.835373] </TASK>
[ 25.835385]
[ 25.845018] Allocated by task 323:
[ 25.845201] kasan_save_stack+0x45/0x70
[ 25.845559] kasan_save_track+0x18/0x40
[ 25.845724] kasan_save_alloc_info+0x3b/0x50
[ 25.845955] __kasan_kmalloc+0xb7/0xc0
[ 25.846123] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 25.846516] kasan_atomics+0x95/0x310
[ 25.846944] kunit_try_run_case+0x1a5/0x490
[ 25.847127] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.847493] kthread+0x337/0x6f0
[ 25.847742] ret_from_fork+0x1c5/0x240
[ 25.848059] ret_from_fork_asm+0x1a/0x30
[ 25.848249]
[ 25.848474] The buggy address belongs to the object at ffff888105db2a00
[ 25.848474] which belongs to the cache kmalloc-64 of size 64
[ 25.848965] The buggy address is located 0 bytes to the right of
[ 25.848965] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 25.849742]
[ 25.849957] The buggy address belongs to the physical page:
[ 25.850395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 25.850701] flags: 0x200000000000000(node=0|zone=2)
[ 25.850940] page_type: f5(slab)
[ 25.851180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 25.851792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 25.852149] page dumped because: kasan: bad access detected
[ 25.852410]
[ 25.852491] Memory state around the buggy address:
[ 25.852970] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.853323] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 25.853850] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 25.854223] ^
[ 25.854660] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.854963] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.855268] ==================================================================
---
[ 26.166239] ==================================================================
[ 26.166472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x33f0/0x59f0
[ 26.166969] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 26.167513]
[ 26.167618] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 26.167668] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.167681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.167714] Call Trace:
[ 26.167727] <TASK>
[ 26.167741] dump_stack_lvl+0x73/0xb0
[ 26.167790] print_report+0xd1/0x640
[ 26.167814] ? __virt_addr_valid+0x1db/0x2d0
[ 26.167836] ? kasan_atomics_helper+0x33f0/0x59f0
[ 26.167878] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.167902] ? kasan_atomics_helper+0x33f0/0x59f0
[ 26.167933] kasan_report+0x144/0x180
[ 26.167957] ? kasan_atomics_helper+0x33f0/0x59f0
[ 26.167996] kasan_check_range+0x10c/0x1c0
[ 26.168020] __kasan_check_write+0x18/0x20
[ 26.168040] kasan_atomics_helper+0x33f0/0x59f0
[ 26.168065] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.168098] ? kasan_save_alloc_info+0x3b/0x50
[ 26.168127] kasan_atomics+0x1dc/0x310
[ 26.168151] ? __pfx_kasan_atomics+0x10/0x10
[ 26.168186] ? __pfx_read_tsc+0x10/0x10
[ 26.168206] ? ktime_get_ts64+0x86/0x230
[ 26.168230] kunit_try_run_case+0x1a5/0x490
[ 26.168254] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.168286] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.168310] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.168344] ? __kthread_parkme+0x82/0x180
[ 26.168368] ? preempt_count_sub+0x50/0x80
[ 26.168394] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.168418] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.168453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.168480] kthread+0x337/0x6f0
[ 26.168511] ? trace_preempt_on+0x20/0xc0
[ 26.168533] ? __pfx_kthread+0x10/0x10
[ 26.168554] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.168576] ? calculate_sigpending+0x7b/0xa0
[ 26.168599] ? __pfx_kthread+0x10/0x10
[ 26.168620] ret_from_fork+0x1c5/0x240
[ 26.168641] ? __pfx_kthread+0x10/0x10
[ 26.168662] ret_from_fork_asm+0x1a/0x30
[ 26.168694] </TASK>
[ 26.168707]
[ 26.176061] Allocated by task 323:
[ 26.176289] kasan_save_stack+0x45/0x70
[ 26.176539] kasan_save_track+0x18/0x40
[ 26.176782] kasan_save_alloc_info+0x3b/0x50
[ 26.176966] __kasan_kmalloc+0xb7/0xc0
[ 26.177150] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.177423] kasan_atomics+0x95/0x310
[ 26.177608] kunit_try_run_case+0x1a5/0x490
[ 26.177824] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.178080] kthread+0x337/0x6f0
[ 26.178199] ret_from_fork+0x1c5/0x240
[ 26.178328] ret_from_fork_asm+0x1a/0x30
[ 26.178461]
[ 26.178526] The buggy address belongs to the object at ffff888105db2a00
[ 26.178526] which belongs to the cache kmalloc-64 of size 64
[ 26.179006] The buggy address is located 0 bytes to the right of
[ 26.179006] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.179549]
[ 26.179640] The buggy address belongs to the physical page:
[ 26.179929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.180276] flags: 0x200000000000000(node=0|zone=2)
[ 26.180490] page_type: f5(slab)
[ 26.180608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.180845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.181114] page dumped because: kasan: bad access detected
[ 26.181412]
[ 26.181503] Memory state around the buggy address:
[ 26.181729] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.182067] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.182393] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.182702] ^
[ 26.182903] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.183173] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.183441] ==================================================================
---
[ 25.997702] ==================================================================
[ 25.998046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x28ca/0x59f0
[ 25.998604] Write of size 8 at addr ffff888105db2a30 by task kunit_try_catch/323
[ 25.999285]
[ 25.999491] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 25.999543] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.999557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.999581] Call Trace:
[ 25.999596] <TASK>
[ 25.999612] dump_stack_lvl+0x73/0xb0
[ 25.999643] print_report+0xd1/0x640
[ 25.999672] ? __virt_addr_valid+0x1db/0x2d0
[ 25.999695] ? kasan_atomics_helper+0x28ca/0x59f0
[ 25.999931] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.999961] ? kasan_atomics_helper+0x28ca/0x59f0
[ 25.999986] kasan_report+0x144/0x180
[ 26.000011] ? kasan_atomics_helper+0x28ca/0x59f0
[ 26.000039] kasan_check_range+0x10c/0x1c0
[ 26.000064] __kasan_check_write+0x18/0x20
[ 26.000085] kasan_atomics_helper+0x28ca/0x59f0
[ 26.000109] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.000133] ? kasan_save_alloc_info+0x3b/0x50
[ 26.000163] kasan_atomics+0x1dc/0x310
[ 26.000187] ? __pfx_kasan_atomics+0x10/0x10
[ 26.000212] ? __pfx_read_tsc+0x10/0x10
[ 26.000232] ? ktime_get_ts64+0x86/0x230
[ 26.000257] kunit_try_run_case+0x1a5/0x490
[ 26.000281] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.000304] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 26.000328] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.000352] ? __kthread_parkme+0x82/0x180
[ 26.000375] ? preempt_count_sub+0x50/0x80
[ 26.000402] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.000425] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.000452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.000479] kthread+0x337/0x6f0
[ 26.000499] ? trace_preempt_on+0x20/0xc0
[ 26.000522] ? __pfx_kthread+0x10/0x10
[ 26.000543] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.000565] ? calculate_sigpending+0x7b/0xa0
[ 26.000588] ? __pfx_kthread+0x10/0x10
[ 26.000609] ret_from_fork+0x1c5/0x240
[ 26.000631] ? __pfx_kthread+0x10/0x10
[ 26.000651] ret_from_fork_asm+0x1a/0x30
[ 26.000684] </TASK>
[ 26.000696]
[ 26.008162] Allocated by task 323:
[ 26.008339] kasan_save_stack+0x45/0x70
[ 26.008557] kasan_save_track+0x18/0x40
[ 26.008712] kasan_save_alloc_info+0x3b/0x50
[ 26.008869] __kasan_kmalloc+0xb7/0xc0
[ 26.009095] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 26.009311] kasan_atomics+0x95/0x310
[ 26.009523] kunit_try_run_case+0x1a5/0x490
[ 26.009727] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.010008] kthread+0x337/0x6f0
[ 26.010213] ret_from_fork+0x1c5/0x240
[ 26.010402] ret_from_fork_asm+0x1a/0x30
[ 26.010606]
[ 26.010697] The buggy address belongs to the object at ffff888105db2a00
[ 26.010697] which belongs to the cache kmalloc-64 of size 64
[ 26.011248] The buggy address is located 0 bytes to the right of
[ 26.011248] allocated 48-byte region [ffff888105db2a00, ffff888105db2a30)
[ 26.011760]
[ 26.011863] The buggy address belongs to the physical page:
[ 26.012165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db2
[ 26.012685] flags: 0x200000000000000(node=0|zone=2)
[ 26.012857] page_type: f5(slab)
[ 26.013018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.013344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.013664] page dumped because: kasan: bad access detected
[ 26.013941]
[ 26.014030] Memory state around the buggy address:
[ 26.014242] ffff888105db2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.014546] ffff888105db2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.014751] >ffff888105db2a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.015490] ^
[ 26.015753] ffff888105db2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.016118] ffff888105db2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.016532] ==================================================================
kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper Regression Log 8 (gcc-13-lkftconfig-kunit)
[ 22.353456] ==================================================================
[ 22.354133] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x868/0x980
[ 22.354469] Write of size 1 at addr ffff888105a2e0eb by task kunit_try_catch/216
[ 22.354747]
[ 22.354845] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 22.354895] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.354908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.354929] Call Trace:
[ 22.354941] <TASK>
[ 22.354954] dump_stack_lvl+0x73/0xb0
[ 22.354982] print_report+0xd1/0x640
[ 22.355005] ? __virt_addr_valid+0x1db/0x2d0
[ 22.355028] ? krealloc_more_oob_helper+0x868/0x980
[ 22.355051] ? kasan_addr_to_slab+0x11/0xa0
[ 22.355071] ? krealloc_more_oob_helper+0x868/0x980
[ 22.355095] kasan_report+0x144/0x180
[ 22.355116] ? krealloc_more_oob_helper+0x868/0x980
[ 22.355145] __asan_report_store1_noabort+0x1b/0x30
[ 22.355168] krealloc_more_oob_helper+0x868/0x980
[ 22.355190] ? __schedule+0x10e1/0x2b50
[ 22.355214] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 22.355237] ? finish_task_switch.isra.0+0x153/0x700
[ 22.355261] ? __switch_to+0x47/0xf90
[ 22.355280] ? update_rq_clock+0x1b2/0x4d0
[ 22.355302] ? __schedule+0x10e1/0x2b50
[ 22.355323] ? __pfx_read_tsc+0x10/0x10
[ 22.355346] krealloc_large_more_oob+0x1c/0x30
[ 22.355368] kunit_try_run_case+0x1a5/0x490
[ 22.355393] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.355413] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 22.355435] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.355458] ? __kthread_parkme+0x82/0x180
[ 22.355481] ? preempt_count_sub+0x50/0x80
[ 22.355505] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.355527] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.355552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.355591] kthread+0x337/0x6f0
[ 22.355609] ? trace_preempt_on+0x20/0xc0
[ 22.355632] ? __pfx_kthread+0x10/0x10
[ 22.355675] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.355695] ? calculate_sigpending+0x7b/0xa0
[ 22.355717] ? __pfx_kthread+0x10/0x10
[ 22.355737] ret_from_fork+0x1c5/0x240
[ 22.355758] ? __pfx_kthread+0x10/0x10
[ 22.355785] ret_from_fork_asm+0x1a/0x30
[ 22.355817] </TASK>
[ 22.355829]
[ 22.365851] The buggy address belongs to the physical page:
[ 22.366490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2c
[ 22.367272] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.367629] flags: 0x200000000000040(head|node=0|zone=2)
[ 22.367821] page_type: f8(unknown)
[ 22.368111] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 22.368832] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 22.369827] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 22.370834] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 22.371934] head: 0200000000000002 ffffea0004168b01 00000000ffffffff 00000000ffffffff
[ 22.372982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[ 22.373988] page dumped because: kasan: bad access detected
[ 22.374649]
[ 22.374920] Memory state around the buggy address:
[ 22.375489] ffff888105a2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.375720] ffff888105a2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.375949] >ffff888105a2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 22.376160] ^
[ 22.376584] ffff888105a2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 22.376828] ffff888105a2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 22.377253] ==================================================================
kasan-bug-kasan-slab-out-of-bounds-in-memchr Regression Log 9 (gcc-13-lkftconfig-kunit)
[ 24.411356] ==================================================================
[ 24.411813] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[ 24.412228] Read of size 1 at addr ffff88810582b358 by task kunit_try_catch/313
[ 24.412474]
[ 24.412561] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 24.412611] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.412624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.412647] Call Trace:
[ 24.412660] <TASK>
[ 24.412674] dump_stack_lvl+0x73/0xb0
[ 24.412701] print_report+0xd1/0x640
[ 24.412726] ? __virt_addr_valid+0x1db/0x2d0
[ 24.412749] ? memchr+0x79/0x90
[ 24.412770] ? kasan_complete_mode_report_info+0x2a/0x200
[ 24.412803] ? memchr+0x79/0x90
[ 24.412824] kasan_report+0x144/0x180
[ 24.412847] ? memchr+0x79/0x90
[ 24.412873] __asan_report_load1_noabort+0x18/0x20
[ 24.412897] memchr+0x79/0x90
[ 24.412920] kasan_memchr+0x162/0x340
[ 24.412940] ? __kasan_check_write+0x18/0x20
[ 24.412959] ? __pfx_kasan_memchr+0x10/0x10
[ 24.412980] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 24.413003] ? trace_hardirqs_on+0x37/0xe0
[ 24.413025] ? __pfx_read_tsc+0x10/0x10
[ 24.413045] ? ktime_get_ts64+0x86/0x230
[ 24.413068] kunit_try_run_case+0x1a5/0x490
[ 24.413114] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.413138] ? queued_spin_lock_slowpath+0x116/0xb40
[ 24.413162] ? __kthread_parkme+0x82/0x180
[ 24.413185] ? preempt_count_sub+0x50/0x80
[ 24.413211] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.413234] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.413263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.413291] kthread+0x337/0x6f0
[ 24.413309] ? trace_preempt_on+0x20/0xc0
[ 24.413331] ? __pfx_kthread+0x10/0x10
[ 24.413351] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.413371] ? calculate_sigpending+0x7b/0xa0
[ 24.413393] ? __pfx_kthread+0x10/0x10
[ 24.413413] ret_from_fork+0x1c5/0x240
[ 24.413434] ? __pfx_kthread+0x10/0x10
[ 24.413453] ret_from_fork_asm+0x1a/0x30
[ 24.413486] </TASK>
[ 24.413500]
[ 24.421657] Allocated by task 313:
[ 24.421865] kasan_save_stack+0x45/0x70
[ 24.422039] kasan_save_track+0x18/0x40
[ 24.422434] kasan_save_alloc_info+0x3b/0x50
[ 24.422650] __kasan_kmalloc+0xb7/0xc0
[ 24.422838] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 24.423076] kasan_memchr+0xac/0x340
[ 24.423277] kunit_try_run_case+0x1a5/0x490
[ 24.423473] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.423720] kthread+0x337/0x6f0
[ 24.423845] ret_from_fork+0x1c5/0x240
[ 24.423970] ret_from_fork_asm+0x1a/0x30
[ 24.424294]
[ 24.424401] The buggy address belongs to the object at ffff88810582b340
[ 24.424401] which belongs to the cache kmalloc-32 of size 32
[ 24.425023] The buggy address is located 0 bytes to the right of
[ 24.425023] allocated 24-byte region [ffff88810582b340, ffff88810582b358)
[ 24.425728]
[ 24.425824] The buggy address belongs to the physical page:
[ 24.426107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10582b
[ 24.426495] flags: 0x200000000000000(node=0|zone=2)
[ 24.426700] page_type: f5(slab)
[ 24.426835] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 24.427077] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 24.427399] page dumped because: kasan: bad access detected
[ 24.427644]
[ 24.427829] Memory state around the buggy address:
[ 24.428283] ffff88810582b200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 24.428587] ffff88810582b280: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 24.428917] >ffff88810582b300: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 24.429181] ^
[ 24.429354] ffff88810582b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.429555] ffff88810582b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.430045] ==================================================================
kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper Regression Log 10 (gcc-13-lkftconfig-kunit)
[ 23.989326] ==================================================================
[ 23.989840] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x30c/0x390
[ 23.990456] Read of size 1 at addr ffff8881062b2001 by task kunit_try_catch/281
[ 23.990806]
[ 23.991321] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 23.991380] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.991394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.991418] Call Trace:
[ 23.991433] <TASK>
[ 23.991447] dump_stack_lvl+0x73/0xb0
[ 23.991479] print_report+0xd1/0x640
[ 23.991503] ? __virt_addr_valid+0x1db/0x2d0
[ 23.991527] ? mempool_oob_right_helper+0x30c/0x390
[ 23.991550] ? kasan_addr_to_slab+0x11/0xa0
[ 23.991571] ? mempool_oob_right_helper+0x30c/0x390
[ 23.991594] kasan_report+0x144/0x180
[ 23.991616] ? mempool_oob_right_helper+0x30c/0x390
[ 23.991644] __asan_report_load1_noabort+0x18/0x20
[ 23.991675] mempool_oob_right_helper+0x30c/0x390
[ 23.991698] ? __pfx_mempool_oob_right_helper+0x10/0x10
[ 23.991720] ? __pfx_call_function_single_prep_ipi+0x10/0x10
[ 23.991746] ? __kasan_check_write+0x18/0x20
[ 23.991766] ? finish_task_switch.isra.0+0x153/0x700
[ 23.991806] mempool_kmalloc_large_oob_right+0xf2/0x150
[ 23.991935] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[ 23.991961] ? update_rq_clock+0x1b2/0x4d0
[ 23.991982] ? __pfx_mempool_kmalloc+0x10/0x10
[ 23.992007] ? __pfx_mempool_kfree+0x10/0x10
[ 23.992029] ? __pfx_read_tsc+0x10/0x10
[ 23.992050] ? ktime_get_ts64+0x86/0x230
[ 23.992074] kunit_try_run_case+0x1a5/0x490
[ 23.992097] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.992118] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 23.992158] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.992181] ? __kthread_parkme+0x82/0x180
[ 23.992204] ? preempt_count_sub+0x50/0x80
[ 23.992229] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.992251] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.992277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.992303] kthread+0x337/0x6f0
[ 23.992321] ? trace_preempt_on+0x20/0xc0
[ 23.992343] ? __pfx_kthread+0x10/0x10
[ 23.992362] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.992382] ? calculate_sigpending+0x7b/0xa0
[ 23.992405] ? __pfx_kthread+0x10/0x10
[ 23.992425] ret_from_fork+0x1c5/0x240
[ 23.992446] ? __pfx_kthread+0x10/0x10
[ 23.992464] ret_from_fork_asm+0x1a/0x30
[ 23.992498] </TASK>
[ 23.992510]
[ 24.005470] The buggy address belongs to the physical page:
[ 24.005806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b0
[ 24.006490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 24.006812] flags: 0x200000000000040(head|node=0|zone=2)
[ 24.007359] page_type: f8(unknown)
[ 24.007664] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 24.008359] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 24.008717] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 24.009492] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 24.009974] head: 0200000000000002 ffffea000418ac01 00000000ffffffff 00000000ffffffff
[ 24.010491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[ 24.010829] page dumped because: kasan: bad access detected
[ 24.011235]
[ 24.011320] Memory state around the buggy address:
[ 24.011518] ffff8881062b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.011800] ffff8881062b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.012715] >ffff8881062b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 24.013438] ^
[ 24.013751] ffff8881062b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 24.014286] ffff8881062b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 24.014548] ==================================================================
kasan-bug-kasan-slab-use-after-free-in-kasan_strings Regression Log 11 (gcc-13-lkftconfig-kunit)
[ 24.554729] ==================================================================
[ 24.555080] BUG: KASAN: slab-use-after-free in kasan_strings+0xdf1/0xf70
[ 24.555867] Read of size 1 at addr ffff888105db3990 by task kunit_try_catch/317
[ 24.556336]
[ 24.556453] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 24.556501] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.556513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.556534] Call Trace:
[ 24.556549] <TASK>
[ 24.556564] dump_stack_lvl+0x73/0xb0
[ 24.556592] print_report+0xd1/0x640
[ 24.556613] ? __virt_addr_valid+0x1db/0x2d0
[ 24.556636] ? kasan_strings+0xdf1/0xf70
[ 24.556655] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.556678] ? kasan_strings+0xdf1/0xf70
[ 24.556698] kasan_report+0x144/0x180
[ 24.556719] ? kasan_strings+0xdf1/0xf70
[ 24.556744] __asan_report_load1_noabort+0x18/0x20
[ 24.556767] kasan_strings+0xdf1/0xf70
[ 24.556798] ? trace_hardirqs_on+0x37/0xe0
[ 24.556821] ? __pfx_kasan_strings+0x10/0x10
[ 24.556840] ? finish_task_switch.isra.0+0x153/0x700
[ 24.556863] ? __switch_to+0x47/0xf90
[ 24.556882] ? update_rq_clock+0x1b2/0x4d0
[ 24.556904] ? __schedule+0x10e1/0x2b50
[ 24.556925] ? __pfx_read_tsc+0x10/0x10
[ 24.556944] ? ktime_get_ts64+0x86/0x230
[ 24.556967] kunit_try_run_case+0x1a5/0x490
[ 24.556989] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.557009] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 24.557031] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.557053] ? __kthread_parkme+0x82/0x180
[ 24.557075] ? preempt_count_sub+0x50/0x80
[ 24.557100] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.557121] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.557192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.557221] kthread+0x337/0x6f0
[ 24.557239] ? trace_preempt_on+0x20/0xc0
[ 24.557260] ? __pfx_kthread+0x10/0x10
[ 24.557279] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.557300] ? calculate_sigpending+0x7b/0xa0
[ 24.557323] ? __pfx_kthread+0x10/0x10
[ 24.557342] ret_from_fork+0x1c5/0x240
[ 24.557362] ? __pfx_kthread+0x10/0x10
[ 24.557381] ret_from_fork_asm+0x1a/0x30
[ 24.557413] </TASK>
[ 24.557423]
[ 24.567343] Allocated by task 317:
[ 24.567512] kasan_save_stack+0x45/0x70
[ 24.567714] kasan_save_track+0x18/0x40
[ 24.568041] kasan_save_alloc_info+0x3b/0x50
[ 24.568510] __kasan_kmalloc+0xb7/0xc0
[ 24.568658] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 24.568818] kasan_strings+0xc0/0xf70
[ 24.569074] kunit_try_run_case+0x1a5/0x490
[ 24.569274] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.569690] kthread+0x337/0x6f0
[ 24.569851] ret_from_fork+0x1c5/0x240
[ 24.570033] ret_from_fork_asm+0x1a/0x30
[ 24.570302]
[ 24.570375] Freed by task 317:
[ 24.570502] kasan_save_stack+0x45/0x70
[ 24.570694] kasan_save_track+0x18/0x40
[ 24.570885] __kasan_save_free_info+0x3f/0x60
[ 24.571057] __kasan_slab_free+0x68/0x90
[ 24.571278] kfree+0x225/0x4f0
[ 24.571442] kasan_strings+0x34f/0xf70
[ 24.571600] kunit_try_run_case+0x1a5/0x490
[ 24.571792] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.571962] kthread+0x337/0x6f0
[ 24.572073] ret_from_fork+0x1c5/0x240
[ 24.572201] ret_from_fork_asm+0x1a/0x30
[ 24.572333]
[ 24.572397] The buggy address belongs to the object at ffff888105db3980
[ 24.572397] which belongs to the cache kmalloc-32 of size 32
[ 24.572914] The buggy address is located 16 bytes inside of
[ 24.572914] freed 32-byte region [ffff888105db3980, ffff888105db39a0)
[ 24.574050]
[ 24.574125] The buggy address belongs to the physical page:
[ 24.574386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db3
[ 24.574635] flags: 0x200000000000000(node=0|zone=2)
[ 24.574803] page_type: f5(slab)
[ 24.575067] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 24.575485] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 24.575864] page dumped because: kasan: bad access detected
[ 24.576084]
[ 24.576164] Memory state around the buggy address:
[ 24.576420] ffff888105db3880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 24.576847] ffff888105db3900: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 24.577116] >ffff888105db3980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 24.577532] ^
[ 24.577722] ffff888105db3a00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 24.578043] ffff888105db3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.578360] ==================================================================
kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper Regression Log 12 (gcc-13-lkftconfig-kunit)
[ 24.105232] ==================================================================
[ 24.105796] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x387/0x420
[ 24.106234] Read of size 1 at addr ffff888105db5240 by task kunit_try_catch/289
[ 24.106707]
[ 24.106832] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 24.106883] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.106897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.106919] Call Trace:
[ 24.106937] <TASK>
[ 24.106951] dump_stack_lvl+0x73/0xb0
[ 24.106982] print_report+0xd1/0x640
[ 24.107006] ? __virt_addr_valid+0x1db/0x2d0
[ 24.107030] ? mempool_uaf_helper+0x387/0x420
[ 24.107051] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.107074] ? mempool_uaf_helper+0x387/0x420
[ 24.107097] kasan_report+0x144/0x180
[ 24.107119] ? mempool_uaf_helper+0x387/0x420
[ 24.107146] __asan_report_load1_noabort+0x18/0x20
[ 24.107170] mempool_uaf_helper+0x387/0x420
[ 24.107192] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 24.107224] mempool_slab_uaf+0xea/0x140
[ 24.107249] ? __pfx_mempool_slab_uaf+0x10/0x10
[ 24.107270] ? update_rq_clock+0x1b2/0x4d0
[ 24.107293] ? __pfx_mempool_alloc_slab+0x10/0x10
[ 24.107316] ? __pfx_mempool_free_slab+0x10/0x10
[ 24.107341] ? __pfx_read_tsc+0x10/0x10
[ 24.107361] ? ktime_get_ts64+0x86/0x230
[ 24.107384] kunit_try_run_case+0x1a5/0x490
[ 24.107409] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.107430] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 24.107453] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.107477] ? __kthread_parkme+0x82/0x180
[ 24.107500] ? preempt_count_sub+0x50/0x80
[ 24.107525] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.107548] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.107573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.107598] kthread+0x337/0x6f0
[ 24.107617] ? trace_preempt_on+0x20/0xc0
[ 24.107639] ? __pfx_kthread+0x10/0x10
[ 24.107664] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.107685] ? calculate_sigpending+0x7b/0xa0
[ 24.107707] ? __pfx_kthread+0x10/0x10
[ 24.107728] ret_from_fork+0x1c5/0x240
[ 24.107752] ? __pfx_kthread+0x10/0x10
[ 24.107772] ret_from_fork_asm+0x1a/0x30
[ 24.107814] </TASK>
[ 24.107826]
[ 24.120997] Allocated by task 289:
[ 24.121442] kasan_save_stack+0x45/0x70
[ 24.121760] kasan_save_track+0x18/0x40
[ 24.122117] kasan_save_alloc_info+0x3b/0x50
[ 24.122519] __kasan_mempool_unpoison_object+0x1bb/0x200
[ 24.122755] remove_element+0x11e/0x190
[ 24.123054] mempool_alloc_preallocated+0x4d/0x90
[ 24.123385] mempool_uaf_helper+0x96/0x420
[ 24.123565] mempool_slab_uaf+0xea/0x140
[ 24.123749] kunit_try_run_case+0x1a5/0x490
[ 24.123899] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.124068] kthread+0x337/0x6f0
[ 24.124187] ret_from_fork+0x1c5/0x240
[ 24.124534] ret_from_fork_asm+0x1a/0x30
[ 24.124733]
[ 24.124837] Freed by task 289:
[ 24.125025] kasan_save_stack+0x45/0x70
[ 24.125158] kasan_save_track+0x18/0x40
[ 24.125375] __kasan_save_free_info+0x3f/0x60
[ 24.125744] __kasan_mempool_poison_object+0x131/0x1d0
[ 24.126061] mempool_free+0x45f/0x6a0
[ 24.126281] mempool_uaf_helper+0x11a/0x420
[ 24.126496] mempool_slab_uaf+0xea/0x140
[ 24.126800] kunit_try_run_case+0x1a5/0x490
[ 24.126950] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.127121] kthread+0x337/0x6f0
[ 24.127363] ret_from_fork+0x1c5/0x240
[ 24.127558] ret_from_fork_asm+0x1a/0x30
[ 24.127759]
[ 24.127860] The buggy address belongs to the object at ffff888105db5240
[ 24.127860] which belongs to the cache test_cache of size 123
[ 24.128235] The buggy address is located 0 bytes inside of
[ 24.128235] freed 123-byte region [ffff888105db5240, ffff888105db52bb)
[ 24.128758]
[ 24.128857] The buggy address belongs to the physical page:
[ 24.129119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db5
[ 24.129564] flags: 0x200000000000000(node=0|zone=2)
[ 24.129791] page_type: f5(slab)
[ 24.129910] raw: 0200000000000000 ffff888101dbe8c0 dead000000000122 0000000000000000
[ 24.130137] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[ 24.130464] page dumped because: kasan: bad access detected
[ 24.130798]
[ 24.130955] Memory state around the buggy address:
[ 24.131152] ffff888105db5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.131404] ffff888105db5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.131623] >ffff888105db5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 24.132038] ^
[ 24.132254] ffff888105db5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.132536] ffff888105db5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.132876] ==================================================================
kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim Regression Log 13 (gcc-13-lkftconfig-kunit)
[ 23.089248] ==================================================================
[ 23.090736] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[ 23.091113] Read of size 4 at addr ffff888105e7ec80 by task swapper/1/0
[ 23.091411]
[ 23.091613] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 23.091668] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.091681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.091702] Call Trace:
[ 23.091731] <IRQ>
[ 23.091746] dump_stack_lvl+0x73/0xb0
[ 23.091814] print_report+0xd1/0x640
[ 23.091837] ? __virt_addr_valid+0x1db/0x2d0
[ 23.091882] ? rcu_uaf_reclaim+0x50/0x60
[ 23.091903] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.091924] ? rcu_uaf_reclaim+0x50/0x60
[ 23.091945] kasan_report+0x144/0x180
[ 23.091967] ? rcu_uaf_reclaim+0x50/0x60
[ 23.091992] __asan_report_load4_noabort+0x18/0x20
[ 23.092016] rcu_uaf_reclaim+0x50/0x60
[ 23.092036] rcu_core+0x66f/0x1c90
[ 23.092065] ? __pfx_rcu_core+0x10/0x10
[ 23.092085] ? ktime_get+0x6b/0x150
[ 23.092111] rcu_core_si+0x12/0x20
[ 23.092188] handle_softirqs+0x209/0x730
[ 23.092212] ? hrtimer_interrupt+0x2fe/0x780
[ 23.092238] ? __pfx_handle_softirqs+0x10/0x10
[ 23.092263] __irq_exit_rcu+0xc9/0x110
[ 23.092281] irq_exit_rcu+0x12/0x20
[ 23.092300] sysvec_apic_timer_interrupt+0x81/0x90
[ 23.092325] </IRQ>
[ 23.092354] <TASK>
[ 23.092365] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 23.092457] RIP: 0010:pv_native_safe_halt+0xf/0x20
[ 23.092675] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 73 a8 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[ 23.092756] RSP: 0000:ffff88810088fdc0 EFLAGS: 00010216
[ 23.092886] RAX: ffff8881c9ca0000 RBX: ffff88810086b000 RCX: ffffffff8eeb1e85
[ 23.092935] RDX: ffffed102b626193 RSI: 0000000000000004 RDI: 00000000000200ac
[ 23.092978] RBP: ffff88810088fdc8 R08: 0000000000000001 R09: ffffed102b626192
[ 23.093022] R10: ffff88815b130c93 R11: ffff88815b1363c8 R12: 0000000000000001
[ 23.093064] R13: ffffed102010d600 R14: ffffffff90c48ad0 R15: 0000000000000000
[ 23.093122] ? ct_kernel_exit.constprop.0+0xa5/0xd0
[ 23.093247] ? default_idle+0xd/0x20
[ 23.093270] arch_cpu_idle+0xd/0x20
[ 23.093292] default_idle_call+0x47/0x80
[ 23.093314] do_idle+0x363/0x4b0
[ 23.093339] ? __pfx_do_idle+0x10/0x10
[ 23.093359] ? _raw_spin_unlock_irqrestore+0x49/0x90
[ 23.093383] ? complete+0x15b/0x1d0
[ 23.093408] cpu_startup_entry+0x5c/0x70
[ 23.093430] start_secondary+0x211/0x290
[ 23.093451] ? __pfx_start_secondary+0x10/0x10
[ 23.093475] common_startup_64+0x13e/0x148
[ 23.093508] </TASK>
[ 23.093520]
[ 23.108888] Allocated by task 254:
[ 23.109197] kasan_save_stack+0x45/0x70
[ 23.109612] kasan_save_track+0x18/0x40
[ 23.110004] kasan_save_alloc_info+0x3b/0x50
[ 23.110403] __kasan_kmalloc+0xb7/0xc0
[ 23.110805] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 23.111071] rcu_uaf+0xb0/0x350
[ 23.111359] kunit_try_run_case+0x1a5/0x490
[ 23.111789] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.112321] kthread+0x337/0x6f0
[ 23.112610] ret_from_fork+0x1c5/0x240
[ 23.112745] ret_from_fork_asm+0x1a/0x30
[ 23.112896]
[ 23.112961] Freed by task 0:
[ 23.113063] kasan_save_stack+0x45/0x70
[ 23.113267] kasan_save_track+0x18/0x40
[ 23.113460] __kasan_save_free_info+0x3f/0x60
[ 23.113642] __kasan_slab_free+0x68/0x90
[ 23.113829] kfree+0x225/0x4f0
[ 23.113960] rcu_uaf_reclaim+0x1f/0x60
[ 23.114111] rcu_core+0x66f/0x1c90
[ 23.114287] rcu_core_si+0x12/0x20
[ 23.114429] handle_softirqs+0x209/0x730
[ 23.114596] __irq_exit_rcu+0xc9/0x110
[ 23.114752] irq_exit_rcu+0x12/0x20
[ 23.114881] sysvec_apic_timer_interrupt+0x81/0x90
[ 23.115036] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 23.115217]
[ 23.115326] Last potentially related work creation:
[ 23.115596] kasan_save_stack+0x45/0x70
[ 23.115806] kasan_record_aux_stack+0xb2/0xc0
[ 23.116080] __call_rcu_common.constprop.0+0x7b/0x9e0
[ 23.116534] call_rcu+0x12/0x20
[ 23.116703] rcu_uaf+0x168/0x350
[ 23.116860] kunit_try_run_case+0x1a5/0x490
[ 23.117051] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.117316] kthread+0x337/0x6f0
[ 23.117476] ret_from_fork+0x1c5/0x240
[ 23.117629] ret_from_fork_asm+0x1a/0x30
[ 23.117772]
[ 23.117861] The buggy address belongs to the object at ffff888105e7ec80
[ 23.117861] which belongs to the cache kmalloc-32 of size 32
[ 23.118290] The buggy address is located 0 bytes inside of
[ 23.118290] freed 32-byte region [ffff888105e7ec80, ffff888105e7eca0)
[ 23.118811]
[ 23.118973] The buggy address belongs to the physical page:
[ 23.119203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7e
[ 23.119489] flags: 0x200000000000000(node=0|zone=2)
[ 23.119648] page_type: f5(slab)
[ 23.119773] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 23.120608] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 23.120960] page dumped because: kasan: bad access detected
[ 23.121260]
[ 23.121338] Memory state around the buggy address:
[ 23.121516] ffff888105e7eb80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 23.121810] ffff888105e7ec00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 23.122150] >ffff888105e7ec80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.122467] ^
[ 23.122636] ffff888105e7ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.122887] ffff888105e7ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.123093] ==================================================================
kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf Regression Log 14 (gcc-13-lkftconfig-kunit)
[ 23.129369] ==================================================================
[ 23.129759] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4cc/0x580
[ 23.130063] Read of size 8 at addr ffff888105e7ed00 by task kunit_try_catch/256
[ 23.130425]
[ 23.130688] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 23.130740] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.130753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.130788] Call Trace:
[ 23.130800] <TASK>
[ 23.130814] dump_stack_lvl+0x73/0xb0
[ 23.130842] print_report+0xd1/0x640
[ 23.130865] ? __virt_addr_valid+0x1db/0x2d0
[ 23.130888] ? workqueue_uaf+0x4cc/0x580
[ 23.130909] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.130930] ? workqueue_uaf+0x4cc/0x580
[ 23.130951] kasan_report+0x144/0x180
[ 23.130973] ? workqueue_uaf+0x4cc/0x580
[ 23.130998] __asan_report_load8_noabort+0x18/0x20
[ 23.131022] workqueue_uaf+0x4cc/0x580
[ 23.131043] ? __pfx_workqueue_uaf+0x10/0x10
[ 23.131065] ? __schedule+0x206a/0x2b50
[ 23.131087] ? __pfx_read_tsc+0x10/0x10
[ 23.131106] ? ktime_get_ts64+0x86/0x230
[ 23.131129] kunit_try_run_case+0x1a5/0x490
[ 23.131152] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.131173] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 23.131195] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.131324] ? __kthread_parkme+0x82/0x180
[ 23.131350] ? preempt_count_sub+0x50/0x80
[ 23.131376] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.131400] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.131426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.131452] kthread+0x337/0x6f0
[ 23.131470] ? trace_preempt_on+0x20/0xc0
[ 23.131493] ? __pfx_kthread+0x10/0x10
[ 23.131512] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.131533] ? calculate_sigpending+0x7b/0xa0
[ 23.131556] ? __pfx_kthread+0x10/0x10
[ 23.131575] ret_from_fork+0x1c5/0x240
[ 23.131595] ? __pfx_kthread+0x10/0x10
[ 23.131614] ret_from_fork_asm+0x1a/0x30
[ 23.131646] </TASK>
[ 23.131663]
[ 23.138818] Allocated by task 256:
[ 23.138988] kasan_save_stack+0x45/0x70
[ 23.139205] kasan_save_track+0x18/0x40
[ 23.139399] kasan_save_alloc_info+0x3b/0x50
[ 23.139576] __kasan_kmalloc+0xb7/0xc0
[ 23.139706] __kmalloc_cache_noprof+0x1d4/0x5f0
[ 23.139867] workqueue_uaf+0x152/0x580
[ 23.139994] kunit_try_run_case+0x1a5/0x490
[ 23.140182] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.140425] kthread+0x337/0x6f0
[ 23.140582] ret_from_fork+0x1c5/0x240
[ 23.140759] ret_from_fork_asm+0x1a/0x30
[ 23.141184]
[ 23.141282] Freed by task 44:
[ 23.141385] kasan_save_stack+0x45/0x70
[ 23.141518] kasan_save_track+0x18/0x40
[ 23.141702] __kasan_save_free_info+0x3f/0x60
[ 23.141963] __kasan_slab_free+0x68/0x90
[ 23.142146] kfree+0x225/0x4f0
[ 23.142316] workqueue_uaf_work+0x12/0x20
[ 23.142507] process_one_work+0x5ee/0xf60
[ 23.142670] worker_thread+0x758/0x1220
[ 23.142852] kthread+0x337/0x6f0
[ 23.143011] ret_from_fork+0x1c5/0x240
[ 23.143139] ret_from_fork_asm+0x1a/0x30
[ 23.143325]
[ 23.143407] Last potentially related work creation:
[ 23.143590] kasan_save_stack+0x45/0x70
[ 23.143740] kasan_record_aux_stack+0xb2/0xc0
[ 23.143897] __queue_work+0x61a/0xe70
[ 23.144024] queue_work_on+0xb6/0xc0
[ 23.144146] workqueue_uaf+0x26d/0x580
[ 23.144272] kunit_try_run_case+0x1a5/0x490
[ 23.144409] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.144634] kthread+0x337/0x6f0
[ 23.144978] ret_from_fork+0x1c5/0x240
[ 23.145212] ret_from_fork_asm+0x1a/0x30
[ 23.145449]
[ 23.145537] The buggy address belongs to the object at ffff888105e7ed00
[ 23.145537] which belongs to the cache kmalloc-32 of size 32
[ 23.146363] The buggy address is located 0 bytes inside of
[ 23.146363] freed 32-byte region [ffff888105e7ed00, ffff888105e7ed20)
[ 23.146771]
[ 23.146847] The buggy address belongs to the physical page:
[ 23.147105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7e
[ 23.147506] flags: 0x200000000000000(node=0|zone=2)
[ 23.147754] page_type: f5(slab)
[ 23.147962] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 23.148304] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 23.148602] page dumped because: kasan: bad access detected
[ 23.148829]
[ 23.148958] Memory state around the buggy address:
[ 23.149284] ffff888105e7ec00: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 23.149586] ffff888105e7ec80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 23.149840] >ffff888105e7ed00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.150375] ^
[ 23.150524] ffff888105e7ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.150749] ffff888105e7ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.151259] ==================================================================
kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob Regression Log 15 (gcc-13-lkftconfig-kunit)
[ 24.341626] ==================================================================
[ 24.342280] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b7/0x320
[ 24.342676] Read of size 1 at addr ffff888106217cf2 by task kunit_try_catch/307
[ 24.342984]
[ 24.343099] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 24.343148] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.343161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.343235] Call Trace:
[ 24.343250] <TASK>
[ 24.343264] dump_stack_lvl+0x73/0xb0
[ 24.343295] print_report+0xd1/0x640
[ 24.343317] ? __virt_addr_valid+0x1db/0x2d0
[ 24.343342] ? kasan_stack_oob+0x2b7/0x320
[ 24.343361] ? kasan_addr_to_slab+0x11/0xa0
[ 24.343383] ? kasan_stack_oob+0x2b7/0x320
[ 24.343404] kasan_report+0x144/0x180
[ 24.343427] ? kasan_stack_oob+0x2b7/0x320
[ 24.343452] __asan_report_load1_noabort+0x18/0x20
[ 24.343477] kasan_stack_oob+0x2b7/0x320
[ 24.343497] ? __pfx_kasan_stack_oob+0x10/0x10
[ 24.343520] ? __kasan_check_write+0x18/0x20
[ 24.343539] ? queued_spin_lock_slowpath+0x116/0xb40
[ 24.343562] ? irqentry_exit+0x2a/0x60
[ 24.343584] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 24.343609] ? __pfx_read_tsc+0x10/0x10
[ 24.343629] ? ktime_get_ts64+0x86/0x230
[ 24.343662] kunit_try_run_case+0x1a5/0x490
[ 24.343686] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.343710] ? queued_spin_lock_slowpath+0x116/0xb40
[ 24.343733] ? __kthread_parkme+0x82/0x180
[ 24.343757] ? preempt_count_sub+0x50/0x80
[ 24.343796] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.343818] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.343844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.343871] kthread+0x337/0x6f0
[ 24.343889] ? trace_preempt_on+0x20/0xc0
[ 24.343913] ? __pfx_kthread+0x10/0x10
[ 24.343932] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.343953] ? calculate_sigpending+0x7b/0xa0
[ 24.343975] ? __pfx_kthread+0x10/0x10
[ 24.343996] ret_from_fork+0x1c5/0x240
[ 24.344017] ? __pfx_kthread+0x10/0x10
[ 24.344036] ret_from_fork_asm+0x1a/0x30
[ 24.344069] </TASK>
[ 24.344081]
[ 24.354913] The buggy address belongs to stack of task kunit_try_catch/307
[ 24.355474] and is located at offset 138 in frame:
[ 24.355797] kasan_stack_oob+0x0/0x320
[ 24.356129]
[ 24.356241] This frame has 4 objects:
[ 24.356499] [48, 49) '__assertion'
[ 24.356520] [64, 72) 'array'
[ 24.356680] [96, 112) '__assertion'
[ 24.356832] [128, 138) 'stack_array'
[ 24.357362]
[ 24.357601] The buggy address belongs to the physical page:
[ 24.358068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106217
[ 24.358488] flags: 0x200000000000000(node=0|zone=2)
[ 24.358727] raw: 0200000000000000 ffffea00041885c8 ffffea00041885c8 0000000000000000
[ 24.359425] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 24.359765] page dumped because: kasan: bad access detected
[ 24.360006]
[ 24.360177] Memory state around the buggy address:
[ 24.360560] ffff888106217b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.360966] ffff888106217c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[ 24.361367] >ffff888106217c80: f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3
[ 24.361631] ^
[ 24.361942] ffff888106217d00: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[ 24.362222] ffff888106217d80: f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00
[ 24.362502] ==================================================================
kasan-bug-kasan-use-after-free-in-mempool_uaf_helper Regression Log 16 (gcc-13-lkftconfig-kunit)
[ 24.145486] ==================================================================
[ 24.145925] BUG: KASAN: use-after-free in mempool_uaf_helper+0x387/0x420
[ 24.146237] Read of size 1 at addr ffff8881062b0000 by task kunit_try_catch/291
[ 24.146730]
[ 24.146856] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 24.146912] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.146925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.146948] Call Trace:
[ 24.146961] <TASK>
[ 24.146977] dump_stack_lvl+0x73/0xb0
[ 24.147007] print_report+0xd1/0x640
[ 24.147030] ? __virt_addr_valid+0x1db/0x2d0
[ 24.147054] ? mempool_uaf_helper+0x387/0x420
[ 24.147076] ? kasan_addr_to_slab+0x11/0xa0
[ 24.147096] ? mempool_uaf_helper+0x387/0x420
[ 24.147119] kasan_report+0x144/0x180
[ 24.147454] ? mempool_uaf_helper+0x387/0x420
[ 24.147494] __asan_report_load1_noabort+0x18/0x20
[ 24.147521] mempool_uaf_helper+0x387/0x420
[ 24.147544] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 24.147570] ? finish_task_switch.isra.0+0x153/0x700
[ 24.147831] mempool_page_alloc_uaf+0xed/0x140
[ 24.147862] ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[ 24.147886] ? update_rq_clock+0x1b2/0x4d0
[ 24.147910] ? __pfx_mempool_alloc_pages+0x10/0x10
[ 24.147936] ? __pfx_mempool_free_pages+0x10/0x10
[ 24.147960] ? __pfx_read_tsc+0x10/0x10
[ 24.147981] ? ktime_get_ts64+0x86/0x230
[ 24.148005] kunit_try_run_case+0x1a5/0x490
[ 24.148030] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.148051] ? _raw_spin_lock_irqsave+0xa1/0x100
[ 24.148075] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.148098] ? __kthread_parkme+0x82/0x180
[ 24.148121] ? preempt_count_sub+0x50/0x80
[ 24.148286] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.148317] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.148345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.148371] kthread+0x337/0x6f0
[ 24.148390] ? trace_preempt_on+0x20/0xc0
[ 24.148414] ? __pfx_kthread+0x10/0x10
[ 24.148434] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.148455] ? calculate_sigpending+0x7b/0xa0
[ 24.148478] ? __pfx_kthread+0x10/0x10
[ 24.148498] ret_from_fork+0x1c5/0x240
[ 24.148519] ? __pfx_kthread+0x10/0x10
[ 24.148538] ret_from_fork_asm+0x1a/0x30
[ 24.148571] </TASK>
[ 24.148583]
[ 24.162480] The buggy address belongs to the physical page:
[ 24.162729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b0
[ 24.163270] flags: 0x200000000000000(node=0|zone=2)
[ 24.163494] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 24.164205] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 24.164964] page dumped because: kasan: bad access detected
[ 24.165496]
[ 24.165657] Memory state around the buggy address:
[ 24.166038] ffff8881062aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 24.166538] ffff8881062aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 24.167096] >ffff8881062b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 24.167728] ^
[ 24.168122] ffff8881062b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 24.168670] ffff8881062b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 24.169089] ==================================================================
kasan-bug-kasan-use-after-free-in-page_alloc_uaf Regression Log 17 (gcc-13-lkftconfig-kunit)
[ 22.167084] ==================================================================
[ 22.168032] BUG: KASAN: use-after-free in page_alloc_uaf+0x369/0x3f0
[ 22.168341] Read of size 1 at addr ffff888106240000 by task kunit_try_catch/210
[ 22.168997]
[ 22.169119] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.17.0-rc7-next-20250924 #1 PREEMPT(voluntary)
[ 22.169169] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.169181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.169202] Call Trace:
[ 22.169214] <TASK>
[ 22.169227] dump_stack_lvl+0x73/0xb0
[ 22.169256] print_report+0xd1/0x640
[ 22.169279] ? __virt_addr_valid+0x1db/0x2d0
[ 22.169345] ? page_alloc_uaf+0x369/0x3f0
[ 22.169367] ? kasan_addr_to_slab+0x11/0xa0
[ 22.169387] ? page_alloc_uaf+0x369/0x3f0
[ 22.169408] kasan_report+0x144/0x180
[ 22.169429] ? page_alloc_uaf+0x369/0x3f0
[ 22.169456] __asan_report_load1_noabort+0x18/0x20
[ 22.169479] page_alloc_uaf+0x369/0x3f0
[ 22.169500] ? __pfx_page_alloc_uaf+0x10/0x10
[ 22.169523] ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[ 22.169547] ? __pfx_read_tsc+0x10/0x10
[ 22.169566] ? ktime_get_ts64+0x86/0x230
[ 22.169590] kunit_try_run_case+0x1a5/0x490
[ 22.169613] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.169634] ? _raw_spin_lock_irqsave+0xf9/0x100
[ 22.169655] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.169677] ? __kthread_parkme+0x82/0x180
[ 22.169699] ? preempt_count_sub+0x50/0x80
[ 22.169725] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.169746] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.169771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.169806] kthread+0x337/0x6f0
[ 22.169824] ? trace_preempt_on+0x20/0xc0
[ 22.169845] ? __pfx_kthread+0x10/0x10
[ 22.169864] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.169904] ? calculate_sigpending+0x7b/0xa0
[ 22.169926] ? __pfx_kthread+0x10/0x10
[ 22.169946] ret_from_fork+0x1c5/0x240
[ 22.169966] ? __pfx_kthread+0x10/0x10
[ 22.169985] ret_from_fork_asm+0x1a/0x30
[ 22.170018] </TASK>
[ 22.170030]
[ 22.177845] The buggy address belongs to the physical page:
[ 22.178204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106240
[ 22.178614] flags: 0x200000000000000(node=0|zone=2)
[ 22.178867] page_type: f0(buddy)
[ 22.179038] raw: 0200000000000000 ffff88817fffc4f0 ffff88817fffc4f0 0000000000000000
[ 22.179504] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[ 22.179736] page dumped because: kasan: bad access detected
[ 22.180002]
[ 22.180091] Memory state around the buggy address:
[ 22.180425] ffff88810623ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.180743] ffff88810623ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.181174] >ffff888106240000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 22.181484] ^
[ 22.181631] ffff888106240080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 22.182052] ffff888106240100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 22.182698] ==================================================================
clang-compiler-fs_btrfs_disk-io_c-warning-format-specifies-type-size_t-aka-unsigned-int-but-the-argument-has-type-unsigned-long Regression Log 1 (rv32-clang-20-allnoconfig)
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=riscv CROSS_COMPILE=riscv64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1
/builds/linux/fs/btrfs/disk-io.c:3401:28: warning: format specifies type 'size_t' (aka 'unsigned int') but the argument has type 'unsigned long' [-Wformat]
3400 | "support for block size %u with page size %zu is experimental, some features may be missing",
| ~~~
| %lu
3401 | fs_info->sectorsize, PAGE_SIZE);
| ^~~~~~~~~
/builds/linux/fs/btrfs/messages.h:47:51: note: expanded from macro 'btrfs_warn'
47 | btrfs_printk_in_rcu(fs_info, KERN_WARNING fmt, ##args)
| ~~~ ^~~~
/builds/linux/fs/btrfs/messages.h:84:31: note: expanded from macro 'btrfs_printk_in_rcu'
84 | btrfs_printk(fs_info, fmt, ##args); \
| ~~~ ^~~~
/builds/linux/fs/btrfs/messages.h:27:32: note: expanded from macro 'btrfs_printk'
27 | _btrfs_printk(fs_info, fmt, ##args)
| ~~~ ^~~~
/builds/linux/include/vdso/page.h:15:19: note: expanded from macro 'PAGE_SIZE'
15 | #define PAGE_SIZE (_AC(1,UL) << CONFIG_PAGE_SHIFT)
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
clang-compiler-futex_numa_mpol_c-warning-unused-function-test_futex_mpol Regression Log 2 (clang-20-lkftconfig-no-kselftest-frag)
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
futex_numa_mpol.c:134:13: warning: unused function 'test_futex_mpol' [-Wunused-function]
134 | static void test_futex_mpol(void *futex_ptr, int err_value)
| ^~~~~~~~~~~~~~~
clang-compiler-kselftest_h-error-unknown-type-name-bool Regression Log 3 (clang-20-lkftconfig-no-kselftest-frag)
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/vDSO'
In file included from vdso_standalone_test_x86.c:19:
./../kselftest.h:116:8: error: unknown type name 'bool'
116 | static bool ksft_debug_enabled;
| ^
clang-compiler-utils_cpupower-info_c-warning-implicit-truncation-from-int-to-a-one-bit-wide-bit-field-changes-value-from-to-cc-_home_tuxbuild__cache_tuxmake_builds__build_utils_powercap-info_o Regression Log 4 (clang-nightly-lkftconfig-kselftest)
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
utils/cpupower-info.c:60:21: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion] CC /home/tuxbuild/.cache/tuxmake/builds/1/build/utils/powercap-info.o
60 | params.perf_bias = 1;
| ^ ~
gcc-compiler-futex_numa_mpol_c-warning-test_futex_mpol-defined-but-not-used Regression Log 5 (gcc-13-lkftconfig-kselftest)
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
futex_numa_mpol.c:134:13: warning: 'test_futex_mpol' defined but not used [-Wunused-function]
134 | static void test_futex_mpol(void *futex_ptr, int err_value)
| ^~~~~~~~~~~~~~~
gcc-compiler-kselftest_h-error-unknown-type-name-bool Regression Log 6 (gcc-13-lkftconfig-kselftest)
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/vDSO'
In file included from vdso_standalone_test_x86.c:19:
../kselftest.h:116:8: error: unknown type name 'bool'
116 | static bool ksft_debug_enabled;
| ^~~~
internal-error-oops-oops-smp Regression Log 1 (gcc-13-lkftconfig-64k_page_size)
[ 1030.581641] Internal error: Oops: 0000000096000005 [#1] SMP
[ 1030.590192] Modules linked in: tun overlay btrfs blake2b_generic xor xor_neon raid6_pq zstd_compress snd_soc_hdmi_codec pm8916_wdt qcom_wcnss_pil coresight_cpu_debug adv7511 coresight_stm stm_core coresight_cti snd_soc_lpass_apq8016 snd_soc_lpass_cpu snd_soc_msm8916_digital snd_soc_apq8016_sbc snd_soc_msm8916_analog snd_soc_qcom_common snd_soc_lpass_platform msm qcom_spmi_vadc qcom_pon qcom_vadc_common snd_soc_core rtc_pm8xxx qcom_spmi_temp_alarm snd_compress snd_pcm_dmaengine ubwc_config snd_pcm qrtr snd_timer llcc_qcom snd soundcore ocmem drm_gpuvm qcom_q6v5_mss qcom_pil_info drm_exec qcom_q6v5 gpu_sched drm_dp_aux_bus qcom_camss venus_core qcom_sysmon qcom_common drm_display_helper videobuf2_dma_sg qcom_stats qcom_glink_smem videobuf2_memops v4l2_mem2mem qmi_helpers qnoc_msm8916 cec mdt_loader videobuf2_v4l2 drm_client_lib videobuf2_common qcom_rng display_connector rpmsg_ctrl rpmsg_char rmtfs_mem socinfo drm_kms_helper ramoops reed_solomon fuse drm backlight
[ 1030.670482] CPU: 2 UID: 0 PID: 130839 Comm: listmount04 Not tainted 6.17.0-rc7-next-20250924 #1 PREEMPT
[ 1030.681628] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 1030.691042] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1030.697715] pc : mnt_ns_release+0x58/0x118
[ 1030.704381] lr : __arm64_sys_listmount+0xc0/0x530
[ 1030.708547] sp : ffff80008e0afd50
[ 1030.713279] x29: ffff80008e0afd50 x28: ffff00001a339440 x27: 0000000000000000
[ 1030.716601] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000100
[ 1030.723735] x23: 0000000000000000 x22: 0000000000000020 x21: ffff80008e0afdc8
[ 1030.730851] x20: 0000aaaadd221110 x19: 0000000000000000 x18: 0000000000000000
[ 1030.737954] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 1030.745045] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1030.752099] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804fbe30
[ 1030.759187] x8 : ffff80008e0afda0 x7 : fefefefefefefefe x6 : ffff800082d29000
[ 1030.766284] x5 : 00000000000000b8 x4 : ffff00001a339440 x3 : 0000000000000000
[ 1030.773414] x2 : 0000000000000001 x1 : 0000000000000000 x0 : 00000000000000b8
[ 1030.780516] Call trace:
[ 1030.787614] mnt_ns_release+0x58/0x118 (P)
[ 1030.789833] __arm64_sys_listmount+0xc0/0x530
[ 1030.793958] invoke_syscall.constprop.0+0x58/0xf8
[ 1030.798363] do_el0_svc+0x48/0xd8
[ 1030.803018] el0_svc+0x44/0x190
[ 1030.806301] el0t_64_sync_handler+0xa0/0xe8
[ 1030.809237] el0t_64_sync+0x198/0x1a0
[ 1030.813400] Code: d65f03c0 9102e265 52800022 f98000b1 (885f7ca1)
[ 1030.817244] ---[ end trace 0000000000000000 ]---
exception-warning-kerneltracetrace_functions_graph-at-print_graph_entry Regression Log 2 (gcc-13-lkftconfig)
------------[ cut here ]------------
[ 131.264925] WARNING: kernel/trace/trace_functions_graph.c:1001 at print_graph_entry+0x4c8/0x508, CPU#2: cat/6980
[ 131.268895] Modules linked in: snd_soc_hdmi_codec pm8916_wdt qcom_wcnss_pil coresight_stm snd_soc_lpass_apq8016 stm_core coresight_cpu_debug coresight_cti snd_soc_apq8016_sbc snd_soc_lpass_cpu snd_soc_msm8916_analog snd_soc_msm8916_digital snd_soc_qcom_common adv7511 snd_soc_lpass_platform snd_soc_core snd_compress snd_pcm_dmaengine qcom_spmi_temp_alarm msm rtc_pm8xxx qcom_pon snd_pcm qrtr snd_timer qcom_spmi_vadc ubwc_config qcom_vadc_common snd llcc_qcom qcom_q6v5_mss soundcore ocmem qcom_pil_info qcom_q6v5 drm_gpuvm drm_exec gpu_sched qcom_sysmon qcom_common qnoc_msm8916 drm_dp_aux_bus qcom_glink_smem qmi_helpers qcom_camss venus_core drm_display_helper videobuf2_dma_sg v4l2_mem2mem videobuf2_memops mdt_loader cec qcom_rng videobuf2_v4l2 qcom_stats drm_client_lib videobuf2_common rpmsg_ctrl rpmsg_char socinfo display_connector ramoops drm_kms_helper rmtfs_mem reed_solomon fuse drm backlight
[ 131.339730] CPU: 2 UID: 0 PID: 6980 Comm: cat Not tainted 6.17.0-rc7-next-20250924 #1 PREEMPT
[ 131.357871] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[ 131.366341] pstate: a0000005 (NzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 131.373211] pc : print_graph_entry+0x4c8/0x508
[ 131.379748] lr : print_graph_entry+0x140/0x508
[ 131.384261] sp : ffff80008f3dbb00
[ 131.388623] x29: ffff80008f3dbb60 x28: ffff000004a8a200 x27: ffff000004a8a250
[ 131.392226] x26: ffff8000801863dc x25: 0000000000000002 x24: ffff000004a8a200
[ 131.399344] x23: ffff000014d24000 x22: 0000000000000697 x21: 00000000fefefefe
[ 131.406464] x20: ffff000014d20000 x19: ffff000014d22090 x18: 0000000000000000
[ 131.413583] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 131.420702] x14: 0000000000000001 x13: 0000000000000001 x12: 000002680200000b
[ 131.427817] x11: ffff80008180f028 x10: 0000000000000020 x9 : ffff8000800a3068
[ 131.434938] x8 : 0000000000000020 x7 : 0000000000000001 x6 : 0000000000000029
[ 131.442055] x5 : ffff000014d22094 x4 : ffff8000823b8fa6 x3 : 0000000000000002
[ 131.449173] x2 : ffff800082c31708 x1 : ffff7fffbd00b000 x0 : fffffdffbf7d92b0
[ 131.456293] Call trace:
[ 131.463143] print_graph_entry+0x4c8/0x508 (P)
[ 131.465514] print_graph_function_flags+0x280/0x4b8
[ 131.470051] print_graph_function+0x18/0x28
[ 131.474784] print_trace_line+0xc8/0x5d0
[ 131.478938] tracing_read_pipe+0x21c/0x390
[ 131.483115] vfs_read+0xcc/0x340
[ 131.486974] ksys_read+0x7c/0x120
[ 131.490360] __arm64_sys_read+0x24/0x38
[ 131.493600] invoke_syscall+0x50/0x120
[ 131.497243] el0_svc_common.constprop.0+0xc8/0xf0
[ 131.501118] do_el0_svc+0x24/0x38
[ 131.505814] el0_svc+0x3c/0x138
[ 131.509099] el0t_64_sync_handler+0xa0/0xe8
[ 131.512111] el0t_64_sync+0x198/0x1a0
[ 131.516253] ---[ end trace 0000000000000000 ]---
exception-event-ma_read-has-unsafe-pointer-field-fn Regression Log 3 (gcc-13-lkftconfig)
------------[ cut here ]------------
[ 35.583587] event 'ma_read' has unsafe pointer field 'fn'
[ 35.584054] WARNING: kernel/trace/trace.c:3776 at ignore_event+0x1da/0x1f6, CPU#0: cat/420
[ 35.584103] Modules linked in: fuse drm drm_panel_orientation_quirks backlight configfs
[ 35.584401] CPU: 0 UID: 0 PID: 420 Comm: cat Not tainted 6.17.0-rc7-next-20250924 #1 NONE
[ 35.584440] Hardware name: riscv-virtio,qemu (DT)
[ 35.584523] epc : ignore_event+0x1da/0x1f6
[ 35.584563] ra : ignore_event+0x1da/0x1f6
[ 35.584589] epc : ffffffff80147524 ra : ffffffff80147524 sp : ff20000000713bf0
[ 35.584604] gp : ffffffff81e6fec8 tp : ff60000081275400 t0 : ff200000007139f8
[ 35.584618] t1 : ffffffffffffe000 t2 : 205b2d2d2d2d2d2d s0 : ff20000000713c60
[ 35.584632] s1 : ff60000080067150 a0 : 000000000000002d a1 : 0000000000000001
[ 35.584645] a2 : 00000000000000e0 a3 : 0000000000000000 a4 : 0000000000000000
[ 35.584658] a5 : 0000000000000000 a6 : ff20000000713918 a7 : 0000000000000a00
[ 35.584672] s2 : ffffffff81a01678 s3 : ff60000082748078 s4 : ffffffff81df63f0
[ 35.584691] s5 : ff6000008274a090 s6 : ff6000008274a054 s7 : ff60000085364f60
[ 35.584704] s8 : ffffffff81200000 s9 : ffffffff81a00000 s10: ffffffff81e04d50
[ 35.584717] s11: ff6000008274c000 t3 : ffffffff81e87f82 t4 : ffffffff81e87f82
[ 35.584730] t5 : ffffffff81e87f88 t6 : ff200000007139f8
[ 35.584743] status: 0000000200000120 badaddr: ffffffff80147524 cause: 0000000000000003
[ 35.584789] [<ffffffff80147524>] ignore_event+0x1da/0x1f6
[ 35.584845] [<ffffffff8014cd24>] trace_event_printf+0x46/0x88
[ 35.584856] [<ffffffff80d3f98c>] trace_raw_output_ma_read+0x5e/0x7a
[ 35.584871] [<ffffffff80148890>] print_trace_line+0x1c2/0x438
[ 35.584883] [<ffffffff801490e8>] tracing_read_pipe+0x1a8/0x2f0
[ 35.584896] [<ffffffff802e4f96>] vfs_read+0xac/0x2cc
[ 35.584910] [<ffffffff802e59ca>] ksys_read+0x6a/0xd4
[ 35.584922] [<ffffffff802e5a48>] __riscv_sys_read+0x14/0x1c
[ 35.584934] [<ffffffff80d5ce78>] do_trap_ecall_u+0x1ba/0x392
[ 35.584946] [<ffffffff80d6967a>] handle_exception+0x146/0x152
[ 35.585006] ---[ end trace 0000000000000000 ]---
bug-bug-kernel-null-pointer-dereference-address Regression Log 4 (clang-20-lkftconfig-compat)
[ 702.087122] BUG: kernel NULL pointer dereference, address: 00000000000000b8
oops-oops-oops-smp-pti Regression Log 5 (clang-20-lkftconfig-compat)
[ 702.089190] Oops: Oops: 0002 [#1] SMP PTI
listmount04 Regression Log 1 (gcc-13-lkftconfig-64k_page_size)
listmount04 listmount04
listmount04: [ 1030.456117] /usr/local/bin/kirk[404]: listmount04: start (command: listmount04)
sendmsg03 Regression Log 2 (gcc-13-lkftconfig-64k_page_size)
sendmsg03 sendmsg03
sendmsg03: [ 1546.790770] /usr/local/bin/kirk[404]: sendmsg03: start (command: sendmsg03)
sendto03 Regression Log 3 (gcc-13-lkftconfig-64k_page_size)
failed 0[ 2647.851175] <LAVA_SIGNAL_ENDTC sendto03>
\0\0\0
broken 1
skipped 0
sendto03 sendto03
sendto03: [ 1547.497631] /usr/local/bin/kirk[404]: sendto03: start (command: sendto03)
setsockopt05 Regression Log 4 (gcc-13-lkftconfig-64k_page_size)
setsockopt05 setsockopt05
setsockopt05: [ 1568.095982] /usr/local/bin/kirk[404]: setsockopt05: start (command: setsockopt05)
setsockopt09 Regression Log 5 (gcc-13-lkftconfig-64k_page_size)
setsockopt09 setsockopt09
setsockopt09: [ 1595.799471] /usr/local/bin/kirk[404]: setsockopt09: start (command: setsockopt09)
timerfd_settime02 Regression Log 6 (gcc-13-lkftconfig-64k_page_size)
timerfd_settime02 timerfd_settime02
timerfd_settime02: [ 1759.296523] /usr/local/bin/kirk[404]: timerfd_settime02: start (command: timerfd_settime02)
wait403 Regression Log 7 (gcc-13-lkftconfig-64k_page_size)
wait403 wait403
wait403: [ 1802.020500] /usr/local/bin/kirk[404]: wait403: start (command: wait403)
arm64_fp-ptrace Regression Log 8 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: fp-stress
Warning: file fp-stress is missing!
arm64_fp-ptrace fail
arm64_fp-stress Regression Log 9 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: sve-ptrace
Warning: file sve-ptrace is missing!
arm64_fp-stress fail
arm64_hwcap Regression Log 10 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: ptrace
Warning: file ptrace is missing!
arm64_hwcap fail
arm64_ptrace Regression Log 11 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: syscall-abi
Warning: file syscall-abi is missing!
arm64_ptrace fail
arm64_sve-probe-vls Regression Log 12 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: vec-syscfg
Warning: file vec-syscfg is missing!
arm64_sve-probe-vls fail
arm64_sve-ptrace Regression Log 13 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: sve-probe-vls
Warning: file sve-probe-vls is missing!
arm64_sve-ptrace fail
arm64_syscall-abi Regression Log 14 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: tpidr2
Warning: file tpidr2 is missing!
arm64_syscall-abi fail
arm64_tpidr2 Regression Log 15 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: basic-gcs
TAP version 13
1..0 # SKIP SKIP GCS not supported
arm64_tpidr2_restore skip
arm64_tpidr2_siginfo pass
arm64_tpidr2 fail
arm64_vec-syscfg Regression Log 16 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: za-fork
Warning: file za-fork is missing!
arm64_vec-syscfg fail
arm64_za-fork Regression Log 17 (gcc-12-lkftconfig-graviton4-no-kselftest-frag)
timeout set to 45
selftests: arm64: za-ptrace
Warning: file za-ptrace is missing!
arm64_za-fork fail
listmount04 Regression Log 18 (clang-20-lkftconfig)
<8>[ 1119.165712] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP @1758727004 riscv64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1852: TBROK: Test killed by SIGSEGV!
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 1119.181830] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 1106.631341] /usr/local/bin/kirk[291]: listmount04: start (command: listmount04)
listmount04 Regression Log 19 (gcc-13-lkftconfig)
<8>[ 1034.150241] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP @1758727003 riscv64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1852: TBROK: Test killed by SIGSEGV!
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 1034.161009] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 1024.212398] /usr/local/bin/kirk[290]: listmount04: start (command: listmount04)
listmount04 Regression Log 20 (clang-20-lkftconfig-compat)
<8>[ 714.875283] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727005 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 714.890138] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 701.987319] /usr/local/bin/kirk[310]: listmount04: start (command: listmount04)
listmount04 Regression Log 21 (gcc-13-lkftconfig-compat)
<8>[ 712.374470] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727008 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 712.389933] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 699.734405] /usr/local/bin/kirk[311]: listmount04: start (command: listmount04)
shardfile-vDSO Regression Log 22 (clang-20-lkftconfig-no-kselftest-frag)
<8>[ 15.692188] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-vDSO RESULT=fail>
shardfile-vDSO fail
listmount04 Regression Log 23 (clang-20-lkftconfig)
<8>[ 731.933385] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727006 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 731.951285] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 719.900284] /usr/local/bin/kirk[312]: listmount04: start (command: listmount04)
mm_run_vmtests_sh_uffd-unit-tests Regression Log 24 (clang-nightly-lkftconfig-kselftest)
<8>[ 414.520860] <LAVA_SIGNAL_STARTTC mm_run_vmtests_sh_uffd-unit-tests>
exit=1--------------------------------
running ./uffd-stress anon 20 16
--------------------------------
nr_pages: 5120, nr_pages_per_cpu: 2560
bounces: 15, mode: rnd racing ver poll, userfaults: 1096 missing (542+554+\b)
bounces: 14, mode: racing ver poll, userfaults: 1329 missing (659+670+\b)
bounces: 13, mode: rnd ver poll, userfaults: 1217 missing (621+596+\b)
bounces: 12, mode: ver poll, userfaults: 682 missing (339+343+\b)
bounces: 11, mode: rnd racing poll, userfaults: 1186 missing (598+588+\b)
bounces: 10, mode: racing poll, userfaults: 867 missing (332+535+\b)
bounces: 9, mode: rnd poll, userfaults: 1450 missing (724+726+\b)
bounces: 8, mode: poll, userfaults: 1200 missing (589+611+\b)
bounces: 7, mode: rnd racing ver read, userfaults: 1919 missing (967+952+\b)
bounces: 6, mode: racing ver read, userfaults: 1482 missing (672+810+\b)
bounces: 5, mode: rnd ver read, userfaults: 1390 missing (694+696+\b)
bounces: 4, mode: ver read, userfaults: 1377 missing (801+576+\b)
bounces: 3, mode: rnd racing read, userfaults: 1904 missing (948+956+\b)
bounces: 2, mode: racing read, userfaults: 1025 missing (521+504+\b)
bounces: 1, mode: rnd read, userfaults: 1408 missing (730+678+\b)
bounces: 0, mode: read, userfaults: 1749 missing (917+832+\b)
[PASS]
<8>[ 414.540878] <LAVA_SIGNAL_ENDTC mm_run_vmtests_sh_uffd-unit-tests>
mm_run_vmtests_sh_uffd-unit-tests fail
listmount04 Regression Log 25 (clang-nightly-lkftconfig)
<8>[ 674.323444] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727005 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 674.337887] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 663.879859] /usr/local/bin/kirk[312]: listmount04: start (command: listmount04)
cgroup_test_cpu_test_cpucg_nice Regression Log 26 (gcc-13-lkftconfig-kselftest)
<8>[ 90.911743] <LAVA_SIGNAL_STARTTC cgroup_test_cpu_test_cpucg_nice>
<8>[ 90.922799] <LAVA_SIGNAL_ENDTC cgroup_test_cpu_test_cpucg_nice>
cgroup_test_cpu_test_cpucg_nice fail
shardfile-vDSO Regression Log 27 (gcc-13-lkftconfig-no-kselftest-frag)
<8>[ 21.996076] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=shardfile-vDSO RESULT=fail>
shardfile-vDSO fail
listmount04 Regression Log 28 (gcc-13-lkftconfig)
<8>[ 818.140386] <LAVA_SIGNAL_STARTTC listmount04>
tst_buffers.c:57: TINFO: Test is using guarded buffers
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.17.0-rc7-next-20250924 #1 SMP PREEMPT_DYNAMIC @1758727037 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_test.c:1846: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1
tst_test.c:1848: TBROK: Test killed! (timeout?)
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
<8>[ 818.152480] <LAVA_SIGNAL_ENDTC listmount04>
listmount04 listmount04
listmount04: <12>[ 805.479302] /usr/local/bin/kirk[314]: listmount04: start (command: listmount04)
listmount04 Regression Log 29 (gcc-13-lkftconfig-compat)
listmount04 listmount04
listmount04: [ 335.257582] /usr/local/bin/kirk[378]: listmount04: start (command: listmount04)
sendmsg03 Regression Log 30 (gcc-13-lkftconfig-compat)
sendmsg03 sendmsg03
sendmsg03: [ 778.539900] /usr/local/bin/kirk[378]: sendmsg03: start (command: sendmsg03)
sendto03 Regression Log 31 (gcc-13-lkftconfig-compat)
sendto03 sendto03
sendto03: [ 778.854063] /usr/local/bin/kirk[378]: sendto03: start (command: sendto03)
setsockopt05 Regression Log 32 (gcc-13-lkftconfig-compat)
setsockopt05 setsockopt05
setsockopt05: [ 792.809840] /usr/local/bin/kirk[378]: setsockopt05: start (command: setsockopt05)
setsockopt09 Regression Log 33 (gcc-13-lkftconfig-compat)
setsockopt09 setsockopt09
setsockopt09: [ 808.934420] /usr/local/bin/kirk[378]: setsockopt09: start (command: setsockopt09)
timerfd_settime02 Regression Log 34 (gcc-13-lkftconfig-compat)
timerfd_settime02 timerfd_settime02
timerfd_settime02: [ 880.852903] /usr/local/bin/kirk[378]: timerfd_settime02: start (command: timerfd_settime02)
wait403 Regression Log 35 (gcc-13-lkftconfig-compat)
wait403 wait403
wait403: [ 896.703182] /usr/local/bin/kirk[378]: wait403: start (command: wait403)
shardfile-vDSO Regression Log 36 (clang-20-lkftconfig-no-kselftest-frag)
+ set +x
shardfile-vDSO fail
listmount04 Regression Log 37 (gcc-13-defconfig-preempt_rt)
listmount04 listmount04
listmount04: [ 346.019643] BUG: kernel NULL pointer dereference, address: 00000000000000d0
sendmsg03 Regression Log 38 (gcc-13-defconfig-preempt_rt)
tst_kconfig.c:88: TINFO: Parsing[ 1511.796007] <LAVA_SIGNAL_ENDTC sendmsg03>
kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
sendmsg03 sendmsg03
sendmsg03: broken | tainted (0.013s)
sendto03 Regression Log 39 (gcc-13-defconfig-preempt_rt)
ich might slow t[ 1511.964417] <LAVA_SIGNAL_ENDTC sendto03>
he execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
sendto02.c:38: TCONF: sctp protocol was not supported
Summary:
passed 0
failed 0
broken 0
skipped 1
warnings 0
tst_kconfig.c:88: [ 1511.987763] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=sendto03 RESULT=fail>
[ 1511.990827] <LAVA_SIGNAL_STARTTC set_mempolicy01>
sendto03 sendto03
sendto03: broken | tainted (0.012s)
setsockopt05 Regression Log 40 (gcc-13-defconfig-preempt_rt)
tst_kconfig.c:88[ 1515.735581] <LAVA_SIGNAL_ENDTC setsockopt05>
: TINFO: Parsing kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed 0
failed 0
broken 1
setsockopt05 setsockopt05
setsockopt05: broken | tainted (0.013s)
setsockopt09 Regression Log 41 (gcc-13-defconfig-preempt_rt)
Undefined
tst_t[ 1515.842096] <LAVA_SIGNAL_ENDTC setsockopt09>
est.c:1353: TCONF: Aborting due to unsuitable kernel config, see above!
setsockopt09 setsockopt09
setsockopt09: broken | tainted (0.013s)
timerfd_settime02 Regression Log 42 (gcc-13-defconfig-preempt_rt)
timerfd_settime02 timerfd_settime02
timerfd_settime02: broken | tainted (0.007s)
wait403 Regression Log 43 (gcc-13-defconfig-preempt_rt)
tst_taint.c:92: [ 1521.864624] <LAVA_SIGNAL_ENDTC wait403>
TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
[ 1521.891035] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=wait403 RESULT=fail>
wait403 wait403
wait403: broken | tainted (0.007s)
rt-tests-cyclicdeadline Regression Log 44 (gcc-13-defconfig-preempt_rt)
+ set +x
rt-tests-cyclicdeadline fail
shardfile-vDSO Regression Log 45 (gcc-13-lkftconfig-no-kselftest-frag)
+ set +x
shardfile-vDSO fail
listmount04 Regression Log 46 (gcc-13-lkftconfig-sched-proxy-exec)
listmount04 listmount04
listmount04: [ 332.755831] /usr/local/bin/kirk[378]: listmount04: start (command: listmount04)
sendmsg03 Regression Log 47 (gcc-13-lkftconfig-sched-proxy-exec)
sendmsg03 sendmsg03
sendmsg03: [ 745.587190] /usr/local/bin/kirk[378]: sendmsg03: start (command: sendmsg03)
sendto03 Regression Log 48 (gcc-13-lkftconfig-sched-proxy-exec)
sendto02.c:38: TCONF: sctp pro[ 1380.487789] <LAVA_SIGNAL_ENDTC sendto03>
tocol was not supported
Summary:
passed 0
failed 0
broken 0
skipped 1
warnings 0
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
sendto03 sendto03
sendto03: [ 745.860485] /usr/local/bin/kirk[378]: sendto03: start (command: sendto03)
setsockopt05 Regression Log 49 (gcc-13-lkftconfig-sched-proxy-exec)
setsockopt05 setsockopt05
setsockopt05: [ 757.905132] /usr/local/bin/kirk[378]: setsockopt05: start (command: setsockopt05)
setsockopt09 Regression Log 50 (gcc-13-lkftconfig-sched-proxy-exec)
setsockopt09 setsockopt09
setsockopt09: [ 773.958184] /usr/local/bin/kirk[378]: setsockopt09: start (command: setsockopt09)
timerfd_settime02 Regression Log 51 (gcc-13-lkftconfig-sched-proxy-exec)
timerfd_settime02 timerfd_settime02
timerfd_settime02: [ 844.806739] /usr/local/bin/kirk[378]: timerfd_settime02: start (command: timerfd_settime02)
wait403 Regression Log 52 (gcc-13-lkftconfig-sched-proxy-exec)
wait403 wait403
wait403: [ 858.066876] /usr/local/bin/kirk[378]: wait403: start (command: wait403)
listmount04 Regression Log 53 (gcc-13-lkftconfig)
listmount04 listmount04
listmount04: [ 330.050425] /usr/local/bin/kirk[377]: listmount04: start (command: listmount04)
sendmsg03 Regression Log 54 (gcc-13-lkftconfig)
sendmsg03 sendmsg03
sendmsg03: [ 722.217588] /usr/local/bin/kirk[377]: sendmsg03: start (command: sendmsg03)
sendto03 Regression Log 55 (gcc-13-lkftconfig)
[ 1395.816050] <LAVA_SIGNAL_STARTTC sendto03>
tst_kconfig.c:88[ 1395.823462] <LAVA_SIGNAL_ENDTC sendto03>
: TINFO: Parsing kernel config '/proc/config.gz'
tst_taint.c:92: TINFO: tainted: S (Running on out of spec system)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed 0
failed 0
broken 1
skipped 0
warnings 0
sendto03 sendto03
sendto03: [ 722.490941] /usr/local/bin/kirk[377]: sendto03: start (command: sendto03)
setsockopt05 Regression Log 56 (gcc-13-lkftconfig)
setsockopt05 setsockopt05
setsockopt05: [ 733.785272] /usr/local/bin/kirk[377]: setsockopt05: start (command: setsockopt05)
setsockopt09 Regression Log 57 (gcc-13-lkftconfig)
setsockopt09 setsockopt09
setsockopt09: [ 749.863820] /usr/local/bin/kirk[377]: setsockopt09: start (command: setsockopt09)
timerfd_settime02 Regression Log 58 (gcc-13-lkftconfig)
timerfd_settime02 timerfd_settime02
timerfd_settime02: [ 820.712314] /usr/local/bin/kirk[377]: timerfd_settime02: start (command: timerfd_settime02)
wait403 Regression Log 59 (gcc-13-lkftconfig)
wait403 wait403
wait403: [ 834.101388] /usr/local/bin/kirk[377]: wait403: start (command: wait403)
All Failure List (662 failures)
kselftest-arm64 (11 failures)
- arm64_fp-ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_fp-stress (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_hwcap (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_sve-probe-vls (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_sve-ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_syscall-abi (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_tpidr2 (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_vec-syscfg (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_za-fork (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
- arm64_za-ptrace (graviton4-vm/gcc-12-lkftconfig-graviton4-no-kselftest-frag)
kselftest-breakpoints (7 failures)
- shardfile-breakpoints (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- shardfile-breakpoints (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-breakpoints (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-breakpoints (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-breakpoints (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-breakpoints (x86/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-breakpoints (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-cgroup (23 failures)
- cgroup_test_cpu (dragonboard-410c/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpu (e850-96/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpu (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpu (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpu_test_cpucg_max (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpu_test_cpucg_max_nested (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpu_test_cpucg_nice (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- cgroup_test_cpuset_prs_sh (e850-96/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem (dragonboard-410c/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem (e850-96/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem_test_kmem_dead_cgroups (e850-96/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem_test_percpu_basic (dragonboard-410c/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem_test_percpu_basic (e850-96/gcc-13-lkftconfig-kselftest)
- cgroup_test_kmem_test_percpu_basic (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol_test_memcg_current_peak (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol_test_memcg_high (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol_test_memcg_low (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol_test_memcg_max (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol_test_memcg_min (x86/gcc-13-lkftconfig-kselftest)
- cgroup_test_memcontrol_test_memcg_reclaim (x86/gcc-13-lkftconfig-kselftest)
kselftest-clone3 (22 failures)
- clone3_clone3 (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3 (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3 (x86/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3 (x86/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_Shadow_stack_on_system_without_shadow_stack (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_Shadow_stack_on_system_without_shadow_stack (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_Shadow_stack_on_system_without_shadow_stack (x86/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_Shadow_stack_on_system_without_shadow_stack (x86/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- clone3_clone3_cap_checkpoint_restore (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore (x86/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore (x86/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (x86/clang-20-lkftconfig-no-kselftest-frag)
- clone3_clone3_cap_checkpoint_restore_global_clone3_cap_checkpoint_restore (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-core (14 failures)
- core_unshare_test (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- core_unshare_test (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- core_unshare_test (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- core_unshare_test (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- core_unshare_test (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- core_unshare_test (x86/clang-20-lkftconfig-no-kselftest-frag)
- core_unshare_test (x86/gcc-13-lkftconfig-no-kselftest-frag)
- core_unshare_test_global_unshare_EMFILE (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- core_unshare_test_global_unshare_EMFILE (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- core_unshare_test_global_unshare_EMFILE (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- core_unshare_test_global_unshare_EMFILE (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- core_unshare_test_global_unshare_EMFILE (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- core_unshare_test_global_unshare_EMFILE (x86/clang-20-lkftconfig-no-kselftest-frag)
- core_unshare_test_global_unshare_EMFILE (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-cpu-hotplug (1 failures)
- cpu-hotplug_cpu-on-off-test_sh (e850-96/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: e850-96
kselftest-filesystems (1 failures)
- filesystems_file_stressor (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-armv7, qemu-x86_64
kselftest-firmware (1 failures)
- firmware_fw_run_tests_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva, qemu-arm64, qemu-armv7, qemu-x86_64
kselftest-ftrace (1 failures)
- ftrace_ftracetest-ktap_Meta-selftest_Checkbashisms (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-armv7, qemu-x86_64
kselftest-gpio (1 failures)
- gpio_gpio-aggregator_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva
kselftest-kexec (3 failures)
- kexec_test_kexec_jump (qemu-x86_64/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64
- kexec_test_kexec_jump (qemu-x86_64/gcc-13-lkftconfig-kselftest)
- kexec_test_kexec_load_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64
kselftest-kvm (1 failures)
- kvm_irqfd_test (graviton4-metal/gcc-12-lkftconfig-graviton4-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
kselftest-memfd (1 failures)
- memfd_run_fuse_test_sh (qemu-x86_64/gcc-13-lkftconfig-kselftest)
kselftest-mm (20 failures)
- mm_run_vmtests_sh_guard-regions (x86/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: juno-r2, qemu-armv7, rk3399-rock-pi-4b, x15, x86
- mm_run_vmtests_sh_guard-regions_guard_regions_file_hole_punch (x86/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: juno-r2, rk3399-rock-pi-4b, x86
- mm_run_vmtests_sh_hugetlb_reparenting_test_sh__cgroup-v2 (qemu-x86_64/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64, x86
- mm_run_vmtests_sh_hugetlb_reparenting_test_sh__cgroup-v2 (x86/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_khugepaged (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, qemu-x86_64
- mm_run_vmtests_sh_khugepaged__s_2 (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c
- mm_run_vmtests_sh_mlock-random-test (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- mm_run_vmtests_sh_mlock-random-test (e850-96/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_mlock-random-test (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_mlock-random-test (x86/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_mremap_test (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, qemu-armv7, x15
- mm_run_vmtests_sh_mremap_test_2GB_mremap___Source_PUD-aligned_Destination_1MB-aligned (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, qemu-armv7, x15
- mm_run_vmtests_sh_mremap_test_2GB_mremap___Source_PUD-aligned_Destination_PMD-aligned (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, qemu-armv7, x15
- mm_run_vmtests_sh_mremap_test_2GB_mremap___Source_PUD-aligned_Destination_PTE-aligned (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, qemu-armv7, x15
- mm_run_vmtests_sh_mremap_test_2GB_mremap___Source_PUD-aligned_Destination_PUD-aligned (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, qemu-armv7, x15
- mm_run_vmtests_sh_pagemap_ioctl_sanity_tests_Memory_mapped_file (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-x86_64, rk3399-rock-pi-4b, x86
- mm_run_vmtests_sh_pagemap_ioctl_sanity_tests_Memory_mapped_file (e850-96/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_pagemap_ioctl_sanity_tests_Memory_mapped_file (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_pagemap_ioctl_sanity_tests_Memory_mapped_file (x86/clang-nightly-lkftconfig-kselftest)
- mm_run_vmtests_sh_uffd-unit-tests (qemu-x86_64/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-armv7, qemu-x86_64, x15
kselftest-mqueue (7 failures)
- shardfile-mqueue (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- shardfile-mqueue (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-mqueue (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-mqueue (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-mqueue (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-mqueue (x86/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-mqueue (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-net (248 failures)
- net_altnames_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_altnames_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_amt_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_amt_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_arp_ndisc_evict_nocarrier_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_arp_ndisc_evict_nocarrier_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_arp_ndisc_untracked_subnets_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_arp_ndisc_untracked_subnets_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_bareudp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_bareudp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_bareudp_sh (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
- net_big_tcp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_big_tcp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_bind_bhash_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_bind_bhash_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_bind_timewait (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_bind_timewait (e850-96/clang-nightly-lkftconfig-kselftest)
- net_bind_wildcard (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_bind_wildcard (e850-96/clang-nightly-lkftconfig-kselftest)
- net_bpf_offload_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_bpf_offload_py (e850-96/clang-nightly-lkftconfig-kselftest)
- net_broadcast_ether_dst_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_broadcast_ether_dst_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_broadcast_pmtu_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_broadcast_pmtu_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_busy_poll_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_busy_poll_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_cmsg_ip_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_cmsg_ip_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_cmsg_so_mark_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_cmsg_so_mark_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_cmsg_so_priority_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_cmsg_so_priority_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_cmsg_time_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_cmsg_time_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_drop_monitor_tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_drop_monitor_tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_epoll_busy_poll (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_epoll_busy_poll (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fcnal-ipv4_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_fcnal-ipv4_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fcnal-ipv6_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_fcnal-ipv6_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fcnal-other_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_fcnal-other_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fdb_flush_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fdb_flush_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fdb_notify_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fdb_notify_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fib-onlink-tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_fib-onlink-tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fib_nexthop_multiprefix_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fib_nexthop_multiprefix_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fib_nexthop_nongw_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fib_nexthop_nongw_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fib_rule_tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fib_rule_tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fib_tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_fib_tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fin_ack_lat_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fin_ack_lat_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_fq_band_pktlimit_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_fq_band_pktlimit_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_gre_gso_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_gre_gso_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_gre_ipv6_lladdr_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_gre_ipv6_lladdr_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_gro_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_gro_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_gro_sh (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
- net_icmp_redirect_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_icmp_redirect_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_icmp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_icmp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_io_uring_zerocopy_tx_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_io_uring_zerocopy_tx_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ioam6_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ioam6_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ip6_gre_headroom_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ip6_gre_headroom_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ip_defrag_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ip_defrag_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ip_local_port_range_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ip_local_port_range_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ipv6_flowlabel_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ipv6_flowlabel_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ipv6_force_forwarding_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ipv6_force_forwarding_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ipv6_fragmentation (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_ipv6_fragmentation (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ipv6_route_update_soft_lockup_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ipv6_route_update_soft_lockup_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_l2_tos_ttl_inherit_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_l2_tos_ttl_inherit_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_l2tp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_l2tp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_link_netns_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_link_netns_py (e850-96/clang-nightly-lkftconfig-kselftest)
- net_lwt_dst_cache_ref_loop_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_lwt_dst_cache_ref_loop_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_nat6to4_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_nat6to4_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_ndisc_unsolicited_na_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_ndisc_unsolicited_na_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_netdev-l2addr_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_netdev-l2addr_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_netdevice_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_netdevice_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_netlink-dumps (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_netlink-dumps (e850-96/clang-nightly-lkftconfig-kselftest)
- net_netns-name_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_netns-name_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_netns-sysctl_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_netns-sysctl_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_nl_netdev_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_nl_netdev_py (e850-96/clang-nightly-lkftconfig-kselftest)
- net_pmtu_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_pmtu_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_proc_net_pktgen (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_proc_net_pktgen (e850-96/clang-nightly-lkftconfig-kselftest)
- net_psock_snd_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_psock_snd_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseaddr_conflict (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_reuseaddr_conflict (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseaddr_ports_exhausted_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_reuseaddr_ports_exhausted_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseport_addr_any_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_reuseport_addr_any_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseport_bpf (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_reuseport_bpf (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseport_bpf_cpu (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_reuseport_bpf_cpu (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseport_bpf_numa (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_reuseport_bpf_numa (e850-96/clang-nightly-lkftconfig-kselftest)
- net_reuseport_dualstack (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_reuseport_dualstack (e850-96/clang-nightly-lkftconfig-kselftest)
- net_route_hint_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_route_hint_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_route_localnet_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_route_localnet_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_rps_default_mask_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_rps_default_mask_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_rtnetlink_notification_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_rtnetlink_notification_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_rtnetlink_py (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_rtnetlink_py (e850-96/clang-nightly-lkftconfig-kselftest)
- net_run_netsocktests (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_run_netsocktests (e850-96/clang-nightly-lkftconfig-kselftest)
- net_rxtimestamp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_rxtimestamp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_sctp_vrf_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_sctp_vrf_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_sk_bind_sendto_listen (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_sk_bind_sendto_listen (e850-96/clang-nightly-lkftconfig-kselftest)
- net_sk_connect_zero_addr (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_sk_connect_zero_addr (e850-96/clang-nightly-lkftconfig-kselftest)
- net_sk_so_peek_off (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_sk_so_peek_off (e850-96/clang-nightly-lkftconfig-kselftest)
- net_skf_net_off_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_skf_net_off_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_so_incoming_cpu (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_so_incoming_cpu (e850-96/clang-nightly-lkftconfig-kselftest)
- net_so_txtime_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_so_txtime_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_dt46_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_dt46_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_dt4_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_dt4_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_dt6_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_dt6_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_dx4_netfilter_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_dx4_netfilter_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_dx6_netfilter_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_dx6_netfilter_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_flavors_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_flavors_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_next_csid_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_next_csid_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_end_x_next_csid_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_end_x_next_csid_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_hencap_red_l3vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_hencap_red_l3vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_srv6_hl2encap_red_l2vpn_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_srv6_hl2encap_red_l2vpn_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_stress_reuseport_listen_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_stress_reuseport_listen_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_tap (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_tap (e850-96/clang-nightly-lkftconfig-kselftest)
- net_tcp_fastopen_backup_key_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_tcp_fastopen_backup_key_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_tcp_port_share (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_tcp_port_share (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_bpf_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_bpf_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_bridge_backup_port_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_bridge_backup_port_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_bridge_neigh_suppress_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_bridge_neigh_suppress_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_ingress_egress_chaining_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_ingress_egress_chaining_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_neigh_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_neigh_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_so_rcv_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_so_rcv_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_fdb_changelink_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_fdb_changelink_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_mdb_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_vxlan_mdb_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_nh_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_vxlan_nh_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_nolocalbypass_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_vxlan_nolocalbypass_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_under_vrf_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_under_vrf_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_test_vxlan_vnifiltering_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_test_vxlan_vnifiltering_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_tfo_passive_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_tfo_passive_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_traceroute_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_traceroute_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_tun (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_tun (e850-96/clang-nightly-lkftconfig-kselftest)
- net_txtimestamp_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_txtimestamp_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_udpgro_bench_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_udpgro_bench_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_udpgro_frglist_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_udpgro_frglist_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_udpgro_fwd_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_udpgro_fwd_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_udpgso_bench_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest)
- net_udpgso_bench_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_udpgso_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_udpgso_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_unicast_extensions_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_unicast_extensions_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_veth_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_veth_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_vlan_bridge_binding_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_vlan_bridge_binding_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_vlan_hw_filter_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_vlan_hw_filter_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_vrf-xfrm-tests_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_vrf-xfrm-tests_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_vrf_route_leaking_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_vrf_route_leaking_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- net_vrf_strict_mode_test_sh (dragonboard-410c/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- net_vrf_strict_mode_test_sh (e850-96/clang-nightly-lkftconfig-kselftest)
kselftest-openat2 (4 failures)
- openat2_rename_attack_test (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-armv7, qemu-x86_64
- openat2_rename_attack_test (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-openat2 (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, rk3399-rock-pi-4b, x15
- shardfile-openat2 (e850-96/clang-20-lkftconfig-no-kselftest-frag)
kselftest-rseq (8 failures)
- rseq_syscall_errors_test (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- rseq_syscall_errors_test (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- rseq_syscall_errors_test (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rseq_syscall_errors_test (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rseq_syscall_errors_test (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- rseq_syscall_errors_test (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- rseq_syscall_errors_test (x86/clang-20-lkftconfig-no-kselftest-frag)
- rseq_syscall_errors_test (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-rtc (36 failures)
- rtc_rtctest (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest (x86/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set (x86/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set_minute (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set_minute (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set_minute (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set_minute (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set_minute (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_alm_set_minute (x86/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set (x86/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set_minute (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set_minute (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set_minute (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set_minute (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set_minute (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_alarm_wkalm_set_minute (x86/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_date_read (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_date_read (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_date_read_loop (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_date_read_loop (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_uie_read (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag)
- rtc_rtctest_rtc_uie_read (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-seccomp (5 failures)
- seccomp_seccomp_benchmark (e850-96/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15
- seccomp_seccomp_benchmark (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
- seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total (qemu-x86_64/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b
- seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 (e850-96/clang-nightly-lkftconfig-kselftest) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15
- seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
kselftest-sigaltstack (8 failures)
- shardfile-sigaltstack (dragonboard-410c/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- shardfile-sigaltstack (dragonboard-410c/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-sigaltstack (e850-96/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-sigaltstack (e850-96/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-sigaltstack (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-sigaltstack (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-sigaltstack (x86/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-sigaltstack (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-tc-testing (2 failures)
- tc-testing_tdc_sh (e850-96/clang-nightly-lkftconfig-kselftest)
- tc-testing_tdc_sh (qemu-x86_64/clang-nightly-lkftconfig-kselftest)
kselftest-vDSO (4 failures)
- shardfile-vDSO (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-vDSO (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- shardfile-vDSO (x86/clang-20-lkftconfig-no-kselftest-frag)
- shardfile-vDSO (x86/gcc-13-lkftconfig-no-kselftest-frag)
kselftest-x86 (4 failures)
- x86_mov_ss_trap_64 (qemu-x86_64/clang-20-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64
- x86_mov_ss_trap_64 (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag)
- x86_test_shadow_stack_64 (qemu-x86_64/gcc-13-lkftconfig-no-kselftest-frag) Also seen in: lkft/linux-mainline-master on devices: qemu-x86_64, x86
- x86_test_shadow_stack_64 (x86/gcc-13-lkftconfig-no-kselftest-frag)
kvm-unit-tests (80 failures)
- debug-wp-migration-terminated-on-SIGSEGV (graviton4-metal-nvhe/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-nvhe, graviton4-metal-protected, graviton4-metal-vhe
- debug-wp-migration-terminated-on-SIGSEGV (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- debug-wp-migration-terminated-on-SIGSEGV (graviton4-metal-vhe/gcc-12-lkftconfig-graviton4)
- pmu-basic-event-count-pmu-pmu-basic-event-count-32-bit-overflows-check-overflow-happened-on-0-only (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-basic-event-count-pmu-pmu-basic-event-count-64-bit-overflows-check-overflow-happened-on-0-only (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest2-odd-counter-did-not-increment-on-overflow-if-disabled (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest2-odd-counter-did-not-increment-on-overflow-if-disabled (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest2-odd-counter-did-not-increment-on-overflow-if-disabled (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest2-odd-counter-did-not-increment-on-overflow-if-disabled (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest3-should-have-triggered-an-overflow-on-0 (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest3-should-have-triggered-an-overflow-on-0 (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest3-should-have-triggered-an-overflow-on-0 (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest3-should-have-triggered-an-overflow-on-0 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest4-CHAIN-counter-enabled-CHAIN-counter-was-incremented-and-overflow (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest4-CHAIN-counter-enabled-CHAIN-counter-was-incremented-and-overflow (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest4-CHAIN-counter-enabled-CHAIN-counter-was-incremented-and-overflow (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest4-CHAIN-counter-enabled-CHAIN-counter-was-incremented-and-overflow (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest5-32b-64b-CHAIN-counter-incremented-and-overflow (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest5-32b-64b-CHAIN-counter-incremented-and-overflow (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest5-32b-64b-CHAIN-counter-incremented-and-overflow (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest5-32b-64b-CHAIN-counter-incremented-and-overflow (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest6-overflow-is-expected-on-counter-0 (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest6-overflow-is-expected-on-counter-0 (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest6-overflow-is-expected-on-counter-0 (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-chain-promotion-pmu-pmu-chain-promotion-32-bit-overflows-subtest6-overflow-is-expected-on-counter-0 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-chained-counters-pmu-pmu-chained-counters-32-bit-overflows-CHAIN-counter-1-incremented (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chained-counters-pmu-pmu-chained-counters-32-bit-overflows-CHAIN-counter-1-set-to-2 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chained-counters-pmu-pmu-chained-counters-32-bit-overflows-CHAIN-counter-1-wrapped (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chained-counters-pmu-pmu-chained-counters-32-bit-overflows-overflow-on-even-and-odd-counters (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chained-counters-pmu-pmu-chained-counters-32-bit-overflows-overflow-recorded-for-chained-incr-1 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-chained-counters-pmu-pmu-chained-counters-32-bit-overflows-overflow-recorded-for-chained-incr-2 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-cycle-counter-pmu-cycle-counter-Cycleinstruction-ratio (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-cycle-counter-pmu-cycle-counter-Monotonically-increasing-cycle-count (graviton4-metal-protected/gcc-12-lkftconfig-graviton4) Also seen in: lkft/linux-mainline-master on devices: graviton4-metal-protected, qemu-arm64-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-mem-access-pmu-pmu-mem-access-32-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-mem-access-pmu-pmu-mem-access-64-bit-overflows-Ran-20-mem-accesses-with-expected-overflows-on-both-counters (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-Odd-counter-wrapped (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-Odd-counter-wrapped (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-Odd-counter-wrapped (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-Odd-counter-wrapped (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt-on-even-and-odd-counter (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt-on-even-and-odd-counter (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt-on-even-and-odd-counter (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-expect-overflow-interrupt-on-even-and-odd-counter (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-overflow-interrupts-expected-on-0-and-1 (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected, rk3399-rock-pi-4b-nvhe, rk3399-rock-pi-4b-protected, rk3399-rock-pi-4b-vhe
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-overflow-interrupts-expected-on-0-and-1 (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-overflow-interrupts-expected-on-0-and-1 (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-32-bit-overflows-overflow-interrupts-expected-on-0-and-1 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt-on-even-counter (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt-on-even-counter (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt-on-even-counter (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-expect-overflow-interrupt-on-even-counter (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-overflow-interrupts-expected-on-0-and-1 (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, graviton4-metal-protected
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-overflow-interrupts-expected-on-0-and-1 (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-overflow-interrupts-expected-on-0-and-1 (fvp-aemva-vhe/gcc-13-lkftconfig)
- pmu-overflow-interrupt-pmu-pmu-overflow-interrupt-64-bit-overflows-overflow-interrupts-expected-on-0-and-1 (graviton4-metal-protected/gcc-12-lkftconfig-graviton4)
- timer-timeout-duration10s (fvp-aemva-vhe/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: fvp-aemva-vhe, qemu-arm64-protected
- timer-timeout-duration10s (fvp-aemva-vhe/gcc-13-lkftconfig-sched-proxy-exec)
- timer-timeout-duration10s (fvp-aemva-vhe/gcc-13-lkftconfig)
ltp-controllers (11 failures)
- memcontrol03 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, juno-r2-compat, qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-riscv64, qemu-x86_64, qemu-x86_64-compat, rk3399-rock-pi-4b, x15
- memcontrol03 (dragonboard-410c/gcc-13-lkftconfig)
- memcontrol03 (qemu-riscv64/clang-20-lkftconfig)
- memcontrol03 (qemu-riscv64/gcc-13-lkftconfig)
- memcontrol03 (qemu-x86_64/clang-20-lkftconfig)
- memcontrol03 (qemu-x86_64/clang-nightly-lkftconfig)
- memcontrol03 (qemu-x86_64/gcc-13-lkftconfig)
- memcontrol03 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- memcontrol03 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- memcontrol04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, qemu-arm64, rk3399-rock-pi-4b
- memcontrol04 (dragonboard-410c/gcc-13-lkftconfig)
ltp-cve (5 failures)
- cve-2015-3290 (x86-compat/gcc-13-lkftconfig-compat) Also seen in: lkft/linux-mainline-master on devices: x86-compat
- cve-2017-8890 (qemu-riscv64/clang-20-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-riscv64, qemu-x86_64-compat
- cve-2017-8890 (qemu-riscv64/gcc-13-lkftconfig)
- cve-2017-8890 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- cve-2017-8890 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
ltp-fs (2 failures)
- fs_fill (qemu-riscv64/gcc-13-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-x86_64-compat, x15
- fs_fill (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
ltp-mm (5 failures)
- vma05 (qemu-riscv64/clang-20-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-riscv64, qemu-x86_64-compat, x86-compat
- vma05 (qemu-riscv64/gcc-13-lkftconfig)
- vma05 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- vma05 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- vma05 (x86-compat/gcc-13-lkftconfig-compat)
ltp-syscalls (108 failures)
- accept02 (qemu-riscv64/clang-20-lkftconfig) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-riscv64, qemu-x86_64-compat
- accept02 (qemu-riscv64/gcc-13-lkftconfig)
- accept02 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- accept02 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- acct01 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- acct01 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- acct01 (dragonboard-410c/gcc-13-lkftconfig)
- acct01 (qemu-x86_64/clang-20-lkftconfig)
- acct01 (qemu-x86_64/clang-nightly-lkftconfig)
- acct01 (qemu-x86_64/gcc-13-lkftconfig)
- acct01 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- acct01 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- acct01 (x86/gcc-13-defconfig-preempt_rt)
- acct01 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- acct01 (x86/gcc-13-lkftconfig)
- acct01 (x86-compat/gcc-13-lkftconfig-compat)
- epoll_ctl04 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, juno-r2-compat, qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-riscv64, qemu-x86_64, qemu-x86_64-compat, rk3399-rock-pi-4b, x15, x86, x86-compat
- epoll_ctl04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- epoll_ctl04 (dragonboard-410c/gcc-13-lkftconfig)
- epoll_ctl04 (qemu-riscv64/clang-20-lkftconfig)
- epoll_ctl04 (qemu-riscv64/gcc-13-lkftconfig)
- epoll_ctl04 (qemu-x86_64/clang-20-lkftconfig)
- epoll_ctl04 (qemu-x86_64/clang-nightly-lkftconfig)
- epoll_ctl04 (qemu-x86_64/gcc-13-lkftconfig)
- epoll_ctl04 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- epoll_ctl04 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- epoll_ctl04 (x86/gcc-13-defconfig-preempt_rt)
- epoll_ctl04 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- epoll_ctl04 (x86/gcc-13-lkftconfig)
- epoll_ctl04 (x86-compat/gcc-13-lkftconfig-compat)
- fallocate06 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, x15
- fallocate06 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- fallocate06 (dragonboard-410c/gcc-13-lkftconfig)
- getxattr04 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, juno-r2, juno-r2-compat, qemu-arm64, qemu-arm64-compat, qemu-armv7, qemu-riscv64, qemu-x86_64, qemu-x86_64-compat, rk3399-rock-pi-4b, x15, x86, x86-compat
- getxattr04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- getxattr04 (dragonboard-410c/gcc-13-lkftconfig)
- getxattr04 (qemu-riscv64/clang-20-lkftconfig)
- getxattr04 (qemu-riscv64/gcc-13-lkftconfig)
- getxattr04 (qemu-x86_64/clang-20-lkftconfig)
- getxattr04 (qemu-x86_64/clang-nightly-lkftconfig)
- getxattr04 (qemu-x86_64/gcc-13-lkftconfig)
- getxattr04 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- getxattr04 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- getxattr04 (x86/gcc-13-defconfig-preempt_rt)
- getxattr04 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- getxattr04 (x86/gcc-13-lkftconfig)
- getxattr04 (x86-compat/gcc-13-lkftconfig-compat)
- listmount04 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- listmount04 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- listmount04 (qemu-riscv64/clang-20-lkftconfig)
- listmount04 (qemu-riscv64/gcc-13-lkftconfig)
- listmount04 (qemu-x86_64/clang-20-lkftconfig)
- listmount04 (qemu-x86_64/clang-nightly-lkftconfig)
- listmount04 (qemu-x86_64/gcc-13-lkftconfig)
- listmount04 (qemu-x86_64-compat/clang-20-lkftconfig-compat)
- listmount04 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- listmount04 (x86/gcc-13-defconfig-preempt_rt)
- listmount04 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- listmount04 (x86/gcc-13-lkftconfig)
- listmount04 (x86-compat/gcc-13-lkftconfig-compat)
- madvise06 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- madvise06 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- madvise06 (x86/gcc-13-defconfig-preempt_rt)
- madvise06 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- madvise06 (x86/gcc-13-lkftconfig)
- madvise06 (x86-compat/gcc-13-lkftconfig-compat)
- mseal02 (qemu-x86_64-compat/clang-20-lkftconfig-compat) Also seen in: lkft/linux-mainline-master on devices: juno-r2-compat, qemu-arm64-compat, qemu-x86_64-compat, x86-compat
- mseal02 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- mseal02 (x86-compat/gcc-13-lkftconfig-compat)
- sendmsg03 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- sendmsg03 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- sendmsg03 (x86/gcc-13-defconfig-preempt_rt)
- sendmsg03 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- sendmsg03 (x86/gcc-13-lkftconfig)
- sendmsg03 (x86-compat/gcc-13-lkftconfig-compat)
- sendto03 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- sendto03 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- sendto03 (x86/gcc-13-defconfig-preempt_rt)
- sendto03 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- sendto03 (x86/gcc-13-lkftconfig)
- sendto03 (x86-compat/gcc-13-lkftconfig-compat)
- setsockopt05 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- setsockopt05 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- setsockopt05 (x86/gcc-13-defconfig-preempt_rt)
- setsockopt05 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- setsockopt05 (x86/gcc-13-lkftconfig)
- setsockopt05 (x86-compat/gcc-13-lkftconfig-compat)
- setsockopt09 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- setsockopt09 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- setsockopt09 (x86/gcc-13-defconfig-preempt_rt)
- setsockopt09 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- setsockopt09 (x86/gcc-13-lkftconfig)
- setsockopt09 (x86-compat/gcc-13-lkftconfig-compat)
- shmctl03 (qemu-x86_64-compat/clang-20-lkftconfig-compat) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64-compat, qemu-x86_64-compat, x86-compat
- shmctl03 (qemu-x86_64-compat/gcc-13-lkftconfig-compat)
- shmctl03 (x86-compat/gcc-13-lkftconfig-compat)
- timerfd_settime02 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- timerfd_settime02 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- timerfd_settime02 (x86/gcc-13-defconfig-preempt_rt)
- timerfd_settime02 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- timerfd_settime02 (x86/gcc-13-lkftconfig)
- timerfd_settime02 (x86-compat/gcc-13-lkftconfig-compat)
- wait403 (dragonboard-410c/gcc-13-lkftconfig-64k_page_size)
- wait403 (dragonboard-410c/gcc-13-lkftconfig-sched-proxy-exec)
- wait403 (x86/gcc-13-defconfig-preempt_rt)
- wait403 (x86/gcc-13-lkftconfig-sched-proxy-exec)
- wait403 (x86/gcc-13-lkftconfig)
- wait403 (x86-compat/gcc-13-lkftconfig-compat)
perf (8 failures)
- _17_import_perf_in_python (e850-96/gcc-13-lkftconfig-perf) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, qemu-armv7, qemu-x86_64, rk3399-rock-pi-4b, x15, x86
- _17_import_perf_in_python (qemu-x86_64/gcc-13-lkftconfig-perf)
- _17_import_perf_in_python (x86/gcc-13-lkftconfig-perf)
- _6_Simple_expression_parser (qemu-x86_64/gcc-13-lkftconfig-perf) Also seen in: lkft/linux-mainline-master on devices: qemu-armv7, qemu-x86_64, x15
- _72_2_User_space_counter_reading_of_instructions (e850-96/gcc-13-lkftconfig-perf) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, rk3399-rock-pi-4b
- _72_3_User_space_counter_reading_of_cycles (e850-96/gcc-13-lkftconfig-perf) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, rk3399-rock-pi-4b
- _72_4_User_space_counter_disabling_instructions (e850-96/gcc-13-lkftconfig-perf) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, rk3399-rock-pi-4b
- _72_5_User_space_counter_disabling_cycles (e850-96/gcc-13-lkftconfig-perf) Also seen in: lkft/linux-mainline-master on devices: dragonboard-410c, dragonboard-845c, e850-96, fvp-aemva, juno-r2, qemu-arm64, rk3399-rock-pi-4b
rt-tests-cyclicdeadline (1 failures)
- rt-tests-cyclicdeadline (x86/gcc-13-defconfig-preempt_rt) Also seen in: lkft/linux-mainline-master on devices: x86
rt-tests-rt-migrate-test (6 failures)
- iteration-1-rt-migrate-test (x86/gcc-13-defconfig-no-preempt_rt) Also seen in: lkft/linux-mainline-master on devices: rk3399-rock-pi-4b, x86
- iteration-1-rt-migrate-test (x86/gcc-13-defconfig-preempt_rt)
- iteration-2-rt-migrate-test (x86/gcc-13-defconfig-no-preempt_rt) Also seen in: lkft/linux-mainline-master on devices: rk3399-rock-pi-4b, x86
- iteration-2-rt-migrate-test (x86/gcc-13-defconfig-preempt_rt)
- iteration-3-rt-migrate-test (x86/gcc-13-defconfig-no-preempt_rt) Also seen in: lkft/linux-mainline-master on devices: rk3399-rock-pi-4b, x86
- iteration-3-rt-migrate-test (x86/gcc-13-defconfig-preempt_rt)
xfstests-btrfs (3 failures)
- btrfs-220 (qemu-x86_64/gcc-13-lkftconfig-xfstests-btrfs) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-x86_64
- btrfs-226 (qemu-x86_64/gcc-13-lkftconfig-xfstests-btrfs) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-x86_64
- btrfs-300 (qemu-x86_64/gcc-13-lkftconfig-xfstests-btrfs) Also seen in: lkft/linux-mainline-master on devices: qemu-arm64, qemu-x86_64