Date
June 16, 2025, 7:07 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 22.528546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 22.377488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 97.747713] Internal error: Oops: 0000000096000005 [#1] SMP [ 97.753391] Modules linked in: [ 97.753971] CPU: 0 UID: 0 PID: 541 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 97.754630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 97.755097] Hardware name: linux,dummy-virt (DT) [ 97.755722] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 97.756315] pc : kunit_test_null_dereference+0x70/0x170 [ 97.756719] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.757067] sp : ffff800080ed7d30 [ 97.757283] x29: ffff800080ed7d90 x28: 0000000000000000 x27: 0000000000000000 [ 97.757954] x26: 1ffe000018c7f821 x25: 0000000000000000 x24: 0000000000000004 [ 97.758540] x23: fff00000c63fc10c x22: ffffb10106a2b828 x21: fff00000c1101b88 [ 97.758990] x20: 1ffff000101dafa6 x19: ffff800080087990 x18: 000000008348d21b [ 97.759379] x17: 0000000000000001 x16: fff00000da444d28 x15: 00000000d770d2d6 [ 97.760053] x14: 00000000c7a1232c x13: 1ffe000018dc1e64 x12: fffd8000195ef11c [ 97.760539] x11: 1ffe0000195ef11b x10: fffd8000195ef11b x9 : ffffb10106a22c90 [ 97.761127] x8 : ffff800080ed7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 97.761669] x5 : ffff7000101dafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 97.762052] x2 : dfff800000000000 x1 : fff00000caf78000 x0 : ffff800080087990 [ 97.762468] Call trace: [ 97.762779] kunit_test_null_dereference+0x70/0x170 (P) [ 97.763168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.763476] kthread+0x328/0x630 [ 97.763789] ret_from_fork+0x10/0x20 [ 97.764402] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 97.765054] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 51.538405] ================================================================== [ 51.538512] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.538512] [ 51.538631] Use-after-free read at 0x00000000ed7f8f25 (in kfence-#189): [ 51.538694] test_krealloc+0x51c/0x830 [ 51.538746] kunit_try_run_case+0x170/0x3f0 [ 51.538799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.538871] kthread+0x328/0x630 [ 51.538923] ret_from_fork+0x10/0x20 [ 51.538968] [ 51.538998] kfence-#189: 0x00000000ed7f8f25-0x00000000f0939269, size=32, cache=kmalloc-32 [ 51.538998] [ 51.539063] allocated by task 346 on cpu 1 at 51.537503s (0.001556s ago): [ 51.539142] test_alloc+0x29c/0x628 [ 51.539191] test_krealloc+0xc0/0x830 [ 51.539235] kunit_try_run_case+0x170/0x3f0 [ 51.539280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.539327] kthread+0x328/0x630 [ 51.539367] ret_from_fork+0x10/0x20 [ 51.539411] [ 51.539438] freed by task 346 on cpu 1 at 51.537913s (0.001521s ago): [ 51.539504] krealloc_noprof+0x148/0x360 [ 51.539549] test_krealloc+0x1dc/0x830 [ 51.539590] kunit_try_run_case+0x170/0x3f0 [ 51.539634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.539677] kthread+0x328/0x630 [ 51.539720] ret_from_fork+0x10/0x20 [ 51.539761] [ 51.539822] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 51.539924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.539959] Hardware name: linux,dummy-virt (DT) [ 51.540000] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 51.366067] ================================================================== [ 51.366202] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.366202] [ 51.366341] Use-after-free read at 0x0000000091b6c3f4 (in kfence-#187): [ 51.366416] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.366486] kunit_try_run_case+0x170/0x3f0 [ 51.366543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.366597] kthread+0x328/0x630 [ 51.366650] ret_from_fork+0x10/0x20 [ 51.366702] [ 51.366734] kfence-#187: 0x0000000091b6c3f4-0x000000006f750a5b, size=32, cache=test [ 51.366734] [ 51.366803] allocated by task 344 on cpu 0 at 51.329966s (0.036832s ago): [ 51.366912] test_alloc+0x230/0x628 [ 51.366969] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.367026] kunit_try_run_case+0x170/0x3f0 [ 51.367077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.367133] kthread+0x328/0x630 [ 51.367179] ret_from_fork+0x10/0x20 [ 51.367232] [ 51.367267] freed by task 344 on cpu 0 at 51.330151s (0.037111s ago): [ 51.367339] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.367393] kunit_try_run_case+0x170/0x3f0 [ 51.367443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.367497] kthread+0x328/0x630 [ 51.367541] ret_from_fork+0x10/0x20 [ 51.367591] [ 51.367676] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 51.367788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.367829] Hardware name: linux,dummy-virt (DT) [ 51.367887] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 30.555439] ================================================================== [ 30.555681] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 30.555681] [ 30.555886] Invalid read at 0x00000000eba4baa3: [ 30.556119] test_invalid_access+0xdc/0x1f0 [ 30.556301] kunit_try_run_case+0x170/0x3f0 [ 30.556536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.556764] kthread+0x328/0x630 [ 30.557853] ret_from_fork+0x10/0x20 [ 30.558024] [ 30.558146] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 30.558351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.558722] Hardware name: linux,dummy-virt (DT) [ 30.558832] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 30.321821] ================================================================== [ 30.321976] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 30.321976] [ 30.322067] Corrupted memory at 0x00000000793a76a8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#183): [ 30.322453] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 30.322523] kunit_try_run_case+0x170/0x3f0 [ 30.322582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.322637] kthread+0x328/0x630 [ 30.322688] ret_from_fork+0x10/0x20 [ 30.322737] [ 30.322772] kfence-#183: 0x00000000b0e9ffe2-0x00000000c44fc44d, size=73, cache=kmalloc-96 [ 30.322772] [ 30.322849] allocated by task 334 on cpu 1 at 30.321503s (0.001340s ago): [ 30.322937] test_alloc+0x29c/0x628 [ 30.322991] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 30.323049] kunit_try_run_case+0x170/0x3f0 [ 30.323101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.323165] kthread+0x328/0x630 [ 30.323215] ret_from_fork+0x10/0x20 [ 30.323263] [ 30.323293] freed by task 334 on cpu 1 at 30.321690s (0.001598s ago): [ 30.323368] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 30.323421] kunit_try_run_case+0x170/0x3f0 [ 30.323470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.323522] kthread+0x328/0x630 [ 30.323566] ret_from_fork+0x10/0x20 [ 30.323615] [ 30.323678] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 30.323778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.323816] Hardware name: linux,dummy-virt (DT) [ 30.323870] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 29.905659] ================================================================== [ 29.905751] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 29.905751] [ 29.905904] Out-of-bounds read at 0x00000000bafd51cc (105B right of kfence-#179): [ 29.905986] test_kmalloc_aligned_oob_read+0x238/0x468 [ 29.906050] kunit_try_run_case+0x170/0x3f0 [ 29.906112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.906164] kthread+0x328/0x630 [ 29.906208] ret_from_fork+0x10/0x20 [ 29.906254] [ 29.906284] kfence-#179: 0x00000000a0484d4e-0x00000000635fb133, size=73, cache=kmalloc-96 [ 29.906284] [ 29.906345] allocated by task 332 on cpu 1 at 29.905402s (0.000938s ago): [ 29.906427] test_alloc+0x29c/0x628 [ 29.906476] test_kmalloc_aligned_oob_read+0x100/0x468 [ 29.906525] kunit_try_run_case+0x170/0x3f0 [ 29.906569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.906618] kthread+0x328/0x630 [ 29.906659] ret_from_fork+0x10/0x20 [ 29.906706] [ 29.906770] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 29.906874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.906912] Hardware name: linux,dummy-virt (DT) [ 29.906957] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 25.120046] ================================================================== [ 25.120644] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 25.120644] [ 25.121014] Corrupted memory at 0x00000000a4fe785a [ ! . . . . . . . . . . . . . . . ] (in kfence-#133): [ 25.125846] test_corruption+0x278/0x378 [ 25.126543] kunit_try_run_case+0x170/0x3f0 [ 25.126797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.127063] kthread+0x328/0x630 [ 25.127340] ret_from_fork+0x10/0x20 [ 25.127522] [ 25.127624] kfence-#133: 0x00000000e2e82a65-0x0000000082c132e6, size=32, cache=kmalloc-32 [ 25.127624] [ 25.127979] allocated by task 320 on cpu 0 at 25.118628s (0.009255s ago): [ 25.128386] test_alloc+0x29c/0x628 [ 25.128476] test_corruption+0xdc/0x378 [ 25.128590] kunit_try_run_case+0x170/0x3f0 [ 25.128733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.128926] kthread+0x328/0x630 [ 25.129187] ret_from_fork+0x10/0x20 [ 25.129297] [ 25.129355] freed by task 320 on cpu 0 at 25.119185s (0.010162s ago): [ 25.129481] test_corruption+0x278/0x378 [ 25.129598] kunit_try_run_case+0x170/0x3f0 [ 25.129708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.129862] kthread+0x328/0x630 [ 25.130010] ret_from_fork+0x10/0x20 [ 25.130241] [ 25.130488] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 25.130981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.131221] Hardware name: linux,dummy-virt (DT) [ 25.131615] ================================================================== [ 25.432348] ================================================================== [ 25.432499] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 25.432499] [ 25.432621] Corrupted memory at 0x000000000bb77e1a [ ! ] (in kfence-#136): [ 25.432923] test_corruption+0x284/0x378 [ 25.433025] kunit_try_run_case+0x170/0x3f0 [ 25.433157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.433523] kthread+0x328/0x630 [ 25.433628] ret_from_fork+0x10/0x20 [ 25.433827] [ 25.433959] kfence-#136: 0x000000005ee313ab-0x000000005f295828, size=32, cache=kmalloc-32 [ 25.433959] [ 25.434204] allocated by task 320 on cpu 0 at 25.431862s (0.002332s ago): [ 25.434359] test_alloc+0x29c/0x628 [ 25.434465] test_corruption+0x198/0x378 [ 25.434564] kunit_try_run_case+0x170/0x3f0 [ 25.434656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.436919] kthread+0x328/0x630 [ 25.436976] ret_from_fork+0x10/0x20 [ 25.437055] [ 25.437101] freed by task 320 on cpu 0 at 25.432056s (0.005038s ago): [ 25.437242] test_corruption+0x284/0x378 [ 25.437362] kunit_try_run_case+0x170/0x3f0 [ 25.437552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.437664] kthread+0x328/0x630 [ 25.438001] ret_from_fork+0x10/0x20 [ 25.438160] [ 25.438284] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 25.438582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.438662] Hardware name: linux,dummy-virt (DT) [ 25.439033] ================================================================== [ 25.534484] ================================================================== [ 25.534643] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 25.534643] [ 25.534781] Corrupted memory at 0x000000004e128d29 [ ! . . . . . . . . . . . . . . . ] (in kfence-#137): [ 25.536126] test_corruption+0x120/0x378 [ 25.536260] kunit_try_run_case+0x170/0x3f0 [ 25.536367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.536468] kthread+0x328/0x630 [ 25.536563] ret_from_fork+0x10/0x20 [ 25.536657] [ 25.536714] kfence-#137: 0x000000002c88ec3f-0x000000005a3e904c, size=32, cache=test [ 25.536714] [ 25.537155] allocated by task 322 on cpu 0 at 25.534210s (0.002935s ago): [ 25.537776] test_alloc+0x230/0x628 [ 25.538110] test_corruption+0xdc/0x378 [ 25.538441] kunit_try_run_case+0x170/0x3f0 [ 25.538552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.538668] kthread+0x328/0x630 [ 25.538967] ret_from_fork+0x10/0x20 [ 25.539242] [ 25.539575] freed by task 322 on cpu 0 at 25.534325s (0.005233s ago): [ 25.539808] test_corruption+0x120/0x378 [ 25.539961] kunit_try_run_case+0x170/0x3f0 [ 25.540230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.540356] kthread+0x328/0x630 [ 25.540453] ret_from_fork+0x10/0x20 [ 25.540855] [ 25.541003] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 25.541406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.541644] Hardware name: linux,dummy-virt (DT) [ 25.541957] ================================================================== [ 25.744457] ================================================================== [ 25.744776] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 25.744776] [ 25.744959] Corrupted memory at 0x000000002a9df148 [ ! ] (in kfence-#139): [ 25.745283] test_corruption+0x1d8/0x378 [ 25.745374] kunit_try_run_case+0x170/0x3f0 [ 25.745459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.745558] kthread+0x328/0x630 [ 25.745659] ret_from_fork+0x10/0x20 [ 25.745771] [ 25.745848] kfence-#139: 0x000000008ca0d44e-0x0000000071aa7347, size=32, cache=test [ 25.745848] [ 25.745989] allocated by task 322 on cpu 0 at 25.743492s (0.002488s ago): [ 25.746134] test_alloc+0x230/0x628 [ 25.746228] test_corruption+0x198/0x378 [ 25.746326] kunit_try_run_case+0x170/0x3f0 [ 25.746422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.746528] kthread+0x328/0x630 [ 25.746613] ret_from_fork+0x10/0x20 [ 25.746701] [ 25.746759] freed by task 322 on cpu 0 at 25.744009s (0.002743s ago): [ 25.747434] test_corruption+0x1d8/0x378 [ 25.747608] kunit_try_run_case+0x170/0x3f0 [ 25.748121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.748388] kthread+0x328/0x630 [ 25.748825] ret_from_fork+0x10/0x20 [ 25.749012] [ 25.749289] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 25.749682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.749756] Hardware name: linux,dummy-virt (DT) [ 25.750044] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 24.806500] ================================================================== [ 24.806661] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 24.806661] [ 24.806790] Invalid free of 0x00000000ff7f821c (in kfence-#130): [ 24.806925] test_invalid_addr_free+0x1ac/0x238 [ 24.807041] kunit_try_run_case+0x170/0x3f0 [ 24.807146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.807248] kthread+0x328/0x630 [ 24.807344] ret_from_fork+0x10/0x20 [ 24.807443] [ 24.807501] kfence-#130: 0x00000000fcb5e0b5-0x0000000032fcb08b, size=32, cache=kmalloc-32 [ 24.807501] [ 24.807632] allocated by task 316 on cpu 0 at 24.806228s (0.001396s ago): [ 24.807780] test_alloc+0x29c/0x628 [ 24.807889] test_invalid_addr_free+0xd4/0x238 [ 24.807986] kunit_try_run_case+0x170/0x3f0 [ 24.808132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.808241] kthread+0x328/0x630 [ 24.808364] ret_from_fork+0x10/0x20 [ 24.808493] [ 24.808635] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.808908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.809002] Hardware name: linux,dummy-virt (DT) [ 24.809109] ================================================================== [ 24.910906] ================================================================== [ 24.911081] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 24.911081] [ 24.911224] Invalid free of 0x00000000a52bb7a3 (in kfence-#131): [ 24.911353] test_invalid_addr_free+0xec/0x238 [ 24.911477] kunit_try_run_case+0x170/0x3f0 [ 24.911592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.911704] kthread+0x328/0x630 [ 24.911813] ret_from_fork+0x10/0x20 [ 24.911930] [ 24.911993] kfence-#131: 0x00000000923591cf-0x0000000038e5d8b4, size=32, cache=test [ 24.911993] [ 24.912140] allocated by task 318 on cpu 0 at 24.910581s (0.001549s ago): [ 24.912708] test_alloc+0x230/0x628 [ 24.913030] test_invalid_addr_free+0xd4/0x238 [ 24.913231] kunit_try_run_case+0x170/0x3f0 [ 24.913326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.913709] kthread+0x328/0x630 [ 24.913972] ret_from_fork+0x10/0x20 [ 24.914737] [ 24.915128] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.915549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.916323] Hardware name: linux,dummy-virt (DT) [ 24.916686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 22.730525] ================================================================== [ 22.730604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 22.730684] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.730753] [ 22.730804] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.731236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.731444] Hardware name: linux,dummy-virt (DT) [ 22.731660] Call trace: [ 22.731697] show_stack+0x20/0x38 (C) [ 22.731865] dump_stack_lvl+0x8c/0xd0 [ 22.732114] print_report+0x118/0x608 [ 22.732295] kasan_report+0xdc/0x128 [ 22.732371] kasan_check_range+0x100/0x1a8 [ 22.732437] __kasan_check_write+0x20/0x30 [ 22.732496] kasan_atomics_helper+0xe44/0x4858 [ 22.732552] kasan_atomics+0x198/0x2e0 [ 22.732605] kunit_try_run_case+0x170/0x3f0 [ 22.732659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.732719] kthread+0x328/0x630 [ 22.732768] ret_from_fork+0x10/0x20 [ 22.733248] [ 22.733281] Allocated by task 274: [ 22.733320] kasan_save_stack+0x3c/0x68 [ 22.733506] kasan_save_track+0x20/0x40 [ 22.733561] kasan_save_alloc_info+0x40/0x58 [ 22.733769] __kasan_kmalloc+0xd4/0xd8 [ 22.733843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.733905] kasan_atomics+0xb8/0x2e0 [ 22.733955] kunit_try_run_case+0x170/0x3f0 [ 22.734005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.734214] kthread+0x328/0x630 [ 22.734436] ret_from_fork+0x10/0x20 [ 22.734503] [ 22.734534] The buggy address belongs to the object at fff00000c63bc080 [ 22.734534] which belongs to the cache kmalloc-64 of size 64 [ 22.734617] The buggy address is located 0 bytes to the right of [ 22.734617] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.734702] [ 22.734732] The buggy address belongs to the physical page: [ 22.734773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.734849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.734916] page_type: f5(slab) [ 22.734968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.735384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.735451] page dumped because: kasan: bad access detected [ 22.735618] [ 22.735648] Memory state around the buggy address: [ 22.735693] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.735985] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.736118] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.736195] ^ [ 22.736460] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.736573] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.736625] ================================================================== [ 22.780148] ================================================================== [ 22.780233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.780417] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.780546] [ 22.780593] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.780913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.781039] Hardware name: linux,dummy-virt (DT) [ 22.781081] Call trace: [ 22.781114] show_stack+0x20/0x38 (C) [ 22.781172] dump_stack_lvl+0x8c/0xd0 [ 22.781333] print_report+0x118/0x608 [ 22.781436] kasan_report+0xdc/0x128 [ 22.781505] kasan_check_range+0x100/0x1a8 [ 22.781561] __kasan_check_write+0x20/0x30 [ 22.781612] kasan_atomics_helper+0x1190/0x4858 [ 22.781715] kasan_atomics+0x198/0x2e0 [ 22.781807] kunit_try_run_case+0x170/0x3f0 [ 22.781887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.781951] kthread+0x328/0x630 [ 22.782181] ret_from_fork+0x10/0x20 [ 22.782259] [ 22.782295] Allocated by task 274: [ 22.782333] kasan_save_stack+0x3c/0x68 [ 22.782385] kasan_save_track+0x20/0x40 [ 22.782431] kasan_save_alloc_info+0x40/0x58 [ 22.782548] __kasan_kmalloc+0xd4/0xd8 [ 22.782760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.782966] kasan_atomics+0xb8/0x2e0 [ 22.783029] kunit_try_run_case+0x170/0x3f0 [ 22.783521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.783671] kthread+0x328/0x630 [ 22.783785] ret_from_fork+0x10/0x20 [ 22.783858] [ 22.783888] The buggy address belongs to the object at fff00000c63bc080 [ 22.783888] which belongs to the cache kmalloc-64 of size 64 [ 22.783958] The buggy address is located 0 bytes to the right of [ 22.783958] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.784031] [ 22.784059] The buggy address belongs to the physical page: [ 22.784100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.784505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.784753] page_type: f5(slab) [ 22.784904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.784967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.785093] page dumped because: kasan: bad access detected [ 22.785287] [ 22.785424] Memory state around the buggy address: [ 22.785624] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.785849] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.786087] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.786168] ^ [ 22.786215] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.786285] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.786425] ================================================================== [ 22.744842] ================================================================== [ 22.744896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 22.744957] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.745016] [ 22.745061] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.745241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745277] Hardware name: linux,dummy-virt (DT) [ 22.745316] Call trace: [ 22.745373] show_stack+0x20/0x38 (C) [ 22.745490] dump_stack_lvl+0x8c/0xd0 [ 22.745545] print_report+0x118/0x608 [ 22.745601] kasan_report+0xdc/0x128 [ 22.745656] kasan_check_range+0x100/0x1a8 [ 22.745717] __kasan_check_write+0x20/0x30 [ 22.745774] kasan_atomics_helper+0xf20/0x4858 [ 22.745856] kasan_atomics+0x198/0x2e0 [ 22.745920] kunit_try_run_case+0x170/0x3f0 [ 22.745981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.746047] kthread+0x328/0x630 [ 22.746102] ret_from_fork+0x10/0x20 [ 22.746190] [ 22.746217] Allocated by task 274: [ 22.746264] kasan_save_stack+0x3c/0x68 [ 22.746320] kasan_save_track+0x20/0x40 [ 22.746371] kasan_save_alloc_info+0x40/0x58 [ 22.746420] __kasan_kmalloc+0xd4/0xd8 [ 22.746468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.746520] kasan_atomics+0xb8/0x2e0 [ 22.746565] kunit_try_run_case+0x170/0x3f0 [ 22.746615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.746669] kthread+0x328/0x630 [ 22.746710] ret_from_fork+0x10/0x20 [ 22.746758] [ 22.746788] The buggy address belongs to the object at fff00000c63bc080 [ 22.746788] which belongs to the cache kmalloc-64 of size 64 [ 22.746884] The buggy address is located 0 bytes to the right of [ 22.746884] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.746960] [ 22.746989] The buggy address belongs to the physical page: [ 22.747086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.747162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.747361] page_type: f5(slab) [ 22.747417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.747483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.747736] page dumped because: kasan: bad access detected [ 22.747821] [ 22.747922] Memory state around the buggy address: [ 22.747977] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748040] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.748386] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.748456] ^ [ 22.748508] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748577] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748766] ================================================================== [ 22.794459] ================================================================== [ 22.794561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.794907] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.795046] [ 22.795127] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.795312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.795373] Hardware name: linux,dummy-virt (DT) [ 22.795450] Call trace: [ 22.795480] show_stack+0x20/0x38 (C) [ 22.795540] dump_stack_lvl+0x8c/0xd0 [ 22.795592] print_report+0x118/0x608 [ 22.795647] kasan_report+0xdc/0x128 [ 22.795701] kasan_check_range+0x100/0x1a8 [ 22.795754] __kasan_check_write+0x20/0x30 [ 22.795806] kasan_atomics_helper+0x126c/0x4858 [ 22.795876] kasan_atomics+0x198/0x2e0 [ 22.795930] kunit_try_run_case+0x170/0x3f0 [ 22.795986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.796047] kthread+0x328/0x630 [ 22.796107] ret_from_fork+0x10/0x20 [ 22.796204] [ 22.796260] Allocated by task 274: [ 22.796297] kasan_save_stack+0x3c/0x68 [ 22.796347] kasan_save_track+0x20/0x40 [ 22.796393] kasan_save_alloc_info+0x40/0x58 [ 22.796438] __kasan_kmalloc+0xd4/0xd8 [ 22.796482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.796528] kasan_atomics+0xb8/0x2e0 [ 22.796571] kunit_try_run_case+0x170/0x3f0 [ 22.796616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.796666] kthread+0x328/0x630 [ 22.796706] ret_from_fork+0x10/0x20 [ 22.796749] [ 22.796777] The buggy address belongs to the object at fff00000c63bc080 [ 22.796777] which belongs to the cache kmalloc-64 of size 64 [ 22.796852] The buggy address is located 0 bytes to the right of [ 22.796852] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.796928] [ 22.796954] The buggy address belongs to the physical page: [ 22.796993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.797053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.797153] page_type: f5(slab) [ 22.797391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.797655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.797949] page dumped because: kasan: bad access detected [ 22.798075] [ 22.798191] Memory state around the buggy address: [ 22.798300] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798359] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.798643] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.798731] ^ [ 22.798775] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798889] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798954] ================================================================== [ 22.764417] ================================================================== [ 22.764497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.764571] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.765029] [ 22.765151] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.765340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.765461] Hardware name: linux,dummy-virt (DT) [ 22.765509] Call trace: [ 22.765677] show_stack+0x20/0x38 (C) [ 22.765758] dump_stack_lvl+0x8c/0xd0 [ 22.765900] print_report+0x118/0x608 [ 22.765969] kasan_report+0xdc/0x128 [ 22.766031] kasan_check_range+0x100/0x1a8 [ 22.766093] __kasan_check_write+0x20/0x30 [ 22.766150] kasan_atomics_helper+0x1058/0x4858 [ 22.766210] kasan_atomics+0x198/0x2e0 [ 22.766269] kunit_try_run_case+0x170/0x3f0 [ 22.766329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.766394] kthread+0x328/0x630 [ 22.766445] ret_from_fork+0x10/0x20 [ 22.766506] [ 22.766535] Allocated by task 274: [ 22.766576] kasan_save_stack+0x3c/0x68 [ 22.766634] kasan_save_track+0x20/0x40 [ 22.766684] kasan_save_alloc_info+0x40/0x58 [ 22.766731] __kasan_kmalloc+0xd4/0xd8 [ 22.766779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.766831] kasan_atomics+0xb8/0x2e0 [ 22.766911] kunit_try_run_case+0x170/0x3f0 [ 22.766963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.767020] kthread+0x328/0x630 [ 22.767086] ret_from_fork+0x10/0x20 [ 22.767174] [ 22.767237] The buggy address belongs to the object at fff00000c63bc080 [ 22.767237] which belongs to the cache kmalloc-64 of size 64 [ 22.767309] The buggy address is located 0 bytes to the right of [ 22.767309] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.767382] [ 22.767410] The buggy address belongs to the physical page: [ 22.767449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.767507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.767561] page_type: f5(slab) [ 22.767610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.767692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.767797] page dumped because: kasan: bad access detected [ 22.767856] [ 22.767887] Memory state around the buggy address: [ 22.767932] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.767998] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.768093] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.768199] ^ [ 22.768259] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.768357] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.768419] ================================================================== [ 22.849915] ================================================================== [ 22.849992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.850068] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.850134] [ 22.850183] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.850292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.850332] Hardware name: linux,dummy-virt (DT) [ 22.850374] Call trace: [ 22.850408] show_stack+0x20/0x38 (C) [ 22.850471] dump_stack_lvl+0x8c/0xd0 [ 22.850531] print_report+0x118/0x608 [ 22.850592] kasan_report+0xdc/0x128 [ 22.850650] __asan_report_load8_noabort+0x20/0x30 [ 22.850712] kasan_atomics_helper+0x3db0/0x4858 [ 22.850775] kasan_atomics+0x198/0x2e0 [ 22.850833] kunit_try_run_case+0x170/0x3f0 [ 22.851622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.852191] kthread+0x328/0x630 [ 22.852307] ret_from_fork+0x10/0x20 [ 22.852630] [ 22.852906] Allocated by task 274: [ 22.852961] kasan_save_stack+0x3c/0x68 [ 22.853020] kasan_save_track+0x20/0x40 [ 22.853163] kasan_save_alloc_info+0x40/0x58 [ 22.853213] __kasan_kmalloc+0xd4/0xd8 [ 22.853261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.853349] kasan_atomics+0xb8/0x2e0 [ 22.853449] kunit_try_run_case+0x170/0x3f0 [ 22.853695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.853815] kthread+0x328/0x630 [ 22.853910] ret_from_fork+0x10/0x20 [ 22.853965] [ 22.853996] The buggy address belongs to the object at fff00000c63bc080 [ 22.853996] which belongs to the cache kmalloc-64 of size 64 [ 22.854074] The buggy address is located 0 bytes to the right of [ 22.854074] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.854165] [ 22.854195] The buggy address belongs to the physical page: [ 22.854240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.854309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.854370] page_type: f5(slab) [ 22.854426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.854490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.854546] page dumped because: kasan: bad access detected [ 22.854590] [ 22.854617] Memory state around the buggy address: [ 22.854661] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.854729] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.854803] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.854870] ^ [ 22.854936] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.855000] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.855052] ================================================================== [ 22.758637] ================================================================== [ 22.758715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.758785] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.758859] [ 22.758903] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.759003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.759035] Hardware name: linux,dummy-virt (DT) [ 22.759075] Call trace: [ 22.759106] show_stack+0x20/0x38 (C) [ 22.759164] dump_stack_lvl+0x8c/0xd0 [ 22.759216] print_report+0x118/0x608 [ 22.759270] kasan_report+0xdc/0x128 [ 22.759322] kasan_check_range+0x100/0x1a8 [ 22.759379] __kasan_check_write+0x20/0x30 [ 22.759430] kasan_atomics_helper+0xff0/0x4858 [ 22.759485] kasan_atomics+0x198/0x2e0 [ 22.759537] kunit_try_run_case+0x170/0x3f0 [ 22.759592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.759650] kthread+0x328/0x630 [ 22.759698] ret_from_fork+0x10/0x20 [ 22.759751] [ 22.759778] Allocated by task 274: [ 22.759821] kasan_save_stack+0x3c/0x68 [ 22.760586] kasan_save_track+0x20/0x40 [ 22.760697] kasan_save_alloc_info+0x40/0x58 [ 22.760745] __kasan_kmalloc+0xd4/0xd8 [ 22.760790] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.761129] kasan_atomics+0xb8/0x2e0 [ 22.761206] kunit_try_run_case+0x170/0x3f0 [ 22.761445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.761535] kthread+0x328/0x630 [ 22.761585] ret_from_fork+0x10/0x20 [ 22.761632] [ 22.761681] The buggy address belongs to the object at fff00000c63bc080 [ 22.761681] which belongs to the cache kmalloc-64 of size 64 [ 22.761753] The buggy address is located 0 bytes to the right of [ 22.761753] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.761846] [ 22.761881] The buggy address belongs to the physical page: [ 22.761926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.761993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.762259] page_type: f5(slab) [ 22.762518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.762598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.762659] page dumped because: kasan: bad access detected [ 22.762848] [ 22.763078] Memory state around the buggy address: [ 22.763129] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.763188] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.763290] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.763345] ^ [ 22.763397] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.763615] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.763716] ================================================================== [ 22.749918] ================================================================== [ 22.749998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 22.750074] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.750164] [ 22.750211] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.750530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.750582] Hardware name: linux,dummy-virt (DT) [ 22.750622] Call trace: [ 22.750692] show_stack+0x20/0x38 (C) [ 22.750811] dump_stack_lvl+0x8c/0xd0 [ 22.751231] print_report+0x118/0x608 [ 22.751294] kasan_report+0xdc/0x128 [ 22.751557] kasan_check_range+0x100/0x1a8 [ 22.751648] __kasan_check_write+0x20/0x30 [ 22.751711] kasan_atomics_helper+0xf88/0x4858 [ 22.751769] kasan_atomics+0x198/0x2e0 [ 22.751823] kunit_try_run_case+0x170/0x3f0 [ 22.751894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.751955] kthread+0x328/0x630 [ 22.752006] ret_from_fork+0x10/0x20 [ 22.752064] [ 22.752090] Allocated by task 274: [ 22.752128] kasan_save_stack+0x3c/0x68 [ 22.752181] kasan_save_track+0x20/0x40 [ 22.752228] kasan_save_alloc_info+0x40/0x58 [ 22.752273] __kasan_kmalloc+0xd4/0xd8 [ 22.752318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.752364] kasan_atomics+0xb8/0x2e0 [ 22.752408] kunit_try_run_case+0x170/0x3f0 [ 22.752455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.752504] kthread+0x328/0x630 [ 22.752544] ret_from_fork+0x10/0x20 [ 22.752587] [ 22.752613] The buggy address belongs to the object at fff00000c63bc080 [ 22.752613] which belongs to the cache kmalloc-64 of size 64 [ 22.754224] The buggy address is located 0 bytes to the right of [ 22.754224] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.754924] [ 22.754967] The buggy address belongs to the physical page: [ 22.755429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.755515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.756009] page_type: f5(slab) [ 22.756168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.756545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.756603] page dumped because: kasan: bad access detected [ 22.756645] [ 22.756674] Memory state around the buggy address: [ 22.756715] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756769] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.756822] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.756886] ^ [ 22.756932] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756985] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.757032] ================================================================== [ 22.787416] ================================================================== [ 22.787489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.787558] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.787618] [ 22.787659] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.787761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.787796] Hardware name: linux,dummy-virt (DT) [ 22.787845] Call trace: [ 22.787878] show_stack+0x20/0x38 (C) [ 22.787938] dump_stack_lvl+0x8c/0xd0 [ 22.787990] print_report+0x118/0x608 [ 22.788045] kasan_report+0xdc/0x128 [ 22.788100] kasan_check_range+0x100/0x1a8 [ 22.788154] __kasan_check_write+0x20/0x30 [ 22.788206] kasan_atomics_helper+0x11f8/0x4858 [ 22.788263] kasan_atomics+0x198/0x2e0 [ 22.788313] kunit_try_run_case+0x170/0x3f0 [ 22.788368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.789130] kthread+0x328/0x630 [ 22.789376] ret_from_fork+0x10/0x20 [ 22.789476] [ 22.789660] Allocated by task 274: [ 22.789749] kasan_save_stack+0x3c/0x68 [ 22.790000] kasan_save_track+0x20/0x40 [ 22.790299] kasan_save_alloc_info+0x40/0x58 [ 22.790553] __kasan_kmalloc+0xd4/0xd8 [ 22.790897] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.790951] kasan_atomics+0xb8/0x2e0 [ 22.790997] kunit_try_run_case+0x170/0x3f0 [ 22.791707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.791764] kthread+0x328/0x630 [ 22.792024] ret_from_fork+0x10/0x20 [ 22.792075] [ 22.792104] The buggy address belongs to the object at fff00000c63bc080 [ 22.792104] which belongs to the cache kmalloc-64 of size 64 [ 22.792171] The buggy address is located 0 bytes to the right of [ 22.792171] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.792243] [ 22.792268] The buggy address belongs to the physical page: [ 22.792315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.792416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.792469] page_type: f5(slab) [ 22.792517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.792609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.792703] page dumped because: kasan: bad access detected [ 22.792770] [ 22.792795] Memory state around the buggy address: [ 22.792842] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.792901] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.792952] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.792996] ^ [ 22.793035] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.793089] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.793133] ================================================================== [ 22.843941] ================================================================== [ 22.844019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.844093] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.844158] [ 22.844206] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.844312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.844349] Hardware name: linux,dummy-virt (DT) [ 22.844389] Call trace: [ 22.844423] show_stack+0x20/0x38 (C) [ 22.844483] dump_stack_lvl+0x8c/0xd0 [ 22.844540] print_report+0x118/0x608 [ 22.844598] kasan_report+0xdc/0x128 [ 22.844649] kasan_check_range+0x100/0x1a8 [ 22.844704] __kasan_check_write+0x20/0x30 [ 22.844757] kasan_atomics_helper+0x15b4/0x4858 [ 22.844832] kasan_atomics+0x198/0x2e0 [ 22.844902] kunit_try_run_case+0x170/0x3f0 [ 22.844958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.845021] kthread+0x328/0x630 [ 22.845069] ret_from_fork+0x10/0x20 [ 22.845126] [ 22.845154] Allocated by task 274: [ 22.845189] kasan_save_stack+0x3c/0x68 [ 22.845242] kasan_save_track+0x20/0x40 [ 22.845290] kasan_save_alloc_info+0x40/0x58 [ 22.845335] __kasan_kmalloc+0xd4/0xd8 [ 22.845380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.845428] kasan_atomics+0xb8/0x2e0 [ 22.845474] kunit_try_run_case+0x170/0x3f0 [ 22.845522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.845577] kthread+0x328/0x630 [ 22.845619] ret_from_fork+0x10/0x20 [ 22.845666] [ 22.845693] The buggy address belongs to the object at fff00000c63bc080 [ 22.845693] which belongs to the cache kmalloc-64 of size 64 [ 22.845764] The buggy address is located 0 bytes to the right of [ 22.845764] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.846556] [ 22.846610] The buggy address belongs to the physical page: [ 22.846668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.846952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.847200] page_type: f5(slab) [ 22.847256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.847324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.847377] page dumped because: kasan: bad access detected [ 22.847548] [ 22.847597] Memory state around the buggy address: [ 22.847646] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.847977] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.848226] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.848283] ^ [ 22.848642] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.848898] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.848982] ================================================================== [ 22.894814] ================================================================== [ 22.894882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.894993] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.895097] [ 22.895177] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.895347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.895407] Hardware name: linux,dummy-virt (DT) [ 22.895457] Call trace: [ 22.895487] show_stack+0x20/0x38 (C) [ 22.895541] dump_stack_lvl+0x8c/0xd0 [ 22.895595] print_report+0x118/0x608 [ 22.895646] kasan_report+0xdc/0x128 [ 22.895697] kasan_check_range+0x100/0x1a8 [ 22.895750] __kasan_check_write+0x20/0x30 [ 22.895802] kasan_atomics_helper+0x17ec/0x4858 [ 22.895865] kasan_atomics+0x198/0x2e0 [ 22.895918] kunit_try_run_case+0x170/0x3f0 [ 22.895971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.896102] kthread+0x328/0x630 [ 22.896161] ret_from_fork+0x10/0x20 [ 22.896217] [ 22.896244] Allocated by task 274: [ 22.896279] kasan_save_stack+0x3c/0x68 [ 22.896328] kasan_save_track+0x20/0x40 [ 22.896374] kasan_save_alloc_info+0x40/0x58 [ 22.896416] __kasan_kmalloc+0xd4/0xd8 [ 22.896474] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.896553] kasan_atomics+0xb8/0x2e0 [ 22.896653] kunit_try_run_case+0x170/0x3f0 [ 22.896784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.897028] kthread+0x328/0x630 [ 22.897070] ret_from_fork+0x10/0x20 [ 22.897113] [ 22.897141] The buggy address belongs to the object at fff00000c63bc080 [ 22.897141] which belongs to the cache kmalloc-64 of size 64 [ 22.897439] The buggy address is located 0 bytes to the right of [ 22.897439] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.897844] [ 22.897893] The buggy address belongs to the physical page: [ 22.897940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.898006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.898068] page_type: f5(slab) [ 22.898467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.898636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.898798] page dumped because: kasan: bad access detected [ 22.898856] [ 22.898895] Memory state around the buggy address: [ 22.899091] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899364] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.899508] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.899561] ^ [ 22.899607] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899815] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899876] ================================================================== [ 22.875210] ================================================================== [ 22.875270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.875338] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.875415] [ 22.875488] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.875663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.875724] Hardware name: linux,dummy-virt (DT) [ 22.875777] Call trace: [ 22.875808] show_stack+0x20/0x38 (C) [ 22.875887] dump_stack_lvl+0x8c/0xd0 [ 22.876000] print_report+0x118/0x608 [ 22.876052] kasan_report+0xdc/0x128 [ 22.876105] __asan_report_load8_noabort+0x20/0x30 [ 22.876159] kasan_atomics_helper+0x3e10/0x4858 [ 22.876211] kasan_atomics+0x198/0x2e0 [ 22.876264] kunit_try_run_case+0x170/0x3f0 [ 22.876318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.876385] kthread+0x328/0x630 [ 22.876476] ret_from_fork+0x10/0x20 [ 22.876563] [ 22.876589] Allocated by task 274: [ 22.876625] kasan_save_stack+0x3c/0x68 [ 22.876718] kasan_save_track+0x20/0x40 [ 22.876850] kasan_save_alloc_info+0x40/0x58 [ 22.877130] __kasan_kmalloc+0xd4/0xd8 [ 22.877380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.877441] kasan_atomics+0xb8/0x2e0 [ 22.877484] kunit_try_run_case+0x170/0x3f0 [ 22.877528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.877578] kthread+0x328/0x630 [ 22.877941] ret_from_fork+0x10/0x20 [ 22.878002] [ 22.878420] The buggy address belongs to the object at fff00000c63bc080 [ 22.878420] which belongs to the cache kmalloc-64 of size 64 [ 22.878548] The buggy address is located 0 bytes to the right of [ 22.878548] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.878644] [ 22.878676] The buggy address belongs to the physical page: [ 22.878715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.878775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.878832] page_type: f5(slab) [ 22.878893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.878952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.879423] page dumped because: kasan: bad access detected [ 22.879479] [ 22.879907] Memory state around the buggy address: [ 22.879996] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.880057] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.880308] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.880703] ^ [ 22.880761] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.880859] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.881033] ================================================================== [ 22.698185] ================================================================== [ 22.698262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 22.698344] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.698413] [ 22.698463] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.698575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.698614] Hardware name: linux,dummy-virt (DT) [ 22.698658] Call trace: [ 22.698691] show_stack+0x20/0x38 (C) [ 22.698757] dump_stack_lvl+0x8c/0xd0 [ 22.698817] print_report+0x118/0x608 [ 22.700508] kasan_report+0xdc/0x128 [ 22.701056] __asan_report_load4_noabort+0x20/0x30 [ 22.701565] kasan_atomics_helper+0x3e04/0x4858 [ 22.701910] kasan_atomics+0x198/0x2e0 [ 22.702497] kunit_try_run_case+0x170/0x3f0 [ 22.702597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.702673] kthread+0x328/0x630 [ 22.702729] ret_from_fork+0x10/0x20 [ 22.702794] [ 22.702823] Allocated by task 274: [ 22.702882] kasan_save_stack+0x3c/0x68 [ 22.704295] kasan_save_track+0x20/0x40 [ 22.704368] kasan_save_alloc_info+0x40/0x58 [ 22.704418] __kasan_kmalloc+0xd4/0xd8 [ 22.704466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.704517] kasan_atomics+0xb8/0x2e0 [ 22.704561] kunit_try_run_case+0x170/0x3f0 [ 22.704604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.704654] kthread+0x328/0x630 [ 22.704695] ret_from_fork+0x10/0x20 [ 22.704736] [ 22.704766] The buggy address belongs to the object at fff00000c63bc080 [ 22.704766] which belongs to the cache kmalloc-64 of size 64 [ 22.706393] The buggy address is located 0 bytes to the right of [ 22.706393] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.707073] [ 22.707193] The buggy address belongs to the physical page: [ 22.707281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.707470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.707545] page_type: f5(slab) [ 22.707605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.707674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.707724] page dumped because: kasan: bad access detected [ 22.707762] [ 22.707790] Memory state around the buggy address: [ 22.707828] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.707897] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.707950] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.707998] ^ [ 22.709560] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710004] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710067] ================================================================== [ 22.579748] ================================================================== [ 22.579822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.580216] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.580293] [ 22.580566] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.580691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.580943] Hardware name: linux,dummy-virt (DT) [ 22.581007] Call trace: [ 22.581039] show_stack+0x20/0x38 (C) [ 22.581144] dump_stack_lvl+0x8c/0xd0 [ 22.581241] print_report+0x118/0x608 [ 22.581401] kasan_report+0xdc/0x128 [ 22.581623] __asan_report_load4_noabort+0x20/0x30 [ 22.581693] kasan_atomics_helper+0x42d8/0x4858 [ 22.581767] kasan_atomics+0x198/0x2e0 [ 22.582024] kunit_try_run_case+0x170/0x3f0 [ 22.582095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.582207] kthread+0x328/0x630 [ 22.582263] ret_from_fork+0x10/0x20 [ 22.582362] [ 22.582396] Allocated by task 274: [ 22.582436] kasan_save_stack+0x3c/0x68 [ 22.582494] kasan_save_track+0x20/0x40 [ 22.582545] kasan_save_alloc_info+0x40/0x58 [ 22.583879] ret_from_fork+0x10/0x20 [ 22.584227] [ 22.584370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.585165] Memory state around the buggy address: [ 22.585949] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.587807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.588950] __kasan_check_write+0x20/0x30 [ 22.590333] kasan_save_stack+0x3c/0x68 [ 22.590683] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.590736] kasan_atomics+0xb8/0x2e0 [ 22.590784] kunit_try_run_case+0x170/0x3f0 [ 22.590847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.590911] kthread+0x328/0x630 [ 22.590956] ret_from_fork+0x10/0x20 [ 22.591028] [ 22.591058] The buggy address belongs to the object at fff00000c63bc080 [ 22.591058] which belongs to the cache kmalloc-64 of size 64 [ 22.591149] The buggy address is located 0 bytes to the right of [ 22.591149] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.591234] [ 22.591275] The buggy address belongs to the physical page: [ 22.591324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.591391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.591461] page_type: f5(slab) [ 22.591529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.591594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.591647] page dumped because: kasan: bad access detected [ 22.591691] [ 22.591725] Memory state around the buggy address: [ 22.591774] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.591830] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.591925] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.591974] ^ [ 22.592019] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.592458] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.592535] ================================================================== [ 22.741423] ================================================================== [ 22.741481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 22.741548] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.741609] [ 22.741652] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.741759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.741795] Hardware name: linux,dummy-virt (DT) [ 22.741860] Call trace: [ 22.741896] show_stack+0x20/0x38 (C) [ 22.741959] dump_stack_lvl+0x8c/0xd0 [ 22.742021] print_report+0x118/0x608 [ 22.742081] kasan_report+0xdc/0x128 [ 22.742140] kasan_check_range+0x100/0x1a8 [ 22.742201] __kasan_check_write+0x20/0x30 [ 22.742260] kasan_atomics_helper+0xeb8/0x4858 [ 22.742320] kasan_atomics+0x198/0x2e0 [ 22.742375] kunit_try_run_case+0x170/0x3f0 [ 22.742434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.742498] kthread+0x328/0x630 [ 22.742547] ret_from_fork+0x10/0x20 [ 22.742608] [ 22.742635] Allocated by task 274: [ 22.742674] kasan_save_stack+0x3c/0x68 [ 22.742730] kasan_save_track+0x20/0x40 [ 22.742781] kasan_save_alloc_info+0x40/0x58 [ 22.742832] __kasan_kmalloc+0xd4/0xd8 [ 22.742928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.742982] kasan_atomics+0xb8/0x2e0 [ 22.743243] kunit_try_run_case+0x170/0x3f0 [ 22.743304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.743361] kthread+0x328/0x630 [ 22.743405] ret_from_fork+0x10/0x20 [ 22.743452] [ 22.743480] The buggy address belongs to the object at fff00000c63bc080 [ 22.743480] which belongs to the cache kmalloc-64 of size 64 [ 22.743552] The buggy address is located 0 bytes to the right of [ 22.743552] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.743629] [ 22.743657] The buggy address belongs to the physical page: [ 22.743751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.743821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.743896] page_type: f5(slab) [ 22.743948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.744050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.744144] page dumped because: kasan: bad access detected [ 22.744219] [ 22.744275] Memory state around the buggy address: [ 22.744342] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744451] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.744507] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.744557] ^ [ 22.744600] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744657] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744706] ================================================================== [ 22.737776] ================================================================== [ 22.737881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 22.737964] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.738033] [ 22.738082] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.738189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.738229] Hardware name: linux,dummy-virt (DT) [ 22.738274] Call trace: [ 22.738307] show_stack+0x20/0x38 (C) [ 22.738373] dump_stack_lvl+0x8c/0xd0 [ 22.738435] print_report+0x118/0x608 [ 22.738496] kasan_report+0xdc/0x128 [ 22.738563] __asan_report_store8_noabort+0x20/0x30 [ 22.738678] kasan_atomics_helper+0x3e5c/0x4858 [ 22.738786] kasan_atomics+0x198/0x2e0 [ 22.738919] kunit_try_run_case+0x170/0x3f0 [ 22.738983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.739049] kthread+0x328/0x630 [ 22.739104] ret_from_fork+0x10/0x20 [ 22.739167] [ 22.739194] Allocated by task 274: [ 22.739237] kasan_save_stack+0x3c/0x68 [ 22.739292] kasan_save_track+0x20/0x40 [ 22.739339] kasan_save_alloc_info+0x40/0x58 [ 22.739384] __kasan_kmalloc+0xd4/0xd8 [ 22.739436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.739520] kasan_atomics+0xb8/0x2e0 [ 22.739564] kunit_try_run_case+0x170/0x3f0 [ 22.739610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.739701] kthread+0x328/0x630 [ 22.739777] ret_from_fork+0x10/0x20 [ 22.739859] [ 22.739887] The buggy address belongs to the object at fff00000c63bc080 [ 22.739887] which belongs to the cache kmalloc-64 of size 64 [ 22.739955] The buggy address is located 0 bytes to the right of [ 22.739955] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.740026] [ 22.740052] The buggy address belongs to the physical page: [ 22.740092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.740153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.740213] page_type: f5(slab) [ 22.740311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.740377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.740427] page dumped because: kasan: bad access detected [ 22.740467] [ 22.740490] Memory state around the buggy address: [ 22.740532] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740597] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.740675] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.740722] ^ [ 22.740765] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740871] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740922] ================================================================== [ 22.594200] ================================================================== [ 22.594283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.594358] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.594422] [ 22.594467] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.594574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.594609] Hardware name: linux,dummy-virt (DT) [ 22.594651] Call trace: [ 22.594685] show_stack+0x20/0x38 (C) [ 22.594747] dump_stack_lvl+0x8c/0xd0 [ 22.594805] print_report+0x118/0x608 [ 22.594882] kasan_report+0xdc/0x128 [ 22.596118] kasan_check_range+0x100/0x1a8 [ 22.596230] __kasan_check_write+0x20/0x30 [ 22.596511] kasan_atomics_helper+0x99c/0x4858 [ 22.596611] kasan_atomics+0x198/0x2e0 [ 22.596677] kunit_try_run_case+0x170/0x3f0 [ 22.596955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.597057] kthread+0x328/0x630 [ 22.597144] ret_from_fork+0x10/0x20 [ 22.597211] [ 22.597455] Allocated by task 274: [ 22.597519] kasan_save_stack+0x3c/0x68 [ 22.597589] kasan_save_track+0x20/0x40 [ 22.597652] kasan_save_alloc_info+0x40/0x58 [ 22.597699] __kasan_kmalloc+0xd4/0xd8 [ 22.597754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.597803] kasan_atomics+0xb8/0x2e0 [ 22.598106] kunit_try_run_case+0x170/0x3f0 [ 22.598208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.598481] kthread+0x328/0x630 [ 22.598539] ret_from_fork+0x10/0x20 [ 22.598846] [ 22.598975] The buggy address belongs to the object at fff00000c63bc080 [ 22.598975] which belongs to the cache kmalloc-64 of size 64 [ 22.599072] The buggy address is located 0 bytes to the right of [ 22.599072] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.599146] [ 22.599305] The buggy address belongs to the physical page: [ 22.599502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.600441] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.600802] ^ [ 22.601134] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.603470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.604628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.606851] The buggy address is located 0 bytes to the right of [ 22.606851] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.607000] [ 22.607032] The buggy address belongs to the physical page: [ 22.607614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.608137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.608276] page_type: f5(slab) [ 22.608441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.608523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.608576] page dumped because: kasan: bad access detected [ 22.608617] [ 22.608642] Memory state around the buggy address: [ 22.608945] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609139] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.609223] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.609275] ^ [ 22.609469] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609530] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609582] ================================================================== [ 22.723352] ================================================================== [ 22.723429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 22.723499] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.723561] [ 22.723613] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.723712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.723747] Hardware name: linux,dummy-virt (DT) [ 22.723787] Call trace: [ 22.723818] show_stack+0x20/0x38 (C) [ 22.723898] dump_stack_lvl+0x8c/0xd0 [ 22.723957] print_report+0x118/0x608 [ 22.724013] kasan_report+0xdc/0x128 [ 22.724070] __asan_report_load8_noabort+0x20/0x30 [ 22.724595] kasan_atomics_helper+0x3f58/0x4858 [ 22.724939] kasan_atomics+0x198/0x2e0 [ 22.725016] kunit_try_run_case+0x170/0x3f0 [ 22.725122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.725337] kthread+0x328/0x630 [ 22.725406] ret_from_fork+0x10/0x20 [ 22.725659] [ 22.725695] Allocated by task 274: [ 22.725743] kasan_save_stack+0x3c/0x68 [ 22.725822] kasan_save_track+0x20/0x40 [ 22.725892] kasan_save_alloc_info+0x40/0x58 [ 22.725944] __kasan_kmalloc+0xd4/0xd8 [ 22.726104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.726207] kasan_atomics+0xb8/0x2e0 [ 22.726475] kunit_try_run_case+0x170/0x3f0 [ 22.726616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.726715] kthread+0x328/0x630 [ 22.726762] ret_from_fork+0x10/0x20 [ 22.726808] [ 22.726889] The buggy address belongs to the object at fff00000c63bc080 [ 22.726889] which belongs to the cache kmalloc-64 of size 64 [ 22.726967] The buggy address is located 0 bytes to the right of [ 22.726967] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.727047] [ 22.727080] The buggy address belongs to the physical page: [ 22.727225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.727520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.727587] page_type: f5(slab) [ 22.727689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.727815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.727922] page dumped because: kasan: bad access detected [ 22.727998] [ 22.728044] Memory state around the buggy address: [ 22.728089] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.728147] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.728204] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.728254] ^ [ 22.728554] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.728633] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.728753] ================================================================== [ 22.863314] ================================================================== [ 22.863384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.863454] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.863515] [ 22.863561] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.863661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.863695] Hardware name: linux,dummy-virt (DT) [ 22.863736] Call trace: [ 22.863766] show_stack+0x20/0x38 (C) [ 22.863826] dump_stack_lvl+0x8c/0xd0 [ 22.864954] print_report+0x118/0x608 [ 22.865087] kasan_report+0xdc/0x128 [ 22.865149] __asan_report_load8_noabort+0x20/0x30 [ 22.865205] kasan_atomics_helper+0x3df4/0x4858 [ 22.865274] kasan_atomics+0x198/0x2e0 [ 22.865353] kunit_try_run_case+0x170/0x3f0 [ 22.865425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.865519] kthread+0x328/0x630 [ 22.865592] ret_from_fork+0x10/0x20 [ 22.865654] [ 22.865749] Allocated by task 274: [ 22.865792] kasan_save_stack+0x3c/0x68 [ 22.865872] kasan_save_track+0x20/0x40 [ 22.865936] kasan_save_alloc_info+0x40/0x58 [ 22.866002] __kasan_kmalloc+0xd4/0xd8 [ 22.866059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.866194] kasan_atomics+0xb8/0x2e0 [ 22.866248] kunit_try_run_case+0x170/0x3f0 [ 22.866298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.866354] kthread+0x328/0x630 [ 22.866398] ret_from_fork+0x10/0x20 [ 22.866444] [ 22.866473] The buggy address belongs to the object at fff00000c63bc080 [ 22.866473] which belongs to the cache kmalloc-64 of size 64 [ 22.867426] The buggy address is located 0 bytes to the right of [ 22.867426] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.867542] [ 22.867722] The buggy address belongs to the physical page: [ 22.867886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.868008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.868221] page_type: f5(slab) [ 22.868341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.868819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.868887] page dumped because: kasan: bad access detected [ 22.869014] [ 22.869111] Memory state around the buggy address: [ 22.869326] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869386] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.869439] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.869485] ^ [ 22.869527] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869599] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869644] ================================================================== [ 22.822688] ================================================================== [ 22.822978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.823060] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.823320] [ 22.823580] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.823979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.824022] Hardware name: linux,dummy-virt (DT) [ 22.824068] Call trace: [ 22.824254] show_stack+0x20/0x38 (C) [ 22.824343] dump_stack_lvl+0x8c/0xd0 [ 22.824492] print_report+0x118/0x608 [ 22.824549] kasan_report+0xdc/0x128 [ 22.824798] kasan_check_range+0x100/0x1a8 [ 22.824969] __kasan_check_write+0x20/0x30 [ 22.825030] kasan_atomics_helper+0x147c/0x4858 [ 22.825376] kasan_atomics+0x198/0x2e0 [ 22.825469] kunit_try_run_case+0x170/0x3f0 [ 22.825530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.825639] kthread+0x328/0x630 [ 22.825709] ret_from_fork+0x10/0x20 [ 22.825771] [ 22.825801] Allocated by task 274: [ 22.825862] kasan_save_stack+0x3c/0x68 [ 22.825929] kasan_save_track+0x20/0x40 [ 22.825982] kasan_save_alloc_info+0x40/0x58 [ 22.826032] __kasan_kmalloc+0xd4/0xd8 [ 22.826083] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.826175] kasan_atomics+0xb8/0x2e0 [ 22.826251] kunit_try_run_case+0x170/0x3f0 [ 22.826317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826374] kthread+0x328/0x630 [ 22.826417] ret_from_fork+0x10/0x20 [ 22.826463] [ 22.827985] The buggy address belongs to the object at fff00000c63bc080 [ 22.827985] which belongs to the cache kmalloc-64 of size 64 [ 22.828175] The buggy address is located 0 bytes to the right of [ 22.828175] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.828539] [ 22.828873] The buggy address belongs to the physical page: [ 22.829018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.829098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.829356] page_type: f5(slab) [ 22.829513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.829596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.829653] page dumped because: kasan: bad access detected [ 22.829698] [ 22.829725] Memory state around the buggy address: [ 22.829769] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.829899] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.830294] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.830442] ^ [ 22.830497] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.830631] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.830696] ================================================================== [ 22.679674] ================================================================== [ 22.679744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 22.681588] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.682492] [ 22.682787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.683415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.683592] Hardware name: linux,dummy-virt (DT) [ 22.683866] Call trace: [ 22.684172] show_stack+0x20/0x38 (C) [ 22.684311] dump_stack_lvl+0x8c/0xd0 [ 22.684374] print_report+0x118/0x608 [ 22.685318] kasan_report+0xdc/0x128 [ 22.685574] kasan_check_range+0x100/0x1a8 [ 22.685646] __kasan_check_write+0x20/0x30 [ 22.685707] kasan_atomics_helper+0xd3c/0x4858 [ 22.685770] kasan_atomics+0x198/0x2e0 [ 22.686892] kunit_try_run_case+0x170/0x3f0 [ 22.687058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.687130] kthread+0x328/0x630 [ 22.687187] ret_from_fork+0x10/0x20 [ 22.687248] [ 22.687279] Allocated by task 274: [ 22.688413] kasan_save_stack+0x3c/0x68 [ 22.688494] kasan_save_track+0x20/0x40 [ 22.688549] kasan_save_alloc_info+0x40/0x58 [ 22.689245] __kasan_kmalloc+0xd4/0xd8 [ 22.689333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.689400] kasan_atomics+0xb8/0x2e0 [ 22.690063] kunit_try_run_case+0x170/0x3f0 [ 22.690268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.690329] kthread+0x328/0x630 [ 22.690377] ret_from_fork+0x10/0x20 [ 22.690426] [ 22.691134] The buggy address belongs to the object at fff00000c63bc080 [ 22.691134] which belongs to the cache kmalloc-64 of size 64 [ 22.691382] The buggy address is located 0 bytes to the right of [ 22.691382] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.691950] [ 22.692347] The buggy address belongs to the physical page: [ 22.692455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.692661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.692973] page_type: f5(slab) [ 22.693236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.693511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.693705] page dumped because: kasan: bad access detected [ 22.693991] [ 22.694149] Memory state around the buggy address: [ 22.694235] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694303] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.694689] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.695212] ^ [ 22.695324] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695386] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695445] ================================================================== [ 22.711958] ================================================================== [ 22.712042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 22.712116] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.712182] [ 22.712231] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.712342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.712381] Hardware name: linux,dummy-virt (DT) [ 22.712424] Call trace: [ 22.712458] show_stack+0x20/0x38 (C) [ 22.712523] dump_stack_lvl+0x8c/0xd0 [ 22.712585] print_report+0x118/0x608 [ 22.712642] kasan_report+0xdc/0x128 [ 22.712700] kasan_check_range+0x100/0x1a8 [ 22.712762] __kasan_check_read+0x20/0x30 [ 22.712818] kasan_atomics_helper+0xdd4/0x4858 [ 22.714746] kasan_atomics+0x198/0x2e0 [ 22.714822] kunit_try_run_case+0x170/0x3f0 [ 22.715494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.715974] kthread+0x328/0x630 [ 22.716286] ret_from_fork+0x10/0x20 [ 22.716915] [ 22.717231] Allocated by task 274: [ 22.717711] kasan_save_stack+0x3c/0x68 [ 22.718574] kasan_save_track+0x20/0x40 [ 22.718789] kasan_save_alloc_info+0x40/0x58 [ 22.719273] __kasan_kmalloc+0xd4/0xd8 [ 22.719363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.719455] kasan_atomics+0xb8/0x2e0 [ 22.719698] kunit_try_run_case+0x170/0x3f0 [ 22.719916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.719972] kthread+0x328/0x630 [ 22.720135] ret_from_fork+0x10/0x20 [ 22.720267] [ 22.720341] The buggy address belongs to the object at fff00000c63bc080 [ 22.720341] which belongs to the cache kmalloc-64 of size 64 [ 22.720414] The buggy address is located 0 bytes to the right of [ 22.720414] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.720485] [ 22.720513] The buggy address belongs to the physical page: [ 22.720555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.720616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.720675] page_type: f5(slab) [ 22.720726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.720938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.721004] page dumped because: kasan: bad access detected [ 22.721046] [ 22.721178] Memory state around the buggy address: [ 22.721257] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.721416] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.721473] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.721663] ^ [ 22.721718] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.721932] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.722006] ================================================================== [ 22.807589] ================================================================== [ 22.807664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.807735] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.807982] [ 22.808058] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.808186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.808224] Hardware name: linux,dummy-virt (DT) [ 22.808268] Call trace: [ 22.808301] show_stack+0x20/0x38 (C) [ 22.808374] dump_stack_lvl+0x8c/0xd0 [ 22.808432] print_report+0x118/0x608 [ 22.808491] kasan_report+0xdc/0x128 [ 22.808547] kasan_check_range+0x100/0x1a8 [ 22.808606] __kasan_check_write+0x20/0x30 [ 22.808663] kasan_atomics_helper+0x1384/0x4858 [ 22.808722] kasan_atomics+0x198/0x2e0 [ 22.808782] kunit_try_run_case+0x170/0x3f0 [ 22.808858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.808925] kthread+0x328/0x630 [ 22.808973] ret_from_fork+0x10/0x20 [ 22.809032] [ 22.809061] Allocated by task 274: [ 22.809096] kasan_save_stack+0x3c/0x68 [ 22.809150] kasan_save_track+0x20/0x40 [ 22.809197] kasan_save_alloc_info+0x40/0x58 [ 22.809241] __kasan_kmalloc+0xd4/0xd8 [ 22.809286] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.809333] kasan_atomics+0xb8/0x2e0 [ 22.809379] kunit_try_run_case+0x170/0x3f0 [ 22.809426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.809477] kthread+0x328/0x630 [ 22.809520] ret_from_fork+0x10/0x20 [ 22.809565] [ 22.809591] The buggy address belongs to the object at fff00000c63bc080 [ 22.809591] which belongs to the cache kmalloc-64 of size 64 [ 22.809660] The buggy address is located 0 bytes to the right of [ 22.809660] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.809739] [ 22.809767] The buggy address belongs to the physical page: [ 22.810324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.810407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.810591] page_type: f5(slab) [ 22.810657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.810981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.811048] page dumped because: kasan: bad access detected [ 22.811092] [ 22.811262] Memory state around the buggy address: [ 22.811313] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811370] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811423] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.811512] ^ [ 22.811567] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811618] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811663] ================================================================== [ 22.817251] ================================================================== [ 22.817457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.817528] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.817609] [ 22.817654] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.817751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.817782] Hardware name: linux,dummy-virt (DT) [ 22.817844] Call trace: [ 22.817881] show_stack+0x20/0x38 (C) [ 22.818175] dump_stack_lvl+0x8c/0xd0 [ 22.818255] print_report+0x118/0x608 [ 22.818317] kasan_report+0xdc/0x128 [ 22.818752] kasan_check_range+0x100/0x1a8 [ 22.818865] __kasan_check_write+0x20/0x30 [ 22.818936] kasan_atomics_helper+0x1414/0x4858 [ 22.818998] kasan_atomics+0x198/0x2e0 [ 22.819050] kunit_try_run_case+0x170/0x3f0 [ 22.819106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.819165] kthread+0x328/0x630 [ 22.819214] ret_from_fork+0x10/0x20 [ 22.819270] [ 22.819298] Allocated by task 274: [ 22.819333] kasan_save_stack+0x3c/0x68 [ 22.819384] kasan_save_track+0x20/0x40 [ 22.819430] kasan_save_alloc_info+0x40/0x58 [ 22.819474] __kasan_kmalloc+0xd4/0xd8 [ 22.819517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.819562] kasan_atomics+0xb8/0x2e0 [ 22.819604] kunit_try_run_case+0x170/0x3f0 [ 22.819650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.819701] kthread+0x328/0x630 [ 22.819740] ret_from_fork+0x10/0x20 [ 22.819783] [ 22.819808] The buggy address belongs to the object at fff00000c63bc080 [ 22.819808] which belongs to the cache kmalloc-64 of size 64 [ 22.819886] The buggy address is located 0 bytes to the right of [ 22.819886] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.819960] [ 22.819986] The buggy address belongs to the physical page: [ 22.820026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.820083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.820138] page_type: f5(slab) [ 22.820185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.820247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.820295] page dumped because: kasan: bad access detected [ 22.820334] [ 22.820358] Memory state around the buggy address: [ 22.820398] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.820450] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.820500] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.820545] ^ [ 22.820588] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.820640] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.820686] ================================================================== [ 22.870856] ================================================================== [ 22.870983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.871065] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.871130] [ 22.871175] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.871276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.871311] Hardware name: linux,dummy-virt (DT) [ 22.871349] Call trace: [ 22.871382] show_stack+0x20/0x38 (C) [ 22.871440] dump_stack_lvl+0x8c/0xd0 [ 22.871495] print_report+0x118/0x608 [ 22.871549] kasan_report+0xdc/0x128 [ 22.871603] kasan_check_range+0x100/0x1a8 [ 22.871660] __kasan_check_write+0x20/0x30 [ 22.871711] kasan_atomics_helper+0x16d0/0x4858 [ 22.871768] kasan_atomics+0x198/0x2e0 [ 22.871824] kunit_try_run_case+0x170/0x3f0 [ 22.871943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.872211] kthread+0x328/0x630 [ 22.872296] ret_from_fork+0x10/0x20 [ 22.872358] [ 22.872386] Allocated by task 274: [ 22.872423] kasan_save_stack+0x3c/0x68 [ 22.872475] kasan_save_track+0x20/0x40 [ 22.872521] kasan_save_alloc_info+0x40/0x58 [ 22.872564] __kasan_kmalloc+0xd4/0xd8 [ 22.872607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.872653] kasan_atomics+0xb8/0x2e0 [ 22.872695] kunit_try_run_case+0x170/0x3f0 [ 22.872738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.872788] kthread+0x328/0x630 [ 22.872825] ret_from_fork+0x10/0x20 [ 22.872887] [ 22.872913] The buggy address belongs to the object at fff00000c63bc080 [ 22.872913] which belongs to the cache kmalloc-64 of size 64 [ 22.872978] The buggy address is located 0 bytes to the right of [ 22.872978] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.873047] [ 22.873075] The buggy address belongs to the physical page: [ 22.873112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.873171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.873226] page_type: f5(slab) [ 22.873270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.873327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.873375] page dumped because: kasan: bad access detected [ 22.873413] [ 22.873436] Memory state around the buggy address: [ 22.873474] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.873523] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.873692] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.873884] ^ [ 22.873946] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.874004] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.874604] ================================================================== [ 22.836736] ================================================================== [ 22.836866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.836952] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.837017] [ 22.837063] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.837981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.838023] Hardware name: linux,dummy-virt (DT) [ 22.838066] Call trace: [ 22.838102] show_stack+0x20/0x38 (C) [ 22.838168] dump_stack_lvl+0x8c/0xd0 [ 22.838229] print_report+0x118/0x608 [ 22.838290] kasan_report+0xdc/0x128 [ 22.838348] kasan_check_range+0x100/0x1a8 [ 22.838409] __kasan_check_write+0x20/0x30 [ 22.838468] kasan_atomics_helper+0x154c/0x4858 [ 22.838530] kasan_atomics+0x198/0x2e0 [ 22.838590] kunit_try_run_case+0x170/0x3f0 [ 22.838652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.838720] kthread+0x328/0x630 [ 22.838773] ret_from_fork+0x10/0x20 [ 22.838852] [ 22.838889] Allocated by task 274: [ 22.838930] kasan_save_stack+0x3c/0x68 [ 22.838990] kasan_save_track+0x20/0x40 [ 22.839043] kasan_save_alloc_info+0x40/0x58 [ 22.839162] __kasan_kmalloc+0xd4/0xd8 [ 22.839477] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.839590] kasan_atomics+0xb8/0x2e0 [ 22.839645] kunit_try_run_case+0x170/0x3f0 [ 22.839700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.839758] kthread+0x328/0x630 [ 22.839805] ret_from_fork+0x10/0x20 [ 22.839868] [ 22.839900] The buggy address belongs to the object at fff00000c63bc080 [ 22.839900] which belongs to the cache kmalloc-64 of size 64 [ 22.839976] The buggy address is located 0 bytes to the right of [ 22.839976] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.840969] [ 22.841013] The buggy address belongs to the physical page: [ 22.841063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.841142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.841514] page_type: f5(slab) [ 22.841613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.841877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.841977] page dumped because: kasan: bad access detected [ 22.842035] [ 22.842067] Memory state around the buggy address: [ 22.842151] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842333] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.842454] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.842506] ^ [ 22.842738] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842816] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842883] ================================================================== [ 22.888082] ================================================================== [ 22.888206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.888334] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.888394] [ 22.888435] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.888532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.888564] Hardware name: linux,dummy-virt (DT) [ 22.888603] Call trace: [ 22.888631] show_stack+0x20/0x38 (C) [ 22.888692] dump_stack_lvl+0x8c/0xd0 [ 22.888742] print_report+0x118/0x608 [ 22.888817] kasan_report+0xdc/0x128 [ 22.888884] __asan_report_load8_noabort+0x20/0x30 [ 22.888941] kasan_atomics_helper+0x3e20/0x4858 [ 22.889227] kasan_atomics+0x198/0x2e0 [ 22.889342] kunit_try_run_case+0x170/0x3f0 [ 22.889414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.889607] kthread+0x328/0x630 [ 22.889690] ret_from_fork+0x10/0x20 [ 22.889799] [ 22.889891] Allocated by task 274: [ 22.889938] kasan_save_stack+0x3c/0x68 [ 22.889995] kasan_save_track+0x20/0x40 [ 22.890043] kasan_save_alloc_info+0x40/0x58 [ 22.890088] __kasan_kmalloc+0xd4/0xd8 [ 22.890142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.890189] kasan_atomics+0xb8/0x2e0 [ 22.890460] kunit_try_run_case+0x170/0x3f0 [ 22.890517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.890568] kthread+0x328/0x630 [ 22.890655] ret_from_fork+0x10/0x20 [ 22.890743] [ 22.890772] The buggy address belongs to the object at fff00000c63bc080 [ 22.890772] which belongs to the cache kmalloc-64 of size 64 [ 22.890860] The buggy address is located 0 bytes to the right of [ 22.890860] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.890999] [ 22.891036] The buggy address belongs to the physical page: [ 22.891073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.891348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.891593] page_type: f5(slab) [ 22.891642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.892169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.892439] page dumped because: kasan: bad access detected [ 22.892489] [ 22.892961] Memory state around the buggy address: [ 22.893175] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.893334] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.893739] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.893948] ^ [ 22.894002] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.894058] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.894109] ================================================================== [ 22.611167] ================================================================== [ 22.611245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.611318] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.611381] [ 22.611977] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.612312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.612381] Hardware name: linux,dummy-virt (DT) [ 22.612576] Call trace: [ 22.612617] show_stack+0x20/0x38 (C) [ 22.612686] dump_stack_lvl+0x8c/0xd0 [ 22.612746] print_report+0x118/0x608 [ 22.612814] kasan_report+0xdc/0x128 [ 22.612883] kasan_check_range+0x100/0x1a8 [ 22.613213] __kasan_check_write+0x20/0x30 [ 22.613557] kasan_atomics_helper+0xa6c/0x4858 [ 22.613633] kasan_atomics+0x198/0x2e0 [ 22.613757] kunit_try_run_case+0x170/0x3f0 [ 22.613879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.614018] kthread+0x328/0x630 [ 22.614080] ret_from_fork+0x10/0x20 [ 22.614427] [ 22.614460] Allocated by task 274: [ 22.614511] kasan_save_stack+0x3c/0x68 [ 22.614624] kasan_save_track+0x20/0x40 [ 22.614712] kasan_save_alloc_info+0x40/0x58 [ 22.614767] __kasan_kmalloc+0xd4/0xd8 [ 22.614979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.615194] kasan_atomics+0xb8/0x2e0 [ 22.615253] kunit_try_run_case+0x170/0x3f0 [ 22.615377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.615442] kthread+0x328/0x630 [ 22.615769] ret_from_fork+0x10/0x20 [ 22.615862] [ 22.615905] The buggy address belongs to the object at fff00000c63bc080 [ 22.615905] which belongs to the cache kmalloc-64 of size 64 [ 22.615977] The buggy address is located 0 bytes to the right of [ 22.615977] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.616597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.616661] page_type: f5(slab) [ 22.616726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.616970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.617180] page dumped because: kasan: bad access detected [ 22.617236] [ 22.618230] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.620681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.623978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.624337] page_type: f5(slab) [ 22.624426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.624489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.624540] page dumped because: kasan: bad access detected [ 22.624593] [ 22.624643] Memory state around the buggy address: [ 22.624687] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.624741] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.625246] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.626359] [ 22.626510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.627720] __asan_report_load4_noabort+0x20/0x30 [ 22.628989] __kasan_kmalloc+0xd4/0xd8 [ 22.629580] [ 22.629764] page_type: f5(slab) [ 22.629858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.630256] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.631602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 22.632621] Call trace: [ 22.634498] kthread+0x328/0x630 [ 22.636171] The buggy address belongs to the object at fff00000c63bc080 [ 22.636171] which belongs to the cache kmalloc-64 of size 64 [ 22.637790] ^ [ 22.639848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.641000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.641973] kthread+0x328/0x630 [ 22.642552] page_type: f5(slab) [ 22.642608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.642926] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.643119] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.643756] [ 22.644006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.644388] kasan_report+0xdc/0x128 [ 22.644960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.645925] ret_from_fork+0x10/0x20 [ 22.646393] page_type: f5(slab) [ 22.646439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.646499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.646801] ^ [ 22.647669] ================================================================== [ 22.881792] ================================================================== [ 22.882008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.882217] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.882327] [ 22.882540] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.882691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.882767] Hardware name: linux,dummy-virt (DT) [ 22.882915] Call trace: [ 22.882949] show_stack+0x20/0x38 (C) [ 22.883010] dump_stack_lvl+0x8c/0xd0 [ 22.883142] print_report+0x118/0x608 [ 22.883411] kasan_report+0xdc/0x128 [ 22.883555] kasan_check_range+0x100/0x1a8 [ 22.883638] __kasan_check_write+0x20/0x30 [ 22.883807] kasan_atomics_helper+0x175c/0x4858 [ 22.883880] kasan_atomics+0x198/0x2e0 [ 22.883994] kunit_try_run_case+0x170/0x3f0 [ 22.884154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.884265] kthread+0x328/0x630 [ 22.884313] ret_from_fork+0x10/0x20 [ 22.884369] [ 22.884396] Allocated by task 274: [ 22.884432] kasan_save_stack+0x3c/0x68 [ 22.884483] kasan_save_track+0x20/0x40 [ 22.884528] kasan_save_alloc_info+0x40/0x58 [ 22.884571] __kasan_kmalloc+0xd4/0xd8 [ 22.884612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.884658] kasan_atomics+0xb8/0x2e0 [ 22.884698] kunit_try_run_case+0x170/0x3f0 [ 22.884983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.885050] kthread+0x328/0x630 [ 22.885091] ret_from_fork+0x10/0x20 [ 22.885182] [ 22.885209] The buggy address belongs to the object at fff00000c63bc080 [ 22.885209] which belongs to the cache kmalloc-64 of size 64 [ 22.885275] The buggy address is located 0 bytes to the right of [ 22.885275] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.885346] [ 22.885374] The buggy address belongs to the physical page: [ 22.885411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.885470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.885592] page_type: f5(slab) [ 22.885645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.885861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.886161] page dumped because: kasan: bad access detected [ 22.886220] [ 22.886557] Memory state around the buggy address: [ 22.886625] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.886683] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.886737] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.886860] ^ [ 22.887059] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.887225] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.887278] ================================================================== [ 22.666756] ================================================================== [ 22.666847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 22.666928] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.666995] [ 22.667042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.667149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.667188] Hardware name: linux,dummy-virt (DT) [ 22.667232] Call trace: [ 22.667265] show_stack+0x20/0x38 (C) [ 22.667327] dump_stack_lvl+0x8c/0xd0 [ 22.667388] print_report+0x118/0x608 [ 22.667448] kasan_report+0xdc/0x128 [ 22.667508] __asan_report_load4_noabort+0x20/0x30 [ 22.667566] kasan_atomics_helper+0x3dd8/0x4858 [ 22.667625] kasan_atomics+0x198/0x2e0 [ 22.667677] kunit_try_run_case+0x170/0x3f0 [ 22.667735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.670692] kthread+0x328/0x630 [ 22.671646] ret_from_fork+0x10/0x20 [ 22.672493] [ 22.672573] Allocated by task 274: [ 22.673092] kasan_save_stack+0x3c/0x68 [ 22.673282] kasan_save_track+0x20/0x40 [ 22.673413] kasan_save_alloc_info+0x40/0x58 [ 22.673462] __kasan_kmalloc+0xd4/0xd8 [ 22.673507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.673554] kasan_atomics+0xb8/0x2e0 [ 22.674341] kunit_try_run_case+0x170/0x3f0 [ 22.674612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.674682] kthread+0x328/0x630 [ 22.675112] ret_from_fork+0x10/0x20 [ 22.675244] [ 22.675275] The buggy address belongs to the object at fff00000c63bc080 [ 22.675275] which belongs to the cache kmalloc-64 of size 64 [ 22.675345] The buggy address is located 0 bytes to the right of [ 22.675345] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.675422] [ 22.675450] The buggy address belongs to the physical page: [ 22.675488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.675558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.675617] page_type: f5(slab) [ 22.675666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.675727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.675776] page dumped because: kasan: bad access detected [ 22.675817] [ 22.677058] Memory state around the buggy address: [ 22.677486] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.677669] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.678042] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.678498] ^ [ 22.678871] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.678939] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.678993] ================================================================== [ 22.774812] ================================================================== [ 22.774901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.774971] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.775033] [ 22.775230] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.775377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.775418] Hardware name: linux,dummy-virt (DT) [ 22.775459] Call trace: [ 22.775491] show_stack+0x20/0x38 (C) [ 22.775557] dump_stack_lvl+0x8c/0xd0 [ 22.775612] print_report+0x118/0x608 [ 22.775669] kasan_report+0xdc/0x128 [ 22.775722] kasan_check_range+0x100/0x1a8 [ 22.775780] __kasan_check_write+0x20/0x30 [ 22.775831] kasan_atomics_helper+0x1128/0x4858 [ 22.775901] kasan_atomics+0x198/0x2e0 [ 22.775956] kunit_try_run_case+0x170/0x3f0 [ 22.776012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.776074] kthread+0x328/0x630 [ 22.776122] ret_from_fork+0x10/0x20 [ 22.776181] [ 22.776209] Allocated by task 274: [ 22.776247] kasan_save_stack+0x3c/0x68 [ 22.776300] kasan_save_track+0x20/0x40 [ 22.776345] kasan_save_alloc_info+0x40/0x58 [ 22.776391] __kasan_kmalloc+0xd4/0xd8 [ 22.776437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.776484] kasan_atomics+0xb8/0x2e0 [ 22.776527] kunit_try_run_case+0x170/0x3f0 [ 22.776572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.776624] kthread+0x328/0x630 [ 22.776664] ret_from_fork+0x10/0x20 [ 22.776706] [ 22.776731] The buggy address belongs to the object at fff00000c63bc080 [ 22.776731] which belongs to the cache kmalloc-64 of size 64 [ 22.776796] The buggy address is located 0 bytes to the right of [ 22.776796] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.777511] [ 22.777599] The buggy address belongs to the physical page: [ 22.777644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.777709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.777764] page_type: f5(slab) [ 22.777823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.777903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.777961] page dumped because: kasan: bad access detected [ 22.778004] [ 22.778032] Memory state around the buggy address: [ 22.778074] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.778204] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.778433] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.778488] ^ [ 22.778826] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.778899] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.779091] ================================================================== [ 22.769697] ================================================================== [ 22.769772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.769901] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.769967] [ 22.770010] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.770107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.770139] Hardware name: linux,dummy-virt (DT) [ 22.770177] Call trace: [ 22.770206] show_stack+0x20/0x38 (C) [ 22.770260] dump_stack_lvl+0x8c/0xd0 [ 22.770317] print_report+0x118/0x608 [ 22.770368] kasan_report+0xdc/0x128 [ 22.770417] kasan_check_range+0x100/0x1a8 [ 22.770471] __kasan_check_write+0x20/0x30 [ 22.770522] kasan_atomics_helper+0x10c0/0x4858 [ 22.770577] kasan_atomics+0x198/0x2e0 [ 22.770627] kunit_try_run_case+0x170/0x3f0 [ 22.770682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.770740] kthread+0x328/0x630 [ 22.770788] ret_from_fork+0x10/0x20 [ 22.770852] [ 22.770879] Allocated by task 274: [ 22.770914] kasan_save_stack+0x3c/0x68 [ 22.770966] kasan_save_track+0x20/0x40 [ 22.771013] kasan_save_alloc_info+0x40/0x58 [ 22.771056] __kasan_kmalloc+0xd4/0xd8 [ 22.771097] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.771144] kasan_atomics+0xb8/0x2e0 [ 22.771186] kunit_try_run_case+0x170/0x3f0 [ 22.771450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.771719] kthread+0x328/0x630 [ 22.772145] ret_from_fork+0x10/0x20 [ 22.772202] [ 22.772229] The buggy address belongs to the object at fff00000c63bc080 [ 22.772229] which belongs to the cache kmalloc-64 of size 64 [ 22.772304] The buggy address is located 0 bytes to the right of [ 22.772304] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.772511] [ 22.772539] The buggy address belongs to the physical page: [ 22.772578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.772644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.772703] page_type: f5(slab) [ 22.772747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.772983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.773190] page dumped because: kasan: bad access detected [ 22.773311] [ 22.773339] Memory state around the buggy address: [ 22.773384] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773437] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.773486] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.773534] ^ [ 22.773576] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773626] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773858] ================================================================== [ 22.799628] ================================================================== [ 22.799772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.799856] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.799919] [ 22.799961] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.800162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.800198] Hardware name: linux,dummy-virt (DT) [ 22.800241] Call trace: [ 22.800270] show_stack+0x20/0x38 (C) [ 22.800328] dump_stack_lvl+0x8c/0xd0 [ 22.800461] print_report+0x118/0x608 [ 22.800528] kasan_report+0xdc/0x128 [ 22.800583] kasan_check_range+0x100/0x1a8 [ 22.800636] __kasan_check_write+0x20/0x30 [ 22.800688] kasan_atomics_helper+0x12d8/0x4858 [ 22.800744] kasan_atomics+0x198/0x2e0 [ 22.801313] kunit_try_run_case+0x170/0x3f0 [ 22.801407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.801472] kthread+0x328/0x630 [ 22.801522] ret_from_fork+0x10/0x20 [ 22.801746] [ 22.801779] Allocated by task 274: [ 22.801849] kasan_save_stack+0x3c/0x68 [ 22.802356] kasan_save_track+0x20/0x40 [ 22.802606] kasan_save_alloc_info+0x40/0x58 [ 22.802693] __kasan_kmalloc+0xd4/0xd8 [ 22.802899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.802961] kasan_atomics+0xb8/0x2e0 [ 22.803009] kunit_try_run_case+0x170/0x3f0 [ 22.803058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.803387] kthread+0x328/0x630 [ 22.803802] ret_from_fork+0x10/0x20 [ 22.803903] [ 22.804031] The buggy address belongs to the object at fff00000c63bc080 [ 22.804031] which belongs to the cache kmalloc-64 of size 64 [ 22.804327] The buggy address is located 0 bytes to the right of [ 22.804327] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.804598] [ 22.804632] The buggy address belongs to the physical page: [ 22.804681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.804742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.805005] page_type: f5(slab) [ 22.805091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.805162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.805381] page dumped because: kasan: bad access detected [ 22.805429] [ 22.805465] Memory state around the buggy address: [ 22.805702] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.805786] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.806121] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.806299] ^ [ 22.806368] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806620] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806692] ================================================================== [ 22.832226] ================================================================== [ 22.832317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.832434] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.832540] [ 22.832594] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.832860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.832944] Hardware name: linux,dummy-virt (DT) [ 22.832985] Call trace: [ 22.833020] show_stack+0x20/0x38 (C) [ 22.833086] dump_stack_lvl+0x8c/0xd0 [ 22.833147] print_report+0x118/0x608 [ 22.833206] kasan_report+0xdc/0x128 [ 22.833262] kasan_check_range+0x100/0x1a8 [ 22.833336] __kasan_check_write+0x20/0x30 [ 22.833403] kasan_atomics_helper+0x14e4/0x4858 [ 22.833511] kasan_atomics+0x198/0x2e0 [ 22.833611] kunit_try_run_case+0x170/0x3f0 [ 22.833670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.833735] kthread+0x328/0x630 [ 22.833787] ret_from_fork+0x10/0x20 [ 22.833875] [ 22.833908] Allocated by task 274: [ 22.833947] kasan_save_stack+0x3c/0x68 [ 22.834006] kasan_save_track+0x20/0x40 [ 22.834057] kasan_save_alloc_info+0x40/0x58 [ 22.834115] __kasan_kmalloc+0xd4/0xd8 [ 22.834197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.834248] kasan_atomics+0xb8/0x2e0 [ 22.834295] kunit_try_run_case+0x170/0x3f0 [ 22.834344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.834409] kthread+0x328/0x630 [ 22.834476] ret_from_fork+0x10/0x20 [ 22.834523] [ 22.834551] The buggy address belongs to the object at fff00000c63bc080 [ 22.834551] which belongs to the cache kmalloc-64 of size 64 [ 22.834692] The buggy address is located 0 bytes to the right of [ 22.834692] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.834823] [ 22.834866] The buggy address belongs to the physical page: [ 22.834912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.834976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.835038] page_type: f5(slab) [ 22.835089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.835154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.835206] page dumped because: kasan: bad access detected [ 22.835516] [ 22.835577] Memory state around the buggy address: [ 22.835817] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.835893] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835953] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.836004] ^ [ 22.836052] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.836108] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.836157] ================================================================== [ 22.855638] ================================================================== [ 22.855706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.855776] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.856081] [ 22.856138] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.856252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.856288] Hardware name: linux,dummy-virt (DT) [ 22.856331] Call trace: [ 22.856362] show_stack+0x20/0x38 (C) [ 22.856656] dump_stack_lvl+0x8c/0xd0 [ 22.856734] print_report+0x118/0x608 [ 22.857036] kasan_report+0xdc/0x128 [ 22.857129] kasan_check_range+0x100/0x1a8 [ 22.857204] __kasan_check_write+0x20/0x30 [ 22.857262] kasan_atomics_helper+0x1644/0x4858 [ 22.857321] kasan_atomics+0x198/0x2e0 [ 22.857375] kunit_try_run_case+0x170/0x3f0 [ 22.857433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.857494] kthread+0x328/0x630 [ 22.857544] ret_from_fork+0x10/0x20 [ 22.857601] [ 22.857630] Allocated by task 274: [ 22.858075] kasan_save_stack+0x3c/0x68 [ 22.858341] kasan_save_track+0x20/0x40 [ 22.858973] kasan_save_alloc_info+0x40/0x58 [ 22.859354] __kasan_kmalloc+0xd4/0xd8 [ 22.859777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.859968] kasan_atomics+0xb8/0x2e0 [ 22.860026] kunit_try_run_case+0x170/0x3f0 [ 22.860586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.860667] kthread+0x328/0x630 [ 22.860711] ret_from_fork+0x10/0x20 [ 22.860756] [ 22.861040] The buggy address belongs to the object at fff00000c63bc080 [ 22.861040] which belongs to the cache kmalloc-64 of size 64 [ 22.861213] The buggy address is located 0 bytes to the right of [ 22.861213] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.861526] [ 22.861565] The buggy address belongs to the physical page: [ 22.861607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.861701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.861775] page_type: f5(slab) [ 22.861937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.862016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.862253] page dumped because: kasan: bad access detected [ 22.862299] [ 22.862326] Memory state around the buggy address: [ 22.862378] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862436] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.862489] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.862537] ^ [ 22.862578] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862632] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862679] ================================================================== [ 22.812132] ================================================================== [ 22.812229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.812319] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.812398] [ 22.812478] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.812607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.812643] Hardware name: linux,dummy-virt (DT) [ 22.812681] Call trace: [ 22.812712] show_stack+0x20/0x38 (C) [ 22.812769] dump_stack_lvl+0x8c/0xd0 [ 22.812823] print_report+0x118/0x608 [ 22.812894] kasan_report+0xdc/0x128 [ 22.812951] __asan_report_load8_noabort+0x20/0x30 [ 22.813009] kasan_atomics_helper+0x3f04/0x4858 [ 22.813066] kasan_atomics+0x198/0x2e0 [ 22.813117] kunit_try_run_case+0x170/0x3f0 [ 22.813174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.813238] kthread+0x328/0x630 [ 22.813290] ret_from_fork+0x10/0x20 [ 22.813357] [ 22.813412] Allocated by task 274: [ 22.813477] kasan_save_stack+0x3c/0x68 [ 22.813566] kasan_save_track+0x20/0x40 [ 22.813653] kasan_save_alloc_info+0x40/0x58 [ 22.813736] __kasan_kmalloc+0xd4/0xd8 [ 22.813822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.813945] kasan_atomics+0xb8/0x2e0 [ 22.814176] kunit_try_run_case+0x170/0x3f0 [ 22.814455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.814529] kthread+0x328/0x630 [ 22.814574] ret_from_fork+0x10/0x20 [ 22.814633] [ 22.814680] The buggy address belongs to the object at fff00000c63bc080 [ 22.814680] which belongs to the cache kmalloc-64 of size 64 [ 22.814757] The buggy address is located 0 bytes to the right of [ 22.814757] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.814922] [ 22.814956] The buggy address belongs to the physical page: [ 22.815018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.815139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.815198] page_type: f5(slab) [ 22.815251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.815311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.815444] page dumped because: kasan: bad access detected [ 22.815491] [ 22.815526] Memory state around the buggy address: [ 22.815602] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.815661] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.815715] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.815774] ^ [ 22.815856] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.815914] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.815962] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 22.356518] ================================================================== [ 22.357911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.358556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.358597] Hardware name: linux,dummy-virt (DT) [ 22.358641] Call trace: [ 22.358674] show_stack+0x20/0x38 (C) [ 22.358742] dump_stack_lvl+0x8c/0xd0 [ 22.359424] __kasan_check_write+0x20/0x30 [ 22.360558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.360631] kthread+0x328/0x630 [ 22.360688] ret_from_fork+0x10/0x20 [ 22.360753] [ 22.361071] Allocated by task 270: [ 22.361141] kasan_save_stack+0x3c/0x68 [ 22.361213] kasan_save_track+0x20/0x40 [ 22.361514] kasan_bitops_generic+0xa0/0x1c8 [ 22.361981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.362085] kthread+0x328/0x630 [ 22.362544] [ 22.362925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.362992] page_type: f5(slab) [ 22.363049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.363219] [ 22.364034] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.364145] ================================================================== [ 22.303351] ================================================================== [ 22.303594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.303844] Write of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.304132] [ 22.304352] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.304615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.304654] Hardware name: linux,dummy-virt (DT) [ 22.304965] Call trace: [ 22.305029] show_stack+0x20/0x38 (C) [ 22.305106] dump_stack_lvl+0x8c/0xd0 [ 22.305168] print_report+0x118/0x608 [ 22.305224] kasan_report+0xdc/0x128 [ 22.305413] kasan_check_range+0x100/0x1a8 [ 22.305618] __kasan_check_write+0x20/0x30 [ 22.305733] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.305847] kasan_bitops_generic+0x110/0x1c8 [ 22.305913] kunit_try_run_case+0x170/0x3f0 [ 22.306030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.306123] kthread+0x328/0x630 [ 22.306645] ret_from_fork+0x10/0x20 [ 22.306850] [ 22.306887] Allocated by task 270: [ 22.306931] kasan_save_stack+0x3c/0x68 [ 22.307050] kasan_save_track+0x20/0x40 [ 22.307105] kasan_save_alloc_info+0x40/0x58 [ 22.307540] __kasan_kmalloc+0xd4/0xd8 [ 22.307623] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.307745] kasan_bitops_generic+0xa0/0x1c8 [ 22.308074] kunit_try_run_case+0x170/0x3f0 [ 22.308161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.308347] kthread+0x328/0x630 [ 22.308392] ret_from_fork+0x10/0x20 [ 22.308656] [ 22.308740] The buggy address belongs to the object at fff00000c63971e0 [ 22.308740] which belongs to the cache kmalloc-16 of size 16 [ 22.308818] The buggy address is located 8 bytes inside of [ 22.308818] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.308900] [ 22.308929] The buggy address belongs to the physical page: [ 22.309040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.309114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.309301] page_type: f5(slab) [ 22.309357] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.309614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.309848] page dumped because: kasan: bad access detected [ 22.309899] [ 22.309986] Memory state around the buggy address: [ 22.310145] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.310209] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.310278] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.310332] ^ [ 22.310385] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.310437] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.310485] ================================================================== [ 22.325783] ================================================================== [ 22.325886] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.325969] Read of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.326037] [ 22.326086] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.326197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.326237] Hardware name: linux,dummy-virt (DT) [ 22.326279] Call trace: [ 22.326314] show_stack+0x20/0x38 (C) [ 22.326413] dump_stack_lvl+0x8c/0xd0 [ 22.326531] print_report+0x118/0x608 [ 22.326613] kasan_report+0xdc/0x128 [ 22.326776] __asan_report_load8_noabort+0x20/0x30 [ 22.326913] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.326988] kasan_bitops_generic+0x110/0x1c8 [ 22.327056] kunit_try_run_case+0x170/0x3f0 [ 22.327118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.327188] kthread+0x328/0x630 [ 22.327243] ret_from_fork+0x10/0x20 [ 22.327309] [ 22.327372] Allocated by task 270: [ 22.327429] kasan_save_stack+0x3c/0x68 [ 22.327492] kasan_save_track+0x20/0x40 [ 22.327545] kasan_save_alloc_info+0x40/0x58 [ 22.327595] __kasan_kmalloc+0xd4/0xd8 [ 22.327644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.327696] kasan_bitops_generic+0xa0/0x1c8 [ 22.327745] kunit_try_run_case+0x170/0x3f0 [ 22.327796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.327863] kthread+0x328/0x630 [ 22.327910] ret_from_fork+0x10/0x20 [ 22.327958] [ 22.327987] The buggy address belongs to the object at fff00000c63971e0 [ 22.327987] which belongs to the cache kmalloc-16 of size 16 [ 22.328060] The buggy address is located 8 bytes inside of [ 22.328060] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.328136] [ 22.328164] The buggy address belongs to the physical page: [ 22.328205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.328272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.328336] page_type: f5(slab) [ 22.328390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.329428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.329625] page dumped because: kasan: bad access detected [ 22.329690] [ 22.329719] Memory state around the buggy address: [ 22.329782] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.329876] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.330034] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.330218] ^ [ 22.331331] ================================================================== [ 22.318263] ================================================================== [ 22.318550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 22.318649] Write of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.318896] [ 22.319008] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.319314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.319491] Hardware name: linux,dummy-virt (DT) [ 22.319549] Call trace: [ 22.319685] show_stack+0x20/0x38 (C) [ 22.319758] dump_stack_lvl+0x8c/0xd0 [ 22.319825] print_report+0x118/0x608 [ 22.319899] kasan_report+0xdc/0x128 [ 22.319959] kasan_check_range+0x100/0x1a8 [ 22.320020] __kasan_check_write+0x20/0x30 [ 22.320076] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 22.320141] kasan_bitops_generic+0x110/0x1c8 [ 22.320202] kunit_try_run_case+0x170/0x3f0 [ 22.320260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.320325] kthread+0x328/0x630 [ 22.320379] ret_from_fork+0x10/0x20 [ 22.320439] [ 22.320471] Allocated by task 270: [ 22.320512] kasan_save_stack+0x3c/0x68 [ 22.320569] kasan_save_track+0x20/0x40 [ 22.320621] kasan_save_alloc_info+0x40/0x58 [ 22.320671] __kasan_kmalloc+0xd4/0xd8 [ 22.320720] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.320771] kasan_bitops_generic+0xa0/0x1c8 [ 22.321188] kunit_try_run_case+0x170/0x3f0 [ 22.321248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.321437] kthread+0x328/0x630 [ 22.321491] ret_from_fork+0x10/0x20 [ 22.321682] [ 22.321722] The buggy address belongs to the object at fff00000c63971e0 [ 22.321722] which belongs to the cache kmalloc-16 of size 16 [ 22.321805] The buggy address is located 8 bytes inside of [ 22.321805] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.321928] [ 22.321978] The buggy address belongs to the physical page: [ 22.322025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.322550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.322653] page_type: f5(slab) [ 22.322723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.323056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.323401] page dumped because: kasan: bad access detected [ 22.323500] [ 22.323531] Memory state around the buggy address: [ 22.323584] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.323658] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.323717] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.323771] ^ [ 22.324206] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324298] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324413] ================================================================== [ 22.313776] ================================================================== [ 22.313879] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 22.313966] Read of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.314032] [ 22.314083] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.314195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.314230] Hardware name: linux,dummy-virt (DT) [ 22.314273] Call trace: [ 22.314305] show_stack+0x20/0x38 (C) [ 22.314370] dump_stack_lvl+0x8c/0xd0 [ 22.314431] print_report+0x118/0x608 [ 22.314489] kasan_report+0xdc/0x128 [ 22.314549] __asan_report_load8_noabort+0x20/0x30 [ 22.314610] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 22.314673] kasan_bitops_generic+0x110/0x1c8 [ 22.314734] kunit_try_run_case+0x170/0x3f0 [ 22.314795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.314873] kthread+0x328/0x630 [ 22.314931] ret_from_fork+0x10/0x20 [ 22.314994] [ 22.315023] Allocated by task 270: [ 22.315063] kasan_save_stack+0x3c/0x68 [ 22.315118] kasan_save_track+0x20/0x40 [ 22.315168] kasan_save_alloc_info+0x40/0x58 [ 22.315216] __kasan_kmalloc+0xd4/0xd8 [ 22.315265] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.315316] kasan_bitops_generic+0xa0/0x1c8 [ 22.315366] kunit_try_run_case+0x170/0x3f0 [ 22.315414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.315467] kthread+0x328/0x630 [ 22.315510] ret_from_fork+0x10/0x20 [ 22.315557] [ 22.315584] The buggy address belongs to the object at fff00000c63971e0 [ 22.315584] which belongs to the cache kmalloc-16 of size 16 [ 22.315657] The buggy address is located 8 bytes inside of [ 22.315657] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.315730] [ 22.315758] The buggy address belongs to the physical page: [ 22.315802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.316302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.316376] page_type: f5(slab) [ 22.316477] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.316627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.316679] page dumped because: kasan: bad access detected [ 22.316872] [ 22.316919] Memory state around the buggy address: [ 22.316974] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.317169] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.317294] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.317376] ^ [ 22.317449] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.317511] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.317563] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 24.704599] ================================================================== [ 24.704823] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 24.704823] [ 24.705050] Invalid free of 0x000000001ebf7f92 (in kfence-#129): [ 24.705158] test_double_free+0x100/0x238 [ 24.705256] kunit_try_run_case+0x170/0x3f0 [ 24.705350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.705456] kthread+0x328/0x630 [ 24.705551] ret_from_fork+0x10/0x20 [ 24.705649] [ 24.705730] kfence-#129: 0x000000001ebf7f92-0x000000008e97aa79, size=32, cache=test [ 24.705730] [ 24.705900] allocated by task 314 on cpu 0 at 24.703849s (0.002043s ago): [ 24.706098] test_alloc+0x230/0x628 [ 24.706235] test_double_free+0xd4/0x238 [ 24.706337] kunit_try_run_case+0x170/0x3f0 [ 24.706467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.706585] kthread+0x328/0x630 [ 24.706687] ret_from_fork+0x10/0x20 [ 24.706820] [ 24.707162] freed by task 314 on cpu 0 at 24.704241s (0.002909s ago): [ 24.707452] test_double_free+0xf0/0x238 [ 24.707860] kunit_try_run_case+0x170/0x3f0 [ 24.708061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.708176] kthread+0x328/0x630 [ 24.708341] ret_from_fork+0x10/0x20 [ 24.708460] [ 24.708645] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.708885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.708929] Hardware name: linux,dummy-virt (DT) [ 24.708973] ================================================================== [ 24.604831] ================================================================== [ 24.605164] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 24.605164] [ 24.605335] Invalid free of 0x00000000695655a6 (in kfence-#128): [ 24.605470] test_double_free+0x1bc/0x238 [ 24.606163] kunit_try_run_case+0x170/0x3f0 [ 24.606442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.606657] kthread+0x328/0x630 [ 24.606824] ret_from_fork+0x10/0x20 [ 24.607428] [ 24.607514] kfence-#128: 0x00000000695655a6-0x00000000207fc1e4, size=32, cache=kmalloc-32 [ 24.607514] [ 24.607855] allocated by task 312 on cpu 0 at 24.600437s (0.007315s ago): [ 24.608288] test_alloc+0x29c/0x628 [ 24.609689] test_double_free+0xd4/0x238 [ 24.609996] kunit_try_run_case+0x170/0x3f0 [ 24.610158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.610276] kthread+0x328/0x630 [ 24.610950] ret_from_fork+0x10/0x20 [ 24.611444] [ 24.611523] freed by task 312 on cpu 0 at 24.603058s (0.008455s ago): [ 24.611815] test_double_free+0x1ac/0x238 [ 24.612336] kunit_try_run_case+0x170/0x3f0 [ 24.612467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.612580] kthread+0x328/0x630 [ 24.612855] ret_from_fork+0x10/0x20 [ 24.613355] [ 24.613544] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.613902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.614313] Hardware name: linux,dummy-virt (DT) [ 24.614500] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 24.286530] ================================================================== [ 24.286685] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 24.286685] [ 24.286881] Use-after-free read at 0x0000000094f13ee0 (in kfence-#125): [ 24.287003] test_use_after_free_read+0x114/0x248 [ 24.287113] kunit_try_run_case+0x170/0x3f0 [ 24.287217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.287325] kthread+0x328/0x630 [ 24.287421] ret_from_fork+0x10/0x20 [ 24.287511] [ 24.287570] kfence-#125: 0x0000000094f13ee0-0x00000000c80bc3a1, size=32, cache=test [ 24.287570] [ 24.287693] allocated by task 306 on cpu 0 at 24.285970s (0.001715s ago): [ 24.287852] test_alloc+0x230/0x628 [ 24.287956] test_use_after_free_read+0xd0/0x248 [ 24.288055] kunit_try_run_case+0x170/0x3f0 [ 24.288154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.288265] kthread+0x328/0x630 [ 24.288352] ret_from_fork+0x10/0x20 [ 24.288435] [ 24.288751] freed by task 306 on cpu 0 at 24.286316s (0.002425s ago): [ 24.289247] test_use_after_free_read+0xf0/0x248 [ 24.289515] kunit_try_run_case+0x170/0x3f0 [ 24.289604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.289734] kthread+0x328/0x630 [ 24.289831] ret_from_fork+0x10/0x20 [ 24.290131] [ 24.290261] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.290479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.290561] Hardware name: linux,dummy-virt (DT) [ 24.290657] ================================================================== [ 24.183967] ================================================================== [ 24.184365] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 24.184365] [ 24.184574] Use-after-free read at 0x0000000003ad17ab (in kfence-#124): [ 24.184691] test_use_after_free_read+0x114/0x248 [ 24.185379] kunit_try_run_case+0x170/0x3f0 [ 24.185917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.186124] kthread+0x328/0x630 [ 24.186287] ret_from_fork+0x10/0x20 [ 24.186407] [ 24.186474] kfence-#124: 0x0000000003ad17ab-0x00000000e7a88a39, size=32, cache=kmalloc-32 [ 24.186474] [ 24.186963] allocated by task 304 on cpu 0 at 24.182958s (0.003992s ago): [ 24.187212] test_alloc+0x29c/0x628 [ 24.187365] test_use_after_free_read+0xd0/0x248 [ 24.187666] kunit_try_run_case+0x170/0x3f0 [ 24.187941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.188242] kthread+0x328/0x630 [ 24.188501] ret_from_fork+0x10/0x20 [ 24.188628] [ 24.189524] freed by task 304 on cpu 0 at 24.183096s (0.005649s ago): [ 24.189876] test_use_after_free_read+0x1c0/0x248 [ 24.190218] kunit_try_run_case+0x170/0x3f0 [ 24.190347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.190472] kthread+0x328/0x630 [ 24.190753] ret_from_fork+0x10/0x20 [ 24.191093] [ 24.191203] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.191396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.191466] Hardware name: linux,dummy-virt (DT) [ 24.191550] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 23.974920] ================================================================== [ 23.975097] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 23.975097] [ 23.975299] Out-of-bounds write at 0x000000006695e6cc (1B left of kfence-#122): [ 23.975438] test_out_of_bounds_write+0x100/0x240 [ 23.975557] kunit_try_run_case+0x170/0x3f0 [ 23.975665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.975775] kthread+0x328/0x630 [ 23.976457] ret_from_fork+0x10/0x20 [ 23.976870] [ 23.976985] kfence-#122: 0x00000000cf10b9d1-0x00000000d129ebab, size=32, cache=kmalloc-32 [ 23.976985] [ 23.977121] allocated by task 300 on cpu 0 at 23.974619s (0.002494s ago): [ 23.977263] test_alloc+0x29c/0x628 [ 23.977350] test_out_of_bounds_write+0xc8/0x240 [ 23.977451] kunit_try_run_case+0x170/0x3f0 [ 23.977548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.977655] kthread+0x328/0x630 [ 23.977748] ret_from_fork+0x10/0x20 [ 23.977890] [ 23.978003] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.978485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.978738] Hardware name: linux,dummy-virt (DT) [ 23.978863] ================================================================== [ 24.078253] ================================================================== [ 24.078416] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 24.078416] [ 24.078609] Out-of-bounds write at 0x00000000c391947e (1B left of kfence-#123): [ 24.078744] test_out_of_bounds_write+0x100/0x240 [ 24.078871] kunit_try_run_case+0x170/0x3f0 [ 24.078971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.079079] kthread+0x328/0x630 [ 24.079540] ret_from_fork+0x10/0x20 [ 24.079701] [ 24.079787] kfence-#123: 0x000000006be936b0-0x0000000055171e5f, size=32, cache=test [ 24.079787] [ 24.079941] allocated by task 302 on cpu 0 at 24.078071s (0.001862s ago): [ 24.080097] test_alloc+0x230/0x628 [ 24.080471] test_out_of_bounds_write+0xc8/0x240 [ 24.080572] kunit_try_run_case+0x170/0x3f0 [ 24.080681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.080854] kthread+0x328/0x630 [ 24.080940] ret_from_fork+0x10/0x20 [ 24.081271] [ 24.081404] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 24.081583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.081691] Hardware name: linux,dummy-virt (DT) [ 24.081790] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 23.456819] ================================================================== [ 23.457284] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 23.457284] [ 23.457708] Out-of-bounds read at 0x00000000f1f2ce27 (1B left of kfence-#117): [ 23.458079] test_out_of_bounds_read+0x114/0x3e0 [ 23.458260] kunit_try_run_case+0x170/0x3f0 [ 23.458486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.458713] kthread+0x328/0x630 [ 23.459311] ret_from_fork+0x10/0x20 [ 23.459486] [ 23.459570] kfence-#117: 0x00000000d9689ed3-0x000000003981d47a, size=32, cache=test [ 23.459570] [ 23.459729] allocated by task 298 on cpu 0 at 23.456401s (0.003317s ago): [ 23.460047] test_alloc+0x230/0x628 [ 23.460151] test_out_of_bounds_read+0xdc/0x3e0 [ 23.460248] kunit_try_run_case+0x170/0x3f0 [ 23.460490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.461179] kthread+0x328/0x630 [ 23.461879] ret_from_fork+0x10/0x20 [ 23.462032] [ 23.462144] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.462354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.462433] Hardware name: linux,dummy-virt (DT) [ 23.462516] ================================================================== [ 23.662709] ================================================================== [ 23.662896] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 23.662896] [ 23.663087] Out-of-bounds read at 0x000000007367968e (32B right of kfence-#119): [ 23.663223] test_out_of_bounds_read+0x1c8/0x3e0 [ 23.663337] kunit_try_run_case+0x170/0x3f0 [ 23.663439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.664226] kthread+0x328/0x630 [ 23.664465] ret_from_fork+0x10/0x20 [ 23.664621] [ 23.664684] kfence-#119: 0x000000008d825099-0x00000000f5b2b1ac, size=32, cache=test [ 23.664684] [ 23.664901] allocated by task 298 on cpu 0 at 23.662356s (0.002529s ago): [ 23.665118] test_alloc+0x230/0x628 [ 23.665255] test_out_of_bounds_read+0x198/0x3e0 [ 23.665377] kunit_try_run_case+0x170/0x3f0 [ 23.665482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.665595] kthread+0x328/0x630 [ 23.665690] ret_from_fork+0x10/0x20 [ 23.665794] [ 23.666137] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.666425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.666553] Hardware name: linux,dummy-virt (DT) [ 23.666648] ================================================================== [ 23.246764] ================================================================== [ 23.247234] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 23.247234] [ 23.247669] Out-of-bounds read at 0x0000000061e957e1 (32B right of kfence-#115): [ 23.247867] test_out_of_bounds_read+0x1c8/0x3e0 [ 23.248000] kunit_try_run_case+0x170/0x3f0 [ 23.248094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.248230] kthread+0x328/0x630 [ 23.248349] ret_from_fork+0x10/0x20 [ 23.248477] [ 23.248553] kfence-#115: 0x00000000ee79e16a-0x0000000086056930, size=32, cache=kmalloc-32 [ 23.248553] [ 23.248712] allocated by task 296 on cpu 0 at 23.246059s (0.002645s ago): [ 23.248900] test_alloc+0x29c/0x628 [ 23.249249] test_out_of_bounds_read+0x198/0x3e0 [ 23.249364] kunit_try_run_case+0x170/0x3f0 [ 23.249448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.249548] kthread+0x328/0x630 [ 23.249888] ret_from_fork+0x10/0x20 [ 23.250056] [ 23.250169] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.250372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.250449] Hardware name: linux,dummy-virt (DT) [ 23.250529] ================================================================== [ 23.146145] ================================================================== [ 23.146413] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 23.146413] [ 23.146874] Out-of-bounds read at 0x00000000dfc949be (1B left of kfence-#114): [ 23.147611] test_out_of_bounds_read+0x114/0x3e0 [ 23.147787] kunit_try_run_case+0x170/0x3f0 [ 23.147956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.148065] kthread+0x328/0x630 [ 23.148157] ret_from_fork+0x10/0x20 [ 23.148256] [ 23.148597] kfence-#114: 0x00000000a9522aec-0x00000000e68fb61e, size=32, cache=kmalloc-32 [ 23.148597] [ 23.149233] allocated by task 296 on cpu 0 at 23.143628s (0.005498s ago): [ 23.150355] test_alloc+0x29c/0x628 [ 23.150723] test_out_of_bounds_read+0xdc/0x3e0 [ 23.150882] kunit_try_run_case+0x170/0x3f0 [ 23.151153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.151481] kthread+0x328/0x630 [ 23.151574] ret_from_fork+0x10/0x20 [ 23.152093] [ 23.152423] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.152742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.153031] Hardware name: linux,dummy-virt (DT) [ 23.153288] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 23.046942] ================================================================== [ 23.047021] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 23.047100] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.047166] [ 23.047210] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.047318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.047358] Hardware name: linux,dummy-virt (DT) [ 23.047398] Call trace: [ 23.047429] show_stack+0x20/0x38 (C) [ 23.047493] dump_stack_lvl+0x8c/0xd0 [ 23.047550] print_report+0x118/0x608 [ 23.047605] kasan_report+0xdc/0x128 [ 23.047657] kasan_check_range+0x100/0x1a8 [ 23.047709] __kasan_check_write+0x20/0x30 [ 23.047761] strncpy_from_user+0x3c/0x2a0 [ 23.047814] copy_user_test_oob+0x5c0/0xec8 [ 23.048502] kunit_try_run_case+0x170/0x3f0 [ 23.048645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.048999] kthread+0x328/0x630 [ 23.049060] ret_from_fork+0x10/0x20 [ 23.049273] [ 23.049303] Allocated by task 294: [ 23.049339] kasan_save_stack+0x3c/0x68 [ 23.049542] kasan_save_track+0x20/0x40 [ 23.049604] kasan_save_alloc_info+0x40/0x58 [ 23.049869] __kasan_kmalloc+0xd4/0xd8 [ 23.049924] __kmalloc_noprof+0x198/0x4c8 [ 23.050297] kunit_kmalloc_array+0x34/0x88 [ 23.050479] copy_user_test_oob+0xac/0xec8 [ 23.050758] kunit_try_run_case+0x170/0x3f0 [ 23.050910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.050975] kthread+0x328/0x630 [ 23.051018] ret_from_fork+0x10/0x20 [ 23.051075] [ 23.051101] The buggy address belongs to the object at fff00000c6587700 [ 23.051101] which belongs to the cache kmalloc-128 of size 128 [ 23.051171] The buggy address is located 0 bytes inside of [ 23.051171] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.051241] [ 23.051269] The buggy address belongs to the physical page: [ 23.051308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.051369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.051427] page_type: f5(slab) [ 23.051738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.051829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.051968] page dumped because: kasan: bad access detected [ 23.052109] [ 23.052149] Memory state around the buggy address: [ 23.052216] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.052380] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.052459] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.052663] ^ [ 23.052859] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.053017] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.053066] ================================================================== [ 23.054527] ================================================================== [ 23.054993] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 23.055075] Write of size 1 at addr fff00000c6587778 by task kunit_try_catch/294 [ 23.055275] [ 23.055364] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.055602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.055812] Hardware name: linux,dummy-virt (DT) [ 23.055999] Call trace: [ 23.056038] show_stack+0x20/0x38 (C) [ 23.056103] dump_stack_lvl+0x8c/0xd0 [ 23.056156] print_report+0x118/0x608 [ 23.056211] kasan_report+0xdc/0x128 [ 23.056262] __asan_report_store1_noabort+0x20/0x30 [ 23.056317] strncpy_from_user+0x270/0x2a0 [ 23.056370] copy_user_test_oob+0x5c0/0xec8 [ 23.056424] kunit_try_run_case+0x170/0x3f0 [ 23.056478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.056535] kthread+0x328/0x630 [ 23.056584] ret_from_fork+0x10/0x20 [ 23.056637] [ 23.056663] Allocated by task 294: [ 23.056701] kasan_save_stack+0x3c/0x68 [ 23.056751] kasan_save_track+0x20/0x40 [ 23.056795] kasan_save_alloc_info+0x40/0x58 [ 23.056891] __kasan_kmalloc+0xd4/0xd8 [ 23.056940] __kmalloc_noprof+0x198/0x4c8 [ 23.057000] kunit_kmalloc_array+0x34/0x88 [ 23.057085] copy_user_test_oob+0xac/0xec8 [ 23.057130] kunit_try_run_case+0x170/0x3f0 [ 23.057189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.057244] kthread+0x328/0x630 [ 23.057281] ret_from_fork+0x10/0x20 [ 23.057324] [ 23.057349] The buggy address belongs to the object at fff00000c6587700 [ 23.057349] which belongs to the cache kmalloc-128 of size 128 [ 23.057416] The buggy address is located 0 bytes to the right of [ 23.057416] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.057484] [ 23.057511] The buggy address belongs to the physical page: [ 23.057551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.057615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.057705] page_type: f5(slab) [ 23.057784] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.057898] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.057955] page dumped because: kasan: bad access detected [ 23.057999] [ 23.058027] Memory state around the buggy address: [ 23.058066] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.058120] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.058170] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.058216] ^ [ 23.058264] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.058371] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.058431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 23.010499] ================================================================== [ 23.010577] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 23.010657] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.010718] [ 23.010765] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.010901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.010938] Hardware name: linux,dummy-virt (DT) [ 23.010979] Call trace: [ 23.011156] show_stack+0x20/0x38 (C) [ 23.011249] dump_stack_lvl+0x8c/0xd0 [ 23.011307] print_report+0x118/0x608 [ 23.011361] kasan_report+0xdc/0x128 [ 23.011415] kasan_check_range+0x100/0x1a8 [ 23.011500] __kasan_check_read+0x20/0x30 [ 23.011574] copy_user_test_oob+0x728/0xec8 [ 23.011631] kunit_try_run_case+0x170/0x3f0 [ 23.011690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.011805] kthread+0x328/0x630 [ 23.011932] ret_from_fork+0x10/0x20 [ 23.011997] [ 23.012022] Allocated by task 294: [ 23.012061] kasan_save_stack+0x3c/0x68 [ 23.012111] kasan_save_track+0x20/0x40 [ 23.012159] kasan_save_alloc_info+0x40/0x58 [ 23.012201] __kasan_kmalloc+0xd4/0xd8 [ 23.012246] __kmalloc_noprof+0x198/0x4c8 [ 23.012290] kunit_kmalloc_array+0x34/0x88 [ 23.012335] copy_user_test_oob+0xac/0xec8 [ 23.012379] kunit_try_run_case+0x170/0x3f0 [ 23.012423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.012475] kthread+0x328/0x630 [ 23.012515] ret_from_fork+0x10/0x20 [ 23.012559] [ 23.012584] The buggy address belongs to the object at fff00000c6587700 [ 23.012584] which belongs to the cache kmalloc-128 of size 128 [ 23.012653] The buggy address is located 0 bytes inside of [ 23.012653] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.012724] [ 23.012753] The buggy address belongs to the physical page: [ 23.012794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.012870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.012959] page_type: f5(slab) [ 23.013009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.013112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.013172] page dumped because: kasan: bad access detected [ 23.013218] [ 23.013245] Memory state around the buggy address: [ 23.013306] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.013365] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013422] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.013472] ^ [ 23.013522] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013576] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013641] ================================================================== [ 22.999532] ================================================================== [ 22.999649] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 22.999754] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 22.999822] [ 23.000225] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.000534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.000573] Hardware name: linux,dummy-virt (DT) [ 23.000980] Call trace: [ 23.001103] show_stack+0x20/0x38 (C) [ 23.001312] dump_stack_lvl+0x8c/0xd0 [ 23.001405] print_report+0x118/0x608 [ 23.001557] kasan_report+0xdc/0x128 [ 23.001633] kasan_check_range+0x100/0x1a8 [ 23.001695] __kasan_check_write+0x20/0x30 [ 23.001814] copy_user_test_oob+0x234/0xec8 [ 23.001887] kunit_try_run_case+0x170/0x3f0 [ 23.001954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.002020] kthread+0x328/0x630 [ 23.002074] ret_from_fork+0x10/0x20 [ 23.002142] [ 23.002170] Allocated by task 294: [ 23.002209] kasan_save_stack+0x3c/0x68 [ 23.002278] kasan_save_track+0x20/0x40 [ 23.002328] kasan_save_alloc_info+0x40/0x58 [ 23.002557] __kasan_kmalloc+0xd4/0xd8 [ 23.002642] __kmalloc_noprof+0x198/0x4c8 [ 23.002693] kunit_kmalloc_array+0x34/0x88 [ 23.002740] copy_user_test_oob+0xac/0xec8 [ 23.002788] kunit_try_run_case+0x170/0x3f0 [ 23.002849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.002906] kthread+0x328/0x630 [ 23.003167] ret_from_fork+0x10/0x20 [ 23.003297] [ 23.003334] The buggy address belongs to the object at fff00000c6587700 [ 23.003334] which belongs to the cache kmalloc-128 of size 128 [ 23.003449] The buggy address is located 0 bytes inside of [ 23.003449] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.003523] [ 23.003553] The buggy address belongs to the physical page: [ 23.003597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.003668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.003731] page_type: f5(slab) [ 23.003787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.003863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.003915] page dumped because: kasan: bad access detected [ 23.003954] [ 23.003980] Memory state around the buggy address: [ 23.004034] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.004089] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.004316] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.004485] ^ [ 23.004638] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.004701] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.004778] ================================================================== [ 23.031851] ================================================================== [ 23.031906] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 23.031965] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.032023] [ 23.032064] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.032163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.032197] Hardware name: linux,dummy-virt (DT) [ 23.032238] Call trace: [ 23.032267] show_stack+0x20/0x38 (C) [ 23.032325] dump_stack_lvl+0x8c/0xd0 [ 23.032376] print_report+0x118/0x608 [ 23.032429] kasan_report+0xdc/0x128 [ 23.032481] kasan_check_range+0x100/0x1a8 [ 23.033050] __kasan_check_write+0x20/0x30 [ 23.033136] copy_user_test_oob+0x434/0xec8 [ 23.033544] kunit_try_run_case+0x170/0x3f0 [ 23.033623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.033886] kthread+0x328/0x630 [ 23.033989] ret_from_fork+0x10/0x20 [ 23.034057] [ 23.034188] Allocated by task 294: [ 23.034307] kasan_save_stack+0x3c/0x68 [ 23.034368] kasan_save_track+0x20/0x40 [ 23.034417] kasan_save_alloc_info+0x40/0x58 [ 23.034465] __kasan_kmalloc+0xd4/0xd8 [ 23.034514] __kmalloc_noprof+0x198/0x4c8 [ 23.034692] kunit_kmalloc_array+0x34/0x88 [ 23.034749] copy_user_test_oob+0xac/0xec8 [ 23.034822] kunit_try_run_case+0x170/0x3f0 [ 23.034938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.035059] kthread+0x328/0x630 [ 23.035153] ret_from_fork+0x10/0x20 [ 23.035212] [ 23.035503] The buggy address belongs to the object at fff00000c6587700 [ 23.035503] which belongs to the cache kmalloc-128 of size 128 [ 23.035587] The buggy address is located 0 bytes inside of [ 23.035587] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.035667] [ 23.035695] The buggy address belongs to the physical page: [ 23.035736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.035796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.035867] page_type: f5(slab) [ 23.035917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.035979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.036039] page dumped because: kasan: bad access detected [ 23.036120] [ 23.036167] Memory state around the buggy address: [ 23.036366] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.036477] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.036697] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.037227] ^ [ 23.037302] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037359] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037405] ================================================================== [ 23.019962] ================================================================== [ 23.020148] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 23.020416] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.020588] [ 23.020770] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.021023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.021065] Hardware name: linux,dummy-virt (DT) [ 23.021247] Call trace: [ 23.021285] show_stack+0x20/0x38 (C) [ 23.021406] dump_stack_lvl+0x8c/0xd0 [ 23.021479] print_report+0x118/0x608 [ 23.021600] kasan_report+0xdc/0x128 [ 23.021667] kasan_check_range+0x100/0x1a8 [ 23.021862] __kasan_check_write+0x20/0x30 [ 23.021925] copy_user_test_oob+0x35c/0xec8 [ 23.022003] kunit_try_run_case+0x170/0x3f0 [ 23.022243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.022447] kthread+0x328/0x630 [ 23.022530] ret_from_fork+0x10/0x20 [ 23.022593] [ 23.022625] Allocated by task 294: [ 23.022880] kasan_save_stack+0x3c/0x68 [ 23.022981] kasan_save_track+0x20/0x40 [ 23.023156] kasan_save_alloc_info+0x40/0x58 [ 23.023210] __kasan_kmalloc+0xd4/0xd8 [ 23.023416] __kmalloc_noprof+0x198/0x4c8 [ 23.023525] kunit_kmalloc_array+0x34/0x88 [ 23.023651] copy_user_test_oob+0xac/0xec8 [ 23.023710] kunit_try_run_case+0x170/0x3f0 [ 23.023759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.023815] kthread+0x328/0x630 [ 23.023866] ret_from_fork+0x10/0x20 [ 23.024265] [ 23.024301] The buggy address belongs to the object at fff00000c6587700 [ 23.024301] which belongs to the cache kmalloc-128 of size 128 [ 23.024534] The buggy address is located 0 bytes inside of [ 23.024534] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.024701] [ 23.025067] The buggy address belongs to the physical page: [ 23.025133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.025370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.025510] page_type: f5(slab) [ 23.025582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.025788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.025911] page dumped because: kasan: bad access detected [ 23.026017] [ 23.026112] Memory state around the buggy address: [ 23.026280] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.026375] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.026433] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.026481] ^ [ 23.026537] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.026592] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.026643] ================================================================== [ 23.038976] ================================================================== [ 23.039053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 23.039122] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.039185] [ 23.039229] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.039334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.039368] Hardware name: linux,dummy-virt (DT) [ 23.039409] Call trace: [ 23.039439] show_stack+0x20/0x38 (C) [ 23.039499] dump_stack_lvl+0x8c/0xd0 [ 23.039882] print_report+0x118/0x608 [ 23.039961] kasan_report+0xdc/0x128 [ 23.040160] kasan_check_range+0x100/0x1a8 [ 23.040223] __kasan_check_read+0x20/0x30 [ 23.040511] copy_user_test_oob+0x4a0/0xec8 [ 23.040739] kunit_try_run_case+0x170/0x3f0 [ 23.040996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.041110] kthread+0x328/0x630 [ 23.041313] ret_from_fork+0x10/0x20 [ 23.041474] [ 23.041511] Allocated by task 294: [ 23.041568] kasan_save_stack+0x3c/0x68 [ 23.041702] kasan_save_track+0x20/0x40 [ 23.041752] kasan_save_alloc_info+0x40/0x58 [ 23.041872] __kasan_kmalloc+0xd4/0xd8 [ 23.042236] __kmalloc_noprof+0x198/0x4c8 [ 23.042310] kunit_kmalloc_array+0x34/0x88 [ 23.042566] copy_user_test_oob+0xac/0xec8 [ 23.042669] kunit_try_run_case+0x170/0x3f0 [ 23.042820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.042897] kthread+0x328/0x630 [ 23.042941] ret_from_fork+0x10/0x20 [ 23.042988] [ 23.043259] The buggy address belongs to the object at fff00000c6587700 [ 23.043259] which belongs to the cache kmalloc-128 of size 128 [ 23.043699] The buggy address is located 0 bytes inside of [ 23.043699] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.043879] [ 23.043913] The buggy address belongs to the physical page: [ 23.043955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.044115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.044230] page_type: f5(slab) [ 23.044304] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.044364] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.044414] page dumped because: kasan: bad access detected [ 23.044595] [ 23.044634] Memory state around the buggy address: [ 23.044865] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.045008] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.045066] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.045115] ^ [ 23.045276] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.045496] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.045548] ================================================================== [ 23.027250] ================================================================== [ 23.027323] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 23.027395] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.027461] [ 23.027505] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.027611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.027647] Hardware name: linux,dummy-virt (DT) [ 23.027685] Call trace: [ 23.027717] show_stack+0x20/0x38 (C) [ 23.027775] dump_stack_lvl+0x8c/0xd0 [ 23.027829] print_report+0x118/0x608 [ 23.028593] kasan_report+0xdc/0x128 [ 23.028802] kasan_check_range+0x100/0x1a8 [ 23.028888] __kasan_check_read+0x20/0x30 [ 23.029019] copy_user_test_oob+0x3c8/0xec8 [ 23.029088] kunit_try_run_case+0x170/0x3f0 [ 23.029156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.029218] kthread+0x328/0x630 [ 23.029269] ret_from_fork+0x10/0x20 [ 23.029584] [ 23.029631] Allocated by task 294: [ 23.029711] kasan_save_stack+0x3c/0x68 [ 23.029778] kasan_save_track+0x20/0x40 [ 23.029852] kasan_save_alloc_info+0x40/0x58 [ 23.029909] __kasan_kmalloc+0xd4/0xd8 [ 23.029956] __kmalloc_noprof+0x198/0x4c8 [ 23.030020] kunit_kmalloc_array+0x34/0x88 [ 23.030109] copy_user_test_oob+0xac/0xec8 [ 23.030197] kunit_try_run_case+0x170/0x3f0 [ 23.030288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.030345] kthread+0x328/0x630 [ 23.030389] ret_from_fork+0x10/0x20 [ 23.030439] [ 23.030469] The buggy address belongs to the object at fff00000c6587700 [ 23.030469] which belongs to the cache kmalloc-128 of size 128 [ 23.030553] The buggy address is located 0 bytes inside of [ 23.030553] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.030692] [ 23.030749] The buggy address belongs to the physical page: [ 23.030847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.030916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.030978] page_type: f5(slab) [ 23.031033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.031096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.031148] page dumped because: kasan: bad access detected [ 23.031187] [ 23.031213] Memory state around the buggy address: [ 23.031254] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.031313] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.031369] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.031419] ^ [ 23.031470] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.031518] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.031565] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 22.959638] ================================================================== [ 22.959727] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 22.959871] Read of size 8 at addr fff00000c6587678 by task kunit_try_catch/290 [ 22.959936] [ 22.960207] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.960415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.960449] Hardware name: linux,dummy-virt (DT) [ 22.960492] Call trace: [ 22.960525] show_stack+0x20/0x38 (C) [ 22.960724] dump_stack_lvl+0x8c/0xd0 [ 22.960852] print_report+0x118/0x608 [ 22.961002] kasan_report+0xdc/0x128 [ 22.961100] __asan_report_load8_noabort+0x20/0x30 [ 22.961156] copy_to_kernel_nofault+0x204/0x250 [ 22.961210] copy_to_kernel_nofault_oob+0x158/0x418 [ 22.961267] kunit_try_run_case+0x170/0x3f0 [ 22.961320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.961376] kthread+0x328/0x630 [ 22.961422] ret_from_fork+0x10/0x20 [ 22.961480] [ 22.961536] Allocated by task 290: [ 22.961574] kasan_save_stack+0x3c/0x68 [ 22.961626] kasan_save_track+0x20/0x40 [ 22.961669] kasan_save_alloc_info+0x40/0x58 [ 22.961995] __kasan_kmalloc+0xd4/0xd8 [ 22.962082] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.962176] copy_to_kernel_nofault_oob+0xc8/0x418 [ 22.962247] kunit_try_run_case+0x170/0x3f0 [ 22.962319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.962370] kthread+0x328/0x630 [ 22.962408] ret_from_fork+0x10/0x20 [ 22.962454] [ 22.962481] The buggy address belongs to the object at fff00000c6587600 [ 22.962481] which belongs to the cache kmalloc-128 of size 128 [ 22.962550] The buggy address is located 0 bytes to the right of [ 22.962550] allocated 120-byte region [fff00000c6587600, fff00000c6587678) [ 22.962623] [ 22.962652] The buggy address belongs to the physical page: [ 22.962696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 22.962760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.962817] page_type: f5(slab) [ 22.962881] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.962942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.963013] page dumped because: kasan: bad access detected [ 22.963083] [ 22.963130] Memory state around the buggy address: [ 22.963218] fff00000c6587500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.963277] fff00000c6587580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.963328] >fff00000c6587600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.963374] ^ [ 22.963452] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.963548] fff00000c6587700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.963596] ================================================================== [ 22.964802] ================================================================== [ 22.965018] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 22.965111] Write of size 8 at addr fff00000c6587678 by task kunit_try_catch/290 [ 22.965173] [ 22.965215] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.965316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.965359] Hardware name: linux,dummy-virt (DT) [ 22.965400] Call trace: [ 22.965582] show_stack+0x20/0x38 (C) [ 22.965718] dump_stack_lvl+0x8c/0xd0 [ 22.965877] print_report+0x118/0x608 [ 22.966041] kasan_report+0xdc/0x128 [ 22.966109] kasan_check_range+0x100/0x1a8 [ 22.966171] __kasan_check_write+0x20/0x30 [ 22.966224] copy_to_kernel_nofault+0x8c/0x250 [ 22.967174] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 22.967272] kunit_try_run_case+0x170/0x3f0 [ 22.967343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.967411] kthread+0x328/0x630 [ 22.967465] ret_from_fork+0x10/0x20 [ 22.968090] [ 22.968472] Allocated by task 290: [ 22.968813] kasan_save_stack+0x3c/0x68 [ 22.968891] kasan_save_track+0x20/0x40 [ 22.968940] kasan_save_alloc_info+0x40/0x58 [ 22.968987] __kasan_kmalloc+0xd4/0xd8 [ 22.969037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.969147] copy_to_kernel_nofault_oob+0xc8/0x418 [ 22.969252] kunit_try_run_case+0x170/0x3f0 [ 22.969335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.969405] kthread+0x328/0x630 [ 22.969497] ret_from_fork+0x10/0x20 [ 22.969562] [ 22.969765] The buggy address belongs to the object at fff00000c6587600 [ 22.969765] which belongs to the cache kmalloc-128 of size 128 [ 22.969868] The buggy address is located 0 bytes to the right of [ 22.969868] allocated 120-byte region [fff00000c6587600, fff00000c6587678) [ 22.969957] [ 22.969989] The buggy address belongs to the physical page: [ 22.970036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 22.970107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.970172] page_type: f5(slab) [ 22.970230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.970298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.970358] page dumped because: kasan: bad access detected [ 22.970404] [ 22.970431] Memory state around the buggy address: [ 22.970476] fff00000c6587500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.970536] fff00000c6587580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.970593] >fff00000c6587600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.970645] ^ [ 22.970739] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.970799] fff00000c6587700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.970855] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 22.919849] ================================================================== [ 22.919921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 22.919991] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/278 [ 22.920051] [ 22.920093] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.920197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.920232] Hardware name: linux,dummy-virt (DT) [ 22.920271] Call trace: [ 22.920301] show_stack+0x20/0x38 (C) [ 22.920359] dump_stack_lvl+0x8c/0xd0 [ 22.920413] print_report+0x310/0x608 [ 22.920467] kasan_report+0xdc/0x128 [ 22.920519] __asan_report_load1_noabort+0x20/0x30 [ 22.920574] vmalloc_oob+0x51c/0x5d0 [ 22.920625] kunit_try_run_case+0x170/0x3f0 [ 22.920678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.920737] kthread+0x328/0x630 [ 22.921432] ret_from_fork+0x10/0x20 [ 22.921563] [ 22.921600] The buggy address belongs to the virtual mapping at [ 22.921600] [ffff8000800fe000, ffff800080100000) created by: [ 22.921600] vmalloc_oob+0x98/0x5d0 [ 22.921781] [ 22.921982] The buggy address belongs to the physical page: [ 22.922034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bd [ 22.922150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.922259] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.922384] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.922549] page dumped because: kasan: bad access detected [ 22.922593] [ 22.922861] Memory state around the buggy address: [ 22.923109] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.923265] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.923322] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 22.923556] ^ [ 22.923741] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.923801] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.924001] ================================================================== [ 22.914647] ================================================================== [ 22.914748] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 22.914828] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/278 [ 22.914915] [ 22.914966] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.915073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.915111] Hardware name: linux,dummy-virt (DT) [ 22.915153] Call trace: [ 22.915189] show_stack+0x20/0x38 (C) [ 22.915251] dump_stack_lvl+0x8c/0xd0 [ 22.915315] print_report+0x310/0x608 [ 22.915373] kasan_report+0xdc/0x128 [ 22.915428] __asan_report_load1_noabort+0x20/0x30 [ 22.915488] vmalloc_oob+0x578/0x5d0 [ 22.915543] kunit_try_run_case+0x170/0x3f0 [ 22.915602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.915668] kthread+0x328/0x630 [ 22.915719] ret_from_fork+0x10/0x20 [ 22.915781] [ 22.915821] The buggy address belongs to the virtual mapping at [ 22.915821] [ffff8000800fe000, ffff800080100000) created by: [ 22.915821] vmalloc_oob+0x98/0x5d0 [ 22.917123] [ 22.917157] The buggy address belongs to the physical page: [ 22.917199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bd [ 22.917308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.917391] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.917454] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.917506] page dumped because: kasan: bad access detected [ 22.917581] [ 22.917649] Memory state around the buggy address: [ 22.917699] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.917916] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.918089] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 22.918227] ^ [ 22.918283] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.918675] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.918896] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 22.289762] ================================================================== [ 22.289887] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 22.290005] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268 [ 22.290077] [ 22.290134] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.290244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.290280] Hardware name: linux,dummy-virt (DT) [ 22.290325] Call trace: [ 22.290359] show_stack+0x20/0x38 (C) [ 22.290426] dump_stack_lvl+0x8c/0xd0 [ 22.290483] print_report+0x118/0x608 [ 22.290543] kasan_report+0xdc/0x128 [ 22.290611] __asan_report_load1_noabort+0x20/0x30 [ 22.290680] strnlen+0x80/0x88 [ 22.290736] kasan_strings+0x478/0xb00 [ 22.290795] kunit_try_run_case+0x170/0x3f0 [ 22.290866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.290935] kthread+0x328/0x630 [ 22.290986] ret_from_fork+0x10/0x20 [ 22.291044] [ 22.291073] Allocated by task 268: [ 22.291109] kasan_save_stack+0x3c/0x68 [ 22.291162] kasan_save_track+0x20/0x40 [ 22.291218] kasan_save_alloc_info+0x40/0x58 [ 22.291282] __kasan_kmalloc+0xd4/0xd8 [ 22.291332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.291383] kasan_strings+0xc8/0xb00 [ 22.291425] kunit_try_run_case+0x170/0x3f0 [ 22.291469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.291520] kthread+0x328/0x630 [ 22.291562] ret_from_fork+0x10/0x20 [ 22.291606] [ 22.291633] Freed by task 268: [ 22.291669] kasan_save_stack+0x3c/0x68 [ 22.291715] kasan_save_track+0x20/0x40 [ 22.291771] kasan_save_free_info+0x4c/0x78 [ 22.291824] __kasan_slab_free+0x6c/0x98 [ 22.291883] kfree+0x214/0x3c8 [ 22.291926] kasan_strings+0x24c/0xb00 [ 22.291969] kunit_try_run_case+0x170/0x3f0 [ 22.292012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.292060] kthread+0x328/0x630 [ 22.292097] ret_from_fork+0x10/0x20 [ 22.292139] [ 22.292164] The buggy address belongs to the object at fff00000c63fb300 [ 22.292164] which belongs to the cache kmalloc-32 of size 32 [ 22.292230] The buggy address is located 16 bytes inside of [ 22.292230] freed 32-byte region [fff00000c63fb300, fff00000c63fb320) [ 22.292297] [ 22.292322] The buggy address belongs to the physical page: [ 22.292361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 22.292424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.292481] page_type: f5(slab) [ 22.292528] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.292586] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.292633] page dumped because: kasan: bad access detected [ 22.292669] [ 22.292692] Memory state around the buggy address: [ 22.292732] fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.292815] fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.292879] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.292928] ^ [ 22.292965] fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.293075] fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.293129] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 22.271344] ================================================================== [ 22.271425] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 22.271507] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268 [ 22.271572] [ 22.271628] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.271738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.271774] Hardware name: linux,dummy-virt (DT) [ 22.271815] Call trace: [ 22.273229] show_stack+0x20/0x38 (C) [ 22.273904] dump_stack_lvl+0x8c/0xd0 [ 22.274378] print_report+0x118/0x608 [ 22.274548] kasan_report+0xdc/0x128 [ 22.275198] __asan_report_load1_noabort+0x20/0x30 [ 22.275267] strlen+0xa8/0xb0 [ 22.275323] kasan_strings+0x418/0xb00 [ 22.275380] kunit_try_run_case+0x170/0x3f0 [ 22.275436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.275499] kthread+0x328/0x630 [ 22.275550] ret_from_fork+0x10/0x20 [ 22.276787] [ 22.276831] Allocated by task 268: [ 22.277288] kasan_save_stack+0x3c/0x68 [ 22.277401] kasan_save_track+0x20/0x40 [ 22.277454] kasan_save_alloc_info+0x40/0x58 [ 22.277497] __kasan_kmalloc+0xd4/0xd8 [ 22.278140] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.278210] kasan_strings+0xc8/0xb00 [ 22.278262] kunit_try_run_case+0x170/0x3f0 [ 22.278314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.278367] kthread+0x328/0x630 [ 22.278411] ret_from_fork+0x10/0x20 [ 22.278461] [ 22.278490] Freed by task 268: [ 22.278527] kasan_save_stack+0x3c/0x68 [ 22.278573] kasan_save_track+0x20/0x40 [ 22.278625] kasan_save_free_info+0x4c/0x78 [ 22.278667] __kasan_slab_free+0x6c/0x98 [ 22.278712] kfree+0x214/0x3c8 [ 22.279606] kasan_strings+0x24c/0xb00 [ 22.280204] kunit_try_run_case+0x170/0x3f0 [ 22.280898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.281237] kthread+0x328/0x630 [ 22.281294] ret_from_fork+0x10/0x20 [ 22.282063] [ 22.282169] The buggy address belongs to the object at fff00000c63fb300 [ 22.282169] which belongs to the cache kmalloc-32 of size 32 [ 22.282252] The buggy address is located 16 bytes inside of [ 22.282252] freed 32-byte region [fff00000c63fb300, fff00000c63fb320) [ 22.282329] [ 22.282359] The buggy address belongs to the physical page: [ 22.282404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 22.282475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.282540] page_type: f5(slab) [ 22.284622] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.284739] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.284796] page dumped because: kasan: bad access detected [ 22.284850] [ 22.285685] Memory state around the buggy address: [ 22.286011] fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.286447] fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.286624] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.286760] ^ [ 22.286804] fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.286874] fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.286925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 22.250763] ================================================================== [ 22.250860] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 22.250941] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268 [ 22.251008] [ 22.251062] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.251176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.251214] Hardware name: linux,dummy-virt (DT) [ 22.251261] Call trace: [ 22.251296] show_stack+0x20/0x38 (C) [ 22.251361] dump_stack_lvl+0x8c/0xd0 [ 22.251422] print_report+0x118/0x608 [ 22.251483] kasan_report+0xdc/0x128 [ 22.252953] __asan_report_load1_noabort+0x20/0x30 [ 22.253813] kasan_strings+0x95c/0xb00 [ 22.254336] kunit_try_run_case+0x170/0x3f0 [ 22.254766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.255451] kthread+0x328/0x630 [ 22.255561] ret_from_fork+0x10/0x20 [ 22.255631] [ 22.255664] Allocated by task 268: [ 22.255704] kasan_save_stack+0x3c/0x68 [ 22.255762] kasan_save_track+0x20/0x40 [ 22.255811] kasan_save_alloc_info+0x40/0x58 [ 22.255873] __kasan_kmalloc+0xd4/0xd8 [ 22.255923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.258010] kasan_strings+0xc8/0xb00 [ 22.258555] kunit_try_run_case+0x170/0x3f0 [ 22.258932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.259334] kthread+0x328/0x630 [ 22.259477] ret_from_fork+0x10/0x20 [ 22.259532] [ 22.259562] Freed by task 268: [ 22.259601] kasan_save_stack+0x3c/0x68 [ 22.259653] kasan_save_track+0x20/0x40 [ 22.259700] kasan_save_free_info+0x4c/0x78 [ 22.260604] __kasan_slab_free+0x6c/0x98 [ 22.260658] kfree+0x214/0x3c8 [ 22.261440] kasan_strings+0x24c/0xb00 [ 22.261846] kunit_try_run_case+0x170/0x3f0 [ 22.261923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.261995] kthread+0x328/0x630 [ 22.262493] ret_from_fork+0x10/0x20 [ 22.262987] [ 22.263090] The buggy address belongs to the object at fff00000c63fb300 [ 22.263090] which belongs to the cache kmalloc-32 of size 32 [ 22.263168] The buggy address is located 16 bytes inside of [ 22.263168] freed 32-byte region [fff00000c63fb300, fff00000c63fb320) [ 22.263670] [ 22.263932] The buggy address belongs to the physical page: [ 22.264673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 22.265129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.265465] page_type: f5(slab) [ 22.265543] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.265623] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.265682] page dumped because: kasan: bad access detected [ 22.266174] [ 22.266344] Memory state around the buggy address: [ 22.266693] fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.266760] fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.266820] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.266889] ^ [ 22.266934] fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.266993] fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.267044] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 22.239131] ================================================================== [ 22.239214] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 22.239459] Read of size 1 at addr fff00000c63fb310 by task kunit_try_catch/268 [ 22.239552] [ 22.239646] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.239768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.239806] Hardware name: linux,dummy-virt (DT) [ 22.239861] Call trace: [ 22.239910] show_stack+0x20/0x38 (C) [ 22.239995] dump_stack_lvl+0x8c/0xd0 [ 22.240064] print_report+0x118/0x608 [ 22.240123] kasan_report+0xdc/0x128 [ 22.240179] __asan_report_load1_noabort+0x20/0x30 [ 22.240239] strcmp+0xc0/0xc8 [ 22.240293] kasan_strings+0x340/0xb00 [ 22.240347] kunit_try_run_case+0x170/0x3f0 [ 22.240411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.240475] kthread+0x328/0x630 [ 22.240528] ret_from_fork+0x10/0x20 [ 22.240590] [ 22.240620] Allocated by task 268: [ 22.240660] kasan_save_stack+0x3c/0x68 [ 22.240716] kasan_save_track+0x20/0x40 [ 22.240768] kasan_save_alloc_info+0x40/0x58 [ 22.240814] __kasan_kmalloc+0xd4/0xd8 [ 22.241111] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.241174] kasan_strings+0xc8/0xb00 [ 22.241447] kunit_try_run_case+0x170/0x3f0 [ 22.241676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.241745] kthread+0x328/0x630 [ 22.241806] ret_from_fork+0x10/0x20 [ 22.241882] [ 22.241912] Freed by task 268: [ 22.241955] kasan_save_stack+0x3c/0x68 [ 22.242006] kasan_save_track+0x20/0x40 [ 22.242058] kasan_save_free_info+0x4c/0x78 [ 22.242104] __kasan_slab_free+0x6c/0x98 [ 22.242157] kfree+0x214/0x3c8 [ 22.242201] kasan_strings+0x24c/0xb00 [ 22.242248] kunit_try_run_case+0x170/0x3f0 [ 22.243488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.243932] kthread+0x328/0x630 [ 22.244462] ret_from_fork+0x10/0x20 [ 22.244748] [ 22.244783] The buggy address belongs to the object at fff00000c63fb300 [ 22.244783] which belongs to the cache kmalloc-32 of size 32 [ 22.244875] The buggy address is located 16 bytes inside of [ 22.244875] freed 32-byte region [fff00000c63fb300, fff00000c63fb320) [ 22.244954] [ 22.244988] The buggy address belongs to the physical page: [ 22.246044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 22.246376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.246451] page_type: f5(slab) [ 22.247185] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.247784] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.248176] page dumped because: kasan: bad access detected [ 22.248368] [ 22.248663] Memory state around the buggy address: [ 22.248935] fff00000c63fb200: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.249004] fff00000c63fb280: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.249064] >fff00000c63fb300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.249168] ^ [ 22.249457] fff00000c63fb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.249643] fff00000c63fb400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.249974] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 22.215674] ================================================================== [ 22.216170] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 22.216293] Read of size 1 at addr fff00000c63fb198 by task kunit_try_catch/266 [ 22.216614] [ 22.216686] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.217070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.217128] Hardware name: linux,dummy-virt (DT) [ 22.217302] Call trace: [ 22.217345] show_stack+0x20/0x38 (C) [ 22.217457] dump_stack_lvl+0x8c/0xd0 [ 22.217678] print_report+0x118/0x608 [ 22.217941] kasan_report+0xdc/0x128 [ 22.218134] __asan_report_load1_noabort+0x20/0x30 [ 22.218215] memcmp+0x198/0x1d8 [ 22.218276] kasan_memcmp+0x16c/0x300 [ 22.218384] kunit_try_run_case+0x170/0x3f0 [ 22.218468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.218714] kthread+0x328/0x630 [ 22.218798] ret_from_fork+0x10/0x20 [ 22.219204] [ 22.219241] Allocated by task 266: [ 22.219427] kasan_save_stack+0x3c/0x68 [ 22.219498] kasan_save_track+0x20/0x40 [ 22.219711] kasan_save_alloc_info+0x40/0x58 [ 22.219896] __kasan_kmalloc+0xd4/0xd8 [ 22.219959] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.220018] kasan_memcmp+0xbc/0x300 [ 22.220063] kunit_try_run_case+0x170/0x3f0 [ 22.220108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.220160] kthread+0x328/0x630 [ 22.220199] ret_from_fork+0x10/0x20 [ 22.220266] [ 22.220299] The buggy address belongs to the object at fff00000c63fb180 [ 22.220299] which belongs to the cache kmalloc-32 of size 32 [ 22.220392] The buggy address is located 0 bytes to the right of [ 22.220392] allocated 24-byte region [fff00000c63fb180, fff00000c63fb198) [ 22.220476] [ 22.220508] The buggy address belongs to the physical page: [ 22.220554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 22.220624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.220693] page_type: f5(slab) [ 22.220750] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.221085] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.221481] page dumped because: kasan: bad access detected [ 22.221556] [ 22.221586] Memory state around the buggy address: [ 22.221873] fff00000c63fb080: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 22.222013] fff00000c63fb100: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.222082] >fff00000c63fb180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.222157] ^ [ 22.222373] fff00000c63fb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.222620] fff00000c63fb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.222844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 22.179242] ================================================================== [ 22.179330] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 22.179415] Read of size 1 at addr ffff800080a47b4a by task kunit_try_catch/262 [ 22.179482] [ 22.179538] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.179651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.179687] Hardware name: linux,dummy-virt (DT) [ 22.179732] Call trace: [ 22.179767] show_stack+0x20/0x38 (C) [ 22.179833] dump_stack_lvl+0x8c/0xd0 [ 22.179947] print_report+0x310/0x608 [ 22.180006] kasan_report+0xdc/0x128 [ 22.180062] __asan_report_load1_noabort+0x20/0x30 [ 22.180120] kasan_alloca_oob_right+0x2dc/0x340 [ 22.180181] kunit_try_run_case+0x170/0x3f0 [ 22.180240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.180302] kthread+0x328/0x630 [ 22.180351] ret_from_fork+0x10/0x20 [ 22.180413] [ 22.180445] The buggy address belongs to stack of task kunit_try_catch/262 [ 22.180508] [ 22.180541] The buggy address belongs to the virtual mapping at [ 22.180541] [ffff800080a40000, ffff800080a49000) created by: [ 22.180541] kernel_clone+0x150/0x7a8 [ 22.180631] [ 22.180660] The buggy address belongs to the physical page: [ 22.180702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4 [ 22.180766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.182179] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.182526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.182619] page dumped because: kasan: bad access detected [ 22.182780] [ 22.183131] Memory state around the buggy address: [ 22.183206] ffff800080a47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.183268] ffff800080a47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.183347] >ffff800080a47b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 22.183397] ^ [ 22.183447] ffff800080a47b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 22.183742] ffff800080a47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 22.183806] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 22.158747] ================================================================== [ 22.159553] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 22.159688] Read of size 1 at addr ffff800080a47b5f by task kunit_try_catch/260 [ 22.159763] [ 22.159950] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.160407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.160564] Hardware name: linux,dummy-virt (DT) [ 22.160748] Call trace: [ 22.160817] show_stack+0x20/0x38 (C) [ 22.160949] dump_stack_lvl+0x8c/0xd0 [ 22.161050] print_report+0x310/0x608 [ 22.161110] kasan_report+0xdc/0x128 [ 22.161172] __asan_report_load1_noabort+0x20/0x30 [ 22.161229] kasan_alloca_oob_left+0x2b8/0x310 [ 22.161285] kunit_try_run_case+0x170/0x3f0 [ 22.161460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.161921] kthread+0x328/0x630 [ 22.161991] ret_from_fork+0x10/0x20 [ 22.162114] [ 22.162150] The buggy address belongs to stack of task kunit_try_catch/260 [ 22.162409] [ 22.162630] The buggy address belongs to the virtual mapping at [ 22.162630] [ffff800080a40000, ffff800080a49000) created by: [ 22.162630] kernel_clone+0x150/0x7a8 [ 22.162743] [ 22.162906] The buggy address belongs to the physical page: [ 22.163124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4 [ 22.163352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.163555] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.163884] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.164016] page dumped because: kasan: bad access detected [ 22.164066] [ 22.164093] Memory state around the buggy address: [ 22.164253] ffff800080a47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.164328] ffff800080a47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.164388] >ffff800080a47b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 22.164447] ^ [ 22.164499] ffff800080a47b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 22.164553] ffff800080a47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 22.164602] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 22.134412] ================================================================== [ 22.134541] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 22.134636] Read of size 1 at addr ffff800080ab7c2a by task kunit_try_catch/258 [ 22.134703] [ 22.134769] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.134904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.134945] Hardware name: linux,dummy-virt (DT) [ 22.134992] Call trace: [ 22.135028] show_stack+0x20/0x38 (C) [ 22.135098] dump_stack_lvl+0x8c/0xd0 [ 22.135160] print_report+0x310/0x608 [ 22.135221] kasan_report+0xdc/0x128 [ 22.136169] __asan_report_load1_noabort+0x20/0x30 [ 22.136336] kasan_stack_oob+0x238/0x270 [ 22.136396] kunit_try_run_case+0x170/0x3f0 [ 22.136515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.136711] kthread+0x328/0x630 [ 22.136953] ret_from_fork+0x10/0x20 [ 22.137163] [ 22.137451] The buggy address belongs to stack of task kunit_try_catch/258 [ 22.137733] and is located at offset 138 in frame: [ 22.138119] kasan_stack_oob+0x0/0x270 [ 22.138646] [ 22.138747] This frame has 4 objects: [ 22.139198] [48, 49) '__assertion' [ 22.139519] [64, 72) 'array' [ 22.139760] [96, 112) '__assertion' [ 22.139970] [128, 138) 'stack_array' [ 22.140138] [ 22.140311] The buggy address belongs to the virtual mapping at [ 22.140311] [ffff800080ab0000, ffff800080ab9000) created by: [ 22.140311] kernel_clone+0x150/0x7a8 [ 22.140441] [ 22.140684] The buggy address belongs to the physical page: [ 22.140738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 22.140941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.141046] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.141267] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.141511] page dumped because: kasan: bad access detected [ 22.141562] [ 22.141592] Memory state around the buggy address: [ 22.141642] ffff800080ab7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.141703] ffff800080ab7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 22.141759] >ffff800080ab7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 22.141824] ^ [ 22.141891] ffff800080ab7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 22.141949] ffff800080ab7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 22.142023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 22.099541] ================================================================== [ 22.099640] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 22.099730] Read of size 1 at addr ffffb1010d3b664d by task kunit_try_catch/254 [ 22.099793] [ 22.099873] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.099982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.100018] Hardware name: linux,dummy-virt (DT) [ 22.100059] Call trace: [ 22.100947] show_stack+0x20/0x38 (C) [ 22.101159] dump_stack_lvl+0x8c/0xd0 [ 22.101222] print_report+0x310/0x608 [ 22.101499] kasan_report+0xdc/0x128 [ 22.101622] __asan_report_load1_noabort+0x20/0x30 [ 22.101700] kasan_global_oob_right+0x230/0x270 [ 22.102035] kunit_try_run_case+0x170/0x3f0 [ 22.102125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.102410] kthread+0x328/0x630 [ 22.102485] ret_from_fork+0x10/0x20 [ 22.102797] [ 22.102920] The buggy address belongs to the variable: [ 22.102964] global_array+0xd/0x40 [ 22.103304] [ 22.103484] The buggy address belongs to the virtual mapping at [ 22.103484] [ffffb1010b550000, ffffb1010d471000) created by: [ 22.103484] paging_init+0x66c/0x7d0 [ 22.103925] [ 22.104044] The buggy address belongs to the physical page: [ 22.104109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db6 [ 22.104427] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 22.104761] raw: 03fffe0000002000 ffffc1ffc01f6d88 ffffc1ffc01f6d88 0000000000000000 [ 22.104892] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.105027] page dumped because: kasan: bad access detected [ 22.105074] [ 22.105097] Memory state around the buggy address: [ 22.105176] ffffb1010d3b6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.105236] ffffb1010d3b6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.105290] >ffffb1010d3b6600: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 22.105338] ^ [ 22.105385] ffffb1010d3b6680: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 22.105672] ffffb1010d3b6700: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 22.105749] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 22.082851] ================================================================== [ 22.083005] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.083107] Free of addr fff00000c78d8001 by task kunit_try_catch/252 [ 22.083468] [ 22.083580] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.083699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.084001] Hardware name: linux,dummy-virt (DT) [ 22.084056] Call trace: [ 22.084309] show_stack+0x20/0x38 (C) [ 22.084414] dump_stack_lvl+0x8c/0xd0 [ 22.084485] print_report+0x118/0x608 [ 22.084681] kasan_report_invalid_free+0xc0/0xe8 [ 22.084901] __kasan_mempool_poison_object+0xfc/0x150 [ 22.085021] mempool_free+0x28c/0x328 [ 22.085081] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.085142] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 22.085535] kunit_try_run_case+0x170/0x3f0 [ 22.085623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.085739] kthread+0x328/0x630 [ 22.085833] ret_from_fork+0x10/0x20 [ 22.085974] [ 22.086070] The buggy address belongs to the physical page: [ 22.086400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 22.086520] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.086587] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.086702] page_type: f8(unknown) [ 22.086779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.086874] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.087216] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.087518] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.087626] head: 0bfffe0000000002 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff [ 22.087757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.087915] page dumped because: kasan: bad access detected [ 22.087959] [ 22.087990] Memory state around the buggy address: [ 22.088048] fff00000c78d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.088102] fff00000c78d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.088492] >fff00000c78d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.088618] ^ [ 22.088664] fff00000c78d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.088904] fff00000c78d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.089081] ================================================================== [ 22.059622] ================================================================== [ 22.059718] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.059808] Free of addr fff00000c6587201 by task kunit_try_catch/250 [ 22.060739] [ 22.060996] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.061166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.061204] Hardware name: linux,dummy-virt (DT) [ 22.061244] Call trace: [ 22.061276] show_stack+0x20/0x38 (C) [ 22.061352] dump_stack_lvl+0x8c/0xd0 [ 22.061441] print_report+0x118/0x608 [ 22.061502] kasan_report_invalid_free+0xc0/0xe8 [ 22.061561] check_slab_allocation+0xfc/0x108 [ 22.061703] __kasan_mempool_poison_object+0x78/0x150 [ 22.061767] mempool_free+0x28c/0x328 [ 22.061842] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.062052] mempool_kmalloc_invalid_free+0xc0/0x118 [ 22.062130] kunit_try_run_case+0x170/0x3f0 [ 22.062195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.062271] kthread+0x328/0x630 [ 22.062414] ret_from_fork+0x10/0x20 [ 22.062486] [ 22.062511] Allocated by task 250: [ 22.062552] kasan_save_stack+0x3c/0x68 [ 22.062604] kasan_save_track+0x20/0x40 [ 22.062652] kasan_save_alloc_info+0x40/0x58 [ 22.062695] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.062747] remove_element+0x130/0x1f8 [ 22.062789] mempool_alloc_preallocated+0x58/0xc0 [ 22.062992] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 22.063176] mempool_kmalloc_invalid_free+0xc0/0x118 [ 22.063311] kunit_try_run_case+0x170/0x3f0 [ 22.063490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.063555] kthread+0x328/0x630 [ 22.063599] ret_from_fork+0x10/0x20 [ 22.063643] [ 22.063671] The buggy address belongs to the object at fff00000c6587200 [ 22.063671] which belongs to the cache kmalloc-128 of size 128 [ 22.063740] The buggy address is located 1 bytes inside of [ 22.063740] 128-byte region [fff00000c6587200, fff00000c6587280) [ 22.063810] [ 22.064055] The buggy address belongs to the physical page: [ 22.064248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 22.064324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.064725] page_type: f5(slab) [ 22.064922] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.065012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.065066] page dumped because: kasan: bad access detected [ 22.065113] [ 22.065259] Memory state around the buggy address: [ 22.065492] fff00000c6587100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.065656] fff00000c6587180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.065910] >fff00000c6587200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.066077] ^ [ 22.066125] fff00000c6587280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.066187] fff00000c6587300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.066236] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 22.042101] ================================================================== [ 22.042192] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.042275] Free of addr fff00000c788c000 by task kunit_try_catch/248 [ 22.042334] [ 22.042393] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.042506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.042540] Hardware name: linux,dummy-virt (DT) [ 22.042583] Call trace: [ 22.042615] show_stack+0x20/0x38 (C) [ 22.042682] dump_stack_lvl+0x8c/0xd0 [ 22.043208] print_report+0x118/0x608 [ 22.043341] kasan_report_invalid_free+0xc0/0xe8 [ 22.043503] __kasan_mempool_poison_pages+0xe0/0xe8 [ 22.043918] mempool_free+0x24c/0x328 [ 22.044141] mempool_double_free_helper+0x150/0x2e8 [ 22.044285] mempool_page_alloc_double_free+0xbc/0x118 [ 22.044347] kunit_try_run_case+0x170/0x3f0 [ 22.044685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.044872] kthread+0x328/0x630 [ 22.044936] ret_from_fork+0x10/0x20 [ 22.045126] [ 22.045157] The buggy address belongs to the physical page: [ 22.045280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c [ 22.045348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.045598] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.045777] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.045999] page dumped because: kasan: bad access detected [ 22.046239] [ 22.046277] Memory state around the buggy address: [ 22.046322] fff00000c788bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.046801] fff00000c788bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.046954] >fff00000c788c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.047012] ^ [ 22.047382] fff00000c788c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.047610] fff00000c788c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.047766] ================================================================== [ 22.026527] ================================================================== [ 22.026650] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.026745] Free of addr fff00000c788c000 by task kunit_try_catch/246 [ 22.026801] [ 22.026872] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.029114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.029205] Hardware name: linux,dummy-virt (DT) [ 22.029249] Call trace: [ 22.029281] show_stack+0x20/0x38 (C) [ 22.029462] dump_stack_lvl+0x8c/0xd0 [ 22.029529] print_report+0x118/0x608 [ 22.029602] kasan_report_invalid_free+0xc0/0xe8 [ 22.029907] __kasan_mempool_poison_object+0x14c/0x150 [ 22.030278] mempool_free+0x28c/0x328 [ 22.030350] mempool_double_free_helper+0x150/0x2e8 [ 22.030414] mempool_kmalloc_large_double_free+0xc0/0x118 [ 22.030579] kunit_try_run_case+0x170/0x3f0 [ 22.030718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030786] kthread+0x328/0x630 [ 22.030937] ret_from_fork+0x10/0x20 [ 22.031091] [ 22.031161] The buggy address belongs to the physical page: [ 22.031215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c [ 22.031501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.031692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.031780] page_type: f8(unknown) [ 22.031985] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.032201] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.032382] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.032474] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.032588] head: 0bfffe0000000002 ffffc1ffc31e2301 00000000ffffffff 00000000ffffffff [ 22.032744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.032858] page dumped because: kasan: bad access detected [ 22.032929] [ 22.032953] Memory state around the buggy address: [ 22.033207] fff00000c788bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.033381] fff00000c788bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.033445] >fff00000c788c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.033495] ^ [ 22.033535] fff00000c788c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.033663] fff00000c788c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.033887] ================================================================== [ 21.984565] ================================================================== [ 21.984686] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.984783] Free of addr fff00000c6408e00 by task kunit_try_catch/244 [ 21.986966] [ 21.987367] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.988272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.988689] Hardware name: linux,dummy-virt (DT) [ 21.988741] Call trace: [ 21.988776] show_stack+0x20/0x38 (C) [ 21.988865] dump_stack_lvl+0x8c/0xd0 [ 21.988925] print_report+0x118/0x608 [ 21.988985] kasan_report_invalid_free+0xc0/0xe8 [ 21.989045] check_slab_allocation+0xd4/0x108 [ 21.989103] __kasan_mempool_poison_object+0x78/0x150 [ 21.989163] mempool_free+0x28c/0x328 [ 21.989221] mempool_double_free_helper+0x150/0x2e8 [ 21.989282] mempool_kmalloc_double_free+0xc0/0x118 [ 21.989341] kunit_try_run_case+0x170/0x3f0 [ 21.989401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.989465] kthread+0x328/0x630 [ 21.990889] ret_from_fork+0x10/0x20 [ 21.991112] [ 21.991144] Allocated by task 244: [ 21.991368] kasan_save_stack+0x3c/0x68 [ 21.991779] kasan_save_track+0x20/0x40 [ 21.991830] kasan_save_alloc_info+0x40/0x58 [ 21.992300] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.992366] remove_element+0x130/0x1f8 [ 21.992615] mempool_alloc_preallocated+0x58/0xc0 [ 21.993027] mempool_double_free_helper+0x94/0x2e8 [ 21.993086] mempool_kmalloc_double_free+0xc0/0x118 [ 21.993135] kunit_try_run_case+0x170/0x3f0 [ 21.993433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.993504] kthread+0x328/0x630 [ 21.993547] ret_from_fork+0x10/0x20 [ 21.993677] [ 21.993736] Freed by task 244: [ 21.993905] kasan_save_stack+0x3c/0x68 [ 21.993980] kasan_save_track+0x20/0x40 [ 21.994030] kasan_save_free_info+0x4c/0x78 [ 21.994263] __kasan_mempool_poison_object+0xc0/0x150 [ 21.994382] mempool_free+0x28c/0x328 [ 21.994428] mempool_double_free_helper+0x100/0x2e8 [ 21.995038] mempool_kmalloc_double_free+0xc0/0x118 [ 21.995106] kunit_try_run_case+0x170/0x3f0 [ 21.995154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.995207] kthread+0x328/0x630 [ 21.995641] ret_from_fork+0x10/0x20 [ 21.995898] [ 21.996035] The buggy address belongs to the object at fff00000c6408e00 [ 21.996035] which belongs to the cache kmalloc-128 of size 128 [ 21.996134] The buggy address is located 0 bytes inside of [ 21.996134] 128-byte region [fff00000c6408e00, fff00000c6408e80) [ 21.996203] [ 21.996947] The buggy address belongs to the physical page: [ 21.997070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 21.997153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.997223] page_type: f5(slab) [ 21.997738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.997871] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.998343] page dumped because: kasan: bad access detected [ 21.998450] [ 21.998537] Memory state around the buggy address: [ 21.998620] fff00000c6408d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.998788] fff00000c6408d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.998967] >fff00000c6408e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.999019] ^ [ 21.999059] fff00000c6408e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.999112] fff00000c6408f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.999162] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 21.907437] ================================================================== [ 21.907578] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.907703] Read of size 1 at addr fff00000c7888000 by task kunit_try_catch/238 [ 21.907817] [ 21.907882] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.907989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.908024] Hardware name: linux,dummy-virt (DT) [ 21.908063] Call trace: [ 21.908095] show_stack+0x20/0x38 (C) [ 21.908156] dump_stack_lvl+0x8c/0xd0 [ 21.908213] print_report+0x118/0x608 [ 21.908269] kasan_report+0xdc/0x128 [ 21.908322] __asan_report_load1_noabort+0x20/0x30 [ 21.908380] mempool_uaf_helper+0x314/0x340 [ 21.908436] mempool_kmalloc_large_uaf+0xc4/0x120 [ 21.908548] kunit_try_run_case+0x170/0x3f0 [ 21.908677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.908752] kthread+0x328/0x630 [ 21.909486] ret_from_fork+0x10/0x20 [ 21.909569] [ 21.909600] The buggy address belongs to the physical page: [ 21.909674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107888 [ 21.909745] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.909801] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.909891] page_type: f8(unknown) [ 21.909988] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.910051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.910547] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.910696] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.910907] head: 0bfffe0000000002 ffffc1ffc31e2201 00000000ffffffff 00000000ffffffff [ 21.910966] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.911247] page dumped because: kasan: bad access detected [ 21.911327] [ 21.911354] Memory state around the buggy address: [ 21.911817] fff00000c7887f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.911891] fff00000c7887f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.911945] >fff00000c7888000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.911989] ^ [ 21.912026] fff00000c7888080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.912607] fff00000c7888100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.912852] ================================================================== [ 21.951757] ================================================================== [ 21.952061] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.952296] Read of size 1 at addr fff00000c788c000 by task kunit_try_catch/242 [ 21.952597] [ 21.952720] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.953260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.953360] Hardware name: linux,dummy-virt (DT) [ 21.953464] Call trace: [ 21.953516] show_stack+0x20/0x38 (C) [ 21.953616] dump_stack_lvl+0x8c/0xd0 [ 21.953677] print_report+0x118/0x608 [ 21.953736] kasan_report+0xdc/0x128 [ 21.953792] __asan_report_load1_noabort+0x20/0x30 [ 21.953885] mempool_uaf_helper+0x314/0x340 [ 21.953946] mempool_page_alloc_uaf+0xc0/0x118 [ 21.954037] kunit_try_run_case+0x170/0x3f0 [ 21.954269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.954636] kthread+0x328/0x630 [ 21.954704] ret_from_fork+0x10/0x20 [ 21.954780] [ 21.954817] The buggy address belongs to the physical page: [ 21.954874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c [ 21.954946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.955037] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.955104] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.955859] page dumped because: kasan: bad access detected [ 21.956296] [ 21.956622] Memory state around the buggy address: [ 21.956860] fff00000c788bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.957109] fff00000c788bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.957170] >fff00000c788c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.957221] ^ [ 21.957263] fff00000c788c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.957318] fff00000c788c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.957368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 21.923457] ================================================================== [ 21.923552] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.923639] Read of size 1 at addr fff00000c6e15240 by task kunit_try_catch/240 [ 21.923742] [ 21.923803] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.923988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.924225] Hardware name: linux,dummy-virt (DT) [ 21.924275] Call trace: [ 21.924312] show_stack+0x20/0x38 (C) [ 21.924379] dump_stack_lvl+0x8c/0xd0 [ 21.924437] print_report+0x118/0x608 [ 21.924778] kasan_report+0xdc/0x128 [ 21.925102] __asan_report_load1_noabort+0x20/0x30 [ 21.925183] mempool_uaf_helper+0x314/0x340 [ 21.925251] mempool_slab_uaf+0xc0/0x118 [ 21.925308] kunit_try_run_case+0x170/0x3f0 [ 21.925367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.925429] kthread+0x328/0x630 [ 21.925525] ret_from_fork+0x10/0x20 [ 21.925797] [ 21.925938] Allocated by task 240: [ 21.926066] kasan_save_stack+0x3c/0x68 [ 21.926129] kasan_save_track+0x20/0x40 [ 21.926178] kasan_save_alloc_info+0x40/0x58 [ 21.926498] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.926610] remove_element+0x16c/0x1f8 [ 21.926660] mempool_alloc_preallocated+0x58/0xc0 [ 21.927159] mempool_uaf_helper+0xa4/0x340 [ 21.927280] mempool_slab_uaf+0xc0/0x118 [ 21.927343] kunit_try_run_case+0x170/0x3f0 [ 21.927393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927447] kthread+0x328/0x630 [ 21.927489] ret_from_fork+0x10/0x20 [ 21.927536] [ 21.927563] Freed by task 240: [ 21.927598] kasan_save_stack+0x3c/0x68 [ 21.927644] kasan_save_track+0x20/0x40 [ 21.927691] kasan_save_free_info+0x4c/0x78 [ 21.927733] __kasan_mempool_poison_object+0xc0/0x150 [ 21.927781] mempool_free+0x28c/0x328 [ 21.928150] mempool_uaf_helper+0x104/0x340 [ 21.928243] mempool_slab_uaf+0xc0/0x118 [ 21.928350] kunit_try_run_case+0x170/0x3f0 [ 21.928528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.928755] kthread+0x328/0x630 [ 21.928885] ret_from_fork+0x10/0x20 [ 21.928947] [ 21.928976] The buggy address belongs to the object at fff00000c6e15240 [ 21.928976] which belongs to the cache test_cache of size 123 [ 21.929130] The buggy address is located 0 bytes inside of [ 21.929130] freed 123-byte region [fff00000c6e15240, fff00000c6e152bb) [ 21.929207] [ 21.929360] The buggy address belongs to the physical page: [ 21.929423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e15 [ 21.929507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.929572] page_type: f5(slab) [ 21.929630] raw: 0bfffe0000000000 fff00000c6419280 dead000000000122 0000000000000000 [ 21.929694] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.929747] page dumped because: kasan: bad access detected [ 21.929788] [ 21.929908] Memory state around the buggy address: [ 21.930007] fff00000c6e15100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.930180] fff00000c6e15180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.930321] >fff00000c6e15200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 21.930374] ^ [ 21.930770] fff00000c6e15280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.931047] fff00000c6e15300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.931162] ================================================================== [ 21.896253] ================================================================== [ 21.896404] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.896566] Read of size 1 at addr fff00000c6408a00 by task kunit_try_catch/236 [ 21.896626] [ 21.896675] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.896777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.896809] Hardware name: linux,dummy-virt (DT) [ 21.896863] Call trace: [ 21.896896] show_stack+0x20/0x38 (C) [ 21.896968] dump_stack_lvl+0x8c/0xd0 [ 21.897022] print_report+0x118/0x608 [ 21.897076] kasan_report+0xdc/0x128 [ 21.897126] __asan_report_load1_noabort+0x20/0x30 [ 21.897177] mempool_uaf_helper+0x314/0x340 [ 21.897226] mempool_kmalloc_uaf+0xc4/0x120 [ 21.897277] kunit_try_run_case+0x170/0x3f0 [ 21.897332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.897390] kthread+0x328/0x630 [ 21.897436] ret_from_fork+0x10/0x20 [ 21.897490] [ 21.897512] Allocated by task 236: [ 21.897549] kasan_save_stack+0x3c/0x68 [ 21.897597] kasan_save_track+0x20/0x40 [ 21.897638] kasan_save_alloc_info+0x40/0x58 [ 21.897726] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.897827] remove_element+0x130/0x1f8 [ 21.897937] mempool_alloc_preallocated+0x58/0xc0 [ 21.897990] mempool_uaf_helper+0xa4/0x340 [ 21.898035] mempool_kmalloc_uaf+0xc4/0x120 [ 21.898448] kunit_try_run_case+0x170/0x3f0 [ 21.898502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.898585] kthread+0x328/0x630 [ 21.898634] ret_from_fork+0x10/0x20 [ 21.898685] [ 21.898753] Freed by task 236: [ 21.898800] kasan_save_stack+0x3c/0x68 [ 21.898875] kasan_save_track+0x20/0x40 [ 21.898922] kasan_save_free_info+0x4c/0x78 [ 21.898970] __kasan_mempool_poison_object+0xc0/0x150 [ 21.899309] mempool_free+0x28c/0x328 [ 21.899375] mempool_uaf_helper+0x104/0x340 [ 21.899478] mempool_kmalloc_uaf+0xc4/0x120 [ 21.899521] kunit_try_run_case+0x170/0x3f0 [ 21.899565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.899613] kthread+0x328/0x630 [ 21.899649] ret_from_fork+0x10/0x20 [ 21.899691] [ 21.899715] The buggy address belongs to the object at fff00000c6408a00 [ 21.899715] which belongs to the cache kmalloc-128 of size 128 [ 21.899884] The buggy address is located 0 bytes inside of [ 21.899884] freed 128-byte region [fff00000c6408a00, fff00000c6408a80) [ 21.900087] [ 21.900116] The buggy address belongs to the physical page: [ 21.900159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 21.900229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.900288] page_type: f5(slab) [ 21.900338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.900396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.900918] page dumped because: kasan: bad access detected [ 21.900979] [ 21.901175] Memory state around the buggy address: [ 21.901233] fff00000c6408900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.901290] fff00000c6408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.901338] >fff00000c6408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.901389] ^ [ 21.901425] fff00000c6408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.901471] fff00000c6408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.901617] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 21.858033] ================================================================== [ 21.858120] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.858205] Read of size 1 at addr fff00000c7886001 by task kunit_try_catch/232 [ 21.858270] [ 21.858319] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.858425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.858461] Hardware name: linux,dummy-virt (DT) [ 21.858499] Call trace: [ 21.858529] show_stack+0x20/0x38 (C) [ 21.858591] dump_stack_lvl+0x8c/0xd0 [ 21.858646] print_report+0x118/0x608 [ 21.858735] kasan_report+0xdc/0x128 [ 21.858789] __asan_report_load1_noabort+0x20/0x30 [ 21.858860] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.858922] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.858982] kunit_try_run_case+0x170/0x3f0 [ 21.859040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.859213] kthread+0x328/0x630 [ 21.859267] ret_from_fork+0x10/0x20 [ 21.859328] [ 21.859359] The buggy address belongs to the physical page: [ 21.859405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 21.859470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.859521] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.859979] page_type: f8(unknown) [ 21.860152] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.860221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.860286] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.860345] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.860404] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 21.860577] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.860629] page dumped because: kasan: bad access detected [ 21.860665] [ 21.860695] Memory state around the buggy address: [ 21.860735] fff00000c7885f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.860829] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.861058] >fff00000c7886000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.861118] ^ [ 21.861160] fff00000c7886080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.861210] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.861254] ================================================================== [ 21.871790] ================================================================== [ 21.871895] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.871984] Read of size 1 at addr fff00000c63ff2bb by task kunit_try_catch/234 [ 21.872042] [ 21.872238] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.872483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.872663] Hardware name: linux,dummy-virt (DT) [ 21.872706] Call trace: [ 21.872737] show_stack+0x20/0x38 (C) [ 21.872809] dump_stack_lvl+0x8c/0xd0 [ 21.872876] print_report+0x118/0x608 [ 21.872926] kasan_report+0xdc/0x128 [ 21.872973] __asan_report_load1_noabort+0x20/0x30 [ 21.873193] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.873342] mempool_slab_oob_right+0xc0/0x118 [ 21.873402] kunit_try_run_case+0x170/0x3f0 [ 21.873512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.873575] kthread+0x328/0x630 [ 21.873622] ret_from_fork+0x10/0x20 [ 21.873864] [ 21.873908] Allocated by task 234: [ 21.873952] kasan_save_stack+0x3c/0x68 [ 21.874068] kasan_save_track+0x20/0x40 [ 21.874181] kasan_save_alloc_info+0x40/0x58 [ 21.874267] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.874338] remove_element+0x16c/0x1f8 [ 21.874382] mempool_alloc_preallocated+0x58/0xc0 [ 21.874424] mempool_oob_right_helper+0x98/0x2f0 [ 21.874469] mempool_slab_oob_right+0xc0/0x118 [ 21.874512] kunit_try_run_case+0x170/0x3f0 [ 21.874568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.874651] kthread+0x328/0x630 [ 21.874722] ret_from_fork+0x10/0x20 [ 21.874820] [ 21.874949] The buggy address belongs to the object at fff00000c63ff240 [ 21.874949] which belongs to the cache test_cache of size 123 [ 21.875550] The buggy address is located 0 bytes to the right of [ 21.875550] allocated 123-byte region [fff00000c63ff240, fff00000c63ff2bb) [ 21.876099] [ 21.876268] The buggy address belongs to the physical page: [ 21.876336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ff [ 21.876578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.876666] page_type: f5(slab) [ 21.876716] raw: 0bfffe0000000000 fff00000c6419140 dead000000000122 0000000000000000 [ 21.876949] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.877146] page dumped because: kasan: bad access detected [ 21.877189] [ 21.877212] Memory state around the buggy address: [ 21.877257] fff00000c63ff180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.877310] fff00000c63ff200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.877358] >fff00000c63ff280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.877402] ^ [ 21.877440] fff00000c63ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.877488] fff00000c63ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.877532] ================================================================== [ 21.847753] ================================================================== [ 21.847888] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.847993] Read of size 1 at addr fff00000c6408673 by task kunit_try_catch/230 [ 21.848059] [ 21.848128] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.848230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.848262] Hardware name: linux,dummy-virt (DT) [ 21.848302] Call trace: [ 21.848335] show_stack+0x20/0x38 (C) [ 21.848397] dump_stack_lvl+0x8c/0xd0 [ 21.848451] print_report+0x118/0x608 [ 21.848507] kasan_report+0xdc/0x128 [ 21.848556] __asan_report_load1_noabort+0x20/0x30 [ 21.848613] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.848667] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.848720] kunit_try_run_case+0x170/0x3f0 [ 21.848777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.848861] kthread+0x328/0x630 [ 21.848911] ret_from_fork+0x10/0x20 [ 21.848969] [ 21.849022] Allocated by task 230: [ 21.849064] kasan_save_stack+0x3c/0x68 [ 21.849122] kasan_save_track+0x20/0x40 [ 21.849173] kasan_save_alloc_info+0x40/0x58 [ 21.849213] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.849260] remove_element+0x130/0x1f8 [ 21.849303] mempool_alloc_preallocated+0x58/0xc0 [ 21.849347] mempool_oob_right_helper+0x98/0x2f0 [ 21.849388] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.849430] kunit_try_run_case+0x170/0x3f0 [ 21.849472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.849518] kthread+0x328/0x630 [ 21.849553] ret_from_fork+0x10/0x20 [ 21.849595] [ 21.849628] The buggy address belongs to the object at fff00000c6408600 [ 21.849628] which belongs to the cache kmalloc-128 of size 128 [ 21.849697] The buggy address is located 0 bytes to the right of [ 21.849697] allocated 115-byte region [fff00000c6408600, fff00000c6408673) [ 21.849768] [ 21.849798] The buggy address belongs to the physical page: [ 21.849875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 21.849948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.850016] page_type: f5(slab) [ 21.850071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.850134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.850189] page dumped because: kasan: bad access detected [ 21.850230] [ 21.850271] Memory state around the buggy address: [ 21.850318] fff00000c6408500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.850376] fff00000c6408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.850432] >fff00000c6408600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.850482] ^ [ 21.850533] fff00000c6408680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.850588] fff00000c6408700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.850640] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 21.272228] ================================================================== [ 21.272348] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 21.272447] Read of size 1 at addr fff00000c10ddc80 by task kunit_try_catch/224 [ 21.272508] [ 21.272572] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.272681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.272718] Hardware name: linux,dummy-virt (DT) [ 21.272761] Call trace: [ 21.272802] show_stack+0x20/0x38 (C) [ 21.272910] dump_stack_lvl+0x8c/0xd0 [ 21.272966] print_report+0x118/0x608 [ 21.273022] kasan_report+0xdc/0x128 [ 21.273074] __kasan_check_byte+0x54/0x70 [ 21.273132] kmem_cache_destroy+0x34/0x218 [ 21.273188] kmem_cache_double_destroy+0x174/0x300 [ 21.273247] kunit_try_run_case+0x170/0x3f0 [ 21.273305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.273367] kthread+0x328/0x630 [ 21.273420] ret_from_fork+0x10/0x20 [ 21.273480] [ 21.273506] Allocated by task 224: [ 21.273548] kasan_save_stack+0x3c/0x68 [ 21.273606] kasan_save_track+0x20/0x40 [ 21.273654] kasan_save_alloc_info+0x40/0x58 [ 21.273700] __kasan_slab_alloc+0xa8/0xb0 [ 21.273747] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.273800] __kmem_cache_create_args+0x178/0x280 [ 21.273873] kmem_cache_double_destroy+0xc0/0x300 [ 21.273927] kunit_try_run_case+0x170/0x3f0 [ 21.273973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.274022] kthread+0x328/0x630 [ 21.274063] ret_from_fork+0x10/0x20 [ 21.274105] [ 21.274130] Freed by task 224: [ 21.274165] kasan_save_stack+0x3c/0x68 [ 21.274210] kasan_save_track+0x20/0x40 [ 21.274256] kasan_save_free_info+0x4c/0x78 [ 21.274300] __kasan_slab_free+0x6c/0x98 [ 21.274346] kmem_cache_free+0x260/0x468 [ 21.274389] slab_kmem_cache_release+0x38/0x50 [ 21.274436] kmem_cache_release+0x1c/0x30 [ 21.274479] kobject_put+0x17c/0x420 [ 21.274527] sysfs_slab_release+0x1c/0x30 [ 21.274571] kmem_cache_destroy+0x118/0x218 [ 21.274614] kmem_cache_double_destroy+0x128/0x300 [ 21.274662] kunit_try_run_case+0x170/0x3f0 [ 21.274708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.274761] kthread+0x328/0x630 [ 21.274801] ret_from_fork+0x10/0x20 [ 21.274856] [ 21.274883] The buggy address belongs to the object at fff00000c10ddc80 [ 21.274883] which belongs to the cache kmem_cache of size 208 [ 21.274955] The buggy address is located 0 bytes inside of [ 21.274955] freed 208-byte region [fff00000c10ddc80, fff00000c10ddd50) [ 21.275026] [ 21.275056] The buggy address belongs to the physical page: [ 21.275100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010dd [ 21.275168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.275233] page_type: f5(slab) [ 21.275289] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 21.275352] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 21.275407] page dumped because: kasan: bad access detected [ 21.275447] [ 21.275470] Memory state around the buggy address: [ 21.275513] fff00000c10ddb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.275569] fff00000c10ddc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.275622] >fff00000c10ddc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.275665] ^ [ 21.275697] fff00000c10ddd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 21.275743] fff00000c10ddd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.275788] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 21.022067] ================================================================== [ 21.022369] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 21.022555] Read of size 1 at addr fff00000c7736000 by task kunit_try_catch/222 [ 21.022667] [ 21.022767] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 21.022986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.023105] Hardware name: linux,dummy-virt (DT) [ 21.023257] Call trace: [ 21.023391] show_stack+0x20/0x38 (C) [ 21.023577] dump_stack_lvl+0x8c/0xd0 [ 21.023735] print_report+0x118/0x608 [ 21.023946] kasan_report+0xdc/0x128 [ 21.024133] __asan_report_load1_noabort+0x20/0x30 [ 21.024332] kmem_cache_rcu_uaf+0x388/0x468 [ 21.024549] kunit_try_run_case+0x170/0x3f0 [ 21.024727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.024931] kthread+0x328/0x630 [ 21.025035] ret_from_fork+0x10/0x20 [ 21.025219] [ 21.025306] Allocated by task 222: [ 21.025385] kasan_save_stack+0x3c/0x68 [ 21.025499] kasan_save_track+0x20/0x40 [ 21.026017] kasan_save_alloc_info+0x40/0x58 [ 21.026112] __kasan_slab_alloc+0xa8/0xb0 [ 21.026219] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.026328] kmem_cache_rcu_uaf+0x12c/0x468 [ 21.026430] kunit_try_run_case+0x170/0x3f0 [ 21.026534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.026648] kthread+0x328/0x630 [ 21.026953] ret_from_fork+0x10/0x20 [ 21.027063] [ 21.027092] Freed by task 0: [ 21.027135] kasan_save_stack+0x3c/0x68 [ 21.027183] kasan_save_track+0x20/0x40 [ 21.027229] kasan_save_free_info+0x4c/0x78 [ 21.027271] __kasan_slab_free+0x6c/0x98 [ 21.027318] slab_free_after_rcu_debug+0xd4/0x2f8 [ 21.027365] rcu_core+0x9f4/0x1e20 [ 21.027408] rcu_core_si+0x18/0x30 [ 21.027446] handle_softirqs+0x374/0xb28 [ 21.027487] __do_softirq+0x1c/0x28 [ 21.027527] [ 21.027549] Last potentially related work creation: [ 21.027581] kasan_save_stack+0x3c/0x68 [ 21.027626] kasan_record_aux_stack+0xb4/0xc8 [ 21.027667] kmem_cache_free+0x120/0x468 [ 21.027710] kmem_cache_rcu_uaf+0x16c/0x468 [ 21.027749] kunit_try_run_case+0x170/0x3f0 [ 21.027792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.027863] kthread+0x328/0x630 [ 21.027929] ret_from_fork+0x10/0x20 [ 21.028003] [ 21.028044] The buggy address belongs to the object at fff00000c7736000 [ 21.028044] which belongs to the cache test_cache of size 200 [ 21.028218] The buggy address is located 0 bytes inside of [ 21.028218] freed 200-byte region [fff00000c7736000, fff00000c77360c8) [ 21.028470] [ 21.028524] The buggy address belongs to the physical page: [ 21.028698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107736 [ 21.028848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.029224] page_type: f5(slab) [ 21.029341] raw: 0bfffe0000000000 fff00000c10ddb40 dead000000000122 0000000000000000 [ 21.029562] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 21.029695] page dumped because: kasan: bad access detected [ 21.029898] [ 21.029951] Memory state around the buggy address: [ 21.030144] fff00000c7735f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.030334] fff00000c7735f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.030564] >fff00000c7736000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.030674] ^ [ 21.031051] fff00000c7736080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 21.031320] fff00000c7736100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.031524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 20.359476] ================================================================== [ 20.359573] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 20.359663] Free of addr fff00000c6e21001 by task kunit_try_catch/220 [ 20.359713] [ 20.359776] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 20.360416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.360490] Hardware name: linux,dummy-virt (DT) [ 20.360577] Call trace: [ 20.360683] show_stack+0x20/0x38 (C) [ 20.360936] dump_stack_lvl+0x8c/0xd0 [ 20.361021] print_report+0x118/0x608 [ 20.361091] kasan_report_invalid_free+0xc0/0xe8 [ 20.361447] check_slab_allocation+0xfc/0x108 [ 20.361538] __kasan_slab_pre_free+0x2c/0x48 [ 20.361598] kmem_cache_free+0xf0/0x468 [ 20.362132] kmem_cache_invalid_free+0x184/0x3c8 [ 20.362226] kunit_try_run_case+0x170/0x3f0 [ 20.362354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.362452] kthread+0x328/0x630 [ 20.362511] ret_from_fork+0x10/0x20 [ 20.362870] [ 20.362910] Allocated by task 220: [ 20.363166] kasan_save_stack+0x3c/0x68 [ 20.363439] kasan_save_track+0x20/0x40 [ 20.363688] kasan_save_alloc_info+0x40/0x58 [ 20.363962] __kasan_slab_alloc+0xa8/0xb0 [ 20.364025] kmem_cache_alloc_noprof+0x10c/0x398 [ 20.364101] kmem_cache_invalid_free+0x12c/0x3c8 [ 20.364149] kunit_try_run_case+0x170/0x3f0 [ 20.364772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.365185] kthread+0x328/0x630 [ 20.365477] ret_from_fork+0x10/0x20 [ 20.365525] [ 20.365551] The buggy address belongs to the object at fff00000c6e21000 [ 20.365551] which belongs to the cache test_cache of size 200 [ 20.365726] The buggy address is located 1 bytes inside of [ 20.365726] 200-byte region [fff00000c6e21000, fff00000c6e210c8) [ 20.366098] [ 20.366495] The buggy address belongs to the physical page: [ 20.366903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e21 [ 20.367000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.367067] page_type: f5(slab) [ 20.367121] raw: 0bfffe0000000000 fff00000c10dda00 dead000000000122 0000000000000000 [ 20.367183] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.367233] page dumped because: kasan: bad access detected [ 20.367270] [ 20.367294] Memory state around the buggy address: [ 20.367333] fff00000c6e20f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.367388] fff00000c6e20f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.367439] >fff00000c6e21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.367484] ^ [ 20.367517] fff00000c6e21080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.369339] fff00000c6e21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.369414] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 20.327083] ================================================================== [ 20.327264] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 20.327423] Free of addr fff00000c6e23000 by task kunit_try_catch/218 [ 20.327511] [ 20.327591] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 20.327735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.327796] Hardware name: linux,dummy-virt (DT) [ 20.327886] Call trace: [ 20.327923] show_stack+0x20/0x38 (C) [ 20.327986] dump_stack_lvl+0x8c/0xd0 [ 20.328044] print_report+0x118/0x608 [ 20.328097] kasan_report_invalid_free+0xc0/0xe8 [ 20.328154] check_slab_allocation+0xd4/0x108 [ 20.328207] __kasan_slab_pre_free+0x2c/0x48 [ 20.328262] kmem_cache_free+0xf0/0x468 [ 20.328315] kmem_cache_double_free+0x190/0x3c8 [ 20.328370] kunit_try_run_case+0x170/0x3f0 [ 20.328428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.328483] kthread+0x328/0x630 [ 20.328534] ret_from_fork+0x10/0x20 [ 20.328591] [ 20.328616] Allocated by task 218: [ 20.328651] kasan_save_stack+0x3c/0x68 [ 20.328700] kasan_save_track+0x20/0x40 [ 20.328742] kasan_save_alloc_info+0x40/0x58 [ 20.328825] __kasan_slab_alloc+0xa8/0xb0 [ 20.328885] kmem_cache_alloc_noprof+0x10c/0x398 [ 20.328928] kmem_cache_double_free+0x12c/0x3c8 [ 20.328971] kunit_try_run_case+0x170/0x3f0 [ 20.329010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.329354] kthread+0x328/0x630 [ 20.329669] ret_from_fork+0x10/0x20 [ 20.329752] [ 20.329801] Freed by task 218: [ 20.329857] kasan_save_stack+0x3c/0x68 [ 20.329911] kasan_save_track+0x20/0x40 [ 20.329971] kasan_save_free_info+0x4c/0x78 [ 20.330043] __kasan_slab_free+0x6c/0x98 [ 20.330085] kmem_cache_free+0x260/0x468 [ 20.330162] kmem_cache_double_free+0x140/0x3c8 [ 20.330207] kunit_try_run_case+0x170/0x3f0 [ 20.330252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.330301] kthread+0x328/0x630 [ 20.330339] ret_from_fork+0x10/0x20 [ 20.330380] [ 20.330403] The buggy address belongs to the object at fff00000c6e23000 [ 20.330403] which belongs to the cache test_cache of size 200 [ 20.330490] The buggy address is located 0 bytes inside of [ 20.330490] 200-byte region [fff00000c6e23000, fff00000c6e230c8) [ 20.330559] [ 20.330585] The buggy address belongs to the physical page: [ 20.330632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e23 [ 20.330722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.330809] page_type: f5(slab) [ 20.330922] raw: 0bfffe0000000000 fff00000c5c86dc0 dead000000000122 0000000000000000 [ 20.331104] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.331365] page dumped because: kasan: bad access detected [ 20.331408] [ 20.331432] Memory state around the buggy address: [ 20.331654] fff00000c6e22f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.331914] fff00000c6e22f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.332070] >fff00000c6e23000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.332268] ^ [ 20.332395] fff00000c6e23080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.332615] fff00000c6e23100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.332671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 20.079320] ================================================================== [ 20.080031] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 20.080363] Read of size 1 at addr fff00000c6e280c8 by task kunit_try_catch/216 [ 20.080490] [ 20.080786] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 20.081445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.081506] Hardware name: linux,dummy-virt (DT) [ 20.081946] Call trace: [ 20.082004] show_stack+0x20/0x38 (C) [ 20.082090] dump_stack_lvl+0x8c/0xd0 [ 20.082151] print_report+0x118/0x608 [ 20.082246] kasan_report+0xdc/0x128 [ 20.082383] __asan_report_load1_noabort+0x20/0x30 [ 20.082569] kmem_cache_oob+0x344/0x430 [ 20.082702] kunit_try_run_case+0x170/0x3f0 [ 20.082849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.082970] kthread+0x328/0x630 [ 20.083121] ret_from_fork+0x10/0x20 [ 20.083245] [ 20.083301] Allocated by task 216: [ 20.083387] kasan_save_stack+0x3c/0x68 [ 20.083469] kasan_save_track+0x20/0x40 [ 20.083555] kasan_save_alloc_info+0x40/0x58 [ 20.083646] __kasan_slab_alloc+0xa8/0xb0 [ 20.083733] kmem_cache_alloc_noprof+0x10c/0x398 [ 20.083826] kmem_cache_oob+0x12c/0x430 [ 20.083916] kunit_try_run_case+0x170/0x3f0 [ 20.084005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.084103] kthread+0x328/0x630 [ 20.084198] ret_from_fork+0x10/0x20 [ 20.084286] [ 20.084335] The buggy address belongs to the object at fff00000c6e28000 [ 20.084335] which belongs to the cache test_cache of size 200 [ 20.084475] The buggy address is located 0 bytes to the right of [ 20.084475] allocated 200-byte region [fff00000c6e28000, fff00000c6e280c8) [ 20.084621] [ 20.084669] The buggy address belongs to the physical page: [ 20.084741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e28 [ 20.084893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.085007] page_type: f5(slab) [ 20.085106] raw: 0bfffe0000000000 fff00000c5c86c80 dead000000000122 0000000000000000 [ 20.085226] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.085336] page dumped because: kasan: bad access detected [ 20.085404] [ 20.085448] Memory state around the buggy address: [ 20.085536] fff00000c6e27f80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 20.085687] fff00000c6e28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.085936] >fff00000c6e28080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.086046] ^ [ 20.086147] fff00000c6e28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.086256] fff00000c6e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.086440] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 19.986527] ================================================================== [ 19.986675] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 19.986857] Read of size 8 at addr fff00000c6406ac0 by task kunit_try_catch/209 [ 19.987009] [ 19.987122] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.987340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.987406] Hardware name: linux,dummy-virt (DT) [ 19.987482] Call trace: [ 19.987610] show_stack+0x20/0x38 (C) [ 19.987821] dump_stack_lvl+0x8c/0xd0 [ 19.988013] print_report+0x118/0x608 [ 19.988128] kasan_report+0xdc/0x128 [ 19.988239] __asan_report_load8_noabort+0x20/0x30 [ 19.988710] workqueue_uaf+0x480/0x4a8 [ 19.988864] kunit_try_run_case+0x170/0x3f0 [ 19.988974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.989117] kthread+0x328/0x630 [ 19.989208] ret_from_fork+0x10/0x20 [ 19.989543] [ 19.989615] Allocated by task 209: [ 19.989701] kasan_save_stack+0x3c/0x68 [ 19.989787] kasan_save_track+0x20/0x40 [ 19.989920] kasan_save_alloc_info+0x40/0x58 [ 19.990009] __kasan_kmalloc+0xd4/0xd8 [ 19.990126] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.990253] workqueue_uaf+0x13c/0x4a8 [ 19.990344] kunit_try_run_case+0x170/0x3f0 [ 19.990448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.990580] kthread+0x328/0x630 [ 19.990657] ret_from_fork+0x10/0x20 [ 19.990777] [ 19.990849] Freed by task 76: [ 19.990939] kasan_save_stack+0x3c/0x68 [ 19.991060] kasan_save_track+0x20/0x40 [ 19.991176] kasan_save_free_info+0x4c/0x78 [ 19.991268] __kasan_slab_free+0x6c/0x98 [ 19.991359] kfree+0x214/0x3c8 [ 19.991435] workqueue_uaf_work+0x18/0x30 [ 19.991521] process_one_work+0x530/0xf98 [ 19.991612] worker_thread+0x618/0xf38 [ 19.991694] kthread+0x328/0x630 [ 19.991773] ret_from_fork+0x10/0x20 [ 19.991866] [ 19.991910] Last potentially related work creation: [ 19.991963] kasan_save_stack+0x3c/0x68 [ 19.992316] kasan_record_aux_stack+0xb4/0xc8 [ 19.992500] __queue_work+0x65c/0xfe0 [ 19.992587] queue_work_on+0xbc/0xf8 [ 19.992668] workqueue_uaf+0x210/0x4a8 [ 19.992751] kunit_try_run_case+0x170/0x3f0 [ 19.993996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.994117] kthread+0x328/0x630 [ 19.994202] ret_from_fork+0x10/0x20 [ 19.994382] [ 19.994444] The buggy address belongs to the object at fff00000c6406ac0 [ 19.994444] which belongs to the cache kmalloc-32 of size 32 [ 19.994599] The buggy address is located 0 bytes inside of [ 19.994599] freed 32-byte region [fff00000c6406ac0, fff00000c6406ae0) [ 19.994789] [ 19.994860] The buggy address belongs to the physical page: [ 19.994964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106406 [ 19.995103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.995227] page_type: f5(slab) [ 19.995337] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.995473] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.995583] page dumped because: kasan: bad access detected [ 19.995667] [ 19.995712] Memory state around the buggy address: [ 19.996408] fff00000c6406980: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.996989] fff00000c6406a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.997200] >fff00000c6406a80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 19.997456] ^ [ 19.997576] fff00000c6406b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997990] fff00000c6406b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.998167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 19.942490] ================================================================== [ 19.942753] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 19.942920] Read of size 4 at addr fff00000c6406880 by task swapper/0/0 [ 19.943034] [ 19.943128] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.944818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.945259] Hardware name: linux,dummy-virt (DT) [ 19.945344] Call trace: [ 19.945394] show_stack+0x20/0x38 (C) [ 19.945514] dump_stack_lvl+0x8c/0xd0 [ 19.945614] print_report+0x118/0x608 [ 19.946937] kasan_report+0xdc/0x128 [ 19.947568] __asan_report_load4_noabort+0x20/0x30 [ 19.947993] rcu_uaf_reclaim+0x64/0x70 [ 19.948226] rcu_core+0x9f4/0x1e20 [ 19.948372] rcu_core_si+0x18/0x30 [ 19.948849] handle_softirqs+0x374/0xb28 [ 19.949330] __do_softirq+0x1c/0x28 [ 19.949549] ____do_softirq+0x18/0x30 [ 19.949658] call_on_irq_stack+0x24/0x30 [ 19.949805] do_softirq_own_stack+0x24/0x38 [ 19.950242] __irq_exit_rcu+0x1fc/0x318 [ 19.950761] irq_exit_rcu+0x1c/0x80 [ 19.951065] el1_interrupt+0x38/0x58 [ 19.951603] el1h_64_irq_handler+0x18/0x28 [ 19.951722] el1h_64_irq+0x6c/0x70 [ 19.952748] finish_task_switch.isra.0+0x120/0x5e8 (P) [ 19.953554] __schedule+0xab4/0x2840 [ 19.953691] schedule_idle+0x60/0xa8 [ 19.953922] do_idle+0x2c4/0x4e8 [ 19.954168] cpu_startup_entry+0x64/0x80 [ 19.954713] rest_init+0x160/0x188 [ 19.955146] start_kernel+0x30c/0x3d0 [ 19.955297] __primary_switched+0x8c/0xa0 [ 19.955431] [ 19.955856] Allocated by task 207: [ 19.956227] kasan_save_stack+0x3c/0x68 [ 19.956471] kasan_save_track+0x20/0x40 [ 19.956684] kasan_save_alloc_info+0x40/0x58 [ 19.957041] __kasan_kmalloc+0xd4/0xd8 [ 19.957263] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.957359] rcu_uaf+0xb0/0x2d8 [ 19.957442] kunit_try_run_case+0x170/0x3f0 [ 19.957538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.957720] kthread+0x328/0x630 [ 19.957856] ret_from_fork+0x10/0x20 [ 19.957989] [ 19.958060] Freed by task 0: [ 19.958140] kasan_save_stack+0x3c/0x68 [ 19.958233] kasan_save_track+0x20/0x40 [ 19.958332] kasan_save_free_info+0x4c/0x78 [ 19.958466] __kasan_slab_free+0x6c/0x98 [ 19.958555] kfree+0x214/0x3c8 [ 19.958688] rcu_uaf_reclaim+0x28/0x70 [ 19.958792] rcu_core+0x9f4/0x1e20 [ 19.958924] rcu_core_si+0x18/0x30 [ 19.959004] handle_softirqs+0x374/0xb28 [ 19.959085] __do_softirq+0x1c/0x28 [ 19.959170] [ 19.959244] Last potentially related work creation: [ 19.959318] kasan_save_stack+0x3c/0x68 [ 19.959411] kasan_record_aux_stack+0xb4/0xc8 [ 19.959496] __call_rcu_common.constprop.0+0x74/0x8c8 [ 19.959593] call_rcu+0x18/0x30 [ 19.959671] rcu_uaf+0x14c/0x2d8 [ 19.959750] kunit_try_run_case+0x170/0x3f0 [ 19.959843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.959936] kthread+0x328/0x630 [ 19.960006] ret_from_fork+0x10/0x20 [ 19.960376] [ 19.960455] The buggy address belongs to the object at fff00000c6406880 [ 19.960455] which belongs to the cache kmalloc-32 of size 32 [ 19.960674] The buggy address is located 0 bytes inside of [ 19.960674] freed 32-byte region [fff00000c6406880, fff00000c64068a0) [ 19.960890] [ 19.960942] The buggy address belongs to the physical page: [ 19.961024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106406 [ 19.961395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.961632] page_type: f5(slab) [ 19.961727] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.961869] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.962017] page dumped because: kasan: bad access detected [ 19.962093] [ 19.962142] Memory state around the buggy address: [ 19.962222] fff00000c6406780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.962591] fff00000c6406800: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.962722] >fff00000c6406880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.962820] ^ [ 19.962901] fff00000c6406900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.963181] fff00000c6406980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.963395] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 19.686003] ================================================================== [ 19.686164] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 19.686285] Read of size 1 at addr fff00000c6408378 by task kunit_try_catch/205 [ 19.686403] [ 19.686472] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.686661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.686733] Hardware name: linux,dummy-virt (DT) [ 19.686806] Call trace: [ 19.686865] show_stack+0x20/0x38 (C) [ 19.686977] dump_stack_lvl+0x8c/0xd0 [ 19.687088] print_report+0x118/0x608 [ 19.687250] kasan_report+0xdc/0x128 [ 19.687377] __asan_report_load1_noabort+0x20/0x30 [ 19.687501] ksize_uaf+0x544/0x5f8 [ 19.687635] kunit_try_run_case+0x170/0x3f0 [ 19.687780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.687920] kthread+0x328/0x630 [ 19.688011] ret_from_fork+0x10/0x20 [ 19.688107] [ 19.688147] Allocated by task 205: [ 19.688212] kasan_save_stack+0x3c/0x68 [ 19.688326] kasan_save_track+0x20/0x40 [ 19.688574] kasan_save_alloc_info+0x40/0x58 [ 19.688695] __kasan_kmalloc+0xd4/0xd8 [ 19.688931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.689052] ksize_uaf+0xb8/0x5f8 [ 19.689122] kunit_try_run_case+0x170/0x3f0 [ 19.689198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.689287] kthread+0x328/0x630 [ 19.689359] ret_from_fork+0x10/0x20 [ 19.689447] [ 19.689525] Freed by task 205: [ 19.689588] kasan_save_stack+0x3c/0x68 [ 19.689675] kasan_save_track+0x20/0x40 [ 19.689751] kasan_save_free_info+0x4c/0x78 [ 19.689850] __kasan_slab_free+0x6c/0x98 [ 19.689939] kfree+0x214/0x3c8 [ 19.690037] ksize_uaf+0x11c/0x5f8 [ 19.690169] kunit_try_run_case+0x170/0x3f0 [ 19.690269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.690445] kthread+0x328/0x630 [ 19.690555] ret_from_fork+0x10/0x20 [ 19.690665] [ 19.690718] The buggy address belongs to the object at fff00000c6408300 [ 19.690718] which belongs to the cache kmalloc-128 of size 128 [ 19.690876] The buggy address is located 120 bytes inside of [ 19.690876] freed 128-byte region [fff00000c6408300, fff00000c6408380) [ 19.691037] [ 19.691088] The buggy address belongs to the physical page: [ 19.691157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.691308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.691451] page_type: f5(slab) [ 19.691567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.691724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.691825] page dumped because: kasan: bad access detected [ 19.691914] [ 19.691956] Memory state around the buggy address: [ 19.692034] fff00000c6408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.692139] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692239] >fff00000c6408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.692339] ^ [ 19.692465] fff00000c6408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692578] fff00000c6408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692695] ================================================================== [ 19.663212] ================================================================== [ 19.663574] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 19.663913] Read of size 1 at addr fff00000c6408300 by task kunit_try_catch/205 [ 19.664063] [ 19.664135] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.664328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.664387] Hardware name: linux,dummy-virt (DT) [ 19.664487] Call trace: [ 19.664710] show_stack+0x20/0x38 (C) [ 19.664989] dump_stack_lvl+0x8c/0xd0 [ 19.665109] print_report+0x118/0x608 [ 19.665267] kasan_report+0xdc/0x128 [ 19.665361] __kasan_check_byte+0x54/0x70 [ 19.665466] ksize+0x30/0x88 [ 19.665696] ksize_uaf+0x168/0x5f8 [ 19.665798] kunit_try_run_case+0x170/0x3f0 [ 19.665976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.666187] kthread+0x328/0x630 [ 19.666245] ret_from_fork+0x10/0x20 [ 19.666314] [ 19.666357] Allocated by task 205: [ 19.666446] kasan_save_stack+0x3c/0x68 [ 19.666592] kasan_save_track+0x20/0x40 [ 19.666719] kasan_save_alloc_info+0x40/0x58 [ 19.666862] __kasan_kmalloc+0xd4/0xd8 [ 19.666957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.667049] ksize_uaf+0xb8/0x5f8 [ 19.667144] kunit_try_run_case+0x170/0x3f0 [ 19.667265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667404] kthread+0x328/0x630 [ 19.667481] ret_from_fork+0x10/0x20 [ 19.667570] [ 19.667620] Freed by task 205: [ 19.667678] kasan_save_stack+0x3c/0x68 [ 19.667790] kasan_save_track+0x20/0x40 [ 19.667922] kasan_save_free_info+0x4c/0x78 [ 19.668042] __kasan_slab_free+0x6c/0x98 [ 19.668158] kfree+0x214/0x3c8 [ 19.668253] ksize_uaf+0x11c/0x5f8 [ 19.668355] kunit_try_run_case+0x170/0x3f0 [ 19.668470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.668595] kthread+0x328/0x630 [ 19.668672] ret_from_fork+0x10/0x20 [ 19.668801] [ 19.668857] The buggy address belongs to the object at fff00000c6408300 [ 19.668857] which belongs to the cache kmalloc-128 of size 128 [ 19.668992] The buggy address is located 0 bytes inside of [ 19.668992] freed 128-byte region [fff00000c6408300, fff00000c6408380) [ 19.669128] [ 19.669192] The buggy address belongs to the physical page: [ 19.669599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.669732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669855] page_type: f5(slab) [ 19.669942] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.670085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.670200] page dumped because: kasan: bad access detected [ 19.670278] [ 19.670379] Memory state around the buggy address: [ 19.670465] fff00000c6408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.670752] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670878] >fff00000c6408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.671502] ^ [ 19.671671] fff00000c6408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.672032] fff00000c6408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.672151] ================================================================== [ 19.674290] ================================================================== [ 19.674406] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 19.674518] Read of size 1 at addr fff00000c6408300 by task kunit_try_catch/205 [ 19.674635] [ 19.674706] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.674926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.674999] Hardware name: linux,dummy-virt (DT) [ 19.675072] Call trace: [ 19.675127] show_stack+0x20/0x38 (C) [ 19.675234] dump_stack_lvl+0x8c/0xd0 [ 19.675345] print_report+0x118/0x608 [ 19.675454] kasan_report+0xdc/0x128 [ 19.675564] __asan_report_load1_noabort+0x20/0x30 [ 19.675677] ksize_uaf+0x598/0x5f8 [ 19.675774] kunit_try_run_case+0x170/0x3f0 [ 19.676788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.677114] kthread+0x328/0x630 [ 19.677214] ret_from_fork+0x10/0x20 [ 19.677314] [ 19.677517] Allocated by task 205: [ 19.677797] kasan_save_stack+0x3c/0x68 [ 19.677923] kasan_save_track+0x20/0x40 [ 19.678110] kasan_save_alloc_info+0x40/0x58 [ 19.678463] __kasan_kmalloc+0xd4/0xd8 [ 19.678640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.678867] ksize_uaf+0xb8/0x5f8 [ 19.679020] kunit_try_run_case+0x170/0x3f0 [ 19.679172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.679571] kthread+0x328/0x630 [ 19.679654] ret_from_fork+0x10/0x20 [ 19.679891] [ 19.679977] Freed by task 205: [ 19.680050] kasan_save_stack+0x3c/0x68 [ 19.680147] kasan_save_track+0x20/0x40 [ 19.680589] kasan_save_free_info+0x4c/0x78 [ 19.680736] __kasan_slab_free+0x6c/0x98 [ 19.680826] kfree+0x214/0x3c8 [ 19.680908] ksize_uaf+0x11c/0x5f8 [ 19.680992] kunit_try_run_case+0x170/0x3f0 [ 19.681548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.681737] kthread+0x328/0x630 [ 19.681826] ret_from_fork+0x10/0x20 [ 19.682011] [ 19.682115] The buggy address belongs to the object at fff00000c6408300 [ 19.682115] which belongs to the cache kmalloc-128 of size 128 [ 19.682349] The buggy address is located 0 bytes inside of [ 19.682349] freed 128-byte region [fff00000c6408300, fff00000c6408380) [ 19.682505] [ 19.682601] The buggy address belongs to the physical page: [ 19.682679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.682808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.682940] page_type: f5(slab) [ 19.683045] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.683177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.683280] page dumped because: kasan: bad access detected [ 19.683360] [ 19.683403] Memory state around the buggy address: [ 19.683475] fff00000c6408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.683590] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.683700] >fff00000c6408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.683798] ^ [ 19.684162] fff00000c6408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.684502] fff00000c6408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.684610] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 19.631701] ================================================================== [ 19.631815] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.631945] Read of size 1 at addr fff00000c6408278 by task kunit_try_catch/203 [ 19.632063] [ 19.632141] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.632430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.632514] Hardware name: linux,dummy-virt (DT) [ 19.632592] Call trace: [ 19.632644] show_stack+0x20/0x38 (C) [ 19.632761] dump_stack_lvl+0x8c/0xd0 [ 19.633970] print_report+0x118/0x608 [ 19.634221] kasan_report+0xdc/0x128 [ 19.634457] __asan_report_load1_noabort+0x20/0x30 [ 19.634693] ksize_unpoisons_memory+0x618/0x740 [ 19.635121] kunit_try_run_case+0x170/0x3f0 [ 19.635303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.635661] kthread+0x328/0x630 [ 19.635799] ret_from_fork+0x10/0x20 [ 19.635978] [ 19.636049] Allocated by task 203: [ 19.636127] kasan_save_stack+0x3c/0x68 [ 19.636226] kasan_save_track+0x20/0x40 [ 19.636321] kasan_save_alloc_info+0x40/0x58 [ 19.636428] __kasan_kmalloc+0xd4/0xd8 [ 19.636556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.636663] ksize_unpoisons_memory+0xc0/0x740 [ 19.636832] kunit_try_run_case+0x170/0x3f0 [ 19.636933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637045] kthread+0x328/0x630 [ 19.637136] ret_from_fork+0x10/0x20 [ 19.637230] [ 19.637392] The buggy address belongs to the object at fff00000c6408200 [ 19.637392] which belongs to the cache kmalloc-128 of size 128 [ 19.637664] The buggy address is located 5 bytes to the right of [ 19.637664] allocated 115-byte region [fff00000c6408200, fff00000c6408273) [ 19.637884] [ 19.637942] The buggy address belongs to the physical page: [ 19.638056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.638183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.638316] page_type: f5(slab) [ 19.638547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.638698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.638768] page dumped because: kasan: bad access detected [ 19.638812] [ 19.638856] Memory state around the buggy address: [ 19.638938] fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.639097] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.639247] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.639456] ^ [ 19.639617] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.639764] fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.639885] ================================================================== [ 19.623333] ================================================================== [ 19.623489] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.623626] Read of size 1 at addr fff00000c6408273 by task kunit_try_catch/203 [ 19.623755] [ 19.623864] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.624388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.624623] Hardware name: linux,dummy-virt (DT) [ 19.624826] Call trace: [ 19.624931] show_stack+0x20/0x38 (C) [ 19.625096] dump_stack_lvl+0x8c/0xd0 [ 19.625254] print_report+0x118/0x608 [ 19.625377] kasan_report+0xdc/0x128 [ 19.625503] __asan_report_load1_noabort+0x20/0x30 [ 19.625656] ksize_unpoisons_memory+0x628/0x740 [ 19.625777] kunit_try_run_case+0x170/0x3f0 [ 19.626165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.626322] kthread+0x328/0x630 [ 19.626469] ret_from_fork+0x10/0x20 [ 19.626622] [ 19.626683] Allocated by task 203: [ 19.626758] kasan_save_stack+0x3c/0x68 [ 19.626997] kasan_save_track+0x20/0x40 [ 19.627125] kasan_save_alloc_info+0x40/0x58 [ 19.627233] __kasan_kmalloc+0xd4/0xd8 [ 19.627328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.627430] ksize_unpoisons_memory+0xc0/0x740 [ 19.627559] kunit_try_run_case+0x170/0x3f0 [ 19.627680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.627813] kthread+0x328/0x630 [ 19.627923] ret_from_fork+0x10/0x20 [ 19.628004] [ 19.628055] The buggy address belongs to the object at fff00000c6408200 [ 19.628055] which belongs to the cache kmalloc-128 of size 128 [ 19.628253] The buggy address is located 0 bytes to the right of [ 19.628253] allocated 115-byte region [fff00000c6408200, fff00000c6408273) [ 19.628425] [ 19.628490] The buggy address belongs to the physical page: [ 19.628589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.628751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.628876] page_type: f5(slab) [ 19.628967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.629282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.629526] page dumped because: kasan: bad access detected [ 19.629612] [ 19.629656] Memory state around the buggy address: [ 19.629740] fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.630111] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630238] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.630372] ^ [ 19.630517] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630645] fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630750] ================================================================== [ 19.640794] ================================================================== [ 19.640918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.641044] Read of size 1 at addr fff00000c640827f by task kunit_try_catch/203 [ 19.641175] [ 19.641255] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.641461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.641536] Hardware name: linux,dummy-virt (DT) [ 19.641618] Call trace: [ 19.641677] show_stack+0x20/0x38 (C) [ 19.641795] dump_stack_lvl+0x8c/0xd0 [ 19.642394] print_report+0x118/0x608 [ 19.642702] kasan_report+0xdc/0x128 [ 19.642844] __asan_report_load1_noabort+0x20/0x30 [ 19.642954] ksize_unpoisons_memory+0x690/0x740 [ 19.643494] kunit_try_run_case+0x170/0x3f0 [ 19.643831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.644132] kthread+0x328/0x630 [ 19.644334] ret_from_fork+0x10/0x20 [ 19.644584] [ 19.644637] Allocated by task 203: [ 19.644826] kasan_save_stack+0x3c/0x68 [ 19.645174] kasan_save_track+0x20/0x40 [ 19.645418] kasan_save_alloc_info+0x40/0x58 [ 19.645537] __kasan_kmalloc+0xd4/0xd8 [ 19.645631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.645733] ksize_unpoisons_memory+0xc0/0x740 [ 19.646151] kunit_try_run_case+0x170/0x3f0 [ 19.646561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.646896] kthread+0x328/0x630 [ 19.647239] ret_from_fork+0x10/0x20 [ 19.647646] [ 19.647765] The buggy address belongs to the object at fff00000c6408200 [ 19.647765] which belongs to the cache kmalloc-128 of size 128 [ 19.648409] The buggy address is located 12 bytes to the right of [ 19.648409] allocated 115-byte region [fff00000c6408200, fff00000c6408273) [ 19.648700] [ 19.648771] The buggy address belongs to the physical page: [ 19.648854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.649027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.649780] page_type: f5(slab) [ 19.649923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.650052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.650140] page dumped because: kasan: bad access detected [ 19.650209] [ 19.650248] Memory state around the buggy address: [ 19.650326] fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.650440] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650602] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.650804] ^ [ 19.650967] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.651177] fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.651381] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 19.598045] ================================================================== [ 19.598633] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 19.598798] Free of addr fff00000c63971c0 by task kunit_try_catch/201 [ 19.598899] [ 19.599150] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.599416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.599488] Hardware name: linux,dummy-virt (DT) [ 19.599592] Call trace: [ 19.599653] show_stack+0x20/0x38 (C) [ 19.599799] dump_stack_lvl+0x8c/0xd0 [ 19.599918] print_report+0x118/0x608 [ 19.600024] kasan_report_invalid_free+0xc0/0xe8 [ 19.600136] check_slab_allocation+0xd4/0x108 [ 19.600291] __kasan_slab_pre_free+0x2c/0x48 [ 19.600547] kfree+0xe8/0x3c8 [ 19.600745] kfree_sensitive+0x3c/0xb0 [ 19.600884] kmalloc_double_kzfree+0x168/0x308 [ 19.601030] kunit_try_run_case+0x170/0x3f0 [ 19.601172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.601307] kthread+0x328/0x630 [ 19.601411] ret_from_fork+0x10/0x20 [ 19.601549] [ 19.601592] Allocated by task 201: [ 19.601660] kasan_save_stack+0x3c/0x68 [ 19.601753] kasan_save_track+0x20/0x40 [ 19.601866] kasan_save_alloc_info+0x40/0x58 [ 19.602229] __kasan_kmalloc+0xd4/0xd8 [ 19.602354] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.602462] kmalloc_double_kzfree+0xb8/0x308 [ 19.602559] kunit_try_run_case+0x170/0x3f0 [ 19.602658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.602767] kthread+0x328/0x630 [ 19.602870] ret_from_fork+0x10/0x20 [ 19.602969] [ 19.603019] Freed by task 201: [ 19.603086] kasan_save_stack+0x3c/0x68 [ 19.603182] kasan_save_track+0x20/0x40 [ 19.603283] kasan_save_free_info+0x4c/0x78 [ 19.603376] __kasan_slab_free+0x6c/0x98 [ 19.603468] kfree+0x214/0x3c8 [ 19.603562] kfree_sensitive+0x80/0xb0 [ 19.603650] kmalloc_double_kzfree+0x11c/0x308 [ 19.604084] kunit_try_run_case+0x170/0x3f0 [ 19.604230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.604343] kthread+0x328/0x630 [ 19.604426] ret_from_fork+0x10/0x20 [ 19.604514] [ 19.604565] The buggy address belongs to the object at fff00000c63971c0 [ 19.604565] which belongs to the cache kmalloc-16 of size 16 [ 19.604710] The buggy address is located 0 bytes inside of [ 19.604710] 16-byte region [fff00000c63971c0, fff00000c63971d0) [ 19.605058] [ 19.605121] The buggy address belongs to the physical page: [ 19.605206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 19.605339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.605446] page_type: f5(slab) [ 19.605527] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.605801] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.606163] page dumped because: kasan: bad access detected [ 19.606261] [ 19.606341] Memory state around the buggy address: [ 19.606447] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.606590] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.606702] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 19.606797] ^ [ 19.606893] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.607014] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.607115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 19.577949] ================================================================== [ 19.578481] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 19.579163] Read of size 1 at addr fff00000c63971c0 by task kunit_try_catch/201 [ 19.579551] [ 19.579910] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.580135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.580197] Hardware name: linux,dummy-virt (DT) [ 19.580270] Call trace: [ 19.580323] show_stack+0x20/0x38 (C) [ 19.580443] dump_stack_lvl+0x8c/0xd0 [ 19.580547] print_report+0x118/0x608 [ 19.580653] kasan_report+0xdc/0x128 [ 19.580752] __kasan_check_byte+0x54/0x70 [ 19.582446] kfree_sensitive+0x30/0xb0 [ 19.582710] kmalloc_double_kzfree+0x168/0x308 [ 19.583102] kunit_try_run_case+0x170/0x3f0 [ 19.583341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.584201] kthread+0x328/0x630 [ 19.584476] ret_from_fork+0x10/0x20 [ 19.584623] [ 19.584730] Allocated by task 201: [ 19.584893] kasan_save_stack+0x3c/0x68 [ 19.585069] kasan_save_track+0x20/0x40 [ 19.585212] kasan_save_alloc_info+0x40/0x58 [ 19.585307] __kasan_kmalloc+0xd4/0xd8 [ 19.585577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.585688] kmalloc_double_kzfree+0xb8/0x308 [ 19.586253] kunit_try_run_case+0x170/0x3f0 [ 19.586399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.586749] kthread+0x328/0x630 [ 19.587141] ret_from_fork+0x10/0x20 [ 19.587278] [ 19.587326] Freed by task 201: [ 19.587651] kasan_save_stack+0x3c/0x68 [ 19.587779] kasan_save_track+0x20/0x40 [ 19.587878] kasan_save_free_info+0x4c/0x78 [ 19.587972] __kasan_slab_free+0x6c/0x98 [ 19.588059] kfree+0x214/0x3c8 [ 19.588139] kfree_sensitive+0x80/0xb0 [ 19.588223] kmalloc_double_kzfree+0x11c/0x308 [ 19.588317] kunit_try_run_case+0x170/0x3f0 [ 19.588407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588515] kthread+0x328/0x630 [ 19.588594] ret_from_fork+0x10/0x20 [ 19.588675] [ 19.588723] The buggy address belongs to the object at fff00000c63971c0 [ 19.588723] which belongs to the cache kmalloc-16 of size 16 [ 19.589567] The buggy address is located 0 bytes inside of [ 19.589567] freed 16-byte region [fff00000c63971c0, fff00000c63971d0) [ 19.589931] [ 19.590008] The buggy address belongs to the physical page: [ 19.590166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 19.590533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.590814] page_type: f5(slab) [ 19.591907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.592124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.592517] page dumped because: kasan: bad access detected [ 19.592868] [ 19.592932] Memory state around the buggy address: [ 19.593016] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.593110] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.593213] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 19.593779] ^ [ 19.593989] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.594583] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.594859] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 19.524850] ================================================================== [ 19.525067] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 19.525285] Read of size 1 at addr fff00000c640bfa8 by task kunit_try_catch/197 [ 19.525461] [ 19.525553] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.525755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.525825] Hardware name: linux,dummy-virt (DT) [ 19.525925] Call trace: [ 19.526359] show_stack+0x20/0x38 (C) [ 19.526698] dump_stack_lvl+0x8c/0xd0 [ 19.526855] print_report+0x118/0x608 [ 19.527050] kasan_report+0xdc/0x128 [ 19.527279] __asan_report_load1_noabort+0x20/0x30 [ 19.527508] kmalloc_uaf2+0x3f4/0x468 [ 19.527724] kunit_try_run_case+0x170/0x3f0 [ 19.528165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.528437] kthread+0x328/0x630 [ 19.528586] ret_from_fork+0x10/0x20 [ 19.528716] [ 19.528769] Allocated by task 197: [ 19.528853] kasan_save_stack+0x3c/0x68 [ 19.528962] kasan_save_track+0x20/0x40 [ 19.529063] kasan_save_alloc_info+0x40/0x58 [ 19.529169] __kasan_kmalloc+0xd4/0xd8 [ 19.529260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.529362] kmalloc_uaf2+0xc4/0x468 [ 19.529448] kunit_try_run_case+0x170/0x3f0 [ 19.529862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530076] kthread+0x328/0x630 [ 19.530175] ret_from_fork+0x10/0x20 [ 19.530266] [ 19.530368] Freed by task 197: [ 19.530471] kasan_save_stack+0x3c/0x68 [ 19.530669] kasan_save_track+0x20/0x40 [ 19.531006] kasan_save_free_info+0x4c/0x78 [ 19.531190] __kasan_slab_free+0x6c/0x98 [ 19.531309] kfree+0x214/0x3c8 [ 19.531397] kmalloc_uaf2+0x134/0x468 [ 19.531493] kunit_try_run_case+0x170/0x3f0 [ 19.531591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.532192] kthread+0x328/0x630 [ 19.532415] ret_from_fork+0x10/0x20 [ 19.532748] [ 19.532805] The buggy address belongs to the object at fff00000c640bf80 [ 19.532805] which belongs to the cache kmalloc-64 of size 64 [ 19.533106] The buggy address is located 40 bytes inside of [ 19.533106] freed 64-byte region [fff00000c640bf80, fff00000c640bfc0) [ 19.533384] [ 19.533438] The buggy address belongs to the physical page: [ 19.533515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b [ 19.533642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.534160] page_type: f5(slab) [ 19.534382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.534842] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 19.535058] page dumped because: kasan: bad access detected [ 19.535199] [ 19.535320] Memory state around the buggy address: [ 19.535413] fff00000c640be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535547] fff00000c640bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535665] >fff00000c640bf80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535773] ^ [ 19.535865] fff00000c640c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535973] fff00000c640c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.536075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 19.497241] ================================================================== [ 19.497402] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 19.497539] Write of size 33 at addr fff00000c640be00 by task kunit_try_catch/195 [ 19.497668] [ 19.497755] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.497979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.498055] Hardware name: linux,dummy-virt (DT) [ 19.498140] Call trace: [ 19.498202] show_stack+0x20/0x38 (C) [ 19.498325] dump_stack_lvl+0x8c/0xd0 [ 19.498446] print_report+0x118/0x608 [ 19.498560] kasan_report+0xdc/0x128 [ 19.498682] kasan_check_range+0x100/0x1a8 [ 19.498883] __asan_memset+0x34/0x78 [ 19.498993] kmalloc_uaf_memset+0x170/0x310 [ 19.499096] kunit_try_run_case+0x170/0x3f0 [ 19.499209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.499327] kthread+0x328/0x630 [ 19.499434] ret_from_fork+0x10/0x20 [ 19.499548] [ 19.499612] Allocated by task 195: [ 19.499704] kasan_save_stack+0x3c/0x68 [ 19.499798] kasan_save_track+0x20/0x40 [ 19.499940] kasan_save_alloc_info+0x40/0x58 [ 19.500065] __kasan_kmalloc+0xd4/0xd8 [ 19.500194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.500295] kmalloc_uaf_memset+0xb8/0x310 [ 19.500415] kunit_try_run_case+0x170/0x3f0 [ 19.500530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.500660] kthread+0x328/0x630 [ 19.500759] ret_from_fork+0x10/0x20 [ 19.500896] [ 19.500939] Freed by task 195: [ 19.500997] kasan_save_stack+0x3c/0x68 [ 19.501074] kasan_save_track+0x20/0x40 [ 19.501155] kasan_save_free_info+0x4c/0x78 [ 19.501236] __kasan_slab_free+0x6c/0x98 [ 19.501356] kfree+0x214/0x3c8 [ 19.501451] kmalloc_uaf_memset+0x11c/0x310 [ 19.501552] kunit_try_run_case+0x170/0x3f0 [ 19.501658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501759] kthread+0x328/0x630 [ 19.501870] ret_from_fork+0x10/0x20 [ 19.501961] [ 19.502010] The buggy address belongs to the object at fff00000c640be00 [ 19.502010] which belongs to the cache kmalloc-64 of size 64 [ 19.502156] The buggy address is located 0 bytes inside of [ 19.502156] freed 64-byte region [fff00000c640be00, fff00000c640be40) [ 19.502288] [ 19.502370] The buggy address belongs to the physical page: [ 19.502425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b [ 19.502501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.502570] page_type: f5(slab) [ 19.502628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.502692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.502747] page dumped because: kasan: bad access detected [ 19.502785] [ 19.502811] Memory state around the buggy address: [ 19.502887] fff00000c640bd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.503001] fff00000c640bd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.503161] >fff00000c640be00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.503347] ^ [ 19.503426] fff00000c640be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.503544] fff00000c640bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.503650] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 19.463613] ================================================================== [ 19.463776] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 19.464881] Read of size 1 at addr fff00000c63971a8 by task kunit_try_catch/193 [ 19.465134] [ 19.465233] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.465468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.465540] Hardware name: linux,dummy-virt (DT) [ 19.465620] Call trace: [ 19.465674] show_stack+0x20/0x38 (C) [ 19.465785] dump_stack_lvl+0x8c/0xd0 [ 19.465913] print_report+0x118/0x608 [ 19.466011] kasan_report+0xdc/0x128 [ 19.466113] __asan_report_load1_noabort+0x20/0x30 [ 19.466243] kmalloc_uaf+0x300/0x338 [ 19.466382] kunit_try_run_case+0x170/0x3f0 [ 19.466519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.466682] kthread+0x328/0x630 [ 19.466788] ret_from_fork+0x10/0x20 [ 19.466920] [ 19.466979] Allocated by task 193: [ 19.467083] kasan_save_stack+0x3c/0x68 [ 19.467177] kasan_save_track+0x20/0x40 [ 19.467269] kasan_save_alloc_info+0x40/0x58 [ 19.467387] __kasan_kmalloc+0xd4/0xd8 [ 19.467471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.467569] kmalloc_uaf+0xb8/0x338 [ 19.467655] kunit_try_run_case+0x170/0x3f0 [ 19.467776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.467929] kthread+0x328/0x630 [ 19.468032] ret_from_fork+0x10/0x20 [ 19.468146] [ 19.468210] Freed by task 193: [ 19.468308] kasan_save_stack+0x3c/0x68 [ 19.468425] kasan_save_track+0x20/0x40 [ 19.468530] kasan_save_free_info+0x4c/0x78 [ 19.468617] __kasan_slab_free+0x6c/0x98 [ 19.468740] kfree+0x214/0x3c8 [ 19.468820] kmalloc_uaf+0x11c/0x338 [ 19.468903] kunit_try_run_case+0x170/0x3f0 [ 19.469025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.469137] kthread+0x328/0x630 [ 19.469221] ret_from_fork+0x10/0x20 [ 19.469373] [ 19.469470] The buggy address belongs to the object at fff00000c63971a0 [ 19.469470] which belongs to the cache kmalloc-16 of size 16 [ 19.469682] The buggy address is located 8 bytes inside of [ 19.469682] freed 16-byte region [fff00000c63971a0, fff00000c63971b0) [ 19.469848] [ 19.469896] The buggy address belongs to the physical page: [ 19.470224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 19.470459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.470722] page_type: f5(slab) [ 19.470905] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.471126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.471276] page dumped because: kasan: bad access detected [ 19.471364] [ 19.471413] Memory state around the buggy address: [ 19.471496] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.472193] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.472365] >fff00000c6397180: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 19.472672] ^ [ 19.472770] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.473193] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.473613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 19.437789] ================================================================== [ 19.438000] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.438382] Read of size 64 at addr fff00000c640bb04 by task kunit_try_catch/191 [ 19.438500] [ 19.438586] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.438818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.438906] Hardware name: linux,dummy-virt (DT) [ 19.439139] Call trace: [ 19.439208] show_stack+0x20/0x38 (C) [ 19.439320] dump_stack_lvl+0x8c/0xd0 [ 19.439438] print_report+0x118/0x608 [ 19.439540] kasan_report+0xdc/0x128 [ 19.440019] kasan_check_range+0x100/0x1a8 [ 19.440334] __asan_memmove+0x3c/0x98 [ 19.440580] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.440794] kunit_try_run_case+0x170/0x3f0 [ 19.440961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.441118] kthread+0x328/0x630 [ 19.441204] ret_from_fork+0x10/0x20 [ 19.441305] [ 19.441347] Allocated by task 191: [ 19.441415] kasan_save_stack+0x3c/0x68 [ 19.441526] kasan_save_track+0x20/0x40 [ 19.441607] kasan_save_alloc_info+0x40/0x58 [ 19.442014] __kasan_kmalloc+0xd4/0xd8 [ 19.442144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.442243] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 19.442339] kunit_try_run_case+0x170/0x3f0 [ 19.442424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.442524] kthread+0x328/0x630 [ 19.442597] ret_from_fork+0x10/0x20 [ 19.442675] [ 19.442723] The buggy address belongs to the object at fff00000c640bb00 [ 19.442723] which belongs to the cache kmalloc-64 of size 64 [ 19.442876] The buggy address is located 4 bytes inside of [ 19.442876] allocated 64-byte region [fff00000c640bb00, fff00000c640bb40) [ 19.443041] [ 19.443104] The buggy address belongs to the physical page: [ 19.443204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b [ 19.443372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443527] page_type: f5(slab) [ 19.443636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443899] page dumped because: kasan: bad access detected [ 19.443967] [ 19.444012] Memory state around the buggy address: [ 19.444092] fff00000c640ba00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.444548] fff00000c640ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444669] >fff00000c640bb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.444846] ^ [ 19.444935] fff00000c640bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444989] fff00000c640bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.445032] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 19.420134] ================================================================== [ 19.420344] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.420946] Read of size 18446744073709551614 at addr fff00000c640b904 by task kunit_try_catch/189 [ 19.421440] [ 19.421548] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.422331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.422414] Hardware name: linux,dummy-virt (DT) [ 19.422508] Call trace: [ 19.422567] show_stack+0x20/0x38 (C) [ 19.422692] dump_stack_lvl+0x8c/0xd0 [ 19.422822] print_report+0x118/0x608 [ 19.422973] kasan_report+0xdc/0x128 [ 19.423109] kasan_check_range+0x100/0x1a8 [ 19.423259] __asan_memmove+0x3c/0x98 [ 19.423400] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.423515] kunit_try_run_case+0x170/0x3f0 [ 19.423657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.423816] kthread+0x328/0x630 [ 19.424090] ret_from_fork+0x10/0x20 [ 19.424211] [ 19.424255] Allocated by task 189: [ 19.424332] kasan_save_stack+0x3c/0x68 [ 19.424442] kasan_save_track+0x20/0x40 [ 19.424539] kasan_save_alloc_info+0x40/0x58 [ 19.424625] __kasan_kmalloc+0xd4/0xd8 [ 19.424701] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.424790] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 19.424906] kunit_try_run_case+0x170/0x3f0 [ 19.424997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.425103] kthread+0x328/0x630 [ 19.425182] ret_from_fork+0x10/0x20 [ 19.425280] [ 19.425346] The buggy address belongs to the object at fff00000c640b900 [ 19.425346] which belongs to the cache kmalloc-64 of size 64 [ 19.425548] The buggy address is located 4 bytes inside of [ 19.425548] 64-byte region [fff00000c640b900, fff00000c640b940) [ 19.425745] [ 19.425825] The buggy address belongs to the physical page: [ 19.425910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640b [ 19.426037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.426158] page_type: f5(slab) [ 19.426249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.426353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.426438] page dumped because: kasan: bad access detected [ 19.426507] [ 19.426548] Memory state around the buggy address: [ 19.426667] fff00000c640b800: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 19.426770] fff00000c640b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.426882] >fff00000c640b900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.426984] ^ [ 19.427070] fff00000c640b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.427220] fff00000c640ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.427331] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 19.372410] ================================================================== [ 19.372570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 19.372712] Write of size 16 at addr fff00000c6408169 by task kunit_try_catch/187 [ 19.374532] [ 19.374800] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.375683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.375912] Hardware name: linux,dummy-virt (DT) [ 19.376165] Call trace: [ 19.376292] show_stack+0x20/0x38 (C) [ 19.376928] dump_stack_lvl+0x8c/0xd0 [ 19.377166] print_report+0x118/0x608 [ 19.377458] kasan_report+0xdc/0x128 [ 19.377584] kasan_check_range+0x100/0x1a8 [ 19.377689] __asan_memset+0x34/0x78 [ 19.377776] kmalloc_oob_memset_16+0x150/0x2f8 [ 19.377909] kunit_try_run_case+0x170/0x3f0 [ 19.378646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.379592] kthread+0x328/0x630 [ 19.380017] ret_from_fork+0x10/0x20 [ 19.380243] [ 19.380491] Allocated by task 187: [ 19.380593] kasan_save_stack+0x3c/0x68 [ 19.381058] kasan_save_track+0x20/0x40 [ 19.381291] kasan_save_alloc_info+0x40/0x58 [ 19.381379] __kasan_kmalloc+0xd4/0xd8 [ 19.381460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.381536] kmalloc_oob_memset_16+0xb0/0x2f8 [ 19.381605] kunit_try_run_case+0x170/0x3f0 [ 19.381678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381768] kthread+0x328/0x630 [ 19.383290] ret_from_fork+0x10/0x20 [ 19.383827] [ 19.384401] The buggy address belongs to the object at fff00000c6408100 [ 19.384401] which belongs to the cache kmalloc-128 of size 128 [ 19.384585] The buggy address is located 105 bytes inside of [ 19.384585] allocated 120-byte region [fff00000c6408100, fff00000c6408178) [ 19.385360] [ 19.385419] The buggy address belongs to the physical page: [ 19.385499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.386566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.387172] page_type: f5(slab) [ 19.387282] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.387406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.387509] page dumped because: kasan: bad access detected [ 19.387585] [ 19.387629] Memory state around the buggy address: [ 19.387706] fff00000c6408000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.387809] fff00000c6408080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.387923] >fff00000c6408100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.388018] ^ [ 19.388117] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.388215] fff00000c6408200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.388311] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 19.334362] ================================================================== [ 19.334543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 19.334700] Write of size 8 at addr fff00000c6408071 by task kunit_try_catch/185 [ 19.334822] [ 19.334926] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.335150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.335218] Hardware name: linux,dummy-virt (DT) [ 19.335296] Call trace: [ 19.335352] show_stack+0x20/0x38 (C) [ 19.335467] dump_stack_lvl+0x8c/0xd0 [ 19.335572] print_report+0x118/0x608 [ 19.335675] kasan_report+0xdc/0x128 [ 19.335782] kasan_check_range+0x100/0x1a8 [ 19.335891] __asan_memset+0x34/0x78 [ 19.335985] kmalloc_oob_memset_8+0x150/0x2f8 [ 19.336080] kunit_try_run_case+0x170/0x3f0 [ 19.336173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.336304] kthread+0x328/0x630 [ 19.336403] ret_from_fork+0x10/0x20 [ 19.336519] [ 19.336562] Allocated by task 185: [ 19.336628] kasan_save_stack+0x3c/0x68 [ 19.336729] kasan_save_track+0x20/0x40 [ 19.336880] kasan_save_alloc_info+0x40/0x58 [ 19.337008] __kasan_kmalloc+0xd4/0xd8 [ 19.337096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.337202] kmalloc_oob_memset_8+0xb0/0x2f8 [ 19.337327] kunit_try_run_case+0x170/0x3f0 [ 19.337433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.337522] kthread+0x328/0x630 [ 19.337592] ret_from_fork+0x10/0x20 [ 19.337675] [ 19.337726] The buggy address belongs to the object at fff00000c6408000 [ 19.337726] which belongs to the cache kmalloc-128 of size 128 [ 19.337879] The buggy address is located 113 bytes inside of [ 19.337879] allocated 120-byte region [fff00000c6408000, fff00000c6408078) [ 19.338024] [ 19.338068] The buggy address belongs to the physical page: [ 19.338174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.338359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.338546] page_type: f5(slab) [ 19.338705] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.338943] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.339575] page dumped because: kasan: bad access detected [ 19.339784] [ 19.339868] Memory state around the buggy address: [ 19.340475] fff00000c6407f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.340589] fff00000c6407f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.341142] >fff00000c6408000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.341789] ^ [ 19.342375] fff00000c6408080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342539] fff00000c6408100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342665] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 19.301530] ================================================================== [ 19.301907] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 19.302098] Write of size 4 at addr fff00000c6399f75 by task kunit_try_catch/183 [ 19.302254] [ 19.302374] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.302600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.302686] Hardware name: linux,dummy-virt (DT) [ 19.302790] Call trace: [ 19.303056] show_stack+0x20/0x38 (C) [ 19.303458] dump_stack_lvl+0x8c/0xd0 [ 19.303569] print_report+0x118/0x608 [ 19.304003] kasan_report+0xdc/0x128 [ 19.304109] kasan_check_range+0x100/0x1a8 [ 19.304219] __asan_memset+0x34/0x78 [ 19.304316] kmalloc_oob_memset_4+0x150/0x300 [ 19.304423] kunit_try_run_case+0x170/0x3f0 [ 19.304529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.304643] kthread+0x328/0x630 [ 19.304731] ret_from_fork+0x10/0x20 [ 19.304855] [ 19.304901] Allocated by task 183: [ 19.305168] kasan_save_stack+0x3c/0x68 [ 19.305382] kasan_save_track+0x20/0x40 [ 19.305559] kasan_save_alloc_info+0x40/0x58 [ 19.305660] __kasan_kmalloc+0xd4/0xd8 [ 19.305756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.306581] kmalloc_oob_memset_4+0xb0/0x300 [ 19.306848] kunit_try_run_case+0x170/0x3f0 [ 19.307027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.307241] kthread+0x328/0x630 [ 19.307365] ret_from_fork+0x10/0x20 [ 19.307534] [ 19.307584] The buggy address belongs to the object at fff00000c6399f00 [ 19.307584] which belongs to the cache kmalloc-128 of size 128 [ 19.308034] The buggy address is located 117 bytes inside of [ 19.308034] allocated 120-byte region [fff00000c6399f00, fff00000c6399f78) [ 19.308221] [ 19.308280] The buggy address belongs to the physical page: [ 19.308358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 19.308579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.308844] page_type: f5(slab) [ 19.309065] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.309394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.309507] page dumped because: kasan: bad access detected [ 19.309600] [ 19.309646] Memory state around the buggy address: [ 19.309730] fff00000c6399e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.310897] fff00000c6399e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.311021] >fff00000c6399f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.311124] ^ [ 19.311499] fff00000c6399f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.311610] fff00000c639a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.311830] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 19.268115] ================================================================== [ 19.268256] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 19.268388] Write of size 2 at addr fff00000c6399e77 by task kunit_try_catch/181 [ 19.269071] [ 19.269613] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.270642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.270818] Hardware name: linux,dummy-virt (DT) [ 19.270981] Call trace: [ 19.271146] show_stack+0x20/0x38 (C) [ 19.271375] dump_stack_lvl+0x8c/0xd0 [ 19.271495] print_report+0x118/0x608 [ 19.271622] kasan_report+0xdc/0x128 [ 19.271974] kasan_check_range+0x100/0x1a8 [ 19.272315] __asan_memset+0x34/0x78 [ 19.272428] kmalloc_oob_memset_2+0x150/0x2f8 [ 19.273233] kunit_try_run_case+0x170/0x3f0 [ 19.273353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.273469] kthread+0x328/0x630 [ 19.273568] ret_from_fork+0x10/0x20 [ 19.274183] [ 19.274276] Allocated by task 181: [ 19.274362] kasan_save_stack+0x3c/0x68 [ 19.274469] kasan_save_track+0x20/0x40 [ 19.274558] kasan_save_alloc_info+0x40/0x58 [ 19.274641] __kasan_kmalloc+0xd4/0xd8 [ 19.274730] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.274830] kmalloc_oob_memset_2+0xb0/0x2f8 [ 19.274933] kunit_try_run_case+0x170/0x3f0 [ 19.275028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.276768] kthread+0x328/0x630 [ 19.276889] ret_from_fork+0x10/0x20 [ 19.277967] [ 19.278160] The buggy address belongs to the object at fff00000c6399e00 [ 19.278160] which belongs to the cache kmalloc-128 of size 128 [ 19.278407] The buggy address is located 119 bytes inside of [ 19.278407] allocated 120-byte region [fff00000c6399e00, fff00000c6399e78) [ 19.279101] [ 19.279320] The buggy address belongs to the physical page: [ 19.279460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 19.279711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.279881] page_type: f5(slab) [ 19.280136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.280562] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.281009] page dumped because: kasan: bad access detected [ 19.281089] [ 19.281132] Memory state around the buggy address: [ 19.281205] fff00000c6399d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.281304] fff00000c6399d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.281405] >fff00000c6399e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.281501] ^ [ 19.282927] fff00000c6399e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.283158] fff00000c6399f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.283566] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 19.238629] ================================================================== [ 19.238784] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 19.238926] Write of size 128 at addr fff00000c6399d00 by task kunit_try_catch/179 [ 19.239049] [ 19.239138] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.239347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.239412] Hardware name: linux,dummy-virt (DT) [ 19.239486] Call trace: [ 19.239541] show_stack+0x20/0x38 (C) [ 19.239656] dump_stack_lvl+0x8c/0xd0 [ 19.239760] print_report+0x118/0x608 [ 19.239877] kasan_report+0xdc/0x128 [ 19.239976] kasan_check_range+0x100/0x1a8 [ 19.240391] __asan_memset+0x34/0x78 [ 19.240533] kmalloc_oob_in_memset+0x144/0x2d0 [ 19.240675] kunit_try_run_case+0x170/0x3f0 [ 19.240818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.240939] kthread+0x328/0x630 [ 19.241041] ret_from_fork+0x10/0x20 [ 19.241153] [ 19.241346] Allocated by task 179: [ 19.241485] kasan_save_stack+0x3c/0x68 [ 19.241967] kasan_save_track+0x20/0x40 [ 19.242057] kasan_save_alloc_info+0x40/0x58 [ 19.242139] __kasan_kmalloc+0xd4/0xd8 [ 19.242246] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.242334] kmalloc_oob_in_memset+0xb0/0x2d0 [ 19.242420] kunit_try_run_case+0x170/0x3f0 [ 19.242600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.242950] kthread+0x328/0x630 [ 19.243101] ret_from_fork+0x10/0x20 [ 19.243182] [ 19.243229] The buggy address belongs to the object at fff00000c6399d00 [ 19.243229] which belongs to the cache kmalloc-128 of size 128 [ 19.243413] The buggy address is located 0 bytes inside of [ 19.243413] allocated 120-byte region [fff00000c6399d00, fff00000c6399d78) [ 19.243603] [ 19.243905] The buggy address belongs to the physical page: [ 19.243987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 19.244267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.244971] page_type: f5(slab) [ 19.245088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.245206] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.245305] page dumped because: kasan: bad access detected [ 19.245376] [ 19.245419] Memory state around the buggy address: [ 19.246637] fff00000c6399c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.246952] fff00000c6399c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.247138] >fff00000c6399d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.247229] ^ [ 19.248106] fff00000c6399d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.248446] fff00000c6399e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.248648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 19.203449] ================================================================== [ 19.203592] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 19.203722] Read of size 16 at addr fff00000c6397180 by task kunit_try_catch/177 [ 19.204349] [ 19.204605] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.205548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.205628] Hardware name: linux,dummy-virt (DT) [ 19.205728] Call trace: [ 19.205790] show_stack+0x20/0x38 (C) [ 19.205941] dump_stack_lvl+0x8c/0xd0 [ 19.206051] print_report+0x118/0x608 [ 19.206164] kasan_report+0xdc/0x128 [ 19.206438] __asan_report_load16_noabort+0x20/0x30 [ 19.206573] kmalloc_uaf_16+0x3bc/0x438 [ 19.206684] kunit_try_run_case+0x170/0x3f0 [ 19.206798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.206920] kthread+0x328/0x630 [ 19.207160] ret_from_fork+0x10/0x20 [ 19.207311] [ 19.207359] Allocated by task 177: [ 19.207443] kasan_save_stack+0x3c/0x68 [ 19.207597] kasan_save_track+0x20/0x40 [ 19.207723] kasan_save_alloc_info+0x40/0x58 [ 19.208080] __kasan_kmalloc+0xd4/0xd8 [ 19.208277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.208395] kmalloc_uaf_16+0x140/0x438 [ 19.208486] kunit_try_run_case+0x170/0x3f0 [ 19.208577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.208688] kthread+0x328/0x630 [ 19.208773] ret_from_fork+0x10/0x20 [ 19.208886] [ 19.208937] Freed by task 177: [ 19.209006] kasan_save_stack+0x3c/0x68 [ 19.209101] kasan_save_track+0x20/0x40 [ 19.209194] kasan_save_free_info+0x4c/0x78 [ 19.209284] __kasan_slab_free+0x6c/0x98 [ 19.209375] kfree+0x214/0x3c8 [ 19.209455] kmalloc_uaf_16+0x190/0x438 [ 19.209539] kunit_try_run_case+0x170/0x3f0 [ 19.210313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.210539] kthread+0x328/0x630 [ 19.210716] ret_from_fork+0x10/0x20 [ 19.210913] [ 19.211158] The buggy address belongs to the object at fff00000c6397180 [ 19.211158] which belongs to the cache kmalloc-16 of size 16 [ 19.211300] The buggy address is located 0 bytes inside of [ 19.211300] freed 16-byte region [fff00000c6397180, fff00000c6397190) [ 19.211445] [ 19.211494] The buggy address belongs to the physical page: [ 19.211563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 19.211705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.211873] page_type: f5(slab) [ 19.212004] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.212159] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.212284] page dumped because: kasan: bad access detected [ 19.212379] [ 19.212433] Memory state around the buggy address: [ 19.212525] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.212634] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 19.212769] >fff00000c6397180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.212898] ^ [ 19.212966] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.213081] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.213167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 19.177969] ================================================================== [ 19.178114] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 19.178245] Write of size 16 at addr fff00000c6397120 by task kunit_try_catch/175 [ 19.178780] [ 19.178955] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.179211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.179298] Hardware name: linux,dummy-virt (DT) [ 19.179379] Call trace: [ 19.179432] show_stack+0x20/0x38 (C) [ 19.179552] dump_stack_lvl+0x8c/0xd0 [ 19.179654] print_report+0x118/0x608 [ 19.179751] kasan_report+0xdc/0x128 [ 19.179866] __asan_report_store16_noabort+0x20/0x30 [ 19.179982] kmalloc_oob_16+0x3a0/0x3f8 [ 19.180085] kunit_try_run_case+0x170/0x3f0 [ 19.180193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.180310] kthread+0x328/0x630 [ 19.180406] ret_from_fork+0x10/0x20 [ 19.180515] [ 19.180555] Allocated by task 175: [ 19.180617] kasan_save_stack+0x3c/0x68 [ 19.180704] kasan_save_track+0x20/0x40 [ 19.180827] kasan_save_alloc_info+0x40/0x58 [ 19.180912] __kasan_kmalloc+0xd4/0xd8 [ 19.181146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.181422] kmalloc_oob_16+0xb4/0x3f8 [ 19.181633] kunit_try_run_case+0x170/0x3f0 [ 19.181796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.181933] kthread+0x328/0x630 [ 19.182048] ret_from_fork+0x10/0x20 [ 19.182139] [ 19.182196] The buggy address belongs to the object at fff00000c6397120 [ 19.182196] which belongs to the cache kmalloc-16 of size 16 [ 19.182398] The buggy address is located 0 bytes inside of [ 19.182398] allocated 13-byte region [fff00000c6397120, fff00000c639712d) [ 19.182540] [ 19.182581] The buggy address belongs to the physical page: [ 19.182644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 19.182771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.183092] page_type: f5(slab) [ 19.183229] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.183396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.183529] page dumped because: kasan: bad access detected [ 19.183636] [ 19.183679] Memory state around the buggy address: [ 19.183755] fff00000c6397000: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.183889] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.184041] >fff00000c6397100: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 19.184176] ^ [ 19.184284] fff00000c6397180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184388] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184514] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 19.127877] ================================================================== [ 19.128135] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 19.128401] Read of size 1 at addr fff00000c604d400 by task kunit_try_catch/173 [ 19.128553] [ 19.128646] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.128929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.129006] Hardware name: linux,dummy-virt (DT) [ 19.129286] Call trace: [ 19.129444] show_stack+0x20/0x38 (C) [ 19.129976] dump_stack_lvl+0x8c/0xd0 [ 19.130113] print_report+0x118/0x608 [ 19.130320] kasan_report+0xdc/0x128 [ 19.130644] __kasan_check_byte+0x54/0x70 [ 19.130862] krealloc_noprof+0x44/0x360 [ 19.131091] krealloc_uaf+0x180/0x520 [ 19.131375] kunit_try_run_case+0x170/0x3f0 [ 19.131590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.132173] kthread+0x328/0x630 [ 19.132483] ret_from_fork+0x10/0x20 [ 19.132612] [ 19.132826] Allocated by task 173: [ 19.132944] kasan_save_stack+0x3c/0x68 [ 19.133063] kasan_save_track+0x20/0x40 [ 19.133167] kasan_save_alloc_info+0x40/0x58 [ 19.133587] __kasan_kmalloc+0xd4/0xd8 [ 19.133816] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.134361] krealloc_uaf+0xc8/0x520 [ 19.134467] kunit_try_run_case+0x170/0x3f0 [ 19.134601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.134745] kthread+0x328/0x630 [ 19.134830] ret_from_fork+0x10/0x20 [ 19.134937] [ 19.135049] Freed by task 173: [ 19.135168] kasan_save_stack+0x3c/0x68 [ 19.135269] kasan_save_track+0x20/0x40 [ 19.135362] kasan_save_free_info+0x4c/0x78 [ 19.135449] __kasan_slab_free+0x6c/0x98 [ 19.135532] kfree+0x214/0x3c8 [ 19.135606] krealloc_uaf+0x12c/0x520 [ 19.135690] kunit_try_run_case+0x170/0x3f0 [ 19.135791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.135936] kthread+0x328/0x630 [ 19.136038] ret_from_fork+0x10/0x20 [ 19.136169] [ 19.136223] The buggy address belongs to the object at fff00000c604d400 [ 19.136223] which belongs to the cache kmalloc-256 of size 256 [ 19.136406] The buggy address is located 0 bytes inside of [ 19.136406] freed 256-byte region [fff00000c604d400, fff00000c604d500) [ 19.136551] [ 19.136599] The buggy address belongs to the physical page: [ 19.136682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 19.136856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.136961] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.137088] page_type: f5(slab) [ 19.137184] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.137312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.137781] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.137983] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.138125] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 19.138284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.138406] page dumped because: kasan: bad access detected [ 19.138503] [ 19.138546] Memory state around the buggy address: [ 19.138662] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.138784] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.139217] >fff00000c604d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.139601] ^ [ 19.139716] fff00000c604d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.139828] fff00000c604d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.140034] ================================================================== [ 19.146211] ================================================================== [ 19.146428] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 19.146565] Read of size 1 at addr fff00000c604d400 by task kunit_try_catch/173 [ 19.146695] [ 19.146789] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.147817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.148114] Hardware name: linux,dummy-virt (DT) [ 19.148303] Call trace: [ 19.148363] show_stack+0x20/0x38 (C) [ 19.148928] dump_stack_lvl+0x8c/0xd0 [ 19.149130] print_report+0x118/0x608 [ 19.149402] kasan_report+0xdc/0x128 [ 19.149543] __asan_report_load1_noabort+0x20/0x30 [ 19.149657] krealloc_uaf+0x4c8/0x520 [ 19.149750] kunit_try_run_case+0x170/0x3f0 [ 19.149876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.150009] kthread+0x328/0x630 [ 19.150694] ret_from_fork+0x10/0x20 [ 19.151024] [ 19.151073] Allocated by task 173: [ 19.151144] kasan_save_stack+0x3c/0x68 [ 19.151249] kasan_save_track+0x20/0x40 [ 19.151362] kasan_save_alloc_info+0x40/0x58 [ 19.151466] __kasan_kmalloc+0xd4/0xd8 [ 19.151558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.151656] krealloc_uaf+0xc8/0x520 [ 19.151748] kunit_try_run_case+0x170/0x3f0 [ 19.151870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.151986] kthread+0x328/0x630 [ 19.152071] ret_from_fork+0x10/0x20 [ 19.152161] [ 19.152210] Freed by task 173: [ 19.152316] kasan_save_stack+0x3c/0x68 [ 19.152416] kasan_save_track+0x20/0x40 [ 19.152501] kasan_save_free_info+0x4c/0x78 [ 19.152584] __kasan_slab_free+0x6c/0x98 [ 19.152668] kfree+0x214/0x3c8 [ 19.152770] krealloc_uaf+0x12c/0x520 [ 19.152861] kunit_try_run_case+0x170/0x3f0 [ 19.153468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.153851] kthread+0x328/0x630 [ 19.153940] ret_from_fork+0x10/0x20 [ 19.154852] [ 19.155181] The buggy address belongs to the object at fff00000c604d400 [ 19.155181] which belongs to the cache kmalloc-256 of size 256 [ 19.155343] The buggy address is located 0 bytes inside of [ 19.155343] freed 256-byte region [fff00000c604d400, fff00000c604d500) [ 19.155500] [ 19.156296] The buggy address belongs to the physical page: [ 19.157058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 19.157219] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.157339] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.157471] page_type: f5(slab) [ 19.157564] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.157668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.158071] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.158257] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.158734] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 19.159175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.159313] page dumped because: kasan: bad access detected [ 19.159475] [ 19.159524] Memory state around the buggy address: [ 19.159869] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.160018] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.160154] >fff00000c604d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.160392] ^ [ 19.160611] fff00000c604d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.161219] fff00000c604d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.161354] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 18.979617] ================================================================== [ 18.979732] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.979855] Write of size 1 at addr fff00000c604d2da by task kunit_try_catch/167 [ 18.979974] [ 18.980050] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.980249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.980313] Hardware name: linux,dummy-virt (DT) [ 18.980384] Call trace: [ 18.980432] show_stack+0x20/0x38 (C) [ 18.980538] dump_stack_lvl+0x8c/0xd0 [ 18.980639] print_report+0x118/0x608 [ 18.980742] kasan_report+0xdc/0x128 [ 18.981624] __asan_report_store1_noabort+0x20/0x30 [ 18.981788] krealloc_less_oob_helper+0xa80/0xc50 [ 18.981947] krealloc_less_oob+0x20/0x38 [ 18.982370] kunit_try_run_case+0x170/0x3f0 [ 18.982530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.982718] kthread+0x328/0x630 [ 18.982873] ret_from_fork+0x10/0x20 [ 18.982991] [ 18.983034] Allocated by task 167: [ 18.983097] kasan_save_stack+0x3c/0x68 [ 18.983184] kasan_save_track+0x20/0x40 [ 18.983267] kasan_save_alloc_info+0x40/0x58 [ 18.983352] __kasan_krealloc+0x118/0x178 [ 18.983437] krealloc_noprof+0x128/0x360 [ 18.983520] krealloc_less_oob_helper+0x168/0xc50 [ 18.983607] krealloc_less_oob+0x20/0x38 [ 18.983690] kunit_try_run_case+0x170/0x3f0 [ 18.983781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.983892] kthread+0x328/0x630 [ 18.983971] ret_from_fork+0x10/0x20 [ 18.984049] [ 18.984094] The buggy address belongs to the object at fff00000c604d200 [ 18.984094] which belongs to the cache kmalloc-256 of size 256 [ 18.984226] The buggy address is located 17 bytes to the right of [ 18.984226] allocated 201-byte region [fff00000c604d200, fff00000c604d2c9) [ 18.984375] [ 18.985262] The buggy address belongs to the physical page: [ 18.985405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.985541] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.985638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.985785] page_type: f5(slab) [ 18.985895] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.986003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.986106] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.986195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.986308] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.986622] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.986826] page dumped because: kasan: bad access detected [ 18.986989] [ 18.987057] Memory state around the buggy address: [ 18.987134] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.987243] fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.987351] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.987447] ^ [ 18.987536] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.987642] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.987738] ================================================================== [ 19.070083] ================================================================== [ 19.070223] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 19.070361] Write of size 1 at addr fff00000c66160c9 by task kunit_try_catch/171 [ 19.070479] [ 19.070570] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.070786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.070855] Hardware name: linux,dummy-virt (DT) [ 19.070931] Call trace: [ 19.071121] show_stack+0x20/0x38 (C) [ 19.071417] dump_stack_lvl+0x8c/0xd0 [ 19.071522] print_report+0x118/0x608 [ 19.071626] kasan_report+0xdc/0x128 [ 19.072157] __asan_report_store1_noabort+0x20/0x30 [ 19.072282] krealloc_less_oob_helper+0xa48/0xc50 [ 19.072400] krealloc_large_less_oob+0x20/0x38 [ 19.072511] kunit_try_run_case+0x170/0x3f0 [ 19.072625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.072744] kthread+0x328/0x630 [ 19.072854] ret_from_fork+0x10/0x20 [ 19.073159] [ 19.073214] The buggy address belongs to the physical page: [ 19.073311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.073450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.073604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.073773] page_type: f8(unknown) [ 19.073931] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.074074] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.074220] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.074332] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.074455] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.074593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.074705] page dumped because: kasan: bad access detected [ 19.074775] [ 19.074816] Memory state around the buggy address: [ 19.074902] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.075339] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.075488] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.075609] ^ [ 19.075724] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.075932] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.076046] ================================================================== [ 18.954285] ================================================================== [ 18.954881] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.955783] Write of size 1 at addr fff00000c604d2c9 by task kunit_try_catch/167 [ 18.956075] [ 18.956256] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.956480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.956860] Hardware name: linux,dummy-virt (DT) [ 18.957154] Call trace: [ 18.957246] show_stack+0x20/0x38 (C) [ 18.957471] dump_stack_lvl+0x8c/0xd0 [ 18.957589] print_report+0x118/0x608 [ 18.958413] kasan_report+0xdc/0x128 [ 18.958546] __asan_report_store1_noabort+0x20/0x30 [ 18.958766] krealloc_less_oob_helper+0xa48/0xc50 [ 18.959119] krealloc_less_oob+0x20/0x38 [ 18.959251] kunit_try_run_case+0x170/0x3f0 [ 18.959370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.960033] kthread+0x328/0x630 [ 18.960158] ret_from_fork+0x10/0x20 [ 18.960276] [ 18.960492] Allocated by task 167: [ 18.960654] kasan_save_stack+0x3c/0x68 [ 18.960747] kasan_save_track+0x20/0x40 [ 18.961314] kasan_save_alloc_info+0x40/0x58 [ 18.961433] __kasan_krealloc+0x118/0x178 [ 18.961527] krealloc_noprof+0x128/0x360 [ 18.961695] krealloc_less_oob_helper+0x168/0xc50 [ 18.962092] krealloc_less_oob+0x20/0x38 [ 18.962470] kunit_try_run_case+0x170/0x3f0 [ 18.962591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.962699] kthread+0x328/0x630 [ 18.962889] ret_from_fork+0x10/0x20 [ 18.963097] [ 18.963179] The buggy address belongs to the object at fff00000c604d200 [ 18.963179] which belongs to the cache kmalloc-256 of size 256 [ 18.963557] The buggy address is located 0 bytes to the right of [ 18.963557] allocated 201-byte region [fff00000c604d200, fff00000c604d2c9) [ 18.963786] [ 18.964078] The buggy address belongs to the physical page: [ 18.964444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.964731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.965343] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.965499] page_type: f5(slab) [ 18.965601] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.966259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.966503] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.966852] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.967275] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.967419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.967526] page dumped because: kasan: bad access detected [ 18.967712] [ 18.967768] Memory state around the buggy address: [ 18.968064] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.968186] fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.968317] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.968412] ^ [ 18.968501] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.968607] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.968704] ================================================================== [ 19.002525] ================================================================== [ 19.002592] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 19.002658] Write of size 1 at addr fff00000c604d2eb by task kunit_try_catch/167 [ 19.002713] [ 19.002758] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.002882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.002915] Hardware name: linux,dummy-virt (DT) [ 19.002951] Call trace: [ 19.002978] show_stack+0x20/0x38 (C) [ 19.003034] dump_stack_lvl+0x8c/0xd0 [ 19.003086] print_report+0x118/0x608 [ 19.003137] kasan_report+0xdc/0x128 [ 19.003187] __asan_report_store1_noabort+0x20/0x30 [ 19.003240] krealloc_less_oob_helper+0xa58/0xc50 [ 19.003292] krealloc_less_oob+0x20/0x38 [ 19.003342] kunit_try_run_case+0x170/0x3f0 [ 19.003393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.003449] kthread+0x328/0x630 [ 19.003495] ret_from_fork+0x10/0x20 [ 19.003548] [ 19.003570] Allocated by task 167: [ 19.003603] kasan_save_stack+0x3c/0x68 [ 19.003650] kasan_save_track+0x20/0x40 [ 19.003692] kasan_save_alloc_info+0x40/0x58 [ 19.003731] __kasan_krealloc+0x118/0x178 [ 19.003772] krealloc_noprof+0x128/0x360 [ 19.003813] krealloc_less_oob_helper+0x168/0xc50 [ 19.003953] krealloc_less_oob+0x20/0x38 [ 19.004050] kunit_try_run_case+0x170/0x3f0 [ 19.004236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.004403] kthread+0x328/0x630 [ 19.004535] ret_from_fork+0x10/0x20 [ 19.004623] [ 19.004671] The buggy address belongs to the object at fff00000c604d200 [ 19.004671] which belongs to the cache kmalloc-256 of size 256 [ 19.004824] The buggy address is located 34 bytes to the right of [ 19.004824] allocated 201-byte region [fff00000c604d200, fff00000c604d2c9) [ 19.005604] [ 19.005695] The buggy address belongs to the physical page: [ 19.006215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 19.006665] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.006874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.007025] page_type: f5(slab) [ 19.007220] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.007347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.007467] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.007588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.007737] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 19.007923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.008070] page dumped because: kasan: bad access detected [ 19.008173] [ 19.008240] Memory state around the buggy address: [ 19.008338] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.008462] fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.008606] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.008734] ^ [ 19.008876] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.008987] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.009074] ================================================================== [ 19.093962] ================================================================== [ 19.094403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 19.094553] Write of size 1 at addr fff00000c66160ea by task kunit_try_catch/171 [ 19.094666] [ 19.094946] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.095241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.095324] Hardware name: linux,dummy-virt (DT) [ 19.095472] Call trace: [ 19.095553] show_stack+0x20/0x38 (C) [ 19.095700] dump_stack_lvl+0x8c/0xd0 [ 19.095805] print_report+0x118/0x608 [ 19.095928] kasan_report+0xdc/0x128 [ 19.096357] __asan_report_store1_noabort+0x20/0x30 [ 19.096514] krealloc_less_oob_helper+0xae4/0xc50 [ 19.096684] krealloc_large_less_oob+0x20/0x38 [ 19.096813] kunit_try_run_case+0x170/0x3f0 [ 19.096943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.097357] kthread+0x328/0x630 [ 19.097500] ret_from_fork+0x10/0x20 [ 19.097645] [ 19.097700] The buggy address belongs to the physical page: [ 19.097798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.097942] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.098219] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.098353] page_type: f8(unknown) [ 19.098723] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.098940] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.099118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.099247] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.099414] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.099556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.099664] page dumped because: kasan: bad access detected [ 19.099746] [ 19.099797] Memory state around the buggy address: [ 19.099893] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.100128] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.100246] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.100346] ^ [ 19.100832] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.100994] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.101130] ================================================================== [ 19.101721] ================================================================== [ 19.101852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 19.102274] Write of size 1 at addr fff00000c66160eb by task kunit_try_catch/171 [ 19.102448] [ 19.102552] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.102797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.102891] Hardware name: linux,dummy-virt (DT) [ 19.103004] Call trace: [ 19.103078] show_stack+0x20/0x38 (C) [ 19.103239] dump_stack_lvl+0x8c/0xd0 [ 19.103395] print_report+0x118/0x608 [ 19.103531] kasan_report+0xdc/0x128 [ 19.103651] __asan_report_store1_noabort+0x20/0x30 [ 19.103775] krealloc_less_oob_helper+0xa58/0xc50 [ 19.103903] krealloc_large_less_oob+0x20/0x38 [ 19.104349] kunit_try_run_case+0x170/0x3f0 [ 19.104662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.104871] kthread+0x328/0x630 [ 19.105245] ret_from_fork+0x10/0x20 [ 19.105416] [ 19.105458] The buggy address belongs to the physical page: [ 19.105516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.105626] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.105882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.106119] page_type: f8(unknown) [ 19.106329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.106708] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.107112] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.107356] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.107596] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.107896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.108065] page dumped because: kasan: bad access detected [ 19.108149] [ 19.108252] Memory state around the buggy address: [ 19.108441] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.108658] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.109021] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.109138] ^ [ 19.109270] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.109404] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.109505] ================================================================== [ 19.078088] ================================================================== [ 19.078206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 19.078330] Write of size 1 at addr fff00000c66160d0 by task kunit_try_catch/171 [ 19.078454] [ 19.078539] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.078752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.078820] Hardware name: linux,dummy-virt (DT) [ 19.078916] Call trace: [ 19.078972] show_stack+0x20/0x38 (C) [ 19.079135] dump_stack_lvl+0x8c/0xd0 [ 19.079585] print_report+0x118/0x608 [ 19.079922] kasan_report+0xdc/0x128 [ 19.080070] __asan_report_store1_noabort+0x20/0x30 [ 19.080227] krealloc_less_oob_helper+0xb9c/0xc50 [ 19.080343] krealloc_large_less_oob+0x20/0x38 [ 19.080451] kunit_try_run_case+0x170/0x3f0 [ 19.080567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.080691] kthread+0x328/0x630 [ 19.081097] ret_from_fork+0x10/0x20 [ 19.081460] [ 19.081507] The buggy address belongs to the physical page: [ 19.081696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.081844] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.081952] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.082058] page_type: f8(unknown) [ 19.082143] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.082436] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.082775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.082955] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.083073] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.083197] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.083306] page dumped because: kasan: bad access detected [ 19.083410] [ 19.083468] Memory state around the buggy address: [ 19.083569] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.083710] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.083873] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.083956] ^ [ 19.084044] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.084458] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.084554] ================================================================== [ 18.990316] ================================================================== [ 18.990521] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.990646] Write of size 1 at addr fff00000c604d2ea by task kunit_try_catch/167 [ 18.990755] [ 18.990827] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.991054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.991119] Hardware name: linux,dummy-virt (DT) [ 18.991193] Call trace: [ 18.991247] show_stack+0x20/0x38 (C) [ 18.991362] dump_stack_lvl+0x8c/0xd0 [ 18.991472] print_report+0x118/0x608 [ 18.991579] kasan_report+0xdc/0x128 [ 18.991685] __asan_report_store1_noabort+0x20/0x30 [ 18.991796] krealloc_less_oob_helper+0xae4/0xc50 [ 18.991921] krealloc_less_oob+0x20/0x38 [ 18.992027] kunit_try_run_case+0x170/0x3f0 [ 18.992139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.992263] kthread+0x328/0x630 [ 18.992360] ret_from_fork+0x10/0x20 [ 18.992468] [ 18.992513] Allocated by task 167: [ 18.992578] kasan_save_stack+0x3c/0x68 [ 18.992671] kasan_save_track+0x20/0x40 [ 18.992758] kasan_save_alloc_info+0x40/0x58 [ 18.992885] __kasan_krealloc+0x118/0x178 [ 18.992969] krealloc_noprof+0x128/0x360 [ 18.993057] krealloc_less_oob_helper+0x168/0xc50 [ 18.993158] krealloc_less_oob+0x20/0x38 [ 18.993241] kunit_try_run_case+0x170/0x3f0 [ 18.993338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.993504] kthread+0x328/0x630 [ 18.994088] ret_from_fork+0x10/0x20 [ 18.994240] [ 18.994293] The buggy address belongs to the object at fff00000c604d200 [ 18.994293] which belongs to the cache kmalloc-256 of size 256 [ 18.994494] The buggy address is located 33 bytes to the right of [ 18.994494] allocated 201-byte region [fff00000c604d200, fff00000c604d2c9) [ 18.995124] [ 18.995373] The buggy address belongs to the physical page: [ 18.995461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.996132] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.996276] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.996415] page_type: f5(slab) [ 18.996582] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.997181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.997432] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.997634] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.997786] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.997947] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.998517] page dumped because: kasan: bad access detected [ 18.998686] [ 18.998739] Memory state around the buggy address: [ 18.999867] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.000063] fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.000609] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.000813] ^ [ 19.001006] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.001193] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.001393] ================================================================== [ 18.971450] ================================================================== [ 18.971558] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.971961] Write of size 1 at addr fff00000c604d2d0 by task kunit_try_catch/167 [ 18.972119] [ 18.972234] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.972443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.972528] Hardware name: linux,dummy-virt (DT) [ 18.972627] Call trace: [ 18.972697] show_stack+0x20/0x38 (C) [ 18.972872] dump_stack_lvl+0x8c/0xd0 [ 18.972975] print_report+0x118/0x608 [ 18.973288] kasan_report+0xdc/0x128 [ 18.973429] __asan_report_store1_noabort+0x20/0x30 [ 18.973546] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.973787] krealloc_less_oob+0x20/0x38 [ 18.973918] kunit_try_run_case+0x170/0x3f0 [ 18.974033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.974099] kthread+0x328/0x630 [ 18.974150] ret_from_fork+0x10/0x20 [ 18.974209] [ 18.974233] Allocated by task 167: [ 18.974271] kasan_save_stack+0x3c/0x68 [ 18.974322] kasan_save_track+0x20/0x40 [ 18.974363] kasan_save_alloc_info+0x40/0x58 [ 18.974403] __kasan_krealloc+0x118/0x178 [ 18.974444] krealloc_noprof+0x128/0x360 [ 18.974486] krealloc_less_oob_helper+0x168/0xc50 [ 18.974528] krealloc_less_oob+0x20/0x38 [ 18.974567] kunit_try_run_case+0x170/0x3f0 [ 18.974607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.974652] kthread+0x328/0x630 [ 18.974687] ret_from_fork+0x10/0x20 [ 18.974726] [ 18.974749] The buggy address belongs to the object at fff00000c604d200 [ 18.974749] which belongs to the cache kmalloc-256 of size 256 [ 18.974811] The buggy address is located 7 bytes to the right of [ 18.974811] allocated 201-byte region [fff00000c604d200, fff00000c604d2c9) [ 18.974945] [ 18.974992] The buggy address belongs to the physical page: [ 18.975137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.975333] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.975892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.976086] page_type: f5(slab) [ 18.976199] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.976310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.976475] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.976592] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.976710] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.976844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.976951] page dumped because: kasan: bad access detected [ 18.977026] [ 18.977097] Memory state around the buggy address: [ 18.977160] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.977260] fff00000c604d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.977358] >fff00000c604d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.977611] ^ [ 18.977802] fff00000c604d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.977935] fff00000c604d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.978027] ================================================================== [ 19.086695] ================================================================== [ 19.086809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 19.086942] Write of size 1 at addr fff00000c66160da by task kunit_try_catch/171 [ 19.087264] [ 19.087383] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.087665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.087763] Hardware name: linux,dummy-virt (DT) [ 19.087866] Call trace: [ 19.087939] show_stack+0x20/0x38 (C) [ 19.088080] dump_stack_lvl+0x8c/0xd0 [ 19.088217] print_report+0x118/0x608 [ 19.088335] kasan_report+0xdc/0x128 [ 19.088435] __asan_report_store1_noabort+0x20/0x30 [ 19.088923] krealloc_less_oob_helper+0xa80/0xc50 [ 19.089063] krealloc_large_less_oob+0x20/0x38 [ 19.089220] kunit_try_run_case+0x170/0x3f0 [ 19.089425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.089554] kthread+0x328/0x630 [ 19.089850] ret_from_fork+0x10/0x20 [ 19.090017] [ 19.090071] The buggy address belongs to the physical page: [ 19.090152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.090285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.090401] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.090539] page_type: f8(unknown) [ 19.090671] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.090830] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.091006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.091168] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.091310] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.091424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.091524] page dumped because: kasan: bad access detected [ 19.091597] [ 19.091993] Memory state around the buggy address: [ 19.092114] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.092264] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.092384] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.092482] ^ [ 19.092576] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.092682] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.092780] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 19.036486] ================================================================== [ 19.036618] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.036775] Write of size 1 at addr fff00000c66160f0 by task kunit_try_catch/169 [ 19.036971] [ 19.037067] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.037324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.037382] Hardware name: linux,dummy-virt (DT) [ 19.037452] Call trace: [ 19.037501] show_stack+0x20/0x38 (C) [ 19.037600] dump_stack_lvl+0x8c/0xd0 [ 19.037706] print_report+0x118/0x608 [ 19.037802] kasan_report+0xdc/0x128 [ 19.037922] __asan_report_store1_noabort+0x20/0x30 [ 19.038049] krealloc_more_oob_helper+0x5c0/0x678 [ 19.038262] krealloc_large_more_oob+0x20/0x38 [ 19.038494] kunit_try_run_case+0x170/0x3f0 [ 19.038704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.039481] kthread+0x328/0x630 [ 19.040196] ret_from_fork+0x10/0x20 [ 19.040416] [ 19.040465] The buggy address belongs to the physical page: [ 19.041088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.041703] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.041957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.042185] page_type: f8(unknown) [ 19.042713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.042829] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.042956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.043074] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.043200] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.043417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.044350] page dumped because: kasan: bad access detected [ 19.045688] [ 19.046039] Memory state around the buggy address: [ 19.046133] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.046339] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.046656] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.047123] ^ [ 19.047931] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.048417] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.048528] ================================================================== [ 19.027548] ================================================================== [ 19.027689] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.027821] Write of size 1 at addr fff00000c66160eb by task kunit_try_catch/169 [ 19.028816] [ 19.028917] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.029344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.029400] Hardware name: linux,dummy-virt (DT) [ 19.029444] Call trace: [ 19.029475] show_stack+0x20/0x38 (C) [ 19.029638] dump_stack_lvl+0x8c/0xd0 [ 19.029916] print_report+0x118/0x608 [ 19.030136] kasan_report+0xdc/0x128 [ 19.030354] __asan_report_store1_noabort+0x20/0x30 [ 19.030582] krealloc_more_oob_helper+0x60c/0x678 [ 19.030722] krealloc_large_more_oob+0x20/0x38 [ 19.030854] kunit_try_run_case+0x170/0x3f0 [ 19.030977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.031090] kthread+0x328/0x630 [ 19.031176] ret_from_fork+0x10/0x20 [ 19.031492] [ 19.031548] The buggy address belongs to the physical page: [ 19.031686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 19.031954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.032164] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.032383] page_type: f8(unknown) [ 19.032744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.032940] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.033143] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.033364] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.033665] head: 0bfffe0000000002 ffffc1ffc3198501 00000000ffffffff 00000000ffffffff [ 19.033845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.033950] page dumped because: kasan: bad access detected [ 19.034026] [ 19.034088] Memory state around the buggy address: [ 19.034207] fff00000c6615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.034364] fff00000c6616000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.034474] >fff00000c6616080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.034571] ^ [ 19.034674] fff00000c6616100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.034786] fff00000c6616180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.034898] ================================================================== [ 18.918450] ================================================================== [ 18.918567] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 18.918688] Write of size 1 at addr fff00000c604d0f0 by task kunit_try_catch/165 [ 18.918814] [ 18.918907] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.919120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.919191] Hardware name: linux,dummy-virt (DT) [ 18.919266] Call trace: [ 18.919324] show_stack+0x20/0x38 (C) [ 18.919446] dump_stack_lvl+0x8c/0xd0 [ 18.919560] print_report+0x118/0x608 [ 18.919673] kasan_report+0xdc/0x128 [ 18.919785] __asan_report_store1_noabort+0x20/0x30 [ 18.920359] krealloc_more_oob_helper+0x5c0/0x678 [ 18.920547] krealloc_more_oob+0x20/0x38 [ 18.920711] kunit_try_run_case+0x170/0x3f0 [ 18.920931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.921353] kthread+0x328/0x630 [ 18.921463] ret_from_fork+0x10/0x20 [ 18.921703] [ 18.921752] Allocated by task 165: [ 18.921903] kasan_save_stack+0x3c/0x68 [ 18.922132] kasan_save_track+0x20/0x40 [ 18.922333] kasan_save_alloc_info+0x40/0x58 [ 18.922649] __kasan_krealloc+0x118/0x178 [ 18.922743] krealloc_noprof+0x128/0x360 [ 18.922940] krealloc_more_oob_helper+0x168/0x678 [ 18.923237] krealloc_more_oob+0x20/0x38 [ 18.923418] kunit_try_run_case+0x170/0x3f0 [ 18.923623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923847] kthread+0x328/0x630 [ 18.924143] ret_from_fork+0x10/0x20 [ 18.924239] [ 18.924358] The buggy address belongs to the object at fff00000c604d000 [ 18.924358] which belongs to the cache kmalloc-256 of size 256 [ 18.924623] The buggy address is located 5 bytes to the right of [ 18.924623] allocated 235-byte region [fff00000c604d000, fff00000c604d0eb) [ 18.924806] [ 18.924866] The buggy address belongs to the physical page: [ 18.924944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.925081] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.925198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.925332] page_type: f5(slab) [ 18.925429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.925541] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.925670] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.926353] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.926535] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.926695] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.926803] page dumped because: kasan: bad access detected [ 18.926894] [ 18.926991] Memory state around the buggy address: [ 18.927092] fff00000c604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927198] fff00000c604d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.927293] >fff00000c604d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.927406] ^ [ 18.927497] fff00000c604d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927581] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927670] ================================================================== [ 18.904394] ================================================================== [ 18.904558] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 18.904953] Write of size 1 at addr fff00000c604d0eb by task kunit_try_catch/165 [ 18.905354] [ 18.905940] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.906323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.906520] Hardware name: linux,dummy-virt (DT) [ 18.906717] Call trace: [ 18.906968] show_stack+0x20/0x38 (C) [ 18.907108] dump_stack_lvl+0x8c/0xd0 [ 18.907476] print_report+0x118/0x608 [ 18.908052] kasan_report+0xdc/0x128 [ 18.908358] __asan_report_store1_noabort+0x20/0x30 [ 18.908540] krealloc_more_oob_helper+0x60c/0x678 [ 18.908709] krealloc_more_oob+0x20/0x38 [ 18.908894] kunit_try_run_case+0x170/0x3f0 [ 18.909047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.909629] kthread+0x328/0x630 [ 18.909819] ret_from_fork+0x10/0x20 [ 18.910056] [ 18.910111] Allocated by task 165: [ 18.910245] kasan_save_stack+0x3c/0x68 [ 18.910858] kasan_save_track+0x20/0x40 [ 18.911036] kasan_save_alloc_info+0x40/0x58 [ 18.911589] __kasan_krealloc+0x118/0x178 [ 18.912160] krealloc_noprof+0x128/0x360 [ 18.912310] krealloc_more_oob_helper+0x168/0x678 [ 18.912859] krealloc_more_oob+0x20/0x38 [ 18.912999] kunit_try_run_case+0x170/0x3f0 [ 18.913081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.913172] kthread+0x328/0x630 [ 18.913245] ret_from_fork+0x10/0x20 [ 18.913316] [ 18.913360] The buggy address belongs to the object at fff00000c604d000 [ 18.913360] which belongs to the cache kmalloc-256 of size 256 [ 18.913488] The buggy address is located 0 bytes to the right of [ 18.913488] allocated 235-byte region [fff00000c604d000, fff00000c604d0eb) [ 18.913623] [ 18.913665] The buggy address belongs to the physical page: [ 18.913740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604c [ 18.913901] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.914052] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.914217] page_type: f5(slab) [ 18.914336] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.914490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.914697] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.914818] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.914959] head: 0bfffe0000000001 ffffc1ffc3181301 00000000ffffffff 00000000ffffffff [ 18.915088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.915203] page dumped because: kasan: bad access detected [ 18.915277] [ 18.915323] Memory state around the buggy address: [ 18.915396] fff00000c604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.915491] fff00000c604d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.915597] >fff00000c604d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.915702] ^ [ 18.915826] fff00000c604d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.915942] fff00000c604d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.916034] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 18.878476] ================================================================== [ 18.878631] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 18.878780] Read of size 1 at addr fff00000c7830000 by task kunit_try_catch/163 [ 18.878906] [ 18.878994] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.879166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.879223] Hardware name: linux,dummy-virt (DT) [ 18.879293] Call trace: [ 18.879342] show_stack+0x20/0x38 (C) [ 18.879789] dump_stack_lvl+0x8c/0xd0 [ 18.879948] print_report+0x118/0x608 [ 18.880061] kasan_report+0xdc/0x128 [ 18.880198] __asan_report_load1_noabort+0x20/0x30 [ 18.880379] page_alloc_uaf+0x328/0x350 [ 18.880502] kunit_try_run_case+0x170/0x3f0 [ 18.880625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.880745] kthread+0x328/0x630 [ 18.880864] ret_from_fork+0x10/0x20 [ 18.880979] [ 18.881029] The buggy address belongs to the physical page: [ 18.881104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107830 [ 18.881229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.881337] page_type: f0(buddy) [ 18.881434] raw: 0bfffe0000000000 fff00000ff6160a0 fff00000ff6160a0 0000000000000000 [ 18.881558] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 18.881662] page dumped because: kasan: bad access detected [ 18.881744] [ 18.882293] Memory state around the buggy address: [ 18.882424] fff00000c782ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.882550] fff00000c782ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.882795] >fff00000c7830000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.882916] ^ [ 18.883019] fff00000c7830080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.883195] fff00000c7830100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.883297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 18.839702] ================================================================== [ 18.840143] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 18.840804] Free of addr fff00000c660c001 by task kunit_try_catch/159 [ 18.841037] [ 18.841138] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.841444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.841504] Hardware name: linux,dummy-virt (DT) [ 18.841781] Call trace: [ 18.841866] show_stack+0x20/0x38 (C) [ 18.842007] dump_stack_lvl+0x8c/0xd0 [ 18.842131] print_report+0x118/0x608 [ 18.842246] kasan_report_invalid_free+0xc0/0xe8 [ 18.842646] __kasan_kfree_large+0x5c/0xa8 [ 18.842892] free_large_kmalloc+0x64/0x190 [ 18.843409] kfree+0x270/0x3c8 [ 18.843538] kmalloc_large_invalid_free+0x108/0x270 [ 18.843659] kunit_try_run_case+0x170/0x3f0 [ 18.843777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.843919] kthread+0x328/0x630 [ 18.844105] ret_from_fork+0x10/0x20 [ 18.844546] [ 18.845578] The buggy address belongs to the physical page: [ 18.845701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c [ 18.845860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.846354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.846688] page_type: f8(unknown) [ 18.847175] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.847384] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.847845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.848002] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.848114] head: 0bfffe0000000002 ffffc1ffc3198301 00000000ffffffff 00000000ffffffff [ 18.848746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.848983] page dumped because: kasan: bad access detected [ 18.849068] [ 18.849152] Memory state around the buggy address: [ 18.849247] fff00000c660bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.849508] fff00000c660bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.849712] >fff00000c660c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.849825] ^ [ 18.849918] fff00000c660c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.850025] fff00000c660c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.850587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 18.812517] ================================================================== [ 18.812845] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 18.813185] Read of size 1 at addr fff00000c660c000 by task kunit_try_catch/157 [ 18.813322] [ 18.813414] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.813706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.813806] Hardware name: linux,dummy-virt (DT) [ 18.814035] Call trace: [ 18.814193] show_stack+0x20/0x38 (C) [ 18.814451] dump_stack_lvl+0x8c/0xd0 [ 18.814917] print_report+0x118/0x608 [ 18.815135] kasan_report+0xdc/0x128 [ 18.815254] __asan_report_load1_noabort+0x20/0x30 [ 18.815371] kmalloc_large_uaf+0x2cc/0x2f8 [ 18.815491] kunit_try_run_case+0x170/0x3f0 [ 18.815608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.815735] kthread+0x328/0x630 [ 18.815849] ret_from_fork+0x10/0x20 [ 18.815971] [ 18.816027] The buggy address belongs to the physical page: [ 18.816110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c [ 18.816242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.816402] raw: 0bfffe0000000000 ffffc1ffc3198408 fff00000da448c40 0000000000000000 [ 18.816534] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 18.817169] page dumped because: kasan: bad access detected [ 18.817476] [ 18.817557] Memory state around the buggy address: [ 18.817645] fff00000c660bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.817756] fff00000c660bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.818134] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.818249] ^ [ 18.818432] fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.818552] fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.818783] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 18.797907] ================================================================== [ 18.798090] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 18.798229] Write of size 1 at addr fff00000c660e00a by task kunit_try_catch/155 [ 18.798381] [ 18.798471] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.798717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.798809] Hardware name: linux,dummy-virt (DT) [ 18.798924] Call trace: [ 18.798983] show_stack+0x20/0x38 (C) [ 18.799097] dump_stack_lvl+0x8c/0xd0 [ 18.799221] print_report+0x118/0x608 [ 18.799333] kasan_report+0xdc/0x128 [ 18.799507] __asan_report_store1_noabort+0x20/0x30 [ 18.799613] kmalloc_large_oob_right+0x278/0x2b8 [ 18.799710] kunit_try_run_case+0x170/0x3f0 [ 18.799807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.799946] kthread+0x328/0x630 [ 18.800074] ret_from_fork+0x10/0x20 [ 18.800203] [ 18.800305] The buggy address belongs to the physical page: [ 18.800409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c [ 18.800545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.800641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.800766] page_type: f8(unknown) [ 18.800934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.801065] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.801186] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.801295] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.801425] head: 0bfffe0000000002 ffffc1ffc3198301 00000000ffffffff 00000000ffffffff [ 18.801549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.801650] page dumped because: kasan: bad access detected [ 18.801715] [ 18.801752] Memory state around the buggy address: [ 18.801824] fff00000c660df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.801931] fff00000c660df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.802052] >fff00000c660e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.802179] ^ [ 18.802275] fff00000c660e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.802380] fff00000c660e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.802473] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 18.775910] ================================================================== [ 18.776051] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.776184] Write of size 1 at addr fff00000c65adf00 by task kunit_try_catch/153 [ 18.776345] [ 18.776455] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.776819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.776950] Hardware name: linux,dummy-virt (DT) [ 18.777031] Call trace: [ 18.777103] show_stack+0x20/0x38 (C) [ 18.777253] dump_stack_lvl+0x8c/0xd0 [ 18.777397] print_report+0x118/0x608 [ 18.777539] kasan_report+0xdc/0x128 [ 18.777669] __asan_report_store1_noabort+0x20/0x30 [ 18.777772] kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.777906] kunit_try_run_case+0x170/0x3f0 [ 18.778053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.778177] kthread+0x328/0x630 [ 18.778276] ret_from_fork+0x10/0x20 [ 18.778389] [ 18.778439] Allocated by task 153: [ 18.778520] kasan_save_stack+0x3c/0x68 [ 18.778636] kasan_save_track+0x20/0x40 [ 18.778767] kasan_save_alloc_info+0x40/0x58 [ 18.778884] __kasan_kmalloc+0xd4/0xd8 [ 18.779075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.779248] kmalloc_big_oob_right+0xb8/0x2f0 [ 18.779364] kunit_try_run_case+0x170/0x3f0 [ 18.779457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.779570] kthread+0x328/0x630 [ 18.779654] ret_from_fork+0x10/0x20 [ 18.779747] [ 18.779792] The buggy address belongs to the object at fff00000c65ac000 [ 18.779792] which belongs to the cache kmalloc-8k of size 8192 [ 18.779921] The buggy address is located 0 bytes to the right of [ 18.779921] allocated 7936-byte region [fff00000c65ac000, fff00000c65adf00) [ 18.780074] [ 18.780120] The buggy address belongs to the physical page: [ 18.780195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 18.780301] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.780398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.780516] page_type: f5(slab) [ 18.780639] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 18.780817] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.780975] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 18.781117] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.781229] head: 0bfffe0000000003 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 18.781338] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.781430] page dumped because: kasan: bad access detected [ 18.781496] [ 18.781532] Memory state around the buggy address: [ 18.781594] fff00000c65ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.781680] fff00000c65ade80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.781773] >fff00000c65adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.781885] ^ [ 18.781956] fff00000c65adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.782073] fff00000c65ae000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.782198] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 18.736091] ================================================================== [ 18.736228] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.736358] Write of size 1 at addr fff00000c6399b78 by task kunit_try_catch/151 [ 18.736477] [ 18.736565] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.736770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.737371] Hardware name: linux,dummy-virt (DT) [ 18.737518] Call trace: [ 18.737576] show_stack+0x20/0x38 (C) [ 18.737779] dump_stack_lvl+0x8c/0xd0 [ 18.738089] print_report+0x118/0x608 [ 18.738486] kasan_report+0xdc/0x128 [ 18.738930] __asan_report_store1_noabort+0x20/0x30 [ 18.739440] kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.739782] kunit_try_run_case+0x170/0x3f0 [ 18.739999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.740352] kthread+0x328/0x630 [ 18.740527] ret_from_fork+0x10/0x20 [ 18.740741] [ 18.740788] Allocated by task 151: [ 18.740866] kasan_save_stack+0x3c/0x68 [ 18.741181] kasan_save_track+0x20/0x40 [ 18.741310] kasan_save_alloc_info+0x40/0x58 [ 18.741419] __kasan_kmalloc+0xd4/0xd8 [ 18.741513] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.741625] kmalloc_track_caller_oob_right+0xa8/0x488 [ 18.741728] kunit_try_run_case+0x170/0x3f0 [ 18.741822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.741931] kthread+0x328/0x630 [ 18.742004] ret_from_fork+0x10/0x20 [ 18.742087] [ 18.742136] The buggy address belongs to the object at fff00000c6399b00 [ 18.742136] which belongs to the cache kmalloc-128 of size 128 [ 18.742291] The buggy address is located 0 bytes to the right of [ 18.742291] allocated 120-byte region [fff00000c6399b00, fff00000c6399b78) [ 18.743015] [ 18.743098] The buggy address belongs to the physical page: [ 18.743248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.743514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.743710] page_type: f5(slab) [ 18.743888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.744021] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.744320] page dumped because: kasan: bad access detected [ 18.744415] [ 18.744467] Memory state around the buggy address: [ 18.744553] fff00000c6399a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.744672] fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.744893] >fff00000c6399b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.745189] ^ [ 18.745364] fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.745492] fff00000c6399c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.745576] ================================================================== [ 18.750291] ================================================================== [ 18.750419] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 18.750973] Write of size 1 at addr fff00000c6399c78 by task kunit_try_catch/151 [ 18.751224] [ 18.751581] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.752113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.752261] Hardware name: linux,dummy-virt (DT) [ 18.752421] Call trace: [ 18.752534] show_stack+0x20/0x38 (C) [ 18.752779] dump_stack_lvl+0x8c/0xd0 [ 18.752889] print_report+0x118/0x608 [ 18.753072] kasan_report+0xdc/0x128 [ 18.753250] __asan_report_store1_noabort+0x20/0x30 [ 18.753368] kmalloc_track_caller_oob_right+0x418/0x488 [ 18.753494] kunit_try_run_case+0x170/0x3f0 [ 18.753611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.753738] kthread+0x328/0x630 [ 18.753864] ret_from_fork+0x10/0x20 [ 18.753988] [ 18.754036] Allocated by task 151: [ 18.754101] kasan_save_stack+0x3c/0x68 [ 18.754188] kasan_save_track+0x20/0x40 [ 18.754277] kasan_save_alloc_info+0x40/0x58 [ 18.754367] __kasan_kmalloc+0xd4/0xd8 [ 18.754458] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.754567] kmalloc_track_caller_oob_right+0x184/0x488 [ 18.754702] kunit_try_run_case+0x170/0x3f0 [ 18.754795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.755227] kthread+0x328/0x630 [ 18.755344] ret_from_fork+0x10/0x20 [ 18.755461] [ 18.755530] The buggy address belongs to the object at fff00000c6399c00 [ 18.755530] which belongs to the cache kmalloc-128 of size 128 [ 18.755722] The buggy address is located 0 bytes to the right of [ 18.755722] allocated 120-byte region [fff00000c6399c00, fff00000c6399c78) [ 18.755944] [ 18.756012] The buggy address belongs to the physical page: [ 18.756117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.756299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.756453] page_type: f5(slab) [ 18.756562] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.756675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.756772] page dumped because: kasan: bad access detected [ 18.756896] [ 18.757399] Memory state around the buggy address: [ 18.757494] fff00000c6399b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.757597] fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.757908] >fff00000c6399c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.758036] ^ [ 18.758141] fff00000c6399c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.758261] fff00000c6399d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.758370] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 18.715461] ================================================================== [ 18.715642] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 18.715791] Read of size 1 at addr fff00000c773b000 by task kunit_try_catch/149 [ 18.715957] [ 18.716040] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.716274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.716338] Hardware name: linux,dummy-virt (DT) [ 18.716408] Call trace: [ 18.716455] show_stack+0x20/0x38 (C) [ 18.716560] dump_stack_lvl+0x8c/0xd0 [ 18.717010] print_report+0x118/0x608 [ 18.717129] kasan_report+0xdc/0x128 [ 18.717238] __asan_report_load1_noabort+0x20/0x30 [ 18.717361] kmalloc_node_oob_right+0x2f4/0x330 [ 18.717509] kunit_try_run_case+0x170/0x3f0 [ 18.717621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.717749] kthread+0x328/0x630 [ 18.717864] ret_from_fork+0x10/0x20 [ 18.717967] [ 18.718034] Allocated by task 149: [ 18.718099] kasan_save_stack+0x3c/0x68 [ 18.718194] kasan_save_track+0x20/0x40 [ 18.718470] kasan_save_alloc_info+0x40/0x58 [ 18.718578] __kasan_kmalloc+0xd4/0xd8 [ 18.718698] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 18.718843] kmalloc_node_oob_right+0xbc/0x330 [ 18.718973] kunit_try_run_case+0x170/0x3f0 [ 18.719092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.719225] kthread+0x328/0x630 [ 18.719328] ret_from_fork+0x10/0x20 [ 18.719443] [ 18.719505] The buggy address belongs to the object at fff00000c773a000 [ 18.719505] which belongs to the cache kmalloc-4k of size 4096 [ 18.719698] The buggy address is located 0 bytes to the right of [ 18.719698] allocated 4096-byte region [fff00000c773a000, fff00000c773b000) [ 18.719896] [ 18.719946] The buggy address belongs to the physical page: [ 18.720167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738 [ 18.720536] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.720808] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.720981] page_type: f5(slab) [ 18.721486] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 18.721944] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.722137] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 18.722277] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.722413] head: 0bfffe0000000003 ffffc1ffc31dce01 00000000ffffffff 00000000ffffffff [ 18.722547] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.722661] page dumped because: kasan: bad access detected [ 18.722732] [ 18.722772] Memory state around the buggy address: [ 18.723888] fff00000c773af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.724066] fff00000c773af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.724188] >fff00000c773b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.724338] ^ [ 18.724498] fff00000c773b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.724652] fff00000c773b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.724745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 18.690697] ================================================================== [ 18.690868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 18.691169] Read of size 1 at addr fff00000c63970ff by task kunit_try_catch/147 [ 18.691346] [ 18.691437] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.691637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.691694] Hardware name: linux,dummy-virt (DT) [ 18.691756] Call trace: [ 18.691805] show_stack+0x20/0x38 (C) [ 18.691944] dump_stack_lvl+0x8c/0xd0 [ 18.692133] print_report+0x118/0x608 [ 18.692341] kasan_report+0xdc/0x128 [ 18.692459] __asan_report_load1_noabort+0x20/0x30 [ 18.692569] kmalloc_oob_left+0x2ec/0x320 [ 18.692673] kunit_try_run_case+0x170/0x3f0 [ 18.692777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.693168] kthread+0x328/0x630 [ 18.693409] ret_from_fork+0x10/0x20 [ 18.693879] [ 18.693934] Allocated by task 11: [ 18.694021] kasan_save_stack+0x3c/0x68 [ 18.694130] kasan_save_track+0x20/0x40 [ 18.694205] kasan_save_alloc_info+0x40/0x58 [ 18.694352] __kasan_kmalloc+0xd4/0xd8 [ 18.694438] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.694604] kvasprintf+0xe0/0x180 [ 18.694794] __kthread_create_on_node+0x16c/0x350 [ 18.694996] kthread_create_on_node+0xe4/0x130 [ 18.695192] create_worker+0x380/0x6b8 [ 18.695373] worker_thread+0x808/0xf38 [ 18.695510] kthread+0x328/0x630 [ 18.695726] ret_from_fork+0x10/0x20 [ 18.696000] [ 18.696134] The buggy address belongs to the object at fff00000c63970e0 [ 18.696134] which belongs to the cache kmalloc-16 of size 16 [ 18.696283] The buggy address is located 19 bytes to the right of [ 18.696283] allocated 12-byte region [fff00000c63970e0, fff00000c63970ec) [ 18.696648] [ 18.696721] The buggy address belongs to the physical page: [ 18.697004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 18.697196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.697510] page_type: f5(slab) [ 18.697616] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.697822] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.698075] page dumped because: kasan: bad access detected [ 18.698171] [ 18.698313] Memory state around the buggy address: [ 18.698426] fff00000c6396f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.698589] fff00000c6397000: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 18.699039] >fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.699163] ^ [ 18.699268] fff00000c6397100: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.699516] fff00000c6397180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.699728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 18.669627] ================================================================== [ 18.669747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.669892] Read of size 1 at addr fff00000c6399a80 by task kunit_try_catch/145 [ 18.670024] [ 18.670103] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.670322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.670394] Hardware name: linux,dummy-virt (DT) [ 18.670473] Call trace: [ 18.670528] show_stack+0x20/0x38 (C) [ 18.670647] dump_stack_lvl+0x8c/0xd0 [ 18.670761] print_report+0x118/0x608 [ 18.670895] kasan_report+0xdc/0x128 [ 18.671010] __asan_report_load1_noabort+0x20/0x30 [ 18.671123] kmalloc_oob_right+0x5d0/0x660 [ 18.671231] kunit_try_run_case+0x170/0x3f0 [ 18.671343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.671484] kthread+0x328/0x630 [ 18.671581] ret_from_fork+0x10/0x20 [ 18.671685] [ 18.671723] Allocated by task 145: [ 18.671781] kasan_save_stack+0x3c/0x68 [ 18.671882] kasan_save_track+0x20/0x40 [ 18.671969] kasan_save_alloc_info+0x40/0x58 [ 18.672052] __kasan_kmalloc+0xd4/0xd8 [ 18.672135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.672230] kmalloc_oob_right+0xb0/0x660 [ 18.672317] kunit_try_run_case+0x170/0x3f0 [ 18.672404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.672505] kthread+0x328/0x630 [ 18.672583] ret_from_fork+0x10/0x20 [ 18.672668] [ 18.672713] The buggy address belongs to the object at fff00000c6399a00 [ 18.672713] which belongs to the cache kmalloc-128 of size 128 [ 18.672858] The buggy address is located 13 bytes to the right of [ 18.672858] allocated 115-byte region [fff00000c6399a00, fff00000c6399a73) [ 18.673066] [ 18.673128] The buggy address belongs to the physical page: [ 18.673219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.673343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.673474] page_type: f5(slab) [ 18.673593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.673764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.673928] page dumped because: kasan: bad access detected [ 18.674038] [ 18.674084] Memory state around the buggy address: [ 18.674163] fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674311] fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.674457] >fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674587] ^ [ 18.674681] fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674821] fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674959] ================================================================== [ 18.650026] ================================================================== [ 18.650758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.652693] Write of size 1 at addr fff00000c6399a73 by task kunit_try_catch/145 [ 18.652990] [ 18.654493] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.654704] Tainted: [N]=TEST [ 18.654751] Hardware name: linux,dummy-virt (DT) [ 18.655069] Call trace: [ 18.655296] show_stack+0x20/0x38 (C) [ 18.655478] dump_stack_lvl+0x8c/0xd0 [ 18.655555] print_report+0x118/0x608 [ 18.655616] kasan_report+0xdc/0x128 [ 18.655671] __asan_report_store1_noabort+0x20/0x30 [ 18.655729] kmalloc_oob_right+0x5a4/0x660 [ 18.655783] kunit_try_run_case+0x170/0x3f0 [ 18.655855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.655922] kthread+0x328/0x630 [ 18.655975] ret_from_fork+0x10/0x20 [ 18.656169] [ 18.656221] Allocated by task 145: [ 18.656365] kasan_save_stack+0x3c/0x68 [ 18.656450] kasan_save_track+0x20/0x40 [ 18.656496] kasan_save_alloc_info+0x40/0x58 [ 18.656537] __kasan_kmalloc+0xd4/0xd8 [ 18.656578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.656623] kmalloc_oob_right+0xb0/0x660 [ 18.656663] kunit_try_run_case+0x170/0x3f0 [ 18.656703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.656752] kthread+0x328/0x630 [ 18.656794] ret_from_fork+0x10/0x20 [ 18.656917] [ 18.657060] The buggy address belongs to the object at fff00000c6399a00 [ 18.657060] which belongs to the cache kmalloc-128 of size 128 [ 18.657253] The buggy address is located 0 bytes to the right of [ 18.657253] allocated 115-byte region [fff00000c6399a00, fff00000c6399a73) [ 18.657336] [ 18.657438] The buggy address belongs to the physical page: [ 18.657720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.658124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.658492] page_type: f5(slab) [ 18.658900] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.658979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.659119] page dumped because: kasan: bad access detected [ 18.659172] [ 18.659207] Memory state around the buggy address: [ 18.659490] fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.659576] fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.659643] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.659707] ^ [ 18.659802] fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.659865] fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.659942] ================================================================== [ 18.663631] ================================================================== [ 18.663717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.663826] Write of size 1 at addr fff00000c6399a78 by task kunit_try_catch/145 [ 18.663944] [ 18.664027] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.664246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.664314] Hardware name: linux,dummy-virt (DT) [ 18.664389] Call trace: [ 18.664442] show_stack+0x20/0x38 (C) [ 18.664561] dump_stack_lvl+0x8c/0xd0 [ 18.664671] print_report+0x118/0x608 [ 18.664777] kasan_report+0xdc/0x128 [ 18.664916] __asan_report_store1_noabort+0x20/0x30 [ 18.665021] kmalloc_oob_right+0x538/0x660 [ 18.665113] kunit_try_run_case+0x170/0x3f0 [ 18.665220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.665335] kthread+0x328/0x630 [ 18.665434] ret_from_fork+0x10/0x20 [ 18.665545] [ 18.665588] Allocated by task 145: [ 18.665656] kasan_save_stack+0x3c/0x68 [ 18.665755] kasan_save_track+0x20/0x40 [ 18.665895] kasan_save_alloc_info+0x40/0x58 [ 18.666022] __kasan_kmalloc+0xd4/0xd8 [ 18.666152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.666254] kmalloc_oob_right+0xb0/0x660 [ 18.666344] kunit_try_run_case+0x170/0x3f0 [ 18.666436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.666541] kthread+0x328/0x630 [ 18.666621] ret_from_fork+0x10/0x20 [ 18.666699] [ 18.666743] The buggy address belongs to the object at fff00000c6399a00 [ 18.666743] which belongs to the cache kmalloc-128 of size 128 [ 18.666881] The buggy address is located 5 bytes to the right of [ 18.666881] allocated 115-byte region [fff00000c6399a00, fff00000c6399a73) [ 18.667027] [ 18.667075] The buggy address belongs to the physical page: [ 18.667146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.667269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.667385] page_type: f5(slab) [ 18.667485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.667628] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.667740] page dumped because: kasan: bad access detected [ 18.667816] [ 18.667868] Memory state around the buggy address: [ 18.667935] fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.668043] fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.668142] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.668240] ^ [ 18.668350] fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.668454] fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.668542] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 98.820289] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/665 [ 98.821054] Modules linked in: [ 98.821263] CPU: 1 UID: 0 PID: 665 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 98.822127] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 98.822444] Hardware name: linux,dummy-virt (DT) [ 98.822992] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 98.823410] pc : intlog10+0x38/0x48 [ 98.823641] lr : intlog10_test+0xe4/0x200 [ 98.823930] sp : ffff800082177c10 [ 98.824146] x29: ffff800082177c90 x28: 0000000000000000 x27: 0000000000000000 [ 98.824797] x26: 1ffe000019603101 x25: 0000000000000000 x24: ffff800082177ce0 [ 98.825770] x23: ffff800082177d00 x22: 0000000000000000 x21: 1ffff0001042ef82 [ 98.826424] x20: ffffb101094bb880 x19: ffff800080087990 x18: 0000000010b43607 [ 98.826926] x17: 0000000095b199a2 x16: fff00000c593903c x15: fff00000ff616b08 [ 98.827250] x14: 0000000000018fff x13: 1ffe00001b4889cd x12: ffff762021a70181 [ 98.827776] x11: 1ffff62021a70180 x10: ffff762021a70180 x9 : ffffb10106a3e2d4 [ 98.828166] x8 : ffffb1010d380c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 98.828608] x5 : ffff70001042ef82 x4 : 1ffff00010010f3a x3 : 1ffff62021297710 [ 98.829137] x2 : 1ffff62021297710 x1 : 0000000000000003 x0 : 0000000000000000 [ 98.829721] Call trace: [ 98.829925] intlog10+0x38/0x48 (P) [ 98.830200] kunit_try_run_case+0x170/0x3f0 [ 98.830441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.830697] kthread+0x328/0x630 [ 98.830921] ret_from_fork+0x10/0x20 [ 98.831098] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 98.758445] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/647 [ 98.760382] Modules linked in: [ 98.762050] CPU: 1 UID: 0 PID: 647 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 98.763235] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 98.763682] Hardware name: linux,dummy-virt (DT) [ 98.764184] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 98.764833] pc : intlog2+0xd8/0xf8 [ 98.765146] lr : intlog2_test+0xe4/0x200 [ 98.765451] sp : ffff8000820b7c10 [ 98.765827] x29: ffff8000820b7c90 x28: 0000000000000000 x27: 0000000000000000 [ 98.766715] x26: 1ffe00001906dca1 x25: 0000000000000000 x24: ffff8000820b7ce0 [ 98.767378] x23: ffff8000820b7d00 x22: 0000000000000000 x21: 1ffff00010416f82 [ 98.768071] x20: ffffb101094bb780 x19: ffff800080087990 x18: 00000000bf4ccba6 [ 98.768754] x17: 0000000037f69978 x16: 000000003b555c9f x15: 00000000b302b6ee [ 98.769481] x14: 00000000f1f1f1f1 x13: 1ffe00001b48cd89 x12: ffff762021a70181 [ 98.769894] x11: 1ffff62021a70180 x10: ffff762021a70180 x9 : ffffb10106a3e4d4 [ 98.770411] x8 : ffffb1010d380c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 98.771264] x5 : ffff700010416f82 x4 : 1ffff00010010f3a x3 : 1ffff620212976f0 [ 98.771956] x2 : 1ffff620212976f0 x1 : 0000000000000003 x0 : 0000000000000000 [ 98.772615] Call trace: [ 98.773084] intlog2+0xd8/0xf8 (P) [ 98.773425] kunit_try_run_case+0x170/0x3f0 [ 98.774608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 98.775248] kthread+0x328/0x630 [ 98.775636] ret_from_fork+0x10/0x20 [ 98.776198] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[ 337.879413] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[ 337.574205] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>